Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1
value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3
values | title stringlengths 1 1k | labels stringlengths 4 1.38k | body stringlengths 1 262k | index stringclasses 16
values | text_combine stringlengths 96 262k | label stringclasses 2
values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
80,714 | 10,198,265,678 | IssuesEvent | 2019-08-13 04:25:37 | Qiskit/qiskit | https://api.github.com/repos/Qiskit/qiskit | closed | do we need https://qiskit.org/documentation/advanced_use_of_ibm_q_devices.html | documentation | my feeling is we dont need. this page. If we do keep it we should make it much simpler it does not need to mimic the notebook | 1.0 | do we need https://qiskit.org/documentation/advanced_use_of_ibm_q_devices.html - my feeling is we dont need. this page. If we do keep it we should make it much simpler it does not need to mimic the notebook | non_priority | do we need my feeling is we dont need this page if we do keep it we should make it much simpler it does not need to mimic the notebook | 0 |
237,778 | 7,764,124,331 | IssuesEvent | 2018-06-01 19:04:46 | zephyrproject-rtos/zephyr | https://api.github.com/repos/zephyrproject-rtos/zephyr | closed | drivers: can: stm32_can: bitrate ignored | bug priority: medium | The CAN peripheral prescaler is not calculated based on the bitrate passed in or overridden if not passed in, but always on cfg->bus_speed
Also the can.h interface doesn't really specify that bitrate can be zero and will then be overridden with a value from dts or kconfig, not sure if that matters
https://github.com/zephyrproject-rtos/zephyr/blob/8364b223e485c331f99c0c55c8064bce80dd857e/drivers/can/stm32_can.c#L165 | 1.0 | drivers: can: stm32_can: bitrate ignored - The CAN peripheral prescaler is not calculated based on the bitrate passed in or overridden if not passed in, but always on cfg->bus_speed
Also the can.h interface doesn't really specify that bitrate can be zero and will then be overridden with a value from dts or kconfig, not sure if that matters
https://github.com/zephyrproject-rtos/zephyr/blob/8364b223e485c331f99c0c55c8064bce80dd857e/drivers/can/stm32_can.c#L165 | priority | drivers can can bitrate ignored the can peripheral prescaler is not calculated based on the bitrate passed in or overridden if not passed in but always on cfg bus speed also the can h interface doesn t really specify that bitrate can be zero and will then be overridden with a value from dts or kconfig not sure if that matters | 1 |
214,117 | 16,547,528,079 | IssuesEvent | 2021-05-28 03:06:12 | seyaFly/btp_sapUI5 | https://api.github.com/repos/seyaFly/btp_sapUI5 | closed | How to add logs in SAP UI5 | documentation | 1. add library
sap/base/log

2. add log configration when initialize the page

data-sap-ui-loglevel="INFO" or data-sap-ui-logLevel = "debug"
sap blog: [ add logs in SAP UI5 Applicaitons ](https://blogs.sap.com/2019/05/30/sapui5-log-api-javascript-add-logs-in-your-webapps/)
| 1.0 | How to add logs in SAP UI5 - 1. add library
sap/base/log

2. add log configration when initialize the page

data-sap-ui-loglevel="INFO" or data-sap-ui-logLevel = "debug"
sap blog: [ add logs in SAP UI5 Applicaitons ](https://blogs.sap.com/2019/05/30/sapui5-log-api-javascript-add-logs-in-your-webapps/)
| non_priority | how to add logs in sap add library sap base log add log configration when initialize the page data sap ui loglevel info or data sap ui loglevel debug sap blog | 0 |
575,014 | 17,023,910,416 | IssuesEvent | 2021-07-03 04:30:42 | tomhughes/trac-tickets | https://api.github.com/repos/tomhughes/trac-tickets | closed | render names of highway=services and rest_area | Component: mapnik Priority: minor Resolution: duplicate Type: enhancement | **[Submitted to the original trac issue database at 11.35pm, Sunday, 31st August 2014]**
Render the name tag for objects of the type highway=services/rest_area. Very often both type of Objects have a name. | 1.0 | render names of highway=services and rest_area - **[Submitted to the original trac issue database at 11.35pm, Sunday, 31st August 2014]**
Render the name tag for objects of the type highway=services/rest_area. Very often both type of Objects have a name. | priority | render names of highway services and rest area render the name tag for objects of the type highway services rest area very often both type of objects have a name | 1 |
225,833 | 17,911,527,143 | IssuesEvent | 2021-09-09 06:13:50 | pytorch/pytorch | https://api.github.com/repos/pytorch/pytorch | closed | DISABLED test_ddp_logging_data_cpu (__main__.TestDistBackendWithFork) | oncall: distributed module: flaky-tests | ## 🐛 Bug
Example failures:
https://app.circleci.com/pipelines/github/pytorch/pytorch/337673/workflows/db188d30-2c92-4faf-ac2a-e90b70d1e8c2/jobs/14187632
https://app.circleci.com/pipelines/github/pytorch/pytorch/337701/workflows/6e6161a7-7346-403a-a458-97f5e7970279/jobs/14188746
https://app.circleci.com/pipelines/github/pytorch/pytorch/337710/workflows/3f835c0e-ad07-45fd-9ede-dec90c043bb3/jobs/14188742
cc @pietern @mrshenli @pritamdamania87 @zhaojuanmao @satgera @rohan-varma @gqchen @aazzolini @osalpekar @jiayisuse @agolynski @SciPioneer @H-Huang @mrzzd @cbalioglu @gcramer23 | 1.0 | DISABLED test_ddp_logging_data_cpu (__main__.TestDistBackendWithFork) - ## 🐛 Bug
Example failures:
https://app.circleci.com/pipelines/github/pytorch/pytorch/337673/workflows/db188d30-2c92-4faf-ac2a-e90b70d1e8c2/jobs/14187632
https://app.circleci.com/pipelines/github/pytorch/pytorch/337701/workflows/6e6161a7-7346-403a-a458-97f5e7970279/jobs/14188746
https://app.circleci.com/pipelines/github/pytorch/pytorch/337710/workflows/3f835c0e-ad07-45fd-9ede-dec90c043bb3/jobs/14188742
cc @pietern @mrshenli @pritamdamania87 @zhaojuanmao @satgera @rohan-varma @gqchen @aazzolini @osalpekar @jiayisuse @agolynski @SciPioneer @H-Huang @mrzzd @cbalioglu @gcramer23 | non_priority | disabled test ddp logging data cpu main testdistbackendwithfork 🐛 bug example failures cc pietern mrshenli zhaojuanmao satgera rohan varma gqchen aazzolini osalpekar jiayisuse agolynski scipioneer h huang mrzzd cbalioglu | 0 |
198,349 | 15,707,458,744 | IssuesEvent | 2021-03-26 18:55:00 | Qiskit/qiskit | https://api.github.com/repos/Qiskit/qiskit | closed | Unable to load images on "more circuit identities" page | documentation | ### Found broken image links
**Name of the page:**
more circuit identities
**Link of the page:**
https://qiskit.org/textbook/ch-gates/more-circuit-identities.html
**Current links that need to be changed:**
A doubly controlled version of a gate V:
https://s3.us-south.cloud-object-storage.appdomain.cloud/strapi/693974b222d24dba9111e02ae25e9151iden2.png
A Toffoli:
https://s3.us-south.cloud-object-storage.appdomain.cloud/strapi/b3cbeb9b7d674d60a75bed351e4f2bcbiden3.png
| 1.0 | Unable to load images on "more circuit identities" page - ### Found broken image links
**Name of the page:**
more circuit identities
**Link of the page:**
https://qiskit.org/textbook/ch-gates/more-circuit-identities.html
**Current links that need to be changed:**
A doubly controlled version of a gate V:
https://s3.us-south.cloud-object-storage.appdomain.cloud/strapi/693974b222d24dba9111e02ae25e9151iden2.png
A Toffoli:
https://s3.us-south.cloud-object-storage.appdomain.cloud/strapi/b3cbeb9b7d674d60a75bed351e4f2bcbiden3.png
| non_priority | unable to load images on more circuit identities page found broken image links name of the page more circuit identities link of the page current links that need to be changed a doubly controlled version of a gate v a toffoli | 0 |
11,757 | 9,477,895,779 | IssuesEvent | 2019-04-19 20:22:43 | terraform-providers/terraform-provider-aws | https://api.github.com/repos/terraform-providers/terraform-provider-aws | closed | ACM certificate: wrong validation email for sub-domain | question service/acm | I have a sub-domain need to request to validate through email, however, terraform set output email domain as same as sub-domain. I tried with ACM web and there were no problems
Am I wrong or this is a bug?
```hcl
resource "aws_acm_certificate" "cert" {
domain_name = "sub.domain.com"
validation_method = "EMAIL"
}
```
Check terraform.tfstate and it showed
```
"validation_emails.#": "5",
"validation_emails.0": "postmaster@sub.domain.com",
"validation_emails.1": "administrator@sub.domain.com",
"validation_emails.2": "admin@sub.domain.com",
"validation_emails.3": "hostmaster@sub.domain.com",
"validation_emails.4": "webmaster@sub.domain.com",
"validation_method": "EMAIL"
```
It should be
```
"validation_emails.#": "5",
"validation_emails.0": "postmaster@domain.com",
"validation_emails.1": "administrator@domain.com",
"validation_emails.2": "admin@domain.com",
"validation_emails.3": "hostmaster@domain.com",
"validation_emails.4": "webmaster@domain.com",
"validation_method": "EMAIL"
``` | 1.0 | ACM certificate: wrong validation email for sub-domain - I have a sub-domain need to request to validate through email, however, terraform set output email domain as same as sub-domain. I tried with ACM web and there were no problems
Am I wrong or this is a bug?
```hcl
resource "aws_acm_certificate" "cert" {
domain_name = "sub.domain.com"
validation_method = "EMAIL"
}
```
Check terraform.tfstate and it showed
```
"validation_emails.#": "5",
"validation_emails.0": "postmaster@sub.domain.com",
"validation_emails.1": "administrator@sub.domain.com",
"validation_emails.2": "admin@sub.domain.com",
"validation_emails.3": "hostmaster@sub.domain.com",
"validation_emails.4": "webmaster@sub.domain.com",
"validation_method": "EMAIL"
```
It should be
```
"validation_emails.#": "5",
"validation_emails.0": "postmaster@domain.com",
"validation_emails.1": "administrator@domain.com",
"validation_emails.2": "admin@domain.com",
"validation_emails.3": "hostmaster@domain.com",
"validation_emails.4": "webmaster@domain.com",
"validation_method": "EMAIL"
``` | non_priority | acm certificate wrong validation email for sub domain i have a sub domain need to request to validate through email however terraform set output email domain as same as sub domain i tried with acm web and there were no problems am i wrong or this is a bug hcl resource aws acm certificate cert domain name sub domain com validation method email check terraform tfstate and it showed validation emails validation emails postmaster sub domain com validation emails administrator sub domain com validation emails admin sub domain com validation emails hostmaster sub domain com validation emails webmaster sub domain com validation method email it should be validation emails validation emails postmaster domain com validation emails administrator domain com validation emails admin domain com validation emails hostmaster domain com validation emails webmaster domain com validation method email | 0 |
57,429 | 24,120,824,330 | IssuesEvent | 2022-09-20 18:32:30 | googleapis/nodejs-game-servers | https://api.github.com/repos/googleapis/nodejs-game-servers | closed | Game Servers Get Cluster Test: "after all" hook for "should get a Game Server cluster in a realm" failed | type: bug priority: p1 api: gameservices flakybot: issue | Note: #287 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky.
----
commit: 8f345d7c91748fbea14862ebb250e0c84e3f8dda
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/e41b1041-12c6-4e99-b799-d6c1f19aa7ec), [Sponge](http://sponge2/e41b1041-12c6-4e99-b799-d6c1f19aa7ec)
status: failed
<details><summary>Test output</summary><br><pre>16 UNAUTHENTICATED: Request had invalid authentication credentials. Expected OAuth 2 access token, login cookie or other valid authentication credential. See https://developers.google.com/identity/sign-in/web/devconsole-project.
Error: 16 UNAUTHENTICATED: Request had invalid authentication credentials. Expected OAuth 2 access token, login cookie or other valid authentication credential. See https://developers.google.com/identity/sign-in/web/devconsole-project.
at Object.callErrorFromStatus (/workspace/node_modules/@grpc/grpc-js/build/src/call.js:31:19)
-> /workspace/node_modules/@grpc/grpc-js/src/call.ts:81:17
at Object.onReceiveStatus (/workspace/node_modules/@grpc/grpc-js/build/src/client.js:190:52)
-> /workspace/node_modules/@grpc/grpc-js/src/client.ts:352:36
at Object.onReceiveStatus (/workspace/node_modules/@grpc/grpc-js/build/src/client-interceptors.js:365:141)
-> /workspace/node_modules/@grpc/grpc-js/src/client-interceptors.ts:462:34
at Object.onReceiveStatus (/workspace/node_modules/@grpc/grpc-js/build/src/client-interceptors.js:328:181)
-> /workspace/node_modules/@grpc/grpc-js/src/client-interceptors.ts:424:48
at /workspace/node_modules/@grpc/grpc-js/build/src/call-stream.js:188:78
-> /workspace/node_modules/@grpc/grpc-js/src/call-stream.ts:330:24
at processTicksAndRejections (internal/process/task_queues.js:79:11)
for call at
at ServiceClientImpl.makeUnaryRequest (/workspace/node_modules/@grpc/grpc-js/build/src/client.js:160:30)
-> /workspace/node_modules/@grpc/grpc-js/src/client.ts:324:26
at ServiceClientImpl.<anonymous> (/workspace/node_modules/@grpc/grpc-js/build/src/make-client.js:105:19)
-> /workspace/node_modules/@grpc/grpc-js/src/make-client.ts:189:15
at /workspace/build/src/v1/game_server_clusters_service_client.js:269:29
-> /workspace/src/v1/game_server_clusters_service_client.ts:383:25
at /workspace/node_modules/google-gax/build/src/normalCalls/timeout.js:44:16
-> /workspace/node_modules/google-gax/src/normalCalls/timeout.ts:54:13
at LongrunningApiCaller._wrapOperation (/workspace/node_modules/google-gax/build/src/longRunningCalls/longRunningApiCaller.js:55:16)
-> /workspace/node_modules/google-gax/src/longRunningCalls/longRunningApiCaller.ts:80:12
at /workspace/node_modules/google-gax/build/src/longRunningCalls/longRunningApiCaller.js:46:25
-> /workspace/node_modules/google-gax/src/longRunningCalls/longRunningApiCaller.ts:64:19
at OngoingCallPromise.call (/workspace/node_modules/google-gax/build/src/call.js:67:27)
-> /workspace/node_modules/google-gax/src/call.ts:81:23
at LongrunningApiCaller.call (/workspace/node_modules/google-gax/build/src/longRunningCalls/longRunningApiCaller.js:45:19)
-> /workspace/node_modules/google-gax/src/longRunningCalls/longRunningApiCaller.ts:63:15
at /workspace/node_modules/google-gax/build/src/createApiCall.js:84:30
-> /workspace/node_modules/google-gax/src/createApiCall.ts:118:26</pre></details> | 1.0 | Game Servers Get Cluster Test: "after all" hook for "should get a Game Server cluster in a realm" failed - Note: #287 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky.
----
commit: 8f345d7c91748fbea14862ebb250e0c84e3f8dda
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/e41b1041-12c6-4e99-b799-d6c1f19aa7ec), [Sponge](http://sponge2/e41b1041-12c6-4e99-b799-d6c1f19aa7ec)
status: failed
<details><summary>Test output</summary><br><pre>16 UNAUTHENTICATED: Request had invalid authentication credentials. Expected OAuth 2 access token, login cookie or other valid authentication credential. See https://developers.google.com/identity/sign-in/web/devconsole-project.
Error: 16 UNAUTHENTICATED: Request had invalid authentication credentials. Expected OAuth 2 access token, login cookie or other valid authentication credential. See https://developers.google.com/identity/sign-in/web/devconsole-project.
at Object.callErrorFromStatus (/workspace/node_modules/@grpc/grpc-js/build/src/call.js:31:19)
-> /workspace/node_modules/@grpc/grpc-js/src/call.ts:81:17
at Object.onReceiveStatus (/workspace/node_modules/@grpc/grpc-js/build/src/client.js:190:52)
-> /workspace/node_modules/@grpc/grpc-js/src/client.ts:352:36
at Object.onReceiveStatus (/workspace/node_modules/@grpc/grpc-js/build/src/client-interceptors.js:365:141)
-> /workspace/node_modules/@grpc/grpc-js/src/client-interceptors.ts:462:34
at Object.onReceiveStatus (/workspace/node_modules/@grpc/grpc-js/build/src/client-interceptors.js:328:181)
-> /workspace/node_modules/@grpc/grpc-js/src/client-interceptors.ts:424:48
at /workspace/node_modules/@grpc/grpc-js/build/src/call-stream.js:188:78
-> /workspace/node_modules/@grpc/grpc-js/src/call-stream.ts:330:24
at processTicksAndRejections (internal/process/task_queues.js:79:11)
for call at
at ServiceClientImpl.makeUnaryRequest (/workspace/node_modules/@grpc/grpc-js/build/src/client.js:160:30)
-> /workspace/node_modules/@grpc/grpc-js/src/client.ts:324:26
at ServiceClientImpl.<anonymous> (/workspace/node_modules/@grpc/grpc-js/build/src/make-client.js:105:19)
-> /workspace/node_modules/@grpc/grpc-js/src/make-client.ts:189:15
at /workspace/build/src/v1/game_server_clusters_service_client.js:269:29
-> /workspace/src/v1/game_server_clusters_service_client.ts:383:25
at /workspace/node_modules/google-gax/build/src/normalCalls/timeout.js:44:16
-> /workspace/node_modules/google-gax/src/normalCalls/timeout.ts:54:13
at LongrunningApiCaller._wrapOperation (/workspace/node_modules/google-gax/build/src/longRunningCalls/longRunningApiCaller.js:55:16)
-> /workspace/node_modules/google-gax/src/longRunningCalls/longRunningApiCaller.ts:80:12
at /workspace/node_modules/google-gax/build/src/longRunningCalls/longRunningApiCaller.js:46:25
-> /workspace/node_modules/google-gax/src/longRunningCalls/longRunningApiCaller.ts:64:19
at OngoingCallPromise.call (/workspace/node_modules/google-gax/build/src/call.js:67:27)
-> /workspace/node_modules/google-gax/src/call.ts:81:23
at LongrunningApiCaller.call (/workspace/node_modules/google-gax/build/src/longRunningCalls/longRunningApiCaller.js:45:19)
-> /workspace/node_modules/google-gax/src/longRunningCalls/longRunningApiCaller.ts:63:15
at /workspace/node_modules/google-gax/build/src/createApiCall.js:84:30
-> /workspace/node_modules/google-gax/src/createApiCall.ts:118:26</pre></details> | non_priority | game servers get cluster test after all hook for should get a game server cluster in a realm failed note was also for this test but it was closed more than days ago so i didn t mark it flaky commit buildurl status failed test output unauthenticated request had invalid authentication credentials expected oauth access token login cookie or other valid authentication credential see error unauthenticated request had invalid authentication credentials expected oauth access token login cookie or other valid authentication credential see at object callerrorfromstatus workspace node modules grpc grpc js build src call js workspace node modules grpc grpc js src call ts at object onreceivestatus workspace node modules grpc grpc js build src client js workspace node modules grpc grpc js src client ts at object onreceivestatus workspace node modules grpc grpc js build src client interceptors js workspace node modules grpc grpc js src client interceptors ts at object onreceivestatus workspace node modules grpc grpc js build src client interceptors js workspace node modules grpc grpc js src client interceptors ts at workspace node modules grpc grpc js build src call stream js workspace node modules grpc grpc js src call stream ts at processticksandrejections internal process task queues js for call at at serviceclientimpl makeunaryrequest workspace node modules grpc grpc js build src client js workspace node modules grpc grpc js src client ts at serviceclientimpl workspace node modules grpc grpc js build src make client js workspace node modules grpc grpc js src make client ts at workspace build src game server clusters service client js workspace src game server clusters service client ts at workspace node modules google gax build src normalcalls timeout js workspace node modules google gax src normalcalls timeout ts at longrunningapicaller wrapoperation workspace node modules google gax build src longrunningcalls longrunningapicaller js workspace node modules google gax src longrunningcalls longrunningapicaller ts at workspace node modules google gax build src longrunningcalls longrunningapicaller js workspace node modules google gax src longrunningcalls longrunningapicaller ts at ongoingcallpromise call workspace node modules google gax build src call js workspace node modules google gax src call ts at longrunningapicaller call workspace node modules google gax build src longrunningcalls longrunningapicaller js workspace node modules google gax src longrunningcalls longrunningapicaller ts at workspace node modules google gax build src createapicall js workspace node modules google gax src createapicall ts | 0 |
213,376 | 16,521,536,909 | IssuesEvent | 2021-05-26 15:01:38 | iter8-tools/iter8 | https://api.github.com/repos/iter8-tools/iter8 | closed | [Release checklist] Remaining items for Iter8 v0.3.0 release | Epic documentation enhancement testing | ### weight fix
- [x] Merge etc3 weight fix changes into etc3 repo
- [x] Update etc3 image in iter8-install repo
- [x] Create tagged release v0.3.0-pre.1 in iter8-install repo
- [x] Remove install folder from iter8 repo
- [ ] Merge new samples and documentation based on v0.3.0-pre.1 in iter8 repo
- [ ] Update documentation (both install instructions and others like samples / references)
- [ ] Update platform setup
- [ ] Verify automated and manual tests succeed
---
### jq changes; multi-domain multi-db install changes
- [x] Finish test cases for iter8-analytics and merge
- [x] Update iter8-analytics image in iter8-install repo
- [x] Finish and merge jqExpression CRD changes in etc3 repo
- [x] Update etc3 image in iter8-install repo
- [x] Create multi-domain and multi-db install in iter8-install repo
- [x] Focus on knative
- [x] Ensure that `iter8-system` namespace is kustomizable
- [ ] Create tagged release v0.3.0-pre.2 in iter8-install repo
- [ ] Merge new samples and documentation based on v0.3.0-pre.2 in iter8 repo
- [ ] Update documentation (both install instructions and others like samples / references)
- [ ] Update platform setup
- [ ] Verify automated and manual tests succeed
---
### sample to demonstrate multi db
- [ ] Create a sample that showcases multiple database usage for Knative
- [ ] Focus on Prometheus + NewRelic; canary
- **Note:** creating a sample always means creating corresponding tests and documentation
---
### cleanup
- [ ] Clean up what is iter8
- [ ] Clean up title of documentation sections
- [ ] Clean up titles of tutorials and their organization
---
### what always happens before a release (announcement)
- [ ] Create a release branch for iter8 v0.3.0 (we always create immutable release branches for iter8 releases; branch is for Netlify purposes only)
- [ ] Create (only for this type; usually this an update) `what is new?` section of the documentation | 1.0 | [Release checklist] Remaining items for Iter8 v0.3.0 release - ### weight fix
- [x] Merge etc3 weight fix changes into etc3 repo
- [x] Update etc3 image in iter8-install repo
- [x] Create tagged release v0.3.0-pre.1 in iter8-install repo
- [x] Remove install folder from iter8 repo
- [ ] Merge new samples and documentation based on v0.3.0-pre.1 in iter8 repo
- [ ] Update documentation (both install instructions and others like samples / references)
- [ ] Update platform setup
- [ ] Verify automated and manual tests succeed
---
### jq changes; multi-domain multi-db install changes
- [x] Finish test cases for iter8-analytics and merge
- [x] Update iter8-analytics image in iter8-install repo
- [x] Finish and merge jqExpression CRD changes in etc3 repo
- [x] Update etc3 image in iter8-install repo
- [x] Create multi-domain and multi-db install in iter8-install repo
- [x] Focus on knative
- [x] Ensure that `iter8-system` namespace is kustomizable
- [ ] Create tagged release v0.3.0-pre.2 in iter8-install repo
- [ ] Merge new samples and documentation based on v0.3.0-pre.2 in iter8 repo
- [ ] Update documentation (both install instructions and others like samples / references)
- [ ] Update platform setup
- [ ] Verify automated and manual tests succeed
---
### sample to demonstrate multi db
- [ ] Create a sample that showcases multiple database usage for Knative
- [ ] Focus on Prometheus + NewRelic; canary
- **Note:** creating a sample always means creating corresponding tests and documentation
---
### cleanup
- [ ] Clean up what is iter8
- [ ] Clean up title of documentation sections
- [ ] Clean up titles of tutorials and their organization
---
### what always happens before a release (announcement)
- [ ] Create a release branch for iter8 v0.3.0 (we always create immutable release branches for iter8 releases; branch is for Netlify purposes only)
- [ ] Create (only for this type; usually this an update) `what is new?` section of the documentation | non_priority | remaining items for release weight fix merge weight fix changes into repo update image in install repo create tagged release pre in install repo remove install folder from repo merge new samples and documentation based on pre in repo update documentation both install instructions and others like samples references update platform setup verify automated and manual tests succeed jq changes multi domain multi db install changes finish test cases for analytics and merge update analytics image in install repo finish and merge jqexpression crd changes in repo update image in install repo create multi domain and multi db install in install repo focus on knative ensure that system namespace is kustomizable create tagged release pre in install repo merge new samples and documentation based on pre in repo update documentation both install instructions and others like samples references update platform setup verify automated and manual tests succeed sample to demonstrate multi db create a sample that showcases multiple database usage for knative focus on prometheus newrelic canary note creating a sample always means creating corresponding tests and documentation cleanup clean up what is clean up title of documentation sections clean up titles of tutorials and their organization what always happens before a release announcement create a release branch for we always create immutable release branches for releases branch is for netlify purposes only create only for this type usually this an update what is new section of the documentation | 0 |
280,988 | 8,689,139,712 | IssuesEvent | 2018-12-03 17:51:34 | bounswe/bounswe2018group10 | https://api.github.com/repos/bounswe/bounswe2018group10 | closed | Fix profile page according to the changes in backend | enhancement frontend priority: low | Profile API is changed with #135. Frontend should be updated accordingly.
### I'm submitting a ...
<!--Check the most relevant one with an x-->
- [x] bug report
- [ ] feature request
- [ ] support request | 1.0 | Fix profile page according to the changes in backend - Profile API is changed with #135. Frontend should be updated accordingly.
### I'm submitting a ...
<!--Check the most relevant one with an x-->
- [x] bug report
- [ ] feature request
- [ ] support request | priority | fix profile page according to the changes in backend profile api is changed with frontend should be updated accordingly i m submitting a bug report feature request support request | 1 |
443,480 | 12,794,771,162 | IssuesEvent | 2020-07-02 07:34:42 | telerik/kendo-ui-core | https://api.github.com/repos/telerik/kendo-ui-core | closed | On Android the DateRangePicker change event close Calendar after selecting a Start Date | Bug C: DateRangePicker Kendo1 Next LIB Priority 1 SEV: Medium | ### Bug report
When the **change** event is used in kendoDateRangePicker the Calendar gets closed after selecting a Start Date.
### Reproduction of the problem
https://dojo.telerik.com/equPapaJ
https://dojo.telerik.com/@bratanov/OHikoHaC
### Current behavior
The calendar in kendoDateRangePicker close after selecting Start Date.
### Expected/desired behavior
The calendar in kendoDateRangePicker stays open after selecting Start Date and close after selecting End Date.
### Environment
* **Kendo UI version:** 2020.1.406
* **jQuery version:** 1.12.4
* **Browser:** [Android Chrome Web Browser ]
| 1.0 | On Android the DateRangePicker change event close Calendar after selecting a Start Date - ### Bug report
When the **change** event is used in kendoDateRangePicker the Calendar gets closed after selecting a Start Date.
### Reproduction of the problem
https://dojo.telerik.com/equPapaJ
https://dojo.telerik.com/@bratanov/OHikoHaC
### Current behavior
The calendar in kendoDateRangePicker close after selecting Start Date.
### Expected/desired behavior
The calendar in kendoDateRangePicker stays open after selecting Start Date and close after selecting End Date.
### Environment
* **Kendo UI version:** 2020.1.406
* **jQuery version:** 1.12.4
* **Browser:** [Android Chrome Web Browser ]
| priority | on android the daterangepicker change event close calendar after selecting a start date bug report when the change event is used in kendodaterangepicker the calendar gets closed after selecting a start date reproduction of the problem current behavior the calendar in kendodaterangepicker close after selecting start date expected desired behavior the calendar in kendodaterangepicker stays open after selecting start date and close after selecting end date environment kendo ui version jquery version browser | 1 |
586,812 | 17,597,981,612 | IssuesEvent | 2021-08-17 08:15:28 | FAForever/fa | https://api.github.com/repos/FAForever/fa | closed | Dummy weapons on shields and AA causing problems for AI | area: sim priority: high | AI moves around units in formation, before the shields and AA sticked in the formation, protecting what they should have, when other units stopped to shoot, the shields stopped with them and then continues to move together.
Now they stop long before that exposing all units they should be protecting.
I guess with AA it doesnt hurt that much if they stay behind, but shields are a problem. | 1.0 | Dummy weapons on shields and AA causing problems for AI - AI moves around units in formation, before the shields and AA sticked in the formation, protecting what they should have, when other units stopped to shoot, the shields stopped with them and then continues to move together.
Now they stop long before that exposing all units they should be protecting.
I guess with AA it doesnt hurt that much if they stay behind, but shields are a problem. | priority | dummy weapons on shields and aa causing problems for ai ai moves around units in formation before the shields and aa sticked in the formation protecting what they should have when other units stopped to shoot the shields stopped with them and then continues to move together now they stop long before that exposing all units they should be protecting i guess with aa it doesnt hurt that much if they stay behind but shields are a problem | 1 |
152,962 | 19,702,052,016 | IssuesEvent | 2022-01-12 17:34:39 | harrinry/serverless-s3-local | https://api.github.com/repos/harrinry/serverless-s3-local | opened | CVE-2020-28500 (Medium) detected in lodash-4.17.15.tgz | security vulnerability | ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- eslint-5.16.0.tgz (Root Library)
- :x: **lodash-4.17.15.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/harrinry/serverless-s3-local/commit/507b173aed811d0cf6803c485e5541679b085b68">507b173aed811d0cf6803c485e5541679b085b68</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500</a></p>
<p>Release Date: 2021-02-15</p>
<p>Fix Resolution: lodash-4.17.21</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.15","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"eslint:5.16.0;lodash:4.17.15","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.21","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28500","vulnerabilityDetails":"Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-28500 (Medium) detected in lodash-4.17.15.tgz - ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.15.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.15.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- eslint-5.16.0.tgz (Root Library)
- :x: **lodash-4.17.15.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/harrinry/serverless-s3-local/commit/507b173aed811d0cf6803c485e5541679b085b68">507b173aed811d0cf6803c485e5541679b085b68</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500</a></p>
<p>Release Date: 2021-02-15</p>
<p>Fix Resolution: lodash-4.17.21</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.15","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"eslint:5.16.0;lodash:4.17.15","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.21","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-28500","vulnerabilityDetails":"Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in lodash tgz cve medium severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file package json path to vulnerable library node modules lodash package json dependency hierarchy eslint tgz root library x lodash tgz vulnerable library found in head commit a href found in base branch master vulnerability details lodash versions prior to are vulnerable to regular expression denial of service redos via the tonumber trim and trimend functions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree eslint lodash isminimumfixversionavailable true minimumfixversion lodash isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails lodash versions prior to are vulnerable to regular expression denial of service redos via the tonumber trim and trimend functions vulnerabilityurl | 0 |
675,489 | 23,096,421,391 | IssuesEvent | 2022-07-26 20:02:46 | boy0001/FastAsyncWorldedit | https://api.github.com/repos/boy0001/FastAsyncWorldedit | closed | Malformed json in //paste | [-] Low Priority [!] WorldEdit bug | **Debug paste link**:
After using the command, nothing shows on the console... :X
**Description of the problem:**
After use the //paste command, the error shows up in the console, but the task runs.
Error:
```
[17:58:50] [Server thread/INFO] [nucleus]: PotterCraft_ ran the command: //paste
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: com.google.gson.JsonSyntaxException: com.google.gson.stream.MalformedJsonException: Use JsonReader.setLenient(true) to accept malformed JSON at line 1 column 1
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at com.google.gson.internal.Streams.parse(Streams.java:56)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at com.google.gson.TreeTypeAdapter.read(TreeTypeAdapter.java:54)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at net.minecraft.util.JsonUtils.func_188173_a(SourceFile:501)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at net.minecraft.util.JsonUtils.func_188176_a(SourceFile:512)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at net.minecraft.util.text.ITextComponent$Serializer.func_150699_a(ITextComponent.java:260)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at net.minecraft.tileentity.TileEntitySign.func_145839_a(TileEntitySign.java:103)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at com.boydti.fawe.forge.v0.ForgeChunk_All.call(ForgeChunk_All.java:359)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at com.boydti.fawe.forge.v0.ForgeChunk_All.call(ForgeChunk_All.java:37)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask$AdaptedCallable.exec(ForkJoinTask.java:1424)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask.doExec(ForkJoinTask.java:289)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask.doInvoke(ForkJoinTask.java:401)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask.invoke(ForkJoinTask.java:734)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask$AdaptedCallable.run(ForkJoinTask.java:1434)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.FutureTask.run(FutureTask.java:266)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask$RunnableExecuteAction.exec(ForkJoinTask.java:1402)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask.doExec(ForkJoinTask.java:289)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinPool$WorkQueue.runTask(ForkJoinPool.java:1056)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinPool.runWorker(ForkJoinPool.java:1692)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinWorkerThread.run(ForkJoinWorkerThread.java:157)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: Caused by: com.google.gson.stream.MalformedJsonException: Use JsonReader.setLenient(true) to accept malformed JSON at line 1 column 1
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.stream.JsonReader.syntaxError(JsonReader.java:1505)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.stream.JsonReader.checkLenient(JsonReader.java:1386)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.stream.JsonReader.doPeek(JsonReader.java:572)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.stream.JsonReader.peek(JsonReader.java:414)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.internal.Streams.parse(Streams.java:42)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: ... 19 more
```
**Checklist**:
- [] I included a `/fawe debugpaste` link
- [X] I made sure there aren't duplicates of this report [(Use Search)](https://github.com/boy0001/FastAsyncWorldedit/issues?utf8=%E2%9C%93&q=is%3Aissue)
- [X] I made sure I am using an up-to-date version of FAWE
- [X] I Made sure the bug/error is not caused by any other plugin
I'm also using Sponge (not bukkit/forge), I think that could help.
| 1.0 | Malformed json in //paste - **Debug paste link**:
After using the command, nothing shows on the console... :X
**Description of the problem:**
After use the //paste command, the error shows up in the console, but the task runs.
Error:
```
[17:58:50] [Server thread/INFO] [nucleus]: PotterCraft_ ran the command: //paste
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: com.google.gson.JsonSyntaxException: com.google.gson.stream.MalformedJsonException: Use JsonReader.setLenient(true) to accept malformed JSON at line 1 column 1
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at com.google.gson.internal.Streams.parse(Streams.java:56)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at com.google.gson.TreeTypeAdapter.read(TreeTypeAdapter.java:54)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at net.minecraft.util.JsonUtils.func_188173_a(SourceFile:501)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at net.minecraft.util.JsonUtils.func_188176_a(SourceFile:512)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at net.minecraft.util.text.ITextComponent$Serializer.func_150699_a(ITextComponent.java:260)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at net.minecraft.tileentity.TileEntitySign.func_145839_a(TileEntitySign.java:103)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at com.boydti.fawe.forge.v0.ForgeChunk_All.call(ForgeChunk_All.java:359)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at com.boydti.fawe.forge.v0.ForgeChunk_All.call(ForgeChunk_All.java:37)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask$AdaptedCallable.exec(ForkJoinTask.java:1424)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask.doExec(ForkJoinTask.java:289)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask.doInvoke(ForkJoinTask.java:401)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask.invoke(ForkJoinTask.java:734)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask$AdaptedCallable.run(ForkJoinTask.java:1434)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.FutureTask.run(FutureTask.java:266)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask$RunnableExecuteAction.exec(ForkJoinTask.java:1402)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinTask.doExec(ForkJoinTask.java:289)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinPool$WorkQueue.runTask(ForkJoinPool.java:1056)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinPool.runWorker(ForkJoinPool.java:1692)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [com.boydti.fawe.util.MainUtil:handleError:524]: at java.util.concurrent.ForkJoinWorkerThread.run(ForkJoinWorkerThread.java:157)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: Caused by: com.google.gson.stream.MalformedJsonException: Use JsonReader.setLenient(true) to accept malformed JSON at line 1 column 1
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.stream.JsonReader.syntaxError(JsonReader.java:1505)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.stream.JsonReader.checkLenient(JsonReader.java:1386)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.stream.JsonReader.doPeek(JsonReader.java:572)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.stream.JsonReader.peek(JsonReader.java:414)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: at com.google.gson.internal.Streams.parse(Streams.java:42)
[17:58:50] [ForkJoinPool-2-worker-3/INFO] [STDERR]: [java.lang.Throwable:printStackTrace:634]: ... 19 more
```
**Checklist**:
- [] I included a `/fawe debugpaste` link
- [X] I made sure there aren't duplicates of this report [(Use Search)](https://github.com/boy0001/FastAsyncWorldedit/issues?utf8=%E2%9C%93&q=is%3Aissue)
- [X] I made sure I am using an up-to-date version of FAWE
- [X] I Made sure the bug/error is not caused by any other plugin
I'm also using Sponge (not bukkit/forge), I think that could help.
| priority | malformed json in paste debug paste link after using the command nothing shows on the console x description of the problem after use the paste command the error shows up in the console but the task runs error pottercraft ran the command paste com google gson jsonsyntaxexception com google gson stream malformedjsonexception use jsonreader setlenient true to accept malformed json at line column at com google gson internal streams parse streams java at com google gson treetypeadapter read treetypeadapter java at net minecraft util jsonutils func a sourcefile at net minecraft util jsonutils func a sourcefile at net minecraft util text itextcomponent serializer func a itextcomponent java at net minecraft tileentity tileentitysign func a tileentitysign java at com boydti fawe forge forgechunk all call forgechunk all java at com boydti fawe forge forgechunk all call forgechunk all java at java util concurrent forkjointask adaptedcallable exec forkjointask java at java util concurrent forkjointask doexec forkjointask java at java util concurrent forkjointask doinvoke forkjointask java at java util concurrent forkjointask invoke forkjointask java at java util concurrent forkjointask adaptedcallable run forkjointask java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at java util concurrent forkjointask runnableexecuteaction exec forkjointask java at java util concurrent forkjointask doexec forkjointask java at java util concurrent forkjoinpool workqueue runtask forkjoinpool java at java util concurrent forkjoinpool runworker forkjoinpool java at java util concurrent forkjoinworkerthread run forkjoinworkerthread java caused by com google gson stream malformedjsonexception use jsonreader setlenient true to accept malformed json at line column at com google gson stream jsonreader syntaxerror jsonreader java at com google gson stream jsonreader checklenient jsonreader java at com google gson stream jsonreader dopeek jsonreader java at com google gson stream jsonreader peek jsonreader java at com google gson internal streams parse streams java more checklist i included a fawe debugpaste link i made sure there aren t duplicates of this report i made sure i am using an up to date version of fawe i made sure the bug error is not caused by any other plugin i m also using sponge not bukkit forge i think that could help | 1 |
786,052 | 27,632,800,313 | IssuesEvent | 2023-03-10 12:14:03 | SkriptLang/Skript | https://api.github.com/repos/SkriptLang/Skript | closed | Impossible to shoot a projectile that is in a variable | bug priority: low PR available | ### Skript/Server Version
```markdown
2.6.4
1.19.3
```
### Bug Description
We can't shoot a projectile that is in a variable
### Expected Behavior
Normally, the projectile should have been shooted, but nothing happens.
### Steps to Reproduce
Basic Example:
```
on load:
set {customsnowball} to snowball
on right click with a netherite hoe:
shoot {customsnowball} from player at speed 1
```
(you may be wondering why I want to do this, here is a useful example)
```
on load:
set {customsnowball} to snowball with custom model data 2
on right click with a netherite hoe:
shoot {customsnowball} from player at speed 1
```
When we do a right click, nothing happens | 1.0 | Impossible to shoot a projectile that is in a variable - ### Skript/Server Version
```markdown
2.6.4
1.19.3
```
### Bug Description
We can't shoot a projectile that is in a variable
### Expected Behavior
Normally, the projectile should have been shooted, but nothing happens.
### Steps to Reproduce
Basic Example:
```
on load:
set {customsnowball} to snowball
on right click with a netherite hoe:
shoot {customsnowball} from player at speed 1
```
(you may be wondering why I want to do this, here is a useful example)
```
on load:
set {customsnowball} to snowball with custom model data 2
on right click with a netherite hoe:
shoot {customsnowball} from player at speed 1
```
When we do a right click, nothing happens | priority | impossible to shoot a projectile that is in a variable skript server version markdown bug description we can t shoot a projectile that is in a variable expected behavior normally the projectile should have been shooted but nothing happens steps to reproduce basic example on load set customsnowball to snowball on right click with a netherite hoe shoot customsnowball from player at speed you may be wondering why i want to do this here is a useful example on load set customsnowball to snowball with custom model data on right click with a netherite hoe shoot customsnowball from player at speed when we do a right click nothing happens | 1 |
45,183 | 18,452,413,553 | IssuesEvent | 2021-10-15 12:32:15 | GovernIB/registre | https://api.github.com/repos/GovernIB/registre | opened | Paginació parametrizable entre REGWEB-CARPETA dels assentaments d'un ciutadà | Tipus:Nova_Funcionalitat Prioritat:Normal Lloc:EJB Lloc:WebServices Estimació: 3D | Es tracta d'homogenitzar la presentació d'informació de les diferents integracions de CARPETA (de moment SISTRA, REGWEB3 i NOTIB). Bàsicament les APIs haurien de permetre:
- Poder establir un filtre a la consulta (com a mínim textual sobre l'extracte)
- Retornar el nombre total de resultats de la consulta
- Permetre establir dinàmicament un mida de bloc (pàgina) de recuperació
- Indicar la pàgina que es vol recuperar | 1.0 | Paginació parametrizable entre REGWEB-CARPETA dels assentaments d'un ciutadà - Es tracta d'homogenitzar la presentació d'informació de les diferents integracions de CARPETA (de moment SISTRA, REGWEB3 i NOTIB). Bàsicament les APIs haurien de permetre:
- Poder establir un filtre a la consulta (com a mínim textual sobre l'extracte)
- Retornar el nombre total de resultats de la consulta
- Permetre establir dinàmicament un mida de bloc (pàgina) de recuperació
- Indicar la pàgina que es vol recuperar | non_priority | paginació parametrizable entre regweb carpeta dels assentaments d un ciutadà es tracta d homogenitzar la presentació d informació de les diferents integracions de carpeta de moment sistra i notib bàsicament les apis haurien de permetre poder establir un filtre a la consulta com a mínim textual sobre l extracte retornar el nombre total de resultats de la consulta permetre establir dinàmicament un mida de bloc pàgina de recuperació indicar la pàgina que es vol recuperar | 0 |
521,520 | 15,110,386,939 | IssuesEvent | 2021-02-08 19:09:05 | brave/brave-browser | https://api.github.com/repos/brave/brave-browser | closed | Missing translations for educational modals | OS/Android QA/Yes l10n priority/P2 release-notes/exclude release/blocking | <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description <!-- Provide a brief description of the issue -->
Missing translations for educational modals
## Steps to reproduce <!-- Please add a series of steps to reproduce the issue -->
1. Set device locale to non-EN region
2. Install 1.20.x build
3. Trigger educational modals, shows in English instead of device locale
## Actual result <!-- Please add screenshots if needed -->
Educational modals are not translated
## Expected result
Educational modals should be translated
## Issue reproduces how often <!-- [Easily reproduced/Intermittent issue/No steps to reproduce] -->
Easy
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current Play Store version? NA
- Can you reproduce this issue with the current Play Store Beta version? Yes
- Can you reproduce this issue with the current Play Store Nightly version? Yes
## Device details
- Install type (ARM, x86): ARM
- Device type (Phone, Tablet, Phablet): All
- Android version: 10
## Brave version
1.20.x
### Website problems only
- Does the issue resolve itself when disabling Brave Shields? NA
- Does the issue resolve itself when disabling Brave Rewards?NA
- Is the issue reproducible on the latest version of Chrome? NA
### Additional information
<!-- Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue -->
cc: @mkarolin @anthonypkeane @bsclifton @kjozwiak | 1.0 | Missing translations for educational modals - <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description <!-- Provide a brief description of the issue -->
Missing translations for educational modals
## Steps to reproduce <!-- Please add a series of steps to reproduce the issue -->
1. Set device locale to non-EN region
2. Install 1.20.x build
3. Trigger educational modals, shows in English instead of device locale
## Actual result <!-- Please add screenshots if needed -->
Educational modals are not translated
## Expected result
Educational modals should be translated
## Issue reproduces how often <!-- [Easily reproduced/Intermittent issue/No steps to reproduce] -->
Easy
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current Play Store version? NA
- Can you reproduce this issue with the current Play Store Beta version? Yes
- Can you reproduce this issue with the current Play Store Nightly version? Yes
## Device details
- Install type (ARM, x86): ARM
- Device type (Phone, Tablet, Phablet): All
- Android version: 10
## Brave version
1.20.x
### Website problems only
- Does the issue resolve itself when disabling Brave Shields? NA
- Does the issue resolve itself when disabling Brave Rewards?NA
- Is the issue reproducible on the latest version of Chrome? NA
### Additional information
<!-- Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue -->
cc: @mkarolin @anthonypkeane @bsclifton @kjozwiak | priority | missing translations for educational modals have you searched for similar issues before submitting this issue please check the open issues and add a note before logging a new issue please use the template below to provide information about the issue insufficient info will get the issue closed it will only be reopened after sufficient info is provided description missing translations for educational modals steps to reproduce set device locale to non en region install x build trigger educational modals shows in english instead of device locale actual result educational modals are not translated expected result educational modals should be translated issue reproduces how often easy version channel information can you reproduce this issue with the current play store version na can you reproduce this issue with the current play store beta version yes can you reproduce this issue with the current play store nightly version yes device details install type arm arm device type phone tablet phablet all android version brave version x website problems only does the issue resolve itself when disabling brave shields na does the issue resolve itself when disabling brave rewards na is the issue reproducible on the latest version of chrome na additional information cc mkarolin anthonypkeane bsclifton kjozwiak | 1 |
476,712 | 13,748,935,626 | IssuesEvent | 2020-10-06 09:45:24 | strapi/strapi | https://api.github.com/repos/strapi/strapi | closed | Custom authentication provider (e.g. AWS Cognito User Pools) not working because subdomain parameter not set in grant object configuration | Hacktoberfest priority: low source: plugin:users-permissions type: enhancement | **Describe the bug**
When trying to create a new custom authentication provider for strapi, I am calling the strapi server base url /connect/new_provider_name then I am getting a dns error from the browser. When looking at the network log I can see a 302 response with a redirection to https://[subdomain]/oauth2/authorize. The subdomain is not being replaced by the link to the Identity provider (in this case AWS Cognito User Pools)
**Steps to reproduce the behavior**
1. Follow the documentation to add a new Custom provider
2. Go to https://strapi_server_url/collect/name_of_your_provider
3. Redirection fails
**Expected behavior**
The redirection from https://strapi_server_url/collect/name_of_your_provider to the identity provider authorize page works
**Code snippets**
The issue seems to be in not having the subdomain property configurable in the grant object configuration in the user-permissions plugin and more precisely in the connect method located in the Auth.js controller (users-permissions > controllers > Auth.js
```javascript
async connect (ctx, next) {
const grantConfig = await strapi
.store({
environment: '',
type: 'plugin',
name: 'users-permissions',
key: 'grant'
})
.get()
const [requestPath] = ctx.request.url.split('?')
const provider =
process.platform === 'win32' ? requestPath.split('\\')[2] : requestPath.split('/')[2]
if (!_.get(grantConfig[provider], 'enabled')) {
return ctx.badRequest(null, 'This provider is disabled.')
}
// Ability to pass OAuth callback dynamically
grantConfig[provider].callback = _.get(ctx, 'query.callback') || grantConfig[provider].callback
grantConfig[provider].redirect_uri = `${strapi.config.server.url}/connect/${provider}/callback`
// Adding the following code seems to solve the issue
grantConfig[provider].subdomain = strapi.config.custom.cognitoHost
return grant(grantConfig)(ctx, next)
},
```
Adding the following code in the previous method seems to work:
```javascript
// Adding the following sentence seems to solve the issue
grantConfig[provider].subdomain = strapi.config.custom.cognitoHost
```
**System**
- Node.js version: v12
- Strapi version: v3.0.5
| 1.0 | Custom authentication provider (e.g. AWS Cognito User Pools) not working because subdomain parameter not set in grant object configuration - **Describe the bug**
When trying to create a new custom authentication provider for strapi, I am calling the strapi server base url /connect/new_provider_name then I am getting a dns error from the browser. When looking at the network log I can see a 302 response with a redirection to https://[subdomain]/oauth2/authorize. The subdomain is not being replaced by the link to the Identity provider (in this case AWS Cognito User Pools)
**Steps to reproduce the behavior**
1. Follow the documentation to add a new Custom provider
2. Go to https://strapi_server_url/collect/name_of_your_provider
3. Redirection fails
**Expected behavior**
The redirection from https://strapi_server_url/collect/name_of_your_provider to the identity provider authorize page works
**Code snippets**
The issue seems to be in not having the subdomain property configurable in the grant object configuration in the user-permissions plugin and more precisely in the connect method located in the Auth.js controller (users-permissions > controllers > Auth.js
```javascript
async connect (ctx, next) {
const grantConfig = await strapi
.store({
environment: '',
type: 'plugin',
name: 'users-permissions',
key: 'grant'
})
.get()
const [requestPath] = ctx.request.url.split('?')
const provider =
process.platform === 'win32' ? requestPath.split('\\')[2] : requestPath.split('/')[2]
if (!_.get(grantConfig[provider], 'enabled')) {
return ctx.badRequest(null, 'This provider is disabled.')
}
// Ability to pass OAuth callback dynamically
grantConfig[provider].callback = _.get(ctx, 'query.callback') || grantConfig[provider].callback
grantConfig[provider].redirect_uri = `${strapi.config.server.url}/connect/${provider}/callback`
// Adding the following code seems to solve the issue
grantConfig[provider].subdomain = strapi.config.custom.cognitoHost
return grant(grantConfig)(ctx, next)
},
```
Adding the following code in the previous method seems to work:
```javascript
// Adding the following sentence seems to solve the issue
grantConfig[provider].subdomain = strapi.config.custom.cognitoHost
```
**System**
- Node.js version: v12
- Strapi version: v3.0.5
| priority | custom authentication provider e g aws cognito user pools not working because subdomain parameter not set in grant object configuration describe the bug when trying to create a new custom authentication provider for strapi i am calling the strapi server base url connect new provider name then i am getting a dns error from the browser when looking at the network log i can see a response with a redirection to https authorize the subdomain is not being replaced by the link to the identity provider in this case aws cognito user pools steps to reproduce the behavior follow the documentation to add a new custom provider go to redirection fails expected behavior the redirection from to the identity provider authorize page works code snippets the issue seems to be in not having the subdomain property configurable in the grant object configuration in the user permissions plugin and more precisely in the connect method located in the auth js controller users permissions controllers auth js javascript async connect ctx next const grantconfig await strapi store environment type plugin name users permissions key grant get const ctx request url split const provider process platform requestpath split requestpath split if get grantconfig enabled return ctx badrequest null this provider is disabled ability to pass oauth callback dynamically grantconfig callback get ctx query callback grantconfig callback grantconfig redirect uri strapi config server url connect provider callback adding the following code seems to solve the issue grantconfig subdomain strapi config custom cognitohost return grant grantconfig ctx next adding the following code in the previous method seems to work javascript adding the following sentence seems to solve the issue grantconfig subdomain strapi config custom cognitohost system node js version strapi version | 1 |
75,549 | 14,484,441,269 | IssuesEvent | 2020-12-10 16:20:45 | CosmWasm/cosmwasm | https://api.github.com/repos/CosmWasm/cosmwasm | closed | Limit size of linear memory in VM | Upgrade to Wasmer Reborn (Productionize Code) vm | The heap data of a smart contract execution is stored in a Wasm linear memory. Only zero or one linear memories can exist in the current Wasm standard. The maximum size of a linear memory is 4GB because it is addressed by uint32 offsets in 1 byte steps.
Right now, we ensure the upper memory limit is unset by the contract:
```rust
fn check_wasm_memories(module: &Module) -> VmResult<()> {
// ...
if limits.maximum() != None {
return Err(VmError::static_validation_err(
"Wasm contract memory's maximum must be unset. The host will set it for you.",
));
}
Ok(())
}
```
If we wanted we could implement the limit the following way at any time: take a Wasm blob, deserialize, set the maximum of the first linear memory, re-serialize, compile. This is not very elegant and has the disadvantage that the memory limit is stored as part of the compiled modules. So it cannot be adjusted without invalidating cached modules.
A proper solution is discussed here, which is what we wait for right now: https://github.com/wasmerio/wasmer/issues/1360 | 1.0 | Limit size of linear memory in VM - The heap data of a smart contract execution is stored in a Wasm linear memory. Only zero or one linear memories can exist in the current Wasm standard. The maximum size of a linear memory is 4GB because it is addressed by uint32 offsets in 1 byte steps.
Right now, we ensure the upper memory limit is unset by the contract:
```rust
fn check_wasm_memories(module: &Module) -> VmResult<()> {
// ...
if limits.maximum() != None {
return Err(VmError::static_validation_err(
"Wasm contract memory's maximum must be unset. The host will set it for you.",
));
}
Ok(())
}
```
If we wanted we could implement the limit the following way at any time: take a Wasm blob, deserialize, set the maximum of the first linear memory, re-serialize, compile. This is not very elegant and has the disadvantage that the memory limit is stored as part of the compiled modules. So it cannot be adjusted without invalidating cached modules.
A proper solution is discussed here, which is what we wait for right now: https://github.com/wasmerio/wasmer/issues/1360 | non_priority | limit size of linear memory in vm the heap data of a smart contract execution is stored in a wasm linear memory only zero or one linear memories can exist in the current wasm standard the maximum size of a linear memory is because it is addressed by offsets in byte steps right now we ensure the upper memory limit is unset by the contract rust fn check wasm memories module module vmresult if limits maximum none return err vmerror static validation err wasm contract memory s maximum must be unset the host will set it for you ok if we wanted we could implement the limit the following way at any time take a wasm blob deserialize set the maximum of the first linear memory re serialize compile this is not very elegant and has the disadvantage that the memory limit is stored as part of the compiled modules so it cannot be adjusted without invalidating cached modules a proper solution is discussed here which is what we wait for right now | 0 |
205,460 | 23,338,123,071 | IssuesEvent | 2022-08-09 11:51:29 | rsoreq/zaproxy | https://api.github.com/repos/rsoreq/zaproxy | closed | CVE-2021-21351 (High) detected in xstream-1.4.11.1.jar - autoclosed | security vulnerability | ## CVE-2021-21351 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.11.1.jar</b></p></summary>
<p>XStream is a serialization library from Java objects to XML and back.</p>
<p>Library home page: <a href="http://x-stream.github.io">http://x-stream.github.io</a></p>
<p>Path to dependency file: /buildSrc/build.gradle.kts</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.thoughtworks.xstream/xstream/1.4.11.1/6c120c45a8c480bb2fea5b56502e3993ddd74fd2/xstream-1.4.11.1.jar</p>
<p>
Dependency Hierarchy:
- launch4j-2.4.6.jar (Root Library)
- :x: **xstream-1.4.11.1.jar** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21351>CVE-2021-21351</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c">https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p>
</p>
</details>
<p></p>
| True | CVE-2021-21351 (High) detected in xstream-1.4.11.1.jar - autoclosed - ## CVE-2021-21351 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.11.1.jar</b></p></summary>
<p>XStream is a serialization library from Java objects to XML and back.</p>
<p>Library home page: <a href="http://x-stream.github.io">http://x-stream.github.io</a></p>
<p>Path to dependency file: /buildSrc/build.gradle.kts</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.thoughtworks.xstream/xstream/1.4.11.1/6c120c45a8c480bb2fea5b56502e3993ddd74fd2/xstream-1.4.11.1.jar</p>
<p>
Dependency Hierarchy:
- launch4j-2.4.6.jar (Root Library)
- :x: **xstream-1.4.11.1.jar** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21351>CVE-2021-21351</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c">https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p>
</p>
</details>
<p></p>
| non_priority | cve high detected in xstream jar autoclosed cve high severity vulnerability vulnerable library xstream jar xstream is a serialization library from java objects to xml and back library home page a href path to dependency file buildsrc build gradle kts path to vulnerable library home wss scanner gradle caches modules files com thoughtworks xstream xstream xstream jar dependency hierarchy jar root library x xstream jar vulnerable library found in base branch develop vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream | 0 |
227,795 | 7,542,856,819 | IssuesEvent | 2018-04-17 14:06:50 | azavea/azavea-branding-guide | https://api.github.com/repos/azavea/azavea-branding-guide | closed | Fix page navigation | Nice-to-have bug in progress priority backlog | The page navigation at the bottom of the guide does not work consistently. It should go to the next and previous pages. When there is no next/prev page, then the button should not be visible. | 1.0 | Fix page navigation - The page navigation at the bottom of the guide does not work consistently. It should go to the next and previous pages. When there is no next/prev page, then the button should not be visible. | priority | fix page navigation the page navigation at the bottom of the guide does not work consistently it should go to the next and previous pages when there is no next prev page then the button should not be visible | 1 |
326,139 | 9,948,125,206 | IssuesEvent | 2019-07-04 08:11:18 | WoWManiaUK/Blackwing-Lair | https://api.github.com/repos/WoWManiaUK/Blackwing-Lair | closed | [NPC] Spirit Healer Missing - Stagecoach Crash Site - Gilneas | Fixed Confirmed Fixed in Dev Low Priority Starting Zone | The grave yard at stagecoach crash site has no spirit to ress you. unable to find zone id

| 1.0 | [NPC] Spirit Healer Missing - Stagecoach Crash Site - Gilneas - The grave yard at stagecoach crash site has no spirit to ress you. unable to find zone id

| priority | spirit healer missing stagecoach crash site gilneas the grave yard at stagecoach crash site has no spirit to ress you unable to find zone id | 1 |
349,875 | 10,475,012,483 | IssuesEvent | 2019-09-23 15:30:26 | etternagame/etterna | https://api.github.com/repos/etternagame/etterna | opened | Fix/Reduce Textureman Leaks | Priority: Low Type: Maintenance | Jousway: replace the pointers with shared_ptr ;)
(investigate what is going on) | 1.0 | Fix/Reduce Textureman Leaks - Jousway: replace the pointers with shared_ptr ;)
(investigate what is going on) | priority | fix reduce textureman leaks jousway replace the pointers with shared ptr investigate what is going on | 1 |
42,831 | 22,959,904,130 | IssuesEvent | 2022-07-19 14:35:44 | scala/bug | https://api.github.com/repos/scala/bug | closed | For ArrayBuffer#min and max, Scala 2.13 is slower than 2.12 | help wanted has PR performance library:collections | ## Reproduction steps
Scala version: 2.13.8
The test program is as follows
```scala
private def min(numIters: Int, bufferSize: Int, loops: Int): Unit = {
val benchmark = new Benchmark("Array Buffer", loops, output = output)
val buffer = new mutable.ArrayBuffer[Int]()
(0 until bufferSize).foreach(i => buffer += i)
benchmark.addCase(s"buffer min with $bufferSize items", numIters) { _ =>
(0 until loops).foreach(_ => buffer.min)
}
benchmark.addCase(s"buffer max with $bufferSize items", numIters) { _ =>
(0 until loops).foreach(_ => buffer.max)
}
benchmark.run()
}
override def runBenchmarkSuite(mainArgs: Array[String]): Unit = {
val numIters = 3
val loops = 20000
runBenchmark("ArrayBuffer min and max") {
Seq(1000, 10000, 100000).foreach { bufferSize =>
min(numIters, bufferSize, loops)
}
}
}
```
The `Benchmark` of spark is used to record time, which can also be changed to manual timing.
In above cases, I test 2 operations: `ArrayBuffer.min`, `ArrayBuffer.max`, with different buffer size: 1000, 10000, 100000.
**Scala 2.12.16 result:**
```
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 1000 items 121 121 0 0.2 6043.9 1.0X
buffer max with 1000 items 134 134 0 0.1 6705.5 0.9X
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 10000 items 1272 1272 0 0.0 63601.9 1.0X
buffer max with 10000 items 1339 1340 0 0.0 66972.2 0.9X
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 100000 items 12785 12788 3 0.0 639232.4 1.0X
buffer max with 100000 items 13433 13434 1 0.0 671654.2 1.0X
```
**Scala 2.13.8 result:**
```
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 1000 items 273 273 0 0.1 13646.5 1.0X
buffer max with 1000 items 162 162 0 0.1 8076.9 1.7X
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 10000 items 1676 1676 0 0.0 83782.1 1.0X
buffer max with 10000 items 1610 1610 0 0.0 80485.5 1.0X
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 100000 items 16849 16856 10 0.0 842469.3 1.0X
buffer max with 100000 items 15513 15515 4 0.0 775641.0 1.1X
```
## Problem
From the test results, Scala 2.13.8 is slower than Scala 2.12.16 for `ArrayBuffer.min` and `ArrayBuffer.max`. Should they have the same performance? Or should I use other data structures in Scala 2.13?
| True | For ArrayBuffer#min and max, Scala 2.13 is slower than 2.12 - ## Reproduction steps
Scala version: 2.13.8
The test program is as follows
```scala
private def min(numIters: Int, bufferSize: Int, loops: Int): Unit = {
val benchmark = new Benchmark("Array Buffer", loops, output = output)
val buffer = new mutable.ArrayBuffer[Int]()
(0 until bufferSize).foreach(i => buffer += i)
benchmark.addCase(s"buffer min with $bufferSize items", numIters) { _ =>
(0 until loops).foreach(_ => buffer.min)
}
benchmark.addCase(s"buffer max with $bufferSize items", numIters) { _ =>
(0 until loops).foreach(_ => buffer.max)
}
benchmark.run()
}
override def runBenchmarkSuite(mainArgs: Array[String]): Unit = {
val numIters = 3
val loops = 20000
runBenchmark("ArrayBuffer min and max") {
Seq(1000, 10000, 100000).foreach { bufferSize =>
min(numIters, bufferSize, loops)
}
}
}
```
The `Benchmark` of spark is used to record time, which can also be changed to manual timing.
In above cases, I test 2 operations: `ArrayBuffer.min`, `ArrayBuffer.max`, with different buffer size: 1000, 10000, 100000.
**Scala 2.12.16 result:**
```
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 1000 items 121 121 0 0.2 6043.9 1.0X
buffer max with 1000 items 134 134 0 0.1 6705.5 0.9X
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 10000 items 1272 1272 0 0.0 63601.9 1.0X
buffer max with 10000 items 1339 1340 0 0.0 66972.2 0.9X
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 100000 items 12785 12788 3 0.0 639232.4 1.0X
buffer max with 100000 items 13433 13434 1 0.0 671654.2 1.0X
```
**Scala 2.13.8 result:**
```
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 1000 items 273 273 0 0.1 13646.5 1.0X
buffer max with 1000 items 162 162 0 0.1 8076.9 1.7X
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 10000 items 1676 1676 0 0.0 83782.1 1.0X
buffer max with 10000 items 1610 1610 0 0.0 80485.5 1.0X
OpenJDK 64-Bit Server VM 1.8.0_332-b09 on Linux 5.13.0-1031-azure
Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
Array Buffer: Best Time(ms) Avg Time(ms) Stdev(ms) Rate(M/s) Per Row(ns) Relative
------------------------------------------------------------------------------------------------------------------------
buffer min with 100000 items 16849 16856 10 0.0 842469.3 1.0X
buffer max with 100000 items 15513 15515 4 0.0 775641.0 1.1X
```
## Problem
From the test results, Scala 2.13.8 is slower than Scala 2.12.16 for `ArrayBuffer.min` and `ArrayBuffer.max`. Should they have the same performance? Or should I use other data structures in Scala 2.13?
| non_priority | for arraybuffer min and max scala is slower than reproduction steps scala version the test program is as follows scala private def min numiters int buffersize int loops int unit val benchmark new benchmark array buffer loops output output val buffer new mutable arraybuffer until buffersize foreach i buffer i benchmark addcase s buffer min with buffersize items numiters until loops foreach buffer min benchmark addcase s buffer max with buffersize items numiters until loops foreach buffer max benchmark run override def runbenchmarksuite mainargs array unit val numiters val loops runbenchmark arraybuffer min and max seq foreach buffersize min numiters buffersize loops the benchmark of spark is used to record time which can also be changed to manual timing in above cases i test operations arraybuffer min arraybuffer max with different buffer size scala result openjdk bit server vm on linux azure intel r xeon r platinum cpu array buffer best time ms avg time ms stdev ms rate m s per row ns relative buffer min with items buffer max with items openjdk bit server vm on linux azure intel r xeon r platinum cpu array buffer best time ms avg time ms stdev ms rate m s per row ns relative buffer min with items buffer max with items openjdk bit server vm on linux azure intel r xeon r platinum cpu array buffer best time ms avg time ms stdev ms rate m s per row ns relative buffer min with items buffer max with items scala result openjdk bit server vm on linux azure intel r xeon r platinum cpu array buffer best time ms avg time ms stdev ms rate m s per row ns relative buffer min with items buffer max with items openjdk bit server vm on linux azure intel r xeon r platinum cpu array buffer best time ms avg time ms stdev ms rate m s per row ns relative buffer min with items buffer max with items openjdk bit server vm on linux azure intel r xeon r platinum cpu array buffer best time ms avg time ms stdev ms rate m s per row ns relative buffer min with items buffer max with items problem from the test results scala is slower than scala for arraybuffer min and arraybuffer max should they have the same performance or should i use other data structures in scala | 0 |
229,875 | 17,581,036,988 | IssuesEvent | 2021-08-16 07:28:19 | astrolabsoftware/fink-broker | https://api.github.com/repos/astrolabsoftware/fink-broker | opened | Add a message to warn about schema creation upon release | documentation schema | **Describe the issue**
When fink-broker is updated, a new schema should be released in fink-client. In order to avoid (which I do often...), a message should appear in the PR template message, to warn the user. | 1.0 | Add a message to warn about schema creation upon release - **Describe the issue**
When fink-broker is updated, a new schema should be released in fink-client. In order to avoid (which I do often...), a message should appear in the PR template message, to warn the user. | non_priority | add a message to warn about schema creation upon release describe the issue when fink broker is updated a new schema should be released in fink client in order to avoid which i do often a message should appear in the pr template message to warn the user | 0 |
63,934 | 7,753,189,034 | IssuesEvent | 2018-05-30 23:13:13 | cityofaustin/techstack | https://api.github.com/repos/cityofaustin/techstack | closed | Mock up Images on Service Pages | Feature: Image Gallery Feature: Service Size: M Team: Design/Research | We don't have an image gallery as part of any service pages, yet. The Pick up free paint service is a challenge for residents in testing because they want to visualize the colors and also because, when translated–the colors are less clear across languages.
We haven't groomed out what an image module might look like or the constraints for content entry, etc. | 1.0 | Mock up Images on Service Pages - We don't have an image gallery as part of any service pages, yet. The Pick up free paint service is a challenge for residents in testing because they want to visualize the colors and also because, when translated–the colors are less clear across languages.
We haven't groomed out what an image module might look like or the constraints for content entry, etc. | non_priority | mock up images on service pages we don t have an image gallery as part of any service pages yet the pick up free paint service is a challenge for residents in testing because they want to visualize the colors and also because when translated–the colors are less clear across languages we haven t groomed out what an image module might look like or the constraints for content entry etc | 0 |
94,134 | 10,797,958,728 | IssuesEvent | 2019-11-06 09:04:54 | piku/piku | https://api.github.com/repos/piku/piku | closed | Document Procfile | documentation | The Procfile documentation is spread out in various places. Would be good to bring it together into a single place like the ENV file. | 1.0 | Document Procfile - The Procfile documentation is spread out in various places. Would be good to bring it together into a single place like the ENV file. | non_priority | document procfile the procfile documentation is spread out in various places would be good to bring it together into a single place like the env file | 0 |
319,930 | 9,762,215,067 | IssuesEvent | 2019-06-05 10:43:51 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.bbc.com - design is broken | browser-fenix engine-gecko priority-critical | <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 6.0.1; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://www.bbc.com/reel/video/p07c6sb6/the-downsides-of-positive-thinking
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android 6.0.1
**Tested Another Browser**: Unknown
**Problem type**: Design is broken
**Description**: full screen video doesnt work properly
**Steps to Reproduce**:
Clicked full screen
Entered in full sccreen mode
A dialogue box came in bottom as 'entered in fullscreen mode'
Dialogue box disappeared
But video is showing in half.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | www.bbc.com - design is broken - <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 6.0.1; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://www.bbc.com/reel/video/p07c6sb6/the-downsides-of-positive-thinking
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android 6.0.1
**Tested Another Browser**: Unknown
**Problem type**: Design is broken
**Description**: full screen video doesnt work properly
**Steps to Reproduce**:
Clicked full screen
Entered in full sccreen mode
A dialogue box came in bottom as 'entered in fullscreen mode'
Dialogue box disappeared
But video is showing in half.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | priority | design is broken url browser version firefox mobile operating system android tested another browser unknown problem type design is broken description full screen video doesnt work properly steps to reproduce clicked full screen entered in full sccreen mode a dialogue box came in bottom as entered in fullscreen mode dialogue box disappeared but video is showing in half browser configuration none from with ❤️ | 1 |
239,622 | 19,904,679,460 | IssuesEvent | 2022-01-25 11:31:16 | status-im/status-react | https://api.github.com/repos/status-im/status-react | opened | Parallel e2e based on amount of sessions for each test | tests | # Bug Report
## Problem
Currently several e2e each test run failed with ERROR: concurrency limit, because runner doesn't know how many tests it should run based on the amount of sessions (can be 1,2,3).
In fact we have 16 parallel sessions and we shouldn't increase this limit.
#### Expected behavior
No more

#### Actual behavior
4-5 errors in each nightly run
### Reproduction
1) Run nightly set of e2e
| 1.0 | Parallel e2e based on amount of sessions for each test - # Bug Report
## Problem
Currently several e2e each test run failed with ERROR: concurrency limit, because runner doesn't know how many tests it should run based on the amount of sessions (can be 1,2,3).
In fact we have 16 parallel sessions and we shouldn't increase this limit.
#### Expected behavior
No more

#### Actual behavior
4-5 errors in each nightly run
### Reproduction
1) Run nightly set of e2e
| non_priority | parallel based on amount of sessions for each test bug report problem currently several each test run failed with error concurrency limit because runner doesn t know how many tests it should run based on the amount of sessions can be in fact we have parallel sessions and we shouldn t increase this limit expected behavior no more actual behavior errors in each nightly run reproduction run nightly set of | 0 |
464,769 | 13,339,548,283 | IssuesEvent | 2020-08-28 13:04:36 | presscustomizr/customizr | https://api.github.com/repos/presscustomizr/customizr | opened | [search icon] when displayed on the left in the main header, search field is partially hidden when revealed | [Priority:urgent] bug | https://secure.helpscout.net/conversation/1248600655/222664?folderId=607547 | 1.0 | [search icon] when displayed on the left in the main header, search field is partially hidden when revealed - https://secure.helpscout.net/conversation/1248600655/222664?folderId=607547 | priority | when displayed on the left in the main header search field is partially hidden when revealed | 1 |
213,444 | 7,253,883,705 | IssuesEvent | 2018-02-16 08:37:41 | quantopian/pyfolio | https://api.github.com/repos/quantopian/pyfolio | closed | Update package on quantopian channel for anaconda | help wanted high priority | The package is still on version 0.5.1, which forces the use of pip in anaconda.
Please consider updating as for zipline, thank you.
AN | 1.0 | Update package on quantopian channel for anaconda - The package is still on version 0.5.1, which forces the use of pip in anaconda.
Please consider updating as for zipline, thank you.
AN | priority | update package on quantopian channel for anaconda the package is still on version which forces the use of pip in anaconda please consider updating as for zipline thank you an | 1 |
120,276 | 4,787,579,227 | IssuesEvent | 2016-10-30 03:05:55 | JKGDevs/JediKnightGalaxies | https://api.github.com/repos/JKGDevs/JediKnightGalaxies | closed | Server browser shows non-JKG servers with JKG-only filter on | bug priority:medium | Happening as of latest commit. Tried reverting 1e0fff7 but found the issue persists even after cycling game modes. This occurs in the FFA game mode only, as far as I can tell. Switching to Faction Battle shows the JKG dev server.
| 1.0 | Server browser shows non-JKG servers with JKG-only filter on - Happening as of latest commit. Tried reverting 1e0fff7 but found the issue persists even after cycling game modes. This occurs in the FFA game mode only, as far as I can tell. Switching to Faction Battle shows the JKG dev server.
| priority | server browser shows non jkg servers with jkg only filter on happening as of latest commit tried reverting but found the issue persists even after cycling game modes this occurs in the ffa game mode only as far as i can tell switching to faction battle shows the jkg dev server | 1 |
498,825 | 14,434,312,526 | IssuesEvent | 2020-12-07 06:50:22 | ityonemo/zigler | https://api.github.com/repos/ityonemo/zigler | closed | address phantom segfaults in yielding mode | bug help wanted high priority | - [x] the segfaults that prevent cleaning up the yielding mode resources (there is a 1K resource leak each time you call a yielding nif)
- [x] segfault that can sometimes happen long after your yield completes. | 1.0 | address phantom segfaults in yielding mode - - [x] the segfaults that prevent cleaning up the yielding mode resources (there is a 1K resource leak each time you call a yielding nif)
- [x] segfault that can sometimes happen long after your yield completes. | priority | address phantom segfaults in yielding mode the segfaults that prevent cleaning up the yielding mode resources there is a resource leak each time you call a yielding nif segfault that can sometimes happen long after your yield completes | 1 |
675,382 | 23,092,747,904 | IssuesEvent | 2022-07-26 16:30:59 | googleapis/doc-pipeline | https://api.github.com/repos/googleapis/doc-pipeline | closed | generate: docfx-python-redis-1.0.1.tar.gz failed | type: bug priority: p1 flakybot: issue | This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: 48f1842f3b0d9af10dc09c10d8864233056129c1
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/3e2e3f1a-a872-4731-9ea0-788c88cc25f8), [Sponge](http://sponge2/3e2e3f1a-a872-4731-9ea0-788c88cc25f8)
status: failed | 1.0 | generate: docfx-python-redis-1.0.1.tar.gz failed - This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: 48f1842f3b0d9af10dc09c10d8864233056129c1
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/3e2e3f1a-a872-4731-9ea0-788c88cc25f8), [Sponge](http://sponge2/3e2e3f1a-a872-4731-9ea0-788c88cc25f8)
status: failed | priority | generate docfx python redis tar gz failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed | 1 |
9,878 | 11,889,535,309 | IssuesEvent | 2020-03-28 14:20:17 | dreamer/dosbox-staging | https://api.github.com/repos/dreamer/dosbox-staging | closed | Albion crash | game compatibility | * Description
Game will crash right after the intro/before showing the main menu.
* To Reproduce
Launch Albion (ALBILOW.BAT). I'm using a cue/cd version which is mounted prior launching the game. Watch or pass the intro... game will crash exactly at that point.
NOTE: with the current Dosbox SVN (default in Retropie) the crash does not occur.
* Environment:
Raspbian Jessie (the one shipped with Retropie+all packages up-to-date)
Retropie Version 4.5.18 (latest)
Pi3B+
SDL2 2.0.10 (no dispmanx)
Self compiled Dosbox-staging:
```
$ git describe
v0.75.0-pre-706-gdbc77a6f
```
* Dosbox config
```
fullscreen = true
vsync = false
fullresolution = desktop
windowresolution = desktop
output = texture
texture_renderer = auto
capture_mouse = seamless middlerelease
sensitivity = 100
waitonerror = true
priority = higher,normal
mapperfile = mapper-SVN.map
language =
machine = svga_s3
captures = capture
memsize = 32
frameskip = 0
aspect = true
scaler = none
core = dynamic
cputype = auto
cycles = max
cycleup = 10
cycledown = 20
[...]
sbtype = sb16
sbbase = 220
irq = 7
dma = 1
hdma = 5
sbmixer = true
oplmode = auto
oplemu = default
oplrate = 44100
[...]
gus = true
gusrate = 44100
gusbase = 240
gusirq = 5
gusdma = 3
ultradir = U:\ULTRASND
[...]
xms = true
ems = true
umb = true
keyboardlayout = auto
```
| True | Albion crash - * Description
Game will crash right after the intro/before showing the main menu.
* To Reproduce
Launch Albion (ALBILOW.BAT). I'm using a cue/cd version which is mounted prior launching the game. Watch or pass the intro... game will crash exactly at that point.
NOTE: with the current Dosbox SVN (default in Retropie) the crash does not occur.
* Environment:
Raspbian Jessie (the one shipped with Retropie+all packages up-to-date)
Retropie Version 4.5.18 (latest)
Pi3B+
SDL2 2.0.10 (no dispmanx)
Self compiled Dosbox-staging:
```
$ git describe
v0.75.0-pre-706-gdbc77a6f
```
* Dosbox config
```
fullscreen = true
vsync = false
fullresolution = desktop
windowresolution = desktop
output = texture
texture_renderer = auto
capture_mouse = seamless middlerelease
sensitivity = 100
waitonerror = true
priority = higher,normal
mapperfile = mapper-SVN.map
language =
machine = svga_s3
captures = capture
memsize = 32
frameskip = 0
aspect = true
scaler = none
core = dynamic
cputype = auto
cycles = max
cycleup = 10
cycledown = 20
[...]
sbtype = sb16
sbbase = 220
irq = 7
dma = 1
hdma = 5
sbmixer = true
oplmode = auto
oplemu = default
oplrate = 44100
[...]
gus = true
gusrate = 44100
gusbase = 240
gusirq = 5
gusdma = 3
ultradir = U:\ULTRASND
[...]
xms = true
ems = true
umb = true
keyboardlayout = auto
```
| non_priority | albion crash description game will crash right after the intro before showing the main menu to reproduce launch albion albilow bat i m using a cue cd version which is mounted prior launching the game watch or pass the intro game will crash exactly at that point note with the current dosbox svn default in retropie the crash does not occur environment raspbian jessie the one shipped with retropie all packages up to date retropie version latest no dispmanx self compiled dosbox staging git describe pre dosbox config fullscreen true vsync false fullresolution desktop windowresolution desktop output texture texture renderer auto capture mouse seamless middlerelease sensitivity waitonerror true priority higher normal mapperfile mapper svn map language machine svga captures capture memsize frameskip aspect true scaler none core dynamic cputype auto cycles max cycleup cycledown sbtype sbbase irq dma hdma sbmixer true oplmode auto oplemu default oplrate gus true gusrate gusbase gusirq gusdma ultradir u ultrasnd xms true ems true umb true keyboardlayout auto | 0 |
19,624 | 2,622,156,513 | IssuesEvent | 2015-03-04 00:08:19 | byzhang/terrastore | https://api.github.com/repos/byzhang/terrastore | closed | Algebraic sum update function | auto-migrated Milestone-0.6.0 Priority-Medium Project-Terrastore Type-Feature | ```
Update Function for modifying integer values by addition or subtraction
```
Original issue reported on code.google.com by `johansso...@gmail.com` on 18 Jul 2010 at 6:06
* Blocking: #18 | 1.0 | Algebraic sum update function - ```
Update Function for modifying integer values by addition or subtraction
```
Original issue reported on code.google.com by `johansso...@gmail.com` on 18 Jul 2010 at 6:06
* Blocking: #18 | priority | algebraic sum update function update function for modifying integer values by addition or subtraction original issue reported on code google com by johansso gmail com on jul at blocking | 1 |
311,133 | 23,372,415,931 | IssuesEvent | 2022-08-10 21:15:52 | SatelCreative/spylib | https://api.github.com/repos/SatelCreative/spylib | closed | The Document Version seems off | Type: Documentation | The document versioning has been deployed: https://satelcreative.github.io/spylib
**1.** It has the option to switch between versions 0.7.0 and 0.6.0 at the moment. Should we see more versions?
**2.** Some content don't match with the version's actual content.
For example, [0.6.0](https://github.com/SatelCreative/spylib/tree/0.6.0/spylib) doesn't have Multipass but it shows in the document. It seems to just display the content from the latest version.

**3.** Some content do match.. which is good. Then how did 2 happen?
For example, the development-contributing page:


Can you please take a look? @ponty33 Thanks!
| 1.0 | The Document Version seems off - The document versioning has been deployed: https://satelcreative.github.io/spylib
**1.** It has the option to switch between versions 0.7.0 and 0.6.0 at the moment. Should we see more versions?
**2.** Some content don't match with the version's actual content.
For example, [0.6.0](https://github.com/SatelCreative/spylib/tree/0.6.0/spylib) doesn't have Multipass but it shows in the document. It seems to just display the content from the latest version.

**3.** Some content do match.. which is good. Then how did 2 happen?
For example, the development-contributing page:


Can you please take a look? @ponty33 Thanks!
| non_priority | the document version seems off the document versioning has been deployed it has the option to switch between versions and at the moment should we see more versions some content don t match with the version s actual content for example doesn t have multipass but it shows in the document it seems to just display the content from the latest version some content do match which is good then how did happen for example the development contributing page can you please take a look thanks | 0 |
132,432 | 28,142,031,805 | IssuesEvent | 2023-04-02 03:01:31 | dtcxzyw/llvm-ci | https://api.github.com/repos/dtcxzyw/llvm-ci | closed | Regressions Report [rv64gc-O3-thinlto] March 27th 2023, 7:10:45 pm | regression codegen | ## Metadata
+ Workflow URL: https://github.com/dtcxzyw/llvm-ci/actions/runs/4535454894
## Change Logs
from 1d1b3c49531bb80bcd28870d4eafb71d97049e02 to fd059ea7ec044198fd75bb2b3aa30734bcace33e
[fd059ea7ec044198fd75bb2b3aa30734bcace33e](https://github.com/llvm/llvm-project/commit/fd059ea7ec044198fd75bb2b3aa30734bcace33e) [libc] Simplify enabling the GPU build for libc
[a0bf6400d1987e6e0a229de2f5e02d8cfa1d2fbf](https://github.com/llvm/llvm-project/commit/a0bf6400d1987e6e0a229de2f5e02d8cfa1d2fbf) [test] Avoid legacy -target and move 2>&1 to conventional location
[1edde1c1f80347e2560dda340697ff1c2c05a424](https://github.com/llvm/llvm-project/commit/1edde1c1f80347e2560dda340697ff1c2c05a424) Recommit "[RISCV] Relax opcode restriction for .insn."
[923230d45eb5cb0278e5b198c4f840bfaac50abc](https://github.com/llvm/llvm-project/commit/923230d45eb5cb0278e5b198c4f840bfaac50abc) [mlir] Add missing cast functions to mlir namespace
[a85b37d0ca819776c6034c2dbda2b21e54e3393a](https://github.com/llvm/llvm-project/commit/a85b37d0ca819776c6034c2dbda2b21e54e3393a) [M68k] Add support for lowering ATOMIC_SWAP
[39b64ad6dbc413a0e45cd92089c43efc9dc9c49b](https://github.com/llvm/llvm-project/commit/39b64ad6dbc413a0e45cd92089c43efc9dc9c49b) Revert "foo"
[ca70ceeb0f2c2362b37512a81a17d59e17b5fb26](https://github.com/llvm/llvm-project/commit/ca70ceeb0f2c2362b37512a81a17d59e17b5fb26) Revert "[RISCV] Relax opcode restriction for .insn."
[3f8fe5220ac28bc74101e408465655d54d81e574](https://github.com/llvm/llvm-project/commit/3f8fe5220ac28bc74101e408465655d54d81e574) Revert "[RISCV] Add .insn support for compressed formats."
[ec864a537160288a9cf7aea965cf33b0851d6d55](https://github.com/llvm/llvm-project/commit/ec864a537160288a9cf7aea965cf33b0851d6d55) [AArch64][PeepholeOpt]Optimize ALU + compare to flag-setting ALU
[a5ce2da0545bd19d158e1c7e80474d9ddaf5df66](https://github.com/llvm/llvm-project/commit/a5ce2da0545bd19d158e1c7e80474d9ddaf5df66) [NFC]Pre-commit test case
[43290c95631a54c9a02b914d9f87dbc5e7c1375b](https://github.com/llvm/llvm-project/commit/43290c95631a54c9a02b914d9f87dbc5e7c1375b) [SCCIterator] Fix an issue in scc_member_iterator sorting
[5e2445ae65f0a8f1ac38049bdd2f0fd5572be488](https://github.com/llvm/llvm-project/commit/5e2445ae65f0a8f1ac38049bdd2f0fd5572be488) [RISCV] Add .insn support for compressed formats.
[5c5fe3afff12b41d34477977c07c71337fa4ba9d](https://github.com/llvm/llvm-project/commit/5c5fe3afff12b41d34477977c07c71337fa4ba9d) [RISCV] Relax opcode restriction for .insn.
[4fde20b8a62ed3d850e4e770ae640039ca1a9ed8](https://github.com/llvm/llvm-project/commit/4fde20b8a62ed3d850e4e770ae640039ca1a9ed8) foo
[c9e4d9a8ea46e6106d248bdc99d8a07ae3ba5dc2](https://github.com/llvm/llvm-project/commit/c9e4d9a8ea46e6106d248bdc99d8a07ae3ba5dc2) [LegalizeTypes][TargetLowering][RISCV] Fix regressions from D146786.
[697a28b380753c754a534ab92b376357a3839e3f](https://github.com/llvm/llvm-project/commit/697a28b380753c754a534ab92b376357a3839e3f) [CodeGenPrepare][RISCV] Correct the MathUsed flag for shouldFormOverflowOp
[9b957b12cc12dd4fbe4014dae9ed2564da1b6d74](https://github.com/llvm/llvm-project/commit/9b957b12cc12dd4fbe4014dae9ed2564da1b6d74) [X86] select-constant-lea.ll - cleanup test name. NFC.
[984b46e6cc2ad9291959827b99913deac90d698e](https://github.com/llvm/llvm-project/commit/984b46e6cc2ad9291959827b99913deac90d698e) [SLP] Add test to check for GEP vectorization
[0f4c9c016caf52dc45934e0cbf82b1daabcf1d96](https://github.com/llvm/llvm-project/commit/0f4c9c016caf52dc45934e0cbf82b1daabcf1d96) [RISCV] Replace RISCV->RISC-V in strings.
[29463612d21b7d630476fcecdc8301ddf5634bf7](https://github.com/llvm/llvm-project/commit/29463612d21b7d630476fcecdc8301ddf5634bf7) [RISCV] Replace RISCV -> RISC-V in comments. NFC
[edc1c8d290efb998a99a08de025d1c63f834c605](https://github.com/llvm/llvm-project/commit/edc1c8d290efb998a99a08de025d1c63f834c605) [X86] Regenerate avx2-vector-shifts.ll check prefixes
[f0fc8c4878ed3ed60bd7536f97ef2673eb691ae7](https://github.com/llvm/llvm-project/commit/f0fc8c4878ed3ed60bd7536f97ef2673eb691ae7) [libc++] Use named Lit features to flag back-deployment XFAILs
[9ea912fe978df3057a74542d9e22d871e2b899dd](https://github.com/llvm/llvm-project/commit/9ea912fe978df3057a74542d9e22d871e2b899dd) [diagtool] explain that yellow is used to denote disabled-by-default warnings
[b530e1af62be16ffb06285ddca27a413f5089b7e](https://github.com/llvm/llvm-project/commit/b530e1af62be16ffb06285ddca27a413f5089b7e) [LinkerWrapper] Do not extract globals with no offloading language
[e62836e31fb926ff41f91a7597d674a8c76276bc](https://github.com/llvm/llvm-project/commit/e62836e31fb926ff41f91a7597d674a8c76276bc) [X86] Regenerate avx2-shift.ll check prefixes
[e238b0e4ec67c0a541278bab74891c51a9715e37](https://github.com/llvm/llvm-project/commit/e238b0e4ec67c0a541278bab74891c51a9715e37) [gn build] Port ea35740e7e18
[d0dd151eed4bb9a6ea209790e2727c0a007f699a](https://github.com/llvm/llvm-project/commit/d0dd151eed4bb9a6ea209790e2727c0a007f699a) Address code review feedback
[21750a1ae8c86ffefc72f115116c80a98a0792dc](https://github.com/llvm/llvm-project/commit/21750a1ae8c86ffefc72f115116c80a98a0792dc) [clang][ExtractAPI] Refactor ExtractAPIVisitor to make it more extensible
[ea35740e7e189cdcdd88344ac60a53a5b8a8318d](https://github.com/llvm/llvm-project/commit/ea35740e7e189cdcdd88344ac60a53a5b8a8318d) [clang][ExtractAPI] Refactor ExtractAPIVisitor to make it more extensible
[0ceb7a12dbfd2035959d3791b96c923c0e1e89fc](https://github.com/llvm/llvm-project/commit/0ceb7a12dbfd2035959d3791b96c923c0e1e89fc) [mlir] Implement pass utils for 1:N type conversions.
[258b5424edcf72063561ef7bb2ba6e5fbf24181a](https://github.com/llvm/llvm-project/commit/258b5424edcf72063561ef7bb2ba6e5fbf24181a) [X86] Teach computeKnownBitsForTargetNode about MUL_IMM
[1a35893d2a58fdead33ec7daa9f1fe53f4787614](https://github.com/llvm/llvm-project/commit/1a35893d2a58fdead33ec7daa9f1fe53f4787614) [clang][ASTImporter] Import typedefs to distinct records as distinct nodes.
[0f76fb90f855486dd2ba255c4c8afb8f7e957c69](https://github.com/llvm/llvm-project/commit/0f76fb90f855486dd2ba255c4c8afb8f7e957c69) [X86] Move combineVectorSizedSetCCEquality above MatchVectorAllZeroTest. NFC.
[da92f2fb33c4e5fc570a51b0615e3d30a5b0bf8f](https://github.com/llvm/llvm-project/commit/da92f2fb33c4e5fc570a51b0615e3d30a5b0bf8f) [AIX][Driver] Implement -mxcoff-build-id option
[88383f18f3a693f9ea02733c680a32961e038b1e](https://github.com/llvm/llvm-project/commit/88383f18f3a693f9ea02733c680a32961e038b1e) [llvm-exegesis] if lit can't find llvm-exegesis, fail gracefully
[5f34259609f604bfcd5cbf324a32d265e6a5d347](https://github.com/llvm/llvm-project/commit/5f34259609f604bfcd5cbf324a32d265e6a5d347) [mlir] FuncToLLVM: fail gracefully in bare pointer multi-result covnersion
[95abf86060ec7de63f59290e5fb2902839293938](https://github.com/llvm/llvm-project/commit/95abf86060ec7de63f59290e5fb2902839293938) [ADT] Work around MSVC bug affecting `get(enumerator_result)`
[481f88853685bcf604c79059e890553831588e8b](https://github.com/llvm/llvm-project/commit/481f88853685bcf604c79059e890553831588e8b) [clangd] Use expansion location for missing include diagnostics.
[cd7ab4b5c1684dcc60de027700177adfa096b98c](https://github.com/llvm/llvm-project/commit/cd7ab4b5c1684dcc60de027700177adfa096b98c) [clang-format] Improve QualifierAlignment
## Regressions (Size)
|Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Benchmarks/lzbench/lzbench|6428eb8802a0bae3d2dbbed45701118a|0832eb6f3724880a12d69bb8648d501f|3469064|3469436|1.000|
## Regressions (Time)
|Name|Baseline MD5|Current MD5|Baseline Time|Current Time|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Benchmarks/lzbench/lzbench|6428eb8802a0bae3d2dbbed45701118a|0832eb6f3724880a12d69bb8648d501f|484.225463788|484.65916411|1.001|
|MultiSource/Applications/ClamAV/clamscan|33dab41302b6e47323d16ccdd01ba9c4|e807acfc8be2ab6dfa3c15c234eea518|0.45960558|0.459607166|1.000|
## Differences (Size)
|Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Benchmarks/lzbench/lzbench|6428eb8802a0bae3d2dbbed45701118a|0832eb6f3724880a12d69bb8648d501f|3469064|3469436|1.000|
|MultiSource/Benchmarks/MiBench/consumer-jpeg/consumer-jpeg|e7534681514b18807ad154fec3c5cec5|bcaacc4f3819f0352944a4907b2ca2c8|96356|96360|1.000|
|MultiSource/Applications/JM/ldecod/ldecod|2fa25ac3396b8c55c5d25d16be73824d|ac87b4b22bf536c7ac2ed119c2ab4bf9|329882|329894|1.000|
|MultiSource/Applications/lua/lua|cb6c4522dc2b2973d2bae1a910ac8edc|9450a3b4691cbc507bf53b5055160dbb|264862|264870|1.000|
|MultiSource/Applications/ClamAV/clamscan|33dab41302b6e47323d16ccdd01ba9c4|e807acfc8be2ab6dfa3c15c234eea518|570318|570326|1.000|
|SingleSource/Benchmarks/Stanford/Queens|86cd1dcbf5e8c2251820eb4bbe144f4f|df600ecdcae26f5e75202be7f5a83a95|1050|1050|1.000|
|MultiSource/Applications/JM/lencod/lencod|37abf75257240ab9a305a42f604e9829|5403d1c5d221b53859b266e8306d2d04|832458|832454|1.000|
|SingleSource/Benchmarks/Linpack/linpack-pc|e0e9c52fadd43a233fe58f240213ec85|a51d67b916c347da1a2c92ace72f2c2e|19064|19060|1.000|
|GeoMeans|N/A|N/A|308233.898|308234.545|1.000|
## Differences (Time)
|Name|Baseline MD5|Current MD5|Baseline Time|Current Time|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Benchmarks/lzbench/lzbench|6428eb8802a0bae3d2dbbed45701118a|0832eb6f3724880a12d69bb8648d501f|484.225463788|484.65916411|1.001|
|MultiSource/Applications/ClamAV/clamscan|33dab41302b6e47323d16ccdd01ba9c4|e807acfc8be2ab6dfa3c15c234eea518|0.45960558|0.459607166|1.000|
|MultiSource/Benchmarks/MiBench/consumer-jpeg/consumer-jpeg|e7534681514b18807ad154fec3c5cec5|bcaacc4f3819f0352944a4907b2ca2c8|0.021922452|0.021922452|1.000|
|SingleSource/Benchmarks/Stanford/Queens|86cd1dcbf5e8c2251820eb4bbe144f4f|df600ecdcae26f5e75202be7f5a83a95|0.095350266|0.095350266|1.000|
|SingleSource/Benchmarks/Linpack/linpack-pc|e0e9c52fadd43a233fe58f240213ec85|a51d67b916c347da1a2c92ace72f2c2e|24.216221976|24.216221974|1.000|
|MultiSource/Applications/JM/lencod/lencod|37abf75257240ab9a305a42f604e9829|5403d1c5d221b53859b266e8306d2d04|38.307271999|38.306796485|1.000|
|MultiSource/Applications/lua/lua|cb6c4522dc2b2973d2bae1a910ac8edc|9450a3b4691cbc507bf53b5055160dbb|120.566217054|120.562367284|1.000|
|MultiSource/Applications/JM/ldecod/ldecod|2fa25ac3396b8c55c5d25d16be73824d|ac87b4b22bf536c7ac2ed119c2ab4bf9|0.22091339|0.220857836|1.000|
|GeoMeans|N/A|N/A|13.286|13.287|1.000|
| 1.0 | Regressions Report [rv64gc-O3-thinlto] March 27th 2023, 7:10:45 pm - ## Metadata
+ Workflow URL: https://github.com/dtcxzyw/llvm-ci/actions/runs/4535454894
## Change Logs
from 1d1b3c49531bb80bcd28870d4eafb71d97049e02 to fd059ea7ec044198fd75bb2b3aa30734bcace33e
[fd059ea7ec044198fd75bb2b3aa30734bcace33e](https://github.com/llvm/llvm-project/commit/fd059ea7ec044198fd75bb2b3aa30734bcace33e) [libc] Simplify enabling the GPU build for libc
[a0bf6400d1987e6e0a229de2f5e02d8cfa1d2fbf](https://github.com/llvm/llvm-project/commit/a0bf6400d1987e6e0a229de2f5e02d8cfa1d2fbf) [test] Avoid legacy -target and move 2>&1 to conventional location
[1edde1c1f80347e2560dda340697ff1c2c05a424](https://github.com/llvm/llvm-project/commit/1edde1c1f80347e2560dda340697ff1c2c05a424) Recommit "[RISCV] Relax opcode restriction for .insn."
[923230d45eb5cb0278e5b198c4f840bfaac50abc](https://github.com/llvm/llvm-project/commit/923230d45eb5cb0278e5b198c4f840bfaac50abc) [mlir] Add missing cast functions to mlir namespace
[a85b37d0ca819776c6034c2dbda2b21e54e3393a](https://github.com/llvm/llvm-project/commit/a85b37d0ca819776c6034c2dbda2b21e54e3393a) [M68k] Add support for lowering ATOMIC_SWAP
[39b64ad6dbc413a0e45cd92089c43efc9dc9c49b](https://github.com/llvm/llvm-project/commit/39b64ad6dbc413a0e45cd92089c43efc9dc9c49b) Revert "foo"
[ca70ceeb0f2c2362b37512a81a17d59e17b5fb26](https://github.com/llvm/llvm-project/commit/ca70ceeb0f2c2362b37512a81a17d59e17b5fb26) Revert "[RISCV] Relax opcode restriction for .insn."
[3f8fe5220ac28bc74101e408465655d54d81e574](https://github.com/llvm/llvm-project/commit/3f8fe5220ac28bc74101e408465655d54d81e574) Revert "[RISCV] Add .insn support for compressed formats."
[ec864a537160288a9cf7aea965cf33b0851d6d55](https://github.com/llvm/llvm-project/commit/ec864a537160288a9cf7aea965cf33b0851d6d55) [AArch64][PeepholeOpt]Optimize ALU + compare to flag-setting ALU
[a5ce2da0545bd19d158e1c7e80474d9ddaf5df66](https://github.com/llvm/llvm-project/commit/a5ce2da0545bd19d158e1c7e80474d9ddaf5df66) [NFC]Pre-commit test case
[43290c95631a54c9a02b914d9f87dbc5e7c1375b](https://github.com/llvm/llvm-project/commit/43290c95631a54c9a02b914d9f87dbc5e7c1375b) [SCCIterator] Fix an issue in scc_member_iterator sorting
[5e2445ae65f0a8f1ac38049bdd2f0fd5572be488](https://github.com/llvm/llvm-project/commit/5e2445ae65f0a8f1ac38049bdd2f0fd5572be488) [RISCV] Add .insn support for compressed formats.
[5c5fe3afff12b41d34477977c07c71337fa4ba9d](https://github.com/llvm/llvm-project/commit/5c5fe3afff12b41d34477977c07c71337fa4ba9d) [RISCV] Relax opcode restriction for .insn.
[4fde20b8a62ed3d850e4e770ae640039ca1a9ed8](https://github.com/llvm/llvm-project/commit/4fde20b8a62ed3d850e4e770ae640039ca1a9ed8) foo
[c9e4d9a8ea46e6106d248bdc99d8a07ae3ba5dc2](https://github.com/llvm/llvm-project/commit/c9e4d9a8ea46e6106d248bdc99d8a07ae3ba5dc2) [LegalizeTypes][TargetLowering][RISCV] Fix regressions from D146786.
[697a28b380753c754a534ab92b376357a3839e3f](https://github.com/llvm/llvm-project/commit/697a28b380753c754a534ab92b376357a3839e3f) [CodeGenPrepare][RISCV] Correct the MathUsed flag for shouldFormOverflowOp
[9b957b12cc12dd4fbe4014dae9ed2564da1b6d74](https://github.com/llvm/llvm-project/commit/9b957b12cc12dd4fbe4014dae9ed2564da1b6d74) [X86] select-constant-lea.ll - cleanup test name. NFC.
[984b46e6cc2ad9291959827b99913deac90d698e](https://github.com/llvm/llvm-project/commit/984b46e6cc2ad9291959827b99913deac90d698e) [SLP] Add test to check for GEP vectorization
[0f4c9c016caf52dc45934e0cbf82b1daabcf1d96](https://github.com/llvm/llvm-project/commit/0f4c9c016caf52dc45934e0cbf82b1daabcf1d96) [RISCV] Replace RISCV->RISC-V in strings.
[29463612d21b7d630476fcecdc8301ddf5634bf7](https://github.com/llvm/llvm-project/commit/29463612d21b7d630476fcecdc8301ddf5634bf7) [RISCV] Replace RISCV -> RISC-V in comments. NFC
[edc1c8d290efb998a99a08de025d1c63f834c605](https://github.com/llvm/llvm-project/commit/edc1c8d290efb998a99a08de025d1c63f834c605) [X86] Regenerate avx2-vector-shifts.ll check prefixes
[f0fc8c4878ed3ed60bd7536f97ef2673eb691ae7](https://github.com/llvm/llvm-project/commit/f0fc8c4878ed3ed60bd7536f97ef2673eb691ae7) [libc++] Use named Lit features to flag back-deployment XFAILs
[9ea912fe978df3057a74542d9e22d871e2b899dd](https://github.com/llvm/llvm-project/commit/9ea912fe978df3057a74542d9e22d871e2b899dd) [diagtool] explain that yellow is used to denote disabled-by-default warnings
[b530e1af62be16ffb06285ddca27a413f5089b7e](https://github.com/llvm/llvm-project/commit/b530e1af62be16ffb06285ddca27a413f5089b7e) [LinkerWrapper] Do not extract globals with no offloading language
[e62836e31fb926ff41f91a7597d674a8c76276bc](https://github.com/llvm/llvm-project/commit/e62836e31fb926ff41f91a7597d674a8c76276bc) [X86] Regenerate avx2-shift.ll check prefixes
[e238b0e4ec67c0a541278bab74891c51a9715e37](https://github.com/llvm/llvm-project/commit/e238b0e4ec67c0a541278bab74891c51a9715e37) [gn build] Port ea35740e7e18
[d0dd151eed4bb9a6ea209790e2727c0a007f699a](https://github.com/llvm/llvm-project/commit/d0dd151eed4bb9a6ea209790e2727c0a007f699a) Address code review feedback
[21750a1ae8c86ffefc72f115116c80a98a0792dc](https://github.com/llvm/llvm-project/commit/21750a1ae8c86ffefc72f115116c80a98a0792dc) [clang][ExtractAPI] Refactor ExtractAPIVisitor to make it more extensible
[ea35740e7e189cdcdd88344ac60a53a5b8a8318d](https://github.com/llvm/llvm-project/commit/ea35740e7e189cdcdd88344ac60a53a5b8a8318d) [clang][ExtractAPI] Refactor ExtractAPIVisitor to make it more extensible
[0ceb7a12dbfd2035959d3791b96c923c0e1e89fc](https://github.com/llvm/llvm-project/commit/0ceb7a12dbfd2035959d3791b96c923c0e1e89fc) [mlir] Implement pass utils for 1:N type conversions.
[258b5424edcf72063561ef7bb2ba6e5fbf24181a](https://github.com/llvm/llvm-project/commit/258b5424edcf72063561ef7bb2ba6e5fbf24181a) [X86] Teach computeKnownBitsForTargetNode about MUL_IMM
[1a35893d2a58fdead33ec7daa9f1fe53f4787614](https://github.com/llvm/llvm-project/commit/1a35893d2a58fdead33ec7daa9f1fe53f4787614) [clang][ASTImporter] Import typedefs to distinct records as distinct nodes.
[0f76fb90f855486dd2ba255c4c8afb8f7e957c69](https://github.com/llvm/llvm-project/commit/0f76fb90f855486dd2ba255c4c8afb8f7e957c69) [X86] Move combineVectorSizedSetCCEquality above MatchVectorAllZeroTest. NFC.
[da92f2fb33c4e5fc570a51b0615e3d30a5b0bf8f](https://github.com/llvm/llvm-project/commit/da92f2fb33c4e5fc570a51b0615e3d30a5b0bf8f) [AIX][Driver] Implement -mxcoff-build-id option
[88383f18f3a693f9ea02733c680a32961e038b1e](https://github.com/llvm/llvm-project/commit/88383f18f3a693f9ea02733c680a32961e038b1e) [llvm-exegesis] if lit can't find llvm-exegesis, fail gracefully
[5f34259609f604bfcd5cbf324a32d265e6a5d347](https://github.com/llvm/llvm-project/commit/5f34259609f604bfcd5cbf324a32d265e6a5d347) [mlir] FuncToLLVM: fail gracefully in bare pointer multi-result covnersion
[95abf86060ec7de63f59290e5fb2902839293938](https://github.com/llvm/llvm-project/commit/95abf86060ec7de63f59290e5fb2902839293938) [ADT] Work around MSVC bug affecting `get(enumerator_result)`
[481f88853685bcf604c79059e890553831588e8b](https://github.com/llvm/llvm-project/commit/481f88853685bcf604c79059e890553831588e8b) [clangd] Use expansion location for missing include diagnostics.
[cd7ab4b5c1684dcc60de027700177adfa096b98c](https://github.com/llvm/llvm-project/commit/cd7ab4b5c1684dcc60de027700177adfa096b98c) [clang-format] Improve QualifierAlignment
## Regressions (Size)
|Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Benchmarks/lzbench/lzbench|6428eb8802a0bae3d2dbbed45701118a|0832eb6f3724880a12d69bb8648d501f|3469064|3469436|1.000|
## Regressions (Time)
|Name|Baseline MD5|Current MD5|Baseline Time|Current Time|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Benchmarks/lzbench/lzbench|6428eb8802a0bae3d2dbbed45701118a|0832eb6f3724880a12d69bb8648d501f|484.225463788|484.65916411|1.001|
|MultiSource/Applications/ClamAV/clamscan|33dab41302b6e47323d16ccdd01ba9c4|e807acfc8be2ab6dfa3c15c234eea518|0.45960558|0.459607166|1.000|
## Differences (Size)
|Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Benchmarks/lzbench/lzbench|6428eb8802a0bae3d2dbbed45701118a|0832eb6f3724880a12d69bb8648d501f|3469064|3469436|1.000|
|MultiSource/Benchmarks/MiBench/consumer-jpeg/consumer-jpeg|e7534681514b18807ad154fec3c5cec5|bcaacc4f3819f0352944a4907b2ca2c8|96356|96360|1.000|
|MultiSource/Applications/JM/ldecod/ldecod|2fa25ac3396b8c55c5d25d16be73824d|ac87b4b22bf536c7ac2ed119c2ab4bf9|329882|329894|1.000|
|MultiSource/Applications/lua/lua|cb6c4522dc2b2973d2bae1a910ac8edc|9450a3b4691cbc507bf53b5055160dbb|264862|264870|1.000|
|MultiSource/Applications/ClamAV/clamscan|33dab41302b6e47323d16ccdd01ba9c4|e807acfc8be2ab6dfa3c15c234eea518|570318|570326|1.000|
|SingleSource/Benchmarks/Stanford/Queens|86cd1dcbf5e8c2251820eb4bbe144f4f|df600ecdcae26f5e75202be7f5a83a95|1050|1050|1.000|
|MultiSource/Applications/JM/lencod/lencod|37abf75257240ab9a305a42f604e9829|5403d1c5d221b53859b266e8306d2d04|832458|832454|1.000|
|SingleSource/Benchmarks/Linpack/linpack-pc|e0e9c52fadd43a233fe58f240213ec85|a51d67b916c347da1a2c92ace72f2c2e|19064|19060|1.000|
|GeoMeans|N/A|N/A|308233.898|308234.545|1.000|
## Differences (Time)
|Name|Baseline MD5|Current MD5|Baseline Time|Current Time|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Benchmarks/lzbench/lzbench|6428eb8802a0bae3d2dbbed45701118a|0832eb6f3724880a12d69bb8648d501f|484.225463788|484.65916411|1.001|
|MultiSource/Applications/ClamAV/clamscan|33dab41302b6e47323d16ccdd01ba9c4|e807acfc8be2ab6dfa3c15c234eea518|0.45960558|0.459607166|1.000|
|MultiSource/Benchmarks/MiBench/consumer-jpeg/consumer-jpeg|e7534681514b18807ad154fec3c5cec5|bcaacc4f3819f0352944a4907b2ca2c8|0.021922452|0.021922452|1.000|
|SingleSource/Benchmarks/Stanford/Queens|86cd1dcbf5e8c2251820eb4bbe144f4f|df600ecdcae26f5e75202be7f5a83a95|0.095350266|0.095350266|1.000|
|SingleSource/Benchmarks/Linpack/linpack-pc|e0e9c52fadd43a233fe58f240213ec85|a51d67b916c347da1a2c92ace72f2c2e|24.216221976|24.216221974|1.000|
|MultiSource/Applications/JM/lencod/lencod|37abf75257240ab9a305a42f604e9829|5403d1c5d221b53859b266e8306d2d04|38.307271999|38.306796485|1.000|
|MultiSource/Applications/lua/lua|cb6c4522dc2b2973d2bae1a910ac8edc|9450a3b4691cbc507bf53b5055160dbb|120.566217054|120.562367284|1.000|
|MultiSource/Applications/JM/ldecod/ldecod|2fa25ac3396b8c55c5d25d16be73824d|ac87b4b22bf536c7ac2ed119c2ab4bf9|0.22091339|0.220857836|1.000|
|GeoMeans|N/A|N/A|13.286|13.287|1.000|
| non_priority | regressions report march pm metadata workflow url change logs from to simplify enabling the gpu build for libc avoid legacy target and move gt amp to conventional location recommit quot relax opcode restriction for insn quot add missing cast functions to mlir namespace add support for lowering atomic swap revert quot foo quot revert quot relax opcode restriction for insn quot revert quot add insn support for compressed formats quot optimize alu compare to flag setting alu pre commit test case fix an issue in scc member iterator sorting add insn support for compressed formats relax opcode restriction for insn foo fix regressions from correct the mathused flag for shouldformoverflowop select constant lea ll cleanup test name nfc add test to check for gep vectorization replace riscv gt risc v in strings replace riscv gt risc v in comments nfc regenerate vector shifts ll check prefixes use named lit features to flag back deployment xfails explain that yellow is used to denote disabled by default warnings do not extract globals with no offloading language regenerate shift ll check prefixes port address code review feedback refactor extractapivisitor to make it more extensible refactor extractapivisitor to make it more extensible implement pass utils for n type conversions teach computeknownbitsfortargetnode about mul imm import typedefs to distinct records as distinct nodes move combinevectorsizedsetccequality above matchvectorallzerotest nfc implement mxcoff build id option if lit can t find llvm exegesis fail gracefully functollvm fail gracefully in bare pointer multi result covnersion work around msvc bug affecting get enumerator result use expansion location for missing include diagnostics improve qualifieralignment regressions size name baseline current baseline size current size ratio multisource benchmarks lzbench lzbench regressions time name baseline current baseline time current time ratio multisource benchmarks lzbench lzbench multisource applications clamav clamscan differences size name baseline current baseline size current size ratio multisource benchmarks lzbench lzbench multisource benchmarks mibench consumer jpeg consumer jpeg multisource applications jm ldecod ldecod multisource applications lua lua multisource applications clamav clamscan singlesource benchmarks stanford queens multisource applications jm lencod lencod singlesource benchmarks linpack linpack pc geomeans n a n a differences time name baseline current baseline time current time ratio multisource benchmarks lzbench lzbench multisource applications clamav clamscan multisource benchmarks mibench consumer jpeg consumer jpeg singlesource benchmarks stanford queens singlesource benchmarks linpack linpack pc multisource applications jm lencod lencod multisource applications lua lua multisource applications jm ldecod ldecod geomeans n a n a | 0 |
120,077 | 12,058,635,018 | IssuesEvent | 2020-04-15 17:48:44 | cjpleasant88/Grab-Go | https://api.github.com/repos/cjpleasant88/Grab-Go | opened | Create Sprint 1 for Project | documentation enhancement good first issue | [ ] Create new project called Sprint 1
[ ] Use a kanban template to categorize issues (Todo, WIP, Done) | 1.0 | Create Sprint 1 for Project - [ ] Create new project called Sprint 1
[ ] Use a kanban template to categorize issues (Todo, WIP, Done) | non_priority | create sprint for project create new project called sprint use a kanban template to categorize issues todo wip done | 0 |
559,548 | 16,565,549,750 | IssuesEvent | 2021-05-29 10:25:26 | sopra-fs21-group-26/client | https://api.github.com/repos/sopra-fs21-group-26/client | closed | Rework CSS (px to % transformation) | medium priority task | <h2>Sub-Tasks:</h2>
- [x] Rework Home Component
- [x] Rework Login Component
- [x] Rework Register Component
- [x] Rework Menu Component
- [x] Rework Profile Component
- [x] Rework Leaderboard
<h2>Estimate: 2h</h2> | 1.0 | Rework CSS (px to % transformation) - <h2>Sub-Tasks:</h2>
- [x] Rework Home Component
- [x] Rework Login Component
- [x] Rework Register Component
- [x] Rework Menu Component
- [x] Rework Profile Component
- [x] Rework Leaderboard
<h2>Estimate: 2h</h2> | priority | rework css px to transformation sub tasks rework home component rework login component rework register component rework menu component rework profile component rework leaderboard estimate | 1 |
381,947 | 11,298,555,295 | IssuesEvent | 2020-01-17 09:16:44 | ntop/ntopng | https://api.github.com/repos/ntop/ntopng | closed | Implementation of flow score | priority ticket user scripts | Each flow has a numerical (>= 0) value named score that summarizes all the issues related to the flow. In essence every flow has already a bitmap of issues, such as high retransmission rate, or communication with blacklisted hosts. The score is a way to move from this high-level and non-numerical, to a numerical value that can be used to account anomalies. A high score value means that the flow has critical issues whereas a 0 score means that flow is good and no issue has been reported.
The flow score is made up of several components. Each issue reported on the flow increases the flow score. High score numbers mean that the flow has been "special" (in a bad way) and thus worth to be analysed more than others.
The flow score is computed as the SUM(score of each individual flow issue).
The score of individual flow issues depends on the severity of the problem. For instance suppose to take into account a script that checks TCP retransmissions. Supposing that the max score value accounted by this script is 10. A low retransmission rate can contribute to the flow score with a value of 2 (hence close to the bottom value), whereas a severe retransmission rate will be 10 that is the max this script can account. Hence
- the score value is NOT a static value, but it can have a range of values for each issue reported on the flow
- the flow score is a non-negative number that needs to be saved in nIndex and reported in the ntopng GUI so that people can sort flows according to their score
- each script is free to decide the range of the score value it can use, even though it would be nice to have a homogenous score range so that summarising the flow score is possible
| 1.0 | Implementation of flow score - Each flow has a numerical (>= 0) value named score that summarizes all the issues related to the flow. In essence every flow has already a bitmap of issues, such as high retransmission rate, or communication with blacklisted hosts. The score is a way to move from this high-level and non-numerical, to a numerical value that can be used to account anomalies. A high score value means that the flow has critical issues whereas a 0 score means that flow is good and no issue has been reported.
The flow score is made up of several components. Each issue reported on the flow increases the flow score. High score numbers mean that the flow has been "special" (in a bad way) and thus worth to be analysed more than others.
The flow score is computed as the SUM(score of each individual flow issue).
The score of individual flow issues depends on the severity of the problem. For instance suppose to take into account a script that checks TCP retransmissions. Supposing that the max score value accounted by this script is 10. A low retransmission rate can contribute to the flow score with a value of 2 (hence close to the bottom value), whereas a severe retransmission rate will be 10 that is the max this script can account. Hence
- the score value is NOT a static value, but it can have a range of values for each issue reported on the flow
- the flow score is a non-negative number that needs to be saved in nIndex and reported in the ntopng GUI so that people can sort flows according to their score
- each script is free to decide the range of the score value it can use, even though it would be nice to have a homogenous score range so that summarising the flow score is possible
| priority | implementation of flow score each flow has a numerical value named score that summarizes all the issues related to the flow in essence every flow has already a bitmap of issues such as high retransmission rate or communication with blacklisted hosts the score is a way to move from this high level and non numerical to a numerical value that can be used to account anomalies a high score value means that the flow has critical issues whereas a score means that flow is good and no issue has been reported the flow score is made up of several components each issue reported on the flow increases the flow score high score numbers mean that the flow has been special in a bad way and thus worth to be analysed more than others the flow score is computed as the sum score of each individual flow issue the score of individual flow issues depends on the severity of the problem for instance suppose to take into account a script that checks tcp retransmissions supposing that the max score value accounted by this script is a low retransmission rate can contribute to the flow score with a value of hence close to the bottom value whereas a severe retransmission rate will be that is the max this script can account hence the score value is not a static value but it can have a range of values for each issue reported on the flow the flow score is a non negative number that needs to be saved in nindex and reported in the ntopng gui so that people can sort flows according to their score each script is free to decide the range of the score value it can use even though it would be nice to have a homogenous score range so that summarising the flow score is possible | 1 |
91,794 | 26,488,245,943 | IssuesEvent | 2023-01-17 20:00:57 | expo/expo | https://api.github.com/repos/expo/expo | closed | [expo-updates] Updates API does not expose "channel" property at runtime when switching between branch updates via Expo Dev Client | needs review Development Builds | ### Summary
This issue is a continuation of #20431 and is related to PR #16865.
When switching between different branches via the Expo Dev Client GUI, the Updates API does not expose the new value of its `channel` property, as it is set at build time in native code. Again (as said in #20431), this is a big issue for any app that defines its environment configuration through channels.
As a workaround, one could switch env. configuration via the `Updates.manifest.metadata.branchName` property as I assume that a new modern manifest is fetched when switching between branches. But this implies that a branch name must always match a channel name. This is definitely not a viable workaround.
Two options to tackle this "issue" (in my opinion) :
1. Expose the downloaded branch update's `channel` through subsequent `Updates.channel` calls. I don't know if it's even possible or desirable as there's currently a strong stickness to build time hardcoded channel values in EAS, and because AFAIK, there's no `channel` prop included in modern manifests. My understanding is that this would even break how EAS Update works under the hood, but I may be wrong and I'd really like to have some explanations if not.
2. Update the documentation to suggest another way of switching between different app environments that would be nearly as flexible as using channel-based env. configurations.
### Managed or bare workflow?
bare
### What platform(s) does this occur on?
Android, iOS
### Package versions
```
"expo": "~47.0.8",
"expo-dev-client": "~2.0.1",
"expo-updates": "~0.15.6"
```
### Environment
```
expo-env-info 1.0.5 environment info:
System:
OS: macOS 13.0.1
Shell: 5.8.1 - /bin/zsh
Binaries:
Node: 16.18.1 - ~/.asdf/installs/nodejs/16.18.1/bin/node
Yarn: 1.22.19 - ~/Dev/user-mobile-app/node_modules/.bin/yarn
npm: 8.19.2 - ~/.asdf/installs/nodejs/16.18.1/bin/npm
Watchman: 2022.12.05.00 - /opt/homebrew/bin/watchman
Managers:
CocoaPods: 1.11.2 - /opt/homebrew/lib/ruby/gems/2.7.0/bin/pod
SDKs:
iOS SDK:
Platforms: DriverKit 22.1, iOS 16.1, macOS 13.0, tvOS 16.1, watchOS 9.1
Android SDK:
API Levels: 26, 29, 30, 31
Build Tools: 29.0.2, 29.0.3, 30.0.2, 30.0.3, 31.0.0
System Images: android-30 | Google APIs ARM 64 v8a, android-30 | Google APIs Intel x86 Atom, android-31 | Google APIs ARM 64 v8a, android-32 | Google APIs ARM 64 v8a, android-32 | Google APIs Intel x86 Atom_64, android-32 | Google Play ARM 64 v8a
IDEs:
Xcode: 14.1/14B47b - /usr/bin/xcodebuild
npmPackages:
@expo/webpack-config: ^0.17.2 => 0.17.3
babel-preset-expo: ~9.2.1 => 9.2.2
expo: ~47.0.8 => 47.0.8
react: 18.1.0 => 18.1.0
react-dom: 18.1.0 => 18.1.0
react-native: 0.70.5 => 0.70.5
react-native-web: ~0.18.7 => 0.18.10
Expo Workflow: bare
```
### Reproducible demo
1. Setup a minimal bare workflow template
2. Configure EAS Update
3. Configure the eas.json file as follows:
```json
{
"build": {
"development": {
"developmentClient": true,
"channel": "development"
}
}
}
```
4. Set the App.tsx file as follows:
```tsx
import React from 'react'
import { View, Text } from 'react-native'
import * as Updates from 'expo-updates'
export default () => <View><Text>{Updates.channel}</Text></View>
```
5. Build with `npx eas-cli build -p all --profile development`
6. Run the app built with EAS and switch to another branch
7. Notice that the `channel` rendered on the screen did not change
### Stacktrace (if a crash is involved)
_No response_ | 1.0 | [expo-updates] Updates API does not expose "channel" property at runtime when switching between branch updates via Expo Dev Client - ### Summary
This issue is a continuation of #20431 and is related to PR #16865.
When switching between different branches via the Expo Dev Client GUI, the Updates API does not expose the new value of its `channel` property, as it is set at build time in native code. Again (as said in #20431), this is a big issue for any app that defines its environment configuration through channels.
As a workaround, one could switch env. configuration via the `Updates.manifest.metadata.branchName` property as I assume that a new modern manifest is fetched when switching between branches. But this implies that a branch name must always match a channel name. This is definitely not a viable workaround.
Two options to tackle this "issue" (in my opinion) :
1. Expose the downloaded branch update's `channel` through subsequent `Updates.channel` calls. I don't know if it's even possible or desirable as there's currently a strong stickness to build time hardcoded channel values in EAS, and because AFAIK, there's no `channel` prop included in modern manifests. My understanding is that this would even break how EAS Update works under the hood, but I may be wrong and I'd really like to have some explanations if not.
2. Update the documentation to suggest another way of switching between different app environments that would be nearly as flexible as using channel-based env. configurations.
### Managed or bare workflow?
bare
### What platform(s) does this occur on?
Android, iOS
### Package versions
```
"expo": "~47.0.8",
"expo-dev-client": "~2.0.1",
"expo-updates": "~0.15.6"
```
### Environment
```
expo-env-info 1.0.5 environment info:
System:
OS: macOS 13.0.1
Shell: 5.8.1 - /bin/zsh
Binaries:
Node: 16.18.1 - ~/.asdf/installs/nodejs/16.18.1/bin/node
Yarn: 1.22.19 - ~/Dev/user-mobile-app/node_modules/.bin/yarn
npm: 8.19.2 - ~/.asdf/installs/nodejs/16.18.1/bin/npm
Watchman: 2022.12.05.00 - /opt/homebrew/bin/watchman
Managers:
CocoaPods: 1.11.2 - /opt/homebrew/lib/ruby/gems/2.7.0/bin/pod
SDKs:
iOS SDK:
Platforms: DriverKit 22.1, iOS 16.1, macOS 13.0, tvOS 16.1, watchOS 9.1
Android SDK:
API Levels: 26, 29, 30, 31
Build Tools: 29.0.2, 29.0.3, 30.0.2, 30.0.3, 31.0.0
System Images: android-30 | Google APIs ARM 64 v8a, android-30 | Google APIs Intel x86 Atom, android-31 | Google APIs ARM 64 v8a, android-32 | Google APIs ARM 64 v8a, android-32 | Google APIs Intel x86 Atom_64, android-32 | Google Play ARM 64 v8a
IDEs:
Xcode: 14.1/14B47b - /usr/bin/xcodebuild
npmPackages:
@expo/webpack-config: ^0.17.2 => 0.17.3
babel-preset-expo: ~9.2.1 => 9.2.2
expo: ~47.0.8 => 47.0.8
react: 18.1.0 => 18.1.0
react-dom: 18.1.0 => 18.1.0
react-native: 0.70.5 => 0.70.5
react-native-web: ~0.18.7 => 0.18.10
Expo Workflow: bare
```
### Reproducible demo
1. Setup a minimal bare workflow template
2. Configure EAS Update
3. Configure the eas.json file as follows:
```json
{
"build": {
"development": {
"developmentClient": true,
"channel": "development"
}
}
}
```
4. Set the App.tsx file as follows:
```tsx
import React from 'react'
import { View, Text } from 'react-native'
import * as Updates from 'expo-updates'
export default () => <View><Text>{Updates.channel}</Text></View>
```
5. Build with `npx eas-cli build -p all --profile development`
6. Run the app built with EAS and switch to another branch
7. Notice that the `channel` rendered on the screen did not change
### Stacktrace (if a crash is involved)
_No response_ | non_priority | updates api does not expose channel property at runtime when switching between branch updates via expo dev client summary this issue is a continuation of and is related to pr when switching between different branches via the expo dev client gui the updates api does not expose the new value of its channel property as it is set at build time in native code again as said in this is a big issue for any app that defines its environment configuration through channels as a workaround one could switch env configuration via the updates manifest metadata branchname property as i assume that a new modern manifest is fetched when switching between branches but this implies that a branch name must always match a channel name this is definitely not a viable workaround two options to tackle this issue in my opinion expose the downloaded branch update s channel through subsequent updates channel calls i don t know if it s even possible or desirable as there s currently a strong stickness to build time hardcoded channel values in eas and because afaik there s no channel prop included in modern manifests my understanding is that this would even break how eas update works under the hood but i may be wrong and i d really like to have some explanations if not update the documentation to suggest another way of switching between different app environments that would be nearly as flexible as using channel based env configurations managed or bare workflow bare what platform s does this occur on android ios package versions expo expo dev client expo updates environment expo env info environment info system os macos shell bin zsh binaries node asdf installs nodejs bin node yarn dev user mobile app node modules bin yarn npm asdf installs nodejs bin npm watchman opt homebrew bin watchman managers cocoapods opt homebrew lib ruby gems bin pod sdks ios sdk platforms driverkit ios macos tvos watchos android sdk api levels build tools system images android google apis arm android google apis intel atom android google apis arm android google apis arm android google apis intel atom android google play arm ides xcode usr bin xcodebuild npmpackages expo webpack config babel preset expo expo react react dom react native react native web expo workflow bare reproducible demo setup a minimal bare workflow template configure eas update configure the eas json file as follows json build development developmentclient true channel development set the app tsx file as follows tsx import react from react import view text from react native import as updates from expo updates export default updates channel build with npx eas cli build p all profile development run the app built with eas and switch to another branch notice that the channel rendered on the screen did not change stacktrace if a crash is involved no response | 0 |
343,681 | 10,334,894,451 | IssuesEvent | 2019-09-03 09:21:38 | trustwallet/web-core | https://api.github.com/repos/trustwallet/web-core | closed | Add support for TrustAPI RPC | Priority: High Type: Enhancement | Add support for TrustAPI prices endpoint. Example:
Endpoint: `POST api.trustwallet.com/prices`
Body:
```
{
currency: 'USD',
tokens: [
contract: 'address'
]
}
``` | 1.0 | Add support for TrustAPI RPC - Add support for TrustAPI prices endpoint. Example:
Endpoint: `POST api.trustwallet.com/prices`
Body:
```
{
currency: 'USD',
tokens: [
contract: 'address'
]
}
``` | priority | add support for trustapi rpc add support for trustapi prices endpoint example endpoint post api trustwallet com prices body currency usd tokens contract address | 1 |
693,136 | 23,764,643,281 | IssuesEvent | 2022-09-01 11:49:13 | running-elephant/datart | https://api.github.com/repos/running-elephant/datart | closed | [bug] 创建图表<类型为表格> 列拖动到字段区后 字符串类型列 无法改变顺序 数值列可以 | status: validating type: bug priority: p3 difficulty: medium | **Datart Version**
rc1 /demo环境
**Describe the bug**
A clear and concise description of what the bug is.
**To Reproduce**
Steps to reproduce the behavior:
1. 创建图表<类型为表格>
2. 列拖动到字段区
3. 上下拖动字符串类型列改变显示顺序 发现无法改变列的位置顺序 但是数值列可以
**Expected behavior**
A clear and concise description of what you expected to happen.
**Screenshots**

点击编辑上图的表格仪表盘

修改字符串列顺序 并无变化

修改数值列顺序 正常 同时将上一步的顺序变更为正确的了

**Environmental details: (optional, depending on where the bug occurs)**
- OS: [e.g. Windows 10]
- Source Database: [e.g. MySQL 8.0.26]
- Browser: [e.g. chrome 94, safari 15]
**Additional context**
Add any other context about the problem here.
| 1.0 | [bug] 创建图表<类型为表格> 列拖动到字段区后 字符串类型列 无法改变顺序 数值列可以 - **Datart Version**
rc1 /demo环境
**Describe the bug**
A clear and concise description of what the bug is.
**To Reproduce**
Steps to reproduce the behavior:
1. 创建图表<类型为表格>
2. 列拖动到字段区
3. 上下拖动字符串类型列改变显示顺序 发现无法改变列的位置顺序 但是数值列可以
**Expected behavior**
A clear and concise description of what you expected to happen.
**Screenshots**

点击编辑上图的表格仪表盘

修改字符串列顺序 并无变化

修改数值列顺序 正常 同时将上一步的顺序变更为正确的了

**Environmental details: (optional, depending on where the bug occurs)**
- OS: [e.g. Windows 10]
- Source Database: [e.g. MySQL 8.0.26]
- Browser: [e.g. chrome 94, safari 15]
**Additional context**
Add any other context about the problem here.
| priority | 创建图表 列拖动到字段区后 字符串类型列 无法改变顺序 数值列可以 datart version demo环境 describe the bug a clear and concise description of what the bug is to reproduce steps to reproduce the behavior 创建图表 列拖动到字段区 上下拖动字符串类型列改变显示顺序 发现无法改变列的位置顺序 但是数值列可以 expected behavior a clear and concise description of what you expected to happen screenshots 点击编辑上图的表格仪表盘 修改字符串列顺序 并无变化 修改数值列顺序 正常 同时将上一步的顺序变更为正确的了 environmental details optional depending on where the bug occurs os source database browser additional context add any other context about the problem here | 1 |
3,762 | 6,734,899,697 | IssuesEvent | 2017-10-18 19:43:39 | cypress-io/cypress | https://api.github.com/repos/cypress-io/cypress | closed | Jazz up the Readme | process: contributing | The `README.md` for this repo is kind of sad. 😢 I would like to see the readme more focused on explaining what cypress is, why you would use cypress, **simple install instructions**, etc - for our users and have contributing the secondary focus.
**Ideas to jazz up**
- Add header from old readme branch.
- Embed 'Why Cypress' video directly into readme.
- Have simple 'npm install' instructions.
- Add some cool badges. (gitter, npm package)
- Don't make it too long - refer to the docs when necessary. | 1.0 | Jazz up the Readme - The `README.md` for this repo is kind of sad. 😢 I would like to see the readme more focused on explaining what cypress is, why you would use cypress, **simple install instructions**, etc - for our users and have contributing the secondary focus.
**Ideas to jazz up**
- Add header from old readme branch.
- Embed 'Why Cypress' video directly into readme.
- Have simple 'npm install' instructions.
- Add some cool badges. (gitter, npm package)
- Don't make it too long - refer to the docs when necessary. | non_priority | jazz up the readme the readme md for this repo is kind of sad 😢 i would like to see the readme more focused on explaining what cypress is why you would use cypress simple install instructions etc for our users and have contributing the secondary focus ideas to jazz up add header from old readme branch embed why cypress video directly into readme have simple npm install instructions add some cool badges gitter npm package don t make it too long refer to the docs when necessary | 0 |
54,828 | 11,309,718,462 | IssuesEvent | 2020-01-19 15:01:28 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | [com_fields] Problem with Attributes TITLE and ALT in Media Field | J3 Issue No Code Attached Yet | ### Steps to reproduce the issue
Creating a new custom media field does not require ALT and TITLE attributes
### Expected result
Side frontend should display the ALT and TITLE attributes for SEO purposes
### Actual result
Side frontend media does not have any ALT and TITLE attributes but only some manageable by css such as width and height | 1.0 | [com_fields] Problem with Attributes TITLE and ALT in Media Field - ### Steps to reproduce the issue
Creating a new custom media field does not require ALT and TITLE attributes
### Expected result
Side frontend should display the ALT and TITLE attributes for SEO purposes
### Actual result
Side frontend media does not have any ALT and TITLE attributes but only some manageable by css such as width and height | non_priority | problem with attributes title and alt in media field steps to reproduce the issue creating a new custom media field does not require alt and title attributes expected result side frontend should display the alt and title attributes for seo purposes actual result side frontend media does not have any alt and title attributes but only some manageable by css such as width and height | 0 |
88,988 | 3,788,324,500 | IssuesEvent | 2016-03-21 14:24:34 | BradWBeer/clinch | https://api.github.com/repos/BradWBeer/clinch | closed | Add 3b's ClassImp (assimp wrapper) extension | enhancement Low Priority | I'm not certain how this will work with shaders, but at least it can import data. | 1.0 | Add 3b's ClassImp (assimp wrapper) extension - I'm not certain how this will work with shaders, but at least it can import data. | priority | add s classimp assimp wrapper extension i m not certain how this will work with shaders but at least it can import data | 1 |
254,964 | 21,891,772,561 | IssuesEvent | 2022-05-20 03:00:59 | MPMG-DCC-UFMG/F01 | https://api.github.com/repos/MPMG-DCC-UFMG/F01 | closed | Teste de generalizacao para a tag Despesas com diárias - Despesas com diárias - Siplanweb - Lima Duarte | generalization test development template-Siplanweb tag-Despesas com diárias subtag-Despesas com diárias | DoD: Realizar o teste de Generalização do validador da tag Despesas com diárias - Despesas com diárias - Siplanweb para o Município de Lima Duarte. | 1.0 | Teste de generalizacao para a tag Despesas com diárias - Despesas com diárias - Siplanweb - Lima Duarte - DoD: Realizar o teste de Generalização do validador da tag Despesas com diárias - Despesas com diárias - Siplanweb para o Município de Lima Duarte. | non_priority | teste de generalizacao para a tag despesas com diárias despesas com diárias siplanweb lima duarte dod realizar o teste de generalização do validador da tag despesas com diárias despesas com diárias siplanweb para o município de lima duarte | 0 |
764,723 | 26,813,884,274 | IssuesEvent | 2023-02-02 01:42:52 | apcountryman/picolibrary | https://api.github.com/repos/apcountryman/picolibrary | closed | Improve structure of event driver state machine facilities documentation | priority-normal status-awaiting_review type-refactoring | Improve structure of event driver state machine facilities documentation by splitting, joining, and reordering paragraphs. | 1.0 | Improve structure of event driver state machine facilities documentation - Improve structure of event driver state machine facilities documentation by splitting, joining, and reordering paragraphs. | priority | improve structure of event driver state machine facilities documentation improve structure of event driver state machine facilities documentation by splitting joining and reordering paragraphs | 1 |
175,708 | 6,553,196,364 | IssuesEvent | 2017-09-05 21:25:58 | ProjectSidewalk/SidewalkWebpage | https://api.github.com/repos/ProjectSidewalk/SidewalkWebpage | closed | When a user finishes the last street in a region, ask if they want a new region | feature-request in progress Priority: Low ui-update | If a user is auditing and they finish a street that brings the neighborhood completion (across ALL users) to 100%, then we should have a pop-up asking if they want to move on to a new neighborhood. Overlapping data is nice and all, but right now we are having a hard time hitting 100% coverage of DC, so we should be doing whatever we can to get users working on unaudited streets. And I think this could help with that.
This goes along with the idea of having a neighborhood completion (across all users) progress bar, as outlined in #925
And before we do this, we should be making sure to assign users to unaudited streets (across all users), as outlined in #839 | 1.0 | When a user finishes the last street in a region, ask if they want a new region - If a user is auditing and they finish a street that brings the neighborhood completion (across ALL users) to 100%, then we should have a pop-up asking if they want to move on to a new neighborhood. Overlapping data is nice and all, but right now we are having a hard time hitting 100% coverage of DC, so we should be doing whatever we can to get users working on unaudited streets. And I think this could help with that.
This goes along with the idea of having a neighborhood completion (across all users) progress bar, as outlined in #925
And before we do this, we should be making sure to assign users to unaudited streets (across all users), as outlined in #839 | priority | when a user finishes the last street in a region ask if they want a new region if a user is auditing and they finish a street that brings the neighborhood completion across all users to then we should have a pop up asking if they want to move on to a new neighborhood overlapping data is nice and all but right now we are having a hard time hitting coverage of dc so we should be doing whatever we can to get users working on unaudited streets and i think this could help with that this goes along with the idea of having a neighborhood completion across all users progress bar as outlined in and before we do this we should be making sure to assign users to unaudited streets across all users as outlined in | 1 |
412,559 | 12,044,092,660 | IssuesEvent | 2020-04-14 13:31:09 | HGustavs/LenaSYS | https://api.github.com/repos/HGustavs/LenaSYS | closed | Line thickness slider gets hidden in the Firefox browser when draged | Diagram Group-4-2020 a18petha bug lowPriority | 
When using the Firefox browser, the slider gets hidden while being clicked and dragged. It would be nice if this could be fixed. | 1.0 | Line thickness slider gets hidden in the Firefox browser when draged - 
When using the Firefox browser, the slider gets hidden while being clicked and dragged. It would be nice if this could be fixed. | priority | line thickness slider gets hidden in the firefox browser when draged when using the firefox browser the slider gets hidden while being clicked and dragged it would be nice if this could be fixed | 1 |
61,873 | 17,023,796,973 | IssuesEvent | 2021-07-03 03:54:32 | tomhughes/trac-tickets | https://api.github.com/repos/tomhughes/trac-tickets | closed | Nominatium for Riga street finds Tukums street. | Component: nominatim Priority: minor Resolution: fixed Type: defect | **[Submitted to the original trac issue database at 3.22pm, Wednesday, 9th May 2012]**
, graudu, Riga, LV
should find this street -
http://www.openstreetmap.org/?lat=56.91112&lon=24.08622&zoom=17&layers=M
instead it shows:
, graudu, Jelgava, LV | 1.0 | Nominatium for Riga street finds Tukums street. - **[Submitted to the original trac issue database at 3.22pm, Wednesday, 9th May 2012]**
, graudu, Riga, LV
should find this street -
http://www.openstreetmap.org/?lat=56.91112&lon=24.08622&zoom=17&layers=M
instead it shows:
, graudu, Jelgava, LV | non_priority | nominatium for riga street finds tukums street graudu riga lv should find this street instead it shows graudu jelgava lv | 0 |
806,207 | 29,806,001,651 | IssuesEvent | 2023-06-16 11:43:54 | opencrvs/opencrvs-core | https://api.github.com/repos/opencrvs/opencrvs-core | closed | Bride & Groom signature not appearing when printing certificate | 👹 Bug ❗️ Priority: High | After moving the signatures to minio, they are not appearing in the certificates | 1.0 | Bride & Groom signature not appearing when printing certificate - After moving the signatures to minio, they are not appearing in the certificates | priority | bride groom signature not appearing when printing certificate after moving the signatures to minio they are not appearing in the certificates | 1 |
61,206 | 25,407,315,205 | IssuesEvent | 2022-11-22 16:10:41 | cityofaustin/atd-data-tech | https://api.github.com/repos/cityofaustin/atd-data-tech | closed | [AirWatch] Remove any Juan V off of iOS AirWatch profiles for Parking Services group, wipe device. | Workgroup: PE Type: IT Support Service: Apps Type: Tablet Support | <!-- Email -->
<!-- jacob.coronado@austintexas.gov -->
> What application are you using?
Other / Not sure
> Describe the problem.
Juan V was a temp tech in our group. His assignment completed and we need to remove any access he had.
<!-- juan.valdez@austintexas.gov -->
Please let me know if anything else is needed from me.
> How soon do you need this?
Flexible — An extended timeline is OK
> Requested By
Jacob C.
Request ID: DTS22-105725
| 1.0 | [AirWatch] Remove any Juan V off of iOS AirWatch profiles for Parking Services group, wipe device. - <!-- Email -->
<!-- jacob.coronado@austintexas.gov -->
> What application are you using?
Other / Not sure
> Describe the problem.
Juan V was a temp tech in our group. His assignment completed and we need to remove any access he had.
<!-- juan.valdez@austintexas.gov -->
Please let me know if anything else is needed from me.
> How soon do you need this?
Flexible — An extended timeline is OK
> Requested By
Jacob C.
Request ID: DTS22-105725
| non_priority | remove any juan v off of ios airwatch profiles for parking services group wipe device what application are you using other not sure describe the problem juan v was a temp tech in our group his assignment completed and we need to remove any access he had please let me know if anything else is needed from me how soon do you need this flexible — an extended timeline is ok requested by jacob c request id | 0 |
124,774 | 26,534,341,017 | IssuesEvent | 2023-01-19 14:40:57 | carbon-design-system/carbon | https://api.github.com/repos/carbon-design-system/carbon | closed | Code snippet showing background color changing on hover on disabled state | type: bug 🐛 component: code-snippet | ### Package
@carbon/react
### Browser
_No response_
### Package version
Latest
### React version
_No response_
### Description
Code snippet, all variants (inline, single line, multi line), are showing background color changing on hover on disabled state. The playground is also showing a weird demo where the same content is demo'ed before as an inline code snippet, but now it's a single line code snippet. https://react.carbondesignsystem.com/?path=/story/components-codesnippet--playground&args=disabled:true

### Suggested Severity
Severity 3 = User can complete task, and/or has a workaround within the user experience of a given component.
### Reproduction/example
https://react.carbondesignsystem.com/?path=/story/components-codesnippet--playground&args=disabled:true
### Steps to reproduce
1. Go to https://react.carbondesignsystem.com/?path=/story/components-codesnippet--playground&args=disabled:true
2. And hover on Copy button
### Code of Conduct
- [X] I agree to follow this project's [Code of Conduct](https://github.com/carbon-design-system/carbon/blob/f555616971a03fd454c0f4daea184adf41fff05b/.github/CODE_OF_CONDUCT.md)
- [X] I checked the [current issues](https://github.com/carbon-design-system/carbon/issues) for duplicate problems | 1.0 | Code snippet showing background color changing on hover on disabled state - ### Package
@carbon/react
### Browser
_No response_
### Package version
Latest
### React version
_No response_
### Description
Code snippet, all variants (inline, single line, multi line), are showing background color changing on hover on disabled state. The playground is also showing a weird demo where the same content is demo'ed before as an inline code snippet, but now it's a single line code snippet. https://react.carbondesignsystem.com/?path=/story/components-codesnippet--playground&args=disabled:true

### Suggested Severity
Severity 3 = User can complete task, and/or has a workaround within the user experience of a given component.
### Reproduction/example
https://react.carbondesignsystem.com/?path=/story/components-codesnippet--playground&args=disabled:true
### Steps to reproduce
1. Go to https://react.carbondesignsystem.com/?path=/story/components-codesnippet--playground&args=disabled:true
2. And hover on Copy button
### Code of Conduct
- [X] I agree to follow this project's [Code of Conduct](https://github.com/carbon-design-system/carbon/blob/f555616971a03fd454c0f4daea184adf41fff05b/.github/CODE_OF_CONDUCT.md)
- [X] I checked the [current issues](https://github.com/carbon-design-system/carbon/issues) for duplicate problems | non_priority | code snippet showing background color changing on hover on disabled state package carbon react browser no response package version latest react version no response description code snippet all variants inline single line multi line are showing background color changing on hover on disabled state the playground is also showing a weird demo where the same content is demo ed before as an inline code snippet but now it s a single line code snippet suggested severity severity user can complete task and or has a workaround within the user experience of a given component reproduction example steps to reproduce go to and hover on copy button code of conduct i agree to follow this project s i checked the for duplicate problems | 0 |
369,824 | 10,918,600,285 | IssuesEvent | 2019-11-21 17:12:13 | RhoInc/Webcharts | https://api.github.com/repos/RhoInc/Webcharts | opened | Avoid jittery pagination caused by the table resizing its container. | low priority table | implement styling that maintains a constant div height | 1.0 | Avoid jittery pagination caused by the table resizing its container. - implement styling that maintains a constant div height | priority | avoid jittery pagination caused by the table resizing its container implement styling that maintains a constant div height | 1 |
27,198 | 21,409,564,144 | IssuesEvent | 2022-04-22 03:20:09 | phpmyadmin/phpmyadmin | https://api.github.com/repos/phpmyadmin/phpmyadmin | opened | Probot Stale bot should be replaced with the Close Stale Issues action | help wanted infrastructure newbie good first issue | Looks like [Probot Stale](https://github.com/probot/stale) bot is not working properly lately, so it should be replaced with the [Close Stale Issues](https://github.com/marketplace/actions/close-stale-issues) GitHub Action.
The Probot Stale configuration file is located at `.github/stale.yml`.
| 1.0 | Probot Stale bot should be replaced with the Close Stale Issues action - Looks like [Probot Stale](https://github.com/probot/stale) bot is not working properly lately, so it should be replaced with the [Close Stale Issues](https://github.com/marketplace/actions/close-stale-issues) GitHub Action.
The Probot Stale configuration file is located at `.github/stale.yml`.
| non_priority | probot stale bot should be replaced with the close stale issues action looks like bot is not working properly lately so it should be replaced with the github action the probot stale configuration file is located at github stale yml | 0 |
192,452 | 6,850,049,745 | IssuesEvent | 2017-11-14 00:59:36 | flosse/kartevonmorgen | https://api.github.com/repos/flosse/kartevonmorgen | closed | Description length | 12 low-priority | I think we should extend the short description to 500 characters.
And the Title could have 50 characters.
What do you think? Of cours, in the search result it shows not everything, but on the entrypage it should show all characters. | 1.0 | Description length - I think we should extend the short description to 500 characters.
And the Title could have 50 characters.
What do you think? Of cours, in the search result it shows not everything, but on the entrypage it should show all characters. | priority | description length i think we should extend the short description to characters and the title could have characters what do you think of cours in the search result it shows not everything but on the entrypage it should show all characters | 1 |
19,590 | 10,370,904,001 | IssuesEvent | 2019-09-08 16:13:54 | ZyC0R3/gulp-watch | https://api.github.com/repos/ZyC0R3/gulp-watch | closed | WS-2018-0347 (Medium) detected in eslint-1.10.3.tgz | bug security vulnerability | ## WS-2018-0347 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>eslint-1.10.3.tgz</b></p></summary>
<p>An AST-based pattern checker for JavaScript.</p>
<p>Library home page: <a href="https://registry.npmjs.org/eslint/-/eslint-1.10.3.tgz">https://registry.npmjs.org/eslint/-/eslint-1.10.3.tgz</a></p>
<p>Path to dependency file: /gulp-watch/package.json</p>
<p>Path to vulnerable library: /tmp/git/gulp-watch/node_modules/eslint/package.json</p>
<p>
Dependency Hierarchy:
- xo-0.10.1.tgz (Root Library)
- :x: **eslint-1.10.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ZyC0R3/gulp-watch/commit/14c9d9c0e1ba810c3787a5d145cf1f2cf12c312e">14c9d9c0e1ba810c3787a5d145cf1f2cf12c312e</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was descovered in eslint before 4.18.2. One of the regexes in eslint is vulnerable to catastrophic backtracking.
<p>Publish Date: 2018-02-27
<p>URL: <a href=https://github.com/eslint/eslint/commit/f6901d0bcf6c918ac4e5c6c7c4bddeb2cb715c09>WS-2018-0347</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eslint/eslint/issues/10002">https://github.com/eslint/eslint/issues/10002</a></p>
<p>Release Date: 2019-06-16</p>
<p>Fix Resolution: 4.18.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2018-0347 (Medium) detected in eslint-1.10.3.tgz - ## WS-2018-0347 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>eslint-1.10.3.tgz</b></p></summary>
<p>An AST-based pattern checker for JavaScript.</p>
<p>Library home page: <a href="https://registry.npmjs.org/eslint/-/eslint-1.10.3.tgz">https://registry.npmjs.org/eslint/-/eslint-1.10.3.tgz</a></p>
<p>Path to dependency file: /gulp-watch/package.json</p>
<p>Path to vulnerable library: /tmp/git/gulp-watch/node_modules/eslint/package.json</p>
<p>
Dependency Hierarchy:
- xo-0.10.1.tgz (Root Library)
- :x: **eslint-1.10.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ZyC0R3/gulp-watch/commit/14c9d9c0e1ba810c3787a5d145cf1f2cf12c312e">14c9d9c0e1ba810c3787a5d145cf1f2cf12c312e</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was descovered in eslint before 4.18.2. One of the regexes in eslint is vulnerable to catastrophic backtracking.
<p>Publish Date: 2018-02-27
<p>URL: <a href=https://github.com/eslint/eslint/commit/f6901d0bcf6c918ac4e5c6c7c4bddeb2cb715c09>WS-2018-0347</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eslint/eslint/issues/10002">https://github.com/eslint/eslint/issues/10002</a></p>
<p>Release Date: 2019-06-16</p>
<p>Fix Resolution: 4.18.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in eslint tgz ws medium severity vulnerability vulnerable library eslint tgz an ast based pattern checker for javascript library home page a href path to dependency file gulp watch package json path to vulnerable library tmp git gulp watch node modules eslint package json dependency hierarchy xo tgz root library x eslint tgz vulnerable library found in head commit a href vulnerability details a vulnerability was descovered in eslint before one of the regexes in eslint is vulnerable to catastrophic backtracking publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required high user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
9,943 | 7,042,621,510 | IssuesEvent | 2017-12-30 15:45:56 | dannypsnl/redux | https://api.github.com/repos/dannypsnl/redux | closed | [Drop feature]DispatchC | performance TODO wontfix | As title, the reason is two API cause confusion.
And concurrency code can enjoy the improvement from Go or computer or System.
So I decide to drop the sequential version. | True | [Drop feature]DispatchC - As title, the reason is two API cause confusion.
And concurrency code can enjoy the improvement from Go or computer or System.
So I decide to drop the sequential version. | non_priority | dispatchc as title the reason is two api cause confusion and concurrency code can enjoy the improvement from go or computer or system so i decide to drop the sequential version | 0 |
244,299 | 7,873,240,894 | IssuesEvent | 2018-06-25 13:46:53 | Repair-DeskPOS/RepairDesk-Bugs | https://api.github.com/repos/Repair-DeskPOS/RepairDesk-Bugs | closed | Customer Group Discounts Incorrect on Invoice | Discount Medium Priority Resolved bug | I have a friends and family discount group that provides a 25% discount on all accessories. The discount applies properly to the ticket, but when it creates an invoice the discount calculates wrong.
Look at open ticket #0-110 in my RepairDesk right now and you will see a tempered glass screen protector for $34.99 that is discounted 25% to $26.24
If you look at invoice #93 for the same transaction you will see that the price changes to $31.49 | 1.0 | Customer Group Discounts Incorrect on Invoice - I have a friends and family discount group that provides a 25% discount on all accessories. The discount applies properly to the ticket, but when it creates an invoice the discount calculates wrong.
Look at open ticket #0-110 in my RepairDesk right now and you will see a tempered glass screen protector for $34.99 that is discounted 25% to $26.24
If you look at invoice #93 for the same transaction you will see that the price changes to $31.49 | priority | customer group discounts incorrect on invoice i have a friends and family discount group that provides a discount on all accessories the discount applies properly to the ticket but when it creates an invoice the discount calculates wrong look at open ticket in my repairdesk right now and you will see a tempered glass screen protector for that is discounted to if you look at invoice for the same transaction you will see that the price changes to | 1 |
104,294 | 8,969,923,089 | IssuesEvent | 2019-01-29 12:13:30 | elastic/elasticsearch | https://api.github.com/repos/elastic/elasticsearch | opened | [CI] HotThreadsIT.testHotThreadsDontFail failure on master | :Core/Infra/Core >test-failure | Logs: https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+multijob-unix-compatibility/os=centos/211/console
REPRODUCE WITH:
```
/gradlew :server:integTest \
-Dtests.seed=233C30BFCE2B7117 \
-Dtests.class=org.elasticsearch.action.admin.HotThreadsIT \
-Dtests.method="testHotThreadsDontFail" \
-Dtests.security.manager=true \
-Dtests.locale=es-MX \
-Dtests.timezone=Asia/Yerevan \
-Dcompiler.java=11 \
-Druntime.java=8
```
Couldn't reproduce locally (100+ iterations)
```
1> [2019-01-29T15:44:34,933][INFO ][o.e.c.c.Coordinator ] [node_s1] setting initial configuration to VotingConfiguration{FOMFnLR6RaC0dEzMnFkJ1A,saAXE5n_SbeS_kPuGtZ9eQ,{bootstrap-placeholder}-node_s2}
1> [2019-01-29T15:44:35,350][INFO ][o.e.c.s.MasterService ] [node_s1] elected-as-master ([2] nodes joined)[{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907} elect leader, {node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437} elect leader, _BECOME_MASTER_TASK_, _FINISH_ELECTION_], node-join[{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242} join existing leader], term: 1, version: 1, reason: master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907},{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242},}
1> [2019-01-29T15:44:35,492][INFO ][o.e.c.s.ClusterApplierService] [node_s0] master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437},{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242},}, term: 1, version: 1, reason: ApplyCommitRequest{term=1, version=1, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
2> REPRODUCE WITH: ./gradlew :server:integTest -Dtests.seed=233C30BFCE2B7117 -Dtests.class=org.elasticsearch.action.admin.HotThreadsIT -Dtests.method="testHotThreadsDontFail" -Dtests.security.manager=true -Dtests.locale=es-MX -Dtests.timezone=Asia/Yerevan -Dcompiler.java=11 -Druntime.java=8
1> [2019-01-29T15:44:35,494][INFO ][o.e.c.s.ClusterApplierService] [node_s2] master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437},{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907},}, term: 1, version: 1, reason: ApplyCommitRequest{term=1, version=1, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
2> NOTE: leaving temporary files on disk at: /var/lib/jenkins/workspace/elastic+elasticsearch+master+multijob-unix-compatibility/os/centos/server/build/testrun/integTest/J3/temp/org.elasticsearch.action.admin.HotThreadsIT_233C30BFCE2B7117-001
2> NOTE: test params are: codec=Asserting(Lucene80): {field1.keyword=PostingsFormat(name=Asserting), field1=PostingsFormat(name=Asserting), _id=PostingsFormat(name=Asserting)}, docValues:{field1.keyword=DocValuesFormat(name=Lucene70), _seq_no=DocValuesFormat(name=Lucene70), _primary_term=DocValuesFormat(name=Lucene70), _version=DocValuesFormat(name=Lucene70)}, maxPointsInLeafNode=128, maxMBSortInHeap=5.534645509088748, sim=Asserting(org.apache.lucene.search.similarities.AssertingSimilarity@7769dd0e), locale=es-MX, timezone=Asia/Yerevan
2> NOTE: Linux 2.6.32-754.10.1.el6.x86_64 amd64/Oracle Corporation 1.8.0_202 (64-bit)/cpus=16,threads=1,free=465545688,total=513802240
1> [2019-01-29T15:44:35,497][INFO ][o.e.n.Node ] [integ_1] started
2> NOTE: All tests run in this JVM: [HotThreadsIT]
1> [2019-01-29T15:44:35,497][INFO ][o.e.n.Node ] [integ_3] started
1> [2019-01-29T15:44:35,504][INFO ][o.e.c.s.ClusterApplierService] [node_s1] master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907},{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242},}, term: 1, version: 1, reason: Publication{term=1, version=1}
1> [2019-01-29T15:44:35,516][INFO ][o.e.n.Node ] [integ_2] started
1> [2019-01-29T15:44:35,544][INFO ][o.e.c.s.MasterService ] [node_s1] node-join[{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343} join existing leader], term: 1, version: 2, reason: added {{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343},}
1> [2019-01-29T15:44:35,578][INFO ][o.e.c.s.ClusterApplierService] [node_s2] added {{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343},}, term: 1, version: 2, reason: ApplyCommitRequest{term=1, version=2, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
1> [2019-01-29T15:44:35,578][INFO ][o.e.c.s.ClusterApplierService] [node_sc3] master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437},{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907},{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242},}, term: 1, version: 2, reason: ApplyCommitRequest{term=1, version=2, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
1> [2019-01-29T15:44:35,579][INFO ][o.e.n.Node ] [integ_4] started
1> [2019-01-29T15:44:35,580][INFO ][o.e.c.s.ClusterApplierService] [node_s0] added {{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343},}, term: 1, version: 2, reason: ApplyCommitRequest{term=1, version=2, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
1> [2019-01-29T15:44:35,633][INFO ][o.e.c.s.ClusterApplierService] [node_s1] added {{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343},}, term: 1, version: 2, reason: Publication{term=1, version=2}
1> [2019-01-29T15:44:35,750][INFO ][o.e.g.GatewayService ] [node_s1] recovered [0] indices into cluster_state
1> [2019-01-29T15:44:36,331][INFO ][o.e.c.m.MetaDataIndexTemplateService] [node_s1] adding template [random_index_template] for index patterns [*]
1> [2019-01-29T15:44:36,402][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] [HotThreadsIT#testHotThreadsDontFail]: all set up test
1> [2019-01-29T15:44:36,416][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] using custom data_path for index: [HudQrFRmGG]
1> [2019-01-29T15:44:36,455][INFO ][o.e.c.m.MetaDataCreateIndexService] [node_s1] [test] creating index, cause [api], templates [random_index_template], shards [6]/[1], mappings []
1> [2019-01-29T15:44:37,806][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] Index [3] docs async: [true] bulk: [false]
1> [2019-01-29T15:44:38,270][INFO ][o.e.c.r.a.AllocationService] [node_s1] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[test][5], [test][1], [test][0], [test][3], [test][2]] ...]).
1> [2019-01-29T15:44:38,427][INFO ][o.e.c.m.MetaDataMappingService] [node_s1] [test/Xna3aYPaSLezRRHL3OvARQ] create_mapping [type1]
1> [2019-01-29T15:44:40,095][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] no modules loaded
1> [2019-01-29T15:44:40,095][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] loaded plugin [org.elasticsearch.transport.nio.MockNioTransportPlugin]
1> [2019-01-29T15:44:40,318][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] no modules loaded
1> [2019-01-29T15:44:40,318][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] loaded plugin [org.elasticsearch.transport.nio.MockNioTransportPlugin]
1> [2019-01-29T15:45:10,475][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] [HotThreadsIT#testHotThreadsDontFail]: cleaning up after test
1> [2019-01-29T15:45:10,487][WARN ][o.e.t.OutboundHandler ] [node_s1] send message failed [channel: NioSocketChannel{localAddress=/127.0.0.1:43437, remoteAddress=/127.0.0.1:57414}]
1> java.io.IOException: Connection reset by peer
1> at sun.nio.ch.FileDispatcherImpl.write0(Native Method) ~[?:?]
1> at sun.nio.ch.SocketDispatcher.write(SocketDispatcher.java:47) ~[?:?]
1> at sun.nio.ch.IOUtil.writeFromNativeBuffer(IOUtil.java:93) ~[?:?]
1> at sun.nio.ch.IOUtil.write(IOUtil.java:51) ~[?:?]
1> at sun.nio.ch.SocketChannelImpl.write(SocketChannelImpl.java:471) ~[?:?]
1> at org.elasticsearch.nio.SocketChannelContext.flushToChannel(SocketChannelContext.java:336) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.BytesChannelContext.singleFlush(BytesChannelContext.java:87) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.BytesChannelContext.flushChannel(BytesChannelContext.java:59) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.EventHandler.handleWrite(EventHandler.java:139) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.handleWrite(NioSelector.java:390) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.writeToChannel(NioSelector.java:339) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.SocketChannelContext.sendMessage(SocketChannelContext.java:143) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.transport.nio.MockNioTransport$MockSocketChannel.sendMessage(MockNioTransport.java:314) ~[framework-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.transport.OutboundHandler.internalSendMessage(OutboundHandler.java:80) ~[main/:?]
1> at org.elasticsearch.transport.OutboundHandler.sendMessage(OutboundHandler.java:70) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.sendResponse(TcpTransport.java:737) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.lambda$new$1(TcpTransport.java:162) ~[main/:?]
1> at org.elasticsearch.transport.TransportHandshaker.handleHandshake(TransportHandshaker.java:98) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.handleRequest(TcpTransport.java:1018) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.messageReceived(TcpTransport.java:921) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.inboundMessage(TcpTransport.java:752) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.consumeNetworkReads(TcpTransport.java:779) ~[main/:?]
1> at org.elasticsearch.transport.nio.MockNioTransport$MockTcpReadWriteHandler.consumeReads(MockNioTransport.java:241) ~[framework-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.SocketChannelContext.handleReadBytes(SocketChannelContext.java:213) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.BytesChannelContext.read(BytesChannelContext.java:47) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.EventHandler.handleRead(EventHandler.java:119) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.handleRead(NioSelector.java:398) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.processKey(NioSelector.java:246) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.singleLoop(NioSelector.java:172) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.runLoop(NioSelector.java:129) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at java.lang.Thread.run(Thread.java:748) [?:1.8.0_202]
1> [2019-01-29T15:45:10,495][WARN ][o.e.t.TransportService ] [node_s1] Received response for a request that has timed out, sent [30076ms] ago, timed out [0ms] ago, action [internal:coordination/fault_detection/follower_check], node [{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907}], id [146]
1> [2019-01-29T15:45:10,655][INFO ][o.e.c.m.MetaDataDeleteIndexService] [node_s1] [test/Xna3aYPaSLezRRHL3OvARQ] deleting index
1> [2019-01-29T15:45:11,051][INFO ][o.e.c.m.MetaDataIndexTemplateService] [node_s1] removing template [random_index_template]
1> [2019-01-29T15:45:11,084][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] no modules loaded
1> [2019-01-29T15:45:11,085][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] loaded plugin [org.elasticsearch.transport.nio.MockNioTransportPlugin]
1> [2019-01-29T15:45:11,176][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] [HotThreadsIT#testHotThreadsDontFail]: cleaned up after test
1> [2019-01-29T15:45:11,177][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] after test
ERROR 44.7s J3 | HotThreadsIT.testHotThreadsDontFail <<< FAILURES!
> Throwable #1: NoNodeAvailableException[None of the configured nodes are available: [{#transport#-1}{EF_FcOpLTPeZQ_LUVd5MNA}{127.0.0.1}{127.0.0.1:43437}]]
> at __randomizedtesting.SeedInfo.seed([233C30BFCE2B7117:71D6155E6A3F7E85]:0)
> at org.elasticsearch.client.transport.TransportClientNodesService.ensureNodesAreAvailable(TransportClientNodesService.java:351)
> at org.elasticsearch.client.transport.TransportClientNodesService.execute(TransportClientNodesService.java:249)
> at org.elasticsearch.client.transport.TransportProxyClient.execute(TransportProxyClient.java:57)
> at org.elasticsearch.client.transport.TransportClient.doExecute(TransportClient.java:386)
> at org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:393)
> at org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:382)
> at org.elasticsearch.action.ActionRequestBuilder.execute(ActionRequestBuilder.java:45)
> at org.elasticsearch.action.ActionRequestBuilder.get(ActionRequestBuilder.java:52)
> at org.elasticsearch.action.admin.HotThreadsIT.testHotThreadsDontFail(HotThreadsIT.java:125)
> at java.lang.Thread.run(Thread.java:748)
```
| 1.0 | [CI] HotThreadsIT.testHotThreadsDontFail failure on master - Logs: https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+multijob-unix-compatibility/os=centos/211/console
REPRODUCE WITH:
```
/gradlew :server:integTest \
-Dtests.seed=233C30BFCE2B7117 \
-Dtests.class=org.elasticsearch.action.admin.HotThreadsIT \
-Dtests.method="testHotThreadsDontFail" \
-Dtests.security.manager=true \
-Dtests.locale=es-MX \
-Dtests.timezone=Asia/Yerevan \
-Dcompiler.java=11 \
-Druntime.java=8
```
Couldn't reproduce locally (100+ iterations)
```
1> [2019-01-29T15:44:34,933][INFO ][o.e.c.c.Coordinator ] [node_s1] setting initial configuration to VotingConfiguration{FOMFnLR6RaC0dEzMnFkJ1A,saAXE5n_SbeS_kPuGtZ9eQ,{bootstrap-placeholder}-node_s2}
1> [2019-01-29T15:44:35,350][INFO ][o.e.c.s.MasterService ] [node_s1] elected-as-master ([2] nodes joined)[{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907} elect leader, {node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437} elect leader, _BECOME_MASTER_TASK_, _FINISH_ELECTION_], node-join[{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242} join existing leader], term: 1, version: 1, reason: master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907},{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242},}
1> [2019-01-29T15:44:35,492][INFO ][o.e.c.s.ClusterApplierService] [node_s0] master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437},{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242},}, term: 1, version: 1, reason: ApplyCommitRequest{term=1, version=1, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
2> REPRODUCE WITH: ./gradlew :server:integTest -Dtests.seed=233C30BFCE2B7117 -Dtests.class=org.elasticsearch.action.admin.HotThreadsIT -Dtests.method="testHotThreadsDontFail" -Dtests.security.manager=true -Dtests.locale=es-MX -Dtests.timezone=Asia/Yerevan -Dcompiler.java=11 -Druntime.java=8
1> [2019-01-29T15:44:35,494][INFO ][o.e.c.s.ClusterApplierService] [node_s2] master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437},{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907},}, term: 1, version: 1, reason: ApplyCommitRequest{term=1, version=1, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
2> NOTE: leaving temporary files on disk at: /var/lib/jenkins/workspace/elastic+elasticsearch+master+multijob-unix-compatibility/os/centos/server/build/testrun/integTest/J3/temp/org.elasticsearch.action.admin.HotThreadsIT_233C30BFCE2B7117-001
2> NOTE: test params are: codec=Asserting(Lucene80): {field1.keyword=PostingsFormat(name=Asserting), field1=PostingsFormat(name=Asserting), _id=PostingsFormat(name=Asserting)}, docValues:{field1.keyword=DocValuesFormat(name=Lucene70), _seq_no=DocValuesFormat(name=Lucene70), _primary_term=DocValuesFormat(name=Lucene70), _version=DocValuesFormat(name=Lucene70)}, maxPointsInLeafNode=128, maxMBSortInHeap=5.534645509088748, sim=Asserting(org.apache.lucene.search.similarities.AssertingSimilarity@7769dd0e), locale=es-MX, timezone=Asia/Yerevan
2> NOTE: Linux 2.6.32-754.10.1.el6.x86_64 amd64/Oracle Corporation 1.8.0_202 (64-bit)/cpus=16,threads=1,free=465545688,total=513802240
1> [2019-01-29T15:44:35,497][INFO ][o.e.n.Node ] [integ_1] started
2> NOTE: All tests run in this JVM: [HotThreadsIT]
1> [2019-01-29T15:44:35,497][INFO ][o.e.n.Node ] [integ_3] started
1> [2019-01-29T15:44:35,504][INFO ][o.e.c.s.ClusterApplierService] [node_s1] master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907},{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242},}, term: 1, version: 1, reason: Publication{term=1, version=1}
1> [2019-01-29T15:44:35,516][INFO ][o.e.n.Node ] [integ_2] started
1> [2019-01-29T15:44:35,544][INFO ][o.e.c.s.MasterService ] [node_s1] node-join[{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343} join existing leader], term: 1, version: 2, reason: added {{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343},}
1> [2019-01-29T15:44:35,578][INFO ][o.e.c.s.ClusterApplierService] [node_s2] added {{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343},}, term: 1, version: 2, reason: ApplyCommitRequest{term=1, version=2, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
1> [2019-01-29T15:44:35,578][INFO ][o.e.c.s.ClusterApplierService] [node_sc3] master node changed {previous [], current [{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}]}, added {{node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437},{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907},{node_s2}{2TYkOhZXTt-QaPNJgYFNsw}{DbhzCUXTR7SBzAU85okUDQ}{127.0.0.1}{127.0.0.1:41242},}, term: 1, version: 2, reason: ApplyCommitRequest{term=1, version=2, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
1> [2019-01-29T15:44:35,579][INFO ][o.e.n.Node ] [integ_4] started
1> [2019-01-29T15:44:35,580][INFO ][o.e.c.s.ClusterApplierService] [node_s0] added {{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343},}, term: 1, version: 2, reason: ApplyCommitRequest{term=1, version=2, sourceNode={node_s1}{saAXE5n_SbeS_kPuGtZ9eQ}{IlVsI13pT3m97zB9kigMBw}{127.0.0.1}{127.0.0.1:43437}}
1> [2019-01-29T15:44:35,633][INFO ][o.e.c.s.ClusterApplierService] [node_s1] added {{node_sc3}{aV_f9mFyTOWlZhplwSEfxQ}{qceQ1ZilTLikPSqFG3IJ4w}{127.0.0.1}{127.0.0.1:45343},}, term: 1, version: 2, reason: Publication{term=1, version=2}
1> [2019-01-29T15:44:35,750][INFO ][o.e.g.GatewayService ] [node_s1] recovered [0] indices into cluster_state
1> [2019-01-29T15:44:36,331][INFO ][o.e.c.m.MetaDataIndexTemplateService] [node_s1] adding template [random_index_template] for index patterns [*]
1> [2019-01-29T15:44:36,402][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] [HotThreadsIT#testHotThreadsDontFail]: all set up test
1> [2019-01-29T15:44:36,416][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] using custom data_path for index: [HudQrFRmGG]
1> [2019-01-29T15:44:36,455][INFO ][o.e.c.m.MetaDataCreateIndexService] [node_s1] [test] creating index, cause [api], templates [random_index_template], shards [6]/[1], mappings []
1> [2019-01-29T15:44:37,806][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] Index [3] docs async: [true] bulk: [false]
1> [2019-01-29T15:44:38,270][INFO ][o.e.c.r.a.AllocationService] [node_s1] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[test][5], [test][1], [test][0], [test][3], [test][2]] ...]).
1> [2019-01-29T15:44:38,427][INFO ][o.e.c.m.MetaDataMappingService] [node_s1] [test/Xna3aYPaSLezRRHL3OvARQ] create_mapping [type1]
1> [2019-01-29T15:44:40,095][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] no modules loaded
1> [2019-01-29T15:44:40,095][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] loaded plugin [org.elasticsearch.transport.nio.MockNioTransportPlugin]
1> [2019-01-29T15:44:40,318][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] no modules loaded
1> [2019-01-29T15:44:40,318][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] loaded plugin [org.elasticsearch.transport.nio.MockNioTransportPlugin]
1> [2019-01-29T15:45:10,475][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] [HotThreadsIT#testHotThreadsDontFail]: cleaning up after test
1> [2019-01-29T15:45:10,487][WARN ][o.e.t.OutboundHandler ] [node_s1] send message failed [channel: NioSocketChannel{localAddress=/127.0.0.1:43437, remoteAddress=/127.0.0.1:57414}]
1> java.io.IOException: Connection reset by peer
1> at sun.nio.ch.FileDispatcherImpl.write0(Native Method) ~[?:?]
1> at sun.nio.ch.SocketDispatcher.write(SocketDispatcher.java:47) ~[?:?]
1> at sun.nio.ch.IOUtil.writeFromNativeBuffer(IOUtil.java:93) ~[?:?]
1> at sun.nio.ch.IOUtil.write(IOUtil.java:51) ~[?:?]
1> at sun.nio.ch.SocketChannelImpl.write(SocketChannelImpl.java:471) ~[?:?]
1> at org.elasticsearch.nio.SocketChannelContext.flushToChannel(SocketChannelContext.java:336) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.BytesChannelContext.singleFlush(BytesChannelContext.java:87) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.BytesChannelContext.flushChannel(BytesChannelContext.java:59) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.EventHandler.handleWrite(EventHandler.java:139) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.handleWrite(NioSelector.java:390) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.writeToChannel(NioSelector.java:339) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.SocketChannelContext.sendMessage(SocketChannelContext.java:143) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.transport.nio.MockNioTransport$MockSocketChannel.sendMessage(MockNioTransport.java:314) ~[framework-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.transport.OutboundHandler.internalSendMessage(OutboundHandler.java:80) ~[main/:?]
1> at org.elasticsearch.transport.OutboundHandler.sendMessage(OutboundHandler.java:70) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.sendResponse(TcpTransport.java:737) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.lambda$new$1(TcpTransport.java:162) ~[main/:?]
1> at org.elasticsearch.transport.TransportHandshaker.handleHandshake(TransportHandshaker.java:98) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.handleRequest(TcpTransport.java:1018) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.messageReceived(TcpTransport.java:921) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.inboundMessage(TcpTransport.java:752) ~[main/:?]
1> at org.elasticsearch.transport.TcpTransport.consumeNetworkReads(TcpTransport.java:779) ~[main/:?]
1> at org.elasticsearch.transport.nio.MockNioTransport$MockTcpReadWriteHandler.consumeReads(MockNioTransport.java:241) ~[framework-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.SocketChannelContext.handleReadBytes(SocketChannelContext.java:213) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.BytesChannelContext.read(BytesChannelContext.java:47) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.EventHandler.handleRead(EventHandler.java:119) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.handleRead(NioSelector.java:398) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.processKey(NioSelector.java:246) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.singleLoop(NioSelector.java:172) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at org.elasticsearch.nio.NioSelector.runLoop(NioSelector.java:129) ~[elasticsearch-nio-7.0.0-SNAPSHOT.jar:7.0.0-SNAPSHOT]
1> at java.lang.Thread.run(Thread.java:748) [?:1.8.0_202]
1> [2019-01-29T15:45:10,495][WARN ][o.e.t.TransportService ] [node_s1] Received response for a request that has timed out, sent [30076ms] ago, timed out [0ms] ago, action [internal:coordination/fault_detection/follower_check], node [{node_s0}{FOMFnLR6RaC0dEzMnFkJ1A}{6t1ue7wmTM626qcAoGXuVw}{127.0.0.1}{127.0.0.1:35907}], id [146]
1> [2019-01-29T15:45:10,655][INFO ][o.e.c.m.MetaDataDeleteIndexService] [node_s1] [test/Xna3aYPaSLezRRHL3OvARQ] deleting index
1> [2019-01-29T15:45:11,051][INFO ][o.e.c.m.MetaDataIndexTemplateService] [node_s1] removing template [random_index_template]
1> [2019-01-29T15:45:11,084][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] no modules loaded
1> [2019-01-29T15:45:11,085][INFO ][o.e.p.PluginsService ] [testHotThreadsDontFail] loaded plugin [org.elasticsearch.transport.nio.MockNioTransportPlugin]
1> [2019-01-29T15:45:11,176][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] [HotThreadsIT#testHotThreadsDontFail]: cleaned up after test
1> [2019-01-29T15:45:11,177][INFO ][o.e.a.a.HotThreadsIT ] [testHotThreadsDontFail] after test
ERROR 44.7s J3 | HotThreadsIT.testHotThreadsDontFail <<< FAILURES!
> Throwable #1: NoNodeAvailableException[None of the configured nodes are available: [{#transport#-1}{EF_FcOpLTPeZQ_LUVd5MNA}{127.0.0.1}{127.0.0.1:43437}]]
> at __randomizedtesting.SeedInfo.seed([233C30BFCE2B7117:71D6155E6A3F7E85]:0)
> at org.elasticsearch.client.transport.TransportClientNodesService.ensureNodesAreAvailable(TransportClientNodesService.java:351)
> at org.elasticsearch.client.transport.TransportClientNodesService.execute(TransportClientNodesService.java:249)
> at org.elasticsearch.client.transport.TransportProxyClient.execute(TransportProxyClient.java:57)
> at org.elasticsearch.client.transport.TransportClient.doExecute(TransportClient.java:386)
> at org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:393)
> at org.elasticsearch.client.support.AbstractClient.execute(AbstractClient.java:382)
> at org.elasticsearch.action.ActionRequestBuilder.execute(ActionRequestBuilder.java:45)
> at org.elasticsearch.action.ActionRequestBuilder.get(ActionRequestBuilder.java:52)
> at org.elasticsearch.action.admin.HotThreadsIT.testHotThreadsDontFail(HotThreadsIT.java:125)
> at java.lang.Thread.run(Thread.java:748)
```
| non_priority | hotthreadsit testhotthreadsdontfail failure on master logs reproduce with gradlew server integtest dtests seed dtests class org elasticsearch action admin hotthreadsit dtests method testhotthreadsdontfail dtests security manager true dtests locale es mx dtests timezone asia yerevan dcompiler java druntime java couldn t reproduce locally iterations setting initial configuration to votingconfiguration sbes bootstrap placeholder node elected as master nodes joined node join term version reason master node changed previous current added node node qapnjgyfnsw master node changed previous current added node sbes node qapnjgyfnsw term version reason applycommitrequest term version sourcenode node sbes reproduce with gradlew server integtest dtests seed dtests class org elasticsearch action admin hotthreadsit dtests method testhotthreadsdontfail dtests security manager true dtests locale es mx dtests timezone asia yerevan dcompiler java druntime java master node changed previous current added node sbes node term version reason applycommitrequest term version sourcenode node sbes note leaving temporary files on disk at var lib jenkins workspace elastic elasticsearch master multijob unix compatibility os centos server build testrun integtest temp org elasticsearch action admin hotthreadsit note test params are codec asserting keyword postingsformat name asserting postingsformat name asserting id postingsformat name asserting docvalues keyword docvaluesformat name seq no docvaluesformat name primary term docvaluesformat name version docvaluesformat name maxpointsinleafnode maxmbsortinheap sim asserting org apache lucene search similarities assertingsimilarity locale es mx timezone asia yerevan note linux oracle corporation bit cpus threads free total started note all tests run in this jvm started master node changed previous current added node node qapnjgyfnsw term version reason publication term version started node join term version reason added node av added node av term version reason applycommitrequest term version sourcenode node sbes master node changed previous current added node sbes node node qapnjgyfnsw term version reason applycommitrequest term version sourcenode node sbes started added node av term version reason applycommitrequest term version sourcenode node sbes added node av term version reason publication term version recovered indices into cluster state adding template for index patterns all set up test using custom data path for index creating index cause templates shards mappings index docs async bulk cluster health status changed from to reason create mapping no modules loaded loaded plugin no modules loaded loaded plugin cleaning up after test send message failed java io ioexception connection reset by peer at sun nio ch filedispatcherimpl native method at sun nio ch socketdispatcher write socketdispatcher java at sun nio ch ioutil writefromnativebuffer ioutil java at sun nio ch ioutil write ioutil java at sun nio ch socketchannelimpl write socketchannelimpl java at org elasticsearch nio socketchannelcontext flushtochannel socketchannelcontext java at org elasticsearch nio byteschannelcontext singleflush byteschannelcontext java at org elasticsearch nio byteschannelcontext flushchannel byteschannelcontext java at org elasticsearch nio eventhandler handlewrite eventhandler java at org elasticsearch nio nioselector handlewrite nioselector java at org elasticsearch nio nioselector writetochannel nioselector java at org elasticsearch nio socketchannelcontext sendmessage socketchannelcontext java at org elasticsearch transport nio mockniotransport mocksocketchannel sendmessage mockniotransport java at org elasticsearch transport outboundhandler internalsendmessage outboundhandler java at org elasticsearch transport outboundhandler sendmessage outboundhandler java at org elasticsearch transport tcptransport sendresponse tcptransport java at org elasticsearch transport tcptransport lambda new tcptransport java at org elasticsearch transport transporthandshaker handlehandshake transporthandshaker java at org elasticsearch transport tcptransport handlerequest tcptransport java at org elasticsearch transport tcptransport messagereceived tcptransport java at org elasticsearch transport tcptransport inboundmessage tcptransport java at org elasticsearch transport tcptransport consumenetworkreads tcptransport java at org elasticsearch transport nio mockniotransport mocktcpreadwritehandler consumereads mockniotransport java at org elasticsearch nio socketchannelcontext handlereadbytes socketchannelcontext java at org elasticsearch nio byteschannelcontext read byteschannelcontext java at org elasticsearch nio eventhandler handleread eventhandler java at org elasticsearch nio nioselector handleread nioselector java at org elasticsearch nio nioselector processkey nioselector java at org elasticsearch nio nioselector singleloop nioselector java at org elasticsearch nio nioselector runloop nioselector java at java lang thread run thread java received response for a request that has timed out sent ago timed out ago action node id deleting index removing template no modules loaded loaded plugin cleaned up after test after test error hotthreadsit testhotthreadsdontfail failures throwable nonodeavailableexception at randomizedtesting seedinfo seed at org elasticsearch client transport transportclientnodesservice ensurenodesareavailable transportclientnodesservice java at org elasticsearch client transport transportclientnodesservice execute transportclientnodesservice java at org elasticsearch client transport transportproxyclient execute transportproxyclient java at org elasticsearch client transport transportclient doexecute transportclient java at org elasticsearch client support abstractclient execute abstractclient java at org elasticsearch client support abstractclient execute abstractclient java at org elasticsearch action actionrequestbuilder execute actionrequestbuilder java at org elasticsearch action actionrequestbuilder get actionrequestbuilder java at org elasticsearch action admin hotthreadsit testhotthreadsdontfail hotthreadsit java at java lang thread run thread java | 0 |
77,241 | 9,985,477,727 | IssuesEvent | 2019-07-10 16:39:14 | HaxeFoundation/haxe | https://api.github.com/repos/HaxeFoundation/haxe | closed | Date.getTime documentation should be improved | Hacktoberfest documentation help wanted standard library | The [Date.getTime()](https://github.com/HaxeFoundation/haxe/blob/development/std/Date.hx#L53-L56) [documentation](http://api.haxe.org/Date.html#getTime) states:
> Returns the timestamp of the date. It might only have a per-second precision depending on the platforms.
The word _might_ is not ideal in technical documents, and could turn off potential Haxe users perusing the docs. And handling time is a pretty common task.
I think the docs could be improved by stating exactly which platforms have which resolution. Running a quick test on Linux, I see:
Second resolution: cpp, neko
Millisecond resolution: php, python, java, flash, js
(I couldn't test C#)
Is it actually platform dependent (cpp on linux vs win vs iOS), or merely target language dependent?
Perhaps note Sys.time() for getting the current timestamp on cpp, cs, java, macro, neko, php, python
Thus, I might suggest something like (updated per conversation below):
> Returns the timestamp of this Date in milliseconds.
>
> Note that in cpp and neko targets Date only supports second resolution (e.g. 1454698271000.) To obtain the current timestamp with better precision, see the Sys.time API.
| 1.0 | Date.getTime documentation should be improved - The [Date.getTime()](https://github.com/HaxeFoundation/haxe/blob/development/std/Date.hx#L53-L56) [documentation](http://api.haxe.org/Date.html#getTime) states:
> Returns the timestamp of the date. It might only have a per-second precision depending on the platforms.
The word _might_ is not ideal in technical documents, and could turn off potential Haxe users perusing the docs. And handling time is a pretty common task.
I think the docs could be improved by stating exactly which platforms have which resolution. Running a quick test on Linux, I see:
Second resolution: cpp, neko
Millisecond resolution: php, python, java, flash, js
(I couldn't test C#)
Is it actually platform dependent (cpp on linux vs win vs iOS), or merely target language dependent?
Perhaps note Sys.time() for getting the current timestamp on cpp, cs, java, macro, neko, php, python
Thus, I might suggest something like (updated per conversation below):
> Returns the timestamp of this Date in milliseconds.
>
> Note that in cpp and neko targets Date only supports second resolution (e.g. 1454698271000.) To obtain the current timestamp with better precision, see the Sys.time API.
| non_priority | date gettime documentation should be improved the states returns the timestamp of the date it might only have a per second precision depending on the platforms the word might is not ideal in technical documents and could turn off potential haxe users perusing the docs and handling time is a pretty common task i think the docs could be improved by stating exactly which platforms have which resolution running a quick test on linux i see second resolution cpp neko millisecond resolution php python java flash js i couldn t test c is it actually platform dependent cpp on linux vs win vs ios or merely target language dependent perhaps note sys time for getting the current timestamp on cpp cs java macro neko php python thus i might suggest something like updated per conversation below returns the timestamp of this date in milliseconds note that in cpp and neko targets date only supports second resolution e g to obtain the current timestamp with better precision see the sys time api | 0 |
608,740 | 18,847,870,227 | IssuesEvent | 2021-11-11 16:53:23 | wellcomecollection/wellcomecollection.org | https://api.github.com/repos/wellcomecollection/wellcomecollection.org | closed | Change email flow mixed up with membership flow | type: bug epic: requesting priority: medium needs: ux needs: dev | ### Problem
When a user changes their email address from the account page, this puts them into the same email verification flow that happens during new account creation.
* They are redirected to a page that talks about verifying their account.
* The link in the verification email takes them to a confirmation that says they have confirmed their account.
* They get an email verified email that says the library team will confirm their membership within 72 hrs.
* They get a welcome email that thanks them for applying for a membership and repeats the 72 hrs, plus asks them to bring in ID.
I don't think we can go live with this, it's potentially far too confusing for existing members who change their email address.
### Suggestion
We should change the Auth0 email verification templates back to being just that - things that only mention verifying your email address, removing all mentions of library membership and not send the new member email.
We should treat new membership emails, including information about membership approval, as a separate problem that gets looked at as part of the membership work. | 1.0 | Change email flow mixed up with membership flow - ### Problem
When a user changes their email address from the account page, this puts them into the same email verification flow that happens during new account creation.
* They are redirected to a page that talks about verifying their account.
* The link in the verification email takes them to a confirmation that says they have confirmed their account.
* They get an email verified email that says the library team will confirm their membership within 72 hrs.
* They get a welcome email that thanks them for applying for a membership and repeats the 72 hrs, plus asks them to bring in ID.
I don't think we can go live with this, it's potentially far too confusing for existing members who change their email address.
### Suggestion
We should change the Auth0 email verification templates back to being just that - things that only mention verifying your email address, removing all mentions of library membership and not send the new member email.
We should treat new membership emails, including information about membership approval, as a separate problem that gets looked at as part of the membership work. | priority | change email flow mixed up with membership flow problem when a user changes their email address from the account page this puts them into the same email verification flow that happens during new account creation they are redirected to a page that talks about verifying their account the link in the verification email takes them to a confirmation that says they have confirmed their account they get an email verified email that says the library team will confirm their membership within hrs they get a welcome email that thanks them for applying for a membership and repeats the hrs plus asks them to bring in id i don t think we can go live with this it s potentially far too confusing for existing members who change their email address suggestion we should change the email verification templates back to being just that things that only mention verifying your email address removing all mentions of library membership and not send the new member email we should treat new membership emails including information about membership approval as a separate problem that gets looked at as part of the membership work | 1 |
110,100 | 16,976,946,140 | IssuesEvent | 2021-06-30 01:21:17 | LevyForch/SilverKing | https://api.github.com/repos/LevyForch/SilverKing | opened | CVE-2020-11619 (High) detected in jackson-databind-2.6.7.1.jar | security vulnerability | ## CVE-2020-11619 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: SilverKing/lib/aws-java-sdk-1.11.333/third-party/lib/jackson-databind-2.6.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.7.1.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).
<p>Publish Date: 2020-04-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11619>CVE-2020-11619</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619</a></p>
<p>Release Date: 2020-04-07</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-11619 (High) detected in jackson-databind-2.6.7.1.jar - ## CVE-2020-11619 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: SilverKing/lib/aws-java-sdk-1.11.333/third-party/lib/jackson-databind-2.6.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.6.7.1.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).
<p>Publish Date: 2020-04-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11619>CVE-2020-11619</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619</a></p>
<p>Release Date: 2020-04-07</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library silverking lib aws java sdk third party lib jackson databind jar dependency hierarchy x jackson databind jar vulnerable library vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org springframework aop config methodlocatingfactorybean aka spring aop publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
169,385 | 14,219,467,969 | IssuesEvent | 2020-11-17 13:19:49 | department-of-veterans-affairs/va.gov-team | https://api.github.com/repos/department-of-veterans-affairs/va.gov-team | closed | [Discovery] - Topline summary for wizard migration research | documentation research ux vsa-public-websites | Create topline summary [based on this template](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/teams/vsa/design/topline-summary-template.md) after conclusion of final session and share with team.
**AC**
- [x] Summary created and posted in GH
- [x] Schedule meeting to review w/ team
- [ ] Feedback from team gathered and captured for incorporation into final analysis | 1.0 | [Discovery] - Topline summary for wizard migration research - Create topline summary [based on this template](https://github.com/department-of-veterans-affairs/va.gov-team/blob/master/teams/vsa/design/topline-summary-template.md) after conclusion of final session and share with team.
**AC**
- [x] Summary created and posted in GH
- [x] Schedule meeting to review w/ team
- [ ] Feedback from team gathered and captured for incorporation into final analysis | non_priority | topline summary for wizard migration research create topline summary after conclusion of final session and share with team ac summary created and posted in gh schedule meeting to review w team feedback from team gathered and captured for incorporation into final analysis | 0 |
819,735 | 30,749,802,092 | IssuesEvent | 2023-07-28 18:07:39 | streamlit/streamlit | https://api.github.com/repos/streamlit/streamlit | closed | replace deprecated imghdr library | type:bug area:dependencies status:confirmed priority:P1 | ### Checklist
- [X] I have searched the [existing issues](https://github.com/streamlit/streamlit/issues) for similar issues.
- [X] I added a very descriptive title to this issue.
- [X] I have provided sufficient information below to help reproduce this issue.
### Summary
The `imghdr` module is deprecated in Python 3.11 by [PEP 594](https://peps.python.org/pep-0594/#imghdr) and is slated for removal in Python 3.13.
Streamlit always imports it.
Pypi modules offering similar functionality include
- [Pillow](https://pypi.org/project/Pillow)
- [python-magic](https://pypi.org/project/python-magic)
- [filetype](https://pypi.org/project/filetype)
- [imagesize](https://pypi.org/project/imagesize)
Please let me know how you'd like to proceed,
perhaps by picking one of those
and asking me to code up a PR for it.
### Reproducible Code Example
_No response_
### Steps To Reproduce
```
$ python --version
Python 3.11.4
$
$ python -c 'import streamlit'
# [succeeds]
$
$ python -W error -c 'import streamlit'
[stacktrace due to: import imghdr, from streamlit/elements/image.py line 22]
DeprecationWarning: 'imghdr' is deprecated and slated for removal in Python 3.13
```
### Expected Behavior
The `-W error` invocation should succeed silently.
### Current Behavior
We see a stacktrace mentioning that
```
'imghdr' is deprecated
```
(This is a regression in the environment, rather than in the streamlit codebase.)
### Is this a regression?
- [X] Yes, this used to work in a previous version.
### Debug info
- Streamlit version: 1.24.1
- Python version: 3.11.4
- Operating System: MacOS Monterey 12.6.7
- Browser: firefox 115.0.2
### Additional Information
_No response_ | 1.0 | replace deprecated imghdr library - ### Checklist
- [X] I have searched the [existing issues](https://github.com/streamlit/streamlit/issues) for similar issues.
- [X] I added a very descriptive title to this issue.
- [X] I have provided sufficient information below to help reproduce this issue.
### Summary
The `imghdr` module is deprecated in Python 3.11 by [PEP 594](https://peps.python.org/pep-0594/#imghdr) and is slated for removal in Python 3.13.
Streamlit always imports it.
Pypi modules offering similar functionality include
- [Pillow](https://pypi.org/project/Pillow)
- [python-magic](https://pypi.org/project/python-magic)
- [filetype](https://pypi.org/project/filetype)
- [imagesize](https://pypi.org/project/imagesize)
Please let me know how you'd like to proceed,
perhaps by picking one of those
and asking me to code up a PR for it.
### Reproducible Code Example
_No response_
### Steps To Reproduce
```
$ python --version
Python 3.11.4
$
$ python -c 'import streamlit'
# [succeeds]
$
$ python -W error -c 'import streamlit'
[stacktrace due to: import imghdr, from streamlit/elements/image.py line 22]
DeprecationWarning: 'imghdr' is deprecated and slated for removal in Python 3.13
```
### Expected Behavior
The `-W error` invocation should succeed silently.
### Current Behavior
We see a stacktrace mentioning that
```
'imghdr' is deprecated
```
(This is a regression in the environment, rather than in the streamlit codebase.)
### Is this a regression?
- [X] Yes, this used to work in a previous version.
### Debug info
- Streamlit version: 1.24.1
- Python version: 3.11.4
- Operating System: MacOS Monterey 12.6.7
- Browser: firefox 115.0.2
### Additional Information
_No response_ | priority | replace deprecated imghdr library checklist i have searched the for similar issues i added a very descriptive title to this issue i have provided sufficient information below to help reproduce this issue summary the imghdr module is deprecated in python by and is slated for removal in python streamlit always imports it pypi modules offering similar functionality include please let me know how you d like to proceed perhaps by picking one of those and asking me to code up a pr for it reproducible code example no response steps to reproduce python version python python c import streamlit python w error c import streamlit deprecationwarning imghdr is deprecated and slated for removal in python expected behavior the w error invocation should succeed silently current behavior we see a stacktrace mentioning that imghdr is deprecated this is a regression in the environment rather than in the streamlit codebase is this a regression yes this used to work in a previous version debug info streamlit version python version operating system macos monterey browser firefox additional information no response | 1 |
734,070 | 25,337,385,749 | IssuesEvent | 2022-11-18 18:03:21 | nanoframework/Home | https://api.github.com/repos/nanoframework/Home | closed | Bug in json library unit test | Type: Bug trivial up-for-grabs good first issue Priority: Low Area: CL-nanoFramework.Json | ### Library/API/IoT binding
json library
### Visual Studio version
_No response_
### .NET nanoFramework extension version
_No response_
### Target name(s)
_No response_
### Firmware version
_No response_
### Device capabilities
_No response_
### Description
Sonarcloud is reporting a bug that needs to be addressed:
https://sonarcloud.io/project/issues?resolved=false&sinceLeakPeriod=true&types=BUG&id=nanoframework_lib-nanoFramework.Json&open=AYQKFaUbLqvlGbRq34ta
### How to reproduce
_No response_
### Expected behaviour
_No response_
### Screenshots
_No response_
### Sample project or code
_No response_
### Aditional information
_No response_ | 1.0 | Bug in json library unit test - ### Library/API/IoT binding
json library
### Visual Studio version
_No response_
### .NET nanoFramework extension version
_No response_
### Target name(s)
_No response_
### Firmware version
_No response_
### Device capabilities
_No response_
### Description
Sonarcloud is reporting a bug that needs to be addressed:
https://sonarcloud.io/project/issues?resolved=false&sinceLeakPeriod=true&types=BUG&id=nanoframework_lib-nanoFramework.Json&open=AYQKFaUbLqvlGbRq34ta
### How to reproduce
_No response_
### Expected behaviour
_No response_
### Screenshots
_No response_
### Sample project or code
_No response_
### Aditional information
_No response_ | priority | bug in json library unit test library api iot binding json library visual studio version no response net nanoframework extension version no response target name s no response firmware version no response device capabilities no response description sonarcloud is reporting a bug that needs to be addressed how to reproduce no response expected behaviour no response screenshots no response sample project or code no response aditional information no response | 1 |
71,804 | 30,921,517,293 | IssuesEvent | 2023-08-06 00:46:53 | Zahlungsmittel/Zahlungsmittel | https://api.github.com/repos/Zahlungsmittel/Zahlungsmittel | opened | [CLOSED] refactor(backend): eslint security | refactor service: backend imported | <a href="https://github.com/ulfgebhardt"><img src="https://avatars.githubusercontent.com/u/1238238?v=4" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [ulfgebhardt](https://github.com/ulfgebhardt)**
_Wednesday May 10, 2023 at 10:20 GMT_
_Originally opened as https://github.com/gradido/gradido/pull/2980_
----
<!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates -->
## 🍰 Pullrequest
<!-- Describe the Pullrequest. Use Screenshots if possible. -->
This PR introduces the `eslint-security` plugin, which does code analysis to warn about potential security issues.
While the PR fixes one security issue, it it ignores the remaining 9 since its either not a security concern or its not an easy fix.
The EMail Regex is a potential security flaw we have in our code(could run for long and if utilized correctly it could lead to an ddos attack) - lacking of an immediate solution I decided to ignore this issue.
The benefit is that, when merged, developers will be warned about potential security flaws they introduce with their code.
### Issues
<!-- Which Issues does this fix, which are related?
- fixes #XXX
- relates #XXX
-->
- based on #2979
### Todo
<!-- In case some parts are still missing, list them here. -->
- [X] None
----
_**[ulfgebhardt](https://github.com/ulfgebhardt)** included the following code: https://github.com/gradido/gradido/pull/2980/commits_
| 1.0 | [CLOSED] refactor(backend): eslint security - <a href="https://github.com/ulfgebhardt"><img src="https://avatars.githubusercontent.com/u/1238238?v=4" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [ulfgebhardt](https://github.com/ulfgebhardt)**
_Wednesday May 10, 2023 at 10:20 GMT_
_Originally opened as https://github.com/gradido/gradido/pull/2980_
----
<!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates -->
## 🍰 Pullrequest
<!-- Describe the Pullrequest. Use Screenshots if possible. -->
This PR introduces the `eslint-security` plugin, which does code analysis to warn about potential security issues.
While the PR fixes one security issue, it it ignores the remaining 9 since its either not a security concern or its not an easy fix.
The EMail Regex is a potential security flaw we have in our code(could run for long and if utilized correctly it could lead to an ddos attack) - lacking of an immediate solution I decided to ignore this issue.
The benefit is that, when merged, developers will be warned about potential security flaws they introduce with their code.
### Issues
<!-- Which Issues does this fix, which are related?
- fixes #XXX
- relates #XXX
-->
- based on #2979
### Todo
<!-- In case some parts are still missing, list them here. -->
- [X] None
----
_**[ulfgebhardt](https://github.com/ulfgebhardt)** included the following code: https://github.com/gradido/gradido/pull/2980/commits_
| non_priority | refactor backend eslint security issue by wednesday may at gmt originally opened as 🍰 pullrequest this pr introduces the eslint security plugin which does code analysis to warn about potential security issues while the pr fixes one security issue it it ignores the remaining since its either not a security concern or its not an easy fix the email regex is a potential security flaw we have in our code could run for long and if utilized correctly it could lead to an ddos attack lacking of an immediate solution i decided to ignore this issue the benefit is that when merged developers will be warned about potential security flaws they introduce with their code issues which issues does this fix which are related fixes xxx relates xxx based on todo none included the following code | 0 |
580,448 | 17,258,173,640 | IssuesEvent | 2021-07-22 01:00:42 | infinyon/fluvio | https://api.github.com/repos/infinyon/fluvio | closed | [Bug]: TLS error in `fluvio install` | CI bug priority/blocked | We noticed in the `CD_Dev` workflow that the `install.sh` script was failing when using `VERSION=latest`:
https://github.com/infinyon/fluvio/runs/3120104226?check_suite_focus=true

After some digging, I figured out that this is a TLS problem introduced in https://github.com/infinyon/fluvio/commit/4ffcaa66376d9bf95232058db4e137d0485be19c when we switched from `fluvio_future::native_tls` to `fluvio_future::openssl_tls`. It affects all http calls in the CLI, which includes `fluvio install` and `fluvio update`.
This was the code change that caused this:
https://github.com/infinyon/fluvio/blob/4ffcaa66376d9bf95232058db4e137d0485be19c/src/cli/src/http.rs#L39-L42 | 1.0 | [Bug]: TLS error in `fluvio install` - We noticed in the `CD_Dev` workflow that the `install.sh` script was failing when using `VERSION=latest`:
https://github.com/infinyon/fluvio/runs/3120104226?check_suite_focus=true

After some digging, I figured out that this is a TLS problem introduced in https://github.com/infinyon/fluvio/commit/4ffcaa66376d9bf95232058db4e137d0485be19c when we switched from `fluvio_future::native_tls` to `fluvio_future::openssl_tls`. It affects all http calls in the CLI, which includes `fluvio install` and `fluvio update`.
This was the code change that caused this:
https://github.com/infinyon/fluvio/blob/4ffcaa66376d9bf95232058db4e137d0485be19c/src/cli/src/http.rs#L39-L42 | priority | tls error in fluvio install we noticed in the cd dev workflow that the install sh script was failing when using version latest after some digging i figured out that this is a tls problem introduced in when we switched from fluvio future native tls to fluvio future openssl tls it affects all http calls in the cli which includes fluvio install and fluvio update this was the code change that caused this | 1 |
272,769 | 29,795,085,523 | IssuesEvent | 2023-06-16 01:09:47 | billmcchesney1/flowgate | https://api.github.com/repos/billmcchesney1/flowgate | closed | CVE-2021-22096 (Medium) detected in multiple libraries - autoclosed | Mend: dependency security vulnerability | ## CVE-2021-22096 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>spring-web-4.3.9.RELEASE.jar</b>, <b>spring-webmvc-4.3.9.RELEASE.jar</b>, <b>spring-core-5.2.6.RELEASE.jar</b>, <b>spring-webmvc-5.2.6.RELEASE.jar</b>, <b>spring-web-5.2.6.RELEASE.jar</b></p></summary>
<p>
<details><summary><b>spring-web-4.3.9.RELEASE.jar</b></p></summary>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /operation-expert/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-hateoas-1.4.7.RELEASE.jar (Root Library)
- spring-boot-starter-web-1.4.7.RELEASE.jar
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
</details>
<details><summary><b>spring-webmvc-4.3.9.RELEASE.jar</b></p></summary>
<p>Spring Web MVC</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /operation-expert/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-webmvc/4.3.9.RELEASE/spring-webmvc-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-hateoas-1.4.7.RELEASE.jar (Root Library)
- spring-boot-starter-web-1.4.7.RELEASE.jar
- :x: **spring-webmvc-4.3.9.RELEASE.jar** (Vulnerable Library)
</details>
<details><summary><b>spring-core-5.2.6.RELEASE.jar</b></p></summary>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /common-restclient/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/5.2.6.RELEASE/spring-core-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-core/5.2.6.RELEASE/spring-core-5.2.6.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-context-support-5.2.6.RELEASE.jar (Root Library)
- :x: **spring-core-5.2.6.RELEASE.jar** (Vulnerable Library)
</details>
<details><summary><b>spring-webmvc-5.2.6.RELEASE.jar</b></p></summary>
<p>Spring Web MVC</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /management/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-webmvc/5.2.6.RELEASE/spring-webmvc-5.2.6.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.2.7.RELEASE.jar (Root Library)
- :x: **spring-webmvc-5.2.6.RELEASE.jar** (Vulnerable Library)
</details>
<details><summary><b>spring-web-5.2.6.RELEASE.jar</b></p></summary>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /adapter-sample/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/canner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/canner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-5.2.6.RELEASE.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/flowgate/commit/dd01a1d4381c7a3b94ba25748c015a094c33088e">dd01a1d4381c7a3b94ba25748c015a094c33088e</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
<p>Publish Date: 2021-10-28
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-22096>CVE-2021-22096</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2021-22096">https://tanzu.vmware.com/security/cve-2021-22096</a></p>
<p>Release Date: 2021-10-28</p>
<p>Fix Resolution: 5.2.18.RELEASE</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
| True | CVE-2021-22096 (Medium) detected in multiple libraries - autoclosed - ## CVE-2021-22096 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>spring-web-4.3.9.RELEASE.jar</b>, <b>spring-webmvc-4.3.9.RELEASE.jar</b>, <b>spring-core-5.2.6.RELEASE.jar</b>, <b>spring-webmvc-5.2.6.RELEASE.jar</b>, <b>spring-web-5.2.6.RELEASE.jar</b></p></summary>
<p>
<details><summary><b>spring-web-4.3.9.RELEASE.jar</b></p></summary>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /operation-expert/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/4.3.9.RELEASE/spring-web-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-hateoas-1.4.7.RELEASE.jar (Root Library)
- spring-boot-starter-web-1.4.7.RELEASE.jar
- :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library)
</details>
<details><summary><b>spring-webmvc-4.3.9.RELEASE.jar</b></p></summary>
<p>Spring Web MVC</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /operation-expert/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-webmvc/4.3.9.RELEASE/spring-webmvc-4.3.9.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-hateoas-1.4.7.RELEASE.jar (Root Library)
- spring-boot-starter-web-1.4.7.RELEASE.jar
- :x: **spring-webmvc-4.3.9.RELEASE.jar** (Vulnerable Library)
</details>
<details><summary><b>spring-core-5.2.6.RELEASE.jar</b></p></summary>
<p>Spring Core</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /common-restclient/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-core/5.2.6.RELEASE/spring-core-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-core/5.2.6.RELEASE/spring-core-5.2.6.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-context-support-5.2.6.RELEASE.jar (Root Library)
- :x: **spring-core-5.2.6.RELEASE.jar** (Vulnerable Library)
</details>
<details><summary><b>spring-webmvc-5.2.6.RELEASE.jar</b></p></summary>
<p>Spring Web MVC</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /management/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-webmvc/5.2.6.RELEASE/spring-webmvc-5.2.6.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.2.7.RELEASE.jar (Root Library)
- :x: **spring-webmvc-5.2.6.RELEASE.jar** (Vulnerable Library)
</details>
<details><summary><b>spring-web-5.2.6.RELEASE.jar</b></p></summary>
<p>Spring Web</p>
<p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p>
<p>Path to dependency file: /adapter-sample/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/canner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar,/canner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar</p>
<p>
Dependency Hierarchy:
- :x: **spring-web-5.2.6.RELEASE.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/flowgate/commit/dd01a1d4381c7a3b94ba25748c015a094c33088e">dd01a1d4381c7a3b94ba25748c015a094c33088e</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
<p>Publish Date: 2021-10-28
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-22096>CVE-2021-22096</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://tanzu.vmware.com/security/cve-2021-22096">https://tanzu.vmware.com/security/cve-2021-22096</a></p>
<p>Release Date: 2021-10-28</p>
<p>Fix Resolution: 5.2.18.RELEASE</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
| non_priority | cve medium detected in multiple libraries autoclosed cve medium severity vulnerability vulnerable libraries spring web release jar spring webmvc release jar spring core release jar spring webmvc release jar spring web release jar spring web release jar spring web library home page a href path to dependency file operation expert pom xml path to vulnerable library home wss scanner repository org springframework spring web release spring web release jar dependency hierarchy spring boot starter hateoas release jar root library spring boot starter web release jar x spring web release jar vulnerable library spring webmvc release jar spring web mvc library home page a href path to dependency file operation expert pom xml path to vulnerable library home wss scanner repository org springframework spring webmvc release spring webmvc release jar dependency hierarchy spring boot starter hateoas release jar root library spring boot starter web release jar x spring webmvc release jar vulnerable library spring core release jar spring core library home page a href path to dependency file common restclient pom xml path to vulnerable library home wss scanner repository org springframework spring core release spring core release jar home wss scanner repository org springframework spring core release spring core release jar dependency hierarchy spring context support release jar root library x spring core release jar vulnerable library spring webmvc release jar spring web mvc library home page a href path to dependency file management pom xml path to vulnerable library home wss scanner repository org springframework spring webmvc release spring webmvc release jar dependency hierarchy spring boot starter web release jar root library x spring webmvc release jar vulnerable library spring web release jar spring web library home page a href path to dependency file adapter sample pom xml path to vulnerable library home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar canner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar home wss scanner repository org springframework spring web release spring web release jar canner repository org springframework spring web release spring web release jar dependency hierarchy x spring web release jar vulnerable library found in head commit a href found in base branch master vulnerability details in spring framework versions and older unsupported versions it is possible for a user to provide malicious input to cause the insertion of additional log entries publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution release check this box to open an automated fix pr | 0 |
519,043 | 15,039,130,860 | IssuesEvent | 2021-02-02 18:16:07 | microsoft/PowerToys | https://api.github.com/repos/microsoft/PowerToys | closed | [ColorPicker - Editor] In edit color mode the centered color is clickable | Area-User Interface Issue-Bug Priority-3 Product-Color Picker Resolution-Fix-Committed | <!--
**Important: When reporting BSODs or security issues, DO NOT attach memory dumps, logs, or traces to Github issues**.
Instead, send dumps/traces to secure@microsoft.com, referencing this GitHub issue.
-->
## ℹ Computer information
- PowerToys version: 0.29.0
- PowerToy Utility: ColorPicker
- Running PowerToys as Admin: no
- Windows build number: 10.0.19042.685
## 📝 Provide detailed reproduction steps (if any)
1. Open editor and pick a color.
2. Click on the centered color to switch in edit mode.
3. Hover over centered color.
### ✔️ Expected result
The color doesn't look clickable and has no tooltip.
### ❌ Actual result
The color looks clickable and has a tooltip.
## 📷 Screenshots

| 1.0 | [ColorPicker - Editor] In edit color mode the centered color is clickable - <!--
**Important: When reporting BSODs or security issues, DO NOT attach memory dumps, logs, or traces to Github issues**.
Instead, send dumps/traces to secure@microsoft.com, referencing this GitHub issue.
-->
## ℹ Computer information
- PowerToys version: 0.29.0
- PowerToy Utility: ColorPicker
- Running PowerToys as Admin: no
- Windows build number: 10.0.19042.685
## 📝 Provide detailed reproduction steps (if any)
1. Open editor and pick a color.
2. Click on the centered color to switch in edit mode.
3. Hover over centered color.
### ✔️ Expected result
The color doesn't look clickable and has no tooltip.
### ❌ Actual result
The color looks clickable and has a tooltip.
## 📷 Screenshots

| priority | in edit color mode the centered color is clickable important when reporting bsods or security issues do not attach memory dumps logs or traces to github issues instead send dumps traces to secure microsoft com referencing this github issue ℹ computer information powertoys version powertoy utility colorpicker running powertoys as admin no windows build number 📝 provide detailed reproduction steps if any open editor and pick a color click on the centered color to switch in edit mode hover over centered color ✔️ expected result the color doesn t look clickable and has no tooltip ❌ actual result the color looks clickable and has a tooltip 📷 screenshots | 1 |
192,181 | 6,847,449,113 | IssuesEvent | 2017-11-13 15:28:16 | huridocs/uwazi | https://api.github.com/repos/huridocs/uwazi | closed | Cannot see any uploaded files on ihrda.uwazi.io | Priority: Medium Type: Bug | Hey guys,
So, we at IHRDA cannot see any files on Uploads in IHRDA.uwazi.io
This is what we see. After uploading several docs. So, we are stuck. **Cannot #work.**
@kjantin @danicatalan @konzz
<img width="960" alt="ihrda1" src="https://user-images.githubusercontent.com/22650647/32490711-2deb7d10-c3c5-11e7-9584-386245afac94.png">
| 1.0 | Cannot see any uploaded files on ihrda.uwazi.io - Hey guys,
So, we at IHRDA cannot see any files on Uploads in IHRDA.uwazi.io
This is what we see. After uploading several docs. So, we are stuck. **Cannot #work.**
@kjantin @danicatalan @konzz
<img width="960" alt="ihrda1" src="https://user-images.githubusercontent.com/22650647/32490711-2deb7d10-c3c5-11e7-9584-386245afac94.png">
| priority | cannot see any uploaded files on ihrda uwazi io hey guys so we at ihrda cannot see any files on uploads in ihrda uwazi io this is what we see after uploading several docs so we are stuck cannot work kjantin danicatalan konzz img width alt src | 1 |
105,917 | 4,249,486,756 | IssuesEvent | 2016-07-08 00:13:38 | rathena/rathena | https://api.github.com/repos/rathena/rathena | closed | GTB should bypass | bug:core bug:skill mode:renewal priority:low server:map | GTB should bypass these skills:
White Imprison
Masquarade skills
Genetic skills
Source: pRO and iRO according to other bug reports and forum entries
http://forums.irowiki.org/index.php?topic=106953.0
**Would be great if this could be tested and fixed accordingly.** | 1.0 | GTB should bypass - GTB should bypass these skills:
White Imprison
Masquarade skills
Genetic skills
Source: pRO and iRO according to other bug reports and forum entries
http://forums.irowiki.org/index.php?topic=106953.0
**Would be great if this could be tested and fixed accordingly.** | priority | gtb should bypass gtb should bypass these skills white imprison masquarade skills genetic skills source pro and iro according to other bug reports and forum entries would be great if this could be tested and fixed accordingly | 1 |
634,502 | 20,363,362,573 | IssuesEvent | 2022-02-21 00:32:16 | holy-tanuki/Ether-Bot | https://api.github.com/repos/holy-tanuki/Ether-Bot | closed | Fix/support (pycord.)wavelink | bug priority: hight | Currently, just wavelink, waiting for a v1.0.0 of pycord.wavelink | 1.0 | Fix/support (pycord.)wavelink - Currently, just wavelink, waiting for a v1.0.0 of pycord.wavelink | priority | fix support pycord wavelink currently just wavelink waiting for a of pycord wavelink | 1 |
386,939 | 26,708,055,571 | IssuesEvent | 2023-01-27 20:10:40 | longturn/freeciv21 | https://api.github.com/repos/longturn/freeciv21 | closed | Add "center unit" button to units control bar | documentation enhancement gui | The units control bar establishes a mouse-driven alternative to the keyboard-driven handling of units.
If the player choses to uncheck "auto center unit" in the interface options the unit controls bar is not sufficient for this because the unit has to be centered manually pressing "c".
While centering the unit is no unit action it nevertheless is in this case indispensable.
Combining the use of the control bar with the keyboard is error prone: If the focus is not on the keyboard misclicks happen more frequently.
The question is if a "center unit" button could be added to the bar and if this could and should be done conditionally, e.g. only if the player does not use the "auto center unit" feature.
| 1.0 | Add "center unit" button to units control bar - The units control bar establishes a mouse-driven alternative to the keyboard-driven handling of units.
If the player choses to uncheck "auto center unit" in the interface options the unit controls bar is not sufficient for this because the unit has to be centered manually pressing "c".
While centering the unit is no unit action it nevertheless is in this case indispensable.
Combining the use of the control bar with the keyboard is error prone: If the focus is not on the keyboard misclicks happen more frequently.
The question is if a "center unit" button could be added to the bar and if this could and should be done conditionally, e.g. only if the player does not use the "auto center unit" feature.
| non_priority | add center unit button to units control bar the units control bar establishes a mouse driven alternative to the keyboard driven handling of units if the player choses to uncheck auto center unit in the interface options the unit controls bar is not sufficient for this because the unit has to be centered manually pressing c while centering the unit is no unit action it nevertheless is in this case indispensable combining the use of the control bar with the keyboard is error prone if the focus is not on the keyboard misclicks happen more frequently the question is if a center unit button could be added to the bar and if this could and should be done conditionally e g only if the player does not use the auto center unit feature | 0 |
174,456 | 21,300,072,525 | IssuesEvent | 2022-04-15 01:03:48 | shaimael/easybuggy2 | https://api.github.com/repos/shaimael/easybuggy2 | closed | CVE-2020-2875 (Medium) detected in mysql-connector-java-5.1.25.jar - autoclosed | security vulnerability | ## CVE-2020-2875 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.25.jar</b></p></summary>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /repository/mysql/mysql-connector-java/5.1.25/mysql-connector-java-5.1.25.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.25.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/shaimael/easybuggy2/commit/ce89fd7428395b7b7deb3984e6d7f139611ecc6f">ce89fd7428395b7b7deb3984e6d7f139611ecc6f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-2875>CVE-2020-2875</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mysql/mysql-connector-j/commit/79a4336f140499bd22dd07f02b708e163844e3d5">https://github.com/mysql/mysql-connector-j/commit/79a4336f140499bd22dd07f02b708e163844e3d5</a></p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: mysql:mysql-connector-java:5.1.49,8.0.15</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"mysql","packageName":"mysql-connector-java","packageVersion":"5.1.25","packageFilePaths":["/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"mysql:mysql-connector-java:5.1.25","isMinimumFixVersionAvailable":true,"minimumFixVersion":"mysql:mysql-connector-java:5.1.49,8.0.15","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-2875","vulnerabilityDetails":"Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-2875","cvss3Severity":"medium","cvss3Score":"4.7","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-2875 (Medium) detected in mysql-connector-java-5.1.25.jar - autoclosed - ## CVE-2020-2875 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.25.jar</b></p></summary>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /repository/mysql/mysql-connector-java/5.1.25/mysql-connector-java-5.1.25.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.25.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/shaimael/easybuggy2/commit/ce89fd7428395b7b7deb3984e6d7f139611ecc6f">ce89fd7428395b7b7deb3984e6d7f139611ecc6f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-2875>CVE-2020-2875</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mysql/mysql-connector-j/commit/79a4336f140499bd22dd07f02b708e163844e3d5">https://github.com/mysql/mysql-connector-j/commit/79a4336f140499bd22dd07f02b708e163844e3d5</a></p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: mysql:mysql-connector-java:5.1.49,8.0.15</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"mysql","packageName":"mysql-connector-java","packageVersion":"5.1.25","packageFilePaths":["/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"mysql:mysql-connector-java:5.1.25","isMinimumFixVersionAvailable":true,"minimumFixVersion":"mysql:mysql-connector-java:5.1.49,8.0.15","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-2875","vulnerabilityDetails":"Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-2875","cvss3Severity":"medium","cvss3Score":"4.7","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in mysql connector java jar autoclosed cve medium severity vulnerability vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library repository mysql mysql connector java mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch master vulnerability details vulnerability in the mysql connectors product of oracle mysql component connector j supported versions that are affected are and prior and and prior difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise mysql connectors successful attacks require human interaction from a person other than the attacker and while the vulnerability is in mysql connectors attacks may significantly impact additional products successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data as well as unauthorized read access to a subset of mysql connectors accessible data cvss base score confidentiality and integrity impacts cvss vector cvss av n ac h pr n ui r s c c l i l a n publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution mysql mysql connector java rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree mysql mysql connector java isminimumfixversionavailable true minimumfixversion mysql mysql connector java isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails vulnerability in the mysql connectors product of oracle mysql component connector j supported versions that are affected are and prior and and prior difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise mysql connectors successful attacks require human interaction from a person other than the attacker and while the vulnerability is in mysql connectors attacks may significantly impact additional products successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data as well as unauthorized read access to a subset of mysql connectors accessible data cvss base score confidentiality and integrity impacts cvss vector cvss av n ac h pr n ui r s c c l i l a n vulnerabilityurl | 0 |
77,634 | 3,507,190,081 | IssuesEvent | 2016-01-08 11:47:55 | OregonCore/OregonCore | https://api.github.com/repos/OregonCore/OregonCore | closed | GM commands while drunk (BB #617) | migrated Priority: Low Type: Bug | This issue was migrated from bitbucket.
**Original Reporter:** LordUsagi
**Original Date:** 28.07.2014 20:52:26 GMT+0000
**Original Priority:** trivial
**Original Type:** bug
**Original State:** invalid
**Direct Link:** https://bitbucket.org/oregon/oregoncore/issues/617
<hr>
If you're drunk in game and you type in a gm command sometimes you get ...hic! or sssss put in automatically and it makes command incorrect :) | 1.0 | GM commands while drunk (BB #617) - This issue was migrated from bitbucket.
**Original Reporter:** LordUsagi
**Original Date:** 28.07.2014 20:52:26 GMT+0000
**Original Priority:** trivial
**Original Type:** bug
**Original State:** invalid
**Direct Link:** https://bitbucket.org/oregon/oregoncore/issues/617
<hr>
If you're drunk in game and you type in a gm command sometimes you get ...hic! or sssss put in automatically and it makes command incorrect :) | priority | gm commands while drunk bb this issue was migrated from bitbucket original reporter lordusagi original date gmt original priority trivial original type bug original state invalid direct link if you re drunk in game and you type in a gm command sometimes you get hic or sssss put in automatically and it makes command incorrect | 1 |
3,931 | 2,711,618,242 | IssuesEvent | 2015-04-09 07:56:53 | romait2014/57KYXHZ5S3DYAOHNPXRMLQTB | https://api.github.com/repos/romait2014/57KYXHZ5S3DYAOHNPXRMLQTB | closed | Feozi6mWRQfV+CPKCdNtykK4Nl+xAjKHoMJvPn3i8EksYfROVz8j8Y5Yv/Bjjgh6WDKpiAR38QlGf8bgmoCz6jvLLeslL38Y1C7miBx3Pp8+v/Vt/qEpfs7aQo3Djnr6rz3e5ZtJfHv00pJkOe/p/Vhk3I5r8VTT+KlTfqIka3M= | design | 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 | 1.0 | Feozi6mWRQfV+CPKCdNtykK4Nl+xAjKHoMJvPn3i8EksYfROVz8j8Y5Yv/Bjjgh6WDKpiAR38QlGf8bgmoCz6jvLLeslL38Y1C7miBx3Pp8+v/Vt/qEpfs7aQo3Djnr6rz3e5ZtJfHv00pJkOe/p/Vhk3I5r8VTT+KlTfqIka3M= - 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 | non_priority | v vt p nijkq nojab mva zlle ibcp c | 0 |
41,033 | 2,868,966,308 | IssuesEvent | 2015-06-05 22:15:24 | dart-lang/pub | https://api.github.com/repos/dart-lang/pub | closed | "pub serve" should provide the ability to look up mappings between source and output lines | enhancement Fixed Priority-Medium Pub-Serve | <a href="https://github.com/nex3"><img src="https://avatars.githubusercontent.com/u/188?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [nex3](https://github.com/nex3)**
_Originally opened as dart-lang/sdk#16061_
----
It should be possible (via the "pub serve" websocket API) to provide the server with a source file and line number and get the corresponding output URL and line number, and vice versa.
This particular bug is intended to track the bare minimum feature set necessary to provide parity with the editor's current server. Specifically, it only needs to support Dart inputs and outputs with no transformers in between. Issue dart-lang/sdk#12339 is tracking the broader use of this with all transformers. | 1.0 | "pub serve" should provide the ability to look up mappings between source and output lines - <a href="https://github.com/nex3"><img src="https://avatars.githubusercontent.com/u/188?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [nex3](https://github.com/nex3)**
_Originally opened as dart-lang/sdk#16061_
----
It should be possible (via the "pub serve" websocket API) to provide the server with a source file and line number and get the corresponding output URL and line number, and vice versa.
This particular bug is intended to track the bare minimum feature set necessary to provide parity with the editor's current server. Specifically, it only needs to support Dart inputs and outputs with no transformers in between. Issue dart-lang/sdk#12339 is tracking the broader use of this with all transformers. | priority | pub serve should provide the ability to look up mappings between source and output lines issue by originally opened as dart lang sdk it should be possible via the quot pub serve quot websocket api to provide the server with a source file and line number and get the corresponding output url and line number and vice versa this particular bug is intended to track the bare minimum feature set necessary to provide parity with the editor s current server specifically it only needs to support dart inputs and outputs with no transformers in between issue dart lang sdk is tracking the broader use of this with all transformers | 1 |
579,454 | 17,191,831,385 | IssuesEvent | 2021-07-16 12:09:19 | NinjaEnterprise/NinjaConfiguration | https://api.github.com/repos/NinjaEnterprise/NinjaConfiguration | closed | [FEATURE] Creating a configuration service. | priority: low status: backlog type: enhancement | **Description of functionality**
You need to create a configuration service, which is needed in order to receive settings for all other services.
- [ ] Creation and configuration of a multi-module structure;
- [ ] Using a separate database to store the settings;
- [ ] Adding a REST module for editing settings;
- [ ] Testing in Postman.
| 1.0 | [FEATURE] Creating a configuration service. - **Description of functionality**
You need to create a configuration service, which is needed in order to receive settings for all other services.
- [ ] Creation and configuration of a multi-module structure;
- [ ] Using a separate database to store the settings;
- [ ] Adding a REST module for editing settings;
- [ ] Testing in Postman.
| priority | creating a configuration service description of functionality you need to create a configuration service which is needed in order to receive settings for all other services creation and configuration of a multi module structure using a separate database to store the settings adding a rest module for editing settings testing in postman | 1 |
386,143 | 11,432,706,210 | IssuesEvent | 2020-02-04 14:31:46 | ooni/ooni.org | https://api.github.com/repos/ooni/ooni.org | opened | Add drill down searching for count tables | discuss priority/medium ux | Use them in the search page in Explorer to provide drill-down searching (e.g. avoid returning many thousand msmts if the users cannot reasonably browse them).
This came from ooni/backend#234 | 1.0 | Add drill down searching for count tables - Use them in the search page in Explorer to provide drill-down searching (e.g. avoid returning many thousand msmts if the users cannot reasonably browse them).
This came from ooni/backend#234 | priority | add drill down searching for count tables use them in the search page in explorer to provide drill down searching e g avoid returning many thousand msmts if the users cannot reasonably browse them this came from ooni backend | 1 |
70,367 | 13,457,178,440 | IssuesEvent | 2020-09-09 08:51:33 | eclipse-theia/theia | https://api.github.com/repos/eclipse-theia/theia | closed | [Plugin-Api] Apply authentication API | help wanted plug-in system vscode | <!-- Please fill out the following content for a feature request. -->
Apply `authentication` VsCode Plugin API. Is needed for [vscode-github-pr-plugin](https://github.com/microsoft/vscode-pull-request-github) authentication.
<!-- Please provide a clear description of the feature and any relevant information. -->
### Feature Description:
VsCode implementation: https://github.com/microsoft/vscode/blob/ab42ffc44c709aded523b15399a070ae8c724824/src/vs/vscode.proposed.d.ts#L98-L131 | 1.0 | [Plugin-Api] Apply authentication API - <!-- Please fill out the following content for a feature request. -->
Apply `authentication` VsCode Plugin API. Is needed for [vscode-github-pr-plugin](https://github.com/microsoft/vscode-pull-request-github) authentication.
<!-- Please provide a clear description of the feature and any relevant information. -->
### Feature Description:
VsCode implementation: https://github.com/microsoft/vscode/blob/ab42ffc44c709aded523b15399a070ae8c724824/src/vs/vscode.proposed.d.ts#L98-L131 | non_priority | apply authentication api apply authentication vscode plugin api is needed for authentication feature description vscode implementation | 0 |
32,783 | 12,149,767,965 | IssuesEvent | 2020-04-24 16:43:59 | vancopayments/rt-web-internal-docs | https://api.github.com/repos/vancopayments/rt-web-internal-docs | opened | WS-2018-0021 (Medium) detected in bootstrap-3.0.0.min.js | security vulnerability | ## WS-2018-0021 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.0.0.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.0/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.0/js/bootstrap.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/rt-web-internal-docs/ll_CC/index.html</p>
<p>Path to vulnerable library: /rt-web-internal-docs/ll_CC/index.html</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.0.0.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/vancopayments/rt-web-internal-docs/commits/cf2b6185bddfee72b6d2d022735e84c14c7bde3b">cf2b6185bddfee72b6d2d022735e84c14c7bde3b</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
XSS in data-target in bootstrap (3.3.7 and before)
<p>Publish Date: 2017-06-27
<p>URL: <a href=https://github.com/twbs/bootstrap/issues/20184>WS-2018-0021</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/issues/20184">https://github.com/twbs/bootstrap/issues/20184</a></p>
<p>Release Date: 2019-06-12</p>
<p>Fix Resolution: 3.4.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.0.0","isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"}],"vulnerabilityIdentifier":"WS-2018-0021","vulnerabilityDetails":"XSS in data-target in bootstrap (3.3.7 and before)","vulnerabilityUrl":"https://github.com/twbs/bootstrap/issues/20184","cvss2Severity":"medium","cvss2Score":"6.5","extraData":{}}</REMEDIATE> --> | True | WS-2018-0021 (Medium) detected in bootstrap-3.0.0.min.js - ## WS-2018-0021 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bootstrap-3.0.0.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.0/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.0.0/js/bootstrap.min.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/rt-web-internal-docs/ll_CC/index.html</p>
<p>Path to vulnerable library: /rt-web-internal-docs/ll_CC/index.html</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.0.0.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/vancopayments/rt-web-internal-docs/commits/cf2b6185bddfee72b6d2d022735e84c14c7bde3b">cf2b6185bddfee72b6d2d022735e84c14c7bde3b</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
XSS in data-target in bootstrap (3.3.7 and before)
<p>Publish Date: 2017-06-27
<p>URL: <a href=https://github.com/twbs/bootstrap/issues/20184>WS-2018-0021</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/issues/20184">https://github.com/twbs/bootstrap/issues/20184</a></p>
<p>Release Date: 2019-06-12</p>
<p>Fix Resolution: 3.4.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"twitter-bootstrap","packageVersion":"3.0.0","isTransitiveDependency":false,"dependencyTree":"twitter-bootstrap:3.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0"}],"vulnerabilityIdentifier":"WS-2018-0021","vulnerabilityDetails":"XSS in data-target in bootstrap (3.3.7 and before)","vulnerabilityUrl":"https://github.com/twbs/bootstrap/issues/20184","cvss2Severity":"medium","cvss2Score":"6.5","extraData":{}}</REMEDIATE> --> | non_priority | ws medium detected in bootstrap min js ws medium severity vulnerability vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to dependency file tmp ws scm rt web internal docs ll cc index html path to vulnerable library rt web internal docs ll cc index html dependency hierarchy x bootstrap min js vulnerable library found in head commit a href vulnerability details xss in data target in bootstrap and before publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails xss in data target in bootstrap and before vulnerabilityurl | 0 |
103,797 | 4,185,989,020 | IssuesEvent | 2016-06-23 13:10:18 | DistrictDataLabs/logbook | https://api.github.com/repos/DistrictDataLabs/logbook | opened | Person Search | priority: high type: feature | The primary use case that I've been using Logbook for is to look someone up for their contact information, and even to annotate details about them.
Right now however, there is no filter by name or search capabilities some ideas are:
- autocomplete filter/text box
- an actual text search on first, last name and email
- filter by first letter of last name (e.g. buttons)
- filter by role
This will hopefully allow us to engage more with logbook and specific members. | 1.0 | Person Search - The primary use case that I've been using Logbook for is to look someone up for their contact information, and even to annotate details about them.
Right now however, there is no filter by name or search capabilities some ideas are:
- autocomplete filter/text box
- an actual text search on first, last name and email
- filter by first letter of last name (e.g. buttons)
- filter by role
This will hopefully allow us to engage more with logbook and specific members. | priority | person search the primary use case that i ve been using logbook for is to look someone up for their contact information and even to annotate details about them right now however there is no filter by name or search capabilities some ideas are autocomplete filter text box an actual text search on first last name and email filter by first letter of last name e g buttons filter by role this will hopefully allow us to engage more with logbook and specific members | 1 |
77,470 | 27,008,492,488 | IssuesEvent | 2023-02-10 13:39:29 | primefaces/primefaces | https://api.github.com/repos/primefaces/primefaces | opened | MatchMode: returns STARTS_WITH by default if blank | :lady_beetle: defect :bangbang: needs-triage | ### Describe the bug
Follwing up discussing in #9767
`MatchMode` returns `STARTS_WITH` if blank, and throw exception if unkown value
### Reproducer
_No response_
### Expected behavior
Be lenient with blank value, and prevent further error
### PrimeFaces edition
Community
### PrimeFaces version
13.0.0-SNAPSHOT
### Theme
_No response_
### JSF implementation
All
### JSF version
2.3
### Java version
8
### Browser(s)
_No response_ | 1.0 | MatchMode: returns STARTS_WITH by default if blank - ### Describe the bug
Follwing up discussing in #9767
`MatchMode` returns `STARTS_WITH` if blank, and throw exception if unkown value
### Reproducer
_No response_
### Expected behavior
Be lenient with blank value, and prevent further error
### PrimeFaces edition
Community
### PrimeFaces version
13.0.0-SNAPSHOT
### Theme
_No response_
### JSF implementation
All
### JSF version
2.3
### Java version
8
### Browser(s)
_No response_ | non_priority | matchmode returns starts with by default if blank describe the bug follwing up discussing in matchmode returns starts with if blank and throw exception if unkown value reproducer no response expected behavior be lenient with blank value and prevent further error primefaces edition community primefaces version snapshot theme no response jsf implementation all jsf version java version browser s no response | 0 |
41,038 | 10,605,143,184 | IssuesEvent | 2019-10-10 19:47:17 | lyft/amundsen | https://api.github.com/repos/lyft/amundsen | closed | Position databuilder more clearly as an ETL tool(box) in its own right | amundsendatabuilder keep fresh | Background originated in Q&A on this PR https://github.com/lyft/amundsendatabuilder/pull/31#issuecomment-488501046
- - - -
> Hence making databuilder not aware of the search service could help to grow the library into a more generic way.
Yes, that framing certainly puts a different perspective on databuilder. I guess what fooled me into that train of thinking was it being included under the Amundsen naming umbrella etc. instead of it being a lower level thing “closer to the metal” more in its own right. Perhaps longer term worth explaining more — somehow...
Oh, wait; Just found this right at the top of the README.md under concept:
> Amundsen Databuilder is a ETL framework **for Amundsen** ...
(bolding text is mine)
You guys certainly *nudged* me a bit into having my _former_ perspective. :) Guess it could sit on a list like https://github.com/pawl/awesome-etl. Tools I’m familiar with it reminds me most of is https://singer.io, Pandas or Embulk on ⬅️ that list
* Care to share if you think it’s got a unique value proposition compared to it’s competitors (ie why it was built in the first place)?
> Just came across a nice example of such a WHY statement in yet-another-ETL-tool at https://metalpipe.readthedocs.io/en/latest/overview.html#what-isn-t-it
* Do you think it’s worth it for me to submit a PR or two trying to boost databuilder slightly more in its own right? (Maybe better to spend our time on the 3 Amundsen services)
* One immediate thing that comes to mind is databuilder (or maybe more the 3 Amundsen services) might benefit from having a CLI wrapper for something like the example Amundsen script, then you could:
`pip install amundsendatabuilder`
->
`databuilder loadcsv <CSVurl> targetURL <publisherURL> ... parameters ...`
| 1.0 | Position databuilder more clearly as an ETL tool(box) in its own right - Background originated in Q&A on this PR https://github.com/lyft/amundsendatabuilder/pull/31#issuecomment-488501046
- - - -
> Hence making databuilder not aware of the search service could help to grow the library into a more generic way.
Yes, that framing certainly puts a different perspective on databuilder. I guess what fooled me into that train of thinking was it being included under the Amundsen naming umbrella etc. instead of it being a lower level thing “closer to the metal” more in its own right. Perhaps longer term worth explaining more — somehow...
Oh, wait; Just found this right at the top of the README.md under concept:
> Amundsen Databuilder is a ETL framework **for Amundsen** ...
(bolding text is mine)
You guys certainly *nudged* me a bit into having my _former_ perspective. :) Guess it could sit on a list like https://github.com/pawl/awesome-etl. Tools I’m familiar with it reminds me most of is https://singer.io, Pandas or Embulk on ⬅️ that list
* Care to share if you think it’s got a unique value proposition compared to it’s competitors (ie why it was built in the first place)?
> Just came across a nice example of such a WHY statement in yet-another-ETL-tool at https://metalpipe.readthedocs.io/en/latest/overview.html#what-isn-t-it
* Do you think it’s worth it for me to submit a PR or two trying to boost databuilder slightly more in its own right? (Maybe better to spend our time on the 3 Amundsen services)
* One immediate thing that comes to mind is databuilder (or maybe more the 3 Amundsen services) might benefit from having a CLI wrapper for something like the example Amundsen script, then you could:
`pip install amundsendatabuilder`
->
`databuilder loadcsv <CSVurl> targetURL <publisherURL> ... parameters ...`
| non_priority | position databuilder more clearly as an etl tool box in its own right background originated in q a on this pr hence making databuilder not aware of the search service could help to grow the library into a more generic way yes that framing certainly puts a different perspective on databuilder i guess what fooled me into that train of thinking was it being included under the amundsen naming umbrella etc instead of it being a lower level thing “closer to the metal” more in its own right perhaps longer term worth explaining more — somehow oh wait just found this right at the top of the readme md under concept amundsen databuilder is a etl framework for amundsen bolding text is mine you guys certainly nudged me a bit into having my former perspective guess it could sit on a list like tools i’m familiar with it reminds me most of is pandas or embulk on ⬅️ that list care to share if you think it’s got a unique value proposition compared to it’s competitors ie why it was built in the first place just came across a nice example of such a why statement in yet another etl tool at do you think it’s worth it for me to submit a pr or two trying to boost databuilder slightly more in its own right maybe better to spend our time on the amundsen services one immediate thing that comes to mind is databuilder or maybe more the amundsen services might benefit from having a cli wrapper for something like the example amundsen script then you could pip install amundsendatabuilder databuilder loadcsv targeturl parameters | 0 |
725,353 | 24,959,702,774 | IssuesEvent | 2022-11-01 14:37:45 | AY2223S1-CS2103T-W15-4/tp | https://api.github.com/repos/AY2223S1-CS2103T-W15-4/tp | closed | [PE-D][Tester E] Not sure what alias done | type.Bug priority.High severity.Medium | 
Think could be more specific when explaining what does alias mean and what the command does
<!--session: 1666944265112-3d5780d8-add8-45ea-831e-933088a9871a-->
<!--Version: Web v3.4.4-->
-------------
Labels: `severity.VeryLow` `type.DocumentationBug`
original: limweijun/ped#3 | 1.0 | [PE-D][Tester E] Not sure what alias done - 
Think could be more specific when explaining what does alias mean and what the command does
<!--session: 1666944265112-3d5780d8-add8-45ea-831e-933088a9871a-->
<!--Version: Web v3.4.4-->
-------------
Labels: `severity.VeryLow` `type.DocumentationBug`
original: limweijun/ped#3 | priority | not sure what alias done think could be more specific when explaining what does alias mean and what the command does labels severity verylow type documentationbug original limweijun ped | 1 |
286,471 | 31,652,401,402 | IssuesEvent | 2023-09-07 00:14:53 | samq-wsdemo/cassandra | https://api.github.com/repos/samq-wsdemo/cassandra | opened | CVE-2023-34455 (High) detected in snappy-java-1.1.1.7.jar | Mend: dependency security vulnerability | ## CVE-2023-34455 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snappy-java-1.1.1.7.jar</b></p></summary>
<p>snappy-java: A fast compression/decompression library</p>
<p>Path to vulnerable library: /lib/snappy-java-1.1.1.7.jar</p>
<p>
Dependency Hierarchy:
- :x: **snappy-java-1.1.1.7.jar** (Vulnerable Library)
<p>Found in base branch: <b>palantir-cassandra-2.2.18</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
snappy-java is a fast compressor/decompressor for Java. Due to use of an unchecked chunk length, an unrecoverable fatal error can occur in versions prior to 1.1.10.1.
The code in the function hasNextChunk in the fileSnappyInputStream.java checks if a given stream has more chunks to read. It does that by attempting to read 4 bytes. If it wasn’t possible to read the 4 bytes, the function returns false. Otherwise, if 4 bytes were available, the code treats them as the length of the next chunk.
In the case that the `compressed` variable is null, a byte array is allocated with the size given by the input data. Since the code doesn’t test the legality of the `chunkSize` variable, it is possible to pass a negative number (such as 0xFFFFFFFF which is -1), which will cause the code to raise a `java.lang.NegativeArraySizeException` exception. A worse case would happen when passing a huge positive value (such as 0x7FFFFFFF), which would raise the fatal `java.lang.OutOfMemoryError` error.
Version 1.1.10.1 contains a patch for this issue.
<p>Publish Date: 2023-06-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-34455>CVE-2023-34455</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh">https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh</a></p>
<p>Release Date: 2023-06-15</p>
<p>Fix Resolution: 1.1.10.1</p>
</p>
</details>
<p></p>
| True | CVE-2023-34455 (High) detected in snappy-java-1.1.1.7.jar - ## CVE-2023-34455 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snappy-java-1.1.1.7.jar</b></p></summary>
<p>snappy-java: A fast compression/decompression library</p>
<p>Path to vulnerable library: /lib/snappy-java-1.1.1.7.jar</p>
<p>
Dependency Hierarchy:
- :x: **snappy-java-1.1.1.7.jar** (Vulnerable Library)
<p>Found in base branch: <b>palantir-cassandra-2.2.18</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
snappy-java is a fast compressor/decompressor for Java. Due to use of an unchecked chunk length, an unrecoverable fatal error can occur in versions prior to 1.1.10.1.
The code in the function hasNextChunk in the fileSnappyInputStream.java checks if a given stream has more chunks to read. It does that by attempting to read 4 bytes. If it wasn’t possible to read the 4 bytes, the function returns false. Otherwise, if 4 bytes were available, the code treats them as the length of the next chunk.
In the case that the `compressed` variable is null, a byte array is allocated with the size given by the input data. Since the code doesn’t test the legality of the `chunkSize` variable, it is possible to pass a negative number (such as 0xFFFFFFFF which is -1), which will cause the code to raise a `java.lang.NegativeArraySizeException` exception. A worse case would happen when passing a huge positive value (such as 0x7FFFFFFF), which would raise the fatal `java.lang.OutOfMemoryError` error.
Version 1.1.10.1 contains a patch for this issue.
<p>Publish Date: 2023-06-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-34455>CVE-2023-34455</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh">https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh</a></p>
<p>Release Date: 2023-06-15</p>
<p>Fix Resolution: 1.1.10.1</p>
</p>
</details>
<p></p>
| non_priority | cve high detected in snappy java jar cve high severity vulnerability vulnerable library snappy java jar snappy java a fast compression decompression library path to vulnerable library lib snappy java jar dependency hierarchy x snappy java jar vulnerable library found in base branch palantir cassandra vulnerability details snappy java is a fast compressor decompressor for java due to use of an unchecked chunk length an unrecoverable fatal error can occur in versions prior to the code in the function hasnextchunk in the filesnappyinputstream java checks if a given stream has more chunks to read it does that by attempting to read bytes if it wasn’t possible to read the bytes the function returns false otherwise if bytes were available the code treats them as the length of the next chunk in the case that the compressed variable is null a byte array is allocated with the size given by the input data since the code doesn’t test the legality of the chunksize variable it is possible to pass a negative number such as which is which will cause the code to raise a java lang negativearraysizeexception exception a worse case would happen when passing a huge positive value such as which would raise the fatal java lang outofmemoryerror error version contains a patch for this issue publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution | 0 |
375,992 | 11,136,839,753 | IssuesEvent | 2019-12-20 17:37:42 | SETI/pds-opus | https://api.github.com/repos/SETI/pds-opus | closed | Metadata Selector drag-and-drop broken when scrolling | A-Bug B-OPUS JS Effort 2 Medium Priority 4 Useful | B063: Add enough slugs to select metadata to require a scrollbar on the right side. Actually scroll down some. Then try to drag a metadata item. Instead of showing up under your mouse, it shows it being dragged further up on the screen by the amount the window has been scrolled. | 1.0 | Metadata Selector drag-and-drop broken when scrolling - B063: Add enough slugs to select metadata to require a scrollbar on the right side. Actually scroll down some. Then try to drag a metadata item. Instead of showing up under your mouse, it shows it being dragged further up on the screen by the amount the window has been scrolled. | priority | metadata selector drag and drop broken when scrolling add enough slugs to select metadata to require a scrollbar on the right side actually scroll down some then try to drag a metadata item instead of showing up under your mouse it shows it being dragged further up on the screen by the amount the window has been scrolled | 1 |
396,509 | 11,709,730,023 | IssuesEvent | 2020-03-08 20:30:01 | open-gunz/source | https://api.github.com/repos/open-gunz/source | opened | Interface UX suggestions | Moderate Priority | * [ ] "Play now" button's clickable area is much larger than the actual button (indicated by the green area when the button is clicked).
* [x] The lobby numbers for 1/2/3/4/5/6 should be moved slightly lower to be in the center.
* [x] The Join/Create/Play now buttons should be moved slightly higher to be in the center.
* [x] The "Inventory" button is small when in the lobby and larger when you click "Inventory" or click "Shop". It should be the larger version in the lobby as well.
* [x] The "You have now entered the free channel." text should be moved slightly lower as the border/design is too close to it.
* [ ] Sometimes when you enter a room quickly, the room's settings show up in the lobby's chat instead of room chat.
* [ ] Rapid clicking a button many times in a short interval makes a light green fade/hue stay around the button area.
* [ ] Screenshots button to view them next to replays.
* [ ] Monster book button for quest monsters with appropriate description.
Updated icons for the settings in "options" as well as scaling according to resolution.
* [ ] Be able to use up/down arrow keys in character selection (following login) to switch between characters.
* [ ] When u spam "character" button that appears in channel lobby while the logging in animation is loading and accidentally click the select button after moving back to character selection... u get stuck and can't select a character or log out or anything with enter/button/arrow keys/esc/etc.
* [ ] For the future- possible settings controlled by "Licenses" that you can get following purchases (ie. Dab emote that can be activated when you have a license and can be keybound once setting detects the license in "Storage"). | 1.0 | Interface UX suggestions - * [ ] "Play now" button's clickable area is much larger than the actual button (indicated by the green area when the button is clicked).
* [x] The lobby numbers for 1/2/3/4/5/6 should be moved slightly lower to be in the center.
* [x] The Join/Create/Play now buttons should be moved slightly higher to be in the center.
* [x] The "Inventory" button is small when in the lobby and larger when you click "Inventory" or click "Shop". It should be the larger version in the lobby as well.
* [x] The "You have now entered the free channel." text should be moved slightly lower as the border/design is too close to it.
* [ ] Sometimes when you enter a room quickly, the room's settings show up in the lobby's chat instead of room chat.
* [ ] Rapid clicking a button many times in a short interval makes a light green fade/hue stay around the button area.
* [ ] Screenshots button to view them next to replays.
* [ ] Monster book button for quest monsters with appropriate description.
Updated icons for the settings in "options" as well as scaling according to resolution.
* [ ] Be able to use up/down arrow keys in character selection (following login) to switch between characters.
* [ ] When u spam "character" button that appears in channel lobby while the logging in animation is loading and accidentally click the select button after moving back to character selection... u get stuck and can't select a character or log out or anything with enter/button/arrow keys/esc/etc.
* [ ] For the future- possible settings controlled by "Licenses" that you can get following purchases (ie. Dab emote that can be activated when you have a license and can be keybound once setting detects the license in "Storage"). | priority | interface ux suggestions play now button s clickable area is much larger than the actual button indicated by the green area when the button is clicked the lobby numbers for should be moved slightly lower to be in the center the join create play now buttons should be moved slightly higher to be in the center the inventory button is small when in the lobby and larger when you click inventory or click shop it should be the larger version in the lobby as well the you have now entered the free channel text should be moved slightly lower as the border design is too close to it sometimes when you enter a room quickly the room s settings show up in the lobby s chat instead of room chat rapid clicking a button many times in a short interval makes a light green fade hue stay around the button area screenshots button to view them next to replays monster book button for quest monsters with appropriate description updated icons for the settings in options as well as scaling according to resolution be able to use up down arrow keys in character selection following login to switch between characters when u spam character button that appears in channel lobby while the logging in animation is loading and accidentally click the select button after moving back to character selection u get stuck and can t select a character or log out or anything with enter button arrow keys esc etc for the future possible settings controlled by licenses that you can get following purchases ie dab emote that can be activated when you have a license and can be keybound once setting detects the license in storage | 1 |
203,366 | 7,060,378,186 | IssuesEvent | 2018-01-05 08:28:17 | wso2/product-is | https://api.github.com/repos/wso2/product-is | opened | BPS profile name front end validation missing which must only contain letters and numbers | Affected/5.4.0 Priority/High Type/Bug | When creating BPS profile, ** Profile Name** must only contain letters and numbers. But in fronted its not validated and only giving error as
> Error when adding the BPS profile.
Below error can be seen in the backend
```
[-1234] [] [2018-01-05 07:51:38,255] ERROR {org.wso2.carbon.identity.workflow.impl.WorkflowImplAdminService} - Server error when adding the profile bps_1
org.wso2.carbon.identity.workflow.impl.WorkflowImplException: Profile name should be a not null alpha numeric string, if its not the default embedded BPS.
at org.wso2.carbon.identity.workflow.impl.listener.WorkflowImplValidationListener.doPreAddBPSProfile(WorkflowImplValidationListener.java:46)
at org.wso2.carbon.identity.workflow.impl.WorkflowImplServiceImpl.addBPSProfile(WorkflowImplServiceImpl.java:85)
at org.wso2.carbon.identity.workflow.impl.WorkflowImplAdminService.addBPSProfile(WorkflowImplAdminService.java:50)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:497)
at org.apache.axis2.rpc.receivers.RPCUtil.invokeServiceClass(RPCUtil.java:212)
at org.apache.axis2.rpc.receivers.RPCMessageReceiver.invokeBusinessLogic(RPCMessageReceiver.java:117)
at org.apache.axis2.receivers.AbstractInOutMessageReceiver.invokeBusinessLogic(AbstractInOutMessageReceiver.java:40)
at org.apache.axis2.receivers.AbstractMessageReceiver.receive(AbstractMessageReceiver.java:110)
at org.apache.axis2.engine.AxisEngine.receive(AxisEngine.java:180)
at org.apache.axis2.transport.local.LocalTransportReceiver.processMessage(LocalTransportReceiver.java:169)
at org.apache.axis2.transport.local.LocalTransportReceiver.processMessage(LocalTransportReceiver.java:82)
at org.wso2.carbon.core.transports.local.CarbonLocalTransportSender.finalizeSendWithToAddress(CarbonLocalTransportSender.java:45)
at org.apache.axis2.transport.local.LocalTransportSender.invoke(LocalTransportSender.java:77)
at org.apache.axis2.engine.AxisEngine.send(AxisEngine.java:442)
at org.apache.axis2.description.OutInAxisOperationClient.send(OutInAxisOperation.java:430)
at org.apache.axis2.description.OutInAxisOperationClient.executeImpl(OutInAxisOperation.java:225)
at org.apache.axis2.client.OperationClient.execute(OperationClient.java:149)
at org.wso2.carbon.identity.workflow.impl.stub.WorkflowImplAdminServiceStub.addBPSProfile(WorkflowImplAdminServiceStub.java:1354)
at org.wso2.carbon.identity.workflow.impl.ui.WorkflowImplAdminServiceClient.addBPSProfile(WorkflowImplAdminServiceClient.java:62)
at org.apache.jsp.workflow_002dimpl.update_002dbps_002dprofile_002dfinish_002dajaxprocessor_jsp._jspService(update_002dbps_002dprofile_002dfinish_002dajaxprocessor_jsp.java:157)
at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:439)
at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:395)
at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:339)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.wso2.carbon.ui.JspServlet.service(JspServlet.java:155)
at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:80)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37)
at org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61)
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128)
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.owasp.csrfguard.CsrfGuardFilter.doFilter(CsrfGuardFilter.java:88)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:124)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:65)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:124)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:219)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:506)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
at org.wso2.carbon.identity.context.rewrite.valve.TenantContextRewriteValve.invoke(TenantContextRewriteValve.java:80)
at org.wso2.carbon.identity.authz.valve.AuthorizationValve.invoke(AuthorizationValve.java:91)
at org.wso2.carbon.identity.auth.valve.AuthenticationValve.invoke(AuthenticationValve.java:60)
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:99)
at org.wso2.carbon.tomcat.ext.valves.CarbonTomcatValve$1.invoke(CarbonTomcatValve.java:47)
at org.wso2.carbon.webapp.mgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:57)
at org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:47)
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:62)
at org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:159)
at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:962)
at org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:57)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)
at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1115)
at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1775)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1734)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.lang.Thread.run(Thread.java:745)
TID
```:
name should be a not null alpha numeric string, if its not the default embedded BPS.
| 1.0 | BPS profile name front end validation missing which must only contain letters and numbers - When creating BPS profile, ** Profile Name** must only contain letters and numbers. But in fronted its not validated and only giving error as
> Error when adding the BPS profile.
Below error can be seen in the backend
```
[-1234] [] [2018-01-05 07:51:38,255] ERROR {org.wso2.carbon.identity.workflow.impl.WorkflowImplAdminService} - Server error when adding the profile bps_1
org.wso2.carbon.identity.workflow.impl.WorkflowImplException: Profile name should be a not null alpha numeric string, if its not the default embedded BPS.
at org.wso2.carbon.identity.workflow.impl.listener.WorkflowImplValidationListener.doPreAddBPSProfile(WorkflowImplValidationListener.java:46)
at org.wso2.carbon.identity.workflow.impl.WorkflowImplServiceImpl.addBPSProfile(WorkflowImplServiceImpl.java:85)
at org.wso2.carbon.identity.workflow.impl.WorkflowImplAdminService.addBPSProfile(WorkflowImplAdminService.java:50)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:497)
at org.apache.axis2.rpc.receivers.RPCUtil.invokeServiceClass(RPCUtil.java:212)
at org.apache.axis2.rpc.receivers.RPCMessageReceiver.invokeBusinessLogic(RPCMessageReceiver.java:117)
at org.apache.axis2.receivers.AbstractInOutMessageReceiver.invokeBusinessLogic(AbstractInOutMessageReceiver.java:40)
at org.apache.axis2.receivers.AbstractMessageReceiver.receive(AbstractMessageReceiver.java:110)
at org.apache.axis2.engine.AxisEngine.receive(AxisEngine.java:180)
at org.apache.axis2.transport.local.LocalTransportReceiver.processMessage(LocalTransportReceiver.java:169)
at org.apache.axis2.transport.local.LocalTransportReceiver.processMessage(LocalTransportReceiver.java:82)
at org.wso2.carbon.core.transports.local.CarbonLocalTransportSender.finalizeSendWithToAddress(CarbonLocalTransportSender.java:45)
at org.apache.axis2.transport.local.LocalTransportSender.invoke(LocalTransportSender.java:77)
at org.apache.axis2.engine.AxisEngine.send(AxisEngine.java:442)
at org.apache.axis2.description.OutInAxisOperationClient.send(OutInAxisOperation.java:430)
at org.apache.axis2.description.OutInAxisOperationClient.executeImpl(OutInAxisOperation.java:225)
at org.apache.axis2.client.OperationClient.execute(OperationClient.java:149)
at org.wso2.carbon.identity.workflow.impl.stub.WorkflowImplAdminServiceStub.addBPSProfile(WorkflowImplAdminServiceStub.java:1354)
at org.wso2.carbon.identity.workflow.impl.ui.WorkflowImplAdminServiceClient.addBPSProfile(WorkflowImplAdminServiceClient.java:62)
at org.apache.jsp.workflow_002dimpl.update_002dbps_002dprofile_002dfinish_002dajaxprocessor_jsp._jspService(update_002dbps_002dprofile_002dfinish_002dajaxprocessor_jsp.java:157)
at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:439)
at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:395)
at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:339)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.wso2.carbon.ui.JspServlet.service(JspServlet.java:155)
at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:80)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37)
at org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61)
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128)
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.owasp.csrfguard.CsrfGuardFilter.doFilter(CsrfGuardFilter.java:88)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:124)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:65)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:124)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:219)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:506)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
at org.wso2.carbon.identity.context.rewrite.valve.TenantContextRewriteValve.invoke(TenantContextRewriteValve.java:80)
at org.wso2.carbon.identity.authz.valve.AuthorizationValve.invoke(AuthorizationValve.java:91)
at org.wso2.carbon.identity.auth.valve.AuthenticationValve.invoke(AuthenticationValve.java:60)
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:99)
at org.wso2.carbon.tomcat.ext.valves.CarbonTomcatValve$1.invoke(CarbonTomcatValve.java:47)
at org.wso2.carbon.webapp.mgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:57)
at org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:47)
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:62)
at org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:159)
at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:962)
at org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:57)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)
at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1115)
at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1775)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1734)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.lang.Thread.run(Thread.java:745)
TID
```:
name should be a not null alpha numeric string, if its not the default embedded BPS.
| priority | bps profile name front end validation missing which must only contain letters and numbers when creating bps profile profile name must only contain letters and numbers but in fronted its not validated and only giving error as error when adding the bps profile below error can be seen in the backend error org carbon identity workflow impl workflowimpladminservice server error when adding the profile bps org carbon identity workflow impl workflowimplexception profile name should be a not null alpha numeric string if its not the default embedded bps at org carbon identity workflow impl listener workflowimplvalidationlistener dopreaddbpsprofile workflowimplvalidationlistener java at org carbon identity workflow impl workflowimplserviceimpl addbpsprofile workflowimplserviceimpl java at org carbon identity workflow impl workflowimpladminservice addbpsprofile workflowimpladminservice java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org apache rpc receivers rpcutil invokeserviceclass rpcutil java at org apache rpc receivers rpcmessagereceiver invokebusinesslogic rpcmessagereceiver java at org apache receivers abstractinoutmessagereceiver invokebusinesslogic abstractinoutmessagereceiver java at org apache receivers abstractmessagereceiver receive abstractmessagereceiver java at org apache engine axisengine receive axisengine java at org apache transport local localtransportreceiver processmessage localtransportreceiver java at org apache transport local localtransportreceiver processmessage localtransportreceiver java at org carbon core transports local carbonlocaltransportsender finalizesendwithtoaddress carbonlocaltransportsender java at org apache transport local localtransportsender invoke localtransportsender java at org apache engine axisengine send axisengine java at org apache description outinaxisoperationclient send outinaxisoperation java at org apache description outinaxisoperationclient executeimpl outinaxisoperation java at org apache client operationclient execute operationclient java at org carbon identity workflow impl stub workflowimpladminservicestub addbpsprofile workflowimpladminservicestub java at org carbon identity workflow impl ui workflowimpladminserviceclient addbpsprofile workflowimpladminserviceclient java at org apache jsp workflow update jsp jspservice update jsp java at org apache jasper runtime httpjspbase service httpjspbase java at javax servlet http httpservlet service httpservlet java at org apache jasper servlet jspservletwrapper service jspservletwrapper java at org apache jasper servlet jspservlet servicejspfile jspservlet java at org apache jasper servlet jspservlet service jspservlet java at javax servlet http httpservlet service httpservlet java at org carbon ui jspservlet service jspservlet java at org carbon ui tilesjspservlet service tilesjspservlet java at javax servlet http httpservlet service httpservlet java at org eclipse equinox http helper contextpathservletadaptor service contextpathservletadaptor java at org eclipse equinox http servlet internal servletregistration service servletregistration java at org eclipse equinox http servlet internal proxyservlet processalias proxyservlet java at org eclipse equinox http servlet internal proxyservlet service proxyservlet java at javax servlet http httpservlet service httpservlet java at org carbon tomcat ext servlet delegationservlet service delegationservlet java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache tomcat websocket server wsfilter dofilter wsfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org owasp csrfguard csrfguardfilter dofilter csrfguardfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache catalina filters httpheadersecurityfilter dofilter httpheadersecurityfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org carbon tomcat ext filter charactersetfilter dofilter charactersetfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache catalina filters httpheadersecurityfilter dofilter httpheadersecurityfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache catalina core standardwrappervalve invoke standardwrappervalve java at org apache catalina core standardcontextvalve invoke standardcontextvalve java at org apache catalina authenticator authenticatorbase invoke authenticatorbase java at org apache catalina core standardhostvalve invoke standardhostvalve java at org apache catalina valves errorreportvalve invoke errorreportvalve java at org carbon identity context rewrite valve tenantcontextrewritevalve invoke tenantcontextrewritevalve java at org carbon identity authz valve authorizationvalve invoke authorizationvalve java at org carbon identity auth valve authenticationvalve invoke authenticationvalve java at org carbon tomcat ext valves compositevalve continueinvocation compositevalve java at org carbon tomcat ext valves carbontomcatvalve invoke carbontomcatvalve java at org carbon webapp mgt tenantlazyloadervalve invoke tenantlazyloadervalve java at org carbon tomcat ext valves tomcatvalvecontainer invokevalves tomcatvalvecontainer java at org carbon tomcat ext valves compositevalve invoke compositevalve java at org carbon tomcat ext valves carbonstuckthreaddetectionvalve invoke carbonstuckthreaddetectionvalve java at org apache catalina valves accesslogvalve invoke accesslogvalve java at org carbon tomcat ext valves carboncontextcreatorvalve invoke carboncontextcreatorvalve java at org apache catalina core standardenginevalve invoke standardenginevalve java at org apache catalina connector coyoteadapter service coyoteadapter java at org apache coyote process java at org apache coyote abstractprotocol abstractconnectionhandler process abstractprotocol java at org apache tomcat util net nioendpoint socketprocessor dorun nioendpoint java at org apache tomcat util net nioendpoint socketprocessor run nioendpoint java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at org apache tomcat util threads taskthread wrappingrunnable run taskthread java at java lang thread run thread java tid name should be a not null alpha numeric string if its not the default embedded bps | 1 |
198,523 | 6,973,918,974 | IssuesEvent | 2017-12-11 22:16:45 | opencurrents/opencurrents | https://api.github.com/repos/opencurrents/opencurrents | closed | openCurrents.com - Size: I think the site looks better when zoomed in at 125%, see the difference. Have had a few folks tell me the same. | mvp? priority low | 

| 1.0 | openCurrents.com - Size: I think the site looks better when zoomed in at 125%, see the difference. Have had a few folks tell me the same. - 

| priority | opencurrents com size i think the site looks better when zoomed in at see the difference have had a few folks tell me the same | 1 |
350,321 | 24,978,703,462 | IssuesEvent | 2022-11-02 09:58:40 | fluxninja/aperture | https://api.github.com/repos/fluxninja/aperture | opened | Documentation for the last panel in the Grafana Dashboard | Documentation | We need to add documentation for the below panels under the Grafana for the end user's visibility.

| 1.0 | Documentation for the last panel in the Grafana Dashboard - We need to add documentation for the below panels under the Grafana for the end user's visibility.

| non_priority | documentation for the last panel in the grafana dashboard we need to add documentation for the below panels under the grafana for the end user s visibility | 0 |
369,151 | 10,888,930,049 | IssuesEvent | 2019-11-18 17:09:45 | lowRISC/opentitan | https://api.github.com/repos/lowRISC/opentitan | opened | [site] Add favicon to docs.opentitan.org | Component:Tooling Priority:P3 Type:Enhancement | Nice looking favicon is only at the opentitan.org. It would be good if docs.opentitan.org also has same favicon :) | 1.0 | [site] Add favicon to docs.opentitan.org - Nice looking favicon is only at the opentitan.org. It would be good if docs.opentitan.org also has same favicon :) | priority | add favicon to docs opentitan org nice looking favicon is only at the opentitan org it would be good if docs opentitan org also has same favicon | 1 |
301,898 | 9,232,416,374 | IssuesEvent | 2019-03-13 07:01:50 | BentoBoxWorld/BentoBox | https://api.github.com/repos/BentoBoxWorld/BentoBox | closed | Players able to /is sethome on island that they are cooped/trusted on | Priority: High Type: Bug | ### Description
#### Describe the bug
- Players are able to /is sethome on island that they are cooped/ trusted on
- If they have no warp-sign or a player on their island to tp them back, they are unable to go to their island with /is, since it leads to the one they set it to. Of course, even if the `Island respawn: Active`, they will still respawn on their last sethome-d location.
- Consider that the permission for sethome limits them to only 1 home, as in our case.
#### Steps to reproduce the behavior
1. Have a **Player** /is team coop/trust **Another Player** on their island
2. Let **Another Player** /is sethome while there
3. Have no extra tricks for **Another Player** to go back to his island except /is
4. **Another Player** is stuck on a new island
#### Expected behavior
<!-- Clear and concise description of what you actually expected to happen when you encountered this bug. -->
<!-- Please type below this line. -->
- Not be able to sethome on island that you are cooped/ trusted
### Environment
#### Server
- OS: **Windows 10**
- Java version: **Java 8**
#### Plugins
```
[13:50:09 INFO]: Plugins (2): BentoBox, IslandBorder
```
#### BentoBox setup
##### BentoBox and Addons
```
[13:49:00 INFO]: Running SPIGOT 1.13.2.
[13:49:00 INFO]: BentoBox version: 1.4.0-SNAPSHOT
[13:49:00 INFO]: Loaded Game Worlds:
[13:49:00 INFO]: skyblock (skyblock)
[13:49:00 INFO]: Loaded Addons:
[13:49:00 INFO]: BSkyBlock 1.3.0
[13:49:00 INFO]: Challenges 0.6.0
[13:49:00 INFO]: Level 1.2.2-SNAPSHOT
[13:49:00 INFO]: SerbCraftAddon 2.0
[13:49:00 INFO]: WelcomeWarps 1.2-SNAPSHOT
```
##### Configuration
- Database: **YAML**
### Additional context
- None
| 1.0 | Players able to /is sethome on island that they are cooped/trusted on - ### Description
#### Describe the bug
- Players are able to /is sethome on island that they are cooped/ trusted on
- If they have no warp-sign or a player on their island to tp them back, they are unable to go to their island with /is, since it leads to the one they set it to. Of course, even if the `Island respawn: Active`, they will still respawn on their last sethome-d location.
- Consider that the permission for sethome limits them to only 1 home, as in our case.
#### Steps to reproduce the behavior
1. Have a **Player** /is team coop/trust **Another Player** on their island
2. Let **Another Player** /is sethome while there
3. Have no extra tricks for **Another Player** to go back to his island except /is
4. **Another Player** is stuck on a new island
#### Expected behavior
<!-- Clear and concise description of what you actually expected to happen when you encountered this bug. -->
<!-- Please type below this line. -->
- Not be able to sethome on island that you are cooped/ trusted
### Environment
#### Server
- OS: **Windows 10**
- Java version: **Java 8**
#### Plugins
```
[13:50:09 INFO]: Plugins (2): BentoBox, IslandBorder
```
#### BentoBox setup
##### BentoBox and Addons
```
[13:49:00 INFO]: Running SPIGOT 1.13.2.
[13:49:00 INFO]: BentoBox version: 1.4.0-SNAPSHOT
[13:49:00 INFO]: Loaded Game Worlds:
[13:49:00 INFO]: skyblock (skyblock)
[13:49:00 INFO]: Loaded Addons:
[13:49:00 INFO]: BSkyBlock 1.3.0
[13:49:00 INFO]: Challenges 0.6.0
[13:49:00 INFO]: Level 1.2.2-SNAPSHOT
[13:49:00 INFO]: SerbCraftAddon 2.0
[13:49:00 INFO]: WelcomeWarps 1.2-SNAPSHOT
```
##### Configuration
- Database: **YAML**
### Additional context
- None
| priority | players able to is sethome on island that they are cooped trusted on description describe the bug players are able to is sethome on island that they are cooped trusted on if they have no warp sign or a player on their island to tp them back they are unable to go to their island with is since it leads to the one they set it to of course even if the island respawn active they will still respawn on their last sethome d location consider that the permission for sethome limits them to only home as in our case steps to reproduce the behavior have a player is team coop trust another player on their island let another player is sethome while there have no extra tricks for another player to go back to his island except is another player is stuck on a new island expected behavior not be able to sethome on island that you are cooped trusted environment server os windows java version java plugins plugins bentobox islandborder bentobox setup bentobox and addons running spigot bentobox version snapshot loaded game worlds skyblock skyblock loaded addons bskyblock challenges level snapshot serbcraftaddon welcomewarps snapshot configuration database yaml additional context none | 1 |
343,103 | 30,652,309,867 | IssuesEvent | 2023-07-25 09:42:47 | unifyai/ivy | https://api.github.com/repos/unifyai/ivy | closed | Fix jax_numpy_statistical.test_jax_average | JAX Frontend Sub Task Failing Test | | | |
|---|---|
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
|paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
| 1.0 | Fix jax_numpy_statistical.test_jax_average - | | |
|---|---|
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
|paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5609939117"><img src=https://img.shields.io/badge/-success-success></a>
| non_priority | fix jax numpy statistical test jax average numpy a href src jax a href src tensorflow a href src torch a href src paddle a href src | 0 |
262,106 | 27,850,914,719 | IssuesEvent | 2023-03-20 18:37:26 | jgeraigery/HubSpot-Test-Repo-2 | https://api.github.com/repos/jgeraigery/HubSpot-Test-Repo-2 | opened | handlebars-1.3.1.jar: 1 vulnerabilities (highest severity is: 9.8) | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-1.3.1.jar</b></p></summary>
<p>Logic-less and semantic templates with Java</p>
<p>Library home page: <a href="https://github.com/jknack/handlebars.java">https://github.com/jknack/handlebars.java</a></p>
<p>Path to dependency file: /SingularityExecutorCleanup/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/github/jknack/handlebars/1.3.1/handlebars-1.3.1.jar,/home/wss-scanner/.m2/repository/com/github/jknack/handlebars/1.3.1/handlebars-1.3.1.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/HubSpot-Test-Repo-2/commit/a5e9d2faf273c02327a7e5732ba6896691338e44">a5e9d2faf273c02327a7e5732ba6896691338e44</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (handlebars version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-23369](https://www.mend.io/vulnerability-database/CVE-2021-23369) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | handlebars-1.3.1.jar | Direct | 4.2.1 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-23369</summary>
### Vulnerable Library - <b>handlebars-1.3.1.jar</b></p>
<p>Logic-less and semantic templates with Java</p>
<p>Library home page: <a href="https://github.com/jknack/handlebars.java">https://github.com/jknack/handlebars.java</a></p>
<p>Path to dependency file: /SingularityExecutorCleanup/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/github/jknack/handlebars/1.3.1/handlebars-1.3.1.jar,/home/wss-scanner/.m2/repository/com/github/jknack/handlebars/1.3.1/handlebars-1.3.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **handlebars-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/HubSpot-Test-Repo-2/commit/a5e9d2faf273c02327a7e5732ba6896691338e44">a5e9d2faf273c02327a7e5732ba6896691338e44</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
<p>Publish Date: 2021-04-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23369>CVE-2021-23369</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-04-12</p>
<p>Fix Resolution: 4.2.1</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | handlebars-1.3.1.jar: 1 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-1.3.1.jar</b></p></summary>
<p>Logic-less and semantic templates with Java</p>
<p>Library home page: <a href="https://github.com/jknack/handlebars.java">https://github.com/jknack/handlebars.java</a></p>
<p>Path to dependency file: /SingularityExecutorCleanup/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/github/jknack/handlebars/1.3.1/handlebars-1.3.1.jar,/home/wss-scanner/.m2/repository/com/github/jknack/handlebars/1.3.1/handlebars-1.3.1.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/HubSpot-Test-Repo-2/commit/a5e9d2faf273c02327a7e5732ba6896691338e44">a5e9d2faf273c02327a7e5732ba6896691338e44</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (handlebars version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-23369](https://www.mend.io/vulnerability-database/CVE-2021-23369) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | handlebars-1.3.1.jar | Direct | 4.2.1 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-23369</summary>
### Vulnerable Library - <b>handlebars-1.3.1.jar</b></p>
<p>Logic-less and semantic templates with Java</p>
<p>Library home page: <a href="https://github.com/jknack/handlebars.java">https://github.com/jknack/handlebars.java</a></p>
<p>Path to dependency file: /SingularityExecutorCleanup/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/github/jknack/handlebars/1.3.1/handlebars-1.3.1.jar,/home/wss-scanner/.m2/repository/com/github/jknack/handlebars/1.3.1/handlebars-1.3.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **handlebars-1.3.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/HubSpot-Test-Repo-2/commit/a5e9d2faf273c02327a7e5732ba6896691338e44">a5e9d2faf273c02327a7e5732ba6896691338e44</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
<p>Publish Date: 2021-04-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23369>CVE-2021-23369</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-04-12</p>
<p>Fix Resolution: 4.2.1</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_priority | handlebars jar vulnerabilities highest severity is vulnerable library handlebars jar logic less and semantic templates with java library home page a href path to dependency file singularityexecutorcleanup pom xml path to vulnerable library home wss scanner repository com github jknack handlebars handlebars jar home wss scanner repository com github jknack handlebars handlebars jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in handlebars version remediation available critical handlebars jar direct details cve vulnerable library handlebars jar logic less and semantic templates with java library home page a href path to dependency file singularityexecutorcleanup pom xml path to vulnerable library home wss scanner repository com github jknack handlebars handlebars jar home wss scanner repository com github jknack handlebars handlebars jar dependency hierarchy x handlebars jar vulnerable library found in head commit a href found in base branch master vulnerability details the package handlebars before are vulnerable to remote code execution rce when selecting certain compiling options to compile templates coming from an untrusted source publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue | 0 |
86,548 | 15,755,678,485 | IssuesEvent | 2021-03-31 02:12:16 | Thezone1975/Wallie_Bot | https://api.github.com/repos/Thezone1975/Wallie_Bot | opened | WS-2018-0076 (Medium) detected in tunnel-agent-0.4.3.tgz | security vulnerability | ## WS-2018-0076 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tunnel-agent-0.4.3.tgz</b></p></summary>
<p>HTTP proxy tunneling agent. Formerly part of mikeal/request, now a standalone module.</p>
<p>Library home page: <a href="https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz">https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz</a></p>
<p>Path to dependency file: /watsonSocketBot/package.json</p>
<p>Path to vulnerable library: /tmp/git/watsonSocketBot/node_modules/tunnel-agent/package.json</p>
<p>
Dependency Hierarchy:
- watson-developer-cloud-2.27.0.tgz (Root Library)
- request-2.79.0.tgz
- :x: **tunnel-agent-0.4.3.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure.
This is exploitable if user supplied input is provided to the auth value and is a number.
<p>Publish Date: 2017-03-05
<p>URL: <a href=https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0>WS-2018-0076</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/598">https://nodesecurity.io/advisories/598</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 0.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2018-0076 (Medium) detected in tunnel-agent-0.4.3.tgz - ## WS-2018-0076 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tunnel-agent-0.4.3.tgz</b></p></summary>
<p>HTTP proxy tunneling agent. Formerly part of mikeal/request, now a standalone module.</p>
<p>Library home page: <a href="https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz">https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz</a></p>
<p>Path to dependency file: /watsonSocketBot/package.json</p>
<p>Path to vulnerable library: /tmp/git/watsonSocketBot/node_modules/tunnel-agent/package.json</p>
<p>
Dependency Hierarchy:
- watson-developer-cloud-2.27.0.tgz (Root Library)
- request-2.79.0.tgz
- :x: **tunnel-agent-0.4.3.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure.
This is exploitable if user supplied input is provided to the auth value and is a number.
<p>Publish Date: 2017-03-05
<p>URL: <a href=https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0>WS-2018-0076</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/598">https://nodesecurity.io/advisories/598</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 0.6.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in tunnel agent tgz ws medium severity vulnerability vulnerable library tunnel agent tgz http proxy tunneling agent formerly part of mikeal request now a standalone module library home page a href path to dependency file watsonsocketbot package json path to vulnerable library tmp git watsonsocketbot node modules tunnel agent package json dependency hierarchy watson developer cloud tgz root library request tgz x tunnel agent tgz vulnerable library vulnerability details versions of tunnel agent before are vulnerable to memory exposure this is exploitable if user supplied input is provided to the auth value and is a number publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
133,222 | 18,285,461,117 | IssuesEvent | 2021-10-05 09:46:11 | AlexRogalskiy/quotes | https://api.github.com/repos/AlexRogalskiy/quotes | opened | CVE-2018-3721 (Medium) detected in lodash-2.4.2.tgz | security vulnerability | ## CVE-2018-3721 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, & extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p>
<p>Path to dependency file: quotes/package.json</p>
<p>Path to vulnerable library: quotes/node_modules/dockerfile_lint/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- dockerfile_lint-0.3.4.tgz (Root Library)
- :x: **lodash-2.4.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/quotes/commit/0bfa0d40b31d48d6a53cb48f7a03c23213a21c57">0bfa0d40b31d48d6a53cb48f7a03c23213a21c57</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3721>CVE-2018-3721</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-3721">https://nvd.nist.gov/vuln/detail/CVE-2018-3721</a></p>
<p>Release Date: 2018-06-07</p>
<p>Fix Resolution: 4.17.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-3721 (Medium) detected in lodash-2.4.2.tgz - ## CVE-2018-3721 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, & extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p>
<p>Path to dependency file: quotes/package.json</p>
<p>Path to vulnerable library: quotes/node_modules/dockerfile_lint/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- dockerfile_lint-0.3.4.tgz (Root Library)
- :x: **lodash-2.4.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/quotes/commit/0bfa0d40b31d48d6a53cb48f7a03c23213a21c57">0bfa0d40b31d48d6a53cb48f7a03c23213a21c57</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3721>CVE-2018-3721</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-3721">https://nvd.nist.gov/vuln/detail/CVE-2018-3721</a></p>
<p>Release Date: 2018-06-07</p>
<p>Fix Resolution: 4.17.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in lodash tgz cve medium severity vulnerability vulnerable library lodash tgz a utility library delivering consistency customization performance extras library home page a href path to dependency file quotes package json path to vulnerable library quotes node modules dockerfile lint node modules lodash package json dependency hierarchy dockerfile lint tgz root library x lodash tgz vulnerable library found in head commit a href vulnerability details lodash node module before suffers from a modification of assumed immutable data maid vulnerability via defaultsdeep merge and mergewith functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.