Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1
value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3
values | title stringlengths 1 1k | labels stringlengths 4 1.38k | body stringlengths 1 262k | index stringclasses 16
values | text_combine stringlengths 96 262k | label stringclasses 2
values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
646,709 | 21,057,394,501 | IssuesEvent | 2022-04-01 05:46:35 | turbot/steampipe-plugin-oci | https://api.github.com/repos/turbot/steampipe-plugin-oci | closed | Add table oci_resourcemanager_stack | enhancement new table priority:medium | **References**
Add any related links that will help us understand the resource, including vendor documentation, related GitHub issues, and Go SDK documentation.
Reference
https://registry.terraform.io/providers/oracle/oci/latest/docs/data-sources/resourcemanager_stacks | 1.0 | Add table oci_resourcemanager_stack - **References**
Add any related links that will help us understand the resource, including vendor documentation, related GitHub issues, and Go SDK documentation.
Reference
https://registry.terraform.io/providers/oracle/oci/latest/docs/data-sources/resourcemanager_stacks | priority | add table oci resourcemanager stack references add any related links that will help us understand the resource including vendor documentation related github issues and go sdk documentation reference | 1 |
759,545 | 26,600,631,652 | IssuesEvent | 2023-01-23 15:31:53 | kir-dev/konzisite-api | https://api.github.com/repos/kir-dev/konzisite-api | closed | Only return consultations where the user is member of the targetGroups | high priority | In `GET /consultations/`
- If the user isn't signed in, only return the consultations where there's no target groups
- Otherwise also return the consultations where the user is member of at least one of the target groups
In `GET /consultations/:id`
- return with 403 if the user is not in any of the target groups | 1.0 | Only return consultations where the user is member of the targetGroups - In `GET /consultations/`
- If the user isn't signed in, only return the consultations where there's no target groups
- Otherwise also return the consultations where the user is member of at least one of the target groups
In `GET /consultations/:id`
- return with 403 if the user is not in any of the target groups | priority | only return consultations where the user is member of the targetgroups in get consultations if the user isn t signed in only return the consultations where there s no target groups otherwise also return the consultations where the user is member of at least one of the target groups in get consultations id return with if the user is not in any of the target groups | 1 |
59,326 | 3,105,473,842 | IssuesEvent | 2015-08-31 21:06:11 | UniVR/GolfVR | https://api.github.com/repos/UniVR/GolfVR | opened | Explain rules introduction | priority:low type:idea | Explain the rules before the game begin
_Watch the ball to shoot (the time the ball is watched will define the power)
_... (to be defined) | 1.0 | Explain rules introduction - Explain the rules before the game begin
_Watch the ball to shoot (the time the ball is watched will define the power)
_... (to be defined) | priority | explain rules introduction explain the rules before the game begin watch the ball to shoot the time the ball is watched will define the power to be defined | 1 |
72,321 | 9,567,087,357 | IssuesEvent | 2019-05-06 01:39:48 | CompileIO/compile.io | https://api.github.com/repos/CompileIO/compile.io | closed | Project Documentation Review | documentation | # Description of Issue
As a stakeholder, I'd like to have a well documented project so that if this project went open-source, developers would have little to no trouble with the on-boarding process.
# Acceptance Criteria
- [x] Review Code and address areas lacking/needing Documentation
- [ ] Address additional Documentation concerns that may not be directly code-related (how to set-up environment, required software download instructions, design philosophy, etc.) | 1.0 | Project Documentation Review - # Description of Issue
As a stakeholder, I'd like to have a well documented project so that if this project went open-source, developers would have little to no trouble with the on-boarding process.
# Acceptance Criteria
- [x] Review Code and address areas lacking/needing Documentation
- [ ] Address additional Documentation concerns that may not be directly code-related (how to set-up environment, required software download instructions, design philosophy, etc.) | non_priority | project documentation review description of issue as a stakeholder i d like to have a well documented project so that if this project went open source developers would have little to no trouble with the on boarding process acceptance criteria review code and address areas lacking needing documentation address additional documentation concerns that may not be directly code related how to set up environment required software download instructions design philosophy etc | 0 |
178,958 | 14,686,013,198 | IssuesEvent | 2021-01-01 12:40:21 | corona-warn-app/cwa-website | https://api.github.com/repos/corona-warn-app/cwa-website | closed | ENA.ExposureNotificationError-Fehler2 | documentation | <!--
Thanks for reporting an issue on the website 🙌 ❤️
Before opening a new issue, please make sure that we do not have any duplicates already open. You can ensure this by searching the issue list for this repository. If there is a duplicate, please close your issue and add a comment to the existing issue instead.
-->
## Where to find the issue
<!-- Be as specific as possible by naming the URL path, page, and ideally paragraph. -->
## Describe the issue
<!-- Please let us know what exactly is the issue with that part of the website -->
## Suggested change
<!-- If you have ideas on how to fix this issue, please note them here, or consider creating a Pull Request -->
https://github.com/corona-warn-app/cwa-app-ios/issues/1453
Sporadic occurrences of error notification
- "ENA.ExposureNotificationError-Fehler2"
- can be solved with work-around https://www.coronawarn.app/de/faq/#ios_black_screen
- add error message to title
| 1.0 | ENA.ExposureNotificationError-Fehler2 - <!--
Thanks for reporting an issue on the website 🙌 ❤️
Before opening a new issue, please make sure that we do not have any duplicates already open. You can ensure this by searching the issue list for this repository. If there is a duplicate, please close your issue and add a comment to the existing issue instead.
-->
## Where to find the issue
<!-- Be as specific as possible by naming the URL path, page, and ideally paragraph. -->
## Describe the issue
<!-- Please let us know what exactly is the issue with that part of the website -->
## Suggested change
<!-- If you have ideas on how to fix this issue, please note them here, or consider creating a Pull Request -->
https://github.com/corona-warn-app/cwa-app-ios/issues/1453
Sporadic occurrences of error notification
- "ENA.ExposureNotificationError-Fehler2"
- can be solved with work-around https://www.coronawarn.app/de/faq/#ios_black_screen
- add error message to title
| non_priority | ena exposurenotificationerror thanks for reporting an issue on the website 🙌 ❤️ before opening a new issue please make sure that we do not have any duplicates already open you can ensure this by searching the issue list for this repository if there is a duplicate please close your issue and add a comment to the existing issue instead where to find the issue describe the issue suggested change sporadic occurrences of error notification ena exposurenotificationerror can be solved with work around add error message to title | 0 |
822,342 | 30,866,484,082 | IssuesEvent | 2023-08-03 08:25:03 | telerik/kendo-react | https://api.github.com/repos/telerik/kendo-react | opened | [Editor] BackColor and ForeColor are not applied on table cells content if multiple cells are selected | bug pkg:editor Priority 1 SEV: High | If multiple cells/rows are selected in a table, applying changes to the BackColor and ForeColor fails in some scenarios.
To observe the issue, open the following example:
- https://stackblitz.com/edit/react-icvjor?file=app%2Fmain.jsx
Cases that fail:
- select with the mouse from row1cell1 to row2cell2 and changing the ForeColor or the BackColor
- select with the mouse from row1cell2 to row3cell3 and changing the ForeColor or the BackColor
- selecting all cells and changing the ForeColor or the BackColor | 1.0 | [Editor] BackColor and ForeColor are not applied on table cells content if multiple cells are selected - If multiple cells/rows are selected in a table, applying changes to the BackColor and ForeColor fails in some scenarios.
To observe the issue, open the following example:
- https://stackblitz.com/edit/react-icvjor?file=app%2Fmain.jsx
Cases that fail:
- select with the mouse from row1cell1 to row2cell2 and changing the ForeColor or the BackColor
- select with the mouse from row1cell2 to row3cell3 and changing the ForeColor or the BackColor
- selecting all cells and changing the ForeColor or the BackColor | priority | backcolor and forecolor are not applied on table cells content if multiple cells are selected if multiple cells rows are selected in a table applying changes to the backcolor and forecolor fails in some scenarios to observe the issue open the following example cases that fail select with the mouse from to and changing the forecolor or the backcolor select with the mouse from to and changing the forecolor or the backcolor selecting all cells and changing the forecolor or the backcolor | 1 |
27,684 | 13,349,348,104 | IssuesEvent | 2020-08-30 00:11:18 | aws/aws-sdk-go | https://api.github.com/repos/aws/aws-sdk-go | closed | Presign performance. Can it it be improved? | performance | We are seeing heavy degrading of our services that generate payload with a significant number of presigned urls in. The effect is dramatic, on Heroku standard 1x machine the performence is a factor 20 lower and a profile pprof shows ~75% of cpu time goes into prsign related work (1/3 of which is some sort of rest xml protocol).
### Version of AWS SDK for Go?
Latest as given by `dep ensure -update`.
### Version of Go (`go version`)?
go version go1.9.2 linux/amd64
### What issue did you see?
Performance of presign is low.
### Steps to reproduce
Create 1 session and 1 s3 object and generate presigned urls of at least 300-400 chars.
Compare with not presigning at all.
If you have have an runnable example, please include it.
I am sorry, it is part of a service.
| True | Presign performance. Can it it be improved? - We are seeing heavy degrading of our services that generate payload with a significant number of presigned urls in. The effect is dramatic, on Heroku standard 1x machine the performence is a factor 20 lower and a profile pprof shows ~75% of cpu time goes into prsign related work (1/3 of which is some sort of rest xml protocol).
### Version of AWS SDK for Go?
Latest as given by `dep ensure -update`.
### Version of Go (`go version`)?
go version go1.9.2 linux/amd64
### What issue did you see?
Performance of presign is low.
### Steps to reproduce
Create 1 session and 1 s3 object and generate presigned urls of at least 300-400 chars.
Compare with not presigning at all.
If you have have an runnable example, please include it.
I am sorry, it is part of a service.
| non_priority | presign performance can it it be improved we are seeing heavy degrading of our services that generate payload with a significant number of presigned urls in the effect is dramatic on heroku standard machine the performence is a factor lower and a profile pprof shows of cpu time goes into prsign related work of which is some sort of rest xml protocol version of aws sdk for go latest as given by dep ensure update version of go go version go version linux what issue did you see performance of presign is low steps to reproduce create session and object and generate presigned urls of at least chars compare with not presigning at all if you have have an runnable example please include it i am sorry it is part of a service | 0 |
201,682 | 15,217,765,806 | IssuesEvent | 2021-02-17 16:59:32 | brave/brave-browser | https://api.github.com/repos/brave/brave-browser | closed | Brave nightly build `Bravearm 1.22.30.apk` is crashing | OS/Android QA/Test-Plan-Specified QA/Yes crash regression | <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description <!-- Provide a brief description of the issue -->
Brave nightly build `Bravearm 1.22.30.apk` is crashing
## Steps to reproduce <!-- Please add a series of steps to reproduce the issue -->
1. Install `Bravearm.apk` - 1.22.30
2. Launch brave
3. Brave is crashing
## Actual result <!-- Please add screenshots if needed -->
Brave crash
## Expected result
should not be any crash
## Issue reproduces how often <!-- [Easily reproduced/Intermittent issue/No steps to reproduce] -->
Always
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current Play Store version? No
- Can you reproduce this issue with the current Play Store Beta version? No
- Can you reproduce this issue with the current Play Store Nightly version? No
## Device details
- Install type (ARM, x86): ARM
- Device type (Phone, Tablet, Phablet): Samsung Galaxy J3
- Android version: 5.1.1
## Brave version
1.22.30
### Website problems only
- Does the issue resolve itself when disabling Brave Shields? na
- Does the issue resolve itself when disabling Brave Rewards?na
- Is the issue reproducible on the latest version of Chrome? na
### Additional information
<!-- Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue -->
cc: @brave/legacy_qa @SergeyZhukovsky @samartnik @deeppandya @anthonypkeane | 1.0 | Brave nightly build `Bravearm 1.22.30.apk` is crashing - <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description <!-- Provide a brief description of the issue -->
Brave nightly build `Bravearm 1.22.30.apk` is crashing
## Steps to reproduce <!-- Please add a series of steps to reproduce the issue -->
1. Install `Bravearm.apk` - 1.22.30
2. Launch brave
3. Brave is crashing
## Actual result <!-- Please add screenshots if needed -->
Brave crash
## Expected result
should not be any crash
## Issue reproduces how often <!-- [Easily reproduced/Intermittent issue/No steps to reproduce] -->
Always
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current Play Store version? No
- Can you reproduce this issue with the current Play Store Beta version? No
- Can you reproduce this issue with the current Play Store Nightly version? No
## Device details
- Install type (ARM, x86): ARM
- Device type (Phone, Tablet, Phablet): Samsung Galaxy J3
- Android version: 5.1.1
## Brave version
1.22.30
### Website problems only
- Does the issue resolve itself when disabling Brave Shields? na
- Does the issue resolve itself when disabling Brave Rewards?na
- Is the issue reproducible on the latest version of Chrome? na
### Additional information
<!-- Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue -->
cc: @brave/legacy_qa @SergeyZhukovsky @samartnik @deeppandya @anthonypkeane | non_priority | brave nightly build bravearm apk is crashing have you searched for similar issues before submitting this issue please check the open issues and add a note before logging a new issue please use the template below to provide information about the issue insufficient info will get the issue closed it will only be reopened after sufficient info is provided description brave nightly build bravearm apk is crashing steps to reproduce install bravearm apk launch brave brave is crashing actual result brave crash expected result should not be any crash issue reproduces how often always version channel information can you reproduce this issue with the current play store version no can you reproduce this issue with the current play store beta version no can you reproduce this issue with the current play store nightly version no device details install type arm arm device type phone tablet phablet samsung galaxy android version brave version website problems only does the issue resolve itself when disabling brave shields na does the issue resolve itself when disabling brave rewards na is the issue reproducible on the latest version of chrome na additional information cc brave legacy qa sergeyzhukovsky samartnik deeppandya anthonypkeane | 0 |
11,559 | 2,610,141,745 | IssuesEvent | 2015-02-26 18:44:40 | chrsmith/hedgewars | https://api.github.com/repos/chrsmith/hedgewars | closed | Add [save as defaults] button to teams' key settings | auto-migrated Priority-Medium Type-Enhancement | ```
Currently players can't use their preferred key settings as spectators or in
quick single-player matches.
This is especially a problem with special default keys (like the current chat
history key) on different keyboard layouts.
Making it possible to save the key settings of a preferred team would solve
that problem.
```
-----
Original issue reported on code.google.com by `sheepyluva` on 10 Dec 2010 at 6:58
* Blocking: #192 | 1.0 | Add [save as defaults] button to teams' key settings - ```
Currently players can't use their preferred key settings as spectators or in
quick single-player matches.
This is especially a problem with special default keys (like the current chat
history key) on different keyboard layouts.
Making it possible to save the key settings of a preferred team would solve
that problem.
```
-----
Original issue reported on code.google.com by `sheepyluva` on 10 Dec 2010 at 6:58
* Blocking: #192 | priority | add button to teams key settings currently players can t use their preferred key settings as spectators or in quick single player matches this is especially a problem with special default keys like the current chat history key on different keyboard layouts making it possible to save the key settings of a preferred team would solve that problem original issue reported on code google com by sheepyluva on dec at blocking | 1 |
781,178 | 27,425,875,439 | IssuesEvent | 2023-03-01 20:14:57 | DSpace/dspace-angular | https://api.github.com/repos/DSpace/dspace-angular | closed | [Deque Analysis] MyDSpace page's "serious" accessibility issues | bug accessibility component: MyDSpace medium priority Estimate TBD | > Serious: This issue results in serious barriers for people with disabilities, and will partially prevent them from accessing fundamental features or content. People relying on assistive technologies will experience significant frustration as a result. Issues falling under this category are major problems, and remediation should be a priority.
## Deque Analysis Summary
Our MyDSpace page as a total of 5 serious accessibility issues (not including color contrast which are handled in other tickets).
1. (ID 470746) "Hover content disappearing." on the tooltip/hints that appear when you hover over the action buttons (e.g. hover over "View" shows "Select this option to view the Item's metadata"). They all appear to be related to `ngb-tooltip-window`)
* RULE: When additional content is triggered on pointer hover or on keyboard focus, that additional content MUST be visually perceived and MUST be dismissible.
* HOW TO FIX: Fix this issue by ensuring that content that appears on mouse hover or keyboard focus meets ALL of the following requirements:
* _Dismissible:_ If the content obscures or replaces other content, it can be dismissed via keyboard without moving mouse hover or keyboard focus - such as by pressing the Escape key.
* _Hoverable:_ If the content is triggered by mouse hover, the user can move the mouse pointer to the content without the content disappearing.
* _Persistent:_ The content stays visible until mouse hover or keyboard focus is moved or it is dismissed by the user (see #1 above), or the information is no longer valid.
* See also https://www.w3.org/WAI/WCAG21/Understanding/content-on-hover-or-focus
2. (ID 470748) "Non-decorative content is inserted using CSS pseudo-elements." on the two buttons ("Add" and "Import" icons) which appear to the right of the "Drag & Drop your files" area.
* RULE : Non-decorative content MUST NOT be inserted using CSS :before and :after pseudo-elements unless there is a way to access the content with CSS turned off.
* HOW TO FIX: Fix this issue by including the content directly in the DOM using HTML.
3. (ID 470750) "Buttons have same name but different actions." on the "Edit" and "Delete" buttons. Neither of them have a label/name, so they appear the same.
* Fix by adding an `aria-label` to both, or changing the button label (visible & programmatic) to provide a complete description of the button purpose. See also https://dequeuniversity.com/class/forms2/labels/meaningful
4.. (ID 470756, 470758) "Content is lost at 200% zoom" and "Content is lost at 320px width" occurs on the hover over text / tooltip (when hovering over a button). In both cases the tooltip popup is partially hidden by the Admin sidebar menu. (screenshots available in the Deque tickets)
Full list of issues is viewable at (requires login): https://axeauditor.dequecloud.com/test-run/0856438a-a19a-11eb-bc31-b7d5be387c86/issues?activeTab=dt-issue&page=0&pageSize=50&sortField=ordinal&sortDir=asc&filter%5Bseverity%5D=3&filter%5Btype%5D=issue&filter%5Bpage_number%5D=10&row=9
## More Information / Tools
* Consider using [Deque's free Chrome plugin](https://chrome.google.com/webstore/detail/axe-devtools-web-accessib/lhdoppojpmngadmnindnejefpokejbdd?hl=en-US) to check your work
* Deque's color contrast tool: https://dequeuniversity.com/rules/axe/4.1/color-contrast?application=axeAPI | 1.0 | [Deque Analysis] MyDSpace page's "serious" accessibility issues - > Serious: This issue results in serious barriers for people with disabilities, and will partially prevent them from accessing fundamental features or content. People relying on assistive technologies will experience significant frustration as a result. Issues falling under this category are major problems, and remediation should be a priority.
## Deque Analysis Summary
Our MyDSpace page as a total of 5 serious accessibility issues (not including color contrast which are handled in other tickets).
1. (ID 470746) "Hover content disappearing." on the tooltip/hints that appear when you hover over the action buttons (e.g. hover over "View" shows "Select this option to view the Item's metadata"). They all appear to be related to `ngb-tooltip-window`)
* RULE: When additional content is triggered on pointer hover or on keyboard focus, that additional content MUST be visually perceived and MUST be dismissible.
* HOW TO FIX: Fix this issue by ensuring that content that appears on mouse hover or keyboard focus meets ALL of the following requirements:
* _Dismissible:_ If the content obscures or replaces other content, it can be dismissed via keyboard without moving mouse hover or keyboard focus - such as by pressing the Escape key.
* _Hoverable:_ If the content is triggered by mouse hover, the user can move the mouse pointer to the content without the content disappearing.
* _Persistent:_ The content stays visible until mouse hover or keyboard focus is moved or it is dismissed by the user (see #1 above), or the information is no longer valid.
* See also https://www.w3.org/WAI/WCAG21/Understanding/content-on-hover-or-focus
2. (ID 470748) "Non-decorative content is inserted using CSS pseudo-elements." on the two buttons ("Add" and "Import" icons) which appear to the right of the "Drag & Drop your files" area.
* RULE : Non-decorative content MUST NOT be inserted using CSS :before and :after pseudo-elements unless there is a way to access the content with CSS turned off.
* HOW TO FIX: Fix this issue by including the content directly in the DOM using HTML.
3. (ID 470750) "Buttons have same name but different actions." on the "Edit" and "Delete" buttons. Neither of them have a label/name, so they appear the same.
* Fix by adding an `aria-label` to both, or changing the button label (visible & programmatic) to provide a complete description of the button purpose. See also https://dequeuniversity.com/class/forms2/labels/meaningful
4.. (ID 470756, 470758) "Content is lost at 200% zoom" and "Content is lost at 320px width" occurs on the hover over text / tooltip (when hovering over a button). In both cases the tooltip popup is partially hidden by the Admin sidebar menu. (screenshots available in the Deque tickets)
Full list of issues is viewable at (requires login): https://axeauditor.dequecloud.com/test-run/0856438a-a19a-11eb-bc31-b7d5be387c86/issues?activeTab=dt-issue&page=0&pageSize=50&sortField=ordinal&sortDir=asc&filter%5Bseverity%5D=3&filter%5Btype%5D=issue&filter%5Bpage_number%5D=10&row=9
## More Information / Tools
* Consider using [Deque's free Chrome plugin](https://chrome.google.com/webstore/detail/axe-devtools-web-accessib/lhdoppojpmngadmnindnejefpokejbdd?hl=en-US) to check your work
* Deque's color contrast tool: https://dequeuniversity.com/rules/axe/4.1/color-contrast?application=axeAPI | priority | mydspace page s serious accessibility issues serious this issue results in serious barriers for people with disabilities and will partially prevent them from accessing fundamental features or content people relying on assistive technologies will experience significant frustration as a result issues falling under this category are major problems and remediation should be a priority deque analysis summary our mydspace page as a total of serious accessibility issues not including color contrast which are handled in other tickets id hover content disappearing on the tooltip hints that appear when you hover over the action buttons e g hover over view shows select this option to view the item s metadata they all appear to be related to ngb tooltip window rule when additional content is triggered on pointer hover or on keyboard focus that additional content must be visually perceived and must be dismissible how to fix fix this issue by ensuring that content that appears on mouse hover or keyboard focus meets all of the following requirements dismissible if the content obscures or replaces other content it can be dismissed via keyboard without moving mouse hover or keyboard focus such as by pressing the escape key hoverable if the content is triggered by mouse hover the user can move the mouse pointer to the content without the content disappearing persistent the content stays visible until mouse hover or keyboard focus is moved or it is dismissed by the user see above or the information is no longer valid see also id non decorative content is inserted using css pseudo elements on the two buttons add and import icons which appear to the right of the drag drop your files area rule non decorative content must not be inserted using css before and after pseudo elements unless there is a way to access the content with css turned off how to fix fix this issue by including the content directly in the dom using html id buttons have same name but different actions on the edit and delete buttons neither of them have a label name so they appear the same fix by adding an aria label to both or changing the button label visible programmatic to provide a complete description of the button purpose see also id content is lost at zoom and content is lost at width occurs on the hover over text tooltip when hovering over a button in both cases the tooltip popup is partially hidden by the admin sidebar menu screenshots available in the deque tickets full list of issues is viewable at requires login more information tools consider using to check your work deque s color contrast tool | 1 |
185,671 | 6,726,550,547 | IssuesEvent | 2017-10-17 10:16:07 | pingcap/tidb | https://api.github.com/repos/pingcap/tidb | closed | Estimate cardinality more precisely. | bug optimizer priority/P1 statistic | Once we analyze a table, its cardinality for each histogram will not update any more. So we should estimate it as ndv * (new count / old count) | 1.0 | Estimate cardinality more precisely. - Once we analyze a table, its cardinality for each histogram will not update any more. So we should estimate it as ndv * (new count / old count) | priority | estimate cardinality more precisely once we analyze a table its cardinality for each histogram will not update any more so we should estimate it as ndv new count old count | 1 |
146,233 | 19,393,981,389 | IssuesEvent | 2021-12-18 01:47:32 | peterwkc85/Spock_Testing_Framework | https://api.github.com/repos/peterwkc85/Spock_Testing_Framework | opened | CVE-2021-42550 (Medium) detected in logback-classic-0.9.26.jar | security vulnerability | ## CVE-2021-42550 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>logback-classic-0.9.26.jar</b></p></summary>
<p>Logback: the reliable, generic, fast and flexible logging library for Java.</p>
<p>Library home page: <a href="http://logback.qos.ch">http://logback.qos.ch</a></p>
<p>Path to dependency file: Spock_Testing_Framework/java-testing-with-spock-master/java-testing-with-spock-master/chapter7/web-ui-example/build.gradle</p>
<p>Path to vulnerable library: radle/caches/modules-2/files-2.1/ch.qos.logback/logback-classic/0.9.26/42253815f22c35f3a9b9a34fd0feca62eec8c78e/logback-classic-0.9.26.jar</p>
<p>
Dependency Hierarchy:
- :x: **logback-classic-0.9.26.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
<p>Publish Date: 2021-12-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42550>CVE-2021-42550</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://logback.qos.ch/news.html">http://logback.qos.ch/news.html</a></p>
<p>Release Date: 2021-12-16</p>
<p>Fix Resolution: ch.qos.logback:logback-classic:1.2.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-42550 (Medium) detected in logback-classic-0.9.26.jar - ## CVE-2021-42550 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>logback-classic-0.9.26.jar</b></p></summary>
<p>Logback: the reliable, generic, fast and flexible logging library for Java.</p>
<p>Library home page: <a href="http://logback.qos.ch">http://logback.qos.ch</a></p>
<p>Path to dependency file: Spock_Testing_Framework/java-testing-with-spock-master/java-testing-with-spock-master/chapter7/web-ui-example/build.gradle</p>
<p>Path to vulnerable library: radle/caches/modules-2/files-2.1/ch.qos.logback/logback-classic/0.9.26/42253815f22c35f3a9b9a34fd0feca62eec8c78e/logback-classic-0.9.26.jar</p>
<p>
Dependency Hierarchy:
- :x: **logback-classic-0.9.26.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
<p>Publish Date: 2021-12-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-42550>CVE-2021-42550</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://logback.qos.ch/news.html">http://logback.qos.ch/news.html</a></p>
<p>Release Date: 2021-12-16</p>
<p>Fix Resolution: ch.qos.logback:logback-classic:1.2.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in logback classic jar cve medium severity vulnerability vulnerable library logback classic jar logback the reliable generic fast and flexible logging library for java library home page a href path to dependency file spock testing framework java testing with spock master java testing with spock master web ui example build gradle path to vulnerable library radle caches modules files ch qos logback logback classic logback classic jar dependency hierarchy x logback classic jar vulnerable library vulnerability details in logback version and prior versions an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from ldap servers publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos logback logback classic step up your open source security game with whitesource | 0 |
11,705 | 5,076,084,966 | IssuesEvent | 2016-12-27 23:37:11 | portainer/portainer | https://api.github.com/repos/portainer/portainer | opened | Setup a cache busting mechanism | area/build-system kind/enhancement | When upgrading Portainer, the JS/CSS files can be cached by the browser and this can lead to bugs/strange behaviours.
This can be achieved by using a combination of grunt plugins:
* https://github.com/sebdeckers/grunt-rev
* https://github.com/yeoman/grunt-usemin
This should help versioning the assets before release which gives us the ability to let the browser cache the files for the current version only. | 1.0 | Setup a cache busting mechanism - When upgrading Portainer, the JS/CSS files can be cached by the browser and this can lead to bugs/strange behaviours.
This can be achieved by using a combination of grunt plugins:
* https://github.com/sebdeckers/grunt-rev
* https://github.com/yeoman/grunt-usemin
This should help versioning the assets before release which gives us the ability to let the browser cache the files for the current version only. | non_priority | setup a cache busting mechanism when upgrading portainer the js css files can be cached by the browser and this can lead to bugs strange behaviours this can be achieved by using a combination of grunt plugins this should help versioning the assets before release which gives us the ability to let the browser cache the files for the current version only | 0 |
91,230 | 11,488,211,698 | IssuesEvent | 2020-02-11 13:31:03 | toggl/mobileapp | https://api.github.com/repos/toggl/mobileapp | closed | Use HH:mm format for 24-hour format | carry-over-to-native foundation needs-design | Higher echelons of power have decided that
`HH:mm` format
should be used on all clients for 24-hour mode (instead of previous `H:mm`).
| 1.0 | Use HH:mm format for 24-hour format - Higher echelons of power have decided that
`HH:mm` format
should be used on all clients for 24-hour mode (instead of previous `H:mm`).
| non_priority | use hh mm format for hour format higher echelons of power have decided that hh mm format should be used on all clients for hour mode instead of previous h mm | 0 |
383,460 | 11,356,338,345 | IssuesEvent | 2020-01-24 22:25:49 | DlfinBroom/UnleashedRage | https://api.github.com/repos/DlfinBroom/UnleashedRage | closed | GetLatestIssue() method in ComicPageDB does not work | Bug Database High Priority | GetLatestIssue() will always return a null value
The database part of the code will always throw an exception and catch the exception, returning a null value | 1.0 | GetLatestIssue() method in ComicPageDB does not work - GetLatestIssue() will always return a null value
The database part of the code will always throw an exception and catch the exception, returning a null value | priority | getlatestissue method in comicpagedb does not work getlatestissue will always return a null value the database part of the code will always throw an exception and catch the exception returning a null value | 1 |
270,148 | 23,494,002,569 | IssuesEvent | 2022-08-17 22:00:02 | rectorphp/rector | https://api.github.com/repos/rectorphp/rector | closed | NodeFactory->createArray doesn't support boolean Node elements | feature failing test case needed | # Bug Report
<!-- First, thank you for reporting a bug. That takes time and we appreciate that! -->
| Subject | Details |
| :------------- | :---------------------------------------------------------------|
| Rector version | 0.13.2 |
<!-- Please describe your problem here. -->
## Minimal PHP Code Causing Issue
```php
<?php
class MyRule extends AbstractRector
{
public function getNodeTypes(): array
{
return [Node\Expr\MethodCall::class];
}
public function refactor(Node $node)
{
// String works!
// return $this->nodeFactory->createArray([new Node\Scalar\String_('hello')]);
// Boolean isn't :(
return $this->nodeFactory->createArray([$this->nodeFactory->createTrue()]);
return null;
}
public function getRuleDefinition(): RuleDefinition
{
return new RuleDefinition('', []);
}
}
```
## Expected Behaviour
It generates a node with array `[true]`
## Actual
Exception:
```
In NodeFactory.php line 517:
Not implemented yet. Go to "Rector\Core\PhpParser\Node\NodeFactory::createArrayItem()" and add check for "PhpParser\Node\Expr\ConstFetch" node.
```
| 1.0 | NodeFactory->createArray doesn't support boolean Node elements - # Bug Report
<!-- First, thank you for reporting a bug. That takes time and we appreciate that! -->
| Subject | Details |
| :------------- | :---------------------------------------------------------------|
| Rector version | 0.13.2 |
<!-- Please describe your problem here. -->
## Minimal PHP Code Causing Issue
```php
<?php
class MyRule extends AbstractRector
{
public function getNodeTypes(): array
{
return [Node\Expr\MethodCall::class];
}
public function refactor(Node $node)
{
// String works!
// return $this->nodeFactory->createArray([new Node\Scalar\String_('hello')]);
// Boolean isn't :(
return $this->nodeFactory->createArray([$this->nodeFactory->createTrue()]);
return null;
}
public function getRuleDefinition(): RuleDefinition
{
return new RuleDefinition('', []);
}
}
```
## Expected Behaviour
It generates a node with array `[true]`
## Actual
Exception:
```
In NodeFactory.php line 517:
Not implemented yet. Go to "Rector\Core\PhpParser\Node\NodeFactory::createArrayItem()" and add check for "PhpParser\Node\Expr\ConstFetch" node.
```
| non_priority | nodefactory createarray doesn t support boolean node elements bug report subject details rector version minimal php code causing issue php php class myrule extends abstractrector public function getnodetypes array return public function refactor node node string works return this nodefactory createarray boolean isn t return this nodefactory createarray return null public function getruledefinition ruledefinition return new ruledefinition expected behaviour it generates a node with array actual exception in nodefactory php line not implemented yet go to rector core phpparser node nodefactory createarrayitem and add check for phpparser node expr constfetch node | 0 |
618,271 | 19,431,293,523 | IssuesEvent | 2021-12-21 12:18:09 | openforis/arena | https://api.github.com/repos/openforis/arena | closed | Collect Import Report: Show full Xpath expression | Priority_2 | A long equation without spaces is now shown only partially:

| 1.0 | Collect Import Report: Show full Xpath expression - A long equation without spaces is now shown only partially:

| priority | collect import report show full xpath expression a long equation without spaces is now shown only partially | 1 |
166,242 | 12,917,736,011 | IssuesEvent | 2020-07-16 00:39:20 | KCarlile/flashchord | https://api.github.com/repos/KCarlile/flashchord | closed | Add @Flash_Chord Twitter link | easy enhancement passed testing ready for testing | ## Background
In order for people to follow updates for Flash Chord, we have a Twitter account for announcing new features and other information: https://twitter.com/flash_chord
## Acceptance Criteria
- The Twitter icon followed by the `@Flash_Chord` handle text are linked to https://twitter.com/flash_chord in the footer (copyright section) and on the About page
- The README.md file includes a link to the Twitter account for reference, but without icon
## Approach
- https://twitter.com/flash_chord link as `@Flash_Chord` text
- Prefix the Twitter handle text with the Twitter icon, found here: https://about.twitter.com/en_us/company/brand-resources.html
- Put this link in the copyright footer and also on the About page where appropriate | 2.0 | Add @Flash_Chord Twitter link - ## Background
In order for people to follow updates for Flash Chord, we have a Twitter account for announcing new features and other information: https://twitter.com/flash_chord
## Acceptance Criteria
- The Twitter icon followed by the `@Flash_Chord` handle text are linked to https://twitter.com/flash_chord in the footer (copyright section) and on the About page
- The README.md file includes a link to the Twitter account for reference, but without icon
## Approach
- https://twitter.com/flash_chord link as `@Flash_Chord` text
- Prefix the Twitter handle text with the Twitter icon, found here: https://about.twitter.com/en_us/company/brand-resources.html
- Put this link in the copyright footer and also on the About page where appropriate | non_priority | add flash chord twitter link background in order for people to follow updates for flash chord we have a twitter account for announcing new features and other information acceptance criteria the twitter icon followed by the flash chord handle text are linked to in the footer copyright section and on the about page the readme md file includes a link to the twitter account for reference but without icon approach link as flash chord text prefix the twitter handle text with the twitter icon found here put this link in the copyright footer and also on the about page where appropriate | 0 |
823,247 | 30,961,804,284 | IssuesEvent | 2023-08-08 05:03:13 | rpm-software-management/dnf5 | https://api.github.com/repos/rpm-software-management/dnf5 | closed | Handle duplicate REPOIDs somehow | Priority: HIGH | DNF4 warns like this:
> Repository REPOID is listed more than once in the configuration
And uses just one of them? Or merges the config?
With DNF5 it seems the `REPOID` is loaded twice as `libdnf::Repo`, per:
```
$ dnf5 repo list
REPOID Some repo name
REPOID Some repo name - the duplicate
``` | 1.0 | Handle duplicate REPOIDs somehow - DNF4 warns like this:
> Repository REPOID is listed more than once in the configuration
And uses just one of them? Or merges the config?
With DNF5 it seems the `REPOID` is loaded twice as `libdnf::Repo`, per:
```
$ dnf5 repo list
REPOID Some repo name
REPOID Some repo name - the duplicate
``` | priority | handle duplicate repoids somehow warns like this repository repoid is listed more than once in the configuration and uses just one of them or merges the config with it seems the repoid is loaded twice as libdnf repo per repo list repoid some repo name repoid some repo name the duplicate | 1 |
74,241 | 15,325,439,518 | IssuesEvent | 2021-02-26 01:19:01 | idonthaveafifaaddiction/MapLoom | https://api.github.com/repos/idonthaveafifaaddiction/MapLoom | opened | WS-2017-0116 (Medium) detected in angular-v1.2.21 | security vulnerability | ## WS-2017-0116 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>angular-v1.2.21</b></p></summary>
<p>null</p>
<p>Path to dependency file: MapLoom/bower.json</p>
<p>Path to vulnerable library: MapLoom/vendor/angular/.bower.json,MapLoom/vendor/angular/.bower.json</p>
<p>
Dependency Hierarchy:
- :x: **angular-v1.2.21** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The use element can reference external svg's (same origin) and can include xlink javascript urls or foreign object that can execute xss.
<p>Publish Date: 2015-12-05
<p>URL: <a href=https://github.com/angular/angular.js/commit/7a668cdd7d08a7016883eb3c671cbcd586223ae8>WS-2017-0116</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/angular/angular.js/pull/13453">https://github.com/angular/angular.js/pull/13453</a></p>
<p>Release Date: 2015-12-05</p>
<p>Fix Resolution: angular - 1.5.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Bower","packageName":"angular","packageVersion":"v1.2.21","packageFilePaths":["/bower.json"],"isTransitiveDependency":false,"dependencyTree":"angular:v1.2.21","isMinimumFixVersionAvailable":true,"minimumFixVersion":"angular - 1.5.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2017-0116","vulnerabilityDetails":"The use element can reference external svg\u0027s (same origin) and can include xlink javascript urls or foreign object that can execute xss.","vulnerabilityUrl":"https://github.com/angular/angular.js/commit/7a668cdd7d08a7016883eb3c671cbcd586223ae8","cvss3Severity":"medium","cvss3Score":"5.8","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | WS-2017-0116 (Medium) detected in angular-v1.2.21 - ## WS-2017-0116 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>angular-v1.2.21</b></p></summary>
<p>null</p>
<p>Path to dependency file: MapLoom/bower.json</p>
<p>Path to vulnerable library: MapLoom/vendor/angular/.bower.json,MapLoom/vendor/angular/.bower.json</p>
<p>
Dependency Hierarchy:
- :x: **angular-v1.2.21** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The use element can reference external svg's (same origin) and can include xlink javascript urls or foreign object that can execute xss.
<p>Publish Date: 2015-12-05
<p>URL: <a href=https://github.com/angular/angular.js/commit/7a668cdd7d08a7016883eb3c671cbcd586223ae8>WS-2017-0116</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/angular/angular.js/pull/13453">https://github.com/angular/angular.js/pull/13453</a></p>
<p>Release Date: 2015-12-05</p>
<p>Fix Resolution: angular - 1.5.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Bower","packageName":"angular","packageVersion":"v1.2.21","packageFilePaths":["/bower.json"],"isTransitiveDependency":false,"dependencyTree":"angular:v1.2.21","isMinimumFixVersionAvailable":true,"minimumFixVersion":"angular - 1.5.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2017-0116","vulnerabilityDetails":"The use element can reference external svg\u0027s (same origin) and can include xlink javascript urls or foreign object that can execute xss.","vulnerabilityUrl":"https://github.com/angular/angular.js/commit/7a668cdd7d08a7016883eb3c671cbcd586223ae8","cvss3Severity":"medium","cvss3Score":"5.8","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | ws medium detected in angular ws medium severity vulnerability vulnerable library angular null path to dependency file maploom bower json path to vulnerable library maploom vendor angular bower json maploom vendor angular bower json dependency hierarchy x angular vulnerable library found in base branch master vulnerability details the use element can reference external svg s same origin and can include xlink javascript urls or foreign object that can execute xss publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution angular isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree angular isminimumfixversionavailable true minimumfixversion angular basebranches vulnerabilityidentifier ws vulnerabilitydetails the use element can reference external svg same origin and can include xlink javascript urls or foreign object that can execute xss vulnerabilityurl | 0 |
445,707 | 12,835,347,805 | IssuesEvent | 2020-07-07 12:44:05 | radical-cybertools/radical.pilot | https://api.github.com/repos/radical-cybertools/radical.pilot | closed | Long queue times result in non-starting pilots on BW | comp:agent layer:utils priority:v2 topic:communication type:bug type:performance | In short a job just simply didn't start (no errors in the logs) on BW with `gsissh` from local cluster.
The DEBUG log (not captured) shows a heartbeat from SAGA (I think) about the job queue status (PENDING), that (the heartbeat) at some point just stops. That is the last line in the log, no errors.
Wonder if the folders will be enough to find the problem. They are here:
[rp.remote.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz](https://github.com/radical-cybertools/radical.pilot/files/1984692/rp.remote.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz)
[rp.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz](https://github.com/radical-cybertools/radical.pilot/files/1984694/rp.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz)
Tagging @andre-merzky @jdakka
| 1.0 | Long queue times result in non-starting pilots on BW - In short a job just simply didn't start (no errors in the logs) on BW with `gsissh` from local cluster.
The DEBUG log (not captured) shows a heartbeat from SAGA (I think) about the job queue status (PENDING), that (the heartbeat) at some point just stops. That is the last line in the log, no errors.
Wonder if the folders will be enough to find the problem. They are here:
[rp.remote.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz](https://github.com/radical-cybertools/radical.pilot/files/1984692/rp.remote.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz)
[rp.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz](https://github.com/radical-cybertools/radical.pilot/files/1984694/rp.session.julian.chem.ucl.ac.uk.kristof.farkas-pall.017651.0003.tar.gz)
Tagging @andre-merzky @jdakka
| priority | long queue times result in non starting pilots on bw in short a job just simply didn t start no errors in the logs on bw with gsissh from local cluster the debug log not captured shows a heartbeat from saga i think about the job queue status pending that the heartbeat at some point just stops that is the last line in the log no errors wonder if the folders will be enough to find the problem they are here tagging andre merzky jdakka | 1 |
288,131 | 8,826,361,208 | IssuesEvent | 2019-01-03 01:33:12 | Lustrel/money-management | https://api.github.com/repos/Lustrel/money-management | closed | Move Select2 files to "assets" folder | high-priority | It seems that Heroku doesn't recognize the `bundles` folder. This way, we need to move all Select2 related files to the `assets` folder, since it seems that Heroku can load files from there. | 1.0 | Move Select2 files to "assets" folder - It seems that Heroku doesn't recognize the `bundles` folder. This way, we need to move all Select2 related files to the `assets` folder, since it seems that Heroku can load files from there. | priority | move files to assets folder it seems that heroku doesn t recognize the bundles folder this way we need to move all related files to the assets folder since it seems that heroku can load files from there | 1 |
600,902 | 18,361,495,299 | IssuesEvent | 2021-10-09 09:31:49 | AY2122S1-CS2103T-T17-3/tp | https://api.github.com/repos/AY2122S1-CS2103T-T17-3/tp | closed | Add command doesn't work | bug priority.HIGH severity.High | Todo:
- update UG (UG still says `create` to create a person)
- fix the add command
When I typed in `add n/John Doe` I got the following error.
```
Invalid command format!
add: Adds a person to the address book. Parameters: n/NAME p/PHONE e/EMAIL a/ADDRESS [t/TAG]...
Example: add n/John Doe p/98765432 e/johnd@example.com a/311, Clementi Ave 2, #02-25 t/friends t/owesMoney
``` | 1.0 | Add command doesn't work - Todo:
- update UG (UG still says `create` to create a person)
- fix the add command
When I typed in `add n/John Doe` I got the following error.
```
Invalid command format!
add: Adds a person to the address book. Parameters: n/NAME p/PHONE e/EMAIL a/ADDRESS [t/TAG]...
Example: add n/John Doe p/98765432 e/johnd@example.com a/311, Clementi Ave 2, #02-25 t/friends t/owesMoney
``` | priority | add command doesn t work todo update ug ug still says create to create a person fix the add command when i typed in add n john doe i got the following error invalid command format add adds a person to the address book parameters n name p phone e email a address example add n john doe p e johnd example com a clementi ave t friends t owesmoney | 1 |
56,970 | 15,531,838,061 | IssuesEvent | 2021-03-14 01:56:35 | primefaces/primefaces | https://api.github.com/repos/primefaces/primefaces | closed | SlideMenu - scrollbar appears, no height adjustment | Stale defect | SlideMenu shows vertical scrollbar if count of menuitems in next slides (submenus) is greater than the count of menuitems in prev. (initial) slide. I think a dynamic (at runtime) adjustment of SlideMenu's height is missing.
| 1.0 | SlideMenu - scrollbar appears, no height adjustment - SlideMenu shows vertical scrollbar if count of menuitems in next slides (submenus) is greater than the count of menuitems in prev. (initial) slide. I think a dynamic (at runtime) adjustment of SlideMenu's height is missing.
| non_priority | slidemenu scrollbar appears no height adjustment slidemenu shows vertical scrollbar if count of menuitems in next slides submenus is greater than the count of menuitems in prev initial slide i think a dynamic at runtime adjustment of slidemenu s height is missing | 0 |
225,614 | 17,272,032,286 | IssuesEvent | 2021-07-22 21:16:44 | endojs/endo | https://api.github.com/repos/endojs/endo | closed | add readme/mission-statement to SES repo | documentation | We need more justification/motivation
Add code snippets similar to the DWeb Summit talk | 1.0 | add readme/mission-statement to SES repo - We need more justification/motivation
Add code snippets similar to the DWeb Summit talk | non_priority | add readme mission statement to ses repo we need more justification motivation add code snippets similar to the dweb summit talk | 0 |
264,778 | 28,212,805,029 | IssuesEvent | 2023-04-05 06:32:36 | hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933 | https://api.github.com/repos/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933 | closed | CVE-2020-0179 (High) detected in avandroid-10.0.0_r33 - autoclosed | Mend: dependency security vulnerability | ## CVE-2020-0179 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>avandroid-10.0.0_r33</b></p></summary>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/av>https://android.googlesource.com/platform/frameworks/av</a></p>
<p>Found in HEAD commit: <a href="https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933/commit/e5975426a81f934f3cf32ef72736eb9cdbf7678b">e5975426a81f934f3cf32ef72736eb9cdbf7678b</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/media/mtp/MtpServer.cpp</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In doSendObjectInfo of MtpServer.cpp, there is a possible path traversal attack due to insufficient input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is required for exploitation.Product: AndroidVersions: Android-10Android ID: A-130656917
<p>Publish Date: 2020-06-11
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-0179>CVE-2020-0179</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://android.googlesource.com/platform/frameworks/av/+/refs/tags/android-10.0.0_r37">https://android.googlesource.com/platform/frameworks/av/+/refs/tags/android-10.0.0_r37</a></p>
<p>Release Date: 2020-06-11</p>
<p>Fix Resolution: android-10.0.0_r37</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-0179 (High) detected in avandroid-10.0.0_r33 - autoclosed - ## CVE-2020-0179 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>avandroid-10.0.0_r33</b></p></summary>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/av>https://android.googlesource.com/platform/frameworks/av</a></p>
<p>Found in HEAD commit: <a href="https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933/commit/e5975426a81f934f3cf32ef72736eb9cdbf7678b">e5975426a81f934f3cf32ef72736eb9cdbf7678b</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/media/mtp/MtpServer.cpp</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In doSendObjectInfo of MtpServer.cpp, there is a possible path traversal attack due to insufficient input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is required for exploitation.Product: AndroidVersions: Android-10Android ID: A-130656917
<p>Publish Date: 2020-06-11
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-0179>CVE-2020-0179</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://android.googlesource.com/platform/frameworks/av/+/refs/tags/android-10.0.0_r37">https://android.googlesource.com/platform/frameworks/av/+/refs/tags/android-10.0.0_r37</a></p>
<p>Release Date: 2020-06-11</p>
<p>Fix Resolution: android-10.0.0_r37</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in avandroid autoclosed cve high severity vulnerability vulnerable library avandroid library home page a href found in head commit a href found in base branch main vulnerable source files media mtp mtpserver cpp vulnerability details in dosendobjectinfo of mtpserver cpp there is a possible path traversal attack due to insufficient input validation this could lead to local escalation of privilege with no additional execution privileges needed user interaction is required for exploitation product androidversions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend | 0 |
603,623 | 18,669,936,099 | IssuesEvent | 2021-10-30 14:12:11 | AY2122S1-CS2103T-T09-4/tp | https://api.github.com/repos/AY2122S1-CS2103T-T09-4/tp | closed | [PE-D] UG updating to match your app (2) | priority.High severity.High | 
Again, you may want to change this to `del 3`
<!--session: 1635494405543-941eecba-97e4-468b-b880-fe6464b30d81-->
<!--Version: Web v3.4.1-->
-------------
Labels: `severity.VeryLow` `type.DocumentationBug`
original: Pulpy-y/ped#3 | 1.0 | [PE-D] UG updating to match your app (2) - 
Again, you may want to change this to `del 3`
<!--session: 1635494405543-941eecba-97e4-468b-b880-fe6464b30d81-->
<!--Version: Web v3.4.1-->
-------------
Labels: `severity.VeryLow` `type.DocumentationBug`
original: Pulpy-y/ped#3 | priority | ug updating to match your app again you may want to change this to del labels severity verylow type documentationbug original pulpy y ped | 1 |
684,402 | 23,416,878,126 | IssuesEvent | 2022-08-13 04:34:31 | HaDuve/TravelCostNative | https://api.github.com/repos/HaDuve/TravelCostNative | closed | Add Trip Input Form | enhancement High Priority Frontend | - [x] new modal for the input fields
- [x] trip name
- [x] total budget
- [ ] invite other travellers
| 1.0 | Add Trip Input Form - - [x] new modal for the input fields
- [x] trip name
- [x] total budget
- [ ] invite other travellers
| priority | add trip input form new modal for the input fields trip name total budget invite other travellers | 1 |
425,341 | 12,339,051,995 | IssuesEvent | 2020-05-14 17:27:37 | mozilla/addons-server | https://api.github.com/repos/mozilla/addons-server | closed | prevent the `include_in_legacy` Block property from being set | priority: p4 state: pull request ready | The Block property `include_in_legacy` can be set/unset currently which doesn't make any sense when legacy blocklist submission is disabled (the default). Otherwise the Block doesn't actually get uploaded to the legacy blocklist. It should be read-only unless `blocklist_legacy_submit` is also enabled. | 1.0 | prevent the `include_in_legacy` Block property from being set - The Block property `include_in_legacy` can be set/unset currently which doesn't make any sense when legacy blocklist submission is disabled (the default). Otherwise the Block doesn't actually get uploaded to the legacy blocklist. It should be read-only unless `blocklist_legacy_submit` is also enabled. | priority | prevent the include in legacy block property from being set the block property include in legacy can be set unset currently which doesn t make any sense when legacy blocklist submission is disabled the default otherwise the block doesn t actually get uploaded to the legacy blocklist it should be read only unless blocklist legacy submit is also enabled | 1 |
544,250 | 15,891,583,183 | IssuesEvent | 2021-04-10 19:50:59 | zeoflow/memo | https://api.github.com/repos/zeoflow/memo | closed | `@CompoundMethod` annotation | @feature @priority-medium | **Is your feature request related to a problem? Please describe.**
The `@CompoundMethod` annotation should be used for retrieving values based on different fields
###### We also happily accept [pull requests](https://github.com/zeoflow/memo/pulls).
| 1.0 | `@CompoundMethod` annotation - **Is your feature request related to a problem? Please describe.**
The `@CompoundMethod` annotation should be used for retrieving values based on different fields
###### We also happily accept [pull requests](https://github.com/zeoflow/memo/pulls).
| priority | compoundmethod annotation is your feature request related to a problem please describe the compoundmethod annotation should be used for retrieving values based on different fields we also happily accept | 1 |
593,527 | 18,010,506,320 | IssuesEvent | 2021-09-16 08:03:18 | ballerina-platform/ballerina-lang | https://api.github.com/repos/ballerina-platform/ballerina-lang | closed | When the type is inferred via `var` and the inferred type is from an un-imported module shell emit `Unknown Type 'XXX`` error | Type/Bug Priority/Blocker Team/CompilerFETools Points/2 Area/Shell | **Description:**
```shell
=$ var t = int.typeIds() took 0 ms
=$ t took 530 ms
| error: unknown type 'TypeId'
| TypeId[]? & readonly 't = <TypeId[]? & readonly> __recall_any("'t");
| ^----^
| Compilation aborted due to errors.
```
**Steps to reproduce:**
**Affected Versions:**
Swan Lake beta-2
**OS, DB, other environment details and versions:**
**Related Issues (optional):**
<!-- Any related issues such as sub tasks, issues reported in other repositories (e.g component repositories), similar problems, etc. -->
**Suggested Labels (optional):**
<!-- Optional comma separated list of suggested labels. Non committers can’t assign labels to issues, so this will help issue creators who are not a committer to suggest possible labels-->
**Suggested Assignees (optional):**
<!--Optional comma separated list of suggested team members who should attend the issue. Non committers can’t assign issues to assignees, so this will help issue creators who are not a committer to suggest possible assignees-->
| 1.0 | When the type is inferred via `var` and the inferred type is from an un-imported module shell emit `Unknown Type 'XXX`` error - **Description:**
```shell
=$ var t = int.typeIds() took 0 ms
=$ t took 530 ms
| error: unknown type 'TypeId'
| TypeId[]? & readonly 't = <TypeId[]? & readonly> __recall_any("'t");
| ^----^
| Compilation aborted due to errors.
```
**Steps to reproduce:**
**Affected Versions:**
Swan Lake beta-2
**OS, DB, other environment details and versions:**
**Related Issues (optional):**
<!-- Any related issues such as sub tasks, issues reported in other repositories (e.g component repositories), similar problems, etc. -->
**Suggested Labels (optional):**
<!-- Optional comma separated list of suggested labels. Non committers can’t assign labels to issues, so this will help issue creators who are not a committer to suggest possible labels-->
**Suggested Assignees (optional):**
<!--Optional comma separated list of suggested team members who should attend the issue. Non committers can’t assign issues to assignees, so this will help issue creators who are not a committer to suggest possible assignees-->
| priority | when the type is inferred via var and the inferred type is from an un imported module shell emit unknown type xxx error description shell var t int typeids took ms t took ms error unknown type typeid typeid readonly t recall any t compilation aborted due to errors steps to reproduce affected versions swan lake beta os db other environment details and versions related issues optional suggested labels optional suggested assignees optional | 1 |
68,858 | 8,357,316,509 | IssuesEvent | 2018-10-02 21:10:24 | ManageIQ/manageiq-v2v | https://api.github.com/repos/ManageIQ/manageiq-v2v | opened | Show the Mapping type in the Infrastructure Mappings list view | enhancement needs-design v1.1 | We should show the mapping type in the list view now that we have multiple types (RHV and OpenStack). Question is where to put it? | 1.0 | Show the Mapping type in the Infrastructure Mappings list view - We should show the mapping type in the list view now that we have multiple types (RHV and OpenStack). Question is where to put it? | non_priority | show the mapping type in the infrastructure mappings list view we should show the mapping type in the list view now that we have multiple types rhv and openstack question is where to put it | 0 |
51,158 | 6,496,708,279 | IssuesEvent | 2017-08-22 11:11:53 | tarantool/doc | https://api.github.com/repos/tarantool/doc | closed | Inconsistent version switcher at doc main | design LT | after PR merge https://github.com/tarantool/doc/pull/216: at the doc main page, a horizontal version switcher at the top is present in 1.7/1.8 and missing in 1.6 (it duplicates the "Manual for other versions" list from the left menu, so the horizontal switcher should be removed from the doc **main page** in all versions) | 1.0 | Inconsistent version switcher at doc main - after PR merge https://github.com/tarantool/doc/pull/216: at the doc main page, a horizontal version switcher at the top is present in 1.7/1.8 and missing in 1.6 (it duplicates the "Manual for other versions" list from the left menu, so the horizontal switcher should be removed from the doc **main page** in all versions) | non_priority | inconsistent version switcher at doc main after pr merge at the doc main page a horizontal version switcher at the top is present in and missing in it duplicates the manual for other versions list from the left menu so the horizontal switcher should be removed from the doc main page in all versions | 0 |
70,738 | 15,105,644,432 | IssuesEvent | 2021-02-08 13:19:45 | rammatzkvosky/epsagon-java | https://api.github.com/repos/rammatzkvosky/epsagon-java | opened | CVE-2020-36182 (High) detected in jackson-databind-2.9.10.5.jar | security vulnerability | ## CVE-2020-36182 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.10.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: epsagon-java/epsagon/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10.5/jackson-databind-2.9.10.5.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.10.5.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/rammatzkvosky/epsagon-java/commit/d9503d651e6d79077ee11302da9edca9a60e6954">d9503d651e6d79077ee11302da9edca9a60e6954</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.
<p>Publish Date: 2021-01-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182>CVE-2020-36182</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/3004">https://github.com/FasterXML/jackson-databind/issues/3004</a></p>
<p>Release Date: 2021-01-07</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.10.5","packageFilePaths":["/epsagon/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.10.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36182","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-36182 (High) detected in jackson-databind-2.9.10.5.jar - ## CVE-2020-36182 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.10.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: epsagon-java/epsagon/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10.5/jackson-databind-2.9.10.5.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.10.5.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/rammatzkvosky/epsagon-java/commit/d9503d651e6d79077ee11302da9edca9a60e6954">d9503d651e6d79077ee11302da9edca9a60e6954</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.
<p>Publish Date: 2021-01-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182>CVE-2020-36182</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/3004">https://github.com/FasterXML/jackson-databind/issues/3004</a></p>
<p>Release Date: 2021-01-07</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.10.5","packageFilePaths":["/epsagon/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.10.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36182","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36182","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file epsagon java epsagon pom xml path to vulnerable library canner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp cpdsadapter driveradaptercpds publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp cpdsadapter driveradaptercpds vulnerabilityurl | 0 |
5,636 | 2,957,571,778 | IssuesEvent | 2015-07-08 16:59:57 | GoogleCloudPlatform/kubernetes | https://api.github.com/repos/GoogleCloudPlatform/kubernetes | closed | `kubectl describe` docs: explain what happens if the object doesn't exist | component/CLI kind/documentation priority/P2 team/friction team/UX | In kube-apiserver.INFO, I see a failed API call being attempted roughly every second:
```
kube-apiserver.INFO:I0624 15:26:22.970228 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.662407ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45055]
kube-apiserver.INFO:I0624 15:26:24.262562 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.80702ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45057]
kube-apiserver.INFO:I0624 15:26:25.558359 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.764591ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45064]
kube-apiserver.INFO:I0624 15:26:25.566240 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything-1jq7j: (2.054047ms) 200 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45064]
kube-apiserver.INFO:I0624 15:26:26.855882 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (2.237989ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45066]
kube-apiserver.INFO:I0624 15:26:28.151144 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.868889ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45068]
kube-apiserver.INFO:I0624 15:26:29.445528 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.792321ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45070]
```
Note that legit endpoints, eg "/api/v1/namespaces/ns-mything/pods/mything-1jq7j", are also in the mix, and those are successful. Also note that many other endpoints are being checked, all successfully -- the specific endpoint is the only one returning a 404.
That invalid endpoint indeed returns 404:
```
$ curl -v http://10.0.0.2:8080/api/v1/namespaces/ns-mything/pods/mything
> GET /api/v1/namespaces/ns-mything/pods/mything HTTP/1.1
> User-Agent: curl/7.22.0 (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4 libidn/1.23 librtmp/2.3
> Host: 10.0.0.2:8080
> Accept: */*
>
< HTTP/1.1 404 Not Found
< Content-Type: application/json
< Date: Wed, 24 Jun 2015 15:47:21 GMT
< Content-Length: 233
<
{
"kind": "Status",
"apiVersion": "v1",
"metadata": {},
"status": "Failure",
"message": "pods \"mything\" not found",
"reason": "NotFound",
"details": {
"name": "mything",
"kind": "pods"
},
"code": 404
}
```
The problem is that "mything" is not a pod -- rather, "mything-1jq7j" and "mything-rdd7e" are pods, "mything" is just the common base name.
```
$ kubectl --server=10.0.0.2:8080 --namespace=ns-mything get pods
NAME READY REASON RESTARTS AGE
mything-1jq7j 1/1 Running 0 17h
mything-rdd7e 1/1 Running 0 17h
kubectl --server=10.0.0.2:8080 --namespace=ns-mything get rc
CONTROLLER CONTAINER(S) IMAGE(S) SELECTOR REPLICAS
mything mything dev.foo.com:5000/foo/mything:314159a10cee8edd3059d0fce4036c72c2527392 name=mything 2
```
My rc/pod config:
```
{
"apiVersion": "v1",
"kind": "ReplicationController",
"metadata": {
"name": "mything",
"namespace": "ns-mything",
"labels": {
"name": "mything"
}
},
"spec": {
"replicas": 2,
"selector": {
"name": "mything"
},
"template": {
"metadata": {
"labels": {
"name": "mything"
}
},
"spec": {
"containers": [{
"name": "mything",
"image": "dev.foo.com:5000/foo/mything:314159a10cee8edd3059d0fce4036c72c2527392",
"ports": [],
"env": [
{"name": "FOO", "value": "bar"}
]
}]
}
}
}
}
```
Is this a wayward API call / bug in kubernetes, or an indication that I've missed something in my setup? | 1.0 | `kubectl describe` docs: explain what happens if the object doesn't exist - In kube-apiserver.INFO, I see a failed API call being attempted roughly every second:
```
kube-apiserver.INFO:I0624 15:26:22.970228 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.662407ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45055]
kube-apiserver.INFO:I0624 15:26:24.262562 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.80702ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45057]
kube-apiserver.INFO:I0624 15:26:25.558359 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.764591ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45064]
kube-apiserver.INFO:I0624 15:26:25.566240 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything-1jq7j: (2.054047ms) 200 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45064]
kube-apiserver.INFO:I0624 15:26:26.855882 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (2.237989ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45066]
kube-apiserver.INFO:I0624 15:26:28.151144 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.868889ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45068]
kube-apiserver.INFO:I0624 15:26:29.445528 3508 handlers.go:135] GET /api/v1/namespaces/ns-mything/pods/mything: (1.792321ms) 404 [[kubectl/v0.19.3 (linux/amd64) kubernetes/3103c8c] 10.0.0.2:45070]
```
Note that legit endpoints, eg "/api/v1/namespaces/ns-mything/pods/mything-1jq7j", are also in the mix, and those are successful. Also note that many other endpoints are being checked, all successfully -- the specific endpoint is the only one returning a 404.
That invalid endpoint indeed returns 404:
```
$ curl -v http://10.0.0.2:8080/api/v1/namespaces/ns-mything/pods/mything
> GET /api/v1/namespaces/ns-mything/pods/mything HTTP/1.1
> User-Agent: curl/7.22.0 (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4 libidn/1.23 librtmp/2.3
> Host: 10.0.0.2:8080
> Accept: */*
>
< HTTP/1.1 404 Not Found
< Content-Type: application/json
< Date: Wed, 24 Jun 2015 15:47:21 GMT
< Content-Length: 233
<
{
"kind": "Status",
"apiVersion": "v1",
"metadata": {},
"status": "Failure",
"message": "pods \"mything\" not found",
"reason": "NotFound",
"details": {
"name": "mything",
"kind": "pods"
},
"code": 404
}
```
The problem is that "mything" is not a pod -- rather, "mything-1jq7j" and "mything-rdd7e" are pods, "mything" is just the common base name.
```
$ kubectl --server=10.0.0.2:8080 --namespace=ns-mything get pods
NAME READY REASON RESTARTS AGE
mything-1jq7j 1/1 Running 0 17h
mything-rdd7e 1/1 Running 0 17h
kubectl --server=10.0.0.2:8080 --namespace=ns-mything get rc
CONTROLLER CONTAINER(S) IMAGE(S) SELECTOR REPLICAS
mything mything dev.foo.com:5000/foo/mything:314159a10cee8edd3059d0fce4036c72c2527392 name=mything 2
```
My rc/pod config:
```
{
"apiVersion": "v1",
"kind": "ReplicationController",
"metadata": {
"name": "mything",
"namespace": "ns-mything",
"labels": {
"name": "mything"
}
},
"spec": {
"replicas": 2,
"selector": {
"name": "mything"
},
"template": {
"metadata": {
"labels": {
"name": "mything"
}
},
"spec": {
"containers": [{
"name": "mything",
"image": "dev.foo.com:5000/foo/mything:314159a10cee8edd3059d0fce4036c72c2527392",
"ports": [],
"env": [
{"name": "FOO", "value": "bar"}
]
}]
}
}
}
}
```
Is this a wayward API call / bug in kubernetes, or an indication that I've missed something in my setup? | non_priority | kubectl describe docs explain what happens if the object doesn t exist in kube apiserver info i see a failed api call being attempted roughly every second kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything kube apiserver info handlers go get api namespaces ns mything pods mything note that legit endpoints eg api namespaces ns mything pods mything are also in the mix and those are successful also note that many other endpoints are being checked all successfully the specific endpoint is the only one returning a that invalid endpoint indeed returns curl v get api namespaces ns mything pods mything http user agent curl pc linux gnu libcurl openssl zlib libidn librtmp host accept http not found content type application json date wed jun gmt content length kind status apiversion metadata status failure message pods mything not found reason notfound details name mything kind pods code the problem is that mything is not a pod rather mything and mything are pods mything is just the common base name kubectl server namespace ns mything get pods name ready reason restarts age mything running mything running kubectl server namespace ns mything get rc controller container s image s selector replicas mything mything dev foo com foo mything name mything my rc pod config apiversion kind replicationcontroller metadata name mything namespace ns mything labels name mything spec replicas selector name mything template metadata labels name mything spec containers name mything image dev foo com foo mything ports env name foo value bar is this a wayward api call bug in kubernetes or an indication that i ve missed something in my setup | 0 |
143,474 | 5,517,705,042 | IssuesEvent | 2017-03-18 01:04:03 | prologinsandbox/site-issues | https://api.github.com/repos/prologinsandbox/site-issues | closed | Nombre de problèmes résolus incorrect | priority:minor state:resolved type:bug | > ###### Originally posted 2015-10-31 11:55 by *some anonymous* on Bitbucket
Au questionnaire de sélection 2016, j'ai résolu entièrement 4 problèmes, et j'ai fait plusieurs tentatives ratées sur le dernier. Pourtant, sur la page d'accueil, il est affiché "5/5 problèmes résolus". | 1.0 | Nombre de problèmes résolus incorrect - > ###### Originally posted 2015-10-31 11:55 by *some anonymous* on Bitbucket
Au questionnaire de sélection 2016, j'ai résolu entièrement 4 problèmes, et j'ai fait plusieurs tentatives ratées sur le dernier. Pourtant, sur la page d'accueil, il est affiché "5/5 problèmes résolus". | priority | nombre de problèmes résolus incorrect originally posted by some anonymous on bitbucket au questionnaire de sélection j ai résolu entièrement problèmes et j ai fait plusieurs tentatives ratées sur le dernier pourtant sur la page d accueil il est affiché problèmes résolus | 1 |
487,326 | 14,040,502,624 | IssuesEvent | 2020-11-01 03:00:53 | codidact/qpixel | https://api.github.com/repos/codidact/qpixel | opened | Tools button isn't clickable for some users (Chrome) | area: frontend complexity: unassessed priority: medium type: bug | https://meta.codidact.com/questions/278096
The reporting user has enough reputation to use one of the tools (Change Category), but clicking on the button doesn't do anything. The question reports:
Chrome for Windows (Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36)
And a comment adds Chrome on Android.
(I can't reproduce in Chrome on a Mac.)
The console shows an Uncaught TypeError: https://i.stack.imgur.com/BOuM2.png
| 1.0 | Tools button isn't clickable for some users (Chrome) - https://meta.codidact.com/questions/278096
The reporting user has enough reputation to use one of the tools (Change Category), but clicking on the button doesn't do anything. The question reports:
Chrome for Windows (Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36)
And a comment adds Chrome on Android.
(I can't reproduce in Chrome on a Mac.)
The console shows an Uncaught TypeError: https://i.stack.imgur.com/BOuM2.png
| priority | tools button isn t clickable for some users chrome the reporting user has enough reputation to use one of the tools change category but clicking on the button doesn t do anything the question reports chrome for windows mozilla windows nt applewebkit khtml like gecko chrome safari and a comment adds chrome on android i can t reproduce in chrome on a mac the console shows an uncaught typeerror | 1 |
105,069 | 16,624,021,386 | IssuesEvent | 2021-06-03 07:17:53 | Thanraj/OpenSSL_1.0.1_stable | https://api.github.com/repos/Thanraj/OpenSSL_1.0.1_stable | opened | CVE-2008-5077 (Medium) detected in opensslOpenSSL_1_0_1u | security vulnerability | ## CVE-2008-5077 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1u</b></p></summary>
<p>
<p>Android (AOSP) build for libcrypto and libssl on branch VidityOpenSSL</p>
<p>Library home page: <a href=https://github.com/nikolakolarovic/openssl.git>https://github.com/nikolakolarovic/openssl.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Thanraj/OpenSSL_1.0.1_stable/commit/42e09f8ba04040e5027381a7166c52edccb3f402">42e09f8ba04040e5027381a7166c52edccb3f402</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
<p>Publish Date: 2009-01-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2008-5077>CVE-2008-5077</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.8</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openssl.org/news/secadv/20090107.txt">https://www.openssl.org/news/secadv/20090107.txt</a></p>
<p>Release Date: 2009-01-07</p>
<p>Fix Resolution: 0.9.8j</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2008-5077 (Medium) detected in opensslOpenSSL_1_0_1u - ## CVE-2008-5077 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1u</b></p></summary>
<p>
<p>Android (AOSP) build for libcrypto and libssl on branch VidityOpenSSL</p>
<p>Library home page: <a href=https://github.com/nikolakolarovic/openssl.git>https://github.com/nikolakolarovic/openssl.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Thanraj/OpenSSL_1.0.1_stable/commit/42e09f8ba04040e5027381a7166c52edccb3f402">42e09f8ba04040e5027381a7166c52edccb3f402</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>OpenSSL_1.0.1_stable/apps/spkac.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
<p>Publish Date: 2009-01-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2008-5077>CVE-2008-5077</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.8</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openssl.org/news/secadv/20090107.txt">https://www.openssl.org/news/secadv/20090107.txt</a></p>
<p>Release Date: 2009-01-07</p>
<p>Fix Resolution: 0.9.8j</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in opensslopenssl cve medium severity vulnerability vulnerable library opensslopenssl android aosp build for libcrypto and libssl on branch vidityopenssl library home page a href found in head commit a href found in base branch master vulnerable source files openssl stable apps spkac c openssl stable apps spkac c openssl stable apps spkac c vulnerability details openssl and earlier does not properly check the return value from the evp verifyfinal function which allows remote attackers to bypass validation of the certificate chain via a malformed ssl tls signature for dsa and ecdsa keys publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
765,095 | 26,833,056,972 | IssuesEvent | 2023-02-02 17:18:50 | vortexntnu/pca9685-interface | https://api.github.com/repos/vortexntnu/pca9685-interface | closed | Limit ESC Driver code to run thrusters at 70% | enhancement High Priority | Max thrust must be set to 70%. More than that and we risk draining to much current from the batteries X-X
- Set Max backwards thrust PWM: 1220
- Set Max forward thrust PWM: 1780
Set max thrust on ESC Hardware with the specific software it uses
- Set Max backwards thrust PWM: 1220
- Set Max forward thrust PWM: 1780 | 1.0 | Limit ESC Driver code to run thrusters at 70% - Max thrust must be set to 70%. More than that and we risk draining to much current from the batteries X-X
- Set Max backwards thrust PWM: 1220
- Set Max forward thrust PWM: 1780
Set max thrust on ESC Hardware with the specific software it uses
- Set Max backwards thrust PWM: 1220
- Set Max forward thrust PWM: 1780 | priority | limit esc driver code to run thrusters at max thrust must be set to more than that and we risk draining to much current from the batteries x x set max backwards thrust pwm set max forward thrust pwm set max thrust on esc hardware with the specific software it uses set max backwards thrust pwm set max forward thrust pwm | 1 |
233,092 | 7,693,577,662 | IssuesEvent | 2018-05-18 04:38:28 | ElektraInitiative/libelektra | https://api.github.com/repos/ElektraInitiative/libelektra | opened | doc: changes to icheck script | low priority | Forgot to add section to doc/news/_preparation_next_release.md mentioning that the icheck script now no longer leaves the base directory. | 1.0 | doc: changes to icheck script - Forgot to add section to doc/news/_preparation_next_release.md mentioning that the icheck script now no longer leaves the base directory. | priority | doc changes to icheck script forgot to add section to doc news preparation next release md mentioning that the icheck script now no longer leaves the base directory | 1 |
162,765 | 6,167,977,210 | IssuesEvent | 2017-06-30 00:53:57 | afranka70/AbOutIssues | https://api.github.com/repos/afranka70/AbOutIssues | closed | Add "Administrator" designation to Users | AbOutPE Administrator New Feature Priority2 Users | # AbOut Version
DevPEv0.2
# Description
The current User list does not show the user role:

In DevPEv0.3 with the AbOutPE1 database, a few users can take the role of administrator. The only other role is 'instructor'. Since the instructors may need to contact an administrator this role should show on the list:

Assuming that at the time this screen was requested only Frank Ackerman and Kodie Neumiller had their User/adminFlag set to 1.
# Related issues
| 1.0 | Add "Administrator" designation to Users - # AbOut Version
DevPEv0.2
# Description
The current User list does not show the user role:

In DevPEv0.3 with the AbOutPE1 database, a few users can take the role of administrator. The only other role is 'instructor'. Since the instructors may need to contact an administrator this role should show on the list:

Assuming that at the time this screen was requested only Frank Ackerman and Kodie Neumiller had their User/adminFlag set to 1.
# Related issues
| priority | add administrator designation to users about version description the current user list does not show the user role in with the database a few users can take the role of administrator the only other role is instructor since the instructors may need to contact an administrator this role should show on the list assuming that at the time this screen was requested only frank ackerman and kodie neumiller had their user adminflag set to related issues | 1 |
18,800 | 13,237,323,439 | IssuesEvent | 2020-08-18 21:26:27 | godotengine/godot | https://api.github.com/repos/godotengine/godot | closed | Strings are not automatically converted to StringNames | bug topic:gdscript usability | <!-- Please search existing issues for potential duplicates before filing yours:
https://github.com/godotengine/godot/issues?q=is%3Aissue
-->
**Godot version:**
<!-- Specify commit hash if using non-official build. -->
08d3d06
**Issue description:**
<!-- What happened, and what was expected. -->
This doesn't work:
```
connect("body_entered", Callable(self, "entered"))
```
You need to use StringName explicitly:
```
connect("body_entered", Callable(self, StringName("entered")))
```
Strings used to be converted automatically. | True | Strings are not automatically converted to StringNames - <!-- Please search existing issues for potential duplicates before filing yours:
https://github.com/godotengine/godot/issues?q=is%3Aissue
-->
**Godot version:**
<!-- Specify commit hash if using non-official build. -->
08d3d06
**Issue description:**
<!-- What happened, and what was expected. -->
This doesn't work:
```
connect("body_entered", Callable(self, "entered"))
```
You need to use StringName explicitly:
```
connect("body_entered", Callable(self, StringName("entered")))
```
Strings used to be converted automatically. | non_priority | strings are not automatically converted to stringnames please search existing issues for potential duplicates before filing yours godot version issue description this doesn t work connect body entered callable self entered you need to use stringname explicitly connect body entered callable self stringname entered strings used to be converted automatically | 0 |
403,022 | 27,398,204,158 | IssuesEvent | 2023-02-28 21:34:51 | o3de/o3de.org | https://api.github.com/repos/o3de/o3de.org | closed | Multiplayer Template | feature/networking kind/documentation priority/major sig/network triage/accepted | ## Describe the issue briefly
The Multiplayer Template should be mentioned somewhere in documentation for users trying to set up multiplayer
## Which page(s) / section(s) are affected?
Please add a link for how to use the Multiplayer Template here so new users dont fall into a rabbit hole of having to edit cmake files + create their own spawners etc.
https://www.o3de.org/docs/user-guide/networking/multiplayer/configuration/
## Does this work have an engineering dependency? What is it?
No | 1.0 | Multiplayer Template - ## Describe the issue briefly
The Multiplayer Template should be mentioned somewhere in documentation for users trying to set up multiplayer
## Which page(s) / section(s) are affected?
Please add a link for how to use the Multiplayer Template here so new users dont fall into a rabbit hole of having to edit cmake files + create their own spawners etc.
https://www.o3de.org/docs/user-guide/networking/multiplayer/configuration/
## Does this work have an engineering dependency? What is it?
No | non_priority | multiplayer template describe the issue briefly the multiplayer template should be mentioned somewhere in documentation for users trying to set up multiplayer which page s section s are affected please add a link for how to use the multiplayer template here so new users dont fall into a rabbit hole of having to edit cmake files create their own spawners etc does this work have an engineering dependency what is it no | 0 |
71,141 | 15,183,284,824 | IssuesEvent | 2021-02-15 07:53:32 | devikab2b/mavenwitthwhitesource | https://api.github.com/repos/devikab2b/mavenwitthwhitesource | opened | CVE-2020-8908 (Low) detected in guava-11.0.2.jar | security vulnerability | ## CVE-2020-8908 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guava-11.0.2.jar</b></p></summary>
<p>Guava is a suite of core and expanded libraries that include
utility classes, google's collections, io classes, and much
much more.
This project is a complete packaging of all the Guava libraries
into a single jar. Individual portions of Guava can be used
by downloading the appropriate module and its dependencies.
Guava (complete) has only one code dependency - javax.annotation,
per the JSR-305 spec.</p>
<p>Library home page: <a href="http://code.google.com/p/guava-libraries">http://code.google.com/p/guava-libraries</a></p>
<p>Path to dependency file: mavenwitthwhitesource/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/11.0.2/guava-11.0.2.jar</p>
<p>
Dependency Hierarchy:
- spark-core_2.12-3.1.0.jar (Root Library)
- hadoop-client-3.2.0.jar
- hadoop-common-3.2.0.jar
- :x: **guava-11.0.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/devikab2b/mavenwitthwhitesource/commit/091097f9d56e9bca2b5bc60c2ce79dd7d4ddf2f6">091097f9d56e9bca2b5bc60c2ce79dd7d4ddf2f6</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A temp directory creation vulnerability exist in Guava versions prior to 30.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.google.common.io.Files.createTempDir(). The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. We recommend updating Guava to version 30.0 or later, or update to Java 7 or later, or to explicitly change the permissions after the creation of the directory if neither are possible.
<p>Publish Date: 2020-12-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8908>CVE-2020-8908</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908</a></p>
<p>Release Date: 2020-12-10</p>
<p>Fix Resolution: v30.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-8908 (Low) detected in guava-11.0.2.jar - ## CVE-2020-8908 - Low Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guava-11.0.2.jar</b></p></summary>
<p>Guava is a suite of core and expanded libraries that include
utility classes, google's collections, io classes, and much
much more.
This project is a complete packaging of all the Guava libraries
into a single jar. Individual portions of Guava can be used
by downloading the appropriate module and its dependencies.
Guava (complete) has only one code dependency - javax.annotation,
per the JSR-305 spec.</p>
<p>Library home page: <a href="http://code.google.com/p/guava-libraries">http://code.google.com/p/guava-libraries</a></p>
<p>Path to dependency file: mavenwitthwhitesource/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/google/guava/guava/11.0.2/guava-11.0.2.jar</p>
<p>
Dependency Hierarchy:
- spark-core_2.12-3.1.0.jar (Root Library)
- hadoop-client-3.2.0.jar
- hadoop-common-3.2.0.jar
- :x: **guava-11.0.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/devikab2b/mavenwitthwhitesource/commit/091097f9d56e9bca2b5bc60c2ce79dd7d4ddf2f6">091097f9d56e9bca2b5bc60c2ce79dd7d4ddf2f6</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A temp directory creation vulnerability exist in Guava versions prior to 30.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.google.common.io.Files.createTempDir(). The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. We recommend updating Guava to version 30.0 or later, or update to Java 7 or later, or to explicitly change the permissions after the creation of the directory if neither are possible.
<p>Publish Date: 2020-12-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8908>CVE-2020-8908</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908</a></p>
<p>Release Date: 2020-12-10</p>
<p>Fix Resolution: v30.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve low detected in guava jar cve low severity vulnerability vulnerable library guava jar guava is a suite of core and expanded libraries that include utility classes google s collections io classes and much much more this project is a complete packaging of all the guava libraries into a single jar individual portions of guava can be used by downloading the appropriate module and its dependencies guava complete has only one code dependency javax annotation per the jsr spec library home page a href path to dependency file mavenwitthwhitesource pom xml path to vulnerable library home wss scanner repository com google guava guava guava jar dependency hierarchy spark core jar root library hadoop client jar hadoop common jar x guava jar vulnerable library found in head commit a href found in base branch main vulnerability details a temp directory creation vulnerability exist in guava versions prior to allowing an attacker with access to the machine to potentially access data in a temporary directory created by the guava com google common io files createtempdir the permissions granted to the directory created default to the standard unix like tmp ones leaving the files open we recommend updating guava to version or later or update to java or later or to explicitly change the permissions after the creation of the directory if neither are possible publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
34,665 | 12,294,678,297 | IssuesEvent | 2020-05-11 01:06:14 | LevyForchh/ant-design-pro | https://api.github.com/repos/LevyForchh/ant-design-pro | opened | WS-2020-0068 (High) detected in yargs-parser-16.1.0.tgz, yargs-parser-10.1.0.tgz | security vulnerability | ## WS-2020-0068 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>yargs-parser-16.1.0.tgz</b>, <b>yargs-parser-10.1.0.tgz</b></p></summary>
<p>
<details><summary><b>yargs-parser-16.1.0.tgz</b></p></summary>
<p>the mighty option parser used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/@ant-design/pro-cli/node_modules/yargs-parser/package.json</p>
<p>
Dependency Hierarchy:
- pro-cli-1.0.20.tgz (Root Library)
- :x: **yargs-parser-16.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>yargs-parser-10.1.0.tgz</b></p></summary>
<p>the mighty option parser used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/umi-uni18n/node_modules/meow/node_modules/yargs-parser/package.json</p>
<p>
Dependency Hierarchy:
- fabric-2.0.8.tgz (Root Library)
- stylelint-config-rational-order-0.1.2.tgz
- stylelint-9.10.1.tgz
- meow-5.0.0.tgz
- :x: **yargs-parser-10.1.0.tgz** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.__proto__.bar baz' adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.
<p>Publish Date: 2020-05-01
<p>URL: <a href=https://www.npmjs.com/advisories/1500>WS-2020-0068</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Adjacent
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/package/yargs-parser">https://www.npmjs.com/package/yargs-parser</a></p>
<p>Release Date: 2020-05-04</p>
<p>Fix Resolution: https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"yargs-parser","packageVersion":"16.1.0","isTransitiveDependency":true,"dependencyTree":"@ant-design/pro-cli:1.0.20;yargs-parser:16.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1"},{"packageType":"javascript/Node.js","packageName":"yargs-parser","packageVersion":"10.1.0","isTransitiveDependency":true,"dependencyTree":"@umijs/fabric:2.0.8;stylelint-config-rational-order:0.1.2;stylelint:9.10.1;meow:5.0.0;yargs-parser:10.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1"}],"vulnerabilityIdentifier":"WS-2020-0068","vulnerabilityDetails":"Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.__proto__.bar baz\u0027 adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.","vulnerabilityUrl":"https://www.npmjs.com/advisories/1500","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Adjacent","I":"High"},"extraData":{}}</REMEDIATE> --> | True | WS-2020-0068 (High) detected in yargs-parser-16.1.0.tgz, yargs-parser-10.1.0.tgz - ## WS-2020-0068 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>yargs-parser-16.1.0.tgz</b>, <b>yargs-parser-10.1.0.tgz</b></p></summary>
<p>
<details><summary><b>yargs-parser-16.1.0.tgz</b></p></summary>
<p>the mighty option parser used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-16.1.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/@ant-design/pro-cli/node_modules/yargs-parser/package.json</p>
<p>
Dependency Hierarchy:
- pro-cli-1.0.20.tgz (Root Library)
- :x: **yargs-parser-16.1.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>yargs-parser-10.1.0.tgz</b></p></summary>
<p>the mighty option parser used by yargs</p>
<p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-10.1.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/ant-design-pro/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/ant-design-pro/node_modules/umi-uni18n/node_modules/meow/node_modules/yargs-parser/package.json</p>
<p>
Dependency Hierarchy:
- fabric-2.0.8.tgz (Root Library)
- stylelint-config-rational-order-0.1.2.tgz
- stylelint-9.10.1.tgz
- meow-5.0.0.tgz
- :x: **yargs-parser-10.1.0.tgz** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.__proto__.bar baz' adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.
<p>Publish Date: 2020-05-01
<p>URL: <a href=https://www.npmjs.com/advisories/1500>WS-2020-0068</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Adjacent
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/package/yargs-parser">https://www.npmjs.com/package/yargs-parser</a></p>
<p>Release Date: 2020-05-04</p>
<p>Fix Resolution: https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"yargs-parser","packageVersion":"16.1.0","isTransitiveDependency":true,"dependencyTree":"@ant-design/pro-cli:1.0.20;yargs-parser:16.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1"},{"packageType":"javascript/Node.js","packageName":"yargs-parser","packageVersion":"10.1.0","isTransitiveDependency":true,"dependencyTree":"@umijs/fabric:2.0.8;stylelint-config-rational-order:0.1.2;stylelint:9.10.1;meow:5.0.0;yargs-parser:10.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"https://www.npmjs.com/package/yargs-parser/v/18.1.2,https://www.npmjs.com/package/yargs-parser/v/15.0.1"}],"vulnerabilityIdentifier":"WS-2020-0068","vulnerabilityDetails":"Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.__proto__.bar baz\u0027 adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.","vulnerabilityUrl":"https://www.npmjs.com/advisories/1500","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Adjacent","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | ws high detected in yargs parser tgz yargs parser tgz ws high severity vulnerability vulnerable libraries yargs parser tgz yargs parser tgz yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file tmp ws scm ant design pro package json path to vulnerable library tmp ws scm ant design pro node modules ant design pro cli node modules yargs parser package json dependency hierarchy pro cli tgz root library x yargs parser tgz vulnerable library yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file tmp ws scm ant design pro package json path to vulnerable library tmp ws scm ant design pro node modules umi node modules meow node modules yargs parser package json dependency hierarchy fabric tgz root library stylelint config rational order tgz stylelint tgz meow tgz x yargs parser tgz vulnerable library vulnerability details affected versions of yargs parser are vulnerable to prototype pollution arguments are not properly sanitized allowing an attacker to modify the prototype of object causing the addition or modification of an existing property that will exist on all objects parsing the argument foo proto bar baz adds a bar property with value baz to all objects this is only exploitable if attackers have control over the arguments being passed to yargs parser publish date url a href cvss score details base score metrics exploitability metrics attack vector adjacent attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails affected versions of yargs parser are vulnerable to prototype pollution arguments are not properly sanitized allowing an attacker to modify the prototype of object causing the addition or modification of an existing property that will exist on all objects parsing the argument foo proto bar baz adds a bar property with value baz to all objects this is only exploitable if attackers have control over the arguments being passed to yargs parser vulnerabilityurl | 0 |
132,578 | 5,188,817,102 | IssuesEvent | 2017-01-20 21:09:37 | DSheirer/sdrtrunk | https://api.github.com/repos/DSheirer/sdrtrunk | opened | Add capability to blacklist Tuners by serial number | enhancement Priority-Medium | Add capability for user to select a tuner and designate it as 'blacklisted', meaning that the tuner should not be used by the application.
Since this can only be done if/when the application is aware of the tuner, add the capability to the 'Tuners' pane and indicate to the user that they must restart the application for the setting to take effect.
On startup, the TunerManager should verify each tuner against the blacklisting and release the USB device when a tuner is blacklisted. | 1.0 | Add capability to blacklist Tuners by serial number - Add capability for user to select a tuner and designate it as 'blacklisted', meaning that the tuner should not be used by the application.
Since this can only be done if/when the application is aware of the tuner, add the capability to the 'Tuners' pane and indicate to the user that they must restart the application for the setting to take effect.
On startup, the TunerManager should verify each tuner against the blacklisting and release the USB device when a tuner is blacklisted. | priority | add capability to blacklist tuners by serial number add capability for user to select a tuner and designate it as blacklisted meaning that the tuner should not be used by the application since this can only be done if when the application is aware of the tuner add the capability to the tuners pane and indicate to the user that they must restart the application for the setting to take effect on startup the tunermanager should verify each tuner against the blacklisting and release the usb device when a tuner is blacklisted | 1 |
744,867 | 25,958,769,527 | IssuesEvent | 2022-12-18 15:51:19 | CosmosOS/Cosmos | https://api.github.com/repos/CosmosOS/Cosmos | closed | Deleting file and directory not working | Bug Up for Grabs Complexity: Medium Priority: Low Area: File System | #### Area of Cosmos - What area of Cosmos are we dealing with?
File system
#### Expected Behaviour - What do you think that should happen?
I should be able to delete files and directories when I want.
#### Actual Behaviour - What unexpectedly happens?
I can only delete files and directories after I created them, after I close VMware and I re-open it (via the Start button in VS 2019) I can't delete them anymore. **However this only seems to happen to folders and files I create, as I was able to delete the directory TEST, though it got created automatically.**
#### Reproduction - How did you get this error to appear?
Initialize a CosmosVFS, then create a file or directory, close and open VMware again (from VS 2019 via the Start button, or F5) and try to delete the file or directory you've created.
#### Version - Were you using the User Kit or Dev Kit? And what User Kit version or Dev Kit commit (Cosmos, IL2CPU, X#)?
Latest User Kit (20200708) | 1.0 | Deleting file and directory not working - #### Area of Cosmos - What area of Cosmos are we dealing with?
File system
#### Expected Behaviour - What do you think that should happen?
I should be able to delete files and directories when I want.
#### Actual Behaviour - What unexpectedly happens?
I can only delete files and directories after I created them, after I close VMware and I re-open it (via the Start button in VS 2019) I can't delete them anymore. **However this only seems to happen to folders and files I create, as I was able to delete the directory TEST, though it got created automatically.**
#### Reproduction - How did you get this error to appear?
Initialize a CosmosVFS, then create a file or directory, close and open VMware again (from VS 2019 via the Start button, or F5) and try to delete the file or directory you've created.
#### Version - Were you using the User Kit or Dev Kit? And what User Kit version or Dev Kit commit (Cosmos, IL2CPU, X#)?
Latest User Kit (20200708) | priority | deleting file and directory not working area of cosmos what area of cosmos are we dealing with file system expected behaviour what do you think that should happen i should be able to delete files and directories when i want actual behaviour what unexpectedly happens i can only delete files and directories after i created them after i close vmware and i re open it via the start button in vs i can t delete them anymore however this only seems to happen to folders and files i create as i was able to delete the directory test though it got created automatically reproduction how did you get this error to appear initialize a cosmosvfs then create a file or directory close and open vmware again from vs via the start button or and try to delete the file or directory you ve created version were you using the user kit or dev kit and what user kit version or dev kit commit cosmos x latest user kit | 1 |
20,901 | 10,559,069,657 | IssuesEvent | 2019-10-04 10:36:13 | ChetanSankhala/LoadGenerator | https://api.github.com/repos/ChetanSankhala/LoadGenerator | opened | CVE-2019-14439 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2019-14439 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.5.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.5.RELEASE.jar
- jackson-datatype-jsr310-2.9.8.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ChetanSankhala/LoadGenerator/commit/e089e2de446515ceaa8823faf12dd7f232e28679">e089e2de446515ceaa8823faf12dd7f232e28679</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
<p>Publish Date: 2019-07-30
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439>CVE-2019-14439</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439</a></p>
<p>Release Date: 2019-07-30</p>
<p>Fix Resolution: 2.9.9.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-14439 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2019-14439 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.5.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.5.RELEASE.jar
- jackson-datatype-jsr310-2.9.8.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ChetanSankhala/LoadGenerator/commit/e089e2de446515ceaa8823faf12dd7f232e28679">e089e2de446515ceaa8823faf12dd7f232e28679</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
<p>Publish Date: 2019-07-30
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439>CVE-2019-14439</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439</a></p>
<p>Release Date: 2019-07-30</p>
<p>Fix Resolution: 2.9.9.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar jackson datatype jar x jackson databind jar vulnerable library found in head commit a href vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind x before this occurs when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the logback jar in the classpath publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
500,233 | 14,493,909,364 | IssuesEvent | 2020-12-11 09:09:11 | renovatebot/renovate | https://api.github.com/repos/renovatebot/renovate | closed | Support limiting concurrent requests per host | priority-3-normal type:feature | **What would you like Renovate to be able to do?**
Provide a configurable way and sensible defaults for concurrent limits per host.
**Describe the solution you'd like**
Implement it in the util/http logic. Mostly it should just work, but users can tweak it using hostRules.
**Describe alternatives you've considered**
Today we try to rate limit by manager and package file, etc. It would be easier to have full concurrency of those and rely on the http layer to do rate limiting instead.
| 1.0 | Support limiting concurrent requests per host - **What would you like Renovate to be able to do?**
Provide a configurable way and sensible defaults for concurrent limits per host.
**Describe the solution you'd like**
Implement it in the util/http logic. Mostly it should just work, but users can tweak it using hostRules.
**Describe alternatives you've considered**
Today we try to rate limit by manager and package file, etc. It would be easier to have full concurrency of those and rely on the http layer to do rate limiting instead.
| priority | support limiting concurrent requests per host what would you like renovate to be able to do provide a configurable way and sensible defaults for concurrent limits per host describe the solution you d like implement it in the util http logic mostly it should just work but users can tweak it using hostrules describe alternatives you ve considered today we try to rate limit by manager and package file etc it would be easier to have full concurrency of those and rely on the http layer to do rate limiting instead | 1 |
830,644 | 32,019,769,063 | IssuesEvent | 2023-09-22 02:47:08 | UNopenGIS/7 | https://api.github.com/repos/UNopenGIS/7 | closed | Project Airbase: プロジェクトアイディア | help wanted priority/SHOULD | #214 直前の今考えるべきことではないかも知れませんが、 #221 での議論を踏まえ、 #205 Kalaja Architecture を踏まえて、Raspberry Pi 群をリモートに配置する形で研修環境を提供するというアイディアについて少し練ってみました。後で考えるためにおいておきます。
## 情報: Kalaja アーキテクチャ

## 基本的アイディア
- Raspberry Pi をリモート化した場合、問題となるのはアカウントの配布方法であろう。
- とりあえず、**SSHキーベースのログイン**を求めるのが枯れていて順当であろう。
- **事前に公開鍵を集めておいて、jump host 及び hosts に ~/.ssh/authorized_keys をセットアップする**という戦略でどうか。
- Ansible とかで構成管理をするのか。それとも、@yuiseki さんが以前実施されていたように、MicroSD 用イメージをセットアップするという手法をとる方が現実的か。
## 要検討事項
- [ ] マルチユーザにするのか、pi 相当のシングルユーザでやるのか。マルチユーザを実現するのは(UNIX的には普通であっても、)どれくらい面倒か。そもそも、ユーザ名を決めてもらったり、かぶりをチェックするのは面倒ではないか。メールアドレスがユーザ名になる、といったような割り切った運用にしたほうがよいかも。あるいは、機体番号を割り振って「jump host に入ったら、この機体番号の Raspberry Pi にログインしてね。この機体にだけあなたの公開鍵をセットしておきます。といった運用。」
## ユーザーストーリー
1. 参加者は、ワークショップに参加したい。参加要領によれば、公開鍵を送れとあるので公開鍵を主催者に送る。
2. 主催者は、公開鍵に機体番号を割り当てて、参加者に案内を返す。
3. ワークショップ当日。参加者はまずジャンプホストにログインする。ジャンプホストにも公開鍵を登録してあるので、参加者はパスワードレスにログインできる。
4. 参加者は、案内に基づき、ジャンプホストから指定機体番号のRaspberry Piにログインする。ここもパスワードレスで進めることができる。演習はすべて指定機体で行う。
5. 演習の結果はIPFSに置かれるので、参加者はCIDを持ち帰ればデータを持ち帰ることができる。
6. ワークショップ後、一定のグレースピリオドを経て、主催者は機体番号のRaspberry Piをリセットする。公開鍵も処分される。
## 概念整理
1. jump host と Raspberry Pi 機体で構成される施設を Airbase(航空基地)と呼ぶことにします。Kalaja が多数からのリモートユース対応したもの(近代化したもの)が Airbase というイメージです。
2. Airbase とワークショップの場所がネットワーク的に近い、あるいは同一ネットワークである場合には、Airbase だけでワークショップができます。JICA 国家測量研修の場合はそのアレンジメントでしょう。
3. Airbase とワークショップの場所がネットワーク的に遠い場合には、ウェブ地図で致命的な低レイテンシー確保を「ワークショップの側に IPFS Node 及びゲートウェイを置く」ということで実施するべきかも知れません。ワークショップの題材にもよるでしょう。10MB程度のプロジェクトであれば、それほど気にする必要はないかも知れません。Airbase 側で add された CID をワークショップ側の Node で自動的に pin するみたいなことをするのかもしれません。
## 気になること
- Ansible を勤勉に書いていくということは SMG (Smart Maps Group) が得意とする技法(technique)に含まれるのだろうか。エンタープライズすぎたりしないか。
- IaaS や FileCoin を再発明するようなことになるのかもしれない。だとすれば逆にアリモノの技術があるのかも。
## どう思いますか
@yuiseki @smellman @mapconcierge | 1.0 | Project Airbase: プロジェクトアイディア - #214 直前の今考えるべきことではないかも知れませんが、 #221 での議論を踏まえ、 #205 Kalaja Architecture を踏まえて、Raspberry Pi 群をリモートに配置する形で研修環境を提供するというアイディアについて少し練ってみました。後で考えるためにおいておきます。
## 情報: Kalaja アーキテクチャ

## 基本的アイディア
- Raspberry Pi をリモート化した場合、問題となるのはアカウントの配布方法であろう。
- とりあえず、**SSHキーベースのログイン**を求めるのが枯れていて順当であろう。
- **事前に公開鍵を集めておいて、jump host 及び hosts に ~/.ssh/authorized_keys をセットアップする**という戦略でどうか。
- Ansible とかで構成管理をするのか。それとも、@yuiseki さんが以前実施されていたように、MicroSD 用イメージをセットアップするという手法をとる方が現実的か。
## 要検討事項
- [ ] マルチユーザにするのか、pi 相当のシングルユーザでやるのか。マルチユーザを実現するのは(UNIX的には普通であっても、)どれくらい面倒か。そもそも、ユーザ名を決めてもらったり、かぶりをチェックするのは面倒ではないか。メールアドレスがユーザ名になる、といったような割り切った運用にしたほうがよいかも。あるいは、機体番号を割り振って「jump host に入ったら、この機体番号の Raspberry Pi にログインしてね。この機体にだけあなたの公開鍵をセットしておきます。といった運用。」
## ユーザーストーリー
1. 参加者は、ワークショップに参加したい。参加要領によれば、公開鍵を送れとあるので公開鍵を主催者に送る。
2. 主催者は、公開鍵に機体番号を割り当てて、参加者に案内を返す。
3. ワークショップ当日。参加者はまずジャンプホストにログインする。ジャンプホストにも公開鍵を登録してあるので、参加者はパスワードレスにログインできる。
4. 参加者は、案内に基づき、ジャンプホストから指定機体番号のRaspberry Piにログインする。ここもパスワードレスで進めることができる。演習はすべて指定機体で行う。
5. 演習の結果はIPFSに置かれるので、参加者はCIDを持ち帰ればデータを持ち帰ることができる。
6. ワークショップ後、一定のグレースピリオドを経て、主催者は機体番号のRaspberry Piをリセットする。公開鍵も処分される。
## 概念整理
1. jump host と Raspberry Pi 機体で構成される施設を Airbase(航空基地)と呼ぶことにします。Kalaja が多数からのリモートユース対応したもの(近代化したもの)が Airbase というイメージです。
2. Airbase とワークショップの場所がネットワーク的に近い、あるいは同一ネットワークである場合には、Airbase だけでワークショップができます。JICA 国家測量研修の場合はそのアレンジメントでしょう。
3. Airbase とワークショップの場所がネットワーク的に遠い場合には、ウェブ地図で致命的な低レイテンシー確保を「ワークショップの側に IPFS Node 及びゲートウェイを置く」ということで実施するべきかも知れません。ワークショップの題材にもよるでしょう。10MB程度のプロジェクトであれば、それほど気にする必要はないかも知れません。Airbase 側で add された CID をワークショップ側の Node で自動的に pin するみたいなことをするのかもしれません。
## 気になること
- Ansible を勤勉に書いていくということは SMG (Smart Maps Group) が得意とする技法(technique)に含まれるのだろうか。エンタープライズすぎたりしないか。
- IaaS や FileCoin を再発明するようなことになるのかもしれない。だとすれば逆にアリモノの技術があるのかも。
## どう思いますか
@yuiseki @smellman @mapconcierge | priority | project airbase プロジェクトアイディア 直前の今考えるべきことではないかも知れませんが、 での議論を踏まえ、 kalaja architecture を踏まえて、raspberry pi 群をリモートに配置する形で研修環境を提供するというアイディアについて少し練ってみました。後で考えるためにおいておきます。 情報 kalaja アーキテクチャ 基本的アイディア raspberry pi をリモート化した場合、問題となるのはアカウントの配布方法であろう。 とりあえず、 sshキーベースのログイン を求めるのが枯れていて順当であろう。 事前に公開鍵を集めておいて、jump host 及び hosts に ssh authorized keys をセットアップする という戦略でどうか。 ansible とかで構成管理をするのか。それとも、 yuiseki さんが以前実施されていたように、microsd 用イメージをセットアップするという手法をとる方が現実的か。 要検討事項 マルチユーザにするのか、pi 相当のシングルユーザでやるのか。マルチユーザを実現するのは(unix的には普通であっても、)どれくらい面倒か。そもそも、ユーザ名を決めてもらったり、かぶりをチェックするのは面倒ではないか。メールアドレスがユーザ名になる、といったような割り切った運用にしたほうがよいかも。あるいは、機体番号を割り振って「jump host に入ったら、この機体番号の raspberry pi にログインしてね。この機体にだけあなたの公開鍵をセットしておきます。といった運用。」 ユーザーストーリー 参加者は、ワークショップに参加したい。参加要領によれば、公開鍵を送れとあるので公開鍵を主催者に送る。 主催者は、公開鍵に機体番号を割り当てて、参加者に案内を返す。 ワークショップ当日。参加者はまずジャンプホストにログインする。ジャンプホストにも公開鍵を登録してあるので、参加者はパスワードレスにログインできる。 参加者は、案内に基づき、ジャンプホストから指定機体番号のraspberry piにログインする。ここもパスワードレスで進めることができる。演習はすべて指定機体で行う。 演習の結果はipfsに置かれるので、参加者はcidを持ち帰ればデータを持ち帰ることができる。 ワークショップ後、一定のグレースピリオドを経て、主催者は機体番号のraspberry piをリセットする。公開鍵も処分される。 概念整理 jump host と raspberry pi 機体で構成される施設を airbase(航空基地)と呼ぶことにします。kalaja が多数からのリモートユース対応したもの(近代化したもの)が airbase というイメージです。 airbase とワークショップの場所がネットワーク的に近い、あるいは同一ネットワークである場合には、airbase だけでワークショップができます。jica 国家測量研修の場合はそのアレンジメントでしょう。 airbase とワークショップの場所がネットワーク的に遠い場合には、ウェブ地図で致命的な低レイテンシー確保を「ワークショップの側に ipfs node 及びゲートウェイを置く」ということで実施するべきかも知れません。ワークショップの題材にもよるでしょう。 、それほど気にする必要はないかも知れません。airbase 側で add された cid をワークショップ側の node で自動的に pin するみたいなことをするのかもしれません。 気になること ansible を勤勉に書いていくということは smg smart maps group が得意とする技法(technique)に含まれるのだろうか。エンタープライズすぎたりしないか。 iaas や filecoin を再発明するようなことになるのかもしれない。だとすれば逆にアリモノの技術があるのかも。 どう思いますか yuiseki smellman mapconcierge | 1 |
144,473 | 5,540,865,262 | IssuesEvent | 2017-03-22 11:14:26 | bedita/bedita | https://api.github.com/repos/bedita/bedita | closed | Patching an entity with `date_ranges` adds new ranges instead of replacing | Priority - High Topic - API Type - Bug | When issuing a `PATCH` request on a BEdita object that already had one or more `date_ranges`, the ranges passed in the request are added to the list of object's ranges, instead of replacing existent ones. | 1.0 | Patching an entity with `date_ranges` adds new ranges instead of replacing - When issuing a `PATCH` request on a BEdita object that already had one or more `date_ranges`, the ranges passed in the request are added to the list of object's ranges, instead of replacing existent ones. | priority | patching an entity with date ranges adds new ranges instead of replacing when issuing a patch request on a bedita object that already had one or more date ranges the ranges passed in the request are added to the list of object s ranges instead of replacing existent ones | 1 |
626,133 | 19,785,976,500 | IssuesEvent | 2022-01-18 06:47:32 | Valdes-Tresanco-MS/gmx_MMPBSA | https://api.github.com/repos/Valdes-Tresanco-MS/gmx_MMPBSA | closed | Improve gmx_MMPBSA_test | low priority improvement | - [ ] Add a flag to overwrite or not the folder where the repository with the examples was cloned.
It would be something like `gmx_MMPBSA_test` [`-nr` / `-noreuse`] (Default = True)
`-nr` will store a 'store_false' action
- [ ] Add a flag to delete the test folder once finished
- [x] Add the use of MPI for the examples if possible | 1.0 | Improve gmx_MMPBSA_test - - [ ] Add a flag to overwrite or not the folder where the repository with the examples was cloned.
It would be something like `gmx_MMPBSA_test` [`-nr` / `-noreuse`] (Default = True)
`-nr` will store a 'store_false' action
- [ ] Add a flag to delete the test folder once finished
- [x] Add the use of MPI for the examples if possible | priority | improve gmx mmpbsa test add a flag to overwrite or not the folder where the repository with the examples was cloned it would be something like gmx mmpbsa test default true nr will store a store false action add a flag to delete the test folder once finished add the use of mpi for the examples if possible | 1 |
55,361 | 14,403,623,168 | IssuesEvent | 2020-12-03 16:16:46 | jOOQ/jOOQ | https://api.github.com/repos/jOOQ/jOOQ | closed | Wrong SQL generated when DomainDataType is loaded before base SQLDataType for SQLDialect.DEFAULT | C: Functionality E: All Editions P: Medium T: Defect | I'm not sure how easy it is to reproduce this, but a recent change in the integration tests lead to the situation where a PostgreSQL domain type that is based on JSONB from #10309 for this table:
```sql
create domain u_10309 as jsonb;
create table t_10309 (
id int,
c1 jsonb,
c2 u_10309,
c3 jsonb[],
c4 u_10309[],
constraint pk_t_10309 primary key (id)
);
```
... lead to the domain type being registered in `DefaultDataType.TYPES_BY_SQL_DATATYPE[SQLDialect.DEFAULT.ordinal()]` *before* the `SQLDataType.JSON` type. As a side effect, a bind variable cast was missing when inserting the value for column `c2`, producing an error. | 1.0 | Wrong SQL generated when DomainDataType is loaded before base SQLDataType for SQLDialect.DEFAULT - I'm not sure how easy it is to reproduce this, but a recent change in the integration tests lead to the situation where a PostgreSQL domain type that is based on JSONB from #10309 for this table:
```sql
create domain u_10309 as jsonb;
create table t_10309 (
id int,
c1 jsonb,
c2 u_10309,
c3 jsonb[],
c4 u_10309[],
constraint pk_t_10309 primary key (id)
);
```
... lead to the domain type being registered in `DefaultDataType.TYPES_BY_SQL_DATATYPE[SQLDialect.DEFAULT.ordinal()]` *before* the `SQLDataType.JSON` type. As a side effect, a bind variable cast was missing when inserting the value for column `c2`, producing an error. | non_priority | wrong sql generated when domaindatatype is loaded before base sqldatatype for sqldialect default i m not sure how easy it is to reproduce this but a recent change in the integration tests lead to the situation where a postgresql domain type that is based on jsonb from for this table sql create domain u as jsonb create table t id int jsonb u jsonb u constraint pk t primary key id lead to the domain type being registered in defaultdatatype types by sql datatype before the sqldatatype json type as a side effect a bind variable cast was missing when inserting the value for column producing an error | 0 |
98,243 | 4,019,086,349 | IssuesEvent | 2016-05-16 13:43:30 | BugBusterSWE/MaaS | https://api.github.com/repos/BugBusterSWE/MaaS | closed | DatabaseModel.ts | backend priority:medium Programmer | Activity #2
Scrivere il modulo DatabaseModel.ts.
Vedere la documentazione nella ST per i dettagli
Link task: [https://bugbusters.teamwork.com/tasks/6538118](https://bugbusters.teamwork.com/tasks/6538118) | 1.0 | DatabaseModel.ts - Activity #2
Scrivere il modulo DatabaseModel.ts.
Vedere la documentazione nella ST per i dettagli
Link task: [https://bugbusters.teamwork.com/tasks/6538118](https://bugbusters.teamwork.com/tasks/6538118) | priority | databasemodel ts activity scrivere il modulo databasemodel ts vedere la documentazione nella st per i dettagli link task | 1 |
387,374 | 11,460,299,217 | IssuesEvent | 2020-02-07 09:27:36 | nhsconnect/gpconnect-demonstrator | https://api.github.com/repos/nhsconnect/gpconnect-demonstrator | closed | Add representative clinical data to the demonstrator | 1.2.3 Low Priority Structured | Placeholder note for now, while clinical data is produced by Pete and colleagues. | 1.0 | Add representative clinical data to the demonstrator - Placeholder note for now, while clinical data is produced by Pete and colleagues. | priority | add representative clinical data to the demonstrator placeholder note for now while clinical data is produced by pete and colleagues | 1 |
60,236 | 14,531,609,926 | IssuesEvent | 2020-12-14 21:03:42 | hydrogen-dev/SDK | https://api.github.com/repos/hydrogen-dev/SDK | opened | CVE-2020-13956 (Medium) detected in httpclient-4.5.2.jar | security vulnerability | ## CVE-2020-13956 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.5.2.jar</b></p></summary>
<p>Apache HttpComponents Client</p>
<p>Path to dependency file: SDK/hydro/raindrop/java/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.2/httpclient-4.5.2.jar</p>
<p>
Dependency Hierarchy:
- unirest-java-1.4.9.jar (Root Library)
- :x: **httpclient-4.5.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/hydrogen-dev/SDK/commit/09b63e4979e6a3f5d08731809692a795c8d7b085">09b63e4979e6a3f5d08731809692a795c8d7b085</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.
<p>Publish Date: 2020-12-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956>CVE-2020-13956</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: org.apache.httpcomponents:httpclient:4.5.13;org.apache.httpcomponents:httpclient-osgi:4.5.13;org.apache.httpcomponents.client5:httpclient5:5.0.3;org.apache.httpcomponents.client5:httpclient5-osgi:5.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.httpcomponents","packageName":"httpclient","packageVersion":"4.5.2","isTransitiveDependency":true,"dependencyTree":"com.mashape.unirest:unirest-java:1.4.9;org.apache.httpcomponents:httpclient:4.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.httpcomponents:httpclient:4.5.13;org.apache.httpcomponents:httpclient-osgi:4.5.13;org.apache.httpcomponents.client5:httpclient5:5.0.3;org.apache.httpcomponents.client5:httpclient5-osgi:5.0.3"}],"vulnerabilityIdentifier":"CVE-2020-13956","vulnerabilityDetails":"Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-13956 (Medium) detected in httpclient-4.5.2.jar - ## CVE-2020-13956 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>httpclient-4.5.2.jar</b></p></summary>
<p>Apache HttpComponents Client</p>
<p>Path to dependency file: SDK/hydro/raindrop/java/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/httpcomponents/httpclient/4.5.2/httpclient-4.5.2.jar</p>
<p>
Dependency Hierarchy:
- unirest-java-1.4.9.jar (Root Library)
- :x: **httpclient-4.5.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/hydrogen-dev/SDK/commit/09b63e4979e6a3f5d08731809692a795c8d7b085">09b63e4979e6a3f5d08731809692a795c8d7b085</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.
<p>Publish Date: 2020-12-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956>CVE-2020-13956</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-13956</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: org.apache.httpcomponents:httpclient:4.5.13;org.apache.httpcomponents:httpclient-osgi:4.5.13;org.apache.httpcomponents.client5:httpclient5:5.0.3;org.apache.httpcomponents.client5:httpclient5-osgi:5.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.httpcomponents","packageName":"httpclient","packageVersion":"4.5.2","isTransitiveDependency":true,"dependencyTree":"com.mashape.unirest:unirest-java:1.4.9;org.apache.httpcomponents:httpclient:4.5.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.httpcomponents:httpclient:4.5.13;org.apache.httpcomponents:httpclient-osgi:4.5.13;org.apache.httpcomponents.client5:httpclient5:5.0.3;org.apache.httpcomponents.client5:httpclient5-osgi:5.0.3"}],"vulnerabilityIdentifier":"CVE-2020-13956","vulnerabilityDetails":"Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-13956","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in httpclient jar cve medium severity vulnerability vulnerable library httpclient jar apache httpcomponents client path to dependency file sdk hydro raindrop java pom xml path to vulnerable library home wss scanner repository org apache httpcomponents httpclient httpclient jar dependency hierarchy unirest java jar root library x httpclient jar vulnerable library found in head commit a href found in base branch master vulnerability details apache httpclient versions prior to version and can misinterpret malformed authority component in request uris passed to the library as java net uri object and pick the wrong target host for request execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache httpcomponents httpclient org apache httpcomponents httpclient osgi org apache httpcomponents org apache httpcomponents osgi isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails apache httpclient versions prior to version and can misinterpret malformed authority component in request uris passed to the library as java net uri object and pick the wrong target host for request execution vulnerabilityurl | 0 |
123,333 | 17,772,209,481 | IssuesEvent | 2021-08-30 14:51:25 | kapseliboi/bitmidi.com | https://api.github.com/repos/kapseliboi/bitmidi.com | opened | CVE-2021-23382 (Medium) detected in postcss-7.0.35.tgz, postcss-7.0.32.tgz | security vulnerability | ## CVE-2021-23382 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>postcss-7.0.35.tgz</b>, <b>postcss-7.0.32.tgz</b></p></summary>
<p>
<details><summary><b>postcss-7.0.35.tgz</b></p></summary>
<p>Tool for transforming styles with JS plugins</p>
<p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz</a></p>
<p>Path to dependency file: bitmidi.com/package.json</p>
<p>Path to vulnerable library: bitmidi.com/node_modules/postcss/package.json</p>
<p>
Dependency Hierarchy:
- cssnano-4.1.10.tgz (Root Library)
- :x: **postcss-7.0.35.tgz** (Vulnerable Library)
</details>
<details><summary><b>postcss-7.0.32.tgz</b></p></summary>
<p>Tool for transforming styles with JS plugins</p>
<p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.32.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.32.tgz</a></p>
<p>Path to dependency file: bitmidi.com/package.json</p>
<p>Path to vulnerable library: bitmidi.com/node_modules/purgecss/node_modules/postcss/package.json</p>
<p>
Dependency Hierarchy:
- purgecss-3.0.0.tgz (Root Library)
- :x: **postcss-7.0.32.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/bitmidi.com/commit/8bfbb9b5b1cc23e87e14304a565f6b849e11bdb2">8bfbb9b5b1cc23e87e14304a565f6b849e11bdb2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
<p>Publish Date: 2021-04-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23382>CVE-2021-23382</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382</a></p>
<p>Release Date: 2021-04-26</p>
<p>Fix Resolution: postcss - 8.2.13</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-23382 (Medium) detected in postcss-7.0.35.tgz, postcss-7.0.32.tgz - ## CVE-2021-23382 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>postcss-7.0.35.tgz</b>, <b>postcss-7.0.32.tgz</b></p></summary>
<p>
<details><summary><b>postcss-7.0.35.tgz</b></p></summary>
<p>Tool for transforming styles with JS plugins</p>
<p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.35.tgz</a></p>
<p>Path to dependency file: bitmidi.com/package.json</p>
<p>Path to vulnerable library: bitmidi.com/node_modules/postcss/package.json</p>
<p>
Dependency Hierarchy:
- cssnano-4.1.10.tgz (Root Library)
- :x: **postcss-7.0.35.tgz** (Vulnerable Library)
</details>
<details><summary><b>postcss-7.0.32.tgz</b></p></summary>
<p>Tool for transforming styles with JS plugins</p>
<p>Library home page: <a href="https://registry.npmjs.org/postcss/-/postcss-7.0.32.tgz">https://registry.npmjs.org/postcss/-/postcss-7.0.32.tgz</a></p>
<p>Path to dependency file: bitmidi.com/package.json</p>
<p>Path to vulnerable library: bitmidi.com/node_modules/purgecss/node_modules/postcss/package.json</p>
<p>
Dependency Hierarchy:
- purgecss-3.0.0.tgz (Root Library)
- :x: **postcss-7.0.32.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/bitmidi.com/commit/8bfbb9b5b1cc23e87e14304a565f6b849e11bdb2">8bfbb9b5b1cc23e87e14304a565f6b849e11bdb2</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
<p>Publish Date: 2021-04-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23382>CVE-2021-23382</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23382</a></p>
<p>Release Date: 2021-04-26</p>
<p>Fix Resolution: postcss - 8.2.13</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in postcss tgz postcss tgz cve medium severity vulnerability vulnerable libraries postcss tgz postcss tgz postcss tgz tool for transforming styles with js plugins library home page a href path to dependency file bitmidi com package json path to vulnerable library bitmidi com node modules postcss package json dependency hierarchy cssnano tgz root library x postcss tgz vulnerable library postcss tgz tool for transforming styles with js plugins library home page a href path to dependency file bitmidi com package json path to vulnerable library bitmidi com node modules purgecss node modules postcss package json dependency hierarchy purgecss tgz root library x postcss tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package postcss before are vulnerable to regular expression denial of service redos via getannotationurl and loadannotation in lib previous map js the vulnerable regexes are caused mainly by the sub pattern s sourcemappingurl publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution postcss step up your open source security game with whitesource | 0 |
72,978 | 9,634,505,772 | IssuesEvent | 2019-05-15 21:26:11 | confluentinc/schema-registry | https://api.github.com/repos/confluentinc/schema-registry | closed | Update Documentation for MAGIC_BYTE=1 | documentation | Regarding: https://github.com/confluentinc/schema-registry/commit/28d5c02df4c355281ddbafb7684a18f5cc14b49f, MAGIC_BYTE was updated to include `1` as well as `0`. cc @mageshn
[In documentation](https://github.com/confluentinc/schema-registry/blob/master/docs/serializer-formatter.rst#wire-format), this is no longer accurate.
> Confluent serialization format version number; currently always `0`.
Should it be documented when 0 or 1 is used?
| 1.0 | Update Documentation for MAGIC_BYTE=1 - Regarding: https://github.com/confluentinc/schema-registry/commit/28d5c02df4c355281ddbafb7684a18f5cc14b49f, MAGIC_BYTE was updated to include `1` as well as `0`. cc @mageshn
[In documentation](https://github.com/confluentinc/schema-registry/blob/master/docs/serializer-formatter.rst#wire-format), this is no longer accurate.
> Confluent serialization format version number; currently always `0`.
Should it be documented when 0 or 1 is used?
| non_priority | update documentation for magic byte regarding magic byte was updated to include as well as cc mageshn this is no longer accurate confluent serialization format version number currently always should it be documented when or is used | 0 |
466,269 | 13,399,112,834 | IssuesEvent | 2020-09-03 14:04:08 | googleapis/python-securitycenter | https://api.github.com/repos/googleapis/python-securitycenter | closed | Synthesis failed for python-securitycenter | api: securitycenter autosynth failure priority: p1 type: bug | Hello! Autosynth couldn't regenerate python-securitycenter. :broken_heart:
Here's the output from running `synth.py`:
```
ages/30/9e/f663a2aa66a09d838042ae1a2c5659828bb9b41ea3a6efa20a20fd92b121/Jinja2-2.11.2-py2.py3-none-any.whl
Saved ./Jinja2-2.11.2-py2.py3-none-any.whl
Collecting MarkupSafe==1.1.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 5))
Using cached https://files.pythonhosted.org/packages/b2/5f/23e0023be6bb885d00ffbefad2942bc51a620328ee910f64abe5a8d18dd1/MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl
Saved ./MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl
Collecting protobuf==3.13.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 6))
Using cached https://files.pythonhosted.org/packages/30/79/510974552cebff2ba04038544799450defe75e96ea5f1675dbf72cc8744f/protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl
Saved ./protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl
Collecting pypandoc==1.5 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 7))
Using cached https://files.pythonhosted.org/packages/d6/b7/5050dc1769c8a93d3ec7c4bd55be161991c94b8b235f88bf7c764449e708/pypandoc-1.5.tar.gz
Complete output from command python setup.py egg_info:
Traceback (most recent call last):
File "<string>", line 1, in <module>
File "/tmpfs/tmp/tmpnk_5ehky/setuptools-tmp/setuptools/__init__.py", line 6, in <module>
import distutils.core
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/_distutils_hack/__init__.py", line 82, in create_module
return importlib.import_module('._distutils', 'setuptools')
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/importlib/__init__.py", line 126, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
ModuleNotFoundError: No module named 'setuptools._distutils'
----------------------------------------
(Command "python setup.py egg_info" failed with error code 1 in /tmpfs/tmp/pip-build-w9bb1l9t/pypandoc/
)
ERROR: no such package '@gapic_generator_python_pip_deps//': pip_import failed: Collecting click==7.1.2 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 1))
Using cached https://files.pythonhosted.org/packages/d2/3d/fa76db83bf75c4f8d338c2fd15c8d33fdd7ad23a9b5e57eb6c5de26b430e/click-7.1.2-py2.py3-none-any.whl
Saved ./click-7.1.2-py2.py3-none-any.whl
Collecting google-api-core==1.22.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 2))
Using cached https://files.pythonhosted.org/packages/e0/2d/7c6c75013105e1d2b6eaa1bf18a56995be1dbc673c38885aea31136e9918/google_api_core-1.22.1-py2.py3-none-any.whl
Saved ./google_api_core-1.22.1-py2.py3-none-any.whl
Collecting googleapis-common-protos==1.52.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 3))
Using cached https://files.pythonhosted.org/packages/03/74/3956721ea1eb4bcf7502a311fdaa60b85bd751de4e57d1943afe9b334141/googleapis_common_protos-1.52.0-py2.py3-none-any.whl
Saved ./googleapis_common_protos-1.52.0-py2.py3-none-any.whl
Collecting jinja2==2.11.2 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 4))
Using cached https://files.pythonhosted.org/packages/30/9e/f663a2aa66a09d838042ae1a2c5659828bb9b41ea3a6efa20a20fd92b121/Jinja2-2.11.2-py2.py3-none-any.whl
Saved ./Jinja2-2.11.2-py2.py3-none-any.whl
Collecting MarkupSafe==1.1.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 5))
Using cached https://files.pythonhosted.org/packages/b2/5f/23e0023be6bb885d00ffbefad2942bc51a620328ee910f64abe5a8d18dd1/MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl
Saved ./MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl
Collecting protobuf==3.13.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 6))
Using cached https://files.pythonhosted.org/packages/30/79/510974552cebff2ba04038544799450defe75e96ea5f1675dbf72cc8744f/protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl
Saved ./protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl
Collecting pypandoc==1.5 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 7))
Using cached https://files.pythonhosted.org/packages/d6/b7/5050dc1769c8a93d3ec7c4bd55be161991c94b8b235f88bf7c764449e708/pypandoc-1.5.tar.gz
Complete output from command python setup.py egg_info:
Traceback (most recent call last):
File "<string>", line 1, in <module>
File "/tmpfs/tmp/tmpnk_5ehky/setuptools-tmp/setuptools/__init__.py", line 6, in <module>
import distutils.core
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/_distutils_hack/__init__.py", line 82, in create_module
return importlib.import_module('._distutils', 'setuptools')
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/importlib/__init__.py", line 126, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
ModuleNotFoundError: No module named 'setuptools._distutils'
----------------------------------------
(Command "python setup.py egg_info" failed with error code 1 in /tmpfs/tmp/pip-build-w9bb1l9t/pypandoc/
)
INFO: Elapsed time: 2.236s
INFO: 0 processes.
FAILED: Build did NOT complete successfully (0 packages loaded)
FAILED: Build did NOT complete successfully (0 packages loaded)
Traceback (most recent call last):
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main
"__main__", mod_spec)
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code
exec(code, run_globals)
File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 102, in <module>
main()
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 829, in __call__
return self.main(*args, **kwargs)
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 782, in main
rv = self.invoke(ctx)
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 1066, in invoke
return ctx.invoke(self.callback, **ctx.params)
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 610, in invoke
return callback(*args, **kwargs)
File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 94, in main
spec.loader.exec_module(synth_module) # type: ignore
File "<frozen importlib._bootstrap_external>", line 678, in exec_module
File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed
File "/home/kbuilder/.cache/synthtool/python-securitycenter/synth.py", line 32, in <module>
include_protos=True
File "/tmpfs/src/github/synthtool/synthtool/gcp/gapic_bazel.py", line 46, in py_library
return self._generate_code(service, version, "python", **kwargs)
File "/tmpfs/src/github/synthtool/synthtool/gcp/gapic_bazel.py", line 183, in _generate_code
shell.run(bazel_run_args)
File "/tmpfs/src/github/synthtool/synthtool/shell.py", line 39, in run
raise exc
File "/tmpfs/src/github/synthtool/synthtool/shell.py", line 33, in run
encoding="utf-8",
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 438, in run
output=stdout, stderr=stderr)
subprocess.CalledProcessError: Command '['bazel', '--max_idle_secs=240', 'build', '//google/cloud/securitycenter/v1p1beta1:securitycenter-v1p1beta1-py']' returned non-zero exit status 1.
2020-08-31 05:24:14,733 autosynth [ERROR] > Synthesis failed
2020-08-31 05:24:14,733 autosynth [DEBUG] > Running: git reset --hard HEAD
HEAD is now at c70d790 docs: Update Security Command Center UpdateNotificationConfig sample, adding filter to mutable field (#39)
2020-08-31 05:24:14,739 autosynth [DEBUG] > Running: git checkout autosynth
Switched to branch 'autosynth'
2020-08-31 05:24:14,744 autosynth [DEBUG] > Running: git clean -fdx
Removing __pycache__/
Removing google/__pycache__/
Traceback (most recent call last):
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main
"__main__", mod_spec)
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code
exec(code, run_globals)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 690, in <module>
main()
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 539, in main
return _inner_main(temp_dir)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 670, in _inner_main
commit_count = synthesize_loop(x, multiple_prs, change_pusher, synthesizer)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 375, in synthesize_loop
has_changes = toolbox.synthesize_version_in_new_branch(synthesizer, youngest)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 273, in synthesize_version_in_new_branch
synthesizer.synthesize(synth_log_path, self.environ)
File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 120, in synthesize
synth_proc.check_returncode() # Raise an exception.
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 389, in check_returncode
self.stderr)
subprocess.CalledProcessError: Command '['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'synth.metadata', 'synth.py', '--']' returned non-zero exit status 1.
```
Google internal developers can see the full log [here](http://sponge2/results/invocations/62315112-900b-4eef-8d49-c6c399a38931/targets/github%2Fsynthtool;config=default/tests;query=python-securitycenter;failed=false).
| 1.0 | Synthesis failed for python-securitycenter - Hello! Autosynth couldn't regenerate python-securitycenter. :broken_heart:
Here's the output from running `synth.py`:
```
ages/30/9e/f663a2aa66a09d838042ae1a2c5659828bb9b41ea3a6efa20a20fd92b121/Jinja2-2.11.2-py2.py3-none-any.whl
Saved ./Jinja2-2.11.2-py2.py3-none-any.whl
Collecting MarkupSafe==1.1.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 5))
Using cached https://files.pythonhosted.org/packages/b2/5f/23e0023be6bb885d00ffbefad2942bc51a620328ee910f64abe5a8d18dd1/MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl
Saved ./MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl
Collecting protobuf==3.13.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 6))
Using cached https://files.pythonhosted.org/packages/30/79/510974552cebff2ba04038544799450defe75e96ea5f1675dbf72cc8744f/protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl
Saved ./protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl
Collecting pypandoc==1.5 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 7))
Using cached https://files.pythonhosted.org/packages/d6/b7/5050dc1769c8a93d3ec7c4bd55be161991c94b8b235f88bf7c764449e708/pypandoc-1.5.tar.gz
Complete output from command python setup.py egg_info:
Traceback (most recent call last):
File "<string>", line 1, in <module>
File "/tmpfs/tmp/tmpnk_5ehky/setuptools-tmp/setuptools/__init__.py", line 6, in <module>
import distutils.core
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/_distutils_hack/__init__.py", line 82, in create_module
return importlib.import_module('._distutils', 'setuptools')
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/importlib/__init__.py", line 126, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
ModuleNotFoundError: No module named 'setuptools._distutils'
----------------------------------------
(Command "python setup.py egg_info" failed with error code 1 in /tmpfs/tmp/pip-build-w9bb1l9t/pypandoc/
)
ERROR: no such package '@gapic_generator_python_pip_deps//': pip_import failed: Collecting click==7.1.2 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 1))
Using cached https://files.pythonhosted.org/packages/d2/3d/fa76db83bf75c4f8d338c2fd15c8d33fdd7ad23a9b5e57eb6c5de26b430e/click-7.1.2-py2.py3-none-any.whl
Saved ./click-7.1.2-py2.py3-none-any.whl
Collecting google-api-core==1.22.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 2))
Using cached https://files.pythonhosted.org/packages/e0/2d/7c6c75013105e1d2b6eaa1bf18a56995be1dbc673c38885aea31136e9918/google_api_core-1.22.1-py2.py3-none-any.whl
Saved ./google_api_core-1.22.1-py2.py3-none-any.whl
Collecting googleapis-common-protos==1.52.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 3))
Using cached https://files.pythonhosted.org/packages/03/74/3956721ea1eb4bcf7502a311fdaa60b85bd751de4e57d1943afe9b334141/googleapis_common_protos-1.52.0-py2.py3-none-any.whl
Saved ./googleapis_common_protos-1.52.0-py2.py3-none-any.whl
Collecting jinja2==2.11.2 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 4))
Using cached https://files.pythonhosted.org/packages/30/9e/f663a2aa66a09d838042ae1a2c5659828bb9b41ea3a6efa20a20fd92b121/Jinja2-2.11.2-py2.py3-none-any.whl
Saved ./Jinja2-2.11.2-py2.py3-none-any.whl
Collecting MarkupSafe==1.1.1 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 5))
Using cached https://files.pythonhosted.org/packages/b2/5f/23e0023be6bb885d00ffbefad2942bc51a620328ee910f64abe5a8d18dd1/MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl
Saved ./MarkupSafe-1.1.1-cp36-cp36m-manylinux1_x86_64.whl
Collecting protobuf==3.13.0 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 6))
Using cached https://files.pythonhosted.org/packages/30/79/510974552cebff2ba04038544799450defe75e96ea5f1675dbf72cc8744f/protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl
Saved ./protobuf-3.13.0-cp36-cp36m-manylinux1_x86_64.whl
Collecting pypandoc==1.5 (from -r /home/kbuilder/.cache/bazel/_bazel_kbuilder/a732f932c2cbeb7e37e1543f189a2a73/external/gapic_generator_python/requirements.txt (line 7))
Using cached https://files.pythonhosted.org/packages/d6/b7/5050dc1769c8a93d3ec7c4bd55be161991c94b8b235f88bf7c764449e708/pypandoc-1.5.tar.gz
Complete output from command python setup.py egg_info:
Traceback (most recent call last):
File "<string>", line 1, in <module>
File "/tmpfs/tmp/tmpnk_5ehky/setuptools-tmp/setuptools/__init__.py", line 6, in <module>
import distutils.core
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/_distutils_hack/__init__.py", line 82, in create_module
return importlib.import_module('._distutils', 'setuptools')
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/importlib/__init__.py", line 126, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
ModuleNotFoundError: No module named 'setuptools._distutils'
----------------------------------------
(Command "python setup.py egg_info" failed with error code 1 in /tmpfs/tmp/pip-build-w9bb1l9t/pypandoc/
)
INFO: Elapsed time: 2.236s
INFO: 0 processes.
FAILED: Build did NOT complete successfully (0 packages loaded)
FAILED: Build did NOT complete successfully (0 packages loaded)
Traceback (most recent call last):
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main
"__main__", mod_spec)
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code
exec(code, run_globals)
File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 102, in <module>
main()
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 829, in __call__
return self.main(*args, **kwargs)
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 782, in main
rv = self.invoke(ctx)
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 1066, in invoke
return ctx.invoke(self.callback, **ctx.params)
File "/tmpfs/src/github/synthtool/env/lib/python3.6/site-packages/click/core.py", line 610, in invoke
return callback(*args, **kwargs)
File "/tmpfs/src/github/synthtool/synthtool/__main__.py", line 94, in main
spec.loader.exec_module(synth_module) # type: ignore
File "<frozen importlib._bootstrap_external>", line 678, in exec_module
File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed
File "/home/kbuilder/.cache/synthtool/python-securitycenter/synth.py", line 32, in <module>
include_protos=True
File "/tmpfs/src/github/synthtool/synthtool/gcp/gapic_bazel.py", line 46, in py_library
return self._generate_code(service, version, "python", **kwargs)
File "/tmpfs/src/github/synthtool/synthtool/gcp/gapic_bazel.py", line 183, in _generate_code
shell.run(bazel_run_args)
File "/tmpfs/src/github/synthtool/synthtool/shell.py", line 39, in run
raise exc
File "/tmpfs/src/github/synthtool/synthtool/shell.py", line 33, in run
encoding="utf-8",
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 438, in run
output=stdout, stderr=stderr)
subprocess.CalledProcessError: Command '['bazel', '--max_idle_secs=240', 'build', '//google/cloud/securitycenter/v1p1beta1:securitycenter-v1p1beta1-py']' returned non-zero exit status 1.
2020-08-31 05:24:14,733 autosynth [ERROR] > Synthesis failed
2020-08-31 05:24:14,733 autosynth [DEBUG] > Running: git reset --hard HEAD
HEAD is now at c70d790 docs: Update Security Command Center UpdateNotificationConfig sample, adding filter to mutable field (#39)
2020-08-31 05:24:14,739 autosynth [DEBUG] > Running: git checkout autosynth
Switched to branch 'autosynth'
2020-08-31 05:24:14,744 autosynth [DEBUG] > Running: git clean -fdx
Removing __pycache__/
Removing google/__pycache__/
Traceback (most recent call last):
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main
"__main__", mod_spec)
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code
exec(code, run_globals)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 690, in <module>
main()
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 539, in main
return _inner_main(temp_dir)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 670, in _inner_main
commit_count = synthesize_loop(x, multiple_prs, change_pusher, synthesizer)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 375, in synthesize_loop
has_changes = toolbox.synthesize_version_in_new_branch(synthesizer, youngest)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 273, in synthesize_version_in_new_branch
synthesizer.synthesize(synth_log_path, self.environ)
File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 120, in synthesize
synth_proc.check_returncode() # Raise an exception.
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/subprocess.py", line 389, in check_returncode
self.stderr)
subprocess.CalledProcessError: Command '['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'synth.metadata', 'synth.py', '--']' returned non-zero exit status 1.
```
Google internal developers can see the full log [here](http://sponge2/results/invocations/62315112-900b-4eef-8d49-c6c399a38931/targets/github%2Fsynthtool;config=default/tests;query=python-securitycenter;failed=false).
| priority | synthesis failed for python securitycenter hello autosynth couldn t regenerate python securitycenter broken heart here s the output from running synth py ages none any whl saved none any whl collecting markupsafe from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved markupsafe whl collecting protobuf from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved protobuf whl collecting pypandoc from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached complete output from command python setup py egg info traceback most recent call last file line in file tmpfs tmp tmpnk setuptools tmp setuptools init py line in import distutils core file tmpfs src github synthtool env lib site packages distutils hack init py line in create module return importlib import module distutils setuptools file home kbuilder pyenv versions lib importlib init py line in import module return bootstrap gcd import name package level modulenotfounderror no module named setuptools distutils command python setup py egg info failed with error code in tmpfs tmp pip build pypandoc error no such package gapic generator python pip deps pip import failed collecting click from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved click none any whl collecting google api core from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved google api core none any whl collecting googleapis common protos from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved googleapis common protos none any whl collecting from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved none any whl collecting markupsafe from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved markupsafe whl collecting protobuf from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached saved protobuf whl collecting pypandoc from r home kbuilder cache bazel bazel kbuilder external gapic generator python requirements txt line using cached complete output from command python setup py egg info traceback most recent call last file line in file tmpfs tmp tmpnk setuptools tmp setuptools init py line in import distutils core file tmpfs src github synthtool env lib site packages distutils hack init py line in create module return importlib import module distutils setuptools file home kbuilder pyenv versions lib importlib init py line in import module return bootstrap gcd import name package level modulenotfounderror no module named setuptools distutils command python setup py egg info failed with error code in tmpfs tmp pip build pypandoc info elapsed time info processes failed build did not complete successfully packages loaded failed build did not complete successfully packages loaded traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src github synthtool synthtool main py line in main file tmpfs src github synthtool env lib site packages click core py line in call return self main args kwargs file tmpfs src github synthtool env lib site packages click core py line in main rv self invoke ctx file tmpfs src github synthtool env lib site packages click core py line in invoke return ctx invoke self callback ctx params file tmpfs src github synthtool env lib site packages click core py line in invoke return callback args kwargs file tmpfs src github synthtool synthtool main py line in main spec loader exec module synth module type ignore file line in exec module file line in call with frames removed file home kbuilder cache synthtool python securitycenter synth py line in include protos true file tmpfs src github synthtool synthtool gcp gapic bazel py line in py library return self generate code service version python kwargs file tmpfs src github synthtool synthtool gcp gapic bazel py line in generate code shell run bazel run args file tmpfs src github synthtool synthtool shell py line in run raise exc file tmpfs src github synthtool synthtool shell py line in run encoding utf file home kbuilder pyenv versions lib subprocess py line in run output stdout stderr stderr subprocess calledprocesserror command returned non zero exit status autosynth synthesis failed autosynth running git reset hard head head is now at docs update security command center updatenotificationconfig sample adding filter to mutable field autosynth running git checkout autosynth switched to branch autosynth autosynth running git clean fdx removing pycache removing google pycache traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src github synthtool autosynth synth py line in main file tmpfs src github synthtool autosynth synth py line in main return inner main temp dir file tmpfs src github synthtool autosynth synth py line in inner main commit count synthesize loop x multiple prs change pusher synthesizer file tmpfs src github synthtool autosynth synth py line in synthesize loop has changes toolbox synthesize version in new branch synthesizer youngest file tmpfs src github synthtool autosynth synth py line in synthesize version in new branch synthesizer synthesize synth log path self environ file tmpfs src github synthtool autosynth synthesizer py line in synthesize synth proc check returncode raise an exception file home kbuilder pyenv versions lib subprocess py line in check returncode self stderr subprocess calledprocesserror command returned non zero exit status google internal developers can see the full log | 1 |
341,408 | 10,295,395,113 | IssuesEvent | 2019-08-27 22:06:19 | metabase/metabase | https://api.github.com/repos/metabase/metabase | opened | Unbinned geo mapping broken | Priority:P2 Type:Bug Visualization/ | Sample dataset; Orders grouped by Users/long, Users/lat, both unbinned:
Problem 1:
The default map is grid which errors out on un-binned coordinates
Problem 2:
If I manually choose pin map, nothing gets mapped, while pin map works for binned coordinates. | 1.0 | Unbinned geo mapping broken - Sample dataset; Orders grouped by Users/long, Users/lat, both unbinned:
Problem 1:
The default map is grid which errors out on un-binned coordinates
Problem 2:
If I manually choose pin map, nothing gets mapped, while pin map works for binned coordinates. | priority | unbinned geo mapping broken sample dataset orders grouped by users long users lat both unbinned problem the default map is grid which errors out on un binned coordinates problem if i manually choose pin map nothing gets mapped while pin map works for binned coordinates | 1 |
745,785 | 26,000,667,625 | IssuesEvent | 2022-12-20 15:05:28 | o3de/o3de | https://api.github.com/repos/o3de/o3de | closed | [Terrain] Painting on a tiny texture doesn't allow for per-pixel painting. | kind/bug sig/content triage/accepted priority/minor feature/terrain | **Describe the bug**
When a tiny texture is mapped to a large world space, and the paintbrush is the size of a pixel, painting doesn't let you paint anything.
**Steps to reproduce**
Steps to reproduce the behavior:
1. Create a new level.
2. Add a Terrain World and a Terrain World Renderer component.
3. Create an entity named 'Terrain' at (0, 0, 50) with an Axis Aligned Box Shape of (256, 256, 100), Terrain Layer Spawner, and Terrain Height Gradient List.
4. Create a child entity named 'Height' with an Image Gradient, a Gradient Transform Modifier, and a Shape Reference pointing back to Terrain.
5. Add the Height entity to the Terrain Height Gradient List.
6. On the Image Gradient, choose "Create New Image" and create an image that is 4x4 in size. Save it in the level folder.
7. Edit the image.
8. Try to paint with a Paint Brush sized 64 m in the upper left corner of the terrain. This should paint the first pixel in the image.

**Expected behavior**
The first pixel should turn white.
**Actual behavior**
Only large rapid brush strokes will cause any pixels to change color.
**Found in Branch**
development
**Additional context**
This is happening because the Image Gradient is trying to query the paintbrush for opacity on the corners of the square around the brush, which are all 0 because the brush is a circle, not a square. The Image Gradient should query from the center of each square representing a pixel, not the corners. | 1.0 | [Terrain] Painting on a tiny texture doesn't allow for per-pixel painting. - **Describe the bug**
When a tiny texture is mapped to a large world space, and the paintbrush is the size of a pixel, painting doesn't let you paint anything.
**Steps to reproduce**
Steps to reproduce the behavior:
1. Create a new level.
2. Add a Terrain World and a Terrain World Renderer component.
3. Create an entity named 'Terrain' at (0, 0, 50) with an Axis Aligned Box Shape of (256, 256, 100), Terrain Layer Spawner, and Terrain Height Gradient List.
4. Create a child entity named 'Height' with an Image Gradient, a Gradient Transform Modifier, and a Shape Reference pointing back to Terrain.
5. Add the Height entity to the Terrain Height Gradient List.
6. On the Image Gradient, choose "Create New Image" and create an image that is 4x4 in size. Save it in the level folder.
7. Edit the image.
8. Try to paint with a Paint Brush sized 64 m in the upper left corner of the terrain. This should paint the first pixel in the image.

**Expected behavior**
The first pixel should turn white.
**Actual behavior**
Only large rapid brush strokes will cause any pixels to change color.
**Found in Branch**
development
**Additional context**
This is happening because the Image Gradient is trying to query the paintbrush for opacity on the corners of the square around the brush, which are all 0 because the brush is a circle, not a square. The Image Gradient should query from the center of each square representing a pixel, not the corners. | priority | painting on a tiny texture doesn t allow for per pixel painting describe the bug when a tiny texture is mapped to a large world space and the paintbrush is the size of a pixel painting doesn t let you paint anything steps to reproduce steps to reproduce the behavior create a new level add a terrain world and a terrain world renderer component create an entity named terrain at with an axis aligned box shape of terrain layer spawner and terrain height gradient list create a child entity named height with an image gradient a gradient transform modifier and a shape reference pointing back to terrain add the height entity to the terrain height gradient list on the image gradient choose create new image and create an image that is in size save it in the level folder edit the image try to paint with a paint brush sized m in the upper left corner of the terrain this should paint the first pixel in the image expected behavior the first pixel should turn white actual behavior only large rapid brush strokes will cause any pixels to change color found in branch development additional context this is happening because the image gradient is trying to query the paintbrush for opacity on the corners of the square around the brush which are all because the brush is a circle not a square the image gradient should query from the center of each square representing a pixel not the corners | 1 |
63,244 | 3,194,335,609 | IssuesEvent | 2015-09-30 11:32:24 | fusioninventory/fusioninventory-for-glpi | https://api.github.com/repos/fusioninventory/fusioninventory-for-glpi | closed | SNMP: Allow deletion of OIDs | Category: SNMP Component: For junior contributor Component: Found in version Priority: Normal Status: Closed Tracker: Bug | ---
Author Name: **Mat Simon** (@matsimon)
Original Redmine Issue: 1846, http://forge.fusioninventory.org/issues/1846
Original Date: 2012-10-08
Original Assignee: David Durieux
---
If one needs to add an additional OID for let's say firnware information, one sometimes needs to try and error. Please add removal option (Example may have wrongly been added with Netgear GS110TP switch during test)
| 1.0 | SNMP: Allow deletion of OIDs - ---
Author Name: **Mat Simon** (@matsimon)
Original Redmine Issue: 1846, http://forge.fusioninventory.org/issues/1846
Original Date: 2012-10-08
Original Assignee: David Durieux
---
If one needs to add an additional OID for let's say firnware information, one sometimes needs to try and error. Please add removal option (Example may have wrongly been added with Netgear GS110TP switch during test)
| priority | snmp allow deletion of oids author name mat simon matsimon original redmine issue original date original assignee david durieux if one needs to add an additional oid for let s say firnware information one sometimes needs to try and error please add removal option example may have wrongly been added with netgear switch during test | 1 |
351,419 | 10,518,291,263 | IssuesEvent | 2019-09-29 09:44:38 | pixelfed/pixelfed | https://api.github.com/repos/pixelfed/pixelfed | closed | [Masterpost] Missing functionality and related issues from the beta launch | 🚨 Priority: Critical | Figured it'd be good to maintain a list of things that are currently missing and would be expected to be implemented.
## Timeline/posts
Posts
- [x] ~Posting UI should be separated from timeline (#89, #86 #168, fixed #349 )~
- [x] ~Post without a caption (#110)~
- [x] ~Show caption limit before posting (#121, fixed by #127)~
- [x] ~Show size/format limit before posting~
- [ ] Preserve caption for editing if too long (#236)
- [x] ~Show live character count for JS users (#346)~
- [x] ~Preview image before posting (#171)~
- [x] ~Preview multiple images before posting (https://github.com/dansup/pixelfed/issues/171#issuecomment-397224719, fixed by #524 )~
- [x] ~Delete images (#98)~
- [x] ~Show own posts in personal timeline (#85) (fixed by #190)~
- [x] ~Filters~
- [x] ~Separate filters for each image in album (#266, fixed in #524)~
- [x] ~Edit filters after upload (#798)~
- [ ] Edit album order (#798)
- [ ] Embed code (currently #) (#776)
Likes
- [x] ~Indicate liked posts with filled heart rather than underline (#70) (fixed #186 #187 #188)~
- [x] ~Indicate liked posts on post page, not just on timeline (#207)~
- [ ] Animation for liking a post (potentially fixed by #222)
- [x] ~Storing liked/unliked state without having to refresh the page (#87) (fixed by #186)~
- [x] ~Listing who liked a post (#213)~
Comments
- [x] ~Comment button should link to all comments (#161)~
- [x] ~Load more comments~
- [x] ~Parse mentions (#231)~
- [x] ~Parse hashtags~
- [x] ~Parse links~
- [x] ~Like comments~
- [x] ~Reply to comments~
- [x] ~Delete comments (#97)~
- [x] ~Show comment in context on permalink (#234)~
- [ ] Show live character count for JS users
- [ ] Preserve comment for editing if too long (WIP #236)
Save
- [x] ~Saving posts not implemented fully -- can't unsave posts (#64)~
## Search/tags:
- [x] ~Hashtag suggestion breaks with 3+ characters or # sign (#76, fixed by #488)~
- [ ] Sort tag suggestions by how many posts they have
- [x] ~Irregular suggestions (#88)~
- [x] ~Hashtag page avatars (#69)~
## Discover:
- [x] ~Scroll through profile suggestions, show more than just 3 at a time (deprecated)~
- [x] ~Allow for temporarily / permanently clearing a suggestion (deprecated)~
- [x] ~Do not clear suggestion immediately after following (only clear on page refresh, to allow undo) (deprecated)~
- [x] ~Do not suggest your own account (#74) (fixed by #108) (deprecated)~
- [x] ~Uniform square thumbnails (potentially fixed by #168)~
## Activity:
- [x] ~"Follow" button should change after following someone (#63) (fixed by #95)~
- [x] ~Notifications of liked posts should link to those posts (#58)~
- [ ] New notification indicator
## Profile:
- [x] ~Count only images as "posts" (#84) (fixed by https://github.com/dansup/pixelfed/commit/ae6a59e782713bfd73924dbf271e646fe00bc656)~
- [x] ~Follower/following lists should allow un/following accounts (#65) (fixed by #105)~
- [x] ~Detect and regenerate failed thumbnails (#67)~
- [x] ~Unsave posts from "Saved" tab~
- [ ] Parse mentions in bio
- [ ] Parse hashtags in bio
- [ ] Parse links in bio
- [ ] Allow editing bio directly from My Profile
- [x] ~Show bio on follower/following pages~
## Settings:
- [x] ~Character count while setting bio (#59)~
- [x] ~Reduced motion (#226)~
- [ ] Finish user settings (#3)
- [x] ~Change avatar/email~
- [x] ~Email/notification/~privacy~/security settings~
- [ ] Import/export data (#814)
- [x] Applications/Developers OAuth
## Documentation:
- [x] ~"About" is sparse~
- [x] ~"Features" (removed)~
- [x] ~"Help" (some empty pages)~
- [ ] "Fediverse" is sparse
- [ ] "Open source" is sparse
- [x] ~"Terms"~
- [x] ~"Privacy" policy~
- [ ] "Platform"/API terms is orphaned https://pixelfed.social/site/platform
- [x] ~"Libraries" (removed)~
## Footer links:
- [x] ~"API" links to /timeline instead of api docs~
- [x] ~"Directory" (removed)~
- [x] ~"Profiles" (removed)~
- [x] ~"Hashtags" (removed)~
- [x] ~"Language" links nowhere~
- [x] ~"C 2018 PIXELFED.ORG" links nowhere (should link to pixelfed.org?)~
- [x] ~is copyright even the right symbol here? Shouldn't it instead reflect the license of the project somehow?~
Registration (#373):
- [ ] Terms
- [ ] Data policy
- [ ] Cookie policy
## Other things on the roadmap:
- "Major features" (#6)
- [x] ~Image albums/video upload~
- [ ] ~Mentions~/DMs
- [x] ~View public timeline while logged out (#214, replaced with Discover page)~
| 1.0 | [Masterpost] Missing functionality and related issues from the beta launch - Figured it'd be good to maintain a list of things that are currently missing and would be expected to be implemented.
## Timeline/posts
Posts
- [x] ~Posting UI should be separated from timeline (#89, #86 #168, fixed #349 )~
- [x] ~Post without a caption (#110)~
- [x] ~Show caption limit before posting (#121, fixed by #127)~
- [x] ~Show size/format limit before posting~
- [ ] Preserve caption for editing if too long (#236)
- [x] ~Show live character count for JS users (#346)~
- [x] ~Preview image before posting (#171)~
- [x] ~Preview multiple images before posting (https://github.com/dansup/pixelfed/issues/171#issuecomment-397224719, fixed by #524 )~
- [x] ~Delete images (#98)~
- [x] ~Show own posts in personal timeline (#85) (fixed by #190)~
- [x] ~Filters~
- [x] ~Separate filters for each image in album (#266, fixed in #524)~
- [x] ~Edit filters after upload (#798)~
- [ ] Edit album order (#798)
- [ ] Embed code (currently #) (#776)
Likes
- [x] ~Indicate liked posts with filled heart rather than underline (#70) (fixed #186 #187 #188)~
- [x] ~Indicate liked posts on post page, not just on timeline (#207)~
- [ ] Animation for liking a post (potentially fixed by #222)
- [x] ~Storing liked/unliked state without having to refresh the page (#87) (fixed by #186)~
- [x] ~Listing who liked a post (#213)~
Comments
- [x] ~Comment button should link to all comments (#161)~
- [x] ~Load more comments~
- [x] ~Parse mentions (#231)~
- [x] ~Parse hashtags~
- [x] ~Parse links~
- [x] ~Like comments~
- [x] ~Reply to comments~
- [x] ~Delete comments (#97)~
- [x] ~Show comment in context on permalink (#234)~
- [ ] Show live character count for JS users
- [ ] Preserve comment for editing if too long (WIP #236)
Save
- [x] ~Saving posts not implemented fully -- can't unsave posts (#64)~
## Search/tags:
- [x] ~Hashtag suggestion breaks with 3+ characters or # sign (#76, fixed by #488)~
- [ ] Sort tag suggestions by how many posts they have
- [x] ~Irregular suggestions (#88)~
- [x] ~Hashtag page avatars (#69)~
## Discover:
- [x] ~Scroll through profile suggestions, show more than just 3 at a time (deprecated)~
- [x] ~Allow for temporarily / permanently clearing a suggestion (deprecated)~
- [x] ~Do not clear suggestion immediately after following (only clear on page refresh, to allow undo) (deprecated)~
- [x] ~Do not suggest your own account (#74) (fixed by #108) (deprecated)~
- [x] ~Uniform square thumbnails (potentially fixed by #168)~
## Activity:
- [x] ~"Follow" button should change after following someone (#63) (fixed by #95)~
- [x] ~Notifications of liked posts should link to those posts (#58)~
- [ ] New notification indicator
## Profile:
- [x] ~Count only images as "posts" (#84) (fixed by https://github.com/dansup/pixelfed/commit/ae6a59e782713bfd73924dbf271e646fe00bc656)~
- [x] ~Follower/following lists should allow un/following accounts (#65) (fixed by #105)~
- [x] ~Detect and regenerate failed thumbnails (#67)~
- [x] ~Unsave posts from "Saved" tab~
- [ ] Parse mentions in bio
- [ ] Parse hashtags in bio
- [ ] Parse links in bio
- [ ] Allow editing bio directly from My Profile
- [x] ~Show bio on follower/following pages~
## Settings:
- [x] ~Character count while setting bio (#59)~
- [x] ~Reduced motion (#226)~
- [ ] Finish user settings (#3)
- [x] ~Change avatar/email~
- [x] ~Email/notification/~privacy~/security settings~
- [ ] Import/export data (#814)
- [x] Applications/Developers OAuth
## Documentation:
- [x] ~"About" is sparse~
- [x] ~"Features" (removed)~
- [x] ~"Help" (some empty pages)~
- [ ] "Fediverse" is sparse
- [ ] "Open source" is sparse
- [x] ~"Terms"~
- [x] ~"Privacy" policy~
- [ ] "Platform"/API terms is orphaned https://pixelfed.social/site/platform
- [x] ~"Libraries" (removed)~
## Footer links:
- [x] ~"API" links to /timeline instead of api docs~
- [x] ~"Directory" (removed)~
- [x] ~"Profiles" (removed)~
- [x] ~"Hashtags" (removed)~
- [x] ~"Language" links nowhere~
- [x] ~"C 2018 PIXELFED.ORG" links nowhere (should link to pixelfed.org?)~
- [x] ~is copyright even the right symbol here? Shouldn't it instead reflect the license of the project somehow?~
Registration (#373):
- [ ] Terms
- [ ] Data policy
- [ ] Cookie policy
## Other things on the roadmap:
- "Major features" (#6)
- [x] ~Image albums/video upload~
- [ ] ~Mentions~/DMs
- [x] ~View public timeline while logged out (#214, replaced with Discover page)~
| priority | missing functionality and related issues from the beta launch figured it d be good to maintain a list of things that are currently missing and would be expected to be implemented timeline posts posts posting ui should be separated from timeline fixed post without a caption show caption limit before posting fixed by show size format limit before posting preserve caption for editing if too long show live character count for js users preview image before posting preview multiple images before posting fixed by delete images show own posts in personal timeline fixed by filters separate filters for each image in album fixed in edit filters after upload edit album order embed code currently likes indicate liked posts with filled heart rather than underline fixed indicate liked posts on post page not just on timeline animation for liking a post potentially fixed by storing liked unliked state without having to refresh the page fixed by listing who liked a post comments comment button should link to all comments load more comments parse mentions parse hashtags parse links like comments reply to comments delete comments show comment in context on permalink show live character count for js users preserve comment for editing if too long wip save saving posts not implemented fully can t unsave posts search tags hashtag suggestion breaks with characters or sign fixed by sort tag suggestions by how many posts they have irregular suggestions hashtag page avatars discover scroll through profile suggestions show more than just at a time deprecated allow for temporarily permanently clearing a suggestion deprecated do not clear suggestion immediately after following only clear on page refresh to allow undo deprecated do not suggest your own account fixed by deprecated uniform square thumbnails potentially fixed by activity follow button should change after following someone fixed by notifications of liked posts should link to those posts new notification indicator profile count only images as posts fixed by follower following lists should allow un following accounts fixed by detect and regenerate failed thumbnails unsave posts from saved tab parse mentions in bio parse hashtags in bio parse links in bio allow editing bio directly from my profile show bio on follower following pages settings character count while setting bio reduced motion finish user settings change avatar email email notification privacy security settings import export data applications developers oauth documentation about is sparse features removed help some empty pages fediverse is sparse open source is sparse terms privacy policy platform api terms is orphaned libraries removed footer links api links to timeline instead of api docs directory removed profiles removed hashtags removed language links nowhere c pixelfed org links nowhere should link to pixelfed org is copyright even the right symbol here shouldn t it instead reflect the license of the project somehow registration terms data policy cookie policy other things on the roadmap major features image albums video upload mentions dms view public timeline while logged out replaced with discover page | 1 |
264,547 | 8,316,517,518 | IssuesEvent | 2018-09-25 09:16:24 | telerik/kendo-ui-core | https://api.github.com/repos/telerik/kendo-ui-core | closed | Command with template throws an error when command.visible handler is added | Bug C: Grid Kendo1 Priority 1 SEV: Low | ### Reproduction of the problem
1. Run [this dojo](https://dojo.telerik.com/OHeXajOF)
1. Error occurs and the content of the grid does not render
### Environment
* **Kendo UI version:** 2018.3.911
| 1.0 | Command with template throws an error when command.visible handler is added - ### Reproduction of the problem
1. Run [this dojo](https://dojo.telerik.com/OHeXajOF)
1. Error occurs and the content of the grid does not render
### Environment
* **Kendo UI version:** 2018.3.911
| priority | command with template throws an error when command visible handler is added reproduction of the problem run error occurs and the content of the grid does not render environment kendo ui version | 1 |
152,821 | 19,697,598,591 | IssuesEvent | 2022-01-12 13:45:14 | RG4421/mmRTLS | https://api.github.com/repos/RG4421/mmRTLS | closed | CVE-2021-35065 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-5.1.2.tgz - autoclosed | security vulnerability | ## CVE-2021-35065 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: /ctrlSrv/processor/package.json</p>
<p>Path to vulnerable library: /ctrlSrv/processor/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- babel-cli-6.26.0.tgz (Root Library)
- chokidar-1.7.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-5.1.2.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p>
<p>
Dependency Hierarchy:
- eslint-7.26.0.tgz (Root Library)
- :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: glob-parent - 6.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/ctrlSrv/processor/package.json"],"isTransitiveDependency":true,"dependencyTree":"babel-cli:6.26.0;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"5.1.2","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"eslint:7.26.0;glob-parent:5.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-35065","vulnerabilityDetails":"The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-35065 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-5.1.2.tgz - autoclosed - ## CVE-2021-35065 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: /ctrlSrv/processor/package.json</p>
<p>Path to vulnerable library: /ctrlSrv/processor/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- babel-cli-6.26.0.tgz (Root Library)
- chokidar-1.7.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-5.1.2.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p>
<p>
Dependency Hierarchy:
- eslint-7.26.0.tgz (Root Library)
- :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: glob-parent - 6.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/ctrlSrv/processor/package.json"],"isTransitiveDependency":true,"dependencyTree":"babel-cli:6.26.0;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"5.1.2","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"eslint:7.26.0;glob-parent:5.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-35065","vulnerabilityDetails":"The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in glob parent tgz glob parent tgz autoclosed cve medium severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file ctrlsrv processor package json path to vulnerable library ctrlsrv processor node modules glob parent package json dependency hierarchy babel cli tgz root library chokidar tgz x glob parent tgz vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href dependency hierarchy eslint tgz root library x glob parent tgz vulnerable library found in base branch main vulnerability details the package glob parent before are vulnerable to regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree babel cli chokidar glob parent isminimumfixversionavailable true minimumfixversion glob parent isbinary false packagetype javascript node js packagename glob parent packageversion packagefilepaths istransitivedependency true dependencytree eslint glob parent isminimumfixversionavailable true minimumfixversion glob parent isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the package glob parent before are vulnerable to regular expression denial of service redos vulnerabilityurl | 0 |
195,012 | 6,901,654,760 | IssuesEvent | 2017-11-25 10:39:10 | gabrielkrell/strain-rig | https://api.github.com/repos/gabrielkrell/strain-rig | closed | Use interrupts to move motor | Priority: High Status: Completed Type: Enhancement | For best results, the motor should get a tick about every 110µs. Printing everything to serial takes way longer than that, so we should use interrupts to make sure it always happens. | 1.0 | Use interrupts to move motor - For best results, the motor should get a tick about every 110µs. Printing everything to serial takes way longer than that, so we should use interrupts to make sure it always happens. | priority | use interrupts to move motor for best results the motor should get a tick about every printing everything to serial takes way longer than that so we should use interrupts to make sure it always happens | 1 |
387,575 | 26,727,321,463 | IssuesEvent | 2023-01-29 21:35:28 | aws/aws-cdk | https://api.github.com/repos/aws/aws-cdk | opened | aws_cdk.RemovalPolicy: Default is stated incorrectly as Destroy | needs-triage documentation | ### Describe the issue
**Destroy** is indicated as the default which is incorrect for AWS CDK as can be seen in:
- CDK Developer Guide
RemovalPolicy.RETAIN Keep the contents of the resource when destroying the stack (default). The resource is orphaned from the stack and must be deleted manually. If you attempt to re-deploy the stack while the resource still exists, you will receive an error message due to a name conflict

- API reference --> S3/Bucket class that shows:
removal_policy (Optional[RemovalPolicy]) removal_policy (Optional[[RemovalPolicy] – Policy to apply when the bucket is removed from this stack. Default: - The bucket will be orphaned.
In essence, **Retain** is the default, not **Destroy**.
Could we kindly have this updated.
Many thanks for the help.
### Links
https://docs.aws.amazon.com/cdk/api/v2/python/aws_cdk/RemovalPolicy.html#aws_cdk.RemovalPolicy.DESTROY | 1.0 | aws_cdk.RemovalPolicy: Default is stated incorrectly as Destroy - ### Describe the issue
**Destroy** is indicated as the default which is incorrect for AWS CDK as can be seen in:
- CDK Developer Guide
RemovalPolicy.RETAIN Keep the contents of the resource when destroying the stack (default). The resource is orphaned from the stack and must be deleted manually. If you attempt to re-deploy the stack while the resource still exists, you will receive an error message due to a name conflict

- API reference --> S3/Bucket class that shows:
removal_policy (Optional[RemovalPolicy]) removal_policy (Optional[[RemovalPolicy] – Policy to apply when the bucket is removed from this stack. Default: - The bucket will be orphaned.
In essence, **Retain** is the default, not **Destroy**.
Could we kindly have this updated.
Many thanks for the help.
### Links
https://docs.aws.amazon.com/cdk/api/v2/python/aws_cdk/RemovalPolicy.html#aws_cdk.RemovalPolicy.DESTROY | non_priority | aws cdk removalpolicy default is stated incorrectly as destroy describe the issue destroy is indicated as the default which is incorrect for aws cdk as can be seen in cdk developer guide removalpolicy retain keep the contents of the resource when destroying the stack default the resource is orphaned from the stack and must be deleted manually if you attempt to re deploy the stack while the resource still exists you will receive an error message due to a name conflict api reference bucket class that shows removal policy optional removal policy optional – policy to apply when the bucket is removed from this stack default the bucket will be orphaned in essence retain is the default not destroy could we kindly have this updated many thanks for the help links | 0 |
474,084 | 13,652,456,629 | IssuesEvent | 2020-09-27 07:37:51 | AY2021S1-CS2103T-T10-4/tp | https://api.github.com/repos/AY2021S1-CS2103T-T10-4/tp | closed | Delete classes | priority.High type.Story | As a tutor, I want to delete classes so that I can remove classes that I have stopped teaching. | 1.0 | Delete classes - As a tutor, I want to delete classes so that I can remove classes that I have stopped teaching. | priority | delete classes as a tutor i want to delete classes so that i can remove classes that i have stopped teaching | 1 |
319,178 | 9,739,657,954 | IssuesEvent | 2019-06-01 13:30:51 | Abnaxos/compose | https://api.github.com/repos/Abnaxos/compose | closed | Method not accessible: wrong error message | component: model priority: major type: bug | The error message for inaccessible methods is wrong: "Method not accessible to <inaccessible method>". The correct message should be something like "Method <inaccessible method> not accessible to <class>". | 1.0 | Method not accessible: wrong error message - The error message for inaccessible methods is wrong: "Method not accessible to <inaccessible method>". The correct message should be something like "Method <inaccessible method> not accessible to <class>". | priority | method not accessible wrong error message the error message for inaccessible methods is wrong method not accessible to the correct message should be something like method not accessible to | 1 |
55,272 | 3,072,617,101 | IssuesEvent | 2015-08-19 17:49:36 | RobotiumTech/robotium | https://api.github.com/repos/RobotiumTech/robotium | closed | Strange behaviours on big projects | bug imported Priority-Medium | _From [alex.gi...@gmail.com](https://code.google.com/u/106277910938818275510/) on April 18, 2012 03:18:02_
What steps will reproduce the problem? 1.Create test steps with one intent flagged ACTIVITY_CLEAR_TOP or other flags that Robotium conception does not take into account.
2.Call solo.finishOpenedActivities() What is the expected output? What do you see instead? My test should terminate. Instead, I can get functional exceptions, outOfMemoryExceptions due to activities that are unfrozen while they should no more exist, hanging InstrumentationTestRunner, ... What version of the product are you using? On what operating system? Will crash on any SDK and every version of robotium Please provide any additional information below. This is a conception flaw. I think the problem was raised on issue #219 , and rejected. But the problem does exist.
The whole conception of keeping a hard reference upon the "stack" of activities is wrong. Android activity manager is much more complex than a simple stack, and stacking activities into an inner object leaks the robotium tests, and bypasses the application expected functional workflow. When a hard reference is kept upon an activity, you prevent Android from managing activities and garbage collecting objects the way it wants to, then the tested application behaves strangely : OutOfMemory (because you keep reference upon an activity that has reference upon bitmaps that can not be garbagecollected), functional exceptions because finishOpenedActivities() calls finish() on activities that should no more exist (for example when an intent is started with flag ACTIVITY_CLEAR_TOP, or NO_HISTORY), hence implemented activity does not handle this unnatural behaviour.
A temporary patch should be to keep a stack of WeakReference<Activity> within the activity stack, to prevent robotium from leaking the whole application then randomly crashing the instrumentationtestrunner. But I don't get the point of keeping the stack at all... Why should this be necessary in a blackbox test ?
Robotium is a great framework, but this point of conception really is painful. This problem keeps crashing our Jenkins continuous integration, holding all executors whenever it happens, and forcing us to allocate 256Mo heaps emulators to prevent OutOfMemory !
If I can help in any way, please let me know.
_Original issue: http://code.google.com/p/robotium/issues/detail?id=249_ | 1.0 | Strange behaviours on big projects - _From [alex.gi...@gmail.com](https://code.google.com/u/106277910938818275510/) on April 18, 2012 03:18:02_
What steps will reproduce the problem? 1.Create test steps with one intent flagged ACTIVITY_CLEAR_TOP or other flags that Robotium conception does not take into account.
2.Call solo.finishOpenedActivities() What is the expected output? What do you see instead? My test should terminate. Instead, I can get functional exceptions, outOfMemoryExceptions due to activities that are unfrozen while they should no more exist, hanging InstrumentationTestRunner, ... What version of the product are you using? On what operating system? Will crash on any SDK and every version of robotium Please provide any additional information below. This is a conception flaw. I think the problem was raised on issue #219 , and rejected. But the problem does exist.
The whole conception of keeping a hard reference upon the "stack" of activities is wrong. Android activity manager is much more complex than a simple stack, and stacking activities into an inner object leaks the robotium tests, and bypasses the application expected functional workflow. When a hard reference is kept upon an activity, you prevent Android from managing activities and garbage collecting objects the way it wants to, then the tested application behaves strangely : OutOfMemory (because you keep reference upon an activity that has reference upon bitmaps that can not be garbagecollected), functional exceptions because finishOpenedActivities() calls finish() on activities that should no more exist (for example when an intent is started with flag ACTIVITY_CLEAR_TOP, or NO_HISTORY), hence implemented activity does not handle this unnatural behaviour.
A temporary patch should be to keep a stack of WeakReference<Activity> within the activity stack, to prevent robotium from leaking the whole application then randomly crashing the instrumentationtestrunner. But I don't get the point of keeping the stack at all... Why should this be necessary in a blackbox test ?
Robotium is a great framework, but this point of conception really is painful. This problem keeps crashing our Jenkins continuous integration, holding all executors whenever it happens, and forcing us to allocate 256Mo heaps emulators to prevent OutOfMemory !
If I can help in any way, please let me know.
_Original issue: http://code.google.com/p/robotium/issues/detail?id=249_ | priority | strange behaviours on big projects from on april what steps will reproduce the problem create test steps with one intent flagged activity clear top or other flags that robotium conception does not take into account call solo finishopenedactivities what is the expected output what do you see instead my test should terminate instead i can get functional exceptions outofmemoryexceptions due to activities that are unfrozen while they should no more exist hanging instrumentationtestrunner what version of the product are you using on what operating system will crash on any sdk and every version of robotium please provide any additional information below this is a conception flaw i think the problem was raised on issue and rejected but the problem does exist the whole conception of keeping a hard reference upon the stack of activities is wrong android activity manager is much more complex than a simple stack and stacking activities into an inner object leaks the robotium tests and bypasses the application expected functional workflow when a hard reference is kept upon an activity you prevent android from managing activities and garbage collecting objects the way it wants to then the tested application behaves strangely outofmemory because you keep reference upon an activity that has reference upon bitmaps that can not be garbagecollected functional exceptions because finishopenedactivities calls finish on activities that should no more exist for example when an intent is started with flag activity clear top or no history hence implemented activity does not handle this unnatural behaviour a temporary patch should be to keep a stack of weakreference within the activity stack to prevent robotium from leaking the whole application then randomly crashing the instrumentationtestrunner but i don t get the point of keeping the stack at all why should this be necessary in a blackbox test robotium is a great framework but this point of conception really is painful this problem keeps crashing our jenkins continuous integration holding all executors whenever it happens and forcing us to allocate heaps emulators to prevent outofmemory if i can help in any way please let me know original issue | 1 |
4,858 | 6,882,412,990 | IssuesEvent | 2017-11-21 03:48:20 | ZcashFoundation/GrantProposals-2017Q4 | https://api.github.com/repos/ZcashFoundation/GrantProposals-2017Q4 | reopened | ZEC <-> XLM Service | financial-interoperability online-service | # ZEC <-> XLM Service
## Motivation and overview
The overarching motivation is widespread adoption of cryptocurrencies and privacy-focused cryptocurrencies, to protect our civil liberties.
Stellar's built-in exchange and Anchor functionality has made it an ideal choice for remittance and money transfer in general.
Zcash's privacy and selective transparency of transactions makes it an attractive privacy-enabled currency to integrate into the Stellar network. The ZEC <-> XLM service would publicly auditable to its users, and subsequently, users may transfer money out of internal wallets via private transactions, providing them the privacy they wanted.
## Technical approach
- Web API: exposing routes to authenticate and initiate wallet transactions
- Asynchronous job queue to monitor users' accounts for incoming / outgoing transaction statuses
- Data store: Secure storage of users' Zcash and Stellar private keys
- Zcash + Stellar nodes
- Front end user interface
## Evaluation plan
Fully functional Zcash and Stellar web-based wallet (much like Coinbase's Wallet).
- Become a Zcash Anchor on the Stellar Network
- 1000 users within 3 months of launching all features
- Enable anonymous remittance
- $1,000,000 USD of monthly transactions within 1 year
## Security considerations
- **External Security Audits and penetration testing**
- Web-based wallets carry an inherent risk; you are trusting them with your secret key(s)
- 2 factor auth and strong password requirements
- Zcash and Stellar reserve funds should be held in offline wallets, and transactions should be programatically created and initiated in a way such that private keys for large wallets are not exposed to the internet
- As a web-wallet for cryptocurrencies, we would be subject to attacks
## Schedule
1. Launch Stellar Wallet functionality (0.5 months)
2. Launch Zcash Wallet functionality for public transactions (1 month)
3. Support private Zcash transactions (1 month)
4. Become an official Zcash Stellar Anchor, and allow for seamless ZEC <-> XLM exchange (1 month)
5. Security auditing and penetration testing (throughout)
## Budget and justification (approx.)
$13,000 USD
- Time compensation: $5,000 USD
- Design contracting fees: $5,000 USD
- Security audit / penetration testing: $2,000
- Hosting / External Fees Fund: $1,000 USD | 1.0 | ZEC <-> XLM Service - # ZEC <-> XLM Service
## Motivation and overview
The overarching motivation is widespread adoption of cryptocurrencies and privacy-focused cryptocurrencies, to protect our civil liberties.
Stellar's built-in exchange and Anchor functionality has made it an ideal choice for remittance and money transfer in general.
Zcash's privacy and selective transparency of transactions makes it an attractive privacy-enabled currency to integrate into the Stellar network. The ZEC <-> XLM service would publicly auditable to its users, and subsequently, users may transfer money out of internal wallets via private transactions, providing them the privacy they wanted.
## Technical approach
- Web API: exposing routes to authenticate and initiate wallet transactions
- Asynchronous job queue to monitor users' accounts for incoming / outgoing transaction statuses
- Data store: Secure storage of users' Zcash and Stellar private keys
- Zcash + Stellar nodes
- Front end user interface
## Evaluation plan
Fully functional Zcash and Stellar web-based wallet (much like Coinbase's Wallet).
- Become a Zcash Anchor on the Stellar Network
- 1000 users within 3 months of launching all features
- Enable anonymous remittance
- $1,000,000 USD of monthly transactions within 1 year
## Security considerations
- **External Security Audits and penetration testing**
- Web-based wallets carry an inherent risk; you are trusting them with your secret key(s)
- 2 factor auth and strong password requirements
- Zcash and Stellar reserve funds should be held in offline wallets, and transactions should be programatically created and initiated in a way such that private keys for large wallets are not exposed to the internet
- As a web-wallet for cryptocurrencies, we would be subject to attacks
## Schedule
1. Launch Stellar Wallet functionality (0.5 months)
2. Launch Zcash Wallet functionality for public transactions (1 month)
3. Support private Zcash transactions (1 month)
4. Become an official Zcash Stellar Anchor, and allow for seamless ZEC <-> XLM exchange (1 month)
5. Security auditing and penetration testing (throughout)
## Budget and justification (approx.)
$13,000 USD
- Time compensation: $5,000 USD
- Design contracting fees: $5,000 USD
- Security audit / penetration testing: $2,000
- Hosting / External Fees Fund: $1,000 USD | non_priority | zec xlm service zec xlm service motivation and overview the overarching motivation is widespread adoption of cryptocurrencies and privacy focused cryptocurrencies to protect our civil liberties stellar s built in exchange and anchor functionality has made it an ideal choice for remittance and money transfer in general zcash s privacy and selective transparency of transactions makes it an attractive privacy enabled currency to integrate into the stellar network the zec xlm service would publicly auditable to its users and subsequently users may transfer money out of internal wallets via private transactions providing them the privacy they wanted technical approach web api exposing routes to authenticate and initiate wallet transactions asynchronous job queue to monitor users accounts for incoming outgoing transaction statuses data store secure storage of users zcash and stellar private keys zcash stellar nodes front end user interface evaluation plan fully functional zcash and stellar web based wallet much like coinbase s wallet become a zcash anchor on the stellar network users within months of launching all features enable anonymous remittance usd of monthly transactions within year security considerations external security audits and penetration testing web based wallets carry an inherent risk you are trusting them with your secret key s factor auth and strong password requirements zcash and stellar reserve funds should be held in offline wallets and transactions should be programatically created and initiated in a way such that private keys for large wallets are not exposed to the internet as a web wallet for cryptocurrencies we would be subject to attacks schedule launch stellar wallet functionality months launch zcash wallet functionality for public transactions month support private zcash transactions month become an official zcash stellar anchor and allow for seamless zec xlm exchange month security auditing and penetration testing throughout budget and justification approx usd time compensation usd design contracting fees usd security audit penetration testing hosting external fees fund usd | 0 |
5,641 | 5,842,253,260 | IssuesEvent | 2017-05-10 05:06:25 | hzi-braunschweig/SORMAS-Open | https://api.github.com/repos/hzi-braunschweig/SORMAS-Open | closed | App Error Report Form [1] | Infrastructure sormas-app | - [x] user should be able to send manual error or problem information to the system
- [x] use a simple text field
- [x] should be possible from any view/activity | 1.0 | App Error Report Form [1] - - [x] user should be able to send manual error or problem information to the system
- [x] use a simple text field
- [x] should be possible from any view/activity | non_priority | app error report form user should be able to send manual error or problem information to the system use a simple text field should be possible from any view activity | 0 |
621,911 | 19,599,346,374 | IssuesEvent | 2022-01-05 22:18:01 | softmatterlab/Braph-2.0-Matlab | https://api.github.com/repos/softmatterlab/Braph-2.0-Matlab | opened | Minimize and Close Plot | low priority GUI | Write functions to minimize and close figures as in cb_bring_to_front():
- [ ] base functions cb_minimize() and cb_close() in Plot
- [ ] follow-up functions where needed (e.g., GUI, PlotElement, PPBrainAtlas_Surf, PPGroup_SUBDIct, ...)
- [ ] change callbacks for closing windows to these functions. | 1.0 | Minimize and Close Plot - Write functions to minimize and close figures as in cb_bring_to_front():
- [ ] base functions cb_minimize() and cb_close() in Plot
- [ ] follow-up functions where needed (e.g., GUI, PlotElement, PPBrainAtlas_Surf, PPGroup_SUBDIct, ...)
- [ ] change callbacks for closing windows to these functions. | priority | minimize and close plot write functions to minimize and close figures as in cb bring to front base functions cb minimize and cb close in plot follow up functions where needed e g gui plotelement ppbrainatlas surf ppgroup subdict change callbacks for closing windows to these functions | 1 |
57,024 | 3,081,231,394 | IssuesEvent | 2015-08-22 14:19:05 | bitfighter/bitfighter | https://api.github.com/repos/bitfighter/bitfighter | closed | Add self-healing turrets/ffps to help | 019 bug imported Priority-Medium | _From [watusim...@bitfighter.org](https://code.google.com/u/105427273526970468779/) on October 19, 2013 18:13:35_
Add self-healing turret and ffp to help. Probably alternate between regular and self-healing rather than use new slots. Text should alternate as well to explain the different images. Graphics should alternate on their own rhythm and not be syncopated with other rotating items. (See help page with asteroids for an example of what I'm talking about.)
_Original issue: http://code.google.com/p/bitfighter/issues/detail?id=255_ | 1.0 | Add self-healing turrets/ffps to help - _From [watusim...@bitfighter.org](https://code.google.com/u/105427273526970468779/) on October 19, 2013 18:13:35_
Add self-healing turret and ffp to help. Probably alternate between regular and self-healing rather than use new slots. Text should alternate as well to explain the different images. Graphics should alternate on their own rhythm and not be syncopated with other rotating items. (See help page with asteroids for an example of what I'm talking about.)
_Original issue: http://code.google.com/p/bitfighter/issues/detail?id=255_ | priority | add self healing turrets ffps to help from on october add self healing turret and ffp to help probably alternate between regular and self healing rather than use new slots text should alternate as well to explain the different images graphics should alternate on their own rhythm and not be syncopated with other rotating items see help page with asteroids for an example of what i m talking about original issue | 1 |
100,310 | 30,670,502,847 | IssuesEvent | 2023-07-25 21:59:06 | actonlang/acton | https://api.github.com/repos/actonlang/acton | closed | Fix makefile deps on lib_deps/libActonDeps.. | bug build system | lib_deps/libActonDeps actually requires deps/*.o but doesn't declare a dependency on it | 1.0 | Fix makefile deps on lib_deps/libActonDeps.. - lib_deps/libActonDeps actually requires deps/*.o but doesn't declare a dependency on it | non_priority | fix makefile deps on lib deps libactondeps lib deps libactondeps actually requires deps o but doesn t declare a dependency on it | 0 |
12,536 | 14,857,702,816 | IssuesEvent | 2021-01-18 15:46:37 | Cyberark-workato-dev/conjur-authn-k8s-client | https://api.github.com/repos/Cyberark-workato-dev/conjur-authn-k8s-client | opened | new bug from JIRA 00 | Bugtype/Compatibility ONYX-6432 Severity/Low | ##description
Steps to reproduce:
Current Results:
Expected Results:
Error Messages:
Logs:
Other Symptoms:
Tenant ID / Pod Number:
##Found in version
11.4
##Workaround Complexity
There's an easy workaround
##Workaround Description
asd
##Link to JIRA bug
https://ca-il-jira-test.il.cyber-ark.com/browse/ONYX-6432 | True | new bug from JIRA 00 - ##description
Steps to reproduce:
Current Results:
Expected Results:
Error Messages:
Logs:
Other Symptoms:
Tenant ID / Pod Number:
##Found in version
11.4
##Workaround Complexity
There's an easy workaround
##Workaround Description
asd
##Link to JIRA bug
https://ca-il-jira-test.il.cyber-ark.com/browse/ONYX-6432 | non_priority | new bug from jira description steps to reproduce current results expected results error messages logs other symptoms tenant id pod number found in version workaround complexity there s an easy workaround workaround description asd link to jira bug | 0 |
396,180 | 11,704,955,991 | IssuesEvent | 2020-03-07 12:58:49 | eJourn-al/eJournal | https://api.github.com/repos/eJourn-al/eJournal | closed | Files can sometimes get stored with the wrong filename | Priority: Critical Status: Available Type: Bug Workload: Medium | **Describe the bug**
Files get stored with the wrong filename. When using sites like webp.net to resize the image, the filename sometimes does not get changed propperly. This causes our system to store them wrongly.
**To Reproduce**
Steps to reproduce the behavior:
1. Resize on image on webp.net
2. Upload it (with the weird filename from webp)
3. See that you are not able to download it
| 1.0 | Files can sometimes get stored with the wrong filename - **Describe the bug**
Files get stored with the wrong filename. When using sites like webp.net to resize the image, the filename sometimes does not get changed propperly. This causes our system to store them wrongly.
**To Reproduce**
Steps to reproduce the behavior:
1. Resize on image on webp.net
2. Upload it (with the weird filename from webp)
3. See that you are not able to download it
| priority | files can sometimes get stored with the wrong filename describe the bug files get stored with the wrong filename when using sites like webp net to resize the image the filename sometimes does not get changed propperly this causes our system to store them wrongly to reproduce steps to reproduce the behavior resize on image on webp net upload it with the weird filename from webp see that you are not able to download it | 1 |
604,359 | 18,682,582,400 | IssuesEvent | 2021-11-01 08:15:11 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | support.mozilla.org - video or audio doesn't play | priority-important browser-fenix engine-gecko | <!-- @browser: Firefox Mobile 94.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:94.0) Gecko/94.0 Firefox/94.0 -->
<!-- @reported_with: android-components-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/91967 -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://support.mozilla.org/pl/kb/unikanie-i-zglaszanie-oszustw-do-pomocy-technicznej-mozilli
**Browser / Version**: Firefox Mobile 94.0
**Operating System**: Android 10
**Tested Another Browser**: Yes Chrome
**Problem type**: Video or audio doesn't play
**Description**: There is no audio
**Steps to Reproduce**:
Firefox Beta
Chrome Beta
Android 10
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2021/10/504ae66e-e5cf-442c-9f21-70507fdb09b3.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20211021185848</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2021/10/fb952260-d86d-49d5-914b-06e2baccd5f3)
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | support.mozilla.org - video or audio doesn't play - <!-- @browser: Firefox Mobile 94.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:94.0) Gecko/94.0 Firefox/94.0 -->
<!-- @reported_with: android-components-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/91967 -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://support.mozilla.org/pl/kb/unikanie-i-zglaszanie-oszustw-do-pomocy-technicznej-mozilli
**Browser / Version**: Firefox Mobile 94.0
**Operating System**: Android 10
**Tested Another Browser**: Yes Chrome
**Problem type**: Video or audio doesn't play
**Description**: There is no audio
**Steps to Reproduce**:
Firefox Beta
Chrome Beta
Android 10
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2021/10/504ae66e-e5cf-442c-9f21-70507fdb09b3.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20211021185848</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2021/10/fb952260-d86d-49d5-914b-06e2baccd5f3)
_From [webcompat.com](https://webcompat.com/) with ❤️_ | priority | support mozilla org video or audio doesn t play url browser version firefox mobile operating system android tested another browser yes chrome problem type video or audio doesn t play description there is no audio steps to reproduce firefox beta chrome beta android view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️ | 1 |
40,803 | 10,580,528,452 | IssuesEvent | 2019-10-08 07:01:18 | yodaos-project/ShadowNode | https://api.github.com/repos/yodaos-project/ShadowNode | opened | Best practice of building on macOS | build doc | We should document the best practice of building on macOS with dbus installed with brew.
As pkg-config could find dbus related stuff: https://github.com/yodaos-project/ShadowNode/blob/master/cmake/iotjs.cmake#L405-L407
It might be much more convenient to `brew install pkg-config` then build. | 1.0 | Best practice of building on macOS - We should document the best practice of building on macOS with dbus installed with brew.
As pkg-config could find dbus related stuff: https://github.com/yodaos-project/ShadowNode/blob/master/cmake/iotjs.cmake#L405-L407
It might be much more convenient to `brew install pkg-config` then build. | non_priority | best practice of building on macos we should document the best practice of building on macos with dbus installed with brew as pkg config could find dbus related stuff it might be much more convenient to brew install pkg config then build | 0 |
160,544 | 20,109,715,937 | IssuesEvent | 2022-02-07 14:03:31 | jgeraigery/herman-1 | https://api.github.com/repos/jgeraigery/herman-1 | opened | CVE-2020-36181 (High) detected in jackson-databind-2.6.7.3.jar | security vulnerability | ## CVE-2020-36181 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.3/jackson-databind-2.6.7.3.jar</p>
<p>
Dependency Hierarchy:
- aws-java-sdk-ecs-1.11.714.jar (Root Library)
- aws-java-sdk-core-1.11.714.jar
- :x: **jackson-databind-2.6.7.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/herman-1/commit/eaf3c717d8aba82b2651ce79d0eab468670a7ce1">eaf3c717d8aba82b2651ce79d0eab468670a7ce1</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.
<p>Publish Date: 2021-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181>CVE-2020-36181</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/3004">https://github.com/FasterXML/jackson-databind/issues/3004</a></p>
<p>Release Date: 2021-01-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.7.3","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.amazonaws:aws-java-sdk-ecs:1.11.714;com.amazonaws:aws-java-sdk-core:1.11.714;com.fasterxml.jackson.core:jackson-databind:2.6.7.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36181","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-36181 (High) detected in jackson-databind-2.6.7.3.jar - ## CVE-2020-36181 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.3/jackson-databind-2.6.7.3.jar</p>
<p>
Dependency Hierarchy:
- aws-java-sdk-ecs-1.11.714.jar (Root Library)
- aws-java-sdk-core-1.11.714.jar
- :x: **jackson-databind-2.6.7.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/herman-1/commit/eaf3c717d8aba82b2651ce79d0eab468670a7ce1">eaf3c717d8aba82b2651ce79d0eab468670a7ce1</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.
<p>Publish Date: 2021-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181>CVE-2020-36181</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/3004">https://github.com/FasterXML/jackson-databind/issues/3004</a></p>
<p>Release Date: 2021-01-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.7.3","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.amazonaws:aws-java-sdk-ecs:1.11.714;com.amazonaws:aws-java-sdk-core:1.11.714;com.fasterxml.jackson.core:jackson-databind:2.6.7.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36181","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36181","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy aws java sdk ecs jar root library aws java sdk core jar x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp dbcp cpdsadapter driveradaptercpds publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com amazonaws aws java sdk ecs com amazonaws aws java sdk core com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp dbcp cpdsadapter driveradaptercpds vulnerabilityurl | 0 |
282,428 | 24,474,846,527 | IssuesEvent | 2022-10-08 03:19:46 | lowRISC/opentitan | https://api.github.com/repos/lowRISC/opentitan | closed | [test-triage] chip_rv_dm_ndm_reset_req | Component:TestTriage | ### Hierarchy of regression failure
Chip Level
### Failure Description
UVM_ERROR @ 4213.817590 us: (sw_logger_if.sv:521) [rv_dm_ndm_reset_req_prog_sim_dv(sw/device/tests/sim_dv/rv_dm_ndm_reset_req.c:214)] CHECK-fail: reg[1]: obs:0x0 exp:0x44
### Steps to Reproduce
GH revision: [9c0b24ddb](https://github.com/lowrisc/opentitan/tree/9c0b24ddbeb5616bd8db661ec1395f2d4f326bc4)
util/dvsim/dvsim.py hw/top_earlgrey/dv/chip_sim_cfg.hjson -i chip_rv_dm_ndm_reset_req --build-seed 2483310614 --fixed-seed 581187855
### Tests with similar or related failures
_No response_ | 1.0 | [test-triage] chip_rv_dm_ndm_reset_req - ### Hierarchy of regression failure
Chip Level
### Failure Description
UVM_ERROR @ 4213.817590 us: (sw_logger_if.sv:521) [rv_dm_ndm_reset_req_prog_sim_dv(sw/device/tests/sim_dv/rv_dm_ndm_reset_req.c:214)] CHECK-fail: reg[1]: obs:0x0 exp:0x44
### Steps to Reproduce
GH revision: [9c0b24ddb](https://github.com/lowrisc/opentitan/tree/9c0b24ddbeb5616bd8db661ec1395f2d4f326bc4)
util/dvsim/dvsim.py hw/top_earlgrey/dv/chip_sim_cfg.hjson -i chip_rv_dm_ndm_reset_req --build-seed 2483310614 --fixed-seed 581187855
### Tests with similar or related failures
_No response_ | non_priority | chip rv dm ndm reset req hierarchy of regression failure chip level failure description uvm error us sw logger if sv check fail reg obs exp steps to reproduce gh revision util dvsim dvsim py hw top earlgrey dv chip sim cfg hjson i chip rv dm ndm reset req build seed fixed seed tests with similar or related failures no response | 0 |
179,980 | 30,335,880,013 | IssuesEvent | 2023-07-11 09:32:13 | audacity/audacity | https://api.github.com/repos/audacity/audacity | closed | [Design] Add new track and new types of tracks | Design / UX Task medium feature | Visual hint in the main UI for adding a new audio (or other types) tracks, and ability to specify what kind of track if other
| 1.0 | [Design] Add new track and new types of tracks - Visual hint in the main UI for adding a new audio (or other types) tracks, and ability to specify what kind of track if other
| non_priority | add new track and new types of tracks visual hint in the main ui for adding a new audio or other types tracks and ability to specify what kind of track if other | 0 |
12,029 | 18,783,349,365 | IssuesEvent | 2021-11-08 09:32:45 | The-GNTL-Project/Exchange | https://api.github.com/repos/The-GNTL-Project/Exchange | closed | Fees being charged on orders rather than transactions | bug go live requirement testing | Fees should be charged on the value of completed transactions at time of execution, not on the order value at the time the order is placed. Charging a full fee on a partially fulfilled order disincentivizes placing any order that risks not being completely filled, and imo will be highly off-putting to big money and small high-frequency traders alike. | 1.0 | Fees being charged on orders rather than transactions - Fees should be charged on the value of completed transactions at time of execution, not on the order value at the time the order is placed. Charging a full fee on a partially fulfilled order disincentivizes placing any order that risks not being completely filled, and imo will be highly off-putting to big money and small high-frequency traders alike. | non_priority | fees being charged on orders rather than transactions fees should be charged on the value of completed transactions at time of execution not on the order value at the time the order is placed charging a full fee on a partially fulfilled order disincentivizes placing any order that risks not being completely filled and imo will be highly off putting to big money and small high frequency traders alike | 0 |
115,154 | 11,866,531,082 | IssuesEvent | 2020-03-26 04:01:44 | WilliamChan4/SENG2021_TheFastGroup | https://api.github.com/repos/WilliamChan4/SENG2021_TheFastGroup | opened | Rename pipelines Staging and Production and Add Badges to GitHub | documentation enhancement | The pipelines should be renamed to staging and production and the badges for both the pipelines and deployments put on the README.md page. | 1.0 | Rename pipelines Staging and Production and Add Badges to GitHub - The pipelines should be renamed to staging and production and the badges for both the pipelines and deployments put on the README.md page. | non_priority | rename pipelines staging and production and add badges to github the pipelines should be renamed to staging and production and the badges for both the pipelines and deployments put on the readme md page | 0 |
747,105 | 26,073,625,321 | IssuesEvent | 2022-12-24 06:19:33 | CreeperMagnet/the-creepers-code | https://api.github.com/repos/CreeperMagnet/the-creepers-code | closed | Teapots can be duplicated by riding a boat into them | priority: high | This can be fixed by... I don't know. There's too many of these stupid boat bugs. I'll probably have to change its kill method from a teleport now. | 1.0 | Teapots can be duplicated by riding a boat into them - This can be fixed by... I don't know. There's too many of these stupid boat bugs. I'll probably have to change its kill method from a teleport now. | priority | teapots can be duplicated by riding a boat into them this can be fixed by i don t know there s too many of these stupid boat bugs i ll probably have to change its kill method from a teleport now | 1 |
271,581 | 8,485,379,223 | IssuesEvent | 2018-10-26 07:36:01 | swe-ms-boun/2018fall-swe574-g1 | https://api.github.com/repos/swe-ms-boun/2018fall-swe574-g1 | opened | Annotations page | module.annotation priority.low tier.ui type.feature | * Development of annotations page. Associated requirements:
* The system should allow registered users to view their annotations.
* The system should allow the registered users to go to the memories by using their annotations.
* Registered users should be able to view their all tags they use when annotating the memories on the annotations page.
* The system shall display a total number of annotations on the annotations page. | 1.0 | Annotations page - * Development of annotations page. Associated requirements:
* The system should allow registered users to view their annotations.
* The system should allow the registered users to go to the memories by using their annotations.
* Registered users should be able to view their all tags they use when annotating the memories on the annotations page.
* The system shall display a total number of annotations on the annotations page. | priority | annotations page development of annotations page associated requirements the system should allow registered users to view their annotations the system should allow the registered users to go to the memories by using their annotations registered users should be able to view their all tags they use when annotating the memories on the annotations page the system shall display a total number of annotations on the annotations page | 1 |
75,836 | 7,494,474,232 | IssuesEvent | 2018-04-07 10:09:13 | rakudo/rakudo | https://api.github.com/repos/rakudo/rakudo | closed | LTA Error when Proc::Async.bind-stdout/err get unopened IO::Handle | LTA testneeded | ```
with Proc::Async.new: :out, :err, $*EXECUTABLE, $program.absolute {
my $out-path := make-temp-file;
my $err-path := make-temp-file;
.bind-stdout: $out-path.IO.open: :w, :!out-buffer;
.bind-stderr: $err-path.IO.open: :w, :!out-buffer;
...
```
gives `"get native descriptor requires an object with REPR MVMOSHandle (got Scalar with REPR P6opaque)"`
```
$ perl6 -v
This is Rakudo version 2018.03-129-g7572983a4 built on MoarVM version 2018.03-35-gafdcad424
implementing Perl 6.c.
``` | 1.0 | LTA Error when Proc::Async.bind-stdout/err get unopened IO::Handle - ```
with Proc::Async.new: :out, :err, $*EXECUTABLE, $program.absolute {
my $out-path := make-temp-file;
my $err-path := make-temp-file;
.bind-stdout: $out-path.IO.open: :w, :!out-buffer;
.bind-stderr: $err-path.IO.open: :w, :!out-buffer;
...
```
gives `"get native descriptor requires an object with REPR MVMOSHandle (got Scalar with REPR P6opaque)"`
```
$ perl6 -v
This is Rakudo version 2018.03-129-g7572983a4 built on MoarVM version 2018.03-35-gafdcad424
implementing Perl 6.c.
``` | non_priority | lta error when proc async bind stdout err get unopened io handle with proc async new out err executable program absolute my out path make temp file my err path make temp file bind stdout out path io open w out buffer bind stderr err path io open w out buffer gives get native descriptor requires an object with repr mvmoshandle got scalar with repr v this is rakudo version built on moarvm version implementing perl c | 0 |
352,003 | 10,526,318,830 | IssuesEvent | 2019-09-30 16:50:14 | ronaldoapf/PDS1 | https://api.github.com/repos/ronaldoapf/PDS1 | closed | User Story 2: Criar setores | Epic Priority "Must" User Story | ## Como adminstrador do aplicativo de setores desejo criar um mapa de setores para Monte Carmelo, com objetivo de agrupar as regiões da cidade.
> Com a criação do mapa de setores a prefeitura terá grandes benefícios no que diz respeito a organização administrativa da cidade. Vale ressaltar que o administrador tem o papel de atualizar os setores e manter a base de dados da aplicação.
Critérios de Aceitação:
- Identificar regiões semelhantes
- Criar base de dados
- Criar setores já existentes na cidade
- Criar novos setores de acordo com crescimento da cidade e povoamento da base de dados
### Tarefas:
- [ ] Utilizar api do OpenStreetMap para coletar dados e criar uma base de dados (8 dias)
- [ ] Implementar o banco de dados a partir da base obtida pela API OpenStreetMap (3 dias)
- [ ] Cruzar as informações no banco de dados para montar a setorização (5 dias)
- [ ] Implementar uma interface para o usuário, prefeitura e administrador (1 dia)
- [ ] Implementar interface para criação de setores (1 dia)
### INVEST
- Independent: A estória é independente devido ao fato que não será necessário implementar outra estória para utilizá la, e pode ser implementada a qualquer momento.
- Negotiable : A estória é negociável, devido ao fato de que seu objetivo é montar um mapa de setores baseado na coleta de informações via OpenStreetMap e IBGE, logo caso seja necessário efetuar alguma mudança com relação ao tipo de informação que sera mostrada ou exibida por setores, esta vai se adaptar.
- Valuable : O grande valor desta estória é que ela é um dos pilares para o funcionamento do sistema, a partir dela é possível executar todas as funcionalidades propostas no sistema.
- Estimable: A user story levaria 21 dias para ser feita de acordo com a estimativa feita pelo grupo. Levando em consideração que os critérios de aceitação e as tarefas a serem realizadas são de extrema importância para o pontapé inicial do sistema.
- Testable:
### Hierarquia
- Epic: Criar setores
- Feature : Coleta de dados para criação dos setores
- User storys:
- Buscar dados do IBGE.
- Buscar dados do OpenStreetMap.
## 3 C's
- Cartão:
Título: Criar um mapa de setores para a cidade de Monte Carmelo.
Ator: Administrador do aplicativo
Objetivo: Agrupar as regiões semelhantes, com o intuito de criar setores.
Benefícios: Usar livremente o mapa de setores para identificar alguma região ou setor, saber aonde o usuário está realmente localizado no setor.
- Conversa: Formulários para identificar se há mesmo novos setores ou se o mesmo já está cadastrado na base de dados.
- Confirmação: | 1.0 | User Story 2: Criar setores - ## Como adminstrador do aplicativo de setores desejo criar um mapa de setores para Monte Carmelo, com objetivo de agrupar as regiões da cidade.
> Com a criação do mapa de setores a prefeitura terá grandes benefícios no que diz respeito a organização administrativa da cidade. Vale ressaltar que o administrador tem o papel de atualizar os setores e manter a base de dados da aplicação.
Critérios de Aceitação:
- Identificar regiões semelhantes
- Criar base de dados
- Criar setores já existentes na cidade
- Criar novos setores de acordo com crescimento da cidade e povoamento da base de dados
### Tarefas:
- [ ] Utilizar api do OpenStreetMap para coletar dados e criar uma base de dados (8 dias)
- [ ] Implementar o banco de dados a partir da base obtida pela API OpenStreetMap (3 dias)
- [ ] Cruzar as informações no banco de dados para montar a setorização (5 dias)
- [ ] Implementar uma interface para o usuário, prefeitura e administrador (1 dia)
- [ ] Implementar interface para criação de setores (1 dia)
### INVEST
- Independent: A estória é independente devido ao fato que não será necessário implementar outra estória para utilizá la, e pode ser implementada a qualquer momento.
- Negotiable : A estória é negociável, devido ao fato de que seu objetivo é montar um mapa de setores baseado na coleta de informações via OpenStreetMap e IBGE, logo caso seja necessário efetuar alguma mudança com relação ao tipo de informação que sera mostrada ou exibida por setores, esta vai se adaptar.
- Valuable : O grande valor desta estória é que ela é um dos pilares para o funcionamento do sistema, a partir dela é possível executar todas as funcionalidades propostas no sistema.
- Estimable: A user story levaria 21 dias para ser feita de acordo com a estimativa feita pelo grupo. Levando em consideração que os critérios de aceitação e as tarefas a serem realizadas são de extrema importância para o pontapé inicial do sistema.
- Testable:
### Hierarquia
- Epic: Criar setores
- Feature : Coleta de dados para criação dos setores
- User storys:
- Buscar dados do IBGE.
- Buscar dados do OpenStreetMap.
## 3 C's
- Cartão:
Título: Criar um mapa de setores para a cidade de Monte Carmelo.
Ator: Administrador do aplicativo
Objetivo: Agrupar as regiões semelhantes, com o intuito de criar setores.
Benefícios: Usar livremente o mapa de setores para identificar alguma região ou setor, saber aonde o usuário está realmente localizado no setor.
- Conversa: Formulários para identificar se há mesmo novos setores ou se o mesmo já está cadastrado na base de dados.
- Confirmação: | priority | user story criar setores como adminstrador do aplicativo de setores desejo criar um mapa de setores para monte carmelo com objetivo de agrupar as regiões da cidade com a criação do mapa de setores a prefeitura terá grandes benefícios no que diz respeito a organização administrativa da cidade vale ressaltar que o administrador tem o papel de atualizar os setores e manter a base de dados da aplicação critérios de aceitação identificar regiões semelhantes criar base de dados criar setores já existentes na cidade criar novos setores de acordo com crescimento da cidade e povoamento da base de dados tarefas utilizar api do openstreetmap para coletar dados e criar uma base de dados dias implementar o banco de dados a partir da base obtida pela api openstreetmap dias cruzar as informações no banco de dados para montar a setorização dias implementar uma interface para o usuário prefeitura e administrador dia implementar interface para criação de setores dia invest independent a estória é independente devido ao fato que não será necessário implementar outra estória para utilizá la e pode ser implementada a qualquer momento negotiable a estória é negociável devido ao fato de que seu objetivo é montar um mapa de setores baseado na coleta de informações via openstreetmap e ibge logo caso seja necessário efetuar alguma mudança com relação ao tipo de informação que sera mostrada ou exibida por setores esta vai se adaptar valuable o grande valor desta estória é que ela é um dos pilares para o funcionamento do sistema a partir dela é possível executar todas as funcionalidades propostas no sistema estimable a user story levaria dias para ser feita de acordo com a estimativa feita pelo grupo levando em consideração que os critérios de aceitação e as tarefas a serem realizadas são de extrema importância para o pontapé inicial do sistema testable hierarquia epic criar setores feature coleta de dados para criação dos setores user storys buscar dados do ibge buscar dados do openstreetmap c s cartão título criar um mapa de setores para a cidade de monte carmelo ator administrador do aplicativo objetivo agrupar as regiões semelhantes com o intuito de criar setores benefícios usar livremente o mapa de setores para identificar alguma região ou setor saber aonde o usuário está realmente localizado no setor conversa formulários para identificar se há mesmo novos setores ou se o mesmo já está cadastrado na base de dados confirmação | 1 |
688,392 | 23,580,337,676 | IssuesEvent | 2022-08-23 07:05:38 | pystardust/ani-cli | https://api.github.com/repos/pystardust/ani-cli | closed | Allow other programs using terminal to use ani-cli | type: feature request priority 4: wishlist | **Is your feature request related to a problem? Please describe.**
There is a problem with trackma when it hooks ani-cli for play. It seems to keep opening and closing the episodes as it goes down the line until there are none left. I left a issue with them at
https://github.com/z411/trackma/issues/637
**Describe the solution you'd like**
After trying to fix it for a while, I think I have come to the conclusion that when ani-cli tries to put up the after player launch menu, it tries to take over the terminal or something, and forces the current player to close?
Honestly I am a layman so I don't know the specifics, but originally I commented out your ending while loop at the end of the ani-cli script. This made it so that trackma seemed to work as intended but obviously now the menu after launching the player is gone if I use ani-cli alone.
Changed line 597 from
```while : ; do```
to
```while [ -t 1 ] ; do```
According to what I searched is supposed to check if ani-cli is active in the terminal, and then won't open the menu if it isn't.
There might be alternatives to this, and this might break something, but I don't know any programming so this is just me fiddling a little and seemed to fix my problem with trackma as well as allowed the menu to come up when directly using ani-cli.
I put this under feature request because technically this is causing an issue on trackma's end and there isn't anything wrong on your side. | 1.0 | Allow other programs using terminal to use ani-cli - **Is your feature request related to a problem? Please describe.**
There is a problem with trackma when it hooks ani-cli for play. It seems to keep opening and closing the episodes as it goes down the line until there are none left. I left a issue with them at
https://github.com/z411/trackma/issues/637
**Describe the solution you'd like**
After trying to fix it for a while, I think I have come to the conclusion that when ani-cli tries to put up the after player launch menu, it tries to take over the terminal or something, and forces the current player to close?
Honestly I am a layman so I don't know the specifics, but originally I commented out your ending while loop at the end of the ani-cli script. This made it so that trackma seemed to work as intended but obviously now the menu after launching the player is gone if I use ani-cli alone.
Changed line 597 from
```while : ; do```
to
```while [ -t 1 ] ; do```
According to what I searched is supposed to check if ani-cli is active in the terminal, and then won't open the menu if it isn't.
There might be alternatives to this, and this might break something, but I don't know any programming so this is just me fiddling a little and seemed to fix my problem with trackma as well as allowed the menu to come up when directly using ani-cli.
I put this under feature request because technically this is causing an issue on trackma's end and there isn't anything wrong on your side. | priority | allow other programs using terminal to use ani cli is your feature request related to a problem please describe there is a problem with trackma when it hooks ani cli for play it seems to keep opening and closing the episodes as it goes down the line until there are none left i left a issue with them at describe the solution you d like after trying to fix it for a while i think i have come to the conclusion that when ani cli tries to put up the after player launch menu it tries to take over the terminal or something and forces the current player to close honestly i am a layman so i don t know the specifics but originally i commented out your ending while loop at the end of the ani cli script this made it so that trackma seemed to work as intended but obviously now the menu after launching the player is gone if i use ani cli alone changed line from while do to while do according to what i searched is supposed to check if ani cli is active in the terminal and then won t open the menu if it isn t there might be alternatives to this and this might break something but i don t know any programming so this is just me fiddling a little and seemed to fix my problem with trackma as well as allowed the menu to come up when directly using ani cli i put this under feature request because technically this is causing an issue on trackma s end and there isn t anything wrong on your side | 1 |
11,064 | 7,047,609,758 | IssuesEvent | 2018-01-02 14:20:26 | Yakindu/statecharts | https://api.github.com/repos/Yakindu/statecharts | closed | Split sc editor and interface editor in multipage editor | Comp-Graphical Editor is-Feature-Request is-Usability-Issue Status-Consolidate | Currently, the interface declaration is a textfield inside of the graphical editor. This solution has certain advantages and drawbacks.
Pro:
- The interface declaration and the statechart can be seen simultaneously side by side. Elements in the statechart can easily be referenced in the interface declaration.
- The statechart and the interface declaration can be printed at once.
Con:
- The intferface declaration isn't edited in a real text editor, the text field needs to be double clicked to edit it, the whole text moves a bit when activating the editing mode, and editing feels sluggish. All in all, it feels like editing a text label in photoshop or similar.
- The interface text label doesn't have line numbering
- Scrolling inside of the text label is not possible, the whole statechart needs to be scrolled, which turns awkward for huge statecharts
It's also questionable if one really needs to see both the statechart and the declaration. All in all, the statechart pretty much speaks for itself - all events / variables of an interface are prefixed with the interface name anyways, it's clearly visible if an interface is an _in_\- or an _out_-event, and the type of variables can be deferred by usage or maybe via tooltip on hover. Also, I wouldn't want to print the statechart declaration on the same page as the diagram itself, because it's hard to fit a bigger statechart on a standard page anyways without losing information.
So, moving the interface declaration inside of another tab with a real text editor seems to be a better solution than the current one all in all, except for very tiny statecharts. An option to show both tabs side by side or to undock the editor would be nice, if this is possible with eclipse.
| True | Split sc editor and interface editor in multipage editor - Currently, the interface declaration is a textfield inside of the graphical editor. This solution has certain advantages and drawbacks.
Pro:
- The interface declaration and the statechart can be seen simultaneously side by side. Elements in the statechart can easily be referenced in the interface declaration.
- The statechart and the interface declaration can be printed at once.
Con:
- The intferface declaration isn't edited in a real text editor, the text field needs to be double clicked to edit it, the whole text moves a bit when activating the editing mode, and editing feels sluggish. All in all, it feels like editing a text label in photoshop or similar.
- The interface text label doesn't have line numbering
- Scrolling inside of the text label is not possible, the whole statechart needs to be scrolled, which turns awkward for huge statecharts
It's also questionable if one really needs to see both the statechart and the declaration. All in all, the statechart pretty much speaks for itself - all events / variables of an interface are prefixed with the interface name anyways, it's clearly visible if an interface is an _in_\- or an _out_-event, and the type of variables can be deferred by usage or maybe via tooltip on hover. Also, I wouldn't want to print the statechart declaration on the same page as the diagram itself, because it's hard to fit a bigger statechart on a standard page anyways without losing information.
So, moving the interface declaration inside of another tab with a real text editor seems to be a better solution than the current one all in all, except for very tiny statecharts. An option to show both tabs side by side or to undock the editor would be nice, if this is possible with eclipse.
| non_priority | split sc editor and interface editor in multipage editor currently the interface declaration is a textfield inside of the graphical editor this solution has certain advantages and drawbacks pro the interface declaration and the statechart can be seen simultaneously side by side elements in the statechart can easily be referenced in the interface declaration the statechart and the interface declaration can be printed at once con the intferface declaration isn t edited in a real text editor the text field needs to be double clicked to edit it the whole text moves a bit when activating the editing mode and editing feels sluggish all in all it feels like editing a text label in photoshop or similar the interface text label doesn t have line numbering scrolling inside of the text label is not possible the whole statechart needs to be scrolled which turns awkward for huge statecharts it s also questionable if one really needs to see both the statechart and the declaration all in all the statechart pretty much speaks for itself all events variables of an interface are prefixed with the interface name anyways it s clearly visible if an interface is an in or an out event and the type of variables can be deferred by usage or maybe via tooltip on hover also i wouldn t want to print the statechart declaration on the same page as the diagram itself because it s hard to fit a bigger statechart on a standard page anyways without losing information so moving the interface declaration inside of another tab with a real text editor seems to be a better solution than the current one all in all except for very tiny statecharts an option to show both tabs side by side or to undock the editor would be nice if this is possible with eclipse | 0 |
327,293 | 28,052,010,886 | IssuesEvent | 2023-03-29 06:42:51 | ALTA-LapakUMKM-Group-2/LapakUMKM-APITesting | https://api.github.com/repos/ALTA-LapakUMKM-Group-2/LapakUMKM-APITesting | closed | [User-016] POST Update User With Complete Data In Json | Manual Api Testing | **Given** Post update data users
**When** User fills in the json data by complete data
**Then** Send post update data
**And** API Should be 200 OK
**And** Validate post update data resource json schema | 1.0 | [User-016] POST Update User With Complete Data In Json - **Given** Post update data users
**When** User fills in the json data by complete data
**Then** Send post update data
**And** API Should be 200 OK
**And** Validate post update data resource json schema | non_priority | post update user with complete data in json given post update data users when user fills in the json data by complete data then send post update data and api should be ok and validate post update data resource json schema | 0 |
17,206 | 9,654,438,719 | IssuesEvent | 2019-05-19 14:07:00 | Beep6581/RawTherapee | https://api.github.com/repos/Beep6581/RawTherapee | closed | Don't preprocess and demosaic again when using coarse rotation or flip | performance | Currently, when using coarse rotation or flip, the image gets raw preprocessed and demosaiced again, which imho is not necessary.
This simple patch fixes it:
```diff
diff --git a/rtengine/refreshmap.cc b/rtengine/refreshmap.cc
index 7a5214d75..d741b1744 100644
--- a/rtengine/refreshmap.cc
+++ b/rtengine/refreshmap.cc
@@ -83,9 +83,9 @@ int refreshmap[rtengine::NUMOFEVENTS] = {
RGBCURVE, // EvSHSHTonalW,
RGBCURVE, // EvSHLContrast,
RETINEX, // EvSHRadius,
- ALL, // EvCTRotate,
- ALL, // EvCTHFlip,
- ALL, // EvCTVFlip,
+ ALLNORAW, // EvCTRotate,
+ ALLNORAW, // EvCTHFlip,
+ ALLNORAW, // EvCTVFlip,
TRANSFORM, // EvROTDegree,
TRANSFORM, // EvTransAutoFill,
TRANSFORM, // EvDISTAmount,
```
Any objections to commit this patch? | True | Don't preprocess and demosaic again when using coarse rotation or flip - Currently, when using coarse rotation or flip, the image gets raw preprocessed and demosaiced again, which imho is not necessary.
This simple patch fixes it:
```diff
diff --git a/rtengine/refreshmap.cc b/rtengine/refreshmap.cc
index 7a5214d75..d741b1744 100644
--- a/rtengine/refreshmap.cc
+++ b/rtengine/refreshmap.cc
@@ -83,9 +83,9 @@ int refreshmap[rtengine::NUMOFEVENTS] = {
RGBCURVE, // EvSHSHTonalW,
RGBCURVE, // EvSHLContrast,
RETINEX, // EvSHRadius,
- ALL, // EvCTRotate,
- ALL, // EvCTHFlip,
- ALL, // EvCTVFlip,
+ ALLNORAW, // EvCTRotate,
+ ALLNORAW, // EvCTHFlip,
+ ALLNORAW, // EvCTVFlip,
TRANSFORM, // EvROTDegree,
TRANSFORM, // EvTransAutoFill,
TRANSFORM, // EvDISTAmount,
```
Any objections to commit this patch? | non_priority | don t preprocess and demosaic again when using coarse rotation or flip currently when using coarse rotation or flip the image gets raw preprocessed and demosaiced again which imho is not necessary this simple patch fixes it diff diff git a rtengine refreshmap cc b rtengine refreshmap cc index a rtengine refreshmap cc b rtengine refreshmap cc int refreshmap rgbcurve evshshtonalw rgbcurve evshlcontrast retinex evshradius all evctrotate all evcthflip all evctvflip allnoraw evctrotate allnoraw evcthflip allnoraw evctvflip transform evrotdegree transform evtransautofill transform evdistamount any objections to commit this patch | 0 |
249,171 | 26,889,995,815 | IssuesEvent | 2023-02-06 08:08:47 | valtech-ch/microservice-kubernetes-cluster | https://api.github.com/repos/valtech-ch/microservice-kubernetes-cluster | closed | CVE-2022-25857 (High) detected in snakeyaml-1.30.jar - autoclosed | security vulnerability | ## CVE-2022-25857 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.30.jar</b></p></summary>
<p>YAML 1.1 parser and emitter for Java</p>
<p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p>
<p>Path to dependency file: /security/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar</p>
<p>
Dependency Hierarchy:
- logstash-logback-encoder-7.2.jar (Root Library)
- jackson-databind-2.13.4.2.jar
- jackson-bom-2.13.4.pom
- jackson-dataformat-yaml-2.13.4.jar
- :x: **snakeyaml-1.30.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/valtech-ch/microservice-kubernetes-cluster/commit/335a4047c89f52dfe860e93daefb32dc86a521a2">335a4047c89f52dfe860e93daefb32dc86a521a2</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
<p>Publish Date: 2022-08-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25857>CVE-2022-25857</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857</a></p>
<p>Release Date: 2022-08-30</p>
<p>Fix Resolution: org.yaml:snakeyaml:1.31</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-25857 (High) detected in snakeyaml-1.30.jar - autoclosed - ## CVE-2022-25857 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.30.jar</b></p></summary>
<p>YAML 1.1 parser and emitter for Java</p>
<p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p>
<p>Path to dependency file: /security/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.30/8fde7fe2586328ac3c68db92045e1c8759125000/snakeyaml-1.30.jar</p>
<p>
Dependency Hierarchy:
- logstash-logback-encoder-7.2.jar (Root Library)
- jackson-databind-2.13.4.2.jar
- jackson-bom-2.13.4.pom
- jackson-dataformat-yaml-2.13.4.jar
- :x: **snakeyaml-1.30.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/valtech-ch/microservice-kubernetes-cluster/commit/335a4047c89f52dfe860e93daefb32dc86a521a2">335a4047c89f52dfe860e93daefb32dc86a521a2</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
<p>Publish Date: 2022-08-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25857>CVE-2022-25857</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857</a></p>
<p>Release Date: 2022-08-30</p>
<p>Fix Resolution: org.yaml:snakeyaml:1.31</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in snakeyaml jar autoclosed cve high severity vulnerability vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file security build gradle path to vulnerable library home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar home wss scanner gradle caches modules files org yaml snakeyaml snakeyaml jar dependency hierarchy logstash logback encoder jar root library jackson databind jar jackson bom pom jackson dataformat yaml jar x snakeyaml jar vulnerable library found in head commit a href found in base branch develop vulnerability details the package org yaml snakeyaml from and before are vulnerable to denial of service dos due missing to nested depth limitation for collections publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org yaml snakeyaml step up your open source security game with mend | 0 |
18,518 | 2,615,172,712 | IssuesEvent | 2015-03-01 06:54:46 | chrsmith/html5rocks | https://api.github.com/repos/chrsmith/html5rocks | opened | How to get started with WebSocket | auto-migrated Milestone-X New Priority-P2 Tutorial Type-Feature | ```
Write an tutorial article introducing how to get started with WebSocket.
This article will include:
- how to build server, what options you have
- how to send/receive text data using WebSocket
- how to send/receive binary data using WebSocket
```
Original issue reported on code.google.com by `agek...@google.com` on 7 Feb 2012 at 9:47 | 1.0 | How to get started with WebSocket - ```
Write an tutorial article introducing how to get started with WebSocket.
This article will include:
- how to build server, what options you have
- how to send/receive text data using WebSocket
- how to send/receive binary data using WebSocket
```
Original issue reported on code.google.com by `agek...@google.com` on 7 Feb 2012 at 9:47 | priority | how to get started with websocket write an tutorial article introducing how to get started with websocket this article will include how to build server what options you have how to send receive text data using websocket how to send receive binary data using websocket original issue reported on code google com by agek google com on feb at | 1 |
133,929 | 29,670,450,083 | IssuesEvent | 2023-06-11 10:41:35 | dtcxzyw/llvm-ci | https://api.github.com/repos/dtcxzyw/llvm-ci | closed | Regressions Report [rv32gc-O3-thinlto] April 27th 2023, 2:15:47 pm | regression codegen reasonable | ## Metadata
+ Workflow URL: https://github.com/dtcxzyw/llvm-ci/actions/runs/4820681730
## Change Logs
from fe3ed6550ef277f5c47a9ccdbdd466fa225f4a99 to 51297a7a720c83f831b072df4666877673f87cfa
[51297a7a720c83f831b072df4666877673f87cfa](https://github.com/llvm/llvm-project/commit/51297a7a720c83f831b072df4666877673f87cfa) [MLIR][OpenMP][NFC] Minor code cleanup
[044f27f62fa5c771385fdac34150307d652e60d6](https://github.com/llvm/llvm-project/commit/044f27f62fa5c771385fdac34150307d652e60d6) [AArch64] Precommit tests for VECTOR_SHUFFLE
[8b56da5e9f3ba737a5ff4bf5dee654416849042f](https://github.com/llvm/llvm-project/commit/8b56da5e9f3ba737a5ff4bf5dee654416849042f) [IR] Change shufflevector undef mask to poison
[90d30fde12d80b633ce157b5f070a33e96018bbc](https://github.com/llvm/llvm-project/commit/90d30fde12d80b633ce157b5f070a33e96018bbc) [InstCombine] Add frozen for the condition value of SelectInst
[f539b6ffc25144703498176558035c499825dc48](https://github.com/llvm/llvm-project/commit/f539b6ffc25144703498176558035c499825dc48) [NFC] Add tests from my fix for GH62362.
[fa0014a68bb452ff12af6e4af5e6e919dbe8584b](https://github.com/llvm/llvm-project/commit/fa0014a68bb452ff12af6e4af5e6e919dbe8584b) [SCEV] Drop LCSSA check in createNodeFromSelectLikePHI()
[079c525f206228c3343048bb5a74a8e9a428de1a](https://github.com/llvm/llvm-project/commit/079c525f206228c3343048bb5a74a8e9a428de1a) [SCEV] Try simplifying phi before createNodeFromSelectLikePHI()
[6cfcf0242f3260a3a90bac68e9f271548caa8372](https://github.com/llvm/llvm-project/commit/6cfcf0242f3260a3a90bac68e9f271548caa8372) [clangd] Fix the include-cleaner-batch-fix.test failure on some platforms
[bd1109307ad16a142d0a185f06e36d256d948e5a](https://github.com/llvm/llvm-project/commit/bd1109307ad16a142d0a185f06e36d256d948e5a) [DebugInfo][InstCombine] Fix missing source and variable locations after foldOpIntoPhi
[a3e56a8792ffaf3a3d3538736e1042b8db45ab89](https://github.com/llvm/llvm-project/commit/a3e56a8792ffaf3a3d3538736e1042b8db45ab89) [KMSAN] Enable on SystemZ
## Regressions (Size)
|Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|452634|452714|1.000|
## Differences (Size)
|Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|452634|452714|1.000|
|MultiSource/Applications/SIBsim4/SIBsim4|ca71f43885c2b833d1b31da81031315f|e2e79cb5471e6b0dce307a49ce6545db|31894|31894|1.000|
|GeoMeans|N/A|N/A|452634.000|452714.000|1.000|
## Differences (Time)
|Name|Baseline MD5|Current MD5|Baseline Time|Current Time|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Applications/SIBsim4/SIBsim4|ca71f43885c2b833d1b31da81031315f|e2e79cb5471e6b0dce307a49ce6545db|11.67499309|11.67499309|1.000|
|MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|0.464783438|0.464783324|1.000|
|GeoMeans|N/A|N/A|0.465|0.465|1.000|
| 1.0 | Regressions Report [rv32gc-O3-thinlto] April 27th 2023, 2:15:47 pm - ## Metadata
+ Workflow URL: https://github.com/dtcxzyw/llvm-ci/actions/runs/4820681730
## Change Logs
from fe3ed6550ef277f5c47a9ccdbdd466fa225f4a99 to 51297a7a720c83f831b072df4666877673f87cfa
[51297a7a720c83f831b072df4666877673f87cfa](https://github.com/llvm/llvm-project/commit/51297a7a720c83f831b072df4666877673f87cfa) [MLIR][OpenMP][NFC] Minor code cleanup
[044f27f62fa5c771385fdac34150307d652e60d6](https://github.com/llvm/llvm-project/commit/044f27f62fa5c771385fdac34150307d652e60d6) [AArch64] Precommit tests for VECTOR_SHUFFLE
[8b56da5e9f3ba737a5ff4bf5dee654416849042f](https://github.com/llvm/llvm-project/commit/8b56da5e9f3ba737a5ff4bf5dee654416849042f) [IR] Change shufflevector undef mask to poison
[90d30fde12d80b633ce157b5f070a33e96018bbc](https://github.com/llvm/llvm-project/commit/90d30fde12d80b633ce157b5f070a33e96018bbc) [InstCombine] Add frozen for the condition value of SelectInst
[f539b6ffc25144703498176558035c499825dc48](https://github.com/llvm/llvm-project/commit/f539b6ffc25144703498176558035c499825dc48) [NFC] Add tests from my fix for GH62362.
[fa0014a68bb452ff12af6e4af5e6e919dbe8584b](https://github.com/llvm/llvm-project/commit/fa0014a68bb452ff12af6e4af5e6e919dbe8584b) [SCEV] Drop LCSSA check in createNodeFromSelectLikePHI()
[079c525f206228c3343048bb5a74a8e9a428de1a](https://github.com/llvm/llvm-project/commit/079c525f206228c3343048bb5a74a8e9a428de1a) [SCEV] Try simplifying phi before createNodeFromSelectLikePHI()
[6cfcf0242f3260a3a90bac68e9f271548caa8372](https://github.com/llvm/llvm-project/commit/6cfcf0242f3260a3a90bac68e9f271548caa8372) [clangd] Fix the include-cleaner-batch-fix.test failure on some platforms
[bd1109307ad16a142d0a185f06e36d256d948e5a](https://github.com/llvm/llvm-project/commit/bd1109307ad16a142d0a185f06e36d256d948e5a) [DebugInfo][InstCombine] Fix missing source and variable locations after foldOpIntoPhi
[a3e56a8792ffaf3a3d3538736e1042b8db45ab89](https://github.com/llvm/llvm-project/commit/a3e56a8792ffaf3a3d3538736e1042b8db45ab89) [KMSAN] Enable on SystemZ
## Regressions (Size)
|Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|452634|452714|1.000|
## Differences (Size)
|Name|Baseline MD5|Current MD5|Baseline Size|Current Size|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|452634|452714|1.000|
|MultiSource/Applications/SIBsim4/SIBsim4|ca71f43885c2b833d1b31da81031315f|e2e79cb5471e6b0dce307a49ce6545db|31894|31894|1.000|
|GeoMeans|N/A|N/A|452634.000|452714.000|1.000|
## Differences (Time)
|Name|Baseline MD5|Current MD5|Baseline Time|Current Time|Ratio|
|:--|:--:|:--:|--:|--:|--:|
|MultiSource/Applications/SIBsim4/SIBsim4|ca71f43885c2b833d1b31da81031315f|e2e79cb5471e6b0dce307a49ce6545db|11.67499309|11.67499309|1.000|
|MultiSource/Applications/ClamAV/clamscan|046626912c5e4be2b649f1585be3b154|f10359246d34349500a20f00c9332540|0.464783438|0.464783324|1.000|
|GeoMeans|N/A|N/A|0.465|0.465|1.000|
| non_priority | regressions report april pm metadata workflow url change logs from to minor code cleanup precommit tests for vector shuffle change shufflevector undef mask to poison add frozen for the condition value of selectinst add tests from my fix for drop lcssa check in createnodefromselectlikephi try simplifying phi before createnodefromselectlikephi fix the include cleaner batch fix test failure on some platforms fix missing source and variable locations after foldopintophi enable on systemz regressions size name baseline current baseline size current size ratio multisource applications clamav clamscan differences size name baseline current baseline size current size ratio multisource applications clamav clamscan multisource applications geomeans n a n a differences time name baseline current baseline time current time ratio multisource applications multisource applications clamav clamscan geomeans n a n a | 0 |
20,029 | 27,945,268,113 | IssuesEvent | 2023-03-24 02:09:54 | TakosThings/Fluent-Discord | https://api.github.com/repos/TakosThings/Fluent-Discord | opened | Plugin name here | better discord plugin compatibility | ### Plugin Link
https://betterdiscord.app/plugin/QuickMention
### Notes
I think this is the same plugin from Vencord, that I'm using... not sure though
Vencord Plugin:
https://gist.github.com/Vendicated/8696cde7b92548064a3ae92ead84d033#QuickMention | True | Plugin name here - ### Plugin Link
https://betterdiscord.app/plugin/QuickMention
### Notes
I think this is the same plugin from Vencord, that I'm using... not sure though
Vencord Plugin:
https://gist.github.com/Vendicated/8696cde7b92548064a3ae92ead84d033#QuickMention | non_priority | plugin name here plugin link notes i think this is the same plugin from vencord that i m using not sure though vencord plugin | 0 |
331,642 | 10,075,805,505 | IssuesEvent | 2019-07-24 14:57:30 | clearlinux/distribution | https://api.github.com/repos/clearlinux/distribution | closed | Bundle "virt-manager" depends on bundle "virt-manager-gui" to work, possible to merge the 2 into one? | bug desktop medium priority | **Is your feature request related to a problem? Please describe.**
I'm not sure what is the reason for having both "virt-manager" and "virt-manager-gui".
"virt-manager" installs the GUI, but it fails (see screenshot) because it's missing Gtk-vnc. Once I install "virt-manager-gui" (which contains Gtk-vnc), the issue is resolved.
**Describe the solution you'd like**
They both perform GUI functions for libvirt. Why not merge the 2 bundles or add the Gtk-vnc bundle into "virt-manager" to resolve the dependency issue?

| 1.0 | Bundle "virt-manager" depends on bundle "virt-manager-gui" to work, possible to merge the 2 into one? - **Is your feature request related to a problem? Please describe.**
I'm not sure what is the reason for having both "virt-manager" and "virt-manager-gui".
"virt-manager" installs the GUI, but it fails (see screenshot) because it's missing Gtk-vnc. Once I install "virt-manager-gui" (which contains Gtk-vnc), the issue is resolved.
**Describe the solution you'd like**
They both perform GUI functions for libvirt. Why not merge the 2 bundles or add the Gtk-vnc bundle into "virt-manager" to resolve the dependency issue?

| priority | bundle virt manager depends on bundle virt manager gui to work possible to merge the into one is your feature request related to a problem please describe i m not sure what is the reason for having both virt manager and virt manager gui virt manager installs the gui but it fails see screenshot because it s missing gtk vnc once i install virt manager gui which contains gtk vnc the issue is resolved describe the solution you d like they both perform gui functions for libvirt why not merge the bundles or add the gtk vnc bundle into virt manager to resolve the dependency issue | 1 |
682,118 | 23,333,297,486 | IssuesEvent | 2022-08-09 07:46:15 | grpc/grpc | https://api.github.com/repos/grpc/grpc | closed | cross compile for aarch64 use bazel meet error | kind/bug lang/c++ priority/P2 untriaged | Like the issues #30257. I had update boringssl with newest master_with_bazel branch but the problem is exist.
Some build errors as bellow.
.....
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S: Assembler messages:
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:303: Error: unknown pseudo-op: `.att_syntax'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:306: Error: unknown mnemonic `push' -- `push %rbp'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:308: Error: bad register expression
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:309: Error: unknown mnemonic `movq' -- `movq %rsp,%rbp'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:310: Error: bad register expression
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:311: Error: unknown mnemonic `push' -- `push %r12'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:312: Error: bad register expression
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:320: Error: operand 1 must be an integer register -- `mov %rcx,%r8'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:321: Error: unknown mnemonic `addq' -- `addq $6144+12288+512+9408+32,%r8'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:322: Error: operand 1 must be an integer register -- `mov %r8,%rax'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:323: Error: unknown mnemonic `subq' -- `subq $6144,%r8'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:324: Error: operand 1 must be an integer register -- `mov %r8,%r11'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:325: Error: unknown mnemonic `subq' -- `subq $12288,%r8'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:326: Error: operand 1 must be an integer register -- `mov %r8,%r12'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:327: Error: unknown mnemonic `subq' -- `subq $512,%r8'
....
By the way, I find when build poly_rq_mul.S will meet the error.
This is my build comand.
/usr/bin/aarch64-linux-gnu-gcc boringssl/src/crypto/hrss/asm/poly_rq_mul.S
/usr/bin/aarch64-linux-gnu-gcc boringssl/src/crypto/hrss/asm/poly_rq_mul.S -march=armv8-a
The paramters is not correct?
Anyone knows how to build the s file?
Thanks very much!
| 1.0 | cross compile for aarch64 use bazel meet error - Like the issues #30257. I had update boringssl with newest master_with_bazel branch but the problem is exist.
Some build errors as bellow.
.....
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S: Assembler messages:
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:303: Error: unknown pseudo-op: `.att_syntax'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:306: Error: unknown mnemonic `push' -- `push %rbp'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:308: Error: bad register expression
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:309: Error: unknown mnemonic `movq' -- `movq %rsp,%rbp'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:310: Error: bad register expression
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:311: Error: unknown mnemonic `push' -- `push %r12'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:312: Error: bad register expression
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:320: Error: operand 1 must be an integer register -- `mov %rcx,%r8'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:321: Error: unknown mnemonic `addq' -- `addq $6144+12288+512+9408+32,%r8'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:322: Error: operand 1 must be an integer register -- `mov %r8,%rax'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:323: Error: unknown mnemonic `subq' -- `subq $6144,%r8'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:324: Error: operand 1 must be an integer register -- `mov %r8,%r11'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:325: Error: unknown mnemonic `subq' -- `subq $12288,%r8'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:326: Error: operand 1 must be an integer register -- `mov %r8,%r12'
external/boringssl/src/crypto/hrss/asm/poly_rq_mul.S:327: Error: unknown mnemonic `subq' -- `subq $512,%r8'
....
By the way, I find when build poly_rq_mul.S will meet the error.
This is my build comand.
/usr/bin/aarch64-linux-gnu-gcc boringssl/src/crypto/hrss/asm/poly_rq_mul.S
/usr/bin/aarch64-linux-gnu-gcc boringssl/src/crypto/hrss/asm/poly_rq_mul.S -march=armv8-a
The paramters is not correct?
Anyone knows how to build the s file?
Thanks very much!
| priority | cross compile for use bazel meet error like the issues i had update boringssl with newest master with bazel branch but the problem is exist some build errors as bellow external boringssl src crypto hrss asm poly rq mul s assembler messages external boringssl src crypto hrss asm poly rq mul s error unknown pseudo op att syntax external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic push push rbp external boringssl src crypto hrss asm poly rq mul s error bad register expression external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic movq movq rsp rbp external boringssl src crypto hrss asm poly rq mul s error bad register expression external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic push push external boringssl src crypto hrss asm poly rq mul s error bad register expression external boringssl src crypto hrss asm poly rq mul s error operand must be an integer register mov rcx external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic addq addq external boringssl src crypto hrss asm poly rq mul s error operand must be an integer register mov rax external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic subq subq external boringssl src crypto hrss asm poly rq mul s error operand must be an integer register mov external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic subq subq external boringssl src crypto hrss asm poly rq mul s error operand must be an integer register mov external boringssl src crypto hrss asm poly rq mul s error unknown mnemonic subq subq by the way i find when build poly rq mul s will meet the error this is my build comand usr bin linux gnu gcc boringssl src crypto hrss asm poly rq mul s usr bin linux gnu gcc boringssl src crypto hrss asm poly rq mul s march a the paramters is not correct anyone knows how to build the s file? thanks very much | 1 |
37,079 | 12,467,796,769 | IssuesEvent | 2020-05-28 17:42:03 | geofffranks/spruce | https://api.github.com/repos/geofffranks/spruce | closed | CVE-2020-11022 (Medium) detected in jquery-2.1.0.js | security vulnerability | ## CVE-2020-11022 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.1.0.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.0/jquery.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/spruce/vendor/github.com/smartystreets/goconvey/web/client/index.html</p>
<p>Path to vulnerable library: /spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/jquery.js,/spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.1.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/geofffranks/spruce/commit/66c58daa21fb1d7c8b0ff833ad4544035c070300">66c58daa21fb1d7c8b0ff833ad4544035c070300</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jQuery - 3.5.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-11022 (Medium) detected in jquery-2.1.0.js - ## CVE-2020-11022 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.1.0.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.0/jquery.js</a></p>
<p>Path to dependency file: /tmp/ws-scm/spruce/vendor/github.com/smartystreets/goconvey/web/client/index.html</p>
<p>Path to vulnerable library: /spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/jquery.js,/spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/jquery.js</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.1.0.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/geofffranks/spruce/commit/66c58daa21fb1d7c8b0ff833ad4544035c070300">66c58daa21fb1d7c8b0ff833ad4544035c070300</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jQuery - 3.5.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in jquery js cve medium severity vulnerability vulnerable library jquery js javascript library for dom operations library home page a href path to dependency file tmp ws scm spruce vendor github com smartystreets goconvey web client index html path to vulnerable library spruce vendor github com smartystreets goconvey web client resources js lib jquery js spruce vendor github com smartystreets goconvey web client resources js lib jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource | 0 |
109,828 | 11,659,450,743 | IssuesEvent | 2020-03-03 00:04:42 | gatsbyjs/gatsby | https://api.github.com/repos/gatsbyjs/gatsby | closed | gatsby tutorial sidebar animation bug | stale? type: documentation | **Summary**
I'm going through the [gatsby tutorial part one](https://www.gatsbyjs.org/tutorial/part-one/) and noticed that the sidebar animation shows the "linking between pages" highlighted when not in that section and that when in the "linking between pages" section the sidebar animation has "deploying a gatsby site" selected. I've also tested this in multiple browsers on my mac with the same results.
**OS / browser versions**
macOS version: 10.15.2
safari version: 13.0.4
firefox version: 71.0
chrome version: 79.0.3945.88
**Steps to reproduce**
1. Go to "linking between pages" anchor (https://www.gatsbyjs.org/tutorial/part-one/#linking-between-pages)
2. Notice "linking between pages" sidebar item is not highlighted
3. Scroll up out of "linking between pages" section until it's sidebar item highlights.
**Screenshots**
- Linking between pages sidebar item highlights outside of it's section
- Linking between pages section does not have its sidebar item highlighted


| 1.0 | gatsby tutorial sidebar animation bug - **Summary**
I'm going through the [gatsby tutorial part one](https://www.gatsbyjs.org/tutorial/part-one/) and noticed that the sidebar animation shows the "linking between pages" highlighted when not in that section and that when in the "linking between pages" section the sidebar animation has "deploying a gatsby site" selected. I've also tested this in multiple browsers on my mac with the same results.
**OS / browser versions**
macOS version: 10.15.2
safari version: 13.0.4
firefox version: 71.0
chrome version: 79.0.3945.88
**Steps to reproduce**
1. Go to "linking between pages" anchor (https://www.gatsbyjs.org/tutorial/part-one/#linking-between-pages)
2. Notice "linking between pages" sidebar item is not highlighted
3. Scroll up out of "linking between pages" section until it's sidebar item highlights.
**Screenshots**
- Linking between pages sidebar item highlights outside of it's section
- Linking between pages section does not have its sidebar item highlighted


| non_priority | gatsby tutorial sidebar animation bug summary i m going through the and noticed that the sidebar animation shows the linking between pages highlighted when not in that section and that when in the linking between pages section the sidebar animation has deploying a gatsby site selected i ve also tested this in multiple browsers on my mac with the same results os browser versions macos version safari version firefox version chrome version steps to reproduce go to linking between pages anchor notice linking between pages sidebar item is not highlighted scroll up out of linking between pages section until it s sidebar item highlights screenshots linking between pages sidebar item highlights outside of it s section linking between pages section does not have its sidebar item highlighted | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.