Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 7
112
| repo_url
stringlengths 36
141
| action
stringclasses 3
values | title
stringlengths 1
744
| labels
stringlengths 4
574
| body
stringlengths 9
211k
| index
stringclasses 10
values | text_combine
stringlengths 96
211k
| label
stringclasses 2
values | text
stringlengths 96
188k
| binary_label
int64 0
1
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
101,842
| 11,260,268,610
|
IssuesEvent
|
2020-01-13 10:11:39
|
auxmoney/OpentracingBundle-core
|
https://api.github.com/repos/auxmoney/OpentracingBundle-core
|
opened
|
create complete tutorial
|
documentation
|
In order to show the complete functionality, we should create a tutorial (as wiki page?) on how to set up an example application.
We should include setting up a tracer instance, symfony application and instrumentation. It should also include some fancy screenshots.
|
1.0
|
create complete tutorial - In order to show the complete functionality, we should create a tutorial (as wiki page?) on how to set up an example application.
We should include setting up a tracer instance, symfony application and instrumentation. It should also include some fancy screenshots.
|
non_process
|
create complete tutorial in order to show the complete functionality we should create a tutorial as wiki page on how to set up an example application we should include setting up a tracer instance symfony application and instrumentation it should also include some fancy screenshots
| 0
|
15,224
| 19,091,542,670
|
IssuesEvent
|
2021-11-29 12:40:13
|
Jeffail/benthos
|
https://api.github.com/repos/Jeffail/benthos
|
opened
|
Investigate elastic/opensearch forks
|
enhancement processors outputs
|
The dust is starting to settle now since the opensearch fork so it's probably worth spending some time understanding what's needed in order to continue to support both offerings. We're currently using https://github.com/olivere/elastic which has been fantastic (more info about future direction here: https://github.com/olivere/elastic/issues/1533) but we could also consider moving to the official client libraries as we only use a small fraction of ES endpoints.
Official libraries:
- https://github.com/elastic/go-elasticsearch
- https://github.com/opensearch-project/opensearch-go
Questions:
- Do we need a forked `opensearch` component?
|
1.0
|
Investigate elastic/opensearch forks - The dust is starting to settle now since the opensearch fork so it's probably worth spending some time understanding what's needed in order to continue to support both offerings. We're currently using https://github.com/olivere/elastic which has been fantastic (more info about future direction here: https://github.com/olivere/elastic/issues/1533) but we could also consider moving to the official client libraries as we only use a small fraction of ES endpoints.
Official libraries:
- https://github.com/elastic/go-elasticsearch
- https://github.com/opensearch-project/opensearch-go
Questions:
- Do we need a forked `opensearch` component?
|
process
|
investigate elastic opensearch forks the dust is starting to settle now since the opensearch fork so it s probably worth spending some time understanding what s needed in order to continue to support both offerings we re currently using which has been fantastic more info about future direction here but we could also consider moving to the official client libraries as we only use a small fraction of es endpoints official libraries questions do we need a forked opensearch component
| 1
|
16,175
| 20,622,317,312
|
IssuesEvent
|
2022-03-07 18:39:38
|
dtcenter/MET
|
https://api.github.com/repos/dtcenter/MET
|
reopened
|
Enhance PB2NC to derive Mixed-Layer CAPE (MLCAPE).
|
type: enhancement requestor: NOAA/EMC priority: blocker reporting: DTC NOAA R2O requestor: METplus Team MET: PreProcessing Tools (Point)
|
## Describe the Enhancement ##
On 6/8/21, NOAA/EMC requested that the PB2NC tool be enhanced to derive additional variations of CAPE. They are most interested in mixed-layer CAPE (representing the average characteristics of the boundary layer). Mixed-layer is the "flavor" of CAPE that was recommended to be verified in our models, via the metrics workshop.
While PB2NC does currently derive CAPE, it is surface-based CAPE and its done by calling this Fortran sub-routine:
https://github.com/dtcenter/MET/blob/main_v10.0/met/src/tools/other/pb2nc/calcape.f
That routine was taken from the NOAA/EMC VSDB verification code, but no such code exists for mixed-layer CAPE. However, it is defined in UPP.
This task is to enhance PB2NC to derive the mixed-layer variation of CAPE. Consider some of the implementation options:
- We could keep the scope limited and lift/adapt the code for deriving MLCAPE from the UPP source code. Should we keep that code in Fortran or re-write in C++?
- We could expand the scope considerably and investigate a more direct interface to the UPP derivation routines. But this would add a new dependency on UPP.
An example of a UPP module to compute CAPE can be found at: []( https://github.com/NOAA-EMC/EMC_post_refactor/blob/jesse/sorc/ncep_post.fd/UPP_PHYSICS.f)
### Time Estimate ###
*Estimate the amount of work required here.*
*Issues should represent approximately 1 to 3 days of work.*
### Sub-Issues ###
Consider breaking the enhancement down into sub-issues.
- [ ] *Add a checkbox for each sub-issue here.*
### Relevant Deadlines ###
needs to be done by 7/31/21 if possible
### Funding Source ###
2792541
## Define the Metadata ##
### Assignee ###
- [x] Select **engineer(s)** or **no engineer** required: not sure yet
- [x] Select **scientist(s)** or **no scientist** required: Perry S
### Labels ###
- [x] Select **component(s)**
- [x] Select **priority**
- [x] Select **requestor(s)**
### Projects and Milestone ###
- [x] Select **Repository** and/or **Organization** level **Project(s)** or add **alert: NEED PROJECT ASSIGNMENT** label
- [x] Select **Milestone** as the next official version or **Future Versions**
## Define Related Issue(s) ##
Consider the impact to the other METplus components.
- [x] [METplus](https://github.com/dtcenter/METplus/issues/new/choose), [MET](https://github.com/dtcenter/MET/issues/new/choose), [METdatadb](https://github.com/dtcenter/METdatadb/issues/new/choose), [METviewer](https://github.com/dtcenter/METviewer/issues/new/choose), [METexpress](https://github.com/dtcenter/METexpress/issues/new/choose), [METcalcpy](https://github.com/dtcenter/METcalcpy/issues/new/choose), [METplotpy](https://github.com/dtcenter/METplotpy/issues/new/choose)
There should be no impacts to other METplus repositories.
## Enhancement Checklist ##
See the [METplus Workflow](https://dtcenter.github.io/METplus/Contributors_Guide/github_workflow.html) for details.
- [ ] Complete the issue definition above, including the **Time Estimate** and **Funding Source**.
- [ ] Fork this repository or create a branch of **develop**.
Branch name: `feature_<Issue Number>_<Description>`
- [ ] Complete the development and test your changes.
- [ ] Add/update log messages for easier debugging.
- [ ] Add/update unit tests.
- [ ] Add/update documentation.
- [ ] Push local changes to GitHub.
- [ ] Submit a pull request to merge into **develop**.
Pull request: `feature <Issue Number> <Description>`
- [ ] Define the pull request metadata, as permissions allow.
Select: **Reviewer(s)** and **Linked issues**
Select: **Repository** level development cycle **Project** for the next official release
Select: **Milestone** as the next official version
- [ ] Iterate until the reviewer(s) accept and merge your changes.
- [ ] Delete your fork or branch.
- [ ] Close this issue.
|
1.0
|
Enhance PB2NC to derive Mixed-Layer CAPE (MLCAPE). - ## Describe the Enhancement ##
On 6/8/21, NOAA/EMC requested that the PB2NC tool be enhanced to derive additional variations of CAPE. They are most interested in mixed-layer CAPE (representing the average characteristics of the boundary layer). Mixed-layer is the "flavor" of CAPE that was recommended to be verified in our models, via the metrics workshop.
While PB2NC does currently derive CAPE, it is surface-based CAPE and its done by calling this Fortran sub-routine:
https://github.com/dtcenter/MET/blob/main_v10.0/met/src/tools/other/pb2nc/calcape.f
That routine was taken from the NOAA/EMC VSDB verification code, but no such code exists for mixed-layer CAPE. However, it is defined in UPP.
This task is to enhance PB2NC to derive the mixed-layer variation of CAPE. Consider some of the implementation options:
- We could keep the scope limited and lift/adapt the code for deriving MLCAPE from the UPP source code. Should we keep that code in Fortran or re-write in C++?
- We could expand the scope considerably and investigate a more direct interface to the UPP derivation routines. But this would add a new dependency on UPP.
An example of a UPP module to compute CAPE can be found at: []( https://github.com/NOAA-EMC/EMC_post_refactor/blob/jesse/sorc/ncep_post.fd/UPP_PHYSICS.f)
### Time Estimate ###
*Estimate the amount of work required here.*
*Issues should represent approximately 1 to 3 days of work.*
### Sub-Issues ###
Consider breaking the enhancement down into sub-issues.
- [ ] *Add a checkbox for each sub-issue here.*
### Relevant Deadlines ###
needs to be done by 7/31/21 if possible
### Funding Source ###
2792541
## Define the Metadata ##
### Assignee ###
- [x] Select **engineer(s)** or **no engineer** required: not sure yet
- [x] Select **scientist(s)** or **no scientist** required: Perry S
### Labels ###
- [x] Select **component(s)**
- [x] Select **priority**
- [x] Select **requestor(s)**
### Projects and Milestone ###
- [x] Select **Repository** and/or **Organization** level **Project(s)** or add **alert: NEED PROJECT ASSIGNMENT** label
- [x] Select **Milestone** as the next official version or **Future Versions**
## Define Related Issue(s) ##
Consider the impact to the other METplus components.
- [x] [METplus](https://github.com/dtcenter/METplus/issues/new/choose), [MET](https://github.com/dtcenter/MET/issues/new/choose), [METdatadb](https://github.com/dtcenter/METdatadb/issues/new/choose), [METviewer](https://github.com/dtcenter/METviewer/issues/new/choose), [METexpress](https://github.com/dtcenter/METexpress/issues/new/choose), [METcalcpy](https://github.com/dtcenter/METcalcpy/issues/new/choose), [METplotpy](https://github.com/dtcenter/METplotpy/issues/new/choose)
There should be no impacts to other METplus repositories.
## Enhancement Checklist ##
See the [METplus Workflow](https://dtcenter.github.io/METplus/Contributors_Guide/github_workflow.html) for details.
- [ ] Complete the issue definition above, including the **Time Estimate** and **Funding Source**.
- [ ] Fork this repository or create a branch of **develop**.
Branch name: `feature_<Issue Number>_<Description>`
- [ ] Complete the development and test your changes.
- [ ] Add/update log messages for easier debugging.
- [ ] Add/update unit tests.
- [ ] Add/update documentation.
- [ ] Push local changes to GitHub.
- [ ] Submit a pull request to merge into **develop**.
Pull request: `feature <Issue Number> <Description>`
- [ ] Define the pull request metadata, as permissions allow.
Select: **Reviewer(s)** and **Linked issues**
Select: **Repository** level development cycle **Project** for the next official release
Select: **Milestone** as the next official version
- [ ] Iterate until the reviewer(s) accept and merge your changes.
- [ ] Delete your fork or branch.
- [ ] Close this issue.
|
process
|
enhance to derive mixed layer cape mlcape describe the enhancement on noaa emc requested that the tool be enhanced to derive additional variations of cape they are most interested in mixed layer cape representing the average characteristics of the boundary layer mixed layer is the flavor of cape that was recommended to be verified in our models via the metrics workshop while does currently derive cape it is surface based cape and its done by calling this fortran sub routine that routine was taken from the noaa emc vsdb verification code but no such code exists for mixed layer cape however it is defined in upp this task is to enhance to derive the mixed layer variation of cape consider some of the implementation options we could keep the scope limited and lift adapt the code for deriving mlcape from the upp source code should we keep that code in fortran or re write in c we could expand the scope considerably and investigate a more direct interface to the upp derivation routines but this would add a new dependency on upp an example of a upp module to compute cape can be found at time estimate estimate the amount of work required here issues should represent approximately to days of work sub issues consider breaking the enhancement down into sub issues add a checkbox for each sub issue here relevant deadlines needs to be done by if possible funding source define the metadata assignee select engineer s or no engineer required not sure yet select scientist s or no scientist required perry s labels select component s select priority select requestor s projects and milestone select repository and or organization level project s or add alert need project assignment label select milestone as the next official version or future versions define related issue s consider the impact to the other metplus components there should be no impacts to other metplus repositories enhancement checklist see the for details complete the issue definition above including the time estimate and funding source fork this repository or create a branch of develop branch name feature complete the development and test your changes add update log messages for easier debugging add update unit tests add update documentation push local changes to github submit a pull request to merge into develop pull request feature define the pull request metadata as permissions allow select reviewer s and linked issues select repository level development cycle project for the next official release select milestone as the next official version iterate until the reviewer s accept and merge your changes delete your fork or branch close this issue
| 1
|
22,090
| 30,612,770,845
|
IssuesEvent
|
2023-07-23 20:25:33
|
rust-lang/rust
|
https://api.github.com/repos/rust-lang/rust
|
closed
|
process_unix::do_exec should reset the signal mask to its value on startup, not clear it
|
T-libs-api C-bug A-process
|
The Unix implementation of `process::spawn` (specifically, `do_exec` in `sys/unix/process/process_unix.rs`) contains logic to restore the signal mask to the default in child processes...
```rust
// Reset signal handling so the child process starts in a
// standardized state. libstd ignores SIGPIPE, and signal-handling
// libraries often set a mask. Child processes inherit ignored
// signals and the signal mask from their parent, but most
// UNIX programs do not reset these things on their own, so we
// need to clean things up now to avoid confusing the program
// we're about to run.
let mut set: libc::sigset_t = mem::uninitialized();
t!(cvt(libc::sigemptyset(&mut set)));
t!(cvt(libc::pthread_sigmask(libc::SIG_SETMASK, &set,
ptr::null_mut())));
let ret = sys::signal(libc::SIGPIPE, libc::SIG_DFL);
if ret == libc::SIG_ERR {
return io::Error::last_os_error()
}
```
Completely clearing the signal mask here is subtly wrong. It should instead be restored to _whatever it was when the parent process started up_. Certain standard shell utilities — the best-known is `nohup` — deliberately start a process with some signals already masked, and expect that those settings will be inherited by any further subprocesses.
For the same reason, the handler for `SIGPIPE` should be reset not to `SIG_DFL`, but to whichever of `SIG_DFL` or `SIG_IGN` it was before libstd ignored it.
(In order to make it possible to _implement_ such utilities in Rust, the ideal resolution here would involve adding `mask_signals` and `ignore_signals` knobs to `unix::process::CommandExt`, and document that the _defaults_ for these are whatever was observed on process startup. But I don't see a clean way to do that without a lot more support for signals in general in libstd, maybe more than is properly in scope.)
|
1.0
|
process_unix::do_exec should reset the signal mask to its value on startup, not clear it - The Unix implementation of `process::spawn` (specifically, `do_exec` in `sys/unix/process/process_unix.rs`) contains logic to restore the signal mask to the default in child processes...
```rust
// Reset signal handling so the child process starts in a
// standardized state. libstd ignores SIGPIPE, and signal-handling
// libraries often set a mask. Child processes inherit ignored
// signals and the signal mask from their parent, but most
// UNIX programs do not reset these things on their own, so we
// need to clean things up now to avoid confusing the program
// we're about to run.
let mut set: libc::sigset_t = mem::uninitialized();
t!(cvt(libc::sigemptyset(&mut set)));
t!(cvt(libc::pthread_sigmask(libc::SIG_SETMASK, &set,
ptr::null_mut())));
let ret = sys::signal(libc::SIGPIPE, libc::SIG_DFL);
if ret == libc::SIG_ERR {
return io::Error::last_os_error()
}
```
Completely clearing the signal mask here is subtly wrong. It should instead be restored to _whatever it was when the parent process started up_. Certain standard shell utilities — the best-known is `nohup` — deliberately start a process with some signals already masked, and expect that those settings will be inherited by any further subprocesses.
For the same reason, the handler for `SIGPIPE` should be reset not to `SIG_DFL`, but to whichever of `SIG_DFL` or `SIG_IGN` it was before libstd ignored it.
(In order to make it possible to _implement_ such utilities in Rust, the ideal resolution here would involve adding `mask_signals` and `ignore_signals` knobs to `unix::process::CommandExt`, and document that the _defaults_ for these are whatever was observed on process startup. But I don't see a clean way to do that without a lot more support for signals in general in libstd, maybe more than is properly in scope.)
|
process
|
process unix do exec should reset the signal mask to its value on startup not clear it the unix implementation of process spawn specifically do exec in sys unix process process unix rs contains logic to restore the signal mask to the default in child processes rust reset signal handling so the child process starts in a standardized state libstd ignores sigpipe and signal handling libraries often set a mask child processes inherit ignored signals and the signal mask from their parent but most unix programs do not reset these things on their own so we need to clean things up now to avoid confusing the program we re about to run let mut set libc sigset t mem uninitialized t cvt libc sigemptyset mut set t cvt libc pthread sigmask libc sig setmask set ptr null mut let ret sys signal libc sigpipe libc sig dfl if ret libc sig err return io error last os error completely clearing the signal mask here is subtly wrong it should instead be restored to whatever it was when the parent process started up certain standard shell utilities — the best known is nohup — deliberately start a process with some signals already masked and expect that those settings will be inherited by any further subprocesses for the same reason the handler for sigpipe should be reset not to sig dfl but to whichever of sig dfl or sig ign it was before libstd ignored it in order to make it possible to implement such utilities in rust the ideal resolution here would involve adding mask signals and ignore signals knobs to unix process commandext and document that the defaults for these are whatever was observed on process startup but i don t see a clean way to do that without a lot more support for signals in general in libstd maybe more than is properly in scope
| 1
|
17,357
| 23,184,081,054
|
IssuesEvent
|
2022-08-01 06:43:00
|
acumenlabs/status-page
|
https://api.github.com/repos/acumenlabs/status-page
|
closed
|
🛑 Processors is down
|
status processors
|
In [`2baed85`](https://github.com/acumenlabs/status-page/commit/2baed8586c88318e23ef8186c1ab123c6c92a4a9
), Processors ($STATUS_URL) was **down**:
- HTTP code: 401
- Response time: 34 ms
|
1.0
|
🛑 Processors is down - In [`2baed85`](https://github.com/acumenlabs/status-page/commit/2baed8586c88318e23ef8186c1ab123c6c92a4a9
), Processors ($STATUS_URL) was **down**:
- HTTP code: 401
- Response time: 34 ms
|
process
|
🛑 processors is down in processors status url was down http code response time ms
| 1
|
264,615
| 20,026,462,329
|
IssuesEvent
|
2022-02-01 21:56:45
|
UnBArqDsw2021-2/2021.2_G2_lava-jato
|
https://api.github.com/repos/UnBArqDsw2021-2/2021.2_G2_lava-jato
|
opened
|
Documento Brainstorm
|
documentation Elicitação Sprint 2
|
### Descrição:
Documentar a secção de Brainstorm feita pela equipe documentada no [miro](https://miro.com/welcomeonboard/WGJaYzNzanRlUUdjOXV0blIyd1Z3bjRuT3E3eEU5WkcweEhIaVZ2dG5KcHpKeml1NHRIcTdQbmVFWElEUmhqNnwzMDc0NDU3MzU1NTA5OTM4MzUy?invite_link_id=235529925893) e pela [issue](https://github.com/UnBArqDsw2021-2/2021.2_G2_lava-jato/issues/2)
### Tarefas:
- [ ] Analisar o Brainstorm.
- [ ] Criar o Documento.
### Critério de aceitação:
Estiver no gh-pages
Todos os integrantes estiverem analisados e aprovados o documento.
|
1.0
|
Documento Brainstorm - ### Descrição:
Documentar a secção de Brainstorm feita pela equipe documentada no [miro](https://miro.com/welcomeonboard/WGJaYzNzanRlUUdjOXV0blIyd1Z3bjRuT3E3eEU5WkcweEhIaVZ2dG5KcHpKeml1NHRIcTdQbmVFWElEUmhqNnwzMDc0NDU3MzU1NTA5OTM4MzUy?invite_link_id=235529925893) e pela [issue](https://github.com/UnBArqDsw2021-2/2021.2_G2_lava-jato/issues/2)
### Tarefas:
- [ ] Analisar o Brainstorm.
- [ ] Criar o Documento.
### Critério de aceitação:
Estiver no gh-pages
Todos os integrantes estiverem analisados e aprovados o documento.
|
non_process
|
documento brainstorm descrição documentar a secção de brainstorm feita pela equipe documentada no e pela tarefas analisar o brainstorm criar o documento critério de aceitação estiver no gh pages todos os integrantes estiverem analisados e aprovados o documento
| 0
|
20,286
| 26,916,418,626
|
IssuesEvent
|
2023-02-07 06:57:35
|
ShashankInsnapsys/user_crud
|
https://api.github.com/repos/ShashankInsnapsys/user_crud
|
reopened
|
DB Issues Demooo
|
invalid In process
|
**Laravel's database** query _builder provides a _convenient_, fluent_ interface to creating and running database queries. It can be used to perform most database operations in your application and works perfectly with all of Laravel's supported database systems.
The Laravel query builder uses PDO parameter binding to protect your application against SQL injection attacks. There is no need to clean or sanitize strings passed to the query builder as query bindings.


|
1.0
|
DB Issues Demooo - **Laravel's database** query _builder provides a _convenient_, fluent_ interface to creating and running database queries. It can be used to perform most database operations in your application and works perfectly with all of Laravel's supported database systems.
The Laravel query builder uses PDO parameter binding to protect your application against SQL injection attacks. There is no need to clean or sanitize strings passed to the query builder as query bindings.


|
process
|
db issues demooo laravel s database query builder provides a convenient fluent interface to creating and running database queries it can be used to perform most database operations in your application and works perfectly with all of laravel s supported database systems the laravel query builder uses pdo parameter binding to protect your application against sql injection attacks there is no need to clean or sanitize strings passed to the query builder as query bindings
| 1
|
505,857
| 14,653,423,124
|
IssuesEvent
|
2020-12-28 05:53:48
|
vanjarosoftware/Vanjaro.Platform
|
https://api.github.com/repos/vanjarosoftware/Vanjaro.Platform
|
closed
|
Custom Fonts Do No Show in the Default Theme Builder Font Picker
|
Area: Backend Bug Priority: High Release: Patch
|
I added a custom font but the font doesn't show up in Default Theme Builder to use for the Breadcrumb and other site elements. It does show up in the Typography settings for Text Blocks, etc.
What I would expect to happen is that after a custom font is added, that it would be an available option to the Default Theme Builder to use site-wide
Steps to Reproduce:
- Go to SEO & Site Search and link the style sheets to a custom Google Font, **Open Sans**
`<link rel="preconnect" href="https://fonts.gstatic.com">`
`<link href="https://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300;0,400;0,700;1,300;1,400;1,700&display=swap" rel="stylesheet">`

- Go to Custom Theme Builder and add the Open Sans Font
Font Name = Open Sans
Font Family = 'Open Sans', sans-serif

- Save the theme
- Clear the Client Cache
- Clear the Server Cache
- Restart the Application
- Go back to the Default Theme Builder

- Expand Breadcrumb
At this point, I would expect to see the new font listed in the drop down so that it can be applied to these global settings.
|
1.0
|
Custom Fonts Do No Show in the Default Theme Builder Font Picker - I added a custom font but the font doesn't show up in Default Theme Builder to use for the Breadcrumb and other site elements. It does show up in the Typography settings for Text Blocks, etc.
What I would expect to happen is that after a custom font is added, that it would be an available option to the Default Theme Builder to use site-wide
Steps to Reproduce:
- Go to SEO & Site Search and link the style sheets to a custom Google Font, **Open Sans**
`<link rel="preconnect" href="https://fonts.gstatic.com">`
`<link href="https://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300;0,400;0,700;1,300;1,400;1,700&display=swap" rel="stylesheet">`

- Go to Custom Theme Builder and add the Open Sans Font
Font Name = Open Sans
Font Family = 'Open Sans', sans-serif

- Save the theme
- Clear the Client Cache
- Clear the Server Cache
- Restart the Application
- Go back to the Default Theme Builder

- Expand Breadcrumb
At this point, I would expect to see the new font listed in the drop down so that it can be applied to these global settings.
|
non_process
|
custom fonts do no show in the default theme builder font picker i added a custom font but the font doesn t show up in default theme builder to use for the breadcrumb and other site elements it does show up in the typography settings for text blocks etc what i would expect to happen is that after a custom font is added that it would be an available option to the default theme builder to use site wide steps to reproduce go to seo site search and link the style sheets to a custom google font open sans link rel preconnect href go to custom theme builder and add the open sans font font name open sans font family open sans sans serif save the theme clear the client cache clear the server cache restart the application go back to the default theme builder expand breadcrumb at this point i would expect to see the new font listed in the drop down so that it can be applied to these global settings
| 0
|
8,656
| 11,796,228,753
|
IssuesEvent
|
2020-03-18 10:24:13
|
TOMP-WG/TOMP-API
|
https://api.github.com/repos/TOMP-WG/TOMP-API
|
closed
|
A high-level roadmap for TO-MP API developments
|
process
|
In discussion with Ross we came to the conclusion that it would be beneficial to have a sort of roadmap that shows our development ideas (visually) and also shows for example data sharing standardization efforts that are at least considering and might be undertaking.
|
1.0
|
A high-level roadmap for TO-MP API developments - In discussion with Ross we came to the conclusion that it would be beneficial to have a sort of roadmap that shows our development ideas (visually) and also shows for example data sharing standardization efforts that are at least considering and might be undertaking.
|
process
|
a high level roadmap for to mp api developments in discussion with ross we came to the conclusion that it would be beneficial to have a sort of roadmap that shows our development ideas visually and also shows for example data sharing standardization efforts that are at least considering and might be undertaking
| 1
|
17,636
| 23,457,364,263
|
IssuesEvent
|
2022-08-16 10:02:29
|
MicrosoftDocs/azure-docs
|
https://api.github.com/repos/MicrosoftDocs/azure-docs
|
closed
|
Missing text
|
automation/svc triaged cxp doc-enhancement process-automation/subsvc Pri1
|
In Run As accounts section, there is text missing after “There are two types of Run As accounts in Azure Automation:”
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 8721e209-24ce-2170-6caa-ed12a7060080
* Version Independent ID: ac13f91d-460c-cbe9-4778-50d20765b252
* Content: [Azure Automation account authentication overview](https://docs.microsoft.com/en-us/azure/automation/automation-security-overview)
* Content Source: [articles/automation/automation-security-overview.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/automation/automation-security-overview.md)
* Service: **automation**
* Sub-service: **process-automation**
* GitHub Login: @SnehaSudhirG
* Microsoft Alias: **sudhirsneha**
|
1.0
|
Missing text -
In Run As accounts section, there is text missing after “There are two types of Run As accounts in Azure Automation:”
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 8721e209-24ce-2170-6caa-ed12a7060080
* Version Independent ID: ac13f91d-460c-cbe9-4778-50d20765b252
* Content: [Azure Automation account authentication overview](https://docs.microsoft.com/en-us/azure/automation/automation-security-overview)
* Content Source: [articles/automation/automation-security-overview.md](https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/automation/automation-security-overview.md)
* Service: **automation**
* Sub-service: **process-automation**
* GitHub Login: @SnehaSudhirG
* Microsoft Alias: **sudhirsneha**
|
process
|
missing text in run as accounts section there is text missing after “there are two types of run as accounts in azure automation ” document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service automation sub service process automation github login snehasudhirg microsoft alias sudhirsneha
| 1
|
18,872
| 24,804,294,819
|
IssuesEvent
|
2022-10-25 02:07:31
|
streamnative/pulsar-spark
|
https://api.github.com/repos/streamnative/pulsar-spark
|
closed
|
Update the release doc follow the release template
|
triage/week-50 compute/data-processing
|
Here is the template https://streamnative.slab.com/posts/repository-release-template-prb0lvyt
If you have any questions about the release doc template, please **leave your comment** on it, **do not edit it directly**.
|
1.0
|
Update the release doc follow the release template - Here is the template https://streamnative.slab.com/posts/repository-release-template-prb0lvyt
If you have any questions about the release doc template, please **leave your comment** on it, **do not edit it directly**.
|
process
|
update the release doc follow the release template here is the template if you have any questions about the release doc template please leave your comment on it do not edit it directly
| 1
|
3,017
| 6,024,603,902
|
IssuesEvent
|
2017-06-08 05:57:41
|
SherlockDean/MsgGo
|
https://api.github.com/repos/SherlockDean/MsgGo
|
opened
|
As a product owner, I would like to start the App Store Release process so that we can have enough time to know what we need to do and prepare for the future
|
In Process
|
This is a long task.
Helpful Wiki: https://wiki.wdf.sap.corp/wiki/display/NAAS/Mobile+Assembly+Alignment+and+Setup
|
1.0
|
As a product owner, I would like to start the App Store Release process so that we can have enough time to know what we need to do and prepare for the future - This is a long task.
Helpful Wiki: https://wiki.wdf.sap.corp/wiki/display/NAAS/Mobile+Assembly+Alignment+and+Setup
|
process
|
as a product owner i would like to start the app store release process so that we can have enough time to know what we need to do and prepare for the future this is a long task helpful wiki
| 1
|
2,121
| 11,427,577,021
|
IssuesEvent
|
2020-02-04 01:17:14
|
rancher/rancher
|
https://api.github.com/repos/rancher/rancher
|
closed
|
Automation - Implement RBAC cases for Istio CRDs
|
setup/automation
|
Need to create automated tests to validate all Istio CRDs have proper RBAC. Cluster Owner, Project Owner, and Project Member should have access to read, create new, edit, and delete. Read Only user should only have access to read. Cluster Member should not have ANY access, including read.
CRD List:
```
policies.authentication.istio.io
adapters.config.istio.io
attributemanifests.config.istio.io
handlers.config.istio.io
httpapispecbindings.config.istio.io
httpapispecs.config.istio.io
instances.config.istio.io
quotaspecbindings.config.istio.io
quotaspecs.config.istio.io
rules.config.istio.io
templates.config.istio.io
destinationrules.networking.istio.io
envoyfilters.networking.istio.io
gateways.networking.istio.io
serviceentries.networking.istio.io
sidecars.networking.istio.io
virtualservices.networking.istio.io
rbacconfigs.rbac.istio.io
servicerolebindings.rbac.istio.io
serviceroles.rbac.istio.io
authorizationpolicies.security.istio.io
certificates.certmanager.k8s.io
challenges.certmanager.k8s.io
issuers.certmanager.k8s.io
orders.certmanager.k8s.io
```
For now can comment out CRDs that are known to fail. Refer to Issue: #25096
|
1.0
|
Automation - Implement RBAC cases for Istio CRDs - Need to create automated tests to validate all Istio CRDs have proper RBAC. Cluster Owner, Project Owner, and Project Member should have access to read, create new, edit, and delete. Read Only user should only have access to read. Cluster Member should not have ANY access, including read.
CRD List:
```
policies.authentication.istio.io
adapters.config.istio.io
attributemanifests.config.istio.io
handlers.config.istio.io
httpapispecbindings.config.istio.io
httpapispecs.config.istio.io
instances.config.istio.io
quotaspecbindings.config.istio.io
quotaspecs.config.istio.io
rules.config.istio.io
templates.config.istio.io
destinationrules.networking.istio.io
envoyfilters.networking.istio.io
gateways.networking.istio.io
serviceentries.networking.istio.io
sidecars.networking.istio.io
virtualservices.networking.istio.io
rbacconfigs.rbac.istio.io
servicerolebindings.rbac.istio.io
serviceroles.rbac.istio.io
authorizationpolicies.security.istio.io
certificates.certmanager.k8s.io
challenges.certmanager.k8s.io
issuers.certmanager.k8s.io
orders.certmanager.k8s.io
```
For now can comment out CRDs that are known to fail. Refer to Issue: #25096
|
non_process
|
automation implement rbac cases for istio crds need to create automated tests to validate all istio crds have proper rbac cluster owner project owner and project member should have access to read create new edit and delete read only user should only have access to read cluster member should not have any access including read crd list policies authentication istio io adapters config istio io attributemanifests config istio io handlers config istio io httpapispecbindings config istio io httpapispecs config istio io instances config istio io quotaspecbindings config istio io quotaspecs config istio io rules config istio io templates config istio io destinationrules networking istio io envoyfilters networking istio io gateways networking istio io serviceentries networking istio io sidecars networking istio io virtualservices networking istio io rbacconfigs rbac istio io servicerolebindings rbac istio io serviceroles rbac istio io authorizationpolicies security istio io certificates certmanager io challenges certmanager io issuers certmanager io orders certmanager io for now can comment out crds that are known to fail refer to issue
| 0
|
355,309
| 25,175,896,514
|
IssuesEvent
|
2022-11-11 09:13:53
|
domoberzin/pe
|
https://api.github.com/repos/domoberzin/pe
|
opened
|
No pictures in UG
|
type.DocumentationBug severity.Low
|
As in the title, there are no images of sample command executions in the UG to show the user how commands are executed and their results.
<!--session: 1668152369213-3a5dd7dd-3795-4ca3-b475-d951537b6bde-->
<!--Version: Web v3.4.4-->
|
1.0
|
No pictures in UG - As in the title, there are no images of sample command executions in the UG to show the user how commands are executed and their results.
<!--session: 1668152369213-3a5dd7dd-3795-4ca3-b475-d951537b6bde-->
<!--Version: Web v3.4.4-->
|
non_process
|
no pictures in ug as in the title there are no images of sample command executions in the ug to show the user how commands are executed and their results
| 0
|
4,663
| 7,497,221,900
|
IssuesEvent
|
2018-04-08 17:35:21
|
nodejs/node
|
https://api.github.com/repos/nodejs/node
|
closed
|
Why does node/io.js hang when printing to the console inside a loop?
|
help wanted memory process
|
Sorry if it is a dumb question/issue, but why does this code:
```
for (i = 0; i < 1000000; i++) {
console.log('abcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabc' + i);
}
```
hang `node` for a few seconds (at around i = 1500) before resuming again? During the hang the amount of memory used by the `node` process increases very fast and the CPU usage is very high during that time.
On the other hand, if I write:
```
for (i = 0; i < 1000000; i++) {
console.log(i);
}
```
then the `node` process does not hang at all.
The reason I am asking is that I have a piece of code which involves printing inside a loop, and it also hangs, but for much longer (like 30-60 seconds, before resuming again). The code prints the paths of all files in a directory (walking recursively): https://gist.github.com/pgkos/f0a650daf56aa49899e9.
The issue occurs on both io.js v2.0.2 and node.js v0.12.2, on Ubuntu 64-bit.
|
1.0
|
Why does node/io.js hang when printing to the console inside a loop? - Sorry if it is a dumb question/issue, but why does this code:
```
for (i = 0; i < 1000000; i++) {
console.log('abcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabc' + i);
}
```
hang `node` for a few seconds (at around i = 1500) before resuming again? During the hang the amount of memory used by the `node` process increases very fast and the CPU usage is very high during that time.
On the other hand, if I write:
```
for (i = 0; i < 1000000; i++) {
console.log(i);
}
```
then the `node` process does not hang at all.
The reason I am asking is that I have a piece of code which involves printing inside a loop, and it also hangs, but for much longer (like 30-60 seconds, before resuming again). The code prints the paths of all files in a directory (walking recursively): https://gist.github.com/pgkos/f0a650daf56aa49899e9.
The issue occurs on both io.js v2.0.2 and node.js v0.12.2, on Ubuntu 64-bit.
|
process
|
why does node io js hang when printing to the console inside a loop sorry if it is a dumb question issue but why does this code for i i i console log abcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabcabc i hang node for a few seconds at around i before resuming again during the hang the amount of memory used by the node process increases very fast and the cpu usage is very high during that time on the other hand if i write for i i i console log i then the node process does not hang at all the reason i am asking is that i have a piece of code which involves printing inside a loop and it also hangs but for much longer like seconds before resuming again the code prints the paths of all files in a directory walking recursively the issue occurs on both io js and node js on ubuntu bit
| 1
|
289,136
| 24,963,345,329
|
IssuesEvent
|
2022-11-01 17:15:54
|
phetsims/qa
|
https://api.github.com/repos/phetsims/qa
|
opened
|
Prototype Test: Mean: Share and Balance 1.0.0-rc.1
|
QA:prototype-test
|
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
DEVELOPERS:
* title for this issue = Prototype Test: {{SIM_TITLE}} {{VERSION}}
* replace {{MENTIONS}} with @mentions for team members who should received GitHub notifications about this issue
* Fill in the {{REPO}}, {{VERSION}}, and {{GITHUB_ISSUE_LINK}} placeholders.
* Delete things that are not relevant, e.g. PhET-iO links for non-PhET-iO tests.
* assign the issue to @KatieWoe and @kathy-phet
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<h1>Prototype Test</h1>
**Mentions**: @kathy-phet, @amanda-phet, @samreid, @KatieWoe
<h3>Simulation links</h3>
- [github repository for issues](https://github.com/phetsims/mean-share-and-balance/issues)
- [phet top level directory](https://phet-dev.colorado.edu/html/mean-share-and-balance/1.0.0-rc.1)
- [sim: all_phet.html](https://phet-dev.colorado.edu/html/mean-share-and-balance/1.0.0-rc.1/phet/mean-share-and-balance_all_phet.html)
<h3>Test Matricies</h3>
- [General Test Matrix](FILLED_IN_BY_QA)
<h3>Features included</h3>
- [x] Alternative Input
- [ ] UI Sound
- [ ] Sonification
- [ ] Description
- [ ] Voicing
<h3>Focus and Special Instructions</h3>
This our first RC test and everything is fair game.
<!---
Things to include here:
* purpose/focus of the test
* milestones
* specific things to test
* specific platforms to test
* instructions for any non-standard tests
* If you want PhET-iO diff wrapper tested against a prior version, provide details and link to prior version.
-->
<h3>Issues to Verify</h3>
No issues to verify.
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// QA only below here
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
---
<h2>For QA...</h2>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// General features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>General features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
- Play with the simulation normally.
- Make sure you can't lose anything.
- Complete the test matrix.
- Try to include version numbers for browsers
- If there is a console available, check for errors and include them in the Problem Description.
- Focus on pedagogy issues and bugs that break the sim.
- If you find bugs beyond pedagogy/breaking, still document these bugs as github issues.
- If a11y aspects are present, test them, but with an eye for "normal use".
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// Accessibility features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>Accessibility features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
<h3>If a11y aspects are present, test them, but with an eye for "normal use".</h3>
- Specific instructions can be found above.
- Make sure the accessibility (a11y) feature that is being tested doesn't negatively affect the sim in any way. Here is
a list of features that may be supported in this test:
- Alternative Input
- Interactive Description
- Sound and Sonification
- Pan and Zoom
- Mobile Description
- Voicing
- Test all possible forms of input.
- Test all mouse/trackpad inputs.
- Test all touchscreen inputs.
- Test all keyboard navigation inputs (if applicable).
- Test all forms of input with a screen reader (if applicable).
- If this sim is not in [this list](https://phet.colorado.edu/en/accessibility/prototypes) or up to date there, make an
issue in [website](https://github.com/phetsims/website) to ask if PhET research page links need updating. Please
assign to @terracoda and @emily-phet.
<!--- [CAN BE OMITTED, DO NOT EDIT] -->
<h3>Screen Readers</h3>
This sim may support screen readers. If you are unfamiliar with screen readers, please ask Katie to introduce you to
screen readers. If you simply need a refresher on screen readers, please consult the
[QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md), which should have all of the information
you need as well as a link to a screen reader tutorial made by Jesse. Otherwise, look over the a11y view before opening
the simulation. Once you've done that, open the simulation and make sure alerts and descriptions work as intended.
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Platforms and Screen Readers to Be Tested</h3>
- Windows 10 + Latest Chrome + Latest JAWS
- Windows 10 + Latest Firefox + Latest NVDA
- macOS + Safari + VoiceOver
- iOS + Safari + VoiceOver (only if specified in testing issue)
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Critical Screen Reader Information</h3>
We are tracking known screen reader bugs in
[here](https://github.com/phetsims/qa/blob/master/documentation/accessibility-bugs.md). If you find a
screen reader bug, please check it against this list.
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Keyboard Navigation</h3>
This sim supports keyboard navigation. Please make sure it works as intended on all platforms by itself and with a
screen reader.
<h3>Magnification</h3>
This sim supports magnification with pinch and drag gestures on touch screens, keyboard shortcuts, and mouse/wheel
controls. Please test magnfication and make sure it is working as intended and well with the use cases of the
simulation. Due to the way screen readers handle user input, magnification is NOT expected to work while using a screen
reader so there is no need to test this case.
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// FAQs for QA Members [DO NOT OMIT, DO NOT EDIT]
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>FAQs for QA Members</b></summary>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>There are multiple tests in this issue... Which test should I do first?</i></summary>
Test in order! Test the first thing first, the second thing second, and so on.
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>How should I format my issue?</i></summary>
Here's a template for making issues:
<b>Test Device</b>
blah
<b>Operating System</b>
blah
<b>Browser</b>
blah
<b>Problem Description</b>
blah
<b>Steps to Reproduce</b>
blah
<b>Visuals</b>
blah
<details>
<summary><b>Troubleshooting Information</b></summary>
blah
</details>
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>Who should I assign?</i></summary>
We typically assign the developer who opened the issue in the QA repository.
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>My question isn't in here... What should I do?</i></summary>
You should:
1. Consult the [QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md).
2. Google it.
3. Ask Katie.
4. Ask a developer.
5. Google it again.
6. Cry.
</details>
<br>
<hr>
</details>
|
1.0
|
Prototype Test: Mean: Share and Balance 1.0.0-rc.1 - <!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
DEVELOPERS:
* title for this issue = Prototype Test: {{SIM_TITLE}} {{VERSION}}
* replace {{MENTIONS}} with @mentions for team members who should received GitHub notifications about this issue
* Fill in the {{REPO}}, {{VERSION}}, and {{GITHUB_ISSUE_LINK}} placeholders.
* Delete things that are not relevant, e.g. PhET-iO links for non-PhET-iO tests.
* assign the issue to @KatieWoe and @kathy-phet
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<h1>Prototype Test</h1>
**Mentions**: @kathy-phet, @amanda-phet, @samreid, @KatieWoe
<h3>Simulation links</h3>
- [github repository for issues](https://github.com/phetsims/mean-share-and-balance/issues)
- [phet top level directory](https://phet-dev.colorado.edu/html/mean-share-and-balance/1.0.0-rc.1)
- [sim: all_phet.html](https://phet-dev.colorado.edu/html/mean-share-and-balance/1.0.0-rc.1/phet/mean-share-and-balance_all_phet.html)
<h3>Test Matricies</h3>
- [General Test Matrix](FILLED_IN_BY_QA)
<h3>Features included</h3>
- [x] Alternative Input
- [ ] UI Sound
- [ ] Sonification
- [ ] Description
- [ ] Voicing
<h3>Focus and Special Instructions</h3>
This our first RC test and everything is fair game.
<!---
Things to include here:
* purpose/focus of the test
* milestones
* specific things to test
* specific platforms to test
* instructions for any non-standard tests
* If you want PhET-iO diff wrapper tested against a prior version, provide details and link to prior version.
-->
<h3>Issues to Verify</h3>
No issues to verify.
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// QA only below here
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
---
<h2>For QA...</h2>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// General features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>General features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
- Play with the simulation normally.
- Make sure you can't lose anything.
- Complete the test matrix.
- Try to include version numbers for browsers
- If there is a console available, check for errors and include them in the Problem Description.
- Focus on pedagogy issues and bugs that break the sim.
- If you find bugs beyond pedagogy/breaking, still document these bugs as github issues.
- If a11y aspects are present, test them, but with an eye for "normal use".
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// Accessibility features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>Accessibility features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
<h3>If a11y aspects are present, test them, but with an eye for "normal use".</h3>
- Specific instructions can be found above.
- Make sure the accessibility (a11y) feature that is being tested doesn't negatively affect the sim in any way. Here is
a list of features that may be supported in this test:
- Alternative Input
- Interactive Description
- Sound and Sonification
- Pan and Zoom
- Mobile Description
- Voicing
- Test all possible forms of input.
- Test all mouse/trackpad inputs.
- Test all touchscreen inputs.
- Test all keyboard navigation inputs (if applicable).
- Test all forms of input with a screen reader (if applicable).
- If this sim is not in [this list](https://phet.colorado.edu/en/accessibility/prototypes) or up to date there, make an
issue in [website](https://github.com/phetsims/website) to ask if PhET research page links need updating. Please
assign to @terracoda and @emily-phet.
<!--- [CAN BE OMITTED, DO NOT EDIT] -->
<h3>Screen Readers</h3>
This sim may support screen readers. If you are unfamiliar with screen readers, please ask Katie to introduce you to
screen readers. If you simply need a refresher on screen readers, please consult the
[QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md), which should have all of the information
you need as well as a link to a screen reader tutorial made by Jesse. Otherwise, look over the a11y view before opening
the simulation. Once you've done that, open the simulation and make sure alerts and descriptions work as intended.
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Platforms and Screen Readers to Be Tested</h3>
- Windows 10 + Latest Chrome + Latest JAWS
- Windows 10 + Latest Firefox + Latest NVDA
- macOS + Safari + VoiceOver
- iOS + Safari + VoiceOver (only if specified in testing issue)
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Critical Screen Reader Information</h3>
We are tracking known screen reader bugs in
[here](https://github.com/phetsims/qa/blob/master/documentation/accessibility-bugs.md). If you find a
screen reader bug, please check it against this list.
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Keyboard Navigation</h3>
This sim supports keyboard navigation. Please make sure it works as intended on all platforms by itself and with a
screen reader.
<h3>Magnification</h3>
This sim supports magnification with pinch and drag gestures on touch screens, keyboard shortcuts, and mouse/wheel
controls. Please test magnfication and make sure it is working as intended and well with the use cases of the
simulation. Due to the way screen readers handle user input, magnification is NOT expected to work while using a screen
reader so there is no need to test this case.
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// FAQs for QA Members [DO NOT OMIT, DO NOT EDIT]
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>FAQs for QA Members</b></summary>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>There are multiple tests in this issue... Which test should I do first?</i></summary>
Test in order! Test the first thing first, the second thing second, and so on.
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>How should I format my issue?</i></summary>
Here's a template for making issues:
<b>Test Device</b>
blah
<b>Operating System</b>
blah
<b>Browser</b>
blah
<b>Problem Description</b>
blah
<b>Steps to Reproduce</b>
blah
<b>Visuals</b>
blah
<details>
<summary><b>Troubleshooting Information</b></summary>
blah
</details>
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>Who should I assign?</i></summary>
We typically assign the developer who opened the issue in the QA repository.
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>My question isn't in here... What should I do?</i></summary>
You should:
1. Consult the [QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md).
2. Google it.
3. Ask Katie.
4. Ask a developer.
5. Google it again.
6. Cry.
</details>
<br>
<hr>
</details>
|
non_process
|
prototype test mean share and balance rc developers title for this issue prototype test sim title version replace mentions with mentions for team members who should received github notifications about this issue fill in the repo version and github issue link placeholders delete things that are not relevant e g phet io links for non phet io tests assign the issue to katiewoe and kathy phet prototype test mentions kathy phet amanda phet samreid katiewoe simulation links test matricies filled in by qa features included alternative input ui sound sonification description voicing focus and special instructions this our first rc test and everything is fair game things to include here purpose focus of the test milestones specific things to test specific platforms to test instructions for any non standard tests if you want phet io diff wrapper tested against a prior version provide details and link to prior version issues to verify no issues to verify qa only below here for qa general features general features what to test play with the simulation normally make sure you can t lose anything complete the test matrix try to include version numbers for browsers if there is a console available check for errors and include them in the problem description focus on pedagogy issues and bugs that break the sim if you find bugs beyond pedagogy breaking still document these bugs as github issues if aspects are present test them but with an eye for normal use accessibility features accessibility features what to test if aspects are present test them but with an eye for normal use specific instructions can be found above make sure the accessibility feature that is being tested doesn t negatively affect the sim in any way here is a list of features that may be supported in this test alternative input interactive description sound and sonification pan and zoom mobile description voicing test all possible forms of input test all mouse trackpad inputs test all touchscreen inputs test all keyboard navigation inputs if applicable test all forms of input with a screen reader if applicable if this sim is not in or up to date there make an issue in to ask if phet research page links need updating please assign to terracoda and emily phet screen readers this sim may support screen readers if you are unfamiliar with screen readers please ask katie to introduce you to screen readers if you simply need a refresher on screen readers please consult the which should have all of the information you need as well as a link to a screen reader tutorial made by jesse otherwise look over the view before opening the simulation once you ve done that open the simulation and make sure alerts and descriptions work as intended platforms and screen readers to be tested windows latest chrome latest jaws windows latest firefox latest nvda macos safari voiceover ios safari voiceover only if specified in testing issue critical screen reader information we are tracking known screen reader bugs in if you find a screen reader bug please check it against this list keyboard navigation this sim supports keyboard navigation please make sure it works as intended on all platforms by itself and with a screen reader magnification this sim supports magnification with pinch and drag gestures on touch screens keyboard shortcuts and mouse wheel controls please test magnfication and make sure it is working as intended and well with the use cases of the simulation due to the way screen readers handle user input magnification is not expected to work while using a screen reader so there is no need to test this case faqs for qa members faqs for qa members there are multiple tests in this issue which test should i do first test in order test the first thing first the second thing second and so on how should i format my issue here s a template for making issues test device blah operating system blah browser blah problem description blah steps to reproduce blah visuals blah troubleshooting information blah who should i assign we typically assign the developer who opened the issue in the qa repository my question isn t in here what should i do you should consult the google it ask katie ask a developer google it again cry
| 0
|
17,824
| 23,753,825,786
|
IssuesEvent
|
2022-08-31 23:51:15
|
Azure/azure-sdk-tools
|
https://api.github.com/repos/Azure/azure-sdk-tools
|
opened
|
Dashboard to track the state of a Service team on our release process
|
Epic Engagement Experience WS: Process Tools & Automation
|
We need requirements for this.
Some rough notes are:
- There must be different views:
- Which service teams are we engaged with
- Where is a specific service team at? what are the next steps?
- User for our internal tracking, for example, for Cadl
- It will be great if it can help us determine how long it took a service team to go through our SDK Release process
|
1.0
|
Dashboard to track the state of a Service team on our release process - We need requirements for this.
Some rough notes are:
- There must be different views:
- Which service teams are we engaged with
- Where is a specific service team at? what are the next steps?
- User for our internal tracking, for example, for Cadl
- It will be great if it can help us determine how long it took a service team to go through our SDK Release process
|
process
|
dashboard to track the state of a service team on our release process we need requirements for this some rough notes are there must be different views which service teams are we engaged with where is a specific service team at what are the next steps user for our internal tracking for example for cadl it will be great if it can help us determine how long it took a service team to go through our sdk release process
| 1
|
222,643
| 17,086,155,952
|
IssuesEvent
|
2021-07-08 12:08:04
|
espoo-dev/espoo-dev
|
https://api.github.com/repos/espoo-dev/espoo-dev
|
opened
|
Configure Storybook.js for frontend
|
documentation frontend
|
Storybook is an open source tool for building UI components and pages in isolation. It streamlines UI development, testing, and documentation.
|
1.0
|
Configure Storybook.js for frontend - Storybook is an open source tool for building UI components and pages in isolation. It streamlines UI development, testing, and documentation.
|
non_process
|
configure storybook js for frontend storybook is an open source tool for building ui components and pages in isolation it streamlines ui development testing and documentation
| 0
|
19,926
| 26,393,048,534
|
IssuesEvent
|
2023-01-12 17:04:16
|
geneontology/go-ontology
|
https://api.github.com/repos/geneontology/go-ontology
|
closed
|
Change label GO:0039648 modulation by virus of host protein ubiquitination
|
multi-species process term name
|
- modulation by symbiont of host of protein ubiquitination
- Change def from: Any process in which a virus modulates the frequency, rate or extent of protein ubiquitination in the host organism. Ubiquitination is the process in which one or more ubiquitin groups are added to a protein.
-
to: Any process by which a symbiont increases or decreases ubiquitination of target proteins of a host organism.
@genegodbold
|
1.0
|
Change label GO:0039648 modulation by virus of host protein ubiquitination - - modulation by symbiont of host of protein ubiquitination
- Change def from: Any process in which a virus modulates the frequency, rate or extent of protein ubiquitination in the host organism. Ubiquitination is the process in which one or more ubiquitin groups are added to a protein.
-
to: Any process by which a symbiont increases or decreases ubiquitination of target proteins of a host organism.
@genegodbold
|
process
|
change label go modulation by virus of host protein ubiquitination modulation by symbiont of host of protein ubiquitination change def from any process in which a virus modulates the frequency rate or extent of protein ubiquitination in the host organism ubiquitination is the process in which one or more ubiquitin groups are added to a protein to any process by which a symbiont increases or decreases ubiquitination of target proteins of a host organism genegodbold
| 1
|
160,800
| 20,118,878,535
|
IssuesEvent
|
2022-02-07 22:52:43
|
TreyM-WSS/whitesource-demo-1
|
https://api.github.com/repos/TreyM-WSS/whitesource-demo-1
|
closed
|
CVE-2021-37701 (High) detected in multiple libraries - autoclosed
|
security vulnerability
|
## CVE-2021-37701 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-4.4.8.tgz</b>, <b>tar-4.4.13.tgz</b>, <b>tar-4.4.11.tgz</b></p></summary>
<p>
<details><summary><b>tar-4.4.8.tgz</b></p></summary>
<p>tar for node</p>
<p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.8.tgz">https://registry.npmjs.org/tar/-/tar-4.4.8.tgz</a></p>
<p>
Dependency Hierarchy:
- firebase-tools-7.1.0.tgz (Root Library)
- :x: **tar-4.4.8.tgz** (Vulnerable Library)
</details>
<details><summary><b>tar-4.4.13.tgz</b></p></summary>
<p>tar for node</p>
<p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.13.tgz">https://registry.npmjs.org/tar/-/tar-4.4.13.tgz</a></p>
<p>
Dependency Hierarchy:
- compiler-cli-9.0.0-next.11.tgz (Root Library)
- chokidar-2.1.5.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- :x: **tar-4.4.13.tgz** (Vulnerable Library)
</details>
<details><summary><b>tar-4.4.11.tgz</b></p></summary>
<p>tar for node</p>
<p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.11.tgz">https://registry.npmjs.org/tar/-/tar-4.4.11.tgz</a></p>
<p>
Dependency Hierarchy:
- cli-9.0.0-next.10.tgz (Root Library)
- pacote-9.5.8.tgz
- :x: **tar-4.4.11.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/whitesource-demo-1/commit/551e7e8a23ecb57fdb46f4d6702da4d7cff49f70">551e7e8a23ecb57fdb46f4d6702da4d7cff49f70</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.
<p>Publish Date: 2021-08-31
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37701>CVE-2021-37701</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc">https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc</a></p>
<p>Release Date: 2021-08-31</p>
<p>Fix Resolution: tar - 4.4.16, 5.0.8, 6.1.7</p>
</p>
</details>
<p></p>
|
True
|
CVE-2021-37701 (High) detected in multiple libraries - autoclosed - ## CVE-2021-37701 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tar-4.4.8.tgz</b>, <b>tar-4.4.13.tgz</b>, <b>tar-4.4.11.tgz</b></p></summary>
<p>
<details><summary><b>tar-4.4.8.tgz</b></p></summary>
<p>tar for node</p>
<p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.8.tgz">https://registry.npmjs.org/tar/-/tar-4.4.8.tgz</a></p>
<p>
Dependency Hierarchy:
- firebase-tools-7.1.0.tgz (Root Library)
- :x: **tar-4.4.8.tgz** (Vulnerable Library)
</details>
<details><summary><b>tar-4.4.13.tgz</b></p></summary>
<p>tar for node</p>
<p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.13.tgz">https://registry.npmjs.org/tar/-/tar-4.4.13.tgz</a></p>
<p>
Dependency Hierarchy:
- compiler-cli-9.0.0-next.11.tgz (Root Library)
- chokidar-2.1.5.tgz
- fsevents-1.2.9.tgz
- node-pre-gyp-0.12.0.tgz
- :x: **tar-4.4.13.tgz** (Vulnerable Library)
</details>
<details><summary><b>tar-4.4.11.tgz</b></p></summary>
<p>tar for node</p>
<p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.11.tgz">https://registry.npmjs.org/tar/-/tar-4.4.11.tgz</a></p>
<p>
Dependency Hierarchy:
- cli-9.0.0-next.10.tgz (Root Library)
- pacote-9.5.8.tgz
- :x: **tar-4.4.11.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/TreyM-WSS/whitesource-demo-1/commit/551e7e8a23ecb57fdb46f4d6702da4d7cff49f70">551e7e8a23ecb57fdb46f4d6702da4d7cff49f70</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.
<p>Publish Date: 2021-08-31
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37701>CVE-2021-37701</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.6</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc">https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc</a></p>
<p>Release Date: 2021-08-31</p>
<p>Fix Resolution: tar - 4.4.16, 5.0.8, 6.1.7</p>
</p>
</details>
<p></p>
|
non_process
|
cve high detected in multiple libraries autoclosed cve high severity vulnerability vulnerable libraries tar tgz tar tgz tar tgz tar tgz tar for node library home page a href dependency hierarchy firebase tools tgz root library x tar tgz vulnerable library tar tgz tar for node library home page a href dependency hierarchy compiler cli next tgz root library chokidar tgz fsevents tgz node pre gyp tgz x tar tgz vulnerable library tar tgz tar for node library home page a href dependency hierarchy cli next tgz root library pacote tgz x tar tgz vulnerable library found in head commit a href vulnerability details the npm package tar aka node tar before versions and has an arbitrary file creation overwrite and arbitrary code execution vulnerability node tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted this is in part achieved by ensuring that extracted directories are not symlinks additionally in order to prevent unnecessary stat calls to determine whether a given path is a directory paths are cached when directories are created this logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems the cache checking logic used both and characters as path separators however is a valid filename character on posix systems by first creating a directory and then replacing that directory with a symlink it was thus possible to bypass node tar symlink checks on directories essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location thus allowing arbitrary file creation and overwrite additionally a similar confusion could arise on case insensitive filesystems if a tar archive contained a directory at foo followed by a symbolic link named foo then on case insensitive file systems the creation of the symbolic link would remove the directory from the filesystem but not from the internal directory cache as it would not be treated as a cache hit a subsequent file entry within the foo directory would then be placed in the target of the symbolic link thinking that the directory had already been created these issues were addressed in releases and the branch of node tar has been deprecated and did not receive patches for these issues if you are still using a release we recommend you update to a more recent version of node tar if this is not possible a workaround is available in the referenced ghsa publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tar
| 0
|
3,966
| 6,900,327,825
|
IssuesEvent
|
2017-11-24 17:54:45
|
GoogleCloudPlatform/google-cloud-dotnet
|
https://api.github.com/repos/GoogleCloudPlatform/google-cloud-dotnet
|
closed
|
Separate out long-running perf/stress tests
|
priority: p2 type: process
|
Currently we have PubSub integration tests that take a very long time, and Spanner stress tests.
While they should clearly be run periodically, it would be good to be able to run the "regular" integration tests without running these.
Options:
- Have categories that are excluded by default (if such a thing exists with xUnit)
- Use an environment variable (ick) to skip/run them
- Separate them into different projects
|
1.0
|
Separate out long-running perf/stress tests - Currently we have PubSub integration tests that take a very long time, and Spanner stress tests.
While they should clearly be run periodically, it would be good to be able to run the "regular" integration tests without running these.
Options:
- Have categories that are excluded by default (if such a thing exists with xUnit)
- Use an environment variable (ick) to skip/run them
- Separate them into different projects
|
process
|
separate out long running perf stress tests currently we have pubsub integration tests that take a very long time and spanner stress tests while they should clearly be run periodically it would be good to be able to run the regular integration tests without running these options have categories that are excluded by default if such a thing exists with xunit use an environment variable ick to skip run them separate them into different projects
| 1
|
72,315
| 15,225,245,949
|
IssuesEvent
|
2021-02-18 06:58:22
|
devikab2b/whites5
|
https://api.github.com/repos/devikab2b/whites5
|
opened
|
CVE-2020-9547 (High) detected in jackson-databind-2.6.7.3.jar
|
security vulnerability
|
## CVE-2020-9547 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: whites5/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.3/jackson-databind-2.6.7.3.jar</p>
<p>
Dependency Hierarchy:
- spark-sql_2.12-2.4.7.jar (Root Library)
- :x: **jackson-databind-2.6.7.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/devikab2b/whites5/commit/b24afaf70d8746f42dcb93a7ef65ad261fda5b7f">b24afaf70d8746f42dcb93a7ef65ad261fda5b7f</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2020-9547 (High) detected in jackson-databind-2.6.7.3.jar - ## CVE-2020-9547 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.7.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: whites5/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.3/jackson-databind-2.6.7.3.jar</p>
<p>
Dependency Hierarchy:
- spark-sql_2.12-2.4.7.jar (Root Library)
- :x: **jackson-databind-2.6.7.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/devikab2b/whites5/commit/b24afaf70d8746f42dcb93a7ef65ad261fda5b7f">b24afaf70d8746f42dcb93a7ef65ad261fda5b7f</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9547>CVE-2020-9547</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spark sql jar root library x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com ibatis sqlmap engine transaction jta jtatransactionconfig aka ibatis sqlmap publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
| 0
|
2,779
| 5,713,497,253
|
IssuesEvent
|
2017-04-19 07:56:32
|
zotero/zotero
|
https://api.github.com/repos/zotero/zotero
|
opened
|
Remove "Store references in document" option
|
Interface Word Processor Integration
|
I can't find the thread where we agreed to this, but given that the text mentions Zotero 3.0, I think it's time to get rid of it…
|
1.0
|
Remove "Store references in document" option - I can't find the thread where we agreed to this, but given that the text mentions Zotero 3.0, I think it's time to get rid of it…
|
process
|
remove store references in document option i can t find the thread where we agreed to this but given that the text mentions zotero i think it s time to get rid of it…
| 1
|
331,830
| 24,328,072,705
|
IssuesEvent
|
2022-09-30 16:34:05
|
envoyproxy/gateway
|
https://api.github.com/repos/envoyproxy/gateway
|
closed
|
Initial Config Manager Design and Implementation
|
documentation enhancement help wanted area/config
|
The Config Manager is responsible for instantiating and managing the lifecycle of the various system components
in Envoy Gateway based on the Envoy Gateway Bootstrap spec
|
1.0
|
Initial Config Manager Design and Implementation - The Config Manager is responsible for instantiating and managing the lifecycle of the various system components
in Envoy Gateway based on the Envoy Gateway Bootstrap spec
|
non_process
|
initial config manager design and implementation the config manager is responsible for instantiating and managing the lifecycle of the various system components in envoy gateway based on the envoy gateway bootstrap spec
| 0
|
6,303
| 9,308,456,875
|
IssuesEvent
|
2019-03-25 14:35:59
|
brandon1roadgears/Interpreter-of-programming-language-of-Turing-Machine
|
https://api.github.com/repos/brandon1roadgears/Interpreter-of-programming-language-of-Turing-Machine
|
opened
|
Проверка работоспособности программы.
|
Testing process
|
# После завершения работы необходимо проверить, как программа решает те или инные задачи.
***
### (@goldmen4ik) Нам необходимо найти на просторах интернета около 10 задач c решением для машины тьюринга, чтобы проверить, способна ли она справиться с ними.
* ### Думаю этого ресурса будет достаточно: [https://infourok.ru/reshenie-zadach-mashina-tyuringa-2302088.html](url), Если есть варианты интереснее - отправить их сюда комментарием.
|
1.0
|
Проверка работоспособности программы. - # После завершения работы необходимо проверить, как программа решает те или инные задачи.
***
### (@goldmen4ik) Нам необходимо найти на просторах интернета около 10 задач c решением для машины тьюринга, чтобы проверить, способна ли она справиться с ними.
* ### Думаю этого ресурса будет достаточно: [https://infourok.ru/reshenie-zadach-mashina-tyuringa-2302088.html](url), Если есть варианты интереснее - отправить их сюда комментарием.
|
process
|
проверка работоспособности программы после завершения работы необходимо проверить как программа решает те или инные задачи нам необходимо найти на просторах интернета около задач c решением для машины тьюринга чтобы проверить способна ли она справиться с ними думаю этого ресурса будет достаточно url если есть варианты интереснее отправить их сюда комментарием
| 1
|
38,758
| 8,956,697,392
|
IssuesEvent
|
2019-01-26 19:44:05
|
catmaid/CATMAID
|
https://api.github.com/repos/catmaid/CATMAID
|
opened
|
ImageBlockLayer: timedout tiles show stale data
|
context: tile layer difficulty: low priority: low type: defect
|
When waiting for tiles to load times out, stale textures are shown for the loading tiles rather than empty tiles filled with the Stack's placeholder color.
|
1.0
|
ImageBlockLayer: timedout tiles show stale data - When waiting for tiles to load times out, stale textures are shown for the loading tiles rather than empty tiles filled with the Stack's placeholder color.
|
non_process
|
imageblocklayer timedout tiles show stale data when waiting for tiles to load times out stale textures are shown for the loading tiles rather than empty tiles filled with the stack s placeholder color
| 0
|
146,670
| 19,441,104,351
|
IssuesEvent
|
2021-12-22 01:03:47
|
samqws-marketing/amzn-ion-hive-serde
|
https://api.github.com/repos/samqws-marketing/amzn-ion-hive-serde
|
opened
|
CVE-2021-43797 (Medium) detected in netty-all-4.0.23.Final.jar
|
security vulnerability
|
## CVE-2021-43797 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-all-4.0.23.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: amzn-ion-hive-serde/integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-all/4.0.23.Final/294104aaf1781d6a56a07d561e792c5d0c95f45/netty-all-4.0.23.Final.jar</p>
<p>
Dependency Hierarchy:
- hive-jdbc-2.3.9.jar (Root Library)
- hive-service-2.3.9.jar
- hive-llap-server-2.3.9.jar
- hbase-server-1.1.1.jar
- :x: **netty-all-4.0.23.Final.jar** (Vulnerable Library)
<p>Found in base branch: <b>0.3.0</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.7.1.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.7.1.Final to receive a patch.
<p>Publish Date: 2021-12-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797>CVE-2021-43797</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="CVE-2021-43797">CVE-2021-43797</a></p>
<p>Release Date: 2021-12-09</p>
<p>Fix Resolution: io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-all","packageVersion":"4.0.23.Final","packageFilePaths":["/integration-test/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.apache.hive:hive-jdbc:2.3.9;org.apache.hive:hive-service:2.3.9;org.apache.hive:hive-llap-server:2.3.9;org.apache.hbase:hbase-server:1.1.1;io.netty:netty-all:4.0.23.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final","isBinary":false}],"baseBranches":["0.3.0"],"vulnerabilityIdentifier":"CVE-2021-43797","vulnerabilityDetails":"Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. Netty prior to version 4.1.7.1.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can\u0027t see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.7.1.Final to receive a patch.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
|
True
|
CVE-2021-43797 (Medium) detected in netty-all-4.0.23.Final.jar - ## CVE-2021-43797 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-all-4.0.23.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: amzn-ion-hive-serde/integration-test/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-all/4.0.23.Final/294104aaf1781d6a56a07d561e792c5d0c95f45/netty-all-4.0.23.Final.jar</p>
<p>
Dependency Hierarchy:
- hive-jdbc-2.3.9.jar (Root Library)
- hive-service-2.3.9.jar
- hive-llap-server-2.3.9.jar
- hbase-server-1.1.1.jar
- :x: **netty-all-4.0.23.Final.jar** (Vulnerable Library)
<p>Found in base branch: <b>0.3.0</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.7.1.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.7.1.Final to receive a patch.
<p>Publish Date: 2021-12-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797>CVE-2021-43797</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="CVE-2021-43797">CVE-2021-43797</a></p>
<p>Release Date: 2021-12-09</p>
<p>Fix Resolution: io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-all","packageVersion":"4.0.23.Final","packageFilePaths":["/integration-test/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.apache.hive:hive-jdbc:2.3.9;org.apache.hive:hive-service:2.3.9;org.apache.hive:hive-llap-server:2.3.9;org.apache.hbase:hbase-server:1.1.1;io.netty:netty-all:4.0.23.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final","isBinary":false}],"baseBranches":["0.3.0"],"vulnerabilityIdentifier":"CVE-2021-43797","vulnerabilityDetails":"Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. Netty prior to version 4.1.7.1.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can\u0027t see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.7.1.Final to receive a patch.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
|
non_process
|
cve medium detected in netty all final jar cve medium severity vulnerability vulnerable library netty all final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file amzn ion hive serde integration test build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty all final netty all final jar dependency hierarchy hive jdbc jar root library hive service jar hive llap server jar hbase server jar x netty all final jar vulnerable library found in base branch vulnerability details netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients netty prior to version final skips control chars when they are present at the beginning end of the header name it should instead fail fast as these are not allowed by the spec and could lead to http request smuggling failing to do the validation might cause netty to sanitize header names before it forward these to another remote system when used as proxy this remote system can t see the invalid usage anymore and therefore does not do the validation itself users should upgrade to version final to receive a patch publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin cve release date fix resolution io netty netty codec http final io netty netty all final isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org apache hive hive jdbc org apache hive hive service org apache hive hive llap server org apache hbase hbase server io netty netty all final isminimumfixversionavailable true minimumfixversion io netty netty codec http final io netty netty all final isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients netty prior to version final skips control chars when they are present at the beginning end of the header name it should instead fail fast as these are not allowed by the spec and could lead to http request smuggling failing to do the validation might cause netty to sanitize header names before it forward these to another remote system when used as proxy this remote system can see the invalid usage anymore and therefore does not do the validation itself users should upgrade to version final to receive a patch vulnerabilityurl
| 0
|
95,966
| 3,962,779,704
|
IssuesEvent
|
2016-05-02 18:04:33
|
dwyl/dwyl.github.io
|
https://api.github.com/repos/dwyl/dwyl.github.io
|
closed
|
Hero image is cut off when resized
|
bug help wanted priority-2
|
I would love the image to always look like this:
<img width="616" alt="screen shot 2015-11-04 at 00 48 46" src="https://cloud.githubusercontent.com/assets/4185328/10926306/e1841ea2-828d-11e5-80fb-6e3fca5a0093.png">
But sadly, on mobile, it does this:
<img width="352" alt="screen shot 2015-11-04 at 00 49 45" src="https://cloud.githubusercontent.com/assets/4185328/10926350/4cf3914a-828e-11e5-8861-39723f90a09a.png">
And even worse on tall thin phones:
<img width="321" alt="screen shot 2015-11-04 at 00 52 03" src="https://cloud.githubusercontent.com/assets/4185328/10926354/58957586-828e-11e5-8a9d-026abfa94604.png">
Then on wide desktop screens:
<img width="761" alt="screen shot 2015-11-04 at 00 53 42" src="https://cloud.githubusercontent.com/assets/4185328/10926363/86fcfebc-828e-11e5-8e64-a0ba88a94bf6.png">
There HAS to be a better solution that manually testing 20 different break points and photoshopping the image to add more and more image 'padding' to the sides every time the aspect ratio is anything short of 'perfect'. :persevere:
|
1.0
|
Hero image is cut off when resized - I would love the image to always look like this:
<img width="616" alt="screen shot 2015-11-04 at 00 48 46" src="https://cloud.githubusercontent.com/assets/4185328/10926306/e1841ea2-828d-11e5-80fb-6e3fca5a0093.png">
But sadly, on mobile, it does this:
<img width="352" alt="screen shot 2015-11-04 at 00 49 45" src="https://cloud.githubusercontent.com/assets/4185328/10926350/4cf3914a-828e-11e5-8861-39723f90a09a.png">
And even worse on tall thin phones:
<img width="321" alt="screen shot 2015-11-04 at 00 52 03" src="https://cloud.githubusercontent.com/assets/4185328/10926354/58957586-828e-11e5-8a9d-026abfa94604.png">
Then on wide desktop screens:
<img width="761" alt="screen shot 2015-11-04 at 00 53 42" src="https://cloud.githubusercontent.com/assets/4185328/10926363/86fcfebc-828e-11e5-8e64-a0ba88a94bf6.png">
There HAS to be a better solution that manually testing 20 different break points and photoshopping the image to add more and more image 'padding' to the sides every time the aspect ratio is anything short of 'perfect'. :persevere:
|
non_process
|
hero image is cut off when resized i would love the image to always look like this img width alt screen shot at src but sadly on mobile it does this img width alt screen shot at src and even worse on tall thin phones img width alt screen shot at src then on wide desktop screens img width alt screen shot at src there has to be a better solution that manually testing different break points and photoshopping the image to add more and more image padding to the sides every time the aspect ratio is anything short of perfect persevere
| 0
|
11,871
| 14,672,820,445
|
IssuesEvent
|
2020-12-30 11:33:20
|
prisma/prisma
|
https://api.github.com/repos/prisma/prisma
|
closed
|
Introspect overwrites prisma relation field names
|
kind/bug process/candidate team/migrations topic: introspection
|
<!--
Thanks for helping us improve Prisma! 🙏 Please follow the sections in the template and provide as much information as possible about your problem, e.g. by setting the `DEBUG="*"` environment variable and enabling additional logging output in Prisma Client.
Learn more about writing proper bug reports here: https://pris.ly/d/bug-reports
-->
## Bug description
<!-- A clear and concise description of what the bug is. -->
The docs: https://www.prisma.io/docs/concepts/components/introspection#introspection-with-an-existing-schema
claims that they maintain `@map and @@map attributes` and `Custom @relation names`.
However, it's not possible to achieve renaming relation fields for introspected workflow.
When I try to put `@map` attribute, I get this error:
> `Error parsing attribute "@map": The attribute @map can not be used on relation fields.`
I've also tried to use relation names:
```diff
- CampaignAutomation CampaignAutomation? @relation(fields: [campaignAutomationId], references: [id])
+ automation CampaignAutomation? @relation("CampaignAutomation", fields: [campaignAutomationId], references: [id])
```
But the introspect overwrites all that changes, removing the relation name
## How to reproduce
<!--
Steps to reproduce the behavior:
1. Go to '...'
2. Change '....'
3. Run '....'
4. See error
-->
Create two tables with one-many relation and introspect the database. Then try to change the generated relation field name.
## Expected behavior
<!-- A clear and concise description of what you expected to happen. -->
Being able to change the introspected relation field names. They are generated as the table names in PascalCase, which is a horrible DX when making a prisma query.
## Prisma information
<!-- Your Prisma schema, Prisma Client queries, ...
Do not include your database credentials when sharing your Prisma schema! -->
## Environment & setup
<!-- In which environment does the problem occur -->
- OS: <!--[e.g. Mac OS, Windows, Debian, CentOS, ...]--> Ubuntu 20.04
- Database: <!--[PostgreSQL, MySQL, MariaDB or SQLite]--> MySQL
- Node.js version: <!--[Run `node -v` to see your Node.js version]--> `v15.3.0`
- Prisma version:
<!--[Run `prisma -v` to see your Prisma version and paste it between the ´´´]-->
```
@prisma/cli : 2.13.1
@prisma/client : 2.13.1
Current platform : debian-openssl-1.1.x
Query Engine : query-engine fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/query-engine-debian-openssl-1.1.x)
Migration Engine : migration-engine-cli fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/migration-engine-debian-openssl-1.1.x)
Introspection Engine : introspection-core fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/introspection-engine-debian-openssl-1.1.x)
Format Binary : prisma-fmt fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/prisma-fmt-debian-openssl-1.1.x)
Studio : 0.329.0
Done in 3.81s.
```
|
1.0
|
Introspect overwrites prisma relation field names - <!--
Thanks for helping us improve Prisma! 🙏 Please follow the sections in the template and provide as much information as possible about your problem, e.g. by setting the `DEBUG="*"` environment variable and enabling additional logging output in Prisma Client.
Learn more about writing proper bug reports here: https://pris.ly/d/bug-reports
-->
## Bug description
<!-- A clear and concise description of what the bug is. -->
The docs: https://www.prisma.io/docs/concepts/components/introspection#introspection-with-an-existing-schema
claims that they maintain `@map and @@map attributes` and `Custom @relation names`.
However, it's not possible to achieve renaming relation fields for introspected workflow.
When I try to put `@map` attribute, I get this error:
> `Error parsing attribute "@map": The attribute @map can not be used on relation fields.`
I've also tried to use relation names:
```diff
- CampaignAutomation CampaignAutomation? @relation(fields: [campaignAutomationId], references: [id])
+ automation CampaignAutomation? @relation("CampaignAutomation", fields: [campaignAutomationId], references: [id])
```
But the introspect overwrites all that changes, removing the relation name
## How to reproduce
<!--
Steps to reproduce the behavior:
1. Go to '...'
2. Change '....'
3. Run '....'
4. See error
-->
Create two tables with one-many relation and introspect the database. Then try to change the generated relation field name.
## Expected behavior
<!-- A clear and concise description of what you expected to happen. -->
Being able to change the introspected relation field names. They are generated as the table names in PascalCase, which is a horrible DX when making a prisma query.
## Prisma information
<!-- Your Prisma schema, Prisma Client queries, ...
Do not include your database credentials when sharing your Prisma schema! -->
## Environment & setup
<!-- In which environment does the problem occur -->
- OS: <!--[e.g. Mac OS, Windows, Debian, CentOS, ...]--> Ubuntu 20.04
- Database: <!--[PostgreSQL, MySQL, MariaDB or SQLite]--> MySQL
- Node.js version: <!--[Run `node -v` to see your Node.js version]--> `v15.3.0`
- Prisma version:
<!--[Run `prisma -v` to see your Prisma version and paste it between the ´´´]-->
```
@prisma/cli : 2.13.1
@prisma/client : 2.13.1
Current platform : debian-openssl-1.1.x
Query Engine : query-engine fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/query-engine-debian-openssl-1.1.x)
Migration Engine : migration-engine-cli fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/migration-engine-debian-openssl-1.1.x)
Introspection Engine : introspection-core fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/introspection-engine-debian-openssl-1.1.x)
Format Binary : prisma-fmt fcbc4bb2d306c86c28014f596b1e8c7980af8bd4 (at node_modules/@prisma/engines/prisma-fmt-debian-openssl-1.1.x)
Studio : 0.329.0
Done in 3.81s.
```
|
process
|
introspect overwrites prisma relation field names thanks for helping us improve prisma 🙏 please follow the sections in the template and provide as much information as possible about your problem e g by setting the debug environment variable and enabling additional logging output in prisma client learn more about writing proper bug reports here bug description the docs claims that they maintain map and map attributes and custom relation names however it s not possible to achieve renaming relation fields for introspected workflow when i try to put map attribute i get this error error parsing attribute map the attribute map can not be used on relation fields i ve also tried to use relation names diff campaignautomation campaignautomation relation fields references automation campaignautomation relation campaignautomation fields references but the introspect overwrites all that changes removing the relation name how to reproduce steps to reproduce the behavior go to change run see error create two tables with one many relation and introspect the database then try to change the generated relation field name expected behavior being able to change the introspected relation field names they are generated as the table names in pascalcase which is a horrible dx when making a prisma query prisma information your prisma schema prisma client queries do not include your database credentials when sharing your prisma schema environment setup os ubuntu database mysql node js version prisma version prisma cli prisma client current platform debian openssl x query engine query engine at node modules prisma engines query engine debian openssl x migration engine migration engine cli at node modules prisma engines migration engine debian openssl x introspection engine introspection core at node modules prisma engines introspection engine debian openssl x format binary prisma fmt at node modules prisma engines prisma fmt debian openssl x studio done in
| 1
|
7,759
| 10,878,728,188
|
IssuesEvent
|
2019-11-16 19:42:42
|
deeplearningunb/Skincare
|
https://api.github.com/repos/deeplearningunb/Skincare
|
closed
|
Split Images into Training set and Test set
|
backend preprocessing
|
This procedure aims to set the data apart which is going to be used to train the model and check the accuracy afterwards.
To be accepted, this procedure must contain:
- [x] A proportion of 20% for Test set and 80% for Training Set
|
1.0
|
Split Images into Training set and Test set - This procedure aims to set the data apart which is going to be used to train the model and check the accuracy afterwards.
To be accepted, this procedure must contain:
- [x] A proportion of 20% for Test set and 80% for Training Set
|
process
|
split images into training set and test set this procedure aims to set the data apart which is going to be used to train the model and check the accuracy afterwards to be accepted this procedure must contain a proportion of for test set and for training set
| 1
|
592,110
| 17,870,797,501
|
IssuesEvent
|
2021-09-06 15:12:57
|
Kotlin/kotlinx.serialization
|
https://api.github.com/repos/Kotlin/kotlinx.serialization
|
closed
|
Annotations are not collected for object kinds
|
bug compiler-plugin Priority: 1
|
**Describe the bug**
`getEntityAnnotations()` for an object descriptor is empty in spite of that the annotation class is marked with `@SerialInfo` meta-annotation. This works well for regular classes.
**To Reproduce**
```kotlin
class ObjectSerialInfoTest {
@Test
@ImplicitReflectionSerializer
fun annotations() {
val childDescriptor = serializer<Root.Child>().descriptor
assertEquals(1, childDescriptor.getEntityAnnotations().size)
assertEquals(22, (childDescriptor.getEntityAnnotations().single() as MetaData).metaValue)
assertEquals(2, childDescriptor.elementsCount)
val rootDescriptor = childDescriptor.getElementDescriptor(1)
assertEquals(1, rootDescriptor.getEntityAnnotations().size)
assertEquals(11, (childDescriptor.getEntityAnnotations().single() as MetaData).metaValue)
}
@SerialInfo
annotation class MetaData(val metaValue: Int)
@Serializable
@MetaData(11)
object Root {
@Serializable
@MetaData(22)
class Child(val id: Int, val root: Root = Root)
}
}
```
**Expected behaviour**
SerialDescriptor should work the same as for a regular class descriptor - it should return annotations and the test should pass.
**Environment**
- Kotlin version: 1.3.61
- Library version: 0.14.0
- Kotlin platforms: JVM
|
1.0
|
Annotations are not collected for object kinds - **Describe the bug**
`getEntityAnnotations()` for an object descriptor is empty in spite of that the annotation class is marked with `@SerialInfo` meta-annotation. This works well for regular classes.
**To Reproduce**
```kotlin
class ObjectSerialInfoTest {
@Test
@ImplicitReflectionSerializer
fun annotations() {
val childDescriptor = serializer<Root.Child>().descriptor
assertEquals(1, childDescriptor.getEntityAnnotations().size)
assertEquals(22, (childDescriptor.getEntityAnnotations().single() as MetaData).metaValue)
assertEquals(2, childDescriptor.elementsCount)
val rootDescriptor = childDescriptor.getElementDescriptor(1)
assertEquals(1, rootDescriptor.getEntityAnnotations().size)
assertEquals(11, (childDescriptor.getEntityAnnotations().single() as MetaData).metaValue)
}
@SerialInfo
annotation class MetaData(val metaValue: Int)
@Serializable
@MetaData(11)
object Root {
@Serializable
@MetaData(22)
class Child(val id: Int, val root: Root = Root)
}
}
```
**Expected behaviour**
SerialDescriptor should work the same as for a regular class descriptor - it should return annotations and the test should pass.
**Environment**
- Kotlin version: 1.3.61
- Library version: 0.14.0
- Kotlin platforms: JVM
|
non_process
|
annotations are not collected for object kinds describe the bug getentityannotations for an object descriptor is empty in spite of that the annotation class is marked with serialinfo meta annotation this works well for regular classes to reproduce kotlin class objectserialinfotest test implicitreflectionserializer fun annotations val childdescriptor serializer descriptor assertequals childdescriptor getentityannotations size assertequals childdescriptor getentityannotations single as metadata metavalue assertequals childdescriptor elementscount val rootdescriptor childdescriptor getelementdescriptor assertequals rootdescriptor getentityannotations size assertequals childdescriptor getentityannotations single as metadata metavalue serialinfo annotation class metadata val metavalue int serializable metadata object root serializable metadata class child val id int val root root root expected behaviour serialdescriptor should work the same as for a regular class descriptor it should return annotations and the test should pass environment kotlin version library version kotlin platforms jvm
| 0
|
66,971
| 12,855,504,204
|
IssuesEvent
|
2020-07-09 05:26:05
|
intel/media-driver
|
https://api.github.com/repos/intel/media-driver
|
closed
|
[ffmpeg_vaapi][hevc_lp_encode] encode file has garbage on ICL
|
Encode Need Info
|
description:
the color have some error on hevc lowpower encode cbr/vbr mode
reproduce step:
1.ffmpeg -hwaccel vaapi -vaapi_device /dev/dri/renderD128 -v verbose -f rawvideo -pix_fmt yuv420p -s:v 352x288 -r:v 30 -i yuv/MOBILE_352x288_30_orig_01_352x288_I420.yuv -vf 'format=nv12,hwupload' -c:v hevc_vaapi -profile:v main -rc_mode CBR -g 30 -slices 1 -b:v 100k -maxrate 100k -low_power 1 -vframes 300 -y test.h265
2. observe
the color have some garbage, screen shot below


|
1.0
|
[ffmpeg_vaapi][hevc_lp_encode] encode file has garbage on ICL - description:
the color have some error on hevc lowpower encode cbr/vbr mode
reproduce step:
1.ffmpeg -hwaccel vaapi -vaapi_device /dev/dri/renderD128 -v verbose -f rawvideo -pix_fmt yuv420p -s:v 352x288 -r:v 30 -i yuv/MOBILE_352x288_30_orig_01_352x288_I420.yuv -vf 'format=nv12,hwupload' -c:v hevc_vaapi -profile:v main -rc_mode CBR -g 30 -slices 1 -b:v 100k -maxrate 100k -low_power 1 -vframes 300 -y test.h265
2. observe
the color have some garbage, screen shot below


|
non_process
|
encode file has garbage on icl description the color have some error on hevc lowpower encode cbr vbr mode reproduce step ffmpeg hwaccel vaapi vaapi device dev dri v verbose f rawvideo pix fmt s v r v i yuv mobile orig yuv vf format hwupload c v hevc vaapi profile v main rc mode cbr g slices b v maxrate low power vframes y test observe the color have some garbage screen shot below
| 0
|
18,075
| 24,091,419,899
|
IssuesEvent
|
2022-09-19 15:02:15
|
bazelbuild/bazel
|
https://api.github.com/repos/bazelbuild/bazel
|
closed
|
Select on host platform and execution platform
|
more data needed type: support / not a bug (process) team-Configurability untriaged
|
First of all, I apologize if I missed this info in the documentation.
I have a use case where I want my code-generator program to be compiled slightly differently for target platform, host platform, and execution platform by setting different defines.
This is a simplified example of what I'm trying to do. My target is aarch64, so that's straight forward. My host and execution platforms are the same x86 machine but the `CODEGEN_TARGET` define value depends on whether it's building for host or execution platform.
```
config_setting(
name = "is_aarch64",
constraint_values = [
"@platforms//cpu:aarch64",
"@platforms//os:linux",
],
)
config_setting(
name = "is_x86_host",
constraint_values = [ <---------------------------------+
"@platforms//cpu:x86", |
"@platforms//os:linux", |
# How to define a host platform ? |
], +---- How to make the distinction between host platform and execution platform?
) |
|
config_setting( |
name = "is_x86_execution", |
constraint_values = [ <---------------------------------+
"@platforms//cpu:x86",
"@platforms//os:linux",
# How to define an execution platform ?
],
)
cc_library(
name = "codeGen",
hdrs = [
"include/codeGen.h",
],
defines = select({
":is_aarch64": ["CODEGEN_TARGET=aarch64"],
":is_x86_execution": ["CODEGEN_TARGET=aarch64"], # <----------------- how do I write a rule that applies to execution platform only?
":is_x86_host": ["CODEGEN_TARGET=x86"],
}),
includes = ["include"],
src = [
"codeGen.cc",
],
)
```
I'm probably approaching it the wrong way. Any guidance would be appreciated.
|
1.0
|
Select on host platform and execution platform - First of all, I apologize if I missed this info in the documentation.
I have a use case where I want my code-generator program to be compiled slightly differently for target platform, host platform, and execution platform by setting different defines.
This is a simplified example of what I'm trying to do. My target is aarch64, so that's straight forward. My host and execution platforms are the same x86 machine but the `CODEGEN_TARGET` define value depends on whether it's building for host or execution platform.
```
config_setting(
name = "is_aarch64",
constraint_values = [
"@platforms//cpu:aarch64",
"@platforms//os:linux",
],
)
config_setting(
name = "is_x86_host",
constraint_values = [ <---------------------------------+
"@platforms//cpu:x86", |
"@platforms//os:linux", |
# How to define a host platform ? |
], +---- How to make the distinction between host platform and execution platform?
) |
|
config_setting( |
name = "is_x86_execution", |
constraint_values = [ <---------------------------------+
"@platforms//cpu:x86",
"@platforms//os:linux",
# How to define an execution platform ?
],
)
cc_library(
name = "codeGen",
hdrs = [
"include/codeGen.h",
],
defines = select({
":is_aarch64": ["CODEGEN_TARGET=aarch64"],
":is_x86_execution": ["CODEGEN_TARGET=aarch64"], # <----------------- how do I write a rule that applies to execution platform only?
":is_x86_host": ["CODEGEN_TARGET=x86"],
}),
includes = ["include"],
src = [
"codeGen.cc",
],
)
```
I'm probably approaching it the wrong way. Any guidance would be appreciated.
|
process
|
select on host platform and execution platform first of all i apologize if i missed this info in the documentation i have a use case where i want my code generator program to be compiled slightly differently for target platform host platform and execution platform by setting different defines this is a simplified example of what i m trying to do my target is so that s straight forward my host and execution platforms are the same machine but the codegen target define value depends on whether it s building for host or execution platform config setting name is constraint values platforms cpu platforms os linux config setting name is host constraint values platforms cpu platforms os linux how to define a host platform how to make the distinction between host platform and execution platform config setting name is execution constraint values platforms cpu platforms os linux how to define an execution platform cc library name codegen hdrs include codegen h defines select is is execution how do i write a rule that applies to execution platform only is host includes src codegen cc i m probably approaching it the wrong way any guidance would be appreciated
| 1
|
1,726
| 4,383,260,677
|
IssuesEvent
|
2016-08-07 12:20:04
|
nodejs/node-v0.x-archive
|
https://api.github.com/repos/nodejs/node-v0.x-archive
|
closed
|
`child_process.spawnSync()` throws an error when `options` argument is shared
|
child_process P-2 v0.12
|
Calling `child_process.spawnSync()` 3 times with shared `options` argument throws an error.
`test.js`:
```javascript
var spawn = require('child_process').spawnSync;
var ls;
var opts = {
stdio: 'inherit'
};
ls = spawn('ls', [], opts);
ls = spawn('ls', [], opts);
ls = spawn('ls', [], opts);
```
This bug has been fixed on io.js v1.1.0.
See also: iojs/io.js#576, iojs/io.js#579
|
1.0
|
`child_process.spawnSync()` throws an error when `options` argument is shared - Calling `child_process.spawnSync()` 3 times with shared `options` argument throws an error.
`test.js`:
```javascript
var spawn = require('child_process').spawnSync;
var ls;
var opts = {
stdio: 'inherit'
};
ls = spawn('ls', [], opts);
ls = spawn('ls', [], opts);
ls = spawn('ls', [], opts);
```
This bug has been fixed on io.js v1.1.0.
See also: iojs/io.js#576, iojs/io.js#579
|
process
|
child process spawnsync throws an error when options argument is shared calling child process spawnsync times with shared options argument throws an error test js javascript var spawn require child process spawnsync var ls var opts stdio inherit ls spawn ls opts ls spawn ls opts ls spawn ls opts this bug has been fixed on io js see also iojs io js iojs io js
| 1
|
294,825
| 25,408,955,674
|
IssuesEvent
|
2022-11-22 17:18:14
|
cockroachdb/cockroach
|
https://api.github.com/repos/cockroachdb/cockroach
|
closed
|
pkg/ccl/logictestccl/tests/3node-tenant/3node-tenant_test: TestTenantLogic_vectorize failed
|
C-test-failure O-robot T-sql-queries branch-release-22.2
|
pkg/ccl/logictestccl/tests/3node-tenant/3node-tenant_test.TestTenantLogic_vectorize [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/7637286?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/7637286?buildTab=artifacts#/) on release-22.2 @ [2a71a5cca1f66313fd39956f1a3db070f67ade15](https://github.com/cockroachdb/cockroach/commits/2a71a5cca1f66313fd39956f1a3db070f67ade15):
```
Slow failing tests:
TestTenantLogic_vectorize - 62.49s
Slow passing tests:
TestTenantLogic_collatedstring - 140.42s
TestTenantLogic_srfs - 117.82s
TestTenantLogic_pg_builtins - 110.66s
TestTenantLogic_fk - 84.98s
TestTenantLogic_fk - 80.33s
TestTenantLogic_alter_table - 66.39s
TestTenantLogic_alter_table - 65.96s
TestTenantLogic_upsert - 65.95s
TestTenantLogic_alter_primary_key - 58.25s
TestTenantLogic_alter_primary_key - 51.62s
TestTenantLogic_hash_sharded_index - 44.45s
TestTenantLogic_enums - 42.62s
TestTenantLogic_drop_type - 42.45s
TestTenantLogic_cascade - 41.90s
TestTenantLogic_cascade - 41.63s
TestTenantLogic_enums - 41.46s
TestTenantLogic_drop_type - 40.83s
TestTenantLogic_new_schema_changer - 39.15s
TestTenantLogic_hash_sharded_index - 38.61s
TestTenantLogic_new_schema_changer - 37.69s
```
<p>Parameters: <code>TAGS=bazel,gss</code>
</p>
<details><summary>Help</summary>
<p>
See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM)
</p>
</details>
/cc @cockroachdb/sql-queries
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestTenantLogic_vectorize.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-21697
|
1.0
|
pkg/ccl/logictestccl/tests/3node-tenant/3node-tenant_test: TestTenantLogic_vectorize failed - pkg/ccl/logictestccl/tests/3node-tenant/3node-tenant_test.TestTenantLogic_vectorize [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/7637286?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/7637286?buildTab=artifacts#/) on release-22.2 @ [2a71a5cca1f66313fd39956f1a3db070f67ade15](https://github.com/cockroachdb/cockroach/commits/2a71a5cca1f66313fd39956f1a3db070f67ade15):
```
Slow failing tests:
TestTenantLogic_vectorize - 62.49s
Slow passing tests:
TestTenantLogic_collatedstring - 140.42s
TestTenantLogic_srfs - 117.82s
TestTenantLogic_pg_builtins - 110.66s
TestTenantLogic_fk - 84.98s
TestTenantLogic_fk - 80.33s
TestTenantLogic_alter_table - 66.39s
TestTenantLogic_alter_table - 65.96s
TestTenantLogic_upsert - 65.95s
TestTenantLogic_alter_primary_key - 58.25s
TestTenantLogic_alter_primary_key - 51.62s
TestTenantLogic_hash_sharded_index - 44.45s
TestTenantLogic_enums - 42.62s
TestTenantLogic_drop_type - 42.45s
TestTenantLogic_cascade - 41.90s
TestTenantLogic_cascade - 41.63s
TestTenantLogic_enums - 41.46s
TestTenantLogic_drop_type - 40.83s
TestTenantLogic_new_schema_changer - 39.15s
TestTenantLogic_hash_sharded_index - 38.61s
TestTenantLogic_new_schema_changer - 37.69s
```
<p>Parameters: <code>TAGS=bazel,gss</code>
</p>
<details><summary>Help</summary>
<p>
See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM)
</p>
</details>
/cc @cockroachdb/sql-queries
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestTenantLogic_vectorize.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-21697
|
non_process
|
pkg ccl logictestccl tests tenant tenant test testtenantlogic vectorize failed pkg ccl logictestccl tests tenant tenant test testtenantlogic vectorize with on release slow failing tests testtenantlogic vectorize slow passing tests testtenantlogic collatedstring testtenantlogic srfs testtenantlogic pg builtins testtenantlogic fk testtenantlogic fk testtenantlogic alter table testtenantlogic alter table testtenantlogic upsert testtenantlogic alter primary key testtenantlogic alter primary key testtenantlogic hash sharded index testtenantlogic enums testtenantlogic drop type testtenantlogic cascade testtenantlogic cascade testtenantlogic enums testtenantlogic drop type testtenantlogic new schema changer testtenantlogic hash sharded index testtenantlogic new schema changer parameters tags bazel gss help see also cc cockroachdb sql queries jira issue crdb
| 0
|
78,079
| 15,569,914,491
|
IssuesEvent
|
2021-03-17 01:17:14
|
benchmarkdebricked/Sylius
|
https://api.github.com/repos/benchmarkdebricked/Sylius
|
opened
|
CVE-2021-20270 (Medium) detected in Pygments-2.4.2-py2.py3-none-any.whl
|
security vulnerability
|
## CVE-2021-20270 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pygments-2.4.2-py2.py3-none-any.whl</b></p></summary>
<p>Pygments is a syntax highlighting package written in Python.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/5c/73/1dfa428150e3ccb0fa3e68db406e5be48698f2a979ccbcec795f28f44048/Pygments-2.4.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/5c/73/1dfa428150e3ccb0fa3e68db406e5be48698f2a979ccbcec795f28f44048/Pygments-2.4.2-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /Sylius/docs/requirements.txt</p>
<p>Path to vulnerable library: teSource-ArchiveExtractor_422d378f-a3b0-4a00-adc7-c445a3bfd558/20190610083023_48873/20190610082952_depth_0/Pygments-2.4.2-py2.py3-none-any/pygments,teSource-ArchiveExtractor_422d378f-a3b0-4a00-adc7-c445a3bfd558/20190610082947_21509/20190610082915_depth_0/Pygments-2.4.2-py2.py3-none-any/pygments</p>
<p>
Dependency Hierarchy:
- :x: **Pygments-2.4.2-py2.py3-none-any.whl** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A security issue was found in python-pygments version 1.5 up to 2.7.3. When the SMLLexer gets fed the string "exception", it loops indefinitely, leading to denial of service. The issue is fixed in python-pygments version 2.7.4.
<p>Publish Date: 2020-12-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20270>CVE-2021-20270</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922136">https://bugzilla.redhat.com/show_bug.cgi?id=1922136</a></p>
<p>Release Date: 2020-12-18</p>
<p>Fix Resolution: 2.7.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-20270 (Medium) detected in Pygments-2.4.2-py2.py3-none-any.whl - ## CVE-2021-20270 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pygments-2.4.2-py2.py3-none-any.whl</b></p></summary>
<p>Pygments is a syntax highlighting package written in Python.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/5c/73/1dfa428150e3ccb0fa3e68db406e5be48698f2a979ccbcec795f28f44048/Pygments-2.4.2-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/5c/73/1dfa428150e3ccb0fa3e68db406e5be48698f2a979ccbcec795f28f44048/Pygments-2.4.2-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /Sylius/docs/requirements.txt</p>
<p>Path to vulnerable library: teSource-ArchiveExtractor_422d378f-a3b0-4a00-adc7-c445a3bfd558/20190610083023_48873/20190610082952_depth_0/Pygments-2.4.2-py2.py3-none-any/pygments,teSource-ArchiveExtractor_422d378f-a3b0-4a00-adc7-c445a3bfd558/20190610082947_21509/20190610082915_depth_0/Pygments-2.4.2-py2.py3-none-any/pygments</p>
<p>
Dependency Hierarchy:
- :x: **Pygments-2.4.2-py2.py3-none-any.whl** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A security issue was found in python-pygments version 1.5 up to 2.7.3. When the SMLLexer gets fed the string "exception", it loops indefinitely, leading to denial of service. The issue is fixed in python-pygments version 2.7.4.
<p>Publish Date: 2020-12-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20270>CVE-2021-20270</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922136">https://bugzilla.redhat.com/show_bug.cgi?id=1922136</a></p>
<p>Release Date: 2020-12-18</p>
<p>Fix Resolution: 2.7.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
cve medium detected in pygments none any whl cve medium severity vulnerability vulnerable library pygments none any whl pygments is a syntax highlighting package written in python library home page a href path to dependency file sylius docs requirements txt path to vulnerable library tesource archiveextractor depth pygments none any pygments tesource archiveextractor depth pygments none any pygments dependency hierarchy x pygments none any whl vulnerable library vulnerability details a security issue was found in python pygments version up to when the smllexer gets fed the string exception it loops indefinitely leading to denial of service the issue is fixed in python pygments version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
| 0
|
33,480
| 9,159,047,043
|
IssuesEvent
|
2019-03-01 00:44:57
|
xlayers/xlayers
|
https://api.github.com/repos/xlayers/xlayers
|
closed
|
Duplicate entries in CHANGELOG
|
Priority: Medium Scope: Build State: accepted community-help effort1: easy (hours) good first issue type: enhancement
|
We should figure out the root cause of this and find a fix to avoid this in the future.
|
1.0
|
Duplicate entries in CHANGELOG - We should figure out the root cause of this and find a fix to avoid this in the future.
|
non_process
|
duplicate entries in changelog we should figure out the root cause of this and find a fix to avoid this in the future
| 0
|
289,844
| 31,999,082,143
|
IssuesEvent
|
2023-09-21 11:05:14
|
uthrasri/frameworks_av_AOSP_4.2.2_r1
|
https://api.github.com/repos/uthrasri/frameworks_av_AOSP_4.2.2_r1
|
opened
|
CVE-2016-3821 (Critical) detected in multiple libraries
|
Mend: dependency security vulnerability
|
## CVE-2016-3821 - Critical Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
libmedia in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 has certain incorrect declarations, which allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference or memory corruption) via a crafted media file, aka internal bug 28166152.
<p>Publish Date: 2016-08-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3821>CVE-2016-3821</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2016-3821 (Critical) detected in multiple libraries - ## CVE-2016-3821 - Critical Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b>, <b>https://source.codeaurora.org/external/hisense/platform/frameworks/av/AU_LINUX_ANDROID_JB_VANILLA.04.02.02.60.051</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
libmedia in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 has certain incorrect declarations, which allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference or memory corruption) via a crafted media file, aka internal bug 28166152.
<p>Publish Date: 2016-08-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-3821>CVE-2016-3821</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
cve critical detected in multiple libraries cve critical severity vulnerability vulnerable libraries vulnerability details libmedia in mediaserver in android x before x before x before and x before has certain incorrect declarations which allows remote attackers to execute arbitrary code or cause a denial of service null pointer dereference or memory corruption via a crafted media file aka internal bug publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with mend
| 0
|
8,779
| 11,900,732,541
|
IssuesEvent
|
2020-03-30 11:11:39
|
prisma/migrate
|
https://api.github.com/repos/prisma/migrate
|
reopened
|
preview025 causes migration error for Postgres db
|
process/candidate
|
## Bug description
Unable to connect to postgres db with new `preview025`. Works with `preview024`.
## How to reproduce
1. Change schema.
2. Attempt to commit the changes: `npx prisma2 migrate save --experimental`
## Prisma information
```
$ npx prisma2 migrate save --experimental
Error: Error in migration engine: Mar 27 08:44:36.142 INFO migration_engine: Starting migration engine RPC server git_hash="8814060fa684793b73d07dbfccd4b7777b3361ae"
Mar 27 08:44:36.659 INFO quaint::single: Starting a postgresql pool with 1 connections.
Mar 27 08:44:37.069 INFO tokio_postgres::connection: NOTICE: schema "public" already exists, skipping
error Command failed with exit code 1.
```
## Environment & setup
- macOS
- PostgreSQL
- Prisma preview025
- Node.js version: 12.6.0
|
1.0
|
preview025 causes migration error for Postgres db - ## Bug description
Unable to connect to postgres db with new `preview025`. Works with `preview024`.
## How to reproduce
1. Change schema.
2. Attempt to commit the changes: `npx prisma2 migrate save --experimental`
## Prisma information
```
$ npx prisma2 migrate save --experimental
Error: Error in migration engine: Mar 27 08:44:36.142 INFO migration_engine: Starting migration engine RPC server git_hash="8814060fa684793b73d07dbfccd4b7777b3361ae"
Mar 27 08:44:36.659 INFO quaint::single: Starting a postgresql pool with 1 connections.
Mar 27 08:44:37.069 INFO tokio_postgres::connection: NOTICE: schema "public" already exists, skipping
error Command failed with exit code 1.
```
## Environment & setup
- macOS
- PostgreSQL
- Prisma preview025
- Node.js version: 12.6.0
|
process
|
causes migration error for postgres db bug description unable to connect to postgres db with new works with how to reproduce change schema attempt to commit the changes npx migrate save experimental prisma information npx migrate save experimental error error in migration engine mar info migration engine starting migration engine rpc server git hash mar info quaint single starting a postgresql pool with connections mar info tokio postgres connection notice schema public already exists skipping error command failed with exit code environment setup macos postgresql prisma node js version
| 1
|
4,719
| 7,552,682,610
|
IssuesEvent
|
2018-04-19 01:46:35
|
UnbFeelings/unb-feelings-docs
|
https://api.github.com/repos/UnbFeelings/unb-feelings-docs
|
opened
|
[Não Conformidade] Backlog da Release
|
Desenvolvimento Processo invalid
|
@UnbFeelings/devel
A auditoria do [Backlog da Release](https://github.com/UnbFeelings/unb-feelings-docs/wiki/Processo#2012-planejar-release), que é um produto da atividade de **Planejar release**, foi feita com base nos [critérios](https://github.com/UnbFeelings/unb-feelings-GQA/wiki/Crit%C3%A9rios-de-Avalia%C3%A7%C3%A3o-e-T%C3%A9cnicas-de-Auditoria#backlog-da-release) pré-estabelecidos para poder verificar se o Processo foi utilizado. O resultado da auditoria pode ser acessado através da seguinte página: [Auditoria Backlog](https://github.com/UnbFeelings/unb-feelings-GQA/wiki/Auditoria-Backlog-da-Release-Ciclo-1).
### Descrição
Foi identificado o principal motivo da não-adesão ao processo:
* Problema de comunicação (externa/interna);
#### Recomendações
Conforme o processo, é necessário que seja documentado o Backlog da release. Por a wiki ser a ferramenta para documentar artefatos, é importante que esteja na mesma.
Além disso, deve-se estabelecer com urgência uma nova reunião entre equipe de processos e desenvolvimento para identificar atividades desnecessárias no processo e principalmente artefatos que não agregam valor para o cliente. Ressalta-se ainda levar em conta a carga horária de trabalho efetivo de cada membro do desenvolvimento para propor melhorias ao processo que se adequem a carga horária dos desenvolvedores para que o processo não torne suas atividades tão custoso.
E que engaje de alguma forma a equipe de processo e de desenvolvimento, porque é bem visível a falta de comunicação e alinhamento de todos.
### Detalhes
**Autor:** Naiara Andrade
**Tipo:** Processo
**Prazo:** Seria de 3 dia para a correção, pela Matriz GUT. Mas como depende dos horários das aulas, seria 6 dias.
|
1.0
|
[Não Conformidade] Backlog da Release - @UnbFeelings/devel
A auditoria do [Backlog da Release](https://github.com/UnbFeelings/unb-feelings-docs/wiki/Processo#2012-planejar-release), que é um produto da atividade de **Planejar release**, foi feita com base nos [critérios](https://github.com/UnbFeelings/unb-feelings-GQA/wiki/Crit%C3%A9rios-de-Avalia%C3%A7%C3%A3o-e-T%C3%A9cnicas-de-Auditoria#backlog-da-release) pré-estabelecidos para poder verificar se o Processo foi utilizado. O resultado da auditoria pode ser acessado através da seguinte página: [Auditoria Backlog](https://github.com/UnbFeelings/unb-feelings-GQA/wiki/Auditoria-Backlog-da-Release-Ciclo-1).
### Descrição
Foi identificado o principal motivo da não-adesão ao processo:
* Problema de comunicação (externa/interna);
#### Recomendações
Conforme o processo, é necessário que seja documentado o Backlog da release. Por a wiki ser a ferramenta para documentar artefatos, é importante que esteja na mesma.
Além disso, deve-se estabelecer com urgência uma nova reunião entre equipe de processos e desenvolvimento para identificar atividades desnecessárias no processo e principalmente artefatos que não agregam valor para o cliente. Ressalta-se ainda levar em conta a carga horária de trabalho efetivo de cada membro do desenvolvimento para propor melhorias ao processo que se adequem a carga horária dos desenvolvedores para que o processo não torne suas atividades tão custoso.
E que engaje de alguma forma a equipe de processo e de desenvolvimento, porque é bem visível a falta de comunicação e alinhamento de todos.
### Detalhes
**Autor:** Naiara Andrade
**Tipo:** Processo
**Prazo:** Seria de 3 dia para a correção, pela Matriz GUT. Mas como depende dos horários das aulas, seria 6 dias.
|
process
|
backlog da release unbfeelings devel a auditoria do que é um produto da atividade de planejar release foi feita com base nos pré estabelecidos para poder verificar se o processo foi utilizado o resultado da auditoria pode ser acessado através da seguinte página descrição foi identificado o principal motivo da não adesão ao processo problema de comunicação externa interna recomendações conforme o processo é necessário que seja documentado o backlog da release por a wiki ser a ferramenta para documentar artefatos é importante que esteja na mesma além disso deve se estabelecer com urgência uma nova reunião entre equipe de processos e desenvolvimento para identificar atividades desnecessárias no processo e principalmente artefatos que não agregam valor para o cliente ressalta se ainda levar em conta a carga horária de trabalho efetivo de cada membro do desenvolvimento para propor melhorias ao processo que se adequem a carga horária dos desenvolvedores para que o processo não torne suas atividades tão custoso e que engaje de alguma forma a equipe de processo e de desenvolvimento porque é bem visível a falta de comunicação e alinhamento de todos detalhes autor naiara andrade tipo processo prazo seria de dia para a correção pela matriz gut mas como depende dos horários das aulas seria dias
| 1
|
23,812
| 16,600,553,772
|
IssuesEvent
|
2021-06-01 18:48:47
|
sciencehistory/scihist_digicoll
|
https://api.github.com/repos/sciencehistory/scihist_digicoll
|
closed
|
Monitoring solution
|
infrastructure
|
We are shutting down our self-hosted netdata, without a sysadmin on staff we don't think it is sustainable to maintain it. (Also there were diverse opinions of how successful netadata was as a solution among staff :) ).
But we do need some monitoring solution in order to keep our systems reliable in a professional way. Perhaps lean more heavily on AWS cloudwatch? Perhaps something else.
Things we want to be alerted to (@eddierubeiz et al add more?):
* disks approaching full. (That took us down a few times with our sufia app, although hasn't recently. But we want an alarm if any of our EC2 block storage disk is appraoching being full).
|
1.0
|
Monitoring solution - We are shutting down our self-hosted netdata, without a sysadmin on staff we don't think it is sustainable to maintain it. (Also there were diverse opinions of how successful netadata was as a solution among staff :) ).
But we do need some monitoring solution in order to keep our systems reliable in a professional way. Perhaps lean more heavily on AWS cloudwatch? Perhaps something else.
Things we want to be alerted to (@eddierubeiz et al add more?):
* disks approaching full. (That took us down a few times with our sufia app, although hasn't recently. But we want an alarm if any of our EC2 block storage disk is appraoching being full).
|
non_process
|
monitoring solution we are shutting down our self hosted netdata without a sysadmin on staff we don t think it is sustainable to maintain it also there were diverse opinions of how successful netadata was as a solution among staff but we do need some monitoring solution in order to keep our systems reliable in a professional way perhaps lean more heavily on aws cloudwatch perhaps something else things we want to be alerted to eddierubeiz et al add more disks approaching full that took us down a few times with our sufia app although hasn t recently but we want an alarm if any of our block storage disk is appraoching being full
| 0
|
152,114
| 13,445,439,395
|
IssuesEvent
|
2020-09-08 11:24:32
|
tsungtingdu/hackmd_clone_react
|
https://api.github.com/repos/tsungtingdu/hackmd_clone_react
|
opened
|
Documents
|
documentation
|
Repo
* Front-end: https://github.com/tsungtingdu/hackmd_clone_react
* Back-end: https://github.com/tsungtingdu/hackmd_clone_api_server
Doc
* Project note: https://hackmd.io/@tsungtingdu/BJKgMGcmv
* Meeting note: https://hackmd.io/@tsungtingdu/B1wsgQsXv
* Frontend design: https://docs.google.com/presentation/d/1GVKVaO1E7SzeVXaBNY9rAXo68FEGxjQq5z11pnU_uOE/edit?usp=sharing
|
1.0
|
Documents - Repo
* Front-end: https://github.com/tsungtingdu/hackmd_clone_react
* Back-end: https://github.com/tsungtingdu/hackmd_clone_api_server
Doc
* Project note: https://hackmd.io/@tsungtingdu/BJKgMGcmv
* Meeting note: https://hackmd.io/@tsungtingdu/B1wsgQsXv
* Frontend design: https://docs.google.com/presentation/d/1GVKVaO1E7SzeVXaBNY9rAXo68FEGxjQq5z11pnU_uOE/edit?usp=sharing
|
non_process
|
documents repo front end back end doc project note meeting note frontend design
| 0
|
19,255
| 25,452,428,489
|
IssuesEvent
|
2022-11-24 11:31:29
|
deepset-ai/haystack
|
https://api.github.com/repos/deepset-ai/haystack
|
closed
|
PDFToTextConverter doesn't seem to preserve any sort of paragraph markings (\n\n)
|
topic:preprocessing
|
**Describe the bug**
I've tried putting various PDFs through the PDFToTextConverter and regardless of how the paragraphs are spaced (even with triple spaces between them), they end up just separated by a single `\n`.
If I run it with `keep_physical_layout=True`, it does seem to do better. However, this is typically very undesirable as it doesn't handle columns etc...
Conversely, Tika does seem to mark paragraph endings with `\n\n\`
**Expected behavior**
I would expect some ability to mark paragraphs, so that split by `"passage"` and other things could be possible, which would make for better embeddings of related information. I don't know if this is simply a limitation inherent to pdftotext, or if there's some config that could be done to make the output more useful.
**To Reproduce**
You could run this (or probably any) pdf through the TikaConverter and PDFToTextConverter.
[tika.pdf](https://github.com/deepset-ai/haystack/files/9602702/tika.pdf)
|
1.0
|
PDFToTextConverter doesn't seem to preserve any sort of paragraph markings (\n\n) - **Describe the bug**
I've tried putting various PDFs through the PDFToTextConverter and regardless of how the paragraphs are spaced (even with triple spaces between them), they end up just separated by a single `\n`.
If I run it with `keep_physical_layout=True`, it does seem to do better. However, this is typically very undesirable as it doesn't handle columns etc...
Conversely, Tika does seem to mark paragraph endings with `\n\n\`
**Expected behavior**
I would expect some ability to mark paragraphs, so that split by `"passage"` and other things could be possible, which would make for better embeddings of related information. I don't know if this is simply a limitation inherent to pdftotext, or if there's some config that could be done to make the output more useful.
**To Reproduce**
You could run this (or probably any) pdf through the TikaConverter and PDFToTextConverter.
[tika.pdf](https://github.com/deepset-ai/haystack/files/9602702/tika.pdf)
|
process
|
pdftotextconverter doesn t seem to preserve any sort of paragraph markings n n describe the bug i ve tried putting various pdfs through the pdftotextconverter and regardless of how the paragraphs are spaced even with triple spaces between them they end up just separated by a single n if i run it with keep physical layout true it does seem to do better however this is typically very undesirable as it doesn t handle columns etc conversely tika does seem to mark paragraph endings with n n expected behavior i would expect some ability to mark paragraphs so that split by passage and other things could be possible which would make for better embeddings of related information i don t know if this is simply a limitation inherent to pdftotext or if there s some config that could be done to make the output more useful to reproduce you could run this or probably any pdf through the tikaconverter and pdftotextconverter
| 1
|
51,084
| 12,676,625,731
|
IssuesEvent
|
2020-06-19 05:47:24
|
turnkeylinux/tracker
|
https://api.github.com/repos/turnkeylinux/tracker
|
closed
|
Moodle - dashboard error message on log in
|
build invalid moodle
|
Upstream error report: https://tracker.moodle.org/browse/MDL-68700
I'll put this appliance aside for now...
|
1.0
|
Moodle - dashboard error message on log in - Upstream error report: https://tracker.moodle.org/browse/MDL-68700
I'll put this appliance aside for now...
|
non_process
|
moodle dashboard error message on log in upstream error report i ll put this appliance aside for now
| 0
|
20,319
| 26,960,784,842
|
IssuesEvent
|
2023-02-08 18:01:15
|
googleapis/google-cloud-dotnet
|
https://api.github.com/repos/googleapis/google-cloud-dotnet
|
closed
|
Warning: a recent release failed
|
type: process
|
The following release PRs may have failed:
* #9855 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9857 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9859 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9860 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9854 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9858 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9853 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9841 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9842 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9843 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9844 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9845 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9846 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9847 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9848 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9849 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9850 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9851 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9852 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
|
1.0
|
Warning: a recent release failed - The following release PRs may have failed:
* #9855 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9857 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9859 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9860 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9854 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9858 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9853 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9841 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9842 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9843 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9844 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9845 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9846 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9847 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9848 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9849 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9850 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9851 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
* #9852 - The release job is 'autorelease: tagged', but expected 'autorelease: published'.
|
process
|
warning a recent release failed the following release prs may have failed the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published the release job is autorelease tagged but expected autorelease published
| 1
|
21,717
| 30,219,123,753
|
IssuesEvent
|
2023-07-05 17:52:28
|
esmero/ami
|
https://api.github.com/repos/esmero/ami
|
opened
|
AMI remote file Mimetype (yes again) renames extensions
|
enhancement Release duty File processing CSV Processing
|
# What?
This is not an error per se. Using the normalized extension based on the actual remote `Mime Type` is OK. But for a specific need, 3D Models, where the exact name of a texture inside an Material file requires a 1:1 match this breaks things.
Need to debug exactly where this is happening bc reading my code I assumed I was already doing this, doing a reverse mapping from MimeType to extension, a normal from extension to `Mime Type` and only if both differed I used the calculated one. But there might be an `IF` or a `logic conditional` that is always ending in renaming. The specific case is JPG v/s JPEG
|
2.0
|
AMI remote file Mimetype (yes again) renames extensions - # What?
This is not an error per se. Using the normalized extension based on the actual remote `Mime Type` is OK. But for a specific need, 3D Models, where the exact name of a texture inside an Material file requires a 1:1 match this breaks things.
Need to debug exactly where this is happening bc reading my code I assumed I was already doing this, doing a reverse mapping from MimeType to extension, a normal from extension to `Mime Type` and only if both differed I used the calculated one. But there might be an `IF` or a `logic conditional` that is always ending in renaming. The specific case is JPG v/s JPEG
|
process
|
ami remote file mimetype yes again renames extensions what this is not an error per se using the normalized extension based on the actual remote mime type is ok but for a specific need models where the exact name of a texture inside an material file requires a match this breaks things need to debug exactly where this is happening bc reading my code i assumed i was already doing this doing a reverse mapping from mimetype to extension a normal from extension to mime type and only if both differed i used the calculated one but there might be an if or a logic conditional that is always ending in renaming the specific case is jpg v s jpeg
| 1
|
237,931
| 7,768,387,272
|
IssuesEvent
|
2018-06-03 17:27:29
|
InfiniteFlightAirportEditing/Navigation
|
https://api.github.com/repos/InfiniteFlightAirportEditing/Navigation
|
opened
|
LRCL
|
ILS Priority ILS Error
|
# Summary of Navigation issue: (ILS, Waypoints, etc.)
Runway moved/changed.
# Runway(s) with ILS: (If any)
25
# References: (Official sources/charts)
http://vau.aero/navdb/chart/LRCL.pdf
|
1.0
|
LRCL - # Summary of Navigation issue: (ILS, Waypoints, etc.)
Runway moved/changed.
# Runway(s) with ILS: (If any)
25
# References: (Official sources/charts)
http://vau.aero/navdb/chart/LRCL.pdf
|
non_process
|
lrcl summary of navigation issue ils waypoints etc runway moved changed runway s with ils if any references official sources charts
| 0
|
241,904
| 26,256,986,546
|
IssuesEvent
|
2023-01-06 02:13:41
|
AlexRogalskiy/object-mappers-playground
|
https://api.github.com/repos/AlexRogalskiy/object-mappers-playground
|
opened
|
CVE-2022-1471 (High) detected in snakeyaml-1.14.jar
|
security vulnerability
|
## CVE-2022-1471 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.14.jar</b></p></summary>
<p>YAML 1.1 parser and emitter for Java</p>
<p>Library home page: <a href="http://www.snakeyaml.org">http://www.snakeyaml.org</a></p>
<p>Path to dependency file: /modules/objectmappers-smooks/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.14/snakeyaml-1.14.jar</p>
<p>
Dependency Hierarchy:
- milyn-smooks-all-1.7.1.jar (Root Library)
- milyn-smooks-yaml-1.7.1.jar
- :x: **snakeyaml-1.14.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/object-mappers-playground/commit/f8ec948423b9447cfa8c211fc94d011f6f24e137">f8ec948423b9447cfa8c211fc94d011f6f24e137</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.
<p>Publish Date: 2022-12-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-1471>CVE-2022-1471</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-1471 (High) detected in snakeyaml-1.14.jar - ## CVE-2022-1471 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.14.jar</b></p></summary>
<p>YAML 1.1 parser and emitter for Java</p>
<p>Library home page: <a href="http://www.snakeyaml.org">http://www.snakeyaml.org</a></p>
<p>Path to dependency file: /modules/objectmappers-smooks/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.14/snakeyaml-1.14.jar</p>
<p>
Dependency Hierarchy:
- milyn-smooks-all-1.7.1.jar (Root Library)
- milyn-smooks-yaml-1.7.1.jar
- :x: **snakeyaml-1.14.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/object-mappers-playground/commit/f8ec948423b9447cfa8c211fc94d011f6f24e137">f8ec948423b9447cfa8c211fc94d011f6f24e137</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.
<p>Publish Date: 2022-12-01
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-1471>CVE-2022-1471</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
cve high detected in snakeyaml jar cve high severity vulnerability vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file modules objectmappers smooks pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar dependency hierarchy milyn smooks all jar root library milyn smooks yaml jar x snakeyaml jar vulnerable library found in head commit a href found in base branch master vulnerability details snakeyaml s constructor class does not restrict types which can be instantiated during deserialization deserializing yaml content provided by an attacker can lead to remote code execution we recommend using snakeyaml s safeconsturctor when parsing untrusted content to restrict deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with mend
| 0
|
15,273
| 19,254,203,441
|
IssuesEvent
|
2021-12-09 09:32:45
|
opensafely-core/job-server
|
https://api.github.com/repos/opensafely-core/job-server
|
closed
|
Sharing application view with other internal reviewers
|
application-process
|
I need to be able share and discuss applications with @brianmackenna @alexwalkerepi (and BenG).
This page, for example, https://jobs.opensafely.org/staff/applications/c058/ is not visible to Alex (and I assume to others) - 403 permission denied error.
Could they have access? In time they should also be able to approve the applications thus I am not concerned they can tick the approved section.
|
1.0
|
Sharing application view with other internal reviewers - I need to be able share and discuss applications with @brianmackenna @alexwalkerepi (and BenG).
This page, for example, https://jobs.opensafely.org/staff/applications/c058/ is not visible to Alex (and I assume to others) - 403 permission denied error.
Could they have access? In time they should also be able to approve the applications thus I am not concerned they can tick the approved section.
|
process
|
sharing application view with other internal reviewers i need to be able share and discuss applications with brianmackenna alexwalkerepi and beng this page for example is not visible to alex and i assume to others permission denied error could they have access in time they should also be able to approve the applications thus i am not concerned they can tick the approved section
| 1
|
436,472
| 12,550,692,023
|
IssuesEvent
|
2020-06-06 12:06:19
|
googleapis/elixir-google-api
|
https://api.github.com/repos/googleapis/elixir-google-api
|
opened
|
Synthesis failed for AdExperienceReport
|
api: adexperiencereport autosynth failure priority: p1 type: bug
|
Hello! Autosynth couldn't regenerate AdExperienceReport. :broken_heart:
Here's the output from running `synth.py`:
```
2020-06-06 05:05:35,259 autosynth [INFO] > logs will be written to: /tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api
2020-06-06 05:05:36,510 autosynth [DEBUG] > Running: git config --global core.excludesfile /home/kbuilder/.autosynth-gitignore
2020-06-06 05:05:36,514 autosynth [DEBUG] > Running: git config user.name yoshi-automation
2020-06-06 05:05:36,517 autosynth [DEBUG] > Running: git config user.email yoshi-automation@google.com
2020-06-06 05:05:36,521 autosynth [DEBUG] > Running: git config push.default simple
2020-06-06 05:05:36,525 autosynth [DEBUG] > Running: git branch -f autosynth-adexperiencereport
2020-06-06 05:05:36,530 autosynth [DEBUG] > Running: git checkout autosynth-adexperiencereport
Switched to branch 'autosynth-adexperiencereport'
2020-06-06 05:05:36,799 autosynth [INFO] > Running synthtool
2020-06-06 05:05:36,799 autosynth [INFO] > ['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'clients/ad_experience_report/synth.metadata', 'synth.py', '--']
2020-06-06 05:05:36,802 autosynth [DEBUG] > Running: /tmpfs/src/github/synthtool/env/bin/python3 -m synthtool --metadata clients/ad_experience_report/synth.metadata synth.py -- AdExperienceReport
tee: /tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api: Is a directory
2020-06-06 05:05:37,068 synthtool [DEBUG] > Executing /home/kbuilder/.cache/synthtool/elixir-google-api/synth.py.
On branch autosynth-adexperiencereport
nothing to commit, working tree clean
2020-06-06 05:05:39,080 synthtool [DEBUG] > Running: docker run --rm -v/tmpfs/tmp/tmp0iwknc7l/repo:/workspace -v/var/run/docker.sock:/var/run/docker.sock -e USER_GROUP=1000:1000 -w /workspace gcr.io/cloud-devrel-public-resources/elixir19 scripts/generate_client.sh AdExperienceReport
DEBUG:synthtool:Running: docker run --rm -v/tmpfs/tmp/tmp0iwknc7l/repo:/workspace -v/var/run/docker.sock:/var/run/docker.sock -e USER_GROUP=1000:1000 -w /workspace gcr.io/cloud-devrel-public-resources/elixir19 scripts/generate_client.sh AdExperienceReport
/workspace /workspace
[33mThe mix.lock file was generated with a newer version of Hex. Update your client by running `mix local.hex` to avoid losing data.[0m
Resolving Hex dependencies...
Dependency resolution completed:
Unchanged:
certifi 2.5.1
google_api_discovery 0.7.0
google_gax 0.3.2
hackney 1.15.2
idna 6.0.0
jason 1.2.1
metrics 1.0.1
mime 1.3.1
mimerl 1.2.0
oauth2 0.9.4
parse_trans 3.3.0
poison 3.1.0
ssl_verify_fun 1.1.5
temp 0.4.7
tesla 1.3.3
unicode_util_compat 0.4.1
* Getting google_api_discovery (Hex package)
* Getting tesla (Hex package)
* Getting oauth2 (Hex package)
* Getting temp (Hex package)
* Getting jason (Hex package)
* Getting poison (Hex package)
* Getting hackney (Hex package)
* Getting certifi (Hex package)
* Getting idna (Hex package)
* Getting metrics (Hex package)
* Getting mimerl (Hex package)
* Getting ssl_verify_fun (Hex package)
* Getting unicode_util_compat (Hex package)
* Getting parse_trans (Hex package)
* Getting mime (Hex package)
* Getting google_gax (Hex package)
[33mThe mix.lock file was generated with a newer version of Hex. Update your client by running `mix local.hex` to avoid losing data.[0m
==> temp
Compiling 3 files (.ex)
Generated temp app
===> Compiling parse_trans
===> Compiling mimerl
===> Compiling metrics
===> Compiling unicode_util_compat
===> Compiling idna
==> jason
Compiling 8 files (.ex)
Generated jason app
warning: String.strip/1 is deprecated. Use String.trim/1 instead
/workspace/deps/poison/mix.exs:4
==> poison
Compiling 4 files (.ex)
warning: Integer.to_char_list/2 is deprecated. Use Integer.to_charlist/2 instead
lib/poison/encoder.ex:173
Generated poison app
==> ssl_verify_fun
Compiling 7 files (.erl)
Generated ssl_verify_fun app
===> Compiling certifi
===> Compiling hackney
==> oauth2
Compiling 13 files (.ex)
Generated oauth2 app
==> mime
Compiling 2 files (.ex)
Generated mime app
==> tesla
Compiling 26 files (.ex)
Generated tesla app
==> google_gax
Compiling 5 files (.ex)
Generated google_gax app
==> google_api_discovery
Compiling 21 files (.ex)
Generated google_api_discovery app
==> google_apis
Compiling 27 files (.ex)
warning: System.cwd/0 is deprecated. Use File.cwd/0 instead
lib/google_apis/publisher.ex:24
Generated google_apis app
12:06:14.782 [info] FETCHING: https://adexperiencereport.googleapis.com/$discovery/GOOGLE_REST_SIMPLE_URI?version=v1
12:06:14.956 [info] FOUND: https://adexperiencereport.googleapis.com/$discovery/GOOGLE_REST_SIMPLE_URI?version=v1
Revision check: old=20200504, new=20200601, generating=true
Creating leading directories
Writing PlatformSummary to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/platform_summary.ex.
Writing SiteSummaryResponse to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/site_summary_response.ex.
Writing ViolatingSitesResponse to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/violating_sites_response.ex.
Writing Sites to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/api/sites.ex.
Writing ViolatingSites to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/api/violating_sites.ex.
Writing connection.ex.
Writing metadata.ex.
Writing mix.exs
Writing README.md
Writing LICENSE
Writing .gitignore
Writing config/config.exs
Writing test/test_helper.exs
12:06:15.351 [info] Found only discovery_revision and/or formatting changes. Not significant enough for a PR.
fixing file permissions
2020-06-06 05:06:18,471 synthtool [DEBUG] > Wrote metadata to clients/ad_experience_report/synth.metadata.
DEBUG:synthtool:Wrote metadata to clients/ad_experience_report/synth.metadata.
2020-06-06 05:06:18,500 autosynth [DEBUG] > Running: git clean -fdx
Removing __pycache__/
Traceback (most recent call last):
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main
"__main__", mod_spec)
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code
exec(code, run_globals)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 615, in <module>
main()
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 476, in main
return _inner_main(temp_dir)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 555, in _inner_main
).synthesize(base_synth_log_path)
File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 121, in synthesize
with open(log_file_path, "rt") as fp:
IsADirectoryError: [Errno 21] Is a directory: '/tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api'
```
Google internal developers can see the full log [here](http://sponge2/results/invocations/567e2ab8-5e4f-4fb0-8bae-9d0cc90aa1af/targets/github%2Fsynthtool;config=default/tests;query=elixir-google-api;failed=false).
|
1.0
|
Synthesis failed for AdExperienceReport - Hello! Autosynth couldn't regenerate AdExperienceReport. :broken_heart:
Here's the output from running `synth.py`:
```
2020-06-06 05:05:35,259 autosynth [INFO] > logs will be written to: /tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api
2020-06-06 05:05:36,510 autosynth [DEBUG] > Running: git config --global core.excludesfile /home/kbuilder/.autosynth-gitignore
2020-06-06 05:05:36,514 autosynth [DEBUG] > Running: git config user.name yoshi-automation
2020-06-06 05:05:36,517 autosynth [DEBUG] > Running: git config user.email yoshi-automation@google.com
2020-06-06 05:05:36,521 autosynth [DEBUG] > Running: git config push.default simple
2020-06-06 05:05:36,525 autosynth [DEBUG] > Running: git branch -f autosynth-adexperiencereport
2020-06-06 05:05:36,530 autosynth [DEBUG] > Running: git checkout autosynth-adexperiencereport
Switched to branch 'autosynth-adexperiencereport'
2020-06-06 05:05:36,799 autosynth [INFO] > Running synthtool
2020-06-06 05:05:36,799 autosynth [INFO] > ['/tmpfs/src/github/synthtool/env/bin/python3', '-m', 'synthtool', '--metadata', 'clients/ad_experience_report/synth.metadata', 'synth.py', '--']
2020-06-06 05:05:36,802 autosynth [DEBUG] > Running: /tmpfs/src/github/synthtool/env/bin/python3 -m synthtool --metadata clients/ad_experience_report/synth.metadata synth.py -- AdExperienceReport
tee: /tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api: Is a directory
2020-06-06 05:05:37,068 synthtool [DEBUG] > Executing /home/kbuilder/.cache/synthtool/elixir-google-api/synth.py.
On branch autosynth-adexperiencereport
nothing to commit, working tree clean
2020-06-06 05:05:39,080 synthtool [DEBUG] > Running: docker run --rm -v/tmpfs/tmp/tmp0iwknc7l/repo:/workspace -v/var/run/docker.sock:/var/run/docker.sock -e USER_GROUP=1000:1000 -w /workspace gcr.io/cloud-devrel-public-resources/elixir19 scripts/generate_client.sh AdExperienceReport
DEBUG:synthtool:Running: docker run --rm -v/tmpfs/tmp/tmp0iwknc7l/repo:/workspace -v/var/run/docker.sock:/var/run/docker.sock -e USER_GROUP=1000:1000 -w /workspace gcr.io/cloud-devrel-public-resources/elixir19 scripts/generate_client.sh AdExperienceReport
/workspace /workspace
[33mThe mix.lock file was generated with a newer version of Hex. Update your client by running `mix local.hex` to avoid losing data.[0m
Resolving Hex dependencies...
Dependency resolution completed:
Unchanged:
certifi 2.5.1
google_api_discovery 0.7.0
google_gax 0.3.2
hackney 1.15.2
idna 6.0.0
jason 1.2.1
metrics 1.0.1
mime 1.3.1
mimerl 1.2.0
oauth2 0.9.4
parse_trans 3.3.0
poison 3.1.0
ssl_verify_fun 1.1.5
temp 0.4.7
tesla 1.3.3
unicode_util_compat 0.4.1
* Getting google_api_discovery (Hex package)
* Getting tesla (Hex package)
* Getting oauth2 (Hex package)
* Getting temp (Hex package)
* Getting jason (Hex package)
* Getting poison (Hex package)
* Getting hackney (Hex package)
* Getting certifi (Hex package)
* Getting idna (Hex package)
* Getting metrics (Hex package)
* Getting mimerl (Hex package)
* Getting ssl_verify_fun (Hex package)
* Getting unicode_util_compat (Hex package)
* Getting parse_trans (Hex package)
* Getting mime (Hex package)
* Getting google_gax (Hex package)
[33mThe mix.lock file was generated with a newer version of Hex. Update your client by running `mix local.hex` to avoid losing data.[0m
==> temp
Compiling 3 files (.ex)
Generated temp app
===> Compiling parse_trans
===> Compiling mimerl
===> Compiling metrics
===> Compiling unicode_util_compat
===> Compiling idna
==> jason
Compiling 8 files (.ex)
Generated jason app
warning: String.strip/1 is deprecated. Use String.trim/1 instead
/workspace/deps/poison/mix.exs:4
==> poison
Compiling 4 files (.ex)
warning: Integer.to_char_list/2 is deprecated. Use Integer.to_charlist/2 instead
lib/poison/encoder.ex:173
Generated poison app
==> ssl_verify_fun
Compiling 7 files (.erl)
Generated ssl_verify_fun app
===> Compiling certifi
===> Compiling hackney
==> oauth2
Compiling 13 files (.ex)
Generated oauth2 app
==> mime
Compiling 2 files (.ex)
Generated mime app
==> tesla
Compiling 26 files (.ex)
Generated tesla app
==> google_gax
Compiling 5 files (.ex)
Generated google_gax app
==> google_api_discovery
Compiling 21 files (.ex)
Generated google_api_discovery app
==> google_apis
Compiling 27 files (.ex)
warning: System.cwd/0 is deprecated. Use File.cwd/0 instead
lib/google_apis/publisher.ex:24
Generated google_apis app
12:06:14.782 [info] FETCHING: https://adexperiencereport.googleapis.com/$discovery/GOOGLE_REST_SIMPLE_URI?version=v1
12:06:14.956 [info] FOUND: https://adexperiencereport.googleapis.com/$discovery/GOOGLE_REST_SIMPLE_URI?version=v1
Revision check: old=20200504, new=20200601, generating=true
Creating leading directories
Writing PlatformSummary to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/platform_summary.ex.
Writing SiteSummaryResponse to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/site_summary_response.ex.
Writing ViolatingSitesResponse to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/model/violating_sites_response.ex.
Writing Sites to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/api/sites.ex.
Writing ViolatingSites to clients/ad_experience_report/lib/google_api/ad_experience_report/v1/api/violating_sites.ex.
Writing connection.ex.
Writing metadata.ex.
Writing mix.exs
Writing README.md
Writing LICENSE
Writing .gitignore
Writing config/config.exs
Writing test/test_helper.exs
12:06:15.351 [info] Found only discovery_revision and/or formatting changes. Not significant enough for a PR.
fixing file permissions
2020-06-06 05:06:18,471 synthtool [DEBUG] > Wrote metadata to clients/ad_experience_report/synth.metadata.
DEBUG:synthtool:Wrote metadata to clients/ad_experience_report/synth.metadata.
2020-06-06 05:06:18,500 autosynth [DEBUG] > Running: git clean -fdx
Removing __pycache__/
Traceback (most recent call last):
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 193, in _run_module_as_main
"__main__", mod_spec)
File "/home/kbuilder/.pyenv/versions/3.6.9/lib/python3.6/runpy.py", line 85, in _run_code
exec(code, run_globals)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 615, in <module>
main()
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 476, in main
return _inner_main(temp_dir)
File "/tmpfs/src/github/synthtool/autosynth/synth.py", line 555, in _inner_main
).synthesize(base_synth_log_path)
File "/tmpfs/src/github/synthtool/autosynth/synthesizer.py", line 121, in synthesize
with open(log_file_path, "rt") as fp:
IsADirectoryError: [Errno 21] Is a directory: '/tmpfs/src/github/synthtool/logs/googleapis/elixir-google-api'
```
Google internal developers can see the full log [here](http://sponge2/results/invocations/567e2ab8-5e4f-4fb0-8bae-9d0cc90aa1af/targets/github%2Fsynthtool;config=default/tests;query=elixir-google-api;failed=false).
|
non_process
|
synthesis failed for adexperiencereport hello autosynth couldn t regenerate adexperiencereport broken heart here s the output from running synth py autosynth logs will be written to tmpfs src github synthtool logs googleapis elixir google api autosynth running git config global core excludesfile home kbuilder autosynth gitignore autosynth running git config user name yoshi automation autosynth running git config user email yoshi automation google com autosynth running git config push default simple autosynth running git branch f autosynth adexperiencereport autosynth running git checkout autosynth adexperiencereport switched to branch autosynth adexperiencereport autosynth running synthtool autosynth autosynth running tmpfs src github synthtool env bin m synthtool metadata clients ad experience report synth metadata synth py adexperiencereport tee tmpfs src github synthtool logs googleapis elixir google api is a directory synthtool executing home kbuilder cache synthtool elixir google api synth py on branch autosynth adexperiencereport nothing to commit working tree clean synthtool running docker run rm v tmpfs tmp repo workspace v var run docker sock var run docker sock e user group w workspace gcr io cloud devrel public resources scripts generate client sh adexperiencereport debug synthtool running docker run rm v tmpfs tmp repo workspace v var run docker sock var run docker sock e user group w workspace gcr io cloud devrel public resources scripts generate client sh adexperiencereport workspace workspace mix lock file was generated with a newer version of hex update your client by running mix local hex to avoid losing data resolving hex dependencies dependency resolution completed unchanged certifi google api discovery google gax hackney idna jason metrics mime mimerl parse trans poison ssl verify fun temp tesla unicode util compat getting google api discovery hex package getting tesla hex package getting hex package getting temp hex package getting jason hex package getting poison hex package getting hackney hex package getting certifi hex package getting idna hex package getting metrics hex package getting mimerl hex package getting ssl verify fun hex package getting unicode util compat hex package getting parse trans hex package getting mime hex package getting google gax hex package mix lock file was generated with a newer version of hex update your client by running mix local hex to avoid losing data temp compiling files ex generated temp app compiling parse trans compiling mimerl compiling metrics compiling unicode util compat compiling idna jason compiling files ex generated jason app warning string strip is deprecated use string trim instead workspace deps poison mix exs poison compiling files ex warning integer to char list is deprecated use integer to charlist instead lib poison encoder ex generated poison app ssl verify fun compiling files erl generated ssl verify fun app compiling certifi compiling hackney compiling files ex generated app mime compiling files ex generated mime app tesla compiling files ex generated tesla app google gax compiling files ex generated google gax app google api discovery compiling files ex generated google api discovery app google apis compiling files ex warning system cwd is deprecated use file cwd instead lib google apis publisher ex generated google apis app fetching found revision check old new generating true creating leading directories writing platformsummary to clients ad experience report lib google api ad experience report model platform summary ex writing sitesummaryresponse to clients ad experience report lib google api ad experience report model site summary response ex writing violatingsitesresponse to clients ad experience report lib google api ad experience report model violating sites response ex writing sites to clients ad experience report lib google api ad experience report api sites ex writing violatingsites to clients ad experience report lib google api ad experience report api violating sites ex writing connection ex writing metadata ex writing mix exs writing readme md writing license writing gitignore writing config config exs writing test test helper exs found only discovery revision and or formatting changes not significant enough for a pr fixing file permissions synthtool wrote metadata to clients ad experience report synth metadata debug synthtool wrote metadata to clients ad experience report synth metadata autosynth running git clean fdx removing pycache traceback most recent call last file home kbuilder pyenv versions lib runpy py line in run module as main main mod spec file home kbuilder pyenv versions lib runpy py line in run code exec code run globals file tmpfs src github synthtool autosynth synth py line in main file tmpfs src github synthtool autosynth synth py line in main return inner main temp dir file tmpfs src github synthtool autosynth synth py line in inner main synthesize base synth log path file tmpfs src github synthtool autosynth synthesizer py line in synthesize with open log file path rt as fp isadirectoryerror is a directory tmpfs src github synthtool logs googleapis elixir google api google internal developers can see the full log
| 0
|
369,240
| 25,834,701,965
|
IssuesEvent
|
2022-12-12 18:39:48
|
UCSCLibrary/ucsc-library-digital-collections
|
https://api.github.com/repos/UCSCLibrary/ucsc-library-digital-collections
|
closed
|
(1) Update github README
|
documentation housekeeping
|
The README file on github for [ucsc-library-digital-collections] is outdated.
We need to update it to remove dev_docker set up and use stack_car instead.
|
1.0
|
(1) Update github README - The README file on github for [ucsc-library-digital-collections] is outdated.
We need to update it to remove dev_docker set up and use stack_car instead.
|
non_process
|
update github readme the readme file on github for is outdated we need to update it to remove dev docker set up and use stack car instead
| 0
|
3,445
| 6,538,272,106
|
IssuesEvent
|
2017-09-01 04:53:47
|
amaster507/ifbmt
|
https://api.github.com/repos/amaster507/ifbmt
|
opened
|
Sending Updates back to KJVchurches.com
|
idea process
|
The problem with these kinds of tools is the database. For the tool to be useful the database has to be kept current. If enough missionaries are involved, maybe a simple form for correction as a pastor changes, a church closes down, or a prophet's chamber is built could help with the capture of that information. We could gain manpower in keeping it current if they had some access to make updates as they are making the call or on site. KJVchurches.com is an awesome tool. I'm not sure how updates are going except that I know who to contact if I notice something wrong.
|
1.0
|
Sending Updates back to KJVchurches.com - The problem with these kinds of tools is the database. For the tool to be useful the database has to be kept current. If enough missionaries are involved, maybe a simple form for correction as a pastor changes, a church closes down, or a prophet's chamber is built could help with the capture of that information. We could gain manpower in keeping it current if they had some access to make updates as they are making the call or on site. KJVchurches.com is an awesome tool. I'm not sure how updates are going except that I know who to contact if I notice something wrong.
|
process
|
sending updates back to kjvchurches com the problem with these kinds of tools is the database for the tool to be useful the database has to be kept current if enough missionaries are involved maybe a simple form for correction as a pastor changes a church closes down or a prophet s chamber is built could help with the capture of that information we could gain manpower in keeping it current if they had some access to make updates as they are making the call or on site kjvchurches com is an awesome tool i m not sure how updates are going except that i know who to contact if i notice something wrong
| 1
|
5,296
| 8,108,473,473
|
IssuesEvent
|
2018-08-14 01:57:24
|
rubberduck-vba/Rubberduck
|
https://api.github.com/repos/rubberduck-vba/Rubberduck
|
closed
|
Dirty designer is ignored if code-behind isn't modified
|
bug difficulty-03-duck edge-case enhancement inspection-false-positive parse-tree-processing
|
Repro:
- Add a UserForm module; Rubberduck parses.
- Add a CommandButton control to the form designer.
- Request a reparse / refresh: Rubberduck ignores the unmodified UserForm module.
- Select the command button: Rubberduck fails to see it.
We need to treat designers like "modules" and monitor their "dirtiness" separately from their code-behind. Otherwise, it's possible to have ignored content on a UserForm, and code in other modules that refer to controls on that form: this results in inspection false positives, e.g. `VariableNotDeclared` and `UnassignedVariableUsage` firing up for `UserForm1.CommandButton1`.
|
1.0
|
Dirty designer is ignored if code-behind isn't modified - Repro:
- Add a UserForm module; Rubberduck parses.
- Add a CommandButton control to the form designer.
- Request a reparse / refresh: Rubberduck ignores the unmodified UserForm module.
- Select the command button: Rubberduck fails to see it.
We need to treat designers like "modules" and monitor their "dirtiness" separately from their code-behind. Otherwise, it's possible to have ignored content on a UserForm, and code in other modules that refer to controls on that form: this results in inspection false positives, e.g. `VariableNotDeclared` and `UnassignedVariableUsage` firing up for `UserForm1.CommandButton1`.
|
process
|
dirty designer is ignored if code behind isn t modified repro add a userform module rubberduck parses add a commandbutton control to the form designer request a reparse refresh rubberduck ignores the unmodified userform module select the command button rubberduck fails to see it we need to treat designers like modules and monitor their dirtiness separately from their code behind otherwise it s possible to have ignored content on a userform and code in other modules that refer to controls on that form this results in inspection false positives e g variablenotdeclared and unassignedvariableusage firing up for
| 1
|
10,819
| 13,609,291,520
|
IssuesEvent
|
2020-09-23 04:50:45
|
googleapis/java-texttospeech
|
https://api.github.com/repos/googleapis/java-texttospeech
|
closed
|
Dependency Dashboard
|
api: texttospeech type: process
|
This issue contains a list of Renovate updates and their statuses.
## Open
These updates have all been created already. Click a checkbox below to force a retry/rebase of any.
- [ ] <!-- rebase-branch=renovate/com.google.cloud-google-cloud-texttospeech-1.x -->chore(deps): update dependency com.google.cloud:google-cloud-texttospeech to v1.2.1
---
- [ ] <!-- manual job -->Check this box to trigger a request for Renovate to run again on this repository
|
1.0
|
Dependency Dashboard - This issue contains a list of Renovate updates and their statuses.
## Open
These updates have all been created already. Click a checkbox below to force a retry/rebase of any.
- [ ] <!-- rebase-branch=renovate/com.google.cloud-google-cloud-texttospeech-1.x -->chore(deps): update dependency com.google.cloud:google-cloud-texttospeech to v1.2.1
---
- [ ] <!-- manual job -->Check this box to trigger a request for Renovate to run again on this repository
|
process
|
dependency dashboard this issue contains a list of renovate updates and their statuses open these updates have all been created already click a checkbox below to force a retry rebase of any chore deps update dependency com google cloud google cloud texttospeech to check this box to trigger a request for renovate to run again on this repository
| 1
|
16,746
| 21,912,532,429
|
IssuesEvent
|
2022-05-21 09:27:42
|
shirou/gopsutil
|
https://api.github.com/repos/shirou/gopsutil
|
closed
|
I have a Windows process that definitely exists, but I'm getting "process does not exist" error
|
os:windows package:process
|
**Describe the bug**
On Windows, when calling `NewProcess` passing a pid that exists for some processes I get "process does not exist" error, whereas the process definitely exists.
**To Reproduce**
This happens to some processes only, it works as exepcted for most of the processes.
```go
package main
import (
"fmt"
"github.com/shirou/gopsutil/v3/process"
)
func findPid(pid int32) {
if pids, err := process.Pids(); err != nil {
fmt.Printf("error calling Pids: %v\n", pid, err)
} else {
pidFound := false
for _, c := range pids {
if c == pid {
pidFound = true
break
}
}
fmt.Printf("Pid %d found: %v\n", pid, pidFound)
}
}
func callNewProcess(pid int32) {
if p, err := process.NewProcess(pid); err != nil {
fmt.Printf("error calling NewProcess for pid %d: %v\n", pid, err)
} else {
fmt.Printf("ok calling NewProcess for pid %d. Result: %v\n", pid, p)
}
}
func main() {
pid := int32(6756)
findPid(pid)
callNewProcess(pid)
findPid(pid)
callNewProcess(pid)
}
```
Output:
```
Pid 6756 found: true
error calling NewProcess for pid 6756: process does not exist
Pid 6756 found: true
error calling NewProcess for pid 6756: process does not exist
```
**Expected behavior**
Since the pid and the process exist I expect the NewProcess call to succeed.
**Environment (please complete the following information):**
- Windows: Microsoft Windows [Version 10.0.14393]
**Additional context**
This is happening with some but not all VirtualBox Headless Frontend processes. I can see the process in the Process Explorer, I can also kill it form there if I like, as far as I can see it is no different from other processes. Process Explorer marks this process as "packed" and the command line for the process as displayed by the process explorer does not start with the executable name, which is a difference from most processes. Some pictures are below.


|
1.0
|
I have a Windows process that definitely exists, but I'm getting "process does not exist" error - **Describe the bug**
On Windows, when calling `NewProcess` passing a pid that exists for some processes I get "process does not exist" error, whereas the process definitely exists.
**To Reproduce**
This happens to some processes only, it works as exepcted for most of the processes.
```go
package main
import (
"fmt"
"github.com/shirou/gopsutil/v3/process"
)
func findPid(pid int32) {
if pids, err := process.Pids(); err != nil {
fmt.Printf("error calling Pids: %v\n", pid, err)
} else {
pidFound := false
for _, c := range pids {
if c == pid {
pidFound = true
break
}
}
fmt.Printf("Pid %d found: %v\n", pid, pidFound)
}
}
func callNewProcess(pid int32) {
if p, err := process.NewProcess(pid); err != nil {
fmt.Printf("error calling NewProcess for pid %d: %v\n", pid, err)
} else {
fmt.Printf("ok calling NewProcess for pid %d. Result: %v\n", pid, p)
}
}
func main() {
pid := int32(6756)
findPid(pid)
callNewProcess(pid)
findPid(pid)
callNewProcess(pid)
}
```
Output:
```
Pid 6756 found: true
error calling NewProcess for pid 6756: process does not exist
Pid 6756 found: true
error calling NewProcess for pid 6756: process does not exist
```
**Expected behavior**
Since the pid and the process exist I expect the NewProcess call to succeed.
**Environment (please complete the following information):**
- Windows: Microsoft Windows [Version 10.0.14393]
**Additional context**
This is happening with some but not all VirtualBox Headless Frontend processes. I can see the process in the Process Explorer, I can also kill it form there if I like, as far as I can see it is no different from other processes. Process Explorer marks this process as "packed" and the command line for the process as displayed by the process explorer does not start with the executable name, which is a difference from most processes. Some pictures are below.


|
process
|
i have a windows process that definitely exists but i m getting process does not exist error describe the bug on windows when calling newprocess passing a pid that exists for some processes i get process does not exist error whereas the process definitely exists to reproduce this happens to some processes only it works as exepcted for most of the processes go package main import fmt github com shirou gopsutil process func findpid pid if pids err process pids err nil fmt printf error calling pids v n pid err else pidfound false for c range pids if c pid pidfound true break fmt printf pid d found v n pid pidfound func callnewprocess pid if p err process newprocess pid err nil fmt printf error calling newprocess for pid d v n pid err else fmt printf ok calling newprocess for pid d result v n pid p func main pid findpid pid callnewprocess pid findpid pid callnewprocess pid output pid found true error calling newprocess for pid process does not exist pid found true error calling newprocess for pid process does not exist expected behavior since the pid and the process exist i expect the newprocess call to succeed environment please complete the following information windows microsoft windows additional context this is happening with some but not all virtualbox headless frontend processes i can see the process in the process explorer i can also kill it form there if i like as far as i can see it is no different from other processes process explorer marks this process as packed and the command line for the process as displayed by the process explorer does not start with the executable name which is a difference from most processes some pictures are below
| 1
|
16,526
| 21,554,040,328
|
IssuesEvent
|
2022-04-30 05:07:34
|
NationalSecurityAgency/ghidra
|
https://api.github.com/repos/NationalSecurityAgency/ghidra
|
closed
|
Wrong addresses with AVR8
|
Feature: Processor/Atmel
|
When decompiling ATmega328 app which is AVR5 with AVR8 (this is the closest that Ghidra provides) I get wrong addresses in code.
It sometimes shows the data at address formatted like this code:[address].1
When this adds up multiple times you eventually end up with completely different addresses.
Is this intentional? Can it be switched somewhere?
Wrong address offset in Ghidra shows 0x5C

Same file, same place but in Okteta shows 0xB8

Language info from Ghidra

The decompiled file shown in screenshots can be downloaded here:
[gateway.ino.eightanaloginputs.bin.zip](https://github.com/NationalSecurityAgency/ghidra/files/7274485/gateway.ino.eightanaloginputs.bin.zip)
|
1.0
|
Wrong addresses with AVR8 - When decompiling ATmega328 app which is AVR5 with AVR8 (this is the closest that Ghidra provides) I get wrong addresses in code.
It sometimes shows the data at address formatted like this code:[address].1
When this adds up multiple times you eventually end up with completely different addresses.
Is this intentional? Can it be switched somewhere?
Wrong address offset in Ghidra shows 0x5C

Same file, same place but in Okteta shows 0xB8

Language info from Ghidra

The decompiled file shown in screenshots can be downloaded here:
[gateway.ino.eightanaloginputs.bin.zip](https://github.com/NationalSecurityAgency/ghidra/files/7274485/gateway.ino.eightanaloginputs.bin.zip)
|
process
|
wrong addresses with when decompiling app which is with this is the closest that ghidra provides i get wrong addresses in code it sometimes shows the data at address formatted like this code when this adds up multiple times you eventually end up with completely different addresses is this intentional can it be switched somewhere wrong address offset in ghidra shows same file same place but in okteta shows language info from ghidra the decompiled file shown in screenshots can be downloaded here
| 1
|
355,781
| 10,584,710,108
|
IssuesEvent
|
2019-10-08 15:57:12
|
AY1920S1-CS2113T-W12-4/main
|
https://api.github.com/repos/AY1920S1-CS2113T-W12-4/main
|
opened
|
As a user, I can see live updates when i add a new task
|
priority.High type.Story
|
so that I can see the tasks I have and compare on easily.
|
1.0
|
As a user, I can see live updates when i add a new task - so that I can see the tasks I have and compare on easily.
|
non_process
|
as a user i can see live updates when i add a new task so that i can see the tasks i have and compare on easily
| 0
|
16,878
| 22,157,499,385
|
IssuesEvent
|
2022-06-04 02:33:12
|
hashgraph/hedera-json-rpc-relay
|
https://api.github.com/repos/hashgraph/hedera-json-rpc-relay
|
closed
|
Add artifact build and upload to 0.1 release branch
|
enhancement P2 process
|
### Problem
`release/0.1` is missing logic to archive and upload the npm package.
### Solution
Add logic to archive and upload artifact
### Alternatives
Use github npm package creation flow. Maybe in 0.2.0
|
1.0
|
Add artifact build and upload to 0.1 release branch - ### Problem
`release/0.1` is missing logic to archive and upload the npm package.
### Solution
Add logic to archive and upload artifact
### Alternatives
Use github npm package creation flow. Maybe in 0.2.0
|
process
|
add artifact build and upload to release branch problem release is missing logic to archive and upload the npm package solution add logic to archive and upload artifact alternatives use github npm package creation flow maybe in
| 1
|
125,639
| 17,836,503,494
|
IssuesEvent
|
2021-09-03 02:22:15
|
alpersonalwebsite/react-state-fetch
|
https://api.github.com/repos/alpersonalwebsite/react-state-fetch
|
opened
|
CVE-2021-3664 (Medium) detected in url-parse-1.4.7.tgz
|
security vulnerability
|
## CVE-2021-3664 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.4.7.tgz</b></p></summary>
<p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p>
<p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz</a></p>
<p>Path to dependency file: react-state-fetch/package.json</p>
<p>Path to vulnerable library: react-state-fetch/node_modules/url-parse/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.3.0.tgz (Root Library)
- webpack-dev-server-3.9.0.tgz
- sockjs-client-1.4.0.tgz
- :x: **url-parse-1.4.7.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
url-parse is vulnerable to URL Redirection to Untrusted Site
<p>Publish Date: 2021-07-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3664>CVE-2021-3664</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3664</a></p>
<p>Release Date: 2021-07-26</p>
<p>Fix Resolution: url-parse - 1.5.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2021-3664 (Medium) detected in url-parse-1.4.7.tgz - ## CVE-2021-3664 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.4.7.tgz</b></p></summary>
<p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p>
<p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.4.7.tgz</a></p>
<p>Path to dependency file: react-state-fetch/package.json</p>
<p>Path to vulnerable library: react-state-fetch/node_modules/url-parse/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-3.3.0.tgz (Root Library)
- webpack-dev-server-3.9.0.tgz
- sockjs-client-1.4.0.tgz
- :x: **url-parse-1.4.7.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
url-parse is vulnerable to URL Redirection to Untrusted Site
<p>Publish Date: 2021-07-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3664>CVE-2021-3664</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3664">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3664</a></p>
<p>Release Date: 2021-07-26</p>
<p>Fix Resolution: url-parse - 1.5.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
cve medium detected in url parse tgz cve medium severity vulnerability vulnerable library url parse tgz small footprint url parser that works seamlessly across node js and browser environments library home page a href path to dependency file react state fetch package json path to vulnerable library react state fetch node modules url parse package json dependency hierarchy react scripts tgz root library webpack dev server tgz sockjs client tgz x url parse tgz vulnerable library found in base branch master vulnerability details url parse is vulnerable to url redirection to untrusted site publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution url parse step up your open source security game with whitesource
| 0
|
9,988
| 13,037,721,917
|
IssuesEvent
|
2020-07-28 14:13:32
|
RockefellerArchiveCenter/request_broker
|
https://api.github.com/repos/RockefellerArchiveCenter/request_broker
|
closed
|
Process data for reading room requests
|
process request
|
## Describe the solution you'd like
Given a list of AS URIs, fetch additional data, parse submittable requests from unsubmittable ones, and return a list of dicts which conform to specs for request data.
This should happen in the `ProcessRequest` `process_readingroom_request` method.
|
1.0
|
Process data for reading room requests - ## Describe the solution you'd like
Given a list of AS URIs, fetch additional data, parse submittable requests from unsubmittable ones, and return a list of dicts which conform to specs for request data.
This should happen in the `ProcessRequest` `process_readingroom_request` method.
|
process
|
process data for reading room requests describe the solution you d like given a list of as uris fetch additional data parse submittable requests from unsubmittable ones and return a list of dicts which conform to specs for request data this should happen in the processrequest process readingroom request method
| 1
|
13,932
| 16,700,107,956
|
IssuesEvent
|
2021-06-09 00:11:27
|
qgis/QGIS
|
https://api.github.com/repos/qgis/QGIS
|
closed
|
error at the end of SAGA logs
|
Bug Processing Regression
|
Author Name: **Giovanni Manghi** (@gioman)
Original Redmine Issue: [21530](https://issues.qgis.org/issues/21530)
Affected QGIS version: 3.6.0
Redmine category:processing/saga
---
On 3.6 at the end of logs of SAGA tools (tested a few tools for rasters/dems) a message like the following will show
Loading resulting layers
The following layers were not correctly generated.<ul><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/0f148c064e624b7e815a936a301e85a3/C_GENE.sdat</li><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/65c98a4ab4f047c99b8ddec8093d9d84/SLOPE.sdat</li><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/f36ee388fb4340c181b64c2e56f0e081/ASPECT.sdat</li></ul>You can check the 'Log Messages Panel' in QGIS main window to find more information about the execution of the algorithm.
the outputs are created and added to the map, but anyway this seems wrong (and does not happen on 3.4.5).
---
Related issue(s): #29339 (relates)
Redmine related issue(s): [21523](https://issues.qgis.org/issues/21523)
---
|
1.0
|
error at the end of SAGA logs - Author Name: **Giovanni Manghi** (@gioman)
Original Redmine Issue: [21530](https://issues.qgis.org/issues/21530)
Affected QGIS version: 3.6.0
Redmine category:processing/saga
---
On 3.6 at the end of logs of SAGA tools (tested a few tools for rasters/dems) a message like the following will show
Loading resulting layers
The following layers were not correctly generated.<ul><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/0f148c064e624b7e815a936a301e85a3/C_GENE.sdat</li><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/65c98a4ab4f047c99b8ddec8093d9d84/SLOPE.sdat</li><li>C:/Users/qgis/AppData/Local/Temp/processing_78672142d2a448ee80c46f3c600901c9/f36ee388fb4340c181b64c2e56f0e081/ASPECT.sdat</li></ul>You can check the 'Log Messages Panel' in QGIS main window to find more information about the execution of the algorithm.
the outputs are created and added to the map, but anyway this seems wrong (and does not happen on 3.4.5).
---
Related issue(s): #29339 (relates)
Redmine related issue(s): [21523](https://issues.qgis.org/issues/21523)
---
|
process
|
error at the end of saga logs author name giovanni manghi gioman original redmine issue affected qgis version redmine category processing saga on at the end of logs of saga tools tested a few tools for rasters dems a message like the following will show loading resulting layers the following layers were not correctly generated c users qgis appdata local temp processing c gene sdat c users qgis appdata local temp processing slope sdat c users qgis appdata local temp processing aspect sdat you can check the log messages panel in qgis main window to find more information about the execution of the algorithm the outputs are created and added to the map but anyway this seems wrong and does not happen on related issue s relates redmine related issue s
| 1
|
735
| 3,214,317,073
|
IssuesEvent
|
2015-10-07 00:46:22
|
broadinstitute/hellbender-dataflow
|
https://api.github.com/repos/broadinstitute/hellbender-dataflow
|
opened
|
Choose approach to fix scaling of ReadBAMTransform, and implement fix
|
Dataflow DataflowPreprocessingPipeline profiling
|
_From @droazen on July 27, 2015 17:39_
From an analysis by @jean-philippe-martin:
**The Problem**
Doing a preliminary performance analysis of Hellbender, I found that ReadBAM did not scale with the number of workers.

Logs indicated it was running on a single worker, regardless of how many were specified for the job.
**The Cause**
The underlying cause is a combination of ReadBAM's design and Dataflow's own perhaps over-eager optimization.
ReadBAM is implemented as a series of transforms. It could also have been implemented as a Dataflow BoundedSource, but the latter is much more complicated.
The transforms are as follows:
Start with a collection of filenames and a collection of contigs.
Transform 1 -- input: filenames, side input: contigs. Generates a list of regions to read ("BAMShard")
Transform 2 -- input: `PCollection<BAMShard>`, output: `PCollection<Read>`. Each worker reads from the BAM file, using the index to find where to read from.
Dataflow sees that transform 2 takes as input transform 1's output, and so these two can be run in sequence on the same machines, skipping a serialization/deserialization step. This optimization is called "fusing" and it's generally a very good thing.
However in this case, the input PCollection has a single element (the file we want to read), so only one worker is involved. Because of the fusion, that same worker then ends up doing all of the reading work, ruining our day.
**The Solutions**
There are multiple ways to solve this problem.
1. change transform 1 to have the contig collection as a primary input in the hope that we always have more than one contig.
This solution's very brittle (our benchmark, for example, reads a single chromosome so the contig list has effectively only one element). I did not pursue it.
2. Insert a groupby step between the two transforms.
pro: this gets all the workers involved again
con: the groupby itself takes some time, unnecessarily.
3. Compute the BAMShards at the client and then send those to workers.
pro: this gets all the workers involved again, and they do not have to spend any time on groupby
con: an existing Dataflow bug will cause the program to crash if the shard list is too long. We can work around this, though, by increasing the shard size when we have many.
4. Bite the bullet and implement a BoundedSource.
I implemented solutions 2 and 3. Solution 3 is the fastest. I suspect solution 4 wouldn't be any faster, though it would be more idiomatic for Dataflow. The graph below shows the time in the Dataflow Read phase with the new code when using the groupby method (this includes sharding, groupby, and actually reading the BAM file).

Next Steps
The next step is to pick either solution 3 or 4 (or 2, I suppose, if we want to be expedient). If 3, then we need to change the sharding to deal with large files. If 4, then we need to spend the time and effort writing the new source (and of course testing that it scales as we're expecting).
Comments & feedback welcome!
_Copied from original issue: broadinstitute/hellbender#756_
|
1.0
|
Choose approach to fix scaling of ReadBAMTransform, and implement fix - _From @droazen on July 27, 2015 17:39_
From an analysis by @jean-philippe-martin:
**The Problem**
Doing a preliminary performance analysis of Hellbender, I found that ReadBAM did not scale with the number of workers.

Logs indicated it was running on a single worker, regardless of how many were specified for the job.
**The Cause**
The underlying cause is a combination of ReadBAM's design and Dataflow's own perhaps over-eager optimization.
ReadBAM is implemented as a series of transforms. It could also have been implemented as a Dataflow BoundedSource, but the latter is much more complicated.
The transforms are as follows:
Start with a collection of filenames and a collection of contigs.
Transform 1 -- input: filenames, side input: contigs. Generates a list of regions to read ("BAMShard")
Transform 2 -- input: `PCollection<BAMShard>`, output: `PCollection<Read>`. Each worker reads from the BAM file, using the index to find where to read from.
Dataflow sees that transform 2 takes as input transform 1's output, and so these two can be run in sequence on the same machines, skipping a serialization/deserialization step. This optimization is called "fusing" and it's generally a very good thing.
However in this case, the input PCollection has a single element (the file we want to read), so only one worker is involved. Because of the fusion, that same worker then ends up doing all of the reading work, ruining our day.
**The Solutions**
There are multiple ways to solve this problem.
1. change transform 1 to have the contig collection as a primary input in the hope that we always have more than one contig.
This solution's very brittle (our benchmark, for example, reads a single chromosome so the contig list has effectively only one element). I did not pursue it.
2. Insert a groupby step between the two transforms.
pro: this gets all the workers involved again
con: the groupby itself takes some time, unnecessarily.
3. Compute the BAMShards at the client and then send those to workers.
pro: this gets all the workers involved again, and they do not have to spend any time on groupby
con: an existing Dataflow bug will cause the program to crash if the shard list is too long. We can work around this, though, by increasing the shard size when we have many.
4. Bite the bullet and implement a BoundedSource.
I implemented solutions 2 and 3. Solution 3 is the fastest. I suspect solution 4 wouldn't be any faster, though it would be more idiomatic for Dataflow. The graph below shows the time in the Dataflow Read phase with the new code when using the groupby method (this includes sharding, groupby, and actually reading the BAM file).

Next Steps
The next step is to pick either solution 3 or 4 (or 2, I suppose, if we want to be expedient). If 3, then we need to change the sharding to deal with large files. If 4, then we need to spend the time and effort writing the new source (and of course testing that it scales as we're expecting).
Comments & feedback welcome!
_Copied from original issue: broadinstitute/hellbender#756_
|
process
|
choose approach to fix scaling of readbamtransform and implement fix from droazen on july from an analysis by jean philippe martin the problem doing a preliminary performance analysis of hellbender i found that readbam did not scale with the number of workers logs indicated it was running on a single worker regardless of how many were specified for the job the cause the underlying cause is a combination of readbam s design and dataflow s own perhaps over eager optimization readbam is implemented as a series of transforms it could also have been implemented as a dataflow boundedsource but the latter is much more complicated the transforms are as follows start with a collection of filenames and a collection of contigs transform input filenames side input contigs generates a list of regions to read bamshard transform input pcollection output pcollection each worker reads from the bam file using the index to find where to read from dataflow sees that transform takes as input transform s output and so these two can be run in sequence on the same machines skipping a serialization deserialization step this optimization is called fusing and it s generally a very good thing however in this case the input pcollection has a single element the file we want to read so only one worker is involved because of the fusion that same worker then ends up doing all of the reading work ruining our day the solutions there are multiple ways to solve this problem change transform to have the contig collection as a primary input in the hope that we always have more than one contig this solution s very brittle our benchmark for example reads a single chromosome so the contig list has effectively only one element i did not pursue it insert a groupby step between the two transforms pro this gets all the workers involved again con the groupby itself takes some time unnecessarily compute the bamshards at the client and then send those to workers pro this gets all the workers involved again and they do not have to spend any time on groupby con an existing dataflow bug will cause the program to crash if the shard list is too long we can work around this though by increasing the shard size when we have many bite the bullet and implement a boundedsource i implemented solutions and solution is the fastest i suspect solution wouldn t be any faster though it would be more idiomatic for dataflow the graph below shows the time in the dataflow read phase with the new code when using the groupby method this includes sharding groupby and actually reading the bam file next steps the next step is to pick either solution or or i suppose if we want to be expedient if then we need to change the sharding to deal with large files if then we need to spend the time and effort writing the new source and of course testing that it scales as we re expecting comments feedback welcome copied from original issue broadinstitute hellbender
| 1
|
750,399
| 26,200,680,042
|
IssuesEvent
|
2023-01-03 17:10:16
|
yugabyte/yugabyte-db
|
https://api.github.com/repos/yugabyte/yugabyte-db
|
closed
|
[CDCSDK + Connector] MySQL Driver not found on latest debezium connector.
|
kind/bug priority/medium area/cdcsdk status/awaiting-triage
|
Jira Link: [DB-4777](https://yugabyte.atlassian.net/browse/DB-4777)
### Description
MySQL Driver not found on latest debezium connector.
```
ERROR || WorkerSinkTask{id=jdbc-sink-test_cdc_264f4f-8} Task threw an uncaught and unrecoverable exception. Task is being killed and will not recover until manually restarted. Error: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo [org.apache.kafka.connect.runtime.WorkerSinkTask]
org.apache.kafka.connect.errors.ConnectException: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo
at io.confluent.connect.jdbc.util.CachedConnectionProvider.getConnection(CachedConnectionProvider.java:59)
at io.confluent.connect.jdbc.sink.JdbcDbWriter.write(JdbcDbWriter.java:64)
at io.confluent.connect.jdbc.sink.JdbcSinkTask.put(JdbcSinkTask.java:84)
at org.apache.kafka.connect.runtime.WorkerSinkTask.deliverMessages(WorkerSinkTask.java:581)
at org.apache.kafka.connect.runtime.WorkerSinkTask.poll(WorkerSinkTask.java:333)
at org.apache.kafka.connect.runtime.WorkerSinkTask.iteration(WorkerSinkTask.java:234)
at org.apache.kafka.connect.runtime.WorkerSinkTask.execute(WorkerSinkTask.java:203)
at org.apache.kafka.connect.runtime.WorkerTask.doRun(WorkerTask.java:188)
at org.apache.kafka.connect.runtime.WorkerTask.run(WorkerTask.java:243)
at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo
at java.sql/java.sql.DriverManager.getConnection(DriverManager.java:702)
at java.sql/java.sql.DriverManager.getConnection(DriverManager.java:189)
at io.confluent.connect.jdbc.dialect.GenericDatabaseDialect.getConnection(GenericDatabaseDialect.java:250)
at io.confluent.connect.jdbc.util.CachedConnectionProvider.newConnection(CachedConnectionProvider.java:80)
at io.confluent.connect.jdbc.util.CachedConnectionProvider.getConnection(CachedConnectionProvider.java:52)
... 13 more
```
|
1.0
|
[CDCSDK + Connector] MySQL Driver not found on latest debezium connector. - Jira Link: [DB-4777](https://yugabyte.atlassian.net/browse/DB-4777)
### Description
MySQL Driver not found on latest debezium connector.
```
ERROR || WorkerSinkTask{id=jdbc-sink-test_cdc_264f4f-8} Task threw an uncaught and unrecoverable exception. Task is being killed and will not recover until manually restarted. Error: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo [org.apache.kafka.connect.runtime.WorkerSinkTask]
org.apache.kafka.connect.errors.ConnectException: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo
at io.confluent.connect.jdbc.util.CachedConnectionProvider.getConnection(CachedConnectionProvider.java:59)
at io.confluent.connect.jdbc.sink.JdbcDbWriter.write(JdbcDbWriter.java:64)
at io.confluent.connect.jdbc.sink.JdbcSinkTask.put(JdbcSinkTask.java:84)
at org.apache.kafka.connect.runtime.WorkerSinkTask.deliverMessages(WorkerSinkTask.java:581)
at org.apache.kafka.connect.runtime.WorkerSinkTask.poll(WorkerSinkTask.java:333)
at org.apache.kafka.connect.runtime.WorkerSinkTask.iteration(WorkerSinkTask.java:234)
at org.apache.kafka.connect.runtime.WorkerSinkTask.execute(WorkerSinkTask.java:203)
at org.apache.kafka.connect.runtime.WorkerTask.doRun(WorkerTask.java:188)
at org.apache.kafka.connect.runtime.WorkerTask.run(WorkerTask.java:243)
at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.sql.SQLException: No suitable driver found for jdbc:mysql://172.151.30.117:3306/demo?user=demo&password=demo
at java.sql/java.sql.DriverManager.getConnection(DriverManager.java:702)
at java.sql/java.sql.DriverManager.getConnection(DriverManager.java:189)
at io.confluent.connect.jdbc.dialect.GenericDatabaseDialect.getConnection(GenericDatabaseDialect.java:250)
at io.confluent.connect.jdbc.util.CachedConnectionProvider.newConnection(CachedConnectionProvider.java:80)
at io.confluent.connect.jdbc.util.CachedConnectionProvider.getConnection(CachedConnectionProvider.java:52)
... 13 more
```
|
non_process
|
mysql driver not found on latest debezium connector jira link description mysql driver not found on latest debezium connector error workersinktask id jdbc sink test cdc task threw an uncaught and unrecoverable exception task is being killed and will not recover until manually restarted error java sql sqlexception no suitable driver found for jdbc mysql demo user demo password demo org apache kafka connect errors connectexception java sql sqlexception no suitable driver found for jdbc mysql demo user demo password demo at io confluent connect jdbc util cachedconnectionprovider getconnection cachedconnectionprovider java at io confluent connect jdbc sink jdbcdbwriter write jdbcdbwriter java at io confluent connect jdbc sink jdbcsinktask put jdbcsinktask java at org apache kafka connect runtime workersinktask delivermessages workersinktask java at org apache kafka connect runtime workersinktask poll workersinktask java at org apache kafka connect runtime workersinktask iteration workersinktask java at org apache kafka connect runtime workersinktask execute workersinktask java at org apache kafka connect runtime workertask dorun workertask java at org apache kafka connect runtime workertask run workertask java at java base java util concurrent executors runnableadapter call executors java at java base java util concurrent futuretask run futuretask java at java base java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java base java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java base java lang thread run thread java caused by java sql sqlexception no suitable driver found for jdbc mysql demo user demo password demo at java sql java sql drivermanager getconnection drivermanager java at java sql java sql drivermanager getconnection drivermanager java at io confluent connect jdbc dialect genericdatabasedialect getconnection genericdatabasedialect java at io confluent connect jdbc util cachedconnectionprovider newconnection cachedconnectionprovider java at io confluent connect jdbc util cachedconnectionprovider getconnection cachedconnectionprovider java more
| 0
|
3,904
| 6,823,010,833
|
IssuesEvent
|
2017-11-07 22:07:00
|
Great-Hill-Corporation/quickBlocks
|
https://api.github.com/repos/Great-Hill-Corporation/quickBlocks
|
closed
|
whenBlock modes clearly identified
|
status-inprocess tools-whenBlock type-enhancement
|
As we did with other commands, we need to clarify in the help that we can work in 2 modes with this tool:
1) Search mode
2) List mode
This is just an improvement at help message.
|
1.0
|
whenBlock modes clearly identified - As we did with other commands, we need to clarify in the help that we can work in 2 modes with this tool:
1) Search mode
2) List mode
This is just an improvement at help message.
|
process
|
whenblock modes clearly identified as we did with other commands we need to clarify in the help that we can work in modes with this tool search mode list mode this is just an improvement at help message
| 1
|
10,284
| 13,133,400,760
|
IssuesEvent
|
2020-08-06 20:50:42
|
ORNL-AMO/AMO-Tools-Desktop
|
https://api.github.com/repos/ORNL-AMO/AMO-Tools-Desktop
|
closed
|
O2 Enrichment Old Assessments
|
Calculator Process Heating
|
Handle saved 02 enrichment data from PHAST assessments before the refactor
|
1.0
|
O2 Enrichment Old Assessments - Handle saved 02 enrichment data from PHAST assessments before the refactor
|
process
|
enrichment old assessments handle saved enrichment data from phast assessments before the refactor
| 1
|
4,841
| 7,735,307,722
|
IssuesEvent
|
2018-05-27 13:45:54
|
rubberduck-vba/Rubberduck
|
https://api.github.com/repos/rubberduck-vba/Rubberduck
|
opened
|
VB6 COM documentation issues
|
parse-tree-preprocessing vb6-specific
|
Several type libraries commonly used by VB6 fail to fully load COM documentation, leading to names not being set. Need to examine how OleWoo handles these so that references are loaded correctly.
|
1.0
|
VB6 COM documentation issues - Several type libraries commonly used by VB6 fail to fully load COM documentation, leading to names not being set. Need to examine how OleWoo handles these so that references are loaded correctly.
|
process
|
com documentation issues several type libraries commonly used by fail to fully load com documentation leading to names not being set need to examine how olewoo handles these so that references are loaded correctly
| 1
|
22,387
| 31,142,285,528
|
IssuesEvent
|
2023-08-16 01:44:13
|
cypress-io/cypress
|
https://api.github.com/repos/cypress-io/cypress
|
closed
|
Flaky test: can delay with deprecated delayMs param
|
process: flaky test topic: flake ❄️ stage: fire watch priority: low topic: net_stubbing.cy.ts stale
|
### Link to dashboard or CircleCI failure
https://dashboard.cypress.io/projects/ypt4pf/runs/38062/test-results/c2ca2d5b-7b08-40ba-80cb-35adcc3a1dcc
### Link to failing test in GitHub
https://github.com/cypress-io/cypress/blob/develop/packages/driver/cypress/e2e/commands/net_stubbing.cy.ts#L1689
### Analysis
<img width="430" alt="Screen Shot 2022-08-17 at 11 02 53 AM" src="https://user-images.githubusercontent.com/26726429/185210518-357341ca-98a1-45b9-9458-faff2d6db4d5.png">
### Cypress Version
10.4.0
### Other
Search for this issue number in the codebase to find the test(s) skipped until this issue is fixed
|
1.0
|
Flaky test: can delay with deprecated delayMs param - ### Link to dashboard or CircleCI failure
https://dashboard.cypress.io/projects/ypt4pf/runs/38062/test-results/c2ca2d5b-7b08-40ba-80cb-35adcc3a1dcc
### Link to failing test in GitHub
https://github.com/cypress-io/cypress/blob/develop/packages/driver/cypress/e2e/commands/net_stubbing.cy.ts#L1689
### Analysis
<img width="430" alt="Screen Shot 2022-08-17 at 11 02 53 AM" src="https://user-images.githubusercontent.com/26726429/185210518-357341ca-98a1-45b9-9458-faff2d6db4d5.png">
### Cypress Version
10.4.0
### Other
Search for this issue number in the codebase to find the test(s) skipped until this issue is fixed
|
process
|
flaky test can delay with deprecated delayms param link to dashboard or circleci failure link to failing test in github analysis img width alt screen shot at am src cypress version other search for this issue number in the codebase to find the test s skipped until this issue is fixed
| 1
|
12,616
| 15,014,722,755
|
IssuesEvent
|
2021-02-01 07:08:40
|
GoogleCloudPlatform/fda-mystudies
|
https://api.github.com/repos/GoogleCloudPlatform/fda-mystudies
|
closed
|
[PM] Title is getting highlighted
|
Bug P2 Participant manager Process: Fixed Process: Tested dev
|
AR : Title is getting highlighted when user mouse hovered on the page title for the following screens
1. Add new location
2. About
3. Terms of service
ER : Title should not be highlighted

|
2.0
|
[PM] Title is getting highlighted - AR : Title is getting highlighted when user mouse hovered on the page title for the following screens
1. Add new location
2. About
3. Terms of service
ER : Title should not be highlighted

|
process
|
title is getting highlighted ar title is getting highlighted when user mouse hovered on the page title for the following screens add new location about terms of service er title should not be highlighted
| 1
|
8,995
| 12,104,497,279
|
IssuesEvent
|
2020-04-20 20:19:30
|
hashgraph/hedera-mirror-node
|
https://api.github.com/repos/hashgraph/hedera-mirror-node
|
closed
|
Kubernetes: API Gateway
|
P2 enhancement process
|
**Problem**
Mirror node needs a reverse proxy/API Gateway in Kubernetes to route requests, load balance, canary rollouts, connection limits, throttling, etc. There are a lot of such solutions making comparison difficult. My [research](https://medium.com/flant-com/comparing-ingress-controllers-for-kubernetes-9b397483b46b) indicates that either Traefik or Kubernetes Ingress Controller are best suited for our needs.
**Solution**
- Add an API Gateway
- Listen on ports 80, 443 and 5600
- Redirect path `/api/v1` on 80 and 443 to mirror-rest
- Redirect path `/grafana` on 80 and 443 to grafana
- Redirect remaining paths on 80, 443l, 5600 to mirror-grpc
- Set connection limits
- Research TLS termination and Let's Encrypt
**Alternatives**
**Additional Context**
|
1.0
|
Kubernetes: API Gateway - **Problem**
Mirror node needs a reverse proxy/API Gateway in Kubernetes to route requests, load balance, canary rollouts, connection limits, throttling, etc. There are a lot of such solutions making comparison difficult. My [research](https://medium.com/flant-com/comparing-ingress-controllers-for-kubernetes-9b397483b46b) indicates that either Traefik or Kubernetes Ingress Controller are best suited for our needs.
**Solution**
- Add an API Gateway
- Listen on ports 80, 443 and 5600
- Redirect path `/api/v1` on 80 and 443 to mirror-rest
- Redirect path `/grafana` on 80 and 443 to grafana
- Redirect remaining paths on 80, 443l, 5600 to mirror-grpc
- Set connection limits
- Research TLS termination and Let's Encrypt
**Alternatives**
**Additional Context**
|
process
|
kubernetes api gateway problem mirror node needs a reverse proxy api gateway in kubernetes to route requests load balance canary rollouts connection limits throttling etc there are a lot of such solutions making comparison difficult my indicates that either traefik or kubernetes ingress controller are best suited for our needs solution add an api gateway listen on ports and redirect path api on and to mirror rest redirect path grafana on and to grafana redirect remaining paths on to mirror grpc set connection limits research tls termination and let s encrypt alternatives additional context
| 1
|
3,764
| 6,735,271,181
|
IssuesEvent
|
2017-10-18 21:07:29
|
macattackftw/IntergalacticLifelineI
|
https://api.github.com/repos/macattackftw/IntergalacticLifelineI
|
opened
|
Markov Decision Process
|
Initial Strategy Classification Markov Decision Process
|
Implement a Markov Decision Process to classify replays in an online manner. Try unsupervised training first until labels become available for subset of the replays.
|| Research | Development | Testing/Tuning |
| :-----: | :------------: | :---------------: | :------------------: |
| Status | In progress | Todo | Todo |
| Time | 30m | ~ | ~ |
| Estimated | 3h | 9h | 8h |
|
1.0
|
Markov Decision Process - Implement a Markov Decision Process to classify replays in an online manner. Try unsupervised training first until labels become available for subset of the replays.
|| Research | Development | Testing/Tuning |
| :-----: | :------------: | :---------------: | :------------------: |
| Status | In progress | Todo | Todo |
| Time | 30m | ~ | ~ |
| Estimated | 3h | 9h | 8h |
|
process
|
markov decision process implement a markov decision process to classify replays in an online manner try unsupervised training first until labels become available for subset of the replays research development testing tuning status in progress todo todo time estimated
| 1
|
667,561
| 22,493,017,325
|
IssuesEvent
|
2022-06-23 04:17:51
|
Marri/glowfic
|
https://api.github.com/repos/Marri/glowfic
|
closed
|
Editing icons/characters does not update flat views
|
type: bug type: idea 2. high priority 8. medium
|
Check on this. I don't recall if they do or not. I don't expect they would, skipping validations, but maybe they do.
|
1.0
|
Editing icons/characters does not update flat views - Check on this. I don't recall if they do or not. I don't expect they would, skipping validations, but maybe they do.
|
non_process
|
editing icons characters does not update flat views check on this i don t recall if they do or not i don t expect they would skipping validations but maybe they do
| 0
|
214,202
| 7,267,768,985
|
IssuesEvent
|
2018-02-20 07:14:51
|
webcompat/web-bugs
|
https://api.github.com/repos/webcompat/web-bugs
|
closed
|
www.news18.com - video or audio doesn't play
|
browser-firefox priority-normal status-needsinfo
|
<!-- @browser: Firefox 60.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0 -->
<!-- @reported_with: desktop-reporter -->
**URL**: http://www.news18.com/livetv/
**Browser / Version**: Firefox 60.0
**Operating System**: Windows 10
**Tested Another Browser**: Yes
**Problem type**: Video or audio doesn't play
**Description**: The Video and Audio not playing
**Steps to Reproduce**:
CNN IBN Indian News Channel Live TV Streaming not working
gfx.webrender.all: false
gfx.webrender.blob-images: 1
gfx.webrender.enabled: false
image.mem.shared: 2
[](https://webcompat.com/uploads/2018/2/3a53f2f6-58b7-4a2f-951d-152c724acd07.jpg)
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
1.0
|
www.news18.com - video or audio doesn't play - <!-- @browser: Firefox 60.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0 -->
<!-- @reported_with: desktop-reporter -->
**URL**: http://www.news18.com/livetv/
**Browser / Version**: Firefox 60.0
**Operating System**: Windows 10
**Tested Another Browser**: Yes
**Problem type**: Video or audio doesn't play
**Description**: The Video and Audio not playing
**Steps to Reproduce**:
CNN IBN Indian News Channel Live TV Streaming not working
gfx.webrender.all: false
gfx.webrender.blob-images: 1
gfx.webrender.enabled: false
image.mem.shared: 2
[](https://webcompat.com/uploads/2018/2/3a53f2f6-58b7-4a2f-951d-152c724acd07.jpg)
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
non_process
|
video or audio doesn t play url browser version firefox operating system windows tested another browser yes problem type video or audio doesn t play description the video and audio not playing steps to reproduce cnn ibn indian news channel live tv streaming not working gfx webrender all false gfx webrender blob images gfx webrender enabled false image mem shared from with ❤️
| 0
|
2,497
| 5,271,296,991
|
IssuesEvent
|
2017-02-06 09:14:39
|
openvstorage/alba
|
https://api.github.com/repos/openvstorage/alba
|
closed
|
[ASD] error during client request: Prelude.DecodingFailure("bool: invalid tag 0x61")
|
priority_normal process_cantreproduce type_bug
|
While performing a fio test on a vpool we saw this error on a ASD:
This happened during this test: https://github.com/ovs-projects/org_quality/issues/22
Also the volumedriver and proxy communication between each other has been changed to `TCP` in addition to the above ticket.
```
2016-08-11 13:50:25 393301 +0200 - str02 - 19600/0 - alba/asd - 293 - info - server: new client connection from (172.19.12.141,41983)
2016-08-11 13:50:26 700716 +0200 - str02 - 19600/0 - alba/asd - 294 - info - reading from fd: 632120B in 11 steps
2016-08-11 13:50:37 665169 +0200 - str02 - 19600/0 - alba/asd - 295 - info - reading from fd: 994966B in 19 steps
2016-08-11 13:50:46 102283 +0200 - str02 - 19600/0 - alba/asd - 296 - info - maxrss:44920 KB, allocated:44227.726562, minor_collections:23, major_collections:2, c
ompactions:0, heap_words:491520
2016-08-11 13:50:46 102540 +0200 - str02 - 19600/0 - alba/asd - 297 - info - {; creation: 2016/08/11_11:59:45.5895;; period: 0.00;; Statistics : { St
at.Stat.n = 26L; avg = 3.29567835881e-05; exp_avg = 3.01622883747e-05;; m2 = 7.05007061277e-10; var = 2.82002824511e-11; min = 2.59876251221e-05;; max = 4.816
05529785e-05; alpha = 0.9 };; Range : { Stat.Stat.n = 8L; avg = 0.000156342983246; exp_avg = 9.02095691323e-05;; m2 = 6.02412342232e-09; var = 8.605890603
32e-10; min = 0.000131845474243;; max = 0.000211000442505; alpha = 0.9 };; MultiGet2 : { Stat.Stat.n = 27L; avg = 0.181439823574; exp_avg = 0.179720160651;
; m2 = 1.28912914898; var = 0.0495818903454; min = 7.5101852417e-05;; max = 0.515853881836; alpha = 0.9 };; Apply : { Stat.Stat.n = 41L; avg = 0.02284
1971095; exp_avg = 0.0594903363469;; m2 = 0.339744026786; var = 0.00849360066964; min = 0.000402927398682;; max = 0.485781908035; alpha = 0.9 };; GetD
iskUsage : { Stat.Stat.n = 241L; avg = 2.39625511328e-05; exp_avg = 2.55106568546e-05;; m2 = 1.36671042505e-08; var = 5.69462677106e-11; min = 1.09672546387e-05
;; max = 7.10487365723e-05; alpha = 0.9 };; Capabilities : { Stat.Stat.n = 215L; avg = 2.27717466133e-05; exp_avg = 1.98782618404e-05;; m2 = 9.26478362597
e-07; var = 4.32933814298e-09; min = 1.09672546387e-05;; max = 0.000981092453003; alpha = 0.9 };; }
2016-08-11 13:50:55 99090 +0200 - str02 - 19600/0 - alba/asd - 298 - info - server: new client connection from (172.19.12.141,36427)
2016-08-11 13:50:55 124672 +0200 - str02 - 19600/0 - alba/asd - 299 - info - reading from fd: 524317B in 10 steps
2016-08-11 13:50:55 227253 +0200 - str02 - 19600/0 - alba/asd - 300 - info - server: new client connection from (172.19.12.141,53341)
2016-08-11 13:50:55 231251 +0200 - str02 - 19600/0 - alba/asd - 301 - info - server: new client connection from (172.19.12.141,50379)
2016-08-11 13:50:55 248783 +0200 - str02 - 19600/0 - alba/asd - 302 - info - reading from fd: 626562B in 9 steps
2016-08-11 13:50:57 163284 +0200 - str02 - 19600/0 - alba/asd - 303 - info - reading from fd: 873788B in 22 steps
2016-08-11 13:50:57 172183 +0200 - str02 - 19600/0 - alba/asd - 304 - info - server: new client connection from (172.19.12.141,40760)
2016-08-11 13:50:57 177460 +0200 - str02 - 19600/0 - alba/asd - 305 - info - reading from fd: 524317B in 12 steps
2016-08-11 13:51:12 407829 +0200 - str02 - 19600/0 - alba/asd - 306 - info - server: new client connection from (172.19.12.141,59907)
2016-08-11 13:51:12 418011 +0200 - str02 - 19600/0 - alba/asd - 307 - info - reading from fd: 524317B in 10 steps
2016-08-11 13:51:29 742925 +0200 - str02 - 19600/0 - alba/asd - 308 - info - reading from fd: 961892B in 13 steps
2016-08-11 13:51:29 743125 +0200 - str02 - 19600/0 - alba/asd - 309 - info - error during client request: Prelude.DecodingFailure("bool: invalid tag 0x61"): Prelu
de.DecodingFailure("bool: invalid tag 0x61"); backtrace:; Raised at file "map.ml", line 117, characters 16-25; Called from file "lib/conv.ml", line 213, character
s 10-37
2016-08-11 13:51:29 800545 +0200 - str02 - 19600/0 - alba/asd - 310 - info - server: new client connection from (172.19.12.141,43535)
2016-08-11 13:51:29 807454 +0200 - str02 - 19600/0 - alba/asd - 311 - info - server: new client connection from (172.19.12.141,57840)
2016-08-11 13:51:29 816725 +0200 - str02 - 19600/0 - alba/asd - 312 - info - server: new client connection from (172.19.12.141,36049)
2016-08-11 13:51:29 817703 +0200 - str02 - 19600/0 - alba/asd - 313 - info - reading from fd: 795581B in 15 steps
2016-08-11 13:51:29 829866 +0200 - str02 - 19600/0 - alba/asd - 314 - info - server: new client connection from (172.19.12.141,40300)
2016-08-11 13:51:46 109014 +0200 - str02 - 19600/0 - alba/asd - 315 - info - maxrss:45556 KB, allocated:46280.390625, minor_collections:24, major_collections:2, c
ompactions:0, heap_words:491520
2016-08-11 13:51:46 109317 +0200 - str02 - 19600/0 - alba/asd - 316 - info - {; creation: 2016/08/11_11:59:45.5895;; period: 0.00;; Statistics : { St
at.Stat.n = 26L; avg = 3.29567835881e-05; exp_avg = 3.01622883747e-05;; m2 = 7.05007061277e-10; var = 2.82002824511e-11; min = 2.59876251221e-05;; max = 4.816
05529785e-05; alpha = 0.9 };; Range : { Stat.Stat.n = 8L; avg = 0.000156342983246; exp_avg = 9.02095691323e-05;; m2 = 6.02412342232e-09; var = 8.605890603
32e-10; min = 0.000131845474243;; max = 0.000211000442505; alpha = 0.9 };; MultiGet2 : { Stat.Stat.n = 27L; avg = 0.181439823574; exp_avg = 0.179720160651;
; m2 = 1.28912914898; var = 0.0495818903454; min = 7.5101852417e-05;; max = 0.515853881836; alpha = 0.9 };; Apply : { Stat.Stat.n = 48L; avg = 0.02009
16876396; exp_avg = 0.0304088216659;; m2 = 0.341921908771; var = 0.00727493422917; min = 0.000211000442505;; max = 0.485781908035; alpha = 0.9 };; GetD
iskUsage : { Stat.Stat.n = 243L; avg = 2.39340856733e-05; exp_avg = 2.454508652e-05;; m2 = 1.36949232604e-08; var = 5.65905919849e-11; min = 1.09672546387e-05;;
max = 7.10487365723e-05; alpha = 0.9 };; Capabilities : { Stat.Stat.n = 217L; avg = 2.26959105461e-05; exp_avg = 1.88598950509e-05;; m2 = 9.26612976341
e-07; var = 4.28987489047e-09; min = 1.09672546387e-05;; max = 0.000981092453003; alpha = 0.9 };; }
2016-08-11 13:51:47 35859 +0200 - str02 - 19600/0 - alba/asd - 317 - info - server: new client connection from (172.19.12.141,51713)
2016-08-11 13:51:47 129868 +0200 - str02 - 19600/0 - alba/asd - 318 - info - server: new client connection from (172.19.12.141,39204)
```
|
1.0
|
[ASD] error during client request: Prelude.DecodingFailure("bool: invalid tag 0x61") - While performing a fio test on a vpool we saw this error on a ASD:
This happened during this test: https://github.com/ovs-projects/org_quality/issues/22
Also the volumedriver and proxy communication between each other has been changed to `TCP` in addition to the above ticket.
```
2016-08-11 13:50:25 393301 +0200 - str02 - 19600/0 - alba/asd - 293 - info - server: new client connection from (172.19.12.141,41983)
2016-08-11 13:50:26 700716 +0200 - str02 - 19600/0 - alba/asd - 294 - info - reading from fd: 632120B in 11 steps
2016-08-11 13:50:37 665169 +0200 - str02 - 19600/0 - alba/asd - 295 - info - reading from fd: 994966B in 19 steps
2016-08-11 13:50:46 102283 +0200 - str02 - 19600/0 - alba/asd - 296 - info - maxrss:44920 KB, allocated:44227.726562, minor_collections:23, major_collections:2, c
ompactions:0, heap_words:491520
2016-08-11 13:50:46 102540 +0200 - str02 - 19600/0 - alba/asd - 297 - info - {; creation: 2016/08/11_11:59:45.5895;; period: 0.00;; Statistics : { St
at.Stat.n = 26L; avg = 3.29567835881e-05; exp_avg = 3.01622883747e-05;; m2 = 7.05007061277e-10; var = 2.82002824511e-11; min = 2.59876251221e-05;; max = 4.816
05529785e-05; alpha = 0.9 };; Range : { Stat.Stat.n = 8L; avg = 0.000156342983246; exp_avg = 9.02095691323e-05;; m2 = 6.02412342232e-09; var = 8.605890603
32e-10; min = 0.000131845474243;; max = 0.000211000442505; alpha = 0.9 };; MultiGet2 : { Stat.Stat.n = 27L; avg = 0.181439823574; exp_avg = 0.179720160651;
; m2 = 1.28912914898; var = 0.0495818903454; min = 7.5101852417e-05;; max = 0.515853881836; alpha = 0.9 };; Apply : { Stat.Stat.n = 41L; avg = 0.02284
1971095; exp_avg = 0.0594903363469;; m2 = 0.339744026786; var = 0.00849360066964; min = 0.000402927398682;; max = 0.485781908035; alpha = 0.9 };; GetD
iskUsage : { Stat.Stat.n = 241L; avg = 2.39625511328e-05; exp_avg = 2.55106568546e-05;; m2 = 1.36671042505e-08; var = 5.69462677106e-11; min = 1.09672546387e-05
;; max = 7.10487365723e-05; alpha = 0.9 };; Capabilities : { Stat.Stat.n = 215L; avg = 2.27717466133e-05; exp_avg = 1.98782618404e-05;; m2 = 9.26478362597
e-07; var = 4.32933814298e-09; min = 1.09672546387e-05;; max = 0.000981092453003; alpha = 0.9 };; }
2016-08-11 13:50:55 99090 +0200 - str02 - 19600/0 - alba/asd - 298 - info - server: new client connection from (172.19.12.141,36427)
2016-08-11 13:50:55 124672 +0200 - str02 - 19600/0 - alba/asd - 299 - info - reading from fd: 524317B in 10 steps
2016-08-11 13:50:55 227253 +0200 - str02 - 19600/0 - alba/asd - 300 - info - server: new client connection from (172.19.12.141,53341)
2016-08-11 13:50:55 231251 +0200 - str02 - 19600/0 - alba/asd - 301 - info - server: new client connection from (172.19.12.141,50379)
2016-08-11 13:50:55 248783 +0200 - str02 - 19600/0 - alba/asd - 302 - info - reading from fd: 626562B in 9 steps
2016-08-11 13:50:57 163284 +0200 - str02 - 19600/0 - alba/asd - 303 - info - reading from fd: 873788B in 22 steps
2016-08-11 13:50:57 172183 +0200 - str02 - 19600/0 - alba/asd - 304 - info - server: new client connection from (172.19.12.141,40760)
2016-08-11 13:50:57 177460 +0200 - str02 - 19600/0 - alba/asd - 305 - info - reading from fd: 524317B in 12 steps
2016-08-11 13:51:12 407829 +0200 - str02 - 19600/0 - alba/asd - 306 - info - server: new client connection from (172.19.12.141,59907)
2016-08-11 13:51:12 418011 +0200 - str02 - 19600/0 - alba/asd - 307 - info - reading from fd: 524317B in 10 steps
2016-08-11 13:51:29 742925 +0200 - str02 - 19600/0 - alba/asd - 308 - info - reading from fd: 961892B in 13 steps
2016-08-11 13:51:29 743125 +0200 - str02 - 19600/0 - alba/asd - 309 - info - error during client request: Prelude.DecodingFailure("bool: invalid tag 0x61"): Prelu
de.DecodingFailure("bool: invalid tag 0x61"); backtrace:; Raised at file "map.ml", line 117, characters 16-25; Called from file "lib/conv.ml", line 213, character
s 10-37
2016-08-11 13:51:29 800545 +0200 - str02 - 19600/0 - alba/asd - 310 - info - server: new client connection from (172.19.12.141,43535)
2016-08-11 13:51:29 807454 +0200 - str02 - 19600/0 - alba/asd - 311 - info - server: new client connection from (172.19.12.141,57840)
2016-08-11 13:51:29 816725 +0200 - str02 - 19600/0 - alba/asd - 312 - info - server: new client connection from (172.19.12.141,36049)
2016-08-11 13:51:29 817703 +0200 - str02 - 19600/0 - alba/asd - 313 - info - reading from fd: 795581B in 15 steps
2016-08-11 13:51:29 829866 +0200 - str02 - 19600/0 - alba/asd - 314 - info - server: new client connection from (172.19.12.141,40300)
2016-08-11 13:51:46 109014 +0200 - str02 - 19600/0 - alba/asd - 315 - info - maxrss:45556 KB, allocated:46280.390625, minor_collections:24, major_collections:2, c
ompactions:0, heap_words:491520
2016-08-11 13:51:46 109317 +0200 - str02 - 19600/0 - alba/asd - 316 - info - {; creation: 2016/08/11_11:59:45.5895;; period: 0.00;; Statistics : { St
at.Stat.n = 26L; avg = 3.29567835881e-05; exp_avg = 3.01622883747e-05;; m2 = 7.05007061277e-10; var = 2.82002824511e-11; min = 2.59876251221e-05;; max = 4.816
05529785e-05; alpha = 0.9 };; Range : { Stat.Stat.n = 8L; avg = 0.000156342983246; exp_avg = 9.02095691323e-05;; m2 = 6.02412342232e-09; var = 8.605890603
32e-10; min = 0.000131845474243;; max = 0.000211000442505; alpha = 0.9 };; MultiGet2 : { Stat.Stat.n = 27L; avg = 0.181439823574; exp_avg = 0.179720160651;
; m2 = 1.28912914898; var = 0.0495818903454; min = 7.5101852417e-05;; max = 0.515853881836; alpha = 0.9 };; Apply : { Stat.Stat.n = 48L; avg = 0.02009
16876396; exp_avg = 0.0304088216659;; m2 = 0.341921908771; var = 0.00727493422917; min = 0.000211000442505;; max = 0.485781908035; alpha = 0.9 };; GetD
iskUsage : { Stat.Stat.n = 243L; avg = 2.39340856733e-05; exp_avg = 2.454508652e-05;; m2 = 1.36949232604e-08; var = 5.65905919849e-11; min = 1.09672546387e-05;;
max = 7.10487365723e-05; alpha = 0.9 };; Capabilities : { Stat.Stat.n = 217L; avg = 2.26959105461e-05; exp_avg = 1.88598950509e-05;; m2 = 9.26612976341
e-07; var = 4.28987489047e-09; min = 1.09672546387e-05;; max = 0.000981092453003; alpha = 0.9 };; }
2016-08-11 13:51:47 35859 +0200 - str02 - 19600/0 - alba/asd - 317 - info - server: new client connection from (172.19.12.141,51713)
2016-08-11 13:51:47 129868 +0200 - str02 - 19600/0 - alba/asd - 318 - info - server: new client connection from (172.19.12.141,39204)
```
|
process
|
error during client request prelude decodingfailure bool invalid tag while performing a fio test on a vpool we saw this error on a asd this happened during this test also the volumedriver and proxy communication between each other has been changed to tcp in addition to the above ticket alba asd info server new client connection from alba asd info reading from fd in steps alba asd info reading from fd in steps alba asd info maxrss kb allocated minor collections major collections c ompactions heap words alba asd info creation period statistics st at stat n avg exp avg var min max alpha range stat stat n avg exp avg var min max alpha stat stat n avg exp avg var min max alpha apply stat stat n avg exp avg var min max alpha getd iskusage stat stat n avg exp avg var min max alpha capabilities stat stat n avg exp avg e var min max alpha alba asd info server new client connection from alba asd info reading from fd in steps alba asd info server new client connection from alba asd info server new client connection from alba asd info reading from fd in steps alba asd info reading from fd in steps alba asd info server new client connection from alba asd info reading from fd in steps alba asd info server new client connection from alba asd info reading from fd in steps alba asd info reading from fd in steps alba asd info error during client request prelude decodingfailure bool invalid tag prelu de decodingfailure bool invalid tag backtrace raised at file map ml line characters called from file lib conv ml line character s alba asd info server new client connection from alba asd info server new client connection from alba asd info server new client connection from alba asd info reading from fd in steps alba asd info server new client connection from alba asd info maxrss kb allocated minor collections major collections c ompactions heap words alba asd info creation period statistics st at stat n avg exp avg var min max alpha range stat stat n avg exp avg var min max alpha stat stat n avg exp avg var min max alpha apply stat stat n avg exp avg var min max alpha getd iskusage stat stat n avg exp avg var min max alpha capabilities stat stat n avg exp avg e var min max alpha alba asd info server new client connection from alba asd info server new client connection from
| 1
|
506
| 2,962,690,460
|
IssuesEvent
|
2015-07-10 03:12:56
|
spootTheLousy/saguaro
|
https://api.github.com/repos/spootTheLousy/saguaro
|
closed
|
Transparent image thumbnails have a black background
|
Bug: Minor Cosmetic change Image processing
|
Transparent PNG/GIF thumbnails don't maintain their transparent background.
|
1.0
|
Transparent image thumbnails have a black background - Transparent PNG/GIF thumbnails don't maintain their transparent background.
|
process
|
transparent image thumbnails have a black background transparent png gif thumbnails don t maintain their transparent background
| 1
|
5,522
| 8,381,047,152
|
IssuesEvent
|
2018-10-07 20:46:47
|
MichiganDataScienceTeam/googleanalytics
|
https://api.github.com/repos/MichiganDataScienceTeam/googleanalytics
|
opened
|
Preprocess: u'geoNetwork.networkDomain', u'geoNetwork.networkLocation', u'geoNetwork.region', u'geoNetwork.subContinent',
|
easy preprocessing
|
Preprocess the following features:
u'geoNetwork.networkDomain',
u'geoNetwork.networkLocation',
u'geoNetwork.region',
u'geoNetwork.subContinent',
1. Standardization: [http://scikit-learn.org/stable/modules/preprocessing.html#standardization-or-mean-removal-and-variance-scaling](http://scikit-learn.org/stable/modules/preprocessing.html#standardization-or-mean-removal-and-variance-scaling)
2. Impute missing values: [http://scikit-learn.org/stable/modules/impute.html](http://scikit-learn.org/stable/modules/impute.html)
3. Normalization: [http://scikit-learn.org/stable/modules/preprocessing.html#normalization](http://scikit-learn.org/stable/modules/preprocessing.html#normalization)
4. Encode categorical features (optional): [http://scikit-learn.org/stable/modules/preprocessing.html#encoding-categorical-features](http://scikit-learn.org/stable/modules/preprocessing.html#encoding-categorical-features)
5. Discretization (optional): [http://scikit-learn.org/stable/modules/preprocessing.html#discretization](http://scikit-learn.org/stable/modules/preprocessing.html#discretization)
[http://scikit-learn.org/stable/modules/preprocessing.html](http://scikit-learn.org/stable/modules/preprocessing.html)
|
1.0
|
Preprocess: u'geoNetwork.networkDomain', u'geoNetwork.networkLocation', u'geoNetwork.region', u'geoNetwork.subContinent', - Preprocess the following features:
u'geoNetwork.networkDomain',
u'geoNetwork.networkLocation',
u'geoNetwork.region',
u'geoNetwork.subContinent',
1. Standardization: [http://scikit-learn.org/stable/modules/preprocessing.html#standardization-or-mean-removal-and-variance-scaling](http://scikit-learn.org/stable/modules/preprocessing.html#standardization-or-mean-removal-and-variance-scaling)
2. Impute missing values: [http://scikit-learn.org/stable/modules/impute.html](http://scikit-learn.org/stable/modules/impute.html)
3. Normalization: [http://scikit-learn.org/stable/modules/preprocessing.html#normalization](http://scikit-learn.org/stable/modules/preprocessing.html#normalization)
4. Encode categorical features (optional): [http://scikit-learn.org/stable/modules/preprocessing.html#encoding-categorical-features](http://scikit-learn.org/stable/modules/preprocessing.html#encoding-categorical-features)
5. Discretization (optional): [http://scikit-learn.org/stable/modules/preprocessing.html#discretization](http://scikit-learn.org/stable/modules/preprocessing.html#discretization)
[http://scikit-learn.org/stable/modules/preprocessing.html](http://scikit-learn.org/stable/modules/preprocessing.html)
|
process
|
preprocess u geonetwork networkdomain u geonetwork networklocation u geonetwork region u geonetwork subcontinent preprocess the following features u geonetwork networkdomain u geonetwork networklocation u geonetwork region u geonetwork subcontinent standardization impute missing values normalization encode categorical features optional discretization optional
| 1
|
10,610
| 2,957,358,339
|
IssuesEvent
|
2015-07-08 15:58:41
|
guardian/frontend
|
https://api.github.com/repos/guardian/frontend
|
closed
|
Container's too tall when cut out involved
|
design input required Reproduced
|
Hello,
I have seen it many times, but just now had it reported by Editorial and we've confirmed that editing in fronts tool can't really resolve it...
Also, sorry, but I do not know the terminology for differently sized tiles/cards/items...
When the cut out is displayed on very big tile, the adjacent boosted very big tile has an empty space below image, like so (Newtork Front, highlights, desktop BP, all browsers):

The **only** way to resolve it (bar removing the cut out) is to make sure that the tile with it has only three lines of text (including byline text) which is not a realistic solution.
One way to fix it would be to reduce the size of the cut out on this particular combination. Even better would be to make it dynamic depending on the amount of text.
As reported by Fergal A. and Nick D.
Loosely related to: https://github.com/guardian/frontend/issues/8935
Regards
Mateusz
|
1.0
|
Container's too tall when cut out involved - Hello,
I have seen it many times, but just now had it reported by Editorial and we've confirmed that editing in fronts tool can't really resolve it...
Also, sorry, but I do not know the terminology for differently sized tiles/cards/items...
When the cut out is displayed on very big tile, the adjacent boosted very big tile has an empty space below image, like so (Newtork Front, highlights, desktop BP, all browsers):

The **only** way to resolve it (bar removing the cut out) is to make sure that the tile with it has only three lines of text (including byline text) which is not a realistic solution.
One way to fix it would be to reduce the size of the cut out on this particular combination. Even better would be to make it dynamic depending on the amount of text.
As reported by Fergal A. and Nick D.
Loosely related to: https://github.com/guardian/frontend/issues/8935
Regards
Mateusz
|
non_process
|
container s too tall when cut out involved hello i have seen it many times but just now had it reported by editorial and we ve confirmed that editing in fronts tool can t really resolve it also sorry but i do not know the terminology for differently sized tiles cards items when the cut out is displayed on very big tile the adjacent boosted very big tile has an empty space below image like so newtork front highlights desktop bp all browsers the only way to resolve it bar removing the cut out is to make sure that the tile with it has only three lines of text including byline text which is not a realistic solution one way to fix it would be to reduce the size of the cut out on this particular combination even better would be to make it dynamic depending on the amount of text as reported by fergal a and nick d loosely related to regards mateusz
| 0
|
5,036
| 7,853,049,936
|
IssuesEvent
|
2018-06-20 16:11:22
|
AlexsLemonade/refinebio
|
https://api.github.com/repos/AlexsLemonade/refinebio
|
opened
|
Add Capabilities to Process and Smash Externally Supplied Data
|
processor smasher
|
### Context
It's quite likely that there will be researchers who will want to combine `refine.bio`-provided data with their own private data repositories.
It'd be great if we provided some functionality to make this easier for them by either running through our processors, gene-converters and smasher. Off the top of my head, I'm imagining that this could be new management command to live inside a processor/smasher Dockerfile and a small script with documentation to wire everything up together. But I'm certainly open to suggestions here!
This would also improve our own testing abilities.
### Problem or idea
I think this could be a good project for @Willv19 to take on if @kurtwheeler doesn't have a grander plan in mind.
### Solution or next step
Next step would probably to put some bounds on the requirements here - what kind of private data is a researcher most likely to have? Will it need to be processed, or just gene-conversion, or even just smashing?
|
1.0
|
Add Capabilities to Process and Smash Externally Supplied Data - ### Context
It's quite likely that there will be researchers who will want to combine `refine.bio`-provided data with their own private data repositories.
It'd be great if we provided some functionality to make this easier for them by either running through our processors, gene-converters and smasher. Off the top of my head, I'm imagining that this could be new management command to live inside a processor/smasher Dockerfile and a small script with documentation to wire everything up together. But I'm certainly open to suggestions here!
This would also improve our own testing abilities.
### Problem or idea
I think this could be a good project for @Willv19 to take on if @kurtwheeler doesn't have a grander plan in mind.
### Solution or next step
Next step would probably to put some bounds on the requirements here - what kind of private data is a researcher most likely to have? Will it need to be processed, or just gene-conversion, or even just smashing?
|
process
|
add capabilities to process and smash externally supplied data context it s quite likely that there will be researchers who will want to combine refine bio provided data with their own private data repositories it d be great if we provided some functionality to make this easier for them by either running through our processors gene converters and smasher off the top of my head i m imagining that this could be new management command to live inside a processor smasher dockerfile and a small script with documentation to wire everything up together but i m certainly open to suggestions here this would also improve our own testing abilities problem or idea i think this could be a good project for to take on if kurtwheeler doesn t have a grander plan in mind solution or next step next step would probably to put some bounds on the requirements here what kind of private data is a researcher most likely to have will it need to be processed or just gene conversion or even just smashing
| 1
|
4,424
| 7,302,533,359
|
IssuesEvent
|
2018-02-27 10:00:50
|
qgis/QGIS-Documentation
|
https://api.github.com/repos/qgis/QGIS-Documentation
|
closed
|
[needs-docs] Update label in Options dialog, replacing node by vertex
|
Automatic new feature Easy Processing Screenshots
|
Original commit: https://github.com/qgis/QGIS/commit/3316d1ba86417ca7b84081a94358df2d7c8f1f7b by DelazJ
Unfortunately this naughty coder did not write a description... :-(
|
1.0
|
[needs-docs] Update label in Options dialog, replacing node by vertex - Original commit: https://github.com/qgis/QGIS/commit/3316d1ba86417ca7b84081a94358df2d7c8f1f7b by DelazJ
Unfortunately this naughty coder did not write a description... :-(
|
process
|
update label in options dialog replacing node by vertex original commit by delazj unfortunately this naughty coder did not write a description
| 1
|
19,658
| 26,018,546,459
|
IssuesEvent
|
2022-12-21 10:33:46
|
parcel-bundler/parcel
|
https://api.github.com/repos/parcel-bundler/parcel
|
reopened
|
PostHTML deletes PHP tags, ignores `directives` configuration
|
:bug: Bug Good First Issue HTML Preprocessing Stale
|
# 🐛 bug report
Parcel (resp. PostHTML) deletes PHP tags from HTML input files during transformation. It also ignores any `directives` options in `.posthtmlrc` that are supposed to preserve them.
## 🎛 Configuration
Minimal default configuration, see below.
## 🤔 Expected Behavior
The resulting file should contain all `<?= ... ?>` and `<?php ... ?>` tags in the input file as-is.
## 😯 Current Behavior
The tags are removed.
## 💁 Possible Solution
Don't know, [this issue](https://github.com/parcel-bundler/parcel/issues/3975), which was wrongfully closed by the stale bot, contains some remarks that are probably outdated by now.
## 🔦 Context
The bug makes it impossible to include PHP snippets in bundled HTML files, which is a hard requirement for one of my current projects.
## 💻 Code Sample
**Reproduction**
https://github.com/schuetzm/parcel-deletes-php-tags
**index.html**
```html
<!DOCTYPE html>
<html>
<head>
</head>
<body>
<user-defined-tag>This is preserved.</user-defined-tag>
<?php phpinfo(); ?>
The above tag is removed.
</body>
</html>
```
**.posthtmlrc**
```json
{
"render": {
"directives": [{"name": "?php", "start": "<", "end": ">"}]
},
"directives": [{"name": "?php", "start": "<", "end": ">"}],
"plugins": {
}
}
```
## 🌍 Your Environment
<!--- Include as many relevant details about the environment you experienced the bug in -->
| Software | Version(s) |
| ---------------- | ---------- |
| Parcel | 2.5.0
| Node | 14.9.1
| npm/Yarn | Yarn 1.22.17
| Operating System | openSUSE 15.3
|
1.0
|
PostHTML deletes PHP tags, ignores `directives` configuration - # 🐛 bug report
Parcel (resp. PostHTML) deletes PHP tags from HTML input files during transformation. It also ignores any `directives` options in `.posthtmlrc` that are supposed to preserve them.
## 🎛 Configuration
Minimal default configuration, see below.
## 🤔 Expected Behavior
The resulting file should contain all `<?= ... ?>` and `<?php ... ?>` tags in the input file as-is.
## 😯 Current Behavior
The tags are removed.
## 💁 Possible Solution
Don't know, [this issue](https://github.com/parcel-bundler/parcel/issues/3975), which was wrongfully closed by the stale bot, contains some remarks that are probably outdated by now.
## 🔦 Context
The bug makes it impossible to include PHP snippets in bundled HTML files, which is a hard requirement for one of my current projects.
## 💻 Code Sample
**Reproduction**
https://github.com/schuetzm/parcel-deletes-php-tags
**index.html**
```html
<!DOCTYPE html>
<html>
<head>
</head>
<body>
<user-defined-tag>This is preserved.</user-defined-tag>
<?php phpinfo(); ?>
The above tag is removed.
</body>
</html>
```
**.posthtmlrc**
```json
{
"render": {
"directives": [{"name": "?php", "start": "<", "end": ">"}]
},
"directives": [{"name": "?php", "start": "<", "end": ">"}],
"plugins": {
}
}
```
## 🌍 Your Environment
<!--- Include as many relevant details about the environment you experienced the bug in -->
| Software | Version(s) |
| ---------------- | ---------- |
| Parcel | 2.5.0
| Node | 14.9.1
| npm/Yarn | Yarn 1.22.17
| Operating System | openSUSE 15.3
|
process
|
posthtml deletes php tags ignores directives configuration 🐛 bug report parcel resp posthtml deletes php tags from html input files during transformation it also ignores any directives options in posthtmlrc that are supposed to preserve them 🎛 configuration minimal default configuration see below 🤔 expected behavior the resulting file should contain all and tags in the input file as is 😯 current behavior the tags are removed 💁 possible solution don t know which was wrongfully closed by the stale bot contains some remarks that are probably outdated by now 🔦 context the bug makes it impossible to include php snippets in bundled html files which is a hard requirement for one of my current projects 💻 code sample reproduction index html html this is preserved the above tag is removed posthtmlrc json render directives directives plugins 🌍 your environment software version s parcel node npm yarn yarn operating system opensuse
| 1
|
10,196
| 13,058,973,965
|
IssuesEvent
|
2020-07-30 09:52:28
|
prisma/e2e-tests
|
https://api.github.com/repos/prisma/e2e-tests
|
opened
|
Explicitly set `CI=1` on all systems we run the CLI in any form
|
kind/feature process/candidate
|
Github Actions, but also all the providers and hosts etc.
|
1.0
|
Explicitly set `CI=1` on all systems we run the CLI in any form - Github Actions, but also all the providers and hosts etc.
|
process
|
explicitly set ci on all systems we run the cli in any form github actions but also all the providers and hosts etc
| 1
|
359,551
| 10,677,930,503
|
IssuesEvent
|
2019-10-21 16:16:38
|
googleapis/nodejs-pubsub
|
https://api.github.com/repos/googleapis/nodejs-pubsub
|
reopened
|
not all grpc libraries are consistently installing 0.6.9 dependency
|
priority: p1 type: bug
|
### Problem
Some dependencies still pin on older versions of `grpc`.
### Original Message
@ericpearson I've moved your comments here, since it's unrelated to the memory issues that are reported in #788
An update here on our issues:
We use a ton of google libraries (stackdriver trace, debug, cloud tasks, pubsub etc). They all seem to share the same common dependecies what I did was go into the package-lock and update all of these to make sure they are pinned at grpc-js 0.6.9 and pinned google-gax which a lot of them depend on to 1.7.5.
This has resolved most of the issues we were having across multiple client libraries (this issue is not limited to pubsub). This was more effective than just pinning 0.6.9 in the package.json, which caused a ton of memory leaks and did not fix the timeout issues.
It seems to be that there are a lot of problems or conflicts with other google libraries using different versions of grpc-js and google-gax (this looks like the brains behind things). We also had issues where google-gax was upgraded, stopped working and when we attempted to downgrade again, completely killled our developers machines and pubsub wouldn't even work locally until their machines were rebooted. This seems similar to the issues observed when running in the cloud. Is some sort of weird state keeping going on in here? This would also maybe explain the versions conflicting with each other.
As of writing we are still seeing message timeouts but they are not on the scale as they were before but we are still impacted by this issue.
|
1.0
|
not all grpc libraries are consistently installing 0.6.9 dependency - ### Problem
Some dependencies still pin on older versions of `grpc`.
### Original Message
@ericpearson I've moved your comments here, since it's unrelated to the memory issues that are reported in #788
An update here on our issues:
We use a ton of google libraries (stackdriver trace, debug, cloud tasks, pubsub etc). They all seem to share the same common dependecies what I did was go into the package-lock and update all of these to make sure they are pinned at grpc-js 0.6.9 and pinned google-gax which a lot of them depend on to 1.7.5.
This has resolved most of the issues we were having across multiple client libraries (this issue is not limited to pubsub). This was more effective than just pinning 0.6.9 in the package.json, which caused a ton of memory leaks and did not fix the timeout issues.
It seems to be that there are a lot of problems or conflicts with other google libraries using different versions of grpc-js and google-gax (this looks like the brains behind things). We also had issues where google-gax was upgraded, stopped working and when we attempted to downgrade again, completely killled our developers machines and pubsub wouldn't even work locally until their machines were rebooted. This seems similar to the issues observed when running in the cloud. Is some sort of weird state keeping going on in here? This would also maybe explain the versions conflicting with each other.
As of writing we are still seeing message timeouts but they are not on the scale as they were before but we are still impacted by this issue.
|
non_process
|
not all grpc libraries are consistently installing dependency problem some dependencies still pin on older versions of grpc original message ericpearson i ve moved your comments here since it s unrelated to the memory issues that are reported in an update here on our issues we use a ton of google libraries stackdriver trace debug cloud tasks pubsub etc they all seem to share the same common dependecies what i did was go into the package lock and update all of these to make sure they are pinned at grpc js and pinned google gax which a lot of them depend on to this has resolved most of the issues we were having across multiple client libraries this issue is not limited to pubsub this was more effective than just pinning in the package json which caused a ton of memory leaks and did not fix the timeout issues it seems to be that there are a lot of problems or conflicts with other google libraries using different versions of grpc js and google gax this looks like the brains behind things we also had issues where google gax was upgraded stopped working and when we attempted to downgrade again completely killled our developers machines and pubsub wouldn t even work locally until their machines were rebooted this seems similar to the issues observed when running in the cloud is some sort of weird state keeping going on in here this would also maybe explain the versions conflicting with each other as of writing we are still seeing message timeouts but they are not on the scale as they were before but we are still impacted by this issue
| 0
|
314,583
| 9,600,009,609
|
IssuesEvent
|
2019-05-10 08:18:34
|
webcompat/web-bugs
|
https://api.github.com/repos/webcompat/web-bugs
|
closed
|
tune.pk - see bug description
|
browser-firefox-tablet engine-gecko priority-normal
|
<!-- @browser: Firefox Mobile (Tablet) 67.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 5.1.1; Tablet; rv:67.0) Gecko/67.0 Firefox/67.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://tune.pk/
**Browser / Version**: Firefox Mobile (Tablet) 67.0
**Operating System**: Android 5.1.1
**Tested Another Browser**: No
**Problem type**: Something else
**Description**: page layout out of bounds
**Steps to Reproduce**:
Created a new account. All pages seemingly stretching to the right side on Mozilla Beta 67.0b18.
I have the screenshot as well but unfortunately I am unable to find any control on this page to submit it currently.
[](https://webcompat.com/uploads/2019/5/a5247698-1aab-40e3-9905-076cb2af2c65.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190506235559</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: beta</li>
</ul>
<p>Console Messages:</p>
<pre>
[u'[JavaScript Warning: "Content Security Policy: Interpreting self as a hostname, not a keyword. If you intended this to be a keyword, use self (wrapped in single quotes)."]', u'[JavaScript Warning: "The resource at https://pk-gmtdmp.mookie1.com/t/v2/learn?tagid=V2_386595&src.rand=1557423680 was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.googletagservices.com/tag/js/gpt.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "Loading failed for the <script> with source https://tune.pk/plugins/cb_ads_manager/front_end/js/dist/master.js." {file: "https://tune.pk/" line: 622}]', u'[JavaScript Warning: "The resource at https://pk-gmtdmp.mookie1.com/t/v2/learn?tagid=V2_386595&src.rand=1557423680 was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.googletagservices.com/tag/js/gpt.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.google-analytics.com/analytics.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://mc.yandex.ru/metrika/tag.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://secure.quantserve.com/quant.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]']
</pre>
</details>
Submitted in the name of `@snasg`
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
1.0
|
tune.pk - see bug description - <!-- @browser: Firefox Mobile (Tablet) 67.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 5.1.1; Tablet; rv:67.0) Gecko/67.0 Firefox/67.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://tune.pk/
**Browser / Version**: Firefox Mobile (Tablet) 67.0
**Operating System**: Android 5.1.1
**Tested Another Browser**: No
**Problem type**: Something else
**Description**: page layout out of bounds
**Steps to Reproduce**:
Created a new account. All pages seemingly stretching to the right side on Mozilla Beta 67.0b18.
I have the screenshot as well but unfortunately I am unable to find any control on this page to submit it currently.
[](https://webcompat.com/uploads/2019/5/a5247698-1aab-40e3-9905-076cb2af2c65.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190506235559</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: beta</li>
</ul>
<p>Console Messages:</p>
<pre>
[u'[JavaScript Warning: "Content Security Policy: Interpreting self as a hostname, not a keyword. If you intended this to be a keyword, use self (wrapped in single quotes)."]', u'[JavaScript Warning: "The resource at https://pk-gmtdmp.mookie1.com/t/v2/learn?tagid=V2_386595&src.rand=1557423680 was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.googletagservices.com/tag/js/gpt.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "Loading failed for the <script> with source https://tune.pk/plugins/cb_ads_manager/front_end/js/dist/master.js." {file: "https://tune.pk/" line: 622}]', u'[JavaScript Warning: "The resource at https://pk-gmtdmp.mookie1.com/t/v2/learn?tagid=V2_386595&src.rand=1557423680 was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.googletagservices.com/tag/js/gpt.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://www.google-analytics.com/analytics.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://mc.yandex.ru/metrika/tag.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]', u'[JavaScript Warning: "The resource at https://secure.quantserve.com/quant.js was blocked because content blocking is enabled." {file: "https://tune.pk/" line: 0}]']
</pre>
</details>
Submitted in the name of `@snasg`
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
non_process
|
tune pk see bug description url browser version firefox mobile tablet operating system android tested another browser no problem type something else description page layout out of bounds steps to reproduce created a new account all pages seemingly stretching to the right side on mozilla beta i have the screenshot as well but unfortunately i am unable to find any control on this page to submit it currently browser configuration mixed active content blocked false image mem shared true buildid tracking content blocked false gfx webrender blob images true hastouchscreen true mixed passive content blocked false gfx webrender enabled false gfx webrender all false channel beta console messages u u u u u u u u submitted in the name of snasg from with ❤️
| 0
|
22,274
| 30,823,445,635
|
IssuesEvent
|
2023-08-01 18:05:27
|
serai-dex/serai
|
https://api.github.com/repos/serai-dex/serai
|
opened
|
Automatically retry TXs which failed to submit
|
bug feature processor
|
Bitcoin, I believe, will reject perfectly valid TXs if its mempool is full. If all nodes have full mempools, this will cause a valid TX to fail to be published. The only solution for this is if we automatically retry publishing TXs, less we have to manually intervene and publish the TXs in question (requiring adding an RPC to view the locally saved TXs we failed to publish).
While I note Bitcoin, this is a theoretical problem not exclusive to Bitcoin.
|
1.0
|
Automatically retry TXs which failed to submit - Bitcoin, I believe, will reject perfectly valid TXs if its mempool is full. If all nodes have full mempools, this will cause a valid TX to fail to be published. The only solution for this is if we automatically retry publishing TXs, less we have to manually intervene and publish the TXs in question (requiring adding an RPC to view the locally saved TXs we failed to publish).
While I note Bitcoin, this is a theoretical problem not exclusive to Bitcoin.
|
process
|
automatically retry txs which failed to submit bitcoin i believe will reject perfectly valid txs if its mempool is full if all nodes have full mempools this will cause a valid tx to fail to be published the only solution for this is if we automatically retry publishing txs less we have to manually intervene and publish the txs in question requiring adding an rpc to view the locally saved txs we failed to publish while i note bitcoin this is a theoretical problem not exclusive to bitcoin
| 1
|
10,634
| 27,174,124,772
|
IssuesEvent
|
2023-02-17 22:40:44
|
Arquisoft/lomap_es5a
|
https://api.github.com/repos/Arquisoft/lomap_es5a
|
closed
|
ADR. Propuesta y decisión en relación a la arquitectura a definir para el lado del cliente
|
documentation 🏗️ architecture design
|
## Arquitectura lado del cliente de la aplicación.
Tomar la decisión y completar la documentación relativa al ADR [https://github.com/Arquisoft/lomap_es5a/wiki/ADR.-Estructura-Cliente-%5BFront-End%5D](https://github.com/Arquisoft/lomap_es5a/wiki/ADR.-Estructura-Cliente-%5BFront-End%5D)
|
1.0
|
ADR. Propuesta y decisión en relación a la arquitectura a definir para el lado del cliente - ## Arquitectura lado del cliente de la aplicación.
Tomar la decisión y completar la documentación relativa al ADR [https://github.com/Arquisoft/lomap_es5a/wiki/ADR.-Estructura-Cliente-%5BFront-End%5D](https://github.com/Arquisoft/lomap_es5a/wiki/ADR.-Estructura-Cliente-%5BFront-End%5D)
|
non_process
|
adr propuesta y decisión en relación a la arquitectura a definir para el lado del cliente arquitectura lado del cliente de la aplicación tomar la decisión y completar la documentación relativa al adr
| 0
|
8,325
| 11,489,877,197
|
IssuesEvent
|
2020-02-11 16:10:50
|
cypress-io/cypress
|
https://api.github.com/repos/cypress-io/cypress
|
closed
|
Broken links in CONTRIBUTING.md file
|
process: contributing stage: needs review type: chore
|
<!-- Is this a question? Questions WILL BE CLOSED. Ask in our chat https://on.cypress.io/chat -->
### Current behavior:
Multiple broken links and a few typos in CONTRIBUTING.md
- [x] _Blog about Cypress. We display blogs featuring Cypress on our Examples page. If you'd like your blog featured, **open a PR to add it to our docs**._
Broken link: https://github.com/cypress-io/cypress-documentation/blob/develop/.github/CONTRIBUTING.md#adding-examples
- [x] _Write some documentation or improve our existing docs. Know another language? You can help us translate them. **See our guide to contributing to our docs**._
Broken link: https://github.com/cypress-io/cypress-documentation/blob/master/.github/CONTRIBUTING.md
- [x] _Issues may be opened about wanting changes to our **documentation**, our example-kitchensink app, or another repository. In this case you should_
Broken link: https://github.com/cypress-io/cypress/blob/develop
- [x] _Cypress documentation lives in a separate repository with its own dependencies and build tools. See **Documentation Contributing Guideline**._
Broken link: https://github.com/cypress-io/cypress-documentation/blob/master/.github/CONTRIBUTING.md
- [x] _Fill out the **Pull Request Tempalte** completely within the body of the PR. If you feel some areas are not relevant add N/A as opposed to **deleteing** those sections. PR's will not be reviewed if this template is not filled in._ (Some typos)
Broken link: https://github.com/cypress-io/cypress/blob/develop/PULL_REQUEST_TEMPLATE.md
<!-- A description including screenshots, stack traces, DEBUG logs, etc -->
### Desired behavior:
all links go to a real page 👍🏽
<!-- A clear description of what you want to happen -->
### Test code to reproduce
N/A
<!-- If we cannot fully run the tests as provided the issue WILL BE CLOSED -->
<!-- Issues without a reproducible example WILL BE CLOSED -->
<!-- You can fork https://github.com/cypress-io/cypress-test-tiny repo, set up a failing test, then link to your fork -->
### Versions
<!-- Cypress, operating system, browser -->
|
1.0
|
Broken links in CONTRIBUTING.md file - <!-- Is this a question? Questions WILL BE CLOSED. Ask in our chat https://on.cypress.io/chat -->
### Current behavior:
Multiple broken links and a few typos in CONTRIBUTING.md
- [x] _Blog about Cypress. We display blogs featuring Cypress on our Examples page. If you'd like your blog featured, **open a PR to add it to our docs**._
Broken link: https://github.com/cypress-io/cypress-documentation/blob/develop/.github/CONTRIBUTING.md#adding-examples
- [x] _Write some documentation or improve our existing docs. Know another language? You can help us translate them. **See our guide to contributing to our docs**._
Broken link: https://github.com/cypress-io/cypress-documentation/blob/master/.github/CONTRIBUTING.md
- [x] _Issues may be opened about wanting changes to our **documentation**, our example-kitchensink app, or another repository. In this case you should_
Broken link: https://github.com/cypress-io/cypress/blob/develop
- [x] _Cypress documentation lives in a separate repository with its own dependencies and build tools. See **Documentation Contributing Guideline**._
Broken link: https://github.com/cypress-io/cypress-documentation/blob/master/.github/CONTRIBUTING.md
- [x] _Fill out the **Pull Request Tempalte** completely within the body of the PR. If you feel some areas are not relevant add N/A as opposed to **deleteing** those sections. PR's will not be reviewed if this template is not filled in._ (Some typos)
Broken link: https://github.com/cypress-io/cypress/blob/develop/PULL_REQUEST_TEMPLATE.md
<!-- A description including screenshots, stack traces, DEBUG logs, etc -->
### Desired behavior:
all links go to a real page 👍🏽
<!-- A clear description of what you want to happen -->
### Test code to reproduce
N/A
<!-- If we cannot fully run the tests as provided the issue WILL BE CLOSED -->
<!-- Issues without a reproducible example WILL BE CLOSED -->
<!-- You can fork https://github.com/cypress-io/cypress-test-tiny repo, set up a failing test, then link to your fork -->
### Versions
<!-- Cypress, operating system, browser -->
|
process
|
broken links in contributing md file current behavior multiple broken links and a few typos in contributing md blog about cypress we display blogs featuring cypress on our examples page if you d like your blog featured open a pr to add it to our docs broken link write some documentation or improve our existing docs know another language you can help us translate them see our guide to contributing to our docs broken link issues may be opened about wanting changes to our documentation our example kitchensink app or another repository in this case you should broken link cypress documentation lives in a separate repository with its own dependencies and build tools see documentation contributing guideline broken link fill out the pull request tempalte completely within the body of the pr if you feel some areas are not relevant add n a as opposed to deleteing those sections pr s will not be reviewed if this template is not filled in some typos broken link desired behavior all links go to a real page 👍🏽 test code to reproduce n a versions
| 1
|
685,541
| 23,460,090,639
|
IssuesEvent
|
2022-08-16 12:26:00
|
blindnet-io/product-management
|
https://api.github.com/repos/blindnet-io/product-management
|
closed
|
Search Filter Name Not Working
|
type: bug env: staging need: investigation priority: 2 (required)
|
When I enter just the name field and form type filters, the search still shows records clearly not fitting the criteria of this name.

Also, the interaction in PrivateForm is immagined with the idea of **reactivity** in mind, meaning that whenever the user inputs something, the system should repond with some sort of feedback (a noticable change, indicating the input has been taken into account). See [Ben Shneiderman's golden rule No3](http://www.cs.umd.edu/~ben/goldenrules.html).
In this case, the user makes an input by typing the something in the name field. The user can see what they typed, but can naturally expect some additional feedback (like in the case of the choice of a form type, where the chosen type appears as a filter the user can remove).
The system should respond at lest in one of the following ways:
- show the name criteria taken into account AND/OR
- change the results to filter-out those not fitting the name criteria
|
1.0
|
Search Filter Name Not Working - When I enter just the name field and form type filters, the search still shows records clearly not fitting the criteria of this name.

Also, the interaction in PrivateForm is immagined with the idea of **reactivity** in mind, meaning that whenever the user inputs something, the system should repond with some sort of feedback (a noticable change, indicating the input has been taken into account). See [Ben Shneiderman's golden rule No3](http://www.cs.umd.edu/~ben/goldenrules.html).
In this case, the user makes an input by typing the something in the name field. The user can see what they typed, but can naturally expect some additional feedback (like in the case of the choice of a form type, where the chosen type appears as a filter the user can remove).
The system should respond at lest in one of the following ways:
- show the name criteria taken into account AND/OR
- change the results to filter-out those not fitting the name criteria
|
non_process
|
search filter name not working when i enter just the name field and form type filters the search still shows records clearly not fitting the criteria of this name also the interaction in privateform is immagined with the idea of reactivity in mind meaning that whenever the user inputs something the system should repond with some sort of feedback a noticable change indicating the input has been taken into account see in this case the user makes an input by typing the something in the name field the user can see what they typed but can naturally expect some additional feedback like in the case of the choice of a form type where the chosen type appears as a filter the user can remove the system should respond at lest in one of the following ways show the name criteria taken into account and or change the results to filter out those not fitting the name criteria
| 0
|
638,104
| 20,712,812,388
|
IssuesEvent
|
2022-03-12 06:23:10
|
AY2122S2-CS2103T-W12-1/tp
|
https://api.github.com/repos/AY2122S2-CS2103T-W12-1/tp
|
closed
|
As a Teaching Assistant, I can know the number of students in each of my tutorial classes and their names
|
type.Story priority.High
|
... so that I can keep track of attendance for each session
|
1.0
|
As a Teaching Assistant, I can know the number of students in each of my tutorial classes and their names - ... so that I can keep track of attendance for each session
|
non_process
|
as a teaching assistant i can know the number of students in each of my tutorial classes and their names so that i can keep track of attendance for each session
| 0
|
28,643
| 4,425,234,102
|
IssuesEvent
|
2016-08-16 14:55:01
|
brave/browser-ios
|
https://api.github.com/repos/brave/browser-ios
|
closed
|
Manual tests for iPad 3 1.2.12 beta 1
|
checked by qa tests
|
## Installer
1. [x] Check that installer is close to the size of last release.
2. [ ] Check the Brave version in About and make sure it is EXACTLY as expected.
## Data
1. [ ] Make sure that data from the last version appears in the new version OK.
2. [ ] Test that the previous version's cookies are preserved in the next version.
## Bookmarks
1. [x] Test that creating a bookmark in the left well works
2. [x] Test that clicking a bookmark in the left well loads the bookmark.
3. [x] Test that deleting a bookmark in the left well works
## Context menus
1. [x] Make sure context menu items in the URL bar work
2. [x] Make sure context menu items on content work with no selected text.
3. [x] Make sure context menu items on content work with selected text.
4. [x] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable).
## Find on page
1. [x] Ensure search box is shown when selected via the share menu
2. [x] Test successful find
3. [x] Test forward and backward find navigation
4. [x] Test failed find shows 0 results
## Site hacks
1. [x] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it
## Downloads
1. [x] Test downloading a file works and that all actions on the download item works.
## Fullscreen
1. [x] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Zoom
1. [x] Test zoom in / out gestures work
2. [x] Test that navigating to a different origin resets the zoom
## Bravery settings
1. [x] Check that HTTPS Everywhere works by loading http://www.apple.com
2. [x] Turning HTTPS Everywhere off and shields off both disable the redirect to https://www.apple.com
3. [x] Check that ad replacement works on http://slashdot.org
4. [x] Check that toggling to blocking and allow ads works as expected.
5. [x] Test that clicking through a cert error in https://badssl.com/ works.
6. [x] Test that Safe Browsing works (http://excellentmovies.net/)
7. [x] Turning Safe Browsing off and shields off both disable safe browsing for http://excellentmovies.net/.
8. [x] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work.
9. [x] Test that about:preferences default Bravery settings take effect on pages with no site settings.
10. [x] Test that turning on fingerprinting protection in about:preferences shows 3 fingerprints blocked at https://jsfiddle.net/bkf50r8v/13/. Test that turning it off in the Bravery menu shows 0 fingerprints blocked.
11. [x] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/7/ when 3rd party cookies are blocked.
12. [x] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on.
## Content tests
1. [x] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab.
2. [x] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows.
3. [x] Go to http://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown.
4. [x] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`.
5. [x] Open a github issue and type some misspellings, make sure they are underlined.
6. [x] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text.
7. [x] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded.
8. [x] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works.
9. [x] Test that PDF is loaded at http://www.orimi.com/pdf-test.pdf
10. [x] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run).
## Top sites view
1. [x] long-press on top sites to get to deletion mode, and delete a top site (note this will stop that site from showing up again on top sites, so you may not want to do this a site you want to keep there)
## Background
1. [x] Start loading a page, background the app, wait >5 sec, then bring to front, ensure splash screen is not shown
## Per release specialty tests
1. [ ] Test each item in release notes for the release that's going out.
## Session storage
1. [x] Test that tabs restore when closed, including active tab.
|
1.0
|
Manual tests for iPad 3 1.2.12 beta 1 - ## Installer
1. [x] Check that installer is close to the size of last release.
2. [ ] Check the Brave version in About and make sure it is EXACTLY as expected.
## Data
1. [ ] Make sure that data from the last version appears in the new version OK.
2. [ ] Test that the previous version's cookies are preserved in the next version.
## Bookmarks
1. [x] Test that creating a bookmark in the left well works
2. [x] Test that clicking a bookmark in the left well loads the bookmark.
3. [x] Test that deleting a bookmark in the left well works
## Context menus
1. [x] Make sure context menu items in the URL bar work
2. [x] Make sure context menu items on content work with no selected text.
3. [x] Make sure context menu items on content work with selected text.
4. [x] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable).
## Find on page
1. [x] Ensure search box is shown when selected via the share menu
2. [x] Test successful find
3. [x] Test forward and backward find navigation
4. [x] Test failed find shows 0 results
## Site hacks
1. [x] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it
## Downloads
1. [x] Test downloading a file works and that all actions on the download item works.
## Fullscreen
1. [x] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Zoom
1. [x] Test zoom in / out gestures work
2. [x] Test that navigating to a different origin resets the zoom
## Bravery settings
1. [x] Check that HTTPS Everywhere works by loading http://www.apple.com
2. [x] Turning HTTPS Everywhere off and shields off both disable the redirect to https://www.apple.com
3. [x] Check that ad replacement works on http://slashdot.org
4. [x] Check that toggling to blocking and allow ads works as expected.
5. [x] Test that clicking through a cert error in https://badssl.com/ works.
6. [x] Test that Safe Browsing works (http://excellentmovies.net/)
7. [x] Turning Safe Browsing off and shields off both disable safe browsing for http://excellentmovies.net/.
8. [x] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work.
9. [x] Test that about:preferences default Bravery settings take effect on pages with no site settings.
10. [x] Test that turning on fingerprinting protection in about:preferences shows 3 fingerprints blocked at https://jsfiddle.net/bkf50r8v/13/. Test that turning it off in the Bravery menu shows 0 fingerprints blocked.
11. [x] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/7/ when 3rd party cookies are blocked.
12. [x] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on.
## Content tests
1. [x] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab.
2. [x] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows.
3. [x] Go to http://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown.
4. [x] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`.
5. [x] Open a github issue and type some misspellings, make sure they are underlined.
6. [x] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text.
7. [x] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded.
8. [x] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works.
9. [x] Test that PDF is loaded at http://www.orimi.com/pdf-test.pdf
10. [x] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run).
## Top sites view
1. [x] long-press on top sites to get to deletion mode, and delete a top site (note this will stop that site from showing up again on top sites, so you may not want to do this a site you want to keep there)
## Background
1. [x] Start loading a page, background the app, wait >5 sec, then bring to front, ensure splash screen is not shown
## Per release specialty tests
1. [ ] Test each item in release notes for the release that's going out.
## Session storage
1. [x] Test that tabs restore when closed, including active tab.
|
non_process
|
manual tests for ipad beta installer check that installer is close to the size of last release check the brave version in about and make sure it is exactly as expected data make sure that data from the last version appears in the new version ok test that the previous version s cookies are preserved in the next version bookmarks test that creating a bookmark in the left well works test that clicking a bookmark in the left well loads the bookmark test that deleting a bookmark in the left well works context menus make sure context menu items in the url bar work make sure context menu items on content work with no selected text make sure context menu items on content work with selected text make sure context menu items on content work inside an editable control input textarea or contenteditable find on page ensure search box is shown when selected via the share menu test successful find test forward and backward find navigation test failed find shows results site hacks test sub page loads a video and you can play it downloads test downloading a file works and that all actions on the download item works fullscreen test that entering full screen works and esc to go back youtube com zoom test zoom in out gestures work test that navigating to a different origin resets the zoom bravery settings check that https everywhere works by loading turning https everywhere off and shields off both disable the redirect to check that ad replacement works on check that toggling to blocking and allow ads works as expected test that clicking through a cert error in works test that safe browsing works turning safe browsing off and shields off both disable safe browsing for visit and then turn on script blocking nothing should load allow it from the script blocking ui in the url bar and it should work test that about preferences default bravery settings take effect on pages with no site settings test that turning on fingerprinting protection in about preferences shows fingerprints blocked at test that turning it off in the bravery menu shows fingerprints blocked test that party storage results are blank at when party cookies are blocked test that audio fingerprint is blocked at when fingerprinting protection is on content tests go to and click on the twitter icon on the top right test that context menus work in the new twitter tab load twitter and click on a tweet so the popup div shows click to dismiss and repeat with another div make sure it shows go to and test that clicking on show pops up a notification asking for permission make sure that clicking deny leads to no notifications being shown go to and make sure that the password can be saved make sure the saved password shows up in about passwords open a github issue and type some misspellings make sure they are underlined make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text make sure that command click control click on windows control click on ubuntu on a link opens a new tab but does not switch to it click on it and make sure it is already loaded open an email on or inbox google com and click on a link make sure it works test that pdf is loaded at test that shows up as grey not red no mixed content scripts are run top sites view long press on top sites to get to deletion mode and delete a top site note this will stop that site from showing up again on top sites so you may not want to do this a site you want to keep there background start loading a page background the app wait sec then bring to front ensure splash screen is not shown per release specialty tests test each item in release notes for the release that s going out session storage test that tabs restore when closed including active tab
| 0
|
140,336
| 31,898,232,604
|
IssuesEvent
|
2023-09-18 05:14:28
|
SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348
|
https://api.github.com/repos/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348
|
opened
|
Code Security Report: 24 high severity findings, 39 total findings
|
Mend: code security findings
|
# Code Security Report
### Scan Metadata
**Latest Scan:** 2023-09-18 05:12am
**Total Findings:** 39 | **New Findings:** 0 | **Resolved Findings:** 0
**Tested Project Files:** 422
**Detected Programming Languages:** 2 (JavaScript / Node.js, Java*)
<!-- SAST-MANUAL-SCAN-START -->
- [ ] Check this box to manually trigger a scan
<!-- SAST-MANUAL-SCAN-END -->
### Most Relevant Findings
> The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend Application](https://dev.whitesourcesoftware.com/app/orgs/UP-QA-ORG/scans/7d054dde-08ff-421d-bbc5-d22be591c167/sast?project=ba156f30-d62f-4ceb-b8d8-7811ad8b30ab).
<table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson8.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L61-L66
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L54
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L55
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L58
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson3.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60-L65
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L57
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson5.java:73](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L68-L73
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L67
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L70
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson6a.java:67](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67)
</td><td>3</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L62-L67
<details>
<summary>3 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidation.java#L48
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidation.java#L52
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67
</details>
<details>
<summary>View Data Flow 2</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L51
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L52
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67
</details>
<details>
<summary>View Data Flow 3</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L48
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L53
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionChallenge.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L60-L65
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L63
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson9.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L66)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L61-L66
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L55
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L59
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L61
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L66
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson5a.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57-L62
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L53
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson4.java:63](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L58-L63
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L57
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson2.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L57-L62
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L55
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L59
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[Assignment5.java:59](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L51
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr></tbody></table>
### Findings Overview
| Severity | Vulnerability Type | CWE | Language | Count |
|-|-|-|-|-|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|6|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|14|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|DOM Based Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|JavaScript / Node.js|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Server Side Request Forgery|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Java*|2|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|5|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Weak Pseudo-Random|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|JavaScript / Node.js|2|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|4|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|XML External Entity (XXE) Injection|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|Java*|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|System Properties Disclosure|[CWE-497](https://cwe.mitre.org/data/definitions/497.html)|Java*|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Log Forging|[CWE-117](https://cwe.mitre.org/data/definitions/117.html)|Java*|1|
|
1.0
|
Code Security Report: 24 high severity findings, 39 total findings - # Code Security Report
### Scan Metadata
**Latest Scan:** 2023-09-18 05:12am
**Total Findings:** 39 | **New Findings:** 0 | **Resolved Findings:** 0
**Tested Project Files:** 422
**Detected Programming Languages:** 2 (JavaScript / Node.js, Java*)
<!-- SAST-MANUAL-SCAN-START -->
- [ ] Check this box to manually trigger a scan
<!-- SAST-MANUAL-SCAN-END -->
### Most Relevant Findings
> The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend Application](https://dev.whitesourcesoftware.com/app/orgs/UP-QA-ORG/scans/7d054dde-08ff-421d-bbc5-d22be591c167/sast?project=ba156f30-d62f-4ceb-b8d8-7811ad8b30ab).
<table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson8.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L61-L66
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L54
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L55
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L58
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L66
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson3.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60-L65
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L57
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson3.java#L65
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson5.java:73](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L68-L73
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L67
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L70
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5.java#L73
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson6a.java:67](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67)
</td><td>3</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L62-L67
<details>
<summary>3 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidation.java#L48
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidation.java#L52
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67
</details>
<details>
<summary>View Data Flow 2</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L51
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L52
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67
</details>
<details>
<summary>View Data Flow 3</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L48
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L49
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/mitigation/SqlOnlyInputValidationOnKeywords.java#L53
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionLesson6a.java#L67
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionChallenge.java:65](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L60-L65
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L63
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/advanced/SqlInjectionChallenge.java#L65
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson9.java:66](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L66)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L61-L66
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L55
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L59
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L61
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson8.java#L128
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L65
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson9.java#L66
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson5a.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57-L62
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L53
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L54
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L57
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson5a.java#L62
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson4.java:63](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L58-L63
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L57
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L60
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson4.java#L63
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[SqlInjectionLesson2.java:62](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L57-L62
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L55
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L56
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L59
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/sql_injection/introduction/SqlInjectionLesson2.java#L62
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>SQL Injection</td><td>
[CWE-89](https://cwe.mitre.org/data/definitions/89.html)
</td><td>
[Assignment5.java:59](https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59)
</td><td>1</td><td>2023-09-18 05:14am</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L54-L59
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L51
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59
https://github.com/SAST-UP-DEV/SAST-Test-Repo-3c19e63a-91de-44fb-beaa-172ac3e45348/blob/590d0bb5b0c3b1fc231393f5a098ea2b0264bf98/src/main/java/org/owasp/webgoat/lessons/challenges/challenge5/Assignment5.java#L59
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior SQL Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/sql/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior SQL Injection Video](https://media.securecodewarrior.com/v2/module_01_sql_injection.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP SQL Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html)</li>
<li>
[OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)</li>
<li>
[OWASP Query Parameterization Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Query_Parameterization_Cheat_Sheet.html)</li>
</ul></li>
</ul>
</details>
</td></tr></tbody></table>
### Findings Overview
| Severity | Vulnerability Type | CWE | Language | Count |
|-|-|-|-|-|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|6|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|14|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|DOM Based Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|JavaScript / Node.js|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Server Side Request Forgery|[CWE-918](https://cwe.mitre.org/data/definitions/918.html)|Java*|2|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|5|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Weak Pseudo-Random|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|JavaScript / Node.js|2|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|4|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|XML External Entity (XXE) Injection|[CWE-611](https://cwe.mitre.org/data/definitions/611.html)|Java*|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|System Properties Disclosure|[CWE-497](https://cwe.mitre.org/data/definitions/497.html)|Java*|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|1|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Log Forging|[CWE-117](https://cwe.mitre.org/data/definitions/117.html)|Java*|1|
|
non_process
|
code security report high severity findings total findings code security report scan metadata latest scan total findings new findings resolved findings tested project files detected programming languages javascript node js java check this box to manually trigger a scan most relevant findings the below list presents the most relevant findings that need your attention to view information on the remaining findings navigate to the severity vulnerability type cwe file data flows date high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow view data flow view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high sql injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading findings overview severity vulnerability type cwe language count high path directory traversal high sql injection high deserialization of untrusted data high dom based cross site scripting node js high server side request forgery medium error messages information exposure medium weak pseudo random node js medium hardcoded password credentials medium xml external entity xxe injection low system properties disclosure low weak hash strength low log forging
| 0
|
9,088
| 12,155,240,161
|
IssuesEvent
|
2020-04-25 12:14:28
|
code4romania/expert-consultation-api
|
https://api.github.com/repos/code4romania/expert-consultation-api
|
closed
|
Assign entire document to one ore more users in the platform
|
document processing documents java spring
|
As an admin of the Legal Consultation platform I want to be able to assign a document to a user in the platform.
We need to create a new entity that will contain the relationship between the document and the user. A user that has been added to a document will be able to post comments on that document. Every user will be able to view the documents in the platform.

|
1.0
|
Assign entire document to one ore more users in the platform - As an admin of the Legal Consultation platform I want to be able to assign a document to a user in the platform.
We need to create a new entity that will contain the relationship between the document and the user. A user that has been added to a document will be able to post comments on that document. Every user will be able to view the documents in the platform.

|
process
|
assign entire document to one ore more users in the platform as an admin of the legal consultation platform i want to be able to assign a document to a user in the platform we need to create a new entity that will contain the relationship between the document and the user a user that has been added to a document will be able to post comments on that document every user will be able to view the documents in the platform
| 1
|
281,538
| 30,888,885,639
|
IssuesEvent
|
2023-08-04 01:58:04
|
artsking/linux-4.1.15_noPatch
|
https://api.github.com/repos/artsking/linux-4.1.15_noPatch
|
reopened
|
CVE-2016-2069 (High) detected in linux-stable-rtv4.1.33
|
Mend: dependency security vulnerability
|
## CVE-2016-2069 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/artsking/linux-4.1.15_noPatch/commit/2a4fd3afc623ae79fea13880ff39350d42fea4e6">2a4fd3afc623ae79fea13880ff39350d42fea4e6</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
<p>Publish Date: 2016-04-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2069>CVE-2016-2069</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">https://nvd.nist.gov/vuln/detail/CVE-2016-2069</a></p>
<p>Release Date: 2016-04-27</p>
<p>Fix Resolution: 4.4.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2016-2069 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2016-2069 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/artsking/linux-4.1.15_noPatch/commit/2a4fd3afc623ae79fea13880ff39350d42fea4e6">2a4fd3afc623ae79fea13880ff39350d42fea4e6</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
<p>Publish Date: 2016-04-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-2069>CVE-2016-2069</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">https://nvd.nist.gov/vuln/detail/CVE-2016-2069</a></p>
<p>Release Date: 2016-04-27</p>
<p>Fix Resolution: 4.4.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details race condition in arch mm tlb c in the linux kernel before allows local users to gain privileges by triggering access to a paging structure by a different cpu publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
| 0
|
172,523
| 14,365,132,930
|
IssuesEvent
|
2020-12-01 01:03:24
|
True-Stay/true-stay-app
|
https://api.github.com/repos/True-Stay/true-stay-app
|
closed
|
Code General Listings UI
|
documentation user story
|
<img width="342" alt="Screen Shot 2020-11-19 at 11 42 14 AM" src="https://user-images.githubusercontent.com/45430120/99696071-46e98900-2a5c-11eb-9504-86287868d343.png">
**Listing details will be shown, the following info is included:
Listing Title/ Listing Pic/Listing Price/Listing Description/Listing Location/Listing Map/Listing Landlord/Listing Review**
|
1.0
|
Code General Listings UI - <img width="342" alt="Screen Shot 2020-11-19 at 11 42 14 AM" src="https://user-images.githubusercontent.com/45430120/99696071-46e98900-2a5c-11eb-9504-86287868d343.png">
**Listing details will be shown, the following info is included:
Listing Title/ Listing Pic/Listing Price/Listing Description/Listing Location/Listing Map/Listing Landlord/Listing Review**
|
non_process
|
code general listings ui img width alt screen shot at am src listing details will be shown the following info is included listing title listing pic listing price listing description listing location listing map listing landlord listing review
| 0
|
19,083
| 25,127,845,472
|
IssuesEvent
|
2022-11-09 13:07:58
|
FreeCAD/FreeCAD
|
https://api.github.com/repos/FreeCAD/FreeCAD
|
closed
|
[Problem] PR Template does not match CONTRIBUTING.md
|
Process
|
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Version
0.21 (Development)
### Full version info
```shell
n/a
```
### Subproject(s) affected?
Other (specify in description)
### Problem description
The [Pull Request template](https://github.com/FreeCAD/FreeCAD/blob/master/.github/PULL_REQUEST_TEMPLATE.md) does not match the requirements in CONTRIBUTING.md -- it specifies some additional "rules" that don't correspond to our current process, and likely needs to be updated.
### Anything else?
_No response_
### Code of Conduct
- [X] I agree to follow this project's Code of Conduct
|
1.0
|
[Problem] PR Template does not match CONTRIBUTING.md - ### Is there an existing issue for this?
- [X] I have searched the existing issues
### Version
0.21 (Development)
### Full version info
```shell
n/a
```
### Subproject(s) affected?
Other (specify in description)
### Problem description
The [Pull Request template](https://github.com/FreeCAD/FreeCAD/blob/master/.github/PULL_REQUEST_TEMPLATE.md) does not match the requirements in CONTRIBUTING.md -- it specifies some additional "rules" that don't correspond to our current process, and likely needs to be updated.
### Anything else?
_No response_
### Code of Conduct
- [X] I agree to follow this project's Code of Conduct
|
process
|
pr template does not match contributing md is there an existing issue for this i have searched the existing issues version development full version info shell n a subproject s affected other specify in description problem description the does not match the requirements in contributing md it specifies some additional rules that don t correspond to our current process and likely needs to be updated anything else no response code of conduct i agree to follow this project s code of conduct
| 1
|
3,672
| 6,706,513,749
|
IssuesEvent
|
2017-10-12 07:24:45
|
nuclio/nuclio
|
https://api.github.com/repos/nuclio/nuclio
|
closed
|
Handler panics / exceptions in synchronous events should return a traceback
|
area/processor priority/medium
|
1. If a panic occurs in a handler, the response body should contain the panic traceback
2. If an exception occurs in a handler, the response body should contain the exception traceback
3. There should be a configuration variable that disables this
The above should have integration tests verifying this
|
1.0
|
Handler panics / exceptions in synchronous events should return a traceback - 1. If a panic occurs in a handler, the response body should contain the panic traceback
2. If an exception occurs in a handler, the response body should contain the exception traceback
3. There should be a configuration variable that disables this
The above should have integration tests verifying this
|
process
|
handler panics exceptions in synchronous events should return a traceback if a panic occurs in a handler the response body should contain the panic traceback if an exception occurs in a handler the response body should contain the exception traceback there should be a configuration variable that disables this the above should have integration tests verifying this
| 1
|
215,244
| 7,292,808,034
|
IssuesEvent
|
2018-02-25 06:26:54
|
PaulL48/SOEN341-SC4
|
https://api.github.com/repos/PaulL48/SOEN341-SC4
|
closed
|
Add question asking back-end
|
back-end feature priority: high risk: low sp 3
|
Add a database containing questions asked by users and a function to add new questions.
|
1.0
|
Add question asking back-end - Add a database containing questions asked by users and a function to add new questions.
|
non_process
|
add question asking back end add a database containing questions asked by users and a function to add new questions
| 0
|
8,078
| 11,252,476,853
|
IssuesEvent
|
2020-01-11 08:59:11
|
QuodAI/semantic-engine
|
https://api.github.com/repos/QuodAI/semantic-engine
|
opened
|
Preprocess and analyze subtokens from 14 top JS repos
|
dataprocessing statistical
|
vbudhram/fantasy-football-io/
muffinista/wayback_exe
Matterwiki/Matterwiki
Flagship repo:
timeoff-management/application
sdelements/lets-chat
proshoumma/ReForum
sahat/tvshow-tracker
mashery/iodocs
Cezerin2/cezerin2
gilbitron/Raneto
joeferner/redis-commander
tellform/tellform
thelounge/thelounge
hackmdio/codimd
|
1.0
|
Preprocess and analyze subtokens from 14 top JS repos - vbudhram/fantasy-football-io/
muffinista/wayback_exe
Matterwiki/Matterwiki
Flagship repo:
timeoff-management/application
sdelements/lets-chat
proshoumma/ReForum
sahat/tvshow-tracker
mashery/iodocs
Cezerin2/cezerin2
gilbitron/Raneto
joeferner/redis-commander
tellform/tellform
thelounge/thelounge
hackmdio/codimd
|
process
|
preprocess and analyze subtokens from top js repos vbudhram fantasy football io muffinista wayback exe matterwiki matterwiki flagship repo timeoff management application sdelements lets chat proshoumma reforum sahat tvshow tracker mashery iodocs gilbitron raneto joeferner redis commander tellform tellform thelounge thelounge hackmdio codimd
| 1
|
47,973
| 13,298,461,911
|
IssuesEvent
|
2020-08-25 08:18:07
|
YauheniPo/Atlas_Popo_GUI_Framework
|
https://api.github.com/repos/YauheniPo/Atlas_Popo_GUI_Framework
|
opened
|
WS-2019-0379 (Medium) detected in commons-codec-1.10.jar
|
security vulnerability
|
## WS-2019-0379 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-codec-1.10.jar</b></p></summary>
<p>The Apache Commons Codec package contains simple encoder and decoders for
various formats such as Base64 and Hexadecimal. In addition to these
widely used encoders and decoders, the codec package also maintains a
collection of phonetic encoding utilities.</p>
<p>Path to dependency file: /tmp/ws-scm/Atlas_Popo_GUI_Framework/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p>
<p>
Dependency Hierarchy:
- webdrivermanager-3.4.0.jar (Root Library)
- httpclient-4.5.6.jar
- :x: **commons-codec-1.10.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/YauheniPo/Atlas_Popo_GUI_Framework/commit/865d1eab5956d1b38c4acaaa788e8fb4996089b5">865d1eab5956d1b38c4acaaa788e8fb4996089b5</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation.
<p>Publish Date: 2019-05-20
<p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113">https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113</a></p>
<p>Release Date: 2019-05-12</p>
<p>Fix Resolution: 1.13-RC1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
WS-2019-0379 (Medium) detected in commons-codec-1.10.jar - ## WS-2019-0379 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-codec-1.10.jar</b></p></summary>
<p>The Apache Commons Codec package contains simple encoder and decoders for
various formats such as Base64 and Hexadecimal. In addition to these
widely used encoders and decoders, the codec package also maintains a
collection of phonetic encoding utilities.</p>
<p>Path to dependency file: /tmp/ws-scm/Atlas_Popo_GUI_Framework/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p>
<p>
Dependency Hierarchy:
- webdrivermanager-3.4.0.jar (Root Library)
- httpclient-4.5.6.jar
- :x: **commons-codec-1.10.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/YauheniPo/Atlas_Popo_GUI_Framework/commit/865d1eab5956d1b38c4acaaa788e8fb4996089b5">865d1eab5956d1b38c4acaaa788e8fb4996089b5</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation.
<p>Publish Date: 2019-05-20
<p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113">https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113</a></p>
<p>Release Date: 2019-05-12</p>
<p>Fix Resolution: 1.13-RC1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_process
|
ws medium detected in commons codec jar ws medium severity vulnerability vulnerable library commons codec jar the apache commons codec package contains simple encoder and decoders for various formats such as and hexadecimal in addition to these widely used encoders and decoders the codec package also maintains a collection of phonetic encoding utilities path to dependency file tmp ws scm atlas popo gui framework pom xml path to vulnerable library home wss scanner repository commons codec commons codec commons codec jar dependency hierarchy webdrivermanager jar root library httpclient jar x commons codec jar vulnerable library found in head commit a href vulnerability details apache commons codec before version “commons codec ” is vulnerable to information disclosure due to improper input validation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
| 0
|
316,887
| 9,658,236,676
|
IssuesEvent
|
2019-05-20 10:28:47
|
mozilla/addons-server
|
https://api.github.com/repos/mozilla/addons-server
|
closed
|
Search results don't boost recommended addons when searching without a query string
|
component: search priority: p3
|
[Recommended add-ons]
Follow up for #11066
**STR:**
1. Open AMO -dev
2. Try to search for add-on without providing a query string- i.e. https://addons-dev.allizom.org/en-US/firefox/search/ or https://addons-dev.allizom.org/en-US/firefox/search/?type=extension
3. Observe the results
**Actual result:**
As per @eviljeff 's comment in https://github.com/mozilla/addons-server/issues/11066#issuecomment-492254041, when no search string is provided , the API defaults to weekly downloads. On -dev, at least, this means that recommended add-ons are not boosted in search results
**Expected result:**
Since we plan to boost recommended extensions in search results, I would expect to see the add-ons from the [curated list](https://addons-internal.dev.mozaws.net/en-US/admin/models/discovery/discoveryitem/) on the first pages of results when no search string was provided.
**Notes:**
- the [PRD](https://docs.google.com/document/d/1fRxLy7h02tn1HBIlsTU_6h9DHmN8c3N6bg4JoxHF7J8/edit#heading=h.5kvm14zbadi2) doesn't mention an approach for this specific scenario
|
1.0
|
Search results don't boost recommended addons when searching without a query string - [Recommended add-ons]
Follow up for #11066
**STR:**
1. Open AMO -dev
2. Try to search for add-on without providing a query string- i.e. https://addons-dev.allizom.org/en-US/firefox/search/ or https://addons-dev.allizom.org/en-US/firefox/search/?type=extension
3. Observe the results
**Actual result:**
As per @eviljeff 's comment in https://github.com/mozilla/addons-server/issues/11066#issuecomment-492254041, when no search string is provided , the API defaults to weekly downloads. On -dev, at least, this means that recommended add-ons are not boosted in search results
**Expected result:**
Since we plan to boost recommended extensions in search results, I would expect to see the add-ons from the [curated list](https://addons-internal.dev.mozaws.net/en-US/admin/models/discovery/discoveryitem/) on the first pages of results when no search string was provided.
**Notes:**
- the [PRD](https://docs.google.com/document/d/1fRxLy7h02tn1HBIlsTU_6h9DHmN8c3N6bg4JoxHF7J8/edit#heading=h.5kvm14zbadi2) doesn't mention an approach for this specific scenario
|
non_process
|
search results don t boost recommended addons when searching without a query string follow up for str open amo dev try to search for add on without providing a query string i e or observe the results actual result as per eviljeff s comment in when no search string is provided the api defaults to weekly downloads on dev at least this means that recommended add ons are not boosted in search results expected result since we plan to boost recommended extensions in search results i would expect to see the add ons from the on the first pages of results when no search string was provided notes the doesn t mention an approach for this specific scenario
| 0
|
112,272
| 9,559,202,505
|
IssuesEvent
|
2019-05-03 16:02:09
|
SunwellTracker/issues
|
https://api.github.com/repos/SunwellTracker/issues
|
closed
|
QUEST: "The Captive Prospectors"
|
Works locally OR Requires testing
|
Description: You need to find a key and open cages to free NPCs. Its a quest in Grizzly Hills.
How it works: You get the key (the drop rate is pretty low, so its hard to find one), you open the cage, but the NPC is not moving out, so the quest can not be completed.
How it should work: https://www.youtube.com/watch?v=2hbsGrb65z0
Source (you should point out proofs of your report, please give us some source):
|
1.0
|
QUEST: "The Captive Prospectors" - Description: You need to find a key and open cages to free NPCs. Its a quest in Grizzly Hills.
How it works: You get the key (the drop rate is pretty low, so its hard to find one), you open the cage, but the NPC is not moving out, so the quest can not be completed.
How it should work: https://www.youtube.com/watch?v=2hbsGrb65z0
Source (you should point out proofs of your report, please give us some source):
|
non_process
|
quest the captive prospectors description you need to find a key and open cages to free npcs its a quest in grizzly hills how it works you get the key the drop rate is pretty low so its hard to find one you open the cage but the npc is not moving out so the quest can not be completed how it should work source you should point out proofs of your report please give us some source
| 0
|
20,854
| 27,634,520,053
|
IssuesEvent
|
2023-03-10 13:29:07
|
notofonts/nushu
|
https://api.github.com/repos/notofonts/nushu
|
closed
|
NotoTraditionalNushu-Regular include Latin glyphs from Source Sans
|
Noto-Process-Issue
|
## Defect Report
### Title
The NotoTraditionalNushu fonts include Latin glyphs from Source Sans in addition to the Nushu glyphs. This is inconsistent with the general Noto practice. Is this intentional?
The NotoSansNushu fonts only have Nushu glyphs/
### Font
NotoTraditionalNushu-Regular.ttf, NotoTraditionalNushu-Regular.otf, NotoTraditionalNushu-Medium-VF.ttf,
### Where the font came from, and when
This repo
### Screenshot
<img width="1536" alt="scr- 2021-03-31 at 09 56 21" src="https://user-images.githubusercontent.com/519108/113110451-6319e580-9207-11eb-91f2-9310a9ee6d4a.png">
|
1.0
|
NotoTraditionalNushu-Regular include Latin glyphs from Source Sans - ## Defect Report
### Title
The NotoTraditionalNushu fonts include Latin glyphs from Source Sans in addition to the Nushu glyphs. This is inconsistent with the general Noto practice. Is this intentional?
The NotoSansNushu fonts only have Nushu glyphs/
### Font
NotoTraditionalNushu-Regular.ttf, NotoTraditionalNushu-Regular.otf, NotoTraditionalNushu-Medium-VF.ttf,
### Where the font came from, and when
This repo
### Screenshot
<img width="1536" alt="scr- 2021-03-31 at 09 56 21" src="https://user-images.githubusercontent.com/519108/113110451-6319e580-9207-11eb-91f2-9310a9ee6d4a.png">
|
process
|
nototraditionalnushu regular include latin glyphs from source sans defect report title the nototraditionalnushu fonts include latin glyphs from source sans in addition to the nushu glyphs this is inconsistent with the general noto practice is this intentional the notosansnushu fonts only have nushu glyphs font nototraditionalnushu regular ttf nototraditionalnushu regular otf nototraditionalnushu medium vf ttf where the font came from and when this repo screenshot img width alt scr at src
| 1
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.