Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
1k
labels
stringlengths
4
1.38k
body
stringlengths
1
262k
index
stringclasses
16 values
text_combine
stringlengths
96
262k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
707,102
24,295,170,501
IssuesEvent
2022-09-29 09:28:42
wso2/api-manager
https://api.github.com/repos/wso2/api-manager
opened
Integration Studio 8.1.0 issue when running the embeded micro integrator in debug mode
Type/Bug Priority/Normal
### Description Integration Studio 8.1.0 is returning the below warn and error logs while running the integrations studio in debug mode as follows. **WARNING:** An illegal reflective access operation has occurred **WARNING:** Illegal reflective access by org.eclipse.osgi.storage.FrameworkExtensionInstaller (file:/home/eshani/Documents/products/chek/WSO2-Integration-Studio-8.1.0-linux-gtk-x86_64/IntegrationStudio/runtime/microesb/wso2/components/plugins/org.eclipse.osgi_3.14.0.v20190517-1309.jar) to method java.net.URLClassLoader.addURL(java.net.URL) **WARNING:** Please consider reporting this to the maintainers of org.eclipse.osgi.storage.FrameworkExtensionInstaller **WARNING:** Use --illegal-access=warn to enable warnings of further illegal reflective access operations **WARNING:** All illegal access operations will be denied in a future release [2022-09-29 14:11:24,753] INFO {EventAdminConfigurationNotifier} - Logging configuration changed. (Event Admin service unavailable - no notification sent). [2022-09-29 14:11:25,452] **ERROR** {Framework} - FrameworkEvent ERROR org.osgi.framework.BundleException: Could not resolve module: org.wso2.carbon.capp.monitor [171] Unresolved requirement: Import-Package: org.wso2.carbon.application.deployer at org.eclipse.osgi.container.Module.start(Module.java:457) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel$1.run(ModuleContainer.java:1820) at org.eclipse.osgi.internal.framework.EquinoxContainerAdaptor$2$1.execute(EquinoxContainerAdaptor.java:150) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.incStartLevel(ModuleContainer.java:1813) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.incStartLevel(ModuleContainer.java:1770) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.doContainerStartLevel(ModuleContainer.java:1735) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.dispatchEvent(ModuleContainer.java:1661) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.dispatchEvent(ModuleContainer.java:1) at org.eclipse.osgi.framework.eventmgr.EventManager.dispatchEvent(EventManager.java:234) at org.eclipse.osgi.framework.eventmgr.EventManager$EventThread.run(EventManager.java:345) After running the integration studio in debug mode once and then just running the embedded micro integrator, the mentioned warn logs are not getting printed, but the following error can be observed. [2022-09-29 14:12:45,997] INFO {EventAdminConfigurationNotifier} - Logging configuration changed. (Event Admin service unavailable - no notification sent). [2022-09-29 14:12:46,667] ERROR {Framework} - FrameworkEvent ERROR org.osgi.framework.BundleException: Could not resolve module: org.wso2.carbon.capp.monitor [171] Unresolved requirement: Import-Package: org.wso2.carbon.application.deployer at org.eclipse.osgi.container.Module.start(Module.java:457) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel$1.run(ModuleContainer.java:1820) at org.eclipse.osgi.internal.framework.EquinoxContainerAdaptor$2$1.execute(EquinoxContainerAdaptor.java:150) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.incStartLevel(ModuleContainer.java:1813) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.incStartLevel(ModuleContainer.java:1770) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.doContainerStartLevel(ModuleContainer.java:1735) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.dispatchEvent(ModuleContainer.java:1661) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.dispatchEvent(ModuleContainer.java:1) at org.eclipse.osgi.framework.eventmgr.EventManager.dispatchEvent(EventManager.java:234) at org.eclipse.osgi.framework.eventmgr.EventManager$EventThread.run(EventManager.java:345) When further checking, we were able to find that the org.wso2.carbon.capp.monitor-3.0.0.jar jar file is getting stored into the droppings folder in embedded integration studio in micro integrator. ### Steps to Reproduce 1. Create an integration project. 2. Go to Run-->Debug configurations-->Debug on Emdeded micro integration server-->debug 3. You will see the errors and it will indicate that the server is MI-1.2.0 4. Then stop and just run the project in the embedded micro integrator. 5. The jar file issue will be observed ### Affected Component IntegrationStudio ### Version 8.1.0 ### Environment Details (with versions) _No response_ ### Relevant Log Output _No response_ ### Related Issues _No response_ ### Suggested Labels _No response_
1.0
Integration Studio 8.1.0 issue when running the embeded micro integrator in debug mode - ### Description Integration Studio 8.1.0 is returning the below warn and error logs while running the integrations studio in debug mode as follows. **WARNING:** An illegal reflective access operation has occurred **WARNING:** Illegal reflective access by org.eclipse.osgi.storage.FrameworkExtensionInstaller (file:/home/eshani/Documents/products/chek/WSO2-Integration-Studio-8.1.0-linux-gtk-x86_64/IntegrationStudio/runtime/microesb/wso2/components/plugins/org.eclipse.osgi_3.14.0.v20190517-1309.jar) to method java.net.URLClassLoader.addURL(java.net.URL) **WARNING:** Please consider reporting this to the maintainers of org.eclipse.osgi.storage.FrameworkExtensionInstaller **WARNING:** Use --illegal-access=warn to enable warnings of further illegal reflective access operations **WARNING:** All illegal access operations will be denied in a future release [2022-09-29 14:11:24,753] INFO {EventAdminConfigurationNotifier} - Logging configuration changed. (Event Admin service unavailable - no notification sent). [2022-09-29 14:11:25,452] **ERROR** {Framework} - FrameworkEvent ERROR org.osgi.framework.BundleException: Could not resolve module: org.wso2.carbon.capp.monitor [171] Unresolved requirement: Import-Package: org.wso2.carbon.application.deployer at org.eclipse.osgi.container.Module.start(Module.java:457) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel$1.run(ModuleContainer.java:1820) at org.eclipse.osgi.internal.framework.EquinoxContainerAdaptor$2$1.execute(EquinoxContainerAdaptor.java:150) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.incStartLevel(ModuleContainer.java:1813) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.incStartLevel(ModuleContainer.java:1770) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.doContainerStartLevel(ModuleContainer.java:1735) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.dispatchEvent(ModuleContainer.java:1661) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.dispatchEvent(ModuleContainer.java:1) at org.eclipse.osgi.framework.eventmgr.EventManager.dispatchEvent(EventManager.java:234) at org.eclipse.osgi.framework.eventmgr.EventManager$EventThread.run(EventManager.java:345) After running the integration studio in debug mode once and then just running the embedded micro integrator, the mentioned warn logs are not getting printed, but the following error can be observed. [2022-09-29 14:12:45,997] INFO {EventAdminConfigurationNotifier} - Logging configuration changed. (Event Admin service unavailable - no notification sent). [2022-09-29 14:12:46,667] ERROR {Framework} - FrameworkEvent ERROR org.osgi.framework.BundleException: Could not resolve module: org.wso2.carbon.capp.monitor [171] Unresolved requirement: Import-Package: org.wso2.carbon.application.deployer at org.eclipse.osgi.container.Module.start(Module.java:457) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel$1.run(ModuleContainer.java:1820) at org.eclipse.osgi.internal.framework.EquinoxContainerAdaptor$2$1.execute(EquinoxContainerAdaptor.java:150) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.incStartLevel(ModuleContainer.java:1813) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.incStartLevel(ModuleContainer.java:1770) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.doContainerStartLevel(ModuleContainer.java:1735) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.dispatchEvent(ModuleContainer.java:1661) at org.eclipse.osgi.container.ModuleContainer$ContainerStartLevel.dispatchEvent(ModuleContainer.java:1) at org.eclipse.osgi.framework.eventmgr.EventManager.dispatchEvent(EventManager.java:234) at org.eclipse.osgi.framework.eventmgr.EventManager$EventThread.run(EventManager.java:345) When further checking, we were able to find that the org.wso2.carbon.capp.monitor-3.0.0.jar jar file is getting stored into the droppings folder in embedded integration studio in micro integrator. ### Steps to Reproduce 1. Create an integration project. 2. Go to Run-->Debug configurations-->Debug on Emdeded micro integration server-->debug 3. You will see the errors and it will indicate that the server is MI-1.2.0 4. Then stop and just run the project in the embedded micro integrator. 5. The jar file issue will be observed ### Affected Component IntegrationStudio ### Version 8.1.0 ### Environment Details (with versions) _No response_ ### Relevant Log Output _No response_ ### Related Issues _No response_ ### Suggested Labels _No response_
priority
integration studio issue when running the embeded micro integrator in debug mode description integration studio is returning the below warn and error logs while running the integrations studio in debug mode as follows warning an illegal reflective access operation has occurred warning illegal reflective access by org eclipse osgi storage frameworkextensioninstaller file home eshani documents products chek integration studio linux gtk integrationstudio runtime microesb components plugins org eclipse osgi jar to method java net urlclassloader addurl java net url warning please consider reporting this to the maintainers of org eclipse osgi storage frameworkextensioninstaller warning use illegal access warn to enable warnings of further illegal reflective access operations warning all illegal access operations will be denied in a future release info eventadminconfigurationnotifier logging configuration changed event admin service unavailable no notification sent error framework frameworkevent error org osgi framework bundleexception could not resolve module org carbon capp monitor unresolved requirement import package org carbon application deployer at org eclipse osgi container module start module java at org eclipse osgi container modulecontainer containerstartlevel run modulecontainer java at org eclipse osgi internal framework equinoxcontaineradaptor execute equinoxcontaineradaptor java at org eclipse osgi container modulecontainer containerstartlevel incstartlevel modulecontainer java at org eclipse osgi container modulecontainer containerstartlevel incstartlevel modulecontainer java at org eclipse osgi container modulecontainer containerstartlevel docontainerstartlevel modulecontainer java at org eclipse osgi container modulecontainer containerstartlevel dispatchevent modulecontainer java at org eclipse osgi container modulecontainer containerstartlevel dispatchevent modulecontainer java at org eclipse osgi framework eventmgr eventmanager dispatchevent eventmanager java at org eclipse osgi framework eventmgr eventmanager eventthread run eventmanager java after running the integration studio in debug mode once and then just running the embedded micro integrator the mentioned warn logs are not getting printed but the following error can be observed info eventadminconfigurationnotifier logging configuration changed event admin service unavailable no notification sent error framework frameworkevent error org osgi framework bundleexception could not resolve module org carbon capp monitor unresolved requirement import package org carbon application deployer at org eclipse osgi container module start module java at org eclipse osgi container modulecontainer containerstartlevel run modulecontainer java at org eclipse osgi internal framework equinoxcontaineradaptor execute equinoxcontaineradaptor java at org eclipse osgi container modulecontainer containerstartlevel incstartlevel modulecontainer java at org eclipse osgi container modulecontainer containerstartlevel incstartlevel modulecontainer java at org eclipse osgi container modulecontainer containerstartlevel docontainerstartlevel modulecontainer java at org eclipse osgi container modulecontainer containerstartlevel dispatchevent modulecontainer java at org eclipse osgi container modulecontainer containerstartlevel dispatchevent modulecontainer java at org eclipse osgi framework eventmgr eventmanager dispatchevent eventmanager java at org eclipse osgi framework eventmgr eventmanager eventthread run eventmanager java when further checking we were able to find that the org carbon capp monitor jar jar file is getting stored into the droppings folder in embedded integration studio in micro integrator steps to reproduce create an integration project go to run debug configurations debug on emdeded micro integration server debug you will see the errors and it will indicate that the server is mi then stop and just run the project in the embedded micro integrator the jar file issue will be observed affected component integrationstudio version environment details with versions no response relevant log output no response related issues no response suggested labels no response
1
611,193
18,947,814,362
IssuesEvent
2021-11-18 12:09:09
metabase/metabase
https://api.github.com/repos/metabase/metabase
opened
When filtering by Entity Key, then most options are hidden in Simple GUI
Type:UX Priority:P3 .Frontend Querying/GUI
**Describe the bug** When filtering by Entity Key, then it hides all filters and the Filtering/Summarize buttons in Simple GUI. This can be specially confusing, when accidentally inputting a wrong value, so there's "No results". **To Reproduce** 1. Simple question > Sample Dataset > Products - Filtering: "Category"=`Gizmo` ![image](https://user-images.githubusercontent.com/1447303/142412156-149731f7-8b1d-45cb-a03e-5a953f94918f.png) 2. Now add another filter (of the Entity Key), "ID"=`2022` (non-existing value) - it quickly flashes the filters before hiding them: ![image](https://user-images.githubusercontent.com/1447303/142412472-3ccb3e50-fc70-4895-a62a-661d2ae7a96c.png) **Expected behavior** Do not try to go into ObjectDetail view, when there's no results. I would prefer to always have the filters shown, but that's a Product call: https://github.com/metabase/metabase/pull/16614#pullrequestreview-685369588 **Information about your Metabase Installation:** Tested 0.37.8 thru 0.41.2
1.0
When filtering by Entity Key, then most options are hidden in Simple GUI - **Describe the bug** When filtering by Entity Key, then it hides all filters and the Filtering/Summarize buttons in Simple GUI. This can be specially confusing, when accidentally inputting a wrong value, so there's "No results". **To Reproduce** 1. Simple question > Sample Dataset > Products - Filtering: "Category"=`Gizmo` ![image](https://user-images.githubusercontent.com/1447303/142412156-149731f7-8b1d-45cb-a03e-5a953f94918f.png) 2. Now add another filter (of the Entity Key), "ID"=`2022` (non-existing value) - it quickly flashes the filters before hiding them: ![image](https://user-images.githubusercontent.com/1447303/142412472-3ccb3e50-fc70-4895-a62a-661d2ae7a96c.png) **Expected behavior** Do not try to go into ObjectDetail view, when there's no results. I would prefer to always have the filters shown, but that's a Product call: https://github.com/metabase/metabase/pull/16614#pullrequestreview-685369588 **Information about your Metabase Installation:** Tested 0.37.8 thru 0.41.2
priority
when filtering by entity key then most options are hidden in simple gui describe the bug when filtering by entity key then it hides all filters and the filtering summarize buttons in simple gui this can be specially confusing when accidentally inputting a wrong value so there s no results to reproduce simple question sample dataset products filtering category gizmo now add another filter of the entity key id non existing value it quickly flashes the filters before hiding them expected behavior do not try to go into objectdetail view when there s no results i would prefer to always have the filters shown but that s a product call information about your metabase installation tested thru
1
457,915
13,165,061,399
IssuesEvent
2020-08-11 05:38:45
wso2/product-apim
https://api.github.com/repos/wso2/product-apim
closed
Portals Publisher and Admin cannot view in Microsoft Edge 44.18362.449.0
Priority/Normal Type/Accessibility Type/Bug Type/React-UI
### Description: Publisher and Admin portals are not working in Microsoft Edge 44.18362.449.0, Devportal is working. All working when remote viewing a server hosted on mac. ![Publisher](https://user-images.githubusercontent.com/20179540/89794751-1df45680-db45-11ea-801a-5afec72066c5.png) ![Admin](https://user-images.githubusercontent.com/20179540/89794773-26e52800-db45-11ea-8a68-614b56a8a9e1.png) ![deveportal](https://user-images.githubusercontent.com/20179540/89794782-29e01880-db45-11ea-8f07-f253de1bb03f.png) ### Steps to reproduce: ### Affected Product Version: <!-- Members can use Affected/*** labels --> RC3 ### Environment details (with versions): - OS: Windows 10 - Client: - Env (Docker/K8s): - Microsoft Edge 44.18362.449.0 --- ### Optional Fields #### Related Issues: <!-- Any related issues from this/other repositories--> #### Suggested Labels: <!--Only to be used by non-members--> #### Suggested Assignees: <!--Only to be used by non-members-->
1.0
Portals Publisher and Admin cannot view in Microsoft Edge 44.18362.449.0 - ### Description: Publisher and Admin portals are not working in Microsoft Edge 44.18362.449.0, Devportal is working. All working when remote viewing a server hosted on mac. ![Publisher](https://user-images.githubusercontent.com/20179540/89794751-1df45680-db45-11ea-801a-5afec72066c5.png) ![Admin](https://user-images.githubusercontent.com/20179540/89794773-26e52800-db45-11ea-8a68-614b56a8a9e1.png) ![deveportal](https://user-images.githubusercontent.com/20179540/89794782-29e01880-db45-11ea-8f07-f253de1bb03f.png) ### Steps to reproduce: ### Affected Product Version: <!-- Members can use Affected/*** labels --> RC3 ### Environment details (with versions): - OS: Windows 10 - Client: - Env (Docker/K8s): - Microsoft Edge 44.18362.449.0 --- ### Optional Fields #### Related Issues: <!-- Any related issues from this/other repositories--> #### Suggested Labels: <!--Only to be used by non-members--> #### Suggested Assignees: <!--Only to be used by non-members-->
priority
portals publisher and admin cannot view in microsoft edge description publisher and admin portals are not working in microsoft edge devportal is working all working when remote viewing a server hosted on mac steps to reproduce affected product version environment details with versions os windows client env docker microsoft edge optional fields related issues suggested labels suggested assignees
1
178,905
14,684,406,333
IssuesEvent
2021-01-01 02:23:19
apache/buildstream
https://api.github.com/repos/apache/buildstream
opened
Plugin documentation is lacking
documentation
[See original issue on GitLab](https://gitlab.com/BuildStream/buildstream/-/issues/1192) In GitLab by [[Gitlab user @cs-shadow]](https://gitlab.com/cs-shadow) on Nov 6, 2019, 19:30 ## Background Plugins are at the heart of BuildStream when it comes to end-users, as that is what allows users to write their element configuration. However BuildStream documentation appears to be lacking in this department. We do have some documentation for each plugin where we talk a bit about default variables. But, just describing what those variables mean in one sentence is hardly sufficient for a new user. Take `stack` element for example, [it's documentation](https://docs.buildstream.build/master/elements/stack.html) says just one sentence: > Stack elements are simply a symbolic element used for representing a logical group of elements. Just by reading that one sentence, it's not clear at all how should an user go about writing a `stack` element. ## Task description I think we first need to think more seriously about _what_ to document. Next, maybe start with a couple of common plugins and have a more detailed documentation for them. Once we are happy with the general strucutre, we can follow similar format in other plugins as well. ## Acceptance Criteria [//]: # (Acceptance criteria should follow the S.M.A.R.T. principle https://en.wikipedia.org/wiki/SMART_criteria ) A resonably new BuildStream user should be able to understand how to use a given plugin by reading its documentation. ---- [//]: # (To review information about possible relevant labels for this issue please view the list of labels: https://gitlab.com/BuildStream/buildstream/labels)
1.0
Plugin documentation is lacking - [See original issue on GitLab](https://gitlab.com/BuildStream/buildstream/-/issues/1192) In GitLab by [[Gitlab user @cs-shadow]](https://gitlab.com/cs-shadow) on Nov 6, 2019, 19:30 ## Background Plugins are at the heart of BuildStream when it comes to end-users, as that is what allows users to write their element configuration. However BuildStream documentation appears to be lacking in this department. We do have some documentation for each plugin where we talk a bit about default variables. But, just describing what those variables mean in one sentence is hardly sufficient for a new user. Take `stack` element for example, [it's documentation](https://docs.buildstream.build/master/elements/stack.html) says just one sentence: > Stack elements are simply a symbolic element used for representing a logical group of elements. Just by reading that one sentence, it's not clear at all how should an user go about writing a `stack` element. ## Task description I think we first need to think more seriously about _what_ to document. Next, maybe start with a couple of common plugins and have a more detailed documentation for them. Once we are happy with the general strucutre, we can follow similar format in other plugins as well. ## Acceptance Criteria [//]: # (Acceptance criteria should follow the S.M.A.R.T. principle https://en.wikipedia.org/wiki/SMART_criteria ) A resonably new BuildStream user should be able to understand how to use a given plugin by reading its documentation. ---- [//]: # (To review information about possible relevant labels for this issue please view the list of labels: https://gitlab.com/BuildStream/buildstream/labels)
non_priority
plugin documentation is lacking in gitlab by on nov background plugins are at the heart of buildstream when it comes to end users as that is what allows users to write their element configuration however buildstream documentation appears to be lacking in this department we do have some documentation for each plugin where we talk a bit about default variables but just describing what those variables mean in one sentence is hardly sufficient for a new user take stack element for example says just one sentence stack elements are simply a symbolic element used for representing a logical group of elements just by reading that one sentence it s not clear at all how should an user go about writing a stack element task description i think we first need to think more seriously about what to document next maybe start with a couple of common plugins and have a more detailed documentation for them once we are happy with the general strucutre we can follow similar format in other plugins as well acceptance criteria acceptance criteria should follow the s m a r t principle a resonably new buildstream user should be able to understand how to use a given plugin by reading its documentation to review information about possible relevant labels for this issue please view the list of labels
0
813,765
30,471,181,889
IssuesEvent
2023-07-17 13:44:34
magento/magento2
https://api.github.com/repos/magento/magento2
closed
Customer data in localstorage not reset when session file lost
Issue: Confirmed Reproduced on 2.4.x Component: Session Priority: P2 Progress: done Reported on 2.4.x Area: Account
### Preconditions and environment - Magento version 2.4-develop ### Steps to reproduce 1. Login customer in frontend 2. Add product to cart 3. Remove magento session files with command: rm -rf var/session/* 4. Flush cache ### Expected result - Header not show customer name - Mini cart not show any item ### Actual result - Header still show old customer name - Mini cart still show old item ![fVbvsUP](https://user-images.githubusercontent.com/78783748/198695728-f1c4534f-b3bf-4345-bc86-dd70c1b0c936.png) ### Additional information _No response_ ### Release note _No response_ ### Triage and priority - [ ] Severity: **S0** _- Affects critical data or functionality and leaves users without workaround._ - [ ] Severity: **S1** _- Affects critical data or functionality and forces users to employ a workaround._ - [ ] Severity: **S2** _- Affects non-critical data or functionality and forces users to employ a workaround._ - [ ] Severity: **S3** _- Affects non-critical data or functionality and does not force users to employ a workaround._ - [ ] Severity: **S4** _- Affects aesthetics, professional look and feel, “quality” or “usability”._
1.0
Customer data in localstorage not reset when session file lost - ### Preconditions and environment - Magento version 2.4-develop ### Steps to reproduce 1. Login customer in frontend 2. Add product to cart 3. Remove magento session files with command: rm -rf var/session/* 4. Flush cache ### Expected result - Header not show customer name - Mini cart not show any item ### Actual result - Header still show old customer name - Mini cart still show old item ![fVbvsUP](https://user-images.githubusercontent.com/78783748/198695728-f1c4534f-b3bf-4345-bc86-dd70c1b0c936.png) ### Additional information _No response_ ### Release note _No response_ ### Triage and priority - [ ] Severity: **S0** _- Affects critical data or functionality and leaves users without workaround._ - [ ] Severity: **S1** _- Affects critical data or functionality and forces users to employ a workaround._ - [ ] Severity: **S2** _- Affects non-critical data or functionality and forces users to employ a workaround._ - [ ] Severity: **S3** _- Affects non-critical data or functionality and does not force users to employ a workaround._ - [ ] Severity: **S4** _- Affects aesthetics, professional look and feel, “quality” or “usability”._
priority
customer data in localstorage not reset when session file lost preconditions and environment magento version develop steps to reproduce login customer in frontend add product to cart remove magento session files with command rm rf var session flush cache expected result header not show customer name mini cart not show any item actual result header still show old customer name mini cart still show old item additional information no response release note no response triage and priority severity affects critical data or functionality and leaves users without workaround severity affects critical data or functionality and forces users to employ a workaround severity affects non critical data or functionality and forces users to employ a workaround severity affects non critical data or functionality and does not force users to employ a workaround severity affects aesthetics professional look and feel “quality” or “usability”
1
120,437
25,794,356,467
IssuesEvent
2022-12-10 11:44:32
reactplay/react-play
https://api.github.com/repos/reactplay/react-play
closed
✨ [Feature request]: Code cleanup `Common` folder
code-cleanup
### Is your feature request related to a problem? Please describe. Fix the eslint and formatting issue for common folder file formatting. ### Describe the solution you'd like. Fix the eslint and formatting issue for common folder file formatting. ### Describe alternatives you've considered. . ### Screenshot / Screenshare _No response_ ### Additional context _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
1.0
✨ [Feature request]: Code cleanup `Common` folder - ### Is your feature request related to a problem? Please describe. Fix the eslint and formatting issue for common folder file formatting. ### Describe the solution you'd like. Fix the eslint and formatting issue for common folder file formatting. ### Describe alternatives you've considered. . ### Screenshot / Screenshare _No response_ ### Additional context _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
non_priority
✨ code cleanup common folder is your feature request related to a problem please describe fix the eslint and formatting issue for common folder file formatting describe the solution you d like fix the eslint and formatting issue for common folder file formatting describe alternatives you ve considered screenshot screenshare no response additional context no response code of conduct i agree to follow this project s code of conduct
0
278,900
30,702,421,715
IssuesEvent
2023-07-27 01:28:48
panasalap/linux-4.1.15
https://api.github.com/repos/panasalap/linux-4.1.15
closed
CVE-2022-25258 (Medium) detected in linux179e72b561d3d331c850e1a5779688d7a7de5246 - autoclosed
Mend: dependency security vulnerability
## CVE-2022-25258 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux179e72b561d3d331c850e1a5779688d7a7de5246</b></p></summary> <p> <p>Linux kernel stable tree mirror</p> <p>Library home page: <a href=https://github.com/gregkh/linux.git>https://github.com/gregkh/linux.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur. <p>Publish Date: 2022-02-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25258>CVE-2022-25258</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Physical - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258</a></p> <p>Release Date: 2022-02-16</p> <p>Fix Resolution: v5.17-rc4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-25258 (Medium) detected in linux179e72b561d3d331c850e1a5779688d7a7de5246 - autoclosed - ## CVE-2022-25258 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux179e72b561d3d331c850e1a5779688d7a7de5246</b></p></summary> <p> <p>Linux kernel stable tree mirror</p> <p>Library home page: <a href=https://github.com/gregkh/linux.git>https://github.com/gregkh/linux.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur. <p>Publish Date: 2022-02-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25258>CVE-2022-25258</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Physical - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258</a></p> <p>Release Date: 2022-02-16</p> <p>Fix Resolution: v5.17-rc4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in autoclosed cve medium severity vulnerability vulnerable library linux kernel stable tree mirror library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details an issue was discovered in drivers usb gadget composite c in the linux kernel before the usb gadget subsystem lacks certain validation of interface os descriptor requests ones with a large array index and ones associated with null function pointer retrieval memory corruption might occur publish date url a href cvss score details base score metrics exploitability metrics attack vector physical attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
318,510
9,693,636,613
IssuesEvent
2019-05-24 16:36:54
mono/monodevelop
https://api.github.com/repos/mono/monodevelop
closed
Crash on trying to open solution from start window
Area: IDE Platform\Start Window high-priority regression vs-sync
Build Information Release ID: 801002578 Git revision: a79542bdc4aba2fe7ea8589b8bff6ea239853078 Build date: 2019-05-24 08:54:27+00 Build branch: release-8.1 Xamarin extensions: b894e02a8f68200720b84feb210215a3c1c2dc66 Clicking a solution on the start window terminates VS Mac. ``` FATAL ERROR [2019-05-24 11:37:54Z]: Visual Studio failed to start. Some of the assemblies required to run Visual Studio (for example gtk-sharp)may not be properly installed in the GAC. System.ObjectDisposedException: Cannot access a disposed object. Object name: 'GetToCodeMainPageView'. at Foundation.NSObject.get_SuperHandle () [0x0005b] in /Library/Frameworks/Xamarin.Mac.framework/Versions/5.6.0.25/src/Xamarin.Mac/Foundation/NSObject2.cs:458 at AppKit.NSView.RegisterForDraggedTypes (System.String[] newTypes) [0x00047] in /Library/Frameworks/Xamarin.Mac.framework/Versions/5.6.0.25/src/Xamarin.Mac/AppKit/NSView.g.cs:4148 at Xamarin.Ide.GetToCode.GetToCodeMainPageView.ViewDidMoveToSuperview () [0x00000] in /Users/vsts/agent/2.150.3/work/1/s/md-addins/Xamarin.Ide/Xamarin.Ide/Xamarin.Ide.GetToCode/GetToCodeMainPageView.cs:195 at (wrapper managed-to-native) Gtk.Application.gtk_main() at Gtk.Application.Run () [0x00001] in /Users/builder/jenkins/workspace/build-package-osx-mono/2018-08/external/bockbuild/builds/gtk-sharp-None/gtk/Application.cs:145 at MonoDevelop.Ide.IdeStartup.Run (MonoDevelop.Ide.MonoDevelopOptions options) [0x00455] in /Users/vsts/agent/2.150.3/work/1/s/monodevelop/main/src/core/MonoDevelop.Ide/MonoDevelop.Ide/IdeStartup.cs:221 at MonoDevelop.Ide.IdeStartup.Main (System.String[] args, MonoDevelop.Ide.Extensions.IdeCustomizer customizer) [0x0009e] in /Users/vsts/agent/2.150.3/work/1/s/monodevelop/main/src/core/MonoDevelop.Ide/MonoDevelop.Ide/IdeStartup.cs:729 ``` > VS bug [#899164](https://devdiv.visualstudio.com/DevDiv/_workitems/edit/899164)
1.0
Crash on trying to open solution from start window - Build Information Release ID: 801002578 Git revision: a79542bdc4aba2fe7ea8589b8bff6ea239853078 Build date: 2019-05-24 08:54:27+00 Build branch: release-8.1 Xamarin extensions: b894e02a8f68200720b84feb210215a3c1c2dc66 Clicking a solution on the start window terminates VS Mac. ``` FATAL ERROR [2019-05-24 11:37:54Z]: Visual Studio failed to start. Some of the assemblies required to run Visual Studio (for example gtk-sharp)may not be properly installed in the GAC. System.ObjectDisposedException: Cannot access a disposed object. Object name: 'GetToCodeMainPageView'. at Foundation.NSObject.get_SuperHandle () [0x0005b] in /Library/Frameworks/Xamarin.Mac.framework/Versions/5.6.0.25/src/Xamarin.Mac/Foundation/NSObject2.cs:458 at AppKit.NSView.RegisterForDraggedTypes (System.String[] newTypes) [0x00047] in /Library/Frameworks/Xamarin.Mac.framework/Versions/5.6.0.25/src/Xamarin.Mac/AppKit/NSView.g.cs:4148 at Xamarin.Ide.GetToCode.GetToCodeMainPageView.ViewDidMoveToSuperview () [0x00000] in /Users/vsts/agent/2.150.3/work/1/s/md-addins/Xamarin.Ide/Xamarin.Ide/Xamarin.Ide.GetToCode/GetToCodeMainPageView.cs:195 at (wrapper managed-to-native) Gtk.Application.gtk_main() at Gtk.Application.Run () [0x00001] in /Users/builder/jenkins/workspace/build-package-osx-mono/2018-08/external/bockbuild/builds/gtk-sharp-None/gtk/Application.cs:145 at MonoDevelop.Ide.IdeStartup.Run (MonoDevelop.Ide.MonoDevelopOptions options) [0x00455] in /Users/vsts/agent/2.150.3/work/1/s/monodevelop/main/src/core/MonoDevelop.Ide/MonoDevelop.Ide/IdeStartup.cs:221 at MonoDevelop.Ide.IdeStartup.Main (System.String[] args, MonoDevelop.Ide.Extensions.IdeCustomizer customizer) [0x0009e] in /Users/vsts/agent/2.150.3/work/1/s/monodevelop/main/src/core/MonoDevelop.Ide/MonoDevelop.Ide/IdeStartup.cs:729 ``` > VS bug [#899164](https://devdiv.visualstudio.com/DevDiv/_workitems/edit/899164)
priority
crash on trying to open solution from start window build information release id git revision build date build branch release xamarin extensions clicking a solution on the start window terminates vs mac fatal error visual studio failed to start some of the assemblies required to run visual studio for example gtk sharp may not be properly installed in the gac system objectdisposedexception cannot access a disposed object object name gettocodemainpageview at foundation nsobject get superhandle in library frameworks xamarin mac framework versions src xamarin mac foundation cs at appkit nsview registerfordraggedtypes system string newtypes in library frameworks xamarin mac framework versions src xamarin mac appkit nsview g cs at xamarin ide gettocode gettocodemainpageview viewdidmovetosuperview in users vsts agent work s md addins xamarin ide xamarin ide xamarin ide gettocode gettocodemainpageview cs at wrapper managed to native gtk application gtk main at gtk application run in users builder jenkins workspace build package osx mono external bockbuild builds gtk sharp none gtk application cs at monodevelop ide idestartup run monodevelop ide monodevelopoptions options in users vsts agent work s monodevelop main src core monodevelop ide monodevelop ide idestartup cs at monodevelop ide idestartup main system string args monodevelop ide extensions idecustomizer customizer in users vsts agent work s monodevelop main src core monodevelop ide monodevelop ide idestartup cs vs bug
1
84,032
7,888,072,015
IssuesEvent
2018-06-27 20:42:48
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
2.0.0: kubectl version in Launch kubectl does not match cluster
area/agent kind/enhancement status/resolved status/to-test version/2.0
kubectl version when launched from UI does not match the version of the cluster. Expected output: > kubectl version --short Client Version: v1.9.7 Server Version: v1.9.7 Actual: # Run kubectl commands inside here # e.g. kubectl get all > kubectl version --short Client Version: v1.8.9-rancher1 Server Version: v1.9.7 **Rancher versions:** rancher/server or rancher/rancher: v2.0.0 rancher/agent or rancher/rancher-agent: v2.0.0 **Infrastructure Stack versions:** healthcheck: ipsec: network-services: scheduler: kubernetes (if applicable): Client Version: version.Info{Major:"1", Minor:"8+", GitVersion:"v1.8.9-rancher1", GitCommit:"68595e18f25e24125244e9966b1e5468a98c1cd4", GitTreeState:"clean", BuildDate:"2018-03-13T04:51:52Z", GoVersion:"go1.8.3", Compiler:"gc", Platform:"linux/amd64"} Server Version: version.Info{Major:"1", Minor:"9", GitVersion:"v1.9.7", GitCommit:"dd5e1a2978fd0b97d9b78e1564398aeea7e7fe92", GitTreeState:"clean", BuildDate:"2018-04-18T23:58:35Z", GoVersion:"go1.9.3", Compiler:"gc", Platform:"linux/amd64"} **Docker version: (`docker version`,`docker info` preferred)** docker version Client: Version: 1.13.1 API version: 1.26 Package version: <unknown> Go version: go1.8.3 Git commit: 774336d/1.13.1 Built: Wed Mar 7 17:06:16 2018 OS/Arch: linux/amd64 Server: Version: 1.13.1 API version: 1.26 (minimum version 1.12) Package version: <unknown> Go version: go1.8.3 Git commit: 774336d/1.13.1 Built: Wed Mar 7 17:06:16 2018 OS/Arch: linux/amd64 Experimental: true docker info Containers: 40 Running: 26 Paused: 0 Stopped: 14 Images: 26 Server Version: 1.13.1 Storage Driver: overlay2 Backing Filesystem: xfs Supports d_type: false Native Overlay Diff: true Logging Driver: journald Cgroup Driver: systemd Plugins: Volume: local Network: bridge host ipvlan macvlan null overlay Swarm: inactive Runtimes: docker-runc runc Default Runtime: docker-runc Init Binary: docker-init containerd version: (expected: aa8187dbd3b7ad67d8e5e3a15115d3eef43a7ed1) runc version: N/A (expected: 9df8b306d01f59d3a8029be411de015b7304dd8f) init version: N/A (expected: 949e6facb77383876aeff8a6944dde66b3089574) Security Options: seccomp WARNING: You're not using the default seccomp profile Profile: /etc/docker/seccomp.json Kernel Version: 3.10.0-693.21.1.el7.x86_64 Operating System: CentOS Linux 7 (Core) OSType: linux Architecture: x86_64 Number of Docker Hooks: 3 CPUs: 4 Total Memory: 7.639 GiB Name: se-centos-bjma-k8s ID: BFUC:COHW:AKSO:ODQT:A63I:NH75:HJKA:UQWA:JRG4:N47F:HNMO:HBL3 Docker Root Dir: /var/lib/docker Debug Mode (client): false Debug Mode (server): true File Descriptors: 151 Goroutines: 151 System Time: 2018-05-17T12:33:10.308006117+02:00 EventsListeners: 0 **Operating system and kernel: (`cat /etc/os-release`, `uname -r` preferred)** cat /etc/os-release NAME="CentOS Linux" VERSION="7 (Core)" ID="centos" ID_LIKE="rhel fedora" VERSION_ID="7" PRETTY_NAME="CentOS Linux 7 (Core)" ANSI_COLOR="0;31" CPE_NAME="cpe:/o:centos:centos:7" HOME_URL="https://www.centos.org/" BUG_REPORT_URL="https://bugs.centos.org/" CENTOS_MANTISBT_PROJECT="CentOS-7" CENTOS_MANTISBT_PROJECT_VERSION="7" REDHAT_SUPPORT_PRODUCT="centos" REDHAT_SUPPORT_PRODUCT_VERSION="7" uname -r 3.10.0-693.21.1.el7.x86_64 **Type/provider of hosts: (VirtualBox/Bare-metal/AWS/GCE/DO)** Bare metal / VM. Custom cluster used **Setup details: (single node rancher vs. HA rancher, internal DB vs. external DB)** Single node Rancher **Environment Template: (Cattle/Kubernetes/Swarm/Mesos)** **Steps to Reproduce:** **Results:**
1.0
2.0.0: kubectl version in Launch kubectl does not match cluster - kubectl version when launched from UI does not match the version of the cluster. Expected output: > kubectl version --short Client Version: v1.9.7 Server Version: v1.9.7 Actual: # Run kubectl commands inside here # e.g. kubectl get all > kubectl version --short Client Version: v1.8.9-rancher1 Server Version: v1.9.7 **Rancher versions:** rancher/server or rancher/rancher: v2.0.0 rancher/agent or rancher/rancher-agent: v2.0.0 **Infrastructure Stack versions:** healthcheck: ipsec: network-services: scheduler: kubernetes (if applicable): Client Version: version.Info{Major:"1", Minor:"8+", GitVersion:"v1.8.9-rancher1", GitCommit:"68595e18f25e24125244e9966b1e5468a98c1cd4", GitTreeState:"clean", BuildDate:"2018-03-13T04:51:52Z", GoVersion:"go1.8.3", Compiler:"gc", Platform:"linux/amd64"} Server Version: version.Info{Major:"1", Minor:"9", GitVersion:"v1.9.7", GitCommit:"dd5e1a2978fd0b97d9b78e1564398aeea7e7fe92", GitTreeState:"clean", BuildDate:"2018-04-18T23:58:35Z", GoVersion:"go1.9.3", Compiler:"gc", Platform:"linux/amd64"} **Docker version: (`docker version`,`docker info` preferred)** docker version Client: Version: 1.13.1 API version: 1.26 Package version: <unknown> Go version: go1.8.3 Git commit: 774336d/1.13.1 Built: Wed Mar 7 17:06:16 2018 OS/Arch: linux/amd64 Server: Version: 1.13.1 API version: 1.26 (minimum version 1.12) Package version: <unknown> Go version: go1.8.3 Git commit: 774336d/1.13.1 Built: Wed Mar 7 17:06:16 2018 OS/Arch: linux/amd64 Experimental: true docker info Containers: 40 Running: 26 Paused: 0 Stopped: 14 Images: 26 Server Version: 1.13.1 Storage Driver: overlay2 Backing Filesystem: xfs Supports d_type: false Native Overlay Diff: true Logging Driver: journald Cgroup Driver: systemd Plugins: Volume: local Network: bridge host ipvlan macvlan null overlay Swarm: inactive Runtimes: docker-runc runc Default Runtime: docker-runc Init Binary: docker-init containerd version: (expected: aa8187dbd3b7ad67d8e5e3a15115d3eef43a7ed1) runc version: N/A (expected: 9df8b306d01f59d3a8029be411de015b7304dd8f) init version: N/A (expected: 949e6facb77383876aeff8a6944dde66b3089574) Security Options: seccomp WARNING: You're not using the default seccomp profile Profile: /etc/docker/seccomp.json Kernel Version: 3.10.0-693.21.1.el7.x86_64 Operating System: CentOS Linux 7 (Core) OSType: linux Architecture: x86_64 Number of Docker Hooks: 3 CPUs: 4 Total Memory: 7.639 GiB Name: se-centos-bjma-k8s ID: BFUC:COHW:AKSO:ODQT:A63I:NH75:HJKA:UQWA:JRG4:N47F:HNMO:HBL3 Docker Root Dir: /var/lib/docker Debug Mode (client): false Debug Mode (server): true File Descriptors: 151 Goroutines: 151 System Time: 2018-05-17T12:33:10.308006117+02:00 EventsListeners: 0 **Operating system and kernel: (`cat /etc/os-release`, `uname -r` preferred)** cat /etc/os-release NAME="CentOS Linux" VERSION="7 (Core)" ID="centos" ID_LIKE="rhel fedora" VERSION_ID="7" PRETTY_NAME="CentOS Linux 7 (Core)" ANSI_COLOR="0;31" CPE_NAME="cpe:/o:centos:centos:7" HOME_URL="https://www.centos.org/" BUG_REPORT_URL="https://bugs.centos.org/" CENTOS_MANTISBT_PROJECT="CentOS-7" CENTOS_MANTISBT_PROJECT_VERSION="7" REDHAT_SUPPORT_PRODUCT="centos" REDHAT_SUPPORT_PRODUCT_VERSION="7" uname -r 3.10.0-693.21.1.el7.x86_64 **Type/provider of hosts: (VirtualBox/Bare-metal/AWS/GCE/DO)** Bare metal / VM. Custom cluster used **Setup details: (single node rancher vs. HA rancher, internal DB vs. external DB)** Single node Rancher **Environment Template: (Cattle/Kubernetes/Swarm/Mesos)** **Steps to Reproduce:** **Results:**
non_priority
kubectl version in launch kubectl does not match cluster kubectl version when launched from ui does not match the version of the cluster expected output kubectl version short client version server version actual run kubectl commands inside here e g kubectl get all kubectl version short client version server version rancher versions rancher server or rancher rancher rancher agent or rancher rancher agent infrastructure stack versions healthcheck ipsec network services scheduler kubernetes if applicable client version version info major minor gitversion gitcommit gittreestate clean builddate goversion compiler gc platform linux server version version info major minor gitversion gitcommit gittreestate clean builddate goversion compiler gc platform linux docker version docker version docker info preferred docker version client version api version package version go version git commit built wed mar os arch linux server version api version minimum version package version go version git commit built wed mar os arch linux experimental true docker info containers running paused stopped images server version storage driver backing filesystem xfs supports d type false native overlay diff true logging driver journald cgroup driver systemd plugins volume local network bridge host ipvlan macvlan null overlay swarm inactive runtimes docker runc runc default runtime docker runc init binary docker init containerd version expected runc version n a expected init version n a expected security options seccomp warning you re not using the default seccomp profile profile etc docker seccomp json kernel version operating system centos linux core ostype linux architecture number of docker hooks cpus total memory gib name se centos bjma id bfuc cohw akso odqt hjka uqwa hnmo docker root dir var lib docker debug mode client false debug mode server true file descriptors goroutines system time eventslisteners operating system and kernel cat etc os release uname r preferred cat etc os release name centos linux version core id centos id like rhel fedora version id pretty name centos linux core ansi color cpe name cpe o centos centos home url bug report url centos mantisbt project centos centos mantisbt project version redhat support product centos redhat support product version uname r type provider of hosts virtualbox bare metal aws gce do bare metal vm custom cluster used setup details single node rancher vs ha rancher internal db vs external db single node rancher environment template cattle kubernetes swarm mesos steps to reproduce results
0
48,699
2,999,471,771
IssuesEvent
2015-07-23 19:12:11
jayway/powermock
https://api.github.com/repos/jayway/powermock
closed
OSGi-ify PowerMock
enhancement imported Milestone-Release1.6 Priority-Low
_From [lukewpat...@gmail.com](https://code.google.com/u/115628002144849920714/) on November 13, 2009 20:06:39_ Please add OSGi metadata to manifest files. This will allow in-container testing with PowerMock. _Original issue: http://code.google.com/p/powermock/issues/detail?id=204_
1.0
OSGi-ify PowerMock - _From [lukewpat...@gmail.com](https://code.google.com/u/115628002144849920714/) on November 13, 2009 20:06:39_ Please add OSGi metadata to manifest files. This will allow in-container testing with PowerMock. _Original issue: http://code.google.com/p/powermock/issues/detail?id=204_
priority
osgi ify powermock from on november please add osgi metadata to manifest files this will allow in container testing with powermock original issue
1
220,932
7,372,306,900
IssuesEvent
2018-03-13 14:26:32
TMats/survey
https://api.github.com/repos/TMats/survey
closed
Learning by Playing - Solving Sparse Reward Tasks from Scratch
Priority: High RL
https://arxiv.org/abs/1802.10567 - Martin Riedmiller, Roland Hafner, Thomas Lampe, Michael Neunert, Jonas Degrave, Tom Van de Wiele, Volodymyr Mnih, Nicolas Heess, Jost Tobias Springenberg - Submitted on 28 Feb 2018
1.0
Learning by Playing - Solving Sparse Reward Tasks from Scratch - https://arxiv.org/abs/1802.10567 - Martin Riedmiller, Roland Hafner, Thomas Lampe, Michael Neunert, Jonas Degrave, Tom Van de Wiele, Volodymyr Mnih, Nicolas Heess, Jost Tobias Springenberg - Submitted on 28 Feb 2018
priority
learning by playing solving sparse reward tasks from scratch martin riedmiller roland hafner thomas lampe michael neunert jonas degrave tom van de wiele volodymyr mnih nicolas heess jost tobias springenberg submitted on feb
1
7,656
2,919,649,850
IssuesEvent
2015-06-24 15:09:39
php-coder/mystamps
https://api.github.com/repos/php-coder/mystamps
opened
Test that Togglz is working
integration tests
In commit 69214f44d9b47e106803c0c826bc1a509d3d3508 I've fixed Togglz that didn't work. To avoid such breakage we need a test for this case. I suggest to add special feature that is always disabled. On any page we will show special message if this feature is active. Our test will just check that this message doesn't exist.
1.0
Test that Togglz is working - In commit 69214f44d9b47e106803c0c826bc1a509d3d3508 I've fixed Togglz that didn't work. To avoid such breakage we need a test for this case. I suggest to add special feature that is always disabled. On any page we will show special message if this feature is active. Our test will just check that this message doesn't exist.
non_priority
test that togglz is working in commit i ve fixed togglz that didn t work to avoid such breakage we need a test for this case i suggest to add special feature that is always disabled on any page we will show special message if this feature is active our test will just check that this message doesn t exist
0
289,623
31,991,433,732
IssuesEvent
2023-09-21 06:13:08
pazhanivel07/frameworks_av_AOSP_10_r33_CVE-2023-35687_CVE-2023-35679
https://api.github.com/repos/pazhanivel07/frameworks_av_AOSP_10_r33_CVE-2023-35687_CVE-2023-35679
opened
CVE-2022-20393 (Medium) detected in avandroid-9.0.0_r56
Mend: dependency security vulnerability
## CVE-2022-20393 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>avandroid-9.0.0_r56</b></p></summary> <p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/av>https://android.googlesource.com/platform/frameworks/av</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/frameworks_av_AOSP_10_r33_CVE-2023-35687_CVE-2023-35679/commit/f6c68d1f56234bf68c91ea85f355b0612cd36a2b">f6c68d1f56234bf68c91ea85f355b0612cd36a2b</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/media/libstagefright/timedtext/TextDescriptions.cpp</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In extract3GPPGlobalDescriptions of TextDescriptions.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure from the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-233735886 <p>Publish Date: 2022-09-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-20393>CVE-2022-20393</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://source.android.com/docs/security/bulletin/2022-09-01">https://source.android.com/docs/security/bulletin/2022-09-01</a></p> <p>Release Date: 2022-09-13</p> <p>Fix Resolution: android-13.0.0_r1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-20393 (Medium) detected in avandroid-9.0.0_r56 - ## CVE-2022-20393 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>avandroid-9.0.0_r56</b></p></summary> <p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/av>https://android.googlesource.com/platform/frameworks/av</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/frameworks_av_AOSP_10_r33_CVE-2023-35687_CVE-2023-35679/commit/f6c68d1f56234bf68c91ea85f355b0612cd36a2b">f6c68d1f56234bf68c91ea85f355b0612cd36a2b</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/media/libstagefright/timedtext/TextDescriptions.cpp</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In extract3GPPGlobalDescriptions of TextDescriptions.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure from the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-233735886 <p>Publish Date: 2022-09-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-20393>CVE-2022-20393</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://source.android.com/docs/security/bulletin/2022-09-01">https://source.android.com/docs/security/bulletin/2022-09-01</a></p> <p>Release Date: 2022-09-13</p> <p>Fix Resolution: android-13.0.0_r1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in avandroid cve medium severity vulnerability vulnerable library avandroid library home page a href found in head commit a href found in base branch main vulnerable source files media libstagefright timedtext textdescriptions cpp vulnerability details in of textdescriptions cpp there is a possible out of bounds read due to an integer overflow this could lead to local information disclosure from the media server with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend
0
44,655
2,910,342,665
IssuesEvent
2015-06-21 17:17:08
Metaswitch/sprout
https://api.github.com/repos/Metaswitch/sprout
closed
Sprout loops ACKs to itself after responding with 503 to an INVITE
high-priority
After Sprout returns a 503 for an INVITE due to overload controls, it begins looping ACKs to itself until Max-Forwards has "expired". This additional processing triggers a LIR over the Cx for each ACK which adds to system latency, thereby "reinforcing" the overload condition (the overload was initially caused by Cx interface latency). A SAS trace has been collected.
1.0
Sprout loops ACKs to itself after responding with 503 to an INVITE - After Sprout returns a 503 for an INVITE due to overload controls, it begins looping ACKs to itself until Max-Forwards has "expired". This additional processing triggers a LIR over the Cx for each ACK which adds to system latency, thereby "reinforcing" the overload condition (the overload was initially caused by Cx interface latency). A SAS trace has been collected.
priority
sprout loops acks to itself after responding with to an invite after sprout returns a for an invite due to overload controls it begins looping acks to itself until max forwards has expired this additional processing triggers a lir over the cx for each ack which adds to system latency thereby reinforcing the overload condition the overload was initially caused by cx interface latency a sas trace has been collected
1
103,854
12,976,734,811
IssuesEvent
2020-07-21 19:19:42
elastic/kibana
https://api.github.com/repos/elastic/kibana
opened
Custom CAs and SSL options
Team:Ingest Management design
**Summary of the problem** Having secure communication between Elastic-Agent and elasticsearch or tier services requires to deal with SSL (TLS): - **Certificate authorities (common):** when authenticating the server. - **Certificate:** required when doing mutual authentication. - **Certificate private key:** required when doing mutual authentication. - **key_passphrase:** used to decode the private key. - **verification_mode (advanced)**: Control how the client verifies the server. - **supported protocol (advanced):** define which version of TLS to use. - **cipher_suites (advanced):** Define which cipher is supported, required in some lock down environment. - **curve_types (advanced):** Define which ECDH curve to use. - **renegotiation (advanced):** Configure TLS renegotiation - **client_authentication (advanced):** Configure client authentication. For a complete list of types see [Filebeat](https://www.elastic.co/guide/en/beats/filebeat/current/configuration-ssl.html#_client_authentication) documentation. The Certificate authorities, Certificate and certificate private key are more often files or blob of text. It's also common to be able to reuse the artifacts on multiples integrations or outputs, and its convenient to only have to update a single file on disk. User stories: * As a Fleet administrator I should be able to define the Certificate Authorities, Certificate and the private key on outputs. * As a fleet administrator I should be able to define the Certificate Authorities, Certificate and the private key on integrations that require it. * As fleet administrator I should be able to define SSL options.
1.0
Custom CAs and SSL options - **Summary of the problem** Having secure communication between Elastic-Agent and elasticsearch or tier services requires to deal with SSL (TLS): - **Certificate authorities (common):** when authenticating the server. - **Certificate:** required when doing mutual authentication. - **Certificate private key:** required when doing mutual authentication. - **key_passphrase:** used to decode the private key. - **verification_mode (advanced)**: Control how the client verifies the server. - **supported protocol (advanced):** define which version of TLS to use. - **cipher_suites (advanced):** Define which cipher is supported, required in some lock down environment. - **curve_types (advanced):** Define which ECDH curve to use. - **renegotiation (advanced):** Configure TLS renegotiation - **client_authentication (advanced):** Configure client authentication. For a complete list of types see [Filebeat](https://www.elastic.co/guide/en/beats/filebeat/current/configuration-ssl.html#_client_authentication) documentation. The Certificate authorities, Certificate and certificate private key are more often files or blob of text. It's also common to be able to reuse the artifacts on multiples integrations or outputs, and its convenient to only have to update a single file on disk. User stories: * As a Fleet administrator I should be able to define the Certificate Authorities, Certificate and the private key on outputs. * As a fleet administrator I should be able to define the Certificate Authorities, Certificate and the private key on integrations that require it. * As fleet administrator I should be able to define SSL options.
non_priority
custom cas and ssl options summary of the problem having secure communication between elastic agent and elasticsearch or tier services requires to deal with ssl tls certificate authorities common when authenticating the server certificate required when doing mutual authentication certificate private key required when doing mutual authentication key passphrase used to decode the private key verification mode advanced control how the client verifies the server supported protocol advanced define which version of tls to use cipher suites advanced define which cipher is supported required in some lock down environment curve types advanced define which ecdh curve to use renegotiation advanced configure tls renegotiation client authentication advanced configure client authentication for a complete list of types see documentation the certificate authorities certificate and certificate private key are more often files or blob of text it s also common to be able to reuse the artifacts on multiples integrations or outputs and its convenient to only have to update a single file on disk user stories as a fleet administrator i should be able to define the certificate authorities certificate and the private key on outputs as a fleet administrator i should be able to define the certificate authorities certificate and the private key on integrations that require it as fleet administrator i should be able to define ssl options
0
104,606
4,215,501,064
IssuesEvent
2016-06-30 04:34:49
diamm/diamm
https://api.github.com/repos/diamm/diamm
closed
Figure out how to migrate old users to new site
Component: User Interface Component: Web Application Priority: High Status: In Progress Type: Enhancement
Conversation with Arielle: The login form will only display the username / e-mail to log in at first. It will then use the information in there to tell what the rest of the form should look like: 1. If the user has logged in to the new site before, show a password prompt. 2. If the username was in the old database but they have never logged in, it should show a 'request new password' link to send an e-mail to them to reset their password. 3. If the username or e-mail does not exist in the new site, show a 'create new account' link, or offer them the chance to correct their username or e-mail and try again.
1.0
Figure out how to migrate old users to new site - Conversation with Arielle: The login form will only display the username / e-mail to log in at first. It will then use the information in there to tell what the rest of the form should look like: 1. If the user has logged in to the new site before, show a password prompt. 2. If the username was in the old database but they have never logged in, it should show a 'request new password' link to send an e-mail to them to reset their password. 3. If the username or e-mail does not exist in the new site, show a 'create new account' link, or offer them the chance to correct their username or e-mail and try again.
priority
figure out how to migrate old users to new site conversation with arielle the login form will only display the username e mail to log in at first it will then use the information in there to tell what the rest of the form should look like if the user has logged in to the new site before show a password prompt if the username was in the old database but they have never logged in it should show a request new password link to send an e mail to them to reset their password if the username or e mail does not exist in the new site show a create new account link or offer them the chance to correct their username or e mail and try again
1
163,885
25,892,510,990
IssuesEvent
2022-12-14 19:12:51
GCTC-NTGC/gc-digital-talent
https://api.github.com/repos/GCTC-NTGC/gc-digital-talent
closed
Display referral path on /not-found page
design
<sup>ℹ️ [Figma (root)][figma] | [Sitemap][sitemap]</sup> <sup>_This initial comment is collaborative and open to modification by all._</sup> Spin-off from: https://github.com/GCTC-NTGC/gc-digital-talent/issues/1904 On 404/not-found page, we should show the referral page we redirected from when it's available. This will help with support requests when ppl arrive on this page. ## Description ## Screenshot: Prototype (needs to be updated with updated design) <img width="934" alt="Screen Shot 2022-10-06 at 4 05 29 PM" src="https://user-images.githubusercontent.com/305339/194354368-f0882ad1-45b2-47d4-aef3-9e0fb0cbc42a.png"> <sup>[Click screenshot to visit Figma.][image-link]</sup> ## Acceptance Criteria - [ ] show referral url when referred from within app - [ ] hide referral url when not available (apache redirect?) - [ ] make URL monospaced and with copy helper <!-- Links --> [image]: https://user-images.githubusercontent.com/305339/166570935-6425a615-82c7-4b2f-9840-5c7d698fa2ab.png [image-link]: https://example.com [figma]: https://go.talent.c4nada.ca/figma [sitemap]: https://go.talent.c4nada.ca/sitemap <!-- Find your prototype via https://go.talent.c4nada.ca/figma and click "play button" ▷ in top-right. -->
1.0
Display referral path on /not-found page - <sup>ℹ️ [Figma (root)][figma] | [Sitemap][sitemap]</sup> <sup>_This initial comment is collaborative and open to modification by all._</sup> Spin-off from: https://github.com/GCTC-NTGC/gc-digital-talent/issues/1904 On 404/not-found page, we should show the referral page we redirected from when it's available. This will help with support requests when ppl arrive on this page. ## Description ## Screenshot: Prototype (needs to be updated with updated design) <img width="934" alt="Screen Shot 2022-10-06 at 4 05 29 PM" src="https://user-images.githubusercontent.com/305339/194354368-f0882ad1-45b2-47d4-aef3-9e0fb0cbc42a.png"> <sup>[Click screenshot to visit Figma.][image-link]</sup> ## Acceptance Criteria - [ ] show referral url when referred from within app - [ ] hide referral url when not available (apache redirect?) - [ ] make URL monospaced and with copy helper <!-- Links --> [image]: https://user-images.githubusercontent.com/305339/166570935-6425a615-82c7-4b2f-9840-5c7d698fa2ab.png [image-link]: https://example.com [figma]: https://go.talent.c4nada.ca/figma [sitemap]: https://go.talent.c4nada.ca/sitemap <!-- Find your prototype via https://go.talent.c4nada.ca/figma and click "play button" ▷ in top-right. -->
non_priority
display referral path on not found page ℹ️ this initial comment is collaborative and open to modification by all spin off from on not found page we should show the referral page we redirected from when it s available this will help with support requests when ppl arrive on this page description screenshot prototype needs to be updated with updated design img width alt screen shot at pm src acceptance criteria show referral url when referred from within app hide referral url when not available apache redirect make url monospaced and with copy helper
0
255,595
19,309,377,323
IssuesEvent
2021-12-13 14:49:20
moonD4rk/HackBrowserData
https://api.github.com/repos/moonD4rk/HackBrowserData
closed
[Improvement] CHANGELOG
documentation
Hi, would be awesome if you could also establish a file for the CHANGELOG with all the (great) frequent changes of each version. I think it would be helpful for everyone to track what is and has happened.
1.0
[Improvement] CHANGELOG - Hi, would be awesome if you could also establish a file for the CHANGELOG with all the (great) frequent changes of each version. I think it would be helpful for everyone to track what is and has happened.
non_priority
changelog hi would be awesome if you could also establish a file for the changelog with all the great frequent changes of each version i think it would be helpful for everyone to track what is and has happened
0
494,566
14,260,592,201
IssuesEvent
2020-11-20 10:02:55
openmsupply/mobile
https://api.github.com/repos/openmsupply/mobile
closed
Odd modal spacing when opening while keyboard is open
Bug: production Docs: not needed Effort: small Good first issue Priority: normal
## Describe the bug When opening a modal (i.e. clicking finalize, or any other action which opens a modal whether it is in requisitions or stocktakes), if the keyboard is opening when the modal is mounted, the spacing is odd forcing the vertical height downward ### To reproduce Steps to reproduce the behavior: 1. Go to requisition / stocktakes 2. Click on a cell to open the keyboard 3. Press Finalize 4. See error ### Expected behaviour The modal should always be consistent ### Version and device info - App version: 2.3.4 - Tablet model: Lenovo Tab4 10 ### Additional context N/A
1.0
Odd modal spacing when opening while keyboard is open - ## Describe the bug When opening a modal (i.e. clicking finalize, or any other action which opens a modal whether it is in requisitions or stocktakes), if the keyboard is opening when the modal is mounted, the spacing is odd forcing the vertical height downward ### To reproduce Steps to reproduce the behavior: 1. Go to requisition / stocktakes 2. Click on a cell to open the keyboard 3. Press Finalize 4. See error ### Expected behaviour The modal should always be consistent ### Version and device info - App version: 2.3.4 - Tablet model: Lenovo Tab4 10 ### Additional context N/A
priority
odd modal spacing when opening while keyboard is open describe the bug when opening a modal i e clicking finalize or any other action which opens a modal whether it is in requisitions or stocktakes if the keyboard is opening when the modal is mounted the spacing is odd forcing the vertical height downward to reproduce steps to reproduce the behavior go to requisition stocktakes click on a cell to open the keyboard press finalize see error expected behaviour the modal should always be consistent version and device info app version tablet model lenovo additional context n a
1
155,713
12,267,916,623
IssuesEvent
2020-05-07 11:35:01
wopian/kitsu
https://api.github.com/repos/wopian/kitsu
closed
serialise depends on binded this (missing pluralize dependency)
bug kitsu-core test
Unable to serialise data using `kitsu-core` as a standalone - tests did not pick this up as they're pre-bound in the specs for each bind combination. Should fallback to requiring `pluralize` if `this.plural` is not a function Ref: https://codepen.io/wopian/pen/KQZwzq (console)
1.0
serialise depends on binded this (missing pluralize dependency) - Unable to serialise data using `kitsu-core` as a standalone - tests did not pick this up as they're pre-bound in the specs for each bind combination. Should fallback to requiring `pluralize` if `this.plural` is not a function Ref: https://codepen.io/wopian/pen/KQZwzq (console)
non_priority
serialise depends on binded this missing pluralize dependency unable to serialise data using kitsu core as a standalone tests did not pick this up as they re pre bound in the specs for each bind combination should fallback to requiring pluralize if this plural is not a function ref console
0
298,471
22,500,774,530
IssuesEvent
2022-06-23 11:37:54
BrainsOnBoard/python-gm-plotting
https://api.github.com/repos/BrainsOnBoard/python-gm-plotting
opened
Add a readme file and other documentation
documentation
It would also be useful to have instructions on how to get set up with a proper Google account so that the user can obtain satellite images.
1.0
Add a readme file and other documentation - It would also be useful to have instructions on how to get set up with a proper Google account so that the user can obtain satellite images.
non_priority
add a readme file and other documentation it would also be useful to have instructions on how to get set up with a proper google account so that the user can obtain satellite images
0
753,373
26,345,513,442
IssuesEvent
2023-01-10 21:40:00
yugabyte/yugabyte-db
https://api.github.com/repos/yugabyte/yugabyte-db
closed
[Platform] [docdb] Validate gflags and raise error if any are invalid
kind/enhancement area/docdb priority/high status/awaiting-triage
Jira Link: [DB-4733](https://yugabyte.atlassian.net/browse/DB-4733) If the admin is setting gflags, an error should be raised if any of the entered gflags are invalid (like a typo in the gflag name). I guess the validation needs to be done by docdb and the error propagated to YW
1.0
[Platform] [docdb] Validate gflags and raise error if any are invalid - Jira Link: [DB-4733](https://yugabyte.atlassian.net/browse/DB-4733) If the admin is setting gflags, an error should be raised if any of the entered gflags are invalid (like a typo in the gflag name). I guess the validation needs to be done by docdb and the error propagated to YW
priority
validate gflags and raise error if any are invalid jira link if the admin is setting gflags an error should be raised if any of the entered gflags are invalid like a typo in the gflag name i guess the validation needs to be done by docdb and the error propagated to yw
1
751,631
26,251,584,088
IssuesEvent
2023-01-05 19:50:19
googleapis/google-api-go-client
https://api.github.com/repos/googleapis/google-api-go-client
closed
bigquery: How to mock for unit testing
type: question api: bigquery priority: p3
Hey, I'm trying to mock bigquery Client, but I didn't find a good solution for that. - https://github.com/googleapis/google-cloud-go-testing it sounds interesting the way but it's outdated and lots of methods have not been updated and the project has been archived recently - [sample 1 ](https://github.com/GoogleCloudPlatform/golang-samples/blob/main/bigquery/simpleapp/simpleapp_test.go) it's using the real client with just a sample project that is not what I wanted is there any sample or way to mock bigquery client for unittesting?
1.0
bigquery: How to mock for unit testing - Hey, I'm trying to mock bigquery Client, but I didn't find a good solution for that. - https://github.com/googleapis/google-cloud-go-testing it sounds interesting the way but it's outdated and lots of methods have not been updated and the project has been archived recently - [sample 1 ](https://github.com/GoogleCloudPlatform/golang-samples/blob/main/bigquery/simpleapp/simpleapp_test.go) it's using the real client with just a sample project that is not what I wanted is there any sample or way to mock bigquery client for unittesting?
priority
bigquery how to mock for unit testing hey i m trying to mock bigquery client but i didn t find a good solution for that it sounds interesting the way but it s outdated and lots of methods have not been updated and the project has been archived recently it s using the real client with just a sample project that is not what i wanted is there any sample or way to mock bigquery client for unittesting
1
463,235
13,262,068,062
IssuesEvent
2020-08-20 21:02:40
OregonDigital/OD2
https://api.github.com/repos/OregonDigital/OD2
reopened
FetchGraphWorker overrides metadata labels as it indexes
Bug Features Priority - High
### Descriptive summary As FetchGraphWorker works through the metadata values for a single field, it's clobbering the values it JUST sent to Solr. https://github.com/OregonDigital/OD2/blob/master/app/workers/fetch_graph_worker.rb#L42-L46 These values need to be initialized to an empty array, then appended to each iteration. This is also true of the FetchFailedGraphWorker. ### Expected behavior Works reindexed through the Fetch(Failed)GraphWorker has all labels associated with all metadata values for each metadata field indexed into Solr, not just the last one. ### Related work #1224 Caused issue ### Accessibility Concerns
1.0
FetchGraphWorker overrides metadata labels as it indexes - ### Descriptive summary As FetchGraphWorker works through the metadata values for a single field, it's clobbering the values it JUST sent to Solr. https://github.com/OregonDigital/OD2/blob/master/app/workers/fetch_graph_worker.rb#L42-L46 These values need to be initialized to an empty array, then appended to each iteration. This is also true of the FetchFailedGraphWorker. ### Expected behavior Works reindexed through the Fetch(Failed)GraphWorker has all labels associated with all metadata values for each metadata field indexed into Solr, not just the last one. ### Related work #1224 Caused issue ### Accessibility Concerns
priority
fetchgraphworker overrides metadata labels as it indexes descriptive summary as fetchgraphworker works through the metadata values for a single field it s clobbering the values it just sent to solr these values need to be initialized to an empty array then appended to each iteration this is also true of the fetchfailedgraphworker expected behavior works reindexed through the fetch failed graphworker has all labels associated with all metadata values for each metadata field indexed into solr not just the last one related work caused issue accessibility concerns
1
27,052
21,055,851,157
IssuesEvent
2022-04-01 03:06:17
google/pytype
https://api.github.com/repos/google/pytype
closed
Add `--platform` option
enhancement cat: infrastructure
As [per PEP 484](https://www.python.org/dev/peps/pep-0484/#version-and-platform-checking) type checkers are expected to understand simple version and platform checks, e.g.: ```python if sys.version_info[0] >= 3: # Python 3 specific definitions if sys.platform == 'win32': # Windows specific definitions ``` While the `pytype` CLI currently supports the flags `-V`, `--python-version` to change for which Python version the types are checked, there apparently is no such option to change for which OS platform the code is checked, instead `pytype` apparently always defaults to `linux`, with no option to change that: https://github.com/google/pytype/blob/9a0f492875f8440627fef7de42ee9244e89e8a06/pytype/pyi/parser.py#L31 https://github.com/google/pytype/blob/9a0f492875f8440627fef7de42ee9244e89e8a06/pytype/pyi/parser.py#L704-L722 So I think it would make sense to introduce a `--platform` option to allow the checking for other platforms. Both mypy and pyright provide such an option: ``` $ mypy -h | grep platform --platform PLATFORM Type check special-cased code for the given OS platform (defaults to sys.platform) $ pyright -h | grep platform --pythonplatform <PLATFORM> Analyze for a specific platform (Darwin, Linux, Windows) ```
1.0
Add `--platform` option - As [per PEP 484](https://www.python.org/dev/peps/pep-0484/#version-and-platform-checking) type checkers are expected to understand simple version and platform checks, e.g.: ```python if sys.version_info[0] >= 3: # Python 3 specific definitions if sys.platform == 'win32': # Windows specific definitions ``` While the `pytype` CLI currently supports the flags `-V`, `--python-version` to change for which Python version the types are checked, there apparently is no such option to change for which OS platform the code is checked, instead `pytype` apparently always defaults to `linux`, with no option to change that: https://github.com/google/pytype/blob/9a0f492875f8440627fef7de42ee9244e89e8a06/pytype/pyi/parser.py#L31 https://github.com/google/pytype/blob/9a0f492875f8440627fef7de42ee9244e89e8a06/pytype/pyi/parser.py#L704-L722 So I think it would make sense to introduce a `--platform` option to allow the checking for other platforms. Both mypy and pyright provide such an option: ``` $ mypy -h | grep platform --platform PLATFORM Type check special-cased code for the given OS platform (defaults to sys.platform) $ pyright -h | grep platform --pythonplatform <PLATFORM> Analyze for a specific platform (Darwin, Linux, Windows) ```
non_priority
add platform option as type checkers are expected to understand simple version and platform checks e g python if sys version info python specific definitions if sys platform windows specific definitions while the pytype cli currently supports the flags v python version to change for which python version the types are checked there apparently is no such option to change for which os platform the code is checked instead pytype apparently always defaults to linux with no option to change that so i think it would make sense to introduce a platform option to allow the checking for other platforms both mypy and pyright provide such an option mypy h grep platform platform platform type check special cased code for the given os platform defaults to sys platform pyright h grep platform pythonplatform analyze for a specific platform darwin linux windows
0
583,846
17,399,767,336
IssuesEvent
2021-08-02 17:53:28
ita-social-projects/TeachUA
https://api.github.com/repos/ita-social-projects/TeachUA
closed
[Редагування профілю] Wrong alignment of 'Змінити пароль' label
Priority: High UI bug
**Environment:** Windows 10, Google Chrome Version 92.0.4515.107 (Official Build) (64-bit **Reproducible:** always **Build found:** last commit **Preconditions** 1. Go to https://speak-ukrainian.org.ua/dev/ 2. Log in **Steps to reproduce** 1. Go to 'Мій Профіль' page 2. Click on 'Редагувати профіль' **Actual result** Wrong alignment of 'Змінити пароль' label. ![align](https://user-images.githubusercontent.com/87872581/127381596-147479c2-c194-4f87-ae9e-271cb28d7575.png) **Expected result** ![125753125-dfa3804c-7c80-4a14-95e0-8422b23cae6d](https://user-images.githubusercontent.com/87872581/127381894-4a8fc746-c3c4-469f-ac45-f0add2a93bb5.png) **User story link** User story #164
1.0
[Редагування профілю] Wrong alignment of 'Змінити пароль' label - **Environment:** Windows 10, Google Chrome Version 92.0.4515.107 (Official Build) (64-bit **Reproducible:** always **Build found:** last commit **Preconditions** 1. Go to https://speak-ukrainian.org.ua/dev/ 2. Log in **Steps to reproduce** 1. Go to 'Мій Профіль' page 2. Click on 'Редагувати профіль' **Actual result** Wrong alignment of 'Змінити пароль' label. ![align](https://user-images.githubusercontent.com/87872581/127381596-147479c2-c194-4f87-ae9e-271cb28d7575.png) **Expected result** ![125753125-dfa3804c-7c80-4a14-95e0-8422b23cae6d](https://user-images.githubusercontent.com/87872581/127381894-4a8fc746-c3c4-469f-ac45-f0add2a93bb5.png) **User story link** User story #164
priority
wrong alignment of змінити пароль label environment windows google chrome version official build bit reproducible always build found last commit preconditions go to log in steps to reproduce go to мій профіль page click on редагувати профіль actual result wrong alignment of змінити пароль label expected result user story link user story
1
570,730
17,023,170,512
IssuesEvent
2021-07-03 00:41:28
tomhughes/trac-tickets
https://api.github.com/repos/tomhughes/trac-tickets
closed
Allow better reuse of GeoRSS class in lib/osm.rb
Component: rails_port Priority: minor Resolution: fixed Type: enhancement
**[Submitted to the original trac issue database at 10.13pm, Saturday, 9th June 2007]** There are some hardcoded strings in there that should probably all be passed in through as parameters (with defaults) so the code can better be reused for other purposes as well as traces.
1.0
Allow better reuse of GeoRSS class in lib/osm.rb - **[Submitted to the original trac issue database at 10.13pm, Saturday, 9th June 2007]** There are some hardcoded strings in there that should probably all be passed in through as parameters (with defaults) so the code can better be reused for other purposes as well as traces.
priority
allow better reuse of georss class in lib osm rb there are some hardcoded strings in there that should probably all be passed in through as parameters with defaults so the code can better be reused for other purposes as well as traces
1
200,179
7,001,143,613
IssuesEvent
2017-12-18 09:07:29
cilium/cilium
https://api.github.com/repos/cilium/cilium
closed
Ginkgo CI: Gather logs that are dumped to file as artifacts in Jenkins build
area/CI priority/high
Parent: #1839 We currently `archiveArtifacts` as part of the Jenkins build for Cilium as a "post-build action" ``` post { always { sh './test/post_build_agent.sh || true' sh './tests/copy_files || true' archiveArtifacts artifacts: "cilium-files-runtime-${JOB_BASE_NAME}-${BUILD_NUMBER}.tar.gz", allowEmptyArchive: true sh './tests/k8s/copy_files || true' archiveArtifacts artifacts: "cilium-files-k8s-${JOB_BASE_NAME}-${BUILD_NUMBER}.tar.gz", allowEmptyArchive: true sh 'rm -rf ${WORKSPACE}/cilium-files*${JOB_BASE_NAME}-${BUILD_NUMBER}* ${WORKSPACE}/tests/cilium-files ${WORKSPACE}/tests/k8s/tests/cilium-files' sh 'ls' sh 'vagrant destroy -f' sh 'cd ./tests/k8s && vagrant destroy -f' } } ``` Make sure that the logs which are gathered as part of #2026 are packaged up and archived to be picked up by Jenkins for further inspection by those who run PRs.
1.0
Ginkgo CI: Gather logs that are dumped to file as artifacts in Jenkins build - Parent: #1839 We currently `archiveArtifacts` as part of the Jenkins build for Cilium as a "post-build action" ``` post { always { sh './test/post_build_agent.sh || true' sh './tests/copy_files || true' archiveArtifacts artifacts: "cilium-files-runtime-${JOB_BASE_NAME}-${BUILD_NUMBER}.tar.gz", allowEmptyArchive: true sh './tests/k8s/copy_files || true' archiveArtifacts artifacts: "cilium-files-k8s-${JOB_BASE_NAME}-${BUILD_NUMBER}.tar.gz", allowEmptyArchive: true sh 'rm -rf ${WORKSPACE}/cilium-files*${JOB_BASE_NAME}-${BUILD_NUMBER}* ${WORKSPACE}/tests/cilium-files ${WORKSPACE}/tests/k8s/tests/cilium-files' sh 'ls' sh 'vagrant destroy -f' sh 'cd ./tests/k8s && vagrant destroy -f' } } ``` Make sure that the logs which are gathered as part of #2026 are packaged up and archived to be picked up by Jenkins for further inspection by those who run PRs.
priority
ginkgo ci gather logs that are dumped to file as artifacts in jenkins build parent we currently archiveartifacts as part of the jenkins build for cilium as a post build action post always sh test post build agent sh true sh tests copy files true archiveartifacts artifacts cilium files runtime job base name build number tar gz allowemptyarchive true sh tests copy files true archiveartifacts artifacts cilium files job base name build number tar gz allowemptyarchive true sh rm rf workspace cilium files job base name build number workspace tests cilium files workspace tests tests cilium files sh ls sh vagrant destroy f sh cd tests vagrant destroy f make sure that the logs which are gathered as part of are packaged up and archived to be picked up by jenkins for further inspection by those who run prs
1
106,737
16,717,902,407
IssuesEvent
2021-06-10 01:04:59
ilan-WS/m3
https://api.github.com/repos/ilan-WS/m3
opened
WS-2020-0345 (High) detected in jsonpointer-4.0.1.tgz
security vulnerability
## WS-2020-0345 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonpointer-4.0.1.tgz</b></p></summary> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz</a></p> <p>Path to dependency file: m3/src/ctl/ui/package.json</p> <p>Path to vulnerable library: m3/src/ctl/ui/node_modules/jsonpointer</p> <p> Dependency Hierarchy: - react-scripts-1.0.10.tgz (Root Library) - eslint-3.19.0.tgz - is-my-json-valid-2.20.0.tgz - :x: **jsonpointer-4.0.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function. <p>Publish Date: 2020-07-03 <p>URL: <a href=https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34>WS-2020-0345</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0">https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0</a></p> <p>Release Date: 2020-07-03</p> <p>Fix Resolution: jsonpointer - 4.1.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"jsonpointer","packageVersion":"4.0.1","packageFilePaths":["/src/ctl/ui/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:1.0.10;eslint:3.19.0;is-my-json-valid:2.20.0;jsonpointer:4.0.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jsonpointer - 4.1.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0345","vulnerabilityDetails":"Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function.","vulnerabilityUrl":"https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
WS-2020-0345 (High) detected in jsonpointer-4.0.1.tgz - ## WS-2020-0345 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonpointer-4.0.1.tgz</b></p></summary> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz</a></p> <p>Path to dependency file: m3/src/ctl/ui/package.json</p> <p>Path to vulnerable library: m3/src/ctl/ui/node_modules/jsonpointer</p> <p> Dependency Hierarchy: - react-scripts-1.0.10.tgz (Root Library) - eslint-3.19.0.tgz - is-my-json-valid-2.20.0.tgz - :x: **jsonpointer-4.0.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function. <p>Publish Date: 2020-07-03 <p>URL: <a href=https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34>WS-2020-0345</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0">https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0</a></p> <p>Release Date: 2020-07-03</p> <p>Fix Resolution: jsonpointer - 4.1.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"jsonpointer","packageVersion":"4.0.1","packageFilePaths":["/src/ctl/ui/package.json"],"isTransitiveDependency":true,"dependencyTree":"react-scripts:1.0.10;eslint:3.19.0;is-my-json-valid:2.20.0;jsonpointer:4.0.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jsonpointer - 4.1.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0345","vulnerabilityDetails":"Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function.","vulnerabilityUrl":"https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
ws high detected in jsonpointer tgz ws high severity vulnerability vulnerable library jsonpointer tgz simple json addressing library home page a href path to dependency file src ctl ui package json path to vulnerable library src ctl ui node modules jsonpointer dependency hierarchy react scripts tgz root library eslint tgz is my json valid tgz x jsonpointer tgz vulnerable library found in base branch master vulnerability details prototype pollution vulnerability was found in jsonpointer before via the set function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jsonpointer isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree react scripts eslint is my json valid jsonpointer isminimumfixversionavailable true minimumfixversion jsonpointer basebranches vulnerabilityidentifier ws vulnerabilitydetails prototype pollution vulnerability was found in jsonpointer before via the set function vulnerabilityurl
0
253,477
8,056,626,751
IssuesEvent
2018-08-02 13:17:37
tavorperry/MTA-Coffee
https://api.github.com/repos/tavorperry/MTA-Coffee
closed
Change URL in code
High Priority
replace **http://vmedu151.mtacloud.co.il** or **http://whispering-scrubland-84389.herokuapp.com/** with **http://mtacoffee.mta.ac.il** in every place that mentions in the code
1.0
Change URL in code - replace **http://vmedu151.mtacloud.co.il** or **http://whispering-scrubland-84389.herokuapp.com/** with **http://mtacoffee.mta.ac.il** in every place that mentions in the code
priority
change url in code replace or with in every place that mentions in the code
1
671,494
22,763,477,170
IssuesEvent
2022-07-08 00:14:13
kubernetes/ingress-nginx
https://api.github.com/repos/kubernetes/ingress-nginx
closed
Helm template with custom values does not create deployment
kind/bug needs-triage needs-priority
When using the helm chart version: ``` $ helm show chart nginx-stable/nginx-ingress 7:34PM apiVersion: v1 appVersion: 2.2.2 description: NGINX Ingress Controller home: https://github.com/nginxinc/kubernetes-ingress icon: https://raw.githubusercontent.com/nginxinc/kubernetes-ingress/v2.2.2/deployments/helm-chart/chart-icon.png keywords: - ingress - nginx kubeVersion: '>= 1.19.0-0' maintainers: - email: kubernetes@nginx.com name: nginxinc name: nginx-ingress sources: - https://github.com/nginxinc/kubernetes-ingress/tree/v2.2.2/deployments/helm-chart version: 0.13.2 ``` Running `helm template nginx nginx-stable/nginx-ingress -f values.yml` where `values.yml` is the default values found https://github.com/kubernetes/ingress-nginx/blob/main/charts/ingress-nginx/values.yaml, does not generate a deployment manifest. If run without the `-f values.yml` the deployment manifest is created. What is wrong with the values that causes the manifest to not be created?
1.0
Helm template with custom values does not create deployment - When using the helm chart version: ``` $ helm show chart nginx-stable/nginx-ingress 7:34PM apiVersion: v1 appVersion: 2.2.2 description: NGINX Ingress Controller home: https://github.com/nginxinc/kubernetes-ingress icon: https://raw.githubusercontent.com/nginxinc/kubernetes-ingress/v2.2.2/deployments/helm-chart/chart-icon.png keywords: - ingress - nginx kubeVersion: '>= 1.19.0-0' maintainers: - email: kubernetes@nginx.com name: nginxinc name: nginx-ingress sources: - https://github.com/nginxinc/kubernetes-ingress/tree/v2.2.2/deployments/helm-chart version: 0.13.2 ``` Running `helm template nginx nginx-stable/nginx-ingress -f values.yml` where `values.yml` is the default values found https://github.com/kubernetes/ingress-nginx/blob/main/charts/ingress-nginx/values.yaml, does not generate a deployment manifest. If run without the `-f values.yml` the deployment manifest is created. What is wrong with the values that causes the manifest to not be created?
priority
helm template with custom values does not create deployment when using the helm chart version helm show chart nginx stable nginx ingress apiversion appversion description nginx ingress controller home icon keywords ingress nginx kubeversion maintainers email kubernetes nginx com name nginxinc name nginx ingress sources version running helm template nginx nginx stable nginx ingress f values yml where values yml is the default values found does not generate a deployment manifest if run without the f values yml the deployment manifest is created what is wrong with the values that causes the manifest to not be created
1
632,282
20,189,609,362
IssuesEvent
2022-02-11 03:21:11
WeAreNewt/NonFungibleTime
https://api.github.com/repos/WeAreNewt/NonFungibleTime
closed
No error prompt when I try to mint absurdly low duration
bug good first issue frontend mid priority
![image](https://user-images.githubusercontent.com/84038320/153106545-d5afde7b-c6fd-4215-8f17-db82365406be.png) I can't mint an absurdly low numberOfHours (Metamask doesn't pop up), but I also get no error messaging from the modal
1.0
No error prompt when I try to mint absurdly low duration - ![image](https://user-images.githubusercontent.com/84038320/153106545-d5afde7b-c6fd-4215-8f17-db82365406be.png) I can't mint an absurdly low numberOfHours (Metamask doesn't pop up), but I also get no error messaging from the modal
priority
no error prompt when i try to mint absurdly low duration i can t mint an absurdly low numberofhours metamask doesn t pop up but i also get no error messaging from the modal
1
54,651
13,401,012,209
IssuesEvent
2020-09-03 16:38:29
stitchEm/stitchEm
https://api.github.com/repos/stitchEm/stitchEm
opened
Print CMake version for easier troubleshooting
Build enhancement good first issue
Just print out the CMake version at the beginning of the configuration, so that when issues are filed with CMake printouts, we already have that information (see #121).
1.0
Print CMake version for easier troubleshooting - Just print out the CMake version at the beginning of the configuration, so that when issues are filed with CMake printouts, we already have that information (see #121).
non_priority
print cmake version for easier troubleshooting just print out the cmake version at the beginning of the configuration so that when issues are filed with cmake printouts we already have that information see
0
648,521
21,188,190,635
IssuesEvent
2022-04-08 14:42:25
ConsistencyPlus/ConsistencyPlus
https://api.github.com/repos/ConsistencyPlus/ConsistencyPlus
closed
Crash at creating a new world
Help Wanted Invalid Question/Information Needed Low Priority
**Describe the bug** Crash at creating a new world after updating C+ from 0.3 to 0.4.2 **Versions** Minecraft version: 1.16.5 C+ version: 0.4.2 Fabric API version: 0.43.0+1.16 (Edited by Siuol the reflect the actual version of Fabric API used.) **Other mods** [crash-2021-12-04_13.23.09-server.txt](https://github.com/ConsistencyPlus/ConsistencyPlus/files/7653380/crash-2021-12-04_13.23.09-server.txt) **Logs** [latest.log](https://github.com/ConsistencyPlus/ConsistencyPlus/files/7653378/latest.log) **To Reproduce** 1. Updating C+ from 0.3 to 0.4.2 2. Start Minecraft 3. Create new world
1.0
Crash at creating a new world - **Describe the bug** Crash at creating a new world after updating C+ from 0.3 to 0.4.2 **Versions** Minecraft version: 1.16.5 C+ version: 0.4.2 Fabric API version: 0.43.0+1.16 (Edited by Siuol the reflect the actual version of Fabric API used.) **Other mods** [crash-2021-12-04_13.23.09-server.txt](https://github.com/ConsistencyPlus/ConsistencyPlus/files/7653380/crash-2021-12-04_13.23.09-server.txt) **Logs** [latest.log](https://github.com/ConsistencyPlus/ConsistencyPlus/files/7653378/latest.log) **To Reproduce** 1. Updating C+ from 0.3 to 0.4.2 2. Start Minecraft 3. Create new world
priority
crash at creating a new world describe the bug crash at creating a new world after updating c from to versions minecraft version c version fabric api version edited by siuol the reflect the actual version of fabric api used other mods logs to reproduce updating c from to start minecraft create new world
1
89,885
3,801,503,779
IssuesEvent
2016-03-23 23:15:42
kubernetes/kubernetes
https://api.github.com/repos/kubernetes/kubernetes
opened
Add a munger (bot) to require release-note-* on all PRs and release-note-(!NONE) on cherrypicks (to branches)
help-wanted priority/P1
Following a revelation in https://github.com/kubernetes/kubernetes/pull/23315#issuecomment-200573266, it became clear we could solve the release note issue (at least the simple case) with labels and a bot. We need a new munger/bot to do the following: 1. Initiate a `needs-release-note` label on all new PRs 1. Disallow/Remove the `lgtm` label on all PRs labeled as `needs-release-note` 1. Create new labels: `release-note-NONE`, maybe others for new release note categories 1. Auto-remove `needs-release-note` when one of the release-note-* labels is added 1. Special case for cherry-picked/branch PRs, release-note-NONE is not allowed
1.0
Add a munger (bot) to require release-note-* on all PRs and release-note-(!NONE) on cherrypicks (to branches) - Following a revelation in https://github.com/kubernetes/kubernetes/pull/23315#issuecomment-200573266, it became clear we could solve the release note issue (at least the simple case) with labels and a bot. We need a new munger/bot to do the following: 1. Initiate a `needs-release-note` label on all new PRs 1. Disallow/Remove the `lgtm` label on all PRs labeled as `needs-release-note` 1. Create new labels: `release-note-NONE`, maybe others for new release note categories 1. Auto-remove `needs-release-note` when one of the release-note-* labels is added 1. Special case for cherry-picked/branch PRs, release-note-NONE is not allowed
priority
add a munger bot to require release note on all prs and release note none on cherrypicks to branches following a revelation in it became clear we could solve the release note issue at least the simple case with labels and a bot we need a new munger bot to do the following initiate a needs release note label on all new prs disallow remove the lgtm label on all prs labeled as needs release note create new labels release note none maybe others for new release note categories auto remove needs release note when one of the release note labels is added special case for cherry picked branch prs release note none is not allowed
1
279,506
8,666,763,987
IssuesEvent
2018-11-29 05:57:14
dmwm/WMCore
https://api.github.com/repos/dmwm/WMCore
closed
Push worker threads execution time to MONIT IT
Medium Priority Monitoring
Since we now collect this data and persist it in the relational database, it should be pretty straight forward to publish how long each component and their threads take per cycle. This is going to be more like a developers metric/view, but I think it's quite useful.
1.0
Push worker threads execution time to MONIT IT - Since we now collect this data and persist it in the relational database, it should be pretty straight forward to publish how long each component and their threads take per cycle. This is going to be more like a developers metric/view, but I think it's quite useful.
priority
push worker threads execution time to monit it since we now collect this data and persist it in the relational database it should be pretty straight forward to publish how long each component and their threads take per cycle this is going to be more like a developers metric view but i think it s quite useful
1
807,771
30,018,740,082
IssuesEvent
2023-06-26 20:59:38
vrchatapi/specification
https://api.github.com/repos/vrchatapi/specification
closed
Presence in auth/user
Type: Enhancement Priority: Medium Status: Help Wanted Good First Task
Noticed this in auth/user: ```json "presence": { "id": "...", "platform": "", "status": "offline", "world": "offline", "instance": "offline", "instanceType": "", "travelingToWorld": "offline", "travelingToInstance": "offline", "groups": [] } ``` No idea how long it's been there. Some fields were previously in the root of the returned object.
1.0
Presence in auth/user - Noticed this in auth/user: ```json "presence": { "id": "...", "platform": "", "status": "offline", "world": "offline", "instance": "offline", "instanceType": "", "travelingToWorld": "offline", "travelingToInstance": "offline", "groups": [] } ``` No idea how long it's been there. Some fields were previously in the root of the returned object.
priority
presence in auth user noticed this in auth user json presence id platform status offline world offline instance offline instancetype travelingtoworld offline travelingtoinstance offline groups no idea how long it s been there some fields were previously in the root of the returned object
1
369,950
10,920,406,156
IssuesEvent
2019-11-21 21:11:38
bounswe/bounswe2019group6
https://api.github.com/repos/bounswe/bounswe2019group6
closed
Implement Portfolio Page
priority:high related:frontend type:new-feature
A user can create a portfolio using his/her profile page. When the user clicks to the created portfolio. We need to redirect him/her to a new page containing the information of the portfolio. User should be able to: * see all trading equipments * add new trading equipment * remove already added trading equipment
1.0
Implement Portfolio Page - A user can create a portfolio using his/her profile page. When the user clicks to the created portfolio. We need to redirect him/her to a new page containing the information of the portfolio. User should be able to: * see all trading equipments * add new trading equipment * remove already added trading equipment
priority
implement portfolio page a user can create a portfolio using his her profile page when the user clicks to the created portfolio we need to redirect him her to a new page containing the information of the portfolio user should be able to see all trading equipments add new trading equipment remove already added trading equipment
1
314,264
26,988,282,802
IssuesEvent
2023-02-09 17:43:46
Azure/azure-sdk-tools
https://api.github.com/repos/Azure/azure-sdk-tools
closed
Test issue - disregard
Test-Proxy
Test of the change I made to Fabric Bot to assign issues labeled as 'Test-Proxy' to me.
1.0
Test issue - disregard - Test of the change I made to Fabric Bot to assign issues labeled as 'Test-Proxy' to me.
non_priority
test issue disregard test of the change i made to fabric bot to assign issues labeled as test proxy to me
0
289,724
31,996,938,126
IssuesEvent
2023-09-21 09:46:36
Mend-developer-platform-load/3184155_33
https://api.github.com/repos/Mend-developer-platform-load/3184155_33
opened
ansible-2.9.9.tar.gz: 8 vulnerabilities (highest severity is: 7.1)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (ansible version) | Remediation Possible** | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2020-14365](https://www.mend.io/vulnerability-database/CVE-2020-14365) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.1 | ansible-2.9.9.tar.gz | Direct | 2.9.12 | &#9989; | | [CVE-2020-14332](https://www.mend.io/vulnerability-database/CVE-2020-14332) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | ansible-2.9.9.tar.gz | Direct | 2.9.12 | &#9989; | | [CVE-2020-1753](https://www.mend.io/vulnerability-database/CVE-2020-1753) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | ansible-2.9.9.tar.gz | Direct | 2.9.10 | &#9989; | | [CVE-2021-20180](https://www.mend.io/vulnerability-database/CVE-2021-20180) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | ansible-2.9.9.tar.gz | Direct | 2.9.18 | &#9989; | | [CVE-2020-14330](https://www.mend.io/vulnerability-database/CVE-2020-14330) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | ansible-2.9.9.tar.gz | Direct | 2.9.14 | &#9989; | | [CVE-2020-10744](https://www.mend.io/vulnerability-database/CVE-2020-10744) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.0 | ansible-2.9.9.tar.gz | Direct | 2.9.10 | &#9989; | | [CVE-2020-1738](https://www.mend.io/vulnerability-database/CVE-2020-1738) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 3.9 | ansible-2.9.9.tar.gz | Direct | 2.9.10 | &#9989; | | [CVE-2021-3533](https://www.mend.io/vulnerability-database/CVE-2021-3533) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 2.5 | ansible-2.9.9.tar.gz | Direct | 2.9.23 | &#9989; | <p>**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-14365</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability. <p>Publish Date: 2020-09-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-14365>CVE-2020-14365</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1869154">https://bugzilla.redhat.com/show_bug.cgi?id=1869154</a></p> <p>Release Date: 2020-09-23</p> <p>Fix Resolution: 2.9.12</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2020-14332</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality. <p>Publish Date: 2020-09-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-14332>CVE-2020-14332</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332</a></p> <p>Release Date: 2020-09-11</p> <p>Fix Resolution: 2.9.12</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2020-1753</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-1753>CVE-2020-1753</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">https://nvd.nist.gov/vuln/detail/CVE-2020-1753</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-20180</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality. <p>Publish Date: 2022-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-20180>CVE-2021-20180</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-fh5v-5f35-2rv2">https://github.com/advisories/GHSA-fh5v-5f35-2rv2</a></p> <p>Release Date: 2022-03-16</p> <p>Fix Resolution: 2.9.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2020-14330</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality. <p>Publish Date: 2020-09-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-14330>CVE-2020-14330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330</a></p> <p>Release Date: 2020-09-11</p> <p>Fix Resolution: 2.9.14</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2020-10744</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected. <p>Publish Date: 2020-05-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10744>CVE-2020-10744</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.0</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10744">https://nvd.nist.gov/vuln/detail/CVE-2020-10744</a></p> <p>Release Date: 2020-05-15</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2020-1738</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-1738>CVE-2020-1738</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2021-3533</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2. <p>Publish Date: 2021-06-09 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3533>CVE-2021-3533</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>2.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3533">https://nvd.nist.gov/vuln/detail/CVE-2021-3533</a></p> <p>Release Date: 2021-06-09</p> <p>Fix Resolution: 2.9.23</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details> *** <p>:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.</p>
True
ansible-2.9.9.tar.gz: 8 vulnerabilities (highest severity is: 7.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (ansible version) | Remediation Possible** | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2020-14365](https://www.mend.io/vulnerability-database/CVE-2020-14365) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.1 | ansible-2.9.9.tar.gz | Direct | 2.9.12 | &#9989; | | [CVE-2020-14332](https://www.mend.io/vulnerability-database/CVE-2020-14332) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | ansible-2.9.9.tar.gz | Direct | 2.9.12 | &#9989; | | [CVE-2020-1753](https://www.mend.io/vulnerability-database/CVE-2020-1753) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | ansible-2.9.9.tar.gz | Direct | 2.9.10 | &#9989; | | [CVE-2021-20180](https://www.mend.io/vulnerability-database/CVE-2021-20180) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | ansible-2.9.9.tar.gz | Direct | 2.9.18 | &#9989; | | [CVE-2020-14330](https://www.mend.io/vulnerability-database/CVE-2020-14330) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | ansible-2.9.9.tar.gz | Direct | 2.9.14 | &#9989; | | [CVE-2020-10744](https://www.mend.io/vulnerability-database/CVE-2020-10744) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.0 | ansible-2.9.9.tar.gz | Direct | 2.9.10 | &#9989; | | [CVE-2020-1738](https://www.mend.io/vulnerability-database/CVE-2020-1738) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 3.9 | ansible-2.9.9.tar.gz | Direct | 2.9.10 | &#9989; | | [CVE-2021-3533](https://www.mend.io/vulnerability-database/CVE-2021-3533) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 2.5 | ansible-2.9.9.tar.gz | Direct | 2.9.23 | &#9989; | <p>**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-14365</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability. <p>Publish Date: 2020-09-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-14365>CVE-2020-14365</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1869154">https://bugzilla.redhat.com/show_bug.cgi?id=1869154</a></p> <p>Release Date: 2020-09-23</p> <p>Fix Resolution: 2.9.12</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2020-14332</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality. <p>Publish Date: 2020-09-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-14332>CVE-2020-14332</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332</a></p> <p>Release Date: 2020-09-11</p> <p>Fix Resolution: 2.9.12</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2020-1753</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-1753>CVE-2020-1753</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">https://nvd.nist.gov/vuln/detail/CVE-2020-1753</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-20180</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality. <p>Publish Date: 2022-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-20180>CVE-2021-20180</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-fh5v-5f35-2rv2">https://github.com/advisories/GHSA-fh5v-5f35-2rv2</a></p> <p>Release Date: 2022-03-16</p> <p>Fix Resolution: 2.9.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2020-14330</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality. <p>Publish Date: 2020-09-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-14330>CVE-2020-14330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330</a></p> <p>Release Date: 2020-09-11</p> <p>Fix Resolution: 2.9.14</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2020-10744</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected. <p>Publish Date: 2020-05-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-10744>CVE-2020-10744</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.0</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10744">https://nvd.nist.gov/vuln/detail/CVE-2020-10744</a></p> <p>Release Date: 2020-05-15</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2020-1738</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-1738>CVE-2020-1738</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2021-3533</summary> ### Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Mend-developer-platform-load/3184155_33/commit/7da6eb4ea8282c74045d0ef7c7c93c00c9df886d">7da6eb4ea8282c74045d0ef7c7c93c00c9df886d</a></p> <p>Found in base branch: <b>feature_branch</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2. <p>Publish Date: 2021-06-09 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3533>CVE-2021-3533</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>2.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3533">https://nvd.nist.gov/vuln/detail/CVE-2021-3533</a></p> <p>Release Date: 2021-06-09</p> <p>Fix Resolution: 2.9.23</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation will be attempted for this issue. </details> *** <p>:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.</p>
non_priority
ansible tar gz vulnerabilities highest severity is vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file requirements txt path to vulnerable library requirements txt found in head commit a href vulnerabilities cve severity cvss dependency type fixed in ansible version remediation possible high ansible tar gz direct medium ansible tar gz direct medium ansible tar gz direct medium ansible tar gz direct medium ansible tar gz direct medium ansible tar gz direct low ansible tar gz direct low ansible tar gz direct in some cases remediation pr cannot be created automatically for a vulnerability despite the availability of remediation details cve vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch feature branch vulnerability details a flaw was found in the ansible engine in ansible engine x before and ansible engine x before when installing packages using the dnf module gpg signatures are ignored during installation even when disable gpg check is set to false which is the default behavior this flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts the highest threat from this vulnerability is to integrity and system availability publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation will be attempted for this issue cve vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch feature branch vulnerability details a flaw was found in the ansible engine when using module args tasks executed with check mode check mode do not properly neutralize sensitive data exposed in the event data this flaw allows unauthorized users to read this data the highest threat from this vulnerability is to confidentiality publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation will be attempted for this issue cve vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch feature branch vulnerability details a security flaw was found in ansible engine all ansible x versions prior to all ansible x versions prior to and all ansible x versions prior to when managing kubernetes using the module sensitive parameters such as passwords and tokens are passed to kubectl from the command line not using an environment variable or an input configuration file this will disclose passwords and tokens from process list and no log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation will be attempted for this issue cve vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch feature branch vulnerability details a flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket pipeline variable module this flaw allows an attacker to steal bitbucket pipeline credentials the highest threat from this vulnerability is to confidentiality publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation will be attempted for this issue cve vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch feature branch vulnerability details an improper output neutralization for logs flaw was found in ansible when using the uri module where sensitive data is exposed to content and json output this flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module the highest threat from this vulnerability is to data confidentiality publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation will be attempted for this issue cve vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch feature branch vulnerability details an incomplete fix was found for the fix of the flaw cve ansible insecure temporary directory when running become user from become directive the provided fix is insufficient to prevent the race condition on systems using acls and fuse filesystems ansible engine and as well as previous versions are affected and ansible tower and as well as previous versions are affected publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation will be attempted for this issue cve vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch feature branch vulnerability details a flaw was found in ansible engine when the module package or service is used and the parameter use is not specified if a previous task is executed with a malicious user the module sent can be selected by the attacker using the ansible facts file all versions in x x and x branches are believed to be vulnerable publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction required scope changed impact metrics confidentiality impact none integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation will be attempted for this issue cve vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch feature branch vulnerability details a flaw was found in ansible if an ansible user sets ansible async dir to a subdirectory of a world writable directory when this occurs there is a race condition on the managed machine a malicious non privileged account on the remote machine can exploit the race condition to access the async result data this flaw affects ansible tower and ansible automation platform publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation will be attempted for this issue rescue worker helmet automatic remediation will be attempted for this issue
0
76,912
9,968,870,168
IssuesEvent
2019-07-08 16:34:15
microsoft/MixedRealityToolkit-Unity
https://api.github.com/repos/microsoft/MixedRealityToolkit-Unity
closed
How to connect HoloLens to server via TCP/IP?
Documentation
Hi guys, I am a beginner in this field. I want to know there is a tutorial that explains to me, how can I connect HoloLens to a server on the network using TCP/IP to exchange data between them. Thnx
1.0
How to connect HoloLens to server via TCP/IP? - Hi guys, I am a beginner in this field. I want to know there is a tutorial that explains to me, how can I connect HoloLens to a server on the network using TCP/IP to exchange data between them. Thnx
non_priority
how to connect hololens to server via tcp ip hi guys i am a beginner in this field i want to know there is a tutorial that explains to me how can i connect hololens to a server on the network using tcp ip to exchange data between them thnx
0
171,016
27,048,976,838
IssuesEvent
2023-02-13 11:53:23
effektio/effektio
https://api.github.com/repos/effektio/effektio
closed
internet connectivity state in app
bug flutter infrastructure design needed
We should add network aware handlers/widgets in the application which would inform the internet connectivity state of the application. These packages seems to be helpful: https://pub.dev/packages/connectivity_plus https://pub.dev/packages/connectivity_wrapper
1.0
internet connectivity state in app - We should add network aware handlers/widgets in the application which would inform the internet connectivity state of the application. These packages seems to be helpful: https://pub.dev/packages/connectivity_plus https://pub.dev/packages/connectivity_wrapper
non_priority
internet connectivity state in app we should add network aware handlers widgets in the application which would inform the internet connectivity state of the application these packages seems to be helpful
0
593,039
17,936,666,245
IssuesEvent
2021-09-10 16:10:37
assurance-maladie-digital/design-system
https://api.github.com/repos/assurance-maladie-digital/design-system
closed
Documentation de la règle de validation exactLength
low-priority
## Description En tant que développeur utilisant le Design System, je veux savoir comment utiliser la règle de validation [`exactLength`](https://github.com/assurance-maladie-digital/design-system/blob/dev/packages/vue-dot/src/rules/exactLength/index.ts).
1.0
Documentation de la règle de validation exactLength - ## Description En tant que développeur utilisant le Design System, je veux savoir comment utiliser la règle de validation [`exactLength`](https://github.com/assurance-maladie-digital/design-system/blob/dev/packages/vue-dot/src/rules/exactLength/index.ts).
priority
documentation de la règle de validation exactlength description en tant que développeur utilisant le design system je veux savoir comment utiliser la règle de validation
1
820,143
30,761,206,490
IssuesEvent
2023-07-29 18:22:32
prakhartiwari0/Arito
https://api.github.com/repos/prakhartiwari0/Arito
closed
[FEATURE] Add a challenge mode
enhancement priority: Low gssoc23
**Is your feature request related to a problem? Please describe.** Yes, the feature request is related to improving the user experience on the mathematical quiz website. Currently, the website lacks a time-based challenge mode and an option to skip questions, which can limit user engagement and frustrate players who encounter difficult or unfamiliar questions. **Describe the solution you'd like** I would like the addition of a challenge mode on the mathematical quiz website. This mode would require players to complete tasks within a specific time limit, adding an element of excitement and urgency to the gameplay. Users would be motivated to solve questions quickly and accurately, enhancing their mathematical skills under pressure. Furthermore, I suggest implementing an option to skip questions. This feature would allow users to bypass questions they find challenging or don't know the answer to, providing a smoother and less frustrating experience. It would enable players to continue progressing through the quiz without getting stuck on a particular question. **Additional context** These features can attract a wider audience and encourage users to continue using the website to improve their mathematical abilities.
1.0
[FEATURE] Add a challenge mode - **Is your feature request related to a problem? Please describe.** Yes, the feature request is related to improving the user experience on the mathematical quiz website. Currently, the website lacks a time-based challenge mode and an option to skip questions, which can limit user engagement and frustrate players who encounter difficult or unfamiliar questions. **Describe the solution you'd like** I would like the addition of a challenge mode on the mathematical quiz website. This mode would require players to complete tasks within a specific time limit, adding an element of excitement and urgency to the gameplay. Users would be motivated to solve questions quickly and accurately, enhancing their mathematical skills under pressure. Furthermore, I suggest implementing an option to skip questions. This feature would allow users to bypass questions they find challenging or don't know the answer to, providing a smoother and less frustrating experience. It would enable players to continue progressing through the quiz without getting stuck on a particular question. **Additional context** These features can attract a wider audience and encourage users to continue using the website to improve their mathematical abilities.
priority
add a challenge mode is your feature request related to a problem please describe yes the feature request is related to improving the user experience on the mathematical quiz website currently the website lacks a time based challenge mode and an option to skip questions which can limit user engagement and frustrate players who encounter difficult or unfamiliar questions describe the solution you d like i would like the addition of a challenge mode on the mathematical quiz website this mode would require players to complete tasks within a specific time limit adding an element of excitement and urgency to the gameplay users would be motivated to solve questions quickly and accurately enhancing their mathematical skills under pressure furthermore i suggest implementing an option to skip questions this feature would allow users to bypass questions they find challenging or don t know the answer to providing a smoother and less frustrating experience it would enable players to continue progressing through the quiz without getting stuck on a particular question additional context these features can attract a wider audience and encourage users to continue using the website to improve their mathematical abilities
1
378,939
11,211,008,299
IssuesEvent
2020-01-06 14:33:19
AugurProject/augur
https://api.github.com/repos/AugurProject/augur
closed
Onboarding: modals have strange spacing all of a sudden
Priority: Medium
See comparison shots below for strange spacing in the build. **note** the heading/description copy is now jumping around as well: ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/dacf932e-8401-4ed4-a73f-89fe505f5783) Comparisons shots (design left, build right): ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/debbce56-5a78-4a5e-b151-fedaa9e420a9) ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/94334c1a-4fda-4522-8b71-96be5eaa6b6c) ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/426db494-4fbf-441a-82d3-ada543b363ac) Similar for mobile (build on left): ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/d02bbe04-589b-4382-bd5e-639aa8acf2c7) Figma link for mobile: https://www.figma.com/file/RMXc7jUWiC6amxz9Q2JK5L/Onboarding-and-Wallet-UX?node-id=1756%3A121
1.0
Onboarding: modals have strange spacing all of a sudden - See comparison shots below for strange spacing in the build. **note** the heading/description copy is now jumping around as well: ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/dacf932e-8401-4ed4-a73f-89fe505f5783) Comparisons shots (design left, build right): ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/debbce56-5a78-4a5e-b151-fedaa9e420a9) ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/94334c1a-4fda-4522-8b71-96be5eaa6b6c) ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/426db494-4fbf-441a-82d3-ada543b363ac) Similar for mobile (build on left): ![image.png](https://images.zenhubusercontent.com/5c7591d7eec15745ffae99b1/d02bbe04-589b-4382-bd5e-639aa8acf2c7) Figma link for mobile: https://www.figma.com/file/RMXc7jUWiC6amxz9Q2JK5L/Onboarding-and-Wallet-UX?node-id=1756%3A121
priority
onboarding modals have strange spacing all of a sudden see comparison shots below for strange spacing in the build note the heading description copy is now jumping around as well comparisons shots design left build right similar for mobile build on left figma link for mobile
1
82,394
7,840,481,458
IssuesEvent
2018-06-18 16:29:01
w3c/csswg-drafts
https://api.github.com/repos/w3c/csswg-drafts
closed
[css-cascade] Change the precedence order of cascading origins to match reality better?
Closed Rejected as Invalid Needs Testcase (WPT) css-cascade-3
Currently, the CSS Cascade spec states that animation declarations [shouldn't override](https://drafts.csswg.org/css-cascade/#cascade-origin) important author declarations. In fact, they do in all browsers except Firefox. There are some articles that appear to describe this overriding as a standard behavior ([1](https://escss.blogspot.com/2015/04/animaciones-transiciones-contra-important.html), [2](https://paulbakaus.com/2017/07/27/more-important-than-important/)), so devs may start to believe that this is how it should be (e.g. [3](https://twitter.com/iamvdo/status/890862651324104704)). The [Chrome bug](https://bugs.chromium.org/p/chromium/issues/detail?id=552085) about this has been reported in 2015, but still there seems to be no visible intent to fix it. Unfortunately I have no data if the corresponding bugs were reported to Safari and Edge. Wouldn't it be easier to change the behavior of Firefox than to persuade all other browser vendors to change their behavior according to the current spec? Wouldn't it make sense to change the spec to match the reality of the majority of the browsers?
1.0
[css-cascade] Change the precedence order of cascading origins to match reality better? - Currently, the CSS Cascade spec states that animation declarations [shouldn't override](https://drafts.csswg.org/css-cascade/#cascade-origin) important author declarations. In fact, they do in all browsers except Firefox. There are some articles that appear to describe this overriding as a standard behavior ([1](https://escss.blogspot.com/2015/04/animaciones-transiciones-contra-important.html), [2](https://paulbakaus.com/2017/07/27/more-important-than-important/)), so devs may start to believe that this is how it should be (e.g. [3](https://twitter.com/iamvdo/status/890862651324104704)). The [Chrome bug](https://bugs.chromium.org/p/chromium/issues/detail?id=552085) about this has been reported in 2015, but still there seems to be no visible intent to fix it. Unfortunately I have no data if the corresponding bugs were reported to Safari and Edge. Wouldn't it be easier to change the behavior of Firefox than to persuade all other browser vendors to change their behavior according to the current spec? Wouldn't it make sense to change the spec to match the reality of the majority of the browsers?
non_priority
change the precedence order of cascading origins to match reality better currently the css cascade spec states that animation declarations important author declarations in fact they do in all browsers except firefox there are some articles that appear to describe this overriding as a standard behavior so devs may start to believe that this is how it should be e g the about this has been reported in but still there seems to be no visible intent to fix it unfortunately i have no data if the corresponding bugs were reported to safari and edge wouldn t it be easier to change the behavior of firefox than to persuade all other browser vendors to change their behavior according to the current spec wouldn t it make sense to change the spec to match the reality of the majority of the browsers
0
690,481
23,661,546,322
IssuesEvent
2022-08-26 16:03:21
PrefectHQ/prefect
https://api.github.com/repos/PrefectHQ/prefect
closed
Add `EXTRA_PIP_PACKAGES` to the `KubernetesJob` block
bug status:backlog v2 priority:medium
### First check - [X] I added a descriptive title to this issue. - [X] I used the GitHub search to find a similar request and didn't find it. - [X] I searched the Prefect documentation for this feature. ### Prefect Version 2.x ### Describe the proposed behavior Add it to K8s block ### Describe the current behavior Atm it only works with the `DockerContainer` block ### Example Use _No response_ ### Additional context _No response_
1.0
Add `EXTRA_PIP_PACKAGES` to the `KubernetesJob` block - ### First check - [X] I added a descriptive title to this issue. - [X] I used the GitHub search to find a similar request and didn't find it. - [X] I searched the Prefect documentation for this feature. ### Prefect Version 2.x ### Describe the proposed behavior Add it to K8s block ### Describe the current behavior Atm it only works with the `DockerContainer` block ### Example Use _No response_ ### Additional context _No response_
priority
add extra pip packages to the kubernetesjob block first check i added a descriptive title to this issue i used the github search to find a similar request and didn t find it i searched the prefect documentation for this feature prefect version x describe the proposed behavior add it to block describe the current behavior atm it only works with the dockercontainer block example use no response additional context no response
1
247,341
7,917,386,644
IssuesEvent
2018-07-04 09:40:58
georchestra/georchestra
https://api.github.com/repos/georchestra/georchestra
closed
console - navigation by organisation don't lead to users of organisations
2018 priority-top
When you navigate by organisation /ldapadmin/console/#/orgs/all you have the organisation list and, for each organisation the count of users attached to the organisation. But at any time you have the list of the users of an organisation.
1.0
console - navigation by organisation don't lead to users of organisations - When you navigate by organisation /ldapadmin/console/#/orgs/all you have the organisation list and, for each organisation the count of users attached to the organisation. But at any time you have the list of the users of an organisation.
priority
console navigation by organisation don t lead to users of organisations when you navigate by organisation ldapadmin console orgs all you have the organisation list and for each organisation the count of users attached to the organisation but at any time you have the list of the users of an organisation
1
56,285
13,784,652,596
IssuesEvent
2020-10-08 21:14:56
microsoft/vscode-cpptools
https://api.github.com/repos/microsoft/vscode-cpptools
closed
Unable to compile program in Win 10 with MinGW
build/tasks question
I had met a bug like what https://github.com/microsoft/vscode-cpptools/issues/1329 mentioned, and I fixed it through change the code in task.json to: ```json "label": "build", "type": "shell", "command": "C:/mingw-w64/i686-8.1.0-posix-dwarf-rt_v6-rev0/mingw32/bin/g++.exe", "args": [ "-g", "-o", "FAIL", "FAIL.c", ], ``` (fix bugs is like torture, so I used FAIL as file name) now, 1.how to make the filename in "args" is defined automatically? 2.after that, the powershell cmd returns it to me: ``` > Executing task: C:/mingw-w64/i686-8.1.0-posix-dwarf-rt_v6-rev0/mingw32/bin/g++.exe -g -o FAIL FAIL.c < The terminal process terminated with exit code: 1 Terminal will be reused by tasks, press any key to close it. ``` but I press F5, it sends me that the exe program has not been set up.How to fix it? Sorry for my improper English and program level, but I am new in VSCode and not familiar with many basic operations, so maybe I will seek help to bugs in preparation of cpp here.
1.0
Unable to compile program in Win 10 with MinGW - I had met a bug like what https://github.com/microsoft/vscode-cpptools/issues/1329 mentioned, and I fixed it through change the code in task.json to: ```json "label": "build", "type": "shell", "command": "C:/mingw-w64/i686-8.1.0-posix-dwarf-rt_v6-rev0/mingw32/bin/g++.exe", "args": [ "-g", "-o", "FAIL", "FAIL.c", ], ``` (fix bugs is like torture, so I used FAIL as file name) now, 1.how to make the filename in "args" is defined automatically? 2.after that, the powershell cmd returns it to me: ``` > Executing task: C:/mingw-w64/i686-8.1.0-posix-dwarf-rt_v6-rev0/mingw32/bin/g++.exe -g -o FAIL FAIL.c < The terminal process terminated with exit code: 1 Terminal will be reused by tasks, press any key to close it. ``` but I press F5, it sends me that the exe program has not been set up.How to fix it? Sorry for my improper English and program level, but I am new in VSCode and not familiar with many basic operations, so maybe I will seek help to bugs in preparation of cpp here.
non_priority
unable to compile program in win with mingw i had met a bug like what mentioned and i fixed it through change the code in task json to json label build type shell command c mingw posix dwarf rt bin g exe args g o fail fail c fix bugs is like torture so i used fail as file name now how to make the filename in args is defined automatically after that the powershell cmd returns it to me executing task c mingw posix dwarf rt bin g exe g o fail fail c the terminal process terminated with exit code terminal will be reused by tasks press any key to close it but i press it sends me that the exe program has not been set up how to fix it sorry for my improper english and program level but i am new in vscode and not familiar with many basic operations so maybe i will seek help to bugs in preparation of cpp here
0
442,976
30,868,790,053
IssuesEvent
2023-08-03 09:51:36
HishamWattar/cooks-kingdom
https://api.github.com/repos/HishamWattar/cooks-kingdom
closed
Add admin endpoint api/admin/user/approve-chef/:id
documentation API tests
This endpoint will approve a chef request in case a user wanted to become a chef
1.0
Add admin endpoint api/admin/user/approve-chef/:id - This endpoint will approve a chef request in case a user wanted to become a chef
non_priority
add admin endpoint api admin user approve chef id this endpoint will approve a chef request in case a user wanted to become a chef
0
742,146
25,840,250,753
IssuesEvent
2022-12-12 23:26:38
rancher/dashboard
https://api.github.com/repos/rancher/dashboard
closed
[Bug] [Monitoring V2] Cannot add Email receivers
kind/bug internal area/monitoring [zube]: QA Working priority/1 team/area3 area/ui JIRA
**What kind of request is this (question/bug/enhancement/feature request):** Bug **Steps to reproduce (least amount of steps as possible):** In this case, the steps we followed were to: 1. Deploy a fresh Rancher v2.5.1 cluster 2. Enable monitoring v2 3. Upgrade Rancher to v2.5.3 4. Attempt to add an email receiver for notifications **Result:** Creation fails with `Cannot read property 'data' of undefined` ![image](https://user-images.githubusercontent.com/8906089/103965175-161cfa80-5155-11eb-91ae-c82fa77e7f71.png) Workaround is to manually add the receiver to the `alertmanager-rancher-monitoring-alertmanager` secret. Alerts will work but the receiver and routes will not show in the UI. We have a HAR capture and a copy of the manually created secret (please DM me internally in Slack) **Other details that may be helpful:** We have seen this in another cluster where they were able to workaround by: 1. Filling in the fields to create a Reciever 2. Clicking on Edit as YAML 3. Copying the YAML and manually applying For them the fix was to disable and re-enable monitoring. It may be worth noting they had upgraded from v2.4.x gz#14160 gz#15969
1.0
[Bug] [Monitoring V2] Cannot add Email receivers - **What kind of request is this (question/bug/enhancement/feature request):** Bug **Steps to reproduce (least amount of steps as possible):** In this case, the steps we followed were to: 1. Deploy a fresh Rancher v2.5.1 cluster 2. Enable monitoring v2 3. Upgrade Rancher to v2.5.3 4. Attempt to add an email receiver for notifications **Result:** Creation fails with `Cannot read property 'data' of undefined` ![image](https://user-images.githubusercontent.com/8906089/103965175-161cfa80-5155-11eb-91ae-c82fa77e7f71.png) Workaround is to manually add the receiver to the `alertmanager-rancher-monitoring-alertmanager` secret. Alerts will work but the receiver and routes will not show in the UI. We have a HAR capture and a copy of the manually created secret (please DM me internally in Slack) **Other details that may be helpful:** We have seen this in another cluster where they were able to workaround by: 1. Filling in the fields to create a Reciever 2. Clicking on Edit as YAML 3. Copying the YAML and manually applying For them the fix was to disable and re-enable monitoring. It may be worth noting they had upgraded from v2.4.x gz#14160 gz#15969
priority
cannot add email receivers what kind of request is this question bug enhancement feature request bug steps to reproduce least amount of steps as possible in this case the steps we followed were to deploy a fresh rancher cluster enable monitoring upgrade rancher to attempt to add an email receiver for notifications result creation fails with cannot read property data of undefined workaround is to manually add the receiver to the alertmanager rancher monitoring alertmanager secret alerts will work but the receiver and routes will not show in the ui we have a har capture and a copy of the manually created secret please dm me internally in slack other details that may be helpful we have seen this in another cluster where they were able to workaround by filling in the fields to create a reciever clicking on edit as yaml copying the yaml and manually applying for them the fix was to disable and re enable monitoring it may be worth noting they had upgraded from x gz gz
1
554,241
16,415,260,020
IssuesEvent
2021-05-19 05:31:26
Nelson-Gon/pycite
https://api.github.com/repos/Nelson-Gon/pycite
closed
Automated documentation and release
enhancement good first issue help wanted priority:medium
**Description** I would like to automate the doc generation and release process. **Similar Features** This is similar to `scripts/mkdocs.sh` and `scripts/release.sh`. **Feature Details** Sufficiently described. **Proposed Implementation** Use an Actions run to automate these e.g. "on release" to run "release.sh". Should also set environmental variables i.e. PyPI username and password.
1.0
Automated documentation and release - **Description** I would like to automate the doc generation and release process. **Similar Features** This is similar to `scripts/mkdocs.sh` and `scripts/release.sh`. **Feature Details** Sufficiently described. **Proposed Implementation** Use an Actions run to automate these e.g. "on release" to run "release.sh". Should also set environmental variables i.e. PyPI username and password.
priority
automated documentation and release description i would like to automate the doc generation and release process similar features this is similar to scripts mkdocs sh and scripts release sh feature details sufficiently described proposed implementation use an actions run to automate these e g on release to run release sh should also set environmental variables i e pypi username and password
1
53,429
22,783,767,299
IssuesEvent
2022-07-09 00:42:45
operate-first/operations
https://api.github.com/repos/operate-first/operations
closed
Let's make Grafana landing page more friendly
lifecycle/rotten area/service/grafana area/monitoring
The landing page at https://grafana.operate-first.cloud/ is just the Grafana default. Let's replace that with something that highlights interesting dashboards, or maybe provides information about how to contribute new dashboards (or links to appropriate docs), etc.
1.0
Let's make Grafana landing page more friendly - The landing page at https://grafana.operate-first.cloud/ is just the Grafana default. Let's replace that with something that highlights interesting dashboards, or maybe provides information about how to contribute new dashboards (or links to appropriate docs), etc.
non_priority
let s make grafana landing page more friendly the landing page at is just the grafana default let s replace that with something that highlights interesting dashboards or maybe provides information about how to contribute new dashboards or links to appropriate docs etc
0
43,286
2,887,367,329
IssuesEvent
2015-06-12 14:35:58
FLEXIcontent/flexicontent-cck
https://api.github.com/repos/FLEXIcontent/flexicontent-cck
opened
Add to content types selection for menu item when editing, thus to allow custom Joomla template
Priority Normal
The Joomla template used in item views, may not be appropriate or desirable for FLEXIcontent item form The FLEXIcontent edit links should include a different menu item that the item viewing links - this should be a parameter per content type
1.0
Add to content types selection for menu item when editing, thus to allow custom Joomla template - The Joomla template used in item views, may not be appropriate or desirable for FLEXIcontent item form The FLEXIcontent edit links should include a different menu item that the item viewing links - this should be a parameter per content type
priority
add to content types selection for menu item when editing thus to allow custom joomla template the joomla template used in item views may not be appropriate or desirable for flexicontent item form the flexicontent edit links should include a different menu item that the item viewing links this should be a parameter per content type
1
134,727
19,318,145,502
IssuesEvent
2021-12-14 00:19:28
timberline-secondary/hackerspace-todo
https://api.github.com/repos/timberline-secondary/hackerspace-todo
closed
Web Dev HTMl & CSS FInal Project?
Campaigns: New Course: Web Design
This might make a good final project for HTML and CSS (pre-JavaScript) https://www.youtube.com/watch?v=-8LTPIJBGwQ
1.0
Web Dev HTMl & CSS FInal Project? - This might make a good final project for HTML and CSS (pre-JavaScript) https://www.youtube.com/watch?v=-8LTPIJBGwQ
non_priority
web dev html css final project this might make a good final project for html and css pre javascript
0
218,066
7,330,368,590
IssuesEvent
2018-03-05 09:42:03
NCEAS/metacat
https://api.github.com/repos/NCEAS/metacat
closed
Dependence of NCEAS registry on Admin database
Category: registry Component: Bugzilla-Id Priority: Normal Status: Resolved Tracker: Bug
--- Author Name: **Saurabh Garg** (Saurabh Garg) Original Redmine Issue: 1552, https://projects.ecoinformatics.org/ecoinfo/issues/1552 Original Date: 2004-05-04 Original Assignee: Shaun Walbridge --- This is reported by Sandy: She had problems accessing the registry when she was in Washington DC and giving demos of the registry to NSF. Everything was working fine except for the register dataset page for NCEAS. So other functions like search etc were working properly - but http://knb.ecoinformatics.org/cgi-bin/register-dataset.cgi?cfg=nceas was showing up as blank page. I think (and I told her the same thing) that it was the admin database that was causing the problem. The project list is generated from the admin database and if admin database is down - we get a blank page for the url http://knb.ecoinformatics.org/cgi-bin/register-dataset.cgi?cfg=nceas. Solution: We should probably make the project list independent of the admin database... (and/or) we should put some kind of error recovery in case admin database is down.
1.0
Dependence of NCEAS registry on Admin database - --- Author Name: **Saurabh Garg** (Saurabh Garg) Original Redmine Issue: 1552, https://projects.ecoinformatics.org/ecoinfo/issues/1552 Original Date: 2004-05-04 Original Assignee: Shaun Walbridge --- This is reported by Sandy: She had problems accessing the registry when she was in Washington DC and giving demos of the registry to NSF. Everything was working fine except for the register dataset page for NCEAS. So other functions like search etc were working properly - but http://knb.ecoinformatics.org/cgi-bin/register-dataset.cgi?cfg=nceas was showing up as blank page. I think (and I told her the same thing) that it was the admin database that was causing the problem. The project list is generated from the admin database and if admin database is down - we get a blank page for the url http://knb.ecoinformatics.org/cgi-bin/register-dataset.cgi?cfg=nceas. Solution: We should probably make the project list independent of the admin database... (and/or) we should put some kind of error recovery in case admin database is down.
priority
dependence of nceas registry on admin database author name saurabh garg saurabh garg original redmine issue original date original assignee shaun walbridge this is reported by sandy she had problems accessing the registry when she was in washington dc and giving demos of the registry to nsf everything was working fine except for the register dataset page for nceas so other functions like search etc were working properly but was showing up as blank page i think and i told her the same thing that it was the admin database that was causing the problem the project list is generated from the admin database and if admin database is down we get a blank page for the url solution we should probably make the project list independent of the admin database and or we should put some kind of error recovery in case admin database is down
1
627,612
19,910,180,150
IssuesEvent
2022-01-25 16:25:39
mozilla/addons-server
https://api.github.com/repos/mozilla/addons-server
closed
Stop exposing reviewer names to developers
component: reviewer tools priority: p3
This is a spin-off from https://github.com/mozilla/addons-server/issues/17318 and is just about removing the names of reviewers from any screens that developers can see, which should be exclusively devhub pages.
1.0
Stop exposing reviewer names to developers - This is a spin-off from https://github.com/mozilla/addons-server/issues/17318 and is just about removing the names of reviewers from any screens that developers can see, which should be exclusively devhub pages.
priority
stop exposing reviewer names to developers this is a spin off from and is just about removing the names of reviewers from any screens that developers can see which should be exclusively devhub pages
1
396,457
27,119,381,517
IssuesEvent
2023-02-15 21:22:56
MatteoCazzaniga/IngegneriaSoftware_22-23
https://api.github.com/repos/MatteoCazzaniga/IngegneriaSoftware_22-23
closed
Creazione Immagini Diagrammi UML mancanti
documentation
Creazione file jpg dei diagrammi UML mancanti (diagramma dei casi d'uso e diagramma delle attività)
1.0
Creazione Immagini Diagrammi UML mancanti - Creazione file jpg dei diagrammi UML mancanti (diagramma dei casi d'uso e diagramma delle attività)
non_priority
creazione immagini diagrammi uml mancanti creazione file jpg dei diagrammi uml mancanti diagramma dei casi d uso e diagramma delle attività
0
360,317
25,285,501,064
IssuesEvent
2022-11-16 18:56:39
WordPress/Documentation-Issue-Tracker
https://api.github.com/repos/WordPress/Documentation-Issue-Tracker
closed
[HelpHub] File block
user documentation block editor medium priority 6.1
Article: https://wordpress.org/support/article/file-block/ ## Updating for 6.1 - [x] Display upload error notices using snackbars. [43893](https://github.com/WordPress/gutenberg/pull/43893) - [x] Remove redundant block name from "settings" panels [40275](https://github.com/WordPress/gutenberg/pull/40275) ## General - [x] Make sure all screenshots are relevant to the latest version - [x] Make sure videos are up to date - [x] Add ALT tags for the images - [x] Make sure the headings are in sentence case - [x] Convert all reusable blocks to a ‘regular block’. - [x] Update the changelog at the end of the article
1.0
[HelpHub] File block - Article: https://wordpress.org/support/article/file-block/ ## Updating for 6.1 - [x] Display upload error notices using snackbars. [43893](https://github.com/WordPress/gutenberg/pull/43893) - [x] Remove redundant block name from "settings" panels [40275](https://github.com/WordPress/gutenberg/pull/40275) ## General - [x] Make sure all screenshots are relevant to the latest version - [x] Make sure videos are up to date - [x] Add ALT tags for the images - [x] Make sure the headings are in sentence case - [x] Convert all reusable blocks to a ‘regular block’. - [x] Update the changelog at the end of the article
non_priority
file block article updating for display upload error notices using snackbars remove redundant block name from settings panels general make sure all screenshots are relevant to the latest version make sure videos are up to date add alt tags for the images make sure the headings are in sentence case convert all reusable blocks to a ‘regular block’ update the changelog at the end of the article
0
214,870
24,120,884,260
IssuesEvent
2022-09-20 18:35:46
bcgov/cloud-pathfinder
https://api.github.com/repos/bcgov/cloud-pathfinder
opened
Compile a list with the guardrails rules that limit/enable the workload accounts
Security Quality Assurance
**Describe the issue** There is not a guardrails list. The closest thing is a bunch of Service Control Policies that can be found at https://github.com/aws-samples/aws-secure-environment-accelerator/tree/main/reference-artifacts/SCPs **Additional context** The guardrails are a crucial characteristic of the ECF. They are tested and poked in several aspects (CSPM, scripts that detect any change in the rules/policies). The approach for which this ticket is required is to impersonate a user, and then poke the guardrails, to see which actions are allowed and which ones are not permitted. However, before doing this "poke" we need to have the list of actions. **Definition of done** A list (text document) of the actions that are allowed/denied, probably sorted by role
True
Compile a list with the guardrails rules that limit/enable the workload accounts - **Describe the issue** There is not a guardrails list. The closest thing is a bunch of Service Control Policies that can be found at https://github.com/aws-samples/aws-secure-environment-accelerator/tree/main/reference-artifacts/SCPs **Additional context** The guardrails are a crucial characteristic of the ECF. They are tested and poked in several aspects (CSPM, scripts that detect any change in the rules/policies). The approach for which this ticket is required is to impersonate a user, and then poke the guardrails, to see which actions are allowed and which ones are not permitted. However, before doing this "poke" we need to have the list of actions. **Definition of done** A list (text document) of the actions that are allowed/denied, probably sorted by role
non_priority
compile a list with the guardrails rules that limit enable the workload accounts describe the issue there is not a guardrails list the closest thing is a bunch of service control policies that can be found at additional context the guardrails are a crucial characteristic of the ecf they are tested and poked in several aspects cspm scripts that detect any change in the rules policies the approach for which this ticket is required is to impersonate a user and then poke the guardrails to see which actions are allowed and which ones are not permitted however before doing this poke we need to have the list of actions definition of done a list text document of the actions that are allowed denied probably sorted by role
0
304,994
23,093,672,158
IssuesEvent
2022-07-26 17:21:06
hashicorp/terraform-provider-aws
https://api.github.com/repos/hashicorp/terraform-provider-aws
closed
aws_appstream_stack.access_endpoints argument documentation missing
documentation service/appstream
<!--- Please note the following potential times when an issue might be in Terraform core: * [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues * [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues * [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues * [Registry](https://registry.terraform.io/) issues * Spans resources across multiple providers If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead. ---> <!--- Please keep this note for the community ---> ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment <!--- Thank you for keeping this note for the community ---> ### Affected Resource(s) <!--- Please list the affected resources and data sources. ---> * aws_appstream_stack `aws_appstream_stack` [documentation page](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appstream_stack) is missing documentation for the `access_endpoints` argument. ![image](https://user-images.githubusercontent.com/3211227/180496538-261f7e43-8a32-454a-98a2-8e970432c42b.png) https://github.com/hashicorp/terraform-provider-aws/blob/main/internal/service/appstream/stack.go#L38 https://github.com/hashicorp/terraform-provider-aws/blob/main/website/docs/r/appstream_stack.html.markdown
1.0
aws_appstream_stack.access_endpoints argument documentation missing - <!--- Please note the following potential times when an issue might be in Terraform core: * [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues * [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues * [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues * [Registry](https://registry.terraform.io/) issues * Spans resources across multiple providers If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead. ---> <!--- Please keep this note for the community ---> ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment <!--- Thank you for keeping this note for the community ---> ### Affected Resource(s) <!--- Please list the affected resources and data sources. ---> * aws_appstream_stack `aws_appstream_stack` [documentation page](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appstream_stack) is missing documentation for the `access_endpoints` argument. ![image](https://user-images.githubusercontent.com/3211227/180496538-261f7e43-8a32-454a-98a2-8e970432c42b.png) https://github.com/hashicorp/terraform-provider-aws/blob/main/internal/service/appstream/stack.go#L38 https://github.com/hashicorp/terraform-provider-aws/blob/main/website/docs/r/appstream_stack.html.markdown
non_priority
aws appstream stack access endpoints argument documentation missing please note the following potential times when an issue might be in terraform core or resource ordering issues and issues issues issues spans resources across multiple providers if you are running into one of these scenarios we recommend opening an issue in the instead community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or other comments that do not add relevant new information or questions they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment affected resource s aws appstream stack aws appstream stack is missing documentation for the access endpoints argument
0
296,507
9,116,750,599
IssuesEvent
2019-02-22 09:52:11
Xceptance/neodymium-library
https://api.github.com/repos/Xceptance/neodymium-library
closed
Update Cucumber to 4.x
Medium Priority doneInDevelop recheckedInDevelop update-dependency
Update Cucumber version to 3.x once the allure support >= version 2.8 is available. See the link for latest release: https://github.com/allure-framework/allure2/releases Remove "io.qameta.allure.cucumber2jvm.AllureCucumber2Jvm" if the update above is successful.
1.0
Update Cucumber to 4.x - Update Cucumber version to 3.x once the allure support >= version 2.8 is available. See the link for latest release: https://github.com/allure-framework/allure2/releases Remove "io.qameta.allure.cucumber2jvm.AllureCucumber2Jvm" if the update above is successful.
priority
update cucumber to x update cucumber version to x once the allure support version is available see the link for latest release remove io qameta allure if the update above is successful
1
97,504
11,015,028,284
IssuesEvent
2019-12-05 00:19:24
openenclave/openenclave
https://api.github.com/repos/openenclave/openenclave
closed
API docs are too hard to find
documentation triaged
Currently they're hidden in the obscure "Versions" link at openenclave.io There's nothing about docs, or APIs, or anything else that one would be looking for to find API docs. And the main GitHub/openenclave readme docs just point to openenclave.io.
1.0
API docs are too hard to find - Currently they're hidden in the obscure "Versions" link at openenclave.io There's nothing about docs, or APIs, or anything else that one would be looking for to find API docs. And the main GitHub/openenclave readme docs just point to openenclave.io.
non_priority
api docs are too hard to find currently they re hidden in the obscure versions link at openenclave io there s nothing about docs or apis or anything else that one would be looking for to find api docs and the main github openenclave readme docs just point to openenclave io
0
10,840
12,824,604,168
IssuesEvent
2020-07-06 13:44:33
pingcap/tidb
https://api.github.com/repos/pingcap/tidb
closed
ORM and application Support
status/TODO status/WIP type/compatibility
Python: - [ ] SQLAlchemy - [ ] Peewee - [ ] django - [ ] ponyorm Go: Orm: - [x] xorm: https://github.com/go-xorm/xorm - [x] beego: https://github.com/astaxie/beego/tree/master/orm - [x] go-sql-test: https://github.com/bradfitz/go-sql-test - [ ] upper.io: https://upper.io/db.v1/mysql Application: - [x] Gogs: https://github.com/gogits/gogs - [ ] Dalga: https://github.com/cenkalti/dalga Java: - [x] Mybatis - [ ] Jdbctemplate - [ ] Hibernate - [ ] Play PHP: - [ ] phabricator: http://phabricator.org/ - [x] phpmyadmin - [x] wordpress - [ ] yii: http://www.yiiframework.com/doc/guide/1.1/en/database.ar - [ ] discuz!: http://www.discuz.net/ - [ ] drupal: https://www.drupal.org/ - [ ] [Eloquent](https://laravel.com/docs/5.5/eloquent) Dotnet: - [ ] [Entity Framework Core](https://github.com/PomeloFoundation/Pomelo.EntityFrameworkCore.MySql)
True
ORM and application Support - Python: - [ ] SQLAlchemy - [ ] Peewee - [ ] django - [ ] ponyorm Go: Orm: - [x] xorm: https://github.com/go-xorm/xorm - [x] beego: https://github.com/astaxie/beego/tree/master/orm - [x] go-sql-test: https://github.com/bradfitz/go-sql-test - [ ] upper.io: https://upper.io/db.v1/mysql Application: - [x] Gogs: https://github.com/gogits/gogs - [ ] Dalga: https://github.com/cenkalti/dalga Java: - [x] Mybatis - [ ] Jdbctemplate - [ ] Hibernate - [ ] Play PHP: - [ ] phabricator: http://phabricator.org/ - [x] phpmyadmin - [x] wordpress - [ ] yii: http://www.yiiframework.com/doc/guide/1.1/en/database.ar - [ ] discuz!: http://www.discuz.net/ - [ ] drupal: https://www.drupal.org/ - [ ] [Eloquent](https://laravel.com/docs/5.5/eloquent) Dotnet: - [ ] [Entity Framework Core](https://github.com/PomeloFoundation/Pomelo.EntityFrameworkCore.MySql)
non_priority
orm and application support python sqlalchemy peewee django ponyorm go orm xorm beego go sql test upper io application gogs dalga java: mybatis jdbctemplate hibernate play php phabricator phpmyadmin wordpress yii discuz drupal dotnet
0
31,792
2,736,876,077
IssuesEvent
2015-04-19 21:03:51
x360ce/x360ce
https://api.github.com/repos/x360ce/x360ce
closed
llll
bug imported invalid Priority-Medium
_From [Crack.bi...@gmail.com](https://code.google.com/u/110974868023865476405/) on May 12, 2010 09:28:38_ What steps will reproduce the problem? 1. 2. 3. What is the expected output? What do you see instead? What version of the product are you using? On what operating system? What gamepad are you using? On what version of drivers? Please set third label to Core if issue affect emulator (dll file) or App if issue affect x360ce.App application (exe file). Also if you want you can provide any additional information below. _Original issue: http://code.google.com/p/x360ce/issues/detail?id=16_
1.0
llll - _From [Crack.bi...@gmail.com](https://code.google.com/u/110974868023865476405/) on May 12, 2010 09:28:38_ What steps will reproduce the problem? 1. 2. 3. What is the expected output? What do you see instead? What version of the product are you using? On what operating system? What gamepad are you using? On what version of drivers? Please set third label to Core if issue affect emulator (dll file) or App if issue affect x360ce.App application (exe file). Also if you want you can provide any additional information below. _Original issue: http://code.google.com/p/x360ce/issues/detail?id=16_
priority
llll from on may what steps will reproduce the problem what is the expected output what do you see instead what version of the product are you using on what operating system what gamepad are you using on what version of drivers please set third label to core if issue affect emulator dll file or app if issue affect app application exe file also if you want you can provide any additional information below original issue
1
670,977
22,716,469,887
IssuesEvent
2022-07-06 02:51:37
ansible-collections/azure
https://api.github.com/repos/ansible-collections/azure
closed
Couldn't find api version for Microsoft.DataFactory/factories?api-version=2018-06-01
medium_priority not a bug
- name: Check if Data Factory ({{ az_datafactory_name }}) already exists azure.azcollection.azure_rm_resource_info: auth_source: auto client_id: "{{ az_client_id }}" secret: "{{ az_secret }}" tenant: "{{ az_tenant_id }}" subscription_id: "{{ az_subscription_id }}" url: "https://management.azure.com/subscriptions/{{ az_subscription_id }}/resourceGroups/{{ az_resource_group_name }}/providers/Microsoft.DataFactory/factories?api-version=2018-06-01" register: az_datafactory Output: fatal: [localhost]: FAILED! => {"changed": false, "msg": "Couldn't find api version for Microsoft.DataFactory/factories?api-version=2018-06-01"}
1.0
Couldn't find api version for Microsoft.DataFactory/factories?api-version=2018-06-01 - - name: Check if Data Factory ({{ az_datafactory_name }}) already exists azure.azcollection.azure_rm_resource_info: auth_source: auto client_id: "{{ az_client_id }}" secret: "{{ az_secret }}" tenant: "{{ az_tenant_id }}" subscription_id: "{{ az_subscription_id }}" url: "https://management.azure.com/subscriptions/{{ az_subscription_id }}/resourceGroups/{{ az_resource_group_name }}/providers/Microsoft.DataFactory/factories?api-version=2018-06-01" register: az_datafactory Output: fatal: [localhost]: FAILED! => {"changed": false, "msg": "Couldn't find api version for Microsoft.DataFactory/factories?api-version=2018-06-01"}
priority
couldn t find api version for microsoft datafactory factories api version name check if data factory az datafactory name already exists azure azcollection azure rm resource info auth source auto client id az client id secret az secret tenant az tenant id subscription id az subscription id url az subscription id resourcegroups az resource group name providers microsoft datafactory factories api version register az datafactory output fatal failed changed false msg couldn t find api version for microsoft datafactory factories api version
1
1,935
4,763,886,581
IssuesEvent
2016-10-25 15:32:42
openvstorage/alba
https://api.github.com/repos/openvstorage/alba
closed
Claim osd looping and high cpu usage
process_wontfix SRP type_bug
## Problem description When I logged into my setup, I found that my root partition was completely full. The culprit was found in /var/log/upstart/alba-asd *. One of the asd logging was full of: ``` 2016-10-19 21:53:42 16108 +0200 - ovs-node1 - 9453/0 - alba/asd - 5366 - info - returning error (Asd_protocol.Protocol.Error.Assert_failed; "p\000\000\000\000n\000\000\000\000g\000\000\000\000\000\000\000\000 \000\000\000\022v\0119\127\220C\168\166\216\005 \228\210\175\242\021\217\143aG\232A\158\184.\146\164\240g=a\142\159\003\000\002\000\000\000\000\000\000\000") 2016-10-19 21:53:42 17439 +0200 - ovs-node1 - 9453/0 - alba/asd - 5367 - warning - Assertion failed, expected some but got None instead 2016-10-19 21:53:42 17473 +0200 - ovs-node1 - 9453/0 - alba/asd - 5368 - info - returning error (Asd_protocol.Protocol.Error.Assert_failed; "p\000\000\000\000n\000\000\000\000g\000\000\000\000\000\000\000\000 \000\000\000\022v\0119\127\220C\168\166\216\005 \228\210\175\242\021\217\143aG\232A\158\184.\146\164\240g=a\142\159\004\000\002\000\000\000\000\000\000\000") 2016-10-19 21:53:42 22216 +0200 - ovs-node1 - 9453/0 - alba/asd - 5369 - warning - Assertion failed, expected some but got None instead 2016-10-19 21:53:42 22241 +0200 - ovs-node1 - 9453/0 - alba/asd - 5370 - info - returning error (Asd_protocol.Protocol.Error.Assert_failed; ``` Every node within my cluster had an identical issue but the asd-id was different each time. After closer inspection I spotted the following: ``` alba 9333 39.7 0.3 459100 52200 ? Rsl Oct19 380:40 /usr/bin/alba asd-start --config arakoon://config/ovs/alba/asds/0Z1uxwBY2djSHiAdG5xG855bwCHhZKfO/config?ini=%2Fopt%2Fasd-manager%2Fconfig%2Farakoon_cacc.ini --log-sink console: ``` The asd process is taking up alot of cpu. The reason why is the claim-osd that is looping: ``` PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 14619 ovs 20 0 7718872 6.096g 2652 S 47.5 38.9 325:26.80 /usr/bin/alba claim-osd --config=arakoon://config/ovs/arakoon/mybackend-global-abm/config?ini=%2Fopt%2FOpenvStorage%2Fconfig%2Farakoon_cacc.ini --long-id=0ff56d57-930c-4a38-96a8-71da45cd7c3c --to-json 9333 alba 20 0 455944 50164 4876 R 43.2 0.3 384:15.83 /usr/bin/alba asd-start --config arakoon://config/ovs/alba/asds/0Z1uxwBY2djSHiAdG5xG855bwCHhZKfO/config?ini=%2Fopt%2Fasd-manager%2Fconfig%2Farakoon_cacc.ini --log-sink console: ``` When the claim-osd was killed, my cpu usage was back to normal.
1.0
Claim osd looping and high cpu usage - ## Problem description When I logged into my setup, I found that my root partition was completely full. The culprit was found in /var/log/upstart/alba-asd *. One of the asd logging was full of: ``` 2016-10-19 21:53:42 16108 +0200 - ovs-node1 - 9453/0 - alba/asd - 5366 - info - returning error (Asd_protocol.Protocol.Error.Assert_failed; "p\000\000\000\000n\000\000\000\000g\000\000\000\000\000\000\000\000 \000\000\000\022v\0119\127\220C\168\166\216\005 \228\210\175\242\021\217\143aG\232A\158\184.\146\164\240g=a\142\159\003\000\002\000\000\000\000\000\000\000") 2016-10-19 21:53:42 17439 +0200 - ovs-node1 - 9453/0 - alba/asd - 5367 - warning - Assertion failed, expected some but got None instead 2016-10-19 21:53:42 17473 +0200 - ovs-node1 - 9453/0 - alba/asd - 5368 - info - returning error (Asd_protocol.Protocol.Error.Assert_failed; "p\000\000\000\000n\000\000\000\000g\000\000\000\000\000\000\000\000 \000\000\000\022v\0119\127\220C\168\166\216\005 \228\210\175\242\021\217\143aG\232A\158\184.\146\164\240g=a\142\159\004\000\002\000\000\000\000\000\000\000") 2016-10-19 21:53:42 22216 +0200 - ovs-node1 - 9453/0 - alba/asd - 5369 - warning - Assertion failed, expected some but got None instead 2016-10-19 21:53:42 22241 +0200 - ovs-node1 - 9453/0 - alba/asd - 5370 - info - returning error (Asd_protocol.Protocol.Error.Assert_failed; ``` Every node within my cluster had an identical issue but the asd-id was different each time. After closer inspection I spotted the following: ``` alba 9333 39.7 0.3 459100 52200 ? Rsl Oct19 380:40 /usr/bin/alba asd-start --config arakoon://config/ovs/alba/asds/0Z1uxwBY2djSHiAdG5xG855bwCHhZKfO/config?ini=%2Fopt%2Fasd-manager%2Fconfig%2Farakoon_cacc.ini --log-sink console: ``` The asd process is taking up alot of cpu. The reason why is the claim-osd that is looping: ``` PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 14619 ovs 20 0 7718872 6.096g 2652 S 47.5 38.9 325:26.80 /usr/bin/alba claim-osd --config=arakoon://config/ovs/arakoon/mybackend-global-abm/config?ini=%2Fopt%2FOpenvStorage%2Fconfig%2Farakoon_cacc.ini --long-id=0ff56d57-930c-4a38-96a8-71da45cd7c3c --to-json 9333 alba 20 0 455944 50164 4876 R 43.2 0.3 384:15.83 /usr/bin/alba asd-start --config arakoon://config/ovs/alba/asds/0Z1uxwBY2djSHiAdG5xG855bwCHhZKfO/config?ini=%2Fopt%2Fasd-manager%2Fconfig%2Farakoon_cacc.ini --log-sink console: ``` When the claim-osd was killed, my cpu usage was back to normal.
non_priority
claim osd looping and high cpu usage problem description when i logged into my setup i found that my root partition was completely full the culprit was found in var log upstart alba asd one of the asd logging was full of ovs alba asd info returning error asd protocol protocol error assert failed p a ovs alba asd warning assertion failed expected some but got none instead ovs alba asd info returning error asd protocol protocol error assert failed p a ovs alba asd warning assertion failed expected some but got none instead ovs alba asd info returning error asd protocol protocol error assert failed every node within my cluster had an identical issue but the asd id was different each time after closer inspection i spotted the following alba rsl usr bin alba asd start config arakoon config ovs alba asds config ini manager cacc ini log sink console the asd process is taking up alot of cpu the reason why is the claim osd that is looping pid user pr ni virt res shr s cpu mem time command ovs s usr bin alba claim osd config arakoon config ovs arakoon mybackend global abm config ini cacc ini long id to json alba r usr bin alba asd start config arakoon config ovs alba asds config ini manager cacc ini log sink console when the claim osd was killed my cpu usage was back to normal
0
570,212
17,021,263,351
IssuesEvent
2021-07-02 19:32:49
phetsims/balloons-and-static-electricity
https://api.github.com/repos/phetsims/balloons-and-static-electricity
closed
The "Remove Wall" button is no longer visible on the wall
priority:2-high status:blocks-publication status:ready-for-review
While testing today, I noticed that the "Remove Wall" button seemed to be gone, but then I found I could navigate to it using the tab keys. Turns out that it is now behind the wall instead of in from of it. After a little detective work, I believe I've traced it to this commit: https://github.com/phetsims/joist/commit/17645a7ad98b2177524b9cc9e61b5d0a9660a82c. This was done by @jessegreenberg, so I'm going to assign it to him. In general, this change seems like it could have similar impacts on other sims, so I'd recommend having QA regression test all sims that are using `pdomControlAreaNode` and `pdomPlayAreaNode` if we decide to keep this change.
1.0
The "Remove Wall" button is no longer visible on the wall - While testing today, I noticed that the "Remove Wall" button seemed to be gone, but then I found I could navigate to it using the tab keys. Turns out that it is now behind the wall instead of in from of it. After a little detective work, I believe I've traced it to this commit: https://github.com/phetsims/joist/commit/17645a7ad98b2177524b9cc9e61b5d0a9660a82c. This was done by @jessegreenberg, so I'm going to assign it to him. In general, this change seems like it could have similar impacts on other sims, so I'd recommend having QA regression test all sims that are using `pdomControlAreaNode` and `pdomPlayAreaNode` if we decide to keep this change.
priority
the remove wall button is no longer visible on the wall while testing today i noticed that the remove wall button seemed to be gone but then i found i could navigate to it using the tab keys turns out that it is now behind the wall instead of in from of it after a little detective work i believe i ve traced it to this commit this was done by jessegreenberg so i m going to assign it to him in general this change seems like it could have similar impacts on other sims so i d recommend having qa regression test all sims that are using pdomcontrolareanode and pdomplayareanode if we decide to keep this change
1
676,349
23,123,448,944
IssuesEvent
2022-07-28 01:25:22
FEeasy404/GameUs
https://api.github.com/repos/FEeasy404/GameUs
closed
하단탭 화면 좁아질 경우 height가 높아짐
🐛bug 🌿Priority: Low ⚔Fix
## 버그 발생 설명 - 화면이 좁아질 경우 하단탭의 height가 높아져 페이지 하단 내용을 가립니다! - 게시물수정' 텍스트가 화면이 좁아져도 한줄로 유지되도록 하면 좋을것 같습니다! ![image](https://user-images.githubusercontent.com/68495264/181241976-fd359045-71f2-43c4-9c3b-99efd66a1661.png) ## 할 일 - [ ] 하단탭 height 수정 ## ETC
1.0
하단탭 화면 좁아질 경우 height가 높아짐 - ## 버그 발생 설명 - 화면이 좁아질 경우 하단탭의 height가 높아져 페이지 하단 내용을 가립니다! - 게시물수정' 텍스트가 화면이 좁아져도 한줄로 유지되도록 하면 좋을것 같습니다! ![image](https://user-images.githubusercontent.com/68495264/181241976-fd359045-71f2-43c4-9c3b-99efd66a1661.png) ## 할 일 - [ ] 하단탭 height 수정 ## ETC
priority
하단탭 화면 좁아질 경우 height가 높아짐 버그 발생 설명 화면이 좁아질 경우 하단탭의 height가 높아져 페이지 하단 내용을 가립니다 게시물수정 텍스트가 화면이 좁아져도 한줄로 유지되도록 하면 좋을것 같습니다 할 일 하단탭 height 수정 etc
1
177,122
13,684,353,727
IssuesEvent
2020-09-30 04:38:30
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
closed
LiveShare tests are crashing and causing build flakiness
Area-IDE Flaky Resolution-Not Applicable Test
Failing builds: - https://dev.azure.com/dnceng/public/_build/results/buildId=564945&view=artifacts&type=publishedArtifacts - https://dev.azure.com/dnceng/public/_build/results?buildId=563985&view=artifacts&type=publishedArtifacts The crash appears to occur on xunit shutdown. The actual log file for the tests indicates that everything succeeded. But xunit is exiting with a failure code and no output.
1.0
LiveShare tests are crashing and causing build flakiness - Failing builds: - https://dev.azure.com/dnceng/public/_build/results/buildId=564945&view=artifacts&type=publishedArtifacts - https://dev.azure.com/dnceng/public/_build/results?buildId=563985&view=artifacts&type=publishedArtifacts The crash appears to occur on xunit shutdown. The actual log file for the tests indicates that everything succeeded. But xunit is exiting with a failure code and no output.
non_priority
liveshare tests are crashing and causing build flakiness failing builds the crash appears to occur on xunit shutdown the actual log file for the tests indicates that everything succeeded but xunit is exiting with a failure code and no output
0
590,482
17,778,740,706
IssuesEvent
2021-08-30 23:31:53
dtcenter/MET
https://api.github.com/repos/dtcenter/MET
closed
Enhance MET to compute the CBS score.
type: new feature priority: blocker requestor: DTC/AF V&V required: FOR DEVELOPMENT RELEASE
## Describe the New Feature ## The AF project needs to generate the CBS score on its GPP verification. This requires adding another method of interpolation (areal). Michelle Harrold has provided some code (from Bob Craig) and helpful references (see attachments). From Bob: "All, the attached document describes the CBS verification process , I.7-36 Table F. The verification is done over a 1.5 degree remap of the model using an area averaging technique. The ground truth is the model analysis. I have attached the program we use to average the data. The index based on the CBS score is from UKMO. I attached the program that calculates it along with the configuration files." I have attached the WMO document with I.7-36 Table F as well as the the areal weighting IDL script (around line 251 is the weighting code) and the CBS score python program. Also, the areal weighting script references a paper, which might have some helpful background: https://www.wmo.int/pages/prog/www/BAS/documents/AnnexDoc3-3.pdf The work for this issue may include supporting a new interpolation method, computing the CBS score, and writing its output somewhere. Recommend coordinating with @michelleharrold since she's likely familiar with the details. ### Acceptance Testing ### *List input data types and sources.* *Describe tests required for new functionality.* ### Time Estimate ### *Estimate the amount of work required here.* *Issues should represent approximately 1 to 3 days of work.* ### Sub-Issues ### Consider breaking the new feature down into sub-issues. - [ ] *Add a checkbox for each sub-issue here.* ### Relevant Deadlines ### *List relevant project deadlines here or state NONE.* ### Funding Source ### *Define the source of funding and account keys here or state NONE.* ## Define the Metadata ## ### Assignee ### - [x] Select **engineer(s)** or **no engineer** required: John HG - [ ] Select **scientist(s)** or **no scientist** required: unknown ### Labels ### - [x] Select **component(s)** - [x] Select **priority** - [x] Select **requestor(s)** ### Projects and Milestone ### - [x] Review **projects** and select relevant **Repository** and **Organization** ones or add "alert:NEED PROJECT ASSIGNMENT" label - [x] Select **milestone** to next major version milestone or "Future Versions" ## Define Related Issue(s) ## Consider the impact to the other METplus components. - [ ] [METplus](https://github.com/dtcenter/METplus/issues/new/choose), [MET](https://github.com/dtcenter/MET/issues/new/choose), [METdatadb](https://github.com/dtcenter/METdatadb/issues/new/choose), [METviewer](https://github.com/dtcenter/METviewer/issues/new/choose), [METexpress](https://github.com/dtcenter/METexpress/issues/new/choose), [METcalcpy](https://github.com/dtcenter/METcalcpy/issues/new/choose), [METplotpy](https://github.com/dtcenter/METplotpy/issues/new/choose) Depending on the changes to the output, may need an issue for METviewer to handle new output. May also need a METplus issue if new configuration file options are added. ## New Feature Checklist ## See the [METplus Workflow](https://dtcenter.github.io/METplus/Contributors_Guide/github_workflow.html) for details. - [x] Complete the issue definition above, including the **Time Estimate** and **Funding source**. - [x] Fork this repository or create a branch of **develop**. Branch name: `feature_<Issue Number>_<Description>` - [ ] Complete the development and test your changes. - [x] Add/update log messages for easier debugging. - [x] Add/update unit tests. - [x] Add/update documentation. - [x] Push local changes to GitHub. - [x] Submit a pull request to merge into **develop**. Pull request: `feature <Issue Number> <Description>` - [x] Define the pull request metadata, as permissions allow. Select: **Reviewer(s)**, **Project(s)**, **Milestone**, and **Linked issues** - [x] Iterate until the reviewer(s) accept and merge your changes. - [x] Delete your fork or branch. - [x] Close this issue.
1.0
Enhance MET to compute the CBS score. - ## Describe the New Feature ## The AF project needs to generate the CBS score on its GPP verification. This requires adding another method of interpolation (areal). Michelle Harrold has provided some code (from Bob Craig) and helpful references (see attachments). From Bob: "All, the attached document describes the CBS verification process , I.7-36 Table F. The verification is done over a 1.5 degree remap of the model using an area averaging technique. The ground truth is the model analysis. I have attached the program we use to average the data. The index based on the CBS score is from UKMO. I attached the program that calculates it along with the configuration files." I have attached the WMO document with I.7-36 Table F as well as the the areal weighting IDL script (around line 251 is the weighting code) and the CBS score python program. Also, the areal weighting script references a paper, which might have some helpful background: https://www.wmo.int/pages/prog/www/BAS/documents/AnnexDoc3-3.pdf The work for this issue may include supporting a new interpolation method, computing the CBS score, and writing its output somewhere. Recommend coordinating with @michelleharrold since she's likely familiar with the details. ### Acceptance Testing ### *List input data types and sources.* *Describe tests required for new functionality.* ### Time Estimate ### *Estimate the amount of work required here.* *Issues should represent approximately 1 to 3 days of work.* ### Sub-Issues ### Consider breaking the new feature down into sub-issues. - [ ] *Add a checkbox for each sub-issue here.* ### Relevant Deadlines ### *List relevant project deadlines here or state NONE.* ### Funding Source ### *Define the source of funding and account keys here or state NONE.* ## Define the Metadata ## ### Assignee ### - [x] Select **engineer(s)** or **no engineer** required: John HG - [ ] Select **scientist(s)** or **no scientist** required: unknown ### Labels ### - [x] Select **component(s)** - [x] Select **priority** - [x] Select **requestor(s)** ### Projects and Milestone ### - [x] Review **projects** and select relevant **Repository** and **Organization** ones or add "alert:NEED PROJECT ASSIGNMENT" label - [x] Select **milestone** to next major version milestone or "Future Versions" ## Define Related Issue(s) ## Consider the impact to the other METplus components. - [ ] [METplus](https://github.com/dtcenter/METplus/issues/new/choose), [MET](https://github.com/dtcenter/MET/issues/new/choose), [METdatadb](https://github.com/dtcenter/METdatadb/issues/new/choose), [METviewer](https://github.com/dtcenter/METviewer/issues/new/choose), [METexpress](https://github.com/dtcenter/METexpress/issues/new/choose), [METcalcpy](https://github.com/dtcenter/METcalcpy/issues/new/choose), [METplotpy](https://github.com/dtcenter/METplotpy/issues/new/choose) Depending on the changes to the output, may need an issue for METviewer to handle new output. May also need a METplus issue if new configuration file options are added. ## New Feature Checklist ## See the [METplus Workflow](https://dtcenter.github.io/METplus/Contributors_Guide/github_workflow.html) for details. - [x] Complete the issue definition above, including the **Time Estimate** and **Funding source**. - [x] Fork this repository or create a branch of **develop**. Branch name: `feature_<Issue Number>_<Description>` - [ ] Complete the development and test your changes. - [x] Add/update log messages for easier debugging. - [x] Add/update unit tests. - [x] Add/update documentation. - [x] Push local changes to GitHub. - [x] Submit a pull request to merge into **develop**. Pull request: `feature <Issue Number> <Description>` - [x] Define the pull request metadata, as permissions allow. Select: **Reviewer(s)**, **Project(s)**, **Milestone**, and **Linked issues** - [x] Iterate until the reviewer(s) accept and merge your changes. - [x] Delete your fork or branch. - [x] Close this issue.
priority
enhance met to compute the cbs score describe the new feature the af project needs to generate the cbs score on its gpp verification this requires adding another method of interpolation areal michelle harrold has provided some code from bob craig and helpful references see attachments from bob all the attached document describes the cbs verification process i table f the verification is done over a degree remap of the model using an area averaging technique the ground truth is the model analysis i have attached the program we use to average the data the index based on the cbs score is from ukmo i attached the program that calculates it along with the configuration files i have attached the wmo document with i table f as well as the the areal weighting idl script around line is the weighting code and the cbs score python program also the areal weighting script references a paper which might have some helpful background the work for this issue may include supporting a new interpolation method computing the cbs score and writing its output somewhere recommend coordinating with michelleharrold since she s likely familiar with the details acceptance testing list input data types and sources describe tests required for new functionality time estimate estimate the amount of work required here issues should represent approximately to days of work sub issues consider breaking the new feature down into sub issues add a checkbox for each sub issue here relevant deadlines list relevant project deadlines here or state none funding source define the source of funding and account keys here or state none define the metadata assignee select engineer s or no engineer required john hg select scientist s or no scientist required unknown labels select component s select priority select requestor s projects and milestone review projects and select relevant repository and organization ones or add alert need project assignment label select milestone to next major version milestone or future versions define related issue s consider the impact to the other metplus components depending on the changes to the output may need an issue for metviewer to handle new output may also need a metplus issue if new configuration file options are added new feature checklist see the for details complete the issue definition above including the time estimate and funding source fork this repository or create a branch of develop branch name feature complete the development and test your changes add update log messages for easier debugging add update unit tests add update documentation push local changes to github submit a pull request to merge into develop pull request feature define the pull request metadata as permissions allow select reviewer s project s milestone and linked issues iterate until the reviewer s accept and merge your changes delete your fork or branch close this issue
1
215,104
7,290,309,613
IssuesEvent
2018-02-24 00:54:30
PikyCZ/NovaMobsX
https://api.github.com/repos/PikyCZ/NovaMobsX
closed
Know Issues
[Priority] High [Status] Work in Progress help wanted
**Autospawn** - [ ] Fix autospawn - [x] disable worlds **Entities** - [ ] spider attacking - [x] target option for passive entities
1.0
Know Issues - **Autospawn** - [ ] Fix autospawn - [x] disable worlds **Entities** - [ ] spider attacking - [x] target option for passive entities
priority
know issues autospawn fix autospawn disable worlds entities spider attacking target option for passive entities
1
248,047
18,858,025,709
IssuesEvent
2021-11-12 09:18:05
IshaaanVyas/pe
https://api.github.com/repos/IshaaanVyas/pe
opened
Very complicated class diagram
type.DocumentationBug severity.Medium
![image.png](https://raw.githubusercontent.com/IshaaanVyas/pe/main/files/8f64512c-423a-4bc7-8669-f2cb35438bec.png) Could have made it much simpler and easier to understand by removing methods/attributes that were not necessary to the understanding of the class diagram. (Pretty sure all the print methods are not necessary to understand the relationship between the classes). <!--session: 1636703251302-c5bade30-d168-4126-8d73-77e1ed078f98--> <!--Version: Web v3.4.1-->
1.0
Very complicated class diagram - ![image.png](https://raw.githubusercontent.com/IshaaanVyas/pe/main/files/8f64512c-423a-4bc7-8669-f2cb35438bec.png) Could have made it much simpler and easier to understand by removing methods/attributes that were not necessary to the understanding of the class diagram. (Pretty sure all the print methods are not necessary to understand the relationship between the classes). <!--session: 1636703251302-c5bade30-d168-4126-8d73-77e1ed078f98--> <!--Version: Web v3.4.1-->
non_priority
very complicated class diagram could have made it much simpler and easier to understand by removing methods attributes that were not necessary to the understanding of the class diagram pretty sure all the print methods are not necessary to understand the relationship between the classes
0
391,337
11,572,219,084
IssuesEvent
2020-02-20 23:24:54
googleapis/python-monitoring
https://api.github.com/repos/googleapis/python-monitoring
closed
Synthesis failed for python-monitoring
api: monitoring autosynth failure priority: p1 type: bug
Hello! Autosynth couldn't regenerate python-monitoring. :broken_heart: Here's the output from running `synth.py`: ``` Cloning into 'working_repo'... Switched to branch 'autosynth' Running synthtool ['/tmpfs/src/git/autosynth/env/bin/python3', '-m', 'synthtool', 'synth.py', '--'] synthtool > Executing /tmpfs/src/git/autosynth/working_repo/synth.py. On branch autosynth nothing to commit, working tree clean HEAD detached at FETCH_HEAD nothing to commit, working tree clean synthtool > Ensuring dependencies. synthtool > Pulling artman image. latest: Pulling from googleapis/artman Digest: sha256:6aec9c34db0e4be221cdaf6faba27bdc07cfea846808b3d3b964dfce3a9a0f9b Status: Image is up to date for googleapis/artman:latest synthtool > Cloning googleapis. synthtool > Running generator for google/monitoring/artman_monitoring.yaml. synthtool > Generated code into /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3. synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/group_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/group_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/metric.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/metric.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/alert_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/alert_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/dropped_labels.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/dropped_labels.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/group.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/group.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/common.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/common.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/notification.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/notification.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/metric_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/metric_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/service_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/service_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/alert.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/alert.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/uptime_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/uptime_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/mutation_record.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/mutation_record.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/uptime.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/uptime.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/span_context.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/span_context.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/notification_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/notification_service.proto synthtool > Placed proto files into /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/metric_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/group_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/alert_policy_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/service_monitoring_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/notification_channel_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/uptime_check_service_client.py. synthtool > Replaced '(^.*$\\n)*' in google/cloud/monitoring_v3/proto/common_pb2.py. synthtool > No replacements made in google/cloud/monitoring_v3/gapic/alert_policy_service_client.py for pattern then a new `\[CONDITION_ID\]` is created. , maybe replacement is not longer needed? synthtool > Replaced ' ::\n\n' in google/cloud/monitoring_v3/gapic/alert_policy_service_client.py. synthtool > No replacements made in google/cloud/monitoring_v3/proto/metric_service_pb2.py for pattern ^(\s+)have an ``id`` label: :: resource.type = .*, maybe replacement is not longer needed? synthtool > Replaced 'from google.cloud.monitoring_v3.gapic import notification_channel_service_client\n' in google/cloud/monitoring_v3/__init__.py. synthtool > Replaced 'notification_channel_service_client.NotificationChannelServiceClient' in google/cloud/monitoring_v3/__init__.py. .coveragerc .flake8 .github/CONTRIBUTING.md .github/ISSUE_TEMPLATE/bug_report.md .github/ISSUE_TEMPLATE/feature_request.md .github/ISSUE_TEMPLATE/support_request.md .github/PULL_REQUEST_TEMPLATE.md .github/release-please.yml .gitignore .kokoro/build.sh .kokoro/continuous/common.cfg .kokoro/continuous/continuous.cfg .kokoro/docs/common.cfg .kokoro/docs/docs.cfg .kokoro/presubmit/common.cfg .kokoro/presubmit/presubmit.cfg .kokoro/publish-docs.sh .kokoro/release.sh .kokoro/release/common.cfg .kokoro/release/release.cfg .kokoro/trampoline.sh CODE_OF_CONDUCT.md CONTRIBUTING.rst LICENSE MANIFEST.in docs/_static/custom.css docs/_templates/layout.html docs/conf.py.j2 noxfile.py.j2 renovate.json setup.cfg Running session blacken Creating virtual environment (virtualenv) using python3.6 in .nox/blacken pip install black==19.3b0 Error: pip is not installed into the virtualenv, it is located at /tmpfs/src/git/autosynth/env/bin/pip. Pass external=True into run() to explicitly allow this. Session blacken failed. synthtool > Failed executing nox -s blacken: None synthtool > Wrote metadata to synth.metadata. Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/synthtool/__main__.py", line 102, in <module> main() File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/click/core.py", line 764, in __call__ return self.main(*args, **kwargs) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/click/core.py", line 717, in main rv = self.invoke(ctx) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/click/core.py", line 956, in invoke return ctx.invoke(self.callback, **ctx.params) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/click/core.py", line 555, in invoke return callback(*args, **kwargs) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/synthtool/__main__.py", line 94, in main spec.loader.exec_module(synth_module) # type: ignore File "<frozen importlib._bootstrap_external>", line 678, in exec_module File "<frozen importlib._bootstrap>", line 205, in _call_with_frames_removed File "/tmpfs/src/git/autosynth/working_repo/synth.py", line 99, in <module> s.shell.run(["nox", "-s", "blacken"], hide_output=False) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/synthtool/shell.py", line 39, in run raise exc File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/synthtool/shell.py", line 33, in run encoding="utf-8", File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/subprocess.py", line 418, in run output=stdout, stderr=stderr) subprocess.CalledProcessError: Command '['nox', '-s', 'blacken']' returned non-zero exit status 1. Synthesis failed ``` Google internal developers can see the full log [here](https://sponge/bc296324-7867-4eae-a113-8090e6bcc834).
1.0
Synthesis failed for python-monitoring - Hello! Autosynth couldn't regenerate python-monitoring. :broken_heart: Here's the output from running `synth.py`: ``` Cloning into 'working_repo'... Switched to branch 'autosynth' Running synthtool ['/tmpfs/src/git/autosynth/env/bin/python3', '-m', 'synthtool', 'synth.py', '--'] synthtool > Executing /tmpfs/src/git/autosynth/working_repo/synth.py. On branch autosynth nothing to commit, working tree clean HEAD detached at FETCH_HEAD nothing to commit, working tree clean synthtool > Ensuring dependencies. synthtool > Pulling artman image. latest: Pulling from googleapis/artman Digest: sha256:6aec9c34db0e4be221cdaf6faba27bdc07cfea846808b3d3b964dfce3a9a0f9b Status: Image is up to date for googleapis/artman:latest synthtool > Cloning googleapis. synthtool > Running generator for google/monitoring/artman_monitoring.yaml. synthtool > Generated code into /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3. synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/group_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/group_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/metric.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/metric.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/alert_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/alert_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/dropped_labels.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/dropped_labels.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/group.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/group.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/common.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/common.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/notification.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/notification.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/metric_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/metric_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/service_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/service_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/alert.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/alert.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/uptime_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/uptime_service.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/mutation_record.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/mutation_record.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/uptime.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/uptime.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/span_context.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/span_context.proto synthtool > Copy: /home/kbuilder/.cache/synthtool/googleapis/google/monitoring/v3/notification_service.proto to /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto/notification_service.proto synthtool > Placed proto files into /home/kbuilder/.cache/synthtool/googleapis/artman-genfiles/python/monitoring-v3/google/cloud/monitoring_v3/proto. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/metric_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/group_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/alert_policy_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/service_monitoring_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/notification_channel_service_client.py. synthtool > Replaced 'def .*\\(([^\\)]+)\n.*metadata=None\\):\n\\s+"""(.*\n)*?\\s+"""\n' in google/cloud/monitoring_v3/gapic/uptime_check_service_client.py. synthtool > Replaced '(^.*$\\n)*' in google/cloud/monitoring_v3/proto/common_pb2.py. synthtool > No replacements made in google/cloud/monitoring_v3/gapic/alert_policy_service_client.py for pattern then a new `\[CONDITION_ID\]` is created. , maybe replacement is not longer needed? synthtool > Replaced ' ::\n\n' in google/cloud/monitoring_v3/gapic/alert_policy_service_client.py. synthtool > No replacements made in google/cloud/monitoring_v3/proto/metric_service_pb2.py for pattern ^(\s+)have an ``id`` label: :: resource.type = .*, maybe replacement is not longer needed? synthtool > Replaced 'from google.cloud.monitoring_v3.gapic import notification_channel_service_client\n' in google/cloud/monitoring_v3/__init__.py. synthtool > Replaced 'notification_channel_service_client.NotificationChannelServiceClient' in google/cloud/monitoring_v3/__init__.py. .coveragerc .flake8 .github/CONTRIBUTING.md .github/ISSUE_TEMPLATE/bug_report.md .github/ISSUE_TEMPLATE/feature_request.md .github/ISSUE_TEMPLATE/support_request.md .github/PULL_REQUEST_TEMPLATE.md .github/release-please.yml .gitignore .kokoro/build.sh .kokoro/continuous/common.cfg .kokoro/continuous/continuous.cfg .kokoro/docs/common.cfg .kokoro/docs/docs.cfg .kokoro/presubmit/common.cfg .kokoro/presubmit/presubmit.cfg .kokoro/publish-docs.sh .kokoro/release.sh .kokoro/release/common.cfg .kokoro/release/release.cfg .kokoro/trampoline.sh CODE_OF_CONDUCT.md CONTRIBUTING.rst LICENSE MANIFEST.in docs/_static/custom.css docs/_templates/layout.html docs/conf.py.j2 noxfile.py.j2 renovate.json setup.cfg Running session blacken Creating virtual environment (virtualenv) using python3.6 in .nox/blacken pip install black==19.3b0 Error: pip is not installed into the virtualenv, it is located at /tmpfs/src/git/autosynth/env/bin/pip. Pass external=True into run() to explicitly allow this. Session blacken failed. synthtool > Failed executing nox -s blacken: None synthtool > Wrote metadata to synth.metadata. Traceback (most recent call last): File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/runpy.py", line 193, in _run_module_as_main "__main__", mod_spec) File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/runpy.py", line 85, in _run_code exec(code, run_globals) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/synthtool/__main__.py", line 102, in <module> main() File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/click/core.py", line 764, in __call__ return self.main(*args, **kwargs) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/click/core.py", line 717, in main rv = self.invoke(ctx) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/click/core.py", line 956, in invoke return ctx.invoke(self.callback, **ctx.params) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/click/core.py", line 555, in invoke return callback(*args, **kwargs) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/synthtool/__main__.py", line 94, in main spec.loader.exec_module(synth_module) # type: ignore File "<frozen importlib._bootstrap_external>", line 678, in exec_module File "<frozen importlib._bootstrap>", line 205, in _call_with_frames_removed File "/tmpfs/src/git/autosynth/working_repo/synth.py", line 99, in <module> s.shell.run(["nox", "-s", "blacken"], hide_output=False) File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/synthtool/shell.py", line 39, in run raise exc File "/tmpfs/src/git/autosynth/env/lib/python3.6/site-packages/synthtool/shell.py", line 33, in run encoding="utf-8", File "/home/kbuilder/.pyenv/versions/3.6.1/lib/python3.6/subprocess.py", line 418, in run output=stdout, stderr=stderr) subprocess.CalledProcessError: Command '['nox', '-s', 'blacken']' returned non-zero exit status 1. Synthesis failed ``` Google internal developers can see the full log [here](https://sponge/bc296324-7867-4eae-a113-8090e6bcc834).
priority
synthesis failed for python monitoring hello autosynth couldn t regenerate python monitoring broken heart here s the output from running synth py cloning into working repo switched to branch autosynth running synthtool synthtool executing tmpfs src git autosynth working repo synth py on branch autosynth nothing to commit working tree clean head detached at fetch head nothing to commit working tree clean synthtool ensuring dependencies synthtool pulling artman image latest pulling from googleapis artman digest status image is up to date for googleapis artman latest synthtool cloning googleapis synthtool running generator for google monitoring artman monitoring yaml synthtool generated code into home kbuilder cache synthtool googleapis artman genfiles python monitoring synthtool copy home kbuilder cache synthtool googleapis google monitoring group service proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto group service proto synthtool copy home kbuilder cache synthtool googleapis google monitoring metric proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto metric proto synthtool copy home kbuilder cache synthtool googleapis google monitoring alert service proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto alert service proto synthtool copy home kbuilder cache synthtool googleapis google monitoring dropped labels proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto dropped labels proto synthtool copy home kbuilder cache synthtool googleapis google monitoring group proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto group proto synthtool copy home kbuilder cache synthtool googleapis google monitoring common proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto common proto synthtool copy home kbuilder cache synthtool googleapis google monitoring notification proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto notification proto synthtool copy home kbuilder cache synthtool googleapis google monitoring metric service proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto metric service proto synthtool copy home kbuilder cache synthtool googleapis google monitoring service proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto service proto synthtool copy home kbuilder cache synthtool googleapis google monitoring service service proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto service service proto synthtool copy home kbuilder cache synthtool googleapis google monitoring alert proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto alert proto synthtool copy home kbuilder cache synthtool googleapis google monitoring uptime service proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto uptime service proto synthtool copy home kbuilder cache synthtool googleapis google monitoring mutation record proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto mutation record proto synthtool copy home kbuilder cache synthtool googleapis google monitoring uptime proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto uptime proto synthtool copy home kbuilder cache synthtool googleapis google monitoring span context proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto span context proto synthtool copy home kbuilder cache synthtool googleapis google monitoring notification service proto to home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto notification service proto synthtool placed proto files into home kbuilder cache synthtool googleapis artman genfiles python monitoring google cloud monitoring proto synthtool replaced def n metadata none n s n s n in google cloud monitoring gapic metric service client py synthtool replaced def n metadata none n s n s n in google cloud monitoring gapic group service client py synthtool replaced def n metadata none n s n s n in google cloud monitoring gapic alert policy service client py synthtool replaced def n metadata none n s n s n in google cloud monitoring gapic service monitoring service client py synthtool replaced def n metadata none n s n s n in google cloud monitoring gapic notification channel service client py synthtool replaced def n metadata none n s n s n in google cloud monitoring gapic uptime check service client py synthtool replaced n in google cloud monitoring proto common py synthtool no replacements made in google cloud monitoring gapic alert policy service client py for pattern then a new is created maybe replacement is not longer needed synthtool replaced n n in google cloud monitoring gapic alert policy service client py synthtool no replacements made in google cloud monitoring proto metric service py for pattern s have an id label resource type maybe replacement is not longer needed synthtool replaced from google cloud monitoring gapic import notification channel service client n in google cloud monitoring init py synthtool replaced notification channel service client notificationchannelserviceclient in google cloud monitoring init py coveragerc github contributing md github issue template bug report md github issue template feature request md github issue template support request md github pull request template md github release please yml gitignore kokoro build sh kokoro continuous common cfg kokoro continuous continuous cfg kokoro docs common cfg kokoro docs docs cfg kokoro presubmit common cfg kokoro presubmit presubmit cfg kokoro publish docs sh kokoro release sh kokoro release common cfg kokoro release release cfg kokoro trampoline sh code of conduct md contributing rst license manifest in docs static custom css docs templates layout html docs conf py noxfile py renovate json setup cfg running session blacken creating virtual environment virtualenv using in nox blacken pip install black error pip is not installed into the virtualenv it is located at tmpfs src git autosynth env bin pip pass external true into run to explicitly allow this session blacken failed synthtool failed executing nox s blacken none synthtool wrote metadata to synth metadata traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src git autosynth env lib site packages synthtool main py line in main file tmpfs src git autosynth env lib site packages click core py line in call return self main args kwargs file tmpfs src git autosynth env lib site packages click core py line in main rv self invoke ctx file tmpfs src git autosynth env lib site packages click core py line in invoke return ctx invoke self callback ctx params file tmpfs src git autosynth env lib site packages click core py line in invoke return callback args kwargs file tmpfs src git autosynth env lib site packages synthtool main py line in main spec loader exec module synth module type ignore file line in exec module file line in call with frames removed file tmpfs src git autosynth working repo synth py line in s shell run hide output false file tmpfs src git autosynth env lib site packages synthtool shell py line in run raise exc file tmpfs src git autosynth env lib site packages synthtool shell py line in run encoding utf file home kbuilder pyenv versions lib subprocess py line in run output stdout stderr stderr subprocess calledprocesserror command returned non zero exit status synthesis failed google internal developers can see the full log
1
236,532
7,750,081,821
IssuesEvent
2018-05-30 13:28:37
ld4l-labs/vitrolib
https://api.github.com/repos/ld4l-labs/vitrolib
opened
Add accession number to custodial event
ARM custom forms priority: medium
Currently linked only to Item. Complexities in adding to custodial event: select list should display all accession numbers linked to the item and not linked to another custodial event; otherwise create new. For now we are linking the accession number only to the item using bf:identifies.
1.0
Add accession number to custodial event - Currently linked only to Item. Complexities in adding to custodial event: select list should display all accession numbers linked to the item and not linked to another custodial event; otherwise create new. For now we are linking the accession number only to the item using bf:identifies.
priority
add accession number to custodial event currently linked only to item complexities in adding to custodial event select list should display all accession numbers linked to the item and not linked to another custodial event otherwise create new for now we are linking the accession number only to the item using bf identifies
1
25,938
19,476,131,918
IssuesEvent
2021-12-24 12:44:06
IBM-Cloud/terraform-provider-ibm
https://api.github.com/repos/IBM-Cloud/terraform-provider-ibm
closed
Destroy of ibm_is_instance_group.instance_group fails with provisioning_status must be active to delete instance group
service/VPC Infrastructure
### Terraform Version - IBM Cloud Provider version 1.16.1 - Terraform v0.12.29 ### Affected Resource(s) - ibm_is_instance_group.instance_group ### Terraform Configuration Files See https://github.com/IBM-Cloud/vpc-tutorials/tree/master/vpc-autoscale ### Expected Behavior Destroy completes succesfully ### Actual Behavior Destroy fails with ``` Error: Error Deleting the InstanceGroup: Load Balancer r006-c66bd695-f88b-4c7d-a4a5-ed69637d021b provisioning_status must be active to delete instance group { "StatusCode": 409, "Headers": { ..., "X-Request-Id": [ "9bc944a6-9297-448c-97e1-742c0d1856da" ], "X-Xss-Protection": [ "1; mode=block" ] }, "Result": { "errors": [ { "code": "conflict_field", "message": "Load Balancer r006-c66bd695-f88b-4c7d-a4a5-ed69637d021b provisioning_status must be active to delete instance group", "target": { "name": "load_balancer", "type": "load_balancer" } } ], "trace": "9bc944a6-9297-448c-97e1-742c0d1856da" }, "RawResult": null } ``` ### Steps to Reproduce Please list the steps required to reproduce the issue, for example: 1. `terraform apply` 1. `terraform destroy` ### Important Factoids The same template used to work with IBM Cloud Provider version 1.13.1. Maybe the provider code has changed, or the backend API did.
1.0
Destroy of ibm_is_instance_group.instance_group fails with provisioning_status must be active to delete instance group - ### Terraform Version - IBM Cloud Provider version 1.16.1 - Terraform v0.12.29 ### Affected Resource(s) - ibm_is_instance_group.instance_group ### Terraform Configuration Files See https://github.com/IBM-Cloud/vpc-tutorials/tree/master/vpc-autoscale ### Expected Behavior Destroy completes succesfully ### Actual Behavior Destroy fails with ``` Error: Error Deleting the InstanceGroup: Load Balancer r006-c66bd695-f88b-4c7d-a4a5-ed69637d021b provisioning_status must be active to delete instance group { "StatusCode": 409, "Headers": { ..., "X-Request-Id": [ "9bc944a6-9297-448c-97e1-742c0d1856da" ], "X-Xss-Protection": [ "1; mode=block" ] }, "Result": { "errors": [ { "code": "conflict_field", "message": "Load Balancer r006-c66bd695-f88b-4c7d-a4a5-ed69637d021b provisioning_status must be active to delete instance group", "target": { "name": "load_balancer", "type": "load_balancer" } } ], "trace": "9bc944a6-9297-448c-97e1-742c0d1856da" }, "RawResult": null } ``` ### Steps to Reproduce Please list the steps required to reproduce the issue, for example: 1. `terraform apply` 1. `terraform destroy` ### Important Factoids The same template used to work with IBM Cloud Provider version 1.13.1. Maybe the provider code has changed, or the backend API did.
non_priority
destroy of ibm is instance group instance group fails with provisioning status must be active to delete instance group terraform version ibm cloud provider version terraform affected resource s ibm is instance group instance group terraform configuration files see expected behavior destroy completes succesfully actual behavior destroy fails with error error deleting the instancegroup load balancer provisioning status must be active to delete instance group statuscode headers x request id x xss protection mode block result errors code conflict field message load balancer provisioning status must be active to delete instance group target name load balancer type load balancer trace rawresult null steps to reproduce please list the steps required to reproduce the issue for example terraform apply terraform destroy important factoids the same template used to work with ibm cloud provider version maybe the provider code has changed or the backend api did
0
53,300
13,151,780,904
IssuesEvent
2020-08-09 18:31:51
xamarin/xamarin-android
https://api.github.com/repos/xamarin/xamarin-android
closed
Unable to build Xamarin Android application after upgrading to VS 16.7 Release - getting error CS8370
Area: App+Library Build
### Steps to Reproduce 1. Open a project containing some C# 8.0 code & which was compiling fine with 16.6, then build it in "Debug" mode 2. Note that updating the tag langversion to "latest" in .csproj does not solve the issue ### Expected Behavior Build should complete without errors. ### Actual Behavior Getting messages CS8370 on C# 8.0 constructs saying that C# language version should be 8.0. Compiler is using C# 7.3. ### Version Information Microsoft Visual Studio Community 2019 Version 16.7.0 VisualStudio.16.Release/16.7.0+30330.147 Microsoft .NET Framework Version 4.8.04084 Version installée : Community ASP.NET and Web Tools 2019 16.7.532.28833 ASP.NET and Web Tools 2019 ASP.NET Core Razor Language Services 16.1.0.2035807+72d099b977d3a85e65fa3b0614ca8cfc803fef02 Provides languages services for ASP.NET Core Razor. ASP.NET Web Frameworks and Tools 2019 16.7.532.28833 Pour plus d'informations, visitez https://www.asp.net/ Azure Functions and Web Jobs Tools 16.7.532.28833 Azure Functions and Web Jobs Tools Common Azure Tools 1.10 Fournit des services courants utilisables par Microsoft Azure Mobile Services et Microsoft Azure Tools. Extensibility Message Bus 1.2.6 (master@34d6af2) Provides common messaging-based MEF services for loosely coupled Visual Studio extension components communication and integration. Extension IntelliCode 1.0 Informations détaillées sur l'extension Visual Studio IntelliCode Extensions des outils de conteneur Visual Studio (préversion) 1.0 Affichez, gérez et diagnostiquez les conteneurs dans Visual Studio. Gestionnaire de package NuGet 5.7.0 Gestionnaire de package NuGet dans Visual Studio. Pour plus d'informations sur NuGet, visitez https://docs.nuget.org/ Microsoft Azure Tools 2.9 Microsoft Azure Tools pour Microsoft Visual Studio 2019 - v2.9.30701.1 Microsoft Continuous Delivery Tools pour Visual Studio 0.4 Simplification de la configuration des pipelines Azure DevOps à partir de l'IDE Visual Studio. Microsoft JVM Debugger 1.0 Provides support for connecting the Visual Studio debugger to JDWP compatible Java Virtual Machines Microsoft MI-Based Debugger 1.0 Provides support for connecting Visual Studio to MI compatible debuggers Mono Debugging for Visual Studio 16.7.5 (112c7bc) Support for debugging Mono processes with Visual Studio. Outils Azure App Service v3.0.0 16.7.532.28833 Outils Azure App Service v3.0.0 Outils C# 3.7.0-6.20375.2+34202cc2f3e869fd70a26d8237f4552cf9e192cf Composants C# utilisés dans l'IDE. Selon votre type de projet et vos paramètres, une version différente du compilateur peut être utilisée. Outils TypeScript 16.0.20702.2001 Outils TypeScript pour Microsoft Visual Studio Outils Visual Basic 3.7.0-6.20375.2+34202cc2f3e869fd70a26d8237f4552cf9e192cf Composants Visual Basic utilisés dans l'IDE. Selon votre type de projet et vos paramètres, une version différente du compilateur peut être utilisée. Package hôte de l'adaptateur de débogage de Visual Studio Code 1.0 Couche d'interopérabilité pour l'hébergement d'adaptateurs de débogage Visual Studio Code dans Visual Studio ProjectServicesPackage Extension 1.0 ProjectServicesPackage Visual Studio Extension Detailed Info SQL Server Data Tools 16.0.62007.09200 Microsoft SQL Server Data Tools Visual Studio Tools pour Conteneurs 1.0 Visual Studio Tools pour Conteneurs Visual Studio Tools pour Docker 1.1 Développez, exécutez et validez vos applications ASP.NET Core dans l'environnement cible. Appuyez sur F5 pour exécuter votre application directement dans un conteneur avec débogage ou sur CTRL+F5 pour modifier et actualiser votre application sans avoir à recréer le conteneur. Visual Studio Tools pour Kubernetes 1.0 Visual Studio Tools pour Kubernetes Visual F# Tools 10.10.0.0 pour F# 4.7 16.7.0-beta.20361.3+3ef6f0b514198c0bfa6c2c09fefe41a740b024d5 Microsoft Visual F# Tools 10.10.0.0 pour F# 4.7 VisualStudio.DeviceLog 1.0 Informations sur mon paquet VisualStudio.Foo 1.0 Information about my package VisualStudio.Mac 1.0 Mac Extension for Visual Studio Xamarin 16.7.000.440 (d16-7@358f3c6) Extension Visual Studio permettant de développer pour Xamarin.iOS et Xamarin.Android. Xamarin Designer 16.7.0.495 (remotes/origin/d16-7@79c0c522c) Extension Visual Studio pour activer les outils Xamarin Designer dans Visual Studio. Xamarin Templates 16.7.85 (1bcbbdf) Templates for building iOS, Android, and Windows apps with Xamarin and Xamarin.Forms. Xamarin.Android SDK 11.0.0.3 (d16-7/aca845b) Xamarin.Android Reference Assemblies and MSBuild support. Mono: 83105ba Java.Interop: xamarin/java.interop/d16-7@1f3388a ProGuard: Guardsquare/proguard/proguard6.2.2@ebe9000 SQLite: xamarin/sqlite/3.32.1@1a3276b Xamarin.Android Tools: xamarin/xamarin-android-tools/d16-7@017078f Xamarin.iOS and Xamarin.Mac SDK 13.20.2.2 (817b6f72a) Xamarin.iOS and Xamarin.Mac Reference Assemblies and MSBuild support. > dotnet --list-sdks 1.1.0-preview1-005077 [C:\Program Files\dotnet\sdk] 2.0.2 [C:\Program Files\dotnet\sdk] 2.1.202 [C:\Program Files\dotnet\sdk] 2.1.504 [C:\Program Files\dotnet\sdk] 2.1.801 [C:\Program Files\dotnet\sdk] 2.2.101 [C:\Program Files\dotnet\sdk] 2.2.207 [C:\Program Files\dotnet\sdk] 3.1.400 [C:\Program Files\dotnet\sdk] ### Log File Application.cs(424,28,424,31): error CS8370: La fonctionnalité 'assignation de fusion' n'est pas disponible en C# 7.3. Utilisez la version de langage 8.0 ou une version ultérieure.
1.0
Unable to build Xamarin Android application after upgrading to VS 16.7 Release - getting error CS8370 - ### Steps to Reproduce 1. Open a project containing some C# 8.0 code & which was compiling fine with 16.6, then build it in "Debug" mode 2. Note that updating the tag langversion to "latest" in .csproj does not solve the issue ### Expected Behavior Build should complete without errors. ### Actual Behavior Getting messages CS8370 on C# 8.0 constructs saying that C# language version should be 8.0. Compiler is using C# 7.3. ### Version Information Microsoft Visual Studio Community 2019 Version 16.7.0 VisualStudio.16.Release/16.7.0+30330.147 Microsoft .NET Framework Version 4.8.04084 Version installée : Community ASP.NET and Web Tools 2019 16.7.532.28833 ASP.NET and Web Tools 2019 ASP.NET Core Razor Language Services 16.1.0.2035807+72d099b977d3a85e65fa3b0614ca8cfc803fef02 Provides languages services for ASP.NET Core Razor. ASP.NET Web Frameworks and Tools 2019 16.7.532.28833 Pour plus d'informations, visitez https://www.asp.net/ Azure Functions and Web Jobs Tools 16.7.532.28833 Azure Functions and Web Jobs Tools Common Azure Tools 1.10 Fournit des services courants utilisables par Microsoft Azure Mobile Services et Microsoft Azure Tools. Extensibility Message Bus 1.2.6 (master@34d6af2) Provides common messaging-based MEF services for loosely coupled Visual Studio extension components communication and integration. Extension IntelliCode 1.0 Informations détaillées sur l'extension Visual Studio IntelliCode Extensions des outils de conteneur Visual Studio (préversion) 1.0 Affichez, gérez et diagnostiquez les conteneurs dans Visual Studio. Gestionnaire de package NuGet 5.7.0 Gestionnaire de package NuGet dans Visual Studio. Pour plus d'informations sur NuGet, visitez https://docs.nuget.org/ Microsoft Azure Tools 2.9 Microsoft Azure Tools pour Microsoft Visual Studio 2019 - v2.9.30701.1 Microsoft Continuous Delivery Tools pour Visual Studio 0.4 Simplification de la configuration des pipelines Azure DevOps à partir de l'IDE Visual Studio. Microsoft JVM Debugger 1.0 Provides support for connecting the Visual Studio debugger to JDWP compatible Java Virtual Machines Microsoft MI-Based Debugger 1.0 Provides support for connecting Visual Studio to MI compatible debuggers Mono Debugging for Visual Studio 16.7.5 (112c7bc) Support for debugging Mono processes with Visual Studio. Outils Azure App Service v3.0.0 16.7.532.28833 Outils Azure App Service v3.0.0 Outils C# 3.7.0-6.20375.2+34202cc2f3e869fd70a26d8237f4552cf9e192cf Composants C# utilisés dans l'IDE. Selon votre type de projet et vos paramètres, une version différente du compilateur peut être utilisée. Outils TypeScript 16.0.20702.2001 Outils TypeScript pour Microsoft Visual Studio Outils Visual Basic 3.7.0-6.20375.2+34202cc2f3e869fd70a26d8237f4552cf9e192cf Composants Visual Basic utilisés dans l'IDE. Selon votre type de projet et vos paramètres, une version différente du compilateur peut être utilisée. Package hôte de l'adaptateur de débogage de Visual Studio Code 1.0 Couche d'interopérabilité pour l'hébergement d'adaptateurs de débogage Visual Studio Code dans Visual Studio ProjectServicesPackage Extension 1.0 ProjectServicesPackage Visual Studio Extension Detailed Info SQL Server Data Tools 16.0.62007.09200 Microsoft SQL Server Data Tools Visual Studio Tools pour Conteneurs 1.0 Visual Studio Tools pour Conteneurs Visual Studio Tools pour Docker 1.1 Développez, exécutez et validez vos applications ASP.NET Core dans l'environnement cible. Appuyez sur F5 pour exécuter votre application directement dans un conteneur avec débogage ou sur CTRL+F5 pour modifier et actualiser votre application sans avoir à recréer le conteneur. Visual Studio Tools pour Kubernetes 1.0 Visual Studio Tools pour Kubernetes Visual F# Tools 10.10.0.0 pour F# 4.7 16.7.0-beta.20361.3+3ef6f0b514198c0bfa6c2c09fefe41a740b024d5 Microsoft Visual F# Tools 10.10.0.0 pour F# 4.7 VisualStudio.DeviceLog 1.0 Informations sur mon paquet VisualStudio.Foo 1.0 Information about my package VisualStudio.Mac 1.0 Mac Extension for Visual Studio Xamarin 16.7.000.440 (d16-7@358f3c6) Extension Visual Studio permettant de développer pour Xamarin.iOS et Xamarin.Android. Xamarin Designer 16.7.0.495 (remotes/origin/d16-7@79c0c522c) Extension Visual Studio pour activer les outils Xamarin Designer dans Visual Studio. Xamarin Templates 16.7.85 (1bcbbdf) Templates for building iOS, Android, and Windows apps with Xamarin and Xamarin.Forms. Xamarin.Android SDK 11.0.0.3 (d16-7/aca845b) Xamarin.Android Reference Assemblies and MSBuild support. Mono: 83105ba Java.Interop: xamarin/java.interop/d16-7@1f3388a ProGuard: Guardsquare/proguard/proguard6.2.2@ebe9000 SQLite: xamarin/sqlite/3.32.1@1a3276b Xamarin.Android Tools: xamarin/xamarin-android-tools/d16-7@017078f Xamarin.iOS and Xamarin.Mac SDK 13.20.2.2 (817b6f72a) Xamarin.iOS and Xamarin.Mac Reference Assemblies and MSBuild support. > dotnet --list-sdks 1.1.0-preview1-005077 [C:\Program Files\dotnet\sdk] 2.0.2 [C:\Program Files\dotnet\sdk] 2.1.202 [C:\Program Files\dotnet\sdk] 2.1.504 [C:\Program Files\dotnet\sdk] 2.1.801 [C:\Program Files\dotnet\sdk] 2.2.101 [C:\Program Files\dotnet\sdk] 2.2.207 [C:\Program Files\dotnet\sdk] 3.1.400 [C:\Program Files\dotnet\sdk] ### Log File Application.cs(424,28,424,31): error CS8370: La fonctionnalité 'assignation de fusion' n'est pas disponible en C# 7.3. Utilisez la version de langage 8.0 ou une version ultérieure.
non_priority
unable to build xamarin android application after upgrading to vs release getting error steps to reproduce open a project containing some c code which was compiling fine with then build it in debug mode note that updating the tag langversion to latest in csproj does not solve the issue expected behavior build should complete without errors actual behavior getting messages on c constructs saying that c language version should be compiler is using c version information microsoft visual studio community version visualstudio release microsoft net framework version version installée community asp net and web tools asp net and web tools asp net core razor language services provides languages services for asp net core razor asp net web frameworks and tools pour plus d informations visitez azure functions and web jobs tools azure functions and web jobs tools common azure tools fournit des services courants utilisables par microsoft azure mobile services et microsoft azure tools extensibility message bus master provides common messaging based mef services for loosely coupled visual studio extension components communication and integration extension intellicode informations détaillées sur l extension visual studio intellicode extensions des outils de conteneur visual studio préversion affichez gérez et diagnostiquez les conteneurs dans visual studio gestionnaire de package nuget gestionnaire de package nuget dans visual studio pour plus d informations sur nuget visitez microsoft azure tools microsoft azure tools pour microsoft visual studio  microsoft continuous delivery tools pour visual studio simplification de la configuration des pipelines azure devops à partir de l ide visual studio microsoft jvm debugger provides support for connecting the visual studio debugger to jdwp compatible java virtual machines microsoft mi based debugger provides support for connecting visual studio to mi compatible debuggers mono debugging for visual studio support for debugging mono processes with visual studio outils azure app service  outils azure app service  outils c composants c utilisés dans l ide selon votre type de projet et vos paramètres une version différente du compilateur peut être utilisée outils typescript outils typescript pour microsoft visual studio outils visual basic composants visual basic utilisés dans l ide selon votre type de projet et vos paramètres une version différente du compilateur peut être utilisée package hôte de l adaptateur de débogage de visual studio code couche d interopérabilité pour l hébergement d adaptateurs de débogage visual studio code dans visual studio projectservicespackage extension projectservicespackage visual studio extension detailed info sql server data tools microsoft sql server data tools visual studio tools pour conteneurs visual studio tools pour conteneurs visual studio tools pour docker développez exécutez et validez vos applications asp net core dans l environnement cible appuyez sur pour exécuter votre application directement dans un conteneur avec débogage ou sur ctrl pour modifier et actualiser votre application sans avoir à recréer le conteneur visual studio tools pour kubernetes visual studio tools pour kubernetes visual f tools pour f beta microsoft visual f tools pour f visualstudio devicelog informations sur mon paquet visualstudio foo information about my package visualstudio mac mac extension for visual studio xamarin extension visual studio permettant de développer pour xamarin ios et xamarin android xamarin designer remotes origin extension visual studio pour activer les outils xamarin designer dans visual studio xamarin templates templates for building ios android and windows apps with xamarin and xamarin forms xamarin android sdk xamarin android reference assemblies and msbuild support mono java interop xamarin java interop proguard guardsquare proguard sqlite xamarin sqlite xamarin android tools xamarin xamarin android tools xamarin ios and xamarin mac sdk xamarin ios and xamarin mac reference assemblies and msbuild support dotnet list sdks log file application cs error la fonctionnalité assignation de fusion n est pas disponible en c   utilisez la version de langage ou une version ultérieure
0
179,823
30,308,713,515
IssuesEvent
2023-07-10 11:19:33
GSA-TTS/FAC
https://api.github.com/repos/GSA-TTS/FAC
closed
Mock up new FAC Resources page
ux/design content
Breakout issue of #377 ### Background We're designing a new FAC Resources page (#458) based on research with auditors and auditees. Once we complete the research and content design work in #458, we can mock up the new FAC Resources page in Figma. ### Tasks - [x] Mock up new page - [ ] Peer review - [ ] Write implementation notes ### Definition of Done - [ ] Screens in Figma are ready to be handed off to front end - [x] All text has a contrast ratio of 4.5:1 with the background - [x] Interaction are documented if they deviate from USWDS components - [x] The needs of someone navigating the site with the use of a screenreader or keyboard has been considered and documented - [x] There is an option for multilingual support - [x] There is supporting documentation for alt text, labels for links (anchor + target), error text in forms, and what assistive technologies should announce (if applicable)
1.0
Mock up new FAC Resources page - Breakout issue of #377 ### Background We're designing a new FAC Resources page (#458) based on research with auditors and auditees. Once we complete the research and content design work in #458, we can mock up the new FAC Resources page in Figma. ### Tasks - [x] Mock up new page - [ ] Peer review - [ ] Write implementation notes ### Definition of Done - [ ] Screens in Figma are ready to be handed off to front end - [x] All text has a contrast ratio of 4.5:1 with the background - [x] Interaction are documented if they deviate from USWDS components - [x] The needs of someone navigating the site with the use of a screenreader or keyboard has been considered and documented - [x] There is an option for multilingual support - [x] There is supporting documentation for alt text, labels for links (anchor + target), error text in forms, and what assistive technologies should announce (if applicable)
non_priority
mock up new fac resources page breakout issue of background we re designing a new fac resources page based on research with auditors and auditees once we complete the research and content design work in we can mock up the new fac resources page in figma tasks mock up new page peer review write implementation notes definition of done screens in figma are ready to be handed off to front end all text has a contrast ratio of with the background interaction are documented if they deviate from uswds components the needs of someone navigating the site with the use of a screenreader or keyboard has been considered and documented there is an option for multilingual support there is supporting documentation for alt text labels for links anchor target error text in forms and what assistive technologies should announce if applicable
0
13,066
5,291,675,441
IssuesEvent
2017-02-08 23:12:42
grpc/grpc
https://api.github.com/repos/grpc/grpc
closed
Python unit.beta._not_found_test.NotFoundTest.test_future_stream_unary_not_found test is flaky
BUILDPONY P1 python
https://grpc-testing.appspot.com/job/gRPC_pull_requests_linux/1799/testReport/junit/(root)/python_linux_opt/py27_test_unit_beta__not_found_test_NotFoundTest/ ``` [0mRunning unit.beta._not_found_test.NotFoundTest.test_future_stream_unary_not_found [91mERROR unit.beta._not_found_test.NotFoundTest.test_future_stream_unary_not_found [0m2 tests finished: 1 successful 1 unsuccessful 0 skipped 0 expected failures 0 unexpected successes Interrupted Tests: [] Errors/Failures: [91munit.beta._not_found_test.NotFoundTest.test_future_stream_unary_not_found[0m [1mtraceback:[0m Traceback (most recent call last): File "/usr/lib/python2.7/unittest/case.py", line 329, in run testMethod() File "/var/local/git/grpc/src/python/grpcio_tests/tests/unit/beta/_not_found_test.py", line 66, in test_future_stream_unary_not_found rpc_future.result() File "/var/local/git/grpc/py27/local/lib/python2.7/site-packages/grpc/beta/_client_adaptations.py", line 111, in result raise _abortion_error(rpc_error_call) RemoteError: RemoteError(code=StatusCode.UNKNOWN, details="Exception iterating requests!") [1mstdout:[0m [1mstderr:[0m ERROR:root:Exception iterating requests! Traceback (most recent call last): File "/var/local/git/grpc/py27/local/lib/python2.7/site-packages/grpc/_channel.py", line 203, in consume_request_iterator request = next(request_iterator) TypeError: list object is not an iterator Unexpected successes: [] Test failure ```
1.0
Python unit.beta._not_found_test.NotFoundTest.test_future_stream_unary_not_found test is flaky - https://grpc-testing.appspot.com/job/gRPC_pull_requests_linux/1799/testReport/junit/(root)/python_linux_opt/py27_test_unit_beta__not_found_test_NotFoundTest/ ``` [0mRunning unit.beta._not_found_test.NotFoundTest.test_future_stream_unary_not_found [91mERROR unit.beta._not_found_test.NotFoundTest.test_future_stream_unary_not_found [0m2 tests finished: 1 successful 1 unsuccessful 0 skipped 0 expected failures 0 unexpected successes Interrupted Tests: [] Errors/Failures: [91munit.beta._not_found_test.NotFoundTest.test_future_stream_unary_not_found[0m [1mtraceback:[0m Traceback (most recent call last): File "/usr/lib/python2.7/unittest/case.py", line 329, in run testMethod() File "/var/local/git/grpc/src/python/grpcio_tests/tests/unit/beta/_not_found_test.py", line 66, in test_future_stream_unary_not_found rpc_future.result() File "/var/local/git/grpc/py27/local/lib/python2.7/site-packages/grpc/beta/_client_adaptations.py", line 111, in result raise _abortion_error(rpc_error_call) RemoteError: RemoteError(code=StatusCode.UNKNOWN, details="Exception iterating requests!") [1mstdout:[0m [1mstderr:[0m ERROR:root:Exception iterating requests! Traceback (most recent call last): File "/var/local/git/grpc/py27/local/lib/python2.7/site-packages/grpc/_channel.py", line 203, in consume_request_iterator request = next(request_iterator) TypeError: list object is not an iterator Unexpected successes: [] Test failure ```
non_priority
python unit beta not found test notfoundtest test future stream unary not found test is flaky unit beta not found test notfoundtest test future stream unary not found unit beta not found test notfoundtest test future stream unary not found tests finished successful unsuccessful skipped expected failures unexpected successes interrupted tests errors failures beta not found test notfoundtest test future stream unary not found traceback most recent call last file usr lib unittest case py line in run testmethod file var local git grpc src python grpcio tests tests unit beta not found test py line in test future stream unary not found rpc future result file var local git grpc local lib site packages grpc beta client adaptations py line in result raise abortion error rpc error call remoteerror remoteerror code statuscode unknown details exception iterating requests error root exception iterating requests traceback most recent call last file var local git grpc local lib site packages grpc channel py line in consume request iterator request next request iterator typeerror list object is not an iterator unexpected successes test failure
0
195,415
14,728,707,621
IssuesEvent
2021-01-06 10:19:42
WoWManiaUK/Redemption
https://api.github.com/repos/WoWManiaUK/Redemption
closed
[Raid] Eredar Twins intro voicelines
Fixed on PTR - Tester Confirmed Priority - Low
**Links:** https://wowwiki.fandom.com/wiki/Eredar_Twins#:~:text=The%20Eredar%20Twins%2C%20Lady%20Sacrolash,of%20Rohendor%2C%20the%20Second%20Gate. **What is Happening:** Lady Sarcolash and Grand Warlock Alythess currently play their intro dialogue exchange as soon as the first player enters the Sunwell Plateau instance. At this point, the bosses are way far from the players, and definitely out of sight, and them talking is quite strange and out of place. ![image](https://user-images.githubusercontent.com/34783736/102820947-1e7ae480-43a4-11eb-8944-f219966bd2eb.png) **What Should happen:** Their intro dialogue should probably play as soon as the first player enters their room. (Change trigger)
1.0
[Raid] Eredar Twins intro voicelines - **Links:** https://wowwiki.fandom.com/wiki/Eredar_Twins#:~:text=The%20Eredar%20Twins%2C%20Lady%20Sacrolash,of%20Rohendor%2C%20the%20Second%20Gate. **What is Happening:** Lady Sarcolash and Grand Warlock Alythess currently play their intro dialogue exchange as soon as the first player enters the Sunwell Plateau instance. At this point, the bosses are way far from the players, and definitely out of sight, and them talking is quite strange and out of place. ![image](https://user-images.githubusercontent.com/34783736/102820947-1e7ae480-43a4-11eb-8944-f219966bd2eb.png) **What Should happen:** Their intro dialogue should probably play as soon as the first player enters their room. (Change trigger)
non_priority
eredar twins intro voicelines links what is happening lady sarcolash and grand warlock alythess currently play their intro dialogue exchange as soon as the first player enters the sunwell plateau instance at this point the bosses are way far from the players and definitely out of sight and them talking is quite strange and out of place what should happen their intro dialogue should probably play as soon as the first player enters their room change trigger
0
25,587
4,414,499,103
IssuesEvent
2016-08-13 13:31:33
ironjan/klausurtool-ror
https://api.github.com/repos/ironjan/klausurtool-ror
closed
Sorted TOC
defect
## How does this problem happen? 1. First I go to http://ausleihe.fachschafts.website/internal/admin/old_folders/175/toc ## What does happen? TOC is unsorted. ## What do you expect to happen instead? TOC should be sorted.
1.0
Sorted TOC - ## How does this problem happen? 1. First I go to http://ausleihe.fachschafts.website/internal/admin/old_folders/175/toc ## What does happen? TOC is unsorted. ## What do you expect to happen instead? TOC should be sorted.
non_priority
sorted toc how does this problem happen first i go to what does happen toc is unsorted what do you expect to happen instead toc should be sorted
0
94,539
3,928,105,214
IssuesEvent
2016-04-24 01:21:42
Baystation12/Baystation12
https://api.github.com/repos/Baystation12/Baystation12
closed
Ghosts can attach and detach IV drips
feature oversight priority: trivial
[Spooky ghost] attaches the IV drip to [Non-spooky human]. Very spooky! But probably not something they should be able to do.
1.0
Ghosts can attach and detach IV drips - [Spooky ghost] attaches the IV drip to [Non-spooky human]. Very spooky! But probably not something they should be able to do.
priority
ghosts can attach and detach iv drips attaches the iv drip to very spooky but probably not something they should be able to do
1
255,915
8,126,577,039
IssuesEvent
2018-08-17 03:07:41
aowen87/BAR
https://api.github.com/repos/aowen87/BAR
closed
ITAPS shared libraries not included when doing a make package.
Bug Likelihood: 3 - Occasional Priority: Normal Severity: 2 - Minor Irritation
make package doesn't package up the ITAPS shared libraries, so when VisIt is run there are error message at startup about missing shared libraries and of course the ITAPS plugins won't work. This can be fixed by either installing only static libraries or fixing the make package script so that it packages up the shared libraries. I guess either way works. It seems like doing the static libraries would be easier. I ran into this problem both on yana and hoth and I moved the shared libriares into a directory named shared and the problem went away. -----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. As such, not all information was able to be captured in the transition. Below is a complete record of the original redmine ticket. Ticket number: 390 Status: Resolved Project: VisIt Tracker: Bug Priority: Normal Subject: ITAPS shared libraries not included when doing a make package. Assigned to: Mark Miller Category: Target version: 2.1.1 Author: Eric Brugger Start: 09/14/2010 Due date: % Done: 0 Estimated time: Created: 09/14/2010 05:28 pm Updated: 10/26/2010 07:19 pm Likelihood: 3 - Occasional Severity: 2 - Minor Irritation Found in version: trunk Impact: Expected Use: OS: All Support Group: Any Description: make package doesn't package up the ITAPS shared libraries, so when VisIt is run there are error message at startup about missing shared libraries and of course the ITAPS plugins won't work. This can be fixed by either installing only static libraries or fixing the make package script so that it packages up the shared libraries. I guess either way works. It seems like doing the static libraries would be easier. I ran into this problem both on yana and hoth and I moved the shared libriares into a directory named shared and the problem went away. Comments: Ensure build_visit removes any .sos for ITAPS installs.Ensure any existing ITAPS installations have .sos removed.The above 2 actions will ensure ITAPS plugins get statically linked to their respective libs and will then 'ride along for free' when those plugins are packaged in an installation. I installed some new ITAPS libs on July 27th. But, when I did, I left the .so's there as well and this caused problems. It turns out build_visit does indeed remove the .so's after installing ITAPS libs. So, I think this is now resolved.
1.0
ITAPS shared libraries not included when doing a make package. - make package doesn't package up the ITAPS shared libraries, so when VisIt is run there are error message at startup about missing shared libraries and of course the ITAPS plugins won't work. This can be fixed by either installing only static libraries or fixing the make package script so that it packages up the shared libraries. I guess either way works. It seems like doing the static libraries would be easier. I ran into this problem both on yana and hoth and I moved the shared libriares into a directory named shared and the problem went away. -----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. As such, not all information was able to be captured in the transition. Below is a complete record of the original redmine ticket. Ticket number: 390 Status: Resolved Project: VisIt Tracker: Bug Priority: Normal Subject: ITAPS shared libraries not included when doing a make package. Assigned to: Mark Miller Category: Target version: 2.1.1 Author: Eric Brugger Start: 09/14/2010 Due date: % Done: 0 Estimated time: Created: 09/14/2010 05:28 pm Updated: 10/26/2010 07:19 pm Likelihood: 3 - Occasional Severity: 2 - Minor Irritation Found in version: trunk Impact: Expected Use: OS: All Support Group: Any Description: make package doesn't package up the ITAPS shared libraries, so when VisIt is run there are error message at startup about missing shared libraries and of course the ITAPS plugins won't work. This can be fixed by either installing only static libraries or fixing the make package script so that it packages up the shared libraries. I guess either way works. It seems like doing the static libraries would be easier. I ran into this problem both on yana and hoth and I moved the shared libriares into a directory named shared and the problem went away. Comments: Ensure build_visit removes any .sos for ITAPS installs.Ensure any existing ITAPS installations have .sos removed.The above 2 actions will ensure ITAPS plugins get statically linked to their respective libs and will then 'ride along for free' when those plugins are packaged in an installation. I installed some new ITAPS libs on July 27th. But, when I did, I left the .so's there as well and this caused problems. It turns out build_visit does indeed remove the .so's after installing ITAPS libs. So, I think this is now resolved.
priority
itaps shared libraries not included when doing a make package make package doesn t package up the itaps shared libraries so when visit is run there are error message at startup about missing shared libraries and of course the itaps plugins won t work this can be fixed by either installing only static libraries or fixing the make package script so that it packages up the shared libraries i guess either way works it seems like doing the static libraries would be easier i ran into this problem both on yana and hoth and i moved the shared libriares into a directory named shared and the problem went away redmine migration this ticket was migrated from redmine as such not all information was able to be captured in the transition below is a complete record of the original redmine ticket ticket number status resolved project visit tracker bug priority normal subject itaps shared libraries not included when doing a make package assigned to mark miller category target version author eric brugger start due date done estimated time created pm updated pm likelihood occasional severity minor irritation found in version trunk impact expected use os all support group any description make package doesn t package up the itaps shared libraries so when visit is run there are error message at startup about missing shared libraries and of course the itaps plugins won t work this can be fixed by either installing only static libraries or fixing the make package script so that it packages up the shared libraries i guess either way works it seems like doing the static libraries would be easier i ran into this problem both on yana and hoth and i moved the shared libriares into a directory named shared and the problem went away comments ensure build visit removes any sos for itaps installs ensure any existing itaps installations have sos removed the above actions will ensure itaps plugins get statically linked to their respective libs and will then ride along for free when those plugins are packaged in an installation i installed some new itaps libs on july but when i did i left the so s there as well and this caused problems it turns out build visit does indeed remove the so s after installing itaps libs so i think this is now resolved
1
561,480
16,617,888,173
IssuesEvent
2021-06-02 19:16:56
department-of-veterans-affairs/caseflow
https://api.github.com/repos/department-of-veterans-affairs/caseflow
closed
[Dogfooding Bug] Offset is displayed instead of Timezone for some cases
Priority: Low Product: caseflow-hearings Stakeholder: BVA Team: Tango 💃 Type: Bug
## Description ![unnamed.png](https://images.zenhubusercontent.com/569954a5638e718c99601d36/59175bef-9670-4329-9099-ae9c00ebcef1) An offset is displayed instead of a timezone for some timezones (e.g. "Vladivostok", which shows "+10"). ## Acceptance criteria - [ ] Ensure something friendlier than the timezone offset displays ## Background/context/resources ## Technical notes Possibly because there is no timezone abbreviation associated with "Vladivostok"; this is an issue in both the front end (moment.js) and back end (Rails timezones).
1.0
[Dogfooding Bug] Offset is displayed instead of Timezone for some cases - ## Description ![unnamed.png](https://images.zenhubusercontent.com/569954a5638e718c99601d36/59175bef-9670-4329-9099-ae9c00ebcef1) An offset is displayed instead of a timezone for some timezones (e.g. "Vladivostok", which shows "+10"). ## Acceptance criteria - [ ] Ensure something friendlier than the timezone offset displays ## Background/context/resources ## Technical notes Possibly because there is no timezone abbreviation associated with "Vladivostok"; this is an issue in both the front end (moment.js) and back end (Rails timezones).
priority
offset is displayed instead of timezone for some cases description an offset is displayed instead of a timezone for some timezones e g vladivostok which shows acceptance criteria ensure something friendlier than the timezone offset displays background context resources technical notes possibly because there is no timezone abbreviation associated with vladivostok this is an issue in both the front end moment js and back end rails timezones
1
499,578
14,450,616,608
IssuesEvent
2020-12-08 09:50:05
StrangeLoopGames/EcoIssues
https://api.github.com/repos/StrangeLoopGames/EcoIssues
closed
Contract Nested Clause "Any" only checks first clause
Category: Gameplay Priority: Medium Status: Fixed
![grafik](https://user-images.githubusercontent.com/33863615/93024296-ac04a680-f5f5-11ea-9d4e-10c23b27c913.png) In the contract only the first entry is counted for the Nested Clause "Any". For example, I gave 20 corn but in the chat it was reported that 20 fiddleheads are missing. When I want to sign the contract as done he tells me that everything is still missing. If I hand in the 20 fiddleheads I can close the contract without everything else. [Player-prev.log](https://github.com/StrangeLoopGames/EcoIssues/files/5214744/Player-prev.log)
1.0
Contract Nested Clause "Any" only checks first clause - ![grafik](https://user-images.githubusercontent.com/33863615/93024296-ac04a680-f5f5-11ea-9d4e-10c23b27c913.png) In the contract only the first entry is counted for the Nested Clause "Any". For example, I gave 20 corn but in the chat it was reported that 20 fiddleheads are missing. When I want to sign the contract as done he tells me that everything is still missing. If I hand in the 20 fiddleheads I can close the contract without everything else. [Player-prev.log](https://github.com/StrangeLoopGames/EcoIssues/files/5214744/Player-prev.log)
priority
contract nested clause any only checks first clause in the contract only the first entry is counted for the nested clause any for example i gave corn but in the chat it was reported that fiddleheads are missing when i want to sign the contract as done he tells me that everything is still missing if i hand in the fiddleheads i can close the contract without everything else
1
259,207
19,590,650,744
IssuesEvent
2022-01-05 12:35:19
brumik/react-json-chart-builder
https://api.github.com/repos/brumik/react-json-chart-builder
closed
Demo app improvements
documentation
- [x] Use react router for different chart types, so you can send link to an exact chart. - [x] Make the link menu better, probably horizontal instead of vertical so it can grow better. - [ ] Add a few more examples. - [ ] Describe the examples so the user can decide which example is probably the closes to the feature they want. - [ ] The description could be on an index page in "tiles" or just a list of charts.
1.0
Demo app improvements - - [x] Use react router for different chart types, so you can send link to an exact chart. - [x] Make the link menu better, probably horizontal instead of vertical so it can grow better. - [ ] Add a few more examples. - [ ] Describe the examples so the user can decide which example is probably the closes to the feature they want. - [ ] The description could be on an index page in "tiles" or just a list of charts.
non_priority
demo app improvements use react router for different chart types so you can send link to an exact chart make the link menu better probably horizontal instead of vertical so it can grow better add a few more examples describe the examples so the user can decide which example is probably the closes to the feature they want the description could be on an index page in tiles or just a list of charts
0
568,119
16,959,804,363
IssuesEvent
2021-06-29 00:59:29
TerriaJS/de-australia-map
https://api.github.com/repos/TerriaJS/de-australia-map
closed
DE Australia - option for DEA team to update catalogue & test data services
high priority
DEA Team: - we do need somewhere to test our web services and catalog - now with the v8 release we don't really have a convenient/persistent spot - until earlier this week, we updated the terria cube catalog with the services/features we want to test to share with stakeholders Some options: 1) update terriacube to v8 and keep that as DEA testing site (public) 2) give access to dev/test DE AU to DEA team (not public)
1.0
DE Australia - option for DEA team to update catalogue & test data services - DEA Team: - we do need somewhere to test our web services and catalog - now with the v8 release we don't really have a convenient/persistent spot - until earlier this week, we updated the terria cube catalog with the services/features we want to test to share with stakeholders Some options: 1) update terriacube to v8 and keep that as DEA testing site (public) 2) give access to dev/test DE AU to DEA team (not public)
priority
de australia option for dea team to update catalogue test data services dea team we do need somewhere to test our web services and catalog now with the release we don t really have a convenient persistent spot until earlier this week we updated the terria cube catalog with the services features we want to test to share with stakeholders some options update terriacube to and keep that as dea testing site public give access to dev test de au to dea team not public
1
461,183
13,224,780,467
IssuesEvent
2020-08-17 19:50:03
google/ground-platform
https://api.github.com/repos/google/ground-platform
closed
[Add/edit observation] Set audit info (creation/edit user and timestamp) on save
priority: p2 type: feature request web
@gyarill fyi, adding here for future work.
1.0
[Add/edit observation] Set audit info (creation/edit user and timestamp) on save - @gyarill fyi, adding here for future work.
priority
set audit info creation edit user and timestamp on save gyarill fyi adding here for future work
1
372,099
11,009,170,163
IssuesEvent
2019-12-04 12:04:39
StrangeLoopGames/EcoIssues
https://api.github.com/repos/StrangeLoopGames/EcoIssues
closed
Audio errors spam console on various tool use
Fixed Medium Priority
When trying to use various tools on the environment: ![image](https://user-images.githubusercontent.com/14983165/69999934-afb7b880-150e-11ea-89d9-54d70b8b9f23.png) Can not play a disabled audio source UnityEngine.AudioSource:Play() PlayRandomAudioClip:OnEnable() (at Assets/PlayRandomAudioClip.cs:34) UnityEngine.Object:Instantiate(GameObject, Vector3, Quaternion) CharacterAudioController:Update() (at Assets/CharacterController/CharacterAudioController.cs:31)
1.0
Audio errors spam console on various tool use - When trying to use various tools on the environment: ![image](https://user-images.githubusercontent.com/14983165/69999934-afb7b880-150e-11ea-89d9-54d70b8b9f23.png) Can not play a disabled audio source UnityEngine.AudioSource:Play() PlayRandomAudioClip:OnEnable() (at Assets/PlayRandomAudioClip.cs:34) UnityEngine.Object:Instantiate(GameObject, Vector3, Quaternion) CharacterAudioController:Update() (at Assets/CharacterController/CharacterAudioController.cs:31)
priority
audio errors spam console on various tool use when trying to use various tools on the environment can not play a disabled audio source unityengine audiosource play playrandomaudioclip onenable at assets playrandomaudioclip cs unityengine object instantiate gameobject quaternion characteraudiocontroller update at assets charactercontroller characteraudiocontroller cs
1
66,936
8,058,895,097
IssuesEvent
2018-08-02 20:01:52
apache/incubator-openwhisk-website
https://api.github.com/repos/apache/incubator-openwhisk-website
opened
Create README Templates for Deployment methods
design priority: low
We would like to link every deployment README to openwhisk website documentation page. And to provide a uniform experience throughout all deployment methods, create a common template so that every deployment repos can change its README.md based on that template.
1.0
Create README Templates for Deployment methods - We would like to link every deployment README to openwhisk website documentation page. And to provide a uniform experience throughout all deployment methods, create a common template so that every deployment repos can change its README.md based on that template.
non_priority
create readme templates for deployment methods we would like to link every deployment readme to openwhisk website documentation page and to provide a uniform experience throughout all deployment methods create a common template so that every deployment repos can change its readme md based on that template
0
44,325
11,427,307,501
IssuesEvent
2020-02-04 00:21:35
lyft/envoy-mobile
https://api.github.com/repos/lyft/envoy-mobile
closed
build: publish envoy artifact
build community no stalebot
During master CI we should publish a compiled library for envoy that people can use to avoid compiling on their own.
1.0
build: publish envoy artifact - During master CI we should publish a compiled library for envoy that people can use to avoid compiling on their own.
non_priority
build publish envoy artifact during master ci we should publish a compiled library for envoy that people can use to avoid compiling on their own
0
436,875
30,573,162,425
IssuesEvent
2023-07-21 01:21:27
SSWConsulting/SSW.Website
https://api.github.com/repos/SSWConsulting/SSW.Website
closed
📄Docs - Wiki Page for Components
Type: Documentation
At the moment, when you press the "embed" button on Tina, it won't give you a preview or description of what each component is. It would be good if there was a piece of documentation describing some/all of the components available to users. ![Image](https://github.com/SSWConsulting/SSW.Website/assets/20507092/b1f009d7-4eba-49f9-a056-cd47a1b50def) **Figure: The "Embed" button in the Tina rich text edtior** ```[tasklist] ### Tasks - [x] Write a wiki page listing components that can be used in the Tina rich text editor ```
1.0
📄Docs - Wiki Page for Components - At the moment, when you press the "embed" button on Tina, it won't give you a preview or description of what each component is. It would be good if there was a piece of documentation describing some/all of the components available to users. ![Image](https://github.com/SSWConsulting/SSW.Website/assets/20507092/b1f009d7-4eba-49f9-a056-cd47a1b50def) **Figure: The "Embed" button in the Tina rich text edtior** ```[tasklist] ### Tasks - [x] Write a wiki page listing components that can be used in the Tina rich text editor ```
non_priority
📄docs wiki page for components at the moment when you press the embed button on tina it won t give you a preview or description of what each component is it would be good if there was a piece of documentation describing some all of the components available to users figure the embed button in the tina rich text edtior tasks write a wiki page listing components that can be used in the tina rich text editor
0
216,016
7,300,036,894
IssuesEvent
2018-02-26 22:08:16
peaceiris/we-are-smarter-than-me
https://api.github.com/repos/peaceiris/we-are-smarter-than-me
opened
Post: Affiliate
Priority: High Status: Pending Target: Post Type: Addition
# Affiliate ## Task - bitFlyer - bitbank - Softbank Air - App - クレジットカード - デビットカード - Taiwan JTB - ポータブルスキャナー AOLECA - 吉野の鶏めし ## References
1.0
Post: Affiliate - # Affiliate ## Task - bitFlyer - bitbank - Softbank Air - App - クレジットカード - デビットカード - Taiwan JTB - ポータブルスキャナー AOLECA - 吉野の鶏めし ## References
priority
post affiliate affiliate task bitflyer bitbank softbank air app クレジットカード デビットカード taiwan jtb ポータブルスキャナー aoleca 吉野の鶏めし references
1
82,039
15,838,629,851
IssuesEvent
2021-04-06 22:54:03
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
"pod install" is running on every iOS build with plugins, even if nothing changed
passed first triage t: xcode tool
``` $ cd dev/integration_tests/flutter_gallery $ flutter build ios ... Running pod install... 1,605ms ``` Run the same command again, and it will run `pod install` again even though it doesn't need to. This adds an extra 1.6 seconds to every build.
1.0
"pod install" is running on every iOS build with plugins, even if nothing changed - ``` $ cd dev/integration_tests/flutter_gallery $ flutter build ios ... Running pod install... 1,605ms ``` Run the same command again, and it will run `pod install` again even though it doesn't need to. This adds an extra 1.6 seconds to every build.
non_priority
pod install is running on every ios build with plugins even if nothing changed cd dev integration tests flutter gallery flutter build ios running pod install run the same command again and it will run pod install again even though it doesn t need to this adds an extra seconds to every build
0
134,350
18,457,954,240
IssuesEvent
2021-10-15 19:15:07
bgoonz/bass-station
https://api.github.com/repos/bgoonz/bass-station
opened
CVE-2021-33502 (High) detected in normalize-url-1.9.1.tgz, normalize-url-3.3.0.tgz
security vulnerability
## CVE-2021-33502 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>normalize-url-1.9.1.tgz</b>, <b>normalize-url-3.3.0.tgz</b></p></summary> <p> <details><summary><b>normalize-url-1.9.1.tgz</b></p></summary> <p>Normalize a URL</p> <p>Library home page: <a href="https://registry.npmjs.org/normalize-url/-/normalize-url-1.9.1.tgz">https://registry.npmjs.org/normalize-url/-/normalize-url-1.9.1.tgz</a></p> <p>Path to dependency file: bass-station/package.json</p> <p>Path to vulnerable library: bass-station/node_modules/normalize-url/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.3.tgz (Root Library) - mini-css-extract-plugin-0.11.3.tgz - :x: **normalize-url-1.9.1.tgz** (Vulnerable Library) </details> <details><summary><b>normalize-url-3.3.0.tgz</b></p></summary> <p>Normalize a URL</p> <p>Library home page: <a href="https://registry.npmjs.org/normalize-url/-/normalize-url-3.3.0.tgz">https://registry.npmjs.org/normalize-url/-/normalize-url-3.3.0.tgz</a></p> <p>Path to dependency file: bass-station/package.json</p> <p>Path to vulnerable library: bass-station/node_modules/postcss-normalize-url/node_modules/normalize-url/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.3.tgz (Root Library) - optimize-css-assets-webpack-plugin-5.0.4.tgz - cssnano-4.1.11.tgz - cssnano-preset-default-4.0.8.tgz - postcss-normalize-url-4.0.1.tgz - :x: **normalize-url-3.3.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/bgoonz/bass-station/commit/09780fa1a8249ca85be224bc1399bc232d23b2e2">09780fa1a8249ca85be224bc1399bc232d23b2e2</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs. <p>Publish Date: 2021-05-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33502>CVE-2021-33502</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502</a></p> <p>Release Date: 2021-05-24</p> <p>Fix Resolution: normalize-url - 4.5.1, 5.3.1, 6.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-33502 (High) detected in normalize-url-1.9.1.tgz, normalize-url-3.3.0.tgz - ## CVE-2021-33502 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>normalize-url-1.9.1.tgz</b>, <b>normalize-url-3.3.0.tgz</b></p></summary> <p> <details><summary><b>normalize-url-1.9.1.tgz</b></p></summary> <p>Normalize a URL</p> <p>Library home page: <a href="https://registry.npmjs.org/normalize-url/-/normalize-url-1.9.1.tgz">https://registry.npmjs.org/normalize-url/-/normalize-url-1.9.1.tgz</a></p> <p>Path to dependency file: bass-station/package.json</p> <p>Path to vulnerable library: bass-station/node_modules/normalize-url/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.3.tgz (Root Library) - mini-css-extract-plugin-0.11.3.tgz - :x: **normalize-url-1.9.1.tgz** (Vulnerable Library) </details> <details><summary><b>normalize-url-3.3.0.tgz</b></p></summary> <p>Normalize a URL</p> <p>Library home page: <a href="https://registry.npmjs.org/normalize-url/-/normalize-url-3.3.0.tgz">https://registry.npmjs.org/normalize-url/-/normalize-url-3.3.0.tgz</a></p> <p>Path to dependency file: bass-station/package.json</p> <p>Path to vulnerable library: bass-station/node_modules/postcss-normalize-url/node_modules/normalize-url/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.3.tgz (Root Library) - optimize-css-assets-webpack-plugin-5.0.4.tgz - cssnano-4.1.11.tgz - cssnano-preset-default-4.0.8.tgz - postcss-normalize-url-4.0.1.tgz - :x: **normalize-url-3.3.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/bgoonz/bass-station/commit/09780fa1a8249ca85be224bc1399bc232d23b2e2">09780fa1a8249ca85be224bc1399bc232d23b2e2</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs. <p>Publish Date: 2021-05-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33502>CVE-2021-33502</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502</a></p> <p>Release Date: 2021-05-24</p> <p>Fix Resolution: normalize-url - 4.5.1, 5.3.1, 6.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in normalize url tgz normalize url tgz cve high severity vulnerability vulnerable libraries normalize url tgz normalize url tgz normalize url tgz normalize a url library home page a href path to dependency file bass station package json path to vulnerable library bass station node modules normalize url package json dependency hierarchy react scripts tgz root library mini css extract plugin tgz x normalize url tgz vulnerable library normalize url tgz normalize a url library home page a href path to dependency file bass station package json path to vulnerable library bass station node modules postcss normalize url node modules normalize url package json dependency hierarchy react scripts tgz root library optimize css assets webpack plugin tgz cssnano tgz cssnano preset default tgz postcss normalize url tgz x normalize url tgz vulnerable library found in head commit a href found in base branch master vulnerability details the normalize url package before x before and x before for node js has a redos regular expression denial of service issue because it has exponential performance for data urls publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution normalize url step up your open source security game with whitesource
0
359,275
10,667,517,954
IssuesEvent
2019-10-19 13:04:16
eJourn-al/eJournal
https://api.github.com/repos/eJourn-al/eJournal
closed
LTI course not ready screen
Priority: High Status: In Progress Type: Enhancement Workload: Medium
**Describe the solution you'd like** - A dedicated screen to this scenario, explaining the situation in a lighthearted way. - Notification with sufficient context so the eJournal team can take action as well. - Notification to the staff member if known (preferably in a non spammy fashion). **User story** As a student start LTI launch without the corresponding course having been set up on eJournal by the teacher yet. Currently, a 404 with a hint in subtext is displayed, I want to be reassured I did nothing wrong. Tell me to contact my teacher to get things in order.
1.0
LTI course not ready screen - **Describe the solution you'd like** - A dedicated screen to this scenario, explaining the situation in a lighthearted way. - Notification with sufficient context so the eJournal team can take action as well. - Notification to the staff member if known (preferably in a non spammy fashion). **User story** As a student start LTI launch without the corresponding course having been set up on eJournal by the teacher yet. Currently, a 404 with a hint in subtext is displayed, I want to be reassured I did nothing wrong. Tell me to contact my teacher to get things in order.
priority
lti course not ready screen describe the solution you d like a dedicated screen to this scenario explaining the situation in a lighthearted way notification with sufficient context so the ejournal team can take action as well notification to the staff member if known preferably in a non spammy fashion user story as a student start lti launch without the corresponding course having been set up on ejournal by the teacher yet currently a with a hint in subtext is displayed i want to be reassured i did nothing wrong tell me to contact my teacher to get things in order
1
794,246
28,027,616,134
IssuesEvent
2023-03-28 10:10:09
ipfs-force-community/venus-cluster
https://api.github.com/repos/ipfs-force-community/venus-cluster
closed
[venus-sector-manager] 手动发送recover消息
enhancement good first issue priority:mid C-cli v0.6
### 模块 / Components - [x] venus-sector-manager - [ ] venus-worker - [ ] 工具链 / toolchains - [ ] 文档 / docs ### 描述 / Description 是否可以考虑增加,允许用户手动发送recover请求,不用等到下一个windowPost,的相关功能? 关联: - [ ] https://github.com/filecoin-project/lotus/pull/9144
1.0
[venus-sector-manager] 手动发送recover消息 - ### 模块 / Components - [x] venus-sector-manager - [ ] venus-worker - [ ] 工具链 / toolchains - [ ] 文档 / docs ### 描述 / Description 是否可以考虑增加,允许用户手动发送recover请求,不用等到下一个windowPost,的相关功能? 关联: - [ ] https://github.com/filecoin-project/lotus/pull/9144
priority
手动发送recover消息 模块 components venus sector manager venus worker 工具链 toolchains 文档 docs 描述 description 是否可以考虑增加,允许用户手动发送recover请求,不用等到下一个windowpost,的相关功能? 关联:
1
246,403
20,862,779,275
IssuesEvent
2022-03-22 01:45:56
khalidsaadat/soen341
https://api.github.com/repos/khalidsaadat/soen341
closed
[TESTING] Create working CI for the project
Testing
**Acceptance Test** 1. Build has to be detected by Github actions 2. For our project, empty tests are available through Github actions
1.0
[TESTING] Create working CI for the project - **Acceptance Test** 1. Build has to be detected by Github actions 2. For our project, empty tests are available through Github actions
non_priority
create working ci for the project acceptance test build has to be detected by github actions for our project empty tests are available through github actions
0
64,038
26,591,988,442
IssuesEvent
2023-01-23 09:28:08
gradido/gradido
https://api.github.com/repos/gradido/gradido
closed
🐛 [Bug] [Design] Fix Mobile Design
bug service: wallet frontend
<!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates --> ## 🐛 Bugreport <!-- Describe your issue in detail. Include screenshots if needed. Give us as much information as possible. Use a clear and concise description of what the bug is.--> ### Mobile - [x] Startseite zu großer Abstand zwischen box & Konto infos - [x] Startseite button zweizeilig - [x] Kein Avatar im Menü - [x] Beim senden sind die Radioboxen nicht gleichgroß - [x] GDD&GDT Avatare oval - [x] GDD&GDT Aufklapp pfeil außerhalb der box - [ ] GDD&GDT Pagination zu groß für minimalen Mobile view(zeige nicht Seite 2 an, sondern nur Pfeile und aktuelle Seite) >>> @mahula please - [ ] Informations -> keinen außenabstand der boxen - [x] Mobile has horizontal scrollbar ![image](https://user-images.githubusercontent.com/1238238/208526639-f7cd00ce-9c58-4e33-8a67-091708f92daf.png) - [x] No round corners on mobile ![image](https://user-images.githubusercontent.com/1238238/208526842-5cde6020-392b-4838-bc3d-a37a348f2a7d.png) - [x] Mobile-Menu no avatar ![image](https://user-images.githubusercontent.com/1238238/208526970-9ba3fd33-6fb0-4dea-a950-6322dc694e83.png) - [x] Whats this for in the menu? ![image](https://user-images.githubusercontent.com/1238238/208527137-98a3e84c-9931-418c-b363-49c5406d03c6.png) - [x] Mobile header should have avatar(can be skipped if we put it in the menu) but the Menu button has no border ![image](https://user-images.githubusercontent.com/1238238/208527439-e13ce38b-05aa-4509-bd90-2e741d345120.png) - [x] Mobile-Menu should not be in a box ![image](https://user-images.githubusercontent.com/1238238/208527545-568fc473-3bf1-455d-a749-08e0cbd61dae.png)
1.0
🐛 [Bug] [Design] Fix Mobile Design - <!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates --> ## 🐛 Bugreport <!-- Describe your issue in detail. Include screenshots if needed. Give us as much information as possible. Use a clear and concise description of what the bug is.--> ### Mobile - [x] Startseite zu großer Abstand zwischen box & Konto infos - [x] Startseite button zweizeilig - [x] Kein Avatar im Menü - [x] Beim senden sind die Radioboxen nicht gleichgroß - [x] GDD&GDT Avatare oval - [x] GDD&GDT Aufklapp pfeil außerhalb der box - [ ] GDD&GDT Pagination zu groß für minimalen Mobile view(zeige nicht Seite 2 an, sondern nur Pfeile und aktuelle Seite) >>> @mahula please - [ ] Informations -> keinen außenabstand der boxen - [x] Mobile has horizontal scrollbar ![image](https://user-images.githubusercontent.com/1238238/208526639-f7cd00ce-9c58-4e33-8a67-091708f92daf.png) - [x] No round corners on mobile ![image](https://user-images.githubusercontent.com/1238238/208526842-5cde6020-392b-4838-bc3d-a37a348f2a7d.png) - [x] Mobile-Menu no avatar ![image](https://user-images.githubusercontent.com/1238238/208526970-9ba3fd33-6fb0-4dea-a950-6322dc694e83.png) - [x] Whats this for in the menu? ![image](https://user-images.githubusercontent.com/1238238/208527137-98a3e84c-9931-418c-b363-49c5406d03c6.png) - [x] Mobile header should have avatar(can be skipped if we put it in the menu) but the Menu button has no border ![image](https://user-images.githubusercontent.com/1238238/208527439-e13ce38b-05aa-4509-bd90-2e741d345120.png) - [x] Mobile-Menu should not be in a box ![image](https://user-images.githubusercontent.com/1238238/208527545-568fc473-3bf1-455d-a749-08e0cbd61dae.png)
non_priority
🐛 fix mobile design 🐛 bugreport mobile startseite zu großer abstand zwischen box konto infos startseite button zweizeilig kein avatar im menü beim senden sind die radioboxen nicht gleichgroß gdd gdt avatare oval gdd gdt aufklapp pfeil außerhalb der box gdd gdt pagination zu groß für minimalen mobile view zeige nicht seite an sondern nur pfeile und aktuelle seite mahula please informations keinen außenabstand der boxen mobile has horizontal scrollbar no round corners on mobile mobile menu no avatar whats this for in the menu mobile header should have avatar can be skipped if we put it in the menu but the menu button has no border mobile menu should not be in a box
0
14,158
3,806,745,434
IssuesEvent
2016-03-25 01:45:40
rosmod/webgme-rosmod
https://api.github.com/repos/rosmod/webgme-rosmod
opened
User guide for deployment and experiment models and infrastructure.
documentation
Should explain how the models work (containment hierarchy, etc.) as well as how they map to hosts on networks for execution. The end of this guide should be the execution of the `RunExperiment` plugin on a sample model and some explanation of how to get access the output of the experiments.
1.0
User guide for deployment and experiment models and infrastructure. - Should explain how the models work (containment hierarchy, etc.) as well as how they map to hosts on networks for execution. The end of this guide should be the execution of the `RunExperiment` plugin on a sample model and some explanation of how to get access the output of the experiments.
non_priority
user guide for deployment and experiment models and infrastructure should explain how the models work containment hierarchy etc as well as how they map to hosts on networks for execution the end of this guide should be the execution of the runexperiment plugin on a sample model and some explanation of how to get access the output of the experiments
0