Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
7
112
repo_url
stringlengths
36
141
action
stringclasses
3 values
title
stringlengths
1
744
labels
stringlengths
4
574
body
stringlengths
9
211k
index
stringclasses
10 values
text_combine
stringlengths
96
211k
label
stringclasses
2 values
text
stringlengths
96
188k
binary_label
int64
0
1
19,945
26,419,628,538
IssuesEvent
2023-01-13 19:04:45
ORNL-AMO/AMO-Tools-Desktop
https://api.github.com/repos/ORNL-AMO/AMO-Tools-Desktop
closed
Solid Fuel Composition
Process Heating Steam
Why is ambient air temp in here. it doesn't seem to do anything ambient air temp is now part of the main form, could we just use that for whatever this one is for? ![image.png](https://images.zenhubusercontent.com/5cd48a2af8cffa5a19122d27/d2dcc67b-b63a-4781-814b-28e056fd5713)
1.0
Solid Fuel Composition - Why is ambient air temp in here. it doesn't seem to do anything ambient air temp is now part of the main form, could we just use that for whatever this one is for? ![image.png](https://images.zenhubusercontent.com/5cd48a2af8cffa5a19122d27/d2dcc67b-b63a-4781-814b-28e056fd5713)
process
solid fuel composition why is ambient air temp in here it doesn t seem to do anything ambient air temp is now part of the main form could we just use that for whatever this one is for
1
12,516
14,964,463,745
IssuesEvent
2021-01-27 12:01:15
threefoldtech/js-sdk
https://api.github.com/repos/threefoldtech/js-sdk
closed
Deplot of Marketplace blog failed.
priority_major process_wontfix type_bug
In my VDC (weynandkuijpers.3bot) I wanted to deploy a blog. I used the following GitHub repo is input: https://github.com/weynandkuijpers/mytrunk (not an empty repo) ![image](https://user-images.githubusercontent.com/13766992/105955242-679f1200-608f-11eb-9a84-88cf3e244550.png) ![image](https://user-images.githubusercontent.com/13766992/105955358-96b58380-608f-11eb-9170-3b5e89f194ae.png)
1.0
Deplot of Marketplace blog failed. - In my VDC (weynandkuijpers.3bot) I wanted to deploy a blog. I used the following GitHub repo is input: https://github.com/weynandkuijpers/mytrunk (not an empty repo) ![image](https://user-images.githubusercontent.com/13766992/105955242-679f1200-608f-11eb-9a84-88cf3e244550.png) ![image](https://user-images.githubusercontent.com/13766992/105955358-96b58380-608f-11eb-9170-3b5e89f194ae.png)
process
deplot of marketplace blog failed in my vdc weynandkuijpers i wanted to deploy a blog i used the following github repo is input not an empty repo
1
330,246
24,252,683,018
IssuesEvent
2022-09-27 15:15:53
awslabs/syne-tune
https://api.github.com/repos/awslabs/syne-tune
closed
Tutorial: How to Contribute a New Scheduler
documentation
This is a tutorial for developers, walking through examples for how to: - Implement a new scheduler - Extend generic scheduler code (async HB, sync HB examples) - Link new searcher into searcher_factory
1.0
Tutorial: How to Contribute a New Scheduler - This is a tutorial for developers, walking through examples for how to: - Implement a new scheduler - Extend generic scheduler code (async HB, sync HB examples) - Link new searcher into searcher_factory
non_process
tutorial how to contribute a new scheduler this is a tutorial for developers walking through examples for how to implement a new scheduler extend generic scheduler code async hb sync hb examples link new searcher into searcher factory
0
3,868
6,808,646,198
IssuesEvent
2017-11-04 06:08:29
Great-Hill-Corporation/quickBlocks
https://api.github.com/repos/Great-Hill-Corporation/quickBlocks
reopened
In transactions.cpp parseParams needs to be removed
apps-ethslurp libs-etherlib status-inprocess type-bug
From https://github.com/Great-Hill-Corporation/ethslurp/issues/130 This code was a very early way to parse functions but it is totally wrong. It has all been subsumed by the monitors, but does have the benefit of not requiring a separate piece of software. In other words remove it, but don't lose the ability to parse a totally arbitrary input data the way ethslurp does. But also don't require a full-fledged monitor program. In other words--input parsing should happen fully through the ABI if that is the only thing present, but through the parse library if that is what is needed for speed or flexibility. Note that monitors use this code to fill in the [{FUNCTION}] tag.
1.0
In transactions.cpp parseParams needs to be removed - From https://github.com/Great-Hill-Corporation/ethslurp/issues/130 This code was a very early way to parse functions but it is totally wrong. It has all been subsumed by the monitors, but does have the benefit of not requiring a separate piece of software. In other words remove it, but don't lose the ability to parse a totally arbitrary input data the way ethslurp does. But also don't require a full-fledged monitor program. In other words--input parsing should happen fully through the ABI if that is the only thing present, but through the parse library if that is what is needed for speed or flexibility. Note that monitors use this code to fill in the [{FUNCTION}] tag.
process
in transactions cpp parseparams needs to be removed from this code was a very early way to parse functions but it is totally wrong it has all been subsumed by the monitors but does have the benefit of not requiring a separate piece of software in other words remove it but don t lose the ability to parse a totally arbitrary input data the way ethslurp does but also don t require a full fledged monitor program in other words input parsing should happen fully through the abi if that is the only thing present but through the parse library if that is what is needed for speed or flexibility note that monitors use this code to fill in the tag
1
15,355
19,529,388,691
IssuesEvent
2021-12-30 14:01:56
nodejs/node
https://api.github.com/repos/nodejs/node
closed
discussion about how to fix child_process 'spawn' not ready to send messages on ESM
child_process feature request
<!-- Thank you for suggesting an idea to make Node.js better. Please fill in as much of the template below as you're able. --> BTW: I'd like to help fixing this bug 🤩 **Is your feature request related to a problem? Please describe.** There's a current issue on spawn's child processes using ES modules mentioned in those issues (#37782, #39140, #39140, #34785, and [help/issues/1383](https://github.com/nodejs/help/issues/1383) ). When you fork a file and immediately use the `.send` event. The child process doesn't receive messages because it's not ready yet. So we need to make a workaround. The child emits an event, the parent waits for `.on('message',` we check the message and then we start sending messages to the child. **Describe the solution you'd like** My plan initially was to add an event like `child.on("ready` to specify when we can start sending messages to the child process. I spoke to @addaleax and she suggested a behavior that is closer to what `MessagePorts` expose, which is queueing up messages until a message listener is installed. I know that it would increase implementation complexity a bit, but it would be very helpful for avoiding pitfalls like the ones linked here What do you think? Any ideas of what could we do?
1.0
discussion about how to fix child_process 'spawn' not ready to send messages on ESM - <!-- Thank you for suggesting an idea to make Node.js better. Please fill in as much of the template below as you're able. --> BTW: I'd like to help fixing this bug 🤩 **Is your feature request related to a problem? Please describe.** There's a current issue on spawn's child processes using ES modules mentioned in those issues (#37782, #39140, #39140, #34785, and [help/issues/1383](https://github.com/nodejs/help/issues/1383) ). When you fork a file and immediately use the `.send` event. The child process doesn't receive messages because it's not ready yet. So we need to make a workaround. The child emits an event, the parent waits for `.on('message',` we check the message and then we start sending messages to the child. **Describe the solution you'd like** My plan initially was to add an event like `child.on("ready` to specify when we can start sending messages to the child process. I spoke to @addaleax and she suggested a behavior that is closer to what `MessagePorts` expose, which is queueing up messages until a message listener is installed. I know that it would increase implementation complexity a bit, but it would be very helpful for avoiding pitfalls like the ones linked here What do you think? Any ideas of what could we do?
process
discussion about how to fix child process spawn not ready to send messages on esm thank you for suggesting an idea to make node js better please fill in as much of the template below as you re able btw i d like to help fixing this bug 🤩 is your feature request related to a problem please describe there s a current issue on spawn s child processes using es modules mentioned in those issues and when you fork a file and immediately use the send event the child process doesn t receive messages because it s not ready yet so we need to make a workaround the child emits an event the parent waits for on message we check the message and then we start sending messages to the child describe the solution you d like my plan initially was to add an event like child on ready to specify when we can start sending messages to the child process i spoke to addaleax and she suggested a behavior that is closer to what messageports expose which is queueing up messages until a message listener is installed i know that it would increase implementation complexity a bit but it would be very helpful for avoiding pitfalls like the ones linked here what do you think any ideas of what could we do
1
374,052
26,097,713,534
IssuesEvent
2022-12-26 23:55:00
MPoL-dev/visread
https://api.github.com/repos/MPoL-dev/visread
closed
Refactor reading routines
documentation enhancement
**Is your feature request related to a problem or opportunity? Please describe.** We want to open up visread and the CASA internals to the user as much as possible, so that they can inspect the visibilities provided by ALMA and CASA to immediately spot errors *before* they get to later analysis. **Describe the solution you'd like** I think one way to achieve this is by writing lots of self-contained reading/analysis scripts based off of casatools like `table` and `ms`, and then writing lots of routines demonstrating how to use them. Even better is if we directly show the user how to interact with the data with the casatools *first*, and then provide the wrapped routines. Ultimately, a tutorial of an API will be a lot more useful than a blackbox `read` routine. **Questions to address** We want the user to be able to discover things like * multiple spectral windows * multiple polarizations * flagged visibilities * autocorrelation visibilities * tclean model column * incorrectly scaled weights (using tclean) * averaging polarizations * S/N of visibilities For spectral line datasets * noise covariance for binned/unbinned
1.0
Refactor reading routines - **Is your feature request related to a problem or opportunity? Please describe.** We want to open up visread and the CASA internals to the user as much as possible, so that they can inspect the visibilities provided by ALMA and CASA to immediately spot errors *before* they get to later analysis. **Describe the solution you'd like** I think one way to achieve this is by writing lots of self-contained reading/analysis scripts based off of casatools like `table` and `ms`, and then writing lots of routines demonstrating how to use them. Even better is if we directly show the user how to interact with the data with the casatools *first*, and then provide the wrapped routines. Ultimately, a tutorial of an API will be a lot more useful than a blackbox `read` routine. **Questions to address** We want the user to be able to discover things like * multiple spectral windows * multiple polarizations * flagged visibilities * autocorrelation visibilities * tclean model column * incorrectly scaled weights (using tclean) * averaging polarizations * S/N of visibilities For spectral line datasets * noise covariance for binned/unbinned
non_process
refactor reading routines is your feature request related to a problem or opportunity please describe we want to open up visread and the casa internals to the user as much as possible so that they can inspect the visibilities provided by alma and casa to immediately spot errors before they get to later analysis describe the solution you d like i think one way to achieve this is by writing lots of self contained reading analysis scripts based off of casatools like table and ms and then writing lots of routines demonstrating how to use them even better is if we directly show the user how to interact with the data with the casatools first and then provide the wrapped routines ultimately a tutorial of an api will be a lot more useful than a blackbox read routine questions to address we want the user to be able to discover things like multiple spectral windows multiple polarizations flagged visibilities autocorrelation visibilities tclean model column incorrectly scaled weights using tclean averaging polarizations s n of visibilities for spectral line datasets noise covariance for binned unbinned
0
276,818
24,023,238,222
IssuesEvent
2022-09-15 09:22:03
Kong/kubernetes-ingress-controller
https://api.github.com/repos/Kong/kubernetes-ingress-controller
opened
Flaky conformance test `TestGatewayConformance/Multiple_HTTP_listeners_with_the_same_port_and_different_hostnames,_each_with_a_different_HTTPRoute`
area/testing test-flake
Looks like a timeout waiting on some condition: ``` --- FAIL: TestGatewayConformance/Multiple_HTTP_listeners_with_the_same_port_and_different_hostnames,_each_with_a_different_HTTPRoute (61.14s) ``` Related CI run: https://github.com/Kong/kubernetes-ingress-controller/actions/runs/3059105976/jobs/4936093386#step:5:10547
2.0
Flaky conformance test `TestGatewayConformance/Multiple_HTTP_listeners_with_the_same_port_and_different_hostnames,_each_with_a_different_HTTPRoute` - Looks like a timeout waiting on some condition: ``` --- FAIL: TestGatewayConformance/Multiple_HTTP_listeners_with_the_same_port_and_different_hostnames,_each_with_a_different_HTTPRoute (61.14s) ``` Related CI run: https://github.com/Kong/kubernetes-ingress-controller/actions/runs/3059105976/jobs/4936093386#step:5:10547
non_process
flaky conformance test testgatewayconformance multiple http listeners with the same port and different hostnames each with a different httproute looks like a timeout waiting on some condition fail testgatewayconformance multiple http listeners with the same port and different hostnames each with a different httproute related ci run
0
2,412
5,198,193,281
IssuesEvent
2017-01-23 17:27:05
coala/teams
https://api.github.com/repos/coala/teams
closed
Community Team Member Application: Udayan Tandon
community_team process/approved
# Bio I'm RTL(Research Team Lead). Have contributed to coala for two years coming up next month. # coala Contributions so far Many contributions to core and a failed GUI(Yes I'm owning it :P ). # Road to the Future Make research a habit in coala and apply to as many outreach programs as possible. # Specific Responsibilities Applying for RGSoC for the next month.
1.0
Community Team Member Application: Udayan Tandon - # Bio I'm RTL(Research Team Lead). Have contributed to coala for two years coming up next month. # coala Contributions so far Many contributions to core and a failed GUI(Yes I'm owning it :P ). # Road to the Future Make research a habit in coala and apply to as many outreach programs as possible. # Specific Responsibilities Applying for RGSoC for the next month.
process
community team member application udayan tandon bio i m rtl research team lead have contributed to coala for two years coming up next month coala contributions so far many contributions to core and a failed gui yes i m owning it p road to the future make research a habit in coala and apply to as many outreach programs as possible specific responsibilities applying for rgsoc for the next month
1
62,185
14,656,451,616
IssuesEvent
2020-12-28 13:27:24
fu1771695yongxie/impress.js
https://api.github.com/repos/fu1771695yongxie/impress.js
opened
CVE-2020-7751 (High) detected in pathval-0.1.1.tgz
security vulnerability
## CVE-2020-7751 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pathval-0.1.1.tgz</b></p></summary> <p>Object value retrieval given a string path</p> <p>Library home page: <a href="https://registry.npmjs.org/pathval/-/pathval-0.1.1.tgz">https://registry.npmjs.org/pathval/-/pathval-0.1.1.tgz</a></p> <p>Path to dependency file: impress.js/package.json</p> <p>Path to vulnerable library: impress.js/node_modules/pathval/package.json</p> <p> Dependency Hierarchy: - jscs-3.0.7.tgz (Root Library) - :x: **pathval-0.1.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/impress.js/commit/61e39e98a0c168a3daebbdcbe1ca9173f50db8ff">61e39e98a0c168a3daebbdcbe1ca9173f50db8ff</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects all versions of package pathval. <p>Publish Date: 2020-10-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7751>CVE-2020-7751</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7751 (High) detected in pathval-0.1.1.tgz - ## CVE-2020-7751 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pathval-0.1.1.tgz</b></p></summary> <p>Object value retrieval given a string path</p> <p>Library home page: <a href="https://registry.npmjs.org/pathval/-/pathval-0.1.1.tgz">https://registry.npmjs.org/pathval/-/pathval-0.1.1.tgz</a></p> <p>Path to dependency file: impress.js/package.json</p> <p>Path to vulnerable library: impress.js/node_modules/pathval/package.json</p> <p> Dependency Hierarchy: - jscs-3.0.7.tgz (Root Library) - :x: **pathval-0.1.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fu1771695yongxie/impress.js/commit/61e39e98a0c168a3daebbdcbe1ca9173f50db8ff">61e39e98a0c168a3daebbdcbe1ca9173f50db8ff</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects all versions of package pathval. <p>Publish Date: 2020-10-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7751>CVE-2020-7751</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve high detected in pathval tgz cve high severity vulnerability vulnerable library pathval tgz object value retrieval given a string path library home page a href path to dependency file impress js package json path to vulnerable library impress js node modules pathval package json dependency hierarchy jscs tgz root library x pathval tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects all versions of package pathval publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource
0
1,418
3,984,997,487
IssuesEvent
2016-05-07 15:43:28
nodejs/node
https://api.github.com/repos/nodejs/node
closed
process.env variable leading '=' truncated
os x process
<!-- Thanks for wanting to report an issue you've found in Node.js. Please fill in the template below by replacing the html comments with an appropriate answer. If unsure about something, just do as best as you're able. version: usually output of `node -v` platform: either `uname -a` output, or if Windows, version and 32 or 64-bit. subsystem: optional -- if known please specify affected core module name. It will be much easier for us to fix the issue if a test case that reproduces the problem is provided. Ideally this test case should not have any external dependencies. We understand that it is not always possible to reduce your code to a small test case, but we would appreciate to have as much data as possible. Thank you! --> * **Version**: 6.0.0 * **Platform**: 15.0.0 Darwin RELEASE_X86_64 * **Subsystem**: process <!-- Enter your issue details below this comment. --> Hello I just recently got a ticket filed on a npm module, [dotenv](https://github.com/motdotla/dotenv), I help maintain. It has to do with a "=" being at the front of an environment variable. While investigating I noticed our parser was picking up on this character fine, but when trying to use dotenv's `preload` option the [tests started failing](https://travis-ci.org/motdotla/dotenv/builds/128468045). After seeing those test I tried to just load the env directly into node. ```shell TEST='=FOO' node -e 'console.log(process.env.TEST)' TEST==FOO node -e 'console.log(process.env.TEST)' TEST="=FOO" node -e 'console.log(process.env.TEST)' ``` All of these commands output `FOO` to the console with no equal sign. Looking at the [test](https://travis-ci.org/motdotla/dotenv/builds/128468045) node has been doing this for a few versions. Is this intended behavior?
1.0
process.env variable leading '=' truncated - <!-- Thanks for wanting to report an issue you've found in Node.js. Please fill in the template below by replacing the html comments with an appropriate answer. If unsure about something, just do as best as you're able. version: usually output of `node -v` platform: either `uname -a` output, or if Windows, version and 32 or 64-bit. subsystem: optional -- if known please specify affected core module name. It will be much easier for us to fix the issue if a test case that reproduces the problem is provided. Ideally this test case should not have any external dependencies. We understand that it is not always possible to reduce your code to a small test case, but we would appreciate to have as much data as possible. Thank you! --> * **Version**: 6.0.0 * **Platform**: 15.0.0 Darwin RELEASE_X86_64 * **Subsystem**: process <!-- Enter your issue details below this comment. --> Hello I just recently got a ticket filed on a npm module, [dotenv](https://github.com/motdotla/dotenv), I help maintain. It has to do with a "=" being at the front of an environment variable. While investigating I noticed our parser was picking up on this character fine, but when trying to use dotenv's `preload` option the [tests started failing](https://travis-ci.org/motdotla/dotenv/builds/128468045). After seeing those test I tried to just load the env directly into node. ```shell TEST='=FOO' node -e 'console.log(process.env.TEST)' TEST==FOO node -e 'console.log(process.env.TEST)' TEST="=FOO" node -e 'console.log(process.env.TEST)' ``` All of these commands output `FOO` to the console with no equal sign. Looking at the [test](https://travis-ci.org/motdotla/dotenv/builds/128468045) node has been doing this for a few versions. Is this intended behavior?
process
process env variable leading truncated thanks for wanting to report an issue you ve found in node js please fill in the template below by replacing the html comments with an appropriate answer if unsure about something just do as best as you re able version usually output of node v platform either uname a output or if windows version and or bit subsystem optional if known please specify affected core module name it will be much easier for us to fix the issue if a test case that reproduces the problem is provided ideally this test case should not have any external dependencies we understand that it is not always possible to reduce your code to a small test case but we would appreciate to have as much data as possible thank you version platform darwin release subsystem process hello i just recently got a ticket filed on a npm module i help maintain it has to do with a being at the front of an environment variable while investigating i noticed our parser was picking up on this character fine but when trying to use dotenv s preload option the after seeing those test i tried to just load the env directly into node shell test foo node e console log process env test test foo node e console log process env test test foo node e console log process env test all of these commands output foo to the console with no equal sign looking at the node has been doing this for a few versions is this intended behavior
1
21,764
30,280,520,780
IssuesEvent
2023-07-08 02:51:30
qgis/QGIS
https://api.github.com/repos/qgis/QGIS
closed
Join attributes by location (summary) not calculating mean
Feedback stale Processing Bug
### What is the bug or the crash? I have to calculate the mean of a certain variable , called visibility, inside an area that correspond to a grid. Therefore I would have to calculate per each grid the mean value. It worked only for another variable, called seastate, but now it is not working anymore. I have checked the CRS, I have installed again QGIS, and it is the latest version. I do not understand because it was working until couple hours ago. ### Steps to reproduce the issue Processing-> toolbox-> Join attributes by location (summary) ### Versions 3.30 ### Supported QGIS version - [X] I'm running a supported QGIS version according to the roadmap. ### New profile - [X] I tried with a new QGIS profile ### Additional context _No response_
1.0
Join attributes by location (summary) not calculating mean - ### What is the bug or the crash? I have to calculate the mean of a certain variable , called visibility, inside an area that correspond to a grid. Therefore I would have to calculate per each grid the mean value. It worked only for another variable, called seastate, but now it is not working anymore. I have checked the CRS, I have installed again QGIS, and it is the latest version. I do not understand because it was working until couple hours ago. ### Steps to reproduce the issue Processing-> toolbox-> Join attributes by location (summary) ### Versions 3.30 ### Supported QGIS version - [X] I'm running a supported QGIS version according to the roadmap. ### New profile - [X] I tried with a new QGIS profile ### Additional context _No response_
process
join attributes by location summary not calculating mean what is the bug or the crash i have to calculate the mean of a certain variable called visibility inside an area that correspond to a grid therefore i would have to calculate per each grid the mean value it worked only for another variable called seastate but now it is not working anymore i have checked the crs i have installed again qgis and it is the latest version i do not understand because it was working until couple hours ago steps to reproduce the issue processing toolbox join attributes by location summary versions supported qgis version i m running a supported qgis version according to the roadmap new profile i tried with a new qgis profile additional context no response
1
8,661
11,798,046,454
IssuesEvent
2020-03-18 13:47:19
qgis/QGIS-Documentation
https://api.github.com/repos/qgis/QGIS-Documentation
closed
[feature][processing] Add dedicated parameter type for database tables
3.12 Automatic new feature Processing User Manual
Original commit: https://github.com/qgis/QGIS/commit/513966ca804df8631dac381731b99792af0e0b16 by nyalldawson Allows selection of an existing database table for a specific database provider connection (the provider must implement the connections API)
1.0
[feature][processing] Add dedicated parameter type for database tables - Original commit: https://github.com/qgis/QGIS/commit/513966ca804df8631dac381731b99792af0e0b16 by nyalldawson Allows selection of an existing database table for a specific database provider connection (the provider must implement the connections API)
process
add dedicated parameter type for database tables original commit by nyalldawson allows selection of an existing database table for a specific database provider connection the provider must implement the connections api
1
17,736
23,653,067,140
IssuesEvent
2022-08-26 08:37:36
benthosdev/benthos
https://api.github.com/repos/benthosdev/benthos
closed
Using regexp matching in awk porcessor
question processors needs more info
I want to be able to use regex in awk porcessor. just like this: ```go pattern := `\s*\/\*.*\*\/\s*` reg := regexp.MustCompile(pattern) sql := reg.ReplaceAllString(originSql, "") ``` How to write the above logic in awk processor?
1.0
Using regexp matching in awk porcessor - I want to be able to use regex in awk porcessor. just like this: ```go pattern := `\s*\/\*.*\*\/\s*` reg := regexp.MustCompile(pattern) sql := reg.ReplaceAllString(originSql, "") ``` How to write the above logic in awk processor?
process
using regexp matching in awk porcessor i want to be able to use regex in awk porcessor just like this go pattern s s reg regexp mustcompile pattern sql reg replaceallstring originsql how to write the above logic in awk processor?
1
13,227
15,697,525,303
IssuesEvent
2021-03-26 04:48:36
threefoldtech/js-sdk
https://api.github.com/repos/threefoldtech/js-sdk
reopened
Prompt user to send all remaining tokens to a wallet when deleting a VDC.
process_duplicate type_feature
Purpose: When deleting a VDC: It would be nice to have an option "send remaining TFTs to your originating wallet" or "send remaining TFTs to your ThreeFold Connect wallet?" ... something like that, to make it more user-friendly. Today that is a manual job, having a menu pop up in which you copy/paste the receiving wallet address for all remaining tokens. Some thought needs to go into: - what tokens are refundable (check the origin of the available tokens and take into account the monthly nature of the product).
1.0
Prompt user to send all remaining tokens to a wallet when deleting a VDC. - Purpose: When deleting a VDC: It would be nice to have an option "send remaining TFTs to your originating wallet" or "send remaining TFTs to your ThreeFold Connect wallet?" ... something like that, to make it more user-friendly. Today that is a manual job, having a menu pop up in which you copy/paste the receiving wallet address for all remaining tokens. Some thought needs to go into: - what tokens are refundable (check the origin of the available tokens and take into account the monthly nature of the product).
process
prompt user to send all remaining tokens to a wallet when deleting a vdc purpose when deleting a vdc it would be nice to have an option send remaining tfts to your originating wallet or send remaining tfts to your threefold connect wallet something like that to make it more user friendly today that is a manual job having a menu pop up in which you copy paste the receiving wallet address for all remaining tokens some thought needs to go into what tokens are refundable check the origin of the available tokens and take into account the monthly nature of the product
1
12,301
9,621,579,707
IssuesEvent
2019-05-14 11:00:05
SharePoint/sp-dev-docs
https://api.github.com/repos/SharePoint/sp-dev-docs
closed
Provisioning template failed.
Needs: Author Feedback area:provisioning-service no-recent-activity
> Thank you for reporting an issue or suggesting an enhancement. We appreciate your feedback - to help the team to understand your needs, please complete the below template to ensure we have the necessary details to assist you. > > SharePoint Online Provisioning ServiceUnfortunately, your request to provision"Custom learning for Office 365" template failed. | SharePoint Online Provisioning ServiceUnfortunately, your request to provision"Custom learning for Office 365" template failed. -- | -- SharePoint Online Provisioning ServiceUnfortunately, your request to provision"Custom learning for Office 365" template failed.   Here is the exception that occurred:Type = System.Exception Message = {"odata.error":{"code":"-2147024894, System.IO.FileNotFoundException","message":{"lang":"en-US","value":"File Not Found."}}} Source = OfficeDevPnP.Core TargetSite = Void MoveNext() StackTrace = at OfficeDevPnP.Core.ALM.AppManager.<BaseRequest>d__38.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.<InstallAsync>d__10.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.Install(Guid id, AppCatalogScope scope) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectApplicationLifecycleManagement.ProvisionObjects(Web web, ProvisioningTemplate template, TokenParser parser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyRemoteTemplate(Web web, ProvisioningTemplate template, ProvisioningTemplateApplyingInformation provisioningInfo, Boolean calledFromHierarchy, TokenParser tokenParser) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectHierarchySequenceSites.ProvisionObjects(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, TokenParser tokenParser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyProvisioningHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation provisioningInfo) at Microsoft.SharePoint.Client.TenantExtensions.ApplyProvisionHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation applyingInformation) at SharePointPnP.ProvisioningApp.WebJob.ProvisioningFunction.<RunAsync>d__0.MoveNext() in C:\github\sp-provisioning-service\SharePointPnP.ProvisioningApp\SharePointPnP.ProvisioningApp.WebJob\ProvisioningFunction.cs:line 337 HResult = -2146233088 | Here is the exception that occurred:Type = System.Exception Message = {"odata.error":{"code":"-2147024894, System.IO.FileNotFoundException","message":{"lang":"en-US","value":"File Not Found."}}} Source = OfficeDevPnP.Core TargetSite = Void MoveNext() StackTrace = at OfficeDevPnP.Core.ALM.AppManager.<BaseRequest>d__38.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.<InstallAsync>d__10.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.Install(Guid id, AppCatalogScope scope) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectApplicationLifecycleManagement.ProvisionObjects(Web web, ProvisioningTemplate template, TokenParser parser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyRemoteTemplate(Web web, ProvisioningTemplate template, ProvisioningTemplateApplyingInformation provisioningInfo, Boolean calledFromHierarchy, TokenParser tokenParser) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectHierarchySequenceSites.ProvisionObjects(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, TokenParser tokenParser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyProvisioningHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation provisioningInfo) at Microsoft.SharePoint.Client.TenantExtensions.ApplyProvisionHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation applyingInformation) at SharePointPnP.ProvisioningApp.WebJob.ProvisioningFunction.<RunAsync>d__0.MoveNext() in C:\github\sp-provisioning-service\SharePointPnP.ProvisioningApp\SharePointPnP.ProvisioningApp.WebJob\ProvisioningFunction.cs:line 337 HResult = -2146233088 Here is the exception that occurred:Type = System.Exception Message = {"odata.error":{"code":"-2147024894, System.IO.FileNotFoundException","message":{"lang":"en-US","value":"File Not Found."}}} Source = OfficeDevPnP.Core TargetSite = Void MoveNext() StackTrace = at OfficeDevPnP.Core.ALM.AppManager.<BaseRequest>d__38.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.<InstallAsync>d__10.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.Install(Guid id, AppCatalogScope scope) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectApplicationLifecycleManagement.ProvisionObjects(Web web, ProvisioningTemplate template, TokenParser parser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyRemoteTemplate(Web web, ProvisioningTemplate template, ProvisioningTemplateApplyingInformation provisioningInfo, Boolean calledFromHierarchy, TokenParser tokenParser) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectHierarchySequenceSites.ProvisionObjects(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, TokenParser tokenParser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyProvisioningHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation provisioningInfo) at Microsoft.SharePoint.Client.TenantExtensions.ApplyProvisionHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation applyingInformation) at SharePointPnP.ProvisioningApp.WebJob.ProvisioningFunction.<RunAsync>d__0.MoveNext() in C:\github\sp-provisioning-service\SharePointPnP.ProvisioningApp\SharePointPnP.ProvisioningApp.WebJob\ProvisioningFunction.cs:line 337 HResult = -2146233088 > #### Category - [ ] Question - [ ] Typo - [x] Bug - [ ] Additional article idea > For the above list, an empty checkbox is [ ] as in <kbd>[</kbd><kbd>SPACE</kbd><kbd>]</kbd>. A checked checkbox is [x] with no space between the brackets. Use the `PREVIEW` tab at the top right to preview the rendering before submitting your issue. > Thanks for your contribution! Sharing is caring.
1.0
Provisioning template failed. - > Thank you for reporting an issue or suggesting an enhancement. We appreciate your feedback - to help the team to understand your needs, please complete the below template to ensure we have the necessary details to assist you. > > SharePoint Online Provisioning ServiceUnfortunately, your request to provision"Custom learning for Office 365" template failed. | SharePoint Online Provisioning ServiceUnfortunately, your request to provision"Custom learning for Office 365" template failed. -- | -- SharePoint Online Provisioning ServiceUnfortunately, your request to provision"Custom learning for Office 365" template failed.   Here is the exception that occurred:Type = System.Exception Message = {"odata.error":{"code":"-2147024894, System.IO.FileNotFoundException","message":{"lang":"en-US","value":"File Not Found."}}} Source = OfficeDevPnP.Core TargetSite = Void MoveNext() StackTrace = at OfficeDevPnP.Core.ALM.AppManager.<BaseRequest>d__38.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.<InstallAsync>d__10.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.Install(Guid id, AppCatalogScope scope) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectApplicationLifecycleManagement.ProvisionObjects(Web web, ProvisioningTemplate template, TokenParser parser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyRemoteTemplate(Web web, ProvisioningTemplate template, ProvisioningTemplateApplyingInformation provisioningInfo, Boolean calledFromHierarchy, TokenParser tokenParser) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectHierarchySequenceSites.ProvisionObjects(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, TokenParser tokenParser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyProvisioningHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation provisioningInfo) at Microsoft.SharePoint.Client.TenantExtensions.ApplyProvisionHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation applyingInformation) at SharePointPnP.ProvisioningApp.WebJob.ProvisioningFunction.<RunAsync>d__0.MoveNext() in C:\github\sp-provisioning-service\SharePointPnP.ProvisioningApp\SharePointPnP.ProvisioningApp.WebJob\ProvisioningFunction.cs:line 337 HResult = -2146233088 | Here is the exception that occurred:Type = System.Exception Message = {"odata.error":{"code":"-2147024894, System.IO.FileNotFoundException","message":{"lang":"en-US","value":"File Not Found."}}} Source = OfficeDevPnP.Core TargetSite = Void MoveNext() StackTrace = at OfficeDevPnP.Core.ALM.AppManager.<BaseRequest>d__38.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.<InstallAsync>d__10.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.Install(Guid id, AppCatalogScope scope) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectApplicationLifecycleManagement.ProvisionObjects(Web web, ProvisioningTemplate template, TokenParser parser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyRemoteTemplate(Web web, ProvisioningTemplate template, ProvisioningTemplateApplyingInformation provisioningInfo, Boolean calledFromHierarchy, TokenParser tokenParser) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectHierarchySequenceSites.ProvisionObjects(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, TokenParser tokenParser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyProvisioningHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation provisioningInfo) at Microsoft.SharePoint.Client.TenantExtensions.ApplyProvisionHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation applyingInformation) at SharePointPnP.ProvisioningApp.WebJob.ProvisioningFunction.<RunAsync>d__0.MoveNext() in C:\github\sp-provisioning-service\SharePointPnP.ProvisioningApp\SharePointPnP.ProvisioningApp.WebJob\ProvisioningFunction.cs:line 337 HResult = -2146233088 Here is the exception that occurred:Type = System.Exception Message = {"odata.error":{"code":"-2147024894, System.IO.FileNotFoundException","message":{"lang":"en-US","value":"File Not Found."}}} Source = OfficeDevPnP.Core TargetSite = Void MoveNext() StackTrace = at OfficeDevPnP.Core.ALM.AppManager.<BaseRequest>d__38.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.<InstallAsync>d__10.MoveNext() --- End of stack trace from previous location where exception was thrown --- at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) at OfficeDevPnP.Core.ALM.AppManager.Install(Guid id, AppCatalogScope scope) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectApplicationLifecycleManagement.ProvisionObjects(Web web, ProvisioningTemplate template, TokenParser parser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyRemoteTemplate(Web web, ProvisioningTemplate template, ProvisioningTemplateApplyingInformation provisioningInfo, Boolean calledFromHierarchy, TokenParser tokenParser) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.ObjectHierarchySequenceSites.ProvisionObjects(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, TokenParser tokenParser, ProvisioningTemplateApplyingInformation applyingInformation) at OfficeDevPnP.Core.Framework.Provisioning.ObjectHandlers.SiteToTemplateConversion.ApplyProvisioningHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation provisioningInfo) at Microsoft.SharePoint.Client.TenantExtensions.ApplyProvisionHierarchy(Tenant tenant, ProvisioningHierarchy hierarchy, String sequenceId, ProvisioningTemplateApplyingInformation applyingInformation) at SharePointPnP.ProvisioningApp.WebJob.ProvisioningFunction.<RunAsync>d__0.MoveNext() in C:\github\sp-provisioning-service\SharePointPnP.ProvisioningApp\SharePointPnP.ProvisioningApp.WebJob\ProvisioningFunction.cs:line 337 HResult = -2146233088 > #### Category - [ ] Question - [ ] Typo - [x] Bug - [ ] Additional article idea > For the above list, an empty checkbox is [ ] as in <kbd>[</kbd><kbd>SPACE</kbd><kbd>]</kbd>. A checked checkbox is [x] with no space between the brackets. Use the `PREVIEW` tab at the top right to preview the rendering before submitting your issue. > Thanks for your contribution! Sharing is caring.
non_process
provisioning template failed thank you for reporting an issue or suggesting an enhancement we appreciate your feedback to help the team to understand your needs please complete the below template to ensure we have the necessary details to assist you sharepoint online provisioning serviceunfortunately your request to provision custom learning for office  template failed sharepoint online provisioning serviceunfortunately your request to provision custom learning for office  template failed sharepoint online provisioning serviceunfortunately your request to provision custom learning for office  template failed   here is the exception that occurred type system exception message odata error code system io filenotfoundexception message lang en us value file not found source officedevpnp core targetsite void movenext stacktrace at officedevpnp core alm appmanager d movenext end of stack trace from previous location where exception was thrown at system runtime compilerservices taskawaiter throwfornonsuccess task task at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at officedevpnp core alm appmanager d movenext end of stack trace from previous location where exception was thrown at system runtime compilerservices taskawaiter throwfornonsuccess task task at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at officedevpnp core alm appmanager install guid id appcatalogscope scope at officedevpnp core framework provisioning objecthandlers objectapplicationlifecyclemanagement provisionobjects web web provisioningtemplate template tokenparser parser provisioningtemplateapplyinginformation applyinginformation at officedevpnp core framework provisioning objecthandlers sitetotemplateconversion applyremotetemplate web web provisioningtemplate template provisioningtemplateapplyinginformation provisioninginfo boolean calledfromhierarchy tokenparser tokenparser at officedevpnp core framework provisioning objecthandlers objecthierarchysequencesites provisionobjects tenant tenant provisioninghierarchy hierarchy string sequenceid tokenparser tokenparser provisioningtemplateapplyinginformation applyinginformation at officedevpnp core framework provisioning objecthandlers sitetotemplateconversion applyprovisioninghierarchy tenant tenant provisioninghierarchy hierarchy string sequenceid provisioningtemplateapplyinginformation provisioninginfo at microsoft sharepoint client tenantextensions applyprovisionhierarchy tenant tenant provisioninghierarchy hierarchy string sequenceid provisioningtemplateapplyinginformation applyinginformation at sharepointpnp provisioningapp webjob provisioningfunction d movenext in c github sp provisioning service sharepointpnp provisioningapp sharepointpnp provisioningapp webjob provisioningfunction cs line hresult here is the exception that occurred type system exception message odata error code system io filenotfoundexception message lang en us value file not found source officedevpnp core targetsite void movenext stacktrace at officedevpnp core alm appmanager d movenext end of stack trace from previous location where exception was thrown at system runtime compilerservices taskawaiter throwfornonsuccess task task at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at officedevpnp core alm appmanager d movenext end of stack trace from previous location where exception was thrown at system runtime compilerservices taskawaiter throwfornonsuccess task task at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at officedevpnp core alm appmanager install guid id appcatalogscope scope at officedevpnp core framework provisioning objecthandlers objectapplicationlifecyclemanagement provisionobjects web web provisioningtemplate template tokenparser parser provisioningtemplateapplyinginformation applyinginformation at officedevpnp core framework provisioning objecthandlers sitetotemplateconversion applyremotetemplate web web provisioningtemplate template provisioningtemplateapplyinginformation provisioninginfo boolean calledfromhierarchy tokenparser tokenparser at officedevpnp core framework provisioning objecthandlers objecthierarchysequencesites provisionobjects tenant tenant provisioninghierarchy hierarchy string sequenceid tokenparser tokenparser provisioningtemplateapplyinginformation applyinginformation at officedevpnp core framework provisioning objecthandlers sitetotemplateconversion applyprovisioninghierarchy tenant tenant provisioninghierarchy hierarchy string sequenceid provisioningtemplateapplyinginformation provisioninginfo at microsoft sharepoint client tenantextensions applyprovisionhierarchy tenant tenant provisioninghierarchy hierarchy string sequenceid provisioningtemplateapplyinginformation applyinginformation at sharepointpnp provisioningapp webjob provisioningfunction d movenext in c github sp provisioning service sharepointpnp provisioningapp sharepointpnp provisioningapp webjob provisioningfunction cs line hresult here is the exception that occurred type system exception message odata error code system io filenotfoundexception message lang en us value file not found source officedevpnp core targetsite void movenext stacktrace at officedevpnp core alm appmanager d movenext end of stack trace from previous location where exception was thrown at system runtime compilerservices taskawaiter throwfornonsuccess task task at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at officedevpnp core alm appmanager d movenext end of stack trace from previous location where exception was thrown at system runtime compilerservices taskawaiter throwfornonsuccess task task at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at officedevpnp core alm appmanager install guid id appcatalogscope scope at officedevpnp core framework provisioning objecthandlers objectapplicationlifecyclemanagement provisionobjects web web provisioningtemplate template tokenparser parser provisioningtemplateapplyinginformation applyinginformation at officedevpnp core framework provisioning objecthandlers sitetotemplateconversion applyremotetemplate web web provisioningtemplate template provisioningtemplateapplyinginformation provisioninginfo boolean calledfromhierarchy tokenparser tokenparser at officedevpnp core framework provisioning objecthandlers objecthierarchysequencesites provisionobjects tenant tenant provisioninghierarchy hierarchy string sequenceid tokenparser tokenparser provisioningtemplateapplyinginformation applyinginformation at officedevpnp core framework provisioning objecthandlers sitetotemplateconversion applyprovisioninghierarchy tenant tenant provisioninghierarchy hierarchy string sequenceid provisioningtemplateapplyinginformation provisioninginfo at microsoft sharepoint client tenantextensions applyprovisionhierarchy tenant tenant provisioninghierarchy hierarchy string sequenceid provisioningtemplateapplyinginformation applyinginformation at sharepointpnp provisioningapp webjob provisioningfunction d movenext in c github sp provisioning service sharepointpnp provisioningapp sharepointpnp provisioningapp webjob provisioningfunction cs line hresult category question typo bug additional article idea for the above list an empty checkbox is as in a checked checkbox is with no space between the brackets use the preview tab at the top right to preview the rendering before submitting your issue thanks for your contribution sharing is caring
0
4,472
7,334,675,354
IssuesEvent
2018-03-05 23:51:10
rivine/rivine
https://api.github.com/repos/rivine/rivine
closed
investigate how/where to validate cross-chain atomic swaps
process_duplicate state_question
For _tfchain_ (http://github.com/threefoldfoundation/tfchain, a custom Rivine blockchain) we require the ability to buy TFTs (ThreeFold Tokens), using an external and common cryptocurrency. For now we'll support either Ethereum (https://github.com/threefoldfoundation/tfchain/issues/16) or Ripple (https://github.com/threefoldfoundation/tfchain/issues/15), and we can optionally add support for the other one later as well. From a Rivine perspective we need to add support to the validator nodes to validate a specific (but regular) transaction (Bob paying Y tokens to Alice), and to than somehow release the money on the alien blockchain (ethereum or ripple) by satisfying the cryptographic condition of that escrow/contract. How that would work is for now unclear to me. When Bob pays to Alice, a request should also be made to the network to make the validators of the network validate that this payment has actually happened. To than somehow provide the unlock condition. This has to be done in a way such that no party can scam the other party. As long as the software is secure, it shouldn't be possible for only one entity receiving tokens. The swap should be atomic at all times, meaning either both parties receive tokens, or none of them do* (in which case they should receive their original tokens back). ---- (*) it is unclear though how we could return the TFT tokens, if they are send directly to from the sender to the target, without going to an intermediary first. While going via an intermediary first, just as we do on the Ripple/Ethereum side, would allow for a token-refund-if-needed, it would also introduce an attack-vector (I think), as there would be a central (?) address holding potentially a lot of tokens
1.0
investigate how/where to validate cross-chain atomic swaps - For _tfchain_ (http://github.com/threefoldfoundation/tfchain, a custom Rivine blockchain) we require the ability to buy TFTs (ThreeFold Tokens), using an external and common cryptocurrency. For now we'll support either Ethereum (https://github.com/threefoldfoundation/tfchain/issues/16) or Ripple (https://github.com/threefoldfoundation/tfchain/issues/15), and we can optionally add support for the other one later as well. From a Rivine perspective we need to add support to the validator nodes to validate a specific (but regular) transaction (Bob paying Y tokens to Alice), and to than somehow release the money on the alien blockchain (ethereum or ripple) by satisfying the cryptographic condition of that escrow/contract. How that would work is for now unclear to me. When Bob pays to Alice, a request should also be made to the network to make the validators of the network validate that this payment has actually happened. To than somehow provide the unlock condition. This has to be done in a way such that no party can scam the other party. As long as the software is secure, it shouldn't be possible for only one entity receiving tokens. The swap should be atomic at all times, meaning either both parties receive tokens, or none of them do* (in which case they should receive their original tokens back). ---- (*) it is unclear though how we could return the TFT tokens, if they are send directly to from the sender to the target, without going to an intermediary first. While going via an intermediary first, just as we do on the Ripple/Ethereum side, would allow for a token-refund-if-needed, it would also introduce an attack-vector (I think), as there would be a central (?) address holding potentially a lot of tokens
process
investigate how where to validate cross chain atomic swaps for tfchain a custom rivine blockchain we require the ability to buy tfts threefold tokens using an external and common cryptocurrency for now we ll support either ethereum or ripple and we can optionally add support for the other one later as well from a rivine perspective we need to add support to the validator nodes to validate a specific but regular transaction bob paying y tokens to alice and to than somehow release the money on the alien blockchain ethereum or ripple by satisfying the cryptographic condition of that escrow contract how that would work is for now unclear to me when bob pays to alice a request should also be made to the network to make the validators of the network validate that this payment has actually happened to than somehow provide the unlock condition this has to be done in a way such that no party can scam the other party as long as the software is secure it shouldn t be possible for only one entity receiving tokens the swap should be atomic at all times meaning either both parties receive tokens or none of them do in which case they should receive their original tokens back it is unclear though how we could return the tft tokens if they are send directly to from the sender to the target without going to an intermediary first while going via an intermediary first just as we do on the ripple ethereum side would allow for a token refund if needed it would also introduce an attack vector i think as there would be a central address holding potentially a lot of tokens
1
21,268
28,440,125,119
IssuesEvent
2023-04-15 20:09:46
cse442-at-ub/project_s23-cinco
https://api.github.com/repos/cse442-at-ub/project_s23-cinco
closed
Load comment from database for specific post
Processing Task Sprint 3
Task Test: Test 1: 1. Go to https://www-student.cse.buffalo.edu/CSE442-542/2023-Spring/cse-442b/build/ 2. Login to your account 3. Click on a post in the feed area 4. Make sure you can see comments and that they match on the Db's comments table. ![image.png](https://images.zenhubusercontent.com/63e2cfc50476ff4c250db692/5d8bc449-58c5-4ee1-912d-162f68a9ddae) 5. Click on add comment button ![image.png](https://images.zenhubusercontent.com/63e2cfc50476ff4c250db692/b70ceac0-fa79-40ed-bb58-fbd0dfed747a) 6. Type in a comment and post it. 7. Verify it is in the db by looking at the Comments table and seeing your comment. ![image.png](https://images.zenhubusercontent.com/63e2cfc50476ff4c250db692/88e344fc-1c65-4a1c-a8c4-6a851578bdcb) 8. Verify it is displayed in the event pop up comments section by identifying your comment at the bottom.
1.0
Load comment from database for specific post - Task Test: Test 1: 1. Go to https://www-student.cse.buffalo.edu/CSE442-542/2023-Spring/cse-442b/build/ 2. Login to your account 3. Click on a post in the feed area 4. Make sure you can see comments and that they match on the Db's comments table. ![image.png](https://images.zenhubusercontent.com/63e2cfc50476ff4c250db692/5d8bc449-58c5-4ee1-912d-162f68a9ddae) 5. Click on add comment button ![image.png](https://images.zenhubusercontent.com/63e2cfc50476ff4c250db692/b70ceac0-fa79-40ed-bb58-fbd0dfed747a) 6. Type in a comment and post it. 7. Verify it is in the db by looking at the Comments table and seeing your comment. ![image.png](https://images.zenhubusercontent.com/63e2cfc50476ff4c250db692/88e344fc-1c65-4a1c-a8c4-6a851578bdcb) 8. Verify it is displayed in the event pop up comments section by identifying your comment at the bottom.
process
load comment from database for specific post task test test go to login to your account click on a post in the feed area make sure you can see comments and that they match on the db s comments table click on add comment button type in a comment and post it verify it is in the db by looking at the comments table and seeing your comment verify it is displayed in the event pop up comments section by identifying your comment at the bottom
1
224,108
17,150,380,388
IssuesEvent
2021-07-13 19:43:52
codewars/docs
https://api.github.com/repos/codewars/docs
opened
HOWTO create a Scala kata
documentation kind/tutorial language/scala
- Test suite styles: https://www.scalatest.org/user_guide/selecting_a_style - Be careful with generated tests: test suite crashes with incomprehensible error if names of test cases are not unique - Long startup time - Be aware of java interop for kata with code restrictions
1.0
HOWTO create a Scala kata - - Test suite styles: https://www.scalatest.org/user_guide/selecting_a_style - Be careful with generated tests: test suite crashes with incomprehensible error if names of test cases are not unique - Long startup time - Be aware of java interop for kata with code restrictions
non_process
howto create a scala kata test suite styles be careful with generated tests test suite crashes with incomprehensible error if names of test cases are not unique long startup time be aware of java interop for kata with code restrictions
0
505,287
14,631,071,880
IssuesEvent
2020-12-23 19:04:37
infiniteautomation/ma-core-public
https://api.github.com/repos/infiniteautomation/ma-core-public
closed
Jetty thread pool lock up with concurrent token authenticated requests
High Priority Item
The Jetty thread pool locks up when many concurrent token authenticated requests are received. The threads are blocked like this - ``` "jetty-thread-pool-2704" #2704 prio=5 os_prio=0 cpu=81113.27ms elapsed=2893.34s tid=0x00007f5a58049000 nid=0x319769 waiting for monitor entry [0x00007f5a57579000] java.lang.Thread.State: BLOCKED (on object monitor) at java.util.concurrent.ConcurrentHashMap.computeIfAbsent(java.base@11.0.7/ConcurrentHashMap.java:1723) - waiting to lock <0x0000000795b2a9a0> (a java.util.concurrent.ConcurrentHashMap$ReservationNode) at com.serotonin.m2m2.db.dao.SystemSettingsDao.getValue(SystemSettingsDao.java:262) at com.serotonin.m2m2.db.dao.SystemSettingsDao.getBooleanValue(SystemSettingsDao.java:303) at com.serotonin.m2m2.db.dao.SystemSettingsDao.getBooleanValue(SystemSettingsDao.java:298) at com.serotonin.m2m2.vo.User.isCredentialsNonExpired(User.java:434) at org.springframework.security.authentication.AccountStatusUserDetailsChecker.check(AccountStatusUserDetailsChecker.java:51) at com.serotonin.m2m2.web.mvc.spring.security.authentication.MangoTokenAuthenticationProvider.authenticate(MangoTokenAuthenticationProvider.java:77) at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:199) at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:219) at org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter$AuthenticationManagerDelegator.authenticate(WebSecurityConfigurerAdapter.java:524) at com.serotonin.m2m2.web.mvc.spring.security.BearerAuthenticationFilter.doFilterInternal(BearerAuthenticationFilter.java:78) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:334) at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:92) at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:77) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:334) at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:56) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:334) at org.springframework.security.web.access.channel.ChannelProcessingFilter.doFilter(ChannelProcessingFilter.java:157) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:334) at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:215) at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:178) at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1604) at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:545) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:143) at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:590) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127) at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:235) at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1610) at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:233) at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1300) at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:188) at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:485) at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1580) at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:186) at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1215) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141) at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:221) at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:767) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127) at org.eclipse.jetty.server.Server.handle(Server.java:500) at org.eclipse.jetty.server.HttpChannel.lambda$handle$1(HttpChannel.java:383) at org.eclipse.jetty.server.HttpChannel$$Lambda$168/0x0000000840320c40.dispatch(Unknown Source) at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:547) at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:375) at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:273) at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:311) at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:336) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:313) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:171) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:129) at org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:375) at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:806) at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:938) at java.lang.Thread.run(java.base@11.0.7/Thread.java:834) ``` Subsequently incoming requests are rejected and you get log entries like this - ``` WARN 2020-09-22T15:22:42,765 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@56bc0086 WARN 2020-09-22T15:22:42,959 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@76b6ef84 WARN 2020-09-22T15:22:43,259 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@67eb850 WARN 2020-09-22T15:22:43,360 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@7ab54d65 WARN 2020-09-22T15:22:43,430 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@c79c9f1 WARN 2020-09-22T15:22:43,460 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@14b93470 WARN 2020-09-22T15:22:43,519 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@12895335 WARN 2020-09-22T15:22:44,230 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@47c244f5 WARN 2020-09-22T15:22:44,305 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@503a7d9a WARN 2020-09-22T15:22:44,344 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@5e2fcf7a ```
1.0
Jetty thread pool lock up with concurrent token authenticated requests - The Jetty thread pool locks up when many concurrent token authenticated requests are received. The threads are blocked like this - ``` "jetty-thread-pool-2704" #2704 prio=5 os_prio=0 cpu=81113.27ms elapsed=2893.34s tid=0x00007f5a58049000 nid=0x319769 waiting for monitor entry [0x00007f5a57579000] java.lang.Thread.State: BLOCKED (on object monitor) at java.util.concurrent.ConcurrentHashMap.computeIfAbsent(java.base@11.0.7/ConcurrentHashMap.java:1723) - waiting to lock <0x0000000795b2a9a0> (a java.util.concurrent.ConcurrentHashMap$ReservationNode) at com.serotonin.m2m2.db.dao.SystemSettingsDao.getValue(SystemSettingsDao.java:262) at com.serotonin.m2m2.db.dao.SystemSettingsDao.getBooleanValue(SystemSettingsDao.java:303) at com.serotonin.m2m2.db.dao.SystemSettingsDao.getBooleanValue(SystemSettingsDao.java:298) at com.serotonin.m2m2.vo.User.isCredentialsNonExpired(User.java:434) at org.springframework.security.authentication.AccountStatusUserDetailsChecker.check(AccountStatusUserDetailsChecker.java:51) at com.serotonin.m2m2.web.mvc.spring.security.authentication.MangoTokenAuthenticationProvider.authenticate(MangoTokenAuthenticationProvider.java:77) at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:199) at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:219) at org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter$AuthenticationManagerDelegator.authenticate(WebSecurityConfigurerAdapter.java:524) at com.serotonin.m2m2.web.mvc.spring.security.BearerAuthenticationFilter.doFilterInternal(BearerAuthenticationFilter.java:78) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:334) at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:92) at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:77) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:334) at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:56) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:334) at org.springframework.security.web.access.channel.ChannelProcessingFilter.doFilter(ChannelProcessingFilter.java:157) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:334) at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:215) at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:178) at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1604) at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:545) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:143) at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:590) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127) at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:235) at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1610) at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:233) at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1300) at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:188) at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:485) at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1580) at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:186) at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1215) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141) at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:221) at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:767) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127) at org.eclipse.jetty.server.Server.handle(Server.java:500) at org.eclipse.jetty.server.HttpChannel.lambda$handle$1(HttpChannel.java:383) at org.eclipse.jetty.server.HttpChannel$$Lambda$168/0x0000000840320c40.dispatch(Unknown Source) at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:547) at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:375) at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:273) at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:311) at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103) at org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:336) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:313) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:171) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:129) at org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:375) at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:806) at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:938) at java.lang.Thread.run(java.base@11.0.7/Thread.java:834) ``` Subsequently incoming requests are rejected and you get log entries like this - ``` WARN 2020-09-22T15:22:42,765 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@56bc0086 WARN 2020-09-22T15:22:42,959 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@76b6ef84 WARN 2020-09-22T15:22:43,259 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@67eb850 WARN 2020-09-22T15:22:43,360 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@7ab54d65 WARN 2020-09-22T15:22:43,430 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@c79c9f1 WARN 2020-09-22T15:22:43,460 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@14b93470 WARN 2020-09-22T15:22:43,519 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@12895335 WARN 2020-09-22T15:22:44,230 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@47c244f5 WARN 2020-09-22T15:22:44,305 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@503a7d9a WARN 2020-09-22T15:22:44,344 (org.eclipse.jetty.util.thread.QueuedThreadPool.execute:538) - QueuedThreadPool[jetty-thread-pool]@7cedfa63{STARTED,8<=200<=200,i=0,r=4,q=1280}[ReservedThreadExecutor@1590a009{s=0/4,p=4}] rejected org.eclipse.jetty.io.ManagedSelector$Accept@5e2fcf7a ```
non_process
jetty thread pool lock up with concurrent token authenticated requests the jetty thread pool locks up when many concurrent token authenticated requests are received the threads are blocked like this jetty thread pool prio os prio cpu elapsed tid nid waiting for monitor entry java lang thread state blocked on object monitor at java util concurrent concurrenthashmap computeifabsent java base concurrenthashmap java waiting to lock a java util concurrent concurrenthashmap reservationnode at com serotonin db dao systemsettingsdao getvalue systemsettingsdao java at com serotonin db dao systemsettingsdao getbooleanvalue systemsettingsdao java at com serotonin db dao systemsettingsdao getbooleanvalue systemsettingsdao java at com serotonin vo user iscredentialsnonexpired user java at org springframework security authentication accountstatususerdetailschecker check accountstatususerdetailschecker java at com serotonin web mvc spring security authentication mangotokenauthenticationprovider authenticate mangotokenauthenticationprovider java at org springframework security authentication providermanager authenticate providermanager java at org springframework security authentication providermanager authenticate providermanager java at org springframework security config annotation web configuration websecurityconfigureradapter authenticationmanagerdelegator authenticate websecurityconfigureradapter java at com serotonin web mvc spring security bearerauthenticationfilter dofilterinternal bearerauthenticationfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web header headerwriterfilter doheadersafter headerwriterfilter java at org springframework security web header headerwriterfilter dofilterinternal headerwriterfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web context request async webasyncmanagerintegrationfilter dofilterinternal webasyncmanagerintegrationfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web access channel channelprocessingfilter dofilter channelprocessingfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web filterchainproxy dofilterinternal filterchainproxy java at org springframework security web filterchainproxy dofilter filterchainproxy java at org springframework web filter delegatingfilterproxy invokedelegate delegatingfilterproxy java at org springframework web filter delegatingfilterproxy dofilter delegatingfilterproxy java at org eclipse jetty servlet servlethandler cachedchain dofilter servlethandler java at org eclipse jetty servlet servlethandler dohandle servlethandler java at org eclipse jetty server handler scopedhandler handle scopedhandler java at org eclipse jetty security securityhandler handle securityhandler java at org eclipse jetty server handler handlerwrapper handle handlerwrapper java at org eclipse jetty server handler scopedhandler nexthandle scopedhandler java at org eclipse jetty server session sessionhandler dohandle sessionhandler java at org eclipse jetty server handler scopedhandler nexthandle scopedhandler java at org eclipse jetty server handler contexthandler dohandle contexthandler java at org eclipse jetty server handler scopedhandler nextscope scopedhandler java at org eclipse jetty servlet servlethandler doscope servlethandler java at org eclipse jetty server session sessionhandler doscope sessionhandler java at org eclipse jetty server handler scopedhandler nextscope scopedhandler java at org eclipse jetty server handler contexthandler doscope contexthandler java at org eclipse jetty server handler scopedhandler handle scopedhandler java at org eclipse jetty server handler contexthandlercollection handle contexthandlercollection java at org eclipse jetty server handler gzip gziphandler handle gziphandler java at org eclipse jetty server handler handlerwrapper handle handlerwrapper java at org eclipse jetty server server handle server java at org eclipse jetty server httpchannel lambda handle httpchannel java at org eclipse jetty server httpchannel lambda dispatch unknown source at org eclipse jetty server httpchannel dispatch httpchannel java at org eclipse jetty server httpchannel handle httpchannel java at org eclipse jetty server httpconnection onfillable httpconnection java at org eclipse jetty io abstractconnection readcallback succeeded abstractconnection java at org eclipse jetty io fillinterest fillable fillinterest java at org eclipse jetty io channelendpoint run channelendpoint java at org eclipse jetty util thread strategy eatwhatyoukill runtask eatwhatyoukill java at org eclipse jetty util thread strategy eatwhatyoukill doproduce eatwhatyoukill java at org eclipse jetty util thread strategy eatwhatyoukill tryproduce eatwhatyoukill java at org eclipse jetty util thread strategy eatwhatyoukill run eatwhatyoukill java at org eclipse jetty util thread reservedthreadexecutor reservedthread run reservedthreadexecutor java at org eclipse jetty util thread queuedthreadpool runjob queuedthreadpool java at org eclipse jetty util thread queuedthreadpool runner run queuedthreadpool java at java lang thread run java base thread java subsequently incoming requests are rejected and you get log entries like this warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept warn org eclipse jetty util thread queuedthreadpool execute queuedthreadpool started i r q rejected org eclipse jetty io managedselector accept
0
266,220
23,226,663,932
IssuesEvent
2022-08-03 01:24:16
MPMG-DCC-UFMG/F01
https://api.github.com/repos/MPMG-DCC-UFMG/F01
closed
Teste de generalizacao para a tag Servidores - Relatório mensal da despesa com pessoal - Serra Azul de Minas
generalization test development template-Síntese tecnologia informatica subtag-Relatórios Despesas com Pessoal tag-Servidores
DoD: Realizar o teste de Generalização do validador da tag Servidores - Relatório mensal da despesa com pessoal para o Município de Serra Azul de Minas.
1.0
Teste de generalizacao para a tag Servidores - Relatório mensal da despesa com pessoal - Serra Azul de Minas - DoD: Realizar o teste de Generalização do validador da tag Servidores - Relatório mensal da despesa com pessoal para o Município de Serra Azul de Minas.
non_process
teste de generalizacao para a tag servidores relatório mensal da despesa com pessoal serra azul de minas dod realizar o teste de generalização do validador da tag servidores relatório mensal da despesa com pessoal para o município de serra azul de minas
0
56,314
6,516,038,140
IssuesEvent
2017-08-27 01:06:09
red/red
https://api.github.com/repos/red/red
closed
Loose group-box follows mouse arrow
GUI status.built status.tested type.bug
When a group-box is made "loose" and you move it to another place, then, after release the mouse button the group follows the mouse arrow by the screen whithout clicking if it passes over the group. Follow this example: Red [ Needs: 'View ] w: [ title "TEST" size 800x800 FntGroup: group-box gray [ below fnt1: radio bold "Console" data on on-down [] fnt2: radio bold "Terminal" on-down [] fnt3: radio bold "Fixed" on-down [] SizSli: slider 80 50% return ] loose ] view w
1.0
Loose group-box follows mouse arrow - When a group-box is made "loose" and you move it to another place, then, after release the mouse button the group follows the mouse arrow by the screen whithout clicking if it passes over the group. Follow this example: Red [ Needs: 'View ] w: [ title "TEST" size 800x800 FntGroup: group-box gray [ below fnt1: radio bold "Console" data on on-down [] fnt2: radio bold "Terminal" on-down [] fnt3: radio bold "Fixed" on-down [] SizSli: slider 80 50% return ] loose ] view w
non_process
loose group box follows mouse arrow when a group box is made loose and you move it to another place then after release the mouse button the group follows the mouse arrow by the screen whithout clicking if it passes over the group follow this example red needs view w title test size fntgroup group box gray below radio bold console data on on down radio bold terminal on down radio bold fixed on down sizsli slider return loose view w
0
20,511
27,168,859,945
IssuesEvent
2023-02-17 17:29:40
open-telemetry/opentelemetry-collector-contrib
https://api.github.com/repos/open-telemetry/opentelemetry-collector-contrib
closed
[connector/spanmetrics] Rename the `operation` attribute to `span.name`
processor/spanmetrics needs triage connector/spanmetrics
### Component(s) connector/spanmetrics ### Describe the issue you're reporting It should bring [data point attributes produced](https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/processor/spanmetricsprocessor/processor.go#L41-L46) by the `spanmetrics` connector closer to the specification, see [Span spec](https://opentelemetry.io/docs/reference/specification/trace/api/#span). It is the change that will be done in the new (not yet enabled) component, so it does not break anything for the existing users. However, we have to inform users about these changes when migrating from spanmeterics processor to spanmeterics connector.
1.0
[connector/spanmetrics] Rename the `operation` attribute to `span.name` - ### Component(s) connector/spanmetrics ### Describe the issue you're reporting It should bring [data point attributes produced](https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/processor/spanmetricsprocessor/processor.go#L41-L46) by the `spanmetrics` connector closer to the specification, see [Span spec](https://opentelemetry.io/docs/reference/specification/trace/api/#span). It is the change that will be done in the new (not yet enabled) component, so it does not break anything for the existing users. However, we have to inform users about these changes when migrating from spanmeterics processor to spanmeterics connector.
process
rename the operation attribute to span name component s connector spanmetrics describe the issue you re reporting it should bring by the spanmetrics connector closer to the specification see it is the change that will be done in the new not yet enabled component so it does not break anything for the existing users however we have to inform users about these changes when migrating from spanmeterics processor to spanmeterics connector
1
177,538
28,505,594,301
IssuesEvent
2023-04-18 21:06:12
TylerMetz/Saucier720
https://api.github.com/repos/TylerMetz/Saucier720
opened
Information about how each page works
Frontend Sprint 4 design
### Description We need to consider how a person who has never seen the page how each thing works. I think it would be a good idea to include a header explaining each tab or Tyler's idea of clicking a question mark and a box with the info appears. ### Definition of Done Users can understand how each page works with no issues.
1.0
Information about how each page works - ### Description We need to consider how a person who has never seen the page how each thing works. I think it would be a good idea to include a header explaining each tab or Tyler's idea of clicking a question mark and a box with the info appears. ### Definition of Done Users can understand how each page works with no issues.
non_process
information about how each page works description we need to consider how a person who has never seen the page how each thing works i think it would be a good idea to include a header explaining each tab or tyler s idea of clicking a question mark and a box with the info appears definition of done users can understand how each page works with no issues
0
167,882
14,118,897,425
IssuesEvent
2020-11-08 15:31:23
AY2021S1-CS2103T-W17-3/tp
https://api.github.com/repos/AY2021S1-CS2103T-W17-3/tp
opened
DeleteCommand under Logic Shows deletePerson instead of DeleteFood
documentation
At the bottom right-hand side of the figue
1.0
DeleteCommand under Logic Shows deletePerson instead of DeleteFood - At the bottom right-hand side of the figue
non_process
deletecommand under logic shows deleteperson instead of deletefood at the bottom right hand side of the figue
0
140,309
5,400,070,868
IssuesEvent
2017-02-27 21:05:27
kolihub/koli
https://api.github.com/repos/kolihub/koli
closed
Slugrunner Pod
area/controller epic improvement priority/P0
The slugrunner is responsible for executing all the slug files from the platform. When a pod starts the slugrunner downloads the slug file from an object store system (minio/s3/gcs) and start the application. The path to download the slug file is constructed by the following information: - Deployment name - Namespace - Full git revision SHA-1 - Cluster name > The constraints to download the slug file is bound to the namespace where the pod is running, so the user cannot download a file that doesn't belong to his namespace.
1.0
Slugrunner Pod - The slugrunner is responsible for executing all the slug files from the platform. When a pod starts the slugrunner downloads the slug file from an object store system (minio/s3/gcs) and start the application. The path to download the slug file is constructed by the following information: - Deployment name - Namespace - Full git revision SHA-1 - Cluster name > The constraints to download the slug file is bound to the namespace where the pod is running, so the user cannot download a file that doesn't belong to his namespace.
non_process
slugrunner pod the slugrunner is responsible for executing all the slug files from the platform when a pod starts the slugrunner downloads the slug file from an object store system minio gcs and start the application the path to download the slug file is constructed by the following information deployment name namespace full git revision sha cluster name the constraints to download the slug file is bound to the namespace where the pod is running so the user cannot download a file that doesn t belong to his namespace
0
12,568
14,984,116,464
IssuesEvent
2021-01-28 18:08:13
ORNL-AMO/AMO-Tools-Desktop
https://api.github.com/repos/ORNL-AMO/AMO-Tools-Desktop
closed
Standalone style/consistency improvements
Calculator Process Heating Quick Fix
Small consistency and styling found while testing the "older" calculators. **Flow and Energy Used** - Help text differences - multiple use 'operating time' -- for the others, use whichever is fewer words (no "of") - Needs form validation/ red alert messaging - Add dashed to empty/invalid outputs on result table **Energy Equivalency:** - use dashes for results (take units off empty results)
1.0
Standalone style/consistency improvements - Small consistency and styling found while testing the "older" calculators. **Flow and Energy Used** - Help text differences - multiple use 'operating time' -- for the others, use whichever is fewer words (no "of") - Needs form validation/ red alert messaging - Add dashed to empty/invalid outputs on result table **Energy Equivalency:** - use dashes for results (take units off empty results)
process
standalone style consistency improvements small consistency and styling found while testing the older calculators flow and energy used help text differences multiple use operating time for the others use whichever is fewer words no of needs form validation red alert messaging add dashed to empty invalid outputs on result table energy equivalency use dashes for results take units off empty results
1
17,922
23,909,934,495
IssuesEvent
2022-09-09 07:09:31
qgis/QGIS-Documentation
https://api.github.com/repos/qgis/QGIS-Documentation
closed
Expose GEOS make valid options for geos 3.10+ builds to Repair Geometries algorithm and make_valid expression function (Request in QGIS)
Easy fix Processing Alg Expressions 3.28
### Request for documentation From pull request QGIS/qgis#50070 Author: @nyalldawson QGIS version: 3.28 **Expose GEOS make valid options for geos 3.10+ builds to Repair Geometries algorithm and make_valid expression function** ### PR Description: Allows use of the newer refined GEOS make valid methods in QGIS. ### Commits tagged with [need-docs] or [FEATURE]
1.0
Expose GEOS make valid options for geos 3.10+ builds to Repair Geometries algorithm and make_valid expression function (Request in QGIS) - ### Request for documentation From pull request QGIS/qgis#50070 Author: @nyalldawson QGIS version: 3.28 **Expose GEOS make valid options for geos 3.10+ builds to Repair Geometries algorithm and make_valid expression function** ### PR Description: Allows use of the newer refined GEOS make valid methods in QGIS. ### Commits tagged with [need-docs] or [FEATURE]
process
expose geos make valid options for geos builds to repair geometries algorithm and make valid expression function request in qgis request for documentation from pull request qgis qgis author nyalldawson qgis version expose geos make valid options for geos builds to repair geometries algorithm and make valid expression function pr description allows use of the newer refined geos make valid methods in qgis commits tagged with or
1
43,590
5,655,304,744
IssuesEvent
2017-04-09 16:31:32
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
closed
Proposal: allow deconstruction in more places (let, from, lambda)
Area-Language Design Language-C# New Language Feature - Tuples
We only were able to implement P0 deconstruction scenarios in C# 7, which leaves a number of [candidates](https://github.com/dotnet/roslyn/issues/11299) unaddressed (let clause, from clause, lambda, method declaration, using, outvar, join clause, query continuation clause, join into clause, catch). The first three in particular could use further investigation. ### From clause Instead of: ``` C# (int, int)[] tuples = new[] { (1, 2), (3, 4) }; var query = from t in tuples select t.Item1; ``` Allow: ``` C# var query = from (x, y) in tuples select x; ``` ### Let clause ``` C# var query = from deconstructable in deconstructables let (x, y) = deconstructable ...; ``` ### Lambda Instead of: ``` C# tuples.Select(t => t.Item1 + t.Item2); ``` Allow: ``` C# tuples.Select((var (x, y)) => x + y); // the lambda takes one argument that is not named // and can be broken into two parts ``` Or maybe this syntax instead: ``` C# tuples.Select(((x, y)) => x +y); // same number of parentheses, but denser ``` FYI @dotnet/roslyn-compiler @MadsTorgersen @CyrusNajmabadi @kuhlenh
1.0
Proposal: allow deconstruction in more places (let, from, lambda) - We only were able to implement P0 deconstruction scenarios in C# 7, which leaves a number of [candidates](https://github.com/dotnet/roslyn/issues/11299) unaddressed (let clause, from clause, lambda, method declaration, using, outvar, join clause, query continuation clause, join into clause, catch). The first three in particular could use further investigation. ### From clause Instead of: ``` C# (int, int)[] tuples = new[] { (1, 2), (3, 4) }; var query = from t in tuples select t.Item1; ``` Allow: ``` C# var query = from (x, y) in tuples select x; ``` ### Let clause ``` C# var query = from deconstructable in deconstructables let (x, y) = deconstructable ...; ``` ### Lambda Instead of: ``` C# tuples.Select(t => t.Item1 + t.Item2); ``` Allow: ``` C# tuples.Select((var (x, y)) => x + y); // the lambda takes one argument that is not named // and can be broken into two parts ``` Or maybe this syntax instead: ``` C# tuples.Select(((x, y)) => x +y); // same number of parentheses, but denser ``` FYI @dotnet/roslyn-compiler @MadsTorgersen @CyrusNajmabadi @kuhlenh
non_process
proposal allow deconstruction in more places let from lambda we only were able to implement deconstruction scenarios in c which leaves a number of unaddressed let clause from clause lambda method declaration using outvar join clause query continuation clause join into clause catch the first three in particular could use further investigation from clause instead of c int int tuples new var query from t in tuples select t allow c var query from x y in tuples select x let clause c var query from deconstructable in deconstructables let x y deconstructable lambda instead of c tuples select t t t allow c tuples select var x y x y the lambda takes one argument that is not named and can be broken into two parts or maybe this syntax instead c tuples select x y x y same number of parentheses but denser fyi dotnet roslyn compiler madstorgersen cyrusnajmabadi kuhlenh
0
557,815
16,520,018,320
IssuesEvent
2021-05-26 13:41:08
BricksVR/bricksvr-issue-tracking
https://api.github.com/repos/BricksVR/bricksvr-issue-tracking
closed
Name censors
feature request high priority
** inappropriate names ** I believe the idea of names not being censored could lead to bad cases. **Heres the solution** Censoring names!.
1.0
Name censors - ** inappropriate names ** I believe the idea of names not being censored could lead to bad cases. **Heres the solution** Censoring names!.
non_process
name censors inappropriate names i believe the idea of names not being censored could lead to bad cases heres the solution censoring names
0
639,737
20,763,558,336
IssuesEvent
2022-03-15 18:23:03
massenergize/api
https://api.github.com/repos/massenergize/api
closed
Routes for user submitted Actions, Events and Vendors
enhancement priority 1
Community portal users will be able to submit events, actions or vendors, which will need to be curated by community admins. The routes actions.add, events.add and vendors.add will work like testimonials.add. The main difference between them and the .create routes is that the primary community admin is notified via Email and Slack when something is submitted.
1.0
Routes for user submitted Actions, Events and Vendors - Community portal users will be able to submit events, actions or vendors, which will need to be curated by community admins. The routes actions.add, events.add and vendors.add will work like testimonials.add. The main difference between them and the .create routes is that the primary community admin is notified via Email and Slack when something is submitted.
non_process
routes for user submitted actions events and vendors community portal users will be able to submit events actions or vendors which will need to be curated by community admins the routes actions add events add and vendors add will work like testimonials add the main difference between them and the create routes is that the primary community admin is notified via email and slack when something is submitted
0
602,991
18,521,320,709
IssuesEvent
2021-10-20 15:18:15
ARMmbed/mbed-os
https://api.github.com/repos/ARMmbed/mbed-os
closed
CY8CKIT064B0S2_4343W fails at test cordio_hci-driver
devices: cypress priority: untriaged
<!-- ************************************** WARNING ************************************** The ciarcom bot parses this header automatically. Any deviation from the template may cause the bot to automatically correct this header or may result in a warning message, requesting updates. Please ensure all sections of the template below are filled in and no changes are made to the template format. Only bugs should be raised here as issues. Questions or enhancements should instead be raised on our forums: https://forums.mbed.com/ . ************************************************************************************* --> ### Description of defect <!-- Add detailed description of what you are reporting. Good example: https://os.mbed.com/docs/mbed-os/latest/contributing/workflow.html --> The CY8CKIT064B0S2_4343W target fails at running the`cordio_hci-driver` greentea tests. ``` mbed test -t [GCC_ARM, ARM] -m CY8CKIT064B0S2_4343W -v -n mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver Build successes: * CY8CKIT064B0S2_4343W::GCC_ARM::MBED-BUILD * CY8CKIT064B0S2_4343W::GCC_ARM::MBED-OS-CONNECTIVITY-FEATURE_BLE-SOURCE-CORDIO-TESTS-CORDIO_HCI-DRIVER [mbed] Exec "mbedgt --test-spec ./BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/test_spec.json -n mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver -V" in "/Users/x/mbed/cypress/test2" mbedgt: greentea test automation tool ver. 1.7.4 mbedgt: test specification file './BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/test_spec.json' (specified with --test-spec option) mbedgt: using './BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/test_spec.json' from current directory! mbedgt: detecting connected mbed-enabled devices... mbedgt: detected 1 device | platform_name | platform_name_unique | serial_port | mount_point | target_id | |----------------------|-------------------------|------------------------|------------------|--------------------------------------------------| | CY8CKIT064B0S2_4343W | CY8CKIT064B0S2_4343W[0] | /dev/tty.usbmodem14203 | /Volumes/DAPLINK | 191013011c111612021c111600000000000000002e127069 | mbedgt: processing target 'CY8CKIT064B0S2_4343W' toolchain 'GCC_ARM' compatible platforms... (note: switch set to --parallel 1) | platform_name | platform_name_unique | serial_port | mount_point | target_id | |----------------------|-------------------------|-----------------------------|------------------|--------------------------------------------------| | CY8CKIT064B0S2_4343W | CY8CKIT064B0S2_4343W[0] | /dev/tty.usbmodem14203:9600 | /Volumes/DAPLINK | 191013011c111612021c111600000000000000002e127069 | mbedgt: test case filter (specified with -n option) mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver test filtered in 'mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver' mbedgt: running 1 test for platform 'CY8CKIT064B0S2_4343W' and toolchain 'GCC_ARM' use 1 instance of execution threads for testing mbedgt: checking for 'host_tests' directory above image directory structure 'host_tests' directory not found: two directory levels above image path checked mbedgt: selecting test case observer... calling mbedhtrun: mbedhtrun -m CY8CKIT064B0S2_4343W -p /dev/tty.usbmodem14203:9600 -f "BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/mbed-os/connectivity/FEATURE_BLE/source/cordio/TESTS/cordio_hci/driver/driver.hex" -d /Volumes/DAPLINK -c default -t 191013011c111612021c111600000000000000002e127069 -r default -C 10 -R 5 --sync 5 -P 60 mbedgt: mbed-host-test-runner: started [1601646435.52][HTST][INF] host test executor ver. 0.0.15 [1601646435.52][HTST][INF] copy image onto target... [1601646435.52][COPY][INF] Waiting up to 60 sec for '191013011c111612021c111600000000000000002e127069' mount point (current is '/Volumes/DAPLINK')... [1601646474.63][HTST][INF] starting host test process... [1601646475.07][CONN][INF] starting connection process... [1601646475.07][CONN][INF] notify event queue about extra 60 sec timeout for serial port pooling [1601646475.07][CONN][INF] initializing serial port listener... [1601646475.07][PLGN][INF] Waiting up to 60 sec for '191013011c111612021c111600000000000000002e127069' serial port (current is '/dev/tty.usbmodem14203')... [1601646475.07][HTST][INF] setting timeout to: 60 sec [1601646477.21][SERI][INF] serial(port=/dev/tty.usbmodem14203, baudrate=9600, read_timeout=0.01, write_timeout=5) [1601646477.22][SERI][INF] reset device using 'default' plugin... [1601646477.62][SERI][INF] waiting 5.00 sec after reset [1601646482.62][SERI][INF] wait for it... [1601646482.62][SERI][TXD] mbedmbedmbedmbedmbedmbedmbedmbedmbedmbed [1601646482.62][CONN][INF] sending up to 5 __sync packets (specified with --sync=5) [1601646482.62][CONN][INF] sending preamble 'f5aa6c75-ac53-453b-b32f-2eac3fe86ad7' [1601646482.62][SERI][TXD] {{__sync;f5aa6c75-ac53-453b-b32f-2eac3fe86ad7}} [1601646482.64][CONN][WRN] UnicodeDecodeError encountered! [1601646482.76][CONN][RXD] IIIHmII閭Ѣ6Rbmbedmbedmbedmbedmbedmbedmbedmbed [1601646482.81][CONN][INF] found SYNC in stream: {{__sync;f5aa6c75-ac53-453b-b32f-2eac3fe86ad7}} it is #0 sent, queued... [1601646482.81][HTST][INF] sync KV found, uuid=f5aa6c75-ac53-453b-b32f-2eac3fe86ad7, timestamp=1601646482.806053 [1601646482.83][CONN][INF] found KV pair in stream: {{__version;1.3.0}}, queued... [1601646482.83][HTST][INF] DUT greentea-client version: 1.3.0 [1601646482.85][CONN][INF] found KV pair in stream: {{__timeout;15}}, queued... [1601646482.85][HTST][INF] setting timeout to: 15 sec [1601646482.89][CONN][INF] found KV pair in stream: {{__host_test_name;default_auto}}, queued... [1601646482.89][HTST][INF] host test class: '<class 'mbed_os_tools.test.host_tests.default_auto.DefaultAuto'>' [1601646482.89][HTST][INF] host test setup() call... [1601646482.89][HTST][INF] CALLBACKs updated [1601646482.89][HTST][INF] host test detected: default_auto [1601646482.91][CONN][RXD] >>> Running 1 test cases... [1601646482.96][CONN][INF] found KV pair in stream: {{__testcase_name;Test cordio stack reset sequence}}, queued... [1601646482.98][CONN][RXD] [1601646483.03][CONN][RXD] >>> Running case #1: 'Test cordio stack reset sequence'... [1601646483.09][CONN][INF] found KV pair in stream: {{__testcase_start;Test cordio stack reset sequence}}, queued... mbedgt: :78::FAIL: Expected 2 Was 0 [1601646494.49][CONN][RXD] :78::FAIL: Expected 2 Was 0 [1601646494.55][CONN][INF] found KV pair in stream: {{__testcase_finish;Test cordio stack reset sequence;0;1}}, queued... [1601646494.64][CONN][RXD] >>> 'Test cordio stack reset sequence': 0 passed, 1 failed with reason 'Assertion Failed' [1601646494.64][CONN][RXD] [1601646494.71][CONN][RXD] >>> Test cases: 0 passed, 1 failed with reason 'Assertion Failed' [1601646494.73][CONN][RXD] >>> TESTS FAILED! [1601646494.75][CONN][INF] found KV pair in stream: {{__testcase_summary;0;1}}, queued... [1601646494.78][CONN][INF] found KV pair in stream: {{end;failure}}, queued... [1601646494.78][HTST][INF] __notify_complete(False) [1601646494.78][HTST][INF] __exit_event_queue received [1601646494.78][HTST][INF] test suite run finished after 11.93 sec... [1601646494.79][CONN][INF] found KV pair in stream: {{__exit;0}}, queued... [1601646494.79][CONN][INF] received special event '__host_test_finished' value='True', finishing [1601646494.89][HTST][INF] CONN exited with code: 0 [1601646494.89][HTST][INF] Some events in queue [1601646494.89][HTST][INF] stopped consuming events [1601646494.89][HTST][INF] host test result() call skipped, received: False [1601646494.89][HTST][WRN] missing __exit event from DUT [1601646494.89][HTST][INF] calling blocking teardown() [1601646494.89][HTST][INF] teardown() finished [1601646494.89][HTST][INF] {{result;failure}} mbedgt: retry mbedhtrun 1/1 mbedgt: ['mbedhtrun', '-m', 'CY8CKIT064B0S2_4343W', '-p', '/dev/tty.usbmodem14203:9600', '-f', '"BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/mbed-os/connectivity/FEATURE_BLE/source/cordio/TESTS/cordio_hci/driver/driver.hex"', '-d', '/Volumes/DAPLINK', '-c', 'default', '-t', '191013011c111612021c111600000000000000002e127069', '-r', 'default', '-C', '10', '-R', '5', '--sync', '5', '-P', '60'] failed after 1 count mbedgt: checking for GCOV data... mbedgt: mbed-host-test-runner: stopped and returned 'FAIL' mbedgt: test on hardware with target id: 191013011c111612021c111600000000000000002e127069 mbedgt: test suite 'mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver' .......... FAIL in 59.94 sec test case: 'Test cordio stack reset sequence' ................................................ FAIL in 11.46 sec mbedgt: test case summary: 0 passes, 1 failure mbedgt: all tests finished! mbedgt: shuffle seed: 0.4482154100 mbedgt: test suite report: | target | platform_name | test suite | result | elapsed_time (sec) | copy_method | |------------------------------|----------------------|------------------------------------------------------------------------|--------|--------------------|-------------| | CY8CKIT064B0S2_4343W-GCC_ARM | CY8CKIT064B0S2_4343W | mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver | FAIL | 59.94 | default | mbedgt: test suite results: 1 FAIL mbedgt: test case report: | target | platform_name | test suite | test case | passed | failed | result | elapsed_time (sec) | |------------------------------|----------------------|------------------------------------------------------------------------|----------------------------------|--------|--------|--------|--------------------| | CY8CKIT064B0S2_4343W-GCC_ARM | CY8CKIT064B0S2_4343W | mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver | Test cordio stack reset sequence | 0 | 1 | FAIL | 11.46 | mbedgt: test case results: 1 FAIL mbedgt: completed in 62.11 sec ``` Logs attached [cordio_hci-driver_test.txt](https://github.com/ARMmbed/mbed-os/files/5318451/cordio_hci-driver_test.txt) #### Target(s) affected by this defect ? CY8CKIT064B0S2_4343W #### Toolchain(s) (name and version) displaying this defect ? Arm Compiler 6 and GCC 9 #### What version of Mbed-os are you using (tag or sha) ? <!-- For a released version please provide the release tag (this can be found as per the instructions below) mbed-os version can be found in /platform/mbed_version.h. The tag can be reconstructed as follows: mbed-os-MBED_MAJOR_VERSION.MBED_MINOR_VERSION.MBED_PATCH_VERSION Master branch is indicated by 'mbed-os-99.99.99 For an issue found on Master please provide the sha being used. --> fbe04097c71d12a28b996084df0304eace81a484 #### What version(s) of tools are you using. List all that apply (E.g. mbed-cli) $ mbed --version 1.10.4 #### How is this defect reproduced ? ``` mbed test -t [GCC_ARM, ARM] -m CY8CKIT064B0S2_4343W -v -n mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver ``` @ARMmbed/team-cypress @ARMmbed/mbed-os-connectivity
1.0
CY8CKIT064B0S2_4343W fails at test cordio_hci-driver - <!-- ************************************** WARNING ************************************** The ciarcom bot parses this header automatically. Any deviation from the template may cause the bot to automatically correct this header or may result in a warning message, requesting updates. Please ensure all sections of the template below are filled in and no changes are made to the template format. Only bugs should be raised here as issues. Questions or enhancements should instead be raised on our forums: https://forums.mbed.com/ . ************************************************************************************* --> ### Description of defect <!-- Add detailed description of what you are reporting. Good example: https://os.mbed.com/docs/mbed-os/latest/contributing/workflow.html --> The CY8CKIT064B0S2_4343W target fails at running the`cordio_hci-driver` greentea tests. ``` mbed test -t [GCC_ARM, ARM] -m CY8CKIT064B0S2_4343W -v -n mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver Build successes: * CY8CKIT064B0S2_4343W::GCC_ARM::MBED-BUILD * CY8CKIT064B0S2_4343W::GCC_ARM::MBED-OS-CONNECTIVITY-FEATURE_BLE-SOURCE-CORDIO-TESTS-CORDIO_HCI-DRIVER [mbed] Exec "mbedgt --test-spec ./BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/test_spec.json -n mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver -V" in "/Users/x/mbed/cypress/test2" mbedgt: greentea test automation tool ver. 1.7.4 mbedgt: test specification file './BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/test_spec.json' (specified with --test-spec option) mbedgt: using './BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/test_spec.json' from current directory! mbedgt: detecting connected mbed-enabled devices... mbedgt: detected 1 device | platform_name | platform_name_unique | serial_port | mount_point | target_id | |----------------------|-------------------------|------------------------|------------------|--------------------------------------------------| | CY8CKIT064B0S2_4343W | CY8CKIT064B0S2_4343W[0] | /dev/tty.usbmodem14203 | /Volumes/DAPLINK | 191013011c111612021c111600000000000000002e127069 | mbedgt: processing target 'CY8CKIT064B0S2_4343W' toolchain 'GCC_ARM' compatible platforms... (note: switch set to --parallel 1) | platform_name | platform_name_unique | serial_port | mount_point | target_id | |----------------------|-------------------------|-----------------------------|------------------|--------------------------------------------------| | CY8CKIT064B0S2_4343W | CY8CKIT064B0S2_4343W[0] | /dev/tty.usbmodem14203:9600 | /Volumes/DAPLINK | 191013011c111612021c111600000000000000002e127069 | mbedgt: test case filter (specified with -n option) mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver test filtered in 'mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver' mbedgt: running 1 test for platform 'CY8CKIT064B0S2_4343W' and toolchain 'GCC_ARM' use 1 instance of execution threads for testing mbedgt: checking for 'host_tests' directory above image directory structure 'host_tests' directory not found: two directory levels above image path checked mbedgt: selecting test case observer... calling mbedhtrun: mbedhtrun -m CY8CKIT064B0S2_4343W -p /dev/tty.usbmodem14203:9600 -f "BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/mbed-os/connectivity/FEATURE_BLE/source/cordio/TESTS/cordio_hci/driver/driver.hex" -d /Volumes/DAPLINK -c default -t 191013011c111612021c111600000000000000002e127069 -r default -C 10 -R 5 --sync 5 -P 60 mbedgt: mbed-host-test-runner: started [1601646435.52][HTST][INF] host test executor ver. 0.0.15 [1601646435.52][HTST][INF] copy image onto target... [1601646435.52][COPY][INF] Waiting up to 60 sec for '191013011c111612021c111600000000000000002e127069' mount point (current is '/Volumes/DAPLINK')... [1601646474.63][HTST][INF] starting host test process... [1601646475.07][CONN][INF] starting connection process... [1601646475.07][CONN][INF] notify event queue about extra 60 sec timeout for serial port pooling [1601646475.07][CONN][INF] initializing serial port listener... [1601646475.07][PLGN][INF] Waiting up to 60 sec for '191013011c111612021c111600000000000000002e127069' serial port (current is '/dev/tty.usbmodem14203')... [1601646475.07][HTST][INF] setting timeout to: 60 sec [1601646477.21][SERI][INF] serial(port=/dev/tty.usbmodem14203, baudrate=9600, read_timeout=0.01, write_timeout=5) [1601646477.22][SERI][INF] reset device using 'default' plugin... [1601646477.62][SERI][INF] waiting 5.00 sec after reset [1601646482.62][SERI][INF] wait for it... [1601646482.62][SERI][TXD] mbedmbedmbedmbedmbedmbedmbedmbedmbedmbed [1601646482.62][CONN][INF] sending up to 5 __sync packets (specified with --sync=5) [1601646482.62][CONN][INF] sending preamble 'f5aa6c75-ac53-453b-b32f-2eac3fe86ad7' [1601646482.62][SERI][TXD] {{__sync;f5aa6c75-ac53-453b-b32f-2eac3fe86ad7}} [1601646482.64][CONN][WRN] UnicodeDecodeError encountered! [1601646482.76][CONN][RXD] IIIHmII閭Ѣ6Rbmbedmbedmbedmbedmbedmbedmbedmbed [1601646482.81][CONN][INF] found SYNC in stream: {{__sync;f5aa6c75-ac53-453b-b32f-2eac3fe86ad7}} it is #0 sent, queued... [1601646482.81][HTST][INF] sync KV found, uuid=f5aa6c75-ac53-453b-b32f-2eac3fe86ad7, timestamp=1601646482.806053 [1601646482.83][CONN][INF] found KV pair in stream: {{__version;1.3.0}}, queued... [1601646482.83][HTST][INF] DUT greentea-client version: 1.3.0 [1601646482.85][CONN][INF] found KV pair in stream: {{__timeout;15}}, queued... [1601646482.85][HTST][INF] setting timeout to: 15 sec [1601646482.89][CONN][INF] found KV pair in stream: {{__host_test_name;default_auto}}, queued... [1601646482.89][HTST][INF] host test class: '<class 'mbed_os_tools.test.host_tests.default_auto.DefaultAuto'>' [1601646482.89][HTST][INF] host test setup() call... [1601646482.89][HTST][INF] CALLBACKs updated [1601646482.89][HTST][INF] host test detected: default_auto [1601646482.91][CONN][RXD] >>> Running 1 test cases... [1601646482.96][CONN][INF] found KV pair in stream: {{__testcase_name;Test cordio stack reset sequence}}, queued... [1601646482.98][CONN][RXD] [1601646483.03][CONN][RXD] >>> Running case #1: 'Test cordio stack reset sequence'... [1601646483.09][CONN][INF] found KV pair in stream: {{__testcase_start;Test cordio stack reset sequence}}, queued... mbedgt: :78::FAIL: Expected 2 Was 0 [1601646494.49][CONN][RXD] :78::FAIL: Expected 2 Was 0 [1601646494.55][CONN][INF] found KV pair in stream: {{__testcase_finish;Test cordio stack reset sequence;0;1}}, queued... [1601646494.64][CONN][RXD] >>> 'Test cordio stack reset sequence': 0 passed, 1 failed with reason 'Assertion Failed' [1601646494.64][CONN][RXD] [1601646494.71][CONN][RXD] >>> Test cases: 0 passed, 1 failed with reason 'Assertion Failed' [1601646494.73][CONN][RXD] >>> TESTS FAILED! [1601646494.75][CONN][INF] found KV pair in stream: {{__testcase_summary;0;1}}, queued... [1601646494.78][CONN][INF] found KV pair in stream: {{end;failure}}, queued... [1601646494.78][HTST][INF] __notify_complete(False) [1601646494.78][HTST][INF] __exit_event_queue received [1601646494.78][HTST][INF] test suite run finished after 11.93 sec... [1601646494.79][CONN][INF] found KV pair in stream: {{__exit;0}}, queued... [1601646494.79][CONN][INF] received special event '__host_test_finished' value='True', finishing [1601646494.89][HTST][INF] CONN exited with code: 0 [1601646494.89][HTST][INF] Some events in queue [1601646494.89][HTST][INF] stopped consuming events [1601646494.89][HTST][INF] host test result() call skipped, received: False [1601646494.89][HTST][WRN] missing __exit event from DUT [1601646494.89][HTST][INF] calling blocking teardown() [1601646494.89][HTST][INF] teardown() finished [1601646494.89][HTST][INF] {{result;failure}} mbedgt: retry mbedhtrun 1/1 mbedgt: ['mbedhtrun', '-m', 'CY8CKIT064B0S2_4343W', '-p', '/dev/tty.usbmodem14203:9600', '-f', '"BUILD/tests/CY8CKIT064B0S2_4343W/GCC_ARM/mbed-os/connectivity/FEATURE_BLE/source/cordio/TESTS/cordio_hci/driver/driver.hex"', '-d', '/Volumes/DAPLINK', '-c', 'default', '-t', '191013011c111612021c111600000000000000002e127069', '-r', 'default', '-C', '10', '-R', '5', '--sync', '5', '-P', '60'] failed after 1 count mbedgt: checking for GCOV data... mbedgt: mbed-host-test-runner: stopped and returned 'FAIL' mbedgt: test on hardware with target id: 191013011c111612021c111600000000000000002e127069 mbedgt: test suite 'mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver' .......... FAIL in 59.94 sec test case: 'Test cordio stack reset sequence' ................................................ FAIL in 11.46 sec mbedgt: test case summary: 0 passes, 1 failure mbedgt: all tests finished! mbedgt: shuffle seed: 0.4482154100 mbedgt: test suite report: | target | platform_name | test suite | result | elapsed_time (sec) | copy_method | |------------------------------|----------------------|------------------------------------------------------------------------|--------|--------------------|-------------| | CY8CKIT064B0S2_4343W-GCC_ARM | CY8CKIT064B0S2_4343W | mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver | FAIL | 59.94 | default | mbedgt: test suite results: 1 FAIL mbedgt: test case report: | target | platform_name | test suite | test case | passed | failed | result | elapsed_time (sec) | |------------------------------|----------------------|------------------------------------------------------------------------|----------------------------------|--------|--------|--------|--------------------| | CY8CKIT064B0S2_4343W-GCC_ARM | CY8CKIT064B0S2_4343W | mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver | Test cordio stack reset sequence | 0 | 1 | FAIL | 11.46 | mbedgt: test case results: 1 FAIL mbedgt: completed in 62.11 sec ``` Logs attached [cordio_hci-driver_test.txt](https://github.com/ARMmbed/mbed-os/files/5318451/cordio_hci-driver_test.txt) #### Target(s) affected by this defect ? CY8CKIT064B0S2_4343W #### Toolchain(s) (name and version) displaying this defect ? Arm Compiler 6 and GCC 9 #### What version of Mbed-os are you using (tag or sha) ? <!-- For a released version please provide the release tag (this can be found as per the instructions below) mbed-os version can be found in /platform/mbed_version.h. The tag can be reconstructed as follows: mbed-os-MBED_MAJOR_VERSION.MBED_MINOR_VERSION.MBED_PATCH_VERSION Master branch is indicated by 'mbed-os-99.99.99 For an issue found on Master please provide the sha being used. --> fbe04097c71d12a28b996084df0304eace81a484 #### What version(s) of tools are you using. List all that apply (E.g. mbed-cli) $ mbed --version 1.10.4 #### How is this defect reproduced ? ``` mbed test -t [GCC_ARM, ARM] -m CY8CKIT064B0S2_4343W -v -n mbed-os-connectivity-feature_ble-source-cordio-tests-cordio_hci-driver ``` @ARMmbed/team-cypress @ARMmbed/mbed-os-connectivity
non_process
fails at test cordio hci driver warning the ciarcom bot parses this header automatically any deviation from the template may cause the bot to automatically correct this header or may result in a warning message requesting updates please ensure all sections of the template below are filled in and no changes are made to the template format only bugs should be raised here as issues questions or enhancements should instead be raised on our forums description of defect add detailed description of what you are reporting good example the target fails at running the cordio hci driver greentea tests mbed test t m v n mbed os connectivity feature ble source cordio tests cordio hci driver build successes gcc arm mbed build gcc arm mbed os connectivity feature ble source cordio tests cordio hci driver exec mbedgt test spec build tests gcc arm test spec json n mbed os connectivity feature ble source cordio tests cordio hci driver v in users x mbed cypress mbedgt greentea test automation tool ver mbedgt test specification file build tests gcc arm test spec json specified with test spec option mbedgt using build tests gcc arm test spec json from current directory mbedgt detecting connected mbed enabled devices mbedgt detected device platform name platform name unique serial port mount point target id dev tty volumes daplink mbedgt processing target toolchain gcc arm compatible platforms note switch set to parallel platform name platform name unique serial port mount point target id dev tty volumes daplink mbedgt test case filter specified with n option mbed os connectivity feature ble source cordio tests cordio hci driver test filtered in mbed os connectivity feature ble source cordio tests cordio hci driver mbedgt running test for platform and toolchain gcc arm use instance of execution threads for testing mbedgt checking for host tests directory above image directory structure host tests directory not found two directory levels above image path checked mbedgt selecting test case observer calling mbedhtrun mbedhtrun m p dev tty f build tests gcc arm mbed os connectivity feature ble source cordio tests cordio hci driver driver hex d volumes daplink c default t r default c r sync p mbedgt mbed host test runner started host test executor ver copy image onto target waiting up to sec for mount point current is volumes daplink starting host test process starting connection process notify event queue about extra sec timeout for serial port pooling initializing serial port listener waiting up to sec for serial port current is dev tty setting timeout to sec serial port dev tty baudrate read timeout write timeout reset device using default plugin waiting sec after reset wait for it mbedmbedmbedmbedmbedmbedmbedmbedmbedmbed sending up to sync packets specified with sync sending preamble sync unicodedecodeerror encountered found sync in stream sync it is sent queued sync kv found uuid timestamp found kv pair in stream version queued dut greentea client version found kv pair in stream timeout queued setting timeout to sec found kv pair in stream host test name default auto queued host test class host test setup call callbacks updated host test detected default auto running test cases found kv pair in stream testcase name test cordio stack reset sequence queued running case test cordio stack reset sequence found kv pair in stream testcase start test cordio stack reset sequence queued mbedgt fail expected was fail expected was found kv pair in stream testcase finish test cordio stack reset sequence queued test cordio stack reset sequence passed failed with reason assertion failed test cases passed failed with reason assertion failed tests failed found kv pair in stream testcase summary queued found kv pair in stream end failure queued notify complete false exit event queue received test suite run finished after sec found kv pair in stream exit queued received special event host test finished value true finishing conn exited with code some events in queue stopped consuming events host test result call skipped received false missing exit event from dut calling blocking teardown teardown finished result failure mbedgt retry mbedhtrun mbedgt failed after count mbedgt checking for gcov data mbedgt mbed host test runner stopped and returned fail mbedgt test on hardware with target id mbedgt test suite mbed os connectivity feature ble source cordio tests cordio hci driver fail in sec test case test cordio stack reset sequence fail in sec mbedgt test case summary passes failure mbedgt all tests finished mbedgt shuffle seed mbedgt test suite report target platform name test suite result elapsed time sec copy method gcc arm mbed os connectivity feature ble source cordio tests cordio hci driver fail default mbedgt test suite results fail mbedgt test case report target platform name test suite test case passed failed result elapsed time sec gcc arm mbed os connectivity feature ble source cordio tests cordio hci driver test cordio stack reset sequence fail mbedgt test case results fail mbedgt completed in sec logs attached target s affected by this defect toolchain s name and version displaying this defect arm compiler and gcc what version of mbed os are you using tag or sha for a released version please provide the release tag this can be found as per the instructions below mbed os version can be found in platform mbed version h the tag can be reconstructed as follows mbed os mbed major version mbed minor version mbed patch version master branch is indicated by mbed os for an issue found on master please provide the sha being used what version s of tools are you using list all that apply e g mbed cli mbed version how is this defect reproduced mbed test t m v n mbed os connectivity feature ble source cordio tests cordio hci driver armmbed team cypress armmbed mbed os connectivity
0
163,611
6,201,982,334
IssuesEvent
2017-07-06 08:00:48
kubernetes/dashboard
https://api.github.com/repos/kubernetes/dashboard
closed
Make events display consistent with kubectl
kind/enhancement priority/P2
Currently on most resource detail pages we are displaying not only events for i.e. ReplicaSet but also for its' pods. Kubectl actually displays only events targeting given resource and only when doing `kubectl describe pod` there are more information. I think that we can still get all related events in order to show warnings on the list but we should update event list on details pages to reflect kubectl behavior. ReplicaSet describe ```bash $ kubectl -n kube-system describe rs dex-2443123885 Name: dex-2443123885 Namespace: kube-system ... Events: FirstSeen LastSeen Count From SubObjectPath Type Reason Message --------- -------- ----- ---- ------------- -------- ------ ------- 15m 15m 1 replicaset-controller Normal SuccessfulCreate Created pod: dex-2443123885-46ntp ``` ReplicaSet details ![zrzut ekranu z 2017-06-29 13-07-17](https://user-images.githubusercontent.com/2285385/27684833-e8faabbe-5ccb-11e7-90ca-92596124a662.png) Pod describe ```bash $ kubectl -n kube-system describe pod dex-2443123885-46ntp Name: dex-2443123885-46ntp Namespace: kube-system ... Events: FirstSeen LastSeen Count From SubObjectPath Type Reason Message --------- -------- ----- ---- ------------- -------- ------ ------- 15m 15m 1 default-scheduler Normal ScheduledSuccessfully assigned dex-2443123885-46ntp to kube-node-1 15m 1m 15 kubelet, kube-node-1 Warning FailedMount MountVolume.SetUp failed for volume "kubernetes.io/configmap/2b705266-5cb8-11e7-8cfc-02420ac00002-config" (spec.Name: "config") pod "2b705266-5cb8-11e7-8cfc-02420ac00002" (UID: "2b705266-5cb8-11e7-8cfc-02420ac00002") with: configmaps "dex" not found 15m 1m 15 kubelet, kube-node-1 Warning FailedMount MountVolume.SetUp failed for volume "kubernetes.io/secret/2b705266-5cb8-11e7-8cfc-02420ac00002-tls" (spec.Name: "tls") pod "2b705266-5cb8-11e7-8cfc-02420ac00002" (UID: "2b705266-5cb8-11e7-8cfc-02420ac00002") with: secrets "10.233.0.1.tls" not found 13m 34s 7 kubelet, kube-node-1 Warning FailedMount Unable to mount volumes for pod "dex-2443123885-46ntp_kube-system(2b705266-5cb8-11e7-8cfc-02420ac00002)": timeout expired waiting for volumes to attach/mount for pod "kube-system"/"dex-2443123885-46ntp". list of unattached/unmounted volumes=[config tls] 13m 34s 7 kubelet, kube-node-1 Warning FailedSync Error syncing pod, skipping: timeout expired waiting for volumes to attach/mount for pod "kube-system"/"dex-2443123885-46ntp". list of unattached/unmounted volumes=[config tls] ``` Pod details ![zrzut ekranu z 2017-06-29 13-08-40](https://user-images.githubusercontent.com/2285385/27684871-17260218-5ccc-11e7-9214-49ce16bbff90.png)
1.0
Make events display consistent with kubectl - Currently on most resource detail pages we are displaying not only events for i.e. ReplicaSet but also for its' pods. Kubectl actually displays only events targeting given resource and only when doing `kubectl describe pod` there are more information. I think that we can still get all related events in order to show warnings on the list but we should update event list on details pages to reflect kubectl behavior. ReplicaSet describe ```bash $ kubectl -n kube-system describe rs dex-2443123885 Name: dex-2443123885 Namespace: kube-system ... Events: FirstSeen LastSeen Count From SubObjectPath Type Reason Message --------- -------- ----- ---- ------------- -------- ------ ------- 15m 15m 1 replicaset-controller Normal SuccessfulCreate Created pod: dex-2443123885-46ntp ``` ReplicaSet details ![zrzut ekranu z 2017-06-29 13-07-17](https://user-images.githubusercontent.com/2285385/27684833-e8faabbe-5ccb-11e7-90ca-92596124a662.png) Pod describe ```bash $ kubectl -n kube-system describe pod dex-2443123885-46ntp Name: dex-2443123885-46ntp Namespace: kube-system ... Events: FirstSeen LastSeen Count From SubObjectPath Type Reason Message --------- -------- ----- ---- ------------- -------- ------ ------- 15m 15m 1 default-scheduler Normal ScheduledSuccessfully assigned dex-2443123885-46ntp to kube-node-1 15m 1m 15 kubelet, kube-node-1 Warning FailedMount MountVolume.SetUp failed for volume "kubernetes.io/configmap/2b705266-5cb8-11e7-8cfc-02420ac00002-config" (spec.Name: "config") pod "2b705266-5cb8-11e7-8cfc-02420ac00002" (UID: "2b705266-5cb8-11e7-8cfc-02420ac00002") with: configmaps "dex" not found 15m 1m 15 kubelet, kube-node-1 Warning FailedMount MountVolume.SetUp failed for volume "kubernetes.io/secret/2b705266-5cb8-11e7-8cfc-02420ac00002-tls" (spec.Name: "tls") pod "2b705266-5cb8-11e7-8cfc-02420ac00002" (UID: "2b705266-5cb8-11e7-8cfc-02420ac00002") with: secrets "10.233.0.1.tls" not found 13m 34s 7 kubelet, kube-node-1 Warning FailedMount Unable to mount volumes for pod "dex-2443123885-46ntp_kube-system(2b705266-5cb8-11e7-8cfc-02420ac00002)": timeout expired waiting for volumes to attach/mount for pod "kube-system"/"dex-2443123885-46ntp". list of unattached/unmounted volumes=[config tls] 13m 34s 7 kubelet, kube-node-1 Warning FailedSync Error syncing pod, skipping: timeout expired waiting for volumes to attach/mount for pod "kube-system"/"dex-2443123885-46ntp". list of unattached/unmounted volumes=[config tls] ``` Pod details ![zrzut ekranu z 2017-06-29 13-08-40](https://user-images.githubusercontent.com/2285385/27684871-17260218-5ccc-11e7-9214-49ce16bbff90.png)
non_process
make events display consistent with kubectl currently on most resource detail pages we are displaying not only events for i e replicaset but also for its pods kubectl actually displays only events targeting given resource and only when doing kubectl describe pod there are more information i think that we can still get all related events in order to show warnings on the list but we should update event list on details pages to reflect kubectl behavior replicaset describe bash kubectl n kube system describe rs dex name dex namespace kube system events firstseen lastseen count from subobjectpath type reason message replicaset controller normal successfulcreate created pod dex replicaset details pod describe bash kubectl n kube system describe pod dex name dex namespace kube system events firstseen lastseen count from subobjectpath type reason message default scheduler normal scheduledsuccessfully assigned dex to kube node kubelet kube node warning failedmount mountvolume setup failed for volume kubernetes io configmap config spec name config pod uid with configmaps dex not found kubelet kube node warning failedmount mountvolume setup failed for volume kubernetes io secret tls spec name tls pod uid with secrets tls not found kubelet kube node warning failedmount unable to mount volumes for pod dex kube system timeout expired waiting for volumes to attach mount for pod kube system dex list of unattached unmounted volumes kubelet kube node warning failedsync error syncing pod skipping timeout expired waiting for volumes to attach mount for pod kube system dex list of unattached unmounted volumes pod details
0
10,502
13,260,889,338
IssuesEvent
2020-08-20 18:56:14
knative/serving
https://api.github.com/repos/knative/serving
closed
imagePullPolicy: IfNotPresent does not work for private registries locally
area/API kind/process kind/question
/area API /kind process ## What version of Knative? 0.16.x ## Expected Behavior If an image already exists in the cluster like docker for desktop or minikube and imagePullPolicy: IfNotPresent is set then the container for a knative service should start running. ## Actual Behavior The revision fails with not authorized │ Events: │ │ Type Reason Age From Message │ │ ---- ------ ---- ---- ------- │ │ Warning InternalError 3s (x11 over 10s) revision-controller Unable to fetch image "xxx.dkr.ecr.us-east-1.amazonaws.com/2269-source-datalake-sqs-java-vert-x:f226381de39d8e6c397b293a32182459c0e644b3": failed to resolve image to digest: GET https://xxx.dkr.ecr.us-east-1.amazonaws.com/v2/2269-source-datalake-sqs-java-vert-x/manifests/f226381de39d8e6c397b293a32182459c0e644b3: unsupported status code 401; body: Not Authorized ## Steps to Reproduce the Problem install docker desktop docker pull an image from a private registry install knative service that uses that private registry
1.0
imagePullPolicy: IfNotPresent does not work for private registries locally - /area API /kind process ## What version of Knative? 0.16.x ## Expected Behavior If an image already exists in the cluster like docker for desktop or minikube and imagePullPolicy: IfNotPresent is set then the container for a knative service should start running. ## Actual Behavior The revision fails with not authorized │ Events: │ │ Type Reason Age From Message │ │ ---- ------ ---- ---- ------- │ │ Warning InternalError 3s (x11 over 10s) revision-controller Unable to fetch image "xxx.dkr.ecr.us-east-1.amazonaws.com/2269-source-datalake-sqs-java-vert-x:f226381de39d8e6c397b293a32182459c0e644b3": failed to resolve image to digest: GET https://xxx.dkr.ecr.us-east-1.amazonaws.com/v2/2269-source-datalake-sqs-java-vert-x/manifests/f226381de39d8e6c397b293a32182459c0e644b3: unsupported status code 401; body: Not Authorized ## Steps to Reproduce the Problem install docker desktop docker pull an image from a private registry install knative service that uses that private registry
process
imagepullpolicy ifnotpresent does not work for private registries locally area api kind process what version of knative x expected behavior if an image already exists in the cluster like docker for desktop or minikube and imagepullpolicy ifnotpresent is set then the container for a knative service should start running actual behavior the revision fails with not authorized │ events │ │ type reason age from message │ │ │ │ warning internalerror over revision controller unable to fetch image xxx dkr ecr us east amazonaws com source datalake sqs java vert x failed to resolve image to digest get unsupported status code body not authorized steps to reproduce the problem install docker desktop docker pull an image from a private registry install knative service that uses that private registry
1
9,270
6,193,015,248
IssuesEvent
2017-07-05 05:19:07
Virtual-Labs/soil-mechanics-and-foundation-engineering-iiith
https://api.github.com/repos/Virtual-Labs/soil-mechanics-and-foundation-engineering-iiith
closed
QA_soil-mechanics_Atterberg Limits Experiment_Procedure_Irrelevant-content
Category: Usability Developed By: VLEAD openedx-issue Resolved Severity: S2
Defect Description : In the procedure section of "Atterberg Limits Experiment" - irrelevant content is given. For the better usability for the user need to update the content. Actual Result : In the procedure section of "Atterberg Limits Experiment" - irrelevant content is given. Environment : OS: Windows 7, Ubuntu-16.04, Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM, Processor:i5 Attachments: ![qa_oe_sm_i30](https://cloud.githubusercontent.com/assets/13479177/26481956/f88ec4dc-4201-11e7-88b0-97eb01fd23a0.png)
True
QA_soil-mechanics_Atterberg Limits Experiment_Procedure_Irrelevant-content - Defect Description : In the procedure section of "Atterberg Limits Experiment" - irrelevant content is given. For the better usability for the user need to update the content. Actual Result : In the procedure section of "Atterberg Limits Experiment" - irrelevant content is given. Environment : OS: Windows 7, Ubuntu-16.04, Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM, Processor:i5 Attachments: ![qa_oe_sm_i30](https://cloud.githubusercontent.com/assets/13479177/26481956/f88ec4dc-4201-11e7-88b0-97eb01fd23a0.png)
non_process
qa soil mechanics atterberg limits experiment procedure irrelevant content defect description in the procedure section of atterberg limits experiment irrelevant content is given for the better usability for the user need to update the content actual result in the procedure section of atterberg limits experiment irrelevant content is given environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor attachments
0
180,270
21,625,623,938
IssuesEvent
2022-05-05 01:27:04
shrivastava-prateek/online-jsp-compiler
https://api.github.com/repos/shrivastava-prateek/online-jsp-compiler
closed
CVE-2020-7608 (Medium) detected in yargs-parser-4.2.1.tgz - autoclosed
security vulnerability
## CVE-2020-7608 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>yargs-parser-4.2.1.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-4.2.1.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-4.2.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/online-jsp-compiler/src/main/webapp/resources/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/online-jsp-compiler/src/main/webapp/resources/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - browser-sync-2.26.7.tgz (Root Library) - yargs-6.4.0.tgz - :x: **yargs-parser-4.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shrivastava-prateek/online-jsp-compiler/commit/5d8ffb248a8e5c277b04d2f3429de779a33919c4">5d8ffb248a8e5c277b04d2f3429de779a33919c4</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7608>CVE-2020-7608</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: v18.1.1;13.1.2;15.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7608 (Medium) detected in yargs-parser-4.2.1.tgz - autoclosed - ## CVE-2020-7608 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>yargs-parser-4.2.1.tgz</b></p></summary> <p>the mighty option parser used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/yargs-parser/-/yargs-parser-4.2.1.tgz">https://registry.npmjs.org/yargs-parser/-/yargs-parser-4.2.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/online-jsp-compiler/src/main/webapp/resources/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/online-jsp-compiler/src/main/webapp/resources/node_modules/yargs-parser/package.json</p> <p> Dependency Hierarchy: - browser-sync-2.26.7.tgz (Root Library) - yargs-6.4.0.tgz - :x: **yargs-parser-4.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shrivastava-prateek/online-jsp-compiler/commit/5d8ffb248a8e5c277b04d2f3429de779a33919c4">5d8ffb248a8e5c277b04d2f3429de779a33919c4</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. <p>Publish Date: 2020-03-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7608>CVE-2020-7608</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608</a></p> <p>Release Date: 2020-03-16</p> <p>Fix Resolution: v18.1.1;13.1.2;15.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve medium detected in yargs parser tgz autoclosed cve medium severity vulnerability vulnerable library yargs parser tgz the mighty option parser used by yargs library home page a href path to dependency file tmp ws scm online jsp compiler src main webapp resources package json path to vulnerable library tmp ws scm online jsp compiler src main webapp resources node modules yargs parser package json dependency hierarchy browser sync tgz root library yargs tgz x yargs parser tgz vulnerable library found in head commit a href vulnerability details yargs parser could be tricked into adding or modifying properties of object prototype using a proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
243,242
26,277,981,464
IssuesEvent
2023-01-07 01:39:33
interserver/mailbaby-api-samples
https://api.github.com/repos/interserver/mailbaby-api-samples
opened
CVE-2017-20162 (Medium) detected in ms-0.7.1.tgz, ms-0.7.2.tgz
security vulnerability
## CVE-2017-20162 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ms-0.7.1.tgz</b>, <b>ms-0.7.2.tgz</b></p></summary> <p> <details><summary><b>ms-0.7.1.tgz</b></p></summary> <p>Tiny ms conversion utility</p> <p>Library home page: <a href="https://registry.npmjs.org/ms/-/ms-0.7.1.tgz">https://registry.npmjs.org/ms/-/ms-0.7.1.tgz</a></p> <p>Path to dependency file: /openapi-documentation/dynamic-html/package.json</p> <p>Path to vulnerable library: /openapi-documentation/dynamic-html/node_modules/ms/package.json,/swagger-documentation/dynamic-html/node_modules/ms/package.json</p> <p> Dependency Hierarchy: - express-3.21.2.tgz (Root Library) - debug-2.2.0.tgz - :x: **ms-0.7.1.tgz** (Vulnerable Library) </details> <details><summary><b>ms-0.7.2.tgz</b></p></summary> <p>Tiny milisecond conversion utility</p> <p>Library home page: <a href="https://registry.npmjs.org/ms/-/ms-0.7.2.tgz">https://registry.npmjs.org/ms/-/ms-0.7.2.tgz</a></p> <p>Path to dependency file: /openapi-documentation/dynamic-html/package.json</p> <p>Path to vulnerable library: /openapi-documentation/dynamic-html/node_modules/serve-favicon/node_modules/ms/package.json,/swagger-documentation/dynamic-html/node_modules/serve-favicon/node_modules/ms/package.json</p> <p> Dependency Hierarchy: - express-3.21.2.tgz (Root Library) - connect-2.30.2.tgz - serve-favicon-2.3.2.tgz - :x: **ms-0.7.2.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/interserver/mailbaby-api-samples/commit/0879348474e22463e77dc76ba5e5f7e6300a2b6c">0879348474e22463e77dc76ba5e5f7e6300a2b6c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability, which was classified as problematic, has been found in vercel ms up to 1.x. This issue affects the function parse of the file index.js. The manipulation of the argument str leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is caae2988ba2a37765d055c4eee63d383320ee662. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217451. <p>Publish Date: 2023-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-20162>CVE-2017-20162</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2023-01-05</p> <p>Fix Resolution (ms): 2.0.0</p> <p>Direct dependency fix Resolution (express): 4.0.0</p><p>Fix Resolution (ms): 2.0.0</p> <p>Direct dependency fix Resolution (express): 4.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-20162 (Medium) detected in ms-0.7.1.tgz, ms-0.7.2.tgz - ## CVE-2017-20162 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>ms-0.7.1.tgz</b>, <b>ms-0.7.2.tgz</b></p></summary> <p> <details><summary><b>ms-0.7.1.tgz</b></p></summary> <p>Tiny ms conversion utility</p> <p>Library home page: <a href="https://registry.npmjs.org/ms/-/ms-0.7.1.tgz">https://registry.npmjs.org/ms/-/ms-0.7.1.tgz</a></p> <p>Path to dependency file: /openapi-documentation/dynamic-html/package.json</p> <p>Path to vulnerable library: /openapi-documentation/dynamic-html/node_modules/ms/package.json,/swagger-documentation/dynamic-html/node_modules/ms/package.json</p> <p> Dependency Hierarchy: - express-3.21.2.tgz (Root Library) - debug-2.2.0.tgz - :x: **ms-0.7.1.tgz** (Vulnerable Library) </details> <details><summary><b>ms-0.7.2.tgz</b></p></summary> <p>Tiny milisecond conversion utility</p> <p>Library home page: <a href="https://registry.npmjs.org/ms/-/ms-0.7.2.tgz">https://registry.npmjs.org/ms/-/ms-0.7.2.tgz</a></p> <p>Path to dependency file: /openapi-documentation/dynamic-html/package.json</p> <p>Path to vulnerable library: /openapi-documentation/dynamic-html/node_modules/serve-favicon/node_modules/ms/package.json,/swagger-documentation/dynamic-html/node_modules/serve-favicon/node_modules/ms/package.json</p> <p> Dependency Hierarchy: - express-3.21.2.tgz (Root Library) - connect-2.30.2.tgz - serve-favicon-2.3.2.tgz - :x: **ms-0.7.2.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/interserver/mailbaby-api-samples/commit/0879348474e22463e77dc76ba5e5f7e6300a2b6c">0879348474e22463e77dc76ba5e5f7e6300a2b6c</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability, which was classified as problematic, has been found in vercel ms up to 1.x. This issue affects the function parse of the file index.js. The manipulation of the argument str leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is caae2988ba2a37765d055c4eee63d383320ee662. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217451. <p>Publish Date: 2023-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-20162>CVE-2017-20162</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2023-01-05</p> <p>Fix Resolution (ms): 2.0.0</p> <p>Direct dependency fix Resolution (express): 4.0.0</p><p>Fix Resolution (ms): 2.0.0</p> <p>Direct dependency fix Resolution (express): 4.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve medium detected in ms tgz ms tgz cve medium severity vulnerability vulnerable libraries ms tgz ms tgz ms tgz tiny ms conversion utility library home page a href path to dependency file openapi documentation dynamic html package json path to vulnerable library openapi documentation dynamic html node modules ms package json swagger documentation dynamic html node modules ms package json dependency hierarchy express tgz root library debug tgz x ms tgz vulnerable library ms tgz tiny milisecond conversion utility library home page a href path to dependency file openapi documentation dynamic html package json path to vulnerable library openapi documentation dynamic html node modules serve favicon node modules ms package json swagger documentation dynamic html node modules serve favicon node modules ms package json dependency hierarchy express tgz root library connect tgz serve favicon tgz x ms tgz vulnerable library found in head commit a href found in base branch master vulnerability details a vulnerability which was classified as problematic has been found in vercel ms up to x this issue affects the function parse of the file index js the manipulation of the argument str leads to inefficient regular expression complexity the attack may be initiated remotely the exploit has been disclosed to the public and may be used upgrading to version is able to address this issue the name of the patch is it is recommended to upgrade the affected component the associated identifier of this vulnerability is vdb publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version release date fix resolution ms direct dependency fix resolution express fix resolution ms direct dependency fix resolution express step up your open source security game with mend
0
166,214
12,907,740,736
IssuesEvent
2020-07-15 05:51:51
nestdotland/api
https://api.github.com/repos/nestdotland/api
opened
More and more unit tests
meta: tests misc: good first issue status: needs triage type: feature
We should add more and more unit tests for actix and juniper to test all types of queries and mutations. Also, tests for package uploads with twig and yolk will be great.
1.0
More and more unit tests - We should add more and more unit tests for actix and juniper to test all types of queries and mutations. Also, tests for package uploads with twig and yolk will be great.
non_process
more and more unit tests we should add more and more unit tests for actix and juniper to test all types of queries and mutations also tests for package uploads with twig and yolk will be great
0
6,378
9,428,878,391
IssuesEvent
2019-04-12 03:14:26
mick-warehime/sixth_corp
https://api.github.com/repos/mick-warehime/sixth_corp
closed
If no moves are available, AI should return None
ai development process
This will likely occur in certain situations and an error should not be raised.
1.0
If no moves are available, AI should return None - This will likely occur in certain situations and an error should not be raised.
process
if no moves are available ai should return none this will likely occur in certain situations and an error should not be raised
1
10,872
13,640,765,506
IssuesEvent
2020-09-25 13:14:55
prisma/prisma
https://api.github.com/repos/prisma/prisma
opened
Improve Prisma Client error handling
process/candidate team/typescript
As of now, we have many different kinds of errors and don't make sure, that errors are easily consumable by both humans and machines. Concrete steps we can do to improve them: - [ ] Instead of printing a custom error stack into the error message, we should probably just override the .stack property of the errors - [ ] Make Prisma Client validation errors easier to consume programmatically 2 libraries that are interesting to look at in this context: - ono https://github.com/JS-DevTools/ono - verror https://github.com/joyent/node-verror
1.0
Improve Prisma Client error handling - As of now, we have many different kinds of errors and don't make sure, that errors are easily consumable by both humans and machines. Concrete steps we can do to improve them: - [ ] Instead of printing a custom error stack into the error message, we should probably just override the .stack property of the errors - [ ] Make Prisma Client validation errors easier to consume programmatically 2 libraries that are interesting to look at in this context: - ono https://github.com/JS-DevTools/ono - verror https://github.com/joyent/node-verror
process
improve prisma client error handling as of now we have many different kinds of errors and don t make sure that errors are easily consumable by both humans and machines concrete steps we can do to improve them instead of printing a custom error stack into the error message we should probably just override the stack property of the errors make prisma client validation errors easier to consume programmatically libraries that are interesting to look at in this context ono verror
1
7,365
6,849,700,689
IssuesEvent
2017-11-13 23:09:05
dotnet/corefx
https://api.github.com/repos/dotnet/corefx
closed
Question: how to store RSA piravate keys?
area-System.Security question
With 2.0 now the private part of `RSAParameters` cannot be serialized any more, so what is the recommended way to store the private key? Thanks!
True
Question: how to store RSA piravate keys? - With 2.0 now the private part of `RSAParameters` cannot be serialized any more, so what is the recommended way to store the private key? Thanks!
non_process
question how to store rsa piravate keys with now the private part of rsaparameters cannot be serialized any more so what is the recommended way to store the private key thanks
0
183,005
14,174,218,551
IssuesEvent
2020-11-12 19:33:15
w3c/csswg-drafts
https://api.github.com/repos/w3c/csswg-drafts
reopened
[css-scroll-snap-1] Snap area trapping behavior of non scrollable elements
Closed Rejected as Wontfix by CSSWG Resolution Needs Testcase (WPT) css-contain-2 css-scroll-snap-1
Here is the current spec text related to an ancestor element's trapping behavior for snap areas. > A box captures snap positions if it is a scroll container or has a value other than none for scroll-snap-type. If a box’s nearest snap-position capturing ancestor on its containing block chain is a scroll container with a non-none value for scroll-snap-type, that is the box’s scroll snap container. Otherwise, the box has no scroll snap container, and its snap positions do not trigger snapping. This allows any regular element which is not a scroll container to trap snap areas. I tested this on latest Chrome, Safari, Firefox and as far as I can tell no engine does this. Here is a [simple test page](https://jsbin.com/vakafihehi/1/edit?html,css,output) that shows this. Also I don't think we have a wpt test case for it. Beside, one can simply achieve the same trapping behavior just by having an element with overflow `auto` or `hidden` that does not actually overflow. This works correctly across all engines. Given that no engine implements this, and the behavior can be achieved without much problem, I suggest we drop this requirement. I am not really sure what is the motivation behind allowing none scroll container to trap snap areas so maybe I am missing something.
1.0
[css-scroll-snap-1] Snap area trapping behavior of non scrollable elements - Here is the current spec text related to an ancestor element's trapping behavior for snap areas. > A box captures snap positions if it is a scroll container or has a value other than none for scroll-snap-type. If a box’s nearest snap-position capturing ancestor on its containing block chain is a scroll container with a non-none value for scroll-snap-type, that is the box’s scroll snap container. Otherwise, the box has no scroll snap container, and its snap positions do not trigger snapping. This allows any regular element which is not a scroll container to trap snap areas. I tested this on latest Chrome, Safari, Firefox and as far as I can tell no engine does this. Here is a [simple test page](https://jsbin.com/vakafihehi/1/edit?html,css,output) that shows this. Also I don't think we have a wpt test case for it. Beside, one can simply achieve the same trapping behavior just by having an element with overflow `auto` or `hidden` that does not actually overflow. This works correctly across all engines. Given that no engine implements this, and the behavior can be achieved without much problem, I suggest we drop this requirement. I am not really sure what is the motivation behind allowing none scroll container to trap snap areas so maybe I am missing something.
non_process
snap area trapping behavior of non scrollable elements here is the current spec text related to an ancestor element s trapping behavior for snap areas a box captures snap positions if it is a scroll container or has a value other than none for scroll snap type if a box’s nearest snap position capturing ancestor on its containing block chain is a scroll container with a non none value for scroll snap type that is the box’s scroll snap container otherwise the box has no scroll snap container and its snap positions do not trigger snapping this allows any regular element which is not a scroll container to trap snap areas i tested this on latest chrome safari firefox and as far as i can tell no engine does this here is a that shows this also i don t think we have a wpt test case for it beside one can simply achieve the same trapping behavior just by having an element with overflow auto or hidden that does not actually overflow this works correctly across all engines given that no engine implements this and the behavior can be achieved without much problem i suggest we drop this requirement i am not really sure what is the motivation behind allowing none scroll container to trap snap areas so maybe i am missing something
0
20,848
27,626,784,129
IssuesEvent
2023-03-10 07:36:28
core-wg/oscore-key-update
https://api.github.com/repos/core-wg/oscore-key-update
closed
Extend 4.3 about multiple CTX_NEW
KUDOS Processing
A newly derived CTX_NEW replaces any potential already stored CTX_NEW.
1.0
Extend 4.3 about multiple CTX_NEW - A newly derived CTX_NEW replaces any potential already stored CTX_NEW.
process
extend about multiple ctx new a newly derived ctx new replaces any potential already stored ctx new
1
184,833
14,991,723,469
IssuesEvent
2021-01-29 08:49:16
kyma-project/kyma
https://api.github.com/repos/kyma-project/kyma
closed
Getting Started - lacking tips for minikube deployment
area/documentation bug
<!-- Thank you for your contribution. Before you submit the issue: 1. Search open and closed issues for duplicates. 2. Read the contributing guidelines. 3. Assign the Documentation project. --> **Description** <!-- Provide a clear and concise description of the potential documentation improvement.--> Going through the Getting Started for External Applications fails on Minikube. There are two issues: * Commerce mock can't connect to Kyma urls (connector-service.kyma.local, gateway.kyma.local) * Certificate validation has to be skipped There's an error: `Error: getaddrinfo EAI_AGAIN connector-service.kyma.local connector-service.kyma.local:443` and `Error: unable to verify the first certificate` It can be solved by [adding hostAliases](https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/) to commerce-mock deployment: ``` kubectl edit deployment commerce-mock ``` Then add the following to **spec.containers**: ``` hostAliases: - hostnames: - connector-service.kyma.local - gateway.kyma.local ip: 192.168.64.8 ``` The certificate issue is solved by using an option "Insecure Connection" when connecting an application at Commerce Mock. **Area** <!-- Provide the area the document refers to. For example, write: * Application Connector * Event Mesh * Kyma Environment Broker * Rafter --> Getting started guides / Connect an external application / Create the Application and retrieve a token **Reasons** <!-- Explain why we should improve the document. --> We should add a tip to make configuration on Minikube possible to run. **Assignees** @kyma-project/technical-writers
1.0
Getting Started - lacking tips for minikube deployment - <!-- Thank you for your contribution. Before you submit the issue: 1. Search open and closed issues for duplicates. 2. Read the contributing guidelines. 3. Assign the Documentation project. --> **Description** <!-- Provide a clear and concise description of the potential documentation improvement.--> Going through the Getting Started for External Applications fails on Minikube. There are two issues: * Commerce mock can't connect to Kyma urls (connector-service.kyma.local, gateway.kyma.local) * Certificate validation has to be skipped There's an error: `Error: getaddrinfo EAI_AGAIN connector-service.kyma.local connector-service.kyma.local:443` and `Error: unable to verify the first certificate` It can be solved by [adding hostAliases](https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/) to commerce-mock deployment: ``` kubectl edit deployment commerce-mock ``` Then add the following to **spec.containers**: ``` hostAliases: - hostnames: - connector-service.kyma.local - gateway.kyma.local ip: 192.168.64.8 ``` The certificate issue is solved by using an option "Insecure Connection" when connecting an application at Commerce Mock. **Area** <!-- Provide the area the document refers to. For example, write: * Application Connector * Event Mesh * Kyma Environment Broker * Rafter --> Getting started guides / Connect an external application / Create the Application and retrieve a token **Reasons** <!-- Explain why we should improve the document. --> We should add a tip to make configuration on Minikube possible to run. **Assignees** @kyma-project/technical-writers
non_process
getting started lacking tips for minikube deployment thank you for your contribution before you submit the issue search open and closed issues for duplicates read the contributing guidelines assign the documentation project description going through the getting started for external applications fails on minikube there are two issues commerce mock can t connect to kyma urls connector service kyma local gateway kyma local certificate validation has to be skipped there s an error error getaddrinfo eai again connector service kyma local connector service kyma local and error unable to verify the first certificate it can be solved by to commerce mock deployment kubectl edit deployment commerce mock then add the following to spec containers hostaliases hostnames connector service kyma local gateway kyma local ip the certificate issue is solved by using an option insecure connection when connecting an application at commerce mock area provide the area the document refers to for example write application connector event mesh kyma environment broker rafter getting started guides connect an external application create the application and retrieve a token reasons we should add a tip to make configuration on minikube possible to run assignees kyma project technical writers
0
92,602
10,759,286,492
IssuesEvent
2019-10-31 16:22:13
Buildly-Marketplace/sales_forecast_service
https://api.github.com/repos/Buildly-Marketplace/sales_forecast_service
opened
Add Swagger / OpenAPI documentation
documentation enhancement good first issue hacktoberfest
# Issue As the microservice grows more complex and for better integration with Buildly Core, we would like there to be an autogenerated Swagger documentation for the service. # Solution Use an existing library (such as `flask-swagger`) to generate a `swagger.json` file and add an endpoint that allows that documentation to be viewed - or, refactor the API to use Flask RestPlus.
1.0
Add Swagger / OpenAPI documentation - # Issue As the microservice grows more complex and for better integration with Buildly Core, we would like there to be an autogenerated Swagger documentation for the service. # Solution Use an existing library (such as `flask-swagger`) to generate a `swagger.json` file and add an endpoint that allows that documentation to be viewed - or, refactor the API to use Flask RestPlus.
non_process
add swagger openapi documentation issue as the microservice grows more complex and for better integration with buildly core we would like there to be an autogenerated swagger documentation for the service solution use an existing library such as flask swagger to generate a swagger json file and add an endpoint that allows that documentation to be viewed or refactor the api to use flask restplus
0
22,152
30,694,241,280
IssuesEvent
2023-07-26 17:18:18
microsoft/vscode
https://api.github.com/repos/microsoft/vscode
opened
Restart pty host isn't working on local
bug terminal-process
Remote issue: https://github.com/microsoft/vscode/issues/186785 Something must have changed since the changes. Not doing in July as this is a developer command and restarting is very rare.
1.0
Restart pty host isn't working on local - Remote issue: https://github.com/microsoft/vscode/issues/186785 Something must have changed since the changes. Not doing in July as this is a developer command and restarting is very rare.
process
restart pty host isn t working on local remote issue something must have changed since the changes not doing in july as this is a developer command and restarting is very rare
1
5,386
8,211,482,739
IssuesEvent
2018-09-04 13:56:29
openvstorage/framework
https://api.github.com/repos/openvstorage/framework
closed
XMLRPC timeout when creating new volume
process_wontfix type_bug
Same issue as #1513 but now for creating a new volume. Code: ``` volume_id = vpool.storagedriver_client.create_volume(target_path=devicename, metadata_backend_config=backend_config, volume_size="{0}B".format(volume_size), node_id=str(storagedriver.storagedriver_id), req_timeout_secs=30) ``` ovs-workers logging: ``` March 24th 2017, 21:33:51.136 ovs05 ovs-workers.service lib/vdisk ERROR Creating new vDisk TMPL-CentOS-6-8-flat_337cc4fe-bc77-45a2-a223-3d3c2779d85b failed: failed to send XMLRPC request volumeCreate March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service celery/celery.worker.job ERROR Task ovs.vdisk.create_new[344ddf95-d90f-48d2-8c1d-97ef92bde984] raised unexpected: RuntimeError('failed to send XMLRPC request volumeCreate',) March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - Traceback (most recent call last): March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - R = retval = fun(*args, **kwargs) March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - File "/usr/lib/python2.7/dist-packages/celery/app/trace.py", line 438, in __protected_call__ March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - return self.run(*args, **kwargs) March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - File "/usr/lib/python2.7/dist-packages/celery/app/trace.py", line 240, in trace_task March 24th 2017, 21:33:51.188 ovs05 ovs-workers.service - - File "/opt/OpenvStorage/ovs/lib/vdisk.py", line 645, in create_new March 24th 2017, 21:33:51.188 ovs05 ovs-workers.service - - req_timeout_secs=30) March 24th 2017, 21:33:51.188 ovs05 ovs-workers.service - - RuntimeError: failed to send XMLRPC request volumeCreate ``` volumedriver logging: ``` March 24th 2017, 21:32:51.168 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/VolManager NOTICE New Volume, VolumeId: e2c419fc-5846-4905-9682-7fd7fd3b37fb, Namespace: e2c419fc-5846-4905-9682-7fd7fd3b37fb, Size: 0, CreateNamespace: CreateNamespace::T, START March 24th 2017, 21:32:51.239 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/BackendConnectionInterfaceLogger INFO ~Logger: Exiting namespaceExists for e2c419fc-5846-4905-9682-7fd7fd3b37fb March 24th 2017, 21:32:51.240 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/BackendConnectionInterfaceLogger INFO Logger: Entering createNamespace e2c419fc-5846-4905-9682-7fd7fd3b37fb March 24th 2017, 21:32:54.339 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/BackendConnectionInterfaceLogger INFO ~Logger: Exiting createNamespace for e2c419fc-5846-4905-9682-7fd7fd3b37fb March 24th 2017, 21:33:26.704 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/PeriodicActionPoolTask INFO operator(): mds-poll-namespace-e2c419fc-5846-4905-9682-7fd7fd3b37fb: timer cancelled March 24th 2017, 21:33:26.705 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/PeriodicActionPoolTask INFO operator(): mds-poll-namespace-e2c419fc-5846-4905-9682-7fd7fd3b37fb: bailing out March 24th 2017, 21:33:26.706 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/VolumeFactory WARNING make_metadata_store: e2c419fc-5846-4905-9682-7fd7fd3b37fb: no scrub ID present in MetaDataStore - did we crash before writing it out? March 24th 2017, 21:33:31.561 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/VolManager NOTICE New Volume, VolumeId: e2c419fc-5846-4905-9682-7fd7fd3b37fb, Namespace: e2c419fc-5846-4905-9682-7fd7fd3b37fb, Size: 0, CreateNamespace: CreateNamespace::T, FINISHED ```
1.0
XMLRPC timeout when creating new volume - Same issue as #1513 but now for creating a new volume. Code: ``` volume_id = vpool.storagedriver_client.create_volume(target_path=devicename, metadata_backend_config=backend_config, volume_size="{0}B".format(volume_size), node_id=str(storagedriver.storagedriver_id), req_timeout_secs=30) ``` ovs-workers logging: ``` March 24th 2017, 21:33:51.136 ovs05 ovs-workers.service lib/vdisk ERROR Creating new vDisk TMPL-CentOS-6-8-flat_337cc4fe-bc77-45a2-a223-3d3c2779d85b failed: failed to send XMLRPC request volumeCreate March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service celery/celery.worker.job ERROR Task ovs.vdisk.create_new[344ddf95-d90f-48d2-8c1d-97ef92bde984] raised unexpected: RuntimeError('failed to send XMLRPC request volumeCreate',) March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - Traceback (most recent call last): March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - R = retval = fun(*args, **kwargs) March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - File "/usr/lib/python2.7/dist-packages/celery/app/trace.py", line 438, in __protected_call__ March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - return self.run(*args, **kwargs) March 24th 2017, 21:33:51.187 ovs05 ovs-workers.service - - File "/usr/lib/python2.7/dist-packages/celery/app/trace.py", line 240, in trace_task March 24th 2017, 21:33:51.188 ovs05 ovs-workers.service - - File "/opt/OpenvStorage/ovs/lib/vdisk.py", line 645, in create_new March 24th 2017, 21:33:51.188 ovs05 ovs-workers.service - - req_timeout_secs=30) March 24th 2017, 21:33:51.188 ovs05 ovs-workers.service - - RuntimeError: failed to send XMLRPC request volumeCreate ``` volumedriver logging: ``` March 24th 2017, 21:32:51.168 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/VolManager NOTICE New Volume, VolumeId: e2c419fc-5846-4905-9682-7fd7fd3b37fb, Namespace: e2c419fc-5846-4905-9682-7fd7fd3b37fb, Size: 0, CreateNamespace: CreateNamespace::T, START March 24th 2017, 21:32:51.239 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/BackendConnectionInterfaceLogger INFO ~Logger: Exiting namespaceExists for e2c419fc-5846-4905-9682-7fd7fd3b37fb March 24th 2017, 21:32:51.240 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/BackendConnectionInterfaceLogger INFO Logger: Entering createNamespace e2c419fc-5846-4905-9682-7fd7fd3b37fb March 24th 2017, 21:32:54.339 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/BackendConnectionInterfaceLogger INFO ~Logger: Exiting createNamespace for e2c419fc-5846-4905-9682-7fd7fd3b37fb March 24th 2017, 21:33:26.704 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/PeriodicActionPoolTask INFO operator(): mds-poll-namespace-e2c419fc-5846-4905-9682-7fd7fd3b37fb: timer cancelled March 24th 2017, 21:33:26.705 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/PeriodicActionPoolTask INFO operator(): mds-poll-namespace-e2c419fc-5846-4905-9682-7fd7fd3b37fb: bailing out March 24th 2017, 21:33:26.706 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/VolumeFactory WARNING make_metadata_store: e2c419fc-5846-4905-9682-7fd7fd3b37fb: no scrub ID present in MetaDataStore - did we crash before writing it out? March 24th 2017, 21:33:31.561 ovs03 ovs-volumedriver_vpool01.service volumedriverfs/VolManager NOTICE New Volume, VolumeId: e2c419fc-5846-4905-9682-7fd7fd3b37fb, Namespace: e2c419fc-5846-4905-9682-7fd7fd3b37fb, Size: 0, CreateNamespace: CreateNamespace::T, FINISHED ```
process
xmlrpc timeout when creating new volume same issue as but now for creating a new volume code volume id vpool storagedriver client create volume target path devicename metadata backend config backend config volume size b format volume size node id str storagedriver storagedriver id req timeout secs ovs workers logging march ovs workers service lib vdisk error creating new vdisk tmpl centos flat failed failed to send xmlrpc request volumecreate march ovs workers service celery celery worker job error task ovs vdisk create new raised unexpected runtimeerror failed to send xmlrpc request volumecreate march ovs workers service traceback most recent call last march ovs workers service r retval fun args kwargs march ovs workers service file usr lib dist packages celery app trace py line in protected call march ovs workers service return self run args kwargs march ovs workers service file usr lib dist packages celery app trace py line in trace task march ovs workers service file opt openvstorage ovs lib vdisk py line in create new march ovs workers service req timeout secs march ovs workers service runtimeerror failed to send xmlrpc request volumecreate volumedriver logging march ovs volumedriver service volumedriverfs volmanager notice new volume volumeid namespace size createnamespace createnamespace t start march ovs volumedriver service volumedriverfs backendconnectioninterfacelogger info logger exiting namespaceexists for march ovs volumedriver service volumedriverfs backendconnectioninterfacelogger info logger entering createnamespace march ovs volumedriver service volumedriverfs backendconnectioninterfacelogger info logger exiting createnamespace for march ovs volumedriver service volumedriverfs periodicactionpooltask info operator mds poll namespace timer cancelled march ovs volumedriver service volumedriverfs periodicactionpooltask info operator mds poll namespace bailing out march ovs volumedriver service volumedriverfs volumefactory warning make metadata store no scrub id present in metadatastore did we crash before writing it out march ovs volumedriver service volumedriverfs volmanager notice new volume volumeid namespace size createnamespace createnamespace t finished
1
99,708
16,449,172,800
IssuesEvent
2021-05-21 01:15:51
SmartBear/soapui-raml-plugin
https://api.github.com/repos/SmartBear/soapui-raml-plugin
opened
CVE-2021-29505 (Medium) detected in xstream-1.4.12.jar
security vulnerability
## CVE-2021-29505 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.12.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p>Library home page: <a href="http://x-stream.github.io">http://x-stream.github.io</a></p> <p>Path to dependency file: soapui-raml-plugin/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.12/xstream-1.4.12.jar</p> <p> Dependency Hierarchy: - ready-api-soapui-pro-3.5.0.jar (Root Library) - ready-api-soapui-3.5.0.jar - :x: **xstream-1.4.12.jar** (Vulnerable Library) <p>Found in base branch: <b>next</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> XStream is vulnerable to a Remote Command Execution attack before version 1.4.17. The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. <p>Publish Date: 2021-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29505>CVE-2021-29505</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-7chv-rrw6-w6fc">https://github.com/advisories/GHSA-7chv-rrw6-w6fc</a></p> <p>Release Date: 2021-03-31</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.17</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.12","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.smartbear:ready-api-soapui-pro:3.5.0;com.smartbear:ready-api-soapui:3.5.0;com.thoughtworks.xstream:xstream:1.4.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.17"}],"baseBranches":["next"],"vulnerabilityIdentifier":"CVE-2021-29505","vulnerabilityDetails":"XStream is vulnerable to a Remote Command Execution attack before version 1.4.17. The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29505","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-29505 (Medium) detected in xstream-1.4.12.jar - ## CVE-2021-29505 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.12.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p>Library home page: <a href="http://x-stream.github.io">http://x-stream.github.io</a></p> <p>Path to dependency file: soapui-raml-plugin/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.12/xstream-1.4.12.jar</p> <p> Dependency Hierarchy: - ready-api-soapui-pro-3.5.0.jar (Root Library) - ready-api-soapui-3.5.0.jar - :x: **xstream-1.4.12.jar** (Vulnerable Library) <p>Found in base branch: <b>next</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> XStream is vulnerable to a Remote Command Execution attack before version 1.4.17. The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. <p>Publish Date: 2021-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29505>CVE-2021-29505</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-7chv-rrw6-w6fc">https://github.com/advisories/GHSA-7chv-rrw6-w6fc</a></p> <p>Release Date: 2021-03-31</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.17</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.12","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.smartbear:ready-api-soapui-pro:3.5.0;com.smartbear:ready-api-soapui:3.5.0;com.thoughtworks.xstream:xstream:1.4.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.17"}],"baseBranches":["next"],"vulnerabilityIdentifier":"CVE-2021-29505","vulnerabilityDetails":"XStream is vulnerable to a Remote Command Execution attack before version 1.4.17. The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29505","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_process
cve medium detected in xstream jar cve medium severity vulnerability vulnerable library xstream jar xstream is a serialization library from java objects to xml and back library home page a href path to dependency file soapui raml plugin pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy ready api soapui pro jar root library ready api soapui jar x xstream jar vulnerable library found in base branch next vulnerability details xstream is vulnerable to a remote command execution attack before version the vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com smartbear ready api soapui pro com smartbear ready api soapui com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is vulnerable to a remote command execution attack before version the vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types vulnerabilityurl
0
10,619
13,439,120,997
IssuesEvent
2020-09-07 20:05:51
timberio/vector
https://api.github.com/repos/timberio/vector
opened
New `flatten` remap function
domain: mapping domain: processing type: feature
The `flatten` remap function flattens an array into a single-depth array. ## Example ### Arrays Given the following event: ```js { "array": [1 [2, [3, 4, 5]], 6] } ``` And the following remap instruction set: ``` .array = flatten(.array) ``` Would produce: ```js { "array": [1 2, 3, 4, 5, 6] } ``` ### Objects Given the following event: ```js { "object": { "parent": { "child1": 1, "child2", 2, }, "key": "val" } } ``` And the following remap instruction set: ``` .object = flatten(.object) ``` Would produce: ```js { "object": { "parent.child1": 1 "parent.child2": 2, "key": "val" } } ```
1.0
New `flatten` remap function - The `flatten` remap function flattens an array into a single-depth array. ## Example ### Arrays Given the following event: ```js { "array": [1 [2, [3, 4, 5]], 6] } ``` And the following remap instruction set: ``` .array = flatten(.array) ``` Would produce: ```js { "array": [1 2, 3, 4, 5, 6] } ``` ### Objects Given the following event: ```js { "object": { "parent": { "child1": 1, "child2", 2, }, "key": "val" } } ``` And the following remap instruction set: ``` .object = flatten(.object) ``` Would produce: ```js { "object": { "parent.child1": 1 "parent.child2": 2, "key": "val" } } ```
process
new flatten remap function the flatten remap function flattens an array into a single depth array example arrays given the following event js array and the following remap instruction set array flatten array would produce js array objects given the following event js object parent key val and the following remap instruction set object flatten object would produce js object parent parent key val
1
22,610
31,834,994,587
IssuesEvent
2023-09-14 13:01:37
USGS-WiM/StreamStats
https://api.github.com/repos/USGS-WiM/StreamStats
closed
Fix batch order in status & manage queue tab
Batch Processor
We want the batch status tab to show batch in decreasing batch id to show the most recent on first. We want the manage queue tab to show the batches with an order number first, then in decreasing batch id.
1.0
Fix batch order in status & manage queue tab - We want the batch status tab to show batch in decreasing batch id to show the most recent on first. We want the manage queue tab to show the batches with an order number first, then in decreasing batch id.
process
fix batch order in status manage queue tab we want the batch status tab to show batch in decreasing batch id to show the most recent on first we want the manage queue tab to show the batches with an order number first then in decreasing batch id
1
22,302
30,857,492,866
IssuesEvent
2023-08-02 22:05:36
NCAR/ucomp-pipeline
https://api.github.com/repos/NCAR/ucomp-pipeline
closed
Reprocess with 0.4.6 to fix days with flat not found errors
process
There are 20 days with flat not found errors: - [x] 20210608 (fixed by 0.4.6) - [x] 20210622 (wavelengths in flat and science don't match for many files in multiple wave regions) - [x] 20210725 (only 706 flat has a dark in it) - [x] 20210815 (fixed in 0.4.6) - [x] 20210827 (the only 637 flat has 21 wavelengths and they are not the same as the 637 science files, it is also only RCAM) - [x] 20210922 (wavelengths in flat and science don't match for many files in multiple wave regions) - [x] 20211109 (OCCLTR is mid for many files, including all flats) - [x] 20211129 (only 1074 flat has a dark in it) - [x] 20211208 (fixed with 0.4.6) - [x] 20211216 (one 637 flat file has a dark in it, and a good 637 flat file actually has 656 data in it) - [x] 20220201 (there is a good 656 flat file with only RCAM data, a 656 flat file with a dark in it, and a good 656 flat file that actually has 789 data in it) - [x] 20220219 (fixed in 0.4.6) - [x] 20220318 (actually didn't have flats, only 19 files for the day) - [x] 20220416 (there are no 637 flats on the day) - [x] 20220420 (only 789 flat has a dark in it) - [x] 20220424 (occulter in for all flats) - [x] 20221019 (only 789 flat has a dark in it) - [x] 20221031 (only 1074 flat has a dark in it) - [x] 20221103 (only 530 flat has a dark in it) - [x] 20221106 (only 530 flat has a dark in it)
1.0
Reprocess with 0.4.6 to fix days with flat not found errors - There are 20 days with flat not found errors: - [x] 20210608 (fixed by 0.4.6) - [x] 20210622 (wavelengths in flat and science don't match for many files in multiple wave regions) - [x] 20210725 (only 706 flat has a dark in it) - [x] 20210815 (fixed in 0.4.6) - [x] 20210827 (the only 637 flat has 21 wavelengths and they are not the same as the 637 science files, it is also only RCAM) - [x] 20210922 (wavelengths in flat and science don't match for many files in multiple wave regions) - [x] 20211109 (OCCLTR is mid for many files, including all flats) - [x] 20211129 (only 1074 flat has a dark in it) - [x] 20211208 (fixed with 0.4.6) - [x] 20211216 (one 637 flat file has a dark in it, and a good 637 flat file actually has 656 data in it) - [x] 20220201 (there is a good 656 flat file with only RCAM data, a 656 flat file with a dark in it, and a good 656 flat file that actually has 789 data in it) - [x] 20220219 (fixed in 0.4.6) - [x] 20220318 (actually didn't have flats, only 19 files for the day) - [x] 20220416 (there are no 637 flats on the day) - [x] 20220420 (only 789 flat has a dark in it) - [x] 20220424 (occulter in for all flats) - [x] 20221019 (only 789 flat has a dark in it) - [x] 20221031 (only 1074 flat has a dark in it) - [x] 20221103 (only 530 flat has a dark in it) - [x] 20221106 (only 530 flat has a dark in it)
process
reprocess with to fix days with flat not found errors there are days with flat not found errors fixed by wavelengths in flat and science don t match for many files in multiple wave regions only flat has a dark in it fixed in the only flat has wavelengths and they are not the same as the science files it is also only rcam wavelengths in flat and science don t match for many files in multiple wave regions occltr is mid for many files including all flats only flat has a dark in it fixed with one flat file has a dark in it and a good flat file actually has data in it there is a good flat file with only rcam data a flat file with a dark in it and a good flat file that actually has data in it fixed in actually didn t have flats only files for the day there are no flats on the day only flat has a dark in it occulter in for all flats only flat has a dark in it only flat has a dark in it only flat has a dark in it only flat has a dark in it
1
178,123
29,501,107,784
IssuesEvent
2023-06-02 21:57:25
flutter/flutter
https://api.github.com/repos/flutter/flutter
opened
[Feature Request] Add support for "overflow" tabs in TabBar
new feature framework f: material design proposal
Here's a custom implementation we put together for DevTools: ![Screenshot 2023-06-02 at 10 18 19 AM](https://github.com/flutter/flutter/assets/43759233/9acee701-46f7-4932-b8b7-880fa85a94e4) PR: https://github.com/flutter/devtools/pull/5875. It would be great if this (and tab re-ordering https://github.com/flutter/flutter/issues/127693) were supported for the TabBar widget out of the box.
1.0
[Feature Request] Add support for "overflow" tabs in TabBar - Here's a custom implementation we put together for DevTools: ![Screenshot 2023-06-02 at 10 18 19 AM](https://github.com/flutter/flutter/assets/43759233/9acee701-46f7-4932-b8b7-880fa85a94e4) PR: https://github.com/flutter/devtools/pull/5875. It would be great if this (and tab re-ordering https://github.com/flutter/flutter/issues/127693) were supported for the TabBar widget out of the box.
non_process
add support for overflow tabs in tabbar here s a custom implementation we put together for devtools pr it would be great if this and tab re ordering were supported for the tabbar widget out of the box
0
502,099
14,540,140,603
IssuesEvent
2020-12-15 12:54:46
CLOSER-Cohorts/archivist
https://api.github.com/repos/CLOSER-Cohorts/archivist
closed
App falls over on startup
High priority
I've added you to the instance as collaborator - this is the log when you start up the app [Syslog-drain_2020-12-15_105441_2020-12-15_111441.log.gz](https://github.com/CLOSER-Cohorts/archivist/files/5695387/Syslog-drain_2020-12-15_105441_2020-12-15_111441.log.gz)
1.0
App falls over on startup - I've added you to the instance as collaborator - this is the log when you start up the app [Syslog-drain_2020-12-15_105441_2020-12-15_111441.log.gz](https://github.com/CLOSER-Cohorts/archivist/files/5695387/Syslog-drain_2020-12-15_105441_2020-12-15_111441.log.gz)
non_process
app falls over on startup i ve added you to the instance as collaborator this is the log when you start up the app
0
17,827
23,768,461,971
IssuesEvent
2022-09-01 14:30:10
googleapis/python-crc32c
https://api.github.com/repos/googleapis/python-crc32c
opened
Migrate Release Publication
type: process priority: p2
Creating an issue to track migrating the release publication from [GH Action](https://github.com/googleapis/python-crc32c/blob/main/.github/workflows/python-publish.yml) to Kokoro.
1.0
Migrate Release Publication - Creating an issue to track migrating the release publication from [GH Action](https://github.com/googleapis/python-crc32c/blob/main/.github/workflows/python-publish.yml) to Kokoro.
process
migrate release publication creating an issue to track migrating the release publication from to kokoro
1
20,271
26,900,808,598
IssuesEvent
2023-02-06 15:31:01
MicrosoftDocs/azure-devops-docs
https://api.github.com/repos/MicrosoftDocs/azure-devops-docs
closed
Where to see Process parameters ?
doc-bug Pri2 azure-devops-pipelines/svc azure-devops-pipelines-process/subsvc
In this documentation, here the sentence : "You can link all important arguments for tasks used across the build definition as process parameters, which are then shown at one place - the Pipeline view" 1 - Where do we set or view these process parameters ? 2 - Where is the pipeline view ? A screenshoot should be appreciated... PS : After creating this issue, I found the answer here : https://stackoverflow.com/questions/43362079/visual-studio-team-services-edit-link-settings This prouve that the explanation needs to be clarified --- #### Document Details ⚠ *Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.* * ID: 1ec7e5a9-e22e-a329-14cf-6e21e65cc85f * Version Independent ID: c96aaf4e-f5ec-c42f-05cb-e2366167fbc6 * Content: [Process parameters - Azure Pipelines](https://learn.microsoft.com/en-us/azure/devops/pipelines/process/parameters?view=azure-devops) * Content Source: [docs/pipelines/process/parameters.md](https://github.com/MicrosoftDocs/azure-devops-docs/blob/main/docs/pipelines/process/parameters.md) * Service: **azure-devops-pipelines** * Sub-service: **azure-devops-pipelines-process** * GitHub Login: @juliakm * Microsoft Alias: **jukullam**
1.0
Where to see Process parameters ? - In this documentation, here the sentence : "You can link all important arguments for tasks used across the build definition as process parameters, which are then shown at one place - the Pipeline view" 1 - Where do we set or view these process parameters ? 2 - Where is the pipeline view ? A screenshoot should be appreciated... PS : After creating this issue, I found the answer here : https://stackoverflow.com/questions/43362079/visual-studio-team-services-edit-link-settings This prouve that the explanation needs to be clarified --- #### Document Details ⚠ *Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.* * ID: 1ec7e5a9-e22e-a329-14cf-6e21e65cc85f * Version Independent ID: c96aaf4e-f5ec-c42f-05cb-e2366167fbc6 * Content: [Process parameters - Azure Pipelines](https://learn.microsoft.com/en-us/azure/devops/pipelines/process/parameters?view=azure-devops) * Content Source: [docs/pipelines/process/parameters.md](https://github.com/MicrosoftDocs/azure-devops-docs/blob/main/docs/pipelines/process/parameters.md) * Service: **azure-devops-pipelines** * Sub-service: **azure-devops-pipelines-process** * GitHub Login: @juliakm * Microsoft Alias: **jukullam**
process
where to see process parameters in this documentation here the sentence you can link all important arguments for tasks used across the build definition as process parameters which are then shown at one place the pipeline view where do we set or view these process parameters where is the pipeline view a screenshoot should be appreciated ps after creating this issue i found the answer here this prouve that the explanation needs to be clarified document details ⚠ do not edit this section it is required for learn microsoft com ➟ github issue linking id version independent id content content source service azure devops pipelines sub service azure devops pipelines process github login juliakm microsoft alias jukullam
1
92,562
3,872,352,274
IssuesEvent
2016-04-11 13:37:18
CloudOpting/cloudopting-manager
https://api.github.com/repos/CloudOpting/cloudopting-manager
closed
problem with size of the files in publishing
bug high priority
I try to upload a file of 9 MB (not so big) and I get: [ERROR] org.activiti.rest.exception.ExceptionHandlerAdvice - Unhandled exception org.springframework.web.multipart.MultipartException: Could not parse multipart servlet request; nested exception is java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.parseRequest(StandardMultipartHttpServletRequest.java:111) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.<init>(StandardMultipartHttpServletRequest.java:85) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardServletMultipartResolver.resolveMultipart(StandardServletMultipartResolver.java:76) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.checkMultipart(DispatcherServlet.java:1089) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:928) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:893) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:969) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:871) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:648) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:845) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:729) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:291) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) [tomcat-embed-websocket-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.autoconfigure.EndpointWebMvcAutoConfiguration$ApplicationContextHeaderFilter.doFilterInternal(EndpointWebMvcAutoConfiguration.java:237) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilterInternal(WebRequestTraceFilter.java:111) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:316) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:126) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:90) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:114) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:122) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:111) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.rememberme.RememberMeAuthenticationFilter.doFilter(RememberMeAuthenticationFilter.java:157) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:169) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:48) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:205) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at eu.cloudopting.filter.CsrfCookieGeneratorFilter.doFilterInternal(CsrfCookieGeneratorFilter.java:34) [common-component-1.0-SNAPSHOT.jar:1.0-SNAPSHOT] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:64) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:91) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:53) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:213) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:176) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:346) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:262) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:99) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HttpPutFormContentFilter.doFilterInternal(HttpPutFormContentFilter.java:87) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:77) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:121) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:212) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:106) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:502) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:141) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:79) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:88) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:521) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1096) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:674) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1500) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1456) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) [na:1.8.0_71] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) [na:1.8.0_71] at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.lang.Thread.run(Thread.java:745) [na:1.8.0_71] Caused by: java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.catalina.connector.Request.parseParts(Request.java:2808) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParameters(Request.java:3114) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.getParameter(Request.java:1100) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.RequestFacade.getParameter(RequestFacade.java:380) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:70) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] ... 22 common frames omitted Caused by: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.tomcat.util.http.fileupload.FileUploadBase$FileItemIteratorImpl$FileItemStreamImpl$1.raiseError(FileUploadBase.java:633) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.checkLimit(LimitedInputStream.java:76) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.read(LimitedInputStream.java:135) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at java.io.FilterInputStream.read(FilterInputStream.java:107) ~[na:1.8.0_71] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:98) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:68) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.FileUploadBase.parseRequest(FileUploadBase.java:293) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParts(Request.java:2738) ~[tomcat-embed-core-8.0.30.jar:8.0.30] ... 26 common frames omitted [ERROR] org.activiti.rest.exception.ExceptionHandlerAdvice - Unhandled exception org.springframework.web.multipart.MultipartException: Could not parse multipart servlet request; nested exception is java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.parseRequest(StandardMultipartHttpServletRequest.java:111) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.<init>(StandardMultipartHttpServletRequest.java:85) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardServletMultipartResolver.resolveMultipart(StandardServletMultipartResolver.java:76) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.checkMultipart(DispatcherServlet.java:1089) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:928) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:893) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:969) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:871) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:648) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:845) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:729) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:291) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) [tomcat-embed-websocket-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.autoconfigure.EndpointWebMvcAutoConfiguration$ApplicationContextHeaderFilter.doFilterInternal(EndpointWebMvcAutoConfiguration.java:237) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilterInternal(WebRequestTraceFilter.java:111) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:316) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:126) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:90) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:114) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:122) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:111) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.rememberme.RememberMeAuthenticationFilter.doFilter(RememberMeAuthenticationFilter.java:157) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:169) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:48) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:205) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at eu.cloudopting.filter.CsrfCookieGeneratorFilter.doFilterInternal(CsrfCookieGeneratorFilter.java:34) [common-component-1.0-SNAPSHOT.jar:1.0-SNAPSHOT] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:64) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:91) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:53) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:213) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:176) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:346) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:262) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:99) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HttpPutFormContentFilter.doFilterInternal(HttpPutFormContentFilter.java:87) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:77) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:121) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:212) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:106) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:502) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:141) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:79) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:88) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:521) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1096) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:674) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1500) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1456) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) [na:1.8.0_71] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) [na:1.8.0_71] at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.lang.Thread.run(Thread.java:745) [na:1.8.0_71] Caused by: java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.catalina.connector.Request.parseParts(Request.java:2808) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParameters(Request.java:3114) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.getParameter(Request.java:1100) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.RequestFacade.getParameter(RequestFacade.java:380) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:70) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] ... 22 common frames omitted Caused by: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.tomcat.util.http.fileupload.FileUploadBase$FileItemIteratorImpl$FileItemStreamImpl$1.raiseError(FileUploadBase.java:633) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.checkLimit(LimitedInputStream.java:76) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.read(LimitedInputStream.java:135) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at java.io.FilterInputStream.read(FilterInputStream.java:107) ~[na:1.8.0_71] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:98) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:68) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.FileUploadBase.parseRequest(FileUploadBase.java:293) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParts(Request.java:2738) ~[tomcat-embed-core-8.0.30.jar:8.0.30] ... 26 common frames omitted [ERROR] org.activiti.rest.exception.ExceptionHandlerAdvice - Unhandled exception org.springframework.web.multipart.MultipartException: Could not parse multipart servlet request; nested exception is java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.parseRequest(StandardMultipartHttpServletRequest.java:111) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.<init>(StandardMultipartHttpServletRequest.java:85) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardServletMultipartResolver.resolveMultipart(StandardServletMultipartResolver.java:76) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.checkMultipart(DispatcherServlet.java:1089) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:928) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:893) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:969) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:871) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:648) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:845) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:729) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:291) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) [tomcat-embed-websocket-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.autoconfigure.EndpointWebMvcAutoConfiguration$ApplicationContextHeaderFilter.doFilterInternal(EndpointWebMvcAutoConfiguration.java:237) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilterInternal(WebRequestTraceFilter.java:111) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:316) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:126) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:90) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:114) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:122) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:111) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.rememberme.RememberMeAuthenticationFilter.doFilter(RememberMeAuthenticationFilter.java:157) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:169) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:48) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:205) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at eu.cloudopting.filter.CsrfCookieGeneratorFilter.doFilterInternal(CsrfCookieGeneratorFilter.java:34) [common-component-1.0-SNAPSHOT.jar:1.0-SNAPSHOT] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:64) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:91) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:53) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:213) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:176) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:346) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:262) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:99) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HttpPutFormContentFilter.doFilterInternal(HttpPutFormContentFilter.java:87) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:77) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:121) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:212) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:106) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:502) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:141) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:79) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:88) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:521) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1096) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:674) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1500) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1456) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) [na:1.8.0_71] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) [na:1.8.0_71] at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.lang.Thread.run(Thread.java:745) [na:1.8.0_71] Caused by: java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.catalina.connector.Request.parseParts(Request.java:2808) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParameters(Request.java:3114) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.getParameter(Request.java:1100) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.RequestFacade.getParameter(RequestFacade.java:380) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:70) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] ... 22 common frames omitted Caused by: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.tomcat.util.http.fileupload.FileUploadBase$FileItemIteratorImpl$FileItemStreamImpl$1.raiseError(FileUploadBase.java:633) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.checkLimit(LimitedInputStream.java:76) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.read(LimitedInputStream.java:135) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at java.io.FilterInputStream.read(FilterInputStream.java:107) ~[na:1.8.0_71] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:98) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:68) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.FileUploadBase.parseRequest(FileUploadBase.java:293) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParts(Request.java:2738) ~[tomcat-embed-core-8.0.30.jar:8.0.30] ... 26 common frames omitted [ERROR] org.activiti.rest.exception.ExceptionHandlerAdvice - Unhandled exception org.springframework.web.multipart.MultipartException: Could not parse multipart servlet request; nested exception is java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.parseRequest(StandardMultipartHttpServletRequest.java:111) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE]
1.0
problem with size of the files in publishing - I try to upload a file of 9 MB (not so big) and I get: [ERROR] org.activiti.rest.exception.ExceptionHandlerAdvice - Unhandled exception org.springframework.web.multipart.MultipartException: Could not parse multipart servlet request; nested exception is java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.parseRequest(StandardMultipartHttpServletRequest.java:111) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.<init>(StandardMultipartHttpServletRequest.java:85) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardServletMultipartResolver.resolveMultipart(StandardServletMultipartResolver.java:76) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.checkMultipart(DispatcherServlet.java:1089) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:928) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:893) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:969) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:871) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:648) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:845) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:729) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:291) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) [tomcat-embed-websocket-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.autoconfigure.EndpointWebMvcAutoConfiguration$ApplicationContextHeaderFilter.doFilterInternal(EndpointWebMvcAutoConfiguration.java:237) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilterInternal(WebRequestTraceFilter.java:111) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:316) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:126) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:90) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:114) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:122) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:111) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.rememberme.RememberMeAuthenticationFilter.doFilter(RememberMeAuthenticationFilter.java:157) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:169) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:48) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:205) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at eu.cloudopting.filter.CsrfCookieGeneratorFilter.doFilterInternal(CsrfCookieGeneratorFilter.java:34) [common-component-1.0-SNAPSHOT.jar:1.0-SNAPSHOT] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:64) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:91) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:53) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:213) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:176) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:346) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:262) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:99) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HttpPutFormContentFilter.doFilterInternal(HttpPutFormContentFilter.java:87) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:77) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:121) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:212) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:106) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:502) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:141) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:79) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:88) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:521) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1096) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:674) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1500) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1456) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) [na:1.8.0_71] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) [na:1.8.0_71] at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.lang.Thread.run(Thread.java:745) [na:1.8.0_71] Caused by: java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.catalina.connector.Request.parseParts(Request.java:2808) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParameters(Request.java:3114) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.getParameter(Request.java:1100) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.RequestFacade.getParameter(RequestFacade.java:380) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:70) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] ... 22 common frames omitted Caused by: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.tomcat.util.http.fileupload.FileUploadBase$FileItemIteratorImpl$FileItemStreamImpl$1.raiseError(FileUploadBase.java:633) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.checkLimit(LimitedInputStream.java:76) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.read(LimitedInputStream.java:135) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at java.io.FilterInputStream.read(FilterInputStream.java:107) ~[na:1.8.0_71] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:98) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:68) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.FileUploadBase.parseRequest(FileUploadBase.java:293) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParts(Request.java:2738) ~[tomcat-embed-core-8.0.30.jar:8.0.30] ... 26 common frames omitted [ERROR] org.activiti.rest.exception.ExceptionHandlerAdvice - Unhandled exception org.springframework.web.multipart.MultipartException: Could not parse multipart servlet request; nested exception is java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.parseRequest(StandardMultipartHttpServletRequest.java:111) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.<init>(StandardMultipartHttpServletRequest.java:85) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardServletMultipartResolver.resolveMultipart(StandardServletMultipartResolver.java:76) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.checkMultipart(DispatcherServlet.java:1089) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:928) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:893) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:969) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:871) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:648) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:845) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:729) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:291) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) [tomcat-embed-websocket-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.autoconfigure.EndpointWebMvcAutoConfiguration$ApplicationContextHeaderFilter.doFilterInternal(EndpointWebMvcAutoConfiguration.java:237) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilterInternal(WebRequestTraceFilter.java:111) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:316) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:126) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:90) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:114) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:122) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:111) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.rememberme.RememberMeAuthenticationFilter.doFilter(RememberMeAuthenticationFilter.java:157) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:169) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:48) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:205) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at eu.cloudopting.filter.CsrfCookieGeneratorFilter.doFilterInternal(CsrfCookieGeneratorFilter.java:34) [common-component-1.0-SNAPSHOT.jar:1.0-SNAPSHOT] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:64) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:91) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:53) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:213) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:176) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:346) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:262) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:99) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HttpPutFormContentFilter.doFilterInternal(HttpPutFormContentFilter.java:87) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:77) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:121) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:212) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:106) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:502) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:141) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:79) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:88) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:521) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1096) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:674) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1500) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1456) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) [na:1.8.0_71] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) [na:1.8.0_71] at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.lang.Thread.run(Thread.java:745) [na:1.8.0_71] Caused by: java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.catalina.connector.Request.parseParts(Request.java:2808) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParameters(Request.java:3114) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.getParameter(Request.java:1100) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.RequestFacade.getParameter(RequestFacade.java:380) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:70) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] ... 22 common frames omitted Caused by: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.tomcat.util.http.fileupload.FileUploadBase$FileItemIteratorImpl$FileItemStreamImpl$1.raiseError(FileUploadBase.java:633) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.checkLimit(LimitedInputStream.java:76) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.read(LimitedInputStream.java:135) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at java.io.FilterInputStream.read(FilterInputStream.java:107) ~[na:1.8.0_71] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:98) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:68) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.FileUploadBase.parseRequest(FileUploadBase.java:293) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParts(Request.java:2738) ~[tomcat-embed-core-8.0.30.jar:8.0.30] ... 26 common frames omitted [ERROR] org.activiti.rest.exception.ExceptionHandlerAdvice - Unhandled exception org.springframework.web.multipart.MultipartException: Could not parse multipart servlet request; nested exception is java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.parseRequest(StandardMultipartHttpServletRequest.java:111) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.<init>(StandardMultipartHttpServletRequest.java:85) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.multipart.support.StandardServletMultipartResolver.resolveMultipart(StandardServletMultipartResolver.java:76) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.checkMultipart(DispatcherServlet.java:1089) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:928) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:893) ~[spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:969) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.servlet.FrameworkServlet.doPost(FrameworkServlet.java:871) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:648) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:845) [spring-webmvc-4.2.4.RELEASE.jar:4.2.4.RELEASE] at javax.servlet.http.HttpServlet.service(HttpServlet.java:729) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:291) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) [tomcat-embed-websocket-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.autoconfigure.EndpointWebMvcAutoConfiguration$ApplicationContextHeaderFilter.doFilterInternal(EndpointWebMvcAutoConfiguration.java:237) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilterInternal(WebRequestTraceFilter.java:111) [spring-boot-actuator-1.3.2.RELEASE.jar:1.3.2.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:316) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:126) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:90) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:114) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:122) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:111) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.rememberme.RememberMeAuthenticationFilter.doFilter(RememberMeAuthenticationFilter.java:157) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:169) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:48) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:205) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at eu.cloudopting.filter.CsrfCookieGeneratorFilter.doFilterInternal(CsrfCookieGeneratorFilter.java:34) [common-component-1.0-SNAPSHOT.jar:1.0-SNAPSHOT] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:120) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:64) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:91) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:53) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:330) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:213) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:176) [spring-security-web-4.0.3.RELEASE.jar:4.0.3.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:346) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:262) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:99) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HttpPutFormContentFilter.doFilterInternal(HttpPutFormContentFilter.java:87) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:77) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:121) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:239) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:212) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:106) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:502) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:141) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:79) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:88) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:521) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1096) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:674) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1500) [tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1456) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) [na:1.8.0_71] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) [na:1.8.0_71] at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) [tomcat-embed-core-8.0.30.jar:8.0.30] at java.lang.Thread.run(Thread.java:745) [na:1.8.0_71] Caused by: java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.catalina.connector.Request.parseParts(Request.java:2808) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParameters(Request.java:3114) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.getParameter(Request.java:1100) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.RequestFacade.getParameter(RequestFacade.java:380) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:70) [spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE] ... 22 common frames omitted Caused by: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.apache.tomcat.util.http.fileupload.FileUploadBase$FileItemIteratorImpl$FileItemStreamImpl$1.raiseError(FileUploadBase.java:633) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.checkLimit(LimitedInputStream.java:76) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.LimitedInputStream.read(LimitedInputStream.java:135) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at java.io.FilterInputStream.read(FilterInputStream.java:107) ~[na:1.8.0_71] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:98) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.util.Streams.copy(Streams.java:68) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.tomcat.util.http.fileupload.FileUploadBase.parseRequest(FileUploadBase.java:293) ~[tomcat-embed-core-8.0.30.jar:8.0.30] at org.apache.catalina.connector.Request.parseParts(Request.java:2738) ~[tomcat-embed-core-8.0.30.jar:8.0.30] ... 26 common frames omitted [ERROR] org.activiti.rest.exception.ExceptionHandlerAdvice - Unhandled exception org.springframework.web.multipart.MultipartException: Could not parse multipart servlet request; nested exception is java.lang.IllegalStateException: org.apache.tomcat.util.http.fileupload.FileUploadBase$FileSizeLimitExceededException: The field file exceeds its maximum permitted size of 1048576 bytes. at org.springframework.web.multipart.support.StandardMultipartHttpServletRequest.parseRequest(StandardMultipartHttpServletRequest.java:111) ~[spring-web-4.2.4.RELEASE.jar:4.2.4.RELEASE]
non_process
problem with size of the files in publishing i try to upload a file of mb not so big and i get org activiti rest exception exceptionhandleradvice unhandled exception org springframework web multipart multipartexception could not parse multipart servlet request nested exception is java lang illegalstateexception org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org springframework web multipart support standardmultiparthttpservletrequest parserequest standardmultiparthttpservletrequest java at org springframework web multipart support standardmultiparthttpservletrequest standardmultiparthttpservletrequest java at org springframework web multipart support standardservletmultipartresolver resolvemultipart standardservletmultipartresolver java at org springframework web servlet dispatcherservlet checkmultipart dispatcherservlet java at org springframework web servlet dispatcherservlet dodispatch dispatcherservlet java at org springframework web servlet dispatcherservlet doservice dispatcherservlet java at org springframework web servlet frameworkservlet processrequest frameworkservlet java at org springframework web servlet frameworkservlet dopost frameworkservlet java at javax servlet http httpservlet service httpservlet java at org springframework web servlet frameworkservlet service frameworkservlet java at javax servlet http httpservlet service httpservlet java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache tomcat websocket server wsfilter dofilter wsfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework boot actuate autoconfigure endpointwebmvcautoconfiguration applicationcontextheaderfilter dofilterinternal endpointwebmvcautoconfiguration java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework boot actuate trace webrequesttracefilter dofilterinternal webrequesttracefilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web access intercept filtersecurityinterceptor invoke filtersecurityinterceptor java at org springframework security web access intercept filtersecurityinterceptor dofilter filtersecurityinterceptor java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web access exceptiontranslationfilter dofilter exceptiontranslationfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web session sessionmanagementfilter dofilter sessionmanagementfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication anonymousauthenticationfilter dofilter anonymousauthenticationfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication rememberme remembermeauthenticationfilter dofilter remembermeauthenticationfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web servletapi securitycontextholderawarerequestfilter dofilter securitycontextholderawarerequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web savedrequest requestcacheawarefilter dofilter requestcacheawarefilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication abstractauthenticationprocessingfilter dofilter abstractauthenticationprocessingfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication logout logoutfilter dofilter logoutfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at eu cloudopting filter csrfcookiegeneratorfilter dofilterinternal csrfcookiegeneratorfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web csrf csrffilter dofilterinternal csrffilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web header headerwriterfilter dofilterinternal headerwriterfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web context securitycontextpersistencefilter dofilter securitycontextpersistencefilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web context request async webasyncmanagerintegrationfilter dofilterinternal webasyncmanagerintegrationfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web filterchainproxy dofilterinternal filterchainproxy java at org springframework security web filterchainproxy dofilter filterchainproxy java at org springframework web filter delegatingfilterproxy invokedelegate delegatingfilterproxy java at org springframework web filter delegatingfilterproxy dofilter delegatingfilterproxy java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter requestcontextfilter dofilterinternal requestcontextfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter httpputformcontentfilter dofilterinternal httpputformcontentfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter hiddenhttpmethodfilter dofilterinternal hiddenhttpmethodfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter characterencodingfilter dofilterinternal characterencodingfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache catalina core standardwrappervalve invoke standardwrappervalve java at org apache catalina core standardcontextvalve invoke standardcontextvalve java at org apache catalina authenticator authenticatorbase invoke authenticatorbase java at org apache catalina core standardhostvalve invoke standardhostvalve java at org apache catalina valves errorreportvalve invoke errorreportvalve java at org apache catalina core standardenginevalve invoke standardenginevalve java at org apache catalina connector coyoteadapter service coyoteadapter java at org apache coyote process java at org apache coyote abstractprotocol abstractconnectionhandler process abstractprotocol java at org apache tomcat util net nioendpoint socketprocessor dorun nioendpoint java at org apache tomcat util net nioendpoint socketprocessor run nioendpoint java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at org apache tomcat util threads taskthread wrappingrunnable run taskthread java at java lang thread run thread java caused by java lang illegalstateexception org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org apache catalina connector request parseparts request java at org apache catalina connector request parseparameters request java at org apache catalina connector request getparameter request java at org apache catalina connector requestfacade getparameter requestfacade java at org springframework web filter hiddenhttpmethodfilter dofilterinternal hiddenhttpmethodfilter java common frames omitted caused by org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org apache tomcat util http fileupload fileuploadbase fileitemiteratorimpl fileitemstreamimpl raiseerror fileuploadbase java at org apache tomcat util http fileupload util limitedinputstream checklimit limitedinputstream java at org apache tomcat util http fileupload util limitedinputstream read limitedinputstream java at java io filterinputstream read filterinputstream java at org apache tomcat util http fileupload util streams copy streams java at org apache tomcat util http fileupload util streams copy streams java at org apache tomcat util http fileupload fileuploadbase parserequest fileuploadbase java at org apache catalina connector request parseparts request java common frames omitted org activiti rest exception exceptionhandleradvice unhandled exception org springframework web multipart multipartexception could not parse multipart servlet request nested exception is java lang illegalstateexception org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org springframework web multipart support standardmultiparthttpservletrequest parserequest standardmultiparthttpservletrequest java at org springframework web multipart support standardmultiparthttpservletrequest standardmultiparthttpservletrequest java at org springframework web multipart support standardservletmultipartresolver resolvemultipart standardservletmultipartresolver java at org springframework web servlet dispatcherservlet checkmultipart dispatcherservlet java at org springframework web servlet dispatcherservlet dodispatch dispatcherservlet java at org springframework web servlet dispatcherservlet doservice dispatcherservlet java at org springframework web servlet frameworkservlet processrequest frameworkservlet java at org springframework web servlet frameworkservlet dopost frameworkservlet java at javax servlet http httpservlet service httpservlet java at org springframework web servlet frameworkservlet service frameworkservlet java at javax servlet http httpservlet service httpservlet java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache tomcat websocket server wsfilter dofilter wsfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework boot actuate autoconfigure endpointwebmvcautoconfiguration applicationcontextheaderfilter dofilterinternal endpointwebmvcautoconfiguration java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework boot actuate trace webrequesttracefilter dofilterinternal webrequesttracefilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web access intercept filtersecurityinterceptor invoke filtersecurityinterceptor java at org springframework security web access intercept filtersecurityinterceptor dofilter filtersecurityinterceptor java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web access exceptiontranslationfilter dofilter exceptiontranslationfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web session sessionmanagementfilter dofilter sessionmanagementfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication anonymousauthenticationfilter dofilter anonymousauthenticationfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication rememberme remembermeauthenticationfilter dofilter remembermeauthenticationfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web servletapi securitycontextholderawarerequestfilter dofilter securitycontextholderawarerequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web savedrequest requestcacheawarefilter dofilter requestcacheawarefilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication abstractauthenticationprocessingfilter dofilter abstractauthenticationprocessingfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication logout logoutfilter dofilter logoutfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at eu cloudopting filter csrfcookiegeneratorfilter dofilterinternal csrfcookiegeneratorfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web csrf csrffilter dofilterinternal csrffilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web header headerwriterfilter dofilterinternal headerwriterfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web context securitycontextpersistencefilter dofilter securitycontextpersistencefilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web context request async webasyncmanagerintegrationfilter dofilterinternal webasyncmanagerintegrationfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web filterchainproxy dofilterinternal filterchainproxy java at org springframework security web filterchainproxy dofilter filterchainproxy java at org springframework web filter delegatingfilterproxy invokedelegate delegatingfilterproxy java at org springframework web filter delegatingfilterproxy dofilter delegatingfilterproxy java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter requestcontextfilter dofilterinternal requestcontextfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter httpputformcontentfilter dofilterinternal httpputformcontentfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter hiddenhttpmethodfilter dofilterinternal hiddenhttpmethodfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter characterencodingfilter dofilterinternal characterencodingfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache catalina core standardwrappervalve invoke standardwrappervalve java at org apache catalina core standardcontextvalve invoke standardcontextvalve java at org apache catalina authenticator authenticatorbase invoke authenticatorbase java at org apache catalina core standardhostvalve invoke standardhostvalve java at org apache catalina valves errorreportvalve invoke errorreportvalve java at org apache catalina core standardenginevalve invoke standardenginevalve java at org apache catalina connector coyoteadapter service coyoteadapter java at org apache coyote process java at org apache coyote abstractprotocol abstractconnectionhandler process abstractprotocol java at org apache tomcat util net nioendpoint socketprocessor dorun nioendpoint java at org apache tomcat util net nioendpoint socketprocessor run nioendpoint java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at org apache tomcat util threads taskthread wrappingrunnable run taskthread java at java lang thread run thread java caused by java lang illegalstateexception org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org apache catalina connector request parseparts request java at org apache catalina connector request parseparameters request java at org apache catalina connector request getparameter request java at org apache catalina connector requestfacade getparameter requestfacade java at org springframework web filter hiddenhttpmethodfilter dofilterinternal hiddenhttpmethodfilter java common frames omitted caused by org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org apache tomcat util http fileupload fileuploadbase fileitemiteratorimpl fileitemstreamimpl raiseerror fileuploadbase java at org apache tomcat util http fileupload util limitedinputstream checklimit limitedinputstream java at org apache tomcat util http fileupload util limitedinputstream read limitedinputstream java at java io filterinputstream read filterinputstream java at org apache tomcat util http fileupload util streams copy streams java at org apache tomcat util http fileupload util streams copy streams java at org apache tomcat util http fileupload fileuploadbase parserequest fileuploadbase java at org apache catalina connector request parseparts request java common frames omitted org activiti rest exception exceptionhandleradvice unhandled exception org springframework web multipart multipartexception could not parse multipart servlet request nested exception is java lang illegalstateexception org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org springframework web multipart support standardmultiparthttpservletrequest parserequest standardmultiparthttpservletrequest java at org springframework web multipart support standardmultiparthttpservletrequest standardmultiparthttpservletrequest java at org springframework web multipart support standardservletmultipartresolver resolvemultipart standardservletmultipartresolver java at org springframework web servlet dispatcherservlet checkmultipart dispatcherservlet java at org springframework web servlet dispatcherservlet dodispatch dispatcherservlet java at org springframework web servlet dispatcherservlet doservice dispatcherservlet java at org springframework web servlet frameworkservlet processrequest frameworkservlet java at org springframework web servlet frameworkservlet dopost frameworkservlet java at javax servlet http httpservlet service httpservlet java at org springframework web servlet frameworkservlet service frameworkservlet java at javax servlet http httpservlet service httpservlet java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache tomcat websocket server wsfilter dofilter wsfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework boot actuate autoconfigure endpointwebmvcautoconfiguration applicationcontextheaderfilter dofilterinternal endpointwebmvcautoconfiguration java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework boot actuate trace webrequesttracefilter dofilterinternal webrequesttracefilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web access intercept filtersecurityinterceptor invoke filtersecurityinterceptor java at org springframework security web access intercept filtersecurityinterceptor dofilter filtersecurityinterceptor java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web access exceptiontranslationfilter dofilter exceptiontranslationfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web session sessionmanagementfilter dofilter sessionmanagementfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication anonymousauthenticationfilter dofilter anonymousauthenticationfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication rememberme remembermeauthenticationfilter dofilter remembermeauthenticationfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web servletapi securitycontextholderawarerequestfilter dofilter securitycontextholderawarerequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web savedrequest requestcacheawarefilter dofilter requestcacheawarefilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication abstractauthenticationprocessingfilter dofilter abstractauthenticationprocessingfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web authentication logout logoutfilter dofilter logoutfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at eu cloudopting filter csrfcookiegeneratorfilter dofilterinternal csrfcookiegeneratorfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web csrf csrffilter dofilterinternal csrffilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web header headerwriterfilter dofilterinternal headerwriterfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web context securitycontextpersistencefilter dofilter securitycontextpersistencefilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web context request async webasyncmanagerintegrationfilter dofilterinternal webasyncmanagerintegrationfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org springframework security web filterchainproxy virtualfilterchain dofilter filterchainproxy java at org springframework security web filterchainproxy dofilterinternal filterchainproxy java at org springframework security web filterchainproxy dofilter filterchainproxy java at org springframework web filter delegatingfilterproxy invokedelegate delegatingfilterproxy java at org springframework web filter delegatingfilterproxy dofilter delegatingfilterproxy java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter requestcontextfilter dofilterinternal requestcontextfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter httpputformcontentfilter dofilterinternal httpputformcontentfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter hiddenhttpmethodfilter dofilterinternal hiddenhttpmethodfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org springframework web filter characterencodingfilter dofilterinternal characterencodingfilter java at org springframework web filter onceperrequestfilter dofilter onceperrequestfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache catalina core standardwrappervalve invoke standardwrappervalve java at org apache catalina core standardcontextvalve invoke standardcontextvalve java at org apache catalina authenticator authenticatorbase invoke authenticatorbase java at org apache catalina core standardhostvalve invoke standardhostvalve java at org apache catalina valves errorreportvalve invoke errorreportvalve java at org apache catalina core standardenginevalve invoke standardenginevalve java at org apache catalina connector coyoteadapter service coyoteadapter java at org apache coyote process java at org apache coyote abstractprotocol abstractconnectionhandler process abstractprotocol java at org apache tomcat util net nioendpoint socketprocessor dorun nioendpoint java at org apache tomcat util net nioendpoint socketprocessor run nioendpoint java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at org apache tomcat util threads taskthread wrappingrunnable run taskthread java at java lang thread run thread java caused by java lang illegalstateexception org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org apache catalina connector request parseparts request java at org apache catalina connector request parseparameters request java at org apache catalina connector request getparameter request java at org apache catalina connector requestfacade getparameter requestfacade java at org springframework web filter hiddenhttpmethodfilter dofilterinternal hiddenhttpmethodfilter java common frames omitted caused by org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org apache tomcat util http fileupload fileuploadbase fileitemiteratorimpl fileitemstreamimpl raiseerror fileuploadbase java at org apache tomcat util http fileupload util limitedinputstream checklimit limitedinputstream java at org apache tomcat util http fileupload util limitedinputstream read limitedinputstream java at java io filterinputstream read filterinputstream java at org apache tomcat util http fileupload util streams copy streams java at org apache tomcat util http fileupload util streams copy streams java at org apache tomcat util http fileupload fileuploadbase parserequest fileuploadbase java at org apache catalina connector request parseparts request java common frames omitted org activiti rest exception exceptionhandleradvice unhandled exception org springframework web multipart multipartexception could not parse multipart servlet request nested exception is java lang illegalstateexception org apache tomcat util http fileupload fileuploadbase filesizelimitexceededexception the field file exceeds its maximum permitted size of bytes at org springframework web multipart support standardmultiparthttpservletrequest parserequest standardmultiparthttpservletrequest java
0
418,524
12,198,941,478
IssuesEvent
2020-04-30 00:10:50
eclipse-ee4j/glassfish
https://api.github.com/repos/eclipse-ee4j/glassfish
closed
Glassfish admin listener thread failure trying to login due to NPE
4_0_1-reviewed Component: admin_gui ERR: Assignee Priority: Major Stale Type: Bug admin-gui
[2013-10-01T11:07:19.750-0400] [glassfish 4.0] [WARNING] [] [javax.enterprise.web] [tid: _ThreadID=197 _ThreadName=admin-listener(16)] [timeMillis: 1380640039750] [levelValue: 900] [[ StandardWrapperValve[FacesServlet]: Servlet.service() for servlet FacesServlet threw exception java.lang.NullPointerException at org.glassfish.admingui.common.util.GuiUtil.genId(GuiUtil.java:343) at org.glassfish.admingui.common.handlers.UtilHandlers.encodeId(UtilHandlers.java:1011) at sun.reflect.GeneratedMethodAccessor684.invoke(Unknown Source) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:606) at com.sun.jsftemplating.layout.descriptors.handler.Handler.invoke(Handler.java:442) at com.sun.jsftemplating.layout.descriptors.LayoutElementBase.dispatchHandlers(LayoutElementBase.java:420) at com.sun.jsftemplating.layout.descriptors.LayoutElementBase.dispatchHandlers(LayoutElementBase.java:394) at com.sun.jsftemplating.layout.descriptors.LayoutComponent.beforeCreate(LayoutComponent.java:348) at com.sun.jsftemplating.layout.descriptors.LayoutComponent.getChild(LayoutComponent.java:288) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:556) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:507) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:551) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:590) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:590) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:590) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:507) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:507) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:507) at com.sun.jsftemplating.layout.LayoutViewHandler.createView(LayoutViewHandler.java:255) at com.sun.faces.lifecycle.RestoreViewPhase.execute(RestoreViewPhase.java:254) at com.sun.faces.lifecycle.Phase.doPhase(Phase.java:101) at com.sun.faces.lifecycle.RestoreViewPhase.doPhase(RestoreViewPhase.java:121) at com.sun.faces.lifecycle.LifecycleImpl.execute(LifecycleImpl.java:198) at javax.faces.webapp.FacesServlet.service(FacesServlet.java:646) at org.apache.catalina.core.StandardWrapper.service(StandardWrapper.java:1682) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:344) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:214) at com.sun.webui.jsf.util.UploadFilter.doFilter(UploadFilter.java:233) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:256) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:214) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:316) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:160) at org.apache.catalina.core.StandardPipeline.doInvoke(StandardPipeline.java:734) at org.apache.catalina.core.StandardPipeline.doChainInvoke(StandardPipeline.java:678) at com.sun.enterprise.web.WebPipeline.invoke(WebPipeline.java:97) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:174) at org.apache.catalina.connector.CoyoteAdapter.doService(CoyoteAdapter.java:357) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:260) at com.sun.enterprise.v3.services.impl.ContainerMapper.service(ContainerMapper.java:246) at org.glassfish.grizzly.http.server.HttpHandler.runService(HttpHandler.java:191) at org.glassfish.grizzly.http.server.HttpHandler.doHandle(HttpHandler.java:168) at org.glassfish.grizzly.http.server.HttpServerFilter.handleRead(HttpServerFilter.java:189) at org.glassfish.grizzly.filterchain.ExecutorResolver$9.execute(ExecutorResolver.java:119) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeFilter(DefaultFilterChain.java:288) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeChainPart(DefaultFilterChain.java:206) at org.glassfish.grizzly.filterchain.DefaultFilterChain.execute(DefaultFilterChain.java:136) at org.glassfish.grizzly.filterchain.DefaultFilterChain.process(DefaultFilterChain.java:114) at org.glassfish.grizzly.ProcessorExecutor.execute(ProcessorExecutor.java:77) at org.glassfish.grizzly.portunif.PUFilter.handleRead(PUFilter.java:231) at org.glassfish.grizzly.filterchain.ExecutorResolver$9.execute(ExecutorResolver.java:119) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeFilter(DefaultFilterChain.java:288) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeChainPart(DefaultFilterChain.java:206) at org.glassfish.grizzly.filterchain.DefaultFilterChain.execute(DefaultFilterChain.java:136) at org.glassfish.grizzly.filterchain.DefaultFilterChain.process(DefaultFilterChain.java:114) at org.glassfish.grizzly.ProcessorExecutor.execute(ProcessorExecutor.java:77) at org.glassfish.grizzly.portunif.PUFilter.handleRead(PUFilter.java:231) at org.glassfish.grizzly.filterchain.ExecutorResolver$9.execute(ExecutorResolver.java:119) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeFilter(DefaultFilterChain.java:288) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeChainPart(DefaultFilterChain.java:206) at org.glassfish.grizzly.filterchain.DefaultFilterChain.execute(DefaultFilterChain.java:136) at org.glassfish.grizzly.filterchain.DefaultFilterChain.process(DefaultFilterChain.java:114) at org.glassfish.grizzly.ProcessorExecutor.execute(ProcessorExecutor.java:77) at org.glassfish.grizzly.nio.transport.TCPNIOTransport.fireIOEvent(TCPNIOTransport.java:838) at org.glassfish.grizzly.strategies.AbstractIOStrategy.fireIOEvent(AbstractIOStrategy.java:113) at org.glassfish.grizzly.strategies.WorkerThreadIOStrategy.run0(WorkerThreadIOStrategy.java:115) at org.glassfish.grizzly.strategies.WorkerThreadIOStrategy.access$100(WorkerThreadIOStrategy.java:55) at org.glassfish.grizzly.strategies.WorkerThreadIOStrategy$WorkerThreadRunnable.run(WorkerThreadIOStrategy.java:135) at org.glassfish.grizzly.threadpool.AbstractThreadPool$Worker.doWork(AbstractThreadPool.java:564) at org.glassfish.grizzly.threadpool.AbstractThreadPool$Worker.run(AbstractThreadPool.java:544) at java.lang.Thread.run(Thread.java:724) #### Environment Linux SUSE 11.3, JDK 1.7.0_25 64 bit, Glassfish4.0 I believe this also happened on my windows 7 machine #### Affected Versions [4.0]
1.0
Glassfish admin listener thread failure trying to login due to NPE - [2013-10-01T11:07:19.750-0400] [glassfish 4.0] [WARNING] [] [javax.enterprise.web] [tid: _ThreadID=197 _ThreadName=admin-listener(16)] [timeMillis: 1380640039750] [levelValue: 900] [[ StandardWrapperValve[FacesServlet]: Servlet.service() for servlet FacesServlet threw exception java.lang.NullPointerException at org.glassfish.admingui.common.util.GuiUtil.genId(GuiUtil.java:343) at org.glassfish.admingui.common.handlers.UtilHandlers.encodeId(UtilHandlers.java:1011) at sun.reflect.GeneratedMethodAccessor684.invoke(Unknown Source) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:606) at com.sun.jsftemplating.layout.descriptors.handler.Handler.invoke(Handler.java:442) at com.sun.jsftemplating.layout.descriptors.LayoutElementBase.dispatchHandlers(LayoutElementBase.java:420) at com.sun.jsftemplating.layout.descriptors.LayoutElementBase.dispatchHandlers(LayoutElementBase.java:394) at com.sun.jsftemplating.layout.descriptors.LayoutComponent.beforeCreate(LayoutComponent.java:348) at com.sun.jsftemplating.layout.descriptors.LayoutComponent.getChild(LayoutComponent.java:288) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:556) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:507) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:551) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:590) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:590) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:590) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:507) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:507) at com.sun.jsftemplating.layout.LayoutViewHandler.buildUIComponentTree(LayoutViewHandler.java:507) at com.sun.jsftemplating.layout.LayoutViewHandler.createView(LayoutViewHandler.java:255) at com.sun.faces.lifecycle.RestoreViewPhase.execute(RestoreViewPhase.java:254) at com.sun.faces.lifecycle.Phase.doPhase(Phase.java:101) at com.sun.faces.lifecycle.RestoreViewPhase.doPhase(RestoreViewPhase.java:121) at com.sun.faces.lifecycle.LifecycleImpl.execute(LifecycleImpl.java:198) at javax.faces.webapp.FacesServlet.service(FacesServlet.java:646) at org.apache.catalina.core.StandardWrapper.service(StandardWrapper.java:1682) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:344) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:214) at com.sun.webui.jsf.util.UploadFilter.doFilter(UploadFilter.java:233) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:256) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:214) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:316) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:160) at org.apache.catalina.core.StandardPipeline.doInvoke(StandardPipeline.java:734) at org.apache.catalina.core.StandardPipeline.doChainInvoke(StandardPipeline.java:678) at com.sun.enterprise.web.WebPipeline.invoke(WebPipeline.java:97) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:174) at org.apache.catalina.connector.CoyoteAdapter.doService(CoyoteAdapter.java:357) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:260) at com.sun.enterprise.v3.services.impl.ContainerMapper.service(ContainerMapper.java:246) at org.glassfish.grizzly.http.server.HttpHandler.runService(HttpHandler.java:191) at org.glassfish.grizzly.http.server.HttpHandler.doHandle(HttpHandler.java:168) at org.glassfish.grizzly.http.server.HttpServerFilter.handleRead(HttpServerFilter.java:189) at org.glassfish.grizzly.filterchain.ExecutorResolver$9.execute(ExecutorResolver.java:119) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeFilter(DefaultFilterChain.java:288) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeChainPart(DefaultFilterChain.java:206) at org.glassfish.grizzly.filterchain.DefaultFilterChain.execute(DefaultFilterChain.java:136) at org.glassfish.grizzly.filterchain.DefaultFilterChain.process(DefaultFilterChain.java:114) at org.glassfish.grizzly.ProcessorExecutor.execute(ProcessorExecutor.java:77) at org.glassfish.grizzly.portunif.PUFilter.handleRead(PUFilter.java:231) at org.glassfish.grizzly.filterchain.ExecutorResolver$9.execute(ExecutorResolver.java:119) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeFilter(DefaultFilterChain.java:288) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeChainPart(DefaultFilterChain.java:206) at org.glassfish.grizzly.filterchain.DefaultFilterChain.execute(DefaultFilterChain.java:136) at org.glassfish.grizzly.filterchain.DefaultFilterChain.process(DefaultFilterChain.java:114) at org.glassfish.grizzly.ProcessorExecutor.execute(ProcessorExecutor.java:77) at org.glassfish.grizzly.portunif.PUFilter.handleRead(PUFilter.java:231) at org.glassfish.grizzly.filterchain.ExecutorResolver$9.execute(ExecutorResolver.java:119) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeFilter(DefaultFilterChain.java:288) at org.glassfish.grizzly.filterchain.DefaultFilterChain.executeChainPart(DefaultFilterChain.java:206) at org.glassfish.grizzly.filterchain.DefaultFilterChain.execute(DefaultFilterChain.java:136) at org.glassfish.grizzly.filterchain.DefaultFilterChain.process(DefaultFilterChain.java:114) at org.glassfish.grizzly.ProcessorExecutor.execute(ProcessorExecutor.java:77) at org.glassfish.grizzly.nio.transport.TCPNIOTransport.fireIOEvent(TCPNIOTransport.java:838) at org.glassfish.grizzly.strategies.AbstractIOStrategy.fireIOEvent(AbstractIOStrategy.java:113) at org.glassfish.grizzly.strategies.WorkerThreadIOStrategy.run0(WorkerThreadIOStrategy.java:115) at org.glassfish.grizzly.strategies.WorkerThreadIOStrategy.access$100(WorkerThreadIOStrategy.java:55) at org.glassfish.grizzly.strategies.WorkerThreadIOStrategy$WorkerThreadRunnable.run(WorkerThreadIOStrategy.java:135) at org.glassfish.grizzly.threadpool.AbstractThreadPool$Worker.doWork(AbstractThreadPool.java:564) at org.glassfish.grizzly.threadpool.AbstractThreadPool$Worker.run(AbstractThreadPool.java:544) at java.lang.Thread.run(Thread.java:724) #### Environment Linux SUSE 11.3, JDK 1.7.0_25 64 bit, Glassfish4.0 I believe this also happened on my windows 7 machine #### Affected Versions [4.0]
non_process
glassfish admin listener thread failure trying to login due to npe standardwrappervalve servlet service for servlet facesservlet threw exception java lang nullpointerexception at org glassfish admingui common util guiutil genid guiutil java at org glassfish admingui common handlers utilhandlers encodeid utilhandlers java at sun reflect invoke unknown source at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at com sun jsftemplating layout descriptors handler handler invoke handler java at com sun jsftemplating layout descriptors layoutelementbase dispatchhandlers layoutelementbase java at com sun jsftemplating layout descriptors layoutelementbase dispatchhandlers layoutelementbase java at com sun jsftemplating layout descriptors layoutcomponent beforecreate layoutcomponent java at com sun jsftemplating layout descriptors layoutcomponent getchild layoutcomponent java at com sun jsftemplating layout layoutviewhandler builduicomponenttree layoutviewhandler java at com sun jsftemplating layout layoutviewhandler builduicomponenttree layoutviewhandler java at com sun jsftemplating layout layoutviewhandler builduicomponenttree layoutviewhandler java at com sun jsftemplating layout layoutviewhandler builduicomponenttree layoutviewhandler java at com sun jsftemplating layout layoutviewhandler builduicomponenttree layoutviewhandler java at com sun jsftemplating layout layoutviewhandler builduicomponenttree layoutviewhandler java at com sun jsftemplating layout layoutviewhandler builduicomponenttree layoutviewhandler java at com sun jsftemplating layout layoutviewhandler builduicomponenttree layoutviewhandler java at com sun jsftemplating layout layoutviewhandler builduicomponenttree layoutviewhandler java at com sun jsftemplating layout layoutviewhandler createview layoutviewhandler java at com sun faces lifecycle restoreviewphase execute restoreviewphase java at com sun faces lifecycle phase dophase phase java at com sun faces lifecycle restoreviewphase dophase restoreviewphase java at com sun faces lifecycle lifecycleimpl execute lifecycleimpl java at javax faces webapp facesservlet service facesservlet java at org apache catalina core standardwrapper service standardwrapper java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at com sun webui jsf util uploadfilter dofilter uploadfilter java at org apache catalina core applicationfilterchain internaldofilter applicationfilterchain java at org apache catalina core applicationfilterchain dofilter applicationfilterchain java at org apache catalina core standardwrappervalve invoke standardwrappervalve java at org apache catalina core standardcontextvalve invoke standardcontextvalve java at org apache catalina core standardpipeline doinvoke standardpipeline java at org apache catalina core standardpipeline dochaininvoke standardpipeline java at com sun enterprise web webpipeline invoke webpipeline java at org apache catalina core standardhostvalve invoke standardhostvalve java at org apache catalina connector coyoteadapter doservice coyoteadapter java at org apache catalina connector coyoteadapter service coyoteadapter java at com sun enterprise services impl containermapper service containermapper java at org glassfish grizzly http server httphandler runservice httphandler java at org glassfish grizzly http server httphandler dohandle httphandler java at org glassfish grizzly http server httpserverfilter handleread httpserverfilter java at org glassfish grizzly filterchain executorresolver execute executorresolver java at org glassfish grizzly filterchain defaultfilterchain executefilter defaultfilterchain java at org glassfish grizzly filterchain defaultfilterchain executechainpart defaultfilterchain java at org glassfish grizzly filterchain defaultfilterchain execute defaultfilterchain java at org glassfish grizzly filterchain defaultfilterchain process defaultfilterchain java at org glassfish grizzly processorexecutor execute processorexecutor java at org glassfish grizzly portunif pufilter handleread pufilter java at org glassfish grizzly filterchain executorresolver execute executorresolver java at org glassfish grizzly filterchain defaultfilterchain executefilter defaultfilterchain java at org glassfish grizzly filterchain defaultfilterchain executechainpart defaultfilterchain java at org glassfish grizzly filterchain defaultfilterchain execute defaultfilterchain java at org glassfish grizzly filterchain defaultfilterchain process defaultfilterchain java at org glassfish grizzly processorexecutor execute processorexecutor java at org glassfish grizzly portunif pufilter handleread pufilter java at org glassfish grizzly filterchain executorresolver execute executorresolver java at org glassfish grizzly filterchain defaultfilterchain executefilter defaultfilterchain java at org glassfish grizzly filterchain defaultfilterchain executechainpart defaultfilterchain java at org glassfish grizzly filterchain defaultfilterchain execute defaultfilterchain java at org glassfish grizzly filterchain defaultfilterchain process defaultfilterchain java at org glassfish grizzly processorexecutor execute processorexecutor java at org glassfish grizzly nio transport tcpniotransport fireioevent tcpniotransport java at org glassfish grizzly strategies abstractiostrategy fireioevent abstractiostrategy java at org glassfish grizzly strategies workerthreadiostrategy workerthreadiostrategy java at org glassfish grizzly strategies workerthreadiostrategy access workerthreadiostrategy java at org glassfish grizzly strategies workerthreadiostrategy workerthreadrunnable run workerthreadiostrategy java at org glassfish grizzly threadpool abstractthreadpool worker dowork abstractthreadpool java at org glassfish grizzly threadpool abstractthreadpool worker run abstractthreadpool java at java lang thread run thread java environment linux suse jdk bit i believe this also happened on my windows machine affected versions
0
7,856
11,029,779,014
IssuesEvent
2019-12-06 14:33:18
eaudeweb/ozone
https://api.github.com/repos/eaudeweb/ozone
opened
Process agent uses reported - remark
Feature: Process Agents
Related to #1016 and #1084 Column Remark from old table ProcAgentUsesDateReported is imported, but not displayed in the UI. (it's usually filled in when there are no amounts to report).
1.0
Process agent uses reported - remark - Related to #1016 and #1084 Column Remark from old table ProcAgentUsesDateReported is imported, but not displayed in the UI. (it's usually filled in when there are no amounts to report).
process
process agent uses reported remark related to and column remark from old table procagentusesdatereported is imported but not displayed in the ui it s usually filled in when there are no amounts to report
1
251,237
18,942,628,529
IssuesEvent
2021-11-18 06:03:41
netbox-community/ansible_modules
https://api.github.com/repos/netbox-community/ansible_modules
closed
please provide an example for nb_inventory for the use with tower with token
documentation help wanted PR Required
please provide an example on how to use the nb_inventory in ansible tower. using an encrypted toke (secret) since we don't want everybody to be able to see the token. Rob
1.0
please provide an example for nb_inventory for the use with tower with token - please provide an example on how to use the nb_inventory in ansible tower. using an encrypted toke (secret) since we don't want everybody to be able to see the token. Rob
non_process
please provide an example for nb inventory for the use with tower with token please provide an example on how to use the nb inventory in ansible tower using an encrypted toke secret since we don t want everybody to be able to see the token rob
0
15,707
19,848,525,253
IssuesEvent
2022-01-21 09:39:08
ooi-data/CE06ISSM-MFD35-04-ADCPTM000-recovered_inst-adcpt_m_wvs_recovered
https://api.github.com/repos/ooi-data/CE06ISSM-MFD35-04-ADCPTM000-recovered_inst-adcpt_m_wvs_recovered
opened
🛑 Processing failed: ValueError
process
## Overview `ValueError` found in `processing_task` task during run ended on 2022-01-21T09:39:08.249914. ## Details Flow name: `CE06ISSM-MFD35-04-ADCPTM000-recovered_inst-adcpt_m_wvs_recovered` Task name: `processing_task` Error type: `ValueError` Error message: conflicting sizes for dimension 'start_time_dim_0': length 24 on 'start_time_dim_0' and length 8 on {'time': 'altitude', 'b_map': 'b_map', 'spec_dat_dim0': 'dspec_dat', 'spec_dat_dim1': 'dspec_dat', 'wvs_series': 'heading_time_series', 'start_time_dim_0': 'start_time'} <details> <summary>Traceback</summary> ``` Traceback (most recent call last): File "/srv/conda/envs/notebook/lib/python3.9/site-packages/ooi_harvester/processor/pipeline.py", line 165, in processing final_path = finalize_data_stream( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/ooi_harvester/processor/__init__.py", line 77, in finalize_data_stream temp_ds = xr.open_dataset( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/backends/api.py", line 495, in open_dataset backend_ds = backend.open_dataset( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/backends/zarr.py", line 838, in open_dataset ds = store_entrypoint.open_dataset( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/backends/store.py", line 39, in open_dataset ds = Dataset(vars, attrs=attrs) File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/core/dataset.py", line 751, in __init__ variables, coord_names, dims, indexes, _ = merge_data_and_coords( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/core/merge.py", line 488, in merge_data_and_coords return merge_core( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/core/merge.py", line 645, in merge_core dims = calculate_dimensions(variables) File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/core/dataset.py", line 205, in calculate_dimensions raise ValueError( ValueError: conflicting sizes for dimension 'start_time_dim_0': length 24 on 'start_time_dim_0' and length 8 on {'time': 'altitude', 'b_map': 'b_map', 'spec_dat_dim0': 'dspec_dat', 'spec_dat_dim1': 'dspec_dat', 'wvs_series': 'heading_time_series', 'start_time_dim_0': 'start_time'} ``` </details>
1.0
🛑 Processing failed: ValueError - ## Overview `ValueError` found in `processing_task` task during run ended on 2022-01-21T09:39:08.249914. ## Details Flow name: `CE06ISSM-MFD35-04-ADCPTM000-recovered_inst-adcpt_m_wvs_recovered` Task name: `processing_task` Error type: `ValueError` Error message: conflicting sizes for dimension 'start_time_dim_0': length 24 on 'start_time_dim_0' and length 8 on {'time': 'altitude', 'b_map': 'b_map', 'spec_dat_dim0': 'dspec_dat', 'spec_dat_dim1': 'dspec_dat', 'wvs_series': 'heading_time_series', 'start_time_dim_0': 'start_time'} <details> <summary>Traceback</summary> ``` Traceback (most recent call last): File "/srv/conda/envs/notebook/lib/python3.9/site-packages/ooi_harvester/processor/pipeline.py", line 165, in processing final_path = finalize_data_stream( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/ooi_harvester/processor/__init__.py", line 77, in finalize_data_stream temp_ds = xr.open_dataset( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/backends/api.py", line 495, in open_dataset backend_ds = backend.open_dataset( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/backends/zarr.py", line 838, in open_dataset ds = store_entrypoint.open_dataset( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/backends/store.py", line 39, in open_dataset ds = Dataset(vars, attrs=attrs) File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/core/dataset.py", line 751, in __init__ variables, coord_names, dims, indexes, _ = merge_data_and_coords( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/core/merge.py", line 488, in merge_data_and_coords return merge_core( File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/core/merge.py", line 645, in merge_core dims = calculate_dimensions(variables) File "/srv/conda/envs/notebook/lib/python3.9/site-packages/xarray/core/dataset.py", line 205, in calculate_dimensions raise ValueError( ValueError: conflicting sizes for dimension 'start_time_dim_0': length 24 on 'start_time_dim_0' and length 8 on {'time': 'altitude', 'b_map': 'b_map', 'spec_dat_dim0': 'dspec_dat', 'spec_dat_dim1': 'dspec_dat', 'wvs_series': 'heading_time_series', 'start_time_dim_0': 'start_time'} ``` </details>
process
🛑 processing failed valueerror overview valueerror found in processing task task during run ended on details flow name recovered inst adcpt m wvs recovered task name processing task error type valueerror error message conflicting sizes for dimension start time dim length on start time dim and length on time altitude b map b map spec dat dspec dat spec dat dspec dat wvs series heading time series start time dim start time traceback traceback most recent call last file srv conda envs notebook lib site packages ooi harvester processor pipeline py line in processing final path finalize data stream file srv conda envs notebook lib site packages ooi harvester processor init py line in finalize data stream temp ds xr open dataset file srv conda envs notebook lib site packages xarray backends api py line in open dataset backend ds backend open dataset file srv conda envs notebook lib site packages xarray backends zarr py line in open dataset ds store entrypoint open dataset file srv conda envs notebook lib site packages xarray backends store py line in open dataset ds dataset vars attrs attrs file srv conda envs notebook lib site packages xarray core dataset py line in init variables coord names dims indexes merge data and coords file srv conda envs notebook lib site packages xarray core merge py line in merge data and coords return merge core file srv conda envs notebook lib site packages xarray core merge py line in merge core dims calculate dimensions variables file srv conda envs notebook lib site packages xarray core dataset py line in calculate dimensions raise valueerror valueerror conflicting sizes for dimension start time dim length on start time dim and length on time altitude b map b map spec dat dspec dat spec dat dspec dat wvs series heading time series start time dim start time
1
8,390
11,563,158,770
IssuesEvent
2020-02-20 05:04:54
geneontology/go-ontology
https://api.github.com/repos/geneontology/go-ontology
closed
Obsoletion proposal: GO:0052157 modulation by symbiont of microbe-associated molecular pattern-induced host innate immune response
multi-species process
Annotations to 'GO:0052157 modulation by symbiont of microbe-associated molecular pattern-induced host innate immune response' are to gene products that get recognized by the host. This is not an active process by the symbiont. Consider: GO:0046789 host cell surface receptor binding 3 EXP: 2 UniProt (disputed in P2GO) 1 MTBBASE @Achchuthan No mappings, not present in any subsets. Thanks, Pascale
1.0
Obsoletion proposal: GO:0052157 modulation by symbiont of microbe-associated molecular pattern-induced host innate immune response - Annotations to 'GO:0052157 modulation by symbiont of microbe-associated molecular pattern-induced host innate immune response' are to gene products that get recognized by the host. This is not an active process by the symbiont. Consider: GO:0046789 host cell surface receptor binding 3 EXP: 2 UniProt (disputed in P2GO) 1 MTBBASE @Achchuthan No mappings, not present in any subsets. Thanks, Pascale
process
obsoletion proposal go modulation by symbiont of microbe associated molecular pattern induced host innate immune response annotations to go modulation by symbiont of microbe associated molecular pattern induced host innate immune response are to gene products that get recognized by the host this is not an active process by the symbiont consider go host cell surface receptor binding exp uniprot disputed in mtbbase achchuthan no mappings not present in any subsets thanks pascale
1
98,529
20,748,453,572
IssuesEvent
2022-03-15 03:23:09
alexandrumuntenas/pingu
https://api.github.com/repos/alexandrumuntenas/pingu
closed
Road to clean code.
enhancement stale Working for Clean Code
Things to check before doing a PR: WORK TO-DO TO IMPROVE THE CODE QUALITY: - [ ] Improve variables names - [ ] Simplify the code. - [ ] Remove duplicated code - [ ] Remove the unnecessary comments and add only the needed ones - [ ] Improve human readability.
1.0
Road to clean code. - Things to check before doing a PR: WORK TO-DO TO IMPROVE THE CODE QUALITY: - [ ] Improve variables names - [ ] Simplify the code. - [ ] Remove duplicated code - [ ] Remove the unnecessary comments and add only the needed ones - [ ] Improve human readability.
non_process
road to clean code things to check before doing a pr work to do to improve the code quality improve variables names simplify the code remove duplicated code remove the unnecessary comments and add only the needed ones improve human readability
0
7,340
10,475,463,394
IssuesEvent
2019-09-23 16:23:30
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Source control sync depends on person?
Pri2 automation/svc cxp process-automation/subsvc product-question triaged
Hi I would like to know, whats the behaviour of source control if person leaves the organisation ? - behaviour in both situations i.e using Portal Add button or Personal Access Token? - Can we connect source control with Azure Ad App creds? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 83c90e64-b615-711f-a53d-fc76606e2ecd * Version Independent ID: 2d164036-6886-4440-50f7-369f99f41cea * Content: [Source Control integration in Azure Automation](https://docs.microsoft.com/en-us/azure/automation/source-control-integration#feedback) * Content Source: [articles/automation/source-control-integration.md](https://github.com/Microsoft/azure-docs/blob/master/articles/automation/source-control-integration.md) * Service: **automation** * Sub-service: **process-automation** * GitHub Login: @bobbytreed * Microsoft Alias: **robreed**
1.0
Source control sync depends on person? - Hi I would like to know, whats the behaviour of source control if person leaves the organisation ? - behaviour in both situations i.e using Portal Add button or Personal Access Token? - Can we connect source control with Azure Ad App creds? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 83c90e64-b615-711f-a53d-fc76606e2ecd * Version Independent ID: 2d164036-6886-4440-50f7-369f99f41cea * Content: [Source Control integration in Azure Automation](https://docs.microsoft.com/en-us/azure/automation/source-control-integration#feedback) * Content Source: [articles/automation/source-control-integration.md](https://github.com/Microsoft/azure-docs/blob/master/articles/automation/source-control-integration.md) * Service: **automation** * Sub-service: **process-automation** * GitHub Login: @bobbytreed * Microsoft Alias: **robreed**
process
source control sync depends on person hi i would like to know whats the behaviour of source control if person leaves the organisation behaviour in both situations i e using portal add button or personal access token can we connect source control with azure ad app creds document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service automation sub service process automation github login bobbytreed microsoft alias robreed
1
211,172
16,178,175,461
IssuesEvent
2021-05-03 10:21:32
IntellectualSites/FastAsyncWorldEdit
https://api.github.com/repos/IntellectualSites/FastAsyncWorldEdit
opened
BeaconDeactivatedEvent may only be triggered synchronously
Requires Testing
### Server Implementation Purpur ### Server Version 1.16.5 ### Describe the bug Not much to say, Beacons (activated beacons?) cannot be removed, they must be destroyed by hand. ### To Reproduce 1. Have Beacons 2. Try to remove them with //set 0 3. Error - Selection is not removed ### Expected behaviour Beacons can be removed, for that the BeaconDeactivatedEvent must be done synchronous. ### Screenshots / Videos _No response_ ### Error log (if applicable) https://gist.github.com/LaurenceBarnes/00dfe5f1122e588a59a5ba4afff43606 ### Fawe Debugpaste https://athion.net/ISPaster/paste/view/cee0b2b1603d4b509ee8b4210e9e1a3c ### Fawe Version FastAsyncWorldEdit Starlight build #14 ### Checklist - [X] I have included a Fawe debugpaste. - [X] I am using the newest build from https://ci.athion.net/job/FastAsyncWorldEdit-1.16/ and the issue still persists. ### Anything else? Did you ever hear the tragedy of Darth Plagueis the Wise?
1.0
BeaconDeactivatedEvent may only be triggered synchronously - ### Server Implementation Purpur ### Server Version 1.16.5 ### Describe the bug Not much to say, Beacons (activated beacons?) cannot be removed, they must be destroyed by hand. ### To Reproduce 1. Have Beacons 2. Try to remove them with //set 0 3. Error - Selection is not removed ### Expected behaviour Beacons can be removed, for that the BeaconDeactivatedEvent must be done synchronous. ### Screenshots / Videos _No response_ ### Error log (if applicable) https://gist.github.com/LaurenceBarnes/00dfe5f1122e588a59a5ba4afff43606 ### Fawe Debugpaste https://athion.net/ISPaster/paste/view/cee0b2b1603d4b509ee8b4210e9e1a3c ### Fawe Version FastAsyncWorldEdit Starlight build #14 ### Checklist - [X] I have included a Fawe debugpaste. - [X] I am using the newest build from https://ci.athion.net/job/FastAsyncWorldEdit-1.16/ and the issue still persists. ### Anything else? Did you ever hear the tragedy of Darth Plagueis the Wise?
non_process
beacondeactivatedevent may only be triggered synchronously server implementation purpur server version describe the bug not much to say beacons activated beacons cannot be removed they must be destroyed by hand to reproduce have beacons try to remove them with set error selection is not removed expected behaviour beacons can be removed for that the beacondeactivatedevent must be done synchronous screenshots videos no response error log if applicable fawe debugpaste fawe version fastasyncworldedit starlight build checklist i have included a fawe debugpaste i am using the newest build from and the issue still persists anything else did you ever hear the tragedy of darth plagueis the wise
0
130,331
18,065,289,024
IssuesEvent
2021-09-20 18:22:24
penumbra-zone/penumbra
https://api.github.com/repos/penumbra-zone/penumbra
opened
Specify address encodings
A-shielded-crypto E-easy C-design
Followup from #61 Related reading: * p. 112 of Zcash protocol spec * ZIP-173 defining Bech32 encoding https://zips.z.cash/zip-0173 * ZIP-316 defining unified addresses https://zips.z.cash/zip-0316
1.0
Specify address encodings - Followup from #61 Related reading: * p. 112 of Zcash protocol spec * ZIP-173 defining Bech32 encoding https://zips.z.cash/zip-0173 * ZIP-316 defining unified addresses https://zips.z.cash/zip-0316
non_process
specify address encodings followup from related reading p of zcash protocol spec zip defining encoding zip defining unified addresses
0
57,321
11,738,964,535
IssuesEvent
2020-03-11 16:54:39
creativecommons/ccsearch-browser-extension
https://api.github.com/repos/creativecommons/ccsearch-browser-extension
closed
Remove instances of "error-message" instances.
aspect:code easy good first issue in progress
The span with `error-message` in `popup.html` ([here](https://github.com/creativecommons/ccsearch-browser-extension/blob/master/src/popup/popup.html#L72)) is not being used in the extension. Remove instances of it (like the span, element selector, stylesheet rules, etc) from the code.
1.0
Remove instances of "error-message" instances. - The span with `error-message` in `popup.html` ([here](https://github.com/creativecommons/ccsearch-browser-extension/blob/master/src/popup/popup.html#L72)) is not being used in the extension. Remove instances of it (like the span, element selector, stylesheet rules, etc) from the code.
non_process
remove instances of error message instances the span with error message in popup html is not being used in the extension remove instances of it like the span element selector stylesheet rules etc from the code
0
11,138
13,957,692,049
IssuesEvent
2020-10-24 08:10:34
alexanderkotsev/geoportal
https://api.github.com/repos/alexanderkotsev/geoportal
opened
EL - NOT harvesting request
EL - Greece Geoportal Harvesting process
Dear INSPIRE Geoportal Team, Due to changes we are planning for our national INSPIRE services, please do not harvest for the next 2 weeks. I will come back to request a new harvesting when the changes will have been applied. Best regards, Elena
1.0
EL - NOT harvesting request - Dear INSPIRE Geoportal Team, Due to changes we are planning for our national INSPIRE services, please do not harvest for the next 2 weeks. I will come back to request a new harvesting when the changes will have been applied. Best regards, Elena
process
el not harvesting request dear inspire geoportal team due to changes we are planning for our national inspire services please do not harvest for the next weeks i will come back to request a new harvesting when the changes will have been applied best regards elena
1
183,593
21,772,132,694
IssuesEvent
2022-05-13 10:06:43
michaelmeaney/IdentityServer
https://api.github.com/repos/michaelmeaney/IdentityServer
opened
jquery-2.2.0.js: 4 vulnerabilities (highest severity is: 6.1)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.2.0.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-11023](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jquery - 3.5.0;jquery-rails - 4.4.0 | &#10060; | | [CVE-2020-11022](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - 3.5.0 | &#10060; | | [CVE-2015-9251](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - v3.0.0 | &#10060; | | [CVE-2019-11358](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | 3.4.0 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440">https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v3.0.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0;jquery-rails - 4.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2020-11023","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing \u003coption\u003e elements from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - 3.5.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2020-11022","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - v3.0.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2015-9251","vulnerabilityDetails":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-11358","vulnerabilityDetails":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> -->
True
jquery-2.2.0.js: 4 vulnerabilities (highest severity is: 6.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.2.0.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2020-11023](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jquery - 3.5.0;jquery-rails - 4.4.0 | &#10060; | | [CVE-2020-11022](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - 3.5.0 | &#10060; | | [CVE-2015-9251](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | jQuery - v3.0.0 | &#10060; | | [CVE-2019-11358](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.0.js | Direct | 3.4.0 | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440">https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jQuery - 3.5.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. <p>Publish Date: 2018-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p> <p>Release Date: 2018-01-18</p> <p>Fix Resolution: jQuery - v3.0.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary> ### Vulnerable Library - <b>jquery-2.2.0.js</b></p> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.0/jquery.js</a></p> <p>Path to vulnerable library: /clients/src/MvcHybridBackChannel/wwwroot/lib/jquery/dist/jquery.js</p> <p> Dependency Hierarchy: - :x: **jquery-2.2.0.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/michaelmeaney/IdentityServer/commit/5d935ff804f203a3184f8e88d1ef723ac77c79e5">5d935ff804f203a3184f8e88d1ef723ac77c79e5</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jquery - 3.5.0;jquery-rails - 4.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2020-11023","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing \u003coption\u003e elements from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - 3.5.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2020-11022","vulnerabilityDetails":"In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery\u0027s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"jQuery - v3.0.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2015-9251","vulnerabilityDetails":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"jquery","packageVersion":"2.2.0","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"jquery:2.2.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.4.0","isBinary":true}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-11358","vulnerabilityDetails":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358","cvss3Severity":"medium","cvss3Score":"6.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}]</REMEDIATE> -->
non_process
jquery js vulnerabilities highest severity is vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library clients src mvchybridbackchannel wwwroot lib jquery dist jquery js found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available medium jquery js direct jquery jquery rails medium jquery js direct jquery medium jquery js direct jquery medium jquery js direct details cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library clients src mvchybridbackchannel wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch main vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery jquery rails step up your open source security game with whitesource cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library clients src mvchybridbackchannel wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch main vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library clients src mvchybridbackchannel wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch main vulnerability details jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource cve vulnerable library jquery js javascript library for dom operations library home page a href path to vulnerable library clients src mvchybridbackchannel wwwroot lib jquery dist jquery js dependency hierarchy x jquery js vulnerable library found in head commit a href found in base branch main vulnerability details jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion jquery jquery rails isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery vulnerabilityurl istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion jquery isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery vulnerabilityurl istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion jquery isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed vulnerabilityurl istransitivedependency false dependencytree jquery isminimumfixversionavailable true minimumfixversion isbinary true basebranches vulnerabilityidentifier cve vulnerabilitydetails jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype vulnerabilityurl
0
181,966
30,768,876,310
IssuesEvent
2023-07-30 16:50:44
frappe/helpdesk
https://api.github.com/repos/frappe/helpdesk
closed
empty list view design
design
@nish7x we don't have a design when a list view is empty. We can add some text like: - Sit back and relax, until the next ticket comes in. - Take a break and stretch a little, until the next ticket arrives. I am visualizing something like this without the button: ![image](https://user-images.githubusercontent.com/46772424/176406765-5d063650-f89a-4e5c-a772-061a4c006b2c.png) It has a doodle backed by some text.
1.0
empty list view design - @nish7x we don't have a design when a list view is empty. We can add some text like: - Sit back and relax, until the next ticket comes in. - Take a break and stretch a little, until the next ticket arrives. I am visualizing something like this without the button: ![image](https://user-images.githubusercontent.com/46772424/176406765-5d063650-f89a-4e5c-a772-061a4c006b2c.png) It has a doodle backed by some text.
non_process
empty list view design we don t have a design when a list view is empty we can add some text like sit back and relax until the next ticket comes in take a break and stretch a little until the next ticket arrives i am visualizing something like this without the button it has a doodle backed by some text
0
158,318
13,728,559,769
IssuesEvent
2020-10-04 12:15:00
novoid/lazyblorg
https://api.github.com/repos/novoid/lazyblorg
opened
Add static types to source code (mypy)
documentation maybehuge
- Why? - I've made good experience with static typing in other tools. - Makes it easier to read function parameters. - Cleaner code and enhanced readability. - Good additional sanity check with `mypy` - add static types to all python files: - [ ] ./lazyblorg.py - [ ] ./__ init __.py - [ ] ./config.py - [ ] ./lib/__ init __.py - [ ] ./lib/orgparser.py - [ ] ./lib/htmlizer.py - [ ] ./lib/utils.py - add statis types to all test files: - [ ] ./tests/lazyblorg_test.py - [ ] ./lib/tests/pypandoc_test.py - [ ] ./lib/tests/orgparser_test.py - [ ] ./lib/tests/htmlizer_test.py - [ ] ./lib/tests/utils_test.py - [ ] add `mypy` check to test shell script(s)
1.0
Add static types to source code (mypy) - - Why? - I've made good experience with static typing in other tools. - Makes it easier to read function parameters. - Cleaner code and enhanced readability. - Good additional sanity check with `mypy` - add static types to all python files: - [ ] ./lazyblorg.py - [ ] ./__ init __.py - [ ] ./config.py - [ ] ./lib/__ init __.py - [ ] ./lib/orgparser.py - [ ] ./lib/htmlizer.py - [ ] ./lib/utils.py - add statis types to all test files: - [ ] ./tests/lazyblorg_test.py - [ ] ./lib/tests/pypandoc_test.py - [ ] ./lib/tests/orgparser_test.py - [ ] ./lib/tests/htmlizer_test.py - [ ] ./lib/tests/utils_test.py - [ ] add `mypy` check to test shell script(s)
non_process
add static types to source code mypy why i ve made good experience with static typing in other tools makes it easier to read function parameters cleaner code and enhanced readability good additional sanity check with mypy add static types to all python files lazyblorg py init py config py lib init py lib orgparser py lib htmlizer py lib utils py add statis types to all test files tests lazyblorg test py lib tests pypandoc test py lib tests orgparser test py lib tests htmlizer test py lib tests utils test py add mypy check to test shell script s
0
282,495
30,889,347,847
IssuesEvent
2023-08-04 02:35:31
maddyCode23/linux-4.1.15
https://api.github.com/repos/maddyCode23/linux-4.1.15
reopened
CVE-2019-19462 (Medium) detected in linux-stable-rtv4.1.33
Mend: dependency security vulnerability
## CVE-2019-19462 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/relay.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/relay.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result. <p>Publish Date: 2019-11-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19462>CVE-2019-19462</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462</a></p> <p>Release Date: 2019-11-30</p> <p>Fix Resolution: v5.8-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-19462 (Medium) detected in linux-stable-rtv4.1.33 - ## CVE-2019-19462 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/relay.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/relay.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result. <p>Publish Date: 2019-11-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19462>CVE-2019-19462</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462</a></p> <p>Release Date: 2019-11-30</p> <p>Fix Resolution: v5.8-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files kernel relay c kernel relay c vulnerability details relay open in kernel relay c in the linux kernel through allows local users to cause a denial of service such as relay blockage by triggering a null alloc percpu result publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
16,465
21,390,776,469
IssuesEvent
2022-04-21 06:50:54
zammad/zammad
https://api.github.com/repos/zammad/zammad
closed
pre-code tags cause Zammad to swallow content
bug verified mail processing
<!-- Hi there - thanks for filing an issue. Please ensure the following things before creating an issue - thank you! 🤓 Since november 15th we handle all requests, except real bugs, at our community board. Full explanation: https://community.zammad.org/t/major-change-regarding-github-issues-community-board/21 Please post: - Feature requests - Development questions - Technical questions on the board -> https://community.zammad.org ! If you think you hit a bug, please continue: - Search existing issues and the CHANGELOG.md for your issue - there might be a solution already - Make sure to use the latest version of Zammad if possible - Add the `log/production.log` file from your system. Attention: Make sure no confidential data is in it! - Please write the issue in english - Don't remove the template - otherwise we will close the issue without further comments - Ask questions about Zammad configuration and usage at our mailinglist. See: https://zammad.org/participate Note: We always do our best. Unfortunately, sometimes there are too many requests and we can't handle everything at once. If you want to prioritize/escalate your issue, you can do so by means of a support contract (see https://zammad.com/pricing#selfhosted). * The upper textblock will be removed automatically when you submit your issue * --> ### Infos: * Used Zammad version: stable 5.1 * Installation method (source, package, ..): any * Operating system: any * Database + version: any * Elasticsearch version: any * Browser + version: any * The used mail client for verification was Roundcube v1.5.2 - Thunderbird was said to be "working". It is unknown how below code is being pasted. (This may technically play it's role) * This issue was originally found by "uli-heller" from our community: https://community.zammad.org/t/incoming-emails-some-parts-are-deleted/8246 ### Expected behavior: Zammad does not swallow text parts. ### Actual behavior: Zammad partly removes text passages in specific situations. In this sample html sanitizing seems to find its victim in `<pre><code></code></pre>` constructs: ![image](https://user-images.githubusercontent.com/6549061/160705511-2178a9a0-7682-4990-97ba-95f7132c608b.png) The content *is not* lost in raw articles but ticket articles only. Here's a affected mail your can import for verification your self. The constructed version of me does not contain some parameters - they didn't seem to matter. For completness: ``` <pre style=3D"font-size: 1em; font-family: Consolas, Inconsolata, Courier, = monospace; line-height: 1.2em; margin: 1.2em 0px;"><code style=3D"font-size= : 0.85em; font-family: Consolas, Inconsolata, Courier, monospace; margin: 0= px 0.15em; padding: 0.5em 0.7em; white-space: pre; border: 1px solid #ccccc= c; background-color: #f8f8f8; border-radius: 3px; display: block !important= ; overflow: auto;"> ``` ``` MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="=_e2d4c04609c2d7bd8a014063cc6120fa" Date: Tue, 29 Mar 2022 22:44:52 +0200 From: Community Verify <community-verify@zammad-hosting.com> To: jdoe@exmaple.com Subject: Test User-Agent: Roundcube Webmail (THA) Message-ID: <98a70575b3edfb20d543d57c7bcb982d@zammad-hosting.com> X-Sender: community-verify@zammad-hosting.com Organization: Zammad GmbH --=_e2d4c04609c2d7bd8a014063cc6120fa Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8; format=flowed Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Integer malesuada nunc vel risus commodo viverra. In aliquam sem fringilla ut. Enim sed faucibus turpis in eu mi bibendum neque egestas. Quis auctor elit sed vulputate mi sit amet mauris. Duis tristique sollicitudin nibh sit amet commodo nulla facilisi nullam. Egestas sed sed risus pretium quam. Maecenas sed enim ut sem. Id leo in vitae turpis massa sed elementum tempus. Tincidunt lobortis feugiat vivamus at. Commodo odio aenean sed adipiscing. Massa id neque aliquam vestibulum morbi blandit. Mauris cursus mattis molestie a. Morbi non arcu risus quis varius quam quisque id. Volutpat consequat mauris nunc congue nisi vitae suscipit. Aliquet eget sit amet tellus cras adipiscing enim. Viverra suspendisse potenti nullam ac tortor vitae. Et pharetra pharetra massa massa. Amet nisl suscipit adipiscing bibendum est ultricies integer quis auctor. Vestibulum morbi blandit cursus risus at ultrices. Malesuada nunc vel risus commodo viverra maecenas. Dictum at tempor commodo ullamcorper. Purus gravida quis blandit turpis cursus in hac habitasse platea. Felis bibendum ut tristique et egestas. Augue lacus viverra vitae congue eu consequat ac felis. Nunc eget lorem dolor sed viverra ipsum nunc aliquet. Ullamcorper velit sed ullamcorper morbi tincidunt ornare massa eget. Est ultricies integer quis auctor elit sed. apt-get update Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB] Hit:2 http://de.archive.ubuntu.com/ubuntu focal InRelease Hit:3 http://de.archive.ubuntu.com/ubuntu focal-updates InRelease Get:4 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ InRelease [3820 B] Hit:5 http://de.archive.ubuntu.com/ubuntu focal-backports InRelease Get:6 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ InRelease [3781 B] Get:7 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ Sources [2710 B] Get:8 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ Packages [6507 B] Get:9 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ Sources [9066 B] Get:10 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ Packages [23.8 kB] Get:11 http://security.ubuntu.com/ubuntu focal-security/main amd64 DEP-11 Metadata [40.6 kB] Get:12 http://security.ubuntu.com/ubuntu focal-security/universe amd64 DEP-11 Metadata [66.3 kB] Get:13 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 DEP-11 Metadata [2464 B] Fetched 273 kB in 1s (288 kB/s) Reading package lists... Batterie-Status prüfen Reading package lists... Building dependency tree... Semper eget duis at tellus at urna. Enim diam vulputate ut pharetra sit amet aliquam id diam. Sollicitudin tempor id eu nisl nunc. Amet justo donec enim diam vulputate ut pharetra sit. Massa tempor nec feugiat nisl pretium fusce id velit ut. Semper feugiat nibh sed pulvinar proin gravida hendrerit lectus. Convallis posuere morbi leo urna molestie at elementum eu. Blandit aliquam etiam erat velit scelerisque in. Nisl tincidunt eget nullam non nisi est sit amet facilisis. In hendrerit gravida rutrum quisque non tellus orci. Et leo duis ut diam quam. Quis hendrerit dolor magna eget. Magna eget est lorem ipsum. Sit amet volutpat consequat mauris nunc congue nisi vitae. Diam maecenas ultricies mi eget. Enim tortor at auctor urna. Nam at lectus urna duis convallis convallis tellus id interdum. Id aliquet lectus proin nibh nisl condimentum id. Vel elit scelerisque mauris pellentesque pulvinar pellentesque habitant. Vitae tortor condimentum lacinia quis vel eros. Dolor morbi non arcu risus quis varius. Nec nam aliquam sem et tortor consequat. Sagittis orci a scelerisque purus. Ultricies mi eget mauris pharetra et. Ut aliquam purus sit amet luctus venenatis lectus magna. Lectus vestibulum mattis ullamcorper velit sed ullamcorper morbi. Eu consequat ac felis donec et. Imperdiet dui accumsan sit amet nulla facilisi morbi tempus. Non odio euismod lacinia at quis risus. Est ullamcorper eget nulla facilisi etiam dignissim diam. Lectus sit amet est placerat. Lectus magna fringilla urna porttitor rhoncus dolor purus. Nec feugiat in fermentum posuere urna nec tincidunt praesent. Egestas quis ipsum suspendisse ultrices gravida dictum fusce. Volutpat sed cras ornare arcu dui vivamus. Quam viverra orci sagittis eu volutpat odio. Egestas sed tempus urna et pharetra pharetra massa massa ultricies. Sagittis nisl rhoncus mattis rhoncus urna neque viverra. Gravida dictum fusce ut placerat orci nulla pellentesque dignissim. Feugiat nibh sed pulvinar proin gravida hendrerit lectus. Molestie ac feugiat sed lectus vestibulum mattis. Sit amet purus gravida quis blandit. Massa vitae tortor condimentum lacinia. Ultricies lacus sed turpis tincidunt id aliquet. Rhoncus urna neque viverra justo nec ultrices. Vulputate odio ut enim blandit volutpat maecenas volutpat. Lorem sed risus ultricies tristique. -- My amazing company --=_e2d4c04609c2d7bd8a014063cc6120fa Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=UTF-8 <html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; charset= =3DUTF-8" /></head><body style=3D'font-size: 10pt'> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod = tempor incididunt ut labore et dolore magna aliqua. Integer malesuada nunc = vel risus commodo viverra. In aliquam sem fringilla ut. Enim sed faucibus t= urpis in eu mi bibendum neque egestas. Quis auctor elit sed vulputate mi si= t amet mauris. Duis tristique sollicitudin nibh sit amet commodo nulla faci= lisi nullam. Egestas sed sed risus pretium quam. Maecenas sed enim ut sem= =2E Id leo in vitae turpis massa sed elementum tempus. Tincidunt lobortis f= eugiat vivamus at. Commodo odio aenean sed adipiscing. Massa id neque aliqu= am vestibulum morbi blandit. Mauris cursus mattis molestie a. Morbi non arc= u risus quis varius quam quisque id. Volutpat consequat mauris nunc congue = nisi vitae suscipit. Aliquet eget sit amet tellus cras adipiscing enim.</p> <p>Viverra suspendisse potenti nullam ac tortor vitae. Et pharetra pharetra= massa massa. Amet nisl suscipit adipiscing bibendum est ultricies integer = quis auctor. Vestibulum morbi blandit cursus risus at ultrices. Malesuada n= unc vel risus commodo viverra maecenas. Dictum at tempor commodo ullamcorpe= r. Purus gravida quis blandit turpis cursus in hac habitasse platea. Felis = bibendum ut tristique et egestas. Augue lacus viverra vitae congue eu conse= quat ac felis. Nunc eget lorem dolor sed viverra ipsum nunc aliquet. Ullamc= orper velit sed ullamcorper morbi tincidunt ornare massa eget. Est ultricie= s integer quis auctor elit sed.</p> <pre><code>apt-get update Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB] Hit:2 http://de.archive.ubuntu.com/ubuntu focal InRelease Hit:3 http://de.archive.ubuntu.com/ubuntu focal-updates InRelease Get:4 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ InR= elease [3820 B] Hit:5 http://de.archive.ubuntu.com/ubuntu focal-backports InRelease Get:6 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ InRelease [3781 = B] Get:7 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ Sou= rces [2710 B] Get:8 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ Pac= kages [6507 B] Get:9 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ Sources [9066 B] Get:10 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ Packages [23.8 = kB] Get:11 http://security.ubuntu.com/ubuntu focal-security/main amd64 DEP-11 M= etadata [40.6 kB] Get:12 http://security.ubuntu.com/ubuntu focal-security/universe amd64 DEP-= 11 Metadata [66.3 kB] Get:13 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 DE= P-11 Metadata [2464 B] Fetched 273 kB in 1s (288 kB/s) Reading package lists... Batterie-Status pr&uuml;fen Reading package lists... Building dependency tree...</code></pre> <p>Semper eget duis at tellus at urna. Enim diam vulputate ut pharetra sit = amet aliquam id diam. Sollicitudin tempor id eu nisl nunc. Amet justo donec= enim diam vulputate ut pharetra sit. Massa tempor nec feugiat nisl pretium= fusce id velit ut. Semper feugiat nibh sed pulvinar proin gravida hendreri= t lectus. Convallis posuere morbi leo urna molestie at elementum eu. Blandi= t aliquam etiam erat velit scelerisque in. Nisl tincidunt eget nullam non n= isi est sit amet facilisis. In hendrerit gravida rutrum quisque non tellus = orci. Et leo duis ut diam quam. Quis hendrerit dolor magna eget. Magna eget= est lorem ipsum. Sit amet volutpat consequat mauris nunc congue nisi vitae= =2E Diam maecenas ultricies mi eget. Enim tortor at auctor urna.</p> <p>Nam at lectus urna duis convallis convallis tellus id interdum. Id aliqu= et lectus proin nibh nisl condimentum id. Vel elit scelerisque mauris pelle= ntesque pulvinar pellentesque habitant. Vitae tortor condimentum lacinia qu= is vel eros. Dolor morbi non arcu risus quis varius. Nec nam aliquam sem et= tortor consequat. Sagittis orci a scelerisque purus. Ultricies mi eget mau= ris pharetra et. Ut aliquam purus sit amet luctus venenatis lectus magna. L= ectus vestibulum mattis ullamcorper velit sed ullamcorper morbi. Eu consequ= at ac felis donec et. Imperdiet dui accumsan sit amet nulla facilisi morbi = tempus. Non odio euismod lacinia at quis risus. Est ullamcorper eget nulla = facilisi etiam dignissim diam. Lectus sit amet est placerat. Lectus magna f= ringilla urna porttitor rhoncus dolor purus. Nec feugiat in fermentum posue= re urna nec tincidunt praesent. Egestas quis ipsum suspendisse ultrices gra= vida dictum fusce. Volutpat sed cras ornare arcu dui vivamus.</p> <p>Quam viverra orci sagittis eu volutpat odio. Egestas sed tempus urna et = pharetra pharetra massa massa ultricies. Sagittis nisl rhoncus mattis rhonc= us urna neque viverra. Gravida dictum fusce ut placerat orci nulla pellente= sque dignissim. Feugiat nibh sed pulvinar proin gravida hendrerit lectus. M= olestie ac feugiat sed lectus vestibulum mattis. Sit amet purus gravida qui= s blandit. Massa vitae tortor condimentum lacinia. Ultricies lacus sed turp= is tincidunt id aliquet. Rhoncus urna neque viverra justo nec ultrices. Vul= putate odio ut enim blandit volutpat maecenas volutpat. Lorem sed risus ult= ricies tristique.</p> <div id=3D"signature"> <div class=3D"pre" style=3D"margin: 0; padding: 0; font-family: monospace">= <span class=3D"sig">--&nbsp;<br />My amazing company</span></div> </div> </body></html> --=_e2d4c04609c2d7bd8a014063cc6120fa-- ``` ### Steps to reproduce the behavior: * Import above sample and check the original (before import) with the imported article in Zammad Yes I'm sure this is a bug and no feature request or a general question.
1.0
pre-code tags cause Zammad to swallow content - <!-- Hi there - thanks for filing an issue. Please ensure the following things before creating an issue - thank you! 🤓 Since november 15th we handle all requests, except real bugs, at our community board. Full explanation: https://community.zammad.org/t/major-change-regarding-github-issues-community-board/21 Please post: - Feature requests - Development questions - Technical questions on the board -> https://community.zammad.org ! If you think you hit a bug, please continue: - Search existing issues and the CHANGELOG.md for your issue - there might be a solution already - Make sure to use the latest version of Zammad if possible - Add the `log/production.log` file from your system. Attention: Make sure no confidential data is in it! - Please write the issue in english - Don't remove the template - otherwise we will close the issue without further comments - Ask questions about Zammad configuration and usage at our mailinglist. See: https://zammad.org/participate Note: We always do our best. Unfortunately, sometimes there are too many requests and we can't handle everything at once. If you want to prioritize/escalate your issue, you can do so by means of a support contract (see https://zammad.com/pricing#selfhosted). * The upper textblock will be removed automatically when you submit your issue * --> ### Infos: * Used Zammad version: stable 5.1 * Installation method (source, package, ..): any * Operating system: any * Database + version: any * Elasticsearch version: any * Browser + version: any * The used mail client for verification was Roundcube v1.5.2 - Thunderbird was said to be "working". It is unknown how below code is being pasted. (This may technically play it's role) * This issue was originally found by "uli-heller" from our community: https://community.zammad.org/t/incoming-emails-some-parts-are-deleted/8246 ### Expected behavior: Zammad does not swallow text parts. ### Actual behavior: Zammad partly removes text passages in specific situations. In this sample html sanitizing seems to find its victim in `<pre><code></code></pre>` constructs: ![image](https://user-images.githubusercontent.com/6549061/160705511-2178a9a0-7682-4990-97ba-95f7132c608b.png) The content *is not* lost in raw articles but ticket articles only. Here's a affected mail your can import for verification your self. The constructed version of me does not contain some parameters - they didn't seem to matter. For completness: ``` <pre style=3D"font-size: 1em; font-family: Consolas, Inconsolata, Courier, = monospace; line-height: 1.2em; margin: 1.2em 0px;"><code style=3D"font-size= : 0.85em; font-family: Consolas, Inconsolata, Courier, monospace; margin: 0= px 0.15em; padding: 0.5em 0.7em; white-space: pre; border: 1px solid #ccccc= c; background-color: #f8f8f8; border-radius: 3px; display: block !important= ; overflow: auto;"> ``` ``` MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="=_e2d4c04609c2d7bd8a014063cc6120fa" Date: Tue, 29 Mar 2022 22:44:52 +0200 From: Community Verify <community-verify@zammad-hosting.com> To: jdoe@exmaple.com Subject: Test User-Agent: Roundcube Webmail (THA) Message-ID: <98a70575b3edfb20d543d57c7bcb982d@zammad-hosting.com> X-Sender: community-verify@zammad-hosting.com Organization: Zammad GmbH --=_e2d4c04609c2d7bd8a014063cc6120fa Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8; format=flowed Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Integer malesuada nunc vel risus commodo viverra. In aliquam sem fringilla ut. Enim sed faucibus turpis in eu mi bibendum neque egestas. Quis auctor elit sed vulputate mi sit amet mauris. Duis tristique sollicitudin nibh sit amet commodo nulla facilisi nullam. Egestas sed sed risus pretium quam. Maecenas sed enim ut sem. Id leo in vitae turpis massa sed elementum tempus. Tincidunt lobortis feugiat vivamus at. Commodo odio aenean sed adipiscing. Massa id neque aliquam vestibulum morbi blandit. Mauris cursus mattis molestie a. Morbi non arcu risus quis varius quam quisque id. Volutpat consequat mauris nunc congue nisi vitae suscipit. Aliquet eget sit amet tellus cras adipiscing enim. Viverra suspendisse potenti nullam ac tortor vitae. Et pharetra pharetra massa massa. Amet nisl suscipit adipiscing bibendum est ultricies integer quis auctor. Vestibulum morbi blandit cursus risus at ultrices. Malesuada nunc vel risus commodo viverra maecenas. Dictum at tempor commodo ullamcorper. Purus gravida quis blandit turpis cursus in hac habitasse platea. Felis bibendum ut tristique et egestas. Augue lacus viverra vitae congue eu consequat ac felis. Nunc eget lorem dolor sed viverra ipsum nunc aliquet. Ullamcorper velit sed ullamcorper morbi tincidunt ornare massa eget. Est ultricies integer quis auctor elit sed. apt-get update Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB] Hit:2 http://de.archive.ubuntu.com/ubuntu focal InRelease Hit:3 http://de.archive.ubuntu.com/ubuntu focal-updates InRelease Get:4 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ InRelease [3820 B] Hit:5 http://de.archive.ubuntu.com/ubuntu focal-backports InRelease Get:6 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ InRelease [3781 B] Get:7 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ Sources [2710 B] Get:8 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ Packages [6507 B] Get:9 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ Sources [9066 B] Get:10 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ Packages [23.8 kB] Get:11 http://security.ubuntu.com/ubuntu focal-security/main amd64 DEP-11 Metadata [40.6 kB] Get:12 http://security.ubuntu.com/ubuntu focal-security/universe amd64 DEP-11 Metadata [66.3 kB] Get:13 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 DEP-11 Metadata [2464 B] Fetched 273 kB in 1s (288 kB/s) Reading package lists... Batterie-Status prüfen Reading package lists... Building dependency tree... Semper eget duis at tellus at urna. Enim diam vulputate ut pharetra sit amet aliquam id diam. Sollicitudin tempor id eu nisl nunc. Amet justo donec enim diam vulputate ut pharetra sit. Massa tempor nec feugiat nisl pretium fusce id velit ut. Semper feugiat nibh sed pulvinar proin gravida hendrerit lectus. Convallis posuere morbi leo urna molestie at elementum eu. Blandit aliquam etiam erat velit scelerisque in. Nisl tincidunt eget nullam non nisi est sit amet facilisis. In hendrerit gravida rutrum quisque non tellus orci. Et leo duis ut diam quam. Quis hendrerit dolor magna eget. Magna eget est lorem ipsum. Sit amet volutpat consequat mauris nunc congue nisi vitae. Diam maecenas ultricies mi eget. Enim tortor at auctor urna. Nam at lectus urna duis convallis convallis tellus id interdum. Id aliquet lectus proin nibh nisl condimentum id. Vel elit scelerisque mauris pellentesque pulvinar pellentesque habitant. Vitae tortor condimentum lacinia quis vel eros. Dolor morbi non arcu risus quis varius. Nec nam aliquam sem et tortor consequat. Sagittis orci a scelerisque purus. Ultricies mi eget mauris pharetra et. Ut aliquam purus sit amet luctus venenatis lectus magna. Lectus vestibulum mattis ullamcorper velit sed ullamcorper morbi. Eu consequat ac felis donec et. Imperdiet dui accumsan sit amet nulla facilisi morbi tempus. Non odio euismod lacinia at quis risus. Est ullamcorper eget nulla facilisi etiam dignissim diam. Lectus sit amet est placerat. Lectus magna fringilla urna porttitor rhoncus dolor purus. Nec feugiat in fermentum posuere urna nec tincidunt praesent. Egestas quis ipsum suspendisse ultrices gravida dictum fusce. Volutpat sed cras ornare arcu dui vivamus. Quam viverra orci sagittis eu volutpat odio. Egestas sed tempus urna et pharetra pharetra massa massa ultricies. Sagittis nisl rhoncus mattis rhoncus urna neque viverra. Gravida dictum fusce ut placerat orci nulla pellentesque dignissim. Feugiat nibh sed pulvinar proin gravida hendrerit lectus. Molestie ac feugiat sed lectus vestibulum mattis. Sit amet purus gravida quis blandit. Massa vitae tortor condimentum lacinia. Ultricies lacus sed turpis tincidunt id aliquet. Rhoncus urna neque viverra justo nec ultrices. Vulputate odio ut enim blandit volutpat maecenas volutpat. Lorem sed risus ultricies tristique. -- My amazing company --=_e2d4c04609c2d7bd8a014063cc6120fa Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=UTF-8 <html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; charset= =3DUTF-8" /></head><body style=3D'font-size: 10pt'> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod = tempor incididunt ut labore et dolore magna aliqua. Integer malesuada nunc = vel risus commodo viverra. In aliquam sem fringilla ut. Enim sed faucibus t= urpis in eu mi bibendum neque egestas. Quis auctor elit sed vulputate mi si= t amet mauris. Duis tristique sollicitudin nibh sit amet commodo nulla faci= lisi nullam. Egestas sed sed risus pretium quam. Maecenas sed enim ut sem= =2E Id leo in vitae turpis massa sed elementum tempus. Tincidunt lobortis f= eugiat vivamus at. Commodo odio aenean sed adipiscing. Massa id neque aliqu= am vestibulum morbi blandit. Mauris cursus mattis molestie a. Morbi non arc= u risus quis varius quam quisque id. Volutpat consequat mauris nunc congue = nisi vitae suscipit. Aliquet eget sit amet tellus cras adipiscing enim.</p> <p>Viverra suspendisse potenti nullam ac tortor vitae. Et pharetra pharetra= massa massa. Amet nisl suscipit adipiscing bibendum est ultricies integer = quis auctor. Vestibulum morbi blandit cursus risus at ultrices. Malesuada n= unc vel risus commodo viverra maecenas. Dictum at tempor commodo ullamcorpe= r. Purus gravida quis blandit turpis cursus in hac habitasse platea. Felis = bibendum ut tristique et egestas. Augue lacus viverra vitae congue eu conse= quat ac felis. Nunc eget lorem dolor sed viverra ipsum nunc aliquet. Ullamc= orper velit sed ullamcorper morbi tincidunt ornare massa eget. Est ultricie= s integer quis auctor elit sed.</p> <pre><code>apt-get update Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB] Hit:2 http://de.archive.ubuntu.com/ubuntu focal InRelease Hit:3 http://de.archive.ubuntu.com/ubuntu focal-updates InRelease Get:4 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ InR= elease [3820 B] Hit:5 http://de.archive.ubuntu.com/ubuntu focal-backports InRelease Get:6 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ InRelease [3781 = B] Get:7 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ Sou= rces [2710 B] Get:8 http://10.10.21.205:3207/dprepo/ubuntu experimental/20.04_x86_64/ Pac= kages [6507 B] Get:9 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ Sources [9066 B] Get:10 http://10.10.21.205:3207/dprepo/ubuntu 20.04_x86_64/ Packages [23.8 = kB] Get:11 http://security.ubuntu.com/ubuntu focal-security/main amd64 DEP-11 M= etadata [40.6 kB] Get:12 http://security.ubuntu.com/ubuntu focal-security/universe amd64 DEP-= 11 Metadata [66.3 kB] Get:13 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 DE= P-11 Metadata [2464 B] Fetched 273 kB in 1s (288 kB/s) Reading package lists... Batterie-Status pr&uuml;fen Reading package lists... Building dependency tree...</code></pre> <p>Semper eget duis at tellus at urna. Enim diam vulputate ut pharetra sit = amet aliquam id diam. Sollicitudin tempor id eu nisl nunc. Amet justo donec= enim diam vulputate ut pharetra sit. Massa tempor nec feugiat nisl pretium= fusce id velit ut. Semper feugiat nibh sed pulvinar proin gravida hendreri= t lectus. Convallis posuere morbi leo urna molestie at elementum eu. Blandi= t aliquam etiam erat velit scelerisque in. Nisl tincidunt eget nullam non n= isi est sit amet facilisis. In hendrerit gravida rutrum quisque non tellus = orci. Et leo duis ut diam quam. Quis hendrerit dolor magna eget. Magna eget= est lorem ipsum. Sit amet volutpat consequat mauris nunc congue nisi vitae= =2E Diam maecenas ultricies mi eget. Enim tortor at auctor urna.</p> <p>Nam at lectus urna duis convallis convallis tellus id interdum. Id aliqu= et lectus proin nibh nisl condimentum id. Vel elit scelerisque mauris pelle= ntesque pulvinar pellentesque habitant. Vitae tortor condimentum lacinia qu= is vel eros. Dolor morbi non arcu risus quis varius. Nec nam aliquam sem et= tortor consequat. Sagittis orci a scelerisque purus. Ultricies mi eget mau= ris pharetra et. Ut aliquam purus sit amet luctus venenatis lectus magna. L= ectus vestibulum mattis ullamcorper velit sed ullamcorper morbi. Eu consequ= at ac felis donec et. Imperdiet dui accumsan sit amet nulla facilisi morbi = tempus. Non odio euismod lacinia at quis risus. Est ullamcorper eget nulla = facilisi etiam dignissim diam. Lectus sit amet est placerat. Lectus magna f= ringilla urna porttitor rhoncus dolor purus. Nec feugiat in fermentum posue= re urna nec tincidunt praesent. Egestas quis ipsum suspendisse ultrices gra= vida dictum fusce. Volutpat sed cras ornare arcu dui vivamus.</p> <p>Quam viverra orci sagittis eu volutpat odio. Egestas sed tempus urna et = pharetra pharetra massa massa ultricies. Sagittis nisl rhoncus mattis rhonc= us urna neque viverra. Gravida dictum fusce ut placerat orci nulla pellente= sque dignissim. Feugiat nibh sed pulvinar proin gravida hendrerit lectus. M= olestie ac feugiat sed lectus vestibulum mattis. Sit amet purus gravida qui= s blandit. Massa vitae tortor condimentum lacinia. Ultricies lacus sed turp= is tincidunt id aliquet. Rhoncus urna neque viverra justo nec ultrices. Vul= putate odio ut enim blandit volutpat maecenas volutpat. Lorem sed risus ult= ricies tristique.</p> <div id=3D"signature"> <div class=3D"pre" style=3D"margin: 0; padding: 0; font-family: monospace">= <span class=3D"sig">--&nbsp;<br />My amazing company</span></div> </div> </body></html> --=_e2d4c04609c2d7bd8a014063cc6120fa-- ``` ### Steps to reproduce the behavior: * Import above sample and check the original (before import) with the imported article in Zammad Yes I'm sure this is a bug and no feature request or a general question.
process
pre code tags cause zammad to swallow content hi there thanks for filing an issue please ensure the following things before creating an issue thank you 🤓 since november we handle all requests except real bugs at our community board full explanation please post feature requests development questions technical questions on the board if you think you hit a bug please continue search existing issues and the changelog md for your issue there might be a solution already make sure to use the latest version of zammad if possible add the log production log file from your system attention make sure no confidential data is in it please write the issue in english don t remove the template otherwise we will close the issue without further comments ask questions about zammad configuration and usage at our mailinglist see note we always do our best unfortunately sometimes there are too many requests and we can t handle everything at once if you want to prioritize escalate your issue you can do so by means of a support contract see the upper textblock will be removed automatically when you submit your issue infos used zammad version stable installation method source package any operating system any database version any elasticsearch version any browser version any the used mail client for verification was roundcube thunderbird was said to be working it is unknown how below code is being pasted this may technically play it s role this issue was originally found by uli heller from our community expected behavior zammad does not swallow text parts actual behavior zammad partly removes text passages in specific situations in this sample html sanitizing seems to find its victim in constructs the content is not lost in raw articles but ticket articles only here s a affected mail your can import for verification your self the constructed version of me does not contain some parameters they didn t seem to matter for completness pre style font size font family consolas inconsolata courier monospace line height margin code style font size font family consolas inconsolata courier monospace margin px padding white space pre border solid ccccc c background color border radius display block important overflow auto mime version content type multipart alternative boundary date tue mar from community verify to jdoe exmaple com subject test user agent roundcube webmail tha message id x sender community verify zammad hosting com organization zammad gmbh content transfer encoding content type text plain charset utf format flowed lorem ipsum dolor sit amet consectetur adipiscing elit sed do eiusmod tempor incididunt ut labore et dolore magna aliqua integer malesuada nunc vel risus commodo viverra in aliquam sem fringilla ut enim sed faucibus turpis in eu mi bibendum neque egestas quis auctor elit sed vulputate mi sit amet mauris duis tristique sollicitudin nibh sit amet commodo nulla facilisi nullam egestas sed sed risus pretium quam maecenas sed enim ut sem id leo in vitae turpis massa sed elementum tempus tincidunt lobortis feugiat vivamus at commodo odio aenean sed adipiscing massa id neque aliquam vestibulum morbi blandit mauris cursus mattis molestie a morbi non arcu risus quis varius quam quisque id volutpat consequat mauris nunc congue nisi vitae suscipit aliquet eget sit amet tellus cras adipiscing enim viverra suspendisse potenti nullam ac tortor vitae et pharetra pharetra massa massa amet nisl suscipit adipiscing bibendum est ultricies integer quis auctor vestibulum morbi blandit cursus risus at ultrices malesuada nunc vel risus commodo viverra maecenas dictum at tempor commodo ullamcorper purus gravida quis blandit turpis cursus in hac habitasse platea felis bibendum ut tristique et egestas augue lacus viverra vitae congue eu consequat ac felis nunc eget lorem dolor sed viverra ipsum nunc aliquet ullamcorper velit sed ullamcorper morbi tincidunt ornare massa eget est ultricies integer quis auctor elit sed apt get update get focal security inrelease kb hit focal inrelease hit focal updates inrelease get experimental inrelease hit focal backports inrelease get inrelease get experimental sources get experimental packages get sources b get packages get focal security main dep metadata get focal security universe dep metadata get focal security multiverse dep metadata fetched kb in kb s reading package lists batterie status prüfen reading package lists building dependency tree semper eget duis at tellus at urna enim diam vulputate ut pharetra sit amet aliquam id diam sollicitudin tempor id eu nisl nunc amet justo donec enim diam vulputate ut pharetra sit massa tempor nec feugiat nisl pretium fusce id velit ut semper feugiat nibh sed pulvinar proin gravida hendrerit lectus convallis posuere morbi leo urna molestie at elementum eu blandit aliquam etiam erat velit scelerisque in nisl tincidunt eget nullam non nisi est sit amet facilisis in hendrerit gravida rutrum quisque non tellus orci et leo duis ut diam quam quis hendrerit dolor magna eget magna eget est lorem ipsum sit amet volutpat consequat mauris nunc congue nisi vitae diam maecenas ultricies mi eget enim tortor at auctor urna nam at lectus urna duis convallis convallis tellus id interdum id aliquet lectus proin nibh nisl condimentum id vel elit scelerisque mauris pellentesque pulvinar pellentesque habitant vitae tortor condimentum lacinia quis vel eros dolor morbi non arcu risus quis varius nec nam aliquam sem et tortor consequat sagittis orci a scelerisque purus ultricies mi eget mauris pharetra et ut aliquam purus sit amet luctus venenatis lectus magna lectus vestibulum mattis ullamcorper velit sed ullamcorper morbi eu consequat ac felis donec et imperdiet dui accumsan sit amet nulla facilisi morbi tempus non odio euismod lacinia at quis risus est ullamcorper eget nulla facilisi etiam dignissim diam lectus sit amet est placerat lectus magna fringilla urna porttitor rhoncus dolor purus nec feugiat in fermentum posuere urna nec tincidunt praesent egestas quis ipsum suspendisse ultrices gravida dictum fusce volutpat sed cras ornare arcu dui vivamus quam viverra orci sagittis eu volutpat odio egestas sed tempus urna et pharetra pharetra massa massa ultricies sagittis nisl rhoncus mattis rhoncus urna neque viverra gravida dictum fusce ut placerat orci nulla pellentesque dignissim feugiat nibh sed pulvinar proin gravida hendrerit lectus molestie ac feugiat sed lectus vestibulum mattis sit amet purus gravida quis blandit massa vitae tortor condimentum lacinia ultricies lacus sed turpis tincidunt id aliquet rhoncus urna neque viverra justo nec ultrices vulputate odio ut enim blandit volutpat maecenas volutpat lorem sed risus ultricies tristique my amazing company content transfer encoding quoted printable content type text html charset utf meta http equiv content type content text html charset lorem ipsum dolor sit amet consectetur adipiscing elit sed do eiusmod tempor incididunt ut labore et dolore magna aliqua integer malesuada nunc vel risus commodo viverra in aliquam sem fringilla ut enim sed faucibus t urpis in eu mi bibendum neque egestas quis auctor elit sed vulputate mi si t amet mauris duis tristique sollicitudin nibh sit amet commodo nulla faci lisi nullam egestas sed sed risus pretium quam maecenas sed enim ut sem id leo in vitae turpis massa sed elementum tempus tincidunt lobortis f eugiat vivamus at commodo odio aenean sed adipiscing massa id neque aliqu am vestibulum morbi blandit mauris cursus mattis molestie a morbi non arc u risus quis varius quam quisque id volutpat consequat mauris nunc congue nisi vitae suscipit aliquet eget sit amet tellus cras adipiscing enim viverra suspendisse potenti nullam ac tortor vitae et pharetra pharetra massa massa amet nisl suscipit adipiscing bibendum est ultricies integer quis auctor vestibulum morbi blandit cursus risus at ultrices malesuada n unc vel risus commodo viverra maecenas dictum at tempor commodo ullamcorpe r purus gravida quis blandit turpis cursus in hac habitasse platea felis bibendum ut tristique et egestas augue lacus viverra vitae congue eu conse quat ac felis nunc eget lorem dolor sed viverra ipsum nunc aliquet ullamc orper velit sed ullamcorper morbi tincidunt ornare massa eget est ultricie s integer quis auctor elit sed apt get update get focal security inrelease hit focal inrelease hit focal updates inrelease get experimental inr elease hit focal backports inrelease get inrelease b get experimental sou rces get experimental pac kages get sources get packages kb get focal security main dep m etadata get focal security universe dep metadata get focal security multiverse de p metadata fetched kb in kb s reading package lists batterie status pr uuml fen reading package lists building dependency tree semper eget duis at tellus at urna enim diam vulputate ut pharetra sit amet aliquam id diam sollicitudin tempor id eu nisl nunc amet justo donec enim diam vulputate ut pharetra sit massa tempor nec feugiat nisl pretium fusce id velit ut semper feugiat nibh sed pulvinar proin gravida hendreri t lectus convallis posuere morbi leo urna molestie at elementum eu blandi t aliquam etiam erat velit scelerisque in nisl tincidunt eget nullam non n isi est sit amet facilisis in hendrerit gravida rutrum quisque non tellus orci et leo duis ut diam quam quis hendrerit dolor magna eget magna eget est lorem ipsum sit amet volutpat consequat mauris nunc congue nisi vitae diam maecenas ultricies mi eget enim tortor at auctor urna nam at lectus urna duis convallis convallis tellus id interdum id aliqu et lectus proin nibh nisl condimentum id vel elit scelerisque mauris pelle ntesque pulvinar pellentesque habitant vitae tortor condimentum lacinia qu is vel eros dolor morbi non arcu risus quis varius nec nam aliquam sem et tortor consequat sagittis orci a scelerisque purus ultricies mi eget mau ris pharetra et ut aliquam purus sit amet luctus venenatis lectus magna l ectus vestibulum mattis ullamcorper velit sed ullamcorper morbi eu consequ at ac felis donec et imperdiet dui accumsan sit amet nulla facilisi morbi tempus non odio euismod lacinia at quis risus est ullamcorper eget nulla facilisi etiam dignissim diam lectus sit amet est placerat lectus magna f ringilla urna porttitor rhoncus dolor purus nec feugiat in fermentum posue re urna nec tincidunt praesent egestas quis ipsum suspendisse ultrices gra vida dictum fusce volutpat sed cras ornare arcu dui vivamus quam viverra orci sagittis eu volutpat odio egestas sed tempus urna et pharetra pharetra massa massa ultricies sagittis nisl rhoncus mattis rhonc us urna neque viverra gravida dictum fusce ut placerat orci nulla pellente sque dignissim feugiat nibh sed pulvinar proin gravida hendrerit lectus m olestie ac feugiat sed lectus vestibulum mattis sit amet purus gravida qui s blandit massa vitae tortor condimentum lacinia ultricies lacus sed turp is tincidunt id aliquet rhoncus urna neque viverra justo nec ultrices vul putate odio ut enim blandit volutpat maecenas volutpat lorem sed risus ult ricies tristique nbsp my amazing company steps to reproduce the behavior import above sample and check the original before import with the imported article in zammad yes i m sure this is a bug and no feature request or a general question
1
497,716
14,383,476,979
IssuesEvent
2020-12-02 09:10:47
mozilla/OpenWPM
https://api.github.com/repos/mozilla/OpenWPM
closed
Turn browser_params and manager_params into dataclasses and validate them
developer-experience enhancement good-first-bug high-priority
A mistyped or unknown configuration parameter in `browser_params` or `manager_params` will currently not throw an error. This may lead to missing data that's not discovered until the end of a crawl. We should validate that the configuration parameters are valid before starting a measurement. We can do this basic check by using [dataclasses](https://docs.python.org/3/library/dataclasses.html) and [dataclass-json](https://github.com/lidatong/dataclasses-json). This allows us to work with objects that have fields instead of having dicts. These classes should have comments for each field explaining its use and type annotations to ensure proper usage. We could then remove [`default_browser_params.json`](https://github.com/mozilla/OpenWPM/blob/7d118c9528d7bc94c44dd34f211802033b5ca9bd/automation/default_browser_params.json) and [`default_manager_params.json`](https://github.com/mozilla/OpenWPM/blob/7d118c9528d7bc94c44dd34f211802033b5ca9bd/automation/default_manager_params.json) and instead set the values there as default values in the class. Once we have these classes we should then write three functions: 1. `validate_manager_params` which would accept a `ManagerParams` object 2. `validate_browser_params` which would accept a `BrowserParams` object 3. `validate_run_config` which accepts one `ManagerParams` and a list of `BrowserParams` All of these should raise a `ConfigError` if anything is invalid. We currently have a bunch of code spread throughout the code base that checks the validity of different configs at different points in time. Examples: - [`save_content`](https://github.com/mozilla/OpenWPM/blob/7d118c9528d7bc94c44dd34f211802033b5ca9bd/automation/DeployBrowsers/deploy_firefox.py#L125-L129) - This belongs into `validate_run_config` - [`browser`](https://github.com/mozilla/OpenWPM/blob/65337e0c19dc857f63bbca1b3aa3773a2c49fd42/automation/DeployBrowsers/deploy_browser.py#L7) - This belongs into `validate_browser_params` - [`callstack_instrument`](https://github.com/mozilla/OpenWPM/blob/65337e0c19dc857f63bbca1b3aa3773a2c49fd42/automation/DeployBrowsers/deploy_firefox.py#L107-L113) - This belongs into `validate_browser_params` - [`save_content`](https://github.com/mozilla/OpenWPM/blob/65337e0c19dc857f63bbca1b3aa3773a2c49fd42/automation/DeployBrowsers/deploy_firefox.py#L115-L125) - This belongs into `validate_browser_params` More cases can be found by looking for where a `BrowserConfigError` gets raised in the code base. See #493 and #494 as examples of issues that arise from not having config validation.
1.0
Turn browser_params and manager_params into dataclasses and validate them - A mistyped or unknown configuration parameter in `browser_params` or `manager_params` will currently not throw an error. This may lead to missing data that's not discovered until the end of a crawl. We should validate that the configuration parameters are valid before starting a measurement. We can do this basic check by using [dataclasses](https://docs.python.org/3/library/dataclasses.html) and [dataclass-json](https://github.com/lidatong/dataclasses-json). This allows us to work with objects that have fields instead of having dicts. These classes should have comments for each field explaining its use and type annotations to ensure proper usage. We could then remove [`default_browser_params.json`](https://github.com/mozilla/OpenWPM/blob/7d118c9528d7bc94c44dd34f211802033b5ca9bd/automation/default_browser_params.json) and [`default_manager_params.json`](https://github.com/mozilla/OpenWPM/blob/7d118c9528d7bc94c44dd34f211802033b5ca9bd/automation/default_manager_params.json) and instead set the values there as default values in the class. Once we have these classes we should then write three functions: 1. `validate_manager_params` which would accept a `ManagerParams` object 2. `validate_browser_params` which would accept a `BrowserParams` object 3. `validate_run_config` which accepts one `ManagerParams` and a list of `BrowserParams` All of these should raise a `ConfigError` if anything is invalid. We currently have a bunch of code spread throughout the code base that checks the validity of different configs at different points in time. Examples: - [`save_content`](https://github.com/mozilla/OpenWPM/blob/7d118c9528d7bc94c44dd34f211802033b5ca9bd/automation/DeployBrowsers/deploy_firefox.py#L125-L129) - This belongs into `validate_run_config` - [`browser`](https://github.com/mozilla/OpenWPM/blob/65337e0c19dc857f63bbca1b3aa3773a2c49fd42/automation/DeployBrowsers/deploy_browser.py#L7) - This belongs into `validate_browser_params` - [`callstack_instrument`](https://github.com/mozilla/OpenWPM/blob/65337e0c19dc857f63bbca1b3aa3773a2c49fd42/automation/DeployBrowsers/deploy_firefox.py#L107-L113) - This belongs into `validate_browser_params` - [`save_content`](https://github.com/mozilla/OpenWPM/blob/65337e0c19dc857f63bbca1b3aa3773a2c49fd42/automation/DeployBrowsers/deploy_firefox.py#L115-L125) - This belongs into `validate_browser_params` More cases can be found by looking for where a `BrowserConfigError` gets raised in the code base. See #493 and #494 as examples of issues that arise from not having config validation.
non_process
turn browser params and manager params into dataclasses and validate them a mistyped or unknown configuration parameter in browser params or manager params will currently not throw an error this may lead to missing data that s not discovered until the end of a crawl we should validate that the configuration parameters are valid before starting a measurement we can do this basic check by using and this allows us to work with objects that have fields instead of having dicts these classes should have comments for each field explaining its use and type annotations to ensure proper usage we could then remove and and instead set the values there as default values in the class once we have these classes we should then write three functions validate manager params which would accept a managerparams object validate browser params which would accept a browserparams object validate run config which accepts one managerparams and a list of browserparams all of these should raise a configerror if anything is invalid we currently have a bunch of code spread throughout the code base that checks the validity of different configs at different points in time examples this belongs into validate run config this belongs into validate browser params this belongs into validate browser params this belongs into validate browser params more cases can be found by looking for where a browserconfigerror gets raised in the code base see and as examples of issues that arise from not having config validation
0
705
3,201,196,159
IssuesEvent
2015-10-02 04:06:29
sebastianbergmann/phpunit
https://api.github.com/repos/sebastianbergmann/phpunit
closed
Stabilization Phase for new releases (nightly beta-quality builds)
process rfc
With the current [release process](https://github.com/sebastianbergmann/phpunit/wiki/Release-Process) for PHPUnit a new release branch is created every two months. Beta-quality releases are made built nightly from this release branch until the first stable version is released from it. Given the fact that over the course of the first year of using this release process we have not received any feedback based on these nightly builds (at least as far as I am aware of) it begs the question whether having this two-month stabilization period makes sense.
1.0
Stabilization Phase for new releases (nightly beta-quality builds) - With the current [release process](https://github.com/sebastianbergmann/phpunit/wiki/Release-Process) for PHPUnit a new release branch is created every two months. Beta-quality releases are made built nightly from this release branch until the first stable version is released from it. Given the fact that over the course of the first year of using this release process we have not received any feedback based on these nightly builds (at least as far as I am aware of) it begs the question whether having this two-month stabilization period makes sense.
process
stabilization phase for new releases nightly beta quality builds with the current for phpunit a new release branch is created every two months beta quality releases are made built nightly from this release branch until the first stable version is released from it given the fact that over the course of the first year of using this release process we have not received any feedback based on these nightly builds at least as far as i am aware of it begs the question whether having this two month stabilization period makes sense
1
294,492
25,376,606,214
IssuesEvent
2022-11-21 14:33:12
void-linux/void-packages
https://api.github.com/repos/void-linux/void-packages
opened
octoxbps is broken
bug needs-testing
### Is this a new report? Yes ### System Info Void 6.0.9_1 x86_64 GenuineIntel uptodate FFFFF ### Package(s) Affected octoxbps-0.3.0_3 ### Does a report exist for this bug with the project's home (upstream) and/or another distro? - ### Expected behaviour the program starts properly. ### Actual behaviour ``` ➜ ~ octoxbps octoxbps: symbol lookup error: octoxbps: undefined symbol: _ZN11QTermWidget20setScrollBarPositionENS_17ScrollBarPositionE ➜ ~ ``` ### Steps to reproduce 1. `xbps-install -S octoxbps` 2. run `octoxbps` in terminal
1.0
octoxbps is broken - ### Is this a new report? Yes ### System Info Void 6.0.9_1 x86_64 GenuineIntel uptodate FFFFF ### Package(s) Affected octoxbps-0.3.0_3 ### Does a report exist for this bug with the project's home (upstream) and/or another distro? - ### Expected behaviour the program starts properly. ### Actual behaviour ``` ➜ ~ octoxbps octoxbps: symbol lookup error: octoxbps: undefined symbol: _ZN11QTermWidget20setScrollBarPositionENS_17ScrollBarPositionE ➜ ~ ``` ### Steps to reproduce 1. `xbps-install -S octoxbps` 2. run `octoxbps` in terminal
non_process
octoxbps is broken is this a new report yes system info void genuineintel uptodate fffff package s affected octoxbps does a report exist for this bug with the project s home upstream and or another distro expected behaviour the program starts properly actual behaviour ➜ octoxbps octoxbps symbol lookup error octoxbps undefined symbol ➜ steps to reproduce xbps install s octoxbps run octoxbps in terminal
0
13,881
16,654,723,646
IssuesEvent
2021-06-05 10:03:41
GoogleCloudPlatform/fda-mystudies
https://api.github.com/repos/GoogleCloudPlatform/fda-mystudies
closed
[PM] Responsive issue when user clicks on the logo
Bug P2 Participant manager Process: Fixed Process: Tested dev
AR: Studies tab is getting highlighted when the user click s on the customer logo ER: Sites tab should be highlighted when the user clicks on the customer logo ![mbss](https://user-images.githubusercontent.com/71445210/115670194-c5798800-a366-11eb-9bf4-75d9092219c0.png)
2.0
[PM] Responsive issue when user clicks on the logo - AR: Studies tab is getting highlighted when the user click s on the customer logo ER: Sites tab should be highlighted when the user clicks on the customer logo ![mbss](https://user-images.githubusercontent.com/71445210/115670194-c5798800-a366-11eb-9bf4-75d9092219c0.png)
process
responsive issue when user clicks on the logo ar studies tab is getting highlighted when the user click s on the customer logo er sites tab should be highlighted when the user clicks on the customer logo
1
87,765
17,373,463,667
IssuesEvent
2021-07-30 17:05:19
eclipse-theia/theia
https://api.github.com/repos/eclipse-theia/theia
closed
Color Picker extension doesn't work
:thinking: needs more info vscode
### Bug Description: Clicking on "Pick Color" command throws an error that extension activation failed. Doesn't happen in vscode. ### Steps to Reproduce: 1. Install "Color Picker" extension (anseki.vscode-color) from Open VSX Registry 2. Ctrl + Shift + p 3. Click on "Pick Color" I get the following error: Activating extension 'Color Picker' failed. ### Additional Information - Operating System: mac OS 11.0.1 - Theia Version: master
1.0
Color Picker extension doesn't work - ### Bug Description: Clicking on "Pick Color" command throws an error that extension activation failed. Doesn't happen in vscode. ### Steps to Reproduce: 1. Install "Color Picker" extension (anseki.vscode-color) from Open VSX Registry 2. Ctrl + Shift + p 3. Click on "Pick Color" I get the following error: Activating extension 'Color Picker' failed. ### Additional Information - Operating System: mac OS 11.0.1 - Theia Version: master
non_process
color picker extension doesn t work bug description clicking on pick color command throws an error that extension activation failed doesn t happen in vscode steps to reproduce install color picker extension anseki vscode color from open vsx registry ctrl shift p click on pick color i get the following error activating extension color picker failed additional information operating system mac os theia version master
0
127,033
18,010,239,882
IssuesEvent
2021-09-16 07:45:04
maddyCode23/linux-4.1.15
https://api.github.com/repos/maddyCode23/linux-4.1.15
opened
CVE-2016-10147 (Medium) detected in linux-stable-rtv4.1.33
security vulnerability
## CVE-2016-10147 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/crypto/mcryptd.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5). <p>Publish Date: 2017-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10147>CVE-2016-10147</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10147">https://nvd.nist.gov/vuln/detail/CVE-2016-10147</a></p> <p>Release Date: 2017-01-18</p> <p>Fix Resolution: 4.8.15</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-10147 (Medium) detected in linux-stable-rtv4.1.33 - ## CVE-2016-10147 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/crypto/mcryptd.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5). <p>Publish Date: 2017-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10147>CVE-2016-10147</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10147">https://nvd.nist.gov/vuln/detail/CVE-2016-10147</a></p> <p>Release Date: 2017-01-18</p> <p>Fix Resolution: 4.8.15</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href vulnerable source files crypto mcryptd c vulnerability details crypto mcryptd c in the linux kernel before allows local users to cause a denial of service null pointer dereference and system crash by using an af alg socket with an incompatible algorithm as demonstrated by mcryptd publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
3,077
6,086,913,076
IssuesEvent
2017-06-18 07:20:44
eranhd/Anti-Drug-Jerusalem
https://api.github.com/repos/eranhd/Anti-Drug-Jerusalem
closed
בהגדרת דוחות להוסיף אפשרות של הוספת תגית select עם ערכים מסוימים וערך אחד קבוע
in process
בנתיים יש אפשרות להוסיף רק שדות טקסט או מספרים, צריך גם למחוק את התיאור באנגלית ולתת id כלשהו לא משנה איזה, אולי להגריל רנדומלי
1.0
בהגדרת דוחות להוסיף אפשרות של הוספת תגית select עם ערכים מסוימים וערך אחד קבוע - בנתיים יש אפשרות להוסיף רק שדות טקסט או מספרים, צריך גם למחוק את התיאור באנגלית ולתת id כלשהו לא משנה איזה, אולי להגריל רנדומלי
process
בהגדרת דוחות להוסיף אפשרות של הוספת תגית select עם ערכים מסוימים וערך אחד קבוע בנתיים יש אפשרות להוסיף רק שדות טקסט או מספרים צריך גם למחוק את התיאור באנגלית ולתת id כלשהו לא משנה איזה אולי להגריל רנדומלי
1
18,552
24,555,427,145
IssuesEvent
2022-10-12 15:30:47
GoogleCloudPlatform/fda-mystudies
https://api.github.com/repos/GoogleCloudPlatform/fda-mystudies
closed
[iOS] Form step questions with 'Repeat form' option > UI issue
Bug P2 iOS Process: Fixed Process: Tested dev
Form step questions with 'Repeat form' option > UI issue > 'Repeat' text should align middle to the white layout ( both vertically and horizontally) ![image](https://user-images.githubusercontent.com/71445210/191534883-fec8839b-a43b-44cd-8b9e-0ade216a63fb.png)
2.0
[iOS] Form step questions with 'Repeat form' option > UI issue - Form step questions with 'Repeat form' option > UI issue > 'Repeat' text should align middle to the white layout ( both vertically and horizontally) ![image](https://user-images.githubusercontent.com/71445210/191534883-fec8839b-a43b-44cd-8b9e-0ade216a63fb.png)
process
form step questions with repeat form option ui issue form step questions with repeat form option ui issue repeat text should align middle to the white layout both vertically and horizontally
1
20,397
27,054,616,907
IssuesEvent
2023-02-13 15:23:22
BioKIC/symbiota-docs
https://api.github.com/repos/BioKIC/symbiota-docs
closed
Improve Symbiota Docs search function
symbiota-docs in process
When searching using a keyword, the search results are listed alphabetically (I think?) rather than in order of relevance. For example, here is the result of searching for the word "permissions" ![image](https://user-images.githubusercontent.com/16688784/144085211-0394ba7d-88da-41b1-aad4-d81617cd83e4.png) "Permissions" is only a keyword for two pages called User Permissions, but these are listed at the very bottom of the search results (which you have to access by scrolling down in the search results, which is not intuitive to do, since there is no scroll bar). If there is a way to improve the search function, that would be great. Otherwise, we should at least add a scroll bar to the search results if at all possible.
1.0
Improve Symbiota Docs search function - When searching using a keyword, the search results are listed alphabetically (I think?) rather than in order of relevance. For example, here is the result of searching for the word "permissions" ![image](https://user-images.githubusercontent.com/16688784/144085211-0394ba7d-88da-41b1-aad4-d81617cd83e4.png) "Permissions" is only a keyword for two pages called User Permissions, but these are listed at the very bottom of the search results (which you have to access by scrolling down in the search results, which is not intuitive to do, since there is no scroll bar). If there is a way to improve the search function, that would be great. Otherwise, we should at least add a scroll bar to the search results if at all possible.
process
improve symbiota docs search function when searching using a keyword the search results are listed alphabetically i think rather than in order of relevance for example here is the result of searching for the word permissions permissions is only a keyword for two pages called user permissions but these are listed at the very bottom of the search results which you have to access by scrolling down in the search results which is not intuitive to do since there is no scroll bar if there is a way to improve the search function that would be great otherwise we should at least add a scroll bar to the search results if at all possible
1
27,325
12,540,635,001
IssuesEvent
2020-06-05 10:44:32
elastic/beats
https://api.github.com/repos/elastic/beats
closed
Need help with custom Filebeat modules, no input data in real tests but local dev test yes
Team:Services [zube]: Inbox
Hi there, i created my own filebeat module, "filebeat-modules-devguide" served as the basis. All tests had been successful and now wanted to test them in real. The index and the ingest pipelines are created successfully, also a UDP server is started on the corresponding filebeat port. However, no data is received from the UDP port, even though it is sent and also arrives (tested with tcpdump). For confirmed bugs, please report: - Version: latest git or master - Operating System: centos 7 - Discuss Forum URL: https://discuss.elastic.co/t/need-help-with-custom-filebeat-modules-no-input-data-in-real-tests-but-local-dev-test-yes/235374 Sorry i come here from the forum, because i have no idea about this problem and currently no solution. At first i thought it was a problem with my module, but it is not. For testing, i defined an udp input (and a file output) in filebeat.yml that listens on port 9004. The data also arrives here verifiably, tested with wireshark. But in the debug log you see nothing, except the message "Run input" but no data. filebeat -e -d "*" `2020-06-04T14:52:29.978+0200 INFO registrar/registrar.go:145 Loading registrar data from /var/lib/filebeat/registry/filebeat/data.json 2020-06-04T14:52:29.978+0200 INFO registrar/registrar.go:152 States Loaded from registrar: 0 2020-06-04T14:52:29.978+0200 INFO beater/crawler.go:73 Loading Inputs: 2 2020-06-04T14:52:29.978+0200 DEBUG [registrar] registrar/registrar.go:278 Starting Registrar 2020-06-04T14:52:29.978+0200 INFO input/input.go:114 Starting input of type: udp; ID: 2603727068719157343 2020-06-04T14:52:29.979+0200 DEBUG [cfgfile] cfgfile/reload.go:137 Checking module configs from: /etc/filebeat/modules.d/*.yml 2020-06-04T14:52:29.979+0200 INFO udp/input.go:103 Starting UDP input 2020-06-04T14:52:29.979+0200 DEBUG [cfgfile] cfgfile/reload.go:151 Number of module configs found: 0 2020-06-04T14:52:29.979+0200 INFO beater/crawler.go:105 Loading and starting Inputs completed. Enabled inputs: 1 2020-06-04T14:52:29.979+0200 INFO cfgfile/reload.go:175 Config reloader started 2020-06-04T14:52:29.979+0200 DEBUG [cfgfile] cfgfile/reload.go:205 Scan for new config files 2020-06-04T14:52:29.979+0200 INFO [udp] udp/server.go:81 Started listening for UDP connection {"address": "0.0.0.0:9004"} 2020-06-04T14:52:29.979+0200 DEBUG [cfgfile] cfgfile/reload.go:224 Number of module configs found: 0 2020-06-04T14:52:29.979+0200 DEBUG [reload] cfgfile/list.go:62 Starting reload procedure, current runners: 0 2020-06-04T14:52:29.979+0200 DEBUG [reload] cfgfile/list.go:80 Start list: 0, Stop list: 0 2020-06-04T14:52:29.979+0200 INFO cfgfile/reload.go:235 Loading of config files completed. 2020-06-04T14:52:39.979+0200 DEBUG [input] input/input.go:152 Run input 2020-06-04T14:52:49.979+0200 DEBUG [input] input/input.go:152 Run input` Why don't you see any data in the debug? How can i ensure / see which data is received by the input module tcp / udp. I'm grateful for any help. StefanS
1.0
Need help with custom Filebeat modules, no input data in real tests but local dev test yes - Hi there, i created my own filebeat module, "filebeat-modules-devguide" served as the basis. All tests had been successful and now wanted to test them in real. The index and the ingest pipelines are created successfully, also a UDP server is started on the corresponding filebeat port. However, no data is received from the UDP port, even though it is sent and also arrives (tested with tcpdump). For confirmed bugs, please report: - Version: latest git or master - Operating System: centos 7 - Discuss Forum URL: https://discuss.elastic.co/t/need-help-with-custom-filebeat-modules-no-input-data-in-real-tests-but-local-dev-test-yes/235374 Sorry i come here from the forum, because i have no idea about this problem and currently no solution. At first i thought it was a problem with my module, but it is not. For testing, i defined an udp input (and a file output) in filebeat.yml that listens on port 9004. The data also arrives here verifiably, tested with wireshark. But in the debug log you see nothing, except the message "Run input" but no data. filebeat -e -d "*" `2020-06-04T14:52:29.978+0200 INFO registrar/registrar.go:145 Loading registrar data from /var/lib/filebeat/registry/filebeat/data.json 2020-06-04T14:52:29.978+0200 INFO registrar/registrar.go:152 States Loaded from registrar: 0 2020-06-04T14:52:29.978+0200 INFO beater/crawler.go:73 Loading Inputs: 2 2020-06-04T14:52:29.978+0200 DEBUG [registrar] registrar/registrar.go:278 Starting Registrar 2020-06-04T14:52:29.978+0200 INFO input/input.go:114 Starting input of type: udp; ID: 2603727068719157343 2020-06-04T14:52:29.979+0200 DEBUG [cfgfile] cfgfile/reload.go:137 Checking module configs from: /etc/filebeat/modules.d/*.yml 2020-06-04T14:52:29.979+0200 INFO udp/input.go:103 Starting UDP input 2020-06-04T14:52:29.979+0200 DEBUG [cfgfile] cfgfile/reload.go:151 Number of module configs found: 0 2020-06-04T14:52:29.979+0200 INFO beater/crawler.go:105 Loading and starting Inputs completed. Enabled inputs: 1 2020-06-04T14:52:29.979+0200 INFO cfgfile/reload.go:175 Config reloader started 2020-06-04T14:52:29.979+0200 DEBUG [cfgfile] cfgfile/reload.go:205 Scan for new config files 2020-06-04T14:52:29.979+0200 INFO [udp] udp/server.go:81 Started listening for UDP connection {"address": "0.0.0.0:9004"} 2020-06-04T14:52:29.979+0200 DEBUG [cfgfile] cfgfile/reload.go:224 Number of module configs found: 0 2020-06-04T14:52:29.979+0200 DEBUG [reload] cfgfile/list.go:62 Starting reload procedure, current runners: 0 2020-06-04T14:52:29.979+0200 DEBUG [reload] cfgfile/list.go:80 Start list: 0, Stop list: 0 2020-06-04T14:52:29.979+0200 INFO cfgfile/reload.go:235 Loading of config files completed. 2020-06-04T14:52:39.979+0200 DEBUG [input] input/input.go:152 Run input 2020-06-04T14:52:49.979+0200 DEBUG [input] input/input.go:152 Run input` Why don't you see any data in the debug? How can i ensure / see which data is received by the input module tcp / udp. I'm grateful for any help. StefanS
non_process
need help with custom filebeat modules no input data in real tests but local dev test yes hi there i created my own filebeat module filebeat modules devguide served as the basis all tests had been successful and now wanted to test them in real the index and the ingest pipelines are created successfully also a udp server is started on the corresponding filebeat port however no data is received from the udp port even though it is sent and also arrives tested with tcpdump for confirmed bugs please report version latest git or master operating system centos discuss forum url sorry i come here from the forum because i have no idea about this problem and currently no solution at first i thought it was a problem with my module but it is not for testing i defined an udp input and a file output in filebeat yml that listens on port the data also arrives here verifiably tested with wireshark but in the debug log you see nothing except the message run input but no data filebeat e d info registrar registrar go loading registrar data from var lib filebeat registry filebeat data json info registrar registrar go states loaded from registrar info beater crawler go loading inputs debug registrar registrar go starting registrar info input input go starting input of type udp id debug cfgfile reload go checking module configs from etc filebeat modules d yml info udp input go starting udp input debug cfgfile reload go number of module configs found info beater crawler go loading and starting inputs completed enabled inputs info cfgfile reload go config reloader started debug cfgfile reload go scan for new config files info udp server go started listening for udp connection address debug cfgfile reload go number of module configs found debug cfgfile list go starting reload procedure current runners debug cfgfile list go start list stop list info cfgfile reload go loading of config files completed debug input input go run input debug input input go run input why don t you see any data in the debug how can i ensure see which data is received by the input module tcp udp i m grateful for any help stefans
0
14,097
3,226,777,608
IssuesEvent
2015-10-10 15:56:12
Crypton/statusapp
https://api.github.com/repos/Crypton/statusapp
closed
iphone keyboard overlays blocks text fields
bug design ios
On certain screens the iphone keyboard overlay blocks the ability to view current fields. Have found a few. iphone 5s 9.0.1 >-Select fields to enter text The following two pictures are from the start screen. The first picture is before selecting the text field. The second picture is with my new username typed in. You are not able to move either the screen or keyboard or background application to view your entry, you must cancel the keyboard. ![start screen](https://cloud.githubusercontent.com/assets/11012743/10386287/e6d521c6-6e1a-11e5-9aa8-f81edfab8741.png) ![username entered](https://cloud.githubusercontent.com/assets/11012743/10386288/eabb62dc-6e1a-11e5-9493-825cff43e920.png) ___ ___ The same issue occurs on the change password screen. See image below. ![change pass](https://cloud.githubusercontent.com/assets/11012743/10386302/362458f0-6e1b-11e5-9302-4fac0ba4a44d.png)
1.0
iphone keyboard overlays blocks text fields - On certain screens the iphone keyboard overlay blocks the ability to view current fields. Have found a few. iphone 5s 9.0.1 >-Select fields to enter text The following two pictures are from the start screen. The first picture is before selecting the text field. The second picture is with my new username typed in. You are not able to move either the screen or keyboard or background application to view your entry, you must cancel the keyboard. ![start screen](https://cloud.githubusercontent.com/assets/11012743/10386287/e6d521c6-6e1a-11e5-9aa8-f81edfab8741.png) ![username entered](https://cloud.githubusercontent.com/assets/11012743/10386288/eabb62dc-6e1a-11e5-9493-825cff43e920.png) ___ ___ The same issue occurs on the change password screen. See image below. ![change pass](https://cloud.githubusercontent.com/assets/11012743/10386302/362458f0-6e1b-11e5-9302-4fac0ba4a44d.png)
non_process
iphone keyboard overlays blocks text fields on certain screens the iphone keyboard overlay blocks the ability to view current fields have found a few iphone select fields to enter text the following two pictures are from the start screen the first picture is before selecting the text field the second picture is with my new username typed in you are not able to move either the screen or keyboard or background application to view your entry you must cancel the keyboard the same issue occurs on the change password screen see image below
0
32,749
4,414,663,120
IssuesEvent
2016-08-13 15:41:13
nextcloud/server
https://api.github.com/repos/nextcloud/server
opened
Missing icons from release review polishing
2. developing design papercut
There are currently icons missing for: - [ ] federation - [ ] password policy - [ ] survey client - [ ] theming - [ ] update notification - [ ] SAML authentication - [ ] retention as requested in https://github.com/nextcloud/server/issues/735 .
1.0
Missing icons from release review polishing - There are currently icons missing for: - [ ] federation - [ ] password policy - [ ] survey client - [ ] theming - [ ] update notification - [ ] SAML authentication - [ ] retention as requested in https://github.com/nextcloud/server/issues/735 .
non_process
missing icons from release review polishing there are currently icons missing for federation password policy survey client theming update notification saml authentication retention as requested in
0
814,399
30,505,937,535
IssuesEvent
2023-07-18 16:53:31
grpc/grpc
https://api.github.com/repos/grpc/grpc
closed
compilation error with gcc 13.1
kind/bug lang/core priority/P2 untriaged
<!-- PLEASE DO NOT POST A QUESTION HERE. This form is for bug reports and feature requests ONLY! For general questions and troubleshooting, please ask/look for answers at StackOverflow, with "grpc" tag: https://stackoverflow.com/questions/tagged/grpc For questions that specifically need to be answered by gRPC team members, please ask/look for answers at grpc.io mailing list: https://groups.google.com/forum/#!forum/grpc-io Issues specific to *grpc-java*, *grpc-go*, *grpc-node*, *grpc-dart*, *grpc-web* should be created in the repository they belong to (e.g. https://github.com/grpc/grpc-LANGUAGE/issues/new) --> ### What version of gRPC and what language are you using? v1.56.0 ### What operating system (Linux, Windows,...) and version? Windows 10, cmake 3.26.4, ninja, ccache, lld ### What runtime / compiler are you using (e.g. python version or version of gcc) compiler from : winlibs-x86_64-posix-seh-gcc-13.1.0-llvm-16.0.5-mingw-w64msvcrt-11.0.0-r5 -- The CXX compiler identification is GNU 13.1.0 ### What did you do? Please provide either 1) A unit test for reproducing the bug or 2) Specific steps for us to follow to reproduce the bug. If there’s not enough information to debug the problem, gRPC team may close the issue at their discretion. You’re welcome to re-open the issue once you have a reproduction. In a powershell script : ``` $repoUrl = "https://github.com/grpc/grpc" $gitTag = "v1.56.0" git clone --recurse-submodules -b $gitTag --depth 1 --shallow-submodules $repoUrl cd grpc md my_build cd my_build cmake -GNinja -DCMAKE_CXX_FLAGS="-fuse-ld=lld -w" -DgRPC_INSTALL=ON -DgRPC_BUILD_TESTS=OFF -DBUILD_SHARED_LIBS=OFF -DCMAKE_BUILD_TYPE=Release -DCMAKE_INSTALL_PREFIX="$installPath" .. cmake --build . cmake --install . ``` ### What did you expect to see? correct compilation ### What did you see instead? ``` [51/2602] Building CXX object CMakeFiles/grpc.dir/src/core/ext/filters/backend_metrics/backend_metric_filter.cc.obj FAILED: CMakeFiles/grpc.dir/src/core/ext/filters/backend_metrics/backend_metric_filter.cc.obj C:\PROGRA~1\mingw64\bin\C__~1.EXE -DCARES_STATICLIB -D_WIN32_WINNT=0x600 -IC:/FactoryCapi/external_deps/grpc/third_party/re2 -IC:/FactoryCapi/external_deps/grpc/third_party/zlib -IC:/FactoryCapi/external_deps/grpc/include -IC:/FactoryCapi/external_deps/grpc -IC:/FactoryCapi/external_deps/grpc/third_party/address_sorting/include -IC:/FactoryCapi/external_deps/grpc/my_build/third_party/re2 -IC:/FactoryCapi/external_deps/grpc/third_party/boringssl-with-bazel/src/include -IC:/FactoryCapi/external_deps/grpc/src/core/ext/upb-generated -IC:/FactoryCapi/external_deps/grpc/src/core/ext/upbdefs-generated -IC:/FactoryCapi/external_deps/grpc/third_party/upb -IC:/FactoryCapi/external_deps/grpc/third_party/utf8_range -IC:/FactoryCapi/external_deps/grpc/third_party/xxhash -IC:/FactoryCapi/external_deps/grpc/my_build/third_party/zlib -IC:/FactoryCapi/external_deps/grpc/my_build/third_party/cares/cares -IC:/FactoryCapi/external_deps/grpc/third_party/cares/cares -IC:/FactoryCapi/external_deps/grpc/third_party/cares/cares/include -IC:/FactoryCapi/external_deps/grpc/third_party/abseil-cpp -fuse-ld=lld -w -O3 -DNDEBUG -MD -MT CMakeFiles/grpc.dir/src/core/ext/filters/backend_metrics/backend_metric_filter.cc.obj -MF CMakeFiles\grpc.dir\src\core\ext\filters\backend_metrics\backend_metric_filter.cc.obj.d -o CMakeFiles/grpc.dir/src/core/ext/filters/backend_metrics/backend_metric_filter.cc.obj -c C:/FactoryCapi/external_deps/grpc/src/core/ext/filters/backend_metrics/backend_metric_filter.cc In file included from C:/FactoryCapi/external_deps/grpc/src/core/lib/channel/channelz.h:43, from C:/FactoryCapi/external_deps/grpc/src/core/lib/surface/channel.h:47, from C:/FactoryCapi/external_deps/grpc/src/core/lib/surface/call.h:51, from C:/FactoryCapi/external_deps/grpc/src/core/lib/channel/promise_based_filter.h:66, from C:/FactoryCapi/external_deps/grpc/src/core/ext/filters/backend_metrics/backend_metric_filter.h:28, from C:/FactoryCapi/external_deps/grpc/src/core/ext/filters/backend_metrics/backend_metric_filter.cc:17: C:/FactoryCapi/external_deps/grpc/src/core/lib/gprpp/per_cpu.h: In instantiation of 'grpc_core::PerCpu<T>::PerCpu(grpc_core::PerCpuOptions) [with T = grpc_core::channelz::PerCpuCallCountingHelper::PerCpuData]': C:/FactoryCapi/external_deps/grpc/src/core/lib/channel/channelz.h:182:70: required from here C:/FactoryCapi/external_deps/grpc/src/core/lib/gprpp/per_cpu.h:70:30: internal compiler error: Segmentation fault 70 | std::unique_ptr<T[]> data_{new T[cpus_]}; | ^~~~~~~~~~~~ libbacktrace could not find executable to open Please submit a full bug report, with preprocessed source (by using -freport-bug). See <https://gcc.gnu.org/bugs/> for instructions. ``` ### Anything else we should know about your project / environment? With GCC 12.3 it's ok, should I send a report to gcc or you can fix it yourself ?
1.0
compilation error with gcc 13.1 - <!-- PLEASE DO NOT POST A QUESTION HERE. This form is for bug reports and feature requests ONLY! For general questions and troubleshooting, please ask/look for answers at StackOverflow, with "grpc" tag: https://stackoverflow.com/questions/tagged/grpc For questions that specifically need to be answered by gRPC team members, please ask/look for answers at grpc.io mailing list: https://groups.google.com/forum/#!forum/grpc-io Issues specific to *grpc-java*, *grpc-go*, *grpc-node*, *grpc-dart*, *grpc-web* should be created in the repository they belong to (e.g. https://github.com/grpc/grpc-LANGUAGE/issues/new) --> ### What version of gRPC and what language are you using? v1.56.0 ### What operating system (Linux, Windows,...) and version? Windows 10, cmake 3.26.4, ninja, ccache, lld ### What runtime / compiler are you using (e.g. python version or version of gcc) compiler from : winlibs-x86_64-posix-seh-gcc-13.1.0-llvm-16.0.5-mingw-w64msvcrt-11.0.0-r5 -- The CXX compiler identification is GNU 13.1.0 ### What did you do? Please provide either 1) A unit test for reproducing the bug or 2) Specific steps for us to follow to reproduce the bug. If there’s not enough information to debug the problem, gRPC team may close the issue at their discretion. You’re welcome to re-open the issue once you have a reproduction. In a powershell script : ``` $repoUrl = "https://github.com/grpc/grpc" $gitTag = "v1.56.0" git clone --recurse-submodules -b $gitTag --depth 1 --shallow-submodules $repoUrl cd grpc md my_build cd my_build cmake -GNinja -DCMAKE_CXX_FLAGS="-fuse-ld=lld -w" -DgRPC_INSTALL=ON -DgRPC_BUILD_TESTS=OFF -DBUILD_SHARED_LIBS=OFF -DCMAKE_BUILD_TYPE=Release -DCMAKE_INSTALL_PREFIX="$installPath" .. cmake --build . cmake --install . ``` ### What did you expect to see? correct compilation ### What did you see instead? ``` [51/2602] Building CXX object CMakeFiles/grpc.dir/src/core/ext/filters/backend_metrics/backend_metric_filter.cc.obj FAILED: CMakeFiles/grpc.dir/src/core/ext/filters/backend_metrics/backend_metric_filter.cc.obj C:\PROGRA~1\mingw64\bin\C__~1.EXE -DCARES_STATICLIB -D_WIN32_WINNT=0x600 -IC:/FactoryCapi/external_deps/grpc/third_party/re2 -IC:/FactoryCapi/external_deps/grpc/third_party/zlib -IC:/FactoryCapi/external_deps/grpc/include -IC:/FactoryCapi/external_deps/grpc -IC:/FactoryCapi/external_deps/grpc/third_party/address_sorting/include -IC:/FactoryCapi/external_deps/grpc/my_build/third_party/re2 -IC:/FactoryCapi/external_deps/grpc/third_party/boringssl-with-bazel/src/include -IC:/FactoryCapi/external_deps/grpc/src/core/ext/upb-generated -IC:/FactoryCapi/external_deps/grpc/src/core/ext/upbdefs-generated -IC:/FactoryCapi/external_deps/grpc/third_party/upb -IC:/FactoryCapi/external_deps/grpc/third_party/utf8_range -IC:/FactoryCapi/external_deps/grpc/third_party/xxhash -IC:/FactoryCapi/external_deps/grpc/my_build/third_party/zlib -IC:/FactoryCapi/external_deps/grpc/my_build/third_party/cares/cares -IC:/FactoryCapi/external_deps/grpc/third_party/cares/cares -IC:/FactoryCapi/external_deps/grpc/third_party/cares/cares/include -IC:/FactoryCapi/external_deps/grpc/third_party/abseil-cpp -fuse-ld=lld -w -O3 -DNDEBUG -MD -MT CMakeFiles/grpc.dir/src/core/ext/filters/backend_metrics/backend_metric_filter.cc.obj -MF CMakeFiles\grpc.dir\src\core\ext\filters\backend_metrics\backend_metric_filter.cc.obj.d -o CMakeFiles/grpc.dir/src/core/ext/filters/backend_metrics/backend_metric_filter.cc.obj -c C:/FactoryCapi/external_deps/grpc/src/core/ext/filters/backend_metrics/backend_metric_filter.cc In file included from C:/FactoryCapi/external_deps/grpc/src/core/lib/channel/channelz.h:43, from C:/FactoryCapi/external_deps/grpc/src/core/lib/surface/channel.h:47, from C:/FactoryCapi/external_deps/grpc/src/core/lib/surface/call.h:51, from C:/FactoryCapi/external_deps/grpc/src/core/lib/channel/promise_based_filter.h:66, from C:/FactoryCapi/external_deps/grpc/src/core/ext/filters/backend_metrics/backend_metric_filter.h:28, from C:/FactoryCapi/external_deps/grpc/src/core/ext/filters/backend_metrics/backend_metric_filter.cc:17: C:/FactoryCapi/external_deps/grpc/src/core/lib/gprpp/per_cpu.h: In instantiation of 'grpc_core::PerCpu<T>::PerCpu(grpc_core::PerCpuOptions) [with T = grpc_core::channelz::PerCpuCallCountingHelper::PerCpuData]': C:/FactoryCapi/external_deps/grpc/src/core/lib/channel/channelz.h:182:70: required from here C:/FactoryCapi/external_deps/grpc/src/core/lib/gprpp/per_cpu.h:70:30: internal compiler error: Segmentation fault 70 | std::unique_ptr<T[]> data_{new T[cpus_]}; | ^~~~~~~~~~~~ libbacktrace could not find executable to open Please submit a full bug report, with preprocessed source (by using -freport-bug). See <https://gcc.gnu.org/bugs/> for instructions. ``` ### Anything else we should know about your project / environment? With GCC 12.3 it's ok, should I send a report to gcc or you can fix it yourself ?
non_process
compilation error with gcc please do not post a question here this form is for bug reports and feature requests only for general questions and troubleshooting please ask look for answers at stackoverflow with grpc tag for questions that specifically need to be answered by grpc team members please ask look for answers at grpc io mailing list issues specific to grpc java grpc go grpc node grpc dart grpc web should be created in the repository they belong to e g what version of grpc and what language are you using what operating system linux windows and version windows cmake ninja ccache lld what runtime compiler are you using e g python version or version of gcc compiler from winlibs posix seh gcc llvm mingw the cxx compiler identification is gnu what did you do please provide either a unit test for reproducing the bug or specific steps for us to follow to reproduce the bug if there’s not enough information to debug the problem grpc team may close the issue at their discretion you’re welcome to re open the issue once you have a reproduction in a powershell script repourl gittag git clone recurse submodules b gittag depth shallow submodules repourl cd grpc md my build cd my build cmake gninja dcmake cxx flags fuse ld lld w dgrpc install on dgrpc build tests off dbuild shared libs off dcmake build type release dcmake install prefix installpath cmake build cmake install what did you expect to see correct compilation what did you see instead building cxx object cmakefiles grpc dir src core ext filters backend metrics backend metric filter cc obj failed cmakefiles grpc dir src core ext filters backend metrics backend metric filter cc obj c progra bin c exe dcares staticlib d winnt ic factorycapi external deps grpc third party ic factorycapi external deps grpc third party zlib ic factorycapi external deps grpc include ic factorycapi external deps grpc ic factorycapi external deps grpc third party address sorting include ic factorycapi external deps grpc my build third party ic factorycapi external deps grpc third party boringssl with bazel src include ic factorycapi external deps grpc src core ext upb generated ic factorycapi external deps grpc src core ext upbdefs generated ic factorycapi external deps grpc third party upb ic factorycapi external deps grpc third party range ic factorycapi external deps grpc third party xxhash ic factorycapi external deps grpc my build third party zlib ic factorycapi external deps grpc my build third party cares cares ic factorycapi external deps grpc third party cares cares ic factorycapi external deps grpc third party cares cares include ic factorycapi external deps grpc third party abseil cpp fuse ld lld w dndebug md mt cmakefiles grpc dir src core ext filters backend metrics backend metric filter cc obj mf cmakefiles grpc dir src core ext filters backend metrics backend metric filter cc obj d o cmakefiles grpc dir src core ext filters backend metrics backend metric filter cc obj c c factorycapi external deps grpc src core ext filters backend metrics backend metric filter cc in file included from c factorycapi external deps grpc src core lib channel channelz h from c factorycapi external deps grpc src core lib surface channel h from c factorycapi external deps grpc src core lib surface call h from c factorycapi external deps grpc src core lib channel promise based filter h from c factorycapi external deps grpc src core ext filters backend metrics backend metric filter h from c factorycapi external deps grpc src core ext filters backend metrics backend metric filter cc c factorycapi external deps grpc src core lib gprpp per cpu h in instantiation of grpc core percpu percpu grpc core percpuoptions c factorycapi external deps grpc src core lib channel channelz h required from here c factorycapi external deps grpc src core lib gprpp per cpu h internal compiler error segmentation fault std unique ptr data new t libbacktrace could not find executable to open please submit a full bug report with preprocessed source by using freport bug see for instructions anything else we should know about your project environment with gcc it s ok should i send a report to gcc or you can fix it yourself
0
8,926
3,236,156,195
IssuesEvent
2015-10-14 02:16:55
johnstonbl01/clementinejs
https://api.github.com/repos/johnstonbl01/clementinejs
closed
Possible typo in Refactoring Routes section
accepted beginner documentation help wanted
**Location of issue** "Now we need to pass the Express application as an argument to our route function object." sentence in: http://www.clementinejs.com/tutorials/tutorial-beginner.html#RefactoringRoutes EDIT: also sentence: "This will allow us to use Express functionality within the scope of our new route function." **Issue** I think "route" should be "routes" **Suggested Solution** Fix typo. Unless of course you really did mean "route" and not "routes"
1.0
Possible typo in Refactoring Routes section - **Location of issue** "Now we need to pass the Express application as an argument to our route function object." sentence in: http://www.clementinejs.com/tutorials/tutorial-beginner.html#RefactoringRoutes EDIT: also sentence: "This will allow us to use Express functionality within the scope of our new route function." **Issue** I think "route" should be "routes" **Suggested Solution** Fix typo. Unless of course you really did mean "route" and not "routes"
non_process
possible typo in refactoring routes section location of issue now we need to pass the express application as an argument to our route function object sentence in edit also sentence this will allow us to use express functionality within the scope of our new route function issue i think route should be routes suggested solution fix typo unless of course you really did mean route and not routes
0
10,842
13,624,089,429
IssuesEvent
2020-09-24 07:30:36
pystatgen/sgkit
https://api.github.com/repos/pystatgen/sgkit
closed
Fresh pre-commit is failing on the master
bug process + tools
Needed to create a fresh conda env for sgkit dev, and fresh pre-commit env is failing on master with: ``` mypy.....................................................................Failed - hook id: mypy - exit code: 1 sgkit/stats/utils.py:46: error: unused 'type: ignore' comment sgkit/display.py:182: error: unused 'type: ignore' comment sgkit/tests/test_association.py:135: error: unused 'type: ignore' comment sgkit/tests/test_association.py:186: error: unused 'type: ignore' comment sgkit/tests/test_association.py:188: error: unused 'type: ignore' comment sgkit/tests/test_hwe.py:140: error: unused 'type: ignore' comment sgkit/tests/test_regenie.py:190: error: unused 'type: ignore' comment Found 7 errors in 5 files (checked 44 source files) ``` This doesn't seem to fail on GH, presumably because pre-commit is still using cache for its envs.
1.0
Fresh pre-commit is failing on the master - Needed to create a fresh conda env for sgkit dev, and fresh pre-commit env is failing on master with: ``` mypy.....................................................................Failed - hook id: mypy - exit code: 1 sgkit/stats/utils.py:46: error: unused 'type: ignore' comment sgkit/display.py:182: error: unused 'type: ignore' comment sgkit/tests/test_association.py:135: error: unused 'type: ignore' comment sgkit/tests/test_association.py:186: error: unused 'type: ignore' comment sgkit/tests/test_association.py:188: error: unused 'type: ignore' comment sgkit/tests/test_hwe.py:140: error: unused 'type: ignore' comment sgkit/tests/test_regenie.py:190: error: unused 'type: ignore' comment Found 7 errors in 5 files (checked 44 source files) ``` This doesn't seem to fail on GH, presumably because pre-commit is still using cache for its envs.
process
fresh pre commit is failing on the master needed to create a fresh conda env for sgkit dev and fresh pre commit env is failing on master with mypy failed hook id mypy exit code sgkit stats utils py error unused type ignore comment sgkit display py error unused type ignore comment sgkit tests test association py error unused type ignore comment sgkit tests test association py error unused type ignore comment sgkit tests test association py error unused type ignore comment sgkit tests test hwe py error unused type ignore comment sgkit tests test regenie py error unused type ignore comment found errors in files checked source files this doesn t seem to fail on gh presumably because pre commit is still using cache for its envs
1
161,338
20,148,683,792
IssuesEvent
2022-02-09 10:12:10
PGreaneyLYIT/easybuggy4django
https://api.github.com/repos/PGreaneyLYIT/easybuggy4django
closed
CVE-2021-28678 (Medium) detected in Pillow-5.1.0.tar.gz - autoclosed
security vulnerability
## CVE-2021-28678 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pillow-5.1.0.tar.gz</b></p></summary> <p>Python Imaging Library (Fork)</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/89/b8/2f49bf71cbd0e9485bb36f72d438421b69b7356180695ae10bd4fd3066f5/Pillow-5.1.0.tar.gz">https://files.pythonhosted.org/packages/89/b8/2f49bf71cbd0e9485bb36f72d438421b69b7356180695ae10bd4fd3066f5/Pillow-5.1.0.tar.gz</a></p> <p>Path to dependency file: /tmp/ws-scm/easybuggy4django</p> <p>Path to vulnerable library: /tmp/ws-scm/easybuggy4django</p> <p> Dependency Hierarchy: - :x: **Pillow-5.1.0.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/PGreaneyLYIT/easybuggy4django/commit/5403b8fbcea4b699ce64d05146aeaa76d1062d89">5403b8fbcea4b699ce64d05146aeaa76d1062d89</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data. <p>Publish Date: 2021-06-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28678>CVE-2021-28678</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28678">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28678</a></p> <p>Release Date: 2021-06-02</p> <p>Fix Resolution: Pillow - 8.2.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-28678 (Medium) detected in Pillow-5.1.0.tar.gz - autoclosed - ## CVE-2021-28678 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Pillow-5.1.0.tar.gz</b></p></summary> <p>Python Imaging Library (Fork)</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/89/b8/2f49bf71cbd0e9485bb36f72d438421b69b7356180695ae10bd4fd3066f5/Pillow-5.1.0.tar.gz">https://files.pythonhosted.org/packages/89/b8/2f49bf71cbd0e9485bb36f72d438421b69b7356180695ae10bd4fd3066f5/Pillow-5.1.0.tar.gz</a></p> <p>Path to dependency file: /tmp/ws-scm/easybuggy4django</p> <p>Path to vulnerable library: /tmp/ws-scm/easybuggy4django</p> <p> Dependency Hierarchy: - :x: **Pillow-5.1.0.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/PGreaneyLYIT/easybuggy4django/commit/5403b8fbcea4b699ce64d05146aeaa76d1062d89">5403b8fbcea4b699ce64d05146aeaa76d1062d89</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data. <p>Publish Date: 2021-06-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28678>CVE-2021-28678</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28678">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28678</a></p> <p>Release Date: 2021-06-02</p> <p>Fix Resolution: Pillow - 8.2.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_process
cve medium detected in pillow tar gz autoclosed cve medium severity vulnerability vulnerable library pillow tar gz python imaging library fork library home page a href path to dependency file tmp ws scm path to vulnerable library tmp ws scm dependency hierarchy x pillow tar gz vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in pillow before for blp data blpimageplugin did not properly check that reads after jumping to file offsets returned data this could lead to a dos where the decoder could be run a large number of times on empty data publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution pillow step up your open source security game with whitesource
0
13,043
15,385,236,409
IssuesEvent
2021-03-03 06:12:05
GoogleCloudPlatform/fda-mystudies
https://api.github.com/repos/GoogleCloudPlatform/fda-mystudies
closed
Stackdriver logging - client is not shut down properly
Bug P1 Process: Fixed Process: Release 2
Seeing in logs: ``` SEVERE [http-nio-8080-exec-4] io.grpc.internal.ManagedChannelOrphanWrapper$ManagedChannelReference.cleanQueue *~*~*~ Channel ManagedChannelImpl{logId=5, target=logging.googleapis.com:443} was not shutdown properly!!! ~*~*~* Make sure to call shutdown()/shutdownNow() and wait until awaitTermination() returns true. java.lang.RuntimeException: ManagedChannel allocation site at io.grpc.internal.ManagedChannelOrphanWrapper$ManagedChannelReference.<init>(ManagedChannelOrphanWrapper.java:94) at io.grpc.internal.ManagedChannelOrphanWrapper.<init>(ManagedChannelOrphanWrapper.java:52) at io.grpc.internal.ManagedChannelOrphanWrapper.<init>(ManagedChannelOrphanWrapper.java:43) at io.grpc.internal.AbstractManagedChannelImplBuilder.build(AbstractManagedChannelImplBuilder.java:518) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider.createSingleChannel(InstantiatingGrpcChannelProvider.java:304) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider.access$1500(InstantiatingGrpcChannelProvider.java:71) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider$1.createSingleChannel(InstantiatingGrpcChannelProvider.java:202) at com.google.api.gax.grpc.ChannelPool.create(ChannelPool.java:72) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider.createChannel(InstantiatingGrpcChannelProvider.java:209) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider.getTransportChannel(InstantiatingGrpcChannelProvider.java:192) at com.google.api.gax.rpc.ClientContext.create(ClientContext.java:155) at com.google.api.gax.rpc.ClientContext.create(ClientContext.java:122) at com.google.cloud.logging.spi.v2.GrpcLoggingRpc.<init>(GrpcLoggingRpc.java:132) at com.google.cloud.logging.LoggingOptions$DefaultLoggingRpcFactory.create(LoggingOptions.java:61) at com.google.cloud.logging.LoggingOptions$DefaultLoggingRpcFactory.create(LoggingOptions.java:55) at com.google.cloud.ServiceOptions.getRpc(ServiceOptions.java:538) at com.google.cloud.logging.LoggingOptions.getLoggingRpcV2(LoggingOptions.java:129) at com.google.cloud.logging.LoggingImpl.<init>(LoggingImpl.java:109) at com.google.cloud.logging.LoggingOptions$DefaultLoggingFactory.create(LoggingOptions.java:46) at com.google.cloud.logging.LoggingOptions$DefaultLoggingFactory.create(LoggingOptions.java:41) at com.google.cloud.ServiceOptions.getService(ServiceOptions.java:518) at com.google.cloud.healthcare.fdamystudies.service.AuditEventServiceImpl.postAuditLogEvent(AuditEventServiceImpl.java:43) at com.google.cloud.healthcare.fdamystudies.common.UserMgmntAuditHelper.logEvent(UserMgmntAuditHelper.java:45) at com.google.cloud.healthcare.fdamystudies.common.UserMgmntAuditHelper.logEvent(UserMgmntAuditHelper.java:30) at com.google.cloud.healthcare.fdamystudies.service.UserRegistrationServiceImpl.register(UserRegistrationServiceImpl.java:96) at com.google.cloud.healthcare.fdamystudies.service.UserRegistrationServiceImpl$$FastClassBySpringCGLIB$$ce6a0d62.invoke(<generated>) ```
2.0
Stackdriver logging - client is not shut down properly - Seeing in logs: ``` SEVERE [http-nio-8080-exec-4] io.grpc.internal.ManagedChannelOrphanWrapper$ManagedChannelReference.cleanQueue *~*~*~ Channel ManagedChannelImpl{logId=5, target=logging.googleapis.com:443} was not shutdown properly!!! ~*~*~* Make sure to call shutdown()/shutdownNow() and wait until awaitTermination() returns true. java.lang.RuntimeException: ManagedChannel allocation site at io.grpc.internal.ManagedChannelOrphanWrapper$ManagedChannelReference.<init>(ManagedChannelOrphanWrapper.java:94) at io.grpc.internal.ManagedChannelOrphanWrapper.<init>(ManagedChannelOrphanWrapper.java:52) at io.grpc.internal.ManagedChannelOrphanWrapper.<init>(ManagedChannelOrphanWrapper.java:43) at io.grpc.internal.AbstractManagedChannelImplBuilder.build(AbstractManagedChannelImplBuilder.java:518) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider.createSingleChannel(InstantiatingGrpcChannelProvider.java:304) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider.access$1500(InstantiatingGrpcChannelProvider.java:71) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider$1.createSingleChannel(InstantiatingGrpcChannelProvider.java:202) at com.google.api.gax.grpc.ChannelPool.create(ChannelPool.java:72) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider.createChannel(InstantiatingGrpcChannelProvider.java:209) at com.google.api.gax.grpc.InstantiatingGrpcChannelProvider.getTransportChannel(InstantiatingGrpcChannelProvider.java:192) at com.google.api.gax.rpc.ClientContext.create(ClientContext.java:155) at com.google.api.gax.rpc.ClientContext.create(ClientContext.java:122) at com.google.cloud.logging.spi.v2.GrpcLoggingRpc.<init>(GrpcLoggingRpc.java:132) at com.google.cloud.logging.LoggingOptions$DefaultLoggingRpcFactory.create(LoggingOptions.java:61) at com.google.cloud.logging.LoggingOptions$DefaultLoggingRpcFactory.create(LoggingOptions.java:55) at com.google.cloud.ServiceOptions.getRpc(ServiceOptions.java:538) at com.google.cloud.logging.LoggingOptions.getLoggingRpcV2(LoggingOptions.java:129) at com.google.cloud.logging.LoggingImpl.<init>(LoggingImpl.java:109) at com.google.cloud.logging.LoggingOptions$DefaultLoggingFactory.create(LoggingOptions.java:46) at com.google.cloud.logging.LoggingOptions$DefaultLoggingFactory.create(LoggingOptions.java:41) at com.google.cloud.ServiceOptions.getService(ServiceOptions.java:518) at com.google.cloud.healthcare.fdamystudies.service.AuditEventServiceImpl.postAuditLogEvent(AuditEventServiceImpl.java:43) at com.google.cloud.healthcare.fdamystudies.common.UserMgmntAuditHelper.logEvent(UserMgmntAuditHelper.java:45) at com.google.cloud.healthcare.fdamystudies.common.UserMgmntAuditHelper.logEvent(UserMgmntAuditHelper.java:30) at com.google.cloud.healthcare.fdamystudies.service.UserRegistrationServiceImpl.register(UserRegistrationServiceImpl.java:96) at com.google.cloud.healthcare.fdamystudies.service.UserRegistrationServiceImpl$$FastClassBySpringCGLIB$$ce6a0d62.invoke(<generated>) ```
process
stackdriver logging client is not shut down properly seeing in logs severe io grpc internal managedchannelorphanwrapper managedchannelreference cleanqueue channel managedchannelimpl logid target logging googleapis com was not shutdown properly make sure to call shutdown shutdownnow and wait until awaittermination returns true java lang runtimeexception managedchannel allocation site at io grpc internal managedchannelorphanwrapper managedchannelreference managedchannelorphanwrapper java at io grpc internal managedchannelorphanwrapper managedchannelorphanwrapper java at io grpc internal managedchannelorphanwrapper managedchannelorphanwrapper java at io grpc internal abstractmanagedchannelimplbuilder build abstractmanagedchannelimplbuilder java at com google api gax grpc instantiatinggrpcchannelprovider createsinglechannel instantiatinggrpcchannelprovider java at com google api gax grpc instantiatinggrpcchannelprovider access instantiatinggrpcchannelprovider java at com google api gax grpc instantiatinggrpcchannelprovider createsinglechannel instantiatinggrpcchannelprovider java at com google api gax grpc channelpool create channelpool java at com google api gax grpc instantiatinggrpcchannelprovider createchannel instantiatinggrpcchannelprovider java at com google api gax grpc instantiatinggrpcchannelprovider gettransportchannel instantiatinggrpcchannelprovider java at com google api gax rpc clientcontext create clientcontext java at com google api gax rpc clientcontext create clientcontext java at com google cloud logging spi grpcloggingrpc grpcloggingrpc java at com google cloud logging loggingoptions defaultloggingrpcfactory create loggingoptions java at com google cloud logging loggingoptions defaultloggingrpcfactory create loggingoptions java at com google cloud serviceoptions getrpc serviceoptions java at com google cloud logging loggingoptions loggingoptions java at com google cloud logging loggingimpl loggingimpl java at com google cloud logging loggingoptions defaultloggingfactory create loggingoptions java at com google cloud logging loggingoptions defaultloggingfactory create loggingoptions java at com google cloud serviceoptions getservice serviceoptions java at com google cloud healthcare fdamystudies service auditeventserviceimpl postauditlogevent auditeventserviceimpl java at com google cloud healthcare fdamystudies common usermgmntaudithelper logevent usermgmntaudithelper java at com google cloud healthcare fdamystudies common usermgmntaudithelper logevent usermgmntaudithelper java at com google cloud healthcare fdamystudies service userregistrationserviceimpl register userregistrationserviceimpl java at com google cloud healthcare fdamystudies service userregistrationserviceimpl fastclassbyspringcglib invoke
1
144,335
11,612,894,596
IssuesEvent
2020-02-26 09:47:41
Hazor-Hellscream/Project-Hellscream-Info
https://api.github.com/repos/Hazor-Hellscream/Project-Hellscream-Info
closed
Quest - [Wisp-napping: 28370]
Fixed Needs Testing Quest Bug
Information: Wisps are not captured by using Darla's Wisp Magnet [63698]. Priority: Medium WoWhead link: https://www.wowhead.com/quest=28370/wisp-napping
1.0
Quest - [Wisp-napping: 28370] - Information: Wisps are not captured by using Darla's Wisp Magnet [63698]. Priority: Medium WoWhead link: https://www.wowhead.com/quest=28370/wisp-napping
non_process
quest information wisps are not captured by using darla s wisp magnet priority medium wowhead link
0
13,307
15,780,630,088
IssuesEvent
2021-04-01 10:12:03
GoogleCloudPlatform/dotnet-docs-samples
https://api.github.com/repos/GoogleCloudPlatform/dotnet-docs-samples
opened
Spanner: Unskip encrypted backup related tests
api: spanner priority: p2 type: process
And also have proper normal backup related tests that create a backup each time, etc. This issue is blocked on #1299 .
1.0
Spanner: Unskip encrypted backup related tests - And also have proper normal backup related tests that create a backup each time, etc. This issue is blocked on #1299 .
process
spanner unskip encrypted backup related tests and also have proper normal backup related tests that create a backup each time etc this issue is blocked on
1
20,987
27,852,831,900
IssuesEvent
2023-03-20 20:07:50
dDevTech/tapas-top-frontend
https://api.github.com/repos/dDevTech/tapas-top-frontend
closed
Link directo pagina verificacion edad 20/03/2023
pending in process require testing
Sustituir el link de creación de cuenta al hacer click en Crear una Cuenta en el menu por la pagina de verificación de edad en el caso de que no se haya verificado previamente
1.0
Link directo pagina verificacion edad 20/03/2023 - Sustituir el link de creación de cuenta al hacer click en Crear una Cuenta en el menu por la pagina de verificación de edad en el caso de que no se haya verificado previamente
process
link directo pagina verificacion edad sustituir el link de creación de cuenta al hacer click en crear una cuenta en el menu por la pagina de verificación de edad en el caso de que no se haya verificado previamente
1
2,905
5,889,722,863
IssuesEvent
2017-05-17 13:33:28
AllenFang/react-bootstrap-table
https://api.github.com/repos/AllenFang/react-bootstrap-table
closed
Expand component rendered at table construction?
enhancement inprocess
Hi there, So the scenario is, in my redux store I have a node for data of current expanded row, and all rows are expandable. In debug I find that, such component are constructed for each and every row of the table, even if the row is not expanded. Plus, my redux node of current opened row are rendered to all components for the rows. Only difference is the components are hidden except the current selected row. Is there a way to not render all those expand components at the construction of the table itself, but rather render it and destruct it every time I expand/collapse a row? Thanks, Richard.
1.0
Expand component rendered at table construction? - Hi there, So the scenario is, in my redux store I have a node for data of current expanded row, and all rows are expandable. In debug I find that, such component are constructed for each and every row of the table, even if the row is not expanded. Plus, my redux node of current opened row are rendered to all components for the rows. Only difference is the components are hidden except the current selected row. Is there a way to not render all those expand components at the construction of the table itself, but rather render it and destruct it every time I expand/collapse a row? Thanks, Richard.
process
expand component rendered at table construction hi there so the scenario is in my redux store i have a node for data of current expanded row and all rows are expandable in debug i find that such component are constructed for each and every row of the table even if the row is not expanded plus my redux node of current opened row are rendered to all components for the rows only difference is the components are hidden except the current selected row is there a way to not render all those expand components at the construction of the table itself but rather render it and destruct it every time i expand collapse a row thanks richard
1
19,552
25,871,881,923
IssuesEvent
2022-12-14 03:41:04
pytorch/pytorch
https://api.github.com/repos/pytorch/pytorch
closed
DISABLED test_exception_raises (__main__.SpawnTest)
module: multiprocessing triaged module: flaky-tests skipped
Platforms: linux This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_exception_raises&suite=SpawnTest&file=test_multiprocessing_spawn.py) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/7848861561). Over the past 3 hours, it has been determined flaky in 1 workflow(s) with 1 failures and 1 successes. **Debugging instructions (after clicking on the recent samples link):** DO NOT BE ALARMED THE CI IS GREEN. We now shield flaky tests from developers so CI will thus be green but it will be harder to parse the logs. To find relevant log snippets: 1. Click on the workflow logs linked above 2. Click on the Test step of the job so that it is expanded. Otherwise, the grepping will not work. 3. Grep for `test_exception_raises` 4. There should be several instances run (as flaky tests are rerun in CI) from which you can study the logs. cc @VitalyFedyunin
1.0
DISABLED test_exception_raises (__main__.SpawnTest) - Platforms: linux This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_exception_raises&suite=SpawnTest&file=test_multiprocessing_spawn.py) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/7848861561). Over the past 3 hours, it has been determined flaky in 1 workflow(s) with 1 failures and 1 successes. **Debugging instructions (after clicking on the recent samples link):** DO NOT BE ALARMED THE CI IS GREEN. We now shield flaky tests from developers so CI will thus be green but it will be harder to parse the logs. To find relevant log snippets: 1. Click on the workflow logs linked above 2. Click on the Test step of the job so that it is expanded. Otherwise, the grepping will not work. 3. Grep for `test_exception_raises` 4. There should be several instances run (as flaky tests are rerun in CI) from which you can study the logs. cc @VitalyFedyunin
process
disabled test exception raises main spawntest platforms linux this test was disabled because it is failing in ci see and the most recent trunk over the past hours it has been determined flaky in workflow s with failures and successes debugging instructions after clicking on the recent samples link do not be alarmed the ci is green we now shield flaky tests from developers so ci will thus be green but it will be harder to parse the logs to find relevant log snippets click on the workflow logs linked above click on the test step of the job so that it is expanded otherwise the grepping will not work grep for test exception raises there should be several instances run as flaky tests are rerun in ci from which you can study the logs cc vitalyfedyunin
1
7,276
10,429,503,624
IssuesEvent
2019-09-17 03:02:20
WebAudio/web-audio-api
https://api.github.com/repos/WebAudio/web-audio-api
closed
DynamicsCompressor node should enable sidechain compression
Feature Request/Missing Feature Needs Prototype Theme - Dynamics Processing
Side-chain compression (http://en.wikipedia.org/wiki/Dynamic_range_compression#Side-chaining) is a very common and useful music production technique. It's used for ducking (reducing music level while speaking), de-essing, removing plosives, maximizing volume in bass-heavy music, and other techniques. There are a couple of ways that have been suggested to add this to the Web Audio API: either exposing the reduction as an AudioNode that can be connect()ed to other AudioParams, or exposing a separate input node (with the semantic, presumably, that a separate input node would disable the signal path from the "control" input).
1.0
DynamicsCompressor node should enable sidechain compression - Side-chain compression (http://en.wikipedia.org/wiki/Dynamic_range_compression#Side-chaining) is a very common and useful music production technique. It's used for ducking (reducing music level while speaking), de-essing, removing plosives, maximizing volume in bass-heavy music, and other techniques. There are a couple of ways that have been suggested to add this to the Web Audio API: either exposing the reduction as an AudioNode that can be connect()ed to other AudioParams, or exposing a separate input node (with the semantic, presumably, that a separate input node would disable the signal path from the "control" input).
process
dynamicscompressor node should enable sidechain compression side chain compression is a very common and useful music production technique it s used for ducking reducing music level while speaking de essing removing plosives maximizing volume in bass heavy music and other techniques there are a couple of ways that have been suggested to add this to the web audio api either exposing the reduction as an audionode that can be connect ed to other audioparams or exposing a separate input node with the semantic presumably that a separate input node would disable the signal path from the control input
1
97,057
10,980,366,650
IssuesEvent
2019-11-30 13:49:11
Students-of-the-city-of-Kostroma/Ray-of-hope
https://api.github.com/repos/Students-of-the-city-of-Kostroma/Ray-of-hope
closed
Инструкция для развертывания локального сервера
AppServer Documentation InTesting O2 PR5 Sprint 7
Необходимо написать инструкцию для развертывания сервера приложений на компьютере под управлением unix подобных ОС. !------------------------------------------------------------------! 1/3 -- техническая часть настройки окружения Папка https://drive.google.com/drive/folders/1CssE_P4RBV2YFDc-pXYEcP6qcGEzz0r8 Файл https://docs.google.com/document/d/1l72a3VRuBhqV79KNh66z4Mx01ek7AnL6vLuesRD4uRQ/edit !------------------------------------------------------------------! 2/3 -- развёртывание локального окружения и зависимостей к нему готова Папка, файл -- те же. !------------------------------------------------------------------!
1.0
Инструкция для развертывания локального сервера - Необходимо написать инструкцию для развертывания сервера приложений на компьютере под управлением unix подобных ОС. !------------------------------------------------------------------! 1/3 -- техническая часть настройки окружения Папка https://drive.google.com/drive/folders/1CssE_P4RBV2YFDc-pXYEcP6qcGEzz0r8 Файл https://docs.google.com/document/d/1l72a3VRuBhqV79KNh66z4Mx01ek7AnL6vLuesRD4uRQ/edit !------------------------------------------------------------------! 2/3 -- развёртывание локального окружения и зависимостей к нему готова Папка, файл -- те же. !------------------------------------------------------------------!
non_process
инструкция для развертывания локального сервера необходимо написать инструкцию для развертывания сервера приложений на компьютере под управлением unix подобных ос техническая часть настройки окружения папка файл развёртывание локального окружения и зависимостей к нему готова папка файл те же
0
7,127
10,276,162,047
IssuesEvent
2019-08-24 14:55:00
shirou/gopsutil
https://api.github.com/repos/shirou/gopsutil
closed
PIDs returned by process.Pids() should be sorted
package:process
PIDs returned by process.Pids() should be sorted so we have consistency across different platforms (not every PIDs are sorted on Windows for example) . This the counterpart issue of https://github.com/giampaolo/psutil/issues/1437 for gopsutil
1.0
PIDs returned by process.Pids() should be sorted - PIDs returned by process.Pids() should be sorted so we have consistency across different platforms (not every PIDs are sorted on Windows for example) . This the counterpart issue of https://github.com/giampaolo/psutil/issues/1437 for gopsutil
process
pids returned by process pids should be sorted pids returned by process pids should be sorted so we have consistency across different platforms not every pids are sorted on windows for example this the counterpart issue of for gopsutil
1
16,671
21,775,122,342
IssuesEvent
2022-05-13 13:07:14
symfony/symfony
https://api.github.com/repos/symfony/symfony
closed
[Windows Command Line] Simfony/Process::prepareWindowsCommandLine() method doesn't properly replace double quotes with triple quotes
Bug Process Status: Needs Review Status: Waiting feedback
### Symfony version(s) affected 5.4.8 ### Description Hi to everyone, I noticed that the Simfony/Process::prepareWindowsCommandLine() does not perperly work in case of presence of double quotes in command line: they are incorrectly replace or indifferently replaced by empty string to avoid to fail. In fact, Windows command line expects three double quotes (""") if command contains double quotes, it does not work otherwise. i.e. The command as follows fails: `copy "C:\user\file.txt" "C:\user\folder1\file.txt"` --> `copy C:\user\file.txt C:\user\folder1\file.txt` Did anyone have observed that yet? ### How to reproduce Call the function run() or mustRun() command using double quotes. ### Possible Solution Changing properly the prepareWindowsCommandLine() method on its inner ` function ($m) use (&$env, &$varCache, &$varCount, $uid)` ### Additional Context _No response_
1.0
[Windows Command Line] Simfony/Process::prepareWindowsCommandLine() method doesn't properly replace double quotes with triple quotes - ### Symfony version(s) affected 5.4.8 ### Description Hi to everyone, I noticed that the Simfony/Process::prepareWindowsCommandLine() does not perperly work in case of presence of double quotes in command line: they are incorrectly replace or indifferently replaced by empty string to avoid to fail. In fact, Windows command line expects three double quotes (""") if command contains double quotes, it does not work otherwise. i.e. The command as follows fails: `copy "C:\user\file.txt" "C:\user\folder1\file.txt"` --> `copy C:\user\file.txt C:\user\folder1\file.txt` Did anyone have observed that yet? ### How to reproduce Call the function run() or mustRun() command using double quotes. ### Possible Solution Changing properly the prepareWindowsCommandLine() method on its inner ` function ($m) use (&$env, &$varCache, &$varCount, $uid)` ### Additional Context _No response_
process
simfony process preparewindowscommandline method doesn t properly replace double quotes with triple quotes symfony version s affected description hi to everyone i noticed that the simfony process preparewindowscommandline does not perperly work in case of presence of double quotes in command line they are incorrectly replace or indifferently replaced by empty string to avoid to fail in fact windows command line expects three double quotes if command contains double quotes it does not work otherwise i e the command as follows fails copy c user file txt c user file txt copy c user file txt c user file txt did anyone have observed that yet how to reproduce call the function run or mustrun command using double quotes possible solution changing properly the preparewindowscommandline method on its inner function m use env varcache varcount uid additional context no response
1
21,195
3,873,954,796
IssuesEvent
2016-04-11 18:47:16
elastic/kibana
https://api.github.com/repos/elastic/kibana
opened
[integration tests] Allow ES plugins to be installed for integration tests
discuss test
In Ingest UI, some of the processors are actually Elasticsearch plugins. An example of this is the GeoIp processor. In order for me to write integration tests in Kibana, I need to be able to somehow install that plugin on the Elasticsearch instance that gets created to run the integration tests.
1.0
[integration tests] Allow ES plugins to be installed for integration tests - In Ingest UI, some of the processors are actually Elasticsearch plugins. An example of this is the GeoIp processor. In order for me to write integration tests in Kibana, I need to be able to somehow install that plugin on the Elasticsearch instance that gets created to run the integration tests.
non_process
allow es plugins to be installed for integration tests in ingest ui some of the processors are actually elasticsearch plugins an example of this is the geoip processor in order for me to write integration tests in kibana i need to be able to somehow install that plugin on the elasticsearch instance that gets created to run the integration tests
0
58,855
3,092,203,050
IssuesEvent
2015-08-26 16:37:30
unt-libraries/django-name
https://api.github.com/repos/unt-libraries/django-name
closed
Naive Datetime Objects in Stats
bug priority high
The `stats` module is creating naive datetime objects, and then trying to compare them to timezone aware datetime objects (if `USE_TZ` is True). This is resulting in a 500
1.0
Naive Datetime Objects in Stats - The `stats` module is creating naive datetime objects, and then trying to compare them to timezone aware datetime objects (if `USE_TZ` is True). This is resulting in a 500
non_process
naive datetime objects in stats the stats module is creating naive datetime objects and then trying to compare them to timezone aware datetime objects if use tz is true this is resulting in a
0
233,827
17,909,079,828
IssuesEvent
2021-09-09 00:57:14
mmoomocow/csharp-quiz
https://api.github.com/repos/mmoomocow/csharp-quiz
opened
Document relevant implications
documentation
**Is your feature request related to a problem? Please describe.** Relevant implications are important for the way that programs are developed and designed **Describe the solution you'd like** Add additional description of the relevant implications to the README.md
1.0
Document relevant implications - **Is your feature request related to a problem? Please describe.** Relevant implications are important for the way that programs are developed and designed **Describe the solution you'd like** Add additional description of the relevant implications to the README.md
non_process
document relevant implications is your feature request related to a problem please describe relevant implications are important for the way that programs are developed and designed describe the solution you d like add additional description of the relevant implications to the readme md
0