Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
1k
labels
stringlengths
4
1.38k
body
stringlengths
1
262k
index
stringclasses
16 values
text_combine
stringlengths
96
262k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
452,084
32,049,445,667
IssuesEvent
2023-09-23 11:29:58
hxijxe/ict-inf2001-p3-6
https://api.github.com/repos/hxijxe/ict-inf2001-p3-6
closed
#Task 1.3.2: Detailed Use Case Description (UC-5 to UC-7)
documentation
Task title ID: https://github.com/hxijxe/ict-inf2001-p3-6/issues/12 What is the task about? Please describe in detail. The task involves creating detailed use case descriptions for Use Cases 5, 6 and 7, which are "Manage Shift", "Manage Shift Location" and "Manage Shift Preference" respectively. What are the goals of the task? Please describe in detail. The primary goals of this task are to create clear, well-structured use case descriptions for Use Cases 5, 6 and 7, ensuring alignment with project objectives, comprehensiveness, accuracy, and documentation quality. These descriptions will serve as valuable references for project stakeholders and developers, enhancing the management of work shifts and their corresponding locations within the system. Success or completion criteria. Please describe in detail. Completion of use case descriptions Allocated time 7 Days Start date and end date of the issue/task 13/09/23 - 19/09/23 Who is the owner? The owner is the person in-charge of the task and the task should be created and maintained by the owner. @avintech The status of the task. This is usually "To-Do" initially. Completed What is the Priority of the task? Medium
1.0
#Task 1.3.2: Detailed Use Case Description (UC-5 to UC-7) - Task title ID: https://github.com/hxijxe/ict-inf2001-p3-6/issues/12 What is the task about? Please describe in detail. The task involves creating detailed use case descriptions for Use Cases 5, 6 and 7, which are "Manage Shift", "Manage Shift Location" and "Manage Shift Preference" respectively. What are the goals of the task? Please describe in detail. The primary goals of this task are to create clear, well-structured use case descriptions for Use Cases 5, 6 and 7, ensuring alignment with project objectives, comprehensiveness, accuracy, and documentation quality. These descriptions will serve as valuable references for project stakeholders and developers, enhancing the management of work shifts and their corresponding locations within the system. Success or completion criteria. Please describe in detail. Completion of use case descriptions Allocated time 7 Days Start date and end date of the issue/task 13/09/23 - 19/09/23 Who is the owner? The owner is the person in-charge of the task and the task should be created and maintained by the owner. @avintech The status of the task. This is usually "To-Do" initially. Completed What is the Priority of the task? Medium
non_priority
task detailed use case description uc to uc task title id what is the task about please describe in detail the task involves creating detailed use case descriptions for use cases and which are manage shift manage shift location and manage shift preference respectively what are the goals of the task please describe in detail the primary goals of this task are to create clear well structured use case descriptions for use cases and ensuring alignment with project objectives comprehensiveness accuracy and documentation quality these descriptions will serve as valuable references for project stakeholders and developers enhancing the management of work shifts and their corresponding locations within the system success or completion criteria please describe in detail completion of use case descriptions allocated time days start date and end date of the issue task who is the owner the owner is the person in charge of the task and the task should be created and maintained by the owner avintech the status of the task this is usually to do initially completed what is the priority of the task medium
0
486,810
14,014,986,467
IssuesEvent
2020-10-29 12:43:51
geosolutions-it/austrocontrol-C125
https://api.github.com/repos/geosolutions-it/austrocontrol-C125
closed
Responsive Design - Info Box - Update of the WYSIWYG
Accepted Priority: Medium Project: C125
Update of the WYSIWYG used by the current Details tool to allow aligning and resizing images. Use the new WYSIWYG editor implemented for Stories (draftJS editor). This means not only adapting the new Text editor to the existing Details tool, but also readapting it in order to include and manage additional utilities to allow operations on images, that are available only using the new WYSIWYG (the [Image](https://www.draft-js-plugins.com/plugin/image) and other plugins that allows to align images, **_the example Alignment + Resize + Focus + Drag’n’drop_** seems near to the desired behaviour). The most part of the estimate reported in the tasklist is needed to accomplish this specific task. ![image](https://user-images.githubusercontent.com/1280027/77438252-debba800-6de5-11ea-8fec-fe6920afb6f6.png)
1.0
Responsive Design - Info Box - Update of the WYSIWYG - Update of the WYSIWYG used by the current Details tool to allow aligning and resizing images. Use the new WYSIWYG editor implemented for Stories (draftJS editor). This means not only adapting the new Text editor to the existing Details tool, but also readapting it in order to include and manage additional utilities to allow operations on images, that are available only using the new WYSIWYG (the [Image](https://www.draft-js-plugins.com/plugin/image) and other plugins that allows to align images, **_the example Alignment + Resize + Focus + Drag’n’drop_** seems near to the desired behaviour). The most part of the estimate reported in the tasklist is needed to accomplish this specific task. ![image](https://user-images.githubusercontent.com/1280027/77438252-debba800-6de5-11ea-8fec-fe6920afb6f6.png)
priority
responsive design info box update of the wysiwyg update of the wysiwyg used by the current details tool to allow aligning and resizing images use the new wysiwyg editor implemented for stories draftjs editor this means not only adapting the new text editor to the existing details tool but also readapting it in order to include and manage additional utilities to allow operations on images that are available only using the new wysiwyg the and other plugins that allows to align images the example alignment resize focus drag’n’drop seems near to the desired behaviour the most part of the estimate reported in the tasklist is needed to accomplish this specific task
1
477,822
13,768,920,478
IssuesEvent
2020-10-07 17:48:49
zephyrproject-rtos/zephyr
https://api.github.com/repos/zephyrproject-rtos/zephyr
opened
[Coverity CID :214875] Dereference after null check in subsys/emul/spi/emul_bmi160.c
Coverity bug priority: low
Static code scan issues found in file: https://github.com/zephyrproject-rtos/zephyr/tree/master/subsys/emul/spi/emul_bmi160.c Category: Null pointer dereferences Function: `bmi160_emul_io` Component: Other CID: [214875](https://scan9.coverity.com/reports.htm#v29726/p12996/mergedDefectId=214875) Please fix or provide comments in coverity using the link: https://scan9.coverity.com/reports.htm#v32951/p12996. Note: This issue was created automatically. Priority was set based on classification of the file affected and the impact field in coverity. Assignees were set using the CODEOWNERS file.
1.0
[Coverity CID :214875] Dereference after null check in subsys/emul/spi/emul_bmi160.c - Static code scan issues found in file: https://github.com/zephyrproject-rtos/zephyr/tree/master/subsys/emul/spi/emul_bmi160.c Category: Null pointer dereferences Function: `bmi160_emul_io` Component: Other CID: [214875](https://scan9.coverity.com/reports.htm#v29726/p12996/mergedDefectId=214875) Please fix or provide comments in coverity using the link: https://scan9.coverity.com/reports.htm#v32951/p12996. Note: This issue was created automatically. Priority was set based on classification of the file affected and the impact field in coverity. Assignees were set using the CODEOWNERS file.
priority
dereference after null check in subsys emul spi emul c static code scan issues found in file category null pointer dereferences function emul io component other cid please fix or provide comments in coverity using the link note this issue was created automatically priority was set based on classification of the file affected and the impact field in coverity assignees were set using the codeowners file
1
28,361
5,242,753,496
IssuesEvent
2017-01-31 18:53:55
bridgedotnet/Bridge
https://api.github.com/repos/bridgedotnet/Bridge
closed
Can't resolve generic alias in method<TA> from within Action<TB<TC>>
defect in progress
### Steps To Reproduce http://deck.net/7c9c1ee892b60cdcd72febeeb3b3c078 ```c# public struct V2<TA, TB> { public TA a; public TB b; } public interface IThing<TC,TD> { void MyMethod(); } public class BugTest<TX> { IThing<V2<TX,double>,V2<double,double>> _MyThing; public void DoStuff() { Action<V2<TX, double>> func = v => _MyThing.MyMethod(); } } ``` ### Expected Result ```js ?? ``` ### Actual Result ```js var func = Bridge.fn.bind(this, function (v) { this._MyThing["ClassLibrary1$IThing$2$ClassLibrary1$V2$2$" + Bridge.getTypeAlias(TX) + "$System$Double"$ClassLibrary1$V2$2$System$Double$System$Double$myMethod"](); }); ``` Related: * http://forums.bridge.net/forum/bridge-net-pro/bugs/3379-javascript-can-t-resolve-call-to-method-ta-from-within-action-tb-tc
1.0
Can't resolve generic alias in method<TA> from within Action<TB<TC>> - ### Steps To Reproduce http://deck.net/7c9c1ee892b60cdcd72febeeb3b3c078 ```c# public struct V2<TA, TB> { public TA a; public TB b; } public interface IThing<TC,TD> { void MyMethod(); } public class BugTest<TX> { IThing<V2<TX,double>,V2<double,double>> _MyThing; public void DoStuff() { Action<V2<TX, double>> func = v => _MyThing.MyMethod(); } } ``` ### Expected Result ```js ?? ``` ### Actual Result ```js var func = Bridge.fn.bind(this, function (v) { this._MyThing["ClassLibrary1$IThing$2$ClassLibrary1$V2$2$" + Bridge.getTypeAlias(TX) + "$System$Double"$ClassLibrary1$V2$2$System$Double$System$Double$myMethod"](); }); ``` Related: * http://forums.bridge.net/forum/bridge-net-pro/bugs/3379-javascript-can-t-resolve-call-to-method-ta-from-within-action-tb-tc
non_priority
can t resolve generic alias in method from within action steps to reproduce c public struct public ta a public tb b public interface ithing void mymethod public class bugtest ithing mything public void dostuff action func v mything mymethod expected result js actual result js var func bridge fn bind this function v this mything related
0
41,625
21,796,761,320
IssuesEvent
2022-05-15 18:54:05
antlr/antlr4
https://api.github.com/repos/antlr/antlr4
opened
ANTLR tool takes 6s to process 1772 line parser grammar
atn-analysis grammars comp:performance
[issue was identified in plugin](https://github.com/antlr/intellij-plugin-v4/issues/553) by @KitsuneAlex This [FerrousParser.g4](https://git.karmakrafts.dev/kk/ferrous-project/vanadium/-/blob/master/src/main/antlr/FerrousParser.g4) takes 6s to process with antlr tool. It seems to be stuck in SLL(1) static analysis. Could be murmur hash. @sharwell This likely affects your optimized fork as well. Simple test rig: ```java import org.antlr.runtime.ANTLRFileStream; import org.antlr.runtime.ANTLRStringStream; import org.antlr.v4.Tool; import org.antlr.v4.tool.Grammar; import org.antlr.v4.tool.ast.GrammarRootAST; import java.io.IOException; public class TestANTLRParse { public static void main(String[] args) throws IOException { long start = System.nanoTime(); runANTLR(args[0]); long time_ns = System.nanoTime() - start; double parseTimeMS = time_ns/(1000.0*1000.0); System.err.println("Exec time to process "+args[0]+": "+parseTimeMS+"ms"); } private static void runANTLR(String grammarFileName) throws IOException { Tool antlr = new Tool(); ANTLRStringStream in = new ANTLRFileStream(grammarFileName); GrammarRootAST grammarRootAST = antlr.parse(grammarFileName, in); // Create a grammar from the AST so we can figure out what type it is Grammar g = antlr.createGrammar(grammarRootAST); antlr.process(g, false); } } ``` I see this on M1 mac mini: ``` Exec time to process /Users/parrt/tmp/FerrousParser.g4: 5984.826209ms ```
True
ANTLR tool takes 6s to process 1772 line parser grammar - [issue was identified in plugin](https://github.com/antlr/intellij-plugin-v4/issues/553) by @KitsuneAlex This [FerrousParser.g4](https://git.karmakrafts.dev/kk/ferrous-project/vanadium/-/blob/master/src/main/antlr/FerrousParser.g4) takes 6s to process with antlr tool. It seems to be stuck in SLL(1) static analysis. Could be murmur hash. @sharwell This likely affects your optimized fork as well. Simple test rig: ```java import org.antlr.runtime.ANTLRFileStream; import org.antlr.runtime.ANTLRStringStream; import org.antlr.v4.Tool; import org.antlr.v4.tool.Grammar; import org.antlr.v4.tool.ast.GrammarRootAST; import java.io.IOException; public class TestANTLRParse { public static void main(String[] args) throws IOException { long start = System.nanoTime(); runANTLR(args[0]); long time_ns = System.nanoTime() - start; double parseTimeMS = time_ns/(1000.0*1000.0); System.err.println("Exec time to process "+args[0]+": "+parseTimeMS+"ms"); } private static void runANTLR(String grammarFileName) throws IOException { Tool antlr = new Tool(); ANTLRStringStream in = new ANTLRFileStream(grammarFileName); GrammarRootAST grammarRootAST = antlr.parse(grammarFileName, in); // Create a grammar from the AST so we can figure out what type it is Grammar g = antlr.createGrammar(grammarRootAST); antlr.process(g, false); } } ``` I see this on M1 mac mini: ``` Exec time to process /Users/parrt/tmp/FerrousParser.g4: 5984.826209ms ```
non_priority
antlr tool takes to process line parser grammar by kitsunealex this takes to process with antlr tool it seems to be stuck in sll static analysis could be murmur hash sharwell this likely affects your optimized fork as well simple test rig java import org antlr runtime antlrfilestream import org antlr runtime antlrstringstream import org antlr tool import org antlr tool grammar import org antlr tool ast grammarrootast import java io ioexception public class testantlrparse public static void main string args throws ioexception long start system nanotime runantlr args long time ns system nanotime start double parsetimems time ns system err println exec time to process args parsetimems ms private static void runantlr string grammarfilename throws ioexception tool antlr new tool antlrstringstream in new antlrfilestream grammarfilename grammarrootast grammarrootast antlr parse grammarfilename in create a grammar from the ast so we can figure out what type it is grammar g antlr creategrammar grammarrootast antlr process g false i see this on mac mini exec time to process users parrt tmp ferrousparser
0
131,160
18,214,761,869
IssuesEvent
2021-09-30 01:53:04
tt9133github/Python
https://api.github.com/repos/tt9133github/Python
opened
CVE-2021-29063 (High) detected in mpmath-1.1.0.tar.gz
security vulnerability
## CVE-2021-29063 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mpmath-1.1.0.tar.gz</b></p></summary> <p>Python library for arbitrary-precision floating-point arithmetic</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/ca/63/3384ebb3b51af9610086b23ea976e6d27d6d97bf140a76a365bd77a3eb32/mpmath-1.1.0.tar.gz">https://files.pythonhosted.org/packages/ca/63/3384ebb3b51af9610086b23ea976e6d27d6d97bf140a76a365bd77a3eb32/mpmath-1.1.0.tar.gz</a></p> <p>Path to dependency file: Python/optimization/requirements.txt</p> <p>Path to vulnerable library: Python/optimization/requirements.txt,Python/requirements.txt</p> <p> Dependency Hierarchy: - sympy-1.5.1-py2.py3-none-any.whl (Root Library) - :x: **mpmath-1.1.0.tar.gz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.0.0 when the mpmathify function is called. <p>Publish Date: 2021-06-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29063>CVE-2021-29063</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-29063 (High) detected in mpmath-1.1.0.tar.gz - ## CVE-2021-29063 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mpmath-1.1.0.tar.gz</b></p></summary> <p>Python library for arbitrary-precision floating-point arithmetic</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/ca/63/3384ebb3b51af9610086b23ea976e6d27d6d97bf140a76a365bd77a3eb32/mpmath-1.1.0.tar.gz">https://files.pythonhosted.org/packages/ca/63/3384ebb3b51af9610086b23ea976e6d27d6d97bf140a76a365bd77a3eb32/mpmath-1.1.0.tar.gz</a></p> <p>Path to dependency file: Python/optimization/requirements.txt</p> <p>Path to vulnerable library: Python/optimization/requirements.txt,Python/requirements.txt</p> <p> Dependency Hierarchy: - sympy-1.5.1-py2.py3-none-any.whl (Root Library) - :x: **mpmath-1.1.0.tar.gz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.0.0 when the mpmathify function is called. <p>Publish Date: 2021-06-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29063>CVE-2021-29063</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in mpmath tar gz cve high severity vulnerability vulnerable library mpmath tar gz python library for arbitrary precision floating point arithmetic library home page a href path to dependency file python optimization requirements txt path to vulnerable library python optimization requirements txt python requirements txt dependency hierarchy sympy none any whl root library x mpmath tar gz vulnerable library vulnerability details a regular expression denial of service redos vulnerability was discovered in mpmath when the mpmathify function is called publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource
0
7,573
2,911,335,793
IssuesEvent
2015-06-22 08:52:45
red/red
https://api.github.com/repos/red/red
closed
length? on tuple!
Red status.built status.tested type.review
red>> length? 1.2.3 *** Script error: length? does not allow tuple for its series argument *** Where: length?
1.0
length? on tuple! - red>> length? 1.2.3 *** Script error: length? does not allow tuple for its series argument *** Where: length?
non_priority
length on tuple red length script error length does not allow tuple for its series argument where length
0
333,116
24,364,643,951
IssuesEvent
2022-10-03 14:19:24
r-lib/pak
https://api.github.com/repos/r-lib/pak
closed
`?ignore`d packages is not ignored
documentation
Related to #421, I'm trying to ignore the package `lixoftConnectors` when installing dependencies. When I used `lixoftConnectors?ignore` in the `extra-packages` list, I got the following error indicating that it was not ignored: https://github.com/nlmixr2/babelmixr2/actions/runs/3169455077/jobs/5161378366#step:5:109 The instructions I used were: https://github.com/nlmixr2/babelmixr2/blob/5bd330353cf4ad0b62d0223b656246672119e3b1/.github/workflows/R-CMD-check.yaml#L45-L55 I was trying to follow the instructions here: https://github.com/r-lib/actions/tree/v2-branch/setup-r-dependencies#ignoring-optional-dependencies
1.0
`?ignore`d packages is not ignored - Related to #421, I'm trying to ignore the package `lixoftConnectors` when installing dependencies. When I used `lixoftConnectors?ignore` in the `extra-packages` list, I got the following error indicating that it was not ignored: https://github.com/nlmixr2/babelmixr2/actions/runs/3169455077/jobs/5161378366#step:5:109 The instructions I used were: https://github.com/nlmixr2/babelmixr2/blob/5bd330353cf4ad0b62d0223b656246672119e3b1/.github/workflows/R-CMD-check.yaml#L45-L55 I was trying to follow the instructions here: https://github.com/r-lib/actions/tree/v2-branch/setup-r-dependencies#ignoring-optional-dependencies
non_priority
ignore d packages is not ignored related to i m trying to ignore the package lixoftconnectors when installing dependencies when i used lixoftconnectors ignore in the extra packages list i got the following error indicating that it was not ignored the instructions i used were i was trying to follow the instructions here
0
61,174
14,942,775,629
IssuesEvent
2021-01-25 21:50:58
quicklisp/quicklisp-projects
https://api.github.com/repos/quicklisp/quicklisp-projects
closed
Please add inheriting-readers
canbuild
inheriting-readers provides a simple yet powerful value inheritance scheme. Project's home: https://www.hexstreamsoft.com/libraries/inheriting-readers/ GitHub: https://github.com/Hexstream/inheriting-readers Quicklisp should pull from the tarball: https://tarballs.hexstreamsoft.com/libraries/latest/inheriting-readers_latest.tar.gz
1.0
Please add inheriting-readers - inheriting-readers provides a simple yet powerful value inheritance scheme. Project's home: https://www.hexstreamsoft.com/libraries/inheriting-readers/ GitHub: https://github.com/Hexstream/inheriting-readers Quicklisp should pull from the tarball: https://tarballs.hexstreamsoft.com/libraries/latest/inheriting-readers_latest.tar.gz
non_priority
please add inheriting readers inheriting readers provides a simple yet powerful value inheritance scheme project s home github quicklisp should pull from the tarball
0
115,740
14,882,456,588
IssuesEvent
2021-01-20 11:55:55
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
[APM] Discovery - need to re-evaluate implementation of filters and kuery bar across APM UI
Team:apm [zube]: Backlog discuss needs design
**Describe the feature:** APM already offers various filters on different pages, like environments, hosts, K8s pods, containers, etc. In 7.8 we started adding cloud metadata to be collected by APM agents. ![image](https://user-images.githubusercontent.com/61838744/88115354-d0e71b00-cb6a-11ea-9dd5-3b1c3a36072e.png) On top of that some of the filters are used to track integrations across other observability UI into APM. This issue would be used to perform discovery and design which filters need to be available for each screen, how they would persist when linking from one screen to another, and what would be used when linking from other UI pages into APM. I suggest we perform this discovery before proceeding with https://github.com/elastic/kibana/issues/49153
1.0
[APM] Discovery - need to re-evaluate implementation of filters and kuery bar across APM UI - **Describe the feature:** APM already offers various filters on different pages, like environments, hosts, K8s pods, containers, etc. In 7.8 we started adding cloud metadata to be collected by APM agents. ![image](https://user-images.githubusercontent.com/61838744/88115354-d0e71b00-cb6a-11ea-9dd5-3b1c3a36072e.png) On top of that some of the filters are used to track integrations across other observability UI into APM. This issue would be used to perform discovery and design which filters need to be available for each screen, how they would persist when linking from one screen to another, and what would be used when linking from other UI pages into APM. I suggest we perform this discovery before proceeding with https://github.com/elastic/kibana/issues/49153
non_priority
discovery need to re evaluate implementation of filters and kuery bar across apm ui describe the feature apm already offers various filters on different pages like environments hosts pods containers etc in we started adding cloud metadata to be collected by apm agents on top of that some of the filters are used to track integrations across other observability ui into apm this issue would be used to perform discovery and design which filters need to be available for each screen how they would persist when linking from one screen to another and what would be used when linking from other ui pages into apm i suggest we perform this discovery before proceeding with
0
231,925
17,761,269,412
IssuesEvent
2021-08-29 18:43:27
fuchicorp/main
https://api.github.com/repos/fuchicorp/main
closed
6. Deploy ELK-Stack to bastion-host
Kubernetes Priority High Bastion Bash Scripting Require Documentation elastic-search kibana basic
We are going to deploy ELK-Stack to our bastion-host so we can understand how it works. Here's the Github repo with documentation to follow! https://github.com/fuchicorp/elk-stack Thanks! Lale
1.0
6. Deploy ELK-Stack to bastion-host - We are going to deploy ELK-Stack to our bastion-host so we can understand how it works. Here's the Github repo with documentation to follow! https://github.com/fuchicorp/elk-stack Thanks! Lale
non_priority
deploy elk stack to bastion host we are going to deploy elk stack to our bastion host so we can understand how it works here s the github repo with documentation to follow thanks lale
0
274,571
8,563,113,978
IssuesEvent
2018-11-09 13:01:19
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
durington.info - see bug description
browser-firefox priority-normal type-search-hijacking
<!-- @browser: Firefox 64.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0 --> <!-- @reported_with: desktop-reporter --> **URL**: https://durington.info/XZEYY?tag_id=715349&sub_id1=59&sub_id2=BF78A1D5-713D-4674-8E18-492B43CFC078&cookie_id=9cedd5fa-dc74-4e95-8463-547442c3e7ef&lp=blank&tb=redirect&allb=redirect&ob=redirect **Browser / Version**: Firefox 64.0 **Operating System**: Windows 7 **Tested Another Browser**: Yes **Problem type**: Something else **Description**: It opens always in background. use cmd prompt. automatic opening of site.. hangs pc.. irritable **Steps to Reproduce**: It seems like a work of virus. [![Screenshot Description](https://webcompat.com/uploads/2018/11/b6523205-5ccd-4ff2-8f5f-f4472aba587f-thumb.jpeg)](https://webcompat.com/uploads/2018/11/b6523205-5ccd-4ff2-8f5f-f4472aba587f.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20181105164654</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: false</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: beta</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
durington.info - see bug description - <!-- @browser: Firefox 64.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0 --> <!-- @reported_with: desktop-reporter --> **URL**: https://durington.info/XZEYY?tag_id=715349&sub_id1=59&sub_id2=BF78A1D5-713D-4674-8E18-492B43CFC078&cookie_id=9cedd5fa-dc74-4e95-8463-547442c3e7ef&lp=blank&tb=redirect&allb=redirect&ob=redirect **Browser / Version**: Firefox 64.0 **Operating System**: Windows 7 **Tested Another Browser**: Yes **Problem type**: Something else **Description**: It opens always in background. use cmd prompt. automatic opening of site.. hangs pc.. irritable **Steps to Reproduce**: It seems like a work of virus. [![Screenshot Description](https://webcompat.com/uploads/2018/11/b6523205-5ccd-4ff2-8f5f-f4472aba587f-thumb.jpeg)](https://webcompat.com/uploads/2018/11/b6523205-5ccd-4ff2-8f5f-f4472aba587f.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20181105164654</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: false</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: beta</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
durington info see bug description url browser version firefox operating system windows tested another browser yes problem type something else description it opens always in background use cmd prompt automatic opening of site hangs pc irritable steps to reproduce it seems like a work of virus browser configuration mixed active content blocked false image mem shared true buildid tracking content blocked false gfx webrender blob images true hastouchscreen false mixed passive content blocked false gfx webrender enabled false gfx webrender all false channel beta from with ❤️
1
12,942
3,103,153,537
IssuesEvent
2015-08-31 07:49:14
osakagamba/7GIQSKRNE5P3AVTZCEFXE3ON
https://api.github.com/repos/osakagamba/7GIQSKRNE5P3AVTZCEFXE3ON
closed
bIHT0vqN8SdqTWLmpVrcP2ptQn9f/r5zfwHcPK5Bi5Jbc6tjAKhtPfVNhyuvf0VVpn3CHe+TRHT9hicK8WovClCK2CorvLKpiXQShxYDhPk+tgNtYW3RtigSXrjmqVs/12SMzG2Dt/ioHl/ZqsiAWkY39nLpWvhd7SzTbK+oMBY=
design
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
1.0
bIHT0vqN8SdqTWLmpVrcP2ptQn9f/r5zfwHcPK5Bi5Jbc6tjAKhtPfVNhyuvf0VVpn3CHe+TRHT9hicK8WovClCK2CorvLKpiXQShxYDhPk+tgNtYW3RtigSXrjmqVs/12SMzG2Dt/ioHl/ZqsiAWkY39nLpWvhd7SzTbK+oMBY= - fSS166lCfoE0L/zWHg5ySeyyN7zoU8dIgazEwBHybrI77oJrNZpSxN1DbyM+ZGGKUURPhxnRWARiyiOJorKJAWdQFC3ksbfOgHl6wteiUO0SCGQaNeUA9B5p9gbAYJAHcB35cTVPy6NONuxGywlJVe7KJ1dUhHzMk4cHqkBS6MDb51l8HTHEvpWXtOOwPKPbr0iJSXQO0Ht+TC+b0JUvJdSxry4SiKMjyJiyBzj+z77trt2teMTI6yzQMkj22IR4r0iJSXQO0Ht+TC+b0JUvJVxgQZqyN9vzuf9yHSffgAe5ccrSKRaievUIyJKo/LKDr0iJSXQO0Ht+TC+b0JUvJS0OM6S4KzzMmIDtiS818glQYkXkphHyede4xlCkEi68r0iJSXQO0Ht+TC+b0JUvJQUH+R6RRAoRyV8Q+ujq5yZ9KSYE1bsqYQ74blVAE83TEMs3tnuPBKhgh3rk2PAMvByR3Z7EMc8bFHfAsnCAkollEfGKEhC1I9uBrT3tCBLIOCXLFUMsf7XEJRzwNAvAAK9IiUl0DtB7fkwvm9CVLyUs8vEEW4aPhy7tcr1m49X00AiU5vpfh8R+dlJ38AAFnq9IiUl0DtB7fkwvm9CVLyX8/+LkJPLfRpLFTSiM6xcD5hm37oLaieAPjIoliAdvBwFCGqB6jErGtcAMRF4wc+ppl3fp7P9A+1XwzWWQXw0qRn68g2OPLCGzHsPkR5gJcdDe5kSLYboddq0femHiH/C6354jnshBi/tKgRCWQqIzWDS2NmiRk3v4ef3t8UTCscRVZEgvOpdrp8VOelITvXpBOfu5fe5ZpnoyyUP5INHLVHl9Lp3SsYygEjnVeCAevJB7Lj86o5xOCDgjRxbG248BTQo9EErXzuPhmxGadSEMV4K9fx/0EUMS5g9pK+nLYsiz+kEODRg7rZID7xLWbRAaKXlD/hANHjNWsi1YAaWOFQA5AsNCXL57/xyQXlBkoomYBwrUfhj+cIlqw87gpwJqSsx0EEgRWIsQIBi5g7bg7CYURv3lpozfOlx80+3IgNNBPPK2v5I1d/S74y6soxCvSIlJdA7Qe35ML5vQlS8lR+MWcDd0tIYGSuv990uMEPRpm8YQ4VjImxa7fQwacpCtEUNaTQhjDLC21AGq7wV89m1IOnl96Y6UGShYZSNC/a9IiUl0DtB7fkwvm9CVLyWbcM3mkuJKNr0tm7ZBvxXEC+J3VH+gvXepGdOSe1U3bK9IiUl0DtB7fkwvm9CVLyWnxibe2G94S3QyKCzdr0zDbE8F5TifMdDuQhnyCTTyVqucr9K0lKLgmU2l2vqVi+NOz6wkexrxwAZIZI6SZK+h3uwpoi0BAGQs9VtBnb4YiZC2KUJ8s/VKfImX3A01r8SsFb6YT3YdOTViydxM3xp8qr84fc3WIv6AjaLIkO61iP+AxE4jhaOLjByVEeKXU4CQtilCfLP1SnyJl9wNNa/EUN2wbMRg0nGWWtucW9J1BpZ/ownicmRBvLuOBIg/uXs+sKW8Yk+24+PsaOjezWh5lub/9BHrcNLLhTCS1++ZBcrOCIEX7HTQbHbsbvCnDwrzAN/fAh90RxDvIwpWtk1dF7YcIojwFv4g4AnHSqFciT6/AGSuC4mMVBvltr0OtcnE/HCBaBD5GFsoj1ruuN82
non_priority
iohl omby tc tc tc tc nlysiz xyqxlbkoomybwrufhj ownicmrbvluobig uxs
0
66,017
12,702,963,867
IssuesEvent
2020-06-22 21:14:09
kubernetes/kubernetes
https://api.github.com/repos/kubernetes/kubernetes
closed
Document the use of import-boss
area/code-organization kind/bug kind/documentation priority/important-longterm sig/testing
[import-boss](https://github.com/kubernetes/kubernetes/blob/master/staging/src/k8s.io/code-generator/cmd/import-boss/main.go) is used in our CI tests ([./hack/verify-import-boss.sh](https://github.com/kubernetes/kubernetes/blob/master/hack/verify-import-boss.sh)) to verify import restrictions in various places throughout k/k. Currently, the only existing documentation is within the script itself and this. xref: https://github.com/kubernetes/kubernetes/issues/81102 - import-boss ignores import in a _test.go file xref: https://github.com/kubernetes/kubernetes/issues/81803 - failed to implement verify import restrictions in the e2 test framework. Seems that import-boss is owned by API machinery /sig api-machinery /area code-organization /kind documentation /priority important-longterm /cc @jaypipes
1.0
Document the use of import-boss - [import-boss](https://github.com/kubernetes/kubernetes/blob/master/staging/src/k8s.io/code-generator/cmd/import-boss/main.go) is used in our CI tests ([./hack/verify-import-boss.sh](https://github.com/kubernetes/kubernetes/blob/master/hack/verify-import-boss.sh)) to verify import restrictions in various places throughout k/k. Currently, the only existing documentation is within the script itself and this. xref: https://github.com/kubernetes/kubernetes/issues/81102 - import-boss ignores import in a _test.go file xref: https://github.com/kubernetes/kubernetes/issues/81803 - failed to implement verify import restrictions in the e2 test framework. Seems that import-boss is owned by API machinery /sig api-machinery /area code-organization /kind documentation /priority important-longterm /cc @jaypipes
non_priority
document the use of import boss is used in our ci tests to verify import restrictions in various places throughout k k currently the only existing documentation is within the script itself and this xref import boss ignores import in a test go file xref failed to implement verify import restrictions in the test framework seems that import boss is owned by api machinery sig api machinery area code organization kind documentation priority important longterm cc jaypipes
0
153,926
5,906,082,427
IssuesEvent
2017-05-19 14:23:53
swimlane/ngx-charts
https://api.github.com/repos/swimlane/ngx-charts
closed
turn off transition (live data)
Backlog Effort: High Enhancement Priority: Med
**I'm submitting a ...** (check one with "x") ``` [ ] bug report => search github for a similar issue or PR before submitting [x] feature request [ ] support request => Please do not submit support request here ``` **Current behavior** plunkr: [https://plnkr.co/edit/Nij7gO4jgqdN2mNPIFJp](https://plnkr.co/edit/Nij7gO4jgqdN2mNPIFJp) **Expected behavior** Shift the points + area left (previous position) without transition. (Only the new point and the corresponding area would use transition or simply appear). **Reproduction of the problem** [https://plnkr.co/edit/Nij7gO4jgqdN2mNPIFJp](https://plnkr.co/edit/Nij7gO4jgqdN2mNPIFJp) **What is the motivation / use case for changing the behavior?** As shown in the plunkr, it looks strange when the result set is updated with the new value. There is a transition between every point + area. Would be handy if this transition was optional. **Please tell us about your environment:** Windows, npm * **Angular version:** 2.x.x 4.0.1 * **Browser:** [all | Chrome XX | Firefox XX | IE XX | Safari XX | Mobile Chrome XX | Android X.X Web Browser | iOS XX Safari | iOS XX UIWebView | iOS XX WKWebView ] Chrome Version 57.0.2987.133 (64-bit) * **Language:** [all | TypeScript X.X | ES6/7 | ES5] TypeScript 2.3.2
1.0
turn off transition (live data) - **I'm submitting a ...** (check one with "x") ``` [ ] bug report => search github for a similar issue or PR before submitting [x] feature request [ ] support request => Please do not submit support request here ``` **Current behavior** plunkr: [https://plnkr.co/edit/Nij7gO4jgqdN2mNPIFJp](https://plnkr.co/edit/Nij7gO4jgqdN2mNPIFJp) **Expected behavior** Shift the points + area left (previous position) without transition. (Only the new point and the corresponding area would use transition or simply appear). **Reproduction of the problem** [https://plnkr.co/edit/Nij7gO4jgqdN2mNPIFJp](https://plnkr.co/edit/Nij7gO4jgqdN2mNPIFJp) **What is the motivation / use case for changing the behavior?** As shown in the plunkr, it looks strange when the result set is updated with the new value. There is a transition between every point + area. Would be handy if this transition was optional. **Please tell us about your environment:** Windows, npm * **Angular version:** 2.x.x 4.0.1 * **Browser:** [all | Chrome XX | Firefox XX | IE XX | Safari XX | Mobile Chrome XX | Android X.X Web Browser | iOS XX Safari | iOS XX UIWebView | iOS XX WKWebView ] Chrome Version 57.0.2987.133 (64-bit) * **Language:** [all | TypeScript X.X | ES6/7 | ES5] TypeScript 2.3.2
priority
turn off transition live data i m submitting a check one with x bug report search github for a similar issue or pr before submitting feature request support request please do not submit support request here current behavior plunkr expected behavior shift the points area left previous position without transition only the new point and the corresponding area would use transition or simply appear reproduction of the problem what is the motivation use case for changing the behavior as shown in the plunkr it looks strange when the result set is updated with the new value there is a transition between every point area would be handy if this transition was optional please tell us about your environment windows npm angular version x x browser chrome version bit language typescript
1
646,070
21,036,357,246
IssuesEvent
2022-03-31 08:13:57
AY2122S2-CS2103-F11-2/tp
https://api.github.com/repos/AY2122S2-CS2103-F11-2/tp
opened
Update `Help` window
type.Bug priority.Medium Functionality
Currently the help window does not contain all available commands in this version. Let's update it to contain all commands.
1.0
Update `Help` window - Currently the help window does not contain all available commands in this version. Let's update it to contain all commands.
priority
update help window currently the help window does not contain all available commands in this version let s update it to contain all commands
1
309,691
26,672,684,081
IssuesEvent
2023-01-26 11:44:00
MarinoFajardo/ControlaTuGasto
https://api.github.com/repos/MarinoFajardo/ControlaTuGasto
closed
[M2] Es necesario comprobar que el comportamiento de la clase parada es el esperado.
invalid test
En #25 de describen una serie de comportamientos que debe cumplir la clase parada para que su funcionamiento sea el esperado: - Para comprobar el comportamiento correcto de esta clase, es necesario que si dos paradas tienen el mismo id sean la misma parada, es decir, no puede haber dos paradas que tengan el mismo id y no sean exactamente iguales. Esto es así ya que sino se producirían confusiones con las paradas. A raíz de estos comportamientos es necesario diseñar los test que comprueben que el comportamiento es el esperado. * [x] Dos paradas no pueden tener el mismo id.
1.0
[M2] Es necesario comprobar que el comportamiento de la clase parada es el esperado. - En #25 de describen una serie de comportamientos que debe cumplir la clase parada para que su funcionamiento sea el esperado: - Para comprobar el comportamiento correcto de esta clase, es necesario que si dos paradas tienen el mismo id sean la misma parada, es decir, no puede haber dos paradas que tengan el mismo id y no sean exactamente iguales. Esto es así ya que sino se producirían confusiones con las paradas. A raíz de estos comportamientos es necesario diseñar los test que comprueben que el comportamiento es el esperado. * [x] Dos paradas no pueden tener el mismo id.
non_priority
es necesario comprobar que el comportamiento de la clase parada es el esperado en de describen una serie de comportamientos que debe cumplir la clase parada para que su funcionamiento sea el esperado para comprobar el comportamiento correcto de esta clase es necesario que si dos paradas tienen el mismo id sean la misma parada es decir no puede haber dos paradas que tengan el mismo id y no sean exactamente iguales esto es así ya que sino se producirían confusiones con las paradas a raíz de estos comportamientos es necesario diseñar los test que comprueben que el comportamiento es el esperado dos paradas no pueden tener el mismo id
0
424,872
29,181,547,129
IssuesEvent
2023-05-19 12:20:15
awslabs/aws-lambda-powertools-typescript
https://api.github.com/repos/awslabs/aws-lambda-powertools-typescript
closed
Docs: fix inappropriate hilighted lines
area/documentation status/discussing
### What were you searching in the docs? Some highlighted lines in the sample code are inappropriate. Some are pointing to the wrong place, others to a line that does not exist. The most obvious example is the "Example CloudWatch Logs excerpt" in Metric's "Adding metadata". It should be specified by highlighting the metadata on line 31. ### Is this related to an existing documentation section? https://awslabs.github.io/aws-lambda-powertools-typescript/latest/core/metrics/#adding-metadata ### How can we improve? Review and fix the highlighted lines in the code sample to ensure that they are correct. ### Got a suggestion in mind? _No response_ ### Acknowledgment - [X] I understand the final update might be different from my proposed suggestion, or refused.
1.0
Docs: fix inappropriate hilighted lines - ### What were you searching in the docs? Some highlighted lines in the sample code are inappropriate. Some are pointing to the wrong place, others to a line that does not exist. The most obvious example is the "Example CloudWatch Logs excerpt" in Metric's "Adding metadata". It should be specified by highlighting the metadata on line 31. ### Is this related to an existing documentation section? https://awslabs.github.io/aws-lambda-powertools-typescript/latest/core/metrics/#adding-metadata ### How can we improve? Review and fix the highlighted lines in the code sample to ensure that they are correct. ### Got a suggestion in mind? _No response_ ### Acknowledgment - [X] I understand the final update might be different from my proposed suggestion, or refused.
non_priority
docs fix inappropriate hilighted lines what were you searching in the docs some highlighted lines in the sample code are inappropriate some are pointing to the wrong place others to a line that does not exist the most obvious example is the example cloudwatch logs excerpt in metric s adding metadata it should be specified by highlighting the metadata on line is this related to an existing documentation section how can we improve review and fix the highlighted lines in the code sample to ensure that they are correct got a suggestion in mind no response acknowledgment i understand the final update might be different from my proposed suggestion or refused
0
642,332
20,885,321,461
IssuesEvent
2022-03-23 04:00:12
CobeyH/SENG-480A
https://api.github.com/repos/CobeyH/SENG-480A
closed
Icon sizes are too big on Safari
bug A Priority 1
**Describe the bug** When creating a group on Safari, the icon profile pictures aren't the correct size. **To Reproduce** Steps to reproduce the behavior: 1. Open the app on Safari 2. Create a new group 3. View the "Icon Profile Pictures" **Expected behavior** The icons will look the same on Safari and Chrome. **Screenshots** ![image](https://user-images.githubusercontent.com/32989729/158911293-f180d9b3-9960-46df-b896-041926da10b1.png)
1.0
Icon sizes are too big on Safari - **Describe the bug** When creating a group on Safari, the icon profile pictures aren't the correct size. **To Reproduce** Steps to reproduce the behavior: 1. Open the app on Safari 2. Create a new group 3. View the "Icon Profile Pictures" **Expected behavior** The icons will look the same on Safari and Chrome. **Screenshots** ![image](https://user-images.githubusercontent.com/32989729/158911293-f180d9b3-9960-46df-b896-041926da10b1.png)
priority
icon sizes are too big on safari describe the bug when creating a group on safari the icon profile pictures aren t the correct size to reproduce steps to reproduce the behavior open the app on safari create a new group view the icon profile pictures expected behavior the icons will look the same on safari and chrome screenshots
1
314,376
9,596,062,469
IssuesEvent
2019-05-09 17:37:42
aiidateam/aiida-quantumespresso
https://api.github.com/repos/aiidateam/aiida-quantumespresso
closed
Bundle all CLI launchers in single click console script
priority/nice to have topic/cli type/accepted feature
Adding a single console script for each calculation and workflow launcher that we would like to make available is not tenable.
1.0
Bundle all CLI launchers in single click console script - Adding a single console script for each calculation and workflow launcher that we would like to make available is not tenable.
priority
bundle all cli launchers in single click console script adding a single console script for each calculation and workflow launcher that we would like to make available is not tenable
1
318,085
27,284,453,320
IssuesEvent
2023-02-23 12:30:51
cosmos/interchain-security
https://api.github.com/repos/cosmos/interchain-security
closed
Code review: Using ibc-go (cosmos/interchain-security)
testing
- [x] ibc-go team needs to review the code from an IBC perspective
1.0
Code review: Using ibc-go (cosmos/interchain-security) - - [x] ibc-go team needs to review the code from an IBC perspective
non_priority
code review using ibc go cosmos interchain security ibc go team needs to review the code from an ibc perspective
0
40,477
12,797,753,299
IssuesEvent
2020-07-02 12:52:18
RG4421/react-credit-card-input
https://api.github.com/repos/RG4421/react-credit-card-input
opened
CVE-2020-7660 (High) detected in serialize-javascript-1.9.1.tgz
security vulnerability
## CVE-2020-7660 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>serialize-javascript-1.9.1.tgz</b></p></summary> <p>Serialize JavaScript to a superset of JSON that includes regular expressions and functions.</p> <p>Library home page: <a href="https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.9.1.tgz">https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.9.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/react-credit-card-input/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/react-credit-card-input/node_modules/serialize-javascript/package.json</p> <p> Dependency Hierarchy: - react-3.4.12.tgz (Root Library) - uglifyjs-webpack-plugin-1.3.0.tgz - :x: **serialize-javascript-1.9.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/RG4421/react-credit-card-input/commit/4d1935810e311ceb2334ae5c8f1d6482c84a0dcd">4d1935810e311ceb2334ae5c8f1d6482c84a0dcd</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js". <p>Publish Date: 2020-06-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7660>CVE-2020-7660</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660</a></p> <p>Release Date: 2020-06-01</p> <p>Fix Resolution: serialize-javascript - 3.1.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"serialize-javascript","packageVersion":"1.9.1","isTransitiveDependency":true,"dependencyTree":"@storybook/react:3.4.12;uglifyjs-webpack-plugin:1.3.0;serialize-javascript:1.9.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"serialize-javascript - 3.1.0"}],"vulnerabilityIdentifier":"CVE-2020-7660","vulnerabilityDetails":"serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function \"deleteFunctions\" within \"index.js\".","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7660","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-7660 (High) detected in serialize-javascript-1.9.1.tgz - ## CVE-2020-7660 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>serialize-javascript-1.9.1.tgz</b></p></summary> <p>Serialize JavaScript to a superset of JSON that includes regular expressions and functions.</p> <p>Library home page: <a href="https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.9.1.tgz">https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-1.9.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/react-credit-card-input/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/react-credit-card-input/node_modules/serialize-javascript/package.json</p> <p> Dependency Hierarchy: - react-3.4.12.tgz (Root Library) - uglifyjs-webpack-plugin-1.3.0.tgz - :x: **serialize-javascript-1.9.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/RG4421/react-credit-card-input/commit/4d1935810e311ceb2334ae5c8f1d6482c84a0dcd">4d1935810e311ceb2334ae5c8f1d6482c84a0dcd</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js". <p>Publish Date: 2020-06-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7660>CVE-2020-7660</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7660</a></p> <p>Release Date: 2020-06-01</p> <p>Fix Resolution: serialize-javascript - 3.1.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"serialize-javascript","packageVersion":"1.9.1","isTransitiveDependency":true,"dependencyTree":"@storybook/react:3.4.12;uglifyjs-webpack-plugin:1.3.0;serialize-javascript:1.9.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"serialize-javascript - 3.1.0"}],"vulnerabilityIdentifier":"CVE-2020-7660","vulnerabilityDetails":"serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function \"deleteFunctions\" within \"index.js\".","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7660","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in serialize javascript tgz cve high severity vulnerability vulnerable library serialize javascript tgz serialize javascript to a superset of json that includes regular expressions and functions library home page a href path to dependency file tmp ws scm react credit card input package json path to vulnerable library tmp ws scm react credit card input node modules serialize javascript package json dependency hierarchy react tgz root library uglifyjs webpack plugin tgz x serialize javascript tgz vulnerable library found in head commit a href vulnerability details serialize javascript prior to allows remote attackers to inject arbitrary code via the function deletefunctions within index js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution serialize javascript isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails serialize javascript prior to allows remote attackers to inject arbitrary code via the function deletefunctions within index js vulnerabilityurl
0
43,027
12,965,164,764
IssuesEvent
2020-07-20 21:48:48
jtimberlake/griffin
https://api.github.com/repos/jtimberlake/griffin
opened
WS-2019-0333 (Medium) detected in handlebars-1.3.0.tgz
security vulnerability
## WS-2019-0333 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-1.3.0.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-1.3.0.tgz">https://registry.npmjs.org/handlebars/-/handlebars-1.3.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/griffin/ui/angular/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/griffin/ui/angular/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - cli-1.3.0.tgz (Root Library) - postcss-url-5.1.2.tgz - directory-encoder-0.7.2.tgz - :x: **handlebars-1.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/griffin/commit/7b8d4cb53c4eab239eecb18da5b2a6048b2fce60">7b8d4cb53c4eab239eecb18da5b2a6048b2fce60</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype Pollution vulnerability found in handlebars 1.0.6 before 4.5.3. It is possible to add or modify properties to the Object prototype through a malicious template. Attacker may crash the application or execute Arbitrary Code in specific conditions. <p>Publish Date: 2019-11-18 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08>WS-2019-0333</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1325">https://www.npmjs.com/advisories/1325</a></p> <p>Release Date: 2019-12-05</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"1.3.0","isTransitiveDependency":true,"dependencyTree":"@angular/cli:1.3.0;postcss-url:5.1.2;directory-encoder:0.7.2;handlebars:1.3.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"handlebars - 4.5.3"}],"vulnerabilityIdentifier":"WS-2019-0333","vulnerabilityDetails":"Prototype Pollution vulnerability found in handlebars 1.0.6 before 4.5.3. It is possible to add or modify properties to the Object prototype through a malicious template. Attacker may crash the application or execute Arbitrary Code in specific conditions.","vulnerabilityUrl":"https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08","cvss2Severity":"medium","cvss2Score":"5.0","extraData":{}}</REMEDIATE> -->
True
WS-2019-0333 (Medium) detected in handlebars-1.3.0.tgz - ## WS-2019-0333 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-1.3.0.tgz</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-1.3.0.tgz">https://registry.npmjs.org/handlebars/-/handlebars-1.3.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/griffin/ui/angular/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/griffin/ui/angular/node_modules/handlebars/package.json</p> <p> Dependency Hierarchy: - cli-1.3.0.tgz (Root Library) - postcss-url-5.1.2.tgz - directory-encoder-0.7.2.tgz - :x: **handlebars-1.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/griffin/commit/7b8d4cb53c4eab239eecb18da5b2a6048b2fce60">7b8d4cb53c4eab239eecb18da5b2a6048b2fce60</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype Pollution vulnerability found in handlebars 1.0.6 before 4.5.3. It is possible to add or modify properties to the Object prototype through a malicious template. Attacker may crash the application or execute Arbitrary Code in specific conditions. <p>Publish Date: 2019-11-18 <p>URL: <a href=https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08>WS-2019-0333</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1325">https://www.npmjs.com/advisories/1325</a></p> <p>Release Date: 2019-12-05</p> <p>Fix Resolution: handlebars - 4.5.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"handlebars","packageVersion":"1.3.0","isTransitiveDependency":true,"dependencyTree":"@angular/cli:1.3.0;postcss-url:5.1.2;directory-encoder:0.7.2;handlebars:1.3.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"handlebars - 4.5.3"}],"vulnerabilityIdentifier":"WS-2019-0333","vulnerabilityDetails":"Prototype Pollution vulnerability found in handlebars 1.0.6 before 4.5.3. It is possible to add or modify properties to the Object prototype through a malicious template. Attacker may crash the application or execute Arbitrary Code in specific conditions.","vulnerabilityUrl":"https://github.com/wycats/handlebars.js/commit/f7f05d7558e674856686b62a00cde5758f3b7a08","cvss2Severity":"medium","cvss2Score":"5.0","extraData":{}}</REMEDIATE> -->
non_priority
ws medium detected in handlebars tgz ws medium severity vulnerability vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to dependency file tmp ws scm griffin ui angular package json path to vulnerable library tmp ws scm griffin ui angular node modules handlebars package json dependency hierarchy cli tgz root library postcss url tgz directory encoder tgz x handlebars tgz vulnerable library found in head commit a href vulnerability details prototype pollution vulnerability found in handlebars before it is possible to add or modify properties to the object prototype through a malicious template attacker may crash the application or execute arbitrary code in specific conditions publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution handlebars isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails prototype pollution vulnerability found in handlebars before it is possible to add or modify properties to the object prototype through a malicious template attacker may crash the application or execute arbitrary code in specific conditions vulnerabilityurl
0
813,352
30,454,740,079
IssuesEvent
2023-07-16 18:45:45
priyankarpal/ProjectsHut
https://api.github.com/repos/priyankarpal/ProjectsHut
closed
feat:Adding hover effect on the links
🛠 goal: fix ⭐ goal: addition 🟩 priority: low 🏁 status: ready for dev
### What feature? addition of the hover effect on the links will look great!! ### Add screenshots ![Screenshot 2023-07-16 at 10 32 15 PM](https://github.com/priyankarpal/ProjectsHut/assets/109215419/9b2c8d07-3d82-4497-9830-2426f7df5b9b) ### Record - [X] I agree to follow this project's Code of Conduct - [ ] I'm a GSSoC'23 contributor - [X] I want to work on this issue
1.0
feat:Adding hover effect on the links - ### What feature? addition of the hover effect on the links will look great!! ### Add screenshots ![Screenshot 2023-07-16 at 10 32 15 PM](https://github.com/priyankarpal/ProjectsHut/assets/109215419/9b2c8d07-3d82-4497-9830-2426f7df5b9b) ### Record - [X] I agree to follow this project's Code of Conduct - [ ] I'm a GSSoC'23 contributor - [X] I want to work on this issue
priority
feat adding hover effect on the links what feature addition of the hover effect on the links will look great add screenshots record i agree to follow this project s code of conduct i m a gssoc contributor i want to work on this issue
1
548,215
16,060,333,621
IssuesEvent
2021-04-23 11:37:16
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.samplicio.us - see bug description
browser-fenix engine-gecko ml-needsdiagnosis-false priority-normal
<!-- @browser: Firefox Mobile 88.0 --> <!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:88.0) Gecko/88.0 Firefox/88.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/71450 --> <!-- @extra_labels: browser-fenix --> **URL**: https://www.samplicio.us/s/RelevantID.aspx?RVPID=IBD13033769173&RVSID=10961636&RSID=0769b34d-9043-4e0a-a73a-8a32f848aa12&RVTO=8000&SSID=60806584-1e10-378a-0dc4-c3abb2565d60 **Browser / Version**: Firefox Mobile 88.0 **Operating System**: Android 8.1.0 **Tested Another Browser**: Yes Chrome **Problem type**: Something else **Description**: Lost connection **Steps to Reproduce**: every survey failed loading.Can not connected survey site. <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2021/4/84aa1fb3-15f8-479a-9d64-11aba5f5ff1c.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20210410185959</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2021/4/a29f57e6-e773-4e92-83b2-3eb1676fa486) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.samplicio.us - see bug description - <!-- @browser: Firefox Mobile 88.0 --> <!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:88.0) Gecko/88.0 Firefox/88.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/71450 --> <!-- @extra_labels: browser-fenix --> **URL**: https://www.samplicio.us/s/RelevantID.aspx?RVPID=IBD13033769173&RVSID=10961636&RSID=0769b34d-9043-4e0a-a73a-8a32f848aa12&RVTO=8000&SSID=60806584-1e10-378a-0dc4-c3abb2565d60 **Browser / Version**: Firefox Mobile 88.0 **Operating System**: Android 8.1.0 **Tested Another Browser**: Yes Chrome **Problem type**: Something else **Description**: Lost connection **Steps to Reproduce**: every survey failed loading.Can not connected survey site. <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2021/4/84aa1fb3-15f8-479a-9d64-11aba5f5ff1c.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20210410185959</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2021/4/a29f57e6-e773-4e92-83b2-3eb1676fa486) _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
see bug description url browser version firefox mobile operating system android tested another browser yes chrome problem type something else description lost connection steps to reproduce every survey failed loading can not connected survey site view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️
1
171,911
21,007,659,465
IssuesEvent
2022-03-30 01:16:53
Satheesh575555/kernel-mm-huge_memory
https://api.github.com/repos/Satheesh575555/kernel-mm-huge_memory
opened
CVE-2021-29154 (High) detected in linuxlinux-4.19.236
security vulnerability
## CVE-2021-29154 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.236</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c. <p>Publish Date: 2021-04-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29154>CVE-2021-29154</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-29154">https://www.linuxkernelcves.com/cves/CVE-2021-29154</a></p> <p>Release Date: 2021-04-08</p> <p>Fix Resolution: v4.4.266, v4.9.266, v4.14.230, v4.19.186, v5.4.111, v5.10.29, v5.11.13</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-29154 (High) detected in linuxlinux-4.19.236 - ## CVE-2021-29154 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.236</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c. <p>Publish Date: 2021-04-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29154>CVE-2021-29154</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-29154">https://www.linuxkernelcves.com/cves/CVE-2021-29154</a></p> <p>Release Date: 2021-04-08</p> <p>Fix Resolution: v4.4.266, v4.9.266, v4.14.230, v4.19.186, v5.4.111, v5.10.29, v5.11.13</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in base branch master vulnerable source files vulnerability details bpf jit compilers in the linux kernel through have incorrect computation of branch displacements allowing them to execute arbitrary code within the kernel context this affects arch net bpf jit comp c and arch net bpf jit c publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
554,631
16,435,033,187
IssuesEvent
2021-05-20 08:17:49
StrangeLoopGames/EcoIssues
https://api.github.com/repos/StrangeLoopGames/EcoIssues
closed
9.3 1966 - Rent currency does not default to what treasury has set
Category: Gameplay Priority: Low Squad: Wild Turkey Type: Bug
As per subject, rent's currency does not default to the currency that the treasury has set. ![image](https://user-images.githubusercontent.com/61889138/112759764-69804580-8fec-11eb-9894-1dedeb3620bf.png) ![image](https://user-images.githubusercontent.com/61889138/112761713-7dc84080-8ff4-11eb-8761-b2a99d0954ad.png)
1.0
9.3 1966 - Rent currency does not default to what treasury has set - As per subject, rent's currency does not default to the currency that the treasury has set. ![image](https://user-images.githubusercontent.com/61889138/112759764-69804580-8fec-11eb-9894-1dedeb3620bf.png) ![image](https://user-images.githubusercontent.com/61889138/112761713-7dc84080-8ff4-11eb-8761-b2a99d0954ad.png)
priority
rent currency does not default to what treasury has set as per subject rent s currency does not default to the currency that the treasury has set
1
375,935
11,136,165,674
IssuesEvent
2019-12-20 15:58:58
dhenry-KCI/FredCo-Post-Go-Live-
https://api.github.com/repos/dhenry-KCI/FredCo-Post-Go-Live-
opened
Building Permits - Capacity - Spring View Estates Subdivision Fees
Medium Priority
CAPACITY - RESIDENTIAL SINGLE FAMILY DWELLING AP # 258425 The Spring View Estates subdivision code 041244 needs to automatically add the RESIDENTIAL SEWER FEE 20400 ($7509.00) when it is a residential occupancy type. Terry manually added these fees to the application in PROD. ![image](https://user-images.githubusercontent.com/31770504/71267012-9046cb00-2317-11ea-99e4-ca769f5fd546.png) ![image](https://user-images.githubusercontent.com/31770504/71267050-a5bbf500-2317-11ea-81a7-5f649d2ee1e3.png)
1.0
Building Permits - Capacity - Spring View Estates Subdivision Fees - CAPACITY - RESIDENTIAL SINGLE FAMILY DWELLING AP # 258425 The Spring View Estates subdivision code 041244 needs to automatically add the RESIDENTIAL SEWER FEE 20400 ($7509.00) when it is a residential occupancy type. Terry manually added these fees to the application in PROD. ![image](https://user-images.githubusercontent.com/31770504/71267012-9046cb00-2317-11ea-99e4-ca769f5fd546.png) ![image](https://user-images.githubusercontent.com/31770504/71267050-a5bbf500-2317-11ea-81a7-5f649d2ee1e3.png)
priority
building permits capacity spring view estates subdivision fees capacity residential single family dwelling ap the spring view estates subdivision code needs to automatically add the residential sewer fee when it is a residential occupancy type terry manually added these fees to the application in prod
1
673,443
22,969,835,113
IssuesEvent
2022-07-20 01:16:33
stackcollision/Nebulous-BugReporting
https://api.github.com/repos/stackcollision/Nebulous-BugReporting
closed
Sprint stage on hybrid missiles (Cyclone, Atlatl) with max speed settings have sprint stages seperate with insufficient range.
bug branch-modmis incorrect behavior priority high
**Describe the bug** Sprint stage on hybrid missiles (Cyclone, Atlatl) with max speed settings have sprint stages seperate with insufficient range. **To Reproduce** Steps to reproduce the behavior: 1. Go to Missile Designer 2. Create new hybrid missile (Cyclone, Atlatl) and set sprint stage to maximum speed. 3. Stage seperation triggers with insufficient range. **Expected behavior** Missile will compensate by shortening stage seperation range. **Additional context** None **Attachments** ![ảnh](https://user-images.githubusercontent.com/61640498/177277752-d8084cfc-4fee-43b9-bca8-5e221825ea7b.png) ![ảnh](https://user-images.githubusercontent.com/61640498/177277885-0ddf5099-6c85-4d48-af5b-47ff027af378.png)
1.0
Sprint stage on hybrid missiles (Cyclone, Atlatl) with max speed settings have sprint stages seperate with insufficient range. - **Describe the bug** Sprint stage on hybrid missiles (Cyclone, Atlatl) with max speed settings have sprint stages seperate with insufficient range. **To Reproduce** Steps to reproduce the behavior: 1. Go to Missile Designer 2. Create new hybrid missile (Cyclone, Atlatl) and set sprint stage to maximum speed. 3. Stage seperation triggers with insufficient range. **Expected behavior** Missile will compensate by shortening stage seperation range. **Additional context** None **Attachments** ![ảnh](https://user-images.githubusercontent.com/61640498/177277752-d8084cfc-4fee-43b9-bca8-5e221825ea7b.png) ![ảnh](https://user-images.githubusercontent.com/61640498/177277885-0ddf5099-6c85-4d48-af5b-47ff027af378.png)
priority
sprint stage on hybrid missiles cyclone atlatl with max speed settings have sprint stages seperate with insufficient range describe the bug sprint stage on hybrid missiles cyclone atlatl with max speed settings have sprint stages seperate with insufficient range to reproduce steps to reproduce the behavior go to missile designer create new hybrid missile cyclone atlatl and set sprint stage to maximum speed stage seperation triggers with insufficient range expected behavior missile will compensate by shortening stage seperation range additional context none attachments
1
359,951
10,682,735,166
IssuesEvent
2019-10-22 06:31:05
bounswe/bounswe2019group8
https://api.github.com/repos/bounswe/bounswe2019group8
closed
Add data picker and check valid cases for sign up.
Effort: High Mobile Platform: Mobile Priority: High Status: Done Status: In Progress Type: Feature
**Actions:** 1. Add data picker in sign up. 2. Check valid for iban and id numbers. 3. Check user exists. **Notes:** - [x] Add data picker in sign up. - [x] Check valid for iban and id numbers. - [x] Check user exists. **Deadline:** 22.10.2019 - 11.00
1.0
Add data picker and check valid cases for sign up. - **Actions:** 1. Add data picker in sign up. 2. Check valid for iban and id numbers. 3. Check user exists. **Notes:** - [x] Add data picker in sign up. - [x] Check valid for iban and id numbers. - [x] Check user exists. **Deadline:** 22.10.2019 - 11.00
priority
add data picker and check valid cases for sign up actions add data picker in sign up check valid for iban and id numbers check user exists notes add data picker in sign up check valid for iban and id numbers check user exists deadline
1
23,435
6,419,940,820
IssuesEvent
2017-08-08 22:30:30
xhqiao89/HydroDesktop_test
https://api.github.com/repos/xhqiao89/HydroDesktop_test
closed
Add a series to a theme (from another theme)
CodePlex
<b>dtarb[CodePlex]</b> <br />I would like to be able to: Add a series to a theme (from another theme) this feature can be added as a new context menu item in the series selector menu.
1.0
Add a series to a theme (from another theme) - <b>dtarb[CodePlex]</b> <br />I would like to be able to: Add a series to a theme (from another theme) this feature can be added as a new context menu item in the series selector menu.
non_priority
add a series to a theme from another theme dtarb i would like to be able to add a series to a theme from another theme this feature can be added as a new context menu item in the series selector menu
0
5,482
2,576,697,805
IssuesEvent
2015-02-12 12:12:52
olga-jane/prizm
https://api.github.com/repos/olga-jane/prizm
closed
Add file button should be at the left, Close at the right at ExternalFile dialog
Attachments bug bug - UI Coding MEDIUM priority
Add file button should be at the left, Close at the right at ExternalFile dialog. Now both buttons are at the right.
1.0
Add file button should be at the left, Close at the right at ExternalFile dialog - Add file button should be at the left, Close at the right at ExternalFile dialog. Now both buttons are at the right.
priority
add file button should be at the left close at the right at externalfile dialog add file button should be at the left close at the right at externalfile dialog now both buttons are at the right
1
35,748
7,800,527,202
IssuesEvent
2018-06-09 10:32:10
StrikeNP/trac_test
https://api.github.com/repos/StrikeNP/trac_test
closed
Divide integer, public declarations in stats_variables.F90 into smaller blocks in order to avoid ANSI warning (Trac #545)
Migrated from Trac clubb_src defect raut@uwm.edu
'''Introduction''' We try to keep CLUBB compatible with ANSI standards in order to enhance portability. ANSI requires that no more than 39 continuation characters (i.e. &) be used for one line. However, when we add new variables to declaration lists, we sometimes exceed 39 continuation characters, thereby triggering a warning. The most recent example occurred on 6 Feb 2013, where [source:/CLUBB/trunk/src/CLUBB_core/stats_variables.F90?rev=6056#L55 this block in stats_variables.F90] exceeded 39 continuations. The resulting error message was: ```text "/usr/nightly_tests/clubb/compile/../src/CLUBB_core/stats_variables.F90", Line = 96, Column = 1: ANSI: More than 39 continuation lines is an extension to the Fortran standard in free source form. ``` '''Technical spec''' Let's break the integer, public declaration blocks into smaller declaration blocks with, say, no more than 20 lines, so that the addition of new variables triggers the warning less often. Are there other files with lots of continuations? If so, should we break up those blocks as well? Attachments: Migrated from http://carson.math.uwm.edu/trac/clubb/ticket/545 ```json { "status": "closed", "changetime": "2014-08-06T23:26:29", "description": "\n'''Introduction'''\n\nWe try to keep CLUBB compatible with ANSI standards in order to enhance portability. ANSI requires that no more than 39 continuation characters (i.e. &) be used for one line. However, when we add new variables to declaration lists, we sometimes exceed 39 continuation characters, thereby triggering a warning. The most recent example occurred on 6 Feb 2013, where [source:/CLUBB/trunk/src/CLUBB_core/stats_variables.F90?rev=6056#L55 this block in stats_variables.F90] exceeded 39 continuations. The resulting error message was:\n{{{\n\"/usr/nightly_tests/clubb/compile/../src/CLUBB_core/stats_variables.F90\", \nLine = 96, Column = 1: \nANSI: More than 39 continuation lines is an extension to the \nFortran standard in free source form.\n}}}\n\n'''Technical spec'''\n\nLet's break the integer, public declaration blocks into smaller declaration blocks with, say, no more than 20 lines, so that the addition of new variables triggers the warning less often. Are there other files with lots of continuations? If so, should we break up those blocks as well?", "reporter": "vlarson@uwm.edu", "cc": "vlarson@uwm.edu, bmg2@uwm.edu", "resolution": "fixed", "_ts": "1407367589153596", "component": "clubb_src", "summary": "Divide integer, public declarations in stats_variables.F90 into smaller blocks in order to avoid ANSI warning", "priority": "minor", "keywords": "", "time": "2013-02-06T18:01:36", "milestone": "3. Refactor CLUBB", "owner": "raut@uwm.edu", "type": "defect" } ```
1.0
Divide integer, public declarations in stats_variables.F90 into smaller blocks in order to avoid ANSI warning (Trac #545) - '''Introduction''' We try to keep CLUBB compatible with ANSI standards in order to enhance portability. ANSI requires that no more than 39 continuation characters (i.e. &) be used for one line. However, when we add new variables to declaration lists, we sometimes exceed 39 continuation characters, thereby triggering a warning. The most recent example occurred on 6 Feb 2013, where [source:/CLUBB/trunk/src/CLUBB_core/stats_variables.F90?rev=6056#L55 this block in stats_variables.F90] exceeded 39 continuations. The resulting error message was: ```text "/usr/nightly_tests/clubb/compile/../src/CLUBB_core/stats_variables.F90", Line = 96, Column = 1: ANSI: More than 39 continuation lines is an extension to the Fortran standard in free source form. ``` '''Technical spec''' Let's break the integer, public declaration blocks into smaller declaration blocks with, say, no more than 20 lines, so that the addition of new variables triggers the warning less often. Are there other files with lots of continuations? If so, should we break up those blocks as well? Attachments: Migrated from http://carson.math.uwm.edu/trac/clubb/ticket/545 ```json { "status": "closed", "changetime": "2014-08-06T23:26:29", "description": "\n'''Introduction'''\n\nWe try to keep CLUBB compatible with ANSI standards in order to enhance portability. ANSI requires that no more than 39 continuation characters (i.e. &) be used for one line. However, when we add new variables to declaration lists, we sometimes exceed 39 continuation characters, thereby triggering a warning. The most recent example occurred on 6 Feb 2013, where [source:/CLUBB/trunk/src/CLUBB_core/stats_variables.F90?rev=6056#L55 this block in stats_variables.F90] exceeded 39 continuations. The resulting error message was:\n{{{\n\"/usr/nightly_tests/clubb/compile/../src/CLUBB_core/stats_variables.F90\", \nLine = 96, Column = 1: \nANSI: More than 39 continuation lines is an extension to the \nFortran standard in free source form.\n}}}\n\n'''Technical spec'''\n\nLet's break the integer, public declaration blocks into smaller declaration blocks with, say, no more than 20 lines, so that the addition of new variables triggers the warning less often. Are there other files with lots of continuations? If so, should we break up those blocks as well?", "reporter": "vlarson@uwm.edu", "cc": "vlarson@uwm.edu, bmg2@uwm.edu", "resolution": "fixed", "_ts": "1407367589153596", "component": "clubb_src", "summary": "Divide integer, public declarations in stats_variables.F90 into smaller blocks in order to avoid ANSI warning", "priority": "minor", "keywords": "", "time": "2013-02-06T18:01:36", "milestone": "3. Refactor CLUBB", "owner": "raut@uwm.edu", "type": "defect" } ```
non_priority
divide integer public declarations in stats variables into smaller blocks in order to avoid ansi warning trac introduction we try to keep clubb compatible with ansi standards in order to enhance portability ansi requires that no more than continuation characters i e be used for one line however when we add new variables to declaration lists we sometimes exceed continuation characters thereby triggering a warning the most recent example occurred on feb where exceeded continuations the resulting error message was text usr nightly tests clubb compile src clubb core stats variables line column ansi more than continuation lines is an extension to the fortran standard in free source form technical spec let s break the integer public declaration blocks into smaller declaration blocks with say no more than lines so that the addition of new variables triggers the warning less often are there other files with lots of continuations if so should we break up those blocks as well attachments migrated from json status closed changetime description n introduction n nwe try to keep clubb compatible with ansi standards in order to enhance portability ansi requires that no more than continuation characters i e be used for one line however when we add new variables to declaration lists we sometimes exceed continuation characters thereby triggering a warning the most recent example occurred on feb where exceeded continuations the resulting error message was n n usr nightly tests clubb compile src clubb core stats variables nline column nansi more than continuation lines is an extension to the nfortran standard in free source form n n n technical spec n nlet s break the integer public declaration blocks into smaller declaration blocks with say no more than lines so that the addition of new variables triggers the warning less often are there other files with lots of continuations if so should we break up those blocks as well reporter vlarson uwm edu cc vlarson uwm edu uwm edu resolution fixed ts component clubb src summary divide integer public declarations in stats variables into smaller blocks in order to avoid ansi warning priority minor keywords time milestone refactor clubb owner raut uwm edu type defect
0
57,142
3,081,243,195
IssuesEvent
2015-08-22 14:33:35
bitfighter/bitfighter
https://api.github.com/repos/bitfighter/bitfighter
closed
Seekers seek teammates in single-team rabbit
019a bug imported Priority-Medium
_From [buckyballreaction](https://code.google.com/u/buckyballreaction/) on January 07, 2014 11:59:38_ Seekers seek teammates in single-team rabbit _Original issue: http://code.google.com/p/bitfighter/issues/detail?id=365_
1.0
Seekers seek teammates in single-team rabbit - _From [buckyballreaction](https://code.google.com/u/buckyballreaction/) on January 07, 2014 11:59:38_ Seekers seek teammates in single-team rabbit _Original issue: http://code.google.com/p/bitfighter/issues/detail?id=365_
priority
seekers seek teammates in single team rabbit from on january seekers seek teammates in single team rabbit original issue
1
5,633
2,577,816,936
IssuesEvent
2015-02-12 19:18:42
phetsims/tasks
https://api.github.com/repos/phetsims/tasks
closed
Update budgets through Jan
Accounting Top Priority
@arnabp Please prioritize updating these budgets through Jan 2015: Moore NSF DRK12 NSF DRK12 Matching NSF TUES CHEM Also, your laptop is in F1011 - should hopefully get labeled today.
1.0
Update budgets through Jan - @arnabp Please prioritize updating these budgets through Jan 2015: Moore NSF DRK12 NSF DRK12 Matching NSF TUES CHEM Also, your laptop is in F1011 - should hopefully get labeled today.
priority
update budgets through jan arnabp please prioritize updating these budgets through jan moore nsf nsf matching nsf tues chem also your laptop is in should hopefully get labeled today
1
82,579
15,648,357,771
IssuesEvent
2021-03-23 05:33:29
YJSoft/namuhub
https://api.github.com/repos/YJSoft/namuhub
closed
CVE-2019-16789 (High) detected in waitress-0.8.9.tar.gz - autoclosed
security vulnerability
## CVE-2019-16789 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>waitress-0.8.9.tar.gz</b></p></summary> <p>Waitress WSGI server</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/ee/65/fc9dee74a909a1187ca51e4f15ad9c4d35476e4ab5813f73421505c48053/waitress-0.8.9.tar.gz">https://files.pythonhosted.org/packages/ee/65/fc9dee74a909a1187ca51e4f15ad9c4d35476e4ab5813f73421505c48053/waitress-0.8.9.tar.gz</a></p> <p>Path to dependency file: namuhub/requirements.txt</p> <p>Path to vulnerable library: namuhub/requirements.txt</p> <p> Dependency Hierarchy: - :x: **waitress-0.8.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/YJSoft/namuhub/commit/3e2e58c112b34d9d89ec2ec01b44226ffaaf7d87">3e2e58c112b34d9d89ec2ec01b44226ffaaf7d87</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation. <p>Publish Date: 2019-12-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16789>CVE-2019-16789</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-m5ff-3wj3-8ph4">https://github.com/advisories/GHSA-m5ff-3wj3-8ph4</a></p> <p>Release Date: 2019-12-26</p> <p>Fix Resolution: v1.4.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-16789 (High) detected in waitress-0.8.9.tar.gz - autoclosed - ## CVE-2019-16789 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>waitress-0.8.9.tar.gz</b></p></summary> <p>Waitress WSGI server</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/ee/65/fc9dee74a909a1187ca51e4f15ad9c4d35476e4ab5813f73421505c48053/waitress-0.8.9.tar.gz">https://files.pythonhosted.org/packages/ee/65/fc9dee74a909a1187ca51e4f15ad9c4d35476e4ab5813f73421505c48053/waitress-0.8.9.tar.gz</a></p> <p>Path to dependency file: namuhub/requirements.txt</p> <p>Path to vulnerable library: namuhub/requirements.txt</p> <p> Dependency Hierarchy: - :x: **waitress-0.8.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/YJSoft/namuhub/commit/3e2e58c112b34d9d89ec2ec01b44226ffaaf7d87">3e2e58c112b34d9d89ec2ec01b44226ffaaf7d87</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation. <p>Publish Date: 2019-12-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16789>CVE-2019-16789</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-m5ff-3wj3-8ph4">https://github.com/advisories/GHSA-m5ff-3wj3-8ph4</a></p> <p>Release Date: 2019-12-26</p> <p>Fix Resolution: v1.4.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in waitress tar gz autoclosed cve high severity vulnerability vulnerable library waitress tar gz waitress wsgi server library home page a href path to dependency file namuhub requirements txt path to vulnerable library namuhub requirements txt dependency hierarchy x waitress tar gz vulnerable library found in head commit a href found in base branch develop vulnerability details in waitress through version if a proxy server is used in front of waitress an invalid request may be sent by an attacker that bypasses the front end and is parsed differently by waitress leading to a potential for http request smuggling specially crafted requests containing special whitespace characters in the transfer encoding header would get parsed by waitress as being a chunked request but a front end server would use the content length instead as the transfer encoding header is considered invalid due to containing invalid characters if a front end server does http pipelining to a backend waitress server this could lead to http request splitting which may lead to potential cache poisoning or unexpected information disclosure this issue is fixed in waitress through more strict http field validation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
633,805
20,266,249,369
IssuesEvent
2022-02-15 12:21:41
HabitRPG/habitica-ios
https://api.github.com/repos/HabitRPG/habitica-ios
closed
Japanese not showing correctly for login incentive rewards
Type: Bug Help wanted Priority: minor
natalie checked the string, and that seems fine. there just seems to be an issue with displaying the characters? ![image](https://user-images.githubusercontent.com/12453119/147960704-a560d3bb-f982-434a-9a4d-b7e6d9a217f3.png) > iOS Version: 15.1 Device: iPhone 8 App Version: 3.4.4 (649) User ID: e0b0a48b-c8ae-40d1-a1e2-84d3ac821f89 Level: 7 Class: warrior Is in Inn: false Uses Costume: false Custom Day Start: 4
1.0
Japanese not showing correctly for login incentive rewards - natalie checked the string, and that seems fine. there just seems to be an issue with displaying the characters? ![image](https://user-images.githubusercontent.com/12453119/147960704-a560d3bb-f982-434a-9a4d-b7e6d9a217f3.png) > iOS Version: 15.1 Device: iPhone 8 App Version: 3.4.4 (649) User ID: e0b0a48b-c8ae-40d1-a1e2-84d3ac821f89 Level: 7 Class: warrior Is in Inn: false Uses Costume: false Custom Day Start: 4
priority
japanese not showing correctly for login incentive rewards natalie checked the string and that seems fine there just seems to be an issue with displaying the characters ios version device iphone app version user id level class warrior is in inn false uses costume false custom day start
1
392,549
26,946,996,586
IssuesEvent
2023-02-08 08:55:00
trixi-framework/Trixi.jl
https://api.github.com/repos/trixi-framework/Trixi.jl
opened
Update instructions to build docs locally
documentation
Developing Trixi on a fork may include adding types / function with corresponding docstrings. Previewing the documentation from a fork online is not available for security reasons. To preview the docs with your local documentation changes and updates one needs to use the following commands (taken directly from #668) ``` julia --project=docs/ -e 'using Pkg; Pkg.develop(PackageSpec(path=pwd())); Pkg.instantiate()' julia --project=docs --color=yes docs/make.jl ``` The current instructions from the Development section of the docs says to use ``` julia --project=docs -e 'using Pkg; Pkg.instantiate(); include("docs/make.jl")' ``` This indeed works, but it build the docs for the current stable release of Trixi and not for the local development changes. We should update the instructions on building the docs locally such that it is clear for people with forks how to get their docs to build.
1.0
Update instructions to build docs locally - Developing Trixi on a fork may include adding types / function with corresponding docstrings. Previewing the documentation from a fork online is not available for security reasons. To preview the docs with your local documentation changes and updates one needs to use the following commands (taken directly from #668) ``` julia --project=docs/ -e 'using Pkg; Pkg.develop(PackageSpec(path=pwd())); Pkg.instantiate()' julia --project=docs --color=yes docs/make.jl ``` The current instructions from the Development section of the docs says to use ``` julia --project=docs -e 'using Pkg; Pkg.instantiate(); include("docs/make.jl")' ``` This indeed works, but it build the docs for the current stable release of Trixi and not for the local development changes. We should update the instructions on building the docs locally such that it is clear for people with forks how to get their docs to build.
non_priority
update instructions to build docs locally developing trixi on a fork may include adding types function with corresponding docstrings previewing the documentation from a fork online is not available for security reasons to preview the docs with your local documentation changes and updates one needs to use the following commands taken directly from julia project docs e using pkg pkg develop packagespec path pwd pkg instantiate julia project docs color yes docs make jl the current instructions from the development section of the docs says to use julia project docs e using pkg pkg instantiate include docs make jl this indeed works but it build the docs for the current stable release of trixi and not for the local development changes we should update the instructions on building the docs locally such that it is clear for people with forks how to get their docs to build
0
49,736
26,280,927,535
IssuesEvent
2023-01-07 09:35:19
python/cpython
https://api.github.com/repos/python/cpython
opened
Make `copy.deepcopy` faster for `slice` objects
type-feature performance
## `slice` Right now `slice` objects are deepcopied using `__reduce__` defined as: https://github.com/python/cpython/blob/26ff43625ed7bf09542ad8f149cb6af710b41e15/Objects/sliceobject.c#L559-L563 It is one of last branches of `deepcopy` logic: https://github.com/python/cpython/blob/26ff43625ed7bf09542ad8f149cb6af710b41e15/Lib/copy.py#L120-L157 But, since `slice` is an immutable type, we can optimize its `deepcopy` as: ```python d[slice] = _deepcopy_atomic ``` Before: ``` » pyperf timeit --setup 'from copy import deepcopy; s = slice(1,10,2)' 'deepcopy(s)' ..................... Mean +- std dev: 3.46 us +- 0.18 us ``` After: ``` » pyperf timeit --setup 'from copy import deepcopy; s = slice(1,10,2)' 'deepcopy(s)' ..................... Mean +- std dev: 277 ns +- 3 ns ``` Looks like a good speedup for just a single line! Noticed while working on #100815 PR is incoming.
True
Make `copy.deepcopy` faster for `slice` objects - ## `slice` Right now `slice` objects are deepcopied using `__reduce__` defined as: https://github.com/python/cpython/blob/26ff43625ed7bf09542ad8f149cb6af710b41e15/Objects/sliceobject.c#L559-L563 It is one of last branches of `deepcopy` logic: https://github.com/python/cpython/blob/26ff43625ed7bf09542ad8f149cb6af710b41e15/Lib/copy.py#L120-L157 But, since `slice` is an immutable type, we can optimize its `deepcopy` as: ```python d[slice] = _deepcopy_atomic ``` Before: ``` » pyperf timeit --setup 'from copy import deepcopy; s = slice(1,10,2)' 'deepcopy(s)' ..................... Mean +- std dev: 3.46 us +- 0.18 us ``` After: ``` » pyperf timeit --setup 'from copy import deepcopy; s = slice(1,10,2)' 'deepcopy(s)' ..................... Mean +- std dev: 277 ns +- 3 ns ``` Looks like a good speedup for just a single line! Noticed while working on #100815 PR is incoming.
non_priority
make copy deepcopy faster for slice objects slice right now slice objects are deepcopied using reduce defined as it is one of last branches of deepcopy logic but since slice is an immutable type we can optimize its deepcopy as python d deepcopy atomic before » pyperf timeit setup from copy import deepcopy s slice deepcopy s mean std dev us us after » pyperf timeit setup from copy import deepcopy s slice deepcopy s mean std dev ns ns looks like a good speedup for just a single line noticed while working on pr is incoming
0
708,992
24,364,446,397
IssuesEvent
2022-10-03 14:11:34
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.google.com - site is not usable
priority-critical browser-focus-geckoview engine-gecko
<!-- @browser: Firefox Mobile 105.0 --> <!-- @ua_header: Mozilla/5.0 (Android 12; Mobile; rv:105.0) Gecko/105.0 Firefox/105.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/111744 --> <!-- @extra_labels: browser-focus-geckoview --> **URL**: https://www.google.com/search?q=trustpilot%20reviews&ie=utf-8&oe=utf-8&client=firefox-b-m **Browser / Version**: Firefox Mobile 105.0 **Operating System**: Android 12 **Tested Another Browser**: No **Problem type**: Site is not usable **Description**: Page not loading correctly **Steps to Reproduce**: Screen goes black and only refreshes black also tried on android Google <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2022/10/2d17e635-ba72-4e75-8d38-4adb4c8a88a8.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20220915150737</li><li>channel: release</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2022/10/5eacd54b-8992-45f9-b06d-9b5bfafa9845) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.google.com - site is not usable - <!-- @browser: Firefox Mobile 105.0 --> <!-- @ua_header: Mozilla/5.0 (Android 12; Mobile; rv:105.0) Gecko/105.0 Firefox/105.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/111744 --> <!-- @extra_labels: browser-focus-geckoview --> **URL**: https://www.google.com/search?q=trustpilot%20reviews&ie=utf-8&oe=utf-8&client=firefox-b-m **Browser / Version**: Firefox Mobile 105.0 **Operating System**: Android 12 **Tested Another Browser**: No **Problem type**: Site is not usable **Description**: Page not loading correctly **Steps to Reproduce**: Screen goes black and only refreshes black also tried on android Google <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2022/10/2d17e635-ba72-4e75-8d38-4adb4c8a88a8.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20220915150737</li><li>channel: release</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2022/10/5eacd54b-8992-45f9-b06d-9b5bfafa9845) _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
site is not usable url browser version firefox mobile operating system android tested another browser no problem type site is not usable description page not loading correctly steps to reproduce screen goes black and only refreshes black also tried on android google view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel release hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️
1
58,303
14,359,635,449
IssuesEvent
2020-11-30 15:51:55
acxz/pkgbuilds
https://api.github.com/repos/acxz/pkgbuilds
closed
[openvsp] Missing unzip
build error
``` ==> Entering fakeroot environment... ==> Starting package()... /startdir/PKGBUILD: line 74: unzip: command not found ==> ERROR: A failure occurred in package(). Aborting... ```
1.0
[openvsp] Missing unzip - ``` ==> Entering fakeroot environment... ==> Starting package()... /startdir/PKGBUILD: line 74: unzip: command not found ==> ERROR: A failure occurred in package(). Aborting... ```
non_priority
missing unzip entering fakeroot environment starting package startdir pkgbuild line unzip command not found error a failure occurred in package aborting
0
102,867
4,161,915,420
IssuesEvent
2016-06-17 18:20:32
ReactiveX/rxjs
https://api.github.com/repos/ReactiveX/rxjs
closed
A method Rx.Observable.when
priority: low status: PRs welcome
Hi all! Exists in plan implementing methods like `Rx.Observable.when` and `Rx.Observable.update`?
1.0
A method Rx.Observable.when - Hi all! Exists in plan implementing methods like `Rx.Observable.when` and `Rx.Observable.update`?
priority
a method rx observable when hi all exists in plan implementing methods like rx observable when and rx observable update
1
275,677
8,578,773,271
IssuesEvent
2018-11-13 06:46:33
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.instagram.com - see bug description
browser-firefox-mobile priority-critical
<!-- @browser: Firefox Mobile 65.0 --> <!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:65.0) Gecko/65.0 Firefox/65.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://www.instagram.com/ **Browser / Version**: Firefox Mobile 65.0 **Operating System**: Android 8.1.0 **Tested Another Browser**: Yes **Problem type**: Something else **Description**: Scrolling does not work as it should **Steps to Reproduce**: While scrolling the page, (although it is loaded) the images do not load instantly as on chrome [![Screenshot Description](https://webcompat.com/uploads/2018/11/3159839f-628c-4ebc-b854-420761c0dd7c-thumb.jpg)](https://webcompat.com/uploads/2018/11/3159839f-628c-4ebc-b854-420761c0dd7c.jpg) <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
www.instagram.com - see bug description - <!-- @browser: Firefox Mobile 65.0 --> <!-- @ua_header: Mozilla/5.0 (Android 8.1.0; Mobile; rv:65.0) Gecko/65.0 Firefox/65.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://www.instagram.com/ **Browser / Version**: Firefox Mobile 65.0 **Operating System**: Android 8.1.0 **Tested Another Browser**: Yes **Problem type**: Something else **Description**: Scrolling does not work as it should **Steps to Reproduce**: While scrolling the page, (although it is loaded) the images do not load instantly as on chrome [![Screenshot Description](https://webcompat.com/uploads/2018/11/3159839f-628c-4ebc-b854-420761c0dd7c-thumb.jpg)](https://webcompat.com/uploads/2018/11/3159839f-628c-4ebc-b854-420761c0dd7c.jpg) <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
see bug description url browser version firefox mobile operating system android tested another browser yes problem type something else description scrolling does not work as it should steps to reproduce while scrolling the page although it is loaded the images do not load instantly as on chrome browser configuration none from with ❤️
1
802,126
28,718,311,306
IssuesEvent
2023-04-28 00:04:28
LiskHQ/lisk-desktop
https://api.github.com/repos/LiskHQ/lisk-desktop
opened
Inaccessible hardware wallet accounts stored in account list
type: bug priority: medium domain: hardware-wallet
### Expected behavior Previous selected and unintialized hardware wallet accounts should be removed from the account list after hardware wallet is disconnected ### Actual behavior Both previously selected and uninitialized hardware wallet accounts remain in account list after hardware wallet is disconnected ![lisk-app-test-fdbk-8](https://user-images.githubusercontent.com/31376203/235015353-8f34b8e3-f5ed-4368-a13c-ebc7d86b80e2.png) ### Steps to reproduce - Connect hardware wallet - Select "Switch account" from the account dropdown in the top bar - Select a hardware wallet account - Disconnect hardware wallet - Open the switch account modal to see the list of accounts ### Which version(s) does this affect? (Environment, OS, etc...) All
1.0
Inaccessible hardware wallet accounts stored in account list - ### Expected behavior Previous selected and unintialized hardware wallet accounts should be removed from the account list after hardware wallet is disconnected ### Actual behavior Both previously selected and uninitialized hardware wallet accounts remain in account list after hardware wallet is disconnected ![lisk-app-test-fdbk-8](https://user-images.githubusercontent.com/31376203/235015353-8f34b8e3-f5ed-4368-a13c-ebc7d86b80e2.png) ### Steps to reproduce - Connect hardware wallet - Select "Switch account" from the account dropdown in the top bar - Select a hardware wallet account - Disconnect hardware wallet - Open the switch account modal to see the list of accounts ### Which version(s) does this affect? (Environment, OS, etc...) All
priority
inaccessible hardware wallet accounts stored in account list expected behavior previous selected and unintialized hardware wallet accounts should be removed from the account list after hardware wallet is disconnected actual behavior both previously selected and uninitialized hardware wallet accounts remain in account list after hardware wallet is disconnected steps to reproduce connect hardware wallet select switch account from the account dropdown in the top bar select a hardware wallet account disconnect hardware wallet open the switch account modal to see the list of accounts which version s does this affect environment os etc all
1
104,619
16,619,403,257
IssuesEvent
2021-06-02 21:30:33
MythicDrops/MythicDrops
https://api.github.com/repos/MythicDrops/MythicDrops
closed
CVE-2021-27290 (High) detected in ssri-6.0.1.tgz - autoclosed
security vulnerability
## CVE-2021-27290 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ssri-6.0.1.tgz</b></p></summary> <p>Standard Subresource Integrity library -- parses, serializes, generates, and verifies integrity metadata according to the SRI spec.</p> <p>Library home page: <a href="https://registry.npmjs.org/ssri/-/ssri-6.0.1.tgz">https://registry.npmjs.org/ssri/-/ssri-6.0.1.tgz</a></p> <p>Path to dependency file: MythicDrops/website/package.json</p> <p>Path to vulnerable library: MythicDrops/website/node_modules/webpack/node_modules/ssri/package.json,MythicDrops/node_modules/npm/node_modules/ssri/package.json</p> <p> Dependency Hierarchy: - semantic-release-17.4.2.tgz (Root Library) - npm-7.0.10.tgz - npm-6.14.11.tgz - :x: **ssri-6.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/MythicDrops/MythicDrops/commit/4c7d8c28d6a410c580066f64b82d37dd7bc9a302">4c7d8c28d6a410c580066f64b82d37dd7bc9a302</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option. <p>Publish Date: 2021-03-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-27290>CVE-2021-27290</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290</a></p> <p>Release Date: 2021-03-12</p> <p>Fix Resolution: ssri - 6.0.2,8.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-27290 (High) detected in ssri-6.0.1.tgz - autoclosed - ## CVE-2021-27290 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ssri-6.0.1.tgz</b></p></summary> <p>Standard Subresource Integrity library -- parses, serializes, generates, and verifies integrity metadata according to the SRI spec.</p> <p>Library home page: <a href="https://registry.npmjs.org/ssri/-/ssri-6.0.1.tgz">https://registry.npmjs.org/ssri/-/ssri-6.0.1.tgz</a></p> <p>Path to dependency file: MythicDrops/website/package.json</p> <p>Path to vulnerable library: MythicDrops/website/node_modules/webpack/node_modules/ssri/package.json,MythicDrops/node_modules/npm/node_modules/ssri/package.json</p> <p> Dependency Hierarchy: - semantic-release-17.4.2.tgz (Root Library) - npm-7.0.10.tgz - npm-6.14.11.tgz - :x: **ssri-6.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/MythicDrops/MythicDrops/commit/4c7d8c28d6a410c580066f64b82d37dd7bc9a302">4c7d8c28d6a410c580066f64b82d37dd7bc9a302</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option. <p>Publish Date: 2021-03-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-27290>CVE-2021-27290</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290</a></p> <p>Release Date: 2021-03-12</p> <p>Fix Resolution: ssri - 6.0.2,8.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in ssri tgz autoclosed cve high severity vulnerability vulnerable library ssri tgz standard subresource integrity library parses serializes generates and verifies integrity metadata according to the sri spec library home page a href path to dependency file mythicdrops website package json path to vulnerable library mythicdrops website node modules webpack node modules ssri package json mythicdrops node modules npm node modules ssri package json dependency hierarchy semantic release tgz root library npm tgz npm tgz x ssri tgz vulnerable library found in head commit a href found in base branch main vulnerability details ssri fixed in processes sris using a regular expression which is vulnerable to a denial of service malicious sris could take an extremely long time to process leading to denial of service this issue only affects consumers using the strict option publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ssri step up your open source security game with whitesource
0
72,288
9,562,589,768
IssuesEvent
2019-05-04 10:32:41
openscript/beefindr
https://api.github.com/repos/openscript/beefindr
closed
Risikoanalyse
documentation
# Ziel Schutzbedarf und Risikoanalyse erstellen (die Excel Vorlagen verwenden) # Auftrag - [x] Schutzbedarf und Risikoanalyse erstellen (die Excel Vorlagen verwenden) https://www.isb.admin.ch/isb/de/home/ikt-vorgaben/prozesse-methoden/p041-schutzbedarfsanalyse_schuban.html https://www.isb.admin.ch/isb/de/home/ikt-vorgaben/prozesse-methoden/p042-informationssicherheits-und-datenschutzkonzept_ISDS.html - [x] Auswahl der geeigneten Schutzmassnahmen - [x] Konfigurieren der Massnahmen für den Service und das GUI umsetzen und testen - [x] Dokumentation für den Schlussbericht erstellen - [x] **Die 2 Top Risiken und 2 wichtigsten Massnahmen im Modulforum mit den anderen Gruppen teilen und gegenseitig kommentieren.**
1.0
Risikoanalyse - # Ziel Schutzbedarf und Risikoanalyse erstellen (die Excel Vorlagen verwenden) # Auftrag - [x] Schutzbedarf und Risikoanalyse erstellen (die Excel Vorlagen verwenden) https://www.isb.admin.ch/isb/de/home/ikt-vorgaben/prozesse-methoden/p041-schutzbedarfsanalyse_schuban.html https://www.isb.admin.ch/isb/de/home/ikt-vorgaben/prozesse-methoden/p042-informationssicherheits-und-datenschutzkonzept_ISDS.html - [x] Auswahl der geeigneten Schutzmassnahmen - [x] Konfigurieren der Massnahmen für den Service und das GUI umsetzen und testen - [x] Dokumentation für den Schlussbericht erstellen - [x] **Die 2 Top Risiken und 2 wichtigsten Massnahmen im Modulforum mit den anderen Gruppen teilen und gegenseitig kommentieren.**
non_priority
risikoanalyse ziel schutzbedarf und risikoanalyse erstellen die excel vorlagen verwenden auftrag schutzbedarf und risikoanalyse erstellen die excel vorlagen verwenden auswahl der geeigneten schutzmassnahmen konfigurieren der massnahmen für den service und das gui umsetzen und testen dokumentation für den schlussbericht erstellen die top risiken und wichtigsten massnahmen im modulforum mit den anderen gruppen teilen und gegenseitig kommentieren
0
176,925
21,464,438,422
IssuesEvent
2022-04-26 01:09:20
alexcorvi/apexo
https://api.github.com/repos/alexcorvi/apexo
closed
CVE-2020-7789 (Medium) detected in node-notifier-5.4.3.tgz - autoclosed
security vulnerability
## CVE-2020-7789 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-notifier-5.4.3.tgz</b></p></summary> <p>A Node.js module for sending notifications on native Mac, Windows (post and pre 8) and Linux (or Growl as fallback)</p> <p>Library home page: <a href="https://registry.npmjs.org/node-notifier/-/node-notifier-5.4.3.tgz">https://registry.npmjs.org/node-notifier/-/node-notifier-5.4.3.tgz</a></p> <p>Path to dependency file: apexo/package.json</p> <p>Path to vulnerable library: apexo/node_modules/node-notifier/package.json</p> <p> Dependency Hierarchy: - jest-24.9.0.tgz (Root Library) - jest-cli-24.9.0.tgz - core-24.9.0.tgz - reporters-24.9.0.tgz - :x: **node-notifier-5.4.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7789>CVE-2020-7789</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7789">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7789</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution: 9.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7789 (Medium) detected in node-notifier-5.4.3.tgz - autoclosed - ## CVE-2020-7789 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-notifier-5.4.3.tgz</b></p></summary> <p>A Node.js module for sending notifications on native Mac, Windows (post and pre 8) and Linux (or Growl as fallback)</p> <p>Library home page: <a href="https://registry.npmjs.org/node-notifier/-/node-notifier-5.4.3.tgz">https://registry.npmjs.org/node-notifier/-/node-notifier-5.4.3.tgz</a></p> <p>Path to dependency file: apexo/package.json</p> <p>Path to vulnerable library: apexo/node_modules/node-notifier/package.json</p> <p> Dependency Hierarchy: - jest-24.9.0.tgz (Root Library) - jest-cli-24.9.0.tgz - core-24.9.0.tgz - reporters-24.9.0.tgz - :x: **node-notifier-5.4.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7789>CVE-2020-7789</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7789">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7789</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution: 9.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in node notifier tgz autoclosed cve medium severity vulnerability vulnerable library node notifier tgz a node js module for sending notifications on native mac windows post and pre and linux or growl as fallback library home page a href path to dependency file apexo package json path to vulnerable library apexo node modules node notifier package json dependency hierarchy jest tgz root library jest cli tgz core tgz reporters tgz x node notifier tgz vulnerable library found in base branch master vulnerability details this affects the package node notifier before it allows an attacker to run arbitrary commands on linux machines due to the options params not being sanitised when being passed an array publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
374,175
26,103,747,599
IssuesEvent
2022-12-27 10:29:36
WorldHealthOrganization/open-source-communication-channel
https://api.github.com/repos/WorldHealthOrganization/open-source-communication-channel
closed
Update projects on README
documentation
Update README file to include Step-by-step and Em Care to list of projects and project points of contact.
1.0
Update projects on README - Update README file to include Step-by-step and Em Care to list of projects and project points of contact.
non_priority
update projects on readme update readme file to include step by step and em care to list of projects and project points of contact
0
425
2,496,666,619
IssuesEvent
2015-01-06 21:18:39
cytoscape/cytoscape.js
https://api.github.com/repos/cytoscape/cytoscape.js
opened
Private renderer.renderTo() motionblur conflict
1-high-priority bug renderer
Seems to be timeout related, as the forced context case should not affect the main rendering logic.
1.0
Private renderer.renderTo() motionblur conflict - Seems to be timeout related, as the forced context case should not affect the main rendering logic.
priority
private renderer renderto motionblur conflict seems to be timeout related as the forced context case should not affect the main rendering logic
1
242,163
20,201,516,548
IssuesEvent
2022-02-11 15:41:40
ubtue/DatenProbleme
https://api.github.com/repos/ubtue/DatenProbleme
reopened
ISSN 2513-1389 | Zeitschrift für christlich-jüdische Begegnung im Kontext | Seitenangabe
ready for testing Zotero_SEMI-AUTO
**URL** https://zfbeg.org/ojs/index.php/cjbk/issue/view/28 **Import-Translator** ubtue_Open Journal Systems Standard.js (Einzel- und Mehrfach-Import) **Problembeschreibung** Bei der Seitenangabe wird der Ausdruck "S." mit importiert sowie am Ende ein Punkt-Zeichen, was dann zum gleichen Export führt. Korrekte Angabe ist ohne "S." und Punkt am Ende und einfach nur die arabische Ziffer. ![image](https://user-images.githubusercontent.com/57000004/153588584-8c96c642-ce44-47f2-809f-ce88fda7dc33.png) ![image](https://user-images.githubusercontent.com/57000004/153588726-b02e0fa5-b3bf-41e2-91a3-a68533499ac7.png)
1.0
ISSN 2513-1389 | Zeitschrift für christlich-jüdische Begegnung im Kontext | Seitenangabe - **URL** https://zfbeg.org/ojs/index.php/cjbk/issue/view/28 **Import-Translator** ubtue_Open Journal Systems Standard.js (Einzel- und Mehrfach-Import) **Problembeschreibung** Bei der Seitenangabe wird der Ausdruck "S." mit importiert sowie am Ende ein Punkt-Zeichen, was dann zum gleichen Export führt. Korrekte Angabe ist ohne "S." und Punkt am Ende und einfach nur die arabische Ziffer. ![image](https://user-images.githubusercontent.com/57000004/153588584-8c96c642-ce44-47f2-809f-ce88fda7dc33.png) ![image](https://user-images.githubusercontent.com/57000004/153588726-b02e0fa5-b3bf-41e2-91a3-a68533499ac7.png)
non_priority
issn zeitschrift für christlich jüdische begegnung im kontext seitenangabe url import translator ubtue open journal systems standard js einzel und mehrfach import problembeschreibung bei der seitenangabe wird der ausdruck s mit importiert sowie am ende ein punkt zeichen was dann zum gleichen export führt korrekte angabe ist ohne s und punkt am ende und einfach nur die arabische ziffer
0
339,905
10,264,130,306
IssuesEvent
2019-08-22 15:41:33
medic/medic-conf
https://api.github.com/repos/medic/medic-conf
closed
Declarative Configuration - Ability to control which contact is associated with emitted task
Priority: 1 - High enhancement
Tasks which are emitted by app_settings configuration contain a contact attribute which controls which contact is associated with the task. In the declarative configuration system, the contact associated with the task is the owner of the report that generated the task. [Here](https://github.com/medic/medic-conf/blob/master/src/nools/lib.js#L142) For Muso's mRDT supervisor workflows, we need to generate tasks for supervisors which are based on the content of reports owned by patients. More details contained in: https://github.com/medic/medic-projects/issues/6519
1.0
Declarative Configuration - Ability to control which contact is associated with emitted task - Tasks which are emitted by app_settings configuration contain a contact attribute which controls which contact is associated with the task. In the declarative configuration system, the contact associated with the task is the owner of the report that generated the task. [Here](https://github.com/medic/medic-conf/blob/master/src/nools/lib.js#L142) For Muso's mRDT supervisor workflows, we need to generate tasks for supervisors which are based on the content of reports owned by patients. More details contained in: https://github.com/medic/medic-projects/issues/6519
priority
declarative configuration ability to control which contact is associated with emitted task tasks which are emitted by app settings configuration contain a contact attribute which controls which contact is associated with the task in the declarative configuration system the contact associated with the task is the owner of the report that generated the task for muso s mrdt supervisor workflows we need to generate tasks for supervisors which are based on the content of reports owned by patients more details contained in
1
92,591
10,758,944,835
IssuesEvent
2019-10-31 15:47:43
microsoft/PowerToys
https://api.github.com/repos/microsoft/PowerToys
closed
PowerRename - capturing and using regex parts
PowerRename documentation
I wanted to check if capturing and using regex parts is possible - I'm used to this from Visual Studio and Notepad++. Found it by accident, it should be documented. Capturing a part can be done like "(...)", using the captured values in the replace can be done with "$1"..."$n". This is very useful and should be added to the documentation.
1.0
PowerRename - capturing and using regex parts - I wanted to check if capturing and using regex parts is possible - I'm used to this from Visual Studio and Notepad++. Found it by accident, it should be documented. Capturing a part can be done like "(...)", using the captured values in the replace can be done with "$1"..."$n". This is very useful and should be added to the documentation.
non_priority
powerrename capturing and using regex parts i wanted to check if capturing and using regex parts is possible i m used to this from visual studio and notepad found it by accident it should be documented capturing a part can be done like using the captured values in the replace can be done with n this is very useful and should be added to the documentation
0
27,272
4,049,144,372
IssuesEvent
2016-05-23 13:13:30
duckduckgo/community-platform
https://api.github.com/repos/duckduckgo/community-platform
closed
An idea to make it quicker to delete spam
Design Forum
The spam has been heavy lately. That and the fact that my laptop has a small screen has forced to scoll up and down tons of times to be able click the "Leave invisible" button, whenever there was a difference in the length of the content of the spam-post (and thus the height of `div` containing it). I quickly checked out the CSS, and managed to add the following CSS code: ```CSS .moderation .notification__comment { height: 350px; max-height: 350px; min-height: 350px; overflow-y: scroll; } ``` This makes each `div` containing a spam message in the moderation-section always have an height of 350px. This means the "Leave invisible"-button is in the same place, every time a new spam message "moves up". Would that be something you would consider adding? Maybe you could make this option if most people don't want this? I figured out that the changes should go into `notifications.css`, but I didn't add it as it should include the `.moderation`-part, and I don't know if you want *that* part to go in `notifications.css`.) In case it can go there I can make a pull request! :) That would be my first one! xD ^_^ Let me know what you think! :)
1.0
An idea to make it quicker to delete spam - The spam has been heavy lately. That and the fact that my laptop has a small screen has forced to scoll up and down tons of times to be able click the "Leave invisible" button, whenever there was a difference in the length of the content of the spam-post (and thus the height of `div` containing it). I quickly checked out the CSS, and managed to add the following CSS code: ```CSS .moderation .notification__comment { height: 350px; max-height: 350px; min-height: 350px; overflow-y: scroll; } ``` This makes each `div` containing a spam message in the moderation-section always have an height of 350px. This means the "Leave invisible"-button is in the same place, every time a new spam message "moves up". Would that be something you would consider adding? Maybe you could make this option if most people don't want this? I figured out that the changes should go into `notifications.css`, but I didn't add it as it should include the `.moderation`-part, and I don't know if you want *that* part to go in `notifications.css`.) In case it can go there I can make a pull request! :) That would be my first one! xD ^_^ Let me know what you think! :)
non_priority
an idea to make it quicker to delete spam the spam has been heavy lately that and the fact that my laptop has a small screen has forced to scoll up and down tons of times to be able click the leave invisible button whenever there was a difference in the length of the content of the spam post and thus the height of div containing it i quickly checked out the css and managed to add the following css code css moderation notification comment height max height min height overflow y scroll this makes each div containing a spam message in the moderation section always have an height of this means the leave invisible button is in the same place every time a new spam message moves up would that be something you would consider adding maybe you could make this option if most people don t want this i figured out that the changes should go into notifications css but i didn t add it as it should include the moderation part and i don t know if you want that part to go in notifications css in case it can go there i can make a pull request that would be my first one xd let me know what you think
0
809,251
30,182,186,142
IssuesEvent
2023-07-04 09:36:35
pendulum-chain/spacewalk
https://api.github.com/repos/pendulum-chain/spacewalk
closed
Support 'confirm' SCP messages in the stellar-relay when proving transaction validity
priority:high
# Problem With the current implementation, the `stellar-relay` pallet only considers `ScpStatementExternalize` consensus messages to prove the validity of a Stellar transaction. However, we identified that Stellar archive entries usually only contain just **one** externalized message but many other 'ScpStatementConfim` or `ScpStatementPrepare` messages. This means that we currently cannot use archive entries to submit 'execute...' extrinsics, since this one externalized message is not enough. # Solution We want to change the validation logic used in the `stellar-relay` pallet to also consider `ScpStatementConfirm` messages. If we combine all 'confirm' and 'externalize' messages contained in archive entries, we should be build valid proofs even when missing the relevant consensus messages when they are emitted on Stellar's overlay network. The reasoning why we can do this can be found on [this](https://www.notion.so/satoshipay/Archived-SCP-Messages-6801530d58d44f1fba1208db27ddee03#b052bb35b2fa416ea69034c5a2b34ae9) Notion page. For our implementation, we will follow the 'simplified approach' described [here](https://www.notion.so/satoshipay/Archived-SCP-Messages-6801530d58d44f1fba1208db27ddee03?pvs=4#b052bb35b2fa416ea69034c5a2b34ae9). ### Steps Note: The structure of `ScpStatements` can be found [here](https://stellar-sdk.readthedocs.io/en/stable/api.html#scpstatement). This is relevant for the next steps. Extend the logic of [this](https://github.com/pendulum-chain/spacewalk/blob/06873f16c4a7ab884e4759d98b7b86c712e0c0ae/pallets/stellar-relay/src/lib.rs#L577-L586) `match` statement: - [ ] Add a new branch for `ScpStConfirm` pledges. Add logic that is very similar to the check for externalized messages, ie. check that the transaction set hash contained in the `ScpBallot` of the pledge matches the one we expect. **Note** that you might have to slightly adapt the `get_tx_set_hash` function because the names for the ballots differ between 'externalize' and 'confirm' messages (ie. it's either `commit` or `ballot`). - [ ] Ensure that all statements contained in the envelopes refer to the same `nH` value. By checking if the transaction set hash contained in the externalized/confirmed ballot matches the expected, we make sure that the consensus messages are related to the same value and the value we are looking for simultaneously.
1.0
Support 'confirm' SCP messages in the stellar-relay when proving transaction validity - # Problem With the current implementation, the `stellar-relay` pallet only considers `ScpStatementExternalize` consensus messages to prove the validity of a Stellar transaction. However, we identified that Stellar archive entries usually only contain just **one** externalized message but many other 'ScpStatementConfim` or `ScpStatementPrepare` messages. This means that we currently cannot use archive entries to submit 'execute...' extrinsics, since this one externalized message is not enough. # Solution We want to change the validation logic used in the `stellar-relay` pallet to also consider `ScpStatementConfirm` messages. If we combine all 'confirm' and 'externalize' messages contained in archive entries, we should be build valid proofs even when missing the relevant consensus messages when they are emitted on Stellar's overlay network. The reasoning why we can do this can be found on [this](https://www.notion.so/satoshipay/Archived-SCP-Messages-6801530d58d44f1fba1208db27ddee03#b052bb35b2fa416ea69034c5a2b34ae9) Notion page. For our implementation, we will follow the 'simplified approach' described [here](https://www.notion.so/satoshipay/Archived-SCP-Messages-6801530d58d44f1fba1208db27ddee03?pvs=4#b052bb35b2fa416ea69034c5a2b34ae9). ### Steps Note: The structure of `ScpStatements` can be found [here](https://stellar-sdk.readthedocs.io/en/stable/api.html#scpstatement). This is relevant for the next steps. Extend the logic of [this](https://github.com/pendulum-chain/spacewalk/blob/06873f16c4a7ab884e4759d98b7b86c712e0c0ae/pallets/stellar-relay/src/lib.rs#L577-L586) `match` statement: - [ ] Add a new branch for `ScpStConfirm` pledges. Add logic that is very similar to the check for externalized messages, ie. check that the transaction set hash contained in the `ScpBallot` of the pledge matches the one we expect. **Note** that you might have to slightly adapt the `get_tx_set_hash` function because the names for the ballots differ between 'externalize' and 'confirm' messages (ie. it's either `commit` or `ballot`). - [ ] Ensure that all statements contained in the envelopes refer to the same `nH` value. By checking if the transaction set hash contained in the externalized/confirmed ballot matches the expected, we make sure that the consensus messages are related to the same value and the value we are looking for simultaneously.
priority
support confirm scp messages in the stellar relay when proving transaction validity problem with the current implementation the stellar relay pallet only considers scpstatementexternalize consensus messages to prove the validity of a stellar transaction however we identified that stellar archive entries usually only contain just one externalized message but many other scpstatementconfim or scpstatementprepare messages this means that we currently cannot use archive entries to submit execute extrinsics since this one externalized message is not enough solution we want to change the validation logic used in the stellar relay pallet to also consider scpstatementconfirm messages if we combine all confirm and externalize messages contained in archive entries we should be build valid proofs even when missing the relevant consensus messages when they are emitted on stellar s overlay network the reasoning why we can do this can be found on notion page for our implementation we will follow the simplified approach described steps note the structure of scpstatements can be found this is relevant for the next steps extend the logic of match statement add a new branch for scpstconfirm pledges add logic that is very similar to the check for externalized messages ie check that the transaction set hash contained in the scpballot of the pledge matches the one we expect note that you might have to slightly adapt the get tx set hash function because the names for the ballots differ between externalize and confirm messages ie it s either commit or ballot ensure that all statements contained in the envelopes refer to the same nh value by checking if the transaction set hash contained in the externalized confirmed ballot matches the expected we make sure that the consensus messages are related to the same value and the value we are looking for simultaneously
1
615,974
19,287,131,076
IssuesEvent
2021-12-11 05:48:53
Vyxal/Vyxal
https://api.github.com/repos/Vyxal/Vyxal
closed
Mold modifies inputs
bug difficulty: average priority:high
When one of the arguments passed to Mold is input, whether taken implicitly or explicitly, it permanently modifies that input to be whatever the output of the Mold command was. Examples: [1 Input](https://vyxal.pythonanywhere.com/#WyIiLCIiLCI/LD8sIMK2LCDin6hcXGF8XFxifFxcY+KfqT8g4oCiID8sPywiLCIiLCJbMSwyLDMsNCw1LDYsNyw4LDldIl0=) [2 Inputs](https://vyxal.pythonanywhere.com/#WyIiLCIiLCLigKIgwrkswrkswrksIiwiIiwiWzEsMiwzLDQsNSw2LDcsOCw5XVxuWydhJywgJ2InLCAnYyddIl0=)
1.0
Mold modifies inputs - When one of the arguments passed to Mold is input, whether taken implicitly or explicitly, it permanently modifies that input to be whatever the output of the Mold command was. Examples: [1 Input](https://vyxal.pythonanywhere.com/#WyIiLCIiLCI/LD8sIMK2LCDin6hcXGF8XFxifFxcY+KfqT8g4oCiID8sPywiLCIiLCJbMSwyLDMsNCw1LDYsNyw4LDldIl0=) [2 Inputs](https://vyxal.pythonanywhere.com/#WyIiLCIiLCLigKIgwrkswrkswrksIiwiIiwiWzEsMiwzLDQsNSw2LDcsOCw5XVxuWydhJywgJ2InLCAnYyddIl0=)
priority
mold modifies inputs when one of the arguments passed to mold is input whether taken implicitly or explicitly it permanently modifies that input to be whatever the output of the mold command was examples
1
582,547
17,363,986,114
IssuesEvent
2021-07-30 03:06:18
ReliaQualAssociates/ramstk
https://api.github.com/repos/ReliaQualAssociates/ramstk
closed
Remove do_get_tree() from Hardware Datamanager
priority: normal status: inprogress type: refactor
**Describe the chore that needs to be addressed.** 1. The do_get_tree() method should be deleted. 2. The pub.subscribe should be deleted. 3. _tag attributes needs to be singular. 4. Fix tests that expect _tag to be plural. 5. Fix export and test_export - [ ] This issue is an epic issue which subsumes the following:
1.0
Remove do_get_tree() from Hardware Datamanager - **Describe the chore that needs to be addressed.** 1. The do_get_tree() method should be deleted. 2. The pub.subscribe should be deleted. 3. _tag attributes needs to be singular. 4. Fix tests that expect _tag to be plural. 5. Fix export and test_export - [ ] This issue is an epic issue which subsumes the following:
priority
remove do get tree from hardware datamanager describe the chore that needs to be addressed the do get tree method should be deleted the pub subscribe should be deleted tag attributes needs to be singular fix tests that expect tag to be plural fix export and test export this issue is an epic issue which subsumes the following
1
636,906
20,612,641,003
IssuesEvent
2022-03-07 10:08:50
Soulcialize/souldragonknight
https://api.github.com/repos/Soulcialize/souldragonknight
opened
Add stamina and mana system
type.Enhancement priority.Medium
The knight will have stamina while the dragon has mana. These two resources are depleted when attacking and will recharge over time. This would discourage players from spamming their attacks which would make the enemies too easy to defeat. Players will have to cooperate more closely so that they do not waste stamina/mana on aimless attacks.
1.0
Add stamina and mana system - The knight will have stamina while the dragon has mana. These two resources are depleted when attacking and will recharge over time. This would discourage players from spamming their attacks which would make the enemies too easy to defeat. Players will have to cooperate more closely so that they do not waste stamina/mana on aimless attacks.
priority
add stamina and mana system the knight will have stamina while the dragon has mana these two resources are depleted when attacking and will recharge over time this would discourage players from spamming their attacks which would make the enemies too easy to defeat players will have to cooperate more closely so that they do not waste stamina mana on aimless attacks
1
705,014
24,218,361,781
IssuesEvent
2022-09-26 08:47:21
AY2223S1-CS2103T-T12-2/tp
https://api.github.com/repos/AY2223S1-CS2103T-T12-2/tp
closed
Update site-wide settings
type.Task priority.High
## Tasks - Follow guide for [Using Jekyll for project documentation @SE-EDU/guides](https://se-education.org/guides/tutorials/jekyll.html) - The text `AB-3` in `docs\_sass\minima\_base.scss` needs updating (it comes into play when you convert documentation to PDF formats) [Link](https://nus-cs2103-ay2223s1.github.io/website/schedule/week7/project.html#2-update-project-website-aboutus-readme) to details
1.0
Update site-wide settings - ## Tasks - Follow guide for [Using Jekyll for project documentation @SE-EDU/guides](https://se-education.org/guides/tutorials/jekyll.html) - The text `AB-3` in `docs\_sass\minima\_base.scss` needs updating (it comes into play when you convert documentation to PDF formats) [Link](https://nus-cs2103-ay2223s1.github.io/website/schedule/week7/project.html#2-update-project-website-aboutus-readme) to details
priority
update site wide settings tasks follow guide for the text ab in docs sass minima base scss needs updating it comes into play when you convert documentation to pdf formats to details
1
121,511
15,954,004,112
IssuesEvent
2021-04-15 13:06:48
department-of-veterans-affairs/vets-design-system-documentation
https://api.github.com/repos/department-of-veterans-affairs/vets-design-system-documentation
closed
Rename action link class to match documented naming convention
vsp-design-system-team
# Bug Report - [x] I’ve searched for any related issues and avoided creating a duplicate issue. ## Description The documentation on design.va.gov describes naming conventions for `formation` component classes: ![image](https://user-images.githubusercontent.com/2008881/114231854-d4584780-992f-11eb-87e6-08dacab3be0b.png) However, our action link component doesn't follow this documentation: ![image](https://user-images.githubusercontent.com/2008881/114232023-1a151000-9930-11eb-84fb-37eb43822a2c.png) ## Context - [Slack thread](https://dsva.slack.com/archives/CBU0KDSB1/p1617805314484100) ## Acceptance Criteria - [ ] `formation` is updated to change the action link class name to `vads-c-action-link` - [ ] `vets-website` is updated to find and replace all instances of the action link
1.0
Rename action link class to match documented naming convention - # Bug Report - [x] I’ve searched for any related issues and avoided creating a duplicate issue. ## Description The documentation on design.va.gov describes naming conventions for `formation` component classes: ![image](https://user-images.githubusercontent.com/2008881/114231854-d4584780-992f-11eb-87e6-08dacab3be0b.png) However, our action link component doesn't follow this documentation: ![image](https://user-images.githubusercontent.com/2008881/114232023-1a151000-9930-11eb-84fb-37eb43822a2c.png) ## Context - [Slack thread](https://dsva.slack.com/archives/CBU0KDSB1/p1617805314484100) ## Acceptance Criteria - [ ] `formation` is updated to change the action link class name to `vads-c-action-link` - [ ] `vets-website` is updated to find and replace all instances of the action link
non_priority
rename action link class to match documented naming convention bug report i’ve searched for any related issues and avoided creating a duplicate issue description the documentation on design va gov describes naming conventions for formation component classes however our action link component doesn t follow this documentation context acceptance criteria formation is updated to change the action link class name to vads c action link vets website is updated to find and replace all instances of the action link
0
14,303
3,822,386,762
IssuesEvent
2016-03-30 00:47:30
iovisor/bcc
https://api.github.com/repos/iovisor/bcc
opened
add /docs/INSTALL-UBUNTU.md
documentation
Targeted at Ubuntu Xenial and beyond. Should work. The docs should also mention that some /tools won't work on the older Xenial 4.4 kernel, and to check under /tools/old for versions that may work. If you've figured out the install steps, please drop comments here or a pull request.
1.0
add /docs/INSTALL-UBUNTU.md - Targeted at Ubuntu Xenial and beyond. Should work. The docs should also mention that some /tools won't work on the older Xenial 4.4 kernel, and to check under /tools/old for versions that may work. If you've figured out the install steps, please drop comments here or a pull request.
non_priority
add docs install ubuntu md targeted at ubuntu xenial and beyond should work the docs should also mention that some tools won t work on the older xenial kernel and to check under tools old for versions that may work if you ve figured out the install steps please drop comments here or a pull request
0
231,347
25,499,126,800
IssuesEvent
2022-11-28 01:09:26
jtimberlake/pacbot
https://api.github.com/repos/jtimberlake/pacbot
opened
CVE-2022-24999 (Medium) detected in multiple libraries
security vulnerability
## CVE-2022-24999 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>qs-6.5.2.tgz</b>, <b>qs-6.7.0.tgz</b>, <b>qs-6.4.0.tgz</b></p></summary> <p> <details><summary><b>qs-6.5.2.tgz</b></p></summary> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.5.2.tgz">https://registry.npmjs.org/qs/-/qs-6.5.2.tgz</a></p> <p>Path to dependency file: /webapp/package.json</p> <p>Path to vulnerable library: /webapp/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - cli-1.6.8.tgz (Root Library) - node-sass-4.14.1.tgz - request-2.88.2.tgz - :x: **qs-6.5.2.tgz** (Vulnerable Library) </details> <details><summary><b>qs-6.7.0.tgz</b></p></summary> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.7.0.tgz">https://registry.npmjs.org/qs/-/qs-6.7.0.tgz</a></p> <p>Path to dependency file: /webapp/package.json</p> <p>Path to vulnerable library: /webapp/node_modules/body-parser/node_modules/qs/package.json,/webapp/node_modules/express/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - karma-4.4.1.tgz (Root Library) - body-parser-1.19.0.tgz - :x: **qs-6.7.0.tgz** (Vulnerable Library) </details> <details><summary><b>qs-6.4.0.tgz</b></p></summary> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.4.0.tgz">https://registry.npmjs.org/qs/-/qs-6.4.0.tgz</a></p> <p>Path to dependency file: /webapp/package.json</p> <p>Path to vulnerable library: /webapp/node_modules/less/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - cli-1.6.8.tgz (Root Library) - less-2.7.3.tgz - request-2.81.0.tgz - :x: **qs-6.4.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/pacbot/commit/5a25dc15882324583860630e773af2e2647dd5fa">5a25dc15882324583860630e773af2e2647dd5fa</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable). <p>Publish Date: 2022-11-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-24999>CVE-2022-24999</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-24999">https://www.cve.org/CVERecord?id=CVE-2022-24999</a></p> <p>Release Date: 2022-11-26</p> <p>Fix Resolution: qs - 6.2.4,6.3.3,6.4.1,6.5.3,6.6.1,6.7.3,6.8.3,6.9.7,6.10.3</p> </p> </details> <p></p>
True
CVE-2022-24999 (Medium) detected in multiple libraries - ## CVE-2022-24999 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>qs-6.5.2.tgz</b>, <b>qs-6.7.0.tgz</b>, <b>qs-6.4.0.tgz</b></p></summary> <p> <details><summary><b>qs-6.5.2.tgz</b></p></summary> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.5.2.tgz">https://registry.npmjs.org/qs/-/qs-6.5.2.tgz</a></p> <p>Path to dependency file: /webapp/package.json</p> <p>Path to vulnerable library: /webapp/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - cli-1.6.8.tgz (Root Library) - node-sass-4.14.1.tgz - request-2.88.2.tgz - :x: **qs-6.5.2.tgz** (Vulnerable Library) </details> <details><summary><b>qs-6.7.0.tgz</b></p></summary> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.7.0.tgz">https://registry.npmjs.org/qs/-/qs-6.7.0.tgz</a></p> <p>Path to dependency file: /webapp/package.json</p> <p>Path to vulnerable library: /webapp/node_modules/body-parser/node_modules/qs/package.json,/webapp/node_modules/express/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - karma-4.4.1.tgz (Root Library) - body-parser-1.19.0.tgz - :x: **qs-6.7.0.tgz** (Vulnerable Library) </details> <details><summary><b>qs-6.4.0.tgz</b></p></summary> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.4.0.tgz">https://registry.npmjs.org/qs/-/qs-6.4.0.tgz</a></p> <p>Path to dependency file: /webapp/package.json</p> <p>Path to vulnerable library: /webapp/node_modules/less/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - cli-1.6.8.tgz (Root Library) - less-2.7.3.tgz - request-2.81.0.tgz - :x: **qs-6.4.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jtimberlake/pacbot/commit/5a25dc15882324583860630e773af2e2647dd5fa">5a25dc15882324583860630e773af2e2647dd5fa</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable). <p>Publish Date: 2022-11-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-24999>CVE-2022-24999</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-24999">https://www.cve.org/CVERecord?id=CVE-2022-24999</a></p> <p>Release Date: 2022-11-26</p> <p>Fix Resolution: qs - 6.2.4,6.3.3,6.4.1,6.5.3,6.6.1,6.7.3,6.8.3,6.9.7,6.10.3</p> </p> </details> <p></p>
non_priority
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries qs tgz qs tgz qs tgz qs tgz a querystring parser that supports nesting and arrays with a depth limit library home page a href path to dependency file webapp package json path to vulnerable library webapp node modules qs package json dependency hierarchy cli tgz root library node sass tgz request tgz x qs tgz vulnerable library qs tgz a querystring parser that supports nesting and arrays with a depth limit library home page a href path to dependency file webapp package json path to vulnerable library webapp node modules body parser node modules qs package json webapp node modules express node modules qs package json dependency hierarchy karma tgz root library body parser tgz x qs tgz vulnerable library qs tgz a querystring parser that supports nesting and arrays with a depth limit library home page a href path to dependency file webapp package json path to vulnerable library webapp node modules less node modules qs package json dependency hierarchy cli tgz root library less tgz request tgz x qs tgz vulnerable library found in head commit a href found in base branch master vulnerability details qs before as used in express before and other products allows attackers to cause a node process hang for an express application because an proto key can be used in many typical express use cases an unauthenticated remote attacker can place the attack payload in the query string of the url that is used to visit the application such as a b a a the fix was backported to qs and and therefore express which has deps qs in its release description is not vulnerable publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs
0
178,314
29,668,094,332
IssuesEvent
2023-06-11 03:30:55
calcom/cal.com
https://api.github.com/repos/calcom/cal.com
closed
[CAL-1734] Clarify what Sender ID means in Workflows
🎨 needs design 🧹 Improvements ⚡ Quick Wins :scroll: Needs Documentation Update Low priority
There's a portion that says "Sender ID" when setting up a workflow when the action is "Send SMS" it may exist for other actions too. No idea what this Sender ID means or how it is presented for the user. This should be explained with some explainer text below the field. ![CleanShot 2023-05-22 at 10.57.51@2x.png](https://uploads.linear.app/e86bf957-d82f-465e-b205-135559f4b623/3f6e4dce-ca73-42ba-9baa-e676a51f06a5/9ad23ce7-81af-4787-9b13-81a2ed65c5bf) ![CleanShot 2023-05-22 at 11.59.52@2x.png](https://uploads.linear.app/e86bf957-d82f-465e-b205-135559f4b623/9640628d-8884-479f-8669-9ea45b14f55d/f6438de7-f9fa-4d9f-acc4-214d20a9fc17) <sub>From [SyncLinear.com](https://synclinear.com) | [CAL-1734](https://linear.app/calcom/issue/CAL-1734/clarify-what-sender-id-means-in-workflows)</sub>
1.0
[CAL-1734] Clarify what Sender ID means in Workflows - There's a portion that says "Sender ID" when setting up a workflow when the action is "Send SMS" it may exist for other actions too. No idea what this Sender ID means or how it is presented for the user. This should be explained with some explainer text below the field. ![CleanShot 2023-05-22 at 10.57.51@2x.png](https://uploads.linear.app/e86bf957-d82f-465e-b205-135559f4b623/3f6e4dce-ca73-42ba-9baa-e676a51f06a5/9ad23ce7-81af-4787-9b13-81a2ed65c5bf) ![CleanShot 2023-05-22 at 11.59.52@2x.png](https://uploads.linear.app/e86bf957-d82f-465e-b205-135559f4b623/9640628d-8884-479f-8669-9ea45b14f55d/f6438de7-f9fa-4d9f-acc4-214d20a9fc17) <sub>From [SyncLinear.com](https://synclinear.com) | [CAL-1734](https://linear.app/calcom/issue/CAL-1734/clarify-what-sender-id-means-in-workflows)</sub>
non_priority
clarify what sender id means in workflows there s a portion that says sender id when setting up a workflow when the action is send sms it may exist for other actions too no idea what this sender id means or how it is presented for the user this should be explained with some explainer text below the field from
0
333,114
10,115,773,708
IssuesEvent
2019-07-30 22:56:49
BuddyForms/BuddyForms
https://api.github.com/repos/BuddyForms/BuddyForms
closed
Endpoints take attached page as edit
High Priorety Priority 1 bug
**Describe the bug** The form endpoints are broken. If you select Sample page as example as attached page and then visit the form the title and content of sample page are displayed in the form. But it should be empty **To Reproduce** Steps to reproduce the behavior: 1. Go to a post form 2. Select a page for edit submissions with a real title and content 3. Click on the View form link in the sidebar 4. Instead of a empty form the attached page is displayed in the form **Expected behavior** An empty form to create a new entry should be displayed **Screenshots** ![Bildschirmfoto 2019-07-29 um 14 32 26](https://user-images.githubusercontent.com/645567/62166920-44709680-b322-11e9-9a52-c7b35f76e6da.png)
1.0
Endpoints take attached page as edit - **Describe the bug** The form endpoints are broken. If you select Sample page as example as attached page and then visit the form the title and content of sample page are displayed in the form. But it should be empty **To Reproduce** Steps to reproduce the behavior: 1. Go to a post form 2. Select a page for edit submissions with a real title and content 3. Click on the View form link in the sidebar 4. Instead of a empty form the attached page is displayed in the form **Expected behavior** An empty form to create a new entry should be displayed **Screenshots** ![Bildschirmfoto 2019-07-29 um 14 32 26](https://user-images.githubusercontent.com/645567/62166920-44709680-b322-11e9-9a52-c7b35f76e6da.png)
priority
endpoints take attached page as edit describe the bug the form endpoints are broken if you select sample page as example as attached page and then visit the form the title and content of sample page are displayed in the form but it should be empty to reproduce steps to reproduce the behavior go to a post form select a page for edit submissions with a real title and content click on the view form link in the sidebar instead of a empty form the attached page is displayed in the form expected behavior an empty form to create a new entry should be displayed screenshots
1
288,716
8,850,723,855
IssuesEvent
2019-01-08 14:03:01
rathena/rathena
https://api.github.com/repos/rathena/rathena
closed
Unable to restore stack! Double continuation!
component:core mode:prerenewal mode:renewal priority:medium type:bug
<!-- NOTE: Anything within these brackets will be hidden on the preview of the Issue. --> * **rAthena Hash**: 79766cd99eebbc507c82f1900df60e909e46a23e <!-- Please specify the rAthena [GitHub hash](https://help.github.com/articles/autolinked-references-and-urls/#commit-shas) on which you encountered this issue. How to get your GitHub Hash: 1. cd your/rAthena/directory/ 2. git rev-parse --short HEAD 3. Copy the resulting hash. --> * **Client Date**: 2017-06-14 <!-- Please specify the client date you used. --> * **Server Mode**: Pre-renewal <!-- Which mode does your server use: Pre-Renewal or Renewal? --> * **Description of Issue**: ``` [Warning]: Unable to restore stack! Double continuation! [Debug]: Previous script (lost): [Debug]: Source (NPC): FAKE_NPC (invisible/not on a map) [Debug]: Current script: [Debug]: Source (NPC): FAKE_NPC (invisible/not on a map) Program received signal SIGSEGV, Segmentation fault. 0x00005555556b6bed in pop_stack (st=st@entry=0x7fffeca07b54, start=0, end=0) at script.cpp:3398 3398 struct script_stack* stack = st->stack; (gdb) bt full #0 0x00005555556b6bed in pop_stack (st=st@entry=0x7fffeca07b54, start=0, end=0) at script.cpp:3398 stack = 0x0 data = <optimized out> i = <optimized out> __FUNCTION__ = "pop_stack" #1 0x00005555556b7ab2 in run_func (st=st@entry=0x7fffeca07b54) at script.cpp:4007 data = <optimized out> i = <optimized out> start_sp = <optimized out> end_sp = <optimized out> func = 50 #2 0x00005555556bc800 in run_script_main (st=0x7fffeca07b54) at script.cpp:4270 c = <optimized out> cmdcount = 655339 gotocount = 2047 sd = <optimized out> stack = 0x7fffe78ceb1c #3 0x000055555564b7a8 in npc_scriptcont(map_session_data*, int, bool) () No symbol table info available. #4 0x00005555555d0905 in clif_parse (fd=8) at clif.cpp:20990 cmd = <optimized out> packet_len = 2 sd = <optimized out> pnum = 0 cmd2 = 21845 #5 0x00005555555749d5 in main () No symbol table info available. ``` This only happens today. after i applied this PR https://github.com/rathena/rathena/pull/3831 which im not sure if its connected. Edit --- Yup. reverted back without the PR and everything works fine.
1.0
Unable to restore stack! Double continuation! - <!-- NOTE: Anything within these brackets will be hidden on the preview of the Issue. --> * **rAthena Hash**: 79766cd99eebbc507c82f1900df60e909e46a23e <!-- Please specify the rAthena [GitHub hash](https://help.github.com/articles/autolinked-references-and-urls/#commit-shas) on which you encountered this issue. How to get your GitHub Hash: 1. cd your/rAthena/directory/ 2. git rev-parse --short HEAD 3. Copy the resulting hash. --> * **Client Date**: 2017-06-14 <!-- Please specify the client date you used. --> * **Server Mode**: Pre-renewal <!-- Which mode does your server use: Pre-Renewal or Renewal? --> * **Description of Issue**: ``` [Warning]: Unable to restore stack! Double continuation! [Debug]: Previous script (lost): [Debug]: Source (NPC): FAKE_NPC (invisible/not on a map) [Debug]: Current script: [Debug]: Source (NPC): FAKE_NPC (invisible/not on a map) Program received signal SIGSEGV, Segmentation fault. 0x00005555556b6bed in pop_stack (st=st@entry=0x7fffeca07b54, start=0, end=0) at script.cpp:3398 3398 struct script_stack* stack = st->stack; (gdb) bt full #0 0x00005555556b6bed in pop_stack (st=st@entry=0x7fffeca07b54, start=0, end=0) at script.cpp:3398 stack = 0x0 data = <optimized out> i = <optimized out> __FUNCTION__ = "pop_stack" #1 0x00005555556b7ab2 in run_func (st=st@entry=0x7fffeca07b54) at script.cpp:4007 data = <optimized out> i = <optimized out> start_sp = <optimized out> end_sp = <optimized out> func = 50 #2 0x00005555556bc800 in run_script_main (st=0x7fffeca07b54) at script.cpp:4270 c = <optimized out> cmdcount = 655339 gotocount = 2047 sd = <optimized out> stack = 0x7fffe78ceb1c #3 0x000055555564b7a8 in npc_scriptcont(map_session_data*, int, bool) () No symbol table info available. #4 0x00005555555d0905 in clif_parse (fd=8) at clif.cpp:20990 cmd = <optimized out> packet_len = 2 sd = <optimized out> pnum = 0 cmd2 = 21845 #5 0x00005555555749d5 in main () No symbol table info available. ``` This only happens today. after i applied this PR https://github.com/rathena/rathena/pull/3831 which im not sure if its connected. Edit --- Yup. reverted back without the PR and everything works fine.
priority
unable to restore stack double continuation rathena hash please specify the rathena on which you encountered this issue how to get your github hash cd your rathena directory git rev parse short head copy the resulting hash client date server mode pre renewal description of issue unable to restore stack double continuation previous script lost source npc fake npc invisible not on a map current script source npc fake npc invisible not on a map program received signal sigsegv segmentation fault in pop stack st st entry start end at script cpp struct script stack stack st stack gdb bt full in pop stack st st entry start end at script cpp stack data i function pop stack in run func st st entry at script cpp data i start sp end sp func in run script main st at script cpp c cmdcount gotocount sd stack in npc scriptcont map session data int bool no symbol table info available in clif parse fd at clif cpp cmd packet len sd pnum in main no symbol table info available this only happens today after i applied this pr which im not sure if its connected edit yup reverted back without the pr and everything works fine
1
17,090
3,354,268,211
IssuesEvent
2015-11-18 11:13:15
vigour-io/hub
https://api.github.com/repos/vigour-io/hub
closed
[Current Implementation] Region example
new:design
to get an idea what we are using this for , this an example of a region of the mtv app [![architecture](https://www.lucidchart.com/publicSegments/view/a677d1bc-faa9-4506-9e2c-06a25d748865/image.png)]
1.0
[Current Implementation] Region example - to get an idea what we are using this for , this an example of a region of the mtv app [![architecture](https://www.lucidchart.com/publicSegments/view/a677d1bc-faa9-4506-9e2c-06a25d748865/image.png)]
non_priority
region example to get an idea what we are using this for this an example of a region of the mtv app
0
51,873
3,015,025,053
IssuesEvent
2015-07-29 17:33:20
brharp/hjckrrh
https://api.github.com/repos/brharp/hjckrrh
closed
G13 General Taxonomy results
feature: general (G) priority: high
Please remove the Read More buttons as Titles will link to the content
1.0
G13 General Taxonomy results - Please remove the Read More buttons as Titles will link to the content
priority
general taxonomy results please remove the read more buttons as titles will link to the content
1
763,638
26,766,353,290
IssuesEvent
2023-01-31 10:55:26
minio/mc
https://api.github.com/repos/minio/mc
closed
Display arn:bucketname under mc replicate ls
community priority: medium
## Expected behavior The current display under mc replicate ls displays entire arn value under Destbucket column ## Actual behavior The Destbucket column should display arn:buckname instead of entire arn value. ## Steps to reproduce the behavior Set up replication rule for a bucket on an instance. Run comman mc replicate ls myminio/bucket_name ![image](https://user-images.githubusercontent.com/109562845/194942607-d623429b-fe78-4b2f-93cc-437e58ba9c80.png) ## mc --version RELEASE.2022-10-06T01-20-06Z
1.0
Display arn:bucketname under mc replicate ls - ## Expected behavior The current display under mc replicate ls displays entire arn value under Destbucket column ## Actual behavior The Destbucket column should display arn:buckname instead of entire arn value. ## Steps to reproduce the behavior Set up replication rule for a bucket on an instance. Run comman mc replicate ls myminio/bucket_name ![image](https://user-images.githubusercontent.com/109562845/194942607-d623429b-fe78-4b2f-93cc-437e58ba9c80.png) ## mc --version RELEASE.2022-10-06T01-20-06Z
priority
display arn bucketname under mc replicate ls expected behavior the current display under mc replicate ls displays entire arn value under destbucket column actual behavior the destbucket column should display arn buckname instead of entire arn value steps to reproduce the behavior set up replication rule for a bucket on an instance run comman mc replicate ls myminio bucket name mc version release
1
563,163
16,676,991,828
IssuesEvent
2021-06-07 17:28:28
googleapis/java-aiplatform
https://api.github.com/repos/googleapis/java-aiplatform
closed
aiplatform.CreateTrainingPipelineImageObjectDetectionSampleTest: testCreateTrainingPipelineImageObjectDetectionSample failed
api: aiplatform flakybot: flaky flakybot: issue priority: p1 type: bug
Note: #216 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky. ---- commit: dafca5d9fc1c0d77fc0c3f26c08c6827e53492a3 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/d828fa34-eac2-4ee9-98e4-0f94a6d7d73f), [Sponge](http://sponge2/d828fa34-eac2-4ee9-98e4-0f94a6d7d73f) status: failed <details><summary>Test output</summary><br><pre>com.google.api.gax.rpc.FailedPreconditionException: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: The TrainingPipeline "projects/ucaip-sample-tests/locations/us-central1/trainingPipelines/4256609733353406464" is in state PIPELINE_STATE_FAILED and cannot be canceled. at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:59) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:72) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:60) at com.google.api.gax.grpc.GrpcExceptionCallable$ExceptionTransformingFuture.onFailure(GrpcExceptionCallable.java:97) at com.google.api.core.ApiFutures$1.onFailure(ApiFutures.java:68) at com.google.common.util.concurrent.Futures$CallbackListener.run(Futures.java:1041) at com.google.common.util.concurrent.DirectExecutor.execute(DirectExecutor.java:30) at com.google.common.util.concurrent.AbstractFuture.executeListener(AbstractFuture.java:1215) at com.google.common.util.concurrent.AbstractFuture.complete(AbstractFuture.java:983) at com.google.common.util.concurrent.AbstractFuture.setException(AbstractFuture.java:771) at io.grpc.stub.ClientCalls$GrpcFuture.setException(ClientCalls.java:563) at io.grpc.stub.ClientCalls$UnaryStreamToFuture.onClose(ClientCalls.java:533) at io.grpc.internal.DelayedClientCall$DelayedListener$3.run(DelayedClientCall.java:464) at io.grpc.internal.DelayedClientCall$DelayedListener.delayOrExecute(DelayedClientCall.java:428) at io.grpc.internal.DelayedClientCall$DelayedListener.onClose(DelayedClientCall.java:461) at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:553) at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:68) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:739) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:718) at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37) at io.grpc.internal.SerializingExecutor.run(SerializingExecutor.java:123) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:748) Suppressed: com.google.api.gax.rpc.AsyncTaskException: Asynchronous task failed at com.google.api.gax.rpc.ApiExceptions.callAndTranslateApiException(ApiExceptions.java:57) at com.google.api.gax.rpc.UnaryCallable.call(UnaryCallable.java:112) at com.google.cloud.aiplatform.v1.PipelineServiceClient.cancelTrainingPipeline(PipelineServiceClient.java:757) at com.google.cloud.aiplatform.v1.PipelineServiceClient.cancelTrainingPipeline(PipelineServiceClient.java:688) at aiplatform.CancelTrainingPipelineSample.cancelTrainingPipelineSample(CancelTrainingPipelineSample.java:51) at aiplatform.CreateTrainingPipelineImageObjectDetectionSampleTest.tearDown(CreateTrainingPipelineImageObjectDetectionSampleTest.java:72) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.RunAfters.invokeMethod(RunAfters.java:46) at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:364) at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272) at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:237) at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:158) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:428) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162) at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:562) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:548) Caused by: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: The TrainingPipeline "projects/ucaip-sample-tests/locations/us-central1/trainingPipelines/4256609733353406464" is in state PIPELINE_STATE_FAILED and cannot be canceled. at io.grpc.Status.asRuntimeException(Status.java:535) ... 17 more </pre></details>
1.0
aiplatform.CreateTrainingPipelineImageObjectDetectionSampleTest: testCreateTrainingPipelineImageObjectDetectionSample failed - Note: #216 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky. ---- commit: dafca5d9fc1c0d77fc0c3f26c08c6827e53492a3 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/d828fa34-eac2-4ee9-98e4-0f94a6d7d73f), [Sponge](http://sponge2/d828fa34-eac2-4ee9-98e4-0f94a6d7d73f) status: failed <details><summary>Test output</summary><br><pre>com.google.api.gax.rpc.FailedPreconditionException: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: The TrainingPipeline "projects/ucaip-sample-tests/locations/us-central1/trainingPipelines/4256609733353406464" is in state PIPELINE_STATE_FAILED and cannot be canceled. at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:59) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:72) at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:60) at com.google.api.gax.grpc.GrpcExceptionCallable$ExceptionTransformingFuture.onFailure(GrpcExceptionCallable.java:97) at com.google.api.core.ApiFutures$1.onFailure(ApiFutures.java:68) at com.google.common.util.concurrent.Futures$CallbackListener.run(Futures.java:1041) at com.google.common.util.concurrent.DirectExecutor.execute(DirectExecutor.java:30) at com.google.common.util.concurrent.AbstractFuture.executeListener(AbstractFuture.java:1215) at com.google.common.util.concurrent.AbstractFuture.complete(AbstractFuture.java:983) at com.google.common.util.concurrent.AbstractFuture.setException(AbstractFuture.java:771) at io.grpc.stub.ClientCalls$GrpcFuture.setException(ClientCalls.java:563) at io.grpc.stub.ClientCalls$UnaryStreamToFuture.onClose(ClientCalls.java:533) at io.grpc.internal.DelayedClientCall$DelayedListener$3.run(DelayedClientCall.java:464) at io.grpc.internal.DelayedClientCall$DelayedListener.delayOrExecute(DelayedClientCall.java:428) at io.grpc.internal.DelayedClientCall$DelayedListener.onClose(DelayedClientCall.java:461) at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:553) at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:68) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:739) at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:718) at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37) at io.grpc.internal.SerializingExecutor.run(SerializingExecutor.java:123) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:748) Suppressed: com.google.api.gax.rpc.AsyncTaskException: Asynchronous task failed at com.google.api.gax.rpc.ApiExceptions.callAndTranslateApiException(ApiExceptions.java:57) at com.google.api.gax.rpc.UnaryCallable.call(UnaryCallable.java:112) at com.google.cloud.aiplatform.v1.PipelineServiceClient.cancelTrainingPipeline(PipelineServiceClient.java:757) at com.google.cloud.aiplatform.v1.PipelineServiceClient.cancelTrainingPipeline(PipelineServiceClient.java:688) at aiplatform.CancelTrainingPipelineSample.cancelTrainingPipelineSample(CancelTrainingPipelineSample.java:51) at aiplatform.CreateTrainingPipelineImageObjectDetectionSampleTest.tearDown(CreateTrainingPipelineImageObjectDetectionSampleTest.java:72) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.RunAfters.invokeMethod(RunAfters.java:46) at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:33) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:364) at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:272) at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:237) at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:158) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:428) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:162) at org.apache.maven.surefire.booter.ForkedBooter.run(ForkedBooter.java:562) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:548) Caused by: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: The TrainingPipeline "projects/ucaip-sample-tests/locations/us-central1/trainingPipelines/4256609733353406464" is in state PIPELINE_STATE_FAILED and cannot be canceled. at io.grpc.Status.asRuntimeException(Status.java:535) ... 17 more </pre></details>
priority
aiplatform createtrainingpipelineimageobjectdetectionsampletest testcreatetrainingpipelineimageobjectdetectionsample failed note was also for this test but it was closed more than days ago so i didn t mark it flaky commit buildurl status failed test output com google api gax rpc failedpreconditionexception io grpc statusruntimeexception failed precondition the trainingpipeline projects ucaip sample tests locations us trainingpipelines is in state pipeline state failed and cannot be canceled at com google api gax rpc apiexceptionfactory createexception apiexceptionfactory java at com google api gax grpc grpcapiexceptionfactory create grpcapiexceptionfactory java at com google api gax grpc grpcapiexceptionfactory create grpcapiexceptionfactory java at com google api gax grpc grpcexceptioncallable exceptiontransformingfuture onfailure grpcexceptioncallable java at com google api core apifutures onfailure apifutures java at com google common util concurrent futures callbacklistener run futures java at com google common util concurrent directexecutor execute directexecutor java at com google common util concurrent abstractfuture executelistener abstractfuture java at com google common util concurrent abstractfuture complete abstractfuture java at com google common util concurrent abstractfuture setexception abstractfuture java at io grpc stub clientcalls grpcfuture setexception clientcalls java at io grpc stub clientcalls unarystreamtofuture onclose clientcalls java at io grpc internal delayedclientcall delayedlistener run delayedclientcall java at io grpc internal delayedclientcall delayedlistener delayorexecute delayedclientcall java at io grpc internal delayedclientcall delayedlistener onclose delayedclientcall java at io grpc internal clientcallimpl closeobserver clientcallimpl java at io grpc internal clientcallimpl access clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runinternal clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runincontext clientcallimpl java at io grpc internal contextrunnable run contextrunnable java at io grpc internal serializingexecutor run serializingexecutor java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at java util concurrent scheduledthreadpoolexecutor scheduledfuturetask access scheduledthreadpoolexecutor java at java util concurrent scheduledthreadpoolexecutor scheduledfuturetask run scheduledthreadpoolexecutor java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java suppressed com google api gax rpc asynctaskexception asynchronous task failed at com google api gax rpc apiexceptions callandtranslateapiexception apiexceptions java at com google api gax rpc unarycallable call unarycallable java at com google cloud aiplatform pipelineserviceclient canceltrainingpipeline pipelineserviceclient java at com google cloud aiplatform pipelineserviceclient canceltrainingpipeline pipelineserviceclient java at aiplatform canceltrainingpipelinesample canceltrainingpipelinesample canceltrainingpipelinesample java at aiplatform createtrainingpipelineimageobjectdetectionsampletest teardown createtrainingpipelineimageobjectdetectionsampletest java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements runafters invokemethod runafters java at org junit internal runners statements runafters evaluate runafters java at org junit runners parentrunner evaluate parentrunner java at org junit runners evaluate java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit internal runners statements runbefores evaluate runbefores java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org apache maven surefire execute java at org apache maven surefire executewithrerun java at org apache maven surefire executetestset java at org apache maven surefire invoke java at org apache maven surefire booter forkedbooter runsuitesinprocess forkedbooter java at org apache maven surefire booter forkedbooter execute forkedbooter java at org apache maven surefire booter forkedbooter run forkedbooter java at org apache maven surefire booter forkedbooter main forkedbooter java caused by io grpc statusruntimeexception failed precondition the trainingpipeline projects ucaip sample tests locations us trainingpipelines is in state pipeline state failed and cannot be canceled at io grpc status asruntimeexception status java more
1
73,562
7,344,302,423
IssuesEvent
2018-03-07 14:18:21
italia/spid
https://api.github.com/repos/italia/spid
closed
Richiesta di validazione e deploy metadati - Comune di Cilavegna
metadata nuovo md test supporto amministrativo verifica implementazione
Buongiorno, si richiede la verifica e il deploy dei metadati per conto del Comune di Cilavegna: ``` https://www.suaplomellina.info/simplesaml/module.php/saml/sp/metadata.php/suaplomellina ``` Si tratta di uno Sportello conforme a quelli già precedentemente validati da GLOBO. Grazie
1.0
Richiesta di validazione e deploy metadati - Comune di Cilavegna - Buongiorno, si richiede la verifica e il deploy dei metadati per conto del Comune di Cilavegna: ``` https://www.suaplomellina.info/simplesaml/module.php/saml/sp/metadata.php/suaplomellina ``` Si tratta di uno Sportello conforme a quelli già precedentemente validati da GLOBO. Grazie
non_priority
richiesta di validazione e deploy metadati comune di cilavegna buongiorno si richiede la verifica e il deploy dei metadati per conto del comune di cilavegna si tratta di uno sportello conforme a quelli già precedentemente validati da globo grazie
0
798,900
28,300,437,617
IssuesEvent
2023-04-10 05:18:21
googleapis/google-cloud-ruby
https://api.github.com/repos/googleapis/google-cloud-ruby
closed
[Nightly CI Failures] Failures detected for google-cloud-bigquery-analytics_hub-v1
type: bug priority: p1 nightly failure
At 2023-04-09 08:59:15 UTC, detected failures in google-cloud-bigquery-analytics_hub-v1 for: yard report_key_e2e3dbfae4be82dcbd05632e6618c5d7
1.0
[Nightly CI Failures] Failures detected for google-cloud-bigquery-analytics_hub-v1 - At 2023-04-09 08:59:15 UTC, detected failures in google-cloud-bigquery-analytics_hub-v1 for: yard report_key_e2e3dbfae4be82dcbd05632e6618c5d7
priority
failures detected for google cloud bigquery analytics hub at utc detected failures in google cloud bigquery analytics hub for yard report key
1
240,898
20,100,616,357
IssuesEvent
2022-02-07 03:19:44
SpenceKonde/ATTinyCore
https://api.github.com/repos/SpenceKonde/ATTinyCore
closed
tinyNeoPixel can be made to not need the menu, I think...
enhancement work complete but untested
The reason we need the menu is that we have to use OUT rather than ST in the event of a zero bit. But we *can* do that with the 2 cycle ST instruction.... it just doesn't leave us with enough spare time to meet the exact timing constraints on the final bit of each byte. More recent investigations, however, have shown that in reality, the timing timing constraints on both the length of a 1 bit and the length of the inter-bit delay are considerably more generous than the datasheet indicates. So, as we do now, we pre-calculate whether we shall write the 0 or 1 pattern. Each bit can then start with two consecutive ST instructions (2 clocks each, giving us a 250ns zero - note that by both WS2812B and SK6812 standards, 3 clocks, 375ns, is also a legal zero. The WS2812 datasheet puts it at 200-500ns, the SK6812 at 150-450. So a zero that is between 200ns and 450ns should always be legal. In other words, 2 or 3 clocks. And a 1 must be at least 550. Which means we want the ST instruction to be issued on the 5th clock, And it looks like we also want the 1 bit to go low And regardless of what point during the ST instruction the pin is actually toggled, I can't imagine it wouldn't be the same point every time ST is called. it doesn't matter, because all ST's are offset by the same amount... So ST hi (2 clocks) ST next (the precalculated value based on next bit, hi or lo) (2 more clocks) Something taking 1 clock ST low whether we need it or nor. (2 clocks) We're now 7 clocks in, We'd ideally like to finish in 10 clocks, but as has been shown, it doesn't actually need to be that short ( https://wp.josh.com/2014/05/13/ws2812-neopixels-are-not-so-finicky-once-you-get-to-know-them/ ) So let's see - how about in that gap we copy lo (or hi), then after the st, we can sbrs (or sbrc), on the next bit, with that controlling what the next bit is. That's 2 more clocks, leaving us with one clock which we.... can't really do much with until the last two bits.., but we can just NOP that cycle away. Finally, on the last two bits things get interesting. Bit 1. Adafruit puts the SBIW there (makes sense) to decrement LED count. That takes an extra clock, so this new implementation would take 11 clocks on the second to last bit. Finally, after that last ST, we can't precalculate the next bit, first we have to load it with ld (2 clocks) - ujp to 9 - and we then do the SBRC/MOV to prep bit 7 bringing us to 11, and the BRNE to get back to the start of the next byte is 2 clocks bringing us to 13. That means the last bit will be 1682ns total, with the LOW time being 1us instead of our targeted 625us on the final bit, and 750us on the next-to-last bit. But if the site I linked above is accurate, the actual timing constraint there is just that it needs to be less than like 5000ns, which would imply we are in the clear. The penalty would be only a 5% reduction in write speed, (Adafruit's timing was **perfect** - 80 clocks exactly. My proposal adds 1 clock at the next-to-last bit and 3 at the final one. But I'd wager money it would work.... and everyone is always complaining about how many confusing tools submenus there are, and the menus for that are obnoxious because each part gets a different set of menus, they're not saved alongside the sketch, so you have to think to put in a reminder of what you chose.
1.0
tinyNeoPixel can be made to not need the menu, I think... - The reason we need the menu is that we have to use OUT rather than ST in the event of a zero bit. But we *can* do that with the 2 cycle ST instruction.... it just doesn't leave us with enough spare time to meet the exact timing constraints on the final bit of each byte. More recent investigations, however, have shown that in reality, the timing timing constraints on both the length of a 1 bit and the length of the inter-bit delay are considerably more generous than the datasheet indicates. So, as we do now, we pre-calculate whether we shall write the 0 or 1 pattern. Each bit can then start with two consecutive ST instructions (2 clocks each, giving us a 250ns zero - note that by both WS2812B and SK6812 standards, 3 clocks, 375ns, is also a legal zero. The WS2812 datasheet puts it at 200-500ns, the SK6812 at 150-450. So a zero that is between 200ns and 450ns should always be legal. In other words, 2 or 3 clocks. And a 1 must be at least 550. Which means we want the ST instruction to be issued on the 5th clock, And it looks like we also want the 1 bit to go low And regardless of what point during the ST instruction the pin is actually toggled, I can't imagine it wouldn't be the same point every time ST is called. it doesn't matter, because all ST's are offset by the same amount... So ST hi (2 clocks) ST next (the precalculated value based on next bit, hi or lo) (2 more clocks) Something taking 1 clock ST low whether we need it or nor. (2 clocks) We're now 7 clocks in, We'd ideally like to finish in 10 clocks, but as has been shown, it doesn't actually need to be that short ( https://wp.josh.com/2014/05/13/ws2812-neopixels-are-not-so-finicky-once-you-get-to-know-them/ ) So let's see - how about in that gap we copy lo (or hi), then after the st, we can sbrs (or sbrc), on the next bit, with that controlling what the next bit is. That's 2 more clocks, leaving us with one clock which we.... can't really do much with until the last two bits.., but we can just NOP that cycle away. Finally, on the last two bits things get interesting. Bit 1. Adafruit puts the SBIW there (makes sense) to decrement LED count. That takes an extra clock, so this new implementation would take 11 clocks on the second to last bit. Finally, after that last ST, we can't precalculate the next bit, first we have to load it with ld (2 clocks) - ujp to 9 - and we then do the SBRC/MOV to prep bit 7 bringing us to 11, and the BRNE to get back to the start of the next byte is 2 clocks bringing us to 13. That means the last bit will be 1682ns total, with the LOW time being 1us instead of our targeted 625us on the final bit, and 750us on the next-to-last bit. But if the site I linked above is accurate, the actual timing constraint there is just that it needs to be less than like 5000ns, which would imply we are in the clear. The penalty would be only a 5% reduction in write speed, (Adafruit's timing was **perfect** - 80 clocks exactly. My proposal adds 1 clock at the next-to-last bit and 3 at the final one. But I'd wager money it would work.... and everyone is always complaining about how many confusing tools submenus there are, and the menus for that are obnoxious because each part gets a different set of menus, they're not saved alongside the sketch, so you have to think to put in a reminder of what you chose.
non_priority
tinyneopixel can be made to not need the menu i think the reason we need the menu is that we have to use out rather than st in the event of a zero bit but we can do that with the cycle st instruction it just doesn t leave us with enough spare time to meet the exact timing constraints on the final bit of each byte more recent investigations however have shown that in reality the timing timing constraints on both the length of a bit and the length of the inter bit delay are considerably more generous than the datasheet indicates so as we do now we pre calculate whether we shall write the or pattern each bit can then start with two consecutive st instructions clocks each giving us a zero note that by both and standards clocks is also a legal zero the datasheet puts it at the at so a zero that is between and should always be legal in other words or clocks and a must be at least which means we want the st instruction to be issued on the clock and it looks like we also want the bit to go low and regardless of what point during the st instruction the pin is actually toggled i can t imagine it wouldn t be the same point every time st is called it doesn t matter because all st s are offset by the same amount so st hi clocks st next the precalculated value based on next bit hi or lo more clocks something taking clock st low whether we need it or nor clocks we re now clocks in we d ideally like to finish in clocks but as has been shown it doesn t actually need to be that short so let s see how about in that gap we copy lo or hi then after the st we can sbrs or sbrc on the next bit with that controlling what the next bit is that s more clocks leaving us with one clock which we can t really do much with until the last two bits but we can just nop that cycle away finally on the last two bits things get interesting bit adafruit puts the sbiw there makes sense to decrement led count that takes an extra clock so this new implementation would take clocks on the second to last bit finally after that last st we can t precalculate the next bit first we have to load it with ld clocks ujp to and we then do the sbrc mov to prep bit bringing us to and the brne to get back to the start of the next byte is clocks bringing us to that means the last bit will be total with the low time being instead of our targeted on the final bit and on the next to last bit but if the site i linked above is accurate the actual timing constraint there is just that it needs to be less than like which would imply we are in the clear the penalty would be only a reduction in write speed adafruit s timing was perfect clocks exactly my proposal adds clock at the next to last bit and at the final one but i d wager money it would work and everyone is always complaining about how many confusing tools submenus there are and the menus for that are obnoxious because each part gets a different set of menus they re not saved alongside the sketch so you have to think to put in a reminder of what you chose
0
796,452
28,112,881,588
IssuesEvent
2023-03-31 08:35:21
YangCatalog/backend
https://api.github.com/repos/YangCatalog/backend
closed
Remove unnecessary git clones
Priority: Low maintenance
`pull_local.py`, `openconfigPullLocal.py`, `ietf_push.py` and `iana_push.py` for various reasons all trigger clones of repositories already downloaded in `/var/yang/nonietf`. Usually the reason is needing an up to date copy of the repository, or needing to add files to the repository without impacting other scripts. A better alternative to this would be to have one script keeping the repositories up to date (`run_download_github.sh` in module-compilation already does this). Any script that would need a copy of the repo that it can modify and that will not be modified by other scripts could then create it's own git worktree and delete it when it's done.
1.0
Remove unnecessary git clones - `pull_local.py`, `openconfigPullLocal.py`, `ietf_push.py` and `iana_push.py` for various reasons all trigger clones of repositories already downloaded in `/var/yang/nonietf`. Usually the reason is needing an up to date copy of the repository, or needing to add files to the repository without impacting other scripts. A better alternative to this would be to have one script keeping the repositories up to date (`run_download_github.sh` in module-compilation already does this). Any script that would need a copy of the repo that it can modify and that will not be modified by other scripts could then create it's own git worktree and delete it when it's done.
priority
remove unnecessary git clones pull local py openconfigpulllocal py ietf push py and iana push py for various reasons all trigger clones of repositories already downloaded in var yang nonietf usually the reason is needing an up to date copy of the repository or needing to add files to the repository without impacting other scripts a better alternative to this would be to have one script keeping the repositories up to date run download github sh in module compilation already does this any script that would need a copy of the repo that it can modify and that will not be modified by other scripts could then create it s own git worktree and delete it when it s done
1
25,481
7,718,007,930
IssuesEvent
2018-05-23 15:07:47
grafana/grafana
https://api.github.com/repos/grafana/grafana
closed
Publish archives and packages for all platforms to s3 and grafana.com
type: build & packaging
The new crossplatform build supplies archives and packages for linux, windows, darwin, armv7 and arm64. Currently only amd64/linux is published to grafana.com through the normal build pipeline. - [x] update build pipeline to publish the artifacts - [ ] update grafana.com to support showing the new artifacts Related to #11557
1.0
Publish archives and packages for all platforms to s3 and grafana.com - The new crossplatform build supplies archives and packages for linux, windows, darwin, armv7 and arm64. Currently only amd64/linux is published to grafana.com through the normal build pipeline. - [x] update build pipeline to publish the artifacts - [ ] update grafana.com to support showing the new artifacts Related to #11557
non_priority
publish archives and packages for all platforms to and grafana com the new crossplatform build supplies archives and packages for linux windows darwin and currently only linux is published to grafana com through the normal build pipeline update build pipeline to publish the artifacts update grafana com to support showing the new artifacts related to
0
649,943
21,330,710,108
IssuesEvent
2022-04-18 07:58:13
ZapSquared/Quaver
https://api.github.com/repos/ZapSquared/Quaver
closed
Queue command crashes Quaver
type:bug released on @next affects:functionality priority:p0
**Describe the bug** What isn't working as intended, and what does it affect? **Affected versions** What versions are affected by this bug? (e.g. >=3.0.1, 2.5.1-2.6.3, >=1.2.0) 3.4.0-next.34 **Steps to reproduce** Steps to reproduce the behavior. (e.g. click on a button, enter a value, etc. and see error) 1. Join a stage or voice channel 2. Play any track with Quaver 3. Use the queue command **Expected behavior** What is expected to happen? Send the queue **Actual behavior** What actually happens? Attach or add errors or screenshots here as well. Crashes immediately. ```js Ava@DESKTOP-5531PRA MINGW64 ~/Documents/GitHub/Quaver (next) $ node main.js 2022-04-02T11:10:59.123Z [Discord] INFO: Connected. Logged in as Aia#3990. 2022-04-02T11:10:59.126Z [Quaver] INFO: Running version 3.4.0-next.34. For help, see https://github.com/ZapSquared/Quaver/issues. 2022-04-02T11:10:59.127Z [Quaver] WARN: You are running an unstable version of Q uaver. Please report bugs using the link above, and note that features may chang e or be removed entirely prior to release. 2022-04-02T11:10:59.897Z [Lavalink] INFO: Connected. 2022-04-02T11:11:13.318Z [Quaver] INFO: [G 906471497231630336 | U 25093458962166 5793] Processing command play 2022-04-02T11:11:13.322Z [Quaver] INFO: [G 906471497231630336 | U 25093458962166 5793] Executing command play 2022-04-02T11:11:15.710Z [Quaver] INFO: [G 906471497231630336] Starting track 2022-04-02T11:11:23.168Z [Quaver] INFO: [G 906471497231630336 | U 25093458962166 5793] Processing command queue 2022-04-02T11:11:23.171Z [Quaver] INFO: [G 906471497231630336 | U 25093458962166 5793] Executing command queue 2022-04-02T11:11:23.175Z [Quaver] ERROR: [G 906471497231630336 | U 2509345896216 65793] Encountered error with command queue 2022-04-02T11:11:23.177Z [Quaver] ERROR: Cannot read properties of undefined (re ading 'additionalEmbeds') TypeError: Cannot read properties of undefined (reading 'additionalEmbeds') at ReplyHandler.error (C:\Users\Ava\Documents\GitHub\Quaver\classes\ReplyHan dler.js:56:20) at ReplyHandler.localeError (C:\Users\Ava\Documents\GitHub\Quaver\classes\Re plyHandler.js:90:15) at Object.execute (C:\Users\Ava\Documents\GitHub\Quaver\commands\queue.js:22 :35) at Object.execute (C:\Users\Ava\Documents\GitHub\Quaver\events\interactionCr eate.js:78:19) at Client.<anonymous> (C:\Users\Ava\Documents\GitHub\Quaver\main.js:162:41) at Client.emit (node:events:526:28) at InteractionCreateAction.handle (C:\Users\Ava\Documents\GitHub\Quaver\node _modules\discord.js\src\client\actions\InteractionCreate.js:74:12) at Object.module.exports [as INTERACTION_CREATE] (C:\Users\Ava\Documents\Git Hub\Quaver\node_modules\discord.js\src\client\websocket\handlers\INTERACTION_CRE ATE.js:4:36) at WebSocketManager.handlePacket (C:\Users\Ava\Documents\GitHub\Quaver\node_ modules\discord.js\src\client\websocket\WebSocketManager.js:351:31) at WebSocketShard.onPacket (C:\Users\Ava\Documents\GitHub\Quaver\node_module s\discord.js\src\client\websocket\WebSocketShard.js:444:22) 2022-04-02T11:11:23.179Z [Quaver] INFO: Shutting down... 2022-04-02T11:11:23.180Z [Quaver] INFO: Disconnecting from all guilds... 2022-04-02T11:11:23.180Z [Quaver] INFO: [G 906471497231630336] Disconnecting (re starting) 2022-04-02T11:11:23.594Z [Quaver] ERROR: Cannot read properties of undefined (re ading 'additionalEmbeds') TypeError: Cannot read properties of undefined (reading 'additionalEmbeds') at ReplyHandler.error (C:\Users\Ava\Documents\GitHub\Quaver\classes\ReplyHan dler.js:56:20) at ReplyHandler.localeError (C:\Users\Ava\Documents\GitHub\Quaver\classes\Re plyHandler.js:90:15) at Object.execute (C:\Users\Ava\Documents\GitHub\Quaver\events\interactionCr eate.js:83:36) at processTicksAndRejections (node:internal/process/task_queues:96:5) 2022-04-02T11:11:23.595Z [Quaver] INFO: Logging additional output to error.log. Ava@DESKTOP-5531PRA MINGW64 ~/Documents/GitHub/Quaver (next) ```
1.0
Queue command crashes Quaver - **Describe the bug** What isn't working as intended, and what does it affect? **Affected versions** What versions are affected by this bug? (e.g. >=3.0.1, 2.5.1-2.6.3, >=1.2.0) 3.4.0-next.34 **Steps to reproduce** Steps to reproduce the behavior. (e.g. click on a button, enter a value, etc. and see error) 1. Join a stage or voice channel 2. Play any track with Quaver 3. Use the queue command **Expected behavior** What is expected to happen? Send the queue **Actual behavior** What actually happens? Attach or add errors or screenshots here as well. Crashes immediately. ```js Ava@DESKTOP-5531PRA MINGW64 ~/Documents/GitHub/Quaver (next) $ node main.js 2022-04-02T11:10:59.123Z [Discord] INFO: Connected. Logged in as Aia#3990. 2022-04-02T11:10:59.126Z [Quaver] INFO: Running version 3.4.0-next.34. For help, see https://github.com/ZapSquared/Quaver/issues. 2022-04-02T11:10:59.127Z [Quaver] WARN: You are running an unstable version of Q uaver. Please report bugs using the link above, and note that features may chang e or be removed entirely prior to release. 2022-04-02T11:10:59.897Z [Lavalink] INFO: Connected. 2022-04-02T11:11:13.318Z [Quaver] INFO: [G 906471497231630336 | U 25093458962166 5793] Processing command play 2022-04-02T11:11:13.322Z [Quaver] INFO: [G 906471497231630336 | U 25093458962166 5793] Executing command play 2022-04-02T11:11:15.710Z [Quaver] INFO: [G 906471497231630336] Starting track 2022-04-02T11:11:23.168Z [Quaver] INFO: [G 906471497231630336 | U 25093458962166 5793] Processing command queue 2022-04-02T11:11:23.171Z [Quaver] INFO: [G 906471497231630336 | U 25093458962166 5793] Executing command queue 2022-04-02T11:11:23.175Z [Quaver] ERROR: [G 906471497231630336 | U 2509345896216 65793] Encountered error with command queue 2022-04-02T11:11:23.177Z [Quaver] ERROR: Cannot read properties of undefined (re ading 'additionalEmbeds') TypeError: Cannot read properties of undefined (reading 'additionalEmbeds') at ReplyHandler.error (C:\Users\Ava\Documents\GitHub\Quaver\classes\ReplyHan dler.js:56:20) at ReplyHandler.localeError (C:\Users\Ava\Documents\GitHub\Quaver\classes\Re plyHandler.js:90:15) at Object.execute (C:\Users\Ava\Documents\GitHub\Quaver\commands\queue.js:22 :35) at Object.execute (C:\Users\Ava\Documents\GitHub\Quaver\events\interactionCr eate.js:78:19) at Client.<anonymous> (C:\Users\Ava\Documents\GitHub\Quaver\main.js:162:41) at Client.emit (node:events:526:28) at InteractionCreateAction.handle (C:\Users\Ava\Documents\GitHub\Quaver\node _modules\discord.js\src\client\actions\InteractionCreate.js:74:12) at Object.module.exports [as INTERACTION_CREATE] (C:\Users\Ava\Documents\Git Hub\Quaver\node_modules\discord.js\src\client\websocket\handlers\INTERACTION_CRE ATE.js:4:36) at WebSocketManager.handlePacket (C:\Users\Ava\Documents\GitHub\Quaver\node_ modules\discord.js\src\client\websocket\WebSocketManager.js:351:31) at WebSocketShard.onPacket (C:\Users\Ava\Documents\GitHub\Quaver\node_module s\discord.js\src\client\websocket\WebSocketShard.js:444:22) 2022-04-02T11:11:23.179Z [Quaver] INFO: Shutting down... 2022-04-02T11:11:23.180Z [Quaver] INFO: Disconnecting from all guilds... 2022-04-02T11:11:23.180Z [Quaver] INFO: [G 906471497231630336] Disconnecting (re starting) 2022-04-02T11:11:23.594Z [Quaver] ERROR: Cannot read properties of undefined (re ading 'additionalEmbeds') TypeError: Cannot read properties of undefined (reading 'additionalEmbeds') at ReplyHandler.error (C:\Users\Ava\Documents\GitHub\Quaver\classes\ReplyHan dler.js:56:20) at ReplyHandler.localeError (C:\Users\Ava\Documents\GitHub\Quaver\classes\Re plyHandler.js:90:15) at Object.execute (C:\Users\Ava\Documents\GitHub\Quaver\events\interactionCr eate.js:83:36) at processTicksAndRejections (node:internal/process/task_queues:96:5) 2022-04-02T11:11:23.595Z [Quaver] INFO: Logging additional output to error.log. Ava@DESKTOP-5531PRA MINGW64 ~/Documents/GitHub/Quaver (next) ```
priority
queue command crashes quaver describe the bug what isn t working as intended and what does it affect affected versions what versions are affected by this bug e g next steps to reproduce steps to reproduce the behavior e g click on a button enter a value etc and see error join a stage or voice channel play any track with quaver use the queue command expected behavior what is expected to happen send the queue actual behavior what actually happens attach or add errors or screenshots here as well crashes immediately js ava desktop documents github quaver next node main js info connected logged in as aia info running version next for help see warn you are running an unstable version of q uaver please report bugs using the link above and note that features may chang e or be removed entirely prior to release info connected info g u processing command play info g u executing command play info starting track info g u processing command queue info g u executing command queue error g u encountered error with command queue error cannot read properties of undefined re ading additionalembeds typeerror cannot read properties of undefined reading additionalembeds at replyhandler error c users ava documents github quaver classes replyhan dler js at replyhandler localeerror c users ava documents github quaver classes re plyhandler js at object execute c users ava documents github quaver commands queue js at object execute c users ava documents github quaver events interactioncr eate js at client c users ava documents github quaver main js at client emit node events at interactioncreateaction handle c users ava documents github quaver node modules discord js src client actions interactioncreate js at object module exports c users ava documents git hub quaver node modules discord js src client websocket handlers interaction cre ate js at websocketmanager handlepacket c users ava documents github quaver node modules discord js src client websocket websocketmanager js at websocketshard onpacket c users ava documents github quaver node module s discord js src client websocket websocketshard js info shutting down info disconnecting from all guilds info disconnecting re starting error cannot read properties of undefined re ading additionalembeds typeerror cannot read properties of undefined reading additionalembeds at replyhandler error c users ava documents github quaver classes replyhan dler js at replyhandler localeerror c users ava documents github quaver classes re plyhandler js at object execute c users ava documents github quaver events interactioncr eate js at processticksandrejections node internal process task queues info logging additional output to error log ava desktop documents github quaver next
1
225,080
17,225,366,391
IssuesEvent
2021-07-20 00:17:47
FourierFlows/FourierFlows.jl
https://api.github.com/repos/FourierFlows/FourierFlows.jl
reopened
JOSS todo list
GPU MPI documentation enhancement
This is a proposed list for things we should implement before we announce the code in an open source journal, e.g., JOSS - [x] GPU - [x] Full GPU functionality on all modules - [ ] 3D grid + 3DNavierStokes Module - [x] Full Docs - [x] Examples (w/ Literate.jl) that include animations where appropriate - [ ] Choose 3 problems to demonstrate the code's capabilities (CPU, GPU, MPI). As a maybes: - [ ] MPI - [ ] Field Abstraction; #129 - [ ] use DifferentialEquations.jl for time integration (?) - [ ] TimeSteppers for NamedTuples (?) - [ ] AdaptiveTimeStepping (?)
1.0
JOSS todo list - This is a proposed list for things we should implement before we announce the code in an open source journal, e.g., JOSS - [x] GPU - [x] Full GPU functionality on all modules - [ ] 3D grid + 3DNavierStokes Module - [x] Full Docs - [x] Examples (w/ Literate.jl) that include animations where appropriate - [ ] Choose 3 problems to demonstrate the code's capabilities (CPU, GPU, MPI). As a maybes: - [ ] MPI - [ ] Field Abstraction; #129 - [ ] use DifferentialEquations.jl for time integration (?) - [ ] TimeSteppers for NamedTuples (?) - [ ] AdaptiveTimeStepping (?)
non_priority
joss todo list this is a proposed list for things we should implement before we announce the code in an open source journal e g joss gpu full gpu functionality on all modules grid module full docs examples w literate jl that include animations where appropriate choose problems to demonstrate the code s capabilities cpu gpu mpi as a maybes mpi field abstraction use differentialequations jl for time integration timesteppers for namedtuples adaptivetimestepping
0
150,947
23,739,079,150
IssuesEvent
2022-08-31 10:44:32
stores-cedcommerce/Lucy-Store-Design
https://api.github.com/repos/stores-cedcommerce/Lucy-Store-Design
opened
The handle needed to be update on the collection page.
Header section Desktop Design / UI / UX
**Actual result:** The handle needed to be update on the collection page. https://bellabrina-boutique.myshopify.com/collections/pants-1 https://bellabrina-boutique.myshopify.com/collections/shoes-1 https://bellabrina-boutique.myshopify.com/collections/accessories-1 **Expected result:** The handle needed to be updated
1.0
The handle needed to be update on the collection page. - **Actual result:** The handle needed to be update on the collection page. https://bellabrina-boutique.myshopify.com/collections/pants-1 https://bellabrina-boutique.myshopify.com/collections/shoes-1 https://bellabrina-boutique.myshopify.com/collections/accessories-1 **Expected result:** The handle needed to be updated
non_priority
the handle needed to be update on the collection page actual result the handle needed to be update on the collection page expected result the handle needed to be updated
0
178,108
6,599,128,081
IssuesEvent
2017-09-16 15:45:50
zerobias/telegram-mtproto
https://api.github.com/repos/zerobias/telegram-mtproto
opened
Support media DC (or possibly CDNs?)
Priority: High Type: Bug
Can't load avatars from different DC even when `FILE_MIGRATE_x` works because we have different DCs for media content (I think `media_only` thing matters) and for messages. But I'm not sure about this.
1.0
Support media DC (or possibly CDNs?) - Can't load avatars from different DC even when `FILE_MIGRATE_x` works because we have different DCs for media content (I think `media_only` thing matters) and for messages. But I'm not sure about this.
priority
support media dc or possibly cdns can t load avatars from different dc even when file migrate x works because we have different dcs for media content i think media only thing matters and for messages but i m not sure about this
1
750,908
26,224,426,017
IssuesEvent
2023-01-04 17:20:28
restarone/violet_rails
https://api.github.com/repos/restarone/violet_rails
closed
run error actions (if any) when recaptcha fails
enhancement high priority API - data pipeline v3
**Is your feature request related to a problem? Please describe.** Currently we don't fire error actions when recaptcha fails **Describe the solution you'd like** fire error actions when recaptcha fails <img width="1728" alt="Screen Shot 2022-07-30 at 1 21 42 PM" src="https://user-images.githubusercontent.com/35935196/181934704-db882ca1-0684-47cb-9394-790ca846e875.png">
1.0
run error actions (if any) when recaptcha fails - **Is your feature request related to a problem? Please describe.** Currently we don't fire error actions when recaptcha fails **Describe the solution you'd like** fire error actions when recaptcha fails <img width="1728" alt="Screen Shot 2022-07-30 at 1 21 42 PM" src="https://user-images.githubusercontent.com/35935196/181934704-db882ca1-0684-47cb-9394-790ca846e875.png">
priority
run error actions if any when recaptcha fails is your feature request related to a problem please describe currently we don t fire error actions when recaptcha fails describe the solution you d like fire error actions when recaptcha fails img width alt screen shot at pm src
1
99,579
4,057,023,161
IssuesEvent
2016-05-24 20:39:46
opencaching/okapi
https://api.github.com/repos/opencaching/okapi
closed
User can log cache even if is already banned
bug Priority-Critical
Hi! There was an issue in oc.pl repo: https://github.com/opencaching/opencaching-pl/issues/646 How I understand architecture of OKAPI, this have to be solved here.
1.0
User can log cache even if is already banned - Hi! There was an issue in oc.pl repo: https://github.com/opencaching/opencaching-pl/issues/646 How I understand architecture of OKAPI, this have to be solved here.
priority
user can log cache even if is already banned hi there was an issue in oc pl repo how i understand architecture of okapi this have to be solved here
1
88,701
10,577,875,000
IssuesEvent
2019-10-07 21:06:38
mRemoteNG/mRemoteNG
https://api.github.com/repos/mRemoteNG/mRemoteNG
closed
Code style: Place attributes on a separate line
Documentation
In the recent code cleanup, attributes were placed in-line with the code that they decorate. I propose we place attributes on a separate line before the target code that they decorate. ## Current style ```csharp [Browsable(false)] public RootPuttySessionsNodeInfo RootRootPuttySessionsInfo { get; set; } ``` ## Proposed style: ```csharp [Browsable(false)] public RootPuttySessionsNodeInfo RootRootPuttySessionsInfo { get; set; } ``` ## Justification Attribute adornments are not critical to the immediate understanding of the code they decorate. It is easier to pick out language keywords (public/readonly/etc) and type information when the definition of a class/property/method is at the start of a line. In addition, placing attributes in-line with a normal code adds quite a bit of length to that line. This may cause us to add line breaks to the property/method definition that further reduces readability.
1.0
Code style: Place attributes on a separate line - In the recent code cleanup, attributes were placed in-line with the code that they decorate. I propose we place attributes on a separate line before the target code that they decorate. ## Current style ```csharp [Browsable(false)] public RootPuttySessionsNodeInfo RootRootPuttySessionsInfo { get; set; } ``` ## Proposed style: ```csharp [Browsable(false)] public RootPuttySessionsNodeInfo RootRootPuttySessionsInfo { get; set; } ``` ## Justification Attribute adornments are not critical to the immediate understanding of the code they decorate. It is easier to pick out language keywords (public/readonly/etc) and type information when the definition of a class/property/method is at the start of a line. In addition, placing attributes in-line with a normal code adds quite a bit of length to that line. This may cause us to add line breaks to the property/method definition that further reduces readability.
non_priority
code style place attributes on a separate line in the recent code cleanup attributes were placed in line with the code that they decorate i propose we place attributes on a separate line before the target code that they decorate current style csharp public rootputtysessionsnodeinfo rootrootputtysessionsinfo get set proposed style csharp public rootputtysessionsnodeinfo rootrootputtysessionsinfo get set justification attribute adornments are not critical to the immediate understanding of the code they decorate it is easier to pick out language keywords public readonly etc and type information when the definition of a class property method is at the start of a line in addition placing attributes in line with a normal code adds quite a bit of length to that line this may cause us to add line breaks to the property method definition that further reduces readability
0
152,374
5,846,019,271
IssuesEvent
2017-05-10 15:21:06
vmware/vic
https://api.github.com/repos/vmware/vic
closed
HTML5 Plugin displays wrong port number when using --no-tls
area/ui kind/bug kind/customer-found priority/high
When creating a VCH with the --no-tls option, HTML5 plugin displays wrong port number (2376 instead of 2375). I attached a screenshot. May 5 2017 13:06:57.777Z INFO ### Installing VCH #### May 5 2017 13:06:57.778Z INFO vSphere password for administrator@corp.local: May 5 2017 13:07:01.063Z WARN Using administrative user for VCH operation - use --ops-user to improve security (see -x for advanced help) May 5 2017 13:07:01.063Z WARN Configuring without TLS - all communications will be insecure May 5 2017 13:07:01.064Z INFO Loaded registry CA from /etc/docker/certs.d/192.168.100.104/ca.crt May 5 2017 13:07:01.492Z INFO Validating supplied configuration May 5 2017 13:07:02.017Z INFO vDS configuration OK on "Bridge01-RegionA01-vDS-COMP" May 5 2017 13:07:02.118Z INFO Firewall status: ENABLED on "/RegionA01/host/RegionA01-COMP01/esx-01a.corp.local" May 5 2017 13:07:02.184Z INFO Firewall status: ENABLED on "/RegionA01/host/RegionA01-COMP01/esx-02a.corp.local" May 5 2017 13:07:02.250Z INFO Firewall status: ENABLED on "/RegionA01/host/RegionA01-COMP01/esx-03a.corp.local" May 5 2017 13:07:02.272Z INFO Firewall configuration OK on hosts: May 5 2017 13:07:02.272Z INFO "/RegionA01/host/RegionA01-COMP01/esx-01a.corp.local" May 5 2017 13:07:02.272Z INFO "/RegionA01/host/RegionA01-COMP01/esx-02a.corp.local" May 5 2017 13:07:02.273Z INFO "/RegionA01/host/RegionA01-COMP01/esx-03a.corp.local" May 5 2017 13:07:02.783Z INFO License check OK on hosts: May 5 2017 13:07:02.783Z INFO "/RegionA01/host/RegionA01-COMP01/esx-01a.corp.local" May 5 2017 13:07:02.790Z INFO "/RegionA01/host/RegionA01-COMP01/esx-02a.corp.local" May 5 2017 13:07:02.790Z INFO "/RegionA01/host/RegionA01-COMP01/esx-03a.corp.local" May 5 2017 13:07:02.801Z INFO DRS check OK on: May 5 2017 13:07:02.802Z INFO "/RegionA01/host/RegionA01-COMP01" May 5 2017 13:07:02.913Z INFO May 5 2017 13:07:03.164Z INFO Creating virtual app "virtual-container-host" May 5 2017 13:07:03.277Z INFO Creating directory [RegionA01-ISCSI01-COMP01] VIC May 5 2017 13:07:03.323Z INFO Datastore path is [RegionA01-ISCSI01-COMP01] VIC May 5 2017 13:07:03.323Z INFO Creating appliance on target May 5 2017 13:07:03.406Z INFO Network role "management" is sharing NIC with "client" May 5 2017 13:07:03.445Z INFO Network role "public" is sharing NIC with "client" May 5 2017 13:07:06.264Z INFO Uploading images for container May 5 2017 13:07:06.265Z INFO "bootstrap.iso" May 5 2017 13:07:06.267Z INFO "appliance.iso" May 5 2017 13:07:24.474Z INFO Waiting for IP information May 5 2017 13:07:53.688Z INFO Waiting for major appliance components to launch May 5 2017 13:07:53.843Z INFO Obtained IP address for client interface: "192.168.100.106" May 5 2017 13:07:53.843Z INFO Checking VCH connectivity with vSphere target May 5 2017 13:07:54.127Z INFO vSphere API Test: https://vcsa-01a.corp.local vSphere API target responds as expected May 5 2017 13:08:10.187Z INFO Initialization of appliance successful May 5 2017 13:08:10.188Z INFO May 5 2017 13:08:10.188Z INFO VCH Admin Portal: May 5 2017 13:08:10.189Z INFO https://192.168.100.106:2378 May 5 2017 13:08:10.189Z INFO May 5 2017 13:08:10.189Z INFO Published ports can be reached at: May 5 2017 13:08:10.190Z INFO 192.168.100.106 May 5 2017 13:08:10.190Z INFO May 5 2017 13:08:10.191Z INFO Docker environment variables: May 5 2017 13:08:10.192Z INFO DOCKER_HOST=192.168.100.106:2375 May 5 2017 13:08:10.192Z INFO May 5 2017 13:08:10.193Z INFO Connect to docker: May 5 2017 13:08:10.193Z INFO docker -H 192.168.100.106:2375 info May 5 2017 13:08:10.193Z INFO Installer completed successfully ![screen shot 2017-05-05 at 09 08 52](https://cloud.githubusercontent.com/assets/8586715/25746781/f156b746-3172-11e7-8788-ee1c7aaa78a1.png) **VIC version:** 1.1.0 **Deployment details:** vic-machine-linux create --target vcsa-01a.corp.local \ --user administrator@corp.local \ --compute-resource RegionA01-COMP01 \ --image-store RegionA01-ISCSI01-COMP01 \ --volume-store RegionA01-ISCSI01-COMP01:default \ --public-network VM-RegionA01-vDS-COMP \ --bridge-network Bridge01-RegionA01-vDS-COMP \ --name virtual-container-host \ --registry-ca=/etc/docker/certs.d/192.168.100.104/ca.crt \ --no-tls **Steps to reproduce:** **Actual behavior:** HTML5 plugin displays DOCKER_HOST=192.168.100.106:2376 **Expected behavior:** HTML5 plugin should display DOCKER_HOST=192.168.100.106:2375 **Logs:** **Additional details as necessary:** I am able to reproduce this in my lab if needed.
1.0
HTML5 Plugin displays wrong port number when using --no-tls - When creating a VCH with the --no-tls option, HTML5 plugin displays wrong port number (2376 instead of 2375). I attached a screenshot. May 5 2017 13:06:57.777Z INFO ### Installing VCH #### May 5 2017 13:06:57.778Z INFO vSphere password for administrator@corp.local: May 5 2017 13:07:01.063Z WARN Using administrative user for VCH operation - use --ops-user to improve security (see -x for advanced help) May 5 2017 13:07:01.063Z WARN Configuring without TLS - all communications will be insecure May 5 2017 13:07:01.064Z INFO Loaded registry CA from /etc/docker/certs.d/192.168.100.104/ca.crt May 5 2017 13:07:01.492Z INFO Validating supplied configuration May 5 2017 13:07:02.017Z INFO vDS configuration OK on "Bridge01-RegionA01-vDS-COMP" May 5 2017 13:07:02.118Z INFO Firewall status: ENABLED on "/RegionA01/host/RegionA01-COMP01/esx-01a.corp.local" May 5 2017 13:07:02.184Z INFO Firewall status: ENABLED on "/RegionA01/host/RegionA01-COMP01/esx-02a.corp.local" May 5 2017 13:07:02.250Z INFO Firewall status: ENABLED on "/RegionA01/host/RegionA01-COMP01/esx-03a.corp.local" May 5 2017 13:07:02.272Z INFO Firewall configuration OK on hosts: May 5 2017 13:07:02.272Z INFO "/RegionA01/host/RegionA01-COMP01/esx-01a.corp.local" May 5 2017 13:07:02.272Z INFO "/RegionA01/host/RegionA01-COMP01/esx-02a.corp.local" May 5 2017 13:07:02.273Z INFO "/RegionA01/host/RegionA01-COMP01/esx-03a.corp.local" May 5 2017 13:07:02.783Z INFO License check OK on hosts: May 5 2017 13:07:02.783Z INFO "/RegionA01/host/RegionA01-COMP01/esx-01a.corp.local" May 5 2017 13:07:02.790Z INFO "/RegionA01/host/RegionA01-COMP01/esx-02a.corp.local" May 5 2017 13:07:02.790Z INFO "/RegionA01/host/RegionA01-COMP01/esx-03a.corp.local" May 5 2017 13:07:02.801Z INFO DRS check OK on: May 5 2017 13:07:02.802Z INFO "/RegionA01/host/RegionA01-COMP01" May 5 2017 13:07:02.913Z INFO May 5 2017 13:07:03.164Z INFO Creating virtual app "virtual-container-host" May 5 2017 13:07:03.277Z INFO Creating directory [RegionA01-ISCSI01-COMP01] VIC May 5 2017 13:07:03.323Z INFO Datastore path is [RegionA01-ISCSI01-COMP01] VIC May 5 2017 13:07:03.323Z INFO Creating appliance on target May 5 2017 13:07:03.406Z INFO Network role "management" is sharing NIC with "client" May 5 2017 13:07:03.445Z INFO Network role "public" is sharing NIC with "client" May 5 2017 13:07:06.264Z INFO Uploading images for container May 5 2017 13:07:06.265Z INFO "bootstrap.iso" May 5 2017 13:07:06.267Z INFO "appliance.iso" May 5 2017 13:07:24.474Z INFO Waiting for IP information May 5 2017 13:07:53.688Z INFO Waiting for major appliance components to launch May 5 2017 13:07:53.843Z INFO Obtained IP address for client interface: "192.168.100.106" May 5 2017 13:07:53.843Z INFO Checking VCH connectivity with vSphere target May 5 2017 13:07:54.127Z INFO vSphere API Test: https://vcsa-01a.corp.local vSphere API target responds as expected May 5 2017 13:08:10.187Z INFO Initialization of appliance successful May 5 2017 13:08:10.188Z INFO May 5 2017 13:08:10.188Z INFO VCH Admin Portal: May 5 2017 13:08:10.189Z INFO https://192.168.100.106:2378 May 5 2017 13:08:10.189Z INFO May 5 2017 13:08:10.189Z INFO Published ports can be reached at: May 5 2017 13:08:10.190Z INFO 192.168.100.106 May 5 2017 13:08:10.190Z INFO May 5 2017 13:08:10.191Z INFO Docker environment variables: May 5 2017 13:08:10.192Z INFO DOCKER_HOST=192.168.100.106:2375 May 5 2017 13:08:10.192Z INFO May 5 2017 13:08:10.193Z INFO Connect to docker: May 5 2017 13:08:10.193Z INFO docker -H 192.168.100.106:2375 info May 5 2017 13:08:10.193Z INFO Installer completed successfully ![screen shot 2017-05-05 at 09 08 52](https://cloud.githubusercontent.com/assets/8586715/25746781/f156b746-3172-11e7-8788-ee1c7aaa78a1.png) **VIC version:** 1.1.0 **Deployment details:** vic-machine-linux create --target vcsa-01a.corp.local \ --user administrator@corp.local \ --compute-resource RegionA01-COMP01 \ --image-store RegionA01-ISCSI01-COMP01 \ --volume-store RegionA01-ISCSI01-COMP01:default \ --public-network VM-RegionA01-vDS-COMP \ --bridge-network Bridge01-RegionA01-vDS-COMP \ --name virtual-container-host \ --registry-ca=/etc/docker/certs.d/192.168.100.104/ca.crt \ --no-tls **Steps to reproduce:** **Actual behavior:** HTML5 plugin displays DOCKER_HOST=192.168.100.106:2376 **Expected behavior:** HTML5 plugin should display DOCKER_HOST=192.168.100.106:2375 **Logs:** **Additional details as necessary:** I am able to reproduce this in my lab if needed.
priority
plugin displays wrong port number when using no tls when creating a vch with the no tls option plugin displays wrong port number instead of i attached a screenshot may info installing vch may info vsphere password for administrator corp local may warn using administrative user for vch operation use ops user to improve security see x for advanced help may warn configuring without tls all communications will be insecure may info loaded registry ca from etc docker certs d ca crt may info validating supplied configuration may info vds configuration ok on vds comp may info firewall status enabled on host esx corp local may info firewall status enabled on host esx corp local may info firewall status enabled on host esx corp local may info firewall configuration ok on hosts may info host esx corp local may info host esx corp local may info host esx corp local may info license check ok on hosts may info host esx corp local may info host esx corp local may info host esx corp local may info drs check ok on may info host may info may info creating virtual app virtual container host may info creating directory vic may info datastore path is vic may info creating appliance on target may info network role management is sharing nic with client may info network role public is sharing nic with client may info uploading images for container may info bootstrap iso may info appliance iso may info waiting for ip information may info waiting for major appliance components to launch may info obtained ip address for client interface may info checking vch connectivity with vsphere target may info vsphere api test vsphere api target responds as expected may info initialization of appliance successful may info may info vch admin portal may info may info may info published ports can be reached at may info may info may info docker environment variables may info docker host may info may info connect to docker may info docker h info may info installer completed successfully vic version deployment details vic machine linux create target vcsa corp local user administrator corp local compute resource image store volume store default public network vm vds comp bridge network vds comp name virtual container host registry ca etc docker certs d ca crt no tls steps to reproduce actual behavior plugin displays docker host expected behavior plugin should display docker host logs additional details as necessary i am able to reproduce this in my lab if needed
1
375,720
26,174,578,777
IssuesEvent
2023-01-02 07:59:40
deepchecks/deepchecks
https://api.github.com/repos/deepchecks/deepchecks
closed
[BUG] Fix Typo in docs/source/getting-started/installation.rst
documentation bug
**Describe the bug** In [docs/source/getting-started/installation.rst](https://github.com/deepchecks/deepchecks/blob/cdfcfc5fbc23d7daf99a74505c0cfd17fc320a17/docs/source/getting-started/installation.rst) fix typo located at line 73 Before ``` Istallation of deepchecks for CV should be stated explicitly and it includes ``` After ``` Installation of deepchecks for CV should be stated explicitly and it includes ```
1.0
[BUG] Fix Typo in docs/source/getting-started/installation.rst - **Describe the bug** In [docs/source/getting-started/installation.rst](https://github.com/deepchecks/deepchecks/blob/cdfcfc5fbc23d7daf99a74505c0cfd17fc320a17/docs/source/getting-started/installation.rst) fix typo located at line 73 Before ``` Istallation of deepchecks for CV should be stated explicitly and it includes ``` After ``` Installation of deepchecks for CV should be stated explicitly and it includes ```
non_priority
fix typo in docs source getting started installation rst describe the bug in fix typo located at line before istallation of deepchecks for cv should be stated explicitly and it includes after installation of deepchecks for cv should be stated explicitly and it includes
0
650,397
21,390,327,701
IssuesEvent
2022-04-21 06:17:59
TerriaJS/terriajs
https://api.github.com/repos/TerriaJS/terriajs
opened
Shared link should always work
T-Bug High priority
When creating a catalog item's shared link before adding the item to the map, the shared link is not usable. Besides, if using the shared link, `Explore map data` will become unclickable.
1.0
Shared link should always work - When creating a catalog item's shared link before adding the item to the map, the shared link is not usable. Besides, if using the shared link, `Explore map data` will become unclickable.
priority
shared link should always work when creating a catalog item s shared link before adding the item to the map the shared link is not usable besides if using the shared link explore map data will become unclickable
1
6,955
2,610,319,325
IssuesEvent
2015-02-26 19:43:02
chrsmith/republic-at-war
https://api.github.com/repos/chrsmith/republic-at-war
closed
Text
auto-migrated Priority-Medium Type-Defect
``` AA9 transport [missing] description ``` ----- Original issue reported on code.google.com by `z3r0...@gmail.com` on 7 May 2011 at 11:37
1.0
Text - ``` AA9 transport [missing] description ``` ----- Original issue reported on code.google.com by `z3r0...@gmail.com` on 7 May 2011 at 11:37
non_priority
text transport description original issue reported on code google com by gmail com on may at
0
29,400
4,500,789,768
IssuesEvent
2016-09-01 06:51:53
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
opened
teamcity: failed tests on develop: test/TestRaftRemoveRace
Robot test-failure
The following tests appear to have failed: [#17097](https://teamcity.cockroachdb.com/viewLog.html?buildId=17097): ``` --- FAIL: test/TestRaftRemoveRace (0.013s) client_test.go:884: change replicas of range 1 aborted due to failed preemptive snapshot: range=1: remote couldn't accept snapshot with error: permanently rejected snapshot: store=3:3: canApplySnapshotLocked: cannot add placeholder, have an existing placeholder range=1 [/Min-/Max) (placeholder) ``` Please assign, take a look and update the issue accordingly.
1.0
teamcity: failed tests on develop: test/TestRaftRemoveRace - The following tests appear to have failed: [#17097](https://teamcity.cockroachdb.com/viewLog.html?buildId=17097): ``` --- FAIL: test/TestRaftRemoveRace (0.013s) client_test.go:884: change replicas of range 1 aborted due to failed preemptive snapshot: range=1: remote couldn't accept snapshot with error: permanently rejected snapshot: store=3:3: canApplySnapshotLocked: cannot add placeholder, have an existing placeholder range=1 [/Min-/Max) (placeholder) ``` Please assign, take a look and update the issue accordingly.
non_priority
teamcity failed tests on develop test testraftremoverace the following tests appear to have failed fail test testraftremoverace client test go change replicas of range aborted due to failed preemptive snapshot range remote couldn t accept snapshot with error permanently rejected snapshot store canapplysnapshotlocked cannot add placeholder have an existing placeholder range min max placeholder please assign take a look and update the issue accordingly
0
800,332
28,361,348,999
IssuesEvent
2023-04-12 10:58:39
netdata/netdata
https://api.github.com/repos/netdata/netdata
closed
Install script should support OpenWRT
area/packaging feature request priority/medium
Netdata should install and run on OpenWRT with the install script. It is important for us that cloud works also (meaning cloud dependencies and cloud build should also work) However, right now there are some basic problems - i.e. old version of tar being used by the install script. See https://forum.openwrt.org/t/how-to-claim-agent-on-netdata/68711/5 https://github.com/openwrt/packages/pull/12164#issuecomment-655981628 https://unix.stackexchange.com/questions/249353/invalid-tar-magic-on-openwrt Initially just setting the compression explicitly should help, but let's test this end-to-end and make sure cloud features also build.
1.0
Install script should support OpenWRT - Netdata should install and run on OpenWRT with the install script. It is important for us that cloud works also (meaning cloud dependencies and cloud build should also work) However, right now there are some basic problems - i.e. old version of tar being used by the install script. See https://forum.openwrt.org/t/how-to-claim-agent-on-netdata/68711/5 https://github.com/openwrt/packages/pull/12164#issuecomment-655981628 https://unix.stackexchange.com/questions/249353/invalid-tar-magic-on-openwrt Initially just setting the compression explicitly should help, but let's test this end-to-end and make sure cloud features also build.
priority
install script should support openwrt netdata should install and run on openwrt with the install script it is important for us that cloud works also meaning cloud dependencies and cloud build should also work however right now there are some basic problems i e old version of tar being used by the install script see initially just setting the compression explicitly should help but let s test this end to end and make sure cloud features also build
1
5,563
7,214,145,422
IssuesEvent
2018-02-08 00:39:30
wesnoth/wesnoth
https://api.github.com/repos/wesnoth/wesnoth
closed
support anonymous issues
Services
it would be nice to be have some form to enable users to report bugs without creating a github account. since this is a public repo we could just have a dummy account that doesn't even need access to the wesnoth repo to let a script create issues with it. One of the problems with suhc a solution that is that i am unuse whethe rit also alows user to respons in existent issues
1.0
support anonymous issues - it would be nice to be have some form to enable users to report bugs without creating a github account. since this is a public repo we could just have a dummy account that doesn't even need access to the wesnoth repo to let a script create issues with it. One of the problems with suhc a solution that is that i am unuse whethe rit also alows user to respons in existent issues
non_priority
support anonymous issues it would be nice to be have some form to enable users to report bugs without creating a github account since this is a public repo we could just have a dummy account that doesn t even need access to the wesnoth repo to let a script create issues with it one of the problems with suhc a solution that is that i am unuse whethe rit also alows user to respons in existent issues
0
87,510
25,136,211,577
IssuesEvent
2022-11-09 18:49:28
libreswan/libreswan
https://api.github.com/repos/libreswan/libreswan
closed
delete include/unbound/unbound-event.h
build upstream FreeBSD blocked
| OS | Status | |-|-| | Linux | installed | | NetBSD | installed | | OpenBSD | 7.2 | | FreeBSD | submitted https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263838 |
1.0
delete include/unbound/unbound-event.h - | OS | Status | |-|-| | Linux | installed | | NetBSD | installed | | OpenBSD | 7.2 | | FreeBSD | submitted https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263838 |
non_priority
delete include unbound unbound event h os status linux installed netbsd installed openbsd freebsd submitted
0
42,873
7,006,765,603
IssuesEvent
2017-12-19 09:45:51
PaddlePaddle/Paddle
https://api.github.com/repos/PaddlePaddle/Paddle
closed
Navigation of Distributed Training is wrong
documentation
In the Chinese version, we can use the downward arrow: ![image](https://user-images.githubusercontent.com/6836917/34146796-576f9e0a-e4d6-11e7-9bc5-07d718ce0219.png) But in the English version, this arrow is missing: ![image](https://user-images.githubusercontent.com/6836917/34146858-82461096-e4d6-11e7-818c-04ccab0c9998.png) The reason is that [kubernetes distributed](https://github.com/PaddlePaddle/Paddle/blob/develop/doc/howto/usage/cluster/cluster_train_en.md#use-different-clusters) doesn't have a link.
1.0
Navigation of Distributed Training is wrong - In the Chinese version, we can use the downward arrow: ![image](https://user-images.githubusercontent.com/6836917/34146796-576f9e0a-e4d6-11e7-9bc5-07d718ce0219.png) But in the English version, this arrow is missing: ![image](https://user-images.githubusercontent.com/6836917/34146858-82461096-e4d6-11e7-818c-04ccab0c9998.png) The reason is that [kubernetes distributed](https://github.com/PaddlePaddle/Paddle/blob/develop/doc/howto/usage/cluster/cluster_train_en.md#use-different-clusters) doesn't have a link.
non_priority
navigation of distributed training is wrong in the chinese version we can use the downward arrow but in the english version this arrow is missing the reason is that doesn t have a link
0
37,964
12,510,908,286
IssuesEvent
2020-06-02 19:32:29
kenferrara/react-base-table
https://api.github.com/repos/kenferrara/react-base-table
opened
CVE-2018-11698 (High) detected in opennms-opennms-source-22.0.1-1
security vulnerability
## CVE-2018-11698 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opennmsopennms-source-22.0.1-1</b></p></summary> <p> <p>A Java based fault and performance management system</p> <p>Library home page: <a href=https://sourceforge.net/projects/opennms/>https://sourceforge.net/projects/opennms/</a></p> <p>Found in HEAD commit: <a href="https://github.com/kenferrara/react-base-table/commit/8e278435a954b3faf16104b3f871a7a2a913555a">8e278435a954b3faf16104b3f871a7a2a913555a</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (64)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /react-base-table/node_modules/node-sass/src/sass_types/number.cpp - /react-base-table/website/node_modules/console-browserify/test/static/test-adapter.js - /react-base-table/website/node_modules/nan/nan_persistent_pre_12_inl.h - /react-base-table/node_modules/nan/nan_persistent_12_inl.h - /react-base-table/node_modules/node-sass/src/libsass/src/emitter.hpp - /react-base-table/node_modules/node-sass/src/sass_types/color.h - /react-base-table/node_modules/node-sass/src/libsass/src/ast.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/operation.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/emitter.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/bind.cpp - /react-base-table/node_modules/js-base64/.attic/test-moment/./yoshinoya.js - /react-base-table/node_modules/node-sass/src/libsass/src/cssize.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/error_handling.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/context.cpp - /react-base-table/node_modules/node-sass/src/sass_types/factory.cpp - /react-base-table/node_modules/node-sass/src/sass_types/list.h - /react-base-table/node_modules/nan/nan_callbacks_pre_12_inl.h - /react-base-table/node_modules/node-sass/src/libsass/src/values.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/util.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/ast.cpp - /react-base-table/node_modules/node-sass/src/sass_types/list.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/to_value.hpp - /react-base-table/website/node_modules/nan/nan_json.h - /react-base-table/node_modules/node-sass/src/libsass/src/prelexer.hpp - /react-base-table/node_modules/node-sass/src/sass_types/boolean.h - /react-base-table/node_modules/node-sass/src/sass_types/null.cpp - /react-base-table/node_modules/node-sass/src/sass_types/color.cpp - /react-base-table/node_modules/node-sass/src/custom_function_bridge.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/operators.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/to_value.cpp - /react-base-table/website/node_modules/nan/nan_callbacks.h - /react-base-table/node_modules/node-sass/src/libsass/src/to_c.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/output.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/constants.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/eval.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/extend.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /react-base-table/website/node_modules/nan/nan_converters.h - /react-base-table/node_modules/nan/nan_converters_pre_43_inl.h - /react-base-table/node_modules/node-sass/src/libsass/src/functions.hpp - /react-base-table/node_modules/nan/nan_define_own_property_helper.h - /react-base-table/node_modules/node-sass/src/libsass/src/expand.hpp - /react-base-table/node_modules/node-sass/src/sass_types/map.cpp - /react-base-table/node_modules/node-sass/src/custom_importer_bridge.h - /react-base-table/node_modules/nan/nan_private.h - /react-base-table/website/node_modules/nan/nan_new.h - /react-base-table/node_modules/js-base64/.attic/test-moment/./es5.js - /react-base-table/node_modules/node-sass/src/libsass/src/inspect.hpp - /react-base-table/node_modules/nan/nan_implementation_pre_12_inl.h - /react-base-table/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /react-base-table/node_modules/node-sass/src/sass_types/value.h - /react-base-table/node_modules/node-sass/src/libsass/src/backtrace.cpp - /react-base-table/node_modules/node-sass/src/sass_types/boolean.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/file.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/error_handling.hpp - /react-base-table/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /react-base-table/node_modules/node-sass/src/libsass/src/sass_values.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/context.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/sass_context.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/constants.cpp - /react-base-table/node_modules/js-base64/.attic/test-moment/./dankogai.js - /react-base-table/node_modules/node-sass/src/sass_types/string.cpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::handle_error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11698>CVE-2018-11698</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11698">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11698</a></p> <p>Release Date: 2019-08-06</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p>
True
CVE-2018-11698 (High) detected in opennms-opennms-source-22.0.1-1 - ## CVE-2018-11698 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opennmsopennms-source-22.0.1-1</b></p></summary> <p> <p>A Java based fault and performance management system</p> <p>Library home page: <a href=https://sourceforge.net/projects/opennms/>https://sourceforge.net/projects/opennms/</a></p> <p>Found in HEAD commit: <a href="https://github.com/kenferrara/react-base-table/commit/8e278435a954b3faf16104b3f871a7a2a913555a">8e278435a954b3faf16104b3f871a7a2a913555a</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (64)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /react-base-table/node_modules/node-sass/src/sass_types/number.cpp - /react-base-table/website/node_modules/console-browserify/test/static/test-adapter.js - /react-base-table/website/node_modules/nan/nan_persistent_pre_12_inl.h - /react-base-table/node_modules/nan/nan_persistent_12_inl.h - /react-base-table/node_modules/node-sass/src/libsass/src/emitter.hpp - /react-base-table/node_modules/node-sass/src/sass_types/color.h - /react-base-table/node_modules/node-sass/src/libsass/src/ast.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/operation.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/emitter.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/bind.cpp - /react-base-table/node_modules/js-base64/.attic/test-moment/./yoshinoya.js - /react-base-table/node_modules/node-sass/src/libsass/src/cssize.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/error_handling.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/context.cpp - /react-base-table/node_modules/node-sass/src/sass_types/factory.cpp - /react-base-table/node_modules/node-sass/src/sass_types/list.h - /react-base-table/node_modules/nan/nan_callbacks_pre_12_inl.h - /react-base-table/node_modules/node-sass/src/libsass/src/values.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/util.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/ast.cpp - /react-base-table/node_modules/node-sass/src/sass_types/list.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/to_value.hpp - /react-base-table/website/node_modules/nan/nan_json.h - /react-base-table/node_modules/node-sass/src/libsass/src/prelexer.hpp - /react-base-table/node_modules/node-sass/src/sass_types/boolean.h - /react-base-table/node_modules/node-sass/src/sass_types/null.cpp - /react-base-table/node_modules/node-sass/src/sass_types/color.cpp - /react-base-table/node_modules/node-sass/src/custom_function_bridge.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/operators.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/to_value.cpp - /react-base-table/website/node_modules/nan/nan_callbacks.h - /react-base-table/node_modules/node-sass/src/libsass/src/to_c.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/output.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/constants.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/eval.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/extend.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp - /react-base-table/website/node_modules/nan/nan_converters.h - /react-base-table/node_modules/nan/nan_converters_pre_43_inl.h - /react-base-table/node_modules/node-sass/src/libsass/src/functions.hpp - /react-base-table/node_modules/nan/nan_define_own_property_helper.h - /react-base-table/node_modules/node-sass/src/libsass/src/expand.hpp - /react-base-table/node_modules/node-sass/src/sass_types/map.cpp - /react-base-table/node_modules/node-sass/src/custom_importer_bridge.h - /react-base-table/node_modules/nan/nan_private.h - /react-base-table/website/node_modules/nan/nan_new.h - /react-base-table/node_modules/js-base64/.attic/test-moment/./es5.js - /react-base-table/node_modules/node-sass/src/libsass/src/inspect.hpp - /react-base-table/node_modules/nan/nan_implementation_pre_12_inl.h - /react-base-table/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/check_nesting.hpp - /react-base-table/node_modules/node-sass/src/sass_types/value.h - /react-base-table/node_modules/node-sass/src/libsass/src/backtrace.cpp - /react-base-table/node_modules/node-sass/src/sass_types/boolean.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/check_nesting.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/file.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/error_handling.hpp - /react-base-table/node_modules/node-sass/src/sass_types/sass_value_wrapper.h - /react-base-table/node_modules/node-sass/src/libsass/src/sass_values.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/context.hpp - /react-base-table/node_modules/node-sass/src/libsass/src/sass_context.cpp - /react-base-table/node_modules/node-sass/src/libsass/src/constants.cpp - /react-base-table/node_modules/js-base64/.attic/test-moment/./dankogai.js - /react-base-table/node_modules/node-sass/src/sass_types/string.cpp </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::handle_error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11698>CVE-2018-11698</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11698">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11698</a></p> <p>Release Date: 2019-08-06</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p>
non_priority
cve high detected in opennms opennms source cve high severity vulnerability vulnerable library opennmsopennms source a java based fault and performance management system library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries react base table node modules node sass src sass types number cpp react base table website node modules console browserify test static test adapter js react base table website node modules nan nan persistent pre inl h react base table node modules nan nan persistent inl h react base table node modules node sass src libsass src emitter hpp react base table node modules node sass src sass types color h react base table node modules node sass src libsass src ast hpp react base table node modules node sass src libsass src operation hpp react base table node modules node sass src libsass src emitter cpp react base table node modules node sass src libsass src bind cpp react base table node modules js attic test moment yoshinoya js react base table node modules node sass src libsass src cssize hpp react base table node modules node sass src libsass src error handling cpp react base table node modules node sass src libsass src context cpp react base table node modules node sass src sass types factory cpp react base table node modules node sass src sass types list h react base table node modules nan nan callbacks pre inl h react base table node modules node sass src libsass src values cpp react base table node modules node sass src libsass src util cpp react base table node modules node sass src libsass src ast cpp react base table node modules node sass src sass types list cpp react base table node modules node sass src libsass src to value hpp react base table website node modules nan nan json h react base table node modules node sass src libsass src prelexer hpp react base table node modules node sass src sass types boolean h react base table node modules node sass src sass types null cpp react base table node modules node sass src sass types color cpp react base table node modules node sass src custom function bridge cpp react base table node modules node sass src libsass src operators hpp react base table node modules node sass src libsass src to value cpp react base table website node modules nan nan callbacks h react base table node modules node sass src libsass src to c cpp react base table node modules node sass src libsass src output cpp react base table node modules node sass src libsass src constants hpp react base table node modules node sass src libsass src eval hpp react base table node modules node sass src libsass src extend cpp react base table node modules node sass src libsass src ast def macros hpp react base table website node modules nan nan converters h react base table node modules nan nan converters pre inl h react base table node modules node sass src libsass src functions hpp react base table node modules nan nan define own property helper h react base table node modules node sass src libsass src expand hpp react base table node modules node sass src sass types map cpp react base table node modules node sass src custom importer bridge h react base table node modules nan nan private h react base table website node modules nan nan new h react base table node modules js attic test moment js react base table node modules node sass src libsass src inspect hpp react base table node modules nan nan implementation pre inl h react base table node modules node sass src libsass src ast fwd decl hpp react base table node modules node sass src libsass src check nesting hpp react base table node modules node sass src sass types value h react base table node modules node sass src libsass src backtrace cpp react base table node modules node sass src sass types boolean cpp react base table node modules node sass src libsass src check nesting cpp react base table node modules node sass src libsass src file cpp react base table node modules node sass src libsass src error handling hpp react base table node modules node sass src sass types sass value wrapper h react base table node modules node sass src libsass src sass values cpp react base table node modules node sass src libsass src context hpp react base table node modules node sass src libsass src sass context cpp react base table node modules node sass src libsass src constants cpp react base table node modules js attic test moment dankogai js react base table node modules node sass src sass types string cpp vulnerability details an issue was discovered in libsass through an out of bounds read of a memory region was found in the function sass handle error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass
0
8,812
2,886,714,497
IssuesEvent
2015-06-12 10:16:42
quantmind/lux
https://api.github.com/repos/quantmind/lux
opened
template url for views with parameters
AngularJS bug extension requires design effort
The `lux` way for serving templates to angular [ui-roter](https://github.com/angular-ui/ui-router) pages for a give url ``/foo`` is: ``` GET /foo?template=ui ``` This is added by a router via the [angular_page](https://github.com/quantmind/lux/blob/dev/lux/core/wrappers.py#L169) method which is invoked by the [add_to_sidemap](https://github.com/quantmind/lux/blob/dev/lux/extensions/angular/__init__.py#L159) function in the angular extension. This method does not work well when the router is serving a page with url parameters, for example ``/foo/<id>``.
1.0
template url for views with parameters - The `lux` way for serving templates to angular [ui-roter](https://github.com/angular-ui/ui-router) pages for a give url ``/foo`` is: ``` GET /foo?template=ui ``` This is added by a router via the [angular_page](https://github.com/quantmind/lux/blob/dev/lux/core/wrappers.py#L169) method which is invoked by the [add_to_sidemap](https://github.com/quantmind/lux/blob/dev/lux/extensions/angular/__init__.py#L159) function in the angular extension. This method does not work well when the router is serving a page with url parameters, for example ``/foo/<id>``.
non_priority
template url for views with parameters the lux way for serving templates to angular pages for a give url foo is get foo template ui this is added by a router via the method which is invoked by the function in the angular extension this method does not work well when the router is serving a page with url parameters for example foo
0
157,286
19,957,083,829
IssuesEvent
2022-01-28 01:22:39
panasalap/linux-4.1.15
https://api.github.com/repos/panasalap/linux-4.1.15
opened
CVE-2015-8787 (High) detected in linuxlinux-4.1.17
security vulnerability
## CVE-2015-8787 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.1.17</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/netfilter/nf_nat_redirect.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/netfilter/nf_nat_redirect.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604. <p>Publish Date: 2016-02-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8787>CVE-2015-8787</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8787">https://nvd.nist.gov/vuln/detail/CVE-2015-8787</a></p> <p>Release Date: 2016-02-08</p> <p>Fix Resolution: 4.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2015-8787 (High) detected in linuxlinux-4.1.17 - ## CVE-2015-8787 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.1.17</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/netfilter/nf_nat_redirect.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/netfilter/nf_nat_redirect.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604. <p>Publish Date: 2016-02-08 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8787>CVE-2015-8787</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8787">https://nvd.nist.gov/vuln/detail/CVE-2015-8787</a></p> <p>Release Date: 2016-02-08</p> <p>Fix Resolution: 4.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux apache software foundation asf library home page a href found in base branch master vulnerable source files net netfilter nf nat redirect c net netfilter nf nat redirect c vulnerability details the nf nat redirect function in net netfilter nf nat redirect c in the linux kernel before allows remote attackers to cause a denial of service null pointer dereference and system crash or possibly have unspecified other impact by sending certain packets to an incompletely configured interface a related issue to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
692,946
23,755,875,882
IssuesEvent
2022-09-01 03:00:29
brainhackorg/brainhack_cloud
https://api.github.com/repos/brainhackorg/brainhack_cloud
closed
Layout of landing page: suboptimal responsiveness
website low_priority
For certain devices the layout will not be optimal. ![Screenshot from 2022-03-09 08-01-02](https://user-images.githubusercontent.com/6961185/157389840-c294a3e6-3d57-475c-98c0-d864622fd422.png)
1.0
Layout of landing page: suboptimal responsiveness - For certain devices the layout will not be optimal. ![Screenshot from 2022-03-09 08-01-02](https://user-images.githubusercontent.com/6961185/157389840-c294a3e6-3d57-475c-98c0-d864622fd422.png)
priority
layout of landing page suboptimal responsiveness for certain devices the layout will not be optimal
1
728,527
25,082,980,156
IssuesEvent
2022-11-07 21:01:44
rmlockwood/FLExTrans
https://api.github.com/repos/rmlockwood/FLExTrans
closed
[Live Rule Tester] Refresh rules on advanced transfer unchecks the other tabs that aren't in focus
bug medium priority
All rules in all tabs should remain in the checked state they were in.
1.0
[Live Rule Tester] Refresh rules on advanced transfer unchecks the other tabs that aren't in focus - All rules in all tabs should remain in the checked state they were in.
priority
refresh rules on advanced transfer unchecks the other tabs that aren t in focus all rules in all tabs should remain in the checked state they were in
1
156,925
24,626,336,907
IssuesEvent
2022-10-16 15:13:46
baloise-incubator/design-system
https://api.github.com/repos/baloise-incubator/design-system
closed
Exchange Fallback Avatars
🆕 Enhancement 💁 Help Wanted 🎨 Design Support
We got the feedback that the avatars that were created by Meta do not match our use-case. Therefore we have to create new ones in order that IBM can replace them. Following tasks should be completed: - [x] Prepare briefing for Stadtluft (2:3) - [x] Update Figma - [x] Send new icons to Leo (upload to Frontify) - [x] Send feedback to Michael (he'll forward request to IBM)
1.0
Exchange Fallback Avatars - We got the feedback that the avatars that were created by Meta do not match our use-case. Therefore we have to create new ones in order that IBM can replace them. Following tasks should be completed: - [x] Prepare briefing for Stadtluft (2:3) - [x] Update Figma - [x] Send new icons to Leo (upload to Frontify) - [x] Send feedback to Michael (he'll forward request to IBM)
non_priority
exchange fallback avatars we got the feedback that the avatars that were created by meta do not match our use case therefore we have to create new ones in order that ibm can replace them following tasks should be completed prepare briefing for stadtluft update figma send new icons to leo upload to frontify send feedback to michael he ll forward request to ibm
0
731,881
25,235,242,911
IssuesEvent
2022-11-14 23:58:54
open-telemetry/opentelemetry-collector
https://api.github.com/repos/open-telemetry/opentelemetry-collector
closed
Make default config per type (metric, traces, etc.)
enhancement priority:p3 release:after-ga area:config
**Is your feature request related to a problem? Please describe.** Created from https://github.com/open-telemetry/opentelemetry-collector/pull/1966#discussion_r524005206 I want to create default config that is different for each entity (traces, metrics, logs). Currently the `Factory.createDefaultConfig` creates a default config for all entities. **Describe the solution you'd like** A factory interface that allows creating different default config for each entity. **Describe alternatives you've considered** Create a single default config with zero values and set appropriate defaults in the create exporter. **Additional context** https://github.com/open-telemetry/opentelemetry-collector/pull/1966#discussion_r524005206
1.0
Make default config per type (metric, traces, etc.) - **Is your feature request related to a problem? Please describe.** Created from https://github.com/open-telemetry/opentelemetry-collector/pull/1966#discussion_r524005206 I want to create default config that is different for each entity (traces, metrics, logs). Currently the `Factory.createDefaultConfig` creates a default config for all entities. **Describe the solution you'd like** A factory interface that allows creating different default config for each entity. **Describe alternatives you've considered** Create a single default config with zero values and set appropriate defaults in the create exporter. **Additional context** https://github.com/open-telemetry/opentelemetry-collector/pull/1966#discussion_r524005206
priority
make default config per type metric traces etc is your feature request related to a problem please describe created from i want to create default config that is different for each entity traces metrics logs currently the factory createdefaultconfig creates a default config for all entities describe the solution you d like a factory interface that allows creating different default config for each entity describe alternatives you ve considered create a single default config with zero values and set appropriate defaults in the create exporter additional context
1
23,125
2,652,930,884
IssuesEvent
2015-03-16 20:08:10
GoogleCloudPlatform/kubernetes
https://api.github.com/repos/GoogleCloudPlatform/kubernetes
closed
Write an e2e test that specifically tests kubectl functionality
area/reliability priority/P2 team/UX
As #3130 nears completion, we want to make sure that kubectl coverage isn't lost by moving to go tests.
1.0
Write an e2e test that specifically tests kubectl functionality - As #3130 nears completion, we want to make sure that kubectl coverage isn't lost by moving to go tests.
priority
write an test that specifically tests kubectl functionality as nears completion we want to make sure that kubectl coverage isn t lost by moving to go tests
1
2,978
3,050,761,564
IssuesEvent
2015-08-12 01:30:35
Carthage/Carthage
https://api.github.com/repos/Carthage/Carthage
closed
Carthage build fails with iOS 7.1 simulator installed
bug build help wanted
Steps to reproduce: - Install the iOS 7.1 Simulator in Xcode 6.2 - Create a new Cocoa Touch Framework project in Xcode - Run `carthage build --no-skip-current` in the directory that the Framework project was created in You will receive the following build error: ``` CompileC ... invalid architecture 'arm64' for deployment target '-mios-simulator-version-min=8.2' Command /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang failed with exit code 1 ``` This is due to the fact that Carthage (as far as I can tell) is running the following command during `carthage build --no-skip-current`: ``` xcodebuild build -scheme Framework -sdk iphonesimulator ``` If you run the above command on your new framework project, you will see the same build error that is produced when you run `carthage build`. As far as I can tell, the reason for this failure is that when no destination is specified in a build command, `xcodebuild` implicitly selects a destination simulator to build for. Since we have the iOS 7.1 Simulator installed, it is (for some reason) picked as the default destination, causing the above error to occur. However, if you select the latest simulator as the build destination via the command line: ```bash xcodebuild build -scheme Framework -sdk iphonesimulator -destination 'platform=iOS Simulator,name=iPhone 4s,OS=latest' ``` There is no build failure. The solution for this (as far as I can tell) would be to have Carthage allow for a `destination` option to be specified in addition to the existing `platform` and `configuration` options, or simply to not support Xcode installs that have pre-iOS 8 simulators installed.
1.0
Carthage build fails with iOS 7.1 simulator installed - Steps to reproduce: - Install the iOS 7.1 Simulator in Xcode 6.2 - Create a new Cocoa Touch Framework project in Xcode - Run `carthage build --no-skip-current` in the directory that the Framework project was created in You will receive the following build error: ``` CompileC ... invalid architecture 'arm64' for deployment target '-mios-simulator-version-min=8.2' Command /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/clang failed with exit code 1 ``` This is due to the fact that Carthage (as far as I can tell) is running the following command during `carthage build --no-skip-current`: ``` xcodebuild build -scheme Framework -sdk iphonesimulator ``` If you run the above command on your new framework project, you will see the same build error that is produced when you run `carthage build`. As far as I can tell, the reason for this failure is that when no destination is specified in a build command, `xcodebuild` implicitly selects a destination simulator to build for. Since we have the iOS 7.1 Simulator installed, it is (for some reason) picked as the default destination, causing the above error to occur. However, if you select the latest simulator as the build destination via the command line: ```bash xcodebuild build -scheme Framework -sdk iphonesimulator -destination 'platform=iOS Simulator,name=iPhone 4s,OS=latest' ``` There is no build failure. The solution for this (as far as I can tell) would be to have Carthage allow for a `destination` option to be specified in addition to the existing `platform` and `configuration` options, or simply to not support Xcode installs that have pre-iOS 8 simulators installed.
non_priority
carthage build fails with ios simulator installed steps to reproduce install the ios simulator in xcode create a new cocoa touch framework project in xcode run carthage build no skip current in the directory that the framework project was created in you will receive the following build error compilec invalid architecture for deployment target mios simulator version min command applications xcode app contents developer toolchains xcodedefault xctoolchain usr bin clang failed with exit code this is due to the fact that carthage as far as i can tell is running the following command during carthage build no skip current xcodebuild build scheme framework sdk iphonesimulator if you run the above command on your new framework project you will see the same build error that is produced when you run carthage build as far as i can tell the reason for this failure is that when no destination is specified in a build command xcodebuild implicitly selects a destination simulator to build for since we have the ios simulator installed it is for some reason picked as the default destination causing the above error to occur however if you select the latest simulator as the build destination via the command line bash xcodebuild build scheme framework sdk iphonesimulator destination platform ios simulator name iphone os latest there is no build failure the solution for this as far as i can tell would be to have carthage allow for a destination option to be specified in addition to the existing platform and configuration options or simply to not support xcode installs that have pre ios simulators installed
0
342,074
30,607,469,966
IssuesEvent
2023-07-23 07:20:27
unifyai/ivy
https://api.github.com/repos/unifyai/ivy
closed
Fix manipulations.test_jax_resize
NumPy Frontend Sub Task Failing Test
| | | |---|---| |jax|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a> |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a> |paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a>
1.0
Fix manipulations.test_jax_resize - | | | |---|---| |jax|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a> |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a> |paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5491105443/jobs/10007308085"><img src=https://img.shields.io/badge/-success-success></a>
non_priority
fix manipulations test jax resize jax a href src numpy a href src tensorflow a href src torch a href src paddle a href src
0
206,200
7,110,073,518
IssuesEvent
2018-01-17 09:22:40
vanilla-framework/vanilla-framework
https://api.github.com/repos/vanilla-framework/vanilla-framework
closed
Go live: Update DNS to point docs.vanillaframework.io at the Kubernetes ingress
Priority: High Status: Blocked Type: Maintenance
I believe we control the DNS. When (and only when) we've confirmed that the Kubernetes environment is correctly able to serve docs.staging.vanillaframework.io and docs.vanillaframework.io, with correct HTTPS certificates, then we should switch over DNS to point to Kubernetes.
1.0
Go live: Update DNS to point docs.vanillaframework.io at the Kubernetes ingress - I believe we control the DNS. When (and only when) we've confirmed that the Kubernetes environment is correctly able to serve docs.staging.vanillaframework.io and docs.vanillaframework.io, with correct HTTPS certificates, then we should switch over DNS to point to Kubernetes.
priority
go live update dns to point docs vanillaframework io at the kubernetes ingress i believe we control the dns when and only when we ve confirmed that the kubernetes environment is correctly able to serve docs staging vanillaframework io and docs vanillaframework io with correct https certificates then we should switch over dns to point to kubernetes
1