Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
1k
labels
stringlengths
4
1.38k
body
stringlengths
1
262k
index
stringclasses
16 values
text_combine
stringlengths
96
262k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
38,396
8,796,418,467
IssuesEvent
2018-12-23 06:33:47
prettydiff/prettydiff
https://api.github.com/repos/prettydiff/prettydiff
closed
Comments breaking vertical alignment of variable chains
3.0.0 Beautification Defect
```javascript /*global global, prettydiff*/ (function beautify_style_init() { "use strict"; const style = function beautify_style(options) { const data = options.parsed, lf = (options.crlf === true) ? "\r\n" : "\n", len = (options.end > 0) ? options.end + 1 : data.token.length, build = [], //a single unit of indentation tab = (function beautify_style_tab() { let aa = 0, bb = []; do { bb.push(options.indent_char); aa = aa + 1; } while (aa < options.indent_size); return bb.join(""); }()), pres = options.preserve + 1, //new lines plus indentation nl = []; }; }()); ``` The assignment operator is not vertically aligned when following a comment
1.0
Comments breaking vertical alignment of variable chains - ```javascript /*global global, prettydiff*/ (function beautify_style_init() { "use strict"; const style = function beautify_style(options) { const data = options.parsed, lf = (options.crlf === true) ? "\r\n" : "\n", len = (options.end > 0) ? options.end + 1 : data.token.length, build = [], //a single unit of indentation tab = (function beautify_style_tab() { let aa = 0, bb = []; do { bb.push(options.indent_char); aa = aa + 1; } while (aa < options.indent_size); return bb.join(""); }()), pres = options.preserve + 1, //new lines plus indentation nl = []; }; }()); ``` The assignment operator is not vertically aligned when following a comment
non_priority
comments breaking vertical alignment of variable chains javascript global global prettydiff function beautify style init use strict const style function beautify style options const data options parsed lf options crlf true r n n len options end options end data token length build a single unit of indentation tab function beautify style tab let aa bb do bb push options indent char aa aa while aa options indent size return bb join pres options preserve new lines plus indentation nl the assignment operator is not vertically aligned when following a comment
0
167,391
13,024,022,985
IssuesEvent
2020-07-27 11:04:15
sebastianbergmann/phpunit
https://api.github.com/repos/sebastianbergmann/phpunit
closed
Schema version is not migrated
feature/test-runner type/bug
With fec8d7d8e988c8be93e3301f127d4eb0e6d5d3cb in place, we finally get useful failure messages: ``` PHPUnit 9.3-gfec8d7d8e by Sebastian Bergmann and contributors. Runtime: PHP 7.4.8 Configuration: /usr/local/src/phpunit/phpunit.xml F 1 / 1 (100%) Time: 00:00.032, Memory: 20.00 MB There was 1 failure: 1) PHPUnit\TextUI\XmlConfiguration\MigrationTest::testMigratesPhpUnit92ConfigurationToPhpUnit93 Failed asserting that two DOM documents are equal. --- Expected +++ Actual @@ @@ <?xml version="1.0"?> -<phpunit xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://schema.phpunit.de/9.3/phpunit.xsd"> +<phpunit xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://schema.phpunit.de/9.2/phpunit.xsd"> <coverage disableCodeCoverageIgnore="true" ignoreDeprecatedCodeUnits="true" includeUncoveredFiles="true" processUncoveredFiles="true"> <include> <directory suffix=".php">src</directory> /usr/local/src/phpunit/src/Framework/Constraint/Equality/IsEqual.php:102 /usr/local/src/phpunit/src/Framework/Assert.php:2290 /usr/local/src/phpunit/src/Framework/Assert.php:322 /usr/local/src/phpunit/tests/unit/TextUI/MigrationTest.php:26 /usr/local/src/phpunit/src/Framework/TestCase.php:1522 /usr/local/src/phpunit/src/Framework/TestCase.php:1128 /usr/local/src/phpunit/src/Framework/TestResult.php:733 /usr/local/src/phpunit/src/Framework/TestCase.php:869 /usr/local/src/phpunit/src/Framework/TestSuite.php:665 /usr/local/src/phpunit/src/Framework/TestSuite.php:665 /usr/local/src/phpunit/src/Framework/TestSuite.php:665 /usr/local/src/phpunit/src/TextUI/TestRunner.php:682 /usr/local/src/phpunit/src/TextUI/Command.php:141 /usr/local/src/phpunit/src/TextUI/Command.php:94 FAILURES! Tests: 1, Assertions: 1, Failures: 1. ``` `https://schema.phpunit.de/9.2/phpunit.xsd` is not migrated to `https://schema.phpunit.de/9.3/phpunit.xsd`.
1.0
Schema version is not migrated - With fec8d7d8e988c8be93e3301f127d4eb0e6d5d3cb in place, we finally get useful failure messages: ``` PHPUnit 9.3-gfec8d7d8e by Sebastian Bergmann and contributors. Runtime: PHP 7.4.8 Configuration: /usr/local/src/phpunit/phpunit.xml F 1 / 1 (100%) Time: 00:00.032, Memory: 20.00 MB There was 1 failure: 1) PHPUnit\TextUI\XmlConfiguration\MigrationTest::testMigratesPhpUnit92ConfigurationToPhpUnit93 Failed asserting that two DOM documents are equal. --- Expected +++ Actual @@ @@ <?xml version="1.0"?> -<phpunit xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://schema.phpunit.de/9.3/phpunit.xsd"> +<phpunit xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://schema.phpunit.de/9.2/phpunit.xsd"> <coverage disableCodeCoverageIgnore="true" ignoreDeprecatedCodeUnits="true" includeUncoveredFiles="true" processUncoveredFiles="true"> <include> <directory suffix=".php">src</directory> /usr/local/src/phpunit/src/Framework/Constraint/Equality/IsEqual.php:102 /usr/local/src/phpunit/src/Framework/Assert.php:2290 /usr/local/src/phpunit/src/Framework/Assert.php:322 /usr/local/src/phpunit/tests/unit/TextUI/MigrationTest.php:26 /usr/local/src/phpunit/src/Framework/TestCase.php:1522 /usr/local/src/phpunit/src/Framework/TestCase.php:1128 /usr/local/src/phpunit/src/Framework/TestResult.php:733 /usr/local/src/phpunit/src/Framework/TestCase.php:869 /usr/local/src/phpunit/src/Framework/TestSuite.php:665 /usr/local/src/phpunit/src/Framework/TestSuite.php:665 /usr/local/src/phpunit/src/Framework/TestSuite.php:665 /usr/local/src/phpunit/src/TextUI/TestRunner.php:682 /usr/local/src/phpunit/src/TextUI/Command.php:141 /usr/local/src/phpunit/src/TextUI/Command.php:94 FAILURES! Tests: 1, Assertions: 1, Failures: 1. ``` `https://schema.phpunit.de/9.2/phpunit.xsd` is not migrated to `https://schema.phpunit.de/9.3/phpunit.xsd`.
non_priority
schema version is not migrated with in place we finally get useful failure messages phpunit by sebastian bergmann and contributors runtime php configuration usr local src phpunit phpunit xml f time memory mb there was failure phpunit textui xmlconfiguration migrationtest failed asserting that two dom documents are equal expected actual phpunit xmlns xsi xsi nonamespaceschemalocation phpunit xmlns xsi xsi nonamespaceschemalocation src usr local src phpunit src framework constraint equality isequal php usr local src phpunit src framework assert php usr local src phpunit src framework assert php usr local src phpunit tests unit textui migrationtest php usr local src phpunit src framework testcase php usr local src phpunit src framework testcase php usr local src phpunit src framework testresult php usr local src phpunit src framework testcase php usr local src phpunit src framework testsuite php usr local src phpunit src framework testsuite php usr local src phpunit src framework testsuite php usr local src phpunit src textui testrunner php usr local src phpunit src textui command php usr local src phpunit src textui command php failures tests assertions failures is not migrated to
0
176,409
6,559,225,413
IssuesEvent
2017-09-07 02:22:55
NuGet/Home
https://api.github.com/repos/NuGet/Home
closed
Project.json restore should warn when top level packages violate constraints
Area: Restore Area:Error Handling Priority:0 Type:Bug
The below project.json should generate a warning for the constraint violation between Microsoft.ApplicationInsights >= 2.0.0 and == 1.2.3 required by the WindowsApp package. Ideally there should also be a way to suppress these warnings. ``` json { "dependencies": { "Microsoft.ApplicationInsights": "2.0.0", "Microsoft.ApplicationInsights.PersistenceChannel": "1.2.3", "Microsoft.ApplicationInsights.WindowsApps": "1.1.1", "Microsoft.NETCore.UniversalWindowsPlatform": "5.0.0", "Win2D.uwp": "1.16.0" }, "frameworks": { "uap10.0": {} }, "runtimes": { "win10-arm": {}, "win10-arm-aot": {}, "win10-x86": {}, "win10-x86-aot": {}, "win10-x64": {}, "win10-x64-aot": {} } } ```
1.0
Project.json restore should warn when top level packages violate constraints - The below project.json should generate a warning for the constraint violation between Microsoft.ApplicationInsights >= 2.0.0 and == 1.2.3 required by the WindowsApp package. Ideally there should also be a way to suppress these warnings. ``` json { "dependencies": { "Microsoft.ApplicationInsights": "2.0.0", "Microsoft.ApplicationInsights.PersistenceChannel": "1.2.3", "Microsoft.ApplicationInsights.WindowsApps": "1.1.1", "Microsoft.NETCore.UniversalWindowsPlatform": "5.0.0", "Win2D.uwp": "1.16.0" }, "frameworks": { "uap10.0": {} }, "runtimes": { "win10-arm": {}, "win10-arm-aot": {}, "win10-x86": {}, "win10-x86-aot": {}, "win10-x64": {}, "win10-x64-aot": {} } } ```
priority
project json restore should warn when top level packages violate constraints the below project json should generate a warning for the constraint violation between microsoft applicationinsights and required by the windowsapp package ideally there should also be a way to suppress these warnings json dependencies microsoft applicationinsights microsoft applicationinsights persistencechannel microsoft applicationinsights windowsapps microsoft netcore universalwindowsplatform uwp frameworks runtimes arm arm aot aot aot
1
196,323
6,926,823,400
IssuesEvent
2017-11-30 20:32:44
vmware/vic-ui
https://api.github.com/repos/vmware/vic-ui
closed
Create VCH wizard says "VM endpoint" instead of "Endpoint VM"
area/ui priority/low team/lifecycle
In the Compute page of the VCH deployment wizard, the text "VM endpoint settings" should be "VCH endpoint VM settings: ![vmendpoint](https://user-images.githubusercontent.com/16718369/33384529-8c09e95a-d526-11e7-83f6-88b61eb92fd7.jpg)
1.0
Create VCH wizard says "VM endpoint" instead of "Endpoint VM" - In the Compute page of the VCH deployment wizard, the text "VM endpoint settings" should be "VCH endpoint VM settings: ![vmendpoint](https://user-images.githubusercontent.com/16718369/33384529-8c09e95a-d526-11e7-83f6-88b61eb92fd7.jpg)
priority
create vch wizard says vm endpoint instead of endpoint vm in the compute page of the vch deployment wizard the text vm endpoint settings should be vch endpoint vm settings
1
73,353
15,253,651,294
IssuesEvent
2021-02-20 08:39:54
gsylvie/madness
https://api.github.com/repos/gsylvie/madness
closed
CVE-2016-10006 Medium Severity Vulnerability detected by WhiteSource - autoclosed
security vulnerability
## CVE-2016-10006 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>antisamy-1.4.3.jar</b></p></summary> <p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML and CSS without exposing the site to XSS vulnerabilities.</p> <p>path: /root/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar</p> <p> <p>Library home page: <a href=http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project/antisamy>http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project/antisamy</a></p> Dependency Hierarchy: - esapi-2.1.0.jar (Root Library) - :x: **antisamy-1.4.3.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS. <p>Publish Date: 2016-12-24 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006>CVE-2016-10006</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://www.securitytracker.com/id/1037532">http://www.securitytracker.com/id/1037532</a></p> <p>Fix Resolution: The vendor has issued a fix (1.5.5). The vendor advisory is available at: https://github.com/nahsra/antisamy/issues/2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-10006 Medium Severity Vulnerability detected by WhiteSource - autoclosed - ## CVE-2016-10006 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>antisamy-1.4.3.jar</b></p></summary> <p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML and CSS without exposing the site to XSS vulnerabilities.</p> <p>path: /root/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar</p> <p> <p>Library home page: <a href=http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project/antisamy>http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project/antisamy</a></p> Dependency Hierarchy: - esapi-2.1.0.jar (Root Library) - :x: **antisamy-1.4.3.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS. <p>Publish Date: 2016-12-24 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006>CVE-2016-10006</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://www.securitytracker.com/id/1037532">http://www.securitytracker.com/id/1037532</a></p> <p>Fix Resolution: The vendor has issued a fix (1.5.5). The vendor advisory is available at: https://github.com/nahsra/antisamy/issues/2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium severity vulnerability detected by whitesource autoclosed cve medium severity vulnerability vulnerable library antisamy jar the owasp antisamy project is a collection of apis for safely allowing users to supply their own html and css without exposing the site to xss vulnerabilities path root repository org owasp antisamy antisamy antisamy jar library home page a href dependency hierarchy esapi jar root library x antisamy jar vulnerable library vulnerability details in owasp antisamy before by submitting a specially crafted input a tag that supports style with active content you could bypass the library protections and supply executable code the impact is xss publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href fix resolution the vendor has issued a fix the vendor advisory is available at step up your open source security game with whitesource
0
826,666
31,708,161,371
IssuesEvent
2023-09-09 01:04:40
HughCraig/GHAP
https://api.github.com/repos/HughCraig/GHAP
opened
Dev access to test-ghap
priority 1 deployment Scope 1 Urgent Easy PriorityBP 1 Tranche Review
Set up access to the test-ghap.tlcmap.org server for: Kaine Usher: kaine.usher1@gmail.com Ivy Zheng: zhengzhixin2016@gmail.com They will need: SSH SFTP sudo Please ensure access is established by October 1. Please contact them directly to coordinate this, with exchanging security keys etc, as Bill will be consumed with other responsibilities. Coordinating with Systemik on deployment for testing isn't workable. We are very short on time, and there would probably be weeks of lag in waiting for one side to find time. So it will work better if the devs do the install and set up testing, and document it, then there is a hand over for deployment to production, where on a scheduled day, TLCMap and Systemik staff work together to move into production. This will also confirm that the documentation is good.
2.0
Dev access to test-ghap - Set up access to the test-ghap.tlcmap.org server for: Kaine Usher: kaine.usher1@gmail.com Ivy Zheng: zhengzhixin2016@gmail.com They will need: SSH SFTP sudo Please ensure access is established by October 1. Please contact them directly to coordinate this, with exchanging security keys etc, as Bill will be consumed with other responsibilities. Coordinating with Systemik on deployment for testing isn't workable. We are very short on time, and there would probably be weeks of lag in waiting for one side to find time. So it will work better if the devs do the install and set up testing, and document it, then there is a hand over for deployment to production, where on a scheduled day, TLCMap and Systemik staff work together to move into production. This will also confirm that the documentation is good.
priority
dev access to test ghap set up access to the test ghap tlcmap org server for kaine usher kaine gmail com ivy zheng gmail com they will need ssh sftp sudo please ensure access is established by october please contact them directly to coordinate this with exchanging security keys etc as bill will be consumed with other responsibilities coordinating with systemik on deployment for testing isn t workable we are very short on time and there would probably be weeks of lag in waiting for one side to find time so it will work better if the devs do the install and set up testing and document it then there is a hand over for deployment to production where on a scheduled day tlcmap and systemik staff work together to move into production this will also confirm that the documentation is good
1
27,389
12,552,322,291
IssuesEvent
2020-06-06 17:42:50
terraform-providers/terraform-provider-aws
https://api.github.com/repos/terraform-providers/terraform-provider-aws
closed
"no_device" in "ephemeral_block_device" doesn't work as expected.
bug service/ec2 stale
### Terraform Version 0.10.6 ### Affected Resource(s) aws_instance, aws_launch_configuration ### Terraform Configuration Files ```hcl # Salt-master instance resource "aws_instance" "salt-master" { ami = "${data.aws_ami.ubuntu1404.id}" instance_type = "${var.infra["salt_instance_type"]}" subnet_id = "${aws_subnet.int_infra_sub.id}" vpc_security_group_ids = ["${aws_security_group.salt-master-sg.id}"] key_name = "${var.global["key_pair_name"]}" iam_instance_profile = "${aws_iam_instance_profile.salt_profile.name}" root_block_device { volume_type = "gp2" volume_size = "${var.infra["salt_volume_size"]}" delete_on_termination = true } #disable the instance store ephemeral_block_device { virtual_name = "ephemeral0" device_name = "xvdb" no_device = true } } ``` This is a simplified configuration. 1. From other github bug reports, it may be not necessary to give 'device_name' when 'no_device' is true. But it still requires. I have to give it anyway. 2. No matter how I tried with "no_device", the device /dev/xvdb still exists ### Debug Output ```hcl + module.ayla_tf.aws_instance.salt-master id: <computed> ami: "ami-44e10d3e" associate_public_ip_address: <computed> availability_zone: <computed> disable_api_termination: "true" ebs_block_device.#: <computed> ephemeral_block_device.#: "1" ephemeral_block_device.3403969019.device_name: "xvdb" ephemeral_block_device.3403969019.no_device: "true" ephemeral_block_device.3403969019.virtual_name: "ephemeral0" iam_instance_profile: "usdv-salt-role" instance_state: <computed> instance_type: "m3.medium" ipv6_address_count: <computed> ...... ''' ### Expected Behavior No ephemeral storage, as in this case /dev/xvdb, should exist. ### Actual Behavior Now /dev/xvdb is there and mounted on /mnt. ### Steps to Reproduce ### Important Factoids I have seen this on several instance type. But currently m3.medium is our main type. Also, we use ubuntu-14.04 AMI image. I don't know if this is a TF issue or AWS API or AMI one.
1.0
"no_device" in "ephemeral_block_device" doesn't work as expected. - ### Terraform Version 0.10.6 ### Affected Resource(s) aws_instance, aws_launch_configuration ### Terraform Configuration Files ```hcl # Salt-master instance resource "aws_instance" "salt-master" { ami = "${data.aws_ami.ubuntu1404.id}" instance_type = "${var.infra["salt_instance_type"]}" subnet_id = "${aws_subnet.int_infra_sub.id}" vpc_security_group_ids = ["${aws_security_group.salt-master-sg.id}"] key_name = "${var.global["key_pair_name"]}" iam_instance_profile = "${aws_iam_instance_profile.salt_profile.name}" root_block_device { volume_type = "gp2" volume_size = "${var.infra["salt_volume_size"]}" delete_on_termination = true } #disable the instance store ephemeral_block_device { virtual_name = "ephemeral0" device_name = "xvdb" no_device = true } } ``` This is a simplified configuration. 1. From other github bug reports, it may be not necessary to give 'device_name' when 'no_device' is true. But it still requires. I have to give it anyway. 2. No matter how I tried with "no_device", the device /dev/xvdb still exists ### Debug Output ```hcl + module.ayla_tf.aws_instance.salt-master id: <computed> ami: "ami-44e10d3e" associate_public_ip_address: <computed> availability_zone: <computed> disable_api_termination: "true" ebs_block_device.#: <computed> ephemeral_block_device.#: "1" ephemeral_block_device.3403969019.device_name: "xvdb" ephemeral_block_device.3403969019.no_device: "true" ephemeral_block_device.3403969019.virtual_name: "ephemeral0" iam_instance_profile: "usdv-salt-role" instance_state: <computed> instance_type: "m3.medium" ipv6_address_count: <computed> ...... ''' ### Expected Behavior No ephemeral storage, as in this case /dev/xvdb, should exist. ### Actual Behavior Now /dev/xvdb is there and mounted on /mnt. ### Steps to Reproduce ### Important Factoids I have seen this on several instance type. But currently m3.medium is our main type. Also, we use ubuntu-14.04 AMI image. I don't know if this is a TF issue or AWS API or AMI one.
non_priority
no device in ephemeral block device doesn t work as expected terraform version affected resource s aws instance aws launch configuration terraform configuration files hcl salt master instance resource aws instance salt master ami data aws ami id instance type var infra subnet id aws subnet int infra sub id vpc security group ids key name var global iam instance profile aws iam instance profile salt profile name root block device volume type volume size var infra delete on termination true disable the instance store ephemeral block device virtual name device name xvdb no device true this is a simplified configuration from other github bug reports it may be not necessary to give device name when no device is true but it still requires i have to give it anyway no matter how i tried with no device the device dev xvdb still exists debug output hcl module ayla tf aws instance salt master id ami ami associate public ip address availability zone disable api termination true ebs block device ephemeral block device ephemeral block device device name xvdb ephemeral block device no device true ephemeral block device virtual name iam instance profile usdv salt role instance state instance type medium address count expected behavior no ephemeral storage as in this case dev xvdb should exist actual behavior now dev xvdb is there and mounted on mnt steps to reproduce important factoids i have seen this on several instance type but currently medium is our main type also we use ubuntu ami image i don t know if this is a tf issue or aws api or ami one
0
124,234
4,894,096,922
IssuesEvent
2016-11-19 03:48:45
caver456/issue_test
https://api.github.com/repos/caver456/issue_test
opened
install
enhancement help wanted Priority:High
make a clean installer. Investigate from scratch. pyqtdeploy? py2exe? jython / jar? https://wiki.python.org/moin/Freeze (linux only)
1.0
install - make a clean installer. Investigate from scratch. pyqtdeploy? py2exe? jython / jar? https://wiki.python.org/moin/Freeze (linux only)
priority
install make a clean installer investigate from scratch pyqtdeploy jython jar linux only
1
49,559
13,454,367,923
IssuesEvent
2020-09-09 03:30:53
ErezDasa/RB2
https://api.github.com/repos/ErezDasa/RB2
opened
CVE-2019-14379 (High) detected in jackson-databind-2.9.9.jar
security vulnerability
## CVE-2019-14379 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/RB2/infra_github/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - spring-cloud-starter-config-2.0.3.RELEASE.jar (Root Library) - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ErezDasa/RB2/commit/76c9fcc27c447880699d2960c8688c59736444af">76c9fcc27c447880699d2960c8688c59736444af</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution: 2.9.9.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-14379 (High) detected in jackson-databind-2.9.9.jar - ## CVE-2019-14379 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/RB2/infra_github/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - spring-cloud-starter-config-2.0.3.RELEASE.jar (Root Library) - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ErezDasa/RB2/commit/76c9fcc27c447880699d2960c8688c59736444af">76c9fcc27c447880699d2960c8688c59736444af</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14379>CVE-2019-14379</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution: 2.9.9.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm infra github pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring cloud starter config release jar root library x jackson databind jar vulnerable library found in head commit a href vulnerability details subtypevalidator java in fasterxml jackson databind before mishandles default typing when ehcache is used because of net sf ehcache transaction manager defaulttransactionmanagerlookup leading to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
521,110
15,102,739,821
IssuesEvent
2021-02-08 09:24:28
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
secure.totalav.com - site is not usable
browser-fenix engine-gecko ml-needsdiagnosis-false priority-normal
<!-- @browser: Firefox Mobile 86.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:86.0) Gecko/86.0 Firefox/86.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/66782 --> <!-- @extra_labels: browser-fenix --> **URL**: https://secure.totalav.com/year-upsell **Browser / Version**: Firefox Mobile 86.0 **Operating System**: Android 9 **Tested Another Browser**: Yes Chrome **Problem type**: Site is not usable **Description**: Page not loading correctly **Steps to Reproduce**: Rerouted too much page not loading <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2021/2/efec07df-000d-487e-af1c-d815cfa82d3c.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20210131185630</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2021/2/0111f034-6615-49db-9d0f-7159223a29a1) _From [webcompat.com](https://webcompat.com/) with ❤️_
1.0
secure.totalav.com - site is not usable - <!-- @browser: Firefox Mobile 86.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:86.0) Gecko/86.0 Firefox/86.0 --> <!-- @reported_with: android-components-reporter --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/66782 --> <!-- @extra_labels: browser-fenix --> **URL**: https://secure.totalav.com/year-upsell **Browser / Version**: Firefox Mobile 86.0 **Operating System**: Android 9 **Tested Another Browser**: Yes Chrome **Problem type**: Site is not usable **Description**: Page not loading correctly **Steps to Reproduce**: Rerouted too much page not loading <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2021/2/efec07df-000d-487e-af1c-d815cfa82d3c.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20210131185630</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2021/2/0111f034-6615-49db-9d0f-7159223a29a1) _From [webcompat.com](https://webcompat.com/) with ❤️_
priority
secure totalav com site is not usable url browser version firefox mobile operating system android tested another browser yes chrome problem type site is not usable description page not loading correctly steps to reproduce rerouted too much page not loading view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️
1
73,683
19,760,954,775
IssuesEvent
2022-01-16 12:06:13
Stupid4You/Digit
https://api.github.com/repos/Stupid4You/Digit
opened
Change from the beginning and not when we edit the file.
Easier Build
We now just change the 0000 in the checker then we have lesser code. if len(str(num)) == 2: num0 = "00" if len(str(num)) == 3: num0 = "0" if len(str(num)) == 4: num0 = "" if num >= 9999: done = 1
1.0
Change from the beginning and not when we edit the file. - We now just change the 0000 in the checker then we have lesser code. if len(str(num)) == 2: num0 = "00" if len(str(num)) == 3: num0 = "0" if len(str(num)) == 4: num0 = "" if num >= 9999: done = 1
non_priority
change from the beginning and not when we edit the file we now just change the in the checker then we have lesser code if len str num if len str num if len str num if num done
0
16,292
6,153,468,346
IssuesEvent
2017-06-28 10:02:01
scikit-learn/scikit-learn
https://api.github.com/repos/scikit-learn/scikit-learn
closed
travis flake8 checks all files, not only python files?
Build / CI
I'm a bit surprised that this hasn't bitten us and I feel like I'm missing something obvious (because why doesn't this always fail for rst files?) Anyhow changing the mailmap or the travis config seems to make it fail, at least for me locally and in the 0.18.X branch: https://travis-ci.org/scikit-learn/scikit-learn/jobs/244582500
1.0
travis flake8 checks all files, not only python files? - I'm a bit surprised that this hasn't bitten us and I feel like I'm missing something obvious (because why doesn't this always fail for rst files?) Anyhow changing the mailmap or the travis config seems to make it fail, at least for me locally and in the 0.18.X branch: https://travis-ci.org/scikit-learn/scikit-learn/jobs/244582500
non_priority
travis checks all files not only python files i m a bit surprised that this hasn t bitten us and i feel like i m missing something obvious because why doesn t this always fail for rst files anyhow changing the mailmap or the travis config seems to make it fail at least for me locally and in the x branch
0
676,134
23,117,208,871
IssuesEvent
2022-07-27 17:51:42
maurosoria/dirsearch
https://api.github.com/repos/maurosoria/dirsearch
closed
[Feature Request] Report files and directories found in crawled file
enhancement Priority: Medium
First of all, thank you for this wonderful tool which is the first that I use on CTF. I would like to know if it possible to add the ability to dirsearch to parse crawled file to extract and report present path and use it for recursive searching. To avoid massive report, Dirsearch should only report files of the targeted domain and in targeted root folder. Thank you
1.0
[Feature Request] Report files and directories found in crawled file - First of all, thank you for this wonderful tool which is the first that I use on CTF. I would like to know if it possible to add the ability to dirsearch to parse crawled file to extract and report present path and use it for recursive searching. To avoid massive report, Dirsearch should only report files of the targeted domain and in targeted root folder. Thank you
priority
report files and directories found in crawled file first of all thank you for this wonderful tool which is the first that i use on ctf i would like to know if it possible to add the ability to dirsearch to parse crawled file to extract and report present path and use it for recursive searching to avoid massive report dirsearch should only report files of the targeted domain and in targeted root folder thank you
1
354,331
10,565,650,843
IssuesEvent
2019-10-05 13:10:35
kubeflow/kubeflow
https://api.github.com/repos/kubeflow/kubeflow
closed
Define Kubeflow cluster role and combine roles (was default roles should include virtualservices)
area/auth area/kfctl kind/feature priority/p0
/kind feature It looks like permission to create virtual services aren't attached by default to the roles created in namespaces. See below **Why you need this feature:** [Is your feature request related to a problem? Please describe in details] editors should probably have the ability to edit virtual services so they can deploy services in their namespaces and configure traffic. viewers should probably have viewer permissions. **Describe the solution you'd like:** [A clear and concise description of what you want to happen.] **Anything else you would like to add:** [Miscellaneous information that will assist in solving the issue.] Here is the edit role ``` kubectl get clusterrole edit -o yaml aggregationRule: clusterRoleSelectors: - matchLabels: rbac.authorization.k8s.io/aggregate-to-edit: "true" apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: 2019-08-16T04:04:19Z labels: kubernetes.io/bootstrapping: rbac-defaults rbac.authorization.k8s.io/aggregate-to-admin: "true" name: edit resourceVersion: "319" selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/edit uid: ebc81501-bfda-11e9-970b-42010a8e010d rules: - apiGroups: - "" resources: - pods/attach - pods/exec - pods/portforward - pods/proxy - secrets - services/proxy verbs: - get - list - watch - apiGroups: - "" resources: - serviceaccounts verbs: - impersonate - apiGroups: - "" resources: - pods - pods/attach - pods/exec - pods/portforward - pods/proxy verbs: - create - delete - deletecollection - patch - update - apiGroups: - "" resources: - configmaps - endpoints - persistentvolumeclaims - replicationcontrollers - replicationcontrollers/scale - secrets - serviceaccounts - services - services/proxy verbs: - create - delete - deletecollection - patch - update - apiGroups: - apps resources: - daemonsets - deployments - deployments/rollback - deployments/scale - replicasets - replicasets/scale - statefulsets - statefulsets/scale verbs: - create - delete - deletecollection - patch - update - apiGroups: - autoscaling resources: - horizontalpodautoscalers verbs: - create - delete - deletecollection - patch - update - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - deletecollection - patch - update - apiGroups: - extensions resources: - daemonsets - deployments - deployments/rollback - deployments/scale - ingresses - networkpolicies - replicasets - replicasets/scale - replicationcontrollers/scale verbs: - create - delete - deletecollection - patch - update - apiGroups: - policy resources: - poddisruptionbudgets verbs: - create - delete - deletecollection - patch - update - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - create - delete - deletecollection - patch - update - apiGroups: - "" resources: - configmaps - endpoints - persistentvolumeclaims - pods - replicationcontrollers - replicationcontrollers/scale - serviceaccounts - services verbs: - get - list - watch - apiGroups: - "" resources: - bindings - events - limitranges - namespaces/status - pods/log - pods/status - replicationcontrollers/status - resourcequotas - resourcequotas/status verbs: - get - list - watch - apiGroups: - "" resources: - namespaces verbs: - get - list - watch - apiGroups: - apps resources: - controllerrevisions - daemonsets - deployments - deployments/scale - replicasets - replicasets/scale - statefulsets - statefulsets/scale verbs: - get - list - watch - apiGroups: - autoscaling resources: - horizontalpodautoscalers verbs: - get - list - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - get - list - watch - apiGroups: - extensions resources: - daemonsets - deployments - deployments/scale - ingresses - networkpolicies - replicasets - replicasets/scale - replicationcontrollers/scale verbs: - get - list - watch - apiGroups: - policy resources: - poddisruptionbudgets verbs: - get - list - watch - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - get - list - watch ```
1.0
Define Kubeflow cluster role and combine roles (was default roles should include virtualservices) - /kind feature It looks like permission to create virtual services aren't attached by default to the roles created in namespaces. See below **Why you need this feature:** [Is your feature request related to a problem? Please describe in details] editors should probably have the ability to edit virtual services so they can deploy services in their namespaces and configure traffic. viewers should probably have viewer permissions. **Describe the solution you'd like:** [A clear and concise description of what you want to happen.] **Anything else you would like to add:** [Miscellaneous information that will assist in solving the issue.] Here is the edit role ``` kubectl get clusterrole edit -o yaml aggregationRule: clusterRoleSelectors: - matchLabels: rbac.authorization.k8s.io/aggregate-to-edit: "true" apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" creationTimestamp: 2019-08-16T04:04:19Z labels: kubernetes.io/bootstrapping: rbac-defaults rbac.authorization.k8s.io/aggregate-to-admin: "true" name: edit resourceVersion: "319" selfLink: /apis/rbac.authorization.k8s.io/v1/clusterroles/edit uid: ebc81501-bfda-11e9-970b-42010a8e010d rules: - apiGroups: - "" resources: - pods/attach - pods/exec - pods/portforward - pods/proxy - secrets - services/proxy verbs: - get - list - watch - apiGroups: - "" resources: - serviceaccounts verbs: - impersonate - apiGroups: - "" resources: - pods - pods/attach - pods/exec - pods/portforward - pods/proxy verbs: - create - delete - deletecollection - patch - update - apiGroups: - "" resources: - configmaps - endpoints - persistentvolumeclaims - replicationcontrollers - replicationcontrollers/scale - secrets - serviceaccounts - services - services/proxy verbs: - create - delete - deletecollection - patch - update - apiGroups: - apps resources: - daemonsets - deployments - deployments/rollback - deployments/scale - replicasets - replicasets/scale - statefulsets - statefulsets/scale verbs: - create - delete - deletecollection - patch - update - apiGroups: - autoscaling resources: - horizontalpodautoscalers verbs: - create - delete - deletecollection - patch - update - apiGroups: - batch resources: - cronjobs - jobs verbs: - create - delete - deletecollection - patch - update - apiGroups: - extensions resources: - daemonsets - deployments - deployments/rollback - deployments/scale - ingresses - networkpolicies - replicasets - replicasets/scale - replicationcontrollers/scale verbs: - create - delete - deletecollection - patch - update - apiGroups: - policy resources: - poddisruptionbudgets verbs: - create - delete - deletecollection - patch - update - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - create - delete - deletecollection - patch - update - apiGroups: - "" resources: - configmaps - endpoints - persistentvolumeclaims - pods - replicationcontrollers - replicationcontrollers/scale - serviceaccounts - services verbs: - get - list - watch - apiGroups: - "" resources: - bindings - events - limitranges - namespaces/status - pods/log - pods/status - replicationcontrollers/status - resourcequotas - resourcequotas/status verbs: - get - list - watch - apiGroups: - "" resources: - namespaces verbs: - get - list - watch - apiGroups: - apps resources: - controllerrevisions - daemonsets - deployments - deployments/scale - replicasets - replicasets/scale - statefulsets - statefulsets/scale verbs: - get - list - watch - apiGroups: - autoscaling resources: - horizontalpodautoscalers verbs: - get - list - watch - apiGroups: - batch resources: - cronjobs - jobs verbs: - get - list - watch - apiGroups: - extensions resources: - daemonsets - deployments - deployments/scale - ingresses - networkpolicies - replicasets - replicasets/scale - replicationcontrollers/scale verbs: - get - list - watch - apiGroups: - policy resources: - poddisruptionbudgets verbs: - get - list - watch - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - get - list - watch ```
priority
define kubeflow cluster role and combine roles was default roles should include virtualservices kind feature it looks like permission to create virtual services aren t attached by default to the roles created in namespaces see below why you need this feature editors should probably have the ability to edit virtual services so they can deploy services in their namespaces and configure traffic viewers should probably have viewer permissions describe the solution you d like anything else you would like to add here is the edit role kubectl get clusterrole edit o yaml aggregationrule clusterroleselectors matchlabels rbac authorization io aggregate to edit true apiversion rbac authorization io kind clusterrole metadata annotations rbac authorization kubernetes io autoupdate true creationtimestamp labels kubernetes io bootstrapping rbac defaults rbac authorization io aggregate to admin true name edit resourceversion selflink apis rbac authorization io clusterroles edit uid bfda rules apigroups resources pods attach pods exec pods portforward pods proxy secrets services proxy verbs get list watch apigroups resources serviceaccounts verbs impersonate apigroups resources pods pods attach pods exec pods portforward pods proxy verbs create delete deletecollection patch update apigroups resources configmaps endpoints persistentvolumeclaims replicationcontrollers replicationcontrollers scale secrets serviceaccounts services services proxy verbs create delete deletecollection patch update apigroups apps resources daemonsets deployments deployments rollback deployments scale replicasets replicasets scale statefulsets statefulsets scale verbs create delete deletecollection patch update apigroups autoscaling resources horizontalpodautoscalers verbs create delete deletecollection patch update apigroups batch resources cronjobs jobs verbs create delete deletecollection patch update apigroups extensions resources daemonsets deployments deployments rollback deployments scale ingresses networkpolicies replicasets replicasets scale replicationcontrollers scale verbs create delete deletecollection patch update apigroups policy resources poddisruptionbudgets verbs create delete deletecollection patch update apigroups networking io resources networkpolicies verbs create delete deletecollection patch update apigroups resources configmaps endpoints persistentvolumeclaims pods replicationcontrollers replicationcontrollers scale serviceaccounts services verbs get list watch apigroups resources bindings events limitranges namespaces status pods log pods status replicationcontrollers status resourcequotas resourcequotas status verbs get list watch apigroups resources namespaces verbs get list watch apigroups apps resources controllerrevisions daemonsets deployments deployments scale replicasets replicasets scale statefulsets statefulsets scale verbs get list watch apigroups autoscaling resources horizontalpodautoscalers verbs get list watch apigroups batch resources cronjobs jobs verbs get list watch apigroups extensions resources daemonsets deployments deployments scale ingresses networkpolicies replicasets replicasets scale replicationcontrollers scale verbs get list watch apigroups policy resources poddisruptionbudgets verbs get list watch apigroups networking io resources networkpolicies verbs get list watch
1
80,510
23,227,946,321
IssuesEvent
2022-08-03 03:35:06
PowerShell/PowerShell
https://api.github.com/repos/PowerShell/PowerShell
closed
Add test for verifying the default language mode
BVT/DRT Area-Maintainers-Build Up-for-Grabs In-PR
## Steps to reproduce Potentially a test issue. .\runlite -suite Scripting.CoreLanguage.CoreLanguageTest -pri -test DefaultExecutionContextSessionStateLanguageModeInRemoteSession ## Expected behavior The language mode is FullLanguage. ## Actual behavior LanguageMode is 3. Exception calling "Invoke" with "0" argument(s): "Default $host.Runspace.InitialSessionState.LanguageMode should be FullLanguage when UMCI is not enabled.: '3' does not equal 'FullLanguage' CallStack: Asserts.ps1: line 87 <- Asserts.ps1: line 219 <- Lite.Scripting.CoreLanguage.CoreLanguageTest.ps1: line 842" System.Management.Automation.MethodInvocationException: Exception calling "Invoke" with "0" argument(s): "Default $host.Runspace.InitialSessionState.LanguageMode should be FullLanguage when UMCI is not enabled.: '3' does not equal 'FullLanguage' CallStack: Asserts.ps1: line 87 <- Asserts.ps1: line 219 <- Lite.Scripting.CoreLanguage.CoreLanguageTest.ps1: line 842" ---> System.Management.Automation.RuntimeException: Default $host.Runspace.InitialSessionState.LanguageMode should be FullLanguage when UMCI is not enabled.: '3' does not equal 'FullLanguage' CallStack: Asserts.ps1: line 87 <- Asserts.ps1: line 219 <- Lite.Scripting.CoreLanguage.CoreLanguageTest.ps1: line 842 at System.Management.Automation.Runspaces.PipelineBase.Invoke(IEnumerable input) at System.Management.Automation.Runspaces.Pipeline.Invoke() at CallSite.Target(Closure , CallSite , Object ) --- End of inner exception stack trace --- at System.Management.Automation.ExceptionHandlingOps.CheckActionPreference(FunctionContext funcContext, Exception exception) at ExecuteInRunspace(Closure , FunctionContext ) ## Environment data ``` powershell > $PSVersionTable Name Value ---- ----- PSVersion 5.1.10032.0 PSEdition Desktop PSCompatibleVersions {1.0, 2.0, 3.0, 4.0...} BuildVersion 3.0.0.0 GitCommitId v0.6.0-112-g3276846c401e0c2132cc260f89752b121c81abde CLRVersion 4.0.30319.42000 WSManStackVersion 3.0 PSRemotingProtocolVersion 2.3 SerializationVersion 1.1.0.1 ```
1.0
Add test for verifying the default language mode - ## Steps to reproduce Potentially a test issue. .\runlite -suite Scripting.CoreLanguage.CoreLanguageTest -pri -test DefaultExecutionContextSessionStateLanguageModeInRemoteSession ## Expected behavior The language mode is FullLanguage. ## Actual behavior LanguageMode is 3. Exception calling "Invoke" with "0" argument(s): "Default $host.Runspace.InitialSessionState.LanguageMode should be FullLanguage when UMCI is not enabled.: '3' does not equal 'FullLanguage' CallStack: Asserts.ps1: line 87 <- Asserts.ps1: line 219 <- Lite.Scripting.CoreLanguage.CoreLanguageTest.ps1: line 842" System.Management.Automation.MethodInvocationException: Exception calling "Invoke" with "0" argument(s): "Default $host.Runspace.InitialSessionState.LanguageMode should be FullLanguage when UMCI is not enabled.: '3' does not equal 'FullLanguage' CallStack: Asserts.ps1: line 87 <- Asserts.ps1: line 219 <- Lite.Scripting.CoreLanguage.CoreLanguageTest.ps1: line 842" ---> System.Management.Automation.RuntimeException: Default $host.Runspace.InitialSessionState.LanguageMode should be FullLanguage when UMCI is not enabled.: '3' does not equal 'FullLanguage' CallStack: Asserts.ps1: line 87 <- Asserts.ps1: line 219 <- Lite.Scripting.CoreLanguage.CoreLanguageTest.ps1: line 842 at System.Management.Automation.Runspaces.PipelineBase.Invoke(IEnumerable input) at System.Management.Automation.Runspaces.Pipeline.Invoke() at CallSite.Target(Closure , CallSite , Object ) --- End of inner exception stack trace --- at System.Management.Automation.ExceptionHandlingOps.CheckActionPreference(FunctionContext funcContext, Exception exception) at ExecuteInRunspace(Closure , FunctionContext ) ## Environment data ``` powershell > $PSVersionTable Name Value ---- ----- PSVersion 5.1.10032.0 PSEdition Desktop PSCompatibleVersions {1.0, 2.0, 3.0, 4.0...} BuildVersion 3.0.0.0 GitCommitId v0.6.0-112-g3276846c401e0c2132cc260f89752b121c81abde CLRVersion 4.0.30319.42000 WSManStackVersion 3.0 PSRemotingProtocolVersion 2.3 SerializationVersion 1.1.0.1 ```
non_priority
add test for verifying the default language mode steps to reproduce potentially a test issue runlite suite scripting corelanguage corelanguagetest pri test defaultexecutioncontextsessionstatelanguagemodeinremotesession expected behavior the language mode is fulllanguage actual behavior languagemode is exception calling invoke with argument s default host runspace initialsessionstate languagemode should be fulllanguage when umci is not enabled does not equal fulllanguage callstack asserts line asserts line lite scripting corelanguage corelanguagetest line system management automation methodinvocationexception exception calling invoke with argument s default host runspace initialsessionstate languagemode should be fulllanguage when umci is not enabled does not equal fulllanguage callstack asserts line system management automation runtimeexception default host runspace initialsessionstate languagemode should be fulllanguage when umci is not enabled does not equal fulllanguage callstack asserts line asserts line lite scripting corelanguage corelanguagetest line at system management automation runspaces pipelinebase invoke ienumerable input at system management automation runspaces pipeline invoke at callsite target closure callsite object end of inner exception stack trace at system management automation exceptionhandlingops checkactionpreference functioncontext funccontext exception exception at executeinrunspace closure functioncontext environment data powershell psversiontable name value psversion psedition desktop pscompatibleversions buildversion gitcommitid clrversion wsmanstackversion psremotingprotocolversion serializationversion
0
9,280
2,615,142,944
IssuesEvent
2015-03-01 06:18:09
chrsmith/html5rocks
https://api.github.com/repos/chrsmith/html5rocks
closed
Over quota
auto-migrated Priority-Medium Type-Defect
``` Please describe the issue: Hi. The website is giving 503 over quota errors, from app engine (i guess). It's your own dogfood, so why this could happen ? Please provide any additional information below. ``` Original issue reported on code.google.com by `alfue...@gmail.com` on 22 Jun 2010 at 7:56
1.0
Over quota - ``` Please describe the issue: Hi. The website is giving 503 over quota errors, from app engine (i guess). It's your own dogfood, so why this could happen ? Please provide any additional information below. ``` Original issue reported on code.google.com by `alfue...@gmail.com` on 22 Jun 2010 at 7:56
non_priority
over quota please describe the issue hi the website is giving over quota errors from app engine i guess it s your own dogfood so why this could happen please provide any additional information below original issue reported on code google com by alfue gmail com on jun at
0
107,569
23,441,062,874
IssuesEvent
2022-08-15 14:55:20
arduino/arduino-ide
https://api.github.com/repos/arduino/arduino-ide
closed
Close compilation/upload error notifications on subsequent actions
type: enhancement topic: code
### Describe the request Automatically close compilation and upload error notifications when a subsequent compilation or upload is triggered. 🙂 The user will only be presented with relevant notifications. ### Describe the current behavior The Arduino IDE opens a notification when compilation or upload of a sketch fails. This is an excellent way of supplementing the more verbose and cryptic error messages shown in the "**Output**" view. Although very valuable in the time after a failed compilation or upload, this notification is no longer relevant when a subsequent compilation/upload is triggered, since at that point the user is only interested in what the result will be of the current operation. Currently, the notifications of errors from previous compilations/uploads are retained until the user manually closes them, which some might not think to do. 1. Create a sketch that will fail to compile: ```cpp #error void setup() {} void loop() {} ``` 1. Select **Sketch > Verify/Compile** from the Arduino IDE menus. 1. Wait for compilation to finish. 🙂 A notification clearly communicates that there was a compilation error: > **❌ Compilation error: #error** 1. Fix the problem with the sketch: ```cpp void setup() {} void loop() {} ``` 1. Select **Sketch > Verify/Compile** from the Arduino IDE menus. 1. Wait for compilation to finish. There are now two notifications, shown in this order: > **ⓘ Done Compiling** > **❌ Compilation error: #error** The "**Done Compiling**" notification does not clearly indicate a successful result. It also disappears after 3 seconds while the "**Compilation error**" notification is persistent. 🙁 It may not be clear to the user that the current compilation or upload was successful. This is what the IDE looks like at the completion of a successful upload following some expected struggles: ![image](https://user-images.githubusercontent.com/8572152/177917827-d451600f-0422-4e96-9011-28d5c8a9a5f4.png) ### Arduino IDE version 2.0.0-rc8-snapshot-1073c3f ### Operating system Windows ### Operating system version 10 ### Additional context Originally reported at https://forum.arduino.cc/t/imperfection-improvement/1010339 ### Issue checklist - [X] I searched for previous requests in [the issue tracker](https://github.com/arduino/arduino-ide/issues?q=) - [X] I verified the feature was still missing when using the latest [nightly build](https://github.com/arduino/arduino-ide#nightly-builds) - [X] My request contains all necessary details
1.0
Close compilation/upload error notifications on subsequent actions - ### Describe the request Automatically close compilation and upload error notifications when a subsequent compilation or upload is triggered. 🙂 The user will only be presented with relevant notifications. ### Describe the current behavior The Arduino IDE opens a notification when compilation or upload of a sketch fails. This is an excellent way of supplementing the more verbose and cryptic error messages shown in the "**Output**" view. Although very valuable in the time after a failed compilation or upload, this notification is no longer relevant when a subsequent compilation/upload is triggered, since at that point the user is only interested in what the result will be of the current operation. Currently, the notifications of errors from previous compilations/uploads are retained until the user manually closes them, which some might not think to do. 1. Create a sketch that will fail to compile: ```cpp #error void setup() {} void loop() {} ``` 1. Select **Sketch > Verify/Compile** from the Arduino IDE menus. 1. Wait for compilation to finish. 🙂 A notification clearly communicates that there was a compilation error: > **❌ Compilation error: #error** 1. Fix the problem with the sketch: ```cpp void setup() {} void loop() {} ``` 1. Select **Sketch > Verify/Compile** from the Arduino IDE menus. 1. Wait for compilation to finish. There are now two notifications, shown in this order: > **ⓘ Done Compiling** > **❌ Compilation error: #error** The "**Done Compiling**" notification does not clearly indicate a successful result. It also disappears after 3 seconds while the "**Compilation error**" notification is persistent. 🙁 It may not be clear to the user that the current compilation or upload was successful. This is what the IDE looks like at the completion of a successful upload following some expected struggles: ![image](https://user-images.githubusercontent.com/8572152/177917827-d451600f-0422-4e96-9011-28d5c8a9a5f4.png) ### Arduino IDE version 2.0.0-rc8-snapshot-1073c3f ### Operating system Windows ### Operating system version 10 ### Additional context Originally reported at https://forum.arduino.cc/t/imperfection-improvement/1010339 ### Issue checklist - [X] I searched for previous requests in [the issue tracker](https://github.com/arduino/arduino-ide/issues?q=) - [X] I verified the feature was still missing when using the latest [nightly build](https://github.com/arduino/arduino-ide#nightly-builds) - [X] My request contains all necessary details
non_priority
close compilation upload error notifications on subsequent actions describe the request automatically close compilation and upload error notifications when a subsequent compilation or upload is triggered 🙂 the user will only be presented with relevant notifications describe the current behavior the arduino ide opens a notification when compilation or upload of a sketch fails this is an excellent way of supplementing the more verbose and cryptic error messages shown in the output view although very valuable in the time after a failed compilation or upload this notification is no longer relevant when a subsequent compilation upload is triggered since at that point the user is only interested in what the result will be of the current operation currently the notifications of errors from previous compilations uploads are retained until the user manually closes them which some might not think to do create a sketch that will fail to compile cpp error void setup void loop select sketch verify compile from the arduino ide menus wait for compilation to finish 🙂 a notification clearly communicates that there was a compilation error ❌ compilation error error fix the problem with the sketch cpp void setup void loop select sketch verify compile from the arduino ide menus wait for compilation to finish there are now two notifications shown in this order ⓘ done compiling ❌ compilation error error the done compiling notification does not clearly indicate a successful result it also disappears after seconds while the compilation error notification is persistent 🙁 it may not be clear to the user that the current compilation or upload was successful this is what the ide looks like at the completion of a successful upload following some expected struggles arduino ide version snapshot operating system windows operating system version additional context originally reported at issue checklist i searched for previous requests in i verified the feature was still missing when using the latest my request contains all necessary details
0
256,184
22,041,792,847
IssuesEvent
2022-05-29 13:17:29
oreillyross/brainy-notes
https://api.github.com/repos/oreillyross/brainy-notes
closed
#1 Add test for Add note form
testing
describe("<AddNote/>", () => { it("renders the form", () => { }) }) create a utils folder with a data-tests file which is exported functions that create objects of data for testing. import {render, screen} from "@testing-library/react" Think of the screen object as the browser window. import {MockedProvider } from "@apollo/react-testing" Wrap component to be tested with MockedProvider const {container, debug } = render(<MockedProvider><AddNote/></MockedProvider>)
1.0
#1 Add test for Add note form - describe("<AddNote/>", () => { it("renders the form", () => { }) }) create a utils folder with a data-tests file which is exported functions that create objects of data for testing. import {render, screen} from "@testing-library/react" Think of the screen object as the browser window. import {MockedProvider } from "@apollo/react-testing" Wrap component to be tested with MockedProvider const {container, debug } = render(<MockedProvider><AddNote/></MockedProvider>)
non_priority
add test for add note form describe it renders the form create a utils folder with a data tests file which is exported functions that create objects of data for testing import render screen from testing library react think of the screen object as the browser window import mockedprovider from apollo react testing wrap component to be tested with mockedprovider const container debug render
0
5,783
2,971,819,058
IssuesEvent
2015-07-14 09:41:35
RIOT-OS/RIOT
https://api.github.com/repos/RIOT-OS/RIOT
opened
doc: wrong hierarchy level for some modules
bug documentation
For some weird reasons some modules (e.g. 6LoWPAN or IEEE802.15.4e) show up at the wrong hierarchy level at http://doc.riot-os.org/modules.html. Building the documentation locally seems to generate the expected hierarchy. The documentation on the web page is generated by doxygen version 1.8.8 - locally I have 1.8.9.1. Can someone cross check?
1.0
doc: wrong hierarchy level for some modules - For some weird reasons some modules (e.g. 6LoWPAN or IEEE802.15.4e) show up at the wrong hierarchy level at http://doc.riot-os.org/modules.html. Building the documentation locally seems to generate the expected hierarchy. The documentation on the web page is generated by doxygen version 1.8.8 - locally I have 1.8.9.1. Can someone cross check?
non_priority
doc wrong hierarchy level for some modules for some weird reasons some modules e g or show up at the wrong hierarchy level at building the documentation locally seems to generate the expected hierarchy the documentation on the web page is generated by doxygen version locally i have can someone cross check
0
138,427
18,793,921,172
IssuesEvent
2021-11-08 19:52:48
Dima2022/hygieia-codequality-sonar-collector
https://api.github.com/repos/Dima2022/hygieia-codequality-sonar-collector
opened
CVE-2016-1000343 (High) detected in bcprov-jdk15on-1.55.jar
security vulnerability
## CVE-2016-1000343 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcprov-jdk15on-1.55.jar</b></p></summary> <p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.</p> <p>Library home page: <a href="http://www.bouncycastle.org/java.html">http://www.bouncycastle.org/java.html</a></p> <p>Path to dependency file: hygieia-codequality-sonar-collector/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar</p> <p> Dependency Hierarchy: - core-3.1.11.jar (Root Library) - spring-cloud-starter-config-1.3.1.RELEASE.jar - spring-cloud-starter-1.2.2.RELEASE.jar - spring-security-rsa-1.0.3.RELEASE.jar - bcpkix-jdk15on-1.55.jar - :x: **bcprov-jdk15on-1.55.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2022/hygieia-codequality-sonar-collector/commit/d72cd85b78442d6e5c56f0a28d43e8922826f909">d72cd85b78442d6e5c56f0a28d43e8922826f909</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000343>CVE-2016-1000343</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000343</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: org.bouncycastle:bcprov-debug-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk15on:1.56,org.bouncycastle:bcprov-jdk14:1.56,org.bouncycastle:bcprov-jdk15on:1.56,org.bouncycastle:bcprov-ext-debug-jdk15on:1.56</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.bouncycastle","packageName":"bcprov-jdk15on","packageVersion":"1.55","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.capitalone.dashboard:core:3.1.11;org.springframework.cloud:spring-cloud-starter-config:1.3.1.RELEASE;org.springframework.cloud:spring-cloud-starter:1.2.2.RELEASE;org.springframework.security:spring-security-rsa:1.0.3.RELEASE;org.bouncycastle:bcpkix-jdk15on:1.55;org.bouncycastle:bcprov-jdk15on:1.55","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.bouncycastle:bcprov-debug-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk15on:1.56,org.bouncycastle:bcprov-jdk14:1.56,org.bouncycastle:bcprov-jdk15on:1.56,org.bouncycastle:bcprov-ext-debug-jdk15on:1.56"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2016-1000343","vulnerabilityDetails":"In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000343","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2016-1000343 (High) detected in bcprov-jdk15on-1.55.jar - ## CVE-2016-1000343 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcprov-jdk15on-1.55.jar</b></p></summary> <p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.</p> <p>Library home page: <a href="http://www.bouncycastle.org/java.html">http://www.bouncycastle.org/java.html</a></p> <p>Path to dependency file: hygieia-codequality-sonar-collector/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.55/bcprov-jdk15on-1.55.jar</p> <p> Dependency Hierarchy: - core-3.1.11.jar (Root Library) - spring-cloud-starter-config-1.3.1.RELEASE.jar - spring-cloud-starter-1.2.2.RELEASE.jar - spring-security-rsa-1.0.3.RELEASE.jar - bcpkix-jdk15on-1.55.jar - :x: **bcprov-jdk15on-1.55.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2022/hygieia-codequality-sonar-collector/commit/d72cd85b78442d6e5c56f0a28d43e8922826f909">d72cd85b78442d6e5c56f0a28d43e8922826f909</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000343>CVE-2016-1000343</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000343</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution: org.bouncycastle:bcprov-debug-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk15on:1.56,org.bouncycastle:bcprov-jdk14:1.56,org.bouncycastle:bcprov-jdk15on:1.56,org.bouncycastle:bcprov-ext-debug-jdk15on:1.56</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.bouncycastle","packageName":"bcprov-jdk15on","packageVersion":"1.55","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.capitalone.dashboard:core:3.1.11;org.springframework.cloud:spring-cloud-starter-config:1.3.1.RELEASE;org.springframework.cloud:spring-cloud-starter:1.2.2.RELEASE;org.springframework.security:spring-security-rsa:1.0.3.RELEASE;org.bouncycastle:bcpkix-jdk15on:1.55;org.bouncycastle:bcprov-jdk15on:1.55","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.bouncycastle:bcprov-debug-jdk14:1.56,org.bouncycastle:bcprov-ext-jdk15on:1.56,org.bouncycastle:bcprov-jdk14:1.56,org.bouncycastle:bcprov-jdk15on:1.56,org.bouncycastle:bcprov-ext-debug-jdk15on:1.56"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2016-1000343","vulnerabilityDetails":"In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000343","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in bcprov jar cve high severity vulnerability vulnerable library bcprov jar the bouncy castle crypto package is a java implementation of cryptographic algorithms this jar contains jce provider and lightweight api for the bouncy castle cryptography apis for jdk to jdk library home page a href path to dependency file hygieia codequality sonar collector pom xml path to vulnerable library home wss scanner repository org bouncycastle bcprov bcprov jar dependency hierarchy core jar root library spring cloud starter config release jar spring cloud starter release jar spring security rsa release jar bcpkix jar x bcprov jar vulnerable library found in head commit a href found in base branch master vulnerability details in the bouncy castle jce provider version and earlier the dsa key pair generator generates a weak private key if used with default values if the jca key pair generator is not explicitly initialised with dsa parameters and earlier generates a private value assuming a bit key size in earlier releases this can be dealt with by explicitly passing parameters to the key pair generator publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org bouncycastle bcprov debug org bouncycastle bcprov ext org bouncycastle bcprov org bouncycastle bcprov org bouncycastle bcprov ext debug isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com capitalone dashboard core org springframework cloud spring cloud starter config release org springframework cloud spring cloud starter release org springframework security spring security rsa release org bouncycastle bcpkix org bouncycastle bcprov isminimumfixversionavailable true minimumfixversion org bouncycastle bcprov debug org bouncycastle bcprov ext org bouncycastle bcprov org bouncycastle bcprov org bouncycastle bcprov ext debug basebranches vulnerabilityidentifier cve vulnerabilitydetails in the bouncy castle jce provider version and earlier the dsa key pair generator generates a weak private key if used with default values if the jca key pair generator is not explicitly initialised with dsa parameters and earlier generates a private value assuming a bit key size in earlier releases this can be dealt with by explicitly passing parameters to the key pair generator vulnerabilityurl
0
121,613
16,005,060,087
IssuesEvent
2021-04-20 01:09:19
microsoft/BotFramework-Composer
https://api.github.com/repos/microsoft/BotFramework-Composer
opened
UX on "Create new LUIS resources" screen
Needs-triage R13 Bugbash Type: Bug UX Design
## Describe the bug Several UX issues on this screen: ![image](https://user-images.githubusercontent.com/1165321/115321884-a77b1000-a139-11eb-8caa-149e95975c41.png) The issues are: 1. The "*" on the LUIS region and "resource name" text is a mystery. What does the "*" mean? 2. The dialog is "LUIS resources" (plural), but the text is "Resource name" (singular). The previous screen calls this "resource" (singular) Which is it? The text across these screens needs to align. ![image](https://user-images.githubusercontent.com/1165321/115322142-3556fb00-a13a-11eb-9f87-1186d43ff21a.png) 3. "Input your details below". I'm not picking any details. The text here needs some tweaking. 4. The "Learn more" text (no ".") needs a hyperlink (I created a separate bug to track that). 5. The "Resource group:" has a ":" at the end. The other fields do not. ## Version Version: 1.4.0-nightly.236875.b9e46c2 Electron: 8.2.4 Chrome: 80.0.3987.165 NodeJS: 12.13.0 V8: 8.0.426.27-electron.0
1.0
UX on "Create new LUIS resources" screen - ## Describe the bug Several UX issues on this screen: ![image](https://user-images.githubusercontent.com/1165321/115321884-a77b1000-a139-11eb-8caa-149e95975c41.png) The issues are: 1. The "*" on the LUIS region and "resource name" text is a mystery. What does the "*" mean? 2. The dialog is "LUIS resources" (plural), but the text is "Resource name" (singular). The previous screen calls this "resource" (singular) Which is it? The text across these screens needs to align. ![image](https://user-images.githubusercontent.com/1165321/115322142-3556fb00-a13a-11eb-9f87-1186d43ff21a.png) 3. "Input your details below". I'm not picking any details. The text here needs some tweaking. 4. The "Learn more" text (no ".") needs a hyperlink (I created a separate bug to track that). 5. The "Resource group:" has a ":" at the end. The other fields do not. ## Version Version: 1.4.0-nightly.236875.b9e46c2 Electron: 8.2.4 Chrome: 80.0.3987.165 NodeJS: 12.13.0 V8: 8.0.426.27-electron.0
non_priority
ux on create new luis resources screen describe the bug several ux issues on this screen the issues are the on the luis region and resource name text is a mystery what does the mean the dialog is luis resources plural but the text is resource name singular the previous screen calls this resource singular which is it the text across these screens needs to align input your details below i m not picking any details the text here needs some tweaking the learn more text no needs a hyperlink i created a separate bug to track that the resource group has a at the end the other fields do not version version nightly electron chrome nodejs electron
0
304,535
26,286,667,520
IssuesEvent
2023-01-07 22:49:34
ker0olos/fable
https://api.github.com/repos/ker0olos/fable
closed
Add more unit tests
tests needed
Some parts of the code are still untested. - [x] searching for media - [x] searching for characters - [x] searching for theme songs - [x] searching for the next episode
1.0
Add more unit tests - Some parts of the code are still untested. - [x] searching for media - [x] searching for characters - [x] searching for theme songs - [x] searching for the next episode
non_priority
add more unit tests some parts of the code are still untested searching for media searching for characters searching for theme songs searching for the next episode
0
608,961
18,851,790,726
IssuesEvent
2021-11-11 21:58:54
fao89/pulp-operator
https://api.github.com/repos/fao89/pulp-operator
opened
Document using https://pypi.org/project/pulpcore-releases/ for the installer
Status: NEW Priority: Normal Tracker: Task Category: Installer - Moved to GitHub issues Sprint: 122
Author: bmbouter (bmbouter) Redmine Issue: 6904, https://pulp.plan.io/issues/6904 --- The Pulp Dependency Checker is a great tool to show compatibility between a pulpcore version and various concerns. We should do three things: 1) Move the pdc tool to the pulp org. 2) Add a very obvious link to the pulp_installer docs recommending users to use the tool to determine pulpcore and plugin compatibility 3) Update the error message that the installer puts out when the pre-flight check fails. Have that error message point users to specifically check which plugins are compatible with the pulpcore version the installer is trying to install.
1.0
Document using https://pypi.org/project/pulpcore-releases/ for the installer - Author: bmbouter (bmbouter) Redmine Issue: 6904, https://pulp.plan.io/issues/6904 --- The Pulp Dependency Checker is a great tool to show compatibility between a pulpcore version and various concerns. We should do three things: 1) Move the pdc tool to the pulp org. 2) Add a very obvious link to the pulp_installer docs recommending users to use the tool to determine pulpcore and plugin compatibility 3) Update the error message that the installer puts out when the pre-flight check fails. Have that error message point users to specifically check which plugins are compatible with the pulpcore version the installer is trying to install.
priority
document using for the installer author bmbouter bmbouter redmine issue the pulp dependency checker is a great tool to show compatibility between a pulpcore version and various concerns we should do three things move the pdc tool to the pulp org add a very obvious link to the pulp installer docs recommending users to use the tool to determine pulpcore and plugin compatibility update the error message that the installer puts out when the pre flight check fails have that error message point users to specifically check which plugins are compatible with the pulpcore version the installer is trying to install
1
252,084
21,555,772,316
IssuesEvent
2022-04-30 11:45:15
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Godot 3.5 BETA 2 is not working with GLES2 project
bug topic:rendering needs testing regression
### Godot version Godot_v3.5-beta2_x11.64 ### System information Linux, GLES2 ### Issue description Godot 3.5 BETA 2 is crashing with a project with GLES2 ### Steps to reproduce Just open a GLES2 project working with Godot 3.5 BETA 1, with this new BETA 2 I got these errors ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) malloc(): invalid size (unsorted) ### Minimal reproduction project _No response_
1.0
Godot 3.5 BETA 2 is not working with GLES2 project - ### Godot version Godot_v3.5-beta2_x11.64 ### System information Linux, GLES2 ### Issue description Godot 3.5 BETA 2 is crashing with a project with GLES2 ### Steps to reproduce Just open a GLES2 project working with Godot 3.5 BETA 1, with this new BETA 2 I got these errors ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) ERROR: Index p_surface = 0 is out of bounds (mesh->surfaces.size() = 0). at: mesh_surface_set_material (drivers/gles2/rasterizer_storage_gles2.cpp:2652) ERROR: Condition "array.size() != array_size" is true. at: mesh_add_surface (drivers/gles2/rasterizer_storage_gles2.cpp:2490) malloc(): invalid size (unsorted) ### Minimal reproduction project _No response_
non_priority
godot beta is not working with project godot version godot system information linux issue description godot beta is crashing with a project with steps to reproduce just open a project working with godot beta with this new beta i got these errors error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp error index p surface is out of bounds mesh surfaces size at mesh surface set material drivers rasterizer storage cpp error condition array size array size is true at mesh add surface drivers rasterizer storage cpp malloc invalid size unsorted minimal reproduction project no response
0
137,492
30,701,135,893
IssuesEvent
2023-07-26 23:35:49
SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86
https://api.github.com/repos/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86
opened
Code Security Report: 24 high severity findings, 38 total findings
Mend: code security findings
# Code Security Report ### Scan Metadata **Latest Scan:** 2023-07-26 11:32pm **Total Findings:** 38 | **New Findings:** 0 | **Resolved Findings:** 0 **Tested Project Files:** 422 **Detected Programming Languages:** 2 (Java*, JavaScript / Node.js) <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ### Most Relevant Findings > The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend Application](https://dev.whitesourcesoftware.com/app/orgs/QA%20SAST%20Only/scans/9f80d5fb-bfa1-465a-bc43-34e12c7658ad/sast?project=720f0ff2-c6c1-4ba9-a1b4-4606719f0a02). <table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [Servers.java:72](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L72) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L67-L72 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L68 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L72 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L72 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson5.java:73](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L68-L73 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L67 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L70 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [Assignment5.java:59](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L51 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson8.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L61-L66 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L58 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson5a.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57-L62 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L53 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson4.java:63](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L58-L63 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson3.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60-L65 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson2.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L57-L62 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson10.java:63](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L63) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L58-L63 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L52 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L53 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L58 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L63 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionChallenge.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L60-L65 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L63 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65 </details> </details> </td></tr></details></td></tr></tbody></table> ### Findings Overview | Severity | Vulnerability Type | CWE | Language | Count | |-|-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|DOM Based Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|JavaScript / Node.js|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|14| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Server Side Request Forgery|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Java*|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|XML External Entity (XXE) Injection|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Weak Pseudo-Random|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|JavaScript / Node.js|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Log Forging|[CWE-117](https://cwe.mitre.org/data/definitions/117.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|System Properties Disclosure|[CWE-497](https://cwe.mitre.org/data/definitions/497.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|1|
1.0
Code Security Report: 24 high severity findings, 38 total findings - # Code Security Report ### Scan Metadata **Latest Scan:** 2023-07-26 11:32pm **Total Findings:** 38 | **New Findings:** 0 | **Resolved Findings:** 0 **Tested Project Files:** 422 **Detected Programming Languages:** 2 (Java*, JavaScript / Node.js) <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ### Most Relevant Findings > The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend Application](https://dev.whitesourcesoftware.com/app/orgs/QA%20SAST%20Only/scans/9f80d5fb-bfa1-465a-bc43-34e12c7658ad/sast?project=720f0ff2-c6c1-4ba9-a1b4-4606719f0a02). <table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [Servers.java:72](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L72) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L67-L72 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L68 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L72 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/Servers.java#L72 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson5.java:73](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L68-L73 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L67 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L70 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [Assignment5.java:59](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L51 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson8.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L61-L66 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L58 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson5a.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57-L62 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L53 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson4.java:63](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L58-L63 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson3.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60-L65 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L57 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson2.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L57-L62 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L55 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L59 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionLesson10.java:63](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L63) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L58-L63 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L52 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L53 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L58 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson10.java#L63 </details> </details> </td></tr></details></td></tr><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td> [CWE-89](https://cwe.mitre.org/data/definitions/89.html) </td><td> [SqlInjectionChallenge.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65) </td><td>1</td><td>2023-07-26 11:34pm</td></tr><tr><td colspan='6'><details><summary>More info</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L60-L65 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L56 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L63 https://github.com/SAST-UP-DEV/SAST-Test-Repo-d65e35ec-761d-4cbe-9254-a4f76b577a86/blob/82801fc8526739fec15cb24bf6edaef86e499243/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65 </details> </details> </td></tr></details></td></tr></tbody></table> ### Findings Overview | Severity | Vulnerability Type | CWE | Language | Count | |-|-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|DOM Based Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|JavaScript / Node.js|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|14| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Server Side Request Forgery|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Java*|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|XML External Entity (XXE) Injection|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Weak Pseudo-Random|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|JavaScript / Node.js|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Log Forging|[CWE-117](https://cwe.mitre.org/data/definitions/117.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|System Properties Disclosure|[CWE-497](https://cwe.mitre.org/data/definitions/497.html)|Java*|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|1|
non_priority
code security report high severity findings total findings code security report scan metadata latest scan total findings new findings resolved findings tested project files detected programming languages java javascript node js check this box to manually trigger a scan most relevant findings the below list presents the most relevant findings that need your attention to view information on the remaining findings navigate to the severity vulnerability type cwe file data flows date high sql injection more info data flow s detected view data flow high sql injection more info data flow s detected view data flow high sql injection more info data flow s detected view data flow high sql injection more info data flow s detected view data flow high sql injection more info data flow s detected view data flow high sql injection more info data flow s detected view data flow high sql injection more info data flow s detected view data flow high sql injection more info data flow s detected view data flow high sql injection more info data flow s detected view data flow high sql injection more info data flow s detected view data flow findings overview severity vulnerability type cwe language count high dom based cross site scripting node js high path directory traversal high deserialization of untrusted data high sql injection high server side request forgery medium xml external entity xxe injection medium hardcoded password credentials medium error messages information exposure medium weak pseudo random node js low log forging low system properties disclosure low weak hash strength
0
723,780
24,907,880,191
IssuesEvent
2022-10-29 13:45:58
bounswe/bounswe2022group7
https://api.github.com/repos/bounswe/bounswe2022group7
closed
Implement Single Art Item Endpoint
Status: Pending Review Priority: High Difficulty: Medium Type: Implementation Target: Backend
We need to implement an endpoint that returns a single art item to the art item detail page. The art item should be requested given the id of the art item which is an art item's primary key. **Deadline:** 28/10/2022 23.59 **Reviewer:** @demet47
1.0
Implement Single Art Item Endpoint - We need to implement an endpoint that returns a single art item to the art item detail page. The art item should be requested given the id of the art item which is an art item's primary key. **Deadline:** 28/10/2022 23.59 **Reviewer:** @demet47
priority
implement single art item endpoint we need to implement an endpoint that returns a single art item to the art item detail page the art item should be requested given the id of the art item which is an art item s primary key deadline reviewer
1
89,549
25,832,267,447
IssuesEvent
2022-12-12 16:54:13
aws-amplify/amplify-flutter
https://api.github.com/repos/aws-amplify/amplify-flutter
closed
Following aws flutter tutorial results in xcode build error
iOS pending-close-response-required GraphQL API Build pending-triage
### Description I am experimenting with the aws amplify todo flutter tutorial - all works great (I can get the todo list working, etc) until I reach this page related to auth: https://docs.amplify.aws/start/getting-started/add-api/q/integration/flutter/#add-api-and-auth-plugins The xcode build fails and I've isolated it to adding this library to the pubspec.yaml: amplify_api: ^0.6.0 The error is: Swift Compiler Error (Xcode): Instance method 'throttle(for:scheduler:latest:)' requires that 'DispatchQueue' conform to 'Scheduler' Adding amplify_auth_cognito works just fine... Thanks! ### Categories - [ ] Analytics - [X] API (REST) - [X] API (GraphQL) - [ ] Auth - [ ] Authenticator - [ ] DataStore - [ ] Storage ### Steps to Reproduce _No response_ ### Screenshots _No response_ ### Platforms - [X] iOS - [ ] Android - [ ] Web - [ ] macOS - [ ] Windows - [ ] Linux ### Android Device/Emulator API Level _No response_ ### Environment ```bash Doctor summary (to see all details, run flutter doctor -v): [✓] Flutter (Channel stable, 3.3.4, on macOS 12.4 21F79 darwin-x64, locale en-US) [✓] Android toolchain - develop for Android devices (Android SDK version 31.0.0) [✓] Xcode - develop for iOS and macOS (Xcode 13.1) [✓] Chrome - develop for the web [✓] Android Studio (version 2020.3) [✓] VS Code (version 1.72.0) [✓] Connected device (3 available) [✓] HTTP Host Availability ``` ### Dependencies ```bash Dart SDK 2.18.2 Flutter SDK 3.3.4 theatre_insight 1.0.0+1 dependencies: - amplify_auth_cognito 0.6.8 [amplify_auth_cognito_android amplify_auth_cognito_ios amplify_core aws_common collection flutter meta plugin_platform_interface] - amplify_datastore 0.6.8 [flutter amplify_datastore_plugin_interface amplify_core plugin_platform_interface meta collection async] - amplify_flutter 0.6.8 [amplify_core amplify_datastore_plugin_interface amplify_flutter_android amplify_flutter_ios aws_common collection flutter meta plugin_platform_interface] - cupertino_icons 1.0.5 - flutter 0.0.0 [characters collection material_color_utilities meta vector_math sky_engine] transitive dependencies: - amplify_auth_cognito_android 0.6.8 [flutter] - amplify_auth_cognito_ios 0.6.8 [amplify_core flutter] - amplify_core 0.6.8 [aws_common collection flutter intl json_annotation meta plugin_platform_interface uuid] - amplify_datastore_plugin_interface 0.6.8 [amplify_core collection flutter meta] - amplify_flutter_android 0.6.8 [flutter] - amplify_flutter_ios 0.6.8 [amplify_core flutter] - async 2.9.0 [collection meta] - aws_common 0.1.1 [async collection http meta stream_transform uuid] - characters 1.2.1 - clock 1.1.1 - collection 1.16.0 - crypto 3.0.2 [typed_data] - http 0.13.5 [async http_parser meta path] - http_parser 4.0.1 [collection source_span string_scanner typed_data] - intl 0.17.0 [clock path] - json_annotation 4.7.0 [meta] - material_color_utilities 0.1.5 - meta 1.8.0 - path 1.8.2 - plugin_platform_interface 2.1.3 [meta] - sky_engine 0.0.99 - source_span 1.9.0 [collection path term_glyph] - stream_transform 2.0.1 - string_scanner 1.1.1 [source_span] - term_glyph 1.2.1 - typed_data 1.3.1 [collection] - uuid 3.0.6 [crypto] - vector_math 2.1.2 ``` ### Device iPhone 13 pro simulator ### OS ios 15.0 ### Deployment Method Amplify CLI ### CLI Version 10.2.3 ### Additional Context _No response_ ### Amplify Config Not sure which config here... { "usageDataConfig": { "installationUuid": "XXXXXXXX", "isUsageTrackingEnabled": true } }
1.0
Following aws flutter tutorial results in xcode build error - ### Description I am experimenting with the aws amplify todo flutter tutorial - all works great (I can get the todo list working, etc) until I reach this page related to auth: https://docs.amplify.aws/start/getting-started/add-api/q/integration/flutter/#add-api-and-auth-plugins The xcode build fails and I've isolated it to adding this library to the pubspec.yaml: amplify_api: ^0.6.0 The error is: Swift Compiler Error (Xcode): Instance method 'throttle(for:scheduler:latest:)' requires that 'DispatchQueue' conform to 'Scheduler' Adding amplify_auth_cognito works just fine... Thanks! ### Categories - [ ] Analytics - [X] API (REST) - [X] API (GraphQL) - [ ] Auth - [ ] Authenticator - [ ] DataStore - [ ] Storage ### Steps to Reproduce _No response_ ### Screenshots _No response_ ### Platforms - [X] iOS - [ ] Android - [ ] Web - [ ] macOS - [ ] Windows - [ ] Linux ### Android Device/Emulator API Level _No response_ ### Environment ```bash Doctor summary (to see all details, run flutter doctor -v): [✓] Flutter (Channel stable, 3.3.4, on macOS 12.4 21F79 darwin-x64, locale en-US) [✓] Android toolchain - develop for Android devices (Android SDK version 31.0.0) [✓] Xcode - develop for iOS and macOS (Xcode 13.1) [✓] Chrome - develop for the web [✓] Android Studio (version 2020.3) [✓] VS Code (version 1.72.0) [✓] Connected device (3 available) [✓] HTTP Host Availability ``` ### Dependencies ```bash Dart SDK 2.18.2 Flutter SDK 3.3.4 theatre_insight 1.0.0+1 dependencies: - amplify_auth_cognito 0.6.8 [amplify_auth_cognito_android amplify_auth_cognito_ios amplify_core aws_common collection flutter meta plugin_platform_interface] - amplify_datastore 0.6.8 [flutter amplify_datastore_plugin_interface amplify_core plugin_platform_interface meta collection async] - amplify_flutter 0.6.8 [amplify_core amplify_datastore_plugin_interface amplify_flutter_android amplify_flutter_ios aws_common collection flutter meta plugin_platform_interface] - cupertino_icons 1.0.5 - flutter 0.0.0 [characters collection material_color_utilities meta vector_math sky_engine] transitive dependencies: - amplify_auth_cognito_android 0.6.8 [flutter] - amplify_auth_cognito_ios 0.6.8 [amplify_core flutter] - amplify_core 0.6.8 [aws_common collection flutter intl json_annotation meta plugin_platform_interface uuid] - amplify_datastore_plugin_interface 0.6.8 [amplify_core collection flutter meta] - amplify_flutter_android 0.6.8 [flutter] - amplify_flutter_ios 0.6.8 [amplify_core flutter] - async 2.9.0 [collection meta] - aws_common 0.1.1 [async collection http meta stream_transform uuid] - characters 1.2.1 - clock 1.1.1 - collection 1.16.0 - crypto 3.0.2 [typed_data] - http 0.13.5 [async http_parser meta path] - http_parser 4.0.1 [collection source_span string_scanner typed_data] - intl 0.17.0 [clock path] - json_annotation 4.7.0 [meta] - material_color_utilities 0.1.5 - meta 1.8.0 - path 1.8.2 - plugin_platform_interface 2.1.3 [meta] - sky_engine 0.0.99 - source_span 1.9.0 [collection path term_glyph] - stream_transform 2.0.1 - string_scanner 1.1.1 [source_span] - term_glyph 1.2.1 - typed_data 1.3.1 [collection] - uuid 3.0.6 [crypto] - vector_math 2.1.2 ``` ### Device iPhone 13 pro simulator ### OS ios 15.0 ### Deployment Method Amplify CLI ### CLI Version 10.2.3 ### Additional Context _No response_ ### Amplify Config Not sure which config here... { "usageDataConfig": { "installationUuid": "XXXXXXXX", "isUsageTrackingEnabled": true } }
non_priority
following aws flutter tutorial results in xcode build error description i am experimenting with the aws amplify todo flutter tutorial all works great i can get the todo list working etc until i reach this page related to auth the xcode build fails and i ve isolated it to adding this library to the pubspec yaml amplify api the error is swift compiler error xcode instance method throttle for scheduler latest requires that dispatchqueue conform to scheduler adding amplify auth cognito works just fine thanks categories analytics api rest api graphql auth authenticator datastore storage steps to reproduce no response screenshots no response platforms ios android web macos windows linux android device emulator api level no response environment bash doctor summary to see all details run flutter doctor v flutter channel stable on macos darwin locale en us android toolchain develop for android devices android sdk version xcode develop for ios and macos xcode chrome develop for the web android studio version vs code version connected device available http host availability dependencies bash dart sdk flutter sdk theatre insight dependencies amplify auth cognito amplify datastore amplify flutter cupertino icons flutter transitive dependencies amplify auth cognito android amplify auth cognito ios amplify core amplify datastore plugin interface amplify flutter android amplify flutter ios async aws common characters clock collection crypto http http parser intl json annotation material color utilities meta path plugin platform interface sky engine source span stream transform string scanner term glyph typed data uuid vector math device iphone pro simulator os ios deployment method amplify cli cli version additional context no response amplify config not sure which config here usagedataconfig installationuuid xxxxxxxx isusagetrackingenabled true
0
396,031
11,700,391,601
IssuesEvent
2020-03-06 17:23:50
department-of-veterans-affairs/caseflow
https://api.github.com/repos/department-of-veterans-affairs/caseflow
closed
Investigate cache job runtime increase, part 2!
Priority: Low Team: Echo 🐬 Type: Investigation Type: Tech-Improvement
Runtimes for [the `UpdateCachedAppealsAttributesJob`](https://github.com/department-of-veterans-affairs/caseflow/blob/master/app/jobs/update_cached_appeals_attributes_job.rb) increased from significantly after [recent changes](https://github.com/department-of-veterans-affairs/caseflow/pull/13285). Short runtimes allow us to run the job more frequently and keep the cache more up-to-date. This ticket exists to determine why runtimes increased and address it if possible. ![Screen Shot 2020-02-11 at 12 23 42 PM](https://user-images.githubusercontent.com/45575454/74261583-7d25fb00-4cc9-11ea-9a9d-12bd6d7e6e73.png) _[Source: Datadog](https://app.datadoghq.com/dashboard/t5t-exj-m32/cronjob-statistics)_ ## Acceptance criteria * [ ] Determine the cause of the increased runtime length * [ ] Determine if the runtime length can be easily optimized to reduce runtime * [ ] Make the optimization
1.0
Investigate cache job runtime increase, part 2! - Runtimes for [the `UpdateCachedAppealsAttributesJob`](https://github.com/department-of-veterans-affairs/caseflow/blob/master/app/jobs/update_cached_appeals_attributes_job.rb) increased from significantly after [recent changes](https://github.com/department-of-veterans-affairs/caseflow/pull/13285). Short runtimes allow us to run the job more frequently and keep the cache more up-to-date. This ticket exists to determine why runtimes increased and address it if possible. ![Screen Shot 2020-02-11 at 12 23 42 PM](https://user-images.githubusercontent.com/45575454/74261583-7d25fb00-4cc9-11ea-9a9d-12bd6d7e6e73.png) _[Source: Datadog](https://app.datadoghq.com/dashboard/t5t-exj-m32/cronjob-statistics)_ ## Acceptance criteria * [ ] Determine the cause of the increased runtime length * [ ] Determine if the runtime length can be easily optimized to reduce runtime * [ ] Make the optimization
priority
investigate cache job runtime increase part runtimes for increased from significantly after short runtimes allow us to run the job more frequently and keep the cache more up to date this ticket exists to determine why runtimes increased and address it if possible acceptance criteria determine the cause of the increased runtime length determine if the runtime length can be easily optimized to reduce runtime make the optimization
1
282,533
30,889,358,512
IssuesEvent
2023-08-04 02:36:23
madhans23/linux-4.1.15
https://api.github.com/repos/madhans23/linux-4.1.15
reopened
CVE-2015-8962 (High) detected in linux-stable-rtv4.1.33
Mend: dependency security vulnerability
## CVE-2015-8962 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/scsi/sg.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/scsi/sg.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call. <p>Publish Date: 2016-11-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-8962>CVE-2015-8962</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8962">https://nvd.nist.gov/vuln/detail/CVE-2015-8962</a></p> <p>Release Date: 2016-11-16</p> <p>Fix Resolution: 4.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2015-8962 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2015-8962 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/scsi/sg.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/scsi/sg.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call. <p>Publish Date: 2016-11-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-8962>CVE-2015-8962</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8962">https://nvd.nist.gov/vuln/detail/CVE-2015-8962</a></p> <p>Release Date: 2016-11-16</p> <p>Fix Resolution: 4.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in base branch master vulnerable source files drivers scsi sg c drivers scsi sg c vulnerability details double free vulnerability in the sg common write function in drivers scsi sg c in the linux kernel before allows local users to gain privileges or cause a denial of service memory corruption and system crash by detaching a device during an sg io ioctl call publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
506,998
14,677,859,716
IssuesEvent
2020-12-31 01:02:05
ampproject/amphtml
https://api.github.com/repos/ampproject/amphtml
closed
amp-analytics: documentExit only works within same domain
Component: amp-analytics P1: High Priority Stale Type: Bug WG: analytics
## What's the issue? When using `amp-analytics` page visibility trigger with the `visibilitySpec` configured to use `documentExit`, the event will only fire when navigating between documents on the same domain but if you navigate to a different domain, the event won’t fire. ``` ... "on": "visible", "request": "event", "visibilitySpec": { "reportWhen": "documentExit" } ... ``` ## How do we reproduce the issue? You can follow these steps using this reduced test case on JSBin: https://jsbin.com/jujuhag/2/edit (To observe the events, click on "Preserve log" in the network tab and look for `POST` requests to `https://httpbin.org/post`) 1. Reload while on the JSBin test case page. The event should fire as expected. 2. In the location bar of the browser enter a jsbin.com URL (example, http://jsbin.com/help/getting-started) or click on a link from the JSBin navigation and the event will again fire as expected. 3. Now, this time while on the test case page, enter a different domain in the location bar, example, https://google.com. No event fires when the document exits. ## What browsers are affected? Chrome and Safari are both affected but works perfectly fine on FireFox. ## Which AMP version is affected? Version 1906051812580 Not sure if this is a new issue but it's the first time we've attempted to use `documentExit`.
1.0
amp-analytics: documentExit only works within same domain - ## What's the issue? When using `amp-analytics` page visibility trigger with the `visibilitySpec` configured to use `documentExit`, the event will only fire when navigating between documents on the same domain but if you navigate to a different domain, the event won’t fire. ``` ... "on": "visible", "request": "event", "visibilitySpec": { "reportWhen": "documentExit" } ... ``` ## How do we reproduce the issue? You can follow these steps using this reduced test case on JSBin: https://jsbin.com/jujuhag/2/edit (To observe the events, click on "Preserve log" in the network tab and look for `POST` requests to `https://httpbin.org/post`) 1. Reload while on the JSBin test case page. The event should fire as expected. 2. In the location bar of the browser enter a jsbin.com URL (example, http://jsbin.com/help/getting-started) or click on a link from the JSBin navigation and the event will again fire as expected. 3. Now, this time while on the test case page, enter a different domain in the location bar, example, https://google.com. No event fires when the document exits. ## What browsers are affected? Chrome and Safari are both affected but works perfectly fine on FireFox. ## Which AMP version is affected? Version 1906051812580 Not sure if this is a new issue but it's the first time we've attempted to use `documentExit`.
priority
amp analytics documentexit only works within same domain what s the issue when using amp analytics page visibility trigger with the visibilityspec configured to use documentexit the event will only fire when navigating between documents on the same domain but if you navigate to a different domain the event won’t fire on visible request event visibilityspec reportwhen documentexit how do we reproduce the issue you can follow these steps using this reduced test case on jsbin to observe the events click on preserve log in the network tab and look for post requests to reload while on the jsbin test case page the event should fire as expected in the location bar of the browser enter a jsbin com url example or click on a link from the jsbin navigation and the event will again fire as expected now this time while on the test case page enter a different domain in the location bar example no event fires when the document exits what browsers are affected chrome and safari are both affected but works perfectly fine on firefox which amp version is affected version not sure if this is a new issue but it s the first time we ve attempted to use documentexit
1
283,731
30,913,533,419
IssuesEvent
2023-08-05 02:09:36
hshivhare67/kernel_v4.19.72
https://api.github.com/repos/hshivhare67/kernel_v4.19.72
reopened
CVE-2018-20669 (High) detected in linuxlinux-4.19.282
Mend: dependency security vulnerability
## CVE-2018-20669 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.282</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/hshivhare67/kernel_v4.19.72/commit/139c4e073703974ca0b05255c4cff6dcd52a8e31">139c4e073703974ca0b05255c4cff6dcd52a8e31</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-20669>CVE-2018-20669</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: v5.0-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-20669 (High) detected in linuxlinux-4.19.282 - ## CVE-2018-20669 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.282</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/hshivhare67/kernel_v4.19.72/commit/139c4e073703974ca0b05255c4cff6dcd52a8e31">139c4e073703974ca0b05255c4cff6dcd52a8e31</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-20669>CVE-2018-20669</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: v5.0-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details an issue where a provided address with access ok is not checked was discovered in gem ioctl in drivers gpu drm gem execbuffer c in the linux kernel through a local attacker can craft a malicious ioctl function call to overwrite arbitrary kernel memory resulting in a denial of service or privilege escalation publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
160,166
20,099,652,527
IssuesEvent
2022-02-07 01:19:30
venkateshreddypala/post-it-a4
https://api.github.com/repos/venkateshreddypala/post-it-a4
opened
CVE-2022-0437 (Medium) detected in karma-1.7.0.tgz
security vulnerability
## CVE-2022-0437 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>karma-1.7.0.tgz</b></p></summary> <p>Spectacular Test Runner for JavaScript.</p> <p>Library home page: <a href="https://registry.npmjs.org/karma/-/karma-1.7.0.tgz">https://registry.npmjs.org/karma/-/karma-1.7.0.tgz</a></p> <p>Path to dependency file: /post-it-a4/package.json</p> <p>Path to vulnerable library: /post-it-a4/node_modules/karma/package.json</p> <p> Dependency Hierarchy: - :x: **karma-1.7.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Cross-site Scripting (XSS) - DOM in NPM karma prior to 6.3.14. <p>Publish Date: 2022-02-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0437>CVE-2022-0437</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0437">https://nvd.nist.gov/vuln/detail/CVE-2022-0437</a></p> <p>Release Date: 2022-02-05</p> <p>Fix Resolution: karma - v6.3.14</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-0437 (Medium) detected in karma-1.7.0.tgz - ## CVE-2022-0437 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>karma-1.7.0.tgz</b></p></summary> <p>Spectacular Test Runner for JavaScript.</p> <p>Library home page: <a href="https://registry.npmjs.org/karma/-/karma-1.7.0.tgz">https://registry.npmjs.org/karma/-/karma-1.7.0.tgz</a></p> <p>Path to dependency file: /post-it-a4/package.json</p> <p>Path to vulnerable library: /post-it-a4/node_modules/karma/package.json</p> <p> Dependency Hierarchy: - :x: **karma-1.7.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Cross-site Scripting (XSS) - DOM in NPM karma prior to 6.3.14. <p>Publish Date: 2022-02-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0437>CVE-2022-0437</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0437">https://nvd.nist.gov/vuln/detail/CVE-2022-0437</a></p> <p>Release Date: 2022-02-05</p> <p>Fix Resolution: karma - v6.3.14</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in karma tgz cve medium severity vulnerability vulnerable library karma tgz spectacular test runner for javascript library home page a href path to dependency file post it package json path to vulnerable library post it node modules karma package json dependency hierarchy x karma tgz vulnerable library vulnerability details cross site scripting xss dom in npm karma prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution karma step up your open source security game with whitesource
0
188,827
6,782,321,265
IssuesEvent
2017-10-30 07:27:59
Cloud-CV/EvalAI
https://api.github.com/repos/Cloud-CV/EvalAI
opened
Add feature to invite users to host team using URL
backend dependent hard-to-fix new-feature priority-high
Very similar to #1346. ## Deliverables Add a feature to invite new team member to a participant team using a Unique URL. Also, don't forget to write unit tests. :) ## Steps 1. **user1** enters the email of his teammate (let's say **user2**) 2. Send an email to **user2** (if he/she is registered on EvalAI) with a unique URL 3. **user2** clicks on the URL to accept the invitation to the team. 4. *user1* gets an email saying that "**user2** has accepted your invite to team <blah>" (we can iterate over the email message later) ### Some important points to note - [ ] Checks performed before inviting to the team should be similar to current invitation logic
1.0
Add feature to invite users to host team using URL - Very similar to #1346. ## Deliverables Add a feature to invite new team member to a participant team using a Unique URL. Also, don't forget to write unit tests. :) ## Steps 1. **user1** enters the email of his teammate (let's say **user2**) 2. Send an email to **user2** (if he/she is registered on EvalAI) with a unique URL 3. **user2** clicks on the URL to accept the invitation to the team. 4. *user1* gets an email saying that "**user2** has accepted your invite to team <blah>" (we can iterate over the email message later) ### Some important points to note - [ ] Checks performed before inviting to the team should be similar to current invitation logic
priority
add feature to invite users to host team using url very similar to deliverables add a feature to invite new team member to a participant team using a unique url also don t forget to write unit tests steps enters the email of his teammate let s say send an email to if he she is registered on evalai with a unique url clicks on the url to accept the invitation to the team gets an email saying that has accepted your invite to team we can iterate over the email message later some important points to note checks performed before inviting to the team should be similar to current invitation logic
1
307,019
9,414,124,187
IssuesEvent
2019-04-10 09:25:46
StrangeLoopGames/EcoIssues
https://api.github.com/repos/StrangeLoopGames/EcoIssues
closed
Shaper and Electric planer have "out of collision" parts.
Medium Priority Push Candidate
Found some notes about bugs, want to place it before stop volontier work. ![shaper](https://user-images.githubusercontent.com/4980243/53541912-0847c880-3b2d-11e9-99af-47831f529571.gif) ![electricplaner](https://user-images.githubusercontent.com/4980243/53541911-0847c880-3b2d-11e9-9dba-cf979dbe1ab6.gif)
1.0
Shaper and Electric planer have "out of collision" parts. - Found some notes about bugs, want to place it before stop volontier work. ![shaper](https://user-images.githubusercontent.com/4980243/53541912-0847c880-3b2d-11e9-99af-47831f529571.gif) ![electricplaner](https://user-images.githubusercontent.com/4980243/53541911-0847c880-3b2d-11e9-9dba-cf979dbe1ab6.gif)
priority
shaper and electric planer have out of collision parts found some notes about bugs want to place it before stop volontier work
1
298,069
9,195,552,186
IssuesEvent
2019-03-07 02:54:58
gw2efficiency/issues
https://api.github.com/repos/gw2efficiency/issues
closed
Miscalculating Deaths/hour and/or Playtime
1-Type: Bug 2-Priority: C 3-Complexity: Low 4-Impact: Low 5-Area: Account 9-Status: For next release 9-Status: Ready for Release
I have 4,142h 33m Playtime and 7,666 deaths as per the https://gw2efficiency.com/account/statistics page. In the https://gw2efficiency.com/account/statistics/statistics.deathCountPerHour Page i have 1.85 deaths/hour which seems correct. In the https://gw2efficiency.com/account/overview Bottom it shows: You played a total of 4,038 hours across all characters During that time you died a total of 7,666 times. That's 1.90 deaths per hour This is using your account data from 4:01:42 PM. which is also correct for the given data. But why is there a difference in the Playtime? Does the first include deleted characters and the other not? But if so my deleted characters also had a few deaths, wich don't seem to count as both death values are the same.
1.0
Miscalculating Deaths/hour and/or Playtime - I have 4,142h 33m Playtime and 7,666 deaths as per the https://gw2efficiency.com/account/statistics page. In the https://gw2efficiency.com/account/statistics/statistics.deathCountPerHour Page i have 1.85 deaths/hour which seems correct. In the https://gw2efficiency.com/account/overview Bottom it shows: You played a total of 4,038 hours across all characters During that time you died a total of 7,666 times. That's 1.90 deaths per hour This is using your account data from 4:01:42 PM. which is also correct for the given data. But why is there a difference in the Playtime? Does the first include deleted characters and the other not? But if so my deleted characters also had a few deaths, wich don't seem to count as both death values are the same.
priority
miscalculating deaths hour and or playtime i have playtime and deaths as per the page in the page i have deaths hour which seems correct in the bottom it shows you played a total of hours across all characters during that time you died a total of times that s deaths per hour this is using your account data from pm which is also correct for the given data but why is there a difference in the playtime does the first include deleted characters and the other not but if so my deleted characters also had a few deaths wich don t seem to count as both death values are the same
1
23,744
2,660,967,536
IssuesEvent
2015-03-19 11:41:06
TypeStrong/atom-typescript
https://api.github.com/repos/TypeStrong/atom-typescript
closed
Atom TypeScript Update Failure
bug platform:windows priority:high
Just got this, this morning while trying to update Atom TypeScript to new version. I'm on Windows 7 (64-bit). I had no .ts files open at the time. Let me know if you need any more information. After restarting Atom, it didn't show any updates for Atom TypeScript. It was indeed installed, but only partially? It didn't function at all and remained in "Installed Packages" without an image or version. Resolved by uninstalling and reinstalling. Not a big deal, but just thought I'd submit. ![update-fail](https://cloud.githubusercontent.com/assets/2846662/6714756/43540d46-cd57-11e4-9ec3-61a37bcbc978.png) ![update-fail-2](https://cloud.githubusercontent.com/assets/2846662/6714876/fac1cff4-cd57-11e4-840e-6dcb563e1f56.png)
1.0
Atom TypeScript Update Failure - Just got this, this morning while trying to update Atom TypeScript to new version. I'm on Windows 7 (64-bit). I had no .ts files open at the time. Let me know if you need any more information. After restarting Atom, it didn't show any updates for Atom TypeScript. It was indeed installed, but only partially? It didn't function at all and remained in "Installed Packages" without an image or version. Resolved by uninstalling and reinstalling. Not a big deal, but just thought I'd submit. ![update-fail](https://cloud.githubusercontent.com/assets/2846662/6714756/43540d46-cd57-11e4-9ec3-61a37bcbc978.png) ![update-fail-2](https://cloud.githubusercontent.com/assets/2846662/6714876/fac1cff4-cd57-11e4-840e-6dcb563e1f56.png)
priority
atom typescript update failure just got this this morning while trying to update atom typescript to new version i m on windows bit i had no ts files open at the time let me know if you need any more information after restarting atom it didn t show any updates for atom typescript it was indeed installed but only partially it didn t function at all and remained in installed packages without an image or version resolved by uninstalling and reinstalling not a big deal but just thought i d submit
1
25,316
4,153,344,731
IssuesEvent
2016-06-16 07:16:30
IDgis/geoportaal-test
https://api.github.com/repos/IDgis/geoportaal-test
closed
Mutatiedatum niet gebruikt bij volgorde lijst geoportaal
bug gebruikerstest
Als ik de mutatiedatum aanpas, bij geodatasets of bij statische kaarten, dan kan eventueel de volgorde in de lijst van gevonden bestanden veranderen. Dat gaat echter niet goed: ik heb de mutatiedatum van statische kaarten aangepast (op vandaag gezet) en in de lijst blijkt dat er enkele niet op volgorde staan: het blijkt dat hier de creatiedatum en niet de mutatiedatum voor de volgorde wordt gebruikt, zie bijgevoegd figuur. Als dat zo is, dan is dat niet goed. De bedoeling is, dat de meest recente datum in de lijst komt te staan, dus als de mutatiedatum meer recent is dan een andere datum, dan moet die datum zichtbaar zijn in de lijst (bij 1, zie figuur) Niet uitgezocht is, welke datums nog meer niet gebruikt worden. Bedoeling is dat altijd de meest recente datum zichtbaar is en dat die ook de volgorde van de lijst bepaalt. zie bijgevoegd figuur ![mutatie_datum_niet_gebruikt](https://cloud.githubusercontent.com/assets/9005444/15751244/b48138a6-28e9-11e6-9441-30c503f92dda.jpg)
1.0
Mutatiedatum niet gebruikt bij volgorde lijst geoportaal - Als ik de mutatiedatum aanpas, bij geodatasets of bij statische kaarten, dan kan eventueel de volgorde in de lijst van gevonden bestanden veranderen. Dat gaat echter niet goed: ik heb de mutatiedatum van statische kaarten aangepast (op vandaag gezet) en in de lijst blijkt dat er enkele niet op volgorde staan: het blijkt dat hier de creatiedatum en niet de mutatiedatum voor de volgorde wordt gebruikt, zie bijgevoegd figuur. Als dat zo is, dan is dat niet goed. De bedoeling is, dat de meest recente datum in de lijst komt te staan, dus als de mutatiedatum meer recent is dan een andere datum, dan moet die datum zichtbaar zijn in de lijst (bij 1, zie figuur) Niet uitgezocht is, welke datums nog meer niet gebruikt worden. Bedoeling is dat altijd de meest recente datum zichtbaar is en dat die ook de volgorde van de lijst bepaalt. zie bijgevoegd figuur ![mutatie_datum_niet_gebruikt](https://cloud.githubusercontent.com/assets/9005444/15751244/b48138a6-28e9-11e6-9441-30c503f92dda.jpg)
non_priority
mutatiedatum niet gebruikt bij volgorde lijst geoportaal als ik de mutatiedatum aanpas bij geodatasets of bij statische kaarten dan kan eventueel de volgorde in de lijst van gevonden bestanden veranderen dat gaat echter niet goed ik heb de mutatiedatum van statische kaarten aangepast op vandaag gezet en in de lijst blijkt dat er enkele niet op volgorde staan het blijkt dat hier de creatiedatum en niet de mutatiedatum voor de volgorde wordt gebruikt zie bijgevoegd figuur als dat zo is dan is dat niet goed de bedoeling is dat de meest recente datum in de lijst komt te staan dus als de mutatiedatum meer recent is dan een andere datum dan moet die datum zichtbaar zijn in de lijst bij zie figuur niet uitgezocht is welke datums nog meer niet gebruikt worden bedoeling is dat altijd de meest recente datum zichtbaar is en dat die ook de volgorde van de lijst bepaalt zie bijgevoegd figuur
0
318,919
9,716,977,308
IssuesEvent
2019-05-29 08:11:37
huridocs/uwazi
https://api.github.com/repos/huridocs/uwazi
opened
Semantic search BETA
Priority: High Status: Sprint
- [ ] Remove launching the search from the selection of documents. Launch always on the filtered documents/whole library. - [ ] When we have pagination it will only run the search on the documents displayed. It should run the search in all the documents affected by the filtering. - [ ] Remove the search box from the panel and instead add a toggle button in library's search box. - [ ] Make a component that will create a description of the search based in the multiselect options. Use this description as part of the title for the saved semantic search. - [ ] Add an explanation of the feature on the side bar where the threshold and minimum relevant sentences are. - [ ] Format the threshold % to just 2 decimals. - [ ] Add explore and precision labels under the threshold bar. - [ ] Add "per document" to the minimum sentences label. - [ ] Also add the description of the search (created from the selected filters) in the semantic search results. - [ ] Add the total amount of sentences in the cards. Ie. 345 out of 500. - [ ] Remove the "Average sentence score" from the cards. - [ ] Add a hard-coded order criteria "% of document above the threshold". - [ ] Add the % of document sentences above the threshold in the cards. - [ ] When you select a result, in the side panel, replace "Average sentence score" by "% of document above threshold". - [ ] Add a bulk edit button that will trigger bulk edition for all documents above the thresholds.
1.0
Semantic search BETA - - [ ] Remove launching the search from the selection of documents. Launch always on the filtered documents/whole library. - [ ] When we have pagination it will only run the search on the documents displayed. It should run the search in all the documents affected by the filtering. - [ ] Remove the search box from the panel and instead add a toggle button in library's search box. - [ ] Make a component that will create a description of the search based in the multiselect options. Use this description as part of the title for the saved semantic search. - [ ] Add an explanation of the feature on the side bar where the threshold and minimum relevant sentences are. - [ ] Format the threshold % to just 2 decimals. - [ ] Add explore and precision labels under the threshold bar. - [ ] Add "per document" to the minimum sentences label. - [ ] Also add the description of the search (created from the selected filters) in the semantic search results. - [ ] Add the total amount of sentences in the cards. Ie. 345 out of 500. - [ ] Remove the "Average sentence score" from the cards. - [ ] Add a hard-coded order criteria "% of document above the threshold". - [ ] Add the % of document sentences above the threshold in the cards. - [ ] When you select a result, in the side panel, replace "Average sentence score" by "% of document above threshold". - [ ] Add a bulk edit button that will trigger bulk edition for all documents above the thresholds.
priority
semantic search beta remove launching the search from the selection of documents launch always on the filtered documents whole library when we have pagination it will only run the search on the documents displayed it should run the search in all the documents affected by the filtering remove the search box from the panel and instead add a toggle button in library s search box make a component that will create a description of the search based in the multiselect options use this description as part of the title for the saved semantic search add an explanation of the feature on the side bar where the threshold and minimum relevant sentences are format the threshold to just decimals add explore and precision labels under the threshold bar add per document to the minimum sentences label also add the description of the search created from the selected filters in the semantic search results add the total amount of sentences in the cards ie out of remove the average sentence score from the cards add a hard coded order criteria of document above the threshold add the of document sentences above the threshold in the cards when you select a result in the side panel replace average sentence score by of document above threshold add a bulk edit button that will trigger bulk edition for all documents above the thresholds
1
566,187
16,814,555,611
IssuesEvent
2021-06-17 05:16:47
neo-one-suite/neo-one
https://api.github.com/repos/neo-one-suite/neo-one
opened
Investigate/fix new max key size for map stack items
area/compiler good first issue kind/bug kind/cleanup priority/important-soon
Map stack items now have a max key size. We need to make sure that anywhere that we set key-value pairs in map stack items the key has to be sliced if it's too large. And then all key lookups need to slice the key the same way before doing the lookup. This is handled by the `SliceKeyHelper` and may have even been done everywhere. But this issue is to check to make sure it's implemented correctly and everywhere. This also poses a problem for getting the keys from a map with the KEYS opcode. So look into that too.
1.0
Investigate/fix new max key size for map stack items - Map stack items now have a max key size. We need to make sure that anywhere that we set key-value pairs in map stack items the key has to be sliced if it's too large. And then all key lookups need to slice the key the same way before doing the lookup. This is handled by the `SliceKeyHelper` and may have even been done everywhere. But this issue is to check to make sure it's implemented correctly and everywhere. This also poses a problem for getting the keys from a map with the KEYS opcode. So look into that too.
priority
investigate fix new max key size for map stack items map stack items now have a max key size we need to make sure that anywhere that we set key value pairs in map stack items the key has to be sliced if it s too large and then all key lookups need to slice the key the same way before doing the lookup this is handled by the slicekeyhelper and may have even been done everywhere but this issue is to check to make sure it s implemented correctly and everywhere this also poses a problem for getting the keys from a map with the keys opcode so look into that too
1
199,635
6,992,760,132
IssuesEvent
2017-12-15 08:35:26
xwikisas/application-onlyoffice-connector
https://api.github.com/repos/xwikisas/application-onlyoffice-connector
closed
Update XWikiOnlyOfficeCode.ConfigurationClass to use the #getMissingLicenseMessage macro
Priority: Minor Type: Improvement
We should use the #getMissingLicenseMessage macro instead of the current implementation: https://github.com/xwikisas/application-onlyoffice-connector/blob/fa245efa8c5f00b80a0284480f7879df8716ea3e/application-onlyoffice-connector-ui/src/main/resources/XWikiOnlyOfficeCode/ConfigurationClass.xml#L84 The macro also makes sure the link always points to the Main Wiki. Example usage of the macro here: https://github.com/xwikisas/application-ideas/blob/0aa38048b83ba9e113cdbe7389a1419a1cb7f37f/src/main/resources/Ideas/WebHome.xml#L192
1.0
Update XWikiOnlyOfficeCode.ConfigurationClass to use the #getMissingLicenseMessage macro - We should use the #getMissingLicenseMessage macro instead of the current implementation: https://github.com/xwikisas/application-onlyoffice-connector/blob/fa245efa8c5f00b80a0284480f7879df8716ea3e/application-onlyoffice-connector-ui/src/main/resources/XWikiOnlyOfficeCode/ConfigurationClass.xml#L84 The macro also makes sure the link always points to the Main Wiki. Example usage of the macro here: https://github.com/xwikisas/application-ideas/blob/0aa38048b83ba9e113cdbe7389a1419a1cb7f37f/src/main/resources/Ideas/WebHome.xml#L192
priority
update xwikionlyofficecode configurationclass to use the getmissinglicensemessage macro we should use the getmissinglicensemessage macro instead of the current implementation the macro also makes sure the link always points to the main wiki example usage of the macro here
1
712,032
24,482,597,367
IssuesEvent
2022-10-09 02:30:26
chaotic-aur/packages
https://api.github.com/repos/chaotic-aur/packages
closed
[Request] openssl3-git
request:new-pkg priority:low
### Link to the package(s) in the AUR https://aur.archlinux.org/packages/openssl3-git ### Utility this package has for you provides library file for ruffle, a flash emulator ### Do you consider the package(s) to be useful for every Chaotic-AUR user? No, but for a few. ### Do you consider the package to be useful for feature testing/preview? - [ ] Yes ### Have you tested if the package builds in a clean chroot? - [ ] Yes ### Does the package's license allow redistributing it? YES! ### Have you searched the issues to ensure this request is unique? - [X] YES! ### Have you read the README to ensure this package is not banned? - [X] YES! ### More information _No response_
1.0
[Request] openssl3-git - ### Link to the package(s) in the AUR https://aur.archlinux.org/packages/openssl3-git ### Utility this package has for you provides library file for ruffle, a flash emulator ### Do you consider the package(s) to be useful for every Chaotic-AUR user? No, but for a few. ### Do you consider the package to be useful for feature testing/preview? - [ ] Yes ### Have you tested if the package builds in a clean chroot? - [ ] Yes ### Does the package's license allow redistributing it? YES! ### Have you searched the issues to ensure this request is unique? - [X] YES! ### Have you read the README to ensure this package is not banned? - [X] YES! ### More information _No response_
priority
git link to the package s in the aur utility this package has for you provides library file for ruffle a flash emulator do you consider the package s to be useful for every chaotic aur user no but for a few do you consider the package to be useful for feature testing preview yes have you tested if the package builds in a clean chroot yes does the package s license allow redistributing it yes have you searched the issues to ensure this request is unique yes have you read the readme to ensure this package is not banned yes more information no response
1
18,735
4,308,853,241
IssuesEvent
2016-07-21 14:20:45
Bouke/django-two-factor-auth
https://api.github.com/repos/Bouke/django-two-factor-auth
closed
Django 1.7 still listed as supported, while it isn't
documentation
In the docs and the readme Django 1.7 is still listed as being supported, while it isn't. The docs and readme should be updated to reflect this.
1.0
Django 1.7 still listed as supported, while it isn't - In the docs and the readme Django 1.7 is still listed as being supported, while it isn't. The docs and readme should be updated to reflect this.
non_priority
django still listed as supported while it isn t in the docs and the readme django is still listed as being supported while it isn t the docs and readme should be updated to reflect this
0
24,490
6,546,812,915
IssuesEvent
2017-09-04 12:05:31
yiisoft/yii2
https://api.github.com/repos/yiisoft/yii2
closed
Codeception Yii2 module should use `andWhere`.
Codeception
### What steps will reproduce the problem? Create an AR query that explicitly disables `where`. Motivation: my AR query filters deleted records and I do not want parts of my code to intentionally or unintentionally retrieve those records. ### What is the expected result? When I use `$this->tester->seeRecord(User::class, ['id' => 15]);` I expect it to find (or not find) the record. ### What do you get instead? Since the connector uses `->where` instead of `->andWhere()` I get an exception. If I implemented my code differently, the connector would still ignore any conditions I set on the query object and replace them with just the conditions passed to `seeRecord()`. ### Proposed solution Use `andWhere` instead.
1.0
Codeception Yii2 module should use `andWhere`. - ### What steps will reproduce the problem? Create an AR query that explicitly disables `where`. Motivation: my AR query filters deleted records and I do not want parts of my code to intentionally or unintentionally retrieve those records. ### What is the expected result? When I use `$this->tester->seeRecord(User::class, ['id' => 15]);` I expect it to find (or not find) the record. ### What do you get instead? Since the connector uses `->where` instead of `->andWhere()` I get an exception. If I implemented my code differently, the connector would still ignore any conditions I set on the query object and replace them with just the conditions passed to `seeRecord()`. ### Proposed solution Use `andWhere` instead.
non_priority
codeception module should use andwhere what steps will reproduce the problem create an ar query that explicitly disables where motivation my ar query filters deleted records and i do not want parts of my code to intentionally or unintentionally retrieve those records what is the expected result when i use this tester seerecord user class i expect it to find or not find the record what do you get instead since the connector uses where instead of andwhere i get an exception if i implemented my code differently the connector would still ignore any conditions i set on the query object and replace them with just the conditions passed to seerecord proposed solution use andwhere instead
0
626,392
19,822,369,301
IssuesEvent
2022-01-20 00:00:32
unitaryfund/mitiq
https://api.github.com/repos/unitaryfund/mitiq
closed
Bayes factory fails on Windows build due to pymc3 install / dependencies
priority/p1 zne zne/inference stale
Full message: ``` ================================== FAILURES =================================== _____________________________ test_exp_bayes_extr _____________________________ [gw1] win32 -- Python 3.8.8 c:\hostedtoolcache\windows\python\3.8.8\x64\python.exe def test_exp_bayes_extr(): """Test of the ExpBayesFactory's extrapolator.""" x_vals = np.linspace(1.0, 5.0, 20) seeded_f = apply_seed_to_func(f_exp_bayes, SEED) fac = ExpBayesFactory(scale_factors=x_vals) assert not fac._opt_params fac.run_classical(seeded_f) > zne_value = fac.reduce() mitiq\zne\tests\test_inference.py:462: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ mitiq\zne\inference.py:1612: in reduce ) = self.extrapolate( # type: ignore mitiq\zne\inference.py:1565: in extrapolate a = pm.Normal("a", 0, 5) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\pymc3\distributions\distribution.py:121: in __new__ dist = cls.dist(*args, **kwargs) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\pymc3\distributions\distribution.py:130: in dist dist.__init__(*args, **kwargs) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\pymc3\distributions\continuous.py:488: in __init__ self.variance = 1.0 / self.tau c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\tensor\var.py:176: in __rtruediv__ return theano.tensor.basic.true_div(other, self) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\graph\op.py:253: in __call__ compute_test_value(node) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\graph\op.py:126: in compute_test_value thunk = node.op.make_thunk(node, storage_map, compute_map, no_recycling=[]) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\graph\op.py:634: in make_thunk return self.make_c_thunk(node, storage_map, compute_map, no_recycling) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\graph\op.py:600: in make_c_thunk outputs = cl.make_thunk( c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\basic.py:1203: in make_thunk cthunk, module, in_storage, out_storage, error_storage = self.__compile__( c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\basic.py:1138: in __compile__ thunk, module = self.cthunk_factory( c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\basic.py:1634: in cthunk_factory module = get_module_cache().module_from_key(key=key, lnk=self) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\cmodule.py:1191: in module_from_key module = lnk.compile_cmodule(location) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\basic.py:1543: in compile_cmodule module = c_compiler.compile_str( c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\cmodule.py:2557: in compile_str return dlimport(lib_filename) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ fullpath = 'C:\\Users\\runneradmin\\AppData\\Local\\Theano\\compiledir_Windows-10-10.0.17763-SP0-Intel64_Family_6_Model_63_Stepping_2_GenuineIntel-3.8.8-64\\tmphsoxh7a_\\m31975b6dadb59d49af3f2b36405378825884299512ee0ed9081be33fa591d30d.pyd' suffix = '.pyd' global import_time try: importlib.invalidate_caches() t0 = time.time() with warnings.catch_warnings(): warnings.filterwarnings("ignore", message="numpy.ndarray size changed") > rval = __import__(module_name, {}, {}, [module_name]) E ImportError: DLL load failed while importing m31975b6dadb59d49af3f2b36405378825884299512ee0ed9081be33fa591d30d: The specified module could not be found. c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\cmodule.py:294: ImportError ----------- coverage: platform win32, python 3.8.8-final-0 ----------- Name Stmts Miss Cover ----------------------------------------------------------------- mitiq\__init__.py 5 0 100% mitiq\_about.py 24 10 58% mitiq\_typing.py 9 0 100% mitiq\_version.py 5 0 100% mitiq\benchmarks\__init__.py 1 0 100% mitiq\benchmarks\maxcut.py 44 2 95% mitiq\benchmarks\random_circuits.py 45 2 96% mitiq\benchmarks\randomized_benchmarking.py 15 1 93% mitiq\benchmarks\utils.py 11 0 100% mitiq\collector.py 61 0 100% mitiq\conversions.py 66 1 98% mitiq\mitiq_pyquil\__init__.py 1 0 100% mitiq\mitiq_pyquil\compiler.py 149 149 0% mitiq\mitiq_pyquil\conversions.py 17 0 100% mitiq\mitiq_pyquil\pyquil_utils.py 29 29 0% mitiq\mitiq_qiskit\__init__.py 2 0 100% mitiq\mitiq_qiskit\conversions.py 94 12 87% mitiq\mitiq_qiskit\qiskit_utils.py 49 34 31% mitiq\pec\__init__.py 4 0 100% mitiq\pec\pec.py 34 1 97% mitiq\pec\representations\__init__.py 1 0 100% mitiq\pec\representations\depolarizing.py 73 0 100% mitiq\pec\sampling.py 36 1 97% mitiq\pec\types\__init__.py 1 0 100% mitiq\pec\types\types.py 188 4 98% mitiq\pec\utils.py 20 0 100% mitiq\utils.py 71 0 100% mitiq\zne\__init__.py 3 0 100% mitiq\zne\inference.py 407 37 91% mitiq\zne\scaling\__init__.py 3 0 100% mitiq\zne\scaling\folding.py 213 7 97% mitiq\zne\scaling\parameter.py 48 0 100% mitiq\zne\zne.py 29 1 97% ----------------------------------------------------------------- TOTAL 1758 291 83% Coverage XML written to file coverage.xml =========================== short test summary info =========================== FAILED mitiq/zne/tests/test_inference.py::test_exp_bayes_extr - ImportError: ... ============ 1 failed, 608 passed, 3 skipped in 142.02s (0:02:22) ============= mingw32-make: *** [Makefile:63: test] Error 1 ```
1.0
Bayes factory fails on Windows build due to pymc3 install / dependencies - Full message: ``` ================================== FAILURES =================================== _____________________________ test_exp_bayes_extr _____________________________ [gw1] win32 -- Python 3.8.8 c:\hostedtoolcache\windows\python\3.8.8\x64\python.exe def test_exp_bayes_extr(): """Test of the ExpBayesFactory's extrapolator.""" x_vals = np.linspace(1.0, 5.0, 20) seeded_f = apply_seed_to_func(f_exp_bayes, SEED) fac = ExpBayesFactory(scale_factors=x_vals) assert not fac._opt_params fac.run_classical(seeded_f) > zne_value = fac.reduce() mitiq\zne\tests\test_inference.py:462: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ mitiq\zne\inference.py:1612: in reduce ) = self.extrapolate( # type: ignore mitiq\zne\inference.py:1565: in extrapolate a = pm.Normal("a", 0, 5) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\pymc3\distributions\distribution.py:121: in __new__ dist = cls.dist(*args, **kwargs) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\pymc3\distributions\distribution.py:130: in dist dist.__init__(*args, **kwargs) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\pymc3\distributions\continuous.py:488: in __init__ self.variance = 1.0 / self.tau c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\tensor\var.py:176: in __rtruediv__ return theano.tensor.basic.true_div(other, self) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\graph\op.py:253: in __call__ compute_test_value(node) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\graph\op.py:126: in compute_test_value thunk = node.op.make_thunk(node, storage_map, compute_map, no_recycling=[]) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\graph\op.py:634: in make_thunk return self.make_c_thunk(node, storage_map, compute_map, no_recycling) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\graph\op.py:600: in make_c_thunk outputs = cl.make_thunk( c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\basic.py:1203: in make_thunk cthunk, module, in_storage, out_storage, error_storage = self.__compile__( c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\basic.py:1138: in __compile__ thunk, module = self.cthunk_factory( c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\basic.py:1634: in cthunk_factory module = get_module_cache().module_from_key(key=key, lnk=self) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\cmodule.py:1191: in module_from_key module = lnk.compile_cmodule(location) c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\basic.py:1543: in compile_cmodule module = c_compiler.compile_str( c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\cmodule.py:2557: in compile_str return dlimport(lib_filename) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ fullpath = 'C:\\Users\\runneradmin\\AppData\\Local\\Theano\\compiledir_Windows-10-10.0.17763-SP0-Intel64_Family_6_Model_63_Stepping_2_GenuineIntel-3.8.8-64\\tmphsoxh7a_\\m31975b6dadb59d49af3f2b36405378825884299512ee0ed9081be33fa591d30d.pyd' suffix = '.pyd' global import_time try: importlib.invalidate_caches() t0 = time.time() with warnings.catch_warnings(): warnings.filterwarnings("ignore", message="numpy.ndarray size changed") > rval = __import__(module_name, {}, {}, [module_name]) E ImportError: DLL load failed while importing m31975b6dadb59d49af3f2b36405378825884299512ee0ed9081be33fa591d30d: The specified module could not be found. c:\hostedtoolcache\windows\python\3.8.8\x64\lib\site-packages\theano\link\c\cmodule.py:294: ImportError ----------- coverage: platform win32, python 3.8.8-final-0 ----------- Name Stmts Miss Cover ----------------------------------------------------------------- mitiq\__init__.py 5 0 100% mitiq\_about.py 24 10 58% mitiq\_typing.py 9 0 100% mitiq\_version.py 5 0 100% mitiq\benchmarks\__init__.py 1 0 100% mitiq\benchmarks\maxcut.py 44 2 95% mitiq\benchmarks\random_circuits.py 45 2 96% mitiq\benchmarks\randomized_benchmarking.py 15 1 93% mitiq\benchmarks\utils.py 11 0 100% mitiq\collector.py 61 0 100% mitiq\conversions.py 66 1 98% mitiq\mitiq_pyquil\__init__.py 1 0 100% mitiq\mitiq_pyquil\compiler.py 149 149 0% mitiq\mitiq_pyquil\conversions.py 17 0 100% mitiq\mitiq_pyquil\pyquil_utils.py 29 29 0% mitiq\mitiq_qiskit\__init__.py 2 0 100% mitiq\mitiq_qiskit\conversions.py 94 12 87% mitiq\mitiq_qiskit\qiskit_utils.py 49 34 31% mitiq\pec\__init__.py 4 0 100% mitiq\pec\pec.py 34 1 97% mitiq\pec\representations\__init__.py 1 0 100% mitiq\pec\representations\depolarizing.py 73 0 100% mitiq\pec\sampling.py 36 1 97% mitiq\pec\types\__init__.py 1 0 100% mitiq\pec\types\types.py 188 4 98% mitiq\pec\utils.py 20 0 100% mitiq\utils.py 71 0 100% mitiq\zne\__init__.py 3 0 100% mitiq\zne\inference.py 407 37 91% mitiq\zne\scaling\__init__.py 3 0 100% mitiq\zne\scaling\folding.py 213 7 97% mitiq\zne\scaling\parameter.py 48 0 100% mitiq\zne\zne.py 29 1 97% ----------------------------------------------------------------- TOTAL 1758 291 83% Coverage XML written to file coverage.xml =========================== short test summary info =========================== FAILED mitiq/zne/tests/test_inference.py::test_exp_bayes_extr - ImportError: ... ============ 1 failed, 608 passed, 3 skipped in 142.02s (0:02:22) ============= mingw32-make: *** [Makefile:63: test] Error 1 ```
priority
bayes factory fails on windows build due to install dependencies full message failures test exp bayes extr python c hostedtoolcache windows python python exe def test exp bayes extr test of the expbayesfactory s extrapolator x vals np linspace seeded f apply seed to func f exp bayes seed fac expbayesfactory scale factors x vals assert not fac opt params fac run classical seeded f zne value fac reduce mitiq zne tests test inference py mitiq zne inference py in reduce self extrapolate type ignore mitiq zne inference py in extrapolate a pm normal a c hostedtoolcache windows python lib site packages distributions distribution py in new dist cls dist args kwargs c hostedtoolcache windows python lib site packages distributions distribution py in dist dist init args kwargs c hostedtoolcache windows python lib site packages distributions continuous py in init self variance self tau c hostedtoolcache windows python lib site packages theano tensor var py in rtruediv return theano tensor basic true div other self c hostedtoolcache windows python lib site packages theano graph op py in call compute test value node c hostedtoolcache windows python lib site packages theano graph op py in compute test value thunk node op make thunk node storage map compute map no recycling c hostedtoolcache windows python lib site packages theano graph op py in make thunk return self make c thunk node storage map compute map no recycling c hostedtoolcache windows python lib site packages theano graph op py in make c thunk outputs cl make thunk c hostedtoolcache windows python lib site packages theano link c basic py in make thunk cthunk module in storage out storage error storage self compile c hostedtoolcache windows python lib site packages theano link c basic py in compile thunk module self cthunk factory c hostedtoolcache windows python lib site packages theano link c basic py in cthunk factory module get module cache module from key key key lnk self c hostedtoolcache windows python lib site packages theano link c cmodule py in module from key module lnk compile cmodule location c hostedtoolcache windows python lib site packages theano link c basic py in compile cmodule module c compiler compile str c hostedtoolcache windows python lib site packages theano link c cmodule py in compile str return dlimport lib filename fullpath c users runneradmin appdata local theano compiledir windows family model stepping genuineintel pyd suffix pyd global import time try importlib invalidate caches time time with warnings catch warnings warnings filterwarnings ignore message numpy ndarray size changed rval import module name e importerror dll load failed while importing the specified module could not be found c hostedtoolcache windows python lib site packages theano link c cmodule py importerror coverage platform python final name stmts miss cover mitiq init py mitiq about py mitiq typing py mitiq version py mitiq benchmarks init py mitiq benchmarks maxcut py mitiq benchmarks random circuits py mitiq benchmarks randomized benchmarking py mitiq benchmarks utils py mitiq collector py mitiq conversions py mitiq mitiq pyquil init py mitiq mitiq pyquil compiler py mitiq mitiq pyquil conversions py mitiq mitiq pyquil pyquil utils py mitiq mitiq qiskit init py mitiq mitiq qiskit conversions py mitiq mitiq qiskit qiskit utils py mitiq pec init py mitiq pec pec py mitiq pec representations init py mitiq pec representations depolarizing py mitiq pec sampling py mitiq pec types init py mitiq pec types types py mitiq pec utils py mitiq utils py mitiq zne init py mitiq zne inference py mitiq zne scaling init py mitiq zne scaling folding py mitiq zne scaling parameter py mitiq zne zne py total coverage xml written to file coverage xml short test summary info failed mitiq zne tests test inference py test exp bayes extr importerror failed passed skipped in make error
1
553,519
16,373,267,335
IssuesEvent
2021-05-15 15:30:29
csingh27sewts/Masterarbeit
https://api.github.com/repos/csingh27sewts/Masterarbeit
opened
Run original cartpole_problem by Phil, check results and compare the experiment with your experiment.
Implementation Medium priority
To check why it is not learning with cloth envionment.
1.0
Run original cartpole_problem by Phil, check results and compare the experiment with your experiment. - To check why it is not learning with cloth envionment.
priority
run original cartpole problem by phil check results and compare the experiment with your experiment to check why it is not learning with cloth envionment
1
472,923
13,633,251,591
IssuesEvent
2020-09-24 21:04:27
metabase/metabase
https://api.github.com/repos/metabase/metabase
closed
Greyed out filtered by and grouped by when creating new custom questions
Database/Postgres Priority:P2 Querying/GUI Type:Bug
Hello When trying to create custom questions I have Greyed out filtered by and grouped by Environment metabase 0.28.5, JRE 8 Update 16, Windows 2012 R2, Chrome 65.0.3325.181, internal DB H2, Datasource is GreenPlum 4.3.9 The issue When trying to create custom questions I have Greyed out filtered by and grouped by See below picture ![image](https://user-images.githubusercontent.com/13211752/38480621-e747ba6e-3c09-11e8-9550-d6e793135383.png) Normal behavior should be like below ![image](https://user-images.githubusercontent.com/13211752/38480640-fd24fb94-3c09-11e8-9e71-c04847fc8ff7.png) I noticed some errors when I try to do a scan fields 04-09 15:24:27 ←[1mERROR sync.util←[0m :: Error syncing fields for Table 25008 ' tablename': ERROR: relation "pg_enum" does not exist Position: 32 ("driver.postgres$enum_types.invokeStatic(postgres.clj:217)" I'm not sure that is the issue, anyway, to clarify GreenPlum does not have the table pg_enum Thanks! Best regards Mark
1.0
Greyed out filtered by and grouped by when creating new custom questions - Hello When trying to create custom questions I have Greyed out filtered by and grouped by Environment metabase 0.28.5, JRE 8 Update 16, Windows 2012 R2, Chrome 65.0.3325.181, internal DB H2, Datasource is GreenPlum 4.3.9 The issue When trying to create custom questions I have Greyed out filtered by and grouped by See below picture ![image](https://user-images.githubusercontent.com/13211752/38480621-e747ba6e-3c09-11e8-9550-d6e793135383.png) Normal behavior should be like below ![image](https://user-images.githubusercontent.com/13211752/38480640-fd24fb94-3c09-11e8-9e71-c04847fc8ff7.png) I noticed some errors when I try to do a scan fields 04-09 15:24:27 ←[1mERROR sync.util←[0m :: Error syncing fields for Table 25008 ' tablename': ERROR: relation "pg_enum" does not exist Position: 32 ("driver.postgres$enum_types.invokeStatic(postgres.clj:217)" I'm not sure that is the issue, anyway, to clarify GreenPlum does not have the table pg_enum Thanks! Best regards Mark
priority
greyed out filtered by and grouped by when creating new custom questions hello when trying to create custom questions i have greyed out filtered by and grouped by environment metabase jre update windows chrome internal db datasource is greenplum the issue when trying to create custom questions i have greyed out filtered by and grouped by see below picture normal behavior should be like below i noticed some errors when i try to do a scan fields ← sync util← error syncing fields for table tablename error relation pg enum does not exist position driver postgres enum types invokestatic postgres clj i m not sure that is the issue anyway to clarify greenplum does not have the table pg enum thanks best regards mark
1
81,835
15,807,313,283
IssuesEvent
2021-04-04 09:50:39
dEAduction/dEAduction
https://api.github.com/repos/dEAduction/dEAduction
opened
Weird context
approved::new area::code priority::high type::bug
<!-- Any text between such tags will not appear on the issue. --> ### Bug description <!-- Clear, precise, concise description of your bug. Include: - [ ] expected behavior / what you wanted to do; - [ ] what happened instead / what was the bug; - [ ] error message (if any); - [ ] if you are a developper, commit ID and which branch you were on. Provide any useful information. If helpful, provide any useful media (e.g. screenshots or code). --> Sometimes the displayed context is weird, not related to what should be displayed. Actually the displayed context seems to corresponds to a previous exercise. ### How to reproduce the bug <!-- How to reproduce your issue, step by step. Include: - [ ] ordered list of steps. Provide any useful information. If helpful, provide any useful media (e.g. screenshots or code). --> Not easy. My guess is that this happens because deaduction is unable to discriminate Lean server's responses according to the request number, and thus it may happen that deaduction mistake an old response for the one it is waiting for. Since deaduction discriminate responses according to the line number in the lean file, this may happen only when a line number coincidence occurs. Note that this seems to happen even if Lean server is stopped and started again between two exercises (to be checked). ### Environment - OS and OS version: unrelated - d∃∀duction version (or commit ID): 5f88db4a0321e4b4b73ca66173eda95fc0eef493 ### Fix ideas <!-- Appreciated but optional. Any implementation idea, proof or concept, snippet, etc; what difficulties we may face. Delete the title if you leave this section empty. --> - Quick bad fix: artificially add 100 lines times number of exercise in the preamble of the Lean virtual file... - Reasonnable fix: find a way to empty Lean's responses queue before starting a new exercise. ### Submission checklist 1. [ x] d∃∀duction is up-to-date and this bug is in the latest version. 2. [x ] I've checked that no-one reported this problem by browsing [other issues](https://github.com/dEAduction/dEAduction/issues). 3. [x ] This issue deals with one and only one issue (if you have multiple issues, please open multiple issues). 4. [ x] I correctly labeled my issue (see commented rules below). 5. [ ] I want to fix this bug. (Check if you do, no judgement if you do not!) <!-- Include one and only one of the following Area labels: - area::code - area::courses files - area::doc - area::install - area::snippets - area::teaching - area::tests - area::tools - area::ui --> ### Misc <!-- Optional. Additional info. Delete the title if you leave this section empty.-->
1.0
Weird context - <!-- Any text between such tags will not appear on the issue. --> ### Bug description <!-- Clear, precise, concise description of your bug. Include: - [ ] expected behavior / what you wanted to do; - [ ] what happened instead / what was the bug; - [ ] error message (if any); - [ ] if you are a developper, commit ID and which branch you were on. Provide any useful information. If helpful, provide any useful media (e.g. screenshots or code). --> Sometimes the displayed context is weird, not related to what should be displayed. Actually the displayed context seems to corresponds to a previous exercise. ### How to reproduce the bug <!-- How to reproduce your issue, step by step. Include: - [ ] ordered list of steps. Provide any useful information. If helpful, provide any useful media (e.g. screenshots or code). --> Not easy. My guess is that this happens because deaduction is unable to discriminate Lean server's responses according to the request number, and thus it may happen that deaduction mistake an old response for the one it is waiting for. Since deaduction discriminate responses according to the line number in the lean file, this may happen only when a line number coincidence occurs. Note that this seems to happen even if Lean server is stopped and started again between two exercises (to be checked). ### Environment - OS and OS version: unrelated - d∃∀duction version (or commit ID): 5f88db4a0321e4b4b73ca66173eda95fc0eef493 ### Fix ideas <!-- Appreciated but optional. Any implementation idea, proof or concept, snippet, etc; what difficulties we may face. Delete the title if you leave this section empty. --> - Quick bad fix: artificially add 100 lines times number of exercise in the preamble of the Lean virtual file... - Reasonnable fix: find a way to empty Lean's responses queue before starting a new exercise. ### Submission checklist 1. [ x] d∃∀duction is up-to-date and this bug is in the latest version. 2. [x ] I've checked that no-one reported this problem by browsing [other issues](https://github.com/dEAduction/dEAduction/issues). 3. [x ] This issue deals with one and only one issue (if you have multiple issues, please open multiple issues). 4. [ x] I correctly labeled my issue (see commented rules below). 5. [ ] I want to fix this bug. (Check if you do, no judgement if you do not!) <!-- Include one and only one of the following Area labels: - area::code - area::courses files - area::doc - area::install - area::snippets - area::teaching - area::tests - area::tools - area::ui --> ### Misc <!-- Optional. Additional info. Delete the title if you leave this section empty.-->
non_priority
weird context bug description clear precise concise description of your bug include expected behavior what you wanted to do what happened instead what was the bug error message if any if you are a developper commit id and which branch you were on provide any useful information if helpful provide any useful media e g screenshots or code sometimes the displayed context is weird not related to what should be displayed actually the displayed context seems to corresponds to a previous exercise how to reproduce the bug how to reproduce your issue step by step include ordered list of steps provide any useful information if helpful provide any useful media e g screenshots or code not easy my guess is that this happens because deaduction is unable to discriminate lean server s responses according to the request number and thus it may happen that deaduction mistake an old response for the one it is waiting for since deaduction discriminate responses according to the line number in the lean file this may happen only when a line number coincidence occurs note that this seems to happen even if lean server is stopped and started again between two exercises to be checked environment os and os version unrelated d∃∀duction version or commit id fix ideas quick bad fix artificially add lines times number of exercise in the preamble of the lean virtual file reasonnable fix find a way to empty lean s responses queue before starting a new exercise submission checklist d∃∀duction is up to date and this bug is in the latest version i ve checked that no one reported this problem by browsing other issues this issue deals with one and only one issue if you have multiple issues please open multiple issues i correctly labeled my issue see commented rules below i want to fix this bug check if you do no judgement if you do not include one and only one of the following area labels area code area courses files area doc area install area snippets area teaching area tests area tools area ui misc
0
684,061
23,405,436,532
IssuesEvent
2022-08-12 12:22:27
FirebirdSQL/firebird
https://api.github.com/repos/FirebirdSQL/firebird
closed
key size exceeds implementation restriction [CORE3499]
priority: major type: bug resolution: incomplete affect-version: 2.5.0
Submitted by: Dieter Blume (blume-edv) When using Firebird 2\.5, the following error occurs: Unsuccessful metadata update key size exceeds implementation restriction for index "RDB$PRIMARY23" Statement: CREATE TABLE OBD \(OBJEKT VARCHAR\(20\) NOT NULL, DATEI VARCHAR\(180\) NOT NULL, USRINS VARCHAR\(8\) NOT NULL, DATINS TIMESTAMP NOT NULL, USRUPD VARCHAR\(8\), DATUPD TIMESTAMP, TSTAMP TIMESTAMP NOT NULL, ZUSINFO VARCHAR\(40\), FOREIGN KEY \(OBJEKT\) REFERENCES OBJ, PRIMARY KEY \(OBJEKT,DATEI\)\) The same statement works fine under firebird 1\.5\.
1.0
key size exceeds implementation restriction [CORE3499] - Submitted by: Dieter Blume (blume-edv) When using Firebird 2\.5, the following error occurs: Unsuccessful metadata update key size exceeds implementation restriction for index "RDB$PRIMARY23" Statement: CREATE TABLE OBD \(OBJEKT VARCHAR\(20\) NOT NULL, DATEI VARCHAR\(180\) NOT NULL, USRINS VARCHAR\(8\) NOT NULL, DATINS TIMESTAMP NOT NULL, USRUPD VARCHAR\(8\), DATUPD TIMESTAMP, TSTAMP TIMESTAMP NOT NULL, ZUSINFO VARCHAR\(40\), FOREIGN KEY \(OBJEKT\) REFERENCES OBJ, PRIMARY KEY \(OBJEKT,DATEI\)\) The same statement works fine under firebird 1\.5\.
priority
key size exceeds implementation restriction submitted by dieter blume blume edv when using firebird the following error occurs unsuccessful metadata update key size exceeds implementation restriction for index rdb statement create table obd objekt varchar not null datei varchar not null usrins varchar not null datins timestamp not null usrupd varchar datupd timestamp tstamp timestamp not null zusinfo varchar foreign key objekt references obj primary key objekt datei the same statement works fine under firebird
1
125,788
26,727,845,356
IssuesEvent
2023-01-29 22:56:37
Plant-Coach/plant_coach_be
https://api.github.com/repos/Plant-Coach/plant_coach_be
closed
Refactor: Create Garden Plant process
enhancement code refactor
- [x] Use callbacks instead of the manual create method currently used. - [x] Debug this issue with the `seeds.rb` file.
1.0
Refactor: Create Garden Plant process - - [x] Use callbacks instead of the manual create method currently used. - [x] Debug this issue with the `seeds.rb` file.
non_priority
refactor create garden plant process use callbacks instead of the manual create method currently used debug this issue with the seeds rb file
0
308,193
9,435,989,769
IssuesEvent
2019-04-13 02:00:50
avored/laravel-ecommerce
https://api.github.com/repos/avored/laravel-ecommerce
closed
select2 - bad work
High Priority backend bug
Hi. Please review the select2 in product/basic. This selection not work properly ![image](https://user-images.githubusercontent.com/30190050/55126837-3e507c00-50dc-11e9-973c-e0ced24f3702.png) **In addition, you have consider to publish the admin UI?**
1.0
select2 - bad work - Hi. Please review the select2 in product/basic. This selection not work properly ![image](https://user-images.githubusercontent.com/30190050/55126837-3e507c00-50dc-11e9-973c-e0ced24f3702.png) **In addition, you have consider to publish the admin UI?**
priority
bad work hi please review the in product basic this selection not work properly in addition you have consider to publish the admin ui
1
152,069
5,832,362,753
IssuesEvent
2017-05-08 21:37:27
HabitRPG/habitica
https://api.github.com/repos/HabitRPG/habitica
closed
add one-time "donate" option that doesn't grant in-game purchase
priority: medium status: issue: suggestion-discussion
Just as important as a code issue: if I donate to developers, I can just buy all of the things I would have otherwise earned on the site. Because of this, I don't think I'd ever want to donate- it would make rewards feel meaningless. I know it feels like a good idea but don't you think there are ways to get people to donate without jeopardizing the entire point of the game? Aside from my personal incentive to be able to use this site meaningfully (it's SO COOL!!), I'm also concerned about that option taking away donations from developers. Easiest solution is to at least add a paypal donation link at the bottom of your page so members can at least have the option of a click donation that DOESN'T compromise the incentives system HabitRPG is built on. Thanks! edit: oops I'm very sorry- did not realize there was a suggestions board... ## <bountysource-plugin> Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/4256412-add-one-time-donate-option-that-doesn-t-grant-in-game-purchase?utm_campaign=plugin&utm_content=tracker%2F68393&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F68393&utm_medium=issues&utm_source=github). </bountysource-plugin>
1.0
add one-time "donate" option that doesn't grant in-game purchase - Just as important as a code issue: if I donate to developers, I can just buy all of the things I would have otherwise earned on the site. Because of this, I don't think I'd ever want to donate- it would make rewards feel meaningless. I know it feels like a good idea but don't you think there are ways to get people to donate without jeopardizing the entire point of the game? Aside from my personal incentive to be able to use this site meaningfully (it's SO COOL!!), I'm also concerned about that option taking away donations from developers. Easiest solution is to at least add a paypal donation link at the bottom of your page so members can at least have the option of a click donation that DOESN'T compromise the incentives system HabitRPG is built on. Thanks! edit: oops I'm very sorry- did not realize there was a suggestions board... ## <bountysource-plugin> Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/4256412-add-one-time-donate-option-that-doesn-t-grant-in-game-purchase?utm_campaign=plugin&utm_content=tracker%2F68393&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F68393&utm_medium=issues&utm_source=github). </bountysource-plugin>
priority
add one time donate option that doesn t grant in game purchase just as important as a code issue if i donate to developers i can just buy all of the things i would have otherwise earned on the site because of this i don t think i d ever want to donate it would make rewards feel meaningless i know it feels like a good idea but don t you think there are ways to get people to donate without jeopardizing the entire point of the game aside from my personal incentive to be able to use this site meaningfully it s so cool i m also concerned about that option taking away donations from developers easiest solution is to at least add a paypal donation link at the bottom of your page so members can at least have the option of a click donation that doesn t compromise the incentives system habitrpg is built on thanks edit oops i m very sorry did not realize there was a suggestions board want to back this issue we accept bounties via
1
395,317
11,683,656,781
IssuesEvent
2020-03-05 04:09:59
StudioTBA/CoronaIO
https://api.github.com/repos/StudioTBA/CoronaIO
opened
Shooting for police officers
Character development Priority: High
**Is your feature request related to a problem? Please describe.** Police officers should be able to shoot at the horde to defeat it. **Describe the solution you would like** Use raycasts and detect collisions. Next issue after this will involve lowering the horde's health.
1.0
Shooting for police officers - **Is your feature request related to a problem? Please describe.** Police officers should be able to shoot at the horde to defeat it. **Describe the solution you would like** Use raycasts and detect collisions. Next issue after this will involve lowering the horde's health.
priority
shooting for police officers is your feature request related to a problem please describe police officers should be able to shoot at the horde to defeat it describe the solution you would like use raycasts and detect collisions next issue after this will involve lowering the horde s health
1
288,714
8,850,684,910
IssuesEvent
2019-01-08 13:56:53
cosmos/voyager
https://api.github.com/repos/cosmos/voyager
opened
Balance header availability not updated after submitting proposal
governance-1 :ballot_box: high priority
Description: <!-- Steps to reproduce, logs, and screenshots are helpful for us to resolve the bug --> Still shows original value. Maybe we should refactor how we're updating the header (or update it after querying the account) because this has been a recurring issue.
1.0
Balance header availability not updated after submitting proposal - Description: <!-- Steps to reproduce, logs, and screenshots are helpful for us to resolve the bug --> Still shows original value. Maybe we should refactor how we're updating the header (or update it after querying the account) because this has been a recurring issue.
priority
balance header availability not updated after submitting proposal description still shows original value maybe we should refactor how we re updating the header or update it after querying the account because this has been a recurring issue
1
93,128
11,741,343,460
IssuesEvent
2020-03-11 21:31:37
brave/brave-browser
https://api.github.com/repos/brave/brave-browser
closed
Allow totally enabling autoplay
design feature/settings priority/P3
Right now, autoplay can be blocked or allowed one-at-a-time. We should add a state for always allowed — beyond just adding a wildcard entry to the list.
1.0
Allow totally enabling autoplay - Right now, autoplay can be blocked or allowed one-at-a-time. We should add a state for always allowed — beyond just adding a wildcard entry to the list.
non_priority
allow totally enabling autoplay right now autoplay can be blocked or allowed one at a time we should add a state for always allowed — beyond just adding a wildcard entry to the list
0
169,869
6,419,326,803
IssuesEvent
2017-08-08 20:57:55
FrogTheFrog/steam-rom-manager
https://api.github.com/repos/FrogTheFrog/steam-rom-manager
closed
Reduce amount of color variables
priority
Up until now, user could change UI color, however this complicates things on my end by having to define A LOT of color variables. Also, I doubt that color picker is used actively. For this and previous reasons UI color panel will be left available only to developers and all color variables will be generalized. This means that SRM will have a theme from now on.
1.0
Reduce amount of color variables - Up until now, user could change UI color, however this complicates things on my end by having to define A LOT of color variables. Also, I doubt that color picker is used actively. For this and previous reasons UI color panel will be left available only to developers and all color variables will be generalized. This means that SRM will have a theme from now on.
priority
reduce amount of color variables up until now user could change ui color however this complicates things on my end by having to define a lot of color variables also i doubt that color picker is used actively for this and previous reasons ui color panel will be left available only to developers and all color variables will be generalized this means that srm will have a theme from now on
1
47,930
13,262,294,105
IssuesEvent
2020-08-20 21:29:11
akivamprager/sefaria-interactive-simple
https://api.github.com/repos/akivamprager/sefaria-interactive-simple
opened
CVE-2012-6708 (Medium) detected in jquery-1.7.2.min.js
security vulnerability
## CVE-2012-6708 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/sefaria-interactive-simple/public/fonts/hadasimclm-regular-demo.html</p> <p>Path to vulnerable library: /sefaria-interactive-simple/public/fonts/hadasimclm-regular-demo.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/akivamprager/sefaria-interactive-simple/commit/3853f4fd0c7ce2cbd8aedd3e6902b3dff2919a9a">3853f4fd0c7ce2cbd8aedd3e6902b3dff2919a9a</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v1.9.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2012-6708 (Medium) detected in jquery-1.7.2.min.js - ## CVE-2012-6708 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.7.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/sefaria-interactive-simple/public/fonts/hadasimclm-regular-demo.html</p> <p>Path to vulnerable library: /sefaria-interactive-simple/public/fonts/hadasimclm-regular-demo.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.7.2.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/akivamprager/sefaria-interactive-simple/commit/3853f4fd0c7ce2cbd8aedd3e6902b3dff2919a9a">3853f4fd0c7ce2cbd8aedd3e6902b3dff2919a9a</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-6708>CVE-2012-6708</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">https://nvd.nist.gov/vuln/detail/CVE-2012-6708</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v1.9.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm sefaria interactive simple public fonts hadasimclm regular demo html path to vulnerable library sefaria interactive simple public fonts hadasimclm regular demo html dependency hierarchy x jquery min js vulnerable library found in head commit a href vulnerability details jquery before is vulnerable to cross site scripting xss attacks the jquery strinput function does not differentiate selectors from html in a reliable fashion in vulnerable versions jquery determined whether the input was html by looking for the character anywhere in the string giving attackers more flexibility when attempting to construct a malicious payload in fixed versions jquery only deems the input to be html if it explicitly starts with the character limiting exploitability only to attackers who can control the beginning of a string which is far less common publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
25,542
4,381,556,367
IssuesEvent
2016-08-06 09:27:55
scipy/scipy
https://api.github.com/repos/scipy/scipy
closed
expm_multiply, complex matrices not working using start,stop,ect...
defect scipy.sparse.linalg
Hi, There is a bug with expm_multiply. If I just use a complex matrix and vector the function returns the correct vector but when I use the linear grid feature it seems to be casting the vector to a float while iterating through the grid points: site-packages/scipy/sparse/linalg/_expm_multiply.py:568: ComplexWarning: Casting complex values to real discards the imaginary part X[0] = _expm_multiply_simple_core(A, B, t_0, mu, m_star, s) site-packages/scipy/sparse/linalg/_expm_multiply.py:654: ComplexWarning: Casting complex values to real discards the imaginary part K[p] = h * A.dot(K[p-1]) / float(p) site-packages/scipy/sparse/linalg/_expm_multiply.py:663: ComplexWarning: Casting complex values to real discards the imaginary part X[k + id] = np.exp(kh*mu) * F I'm using scipy 0.17.1.
1.0
expm_multiply, complex matrices not working using start,stop,ect... - Hi, There is a bug with expm_multiply. If I just use a complex matrix and vector the function returns the correct vector but when I use the linear grid feature it seems to be casting the vector to a float while iterating through the grid points: site-packages/scipy/sparse/linalg/_expm_multiply.py:568: ComplexWarning: Casting complex values to real discards the imaginary part X[0] = _expm_multiply_simple_core(A, B, t_0, mu, m_star, s) site-packages/scipy/sparse/linalg/_expm_multiply.py:654: ComplexWarning: Casting complex values to real discards the imaginary part K[p] = h * A.dot(K[p-1]) / float(p) site-packages/scipy/sparse/linalg/_expm_multiply.py:663: ComplexWarning: Casting complex values to real discards the imaginary part X[k + id] = np.exp(kh*mu) * F I'm using scipy 0.17.1.
non_priority
expm multiply complex matrices not working using start stop ect hi there is a bug with expm multiply if i just use a complex matrix and vector the function returns the correct vector but when i use the linear grid feature it seems to be casting the vector to a float while iterating through the grid points site packages scipy sparse linalg expm multiply py complexwarning casting complex values to real discards the imaginary part x expm multiply simple core a b t mu m star s site packages scipy sparse linalg expm multiply py complexwarning casting complex values to real discards the imaginary part k h a dot k float p site packages scipy sparse linalg expm multiply py complexwarning casting complex values to real discards the imaginary part x np exp kh mu f i m using scipy
0
606,502
18,763,635,585
IssuesEvent
2021-11-05 19:47:31
vmware-tanzu/carvel-ytt
https://api.github.com/repos/vmware-tanzu/carvel-ytt
closed
Test failure with go1.17
bug carvel accepted priority/important-soon
**What steps did you take:** [A clear and concise description steps and yaml files that can be used to reproduce the problem.] Try to run testsuite with `go test -v $(go list ./...|grep -v yaml.v2)` **What happened:** [A small description of the result or the yaml that was generated] ``` checking filetests/ytt-replace/map-item.yml ... . template_test.go:121: checking filetests/ytt-library/url/url.yml ... : eval error: - url.query_params_decode: invalid semicolon separator in query in <toplevel> stdin:18 | test2: #@ url.query_params_decode("y=2&x=1&y=3;z") code: src: tmpl: code: | srccode ????: 1: __ytt_tpl114_set_ctx_type("yaml") | ????: 2: __ytt_tpl114_start_ctx("yaml") | ????: 3: __ytt_tpl114_start_node(1) # *yamlmeta.DocumentSet | 1: 4: __ytt_tpl114_start_node(2) # *yamlmeta.Document | #@ load("@ytt:url", "url") 1: 5: __ytt_tpl114_start_node(3) # *yamlmeta.Map | #@ load("@ytt:url", "url") 1: 6: load("@ytt:url", "url") | #@ load("@ytt:url", "url") 3: 7: __ytt_tpl114_start_node(4) # *yamlmeta.MapItem key=path_segment | path_segment: 3: 8: __ytt_tpl114_start_node(5) # *yamlmeta.Map | path_segment: 4: 9: __ytt_tpl114_start_node(6) # *yamlmeta.MapItem key=test1 | test1: #@ url.path_segment_encode("path path/other") 4: 10: __ytt_tpl114_set_node(6, (url.path_segment_encode("path path/other"))) # *yamlmeta.MapItem key=test1 | test1: #@ url.path_segment_encode("path path/other") 5: 11: __ytt_tpl114_start_node(7) # *yamlmeta.MapItem key=test2 | test2: #@ url.path_segment_decode("path%20path%2Fother") 5: 12: __ytt_tpl114_set_node(7, (url.path_segment_decode("path%20path%2Fother"))) # *yamlmeta.MapItem key=test2 | test2: #@ url.path_segment_decode("path%20path%2Fother") 6: 13: __ytt_tpl114_start_node(8) # *yamlmeta.MapItem key=test3 | test3: #@ url.path_segment_encode("") 6: 14: __ytt_tpl114_set_node(8, (url.path_segment_encode(""))) # *yamlmeta.MapItem key=test3 | test3: #@ url.path_segment_encode("") 7: 15: __ytt_tpl114_start_node(9) # *yamlmeta.MapItem key=test4 | test4: #@ url.path_segment_decode("") 7: 16: __ytt_tpl114_set_node(9, (url.path_segment_decode(""))) # *yamlmeta.MapItem key=test4 | test4: #@ url.path_segment_decode("") 9: 17: __ytt_tpl114_start_node(10) # *yamlmeta.MapItem key=query_param_value | query_param_value: 9: 18: __ytt_tpl114_start_node(11) # *yamlmeta.Map | query_param_value: 10: 19: __ytt_tpl114_start_node(12) # *yamlmeta.MapItem key=test1 | test1: #@ url.query_param_value_encode("val val/other") 10: 20: __ytt_tpl114_set_node(12, (url.query_param_value_encode("val val/other"))) # *yamlmeta.MapItem key=test1 | test1: #@ url.query_param_value_encode("val val/other") 11: 21: __ytt_tpl114_start_node(13) # *yamlmeta.MapItem key=test2 | test2: #@ url.query_param_value_decode("val+val%2Fother") 11: 22: __ytt_tpl114_set_node(13, (url.query_param_value_decode("val+val%2Fother"))) # *yamlmeta.MapItem key=test2 | test2: #@ url.query_param_value_decode("val+val%2Fother") 12: 23: __ytt_tpl114_start_node(14) # *yamlmeta.MapItem key=test3 | test3: #@ url.query_param_value_encode("") 12: 24: __ytt_tpl114_set_node(14, (url.query_param_value_encode(""))) # *yamlmeta.MapItem key=test3 | test3: #@ url.query_param_value_encode("") 13: 25: __ytt_tpl114_start_node(15) # *yamlmeta.MapItem key=test4 | test4: #@ url.query_param_value_decode("") 13: 26: __ytt_tpl114_set_node(15, (url.query_param_value_decode(""))) # *yamlmeta.MapItem key=test4 | test4: #@ url.query_param_value_decode("") 15: 27: __ytt_tpl114_start_node(16) # *yamlmeta.MapItem key=query_params | query_params: 15: 28: __ytt_tpl114_start_node(17) # *yamlmeta.Map | query_params: 17: 29: __ytt_tpl114_start_node(18) # *yamlmeta.MapItem key=test1 | test1: #@ url.query_params_encode({"y":["2","3"],"x":["1"],"z":[""],"w":[]}) 17: 30: __ytt_tpl114_set_node(18, (url.query_params_encode({"y":["2","3"],"x":["1"],"z":[""],"w":[]}))) # *yamlmeta.MapItem key=test1 | test1: #@ url.query_params_encode({"y":["2","3"],"x":["1"],"z":[""],"w":[]}) 18: 31: __ytt_tpl114_start_node(19) # *yamlmeta.MapItem key=test2 | test2: #@ url.query_params_decode("y=2&x=1&y=3;z") 18: 32: __ytt_tpl114_set_node(19, (url.query_params_decode("y=2&x=1&y=3;z"))) # *yamlmeta.MapItem key=test2 | test2: #@ url.query_params_decode("y=2&x=1&y=3;z") 19: 33: __ytt_tpl114_start_node(20) # *yamlmeta.MapItem key=test3 | test3: #@ url.query_params_encode({"w":[]}) 19: 34: __ytt_tpl114_set_node(20, (url.query_params_encode({"w":[]}))) # *yamlmeta.MapItem key=test3 | test3: #@ url.query_params_encode({"w":[]}) 20: 35: __ytt_tpl114_start_node(21) # *yamlmeta.MapItem key=test4 | test4: #@ url.query_params_decode("") 20: 36: __ytt_tpl114_set_node(21, (url.query_params_decode(""))) # *yamlmeta.MapItem key=test4 | test4: #@ url.query_params_decode("") ????: 37: __ytt_tpl114_end_ctx(None) | --- FAIL: TestYAMLTemplate (0.07s) FAIL FAIL github.com/k14s/ytt/pkg/yamltemplate 0.081s ``` **What did you expect:** [A description of what was expected and the yaml that should have been generated] Tests to pass **Environment:** - ytt version (use `ytt --version`): ytt-0.36.0 (source: https://github.com/vmware-tanzu/carvel-ytt/archive/v0.36.0.tar.gz - OS (e.g. from `/etc/os-release`): ```sh NAME="Alpine Linux" ID=alpine VERSION_ID=3.15.0_alpha20210804 PRETTY_NAME="Alpine Linux edge" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://bugs.alpinelinux.org/" ``` --- Vote on this request This is an invitation to the community to vote on issues, to help us prioritize our backlog. Use the "smiley face" up to the right of this comment to vote. 👍 "I would like to see this addressed as soon as possible" 👎 "There are other more important things to focus on right now" We are also happy to receive and review Pull Requests if you want to help working on this issue.
1.0
Test failure with go1.17 - **What steps did you take:** [A clear and concise description steps and yaml files that can be used to reproduce the problem.] Try to run testsuite with `go test -v $(go list ./...|grep -v yaml.v2)` **What happened:** [A small description of the result or the yaml that was generated] ``` checking filetests/ytt-replace/map-item.yml ... . template_test.go:121: checking filetests/ytt-library/url/url.yml ... : eval error: - url.query_params_decode: invalid semicolon separator in query in <toplevel> stdin:18 | test2: #@ url.query_params_decode("y=2&x=1&y=3;z") code: src: tmpl: code: | srccode ????: 1: __ytt_tpl114_set_ctx_type("yaml") | ????: 2: __ytt_tpl114_start_ctx("yaml") | ????: 3: __ytt_tpl114_start_node(1) # *yamlmeta.DocumentSet | 1: 4: __ytt_tpl114_start_node(2) # *yamlmeta.Document | #@ load("@ytt:url", "url") 1: 5: __ytt_tpl114_start_node(3) # *yamlmeta.Map | #@ load("@ytt:url", "url") 1: 6: load("@ytt:url", "url") | #@ load("@ytt:url", "url") 3: 7: __ytt_tpl114_start_node(4) # *yamlmeta.MapItem key=path_segment | path_segment: 3: 8: __ytt_tpl114_start_node(5) # *yamlmeta.Map | path_segment: 4: 9: __ytt_tpl114_start_node(6) # *yamlmeta.MapItem key=test1 | test1: #@ url.path_segment_encode("path path/other") 4: 10: __ytt_tpl114_set_node(6, (url.path_segment_encode("path path/other"))) # *yamlmeta.MapItem key=test1 | test1: #@ url.path_segment_encode("path path/other") 5: 11: __ytt_tpl114_start_node(7) # *yamlmeta.MapItem key=test2 | test2: #@ url.path_segment_decode("path%20path%2Fother") 5: 12: __ytt_tpl114_set_node(7, (url.path_segment_decode("path%20path%2Fother"))) # *yamlmeta.MapItem key=test2 | test2: #@ url.path_segment_decode("path%20path%2Fother") 6: 13: __ytt_tpl114_start_node(8) # *yamlmeta.MapItem key=test3 | test3: #@ url.path_segment_encode("") 6: 14: __ytt_tpl114_set_node(8, (url.path_segment_encode(""))) # *yamlmeta.MapItem key=test3 | test3: #@ url.path_segment_encode("") 7: 15: __ytt_tpl114_start_node(9) # *yamlmeta.MapItem key=test4 | test4: #@ url.path_segment_decode("") 7: 16: __ytt_tpl114_set_node(9, (url.path_segment_decode(""))) # *yamlmeta.MapItem key=test4 | test4: #@ url.path_segment_decode("") 9: 17: __ytt_tpl114_start_node(10) # *yamlmeta.MapItem key=query_param_value | query_param_value: 9: 18: __ytt_tpl114_start_node(11) # *yamlmeta.Map | query_param_value: 10: 19: __ytt_tpl114_start_node(12) # *yamlmeta.MapItem key=test1 | test1: #@ url.query_param_value_encode("val val/other") 10: 20: __ytt_tpl114_set_node(12, (url.query_param_value_encode("val val/other"))) # *yamlmeta.MapItem key=test1 | test1: #@ url.query_param_value_encode("val val/other") 11: 21: __ytt_tpl114_start_node(13) # *yamlmeta.MapItem key=test2 | test2: #@ url.query_param_value_decode("val+val%2Fother") 11: 22: __ytt_tpl114_set_node(13, (url.query_param_value_decode("val+val%2Fother"))) # *yamlmeta.MapItem key=test2 | test2: #@ url.query_param_value_decode("val+val%2Fother") 12: 23: __ytt_tpl114_start_node(14) # *yamlmeta.MapItem key=test3 | test3: #@ url.query_param_value_encode("") 12: 24: __ytt_tpl114_set_node(14, (url.query_param_value_encode(""))) # *yamlmeta.MapItem key=test3 | test3: #@ url.query_param_value_encode("") 13: 25: __ytt_tpl114_start_node(15) # *yamlmeta.MapItem key=test4 | test4: #@ url.query_param_value_decode("") 13: 26: __ytt_tpl114_set_node(15, (url.query_param_value_decode(""))) # *yamlmeta.MapItem key=test4 | test4: #@ url.query_param_value_decode("") 15: 27: __ytt_tpl114_start_node(16) # *yamlmeta.MapItem key=query_params | query_params: 15: 28: __ytt_tpl114_start_node(17) # *yamlmeta.Map | query_params: 17: 29: __ytt_tpl114_start_node(18) # *yamlmeta.MapItem key=test1 | test1: #@ url.query_params_encode({"y":["2","3"],"x":["1"],"z":[""],"w":[]}) 17: 30: __ytt_tpl114_set_node(18, (url.query_params_encode({"y":["2","3"],"x":["1"],"z":[""],"w":[]}))) # *yamlmeta.MapItem key=test1 | test1: #@ url.query_params_encode({"y":["2","3"],"x":["1"],"z":[""],"w":[]}) 18: 31: __ytt_tpl114_start_node(19) # *yamlmeta.MapItem key=test2 | test2: #@ url.query_params_decode("y=2&x=1&y=3;z") 18: 32: __ytt_tpl114_set_node(19, (url.query_params_decode("y=2&x=1&y=3;z"))) # *yamlmeta.MapItem key=test2 | test2: #@ url.query_params_decode("y=2&x=1&y=3;z") 19: 33: __ytt_tpl114_start_node(20) # *yamlmeta.MapItem key=test3 | test3: #@ url.query_params_encode({"w":[]}) 19: 34: __ytt_tpl114_set_node(20, (url.query_params_encode({"w":[]}))) # *yamlmeta.MapItem key=test3 | test3: #@ url.query_params_encode({"w":[]}) 20: 35: __ytt_tpl114_start_node(21) # *yamlmeta.MapItem key=test4 | test4: #@ url.query_params_decode("") 20: 36: __ytt_tpl114_set_node(21, (url.query_params_decode(""))) # *yamlmeta.MapItem key=test4 | test4: #@ url.query_params_decode("") ????: 37: __ytt_tpl114_end_ctx(None) | --- FAIL: TestYAMLTemplate (0.07s) FAIL FAIL github.com/k14s/ytt/pkg/yamltemplate 0.081s ``` **What did you expect:** [A description of what was expected and the yaml that should have been generated] Tests to pass **Environment:** - ytt version (use `ytt --version`): ytt-0.36.0 (source: https://github.com/vmware-tanzu/carvel-ytt/archive/v0.36.0.tar.gz - OS (e.g. from `/etc/os-release`): ```sh NAME="Alpine Linux" ID=alpine VERSION_ID=3.15.0_alpha20210804 PRETTY_NAME="Alpine Linux edge" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://bugs.alpinelinux.org/" ``` --- Vote on this request This is an invitation to the community to vote on issues, to help us prioritize our backlog. Use the "smiley face" up to the right of this comment to vote. 👍 "I would like to see this addressed as soon as possible" 👎 "There are other more important things to focus on right now" We are also happy to receive and review Pull Requests if you want to help working on this issue.
priority
test failure with what steps did you take try to run testsuite with go test v go list grep v yaml what happened checking filetests ytt replace map item yml template test go checking filetests ytt library url url yml eval error url query params decode invalid semicolon separator in query in stdin url query params decode y x y z code src tmpl code srccode ytt set ctx type yaml ytt start ctx yaml ytt start node yamlmeta documentset ytt start node yamlmeta document load ytt url url ytt start node yamlmeta map load ytt url url load ytt url url load ytt url url ytt start node yamlmeta mapitem key path segment path segment ytt start node yamlmeta map path segment ytt start node yamlmeta mapitem key url path segment encode path path other ytt set node url path segment encode path path other yamlmeta mapitem key url path segment encode path path other ytt start node yamlmeta mapitem key url path segment decode path ytt set node url path segment decode path yamlmeta mapitem key url path segment decode path ytt start node yamlmeta mapitem key url path segment encode ytt set node url path segment encode yamlmeta mapitem key url path segment encode ytt start node yamlmeta mapitem key url path segment decode ytt set node url path segment decode yamlmeta mapitem key url path segment decode ytt start node yamlmeta mapitem key query param value query param value ytt start node yamlmeta map query param value ytt start node yamlmeta mapitem key url query param value encode val val other ytt set node url query param value encode val val other yamlmeta mapitem key url query param value encode val val other ytt start node yamlmeta mapitem key url query param value decode val val ytt set node url query param value decode val val yamlmeta mapitem key url query param value decode val val ytt start node yamlmeta mapitem key url query param value encode ytt set node url query param value encode yamlmeta mapitem key url query param value encode ytt start node yamlmeta mapitem key url query param value decode ytt set node url query param value decode yamlmeta mapitem key url query param value decode ytt start node yamlmeta mapitem key query params query params ytt start node yamlmeta map query params ytt start node yamlmeta mapitem key url query params encode y x z w ytt set node url query params encode y x z w yamlmeta mapitem key url query params encode y x z w ytt start node yamlmeta mapitem key url query params decode y x y z ytt set node url query params decode y x y z yamlmeta mapitem key url query params decode y x y z ytt start node yamlmeta mapitem key url query params encode w ytt set node url query params encode w yamlmeta mapitem key url query params encode w ytt start node yamlmeta mapitem key url query params decode ytt set node url query params decode yamlmeta mapitem key url query params decode ytt end ctx none fail testyamltemplate fail fail github com ytt pkg yamltemplate what did you expect tests to pass environment ytt version use ytt version ytt source os e g from etc os release sh name alpine linux id alpine version id pretty name alpine linux edge home url bug report url vote on this request this is an invitation to the community to vote on issues to help us prioritize our backlog use the smiley face up to the right of this comment to vote 👍 i would like to see this addressed as soon as possible 👎 there are other more important things to focus on right now we are also happy to receive and review pull requests if you want to help working on this issue
1
553,904
16,384,932,860
IssuesEvent
2021-05-17 09:12:21
gardener/landscaper
https://api.github.com/repos/gardener/landscaper
closed
Conditional SubInstallations
area/usability effort/1w kind/enhancement kind/epic priority/3
**How to categorize this issue?** <!-- Please select area, kind, and priority for this issue. This helps the community categorizing it. Replace below TODOs or exchange the existing identifiers with those that fit best in your opinion. If multiple identifiers make sense you can also state the commands multiple times, e.g. /area control-plane /area auto-scaling ... "/area" identifiers: backup|certification|cost|delivery|deployers|manifest-deployer|helm-deployer|container-deployer|dev-productivity|documentation|high-availability|logging|monitoring|oci|open-source|operations|ops-productivity|performance|quality|robustness|scalability|security|storage|testing|usability|user-management "/kind" identifiers: api-change|bug|cleanup|discussion|enhancement|epic|impediment|poc|post-mortem|question|regression|task|technical-debt|test "/priority" identifiers: normal|critical|blocker --> /area usability /kind epic /priority 3 **What would you like to be added**: Currently subinstallation defined in blueprints are a hardcoded list of included installations. For some scenarios it is needed that the different subinstallations are needed based on the imports of a blueprint. Possible Implementation: 1. Have a dedicated condition field on the subinstallation template: - the idea is to have a field in the subinstallation template that is prevalidated with thegiven imports. Then condition must return `true` or `false` and decide whether the subinstallation should be deployed or not. ``` subinstallations: - apiVersion: ... kind: InstallationTemplate condition: "if imports.a" # own simple condition syntax condition: (( if imports.a )) # use spiff ``` - Pro: simple to implement and simple to use. Still have easy validation Con: does not cover all scenarios. we need a syntax or templating mechanism 2. have subinstallation executors. - similar to the deploy item executors also have subinstallation executors. ``` subinstallationExecutor: # can be also combined with the deployexecution via another key - name: my-subs type: GoTemplate template: | subinstallations: {{ if imports.a }} - apiVersion: ... kind: InstallationTemplate {{ end }} ``` - Pro: same functionaility as for the deploy items: loops, conditions more complex conditions. Con: validation always needs imports (temapltes always need to be rendered). *Scenarios*: - install a database with a backup bucket. That backup bucket needs to support different cloudproviders. so we could imageine to have differnt blueprints for differnet cloudproviders and based on a import type we only use the corresponding blueprint.
1.0
Conditional SubInstallations - **How to categorize this issue?** <!-- Please select area, kind, and priority for this issue. This helps the community categorizing it. Replace below TODOs or exchange the existing identifiers with those that fit best in your opinion. If multiple identifiers make sense you can also state the commands multiple times, e.g. /area control-plane /area auto-scaling ... "/area" identifiers: backup|certification|cost|delivery|deployers|manifest-deployer|helm-deployer|container-deployer|dev-productivity|documentation|high-availability|logging|monitoring|oci|open-source|operations|ops-productivity|performance|quality|robustness|scalability|security|storage|testing|usability|user-management "/kind" identifiers: api-change|bug|cleanup|discussion|enhancement|epic|impediment|poc|post-mortem|question|regression|task|technical-debt|test "/priority" identifiers: normal|critical|blocker --> /area usability /kind epic /priority 3 **What would you like to be added**: Currently subinstallation defined in blueprints are a hardcoded list of included installations. For some scenarios it is needed that the different subinstallations are needed based on the imports of a blueprint. Possible Implementation: 1. Have a dedicated condition field on the subinstallation template: - the idea is to have a field in the subinstallation template that is prevalidated with thegiven imports. Then condition must return `true` or `false` and decide whether the subinstallation should be deployed or not. ``` subinstallations: - apiVersion: ... kind: InstallationTemplate condition: "if imports.a" # own simple condition syntax condition: (( if imports.a )) # use spiff ``` - Pro: simple to implement and simple to use. Still have easy validation Con: does not cover all scenarios. we need a syntax or templating mechanism 2. have subinstallation executors. - similar to the deploy item executors also have subinstallation executors. ``` subinstallationExecutor: # can be also combined with the deployexecution via another key - name: my-subs type: GoTemplate template: | subinstallations: {{ if imports.a }} - apiVersion: ... kind: InstallationTemplate {{ end }} ``` - Pro: same functionaility as for the deploy items: loops, conditions more complex conditions. Con: validation always needs imports (temapltes always need to be rendered). *Scenarios*: - install a database with a backup bucket. That backup bucket needs to support different cloudproviders. so we could imageine to have differnt blueprints for differnet cloudproviders and based on a import type we only use the corresponding blueprint.
priority
conditional subinstallations how to categorize this issue please select area kind and priority for this issue this helps the community categorizing it replace below todos or exchange the existing identifiers with those that fit best in your opinion if multiple identifiers make sense you can also state the commands multiple times e g area control plane area auto scaling area identifiers backup certification cost delivery deployers manifest deployer helm deployer container deployer dev productivity documentation high availability logging monitoring oci open source operations ops productivity performance quality robustness scalability security storage testing usability user management kind identifiers api change bug cleanup discussion enhancement epic impediment poc post mortem question regression task technical debt test priority identifiers normal critical blocker area usability kind epic priority what would you like to be added currently subinstallation defined in blueprints are a hardcoded list of included installations for some scenarios it is needed that the different subinstallations are needed based on the imports of a blueprint possible implementation have a dedicated condition field on the subinstallation template the idea is to have a field in the subinstallation template that is prevalidated with thegiven imports then condition must return true or false and decide whether the subinstallation should be deployed or not subinstallations apiversion kind installationtemplate condition if imports a own simple condition syntax condition if imports a use spiff pro simple to implement and simple to use still have easy validation con does not cover all scenarios we need a syntax or templating mechanism have subinstallation executors similar to the deploy item executors also have subinstallation executors subinstallationexecutor can be also combined with the deployexecution via another key name my subs type gotemplate template subinstallations if imports a apiversion kind installationtemplate end pro same functionaility as for the deploy items loops conditions more complex conditions con validation always needs imports temapltes always need to be rendered scenarios install a database with a backup bucket that backup bucket needs to support different cloudproviders so we could imageine to have differnt blueprints for differnet cloudproviders and based on a import type we only use the corresponding blueprint
1
27,433
13,249,118,618
IssuesEvent
2020-08-19 20:12:56
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
Metal backend does not properly release image memory
P1 customer: fun (g3) dependency: skia engine perf: memory platform-ios severe: performance severe: regression
Tested on engine revision flutter/engine@d3b81f19fc98076283892c1152d30e2567b6406e run the attached program below at framework revision 45e097da16 Press the `LOAD IMAGE` button, note memory usage increase. Press the `CLEAR IMAGE` button. Press the `CHECK ALLOC PROFILE (Try GC)`. Note that memory does not decrease. Build the engine locally, but use the Open GL backend (set `shell_enable_metal` to false and `skia_use_metal` to false). Follow the same steps - memory gets cleared when GC runs. This is a problem because subsequent image allocations will bump the memory up temporarily - with enough or sufficiently large allocations, this can easily lead to an OOM that is avoidable. /cc @jvanverth @chinmaygarde This program: ```dart import 'dart:async'; import 'dart:developer' as developer; import 'dart:isolate'; import 'dart:typed_data'; import 'dart:ui' as ui; import 'package:flutter/material.dart'; import 'package:flutter/scheduler.dart'; import 'package:vm_service/vm_service.dart' hide Isolate; import 'package:vm_service/vm_service_io.dart'; const int width = 8000; const int height = 8000; const int bytes = width * height * 4; Uint8List pixels; VmService vmService; String isolateId; Future<void> main() async { WidgetsFlutterBinding.ensureInitialized(); imageCache.maximumSize = 0; pixels = await createPixels(bytes); final developer.ServiceProtocolInfo info = await developer.Service.getInfo(); isolateId = developer.Service.getIsolateID(Isolate.current); if (info.serverUri == null) { throw Exception('This app must be run in debug or profile mode'); } vmService = await vmServiceConnectUri( 'ws://localhost:${info.serverUri.port}${info.serverUri.path}ws'); runApp(MyApp()); } class MyApp extends StatelessWidget { @override Widget build(BuildContext context) { return MaterialApp( title: 'Flutter Demo', theme: ThemeData( primarySwatch: Colors.blue, visualDensity: VisualDensity.adaptivePlatformDensity, ), home: MyHomePage(title: 'Flutter Demo Home Page'), ); } } class MyHomePage extends StatefulWidget { MyHomePage({Key key, this.title}) : super(key: key); final String title; @override _MyHomePageState createState() => _MyHomePageState(); } Future<Uint8List> createPixels(int bytes) async { final pixels = Uint8List(bytes); for (int index = 0; index < bytes; index += 4) { pixels[index++] = index % 128; pixels[index++] = index % 127; pixels[index++] = index % 126; pixels[index++] = 0xFF; } return pixels; } Future<ui.Image> createImage() async { final completer = Completer<ui.Image>(); ui.decodeImageFromPixels( pixels, width, height, ui.PixelFormat.rgba8888, (ui.Image image) => completer.complete(image), ); return completer.future; } class _MyHomePageState extends State<MyHomePage> { ui.Image image; bool loadingImage = false; String imageButtonText = 'LOAD IMAGE'; String memoryUsageLabel = 'No memory usage recorded.'; void toggleImage() { assert(!loadingImage); setState(() { if (image == null) { loadingImage = true; imageButtonText = 'Loading image...'; createImage().then((ui.Image image) { setState(() { imageButtonText = 'CLEAR IMAGE'; loadingImage = false; this.image = image; }); }); } else { setState(() { image = null; imageButtonText = 'LOAD IMAGE'; }); } }); } VoidCallback sendLowMemory(bool gc) { // GC is not for sure, but usually works. // Also note that even _without_ trying to trigger a GC, this // creates enough new garbage to sometimes cause a GC anyway. return () { vmService.getAllocationProfile(isolateId, gc: gc).then((dynamic value) { AllocationProfile profile = value as AllocationProfile; setState(() { memoryUsageLabel = ''' External: ${profile.memoryUsage.externalUsage} Heap: ${profile.memoryUsage.heapUsage} '''; }); }); }; } @override Widget build(BuildContext context) { return Scaffold( appBar: AppBar( title: Text(widget.title), ), body: Center( child: Column( children: <Widget>[ RaisedButton( child: Text('CHECK ALLOC PROFILE (No GC)'), onPressed: sendLowMemory(false), ), RaisedButton( child: Text('CHECK ALLOC PROFILE (Try GC)'), onPressed: sendLowMemory(true), ), Text(memoryUsageLabel), RaisedButton( child: Text(imageButtonText), onPressed: loadingImage ? null : toggleImage, ), if (image != null) RawImage( image: image, width: 200, height: 200, ) else Text('No image.'), ], ), ), ); } } ```
True
Metal backend does not properly release image memory - Tested on engine revision flutter/engine@d3b81f19fc98076283892c1152d30e2567b6406e run the attached program below at framework revision 45e097da16 Press the `LOAD IMAGE` button, note memory usage increase. Press the `CLEAR IMAGE` button. Press the `CHECK ALLOC PROFILE (Try GC)`. Note that memory does not decrease. Build the engine locally, but use the Open GL backend (set `shell_enable_metal` to false and `skia_use_metal` to false). Follow the same steps - memory gets cleared when GC runs. This is a problem because subsequent image allocations will bump the memory up temporarily - with enough or sufficiently large allocations, this can easily lead to an OOM that is avoidable. /cc @jvanverth @chinmaygarde This program: ```dart import 'dart:async'; import 'dart:developer' as developer; import 'dart:isolate'; import 'dart:typed_data'; import 'dart:ui' as ui; import 'package:flutter/material.dart'; import 'package:flutter/scheduler.dart'; import 'package:vm_service/vm_service.dart' hide Isolate; import 'package:vm_service/vm_service_io.dart'; const int width = 8000; const int height = 8000; const int bytes = width * height * 4; Uint8List pixels; VmService vmService; String isolateId; Future<void> main() async { WidgetsFlutterBinding.ensureInitialized(); imageCache.maximumSize = 0; pixels = await createPixels(bytes); final developer.ServiceProtocolInfo info = await developer.Service.getInfo(); isolateId = developer.Service.getIsolateID(Isolate.current); if (info.serverUri == null) { throw Exception('This app must be run in debug or profile mode'); } vmService = await vmServiceConnectUri( 'ws://localhost:${info.serverUri.port}${info.serverUri.path}ws'); runApp(MyApp()); } class MyApp extends StatelessWidget { @override Widget build(BuildContext context) { return MaterialApp( title: 'Flutter Demo', theme: ThemeData( primarySwatch: Colors.blue, visualDensity: VisualDensity.adaptivePlatformDensity, ), home: MyHomePage(title: 'Flutter Demo Home Page'), ); } } class MyHomePage extends StatefulWidget { MyHomePage({Key key, this.title}) : super(key: key); final String title; @override _MyHomePageState createState() => _MyHomePageState(); } Future<Uint8List> createPixels(int bytes) async { final pixels = Uint8List(bytes); for (int index = 0; index < bytes; index += 4) { pixels[index++] = index % 128; pixels[index++] = index % 127; pixels[index++] = index % 126; pixels[index++] = 0xFF; } return pixels; } Future<ui.Image> createImage() async { final completer = Completer<ui.Image>(); ui.decodeImageFromPixels( pixels, width, height, ui.PixelFormat.rgba8888, (ui.Image image) => completer.complete(image), ); return completer.future; } class _MyHomePageState extends State<MyHomePage> { ui.Image image; bool loadingImage = false; String imageButtonText = 'LOAD IMAGE'; String memoryUsageLabel = 'No memory usage recorded.'; void toggleImage() { assert(!loadingImage); setState(() { if (image == null) { loadingImage = true; imageButtonText = 'Loading image...'; createImage().then((ui.Image image) { setState(() { imageButtonText = 'CLEAR IMAGE'; loadingImage = false; this.image = image; }); }); } else { setState(() { image = null; imageButtonText = 'LOAD IMAGE'; }); } }); } VoidCallback sendLowMemory(bool gc) { // GC is not for sure, but usually works. // Also note that even _without_ trying to trigger a GC, this // creates enough new garbage to sometimes cause a GC anyway. return () { vmService.getAllocationProfile(isolateId, gc: gc).then((dynamic value) { AllocationProfile profile = value as AllocationProfile; setState(() { memoryUsageLabel = ''' External: ${profile.memoryUsage.externalUsage} Heap: ${profile.memoryUsage.heapUsage} '''; }); }); }; } @override Widget build(BuildContext context) { return Scaffold( appBar: AppBar( title: Text(widget.title), ), body: Center( child: Column( children: <Widget>[ RaisedButton( child: Text('CHECK ALLOC PROFILE (No GC)'), onPressed: sendLowMemory(false), ), RaisedButton( child: Text('CHECK ALLOC PROFILE (Try GC)'), onPressed: sendLowMemory(true), ), Text(memoryUsageLabel), RaisedButton( child: Text(imageButtonText), onPressed: loadingImage ? null : toggleImage, ), if (image != null) RawImage( image: image, width: 200, height: 200, ) else Text('No image.'), ], ), ), ); } } ```
non_priority
metal backend does not properly release image memory tested on engine revision flutter engine run the attached program below at framework revision press the load image button note memory usage increase press the clear image button press the check alloc profile try gc note that memory does not decrease build the engine locally but use the open gl backend set shell enable metal to false and skia use metal to false follow the same steps memory gets cleared when gc runs this is a problem because subsequent image allocations will bump the memory up temporarily with enough or sufficiently large allocations this can easily lead to an oom that is avoidable cc jvanverth chinmaygarde this program dart import dart async import dart developer as developer import dart isolate import dart typed data import dart ui as ui import package flutter material dart import package flutter scheduler dart import package vm service vm service dart hide isolate import package vm service vm service io dart const int width const int height const int bytes width height pixels vmservice vmservice string isolateid future main async widgetsflutterbinding ensureinitialized imagecache maximumsize pixels await createpixels bytes final developer serviceprotocolinfo info await developer service getinfo isolateid developer service getisolateid isolate current if info serveruri null throw exception this app must be run in debug or profile mode vmservice await vmserviceconnecturi ws localhost info serveruri port info serveruri path ws runapp myapp class myapp extends statelesswidget override widget build buildcontext context return materialapp title flutter demo theme themedata primaryswatch colors blue visualdensity visualdensity adaptiveplatformdensity home myhomepage title flutter demo home page class myhomepage extends statefulwidget myhomepage key key this title super key key final string title override myhomepagestate createstate myhomepagestate future createpixels int bytes async final pixels bytes for int index index bytes index pixels index pixels index pixels index pixels return pixels future createimage async final completer completer ui decodeimagefrompixels pixels width height ui pixelformat ui image image completer complete image return completer future class myhomepagestate extends state ui image image bool loadingimage false string imagebuttontext load image string memoryusagelabel no memory usage recorded void toggleimage assert loadingimage setstate if image null loadingimage true imagebuttontext loading image createimage then ui image image setstate imagebuttontext clear image loadingimage false this image image else setstate image null imagebuttontext load image voidcallback sendlowmemory bool gc gc is not for sure but usually works also note that even without trying to trigger a gc this creates enough new garbage to sometimes cause a gc anyway return vmservice getallocationprofile isolateid gc gc then dynamic value allocationprofile profile value as allocationprofile setstate memoryusagelabel external profile memoryusage externalusage heap profile memoryusage heapusage override widget build buildcontext context return scaffold appbar appbar title text widget title body center child column children raisedbutton child text check alloc profile no gc onpressed sendlowmemory false raisedbutton child text check alloc profile try gc onpressed sendlowmemory true text memoryusagelabel raisedbutton child text imagebuttontext onpressed loadingimage null toggleimage if image null rawimage image image width height else text no image
0
710,832
24,437,302,534
IssuesEvent
2022-10-06 12:25:22
leaningtech/webvm
https://api.github.com/repos/leaningtech/webvm
closed
Unexpected file `/nbody.js`
Type: maintenance Priority: medium
Looks like there's a nearly identical copy of `~/examples/nodejs/nbody.js` in the root directory
1.0
Unexpected file `/nbody.js` - Looks like there's a nearly identical copy of `~/examples/nodejs/nbody.js` in the root directory
priority
unexpected file nbody js looks like there s a nearly identical copy of examples nodejs nbody js in the root directory
1
87,593
15,786,538,547
IssuesEvent
2021-04-01 17:53:51
joshnewton31080/experian-java
https://api.github.com/repos/joshnewton31080/experian-java
opened
CVE-2018-11307 (High) detected in jackson-databind-2.9.2.jar
security vulnerability
## CVE-2018-11307 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.2.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: experian-java/MavenWorkspace/bis-services-lib/bis-services-base/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/joshnewton31080/experian-java/commit/f7845d2a79eba7a55a8254693f8dc9db8198487a">f7845d2a79eba7a55a8254693f8dc9db8198487a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6. <p>Publish Date: 2019-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11307>CVE-2018-11307</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2032">https://github.com/FasterXML/jackson-databind/issues/2032</a></p> <p>Release Date: 2019-03-17</p> <p>Fix Resolution: jackson-databind-2.9.6</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.2","packageFilePaths":["/MavenWorkspace/bis-services-lib/bis-services-base/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jackson-databind-2.9.6"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-11307","vulnerabilityDetails":"An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11307","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-11307 (High) detected in jackson-databind-2.9.2.jar - ## CVE-2018-11307 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.2.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: experian-java/MavenWorkspace/bis-services-lib/bis-services-base/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/joshnewton31080/experian-java/commit/f7845d2a79eba7a55a8254693f8dc9db8198487a">f7845d2a79eba7a55a8254693f8dc9db8198487a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6. <p>Publish Date: 2019-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11307>CVE-2018-11307</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2032">https://github.com/FasterXML/jackson-databind/issues/2032</a></p> <p>Release Date: 2019-03-17</p> <p>Fix Resolution: jackson-databind-2.9.6</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.2","packageFilePaths":["/MavenWorkspace/bis-services-lib/bis-services-base/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jackson-databind-2.9.6"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-11307","vulnerabilityDetails":"An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11307","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file experian java mavenworkspace bis services lib bis services base pom xml path to vulnerable library canner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in fasterxml jackson databind through use of jackson default typing along with a gadget class from ibatis allows exfiltration of content fixed in and publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jackson databind check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails an issue was discovered in fasterxml jackson databind through use of jackson default typing along with a gadget class from ibatis allows exfiltration of content fixed in and vulnerabilityurl
0
120,239
15,713,331,269
IssuesEvent
2021-03-27 15:44:20
mateugazi/SelfImprovement
https://api.github.com/repos/mateugazi/SelfImprovement
opened
Implementing DTOs, Mappers & the Repository Pattern using the Sequelize ORM with Examples - DDD w/ TypeScript
DomainDrivenDesign Typescript
https://khalilstemmler.com/articles/typescript-domain-driven-design/repository-dto-mapper/
1.0
Implementing DTOs, Mappers & the Repository Pattern using the Sequelize ORM with Examples - DDD w/ TypeScript - https://khalilstemmler.com/articles/typescript-domain-driven-design/repository-dto-mapper/
non_priority
implementing dtos mappers the repository pattern using the sequelize orm with examples ddd w typescript
0
97,455
16,236,321,957
IssuesEvent
2021-05-07 01:28:49
joaonetoo/saaddeploy
https://api.github.com/repos/joaonetoo/saaddeploy
opened
CVE-2019-16892 (Medium) detected in rubyzip-1.0.0.gem
security vulnerability
## CVE-2019-16892 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>rubyzip-1.0.0.gem</b></p></summary> <p></p> <p>Library home page: <a href="https://rubygems.org/gems/rubyzip-1.0.0.gem">https://rubygems.org/gems/rubyzip-1.0.0.gem</a></p> <p> Dependency Hierarchy: - axlsx_rails-0.5.2.gem (Root Library) - axlsx-2.0.1.gem - :x: **rubyzip-1.0.0.gem** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption). <p>Publish Date: 2019-09-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16892>CVE-2019-16892</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16892">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16892</a></p> <p>Release Date: 2019-09-25</p> <p>Fix Resolution: 1.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-16892 (Medium) detected in rubyzip-1.0.0.gem - ## CVE-2019-16892 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>rubyzip-1.0.0.gem</b></p></summary> <p></p> <p>Library home page: <a href="https://rubygems.org/gems/rubyzip-1.0.0.gem">https://rubygems.org/gems/rubyzip-1.0.0.gem</a></p> <p> Dependency Hierarchy: - axlsx_rails-0.5.2.gem (Root Library) - axlsx-2.0.1.gem - :x: **rubyzip-1.0.0.gem** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption). <p>Publish Date: 2019-09-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16892>CVE-2019-16892</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16892">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16892</a></p> <p>Release Date: 2019-09-25</p> <p>Fix Resolution: 1.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in rubyzip gem cve medium severity vulnerability vulnerable library rubyzip gem library home page a href dependency hierarchy axlsx rails gem root library axlsx gem x rubyzip gem vulnerable library vulnerability details in rubyzip before a crafted zip file can bypass application checks on zip entry sizes because data about the uncompressed size can be spoofed this allows attackers to cause a denial of service disk consumption publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
66,548
7,006,294,181
IssuesEvent
2017-12-19 07:49:13
foodtiny/native
https://api.github.com/repos/foodtiny/native
closed
Add test cases for native
feature test
Add test cases, reformat code for : - [x] Java.Util.HashMap - [x] java.util.ArrayList.hpp - [x] java.util.Vector - [x] java.lang.Bytes - [x] java.lang.ClassCastException - [x] java.lang.ArithmeticException - [x] java.lang.Throwable
1.0
Add test cases for native - Add test cases, reformat code for : - [x] Java.Util.HashMap - [x] java.util.ArrayList.hpp - [x] java.util.Vector - [x] java.lang.Bytes - [x] java.lang.ClassCastException - [x] java.lang.ArithmeticException - [x] java.lang.Throwable
non_priority
add test cases for native add test cases reformat code for java util hashmap java util arraylist hpp java util vector java lang bytes java lang classcastexception java lang arithmeticexception java lang throwable
0
21,795
3,560,494,144
IssuesEvent
2016-01-23 03:41:27
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
Inline refactor isn't always correct and the output can be cleaned up
analyzer-refactoring area-analyzer priority-high Type-Defect
When it works it's awesome, but I've noticed that the inline refactor for a method doesn't always work. In `pkg/compiler/lib/src/cps_ir/cps_ir_builder.dart` in the SDK, search for method buildInvokeStatic, choose Refactor -> Inline... -> Inline all references and remove the method. There is one call site that looked like: ```dart ir.Primitive exception = thenBuilder.buildInvokeStatic( error, new Selector.fromElement(error), <ir.Primitive>[], sourceInformation); ``` and now looks like: ```dart assert(!error.isLocal); assert(!error.isInstanceMember); assert(thenBuilder.isOpen); ir.Primitive exception = addPrimitive( new ir.InvokeStatic(error, new Selector.fromElement(error), <ir.Primitive>[], sourceInformation)); ``` Specifically the receiver `thenBuilder` has been lost from the call to `addPrimitive` in the inlined body. (Note that it was not lost from the call to `isOpen` in the assert). 2. It might be nice to automatically format the output in case there are a lot of call sites. In this case, there is a too-long line, and offside indentation of a continued line. 3. There is an unwanted blank line left at the site of the original method. This is the whitespace that followed the method. It seems nicer to eliminate all the blank lines up to the next member (but there's only one definition site so it's not terrible to have to clean it up by hand).
1.0
Inline refactor isn't always correct and the output can be cleaned up - When it works it's awesome, but I've noticed that the inline refactor for a method doesn't always work. In `pkg/compiler/lib/src/cps_ir/cps_ir_builder.dart` in the SDK, search for method buildInvokeStatic, choose Refactor -> Inline... -> Inline all references and remove the method. There is one call site that looked like: ```dart ir.Primitive exception = thenBuilder.buildInvokeStatic( error, new Selector.fromElement(error), <ir.Primitive>[], sourceInformation); ``` and now looks like: ```dart assert(!error.isLocal); assert(!error.isInstanceMember); assert(thenBuilder.isOpen); ir.Primitive exception = addPrimitive( new ir.InvokeStatic(error, new Selector.fromElement(error), <ir.Primitive>[], sourceInformation)); ``` Specifically the receiver `thenBuilder` has been lost from the call to `addPrimitive` in the inlined body. (Note that it was not lost from the call to `isOpen` in the assert). 2. It might be nice to automatically format the output in case there are a lot of call sites. In this case, there is a too-long line, and offside indentation of a continued line. 3. There is an unwanted blank line left at the site of the original method. This is the whitespace that followed the method. It seems nicer to eliminate all the blank lines up to the next member (but there's only one definition site so it's not terrible to have to clean it up by hand).
non_priority
inline refactor isn t always correct and the output can be cleaned up when it works it s awesome but i ve noticed that the inline refactor for a method doesn t always work in pkg compiler lib src cps ir cps ir builder dart in the sdk search for method buildinvokestatic choose refactor inline inline all references and remove the method there is one call site that looked like dart ir primitive exception thenbuilder buildinvokestatic error new selector fromelement error sourceinformation and now looks like dart assert error islocal assert error isinstancemember assert thenbuilder isopen ir primitive exception addprimitive new ir invokestatic error new selector fromelement error sourceinformation specifically the receiver thenbuilder has been lost from the call to addprimitive in the inlined body note that it was not lost from the call to isopen in the assert it might be nice to automatically format the output in case there are a lot of call sites in this case there is a too long line and offside indentation of a continued line there is an unwanted blank line left at the site of the original method this is the whitespace that followed the method it seems nicer to eliminate all the blank lines up to the next member but there s only one definition site so it s not terrible to have to clean it up by hand
0
92,778
8,378,119,931
IssuesEvent
2018-10-06 10:32:49
CS2103-AY1819S1-T16-2/main
https://api.github.com/repos/CS2103-AY1819S1-T16-2/main
opened
Automated Tests for the Assignment class
tests
Currently there are no tests for the Assignment class. Suggested tests: - Ensure proper creation / initialization of Assignment - Ensure Assignments are saved properly in the XML files - Ensure Assignments can only have students who are present in the TutorialGroup. - Ensure duplicate Assignments in a TutorialGroup should fail.
1.0
Automated Tests for the Assignment class - Currently there are no tests for the Assignment class. Suggested tests: - Ensure proper creation / initialization of Assignment - Ensure Assignments are saved properly in the XML files - Ensure Assignments can only have students who are present in the TutorialGroup. - Ensure duplicate Assignments in a TutorialGroup should fail.
non_priority
automated tests for the assignment class currently there are no tests for the assignment class suggested tests ensure proper creation initialization of assignment ensure assignments are saved properly in the xml files ensure assignments can only have students who are present in the tutorialgroup ensure duplicate assignments in a tutorialgroup should fail
0
207,415
15,815,366,808
IssuesEvent
2021-04-05 11:10:01
NillerMedDild/Enigmatica6
https://api.github.com/repos/NillerMedDild/Enigmatica6
opened
RS Large Patterns
Status: Ready For Testing Suggestion
**CurseForge Link** https://www.curseforge.com/minecraft/mc-mods/rslargepatterns **Mod description** Write a short description of the mod here. **Why would you like the mod added?** **Screenshots if applicable.**
1.0
RS Large Patterns - **CurseForge Link** https://www.curseforge.com/minecraft/mc-mods/rslargepatterns **Mod description** Write a short description of the mod here. **Why would you like the mod added?** **Screenshots if applicable.**
non_priority
rs large patterns curseforge link mod description write a short description of the mod here why would you like the mod added screenshots if applicable
0
233,182
18,952,609,864
IssuesEvent
2021-11-18 16:35:42
w3c/epub-tests
https://api.github.com/repos/w3c/epub-tests
opened
Tests on the rendition properties
tests claimed
I will create tests for the [Rendition flow properties](https://www.w3.org/TR/epub-rs-33/#flow) (see also [in the content document](https://www.w3.org/TR/epub-33/#flow)). --- Note, for the record, that these tests are not really my own. I looked at the old [IDPF test suite for 3.0](https://github.com/IDPF/epub-testsuite) to see whether and how those tests can be repurposed by adapting them to 3.3 and the tests on rendition seem to be the simplest to convert manually (those were written by @mattgarrish). The other tests may be more difficult to repurpose, their granularity vs. the document features is different. @mattgarrish @dauwhe, do you see any issues doing this?
1.0
Tests on the rendition properties - I will create tests for the [Rendition flow properties](https://www.w3.org/TR/epub-rs-33/#flow) (see also [in the content document](https://www.w3.org/TR/epub-33/#flow)). --- Note, for the record, that these tests are not really my own. I looked at the old [IDPF test suite for 3.0](https://github.com/IDPF/epub-testsuite) to see whether and how those tests can be repurposed by adapting them to 3.3 and the tests on rendition seem to be the simplest to convert manually (those were written by @mattgarrish). The other tests may be more difficult to repurpose, their granularity vs. the document features is different. @mattgarrish @dauwhe, do you see any issues doing this?
non_priority
tests on the rendition properties i will create tests for the see also note for the record that these tests are not really my own i looked at the old to see whether and how those tests can be repurposed by adapting them to and the tests on rendition seem to be the simplest to convert manually those were written by mattgarrish the other tests may be more difficult to repurpose their granularity vs the document features is different mattgarrish dauwhe do you see any issues doing this
0
3,302
4,210,814,285
IssuesEvent
2016-06-29 11:23:24
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
Build of ARM version of dart executable fails on our ARM hardware - libc mismatch.
area-infrastructure os-linux P1 high Type: bug
Since updating our builder to trusty ubuntu, and installing the up-to-date arm cross-compiler, the arm dart executable requires glibc 2.16, which isn't present on our target. The error message is: /lib/arm-linux-gnueabihf/libc.so.6: version `GLIBC_2.16' not found (required by out/ReleaseXARM/dart) We need to get the OS on our arm tester updated to one with glibc 2.16 to fix this.
1.0
Build of ARM version of dart executable fails on our ARM hardware - libc mismatch. - Since updating our builder to trusty ubuntu, and installing the up-to-date arm cross-compiler, the arm dart executable requires glibc 2.16, which isn't present on our target. The error message is: /lib/arm-linux-gnueabihf/libc.so.6: version `GLIBC_2.16' not found (required by out/ReleaseXARM/dart) We need to get the OS on our arm tester updated to one with glibc 2.16 to fix this.
non_priority
build of arm version of dart executable fails on our arm hardware libc mismatch since updating our builder to trusty ubuntu and installing the up to date arm cross compiler the arm dart executable requires glibc which isn t present on our target the error message is lib arm linux gnueabihf libc so version glibc not found required by out releasexarm dart we need to get the os on our arm tester updated to one with glibc to fix this
0
7,019
24,125,758,739
IssuesEvent
2022-09-21 00:05:33
o3de/o3de
https://api.github.com/repos/o3de/o3de
closed
PhysX Collider Component returns a memory access violation when getting its Component Property Tree with types
kind/bug triage/accepted priority/critical kind/automation sig/simulation
**Describe the bug** When attempting to get the **Component Property Tree** from a **PhysX Collider Component** a memory access violation is returned **Steps to reproduce** Steps to reproduce the behavior: 1. Create a Python Editor Test that makes a call to get the **Component Property Tree** from the **PhysX Collider Component**. ``` test_entity = EditorEntity.create_editor_entity("Test") test_component = test_entity.add_component("PhysX Collider") print(test_component.get_property_type_visibility()) ``` or ``` test_entity = hydra.Entity("test") entity.create_entity(position, ["PhysX Collider"]) component = test_entity.components[0] print(hydra.get_property_tree(component) ``` 2. Run automation **Expected behavior** A property tree is returned and printed to the stream **Actual behavior** A Read Access Memory exception is returned **Callstack** ``` E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Code\Legacy\CrySystem\DebugCallStack.cpp (223) : DebugCallStack::handleException E |Editor.log| <21:36:43> (Exit) - 00007FFD0C090057 (KERNELBASE) : UnhandledExceptionFilter E |Editor.log| <21:36:43> (Exit) - 00007FFD0E3153B0 (ntdll) : memset E |Editor.log| <21:36:43> (Exit) - 00007FFD0E2FC766 (ntdll) : _C_specific_handler E |Editor.log| <21:36:43> (Exit) - 00007FFD0E31229F (ntdll) : _chkstk E |Editor.log| <21:36:43> (Exit) - 00007FFD0E2C1454 (ntdll) : RtlRaiseException E |Editor.log| <21:36:43> (Exit) - 00007FFD0E310DCE (ntdll) : KiUserExceptionDispatcher E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Code\Framework\AzToolsFramework\AzToolsFramework\PropertyTreeEditor\PropertyTreeEditor.cpp (127) : AzToolsFramework::PropertyTreeEditor::BuildPathsListWithTypes E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Code\Framework\AzCore\AzCore\RTTI\BehaviorContext.h (4038) : AZ::Internal::CallFunction<AZStd::vector<AZStd::basic_string<char,AZStd::char_traits<char>,AZStd::allocator>,AZStd::allocator> const >::Member<,AzToolsFramework::PropertyTreeEditor E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Code\Framework\AzCore\AzCore\RTTI\BehaviorContext.h (4311) : AZ::Internal::BehaviorMethodImpl<AZStd::vector<AZStd::basic_string<char,AZStd::char_traits<char>,AZStd::allocator>,AZStd::allocator> const (__cdecl AzToolsFramework::PropertyTreeEdi E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (662) : EditorPythonBindings::Call::InvokeBehaviorMethodWithResult E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (696) : EditorPythonBindings::Call::InvokeBehaviorMethod E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (716) : EditorPythonBindings::Call::ClassMethod E |Editor.log| <21:36:43> (Exit) - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (159) : `pybind11::cpp_function::initialize<`EditorPythonBindings::PythonProxyObject::GetPropertyValue'::`12'::<lambda_1>,pybind11::object,pybind11::args>'::`2':: E |Editor.log| <21:36:43> (Exit) - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (100) : _Closure_wrapper_92775451_100::<lambda_invoker_cdecl> E |Editor.log| <21:36:43> (Exit) - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (624) : pybind11::cpp_function::dispatcher E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (693) : _PyMethodDef_RawFastCallKeywords E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4568) : call_function E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (3095) : _PyEval_EvalFrameDefault E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (285) : function_code_fastcall E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (408) : _PyFunction_FastCallKeywords E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4617) : call_function E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (3111) : _PyEval_EvalFrameDefault E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (285) : function_code_fastcall E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (408) : _PyFunction_FastCallKeywords E |Editor.log| <21:36:43> () - 00007FFD0C090057 (KERNELBASE) : UnhandledExceptionFilter E |Editor.log| <21:36:43> () - 00007FFD0E3153B0 (ntdll) : memset E |Editor.log| <21:36:43> () - 00007FFD0E2FC766 (ntdll) : _C_specific_handler E |Editor.log| <21:36:43> () - 00007FFD0E31229F (ntdll) : _chkstk E |Editor.log| <21:36:43> () - 00007FFD0E2C1454 (ntdll) : RtlRaiseException E |Editor.log| <21:36:43> () - 00007FFD0E310DCE (ntdll) : KiUserExceptionDispatcher E |Editor.log| <21:36:43> () - E:\gws\o3de\Code\Framework\AzToolsFramework\AzToolsFramework\PropertyTreeEditor\PropertyTreeEditor.cpp (127) : AzToolsFramework::PropertyTreeEditor::BuildPathsListWithTypes E |Editor.log| <21:36:43> () - E:\gws\o3de\Code\Framework\AzCore\AzCore\RTTI\BehaviorContext.h (4038) : AZ::Internal::CallFunction<AZStd::vector<AZStd::basic_string<char,AZStd::char_traits<char>,AZStd::allocator>,AZStd::allocator> const >::Member<,AzToolsFramework::PropertyTreeEditor E |Editor.log| <21:36:43> () - E:\gws\o3de\Code\Framework\AzCore\AzCore\RTTI\BehaviorContext.h (4311) : AZ::Internal::BehaviorMethodImpl<AZStd::vector<AZStd::basic_string<char,AZStd::char_traits<char>,AZStd::allocator>,AZStd::allocator> const (__cdecl AzToolsFramework::PropertyTreeEdi E |Editor.log| <21:36:43> () - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (662) : EditorPythonBindings::Call::InvokeBehaviorMethodWithResult E |Editor.log| <21:36:43> () - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (696) : EditorPythonBindings::Call::InvokeBehaviorMethod E |Editor.log| <21:36:43> () - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (716) : EditorPythonBindings::Call::ClassMethod E |Editor.log| <21:36:43> () - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (159) : `pybind11::cpp_function::initialize<`EditorPythonBindings::PythonProxyObject::GetPropertyValue'::`12'::<lambda_1>,pybind11::object,pybind11::args>'::`2':: E |Editor.log| <21:36:43> () - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (100) : _Closure_wrapper_92775451_100::<lambda_invoker_cdecl> E |Editor.log| <21:36:43> () - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (624) : pybind11::cpp_function::dispatcher E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (693) : _PyMethodDef_RawFastCallKeywords E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4568) : call_function E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (3095) : _PyEval_EvalFrameDefault E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (285) : function_code_fastcall E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (408) : _PyFunction_FastCallKeywords E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4617) : call_function E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (3111) : _PyEval_EvalFrameDefault E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (285) : function_code_fastcall E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (408) : _PyFunction_FastCallKeywords E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4617) : call_function ```
1.0
PhysX Collider Component returns a memory access violation when getting its Component Property Tree with types - **Describe the bug** When attempting to get the **Component Property Tree** from a **PhysX Collider Component** a memory access violation is returned **Steps to reproduce** Steps to reproduce the behavior: 1. Create a Python Editor Test that makes a call to get the **Component Property Tree** from the **PhysX Collider Component**. ``` test_entity = EditorEntity.create_editor_entity("Test") test_component = test_entity.add_component("PhysX Collider") print(test_component.get_property_type_visibility()) ``` or ``` test_entity = hydra.Entity("test") entity.create_entity(position, ["PhysX Collider"]) component = test_entity.components[0] print(hydra.get_property_tree(component) ``` 2. Run automation **Expected behavior** A property tree is returned and printed to the stream **Actual behavior** A Read Access Memory exception is returned **Callstack** ``` E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Code\Legacy\CrySystem\DebugCallStack.cpp (223) : DebugCallStack::handleException E |Editor.log| <21:36:43> (Exit) - 00007FFD0C090057 (KERNELBASE) : UnhandledExceptionFilter E |Editor.log| <21:36:43> (Exit) - 00007FFD0E3153B0 (ntdll) : memset E |Editor.log| <21:36:43> (Exit) - 00007FFD0E2FC766 (ntdll) : _C_specific_handler E |Editor.log| <21:36:43> (Exit) - 00007FFD0E31229F (ntdll) : _chkstk E |Editor.log| <21:36:43> (Exit) - 00007FFD0E2C1454 (ntdll) : RtlRaiseException E |Editor.log| <21:36:43> (Exit) - 00007FFD0E310DCE (ntdll) : KiUserExceptionDispatcher E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Code\Framework\AzToolsFramework\AzToolsFramework\PropertyTreeEditor\PropertyTreeEditor.cpp (127) : AzToolsFramework::PropertyTreeEditor::BuildPathsListWithTypes E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Code\Framework\AzCore\AzCore\RTTI\BehaviorContext.h (4038) : AZ::Internal::CallFunction<AZStd::vector<AZStd::basic_string<char,AZStd::char_traits<char>,AZStd::allocator>,AZStd::allocator> const >::Member<,AzToolsFramework::PropertyTreeEditor E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Code\Framework\AzCore\AzCore\RTTI\BehaviorContext.h (4311) : AZ::Internal::BehaviorMethodImpl<AZStd::vector<AZStd::basic_string<char,AZStd::char_traits<char>,AZStd::allocator>,AZStd::allocator> const (__cdecl AzToolsFramework::PropertyTreeEdi E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (662) : EditorPythonBindings::Call::InvokeBehaviorMethodWithResult E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (696) : EditorPythonBindings::Call::InvokeBehaviorMethod E |Editor.log| <21:36:43> (Exit) - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (716) : EditorPythonBindings::Call::ClassMethod E |Editor.log| <21:36:43> (Exit) - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (159) : `pybind11::cpp_function::initialize<`EditorPythonBindings::PythonProxyObject::GetPropertyValue'::`12'::<lambda_1>,pybind11::object,pybind11::args>'::`2':: E |Editor.log| <21:36:43> (Exit) - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (100) : _Closure_wrapper_92775451_100::<lambda_invoker_cdecl> E |Editor.log| <21:36:43> (Exit) - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (624) : pybind11::cpp_function::dispatcher E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (693) : _PyMethodDef_RawFastCallKeywords E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4568) : call_function E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (3095) : _PyEval_EvalFrameDefault E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (285) : function_code_fastcall E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (408) : _PyFunction_FastCallKeywords E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4617) : call_function E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (3111) : _PyEval_EvalFrameDefault E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (285) : function_code_fastcall E |Editor.log| <21:36:43> (Exit) - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (408) : _PyFunction_FastCallKeywords E |Editor.log| <21:36:43> () - 00007FFD0C090057 (KERNELBASE) : UnhandledExceptionFilter E |Editor.log| <21:36:43> () - 00007FFD0E3153B0 (ntdll) : memset E |Editor.log| <21:36:43> () - 00007FFD0E2FC766 (ntdll) : _C_specific_handler E |Editor.log| <21:36:43> () - 00007FFD0E31229F (ntdll) : _chkstk E |Editor.log| <21:36:43> () - 00007FFD0E2C1454 (ntdll) : RtlRaiseException E |Editor.log| <21:36:43> () - 00007FFD0E310DCE (ntdll) : KiUserExceptionDispatcher E |Editor.log| <21:36:43> () - E:\gws\o3de\Code\Framework\AzToolsFramework\AzToolsFramework\PropertyTreeEditor\PropertyTreeEditor.cpp (127) : AzToolsFramework::PropertyTreeEditor::BuildPathsListWithTypes E |Editor.log| <21:36:43> () - E:\gws\o3de\Code\Framework\AzCore\AzCore\RTTI\BehaviorContext.h (4038) : AZ::Internal::CallFunction<AZStd::vector<AZStd::basic_string<char,AZStd::char_traits<char>,AZStd::allocator>,AZStd::allocator> const >::Member<,AzToolsFramework::PropertyTreeEditor E |Editor.log| <21:36:43> () - E:\gws\o3de\Code\Framework\AzCore\AzCore\RTTI\BehaviorContext.h (4311) : AZ::Internal::BehaviorMethodImpl<AZStd::vector<AZStd::basic_string<char,AZStd::char_traits<char>,AZStd::allocator>,AZStd::allocator> const (__cdecl AzToolsFramework::PropertyTreeEdi E |Editor.log| <21:36:43> () - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (662) : EditorPythonBindings::Call::InvokeBehaviorMethodWithResult E |Editor.log| <21:36:43> () - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (696) : EditorPythonBindings::Call::InvokeBehaviorMethod E |Editor.log| <21:36:43> () - E:\gws\o3de\Gems\EditorPythonBindings\Code\Source\PythonUtility.cpp (716) : EditorPythonBindings::Call::ClassMethod E |Editor.log| <21:36:43> () - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (159) : `pybind11::cpp_function::initialize<`EditorPythonBindings::PythonProxyObject::GetPropertyValue'::`12'::<lambda_1>,pybind11::object,pybind11::args>'::`2':: E |Editor.log| <21:36:43> () - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (100) : _Closure_wrapper_92775451_100::<lambda_invoker_cdecl> E |Editor.log| <21:36:43> () - E:\3rdParty\packages\pybind11-2.4.3-rev3-multiplatform\pybind11\include\pybind11\pybind11.h (624) : pybind11::cpp_function::dispatcher E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (693) : _PyMethodDef_RawFastCallKeywords E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4568) : call_function E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (3095) : _PyEval_EvalFrameDefault E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (285) : function_code_fastcall E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (408) : _PyFunction_FastCallKeywords E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4617) : call_function E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (3111) : _PyEval_EvalFrameDefault E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (285) : function_code_fastcall E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\objects\call.c (408) : _PyFunction_FastCallKeywords E |Editor.log| <21:36:43> () - d:\github\3p-package-source\package-system\python\win_x64\temp\cpython\python\ceval.c (4617) : call_function ```
non_priority
physx collider component returns a memory access violation when getting its component property tree with types describe the bug when attempting to get the component property tree from a physx collider component a memory access violation is returned steps to reproduce steps to reproduce the behavior create a python editor test that makes a call to get the component property tree from the physx collider component test entity editorentity create editor entity test test component test entity add component physx collider print test component get property type visibility or test entity hydra entity test entity create entity position component test entity components print hydra get property tree component run automation expected behavior a property tree is returned and printed to the stream actual behavior a read access memory exception is returned callstack e editor log exit e gws code legacy crysystem debugcallstack cpp debugcallstack handleexception e editor log exit kernelbase unhandledexceptionfilter e editor log exit ntdll memset e editor log exit ntdll c specific handler e editor log exit ntdll chkstk e editor log exit ntdll rtlraiseexception e editor log exit ntdll kiuserexceptiondispatcher e editor log exit e gws code framework aztoolsframework aztoolsframework propertytreeeditor propertytreeeditor cpp aztoolsframework propertytreeeditor buildpathslistwithtypes e editor log exit e gws code framework azcore azcore rtti behaviorcontext h az internal callfunction azstd allocator azstd allocator const member aztoolsframework propertytreeeditor e editor log exit e gws code framework azcore azcore rtti behaviorcontext h az internal behaviormethodimpl azstd allocator azstd allocator const cdecl aztoolsframework propertytreeedi e editor log exit e gws gems editorpythonbindings code source pythonutility cpp editorpythonbindings call invokebehaviormethodwithresult e editor log exit e gws gems editorpythonbindings code source pythonutility cpp editorpythonbindings call invokebehaviormethod e editor log exit e gws gems editorpythonbindings code source pythonutility cpp editorpythonbindings call classmethod e editor log exit e packages multiplatform include h cpp function initialize object args e editor log exit e packages multiplatform include h closure wrapper e editor log exit e packages multiplatform include h cpp function dispatcher e editor log exit d github package source package system python win temp cpython objects call c pymethoddef rawfastcallkeywords e editor log exit d github package source package system python win temp cpython python ceval c call function e editor log exit d github package source package system python win temp cpython python ceval c pyeval evalframedefault e editor log exit d github package source package system python win temp cpython objects call c function code fastcall e editor log exit d github package source package system python win temp cpython objects call c pyfunction fastcallkeywords e editor log exit d github package source package system python win temp cpython python ceval c call function e editor log exit d github package source package system python win temp cpython python ceval c pyeval evalframedefault e editor log exit d github package source package system python win temp cpython objects call c function code fastcall e editor log exit d github package source package system python win temp cpython objects call c pyfunction fastcallkeywords e editor log kernelbase unhandledexceptionfilter e editor log ntdll memset e editor log ntdll c specific handler e editor log ntdll chkstk e editor log ntdll rtlraiseexception e editor log ntdll kiuserexceptiondispatcher e editor log e gws code framework aztoolsframework aztoolsframework propertytreeeditor propertytreeeditor cpp aztoolsframework propertytreeeditor buildpathslistwithtypes e editor log e gws code framework azcore azcore rtti behaviorcontext h az internal callfunction azstd allocator azstd allocator const member aztoolsframework propertytreeeditor e editor log e gws code framework azcore azcore rtti behaviorcontext h az internal behaviormethodimpl azstd allocator azstd allocator const cdecl aztoolsframework propertytreeedi e editor log e gws gems editorpythonbindings code source pythonutility cpp editorpythonbindings call invokebehaviormethodwithresult e editor log e gws gems editorpythonbindings code source pythonutility cpp editorpythonbindings call invokebehaviormethod e editor log e gws gems editorpythonbindings code source pythonutility cpp editorpythonbindings call classmethod e editor log e packages multiplatform include h cpp function initialize object args e editor log e packages multiplatform include h closure wrapper e editor log e packages multiplatform include h cpp function dispatcher e editor log d github package source package system python win temp cpython objects call c pymethoddef rawfastcallkeywords e editor log d github package source package system python win temp cpython python ceval c call function e editor log d github package source package system python win temp cpython python ceval c pyeval evalframedefault e editor log d github package source package system python win temp cpython objects call c function code fastcall e editor log d github package source package system python win temp cpython objects call c pyfunction fastcallkeywords e editor log d github package source package system python win temp cpython python ceval c call function e editor log d github package source package system python win temp cpython python ceval c pyeval evalframedefault e editor log d github package source package system python win temp cpython objects call c function code fastcall e editor log d github package source package system python win temp cpython objects call c pyfunction fastcallkeywords e editor log d github package source package system python win temp cpython python ceval c call function
0
619,277
19,520,872,504
IssuesEvent
2021-12-29 18:11:37
pystardust/ani-cli
https://api.github.com/repos/pystardust/ani-cli
closed
Request - Include list of anime that's popular, new, etc
type: feature request Priority 4: wishlist status: out of scope
Not an issue, but a request. Can you add an option to get a list of new and popular anime? That way we can check which one to look for to watch/download, for example, if new episodes are added.
1.0
Request - Include list of anime that's popular, new, etc - Not an issue, but a request. Can you add an option to get a list of new and popular anime? That way we can check which one to look for to watch/download, for example, if new episodes are added.
priority
request include list of anime that s popular new etc not an issue but a request can you add an option to get a list of new and popular anime that way we can check which one to look for to watch download for example if new episodes are added
1
113,358
17,135,192,019
IssuesEvent
2021-07-13 00:25:25
turkdevops/gitea
https://api.github.com/repos/turkdevops/gitea
opened
CVE-2020-11022 (Medium) detected in multiple libraries
security vulnerability
## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>golang.org/x/tools/go/analysis/passes/loopclosure-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/copylock-v0.1.0</b>, <b>golang.org/x/tools/go/analysis-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/bools-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/asmdecl-v0.1.0</b>, <b>golang.org/x/tools/go/types/objectpath-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/composite-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/assign-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/nilfunc-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/structtag-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/unusedresult-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/printf-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/cgocall-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/unsafeptr-v0.1.0</b>, <b>golang.org/x/tools/internal/analysisinternal-v0.1.0</b>, <b>golang.org/x/tools/internal/lsp/fuzzy-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/errorsas-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/stdmethods-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/lostcancel-v0.1.0</b>, <b>golang.org/x/tools/go/internal/cgo-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/httpresponse-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/shift-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/buildtag-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/tests-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/unmarshal-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/unreachable-v0.1.0</b>, <b>golang.org/x/tools/cover-v0.1.0</b>, <b>jquery-2.1.4.min.js</b>, <b>jquery-1.9.1.min.js</b>, <b>jquery-1.11.1.min.js</b>, <b>jquery-1.10.2.min.js</b></p></summary> <p> <details><summary><b>golang.org/x/tools/go/analysis/passes/loopclosure-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/loopclosure-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/copylock-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/copylock-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - :x: **golang.org/x/tools/go/analysis-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/bools-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/bools-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/asmdecl-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/asmdecl-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/types/objectpath-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - golang.org/x/tools/go/analysis/internal/facts-v0.1.0 - :x: **golang.org/x/tools/go/types/objectpath-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/composite-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/composite-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/assign-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/assign-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/nilfunc-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/nilfunc-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/structtag-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/structtag-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/unusedresult-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/unusedresult-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/printf-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/printf-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/cgocall-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/cgocall-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/unsafeptr-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/unsafeptr-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/internal/analysisinternal-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/internal/analysisinternal-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/internal/lsp/fuzzy-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/internal/analysisinternal-v0.1.0 - :x: **golang.org/x/tools/internal/lsp/fuzzy-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/errorsas-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/errorsas-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/stdmethods-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/stdmethods-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/lostcancel-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/lostcancel-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/internal/cgo-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - github.com/go-swagger/go-swagger/cmd/swagger-v0.27.0 (Root Library) - github.com/go-swagger/go-swagger/cmd/swagger/commands/generate-v0.27.0 - github.com/go-swagger/go-swagger/scan-v0.27.0 - golang.org/x/tools/go/loader-v0.1.0 - :x: **golang.org/x/tools/go/internal/cgo-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/httpresponse-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/httpresponse-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/shift-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/shift-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/buildtag-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/buildtag-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/tests-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/tests-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/unmarshal-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/unmarshal-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/unreachable-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/unreachable-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/cover-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - :x: **golang.org/x/tools/cover-v0.1.0** (Vulnerable Library) </details> <details><summary><b>jquery-2.1.4.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p> <p>Path to dependency file: gitea/web_src/fomantic/node_modules/fomantic-ui/examples/components/table.html</p> <p>Path to vulnerable library: gitea/web_src/fomantic/node_modules/fomantic-ui/examples/components/../assets/library/jquery.min.js,gitea/web_src/fomantic/node_modules/fomantic-ui/examples/assets/library/jquery.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.4.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.9.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.min.js</a></p> <p>Path to dependency file: gitea/node_modules/dagre-d3/dist/demo/hover.html</p> <p>Path to vulnerable library: gitea/node_modules/dagre-d3/dist/demo/hover.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.9.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js</a></p> <p>Path to dependency file: gitea/public/vendor/plugins/codemirror/mode/slim/index.html</p> <p>Path to vulnerable library: gitea/public/vendor/plugins/codemirror/mode/slim/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.10.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: gitea/node_modules/@claviska/jquery-minicolors/without-bootstrap.html</p> <p>Path to vulnerable library: gitea/node_modules/@claviska/jquery-minicolors/without-bootstrap.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/turkdevops/gitea/commit/5a07ad71010693de12293f5ff1fadc890259b5e0">5a07ad71010693de12293f5ff1fadc890259b5e0</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11022 (Medium) detected in multiple libraries - ## CVE-2020-11022 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>golang.org/x/tools/go/analysis/passes/loopclosure-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/copylock-v0.1.0</b>, <b>golang.org/x/tools/go/analysis-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/bools-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/asmdecl-v0.1.0</b>, <b>golang.org/x/tools/go/types/objectpath-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/composite-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/assign-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/nilfunc-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/structtag-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/unusedresult-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/printf-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/cgocall-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/unsafeptr-v0.1.0</b>, <b>golang.org/x/tools/internal/analysisinternal-v0.1.0</b>, <b>golang.org/x/tools/internal/lsp/fuzzy-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/errorsas-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/stdmethods-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/lostcancel-v0.1.0</b>, <b>golang.org/x/tools/go/internal/cgo-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/httpresponse-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/shift-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/buildtag-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/tests-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/unmarshal-v0.1.0</b>, <b>golang.org/x/tools/go/analysis/passes/unreachable-v0.1.0</b>, <b>golang.org/x/tools/cover-v0.1.0</b>, <b>jquery-2.1.4.min.js</b>, <b>jquery-1.9.1.min.js</b>, <b>jquery-1.11.1.min.js</b>, <b>jquery-1.10.2.min.js</b></p></summary> <p> <details><summary><b>golang.org/x/tools/go/analysis/passes/loopclosure-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/loopclosure-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/copylock-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/copylock-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - :x: **golang.org/x/tools/go/analysis-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/bools-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/bools-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/asmdecl-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/asmdecl-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/types/objectpath-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - golang.org/x/tools/go/analysis/internal/facts-v0.1.0 - :x: **golang.org/x/tools/go/types/objectpath-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/composite-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/composite-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/assign-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/assign-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/nilfunc-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/nilfunc-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/structtag-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/structtag-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/unusedresult-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/unusedresult-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/printf-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/printf-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/cgocall-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/cgocall-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/unsafeptr-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/unsafeptr-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/internal/analysisinternal-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/internal/analysisinternal-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/internal/lsp/fuzzy-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/internal/analysisinternal-v0.1.0 - :x: **golang.org/x/tools/internal/lsp/fuzzy-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/errorsas-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/errorsas-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/stdmethods-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/stdmethods-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/lostcancel-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/lostcancel-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/internal/cgo-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - github.com/go-swagger/go-swagger/cmd/swagger-v0.27.0 (Root Library) - github.com/go-swagger/go-swagger/cmd/swagger/commands/generate-v0.27.0 - github.com/go-swagger/go-swagger/scan-v0.27.0 - golang.org/x/tools/go/loader-v0.1.0 - :x: **golang.org/x/tools/go/internal/cgo-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/httpresponse-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/httpresponse-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/shift-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/shift-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/buildtag-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/buildtag-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/tests-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/tests-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/unmarshal-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/unmarshal-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/go/analysis/passes/unreachable-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - code.gitea.io/gitea-vet-v0.2.1 (Root Library) - golang.org/x/tools/go/analysis-v0.1.0 - golang.org/x/tools/go/analysis/unitchecker-v0.1.0 - :x: **golang.org/x/tools/go/analysis/passes/unreachable-v0.1.0** (Vulnerable Library) </details> <details><summary><b>golang.org/x/tools/cover-v0.1.0</b></p></summary> <p>[mirror] Go Tools</p> <p> Dependency Hierarchy: - :x: **golang.org/x/tools/cover-v0.1.0** (Vulnerable Library) </details> <details><summary><b>jquery-2.1.4.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/jquery.min.js</a></p> <p>Path to dependency file: gitea/web_src/fomantic/node_modules/fomantic-ui/examples/components/table.html</p> <p>Path to vulnerable library: gitea/web_src/fomantic/node_modules/fomantic-ui/examples/components/../assets/library/jquery.min.js,gitea/web_src/fomantic/node_modules/fomantic-ui/examples/assets/library/jquery.min.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.1.4.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.9.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.9.1/jquery.min.js</a></p> <p>Path to dependency file: gitea/node_modules/dagre-d3/dist/demo/hover.html</p> <p>Path to vulnerable library: gitea/node_modules/dagre-d3/dist/demo/hover.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.9.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.11.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.11.1/jquery.min.js</a></p> <p>Path to dependency file: gitea/public/vendor/plugins/codemirror/mode/slim/index.html</p> <p>Path to vulnerable library: gitea/public/vendor/plugins/codemirror/mode/slim/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.11.1.min.js** (Vulnerable Library) </details> <details><summary><b>jquery-1.10.2.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.10.2/jquery.min.js</a></p> <p>Path to dependency file: gitea/node_modules/@claviska/jquery-minicolors/without-bootstrap.html</p> <p>Path to vulnerable library: gitea/node_modules/@claviska/jquery-minicolors/without-bootstrap.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.10.2.min.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/turkdevops/gitea/commit/5a07ad71010693de12293f5ff1fadc890259b5e0">5a07ad71010693de12293f5ff1fadc890259b5e0</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries golang org x tools go analysis passes loopclosure golang org x tools go analysis passes copylock golang org x tools go analysis golang org x tools go analysis passes bools golang org x tools go analysis passes asmdecl golang org x tools go types objectpath golang org x tools go analysis passes composite golang org x tools go analysis passes assign golang org x tools go analysis passes nilfunc golang org x tools go analysis passes structtag golang org x tools go analysis passes unusedresult golang org x tools go analysis passes printf golang org x tools go analysis passes cgocall golang org x tools go analysis passes unsafeptr golang org x tools internal analysisinternal golang org x tools internal lsp fuzzy golang org x tools go analysis passes errorsas golang org x tools go analysis passes stdmethods golang org x tools go analysis passes lostcancel golang org x tools go internal cgo golang org x tools go analysis passes httpresponse golang org x tools go analysis passes shift golang org x tools go analysis passes buildtag golang org x tools go analysis passes tests golang org x tools go analysis passes unmarshal golang org x tools go analysis passes unreachable golang org x tools cover jquery min js jquery min js jquery min js jquery min js golang org x tools go analysis passes loopclosure go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis x golang org x tools go analysis passes loopclosure vulnerable library golang org x tools go analysis passes copylock go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes copylock vulnerable library golang org x tools go analysis go tools dependency hierarchy code gitea io gitea vet root library x golang org x tools go analysis vulnerable library golang org x tools go analysis passes bools go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes bools vulnerable library golang org x tools go analysis passes asmdecl go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis x golang org x tools go analysis passes asmdecl vulnerable library golang org x tools go types objectpath go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker golang org x tools go analysis internal facts x golang org x tools go types objectpath vulnerable library golang org x tools go analysis passes composite go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes composite vulnerable library golang org x tools go analysis passes assign go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes assign vulnerable library golang org x tools go analysis passes nilfunc go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes nilfunc vulnerable library golang org x tools go analysis passes structtag go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes structtag vulnerable library golang org x tools go analysis passes unusedresult go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis x golang org x tools go analysis passes unusedresult vulnerable library golang org x tools go analysis passes printf go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis x golang org x tools go analysis passes printf vulnerable library golang org x tools go analysis passes cgocall go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes cgocall vulnerable library golang org x tools go analysis passes unsafeptr go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis x golang org x tools go analysis passes unsafeptr vulnerable library golang org x tools internal analysisinternal go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis x golang org x tools internal analysisinternal vulnerable library golang org x tools internal lsp fuzzy go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools internal analysisinternal x golang org x tools internal lsp fuzzy vulnerable library golang org x tools go analysis passes errorsas go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes errorsas vulnerable library golang org x tools go analysis passes stdmethods go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis x golang org x tools go analysis passes stdmethods vulnerable library golang org x tools go analysis passes lostcancel go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis x golang org x tools go analysis passes lostcancel vulnerable library golang org x tools go internal cgo go tools dependency hierarchy github com go swagger go swagger cmd swagger root library github com go swagger go swagger cmd swagger commands generate github com go swagger go swagger scan golang org x tools go loader x golang org x tools go internal cgo vulnerable library golang org x tools go analysis passes httpresponse go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes httpresponse vulnerable library golang org x tools go analysis passes shift go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes shift vulnerable library golang org x tools go analysis passes buildtag go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes buildtag vulnerable library golang org x tools go analysis passes tests go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes tests vulnerable library golang org x tools go analysis passes unmarshal go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes unmarshal vulnerable library golang org x tools go analysis passes unreachable go tools dependency hierarchy code gitea io gitea vet root library golang org x tools go analysis golang org x tools go analysis unitchecker x golang org x tools go analysis passes unreachable vulnerable library golang org x tools cover go tools dependency hierarchy x golang org x tools cover vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file gitea web src fomantic node modules fomantic ui examples components table html path to vulnerable library gitea web src fomantic node modules fomantic ui examples components assets library jquery min js gitea web src fomantic node modules fomantic ui examples assets library jquery min js dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file gitea node modules dagre dist demo hover html path to vulnerable library gitea node modules dagre dist demo hover html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file gitea public vendor plugins codemirror mode slim index html path to vulnerable library gitea public vendor plugins codemirror mode slim index html dependency hierarchy x jquery min js vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file gitea node modules claviska jquery minicolors without bootstrap html path to vulnerable library gitea node modules claviska jquery minicolors without bootstrap html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch main vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
25,645
5,188,992,270
IssuesEvent
2017-01-20 21:43:39
Esri/military-symbol-editor-addin-wpf
https://api.github.com/repos/Esri/military-symbol-editor-addin-wpf
closed
Make Corrections to Install Military Symbol Editor topic from Pro Doc
3 - Verify B - Affects Documentation B - Bug effort-small
![image](https://cloud.githubusercontent.com/assets/13024357/22162764/c41245ae-df04-11e6-9c88-b39f2b97f343.png) We removed this install topic for the other parts of military tools, so I'm going to go ahead and remove this for consistency sake.
1.0
Make Corrections to Install Military Symbol Editor topic from Pro Doc - ![image](https://cloud.githubusercontent.com/assets/13024357/22162764/c41245ae-df04-11e6-9c88-b39f2b97f343.png) We removed this install topic for the other parts of military tools, so I'm going to go ahead and remove this for consistency sake.
non_priority
make corrections to install military symbol editor topic from pro doc we removed this install topic for the other parts of military tools so i m going to go ahead and remove this for consistency sake
0
668,586
22,590,755,039
IssuesEvent
2022-06-28 19:36:03
googleapis/google-api-nodejs-client
https://api.github.com/repos/googleapis/google-api-nodejs-client
opened
@googleapis/runtimeconfig submodule is not available from npm
type: bug priority: p2
I tried to install the `@googleapis/runtimeconfig` submodule as as instructed by the link below: https://github.com/googleapis/google-api-nodejs-client/tree/main/src/apis/runtimeconfig But the package is not present on NPM. I check the `@google-cloud` nodejs client libraries as well but to no avail. Please make it available on NPM.
1.0
@googleapis/runtimeconfig submodule is not available from npm - I tried to install the `@googleapis/runtimeconfig` submodule as as instructed by the link below: https://github.com/googleapis/google-api-nodejs-client/tree/main/src/apis/runtimeconfig But the package is not present on NPM. I check the `@google-cloud` nodejs client libraries as well but to no avail. Please make it available on NPM.
priority
googleapis runtimeconfig submodule is not available from npm i tried to install the googleapis runtimeconfig submodule as as instructed by the link below but the package is not present on npm i check the google cloud nodejs client libraries as well but to no avail please make it available on npm
1
353,205
10,549,975,415
IssuesEvent
2019-10-03 09:57:04
jenkins-x/jx
https://api.github.com/repos/jenkins-x/jx
opened
Upgrade process needs to make sure needs to make sure not to fail existing builds
area/upgrade kind/task priority/important-soon
The update process as defined now will update and restart essential Jenksins X components which will fail builds in progress. Ideally, once upgrade starts no new builds are submitted and existing builds are allowed to complete, before the upgrade process continues. After upgrade completion builds should resume.
1.0
Upgrade process needs to make sure needs to make sure not to fail existing builds - The update process as defined now will update and restart essential Jenksins X components which will fail builds in progress. Ideally, once upgrade starts no new builds are submitted and existing builds are allowed to complete, before the upgrade process continues. After upgrade completion builds should resume.
priority
upgrade process needs to make sure needs to make sure not to fail existing builds the update process as defined now will update and restart essential jenksins x components which will fail builds in progress ideally once upgrade starts no new builds are submitted and existing builds are allowed to complete before the upgrade process continues after upgrade completion builds should resume
1
185,817
6,730,853,842
IssuesEvent
2017-10-18 03:48:51
wireservice/csvkit
https://api.github.com/repos/wireservice/csvkit
closed
Install with Homebrew
feature Low Priority
[Homebrew](http://brew.sh) Tried with `brew diy` but ``` Error: Couldn't determine build system ```
1.0
Install with Homebrew - [Homebrew](http://brew.sh) Tried with `brew diy` but ``` Error: Couldn't determine build system ```
priority
install with homebrew tried with brew diy but error couldn t determine build system
1
1,640
2,653,006,727
IssuesEvent
2015-03-16 20:34:44
concrete5/concrete5-5.7.0
https://api.github.com/repos/concrete5/concrete5-5.7.0
closed
Block actions do not work in Stacks
code:core classes severity:high status:awaiting development type:bug
Block action URLs do not seem to work properly in a stack. To reproduce: 1. Create a stack 2. Place a form in the stack 3. Show the stack on a page 4. Try to submit the form Please note that this needs to work on both situations: - When a stack is added manually to the page - When a stack is displayed programmatically on the page (Stack::getByName('...')->display())
1.0
Block actions do not work in Stacks - Block action URLs do not seem to work properly in a stack. To reproduce: 1. Create a stack 2. Place a form in the stack 3. Show the stack on a page 4. Try to submit the form Please note that this needs to work on both situations: - When a stack is added manually to the page - When a stack is displayed programmatically on the page (Stack::getByName('...')->display())
non_priority
block actions do not work in stacks block action urls do not seem to work properly in a stack to reproduce create a stack place a form in the stack show the stack on a page try to submit the form please note that this needs to work on both situations when a stack is added manually to the page when a stack is displayed programmatically on the page stack getbyname display
0
18,084
12,751,396,854
IssuesEvent
2020-06-27 10:44:32
merely-useful/merely-useful.github.io
https://api.github.com/repos/merely-useful/merely-useful.github.io
closed
Spacing items in table of contents in PDF version
bug good first issue infrastructure
We have a lot of chapters and sections. When there are two digits' worth of each (e.g., Section 14.11), the number in the table of contents in the PDF version bumps up against the section title. Fix the LaTeX preamble so that this doesn't happen. ![Screen Shot 2019-05-02 at 6 24 51 AM](https://user-images.githubusercontent.com/911566/57069604-120fb880-6ca3-11e9-8e87-4bb1d4c8946f.png)
1.0
Spacing items in table of contents in PDF version - We have a lot of chapters and sections. When there are two digits' worth of each (e.g., Section 14.11), the number in the table of contents in the PDF version bumps up against the section title. Fix the LaTeX preamble so that this doesn't happen. ![Screen Shot 2019-05-02 at 6 24 51 AM](https://user-images.githubusercontent.com/911566/57069604-120fb880-6ca3-11e9-8e87-4bb1d4c8946f.png)
non_priority
spacing items in table of contents in pdf version we have a lot of chapters and sections when there are two digits worth of each e g section the number in the table of contents in the pdf version bumps up against the section title fix the latex preamble so that this doesn t happen
0
559,928
16,581,083,796
IssuesEvent
2021-05-31 11:56:52
grpc/grpc
https://api.github.com/repos/grpc/grpc
closed
Bidirectional streaming with python client and go server having issue
kind/bug lang/Python priority/P2
### What version of gRPC and what language are you using? v1.31 ### What operating system (Linux, Windows,...) and version? Ubuntu 18.04 5.4.0-47-generic ### What runtime / compiler are you using (e.g. python version or version of gcc) Python 3.7 and Go 1.15 ### What did you do? - I have created one simple bidirectional streaming RPC, and trying to stream data. - I have written server in Go 1.15 - I have written client in Python 3.7 - Whenever I start streaming from client sending request, Go server receives request, but also receives EoF from python client once client is finish sending request. - On Go server, I am using EoF to cancel RPC, and I think that is write way to do. Unless otherwise I am missing something. - Client written in Go, works fine as expected and it does not sent EoF once client is finish sending request. ### What did you expect to see? - I am expecting client behaviour should be across board. - May be I am wrong, then is there any text indicating how to terminate the RPC from server side? - If catching EoF is not write way to do it, then I would need to understand how to handle scenarios where the client actually wanted to close the connection. ### What did you see instead? - Client written in Go works fine, but client written in python does not work fine. ### Anything else we should know about your project / environment? - I tried to debug this issue with respect to python client library, and I see that EoF is coming from https://github.com/grpc/grpc/blob/4f0b8dfe56c955e18c1560d034518a494896d4de/src/python/grpcio/grpc/_channel.py#L245 - Why python and go client is behaving differently? May be one of is having BUG Python or Go(I am not sure which one).
1.0
Bidirectional streaming with python client and go server having issue - ### What version of gRPC and what language are you using? v1.31 ### What operating system (Linux, Windows,...) and version? Ubuntu 18.04 5.4.0-47-generic ### What runtime / compiler are you using (e.g. python version or version of gcc) Python 3.7 and Go 1.15 ### What did you do? - I have created one simple bidirectional streaming RPC, and trying to stream data. - I have written server in Go 1.15 - I have written client in Python 3.7 - Whenever I start streaming from client sending request, Go server receives request, but also receives EoF from python client once client is finish sending request. - On Go server, I am using EoF to cancel RPC, and I think that is write way to do. Unless otherwise I am missing something. - Client written in Go, works fine as expected and it does not sent EoF once client is finish sending request. ### What did you expect to see? - I am expecting client behaviour should be across board. - May be I am wrong, then is there any text indicating how to terminate the RPC from server side? - If catching EoF is not write way to do it, then I would need to understand how to handle scenarios where the client actually wanted to close the connection. ### What did you see instead? - Client written in Go works fine, but client written in python does not work fine. ### Anything else we should know about your project / environment? - I tried to debug this issue with respect to python client library, and I see that EoF is coming from https://github.com/grpc/grpc/blob/4f0b8dfe56c955e18c1560d034518a494896d4de/src/python/grpcio/grpc/_channel.py#L245 - Why python and go client is behaving differently? May be one of is having BUG Python or Go(I am not sure which one).
priority
bidirectional streaming with python client and go server having issue what version of grpc and what language are you using what operating system linux windows and version ubuntu generic what runtime compiler are you using e g python version or version of gcc python and go what did you do i have created one simple bidirectional streaming rpc and trying to stream data i have written server in go i have written client in python whenever i start streaming from client sending request go server receives request but also receives eof from python client once client is finish sending request on go server i am using eof to cancel rpc and i think that is write way to do unless otherwise i am missing something client written in go works fine as expected and it does not sent eof once client is finish sending request what did you expect to see i am expecting client behaviour should be across board may be i am wrong then is there any text indicating how to terminate the rpc from server side if catching eof is not write way to do it then i would need to understand how to handle scenarios where the client actually wanted to close the connection what did you see instead client written in go works fine but client written in python does not work fine anything else we should know about your project environment i tried to debug this issue with respect to python client library and i see that eof is coming from why python and go client is behaving differently may be one of is having bug python or go i am not sure which one
1
582,662
17,367,218,384
IssuesEvent
2021-07-30 08:59:55
gambitph/Stackable
https://api.github.com/repos/gambitph/Stackable
closed
divider reset options not working properly
[block] divider bug medium priority
- resetting divider width changes the value to 100% instead of the default 50% - divider disappears in editor when resetting height (it appears in the front end and is resetted properly) ![image](https://user-images.githubusercontent.com/50035760/69118071-09f75900-0acd-11ea-8dbc-873657fde985.png) ![image](https://user-images.githubusercontent.com/50035760/69118105-23000a00-0acd-11ea-901d-cdfd3be92d64.png)
1.0
divider reset options not working properly - - resetting divider width changes the value to 100% instead of the default 50% - divider disappears in editor when resetting height (it appears in the front end and is resetted properly) ![image](https://user-images.githubusercontent.com/50035760/69118071-09f75900-0acd-11ea-8dbc-873657fde985.png) ![image](https://user-images.githubusercontent.com/50035760/69118105-23000a00-0acd-11ea-901d-cdfd3be92d64.png)
priority
divider reset options not working properly resetting divider width changes the value to instead of the default divider disappears in editor when resetting height it appears in the front end and is resetted properly
1
127,222
5,026,412,673
IssuesEvent
2016-12-15 12:30:02
JuliaDocs/Documenter.jl
https://api.github.com/repos/JuliaDocs/Documenter.jl
closed
Travis build stalls on 0.5 when make.jl is run
Priority: High Type: Bug
Due to my package suddenly started failing on nightly I swapped to using 0.5 for the build (https://github.com/KristofferC/ContMechTensors.jl/commit/593ce54b36cf25e83ee8b32459b4dccb1d643797). However, the build now seems to stall https://travis-ci.org/KristofferC/ContMechTensors.jl/jobs/184179783#L200. Any help debugging this is appreciated.
1.0
Travis build stalls on 0.5 when make.jl is run - Due to my package suddenly started failing on nightly I swapped to using 0.5 for the build (https://github.com/KristofferC/ContMechTensors.jl/commit/593ce54b36cf25e83ee8b32459b4dccb1d643797). However, the build now seems to stall https://travis-ci.org/KristofferC/ContMechTensors.jl/jobs/184179783#L200. Any help debugging this is appreciated.
priority
travis build stalls on when make jl is run due to my package suddenly started failing on nightly i swapped to using for the build however the build now seems to stall any help debugging this is appreciated
1
70,771
9,440,803,487
IssuesEvent
2019-04-14 20:32:44
fsharp/FAKE
https://api.github.com/repos/fsharp/FAKE
closed
Install Paket as dotnet tool
documentation enhancement help wanted
Since the new [alfa of Paket](https://github.com/fsprojects/Paket/pull/3183), we can install it as dotnet global tool. I've made a little [sample script](https://github.com/nojaf/fable-docker/blob/remove-mono/sample/build.fsx) where I first install Paket and later use the existing module. ```fsharp Target.create "InstallPaket" (fun _ -> if not (File.exists paketExe) then DotNet.exec id "tool" "install --tool-path \".paket\" Paket --version 5.182.0-alpha001 --add-source https://api.nuget.org/v3/index.json" |> ignore else printfn "paket already installed" ) ``` When running `fake.ps1 Build` (or `fake.sh Build`) it adds paket, downloads dependencies and builds the code. This seems like a nice setup for a CI build. Could we benefit from something similar in the `Fake.DotNet.DotNet` or `Fake.Dotnet.Paket` module?
1.0
Install Paket as dotnet tool - Since the new [alfa of Paket](https://github.com/fsprojects/Paket/pull/3183), we can install it as dotnet global tool. I've made a little [sample script](https://github.com/nojaf/fable-docker/blob/remove-mono/sample/build.fsx) where I first install Paket and later use the existing module. ```fsharp Target.create "InstallPaket" (fun _ -> if not (File.exists paketExe) then DotNet.exec id "tool" "install --tool-path \".paket\" Paket --version 5.182.0-alpha001 --add-source https://api.nuget.org/v3/index.json" |> ignore else printfn "paket already installed" ) ``` When running `fake.ps1 Build` (or `fake.sh Build`) it adds paket, downloads dependencies and builds the code. This seems like a nice setup for a CI build. Could we benefit from something similar in the `Fake.DotNet.DotNet` or `Fake.Dotnet.Paket` module?
non_priority
install paket as dotnet tool since the new we can install it as dotnet global tool i ve made a little where i first install paket and later use the existing module fsharp target create installpaket fun if not file exists paketexe then dotnet exec id tool install tool path paket paket version add source ignore else printfn paket already installed when running fake build or fake sh build it adds paket downloads dependencies and builds the code this seems like a nice setup for a ci build could we benefit from something similar in the fake dotnet dotnet or fake dotnet paket module
0
128,428
18,048,395,511
IssuesEvent
2021-09-19 09:51:34
phildav06/Groupomania
https://api.github.com/repos/phildav06/Groupomania
opened
CVE-2021-37713 (High) detected in tar-6.1.0.tgz
security vulnerability
## CVE-2021-37713 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-6.1.0.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-6.1.0.tgz">https://registry.npmjs.org/tar/-/tar-6.1.0.tgz</a></p> <p>Path to dependency file: Groupomania/backend/package.json</p> <p>Path to vulnerable library: Groupomania/backend/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - bcrypt-5.0.1.tgz (Root Library) - node-pre-gyp-1.0.5.tgz - :x: **tar-6.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/phildav06/Groupomania/commit/b5dfa4dbb08d39b625f69bed42db0a7dad1bd26e">b5dfa4dbb08d39b625f69bed42db0a7dad1bd26e</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\path`. If the drive letter does not match the extraction target, for example `D:\extraction\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves. <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37713>CVE-2021-37713</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh">https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution: tar - 4.4.18, 5.0.10, 6.1.9</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-37713 (High) detected in tar-6.1.0.tgz - ## CVE-2021-37713 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-6.1.0.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-6.1.0.tgz">https://registry.npmjs.org/tar/-/tar-6.1.0.tgz</a></p> <p>Path to dependency file: Groupomania/backend/package.json</p> <p>Path to vulnerable library: Groupomania/backend/node_modules/tar/package.json</p> <p> Dependency Hierarchy: - bcrypt-5.0.1.tgz (Root Library) - node-pre-gyp-1.0.5.tgz - :x: **tar-6.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/phildav06/Groupomania/commit/b5dfa4dbb08d39b625f69bed42db0a7dad1bd26e">b5dfa4dbb08d39b625f69bed42db0a7dad1bd26e</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\path`. If the drive letter does not match the extraction target, for example `D:\extraction\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves. <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37713>CVE-2021-37713</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh">https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution: tar - 4.4.18, 5.0.10, 6.1.9</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tar tgz cve high severity vulnerability vulnerable library tar tgz tar for node library home page a href path to dependency file groupomania backend package json path to vulnerable library groupomania backend node modules tar package json dependency hierarchy bcrypt tgz root library node pre gyp tgz x tar tgz vulnerable library found in head commit a href found in base branch master vulnerability details the npm package tar aka node tar before versions and has an arbitrary file creation overwrite and arbitrary code execution vulnerability node tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted this is in part accomplished by sanitizing absolute paths of entries within the archive skipping archive entries that contain path portions and resolving the sanitized paths against the extraction target directory this logic was insufficient on windows systems when extracting tar files that contained a path that was not an absolute path but specified a drive letter different from the extraction target such as c some path if the drive letter does not match the extraction target for example d extraction dir then the result of path resolve extractiondirectory entrypath would resolve against the current working directory on the c drive rather than the extraction target directory additionally a portion of the path could occur immediately after the drive letter such as c foo and was not properly sanitized by the logic that checked for within the normalized and split portions of the path this only affects users of node tar on windows systems these issues were addressed in releases and the branch of node tar has been deprecated and did not receive patches for these issues if you are still using a release we recommend you update to a more recent version of node tar there is no reasonable way to work around this issue without performing the same path normalization procedures that node tar now does users are encouraged to upgrade to the latest patched versions of node tar rather than attempt to sanitize paths themselves publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tar step up your open source security game with whitesource
0
234,971
7,733,363,178
IssuesEvent
2018-05-26 10:44:14
tuskyapp/Tusky
https://api.github.com/repos/tuskyapp/Tusky
closed
Remaining characters are calculated wrongly
bug priority: high
Links in Mastodon statuses are only counted as 23 characters, no matter how long they are. Tusky ignores this, which means you have less characters in Tusky than on Mastodon web.
1.0
Remaining characters are calculated wrongly - Links in Mastodon statuses are only counted as 23 characters, no matter how long they are. Tusky ignores this, which means you have less characters in Tusky than on Mastodon web.
priority
remaining characters are calculated wrongly links in mastodon statuses are only counted as characters no matter how long they are tusky ignores this which means you have less characters in tusky than on mastodon web
1
670,084
22,669,291,346
IssuesEvent
2022-07-03 11:17:08
FAIRplus/FAIR_wizard
https://api.github.com/repos/FAIRplus/FAIR_wizard
opened
assessment page - DSM content - landing on page Level -1
priority:1 importance:3
TBD Level 0 is a baseline level and every project is at level 0 by default. This way, it doesn't make sense to start the assessment from Level 0. Howerver, the assessment team is designing a new tool for performing assessment. need to check with them
1.0
assessment page - DSM content - landing on page Level -1 - TBD Level 0 is a baseline level and every project is at level 0 by default. This way, it doesn't make sense to start the assessment from Level 0. Howerver, the assessment team is designing a new tool for performing assessment. need to check with them
priority
assessment page dsm content landing on page level tbd level is a baseline level and every project is at level by default this way it doesn t make sense to start the assessment from level howerver the assessment team is designing a new tool for performing assessment need to check with them
1
433,362
30,323,998,193
IssuesEvent
2023-07-10 21:44:02
ArcadeData/arcadedb-docs
https://api.github.com/repos/ArcadeData/arcadedb-docs
opened
Add example of usage for DbVisualizer tool
documentation
Now that we have the Compatible Tool section, it would be nice to add a quick guide on using DbVisualizer with ArcadeDB.
1.0
Add example of usage for DbVisualizer tool - Now that we have the Compatible Tool section, it would be nice to add a quick guide on using DbVisualizer with ArcadeDB.
non_priority
add example of usage for dbvisualizer tool now that we have the compatible tool section it would be nice to add a quick guide on using dbvisualizer with arcadedb
0
87,635
10,551,496,729
IssuesEvent
2019-10-03 13:27:44
sylabs/singularity
https://api.github.com/repos/sylabs/singularity
closed
test-plugin should probably do something when its called
Documentation PluginExample
## Version of Singularity: 3.2.0rc2 The `test-plugin` in the `examples/plugins` directory should probably do something when it is executed. Even if that something is just to print a message. Right now it just prints a `usage` statement, so I can't tell if its working by looking at the output. ``` $ singularity plugin list ENABLED NAME yes sylabs.io/test-plugin $ singularity test-cmd Usage: singularity [global options...] test-cmd [args ...] Run 'singularity test-cmd --help' for more detailed usage information. ```
1.0
test-plugin should probably do something when its called - ## Version of Singularity: 3.2.0rc2 The `test-plugin` in the `examples/plugins` directory should probably do something when it is executed. Even if that something is just to print a message. Right now it just prints a `usage` statement, so I can't tell if its working by looking at the output. ``` $ singularity plugin list ENABLED NAME yes sylabs.io/test-plugin $ singularity test-cmd Usage: singularity [global options...] test-cmd [args ...] Run 'singularity test-cmd --help' for more detailed usage information. ```
non_priority
test plugin should probably do something when its called version of singularity the test plugin in the examples plugins directory should probably do something when it is executed even if that something is just to print a message right now it just prints a usage statement so i can t tell if its working by looking at the output singularity plugin list enabled name yes sylabs io test plugin singularity test cmd usage singularity test cmd run singularity test cmd help for more detailed usage information
0
424,324
12,309,542,548
IssuesEvent
2020-05-12 09:07:42
our-city-app/mobicage-backend
https://api.github.com/repos/our-city-app/mobicage-backend
closed
Sharing services/profile via Facebook
priority_minor type_feature
Need to set `og:image` tag for the pages that are shared on facebook because in the iOS SDK we cannot set the content.imageURL anymore. It has to be server side using `og:image`. - `service.actionMenu.shareLinkUrl` (https://rogerth.at/M/-8LHYOB9.01?email&target=fbWall&from=phone) has to have `og:image` that points to `service.actionMenu.shareImageUrl` - Same for your own QR code when looking for FB friends. https://developers.facebook.com/docs/sharing/webmasters/images/
1.0
Sharing services/profile via Facebook - Need to set `og:image` tag for the pages that are shared on facebook because in the iOS SDK we cannot set the content.imageURL anymore. It has to be server side using `og:image`. - `service.actionMenu.shareLinkUrl` (https://rogerth.at/M/-8LHYOB9.01?email&target=fbWall&from=phone) has to have `og:image` that points to `service.actionMenu.shareImageUrl` - Same for your own QR code when looking for FB friends. https://developers.facebook.com/docs/sharing/webmasters/images/
priority
sharing services profile via facebook need to set og image tag for the pages that are shared on facebook because in the ios sdk we cannot set the content imageurl anymore it has to be server side using og image service actionmenu sharelinkurl has to have og image that points to service actionmenu shareimageurl same for your own qr code when looking for fb friends
1
543,998
15,888,488,379
IssuesEvent
2021-04-10 07:35:22
bryntum/support
https://api.github.com/repos/bryntum/support
closed
Enable yarn support for installing packages
angular bug high-priority ionic react resolved vue
`@bryntum/gantt` package can be installed via npm, but yarn throws error. ``` node 14.2.0 yarn 1.17.3 npm 6.14.4 ```
1.0
Enable yarn support for installing packages - `@bryntum/gantt` package can be installed via npm, but yarn throws error. ``` node 14.2.0 yarn 1.17.3 npm 6.14.4 ```
priority
enable yarn support for installing packages bryntum gantt package can be installed via npm but yarn throws error node yarn npm
1
221,469
7,388,804,182
IssuesEvent
2018-03-16 05:12:17
opensmc/get-connected-smc
https://api.github.com/repos/opensmc/get-connected-smc
reopened
Users Without Kids Eligible for WIC and Free/Reduced Price School Lunches
High Priority bug help wanted
If a user responds that they do not have children, the results screen still shows that they may be eligible for WIC and free/reduced price school lunches. Pregnant women with no other children are eligible for WIC, but users without children should not see free/reduced price school lunch. Can we change the logic for WIC and free/reduced price lunch to something like • Change logic for free/reduced price school lunches to number of kids > 0 • Change logic for WIC to kids 5 or under > 0 OR pregnant YES OR pregnant YES AND kids 5 or under > 0 Feedback from the End Hunger Task Force
1.0
Users Without Kids Eligible for WIC and Free/Reduced Price School Lunches - If a user responds that they do not have children, the results screen still shows that they may be eligible for WIC and free/reduced price school lunches. Pregnant women with no other children are eligible for WIC, but users without children should not see free/reduced price school lunch. Can we change the logic for WIC and free/reduced price lunch to something like • Change logic for free/reduced price school lunches to number of kids > 0 • Change logic for WIC to kids 5 or under > 0 OR pregnant YES OR pregnant YES AND kids 5 or under > 0 Feedback from the End Hunger Task Force
priority
users without kids eligible for wic and free reduced price school lunches if a user responds that they do not have children the results screen still shows that they may be eligible for wic and free reduced price school lunches pregnant women with no other children are eligible for wic but users without children should not see free reduced price school lunch can we change the logic for wic and free reduced price lunch to something like • change logic for free reduced price school lunches to number of kids • change logic for wic to kids or under or pregnant yes or pregnant yes and kids or under feedback from the end hunger task force
1
6,123
3,333,457,496
IssuesEvent
2015-11-12 01:30:10
bobombolo/realterrain
https://api.github.com/repos/bobombolo/realterrain
closed
config file
code refactor feature request
Suggestion to include a default settings file in the mod's main directory, this way, all default settings can be removed from the code, and the user can treat it as a 'master' or default setting file. If no settings file is found in the worldpath in load_settings, copy the default one, then read it.
1.0
config file - Suggestion to include a default settings file in the mod's main directory, this way, all default settings can be removed from the code, and the user can treat it as a 'master' or default setting file. If no settings file is found in the worldpath in load_settings, copy the default one, then read it.
non_priority
config file suggestion to include a default settings file in the mod s main directory this way all default settings can be removed from the code and the user can treat it as a master or default setting file if no settings file is found in the worldpath in load settings copy the default one then read it
0
638,078
20,712,387,198
IssuesEvent
2022-03-12 04:44:51
blackmichael/f1-pickem
https://api.github.com/repos/blackmichael/f1-pickem
opened
Add temporary email->userID lookup in submit-picks lambda
high priority backend
## Description User auth is a lot of work. Gather emails, map them to static user IDs, reject unknown emails.
1.0
Add temporary email->userID lookup in submit-picks lambda - ## Description User auth is a lot of work. Gather emails, map them to static user IDs, reject unknown emails.
priority
add temporary email userid lookup in submit picks lambda description user auth is a lot of work gather emails map them to static user ids reject unknown emails
1
728,716
25,089,468,481
IssuesEvent
2022-11-08 04:17:20
openmsupply/mobile
https://api.github.com/repos/openmsupply/mobile
closed
React-native failed to build
Priority: immediate Bug: development Status: In PR Solution: Agreed
## Describe the bug All of the sudden from today react-native failed to build our mobile app ``` yarn run v1.22.19 $ react-native run-android info Running jetifier to migrate libraries to AndroidX. You can disable it using "--no-jetifier" flag. Jetifier found 1423 file(s) to forward-jetify. Using 10 workers... info JS server already running. info Installing the app... > Configure project :app WARNING: Configuration 'compile' is obsolete and has been replaced with 'implementation' and 'api'. It will be removed in version 5.0 of the Android Gradle plugin. For more information, see http://d.android.com/r/tools/update-dependency-configurations.html. [Bugsnag] "bugsnag-react-native.gradle" should not applied manually. Install the Bugsnag Android Gradle Plugin and remove this from your Gradle file. > Configure project :realm > Task :app:generatePackageList > Task :app:preBuild > Task :app:preDebugBuild > Task :bugsnag_react-native:preBuild UP-TO-DATE > Task :bugsnag_react-native:preDebugBuild UP-TO-DATE > Task :bugsnag_react-native:compileDebugAidl NO-SOURCE > Task :react-native-async-storage_async-storage:preBuild UP-TO-DATE > Task :react-native-async-storage_async-storage:preDebugBuild UP-TO-DATE > Task :react-native-async-storage_async-storage:compileDebugAidl NO-SOURCE > Task :react-native-ble-plx:preBuild UP-TO-DATE > Task :react-native-ble-plx:preDebugBuild UP-TO-DATE > Task :react-native-ble-plx:compileDebugAidl NO-SOURCE > Task :react-native-bluetooth-status:preBuild UP-TO-DATE > Task :react-native-bluetooth-status:preDebugBuild UP-TO-DATE > Task :react-native-bluetooth-status:compileDebugAidl NO-SOURCE > Task :react-native-camera:preBuild UP-TO-DATE > Task :react-native-camera:preGeneralDebugBuild UP-TO-DATE > Task :react-native-camera:compileGeneralDebugAidl NO-SOURCE > Task :react-native-community_checkbox:preBuild UP-TO-DATE > Task :react-native-community_checkbox:preDebugBuild UP-TO-DATE > Task :react-native-community_checkbox:compileDebugAidl NO-SOURCE > Task :react-native-community_datetimepicker:preBuild UP-TO-DATE > Task :react-native-community_datetimepicker:preDebugBuild UP-TO-DATE > Task :react-native-community_datetimepicker:compileDebugAidl NO-SOURCE > Task :react-native-community_masked-view:preBuild UP-TO-DATE > Task :react-native-community_masked-view:preDebugBuild UP-TO-DATE > Task :react-native-community_masked-view:compileDebugAidl NO-SOURCE > Task :react-native-community_picker:preBuild UP-TO-DATE > Task :react-native-community_picker:preDebugBuild UP-TO-DATE > Task :react-native-community_picker:compileDebugAidl NO-SOURCE > Task :react-native-community_slider:preBuild UP-TO-DATE > Task :react-native-community_slider:preDebugBuild UP-TO-DATE > Task :react-native-community_slider:compileDebugAidl NO-SOURCE > Task :react-native-device-info:preBuild UP-TO-DATE > Task :react-native-device-info:preDebugBuild UP-TO-DATE > Task :react-native-device-info:compileDebugAidl NO-SOURCE > Task :react-native-document-picker:preBuild UP-TO-DATE > Task :react-native-document-picker:preDebugBuild UP-TO-DATE > Task :react-native-document-picker:compileDebugAidl NO-SOURCE > Task :react-native-fs:preBuild UP-TO-DATE > Task :react-native-fs:preDebugBuild UP-TO-DATE > Task :react-native-fs:compileDebugAidl NO-SOURCE > Task :react-native-gesture-handler:preBuild UP-TO-DATE > Task :react-native-gesture-handler:preDebugBuild UP-TO-DATE > Task :react-native-gesture-handler:compileDebugAidl NO-SOURCE > Task :react-native-haptic-feedback:preBuild UP-TO-DATE > Task :react-native-haptic-feedback:preDebugBuild UP-TO-DATE > Task :react-native-haptic-feedback:compileDebugAidl NO-SOURCE > Task :react-native-localization:preBuild UP-TO-DATE > Task :react-native-localization:preDebugBuild UP-TO-DATE > Task :react-native-localization:compileDebugAidl NO-SOURCE > Task :react-native-mail:preBuild UP-TO-DATE > Task :react-native-mail:preDebugBuild UP-TO-DATE > Task :react-native-mail:compileDebugAidl NO-SOURCE > Task :react-native-permissions:preBuild UP-TO-DATE > Task :react-native-permissions:preDebugBuild UP-TO-DATE > Task :react-native-permissions:compileDebugAidl NO-SOURCE > Task :react-native-restart:preBuild UP-TO-DATE > Task :react-native-restart:preDebugBuild UP-TO-DATE > Task :react-native-restart:compileDebugAidl NO-SOURCE > Task :react-native-safe-area-context:preBuild UP-TO-DATE > Task :react-native-safe-area-context:preDebugBuild UP-TO-DATE > Task :react-native-safe-area-context:compileDebugAidl NO-SOURCE > Task :react-native-screens:preBuild UP-TO-DATE > Task :react-native-screens:preDebugBuild UP-TO-DATE > Task :react-native-screens:compileDebugAidl NO-SOURCE > Task :react-native-svg:preBuild UP-TO-DATE > Task :react-native-svg:preDebugBuild UP-TO-DATE > Task :react-native-svg:compileDebugAidl NO-SOURCE > Task :react-native-system-setting:preBuild UP-TO-DATE > Task :react-native-system-setting:preDebugBuild UP-TO-DATE > Task :react-native-system-setting:compileDebugAidl NO-SOURCE > Task :react-native-vector-icons:preBuild UP-TO-DATE > Task :react-native-vector-icons:preDebugBuild UP-TO-DATE > Task :react-native-vector-icons:compileDebugAidl NO-SOURCE > Task :realm:send > Task :realm:preBuild > Task :realm:preDebugBuild > Task :realm:compileDebugAidl NO-SOURCE > Task :app:compileDebugAidl NO-SOURCE > Task :bugsnag_react-native:packageDebugRenderscript NO-SOURCE > Task :react-native-async-storage_async-storage:packageDebugRenderscript NO-SOURCE > Task :react-native-ble-plx:packageDebugRenderscript NO-SOURCE > Task :react-native-bluetooth-status:packageDebugRenderscript NO-SOURCE > Task :react-native-camera:packageGeneralDebugRenderscript NO-SOURCE > Task :react-native-community_checkbox:packageDebugRenderscript NO-SOURCE > Task :react-native-community_datetimepicker:packageDebugRenderscript NO-SOURCE > Task :react-native-community_masked-view:packageDebugRenderscript NO-SOURCE > Task :react-native-community_picker:packageDebugRenderscript NO-SOURCE > Task :react-native-community_slider:packageDebugRenderscript NO-SOURCE > Task :react-native-device-info:packageDebugRenderscript NO-SOURCE > Task :react-native-document-picker:packageDebugRenderscript NO-SOURCE > Task :react-native-fs:packageDebugRenderscript NO-SOURCE > Task :react-native-gesture-handler:packageDebugRenderscript NO-SOURCE > Task :react-native-haptic-feedback:packageDebugRenderscript NO-SOURCE > Task :react-native-localization:packageDebugRenderscript NO-SOURCE > Task :react-native-mail:packageDebugRenderscript NO-SOURCE > Task :react-native-permissions:packageDebugRenderscript NO-SOURCE > Task :react-native-restart:packageDebugRenderscript NO-SOURCE > Task :react-native-safe-area-context:packageDebugRenderscript NO-SOURCE > Task :react-native-screens:packageDebugRenderscript NO-SOURCE > Task :react-native-svg:packageDebugRenderscript NO-SOURCE > Task :react-native-system-setting:packageDebugRenderscript NO-SOURCE > Task :react-native-vector-icons:packageDebugRenderscript NO-SOURCE > Task :realm:packageDebugRenderscript NO-SOURCE > Task :app:compileDebugRenderscript NO-SOURCE > Task :app:generateDebugBuildConfig UP-TO-DATE > Task :app:javaPreCompileDebug UP-TO-DATE > Task :bugsnag_react-native:writeDebugAarMetadata UP-TO-DATE > Task :react-native-async-storage_async-storage:writeDebugAarMetadata UP-TO-DATE > Task :react-native-ble-plx:writeDebugAarMetadata UP-TO-DATE > Task :react-native-bluetooth-status:writeDebugAarMetadata UP-TO-DATE > Task :react-native-camera:writeGeneralDebugAarMetadata UP-TO-DATE > Task :react-native-community_checkbox:writeDebugAarMetadata UP-TO-DATE > Task :react-native-community_datetimepicker:writeDebugAarMetadata UP-TO-DATE > Task :react-native-community_masked-view:writeDebugAarMetadata UP-TO-DATE > Task :react-native-community_picker:writeDebugAarMetadata UP-TO-DATE > Task :react-native-community_slider:writeDebugAarMetadata UP-TO-DATE > Task :react-native-device-info:writeDebugAarMetadata UP-TO-DATE > Task :react-native-document-picker:writeDebugAarMetadata UP-TO-DATE > Task :react-native-fs:writeDebugAarMetadata UP-TO-DATE > Task :react-native-gesture-handler:writeDebugAarMetadata UP-TO-DATE > Task :react-native-haptic-feedback:writeDebugAarMetadata UP-TO-DATE > Task :react-native-localization:writeDebugAarMetadata UP-TO-DATE > Task :react-native-mail:writeDebugAarMetadata UP-TO-DATE > Task :react-native-permissions:writeDebugAarMetadata UP-TO-DATE > Task :react-native-restart:writeDebugAarMetadata UP-TO-DATE > Task :react-native-safe-area-context:writeDebugAarMetadata UP-TO-DATE > Task :react-native-screens:writeDebugAarMetadata UP-TO-DATE > Task :react-native-svg:writeDebugAarMetadata UP-TO-DATE > Task :react-native-system-setting:writeDebugAarMetadata UP-TO-DATE > Task :react-native-vector-icons:writeDebugAarMetadata UP-TO-DATE > Task :realm:writeDebugAarMetadata UP-TO-DATE > Task :app:bundleDebugJsAndAssets SKIPPED > Task :app:checkDebugAarMetadata FAILED > Task :app:mergeDebugShaders UP-TO-DATE Deprecated Gradle features were used in this build, making it incompatible with Gradle 7.0. Use '--warning-mode all' to show the individual deprecation warnings. See https://docs.gradle.org/6.7/userguide/command_line_interface.html#sec:command_line_warnings 31 actionable tasks: 3 executed, 28 up-to-date Warning: Mapping new ns http://schemas.android.com/repository/android/common/02 to old ns http://schemas.android.com/repository/android/common/01 Warning: Mapping new ns http://schemas.android.com/repository/android/generic/02 to old ns http://schemas.android.com/repository/android/generic/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/addon2/02 to old ns http://schemas.android.com/sdk/android/repo/addon2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/addon2/03 to old ns http://schemas.android.com/sdk/android/repo/addon2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/repository2/02 to old ns http://schemas.android.com/sdk/android/repo/repository2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/repository2/03 to old ns http://schemas.android.com/sdk/android/repo/repository2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/sys-img2/03 to old ns http://schemas.android.com/sdk/android/repo/sys-img2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/sys-img2/02 to old ns http://schemas.android.com/sdk/android/repo/sys-img2/01 FAILURE: Build failed with an exception. * What went wrong: Execution failed for task ':app:checkDebugAarMetadata'. > Multiple task action failures occurred: > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.appcompat:appcompat:1.4.1. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/3aeebd481c4b979f4aaf1422ab700cb2/appcompat-1.4.1/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.appcompat:appcompat-resources:1.4.1. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/5037444d0e4e7ecd374e14c9cde1a9e9/jetified-appcompat-resources-1.4.1/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.emoji2:emoji2-views-helper:1.0.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/42e939cb6ff04968d17f51f220845a50/jetified-emoji2-views-helper-1.0.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.emoji2:emoji2:1.0.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/6d54bbfebc644b955342f5222212631f/jetified-emoji2-1.0.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.lifecycle:lifecycle-process:2.4.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/b4f70e2aa5cce10e50e20d9b8e994481/jetified-lifecycle-process-2.4.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.tracing:tracing:1.1.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/87def6e2f368a548bd627f1e462ca7d3/jetified-tracing-1.1.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.core:core:1.7.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/e596bd84a87a4cbdcf9d545f7eacbd1e/core-1.7.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.lifecycle:lifecycle-runtime:2.4.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/7e88b296a48384d725962d71d07ec64e/lifecycle-runtime-2.4.0/META-INF/com/android/build/gradle/aar-metadata.properties. * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 8s error Failed to install the app. Make sure you have the Android development environment set up: https://reactnative.dev/docs/environment-setup. Error: Command failed: ./gradlew app:installDebug -PreactNativeDevServerPort=8081 Warning: Mapping new ns http://schemas.android.com/repository/android/common/02 to old ns http://schemas.android.com/repository/android/common/01 Warning: Mapping new ns http://schemas.android.com/repository/android/generic/02 to old ns http://schemas.android.com/repository/android/generic/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/addon2/02 to old ns http://schemas.android.com/sdk/android/repo/addon2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/addon2/03 to old ns http://schemas.android.com/sdk/android/repo/addon2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/repository2/02 to old ns http://schemas.android.com/sdk/android/repo/repository2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/repository2/03 to old ns http://schemas.android.com/sdk/android/repo/repository2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/sys-img2/03 to old ns http://schemas.android.com/sdk/android/repo/sys-img2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/sys-img2/02 to old ns http://schemas.android.com/sdk/android/repo/sys-img2/01 FAILURE: Build failed with an exception. * What went wrong: Execution failed for task ':app:checkDebugAarMetadata'. > Multiple task action failures occurred: > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.appcompat:appcompat:1.4.1. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/3aeebd481c4b979f4aaf1422ab700cb2/appcompat-1.4.1/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.appcompat:appcompat-resources:1.4.1. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/5037444d0e4e7ecd374e14c9cde1a9e9/jetified-appcompat-resources-1.4.1/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.emoji2:emoji2-views-helper:1.0.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/42e939cb6ff04968d17f51f220845a50/jetified-emoji2-views-helper-1.0.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.emoji2:emoji2:1.0.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/6d54bbfebc644b955342f5222212631f/jetified-emoji2-1.0.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.lifecycle:lifecycle-process:2.4.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/b4f70e2aa5cce10e50e20d9b8e994481/jetified-lifecycle-process-2.4.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.tracing:tracing:1.1.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/87def6e2f368a548bd627f1e462ca7d3/jetified-tracing-1.1.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.core:core:1.7.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/e596bd84a87a4cbdcf9d545f7eacbd1e/core-1.7.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.lifecycle:lifecycle-runtime:2.4.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/7e88b296a48384d725962d71d07ec64e/lifecycle-runtime-2.4.0/META-INF/com/android/build/gradle/aar-metadata.properties. * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 8s at makeError (/Users/sussol/Documents/Projects/mobile/node_modules/execa/index.js:174:9) at /Users/sussol/Documents/Projects/mobile/node_modules/execa/index.js:278:16 at processTicksAndRejections (internal/process/task_queues.js:97:5) at async runOnAllDevices (/Users/sussol/Documents/Projects/mobile/node_modules/@react-native-community/cli-platform-android/build/commands/runAndroid/runOnAllDevices.js:94:5) at async Command.handleAction (/Users/sussol/Documents/Projects/mobile/node_modules/@react-native-community/cli/build/index.js:186:9) info Run CLI with --verbose flag for more details. error Command failed with exit code 1. info Visit https://yarnpkg.com/en/docs/cli/run for documentation about this command. ``` ### To reproduce Steps to reproduce the behaviour: 1. Try to build the application to run in development mode 2. Open a terminal and do `yarn start` 3. Open another terminal and do `yarn android` ### Expected behaviour - React native should build properly without error ### Proposed Solution Android studio is trying to enforce version 31 of development kit to our app. However we cannot use version 31 as it is not supported by realm. Update build settings. ### Version and device info - App version: v8.6.1 - Tablet model: - OS version: ### Additional context Add any other context about the problem here.
1.0
React-native failed to build - ## Describe the bug All of the sudden from today react-native failed to build our mobile app ``` yarn run v1.22.19 $ react-native run-android info Running jetifier to migrate libraries to AndroidX. You can disable it using "--no-jetifier" flag. Jetifier found 1423 file(s) to forward-jetify. Using 10 workers... info JS server already running. info Installing the app... > Configure project :app WARNING: Configuration 'compile' is obsolete and has been replaced with 'implementation' and 'api'. It will be removed in version 5.0 of the Android Gradle plugin. For more information, see http://d.android.com/r/tools/update-dependency-configurations.html. [Bugsnag] "bugsnag-react-native.gradle" should not applied manually. Install the Bugsnag Android Gradle Plugin and remove this from your Gradle file. > Configure project :realm > Task :app:generatePackageList > Task :app:preBuild > Task :app:preDebugBuild > Task :bugsnag_react-native:preBuild UP-TO-DATE > Task :bugsnag_react-native:preDebugBuild UP-TO-DATE > Task :bugsnag_react-native:compileDebugAidl NO-SOURCE > Task :react-native-async-storage_async-storage:preBuild UP-TO-DATE > Task :react-native-async-storage_async-storage:preDebugBuild UP-TO-DATE > Task :react-native-async-storage_async-storage:compileDebugAidl NO-SOURCE > Task :react-native-ble-plx:preBuild UP-TO-DATE > Task :react-native-ble-plx:preDebugBuild UP-TO-DATE > Task :react-native-ble-plx:compileDebugAidl NO-SOURCE > Task :react-native-bluetooth-status:preBuild UP-TO-DATE > Task :react-native-bluetooth-status:preDebugBuild UP-TO-DATE > Task :react-native-bluetooth-status:compileDebugAidl NO-SOURCE > Task :react-native-camera:preBuild UP-TO-DATE > Task :react-native-camera:preGeneralDebugBuild UP-TO-DATE > Task :react-native-camera:compileGeneralDebugAidl NO-SOURCE > Task :react-native-community_checkbox:preBuild UP-TO-DATE > Task :react-native-community_checkbox:preDebugBuild UP-TO-DATE > Task :react-native-community_checkbox:compileDebugAidl NO-SOURCE > Task :react-native-community_datetimepicker:preBuild UP-TO-DATE > Task :react-native-community_datetimepicker:preDebugBuild UP-TO-DATE > Task :react-native-community_datetimepicker:compileDebugAidl NO-SOURCE > Task :react-native-community_masked-view:preBuild UP-TO-DATE > Task :react-native-community_masked-view:preDebugBuild UP-TO-DATE > Task :react-native-community_masked-view:compileDebugAidl NO-SOURCE > Task :react-native-community_picker:preBuild UP-TO-DATE > Task :react-native-community_picker:preDebugBuild UP-TO-DATE > Task :react-native-community_picker:compileDebugAidl NO-SOURCE > Task :react-native-community_slider:preBuild UP-TO-DATE > Task :react-native-community_slider:preDebugBuild UP-TO-DATE > Task :react-native-community_slider:compileDebugAidl NO-SOURCE > Task :react-native-device-info:preBuild UP-TO-DATE > Task :react-native-device-info:preDebugBuild UP-TO-DATE > Task :react-native-device-info:compileDebugAidl NO-SOURCE > Task :react-native-document-picker:preBuild UP-TO-DATE > Task :react-native-document-picker:preDebugBuild UP-TO-DATE > Task :react-native-document-picker:compileDebugAidl NO-SOURCE > Task :react-native-fs:preBuild UP-TO-DATE > Task :react-native-fs:preDebugBuild UP-TO-DATE > Task :react-native-fs:compileDebugAidl NO-SOURCE > Task :react-native-gesture-handler:preBuild UP-TO-DATE > Task :react-native-gesture-handler:preDebugBuild UP-TO-DATE > Task :react-native-gesture-handler:compileDebugAidl NO-SOURCE > Task :react-native-haptic-feedback:preBuild UP-TO-DATE > Task :react-native-haptic-feedback:preDebugBuild UP-TO-DATE > Task :react-native-haptic-feedback:compileDebugAidl NO-SOURCE > Task :react-native-localization:preBuild UP-TO-DATE > Task :react-native-localization:preDebugBuild UP-TO-DATE > Task :react-native-localization:compileDebugAidl NO-SOURCE > Task :react-native-mail:preBuild UP-TO-DATE > Task :react-native-mail:preDebugBuild UP-TO-DATE > Task :react-native-mail:compileDebugAidl NO-SOURCE > Task :react-native-permissions:preBuild UP-TO-DATE > Task :react-native-permissions:preDebugBuild UP-TO-DATE > Task :react-native-permissions:compileDebugAidl NO-SOURCE > Task :react-native-restart:preBuild UP-TO-DATE > Task :react-native-restart:preDebugBuild UP-TO-DATE > Task :react-native-restart:compileDebugAidl NO-SOURCE > Task :react-native-safe-area-context:preBuild UP-TO-DATE > Task :react-native-safe-area-context:preDebugBuild UP-TO-DATE > Task :react-native-safe-area-context:compileDebugAidl NO-SOURCE > Task :react-native-screens:preBuild UP-TO-DATE > Task :react-native-screens:preDebugBuild UP-TO-DATE > Task :react-native-screens:compileDebugAidl NO-SOURCE > Task :react-native-svg:preBuild UP-TO-DATE > Task :react-native-svg:preDebugBuild UP-TO-DATE > Task :react-native-svg:compileDebugAidl NO-SOURCE > Task :react-native-system-setting:preBuild UP-TO-DATE > Task :react-native-system-setting:preDebugBuild UP-TO-DATE > Task :react-native-system-setting:compileDebugAidl NO-SOURCE > Task :react-native-vector-icons:preBuild UP-TO-DATE > Task :react-native-vector-icons:preDebugBuild UP-TO-DATE > Task :react-native-vector-icons:compileDebugAidl NO-SOURCE > Task :realm:send > Task :realm:preBuild > Task :realm:preDebugBuild > Task :realm:compileDebugAidl NO-SOURCE > Task :app:compileDebugAidl NO-SOURCE > Task :bugsnag_react-native:packageDebugRenderscript NO-SOURCE > Task :react-native-async-storage_async-storage:packageDebugRenderscript NO-SOURCE > Task :react-native-ble-plx:packageDebugRenderscript NO-SOURCE > Task :react-native-bluetooth-status:packageDebugRenderscript NO-SOURCE > Task :react-native-camera:packageGeneralDebugRenderscript NO-SOURCE > Task :react-native-community_checkbox:packageDebugRenderscript NO-SOURCE > Task :react-native-community_datetimepicker:packageDebugRenderscript NO-SOURCE > Task :react-native-community_masked-view:packageDebugRenderscript NO-SOURCE > Task :react-native-community_picker:packageDebugRenderscript NO-SOURCE > Task :react-native-community_slider:packageDebugRenderscript NO-SOURCE > Task :react-native-device-info:packageDebugRenderscript NO-SOURCE > Task :react-native-document-picker:packageDebugRenderscript NO-SOURCE > Task :react-native-fs:packageDebugRenderscript NO-SOURCE > Task :react-native-gesture-handler:packageDebugRenderscript NO-SOURCE > Task :react-native-haptic-feedback:packageDebugRenderscript NO-SOURCE > Task :react-native-localization:packageDebugRenderscript NO-SOURCE > Task :react-native-mail:packageDebugRenderscript NO-SOURCE > Task :react-native-permissions:packageDebugRenderscript NO-SOURCE > Task :react-native-restart:packageDebugRenderscript NO-SOURCE > Task :react-native-safe-area-context:packageDebugRenderscript NO-SOURCE > Task :react-native-screens:packageDebugRenderscript NO-SOURCE > Task :react-native-svg:packageDebugRenderscript NO-SOURCE > Task :react-native-system-setting:packageDebugRenderscript NO-SOURCE > Task :react-native-vector-icons:packageDebugRenderscript NO-SOURCE > Task :realm:packageDebugRenderscript NO-SOURCE > Task :app:compileDebugRenderscript NO-SOURCE > Task :app:generateDebugBuildConfig UP-TO-DATE > Task :app:javaPreCompileDebug UP-TO-DATE > Task :bugsnag_react-native:writeDebugAarMetadata UP-TO-DATE > Task :react-native-async-storage_async-storage:writeDebugAarMetadata UP-TO-DATE > Task :react-native-ble-plx:writeDebugAarMetadata UP-TO-DATE > Task :react-native-bluetooth-status:writeDebugAarMetadata UP-TO-DATE > Task :react-native-camera:writeGeneralDebugAarMetadata UP-TO-DATE > Task :react-native-community_checkbox:writeDebugAarMetadata UP-TO-DATE > Task :react-native-community_datetimepicker:writeDebugAarMetadata UP-TO-DATE > Task :react-native-community_masked-view:writeDebugAarMetadata UP-TO-DATE > Task :react-native-community_picker:writeDebugAarMetadata UP-TO-DATE > Task :react-native-community_slider:writeDebugAarMetadata UP-TO-DATE > Task :react-native-device-info:writeDebugAarMetadata UP-TO-DATE > Task :react-native-document-picker:writeDebugAarMetadata UP-TO-DATE > Task :react-native-fs:writeDebugAarMetadata UP-TO-DATE > Task :react-native-gesture-handler:writeDebugAarMetadata UP-TO-DATE > Task :react-native-haptic-feedback:writeDebugAarMetadata UP-TO-DATE > Task :react-native-localization:writeDebugAarMetadata UP-TO-DATE > Task :react-native-mail:writeDebugAarMetadata UP-TO-DATE > Task :react-native-permissions:writeDebugAarMetadata UP-TO-DATE > Task :react-native-restart:writeDebugAarMetadata UP-TO-DATE > Task :react-native-safe-area-context:writeDebugAarMetadata UP-TO-DATE > Task :react-native-screens:writeDebugAarMetadata UP-TO-DATE > Task :react-native-svg:writeDebugAarMetadata UP-TO-DATE > Task :react-native-system-setting:writeDebugAarMetadata UP-TO-DATE > Task :react-native-vector-icons:writeDebugAarMetadata UP-TO-DATE > Task :realm:writeDebugAarMetadata UP-TO-DATE > Task :app:bundleDebugJsAndAssets SKIPPED > Task :app:checkDebugAarMetadata FAILED > Task :app:mergeDebugShaders UP-TO-DATE Deprecated Gradle features were used in this build, making it incompatible with Gradle 7.0. Use '--warning-mode all' to show the individual deprecation warnings. See https://docs.gradle.org/6.7/userguide/command_line_interface.html#sec:command_line_warnings 31 actionable tasks: 3 executed, 28 up-to-date Warning: Mapping new ns http://schemas.android.com/repository/android/common/02 to old ns http://schemas.android.com/repository/android/common/01 Warning: Mapping new ns http://schemas.android.com/repository/android/generic/02 to old ns http://schemas.android.com/repository/android/generic/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/addon2/02 to old ns http://schemas.android.com/sdk/android/repo/addon2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/addon2/03 to old ns http://schemas.android.com/sdk/android/repo/addon2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/repository2/02 to old ns http://schemas.android.com/sdk/android/repo/repository2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/repository2/03 to old ns http://schemas.android.com/sdk/android/repo/repository2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/sys-img2/03 to old ns http://schemas.android.com/sdk/android/repo/sys-img2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/sys-img2/02 to old ns http://schemas.android.com/sdk/android/repo/sys-img2/01 FAILURE: Build failed with an exception. * What went wrong: Execution failed for task ':app:checkDebugAarMetadata'. > Multiple task action failures occurred: > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.appcompat:appcompat:1.4.1. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/3aeebd481c4b979f4aaf1422ab700cb2/appcompat-1.4.1/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.appcompat:appcompat-resources:1.4.1. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/5037444d0e4e7ecd374e14c9cde1a9e9/jetified-appcompat-resources-1.4.1/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.emoji2:emoji2-views-helper:1.0.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/42e939cb6ff04968d17f51f220845a50/jetified-emoji2-views-helper-1.0.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.emoji2:emoji2:1.0.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/6d54bbfebc644b955342f5222212631f/jetified-emoji2-1.0.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.lifecycle:lifecycle-process:2.4.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/b4f70e2aa5cce10e50e20d9b8e994481/jetified-lifecycle-process-2.4.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.tracing:tracing:1.1.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/87def6e2f368a548bd627f1e462ca7d3/jetified-tracing-1.1.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.core:core:1.7.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/e596bd84a87a4cbdcf9d545f7eacbd1e/core-1.7.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.lifecycle:lifecycle-runtime:2.4.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/7e88b296a48384d725962d71d07ec64e/lifecycle-runtime-2.4.0/META-INF/com/android/build/gradle/aar-metadata.properties. * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 8s error Failed to install the app. Make sure you have the Android development environment set up: https://reactnative.dev/docs/environment-setup. Error: Command failed: ./gradlew app:installDebug -PreactNativeDevServerPort=8081 Warning: Mapping new ns http://schemas.android.com/repository/android/common/02 to old ns http://schemas.android.com/repository/android/common/01 Warning: Mapping new ns http://schemas.android.com/repository/android/generic/02 to old ns http://schemas.android.com/repository/android/generic/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/addon2/02 to old ns http://schemas.android.com/sdk/android/repo/addon2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/addon2/03 to old ns http://schemas.android.com/sdk/android/repo/addon2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/repository2/02 to old ns http://schemas.android.com/sdk/android/repo/repository2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/repository2/03 to old ns http://schemas.android.com/sdk/android/repo/repository2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/sys-img2/03 to old ns http://schemas.android.com/sdk/android/repo/sys-img2/01 Warning: Mapping new ns http://schemas.android.com/sdk/android/repo/sys-img2/02 to old ns http://schemas.android.com/sdk/android/repo/sys-img2/01 FAILURE: Build failed with an exception. * What went wrong: Execution failed for task ':app:checkDebugAarMetadata'. > Multiple task action failures occurred: > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.appcompat:appcompat:1.4.1. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/3aeebd481c4b979f4aaf1422ab700cb2/appcompat-1.4.1/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.appcompat:appcompat-resources:1.4.1. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/5037444d0e4e7ecd374e14c9cde1a9e9/jetified-appcompat-resources-1.4.1/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.emoji2:emoji2-views-helper:1.0.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/42e939cb6ff04968d17f51f220845a50/jetified-emoji2-views-helper-1.0.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.emoji2:emoji2:1.0.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/6d54bbfebc644b955342f5222212631f/jetified-emoji2-1.0.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.lifecycle:lifecycle-process:2.4.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/b4f70e2aa5cce10e50e20d9b8e994481/jetified-lifecycle-process-2.4.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.tracing:tracing:1.1.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/87def6e2f368a548bd627f1e462ca7d3/jetified-tracing-1.1.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.core:core:1.7.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/e596bd84a87a4cbdcf9d545f7eacbd1e/core-1.7.0/META-INF/com/android/build/gradle/aar-metadata.properties. > A failure occurred while executing com.android.build.gradle.internal.tasks.CheckAarMetadataWorkAction > The minCompileSdk (31) specified in a dependency's AAR metadata (META-INF/com/android/build/gradle/aar-metadata.properties) is greater than this module's compileSdkVersion (android-29). Dependency: androidx.lifecycle:lifecycle-runtime:2.4.0. AAR metadata file: /Users/sussol/.gradle/caches/transforms-2/files-2.1/7e88b296a48384d725962d71d07ec64e/lifecycle-runtime-2.4.0/META-INF/com/android/build/gradle/aar-metadata.properties. * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 8s at makeError (/Users/sussol/Documents/Projects/mobile/node_modules/execa/index.js:174:9) at /Users/sussol/Documents/Projects/mobile/node_modules/execa/index.js:278:16 at processTicksAndRejections (internal/process/task_queues.js:97:5) at async runOnAllDevices (/Users/sussol/Documents/Projects/mobile/node_modules/@react-native-community/cli-platform-android/build/commands/runAndroid/runOnAllDevices.js:94:5) at async Command.handleAction (/Users/sussol/Documents/Projects/mobile/node_modules/@react-native-community/cli/build/index.js:186:9) info Run CLI with --verbose flag for more details. error Command failed with exit code 1. info Visit https://yarnpkg.com/en/docs/cli/run for documentation about this command. ``` ### To reproduce Steps to reproduce the behaviour: 1. Try to build the application to run in development mode 2. Open a terminal and do `yarn start` 3. Open another terminal and do `yarn android` ### Expected behaviour - React native should build properly without error ### Proposed Solution Android studio is trying to enforce version 31 of development kit to our app. However we cannot use version 31 as it is not supported by realm. Update build settings. ### Version and device info - App version: v8.6.1 - Tablet model: - OS version: ### Additional context Add any other context about the problem here.
priority
react native failed to build describe the bug all of the sudden from today react native failed to build our mobile app yarn run react native run android info running jetifier to migrate libraries to androidx you can disable it using no jetifier flag jetifier found file s to forward jetify using workers info js server already running info installing the app configure project app warning configuration compile is obsolete and has been replaced with implementation and api it will be removed in version of the android gradle plugin for more information see bugsnag react native gradle should not applied manually install the bugsnag android gradle plugin and remove this from your gradle file configure project realm task app generatepackagelist task app prebuild task app predebugbuild task bugsnag react native prebuild up to date task bugsnag react native predebugbuild up to date task bugsnag react native compiledebugaidl no source task react native async storage async storage prebuild up to date task react native async storage async storage predebugbuild up to date task react native async storage async storage compiledebugaidl no source task react native ble plx prebuild up to date task react native ble plx predebugbuild up to date task react native ble plx compiledebugaidl no source task react native bluetooth status prebuild up to date task react native bluetooth status predebugbuild up to date task react native bluetooth status compiledebugaidl no source task react native camera prebuild up to date task react native camera pregeneraldebugbuild up to date task react native camera compilegeneraldebugaidl no source task react native community checkbox prebuild up to date task react native community checkbox predebugbuild up to date task react native community checkbox compiledebugaidl no source task react native community datetimepicker prebuild up to date task react native community datetimepicker predebugbuild up to date task react native community datetimepicker compiledebugaidl no source task react native community masked view prebuild up to date task react native community masked view predebugbuild up to date task react native community masked view compiledebugaidl no source task react native community picker prebuild up to date task react native community picker predebugbuild up to date task react native community picker compiledebugaidl no source task react native community slider prebuild up to date task react native community slider predebugbuild up to date task react native community slider compiledebugaidl no source task react native device info prebuild up to date task react native device info predebugbuild up to date task react native device info compiledebugaidl no source task react native document picker prebuild up to date task react native document picker predebugbuild up to date task react native document picker compiledebugaidl no source task react native fs prebuild up to date task react native fs predebugbuild up to date task react native fs compiledebugaidl no source task react native gesture handler prebuild up to date task react native gesture handler predebugbuild up to date task react native gesture handler compiledebugaidl no source task react native haptic feedback prebuild up to date task react native haptic feedback predebugbuild up to date task react native haptic feedback compiledebugaidl no source task react native localization prebuild up to date task react native localization predebugbuild up to date task react native localization compiledebugaidl no source task react native mail prebuild up to date task react native mail predebugbuild up to date task react native mail compiledebugaidl no source task react native permissions prebuild up to date task react native permissions predebugbuild up to date task react native permissions compiledebugaidl no source task react native restart prebuild up to date task react native restart predebugbuild up to date task react native restart compiledebugaidl no source task react native safe area context prebuild up to date task react native safe area context predebugbuild up to date task react native safe area context compiledebugaidl no source task react native screens prebuild up to date task react native screens predebugbuild up to date task react native screens compiledebugaidl no source task react native svg prebuild up to date task react native svg predebugbuild up to date task react native svg compiledebugaidl no source task react native system setting prebuild up to date task react native system setting predebugbuild up to date task react native system setting compiledebugaidl no source task react native vector icons prebuild up to date task react native vector icons predebugbuild up to date task react native vector icons compiledebugaidl no source task realm send task realm prebuild task realm predebugbuild task realm compiledebugaidl no source task app compiledebugaidl no source task bugsnag react native packagedebugrenderscript no source task react native async storage async storage packagedebugrenderscript no source task react native ble plx packagedebugrenderscript no source task react native bluetooth status packagedebugrenderscript no source task react native camera packagegeneraldebugrenderscript no source task react native community checkbox packagedebugrenderscript no source task react native community datetimepicker packagedebugrenderscript no source task react native community masked view packagedebugrenderscript no source task react native community picker packagedebugrenderscript no source task react native community slider packagedebugrenderscript no source task react native device info packagedebugrenderscript no source task react native document picker packagedebugrenderscript no source task react native fs packagedebugrenderscript no source task react native gesture handler packagedebugrenderscript no source task react native haptic feedback packagedebugrenderscript no source task react native localization packagedebugrenderscript no source task react native mail packagedebugrenderscript no source task react native permissions packagedebugrenderscript no source task react native restart packagedebugrenderscript no source task react native safe area context packagedebugrenderscript no source task react native screens packagedebugrenderscript no source task react native svg packagedebugrenderscript no source task react native system setting packagedebugrenderscript no source task react native vector icons packagedebugrenderscript no source task realm packagedebugrenderscript no source task app compiledebugrenderscript no source task app generatedebugbuildconfig up to date task app javaprecompiledebug up to date task bugsnag react native writedebugaarmetadata up to date task react native async storage async storage writedebugaarmetadata up to date task react native ble plx writedebugaarmetadata up to date task react native bluetooth status writedebugaarmetadata up to date task react native camera writegeneraldebugaarmetadata up to date task react native community checkbox writedebugaarmetadata up to date task react native community datetimepicker writedebugaarmetadata up to date task react native community masked view writedebugaarmetadata up to date task react native community picker writedebugaarmetadata up to date task react native community slider writedebugaarmetadata up to date task react native device info writedebugaarmetadata up to date task react native document picker writedebugaarmetadata up to date task react native fs writedebugaarmetadata up to date task react native gesture handler writedebugaarmetadata up to date task react native haptic feedback writedebugaarmetadata up to date task react native localization writedebugaarmetadata up to date task react native mail writedebugaarmetadata up to date task react native permissions writedebugaarmetadata up to date task react native restart writedebugaarmetadata up to date task react native safe area context writedebugaarmetadata up to date task react native screens writedebugaarmetadata up to date task react native svg writedebugaarmetadata up to date task react native system setting writedebugaarmetadata up to date task react native vector icons writedebugaarmetadata up to date task realm writedebugaarmetadata up to date task app bundledebugjsandassets skipped task app checkdebugaarmetadata failed task app mergedebugshaders up to date deprecated gradle features were used in this build making it incompatible with gradle use warning mode all to show the individual deprecation warnings see actionable tasks executed up to date warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns failure build failed with an exception what went wrong execution failed for task app checkdebugaarmetadata multiple task action failures occurred a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx appcompat appcompat aar metadata file users sussol gradle caches transforms files appcompat meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx appcompat appcompat resources aar metadata file users sussol gradle caches transforms files jetified appcompat resources meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx views helper aar metadata file users sussol gradle caches transforms files jetified views helper meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx aar metadata file users sussol gradle caches transforms files jetified meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx lifecycle lifecycle process aar metadata file users sussol gradle caches transforms files jetified lifecycle process meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx tracing tracing aar metadata file users sussol gradle caches transforms files jetified tracing meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx core core aar metadata file users sussol gradle caches transforms files core meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx lifecycle lifecycle runtime aar metadata file users sussol gradle caches transforms files lifecycle runtime meta inf com android build gradle aar metadata properties try run with stacktrace option to get the stack trace run with info or debug option to get more log output run with scan to get full insights get more help at build failed in error failed to install the app make sure you have the android development environment set up error command failed gradlew app installdebug preactnativedevserverport warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns warning mapping new ns to old ns failure build failed with an exception what went wrong execution failed for task app checkdebugaarmetadata multiple task action failures occurred a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx appcompat appcompat aar metadata file users sussol gradle caches transforms files appcompat meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx appcompat appcompat resources aar metadata file users sussol gradle caches transforms files jetified appcompat resources meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx views helper aar metadata file users sussol gradle caches transforms files jetified views helper meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx aar metadata file users sussol gradle caches transforms files jetified meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx lifecycle lifecycle process aar metadata file users sussol gradle caches transforms files jetified lifecycle process meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx tracing tracing aar metadata file users sussol gradle caches transforms files jetified tracing meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx core core aar metadata file users sussol gradle caches transforms files core meta inf com android build gradle aar metadata properties a failure occurred while executing com android build gradle internal tasks checkaarmetadataworkaction the mincompilesdk specified in a dependency s aar metadata meta inf com android build gradle aar metadata properties is greater than this module s compilesdkversion android dependency androidx lifecycle lifecycle runtime aar metadata file users sussol gradle caches transforms files lifecycle runtime meta inf com android build gradle aar metadata properties try run with stacktrace option to get the stack trace run with info or debug option to get more log output run with scan to get full insights get more help at build failed in at makeerror users sussol documents projects mobile node modules execa index js at users sussol documents projects mobile node modules execa index js at processticksandrejections internal process task queues js at async runonalldevices users sussol documents projects mobile node modules react native community cli platform android build commands runandroid runonalldevices js at async command handleaction users sussol documents projects mobile node modules react native community cli build index js info run cli with verbose flag for more details error command failed with exit code info visit for documentation about this command to reproduce steps to reproduce the behaviour try to build the application to run in development mode open a terminal and do yarn start open another terminal and do yarn android expected behaviour react native should build properly without error proposed solution android studio is trying to enforce version of development kit to our app however we cannot use version as it is not supported by realm update build settings version and device info app version tablet model os version additional context add any other context about the problem here
1
248,555
7,933,849,996
IssuesEvent
2018-07-08 12:14:16
RocketMod/Rocket
https://api.github.com/repos/RocketMod/Rocket
closed
Plugins attempting to install with https instead of http
Priority: Normal bug confirmed
http://prntscr.com/jzaknp Operating System and Version: <!-- Please specify the versions you use, you can see them with /rocket --> Unturned Version: Rocketmod Version: <!-- Please be as accurate as possible, and include as much information as possible. Share related configuration or/and your Rocket.log (you can find it in /Rocket/Logs/, the one without any numbers) by creating a gist on https://gist.github.com/. Remember to keep this issue informative and the data relevant. -->
1.0
Plugins attempting to install with https instead of http - http://prntscr.com/jzaknp Operating System and Version: <!-- Please specify the versions you use, you can see them with /rocket --> Unturned Version: Rocketmod Version: <!-- Please be as accurate as possible, and include as much information as possible. Share related configuration or/and your Rocket.log (you can find it in /Rocket/Logs/, the one without any numbers) by creating a gist on https://gist.github.com/. Remember to keep this issue informative and the data relevant. -->
priority
plugins attempting to install with https instead of http operating system and version unturned version rocketmod version please be as accurate as possible and include as much information as possible share related configuration or and your rocket log you can find it in rocket logs the one without any numbers by creating a gist on remember to keep this issue informative and the data relevant
1
36,308
4,726,436,945
IssuesEvent
2016-10-18 10:12:09
pixelhumain/communecter
https://api.github.com/repos/pixelhumain/communecter
closed
Agenda - Bug de l'affichage des étiquettes
bug design Production bug
Les étiquettes s'affichent en dessous de l'événement de l'agenda. Ce comportement est visible lorsque des événements sont affichés une semaine sur l'autre. Dans ce cas l'étiquette de l'événement est caché par l'événement en dessous. ![communecter](https://cloud.githubusercontent.com/assets/425243/17845916/86b145b8-6856-11e6-9d64-024f90bdce6f.png)
1.0
Agenda - Bug de l'affichage des étiquettes - Les étiquettes s'affichent en dessous de l'événement de l'agenda. Ce comportement est visible lorsque des événements sont affichés une semaine sur l'autre. Dans ce cas l'étiquette de l'événement est caché par l'événement en dessous. ![communecter](https://cloud.githubusercontent.com/assets/425243/17845916/86b145b8-6856-11e6-9d64-024f90bdce6f.png)
non_priority
agenda bug de l affichage des étiquettes les étiquettes s affichent en dessous de l événement de l agenda ce comportement est visible lorsque des événements sont affichés une semaine sur l autre dans ce cas l étiquette de l événement est caché par l événement en dessous
0
258,905
27,591,587,632
IssuesEvent
2023-03-09 01:04:13
L00171222/easybuggy4django
https://api.github.com/repos/L00171222/easybuggy4django
opened
mysql_connector_python-8.0.6-py2.py3-none-any.whl: 1 vulnerabilities (highest severity is: 8.1)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql_connector_python-8.0.6-py2.py3-none-any.whl</b></p></summary> <p>MySQL driver written in Python</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/58/75/8095031ec5cff34e81153ceb154eaae8ae8351860c91d930a06502000a15/mysql_connector_python-8.0.6-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/58/75/8095031ec5cff34e81153ceb154eaae8ae8351860c91d930a06502000a15/mysql_connector_python-8.0.6-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (mysql_connector_python version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-2435](https://www.mend.io/vulnerability-database/CVE-2019-2435) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | mysql_connector_python-8.0.6-py2.py3-none-any.whl | Direct | 8.0.14 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-2435</summary> ### Vulnerable Library - <b>mysql_connector_python-8.0.6-py2.py3-none-any.whl</b></p> <p>MySQL driver written in Python</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/58/75/8095031ec5cff34e81153ceb154eaae8ae8351860c91d930a06502000a15/mysql_connector_python-8.0.6-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/58/75/8095031ec5cff34e81153ceb154eaae8ae8351860c91d930a06502000a15/mysql_connector_python-8.0.6-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **mysql_connector_python-8.0.6-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/Python). Supported versions that are affected are 8.0.13 and prior and 2.1.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Connectors accessible data as well as unauthorized access to critical data or complete access to all MySQL Connectors accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N). <p>Publish Date: 2019-01-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-2435>CVE-2019-2435</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2435</a></p> <p>Release Date: 2019-01-16</p> <p>Fix Resolution: 8.0.14</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
True
mysql_connector_python-8.0.6-py2.py3-none-any.whl: 1 vulnerabilities (highest severity is: 8.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql_connector_python-8.0.6-py2.py3-none-any.whl</b></p></summary> <p>MySQL driver written in Python</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/58/75/8095031ec5cff34e81153ceb154eaae8ae8351860c91d930a06502000a15/mysql_connector_python-8.0.6-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/58/75/8095031ec5cff34e81153ceb154eaae8ae8351860c91d930a06502000a15/mysql_connector_python-8.0.6-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (mysql_connector_python version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-2435](https://www.mend.io/vulnerability-database/CVE-2019-2435) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | mysql_connector_python-8.0.6-py2.py3-none-any.whl | Direct | 8.0.14 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-2435</summary> ### Vulnerable Library - <b>mysql_connector_python-8.0.6-py2.py3-none-any.whl</b></p> <p>MySQL driver written in Python</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/58/75/8095031ec5cff34e81153ceb154eaae8ae8351860c91d930a06502000a15/mysql_connector_python-8.0.6-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/58/75/8095031ec5cff34e81153ceb154eaae8ae8351860c91d930a06502000a15/mysql_connector_python-8.0.6-py2.py3-none-any.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **mysql_connector_python-8.0.6-py2.py3-none-any.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/Python). Supported versions that are affected are 8.0.13 and prior and 2.1.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Connectors accessible data as well as unauthorized access to critical data or complete access to all MySQL Connectors accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N). <p>Publish Date: 2019-01-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-2435>CVE-2019-2435</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2435">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2435</a></p> <p>Release Date: 2019-01-16</p> <p>Fix Resolution: 8.0.14</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
non_priority
mysql connector python none any whl vulnerabilities highest severity is vulnerable library mysql connector python none any whl mysql driver written in python library home page a href path to dependency file requirements txt path to vulnerable library requirements txt vulnerabilities cve severity cvss dependency type fixed in mysql connector python version remediation available high mysql connector python none any whl direct details cve vulnerable library mysql connector python none any whl mysql driver written in python library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x mysql connector python none any whl vulnerable library found in base branch master vulnerability details vulnerability in the mysql connectors component of oracle mysql subcomponent connector python supported versions that are affected are and prior and and prior easily exploitable vulnerability allows unauthenticated attacker with network access via tls to compromise mysql connectors successful attacks require human interaction from a person other than the attacker successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all mysql connectors accessible data as well as unauthorized access to critical data or complete access to all mysql connectors accessible data cvss base score confidentiality and integrity impacts cvss vector cvss av n ac l pr n ui r s u c h i h a n publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
3,133
2,810,651,741
IssuesEvent
2015-05-17 02:51:37
HeavensGate/Eternal
https://api.github.com/repos/HeavensGate/Eternal
opened
Chaplain
code complex/difficult discuss/uncertain Gate/writing longterm mapping spriting
We intend to be working on the Chaplain, once we have a little more ground on the forces he opposes. More on this later; pending discussions abound.
1.0
Chaplain - We intend to be working on the Chaplain, once we have a little more ground on the forces he opposes. More on this later; pending discussions abound.
non_priority
chaplain we intend to be working on the chaplain once we have a little more ground on the forces he opposes more on this later pending discussions abound
0
47,365
24,970,910,744
IssuesEvent
2022-11-02 01:00:08
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
closed
Use Automatic Feature Suspension to protect against known issues
Feature Request Area-Performance
**Brief description:** [Automatic Feature Suspension](https://docs.microsoft.com/en-us/visualstudio/code-quality/automatic-feature-suspension?view=vs-2019) guards against bad experiences with Roslyn. When a user has limited memory, it prioritizes their experience by disabling some advanced features. This guard can be expanded to cover other known scenarios. Issues relating to high CPU usage, long task execution, or analyzers that aren't built to run concurrently.
True
Use Automatic Feature Suspension to protect against known issues - **Brief description:** [Automatic Feature Suspension](https://docs.microsoft.com/en-us/visualstudio/code-quality/automatic-feature-suspension?view=vs-2019) guards against bad experiences with Roslyn. When a user has limited memory, it prioritizes their experience by disabling some advanced features. This guard can be expanded to cover other known scenarios. Issues relating to high CPU usage, long task execution, or analyzers that aren't built to run concurrently.
non_priority
use automatic feature suspension to protect against known issues brief description guards against bad experiences with roslyn when a user has limited memory it prioritizes their experience by disabling some advanced features this guard can be expanded to cover other known scenarios issues relating to high cpu usage long task execution or analyzers that aren t built to run concurrently
0
151,174
12,016,494,922
IssuesEvent
2020-04-10 16:13:29
mathjax/MathJax
https://api.github.com/repos/mathjax/MathJax
closed
processEscapes set to true doesn't work
Accepted Fixed Merged Test Needed v3
using version 3.0.1, using "_processEscapes_" set to "_true_" stops MathJax from working, giving the error "**TypeError: Q.setAttribute is not a function**". The folloowing is the minimal example that I tested: ``` <!DOCTYPE html> <head> <meta charset="utf-8"> <meta http-equiv="x-ua-compatible" content="ie=edge"> <meta name="viewport" content="width=device-width"> <title>MathJax v3 with TeX input and SVG output</title> <script> MathJax = { tex: { inlineMath: [['$', '$']], processEscapes: true }, svg: {fontCache: 'global'} }; </script> <script id="MathJax-script" async src="https://cdn.jsdelivr.net/npm/mathjax@3/es5/tex-svg.js"></script> </head> <body> <h1>MathJax v3 beta: TeX input, HTML output test</h1> <p> When $a \ne 0$, there are two solutions to $ax^2 + bx + c = 0$ and they are $$x = {-b \pm \sqrt{b^2-4ac} \over 2a}.$$ \$equation\$ </p> </body> </html> ```
1.0
processEscapes set to true doesn't work - using version 3.0.1, using "_processEscapes_" set to "_true_" stops MathJax from working, giving the error "**TypeError: Q.setAttribute is not a function**". The folloowing is the minimal example that I tested: ``` <!DOCTYPE html> <head> <meta charset="utf-8"> <meta http-equiv="x-ua-compatible" content="ie=edge"> <meta name="viewport" content="width=device-width"> <title>MathJax v3 with TeX input and SVG output</title> <script> MathJax = { tex: { inlineMath: [['$', '$']], processEscapes: true }, svg: {fontCache: 'global'} }; </script> <script id="MathJax-script" async src="https://cdn.jsdelivr.net/npm/mathjax@3/es5/tex-svg.js"></script> </head> <body> <h1>MathJax v3 beta: TeX input, HTML output test</h1> <p> When $a \ne 0$, there are two solutions to $ax^2 + bx + c = 0$ and they are $$x = {-b \pm \sqrt{b^2-4ac} \over 2a}.$$ \$equation\$ </p> </body> </html> ```
non_priority
processescapes set to true doesn t work using version using processescapes set to true stops mathjax from working giving the error typeerror q setattribute is not a function the folloowing is the minimal example that i tested mathjax with tex input and svg output mathjax tex inlinemath processescapes true svg fontcache global script id mathjax script async src mathjax beta tex input html output test when a ne there are two solutions to ax bx c and they are x b pm sqrt b over equation
0