Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 4
112
| repo_url
stringlengths 33
141
| action
stringclasses 3
values | title
stringlengths 1
1.02k
| labels
stringlengths 4
1.54k
| body
stringlengths 1
262k
| index
stringclasses 17
values | text_combine
stringlengths 95
262k
| label
stringclasses 2
values | text
stringlengths 96
252k
| binary_label
int64 0
1
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
736,616
| 25,480,210,315
|
IssuesEvent
|
2022-11-25 19:31:53
|
brave/brave-browser
|
https://api.github.com/repos/brave/brave-browser
|
closed
|
[Android] Failed Uphold tip still shows success screen in tipping banner
|
bug feature/rewards priority/P3 OS/Android feature/Uphold-wallet
|
## Description
STR:
1. Staging
2. Verify with Uphold
3. Try to tip brave.com
4. This tip will fail according to logs
5. Success error message in tipping banner is still shown, which is incorrect
|
1.0
|
[Android] Failed Uphold tip still shows success screen in tipping banner - ## Description
STR:
1. Staging
2. Verify with Uphold
3. Try to tip brave.com
4. This tip will fail according to logs
5. Success error message in tipping banner is still shown, which is incorrect
|
non_test
|
failed uphold tip still shows success screen in tipping banner description str staging verify with uphold try to tip brave com this tip will fail according to logs success error message in tipping banner is still shown which is incorrect
| 0
|
228,577
| 18,243,706,334
|
IssuesEvent
|
2021-10-01 15:39:13
|
aces/Loris-MRI
|
https://api.github.com/repos/aces/Loris-MRI
|
closed
|
[Testing 24.0] - tools/remove_jiv_data_from_db_and_filesystem.pl ????
|
Tools 24.0-testing
|
Not sure this is really relevant for release 24 given that JIV got killed at release 20.0...
|
1.0
|
[Testing 24.0] - tools/remove_jiv_data_from_db_and_filesystem.pl ???? - Not sure this is really relevant for release 24 given that JIV got killed at release 20.0...
|
test
|
tools remove jiv data from db and filesystem pl not sure this is really relevant for release given that jiv got killed at release
| 1
|
308,252
| 23,240,151,424
|
IssuesEvent
|
2022-08-03 14:56:46
|
zephyrproject-rtos/gsoc-2022-arduino-core
|
https://api.github.com/repos/zephyrproject-rtos/gsoc-2022-arduino-core
|
opened
|
Add Documentation
|
documentation
|
The Docs folder has already been created in https://github.com/zephyrproject-rtos/gsoc-2022-arduino-core/pull/20 but it is mostly written in markdown.
In future it may be better to shift to [Sphinx](https://www.sphinx-doc.org/) as it will look more professional and organised. Github also can build these docs and publish them on a website. See [sphinx: github pages](https://www.sphinx-doc.org/en/master/tutorial/deploying.html#id4)
|
1.0
|
Add Documentation - The Docs folder has already been created in https://github.com/zephyrproject-rtos/gsoc-2022-arduino-core/pull/20 but it is mostly written in markdown.
In future it may be better to shift to [Sphinx](https://www.sphinx-doc.org/) as it will look more professional and organised. Github also can build these docs and publish them on a website. See [sphinx: github pages](https://www.sphinx-doc.org/en/master/tutorial/deploying.html#id4)
|
non_test
|
add documentation the docs folder has already been created in but it is mostly written in markdown in future it may be better to shift to as it will look more professional and organised github also can build these docs and publish them on a website see
| 0
|
36,765
| 8,166,382,218
|
IssuesEvent
|
2018-08-25 08:10:48
|
joomla/joomla-cms
|
https://api.github.com/repos/joomla/joomla-cms
|
closed
|
Stages/Transitions should not be always visible in article
|
No Code Attached Yet
|
### Steps to reproduce the issue
- Create a new workflow
- Set it as default
- Delete the default workflow
- Go to articles
- click on the left site on "Stages"
### Problem
You cannot estimate the "active workflow" from the article view. The following PR broke the behavior: https://github.com/joomla/joomla-cms/pull/21709
### Solution
It makes no sense to have an article => stage connection, it has always to be Article => Workflow => Stage
|
1.0
|
Stages/Transitions should not be always visible in article - ### Steps to reproduce the issue
- Create a new workflow
- Set it as default
- Delete the default workflow
- Go to articles
- click on the left site on "Stages"
### Problem
You cannot estimate the "active workflow" from the article view. The following PR broke the behavior: https://github.com/joomla/joomla-cms/pull/21709
### Solution
It makes no sense to have an article => stage connection, it has always to be Article => Workflow => Stage
|
non_test
|
stages transitions should not be always visible in article steps to reproduce the issue create a new workflow set it as default delete the default workflow go to articles click on the left site on stages problem you cannot estimate the active workflow from the article view the following pr broke the behavior solution it makes no sense to have an article stage connection it has always to be article workflow stage
| 0
|
654,787
| 21,664,050,078
|
IssuesEvent
|
2022-05-07 00:11:25
|
o3de/o3de
|
https://api.github.com/repos/o3de/o3de
|
closed
|
Box selection in Entity Outliner leaves some entities selected even if the box does not hover over any entities
|
feature/editor kind/bug sig/content triage/accepted priority/minor
|
**Describe the bug**
The box selection in Entity Outliner does not deselect all entities if not hovering over any entity.
Please note that the issue does not occur when box selecting entities in the Viewport.
Please refer to the attached video for more details.
**Steps to reproduce**
Steps to reproduce the behavior:
1. Open any Level.
2. Expand all entities in the Entity Outliner.
3. Press and hold LMB and box select a few entities (do not release LMB).
4. Move the mouse cursor so that no entities are box selected.
**Expected behavior**
All entities are deselected.
**Actual behavior**
At least one entity remains selected.
**Screenshots/Video**
https://user-images.githubusercontent.com/86953108/161974121-3673ef75-3593-49e6-b5b2-d88a1535cd06.mp4
**Found in Branch**
Stabilization_2205 (3e47df2)
Development (d4f993e)
**Desktop/Device:**
- Device: PC
- OS: Windows
- Version 10
- CPU AMD Ryzen 5 3600
- GPU Nvidia RTX 2060 Super
- Memory 16GB
|
1.0
|
Box selection in Entity Outliner leaves some entities selected even if the box does not hover over any entities - **Describe the bug**
The box selection in Entity Outliner does not deselect all entities if not hovering over any entity.
Please note that the issue does not occur when box selecting entities in the Viewport.
Please refer to the attached video for more details.
**Steps to reproduce**
Steps to reproduce the behavior:
1. Open any Level.
2. Expand all entities in the Entity Outliner.
3. Press and hold LMB and box select a few entities (do not release LMB).
4. Move the mouse cursor so that no entities are box selected.
**Expected behavior**
All entities are deselected.
**Actual behavior**
At least one entity remains selected.
**Screenshots/Video**
https://user-images.githubusercontent.com/86953108/161974121-3673ef75-3593-49e6-b5b2-d88a1535cd06.mp4
**Found in Branch**
Stabilization_2205 (3e47df2)
Development (d4f993e)
**Desktop/Device:**
- Device: PC
- OS: Windows
- Version 10
- CPU AMD Ryzen 5 3600
- GPU Nvidia RTX 2060 Super
- Memory 16GB
|
non_test
|
box selection in entity outliner leaves some entities selected even if the box does not hover over any entities describe the bug the box selection in entity outliner does not deselect all entities if not hovering over any entity please note that the issue does not occur when box selecting entities in the viewport please refer to the attached video for more details steps to reproduce steps to reproduce the behavior open any level expand all entities in the entity outliner press and hold lmb and box select a few entities do not release lmb move the mouse cursor so that no entities are box selected expected behavior all entities are deselected actual behavior at least one entity remains selected screenshots video found in branch stabilization development desktop device device pc os windows version cpu amd ryzen gpu nvidia rtx super memory
| 0
|
156,736
| 5,988,434,004
|
IssuesEvent
|
2017-06-02 04:39:18
|
vmware/vic
|
https://api.github.com/repos/vmware/vic
|
closed
|
Create container folders on datastore with the display name as created and shown in webclient instead of ID
|
area/ux area/vsphere priority/low
|
**User Statement:**
1. Create a container using docker command.
2. Automatically display name is picked and container gets created
3. On the compute datastore this display name is not retained but the folders are created with the ID
This is very inconvenient to look for container specific logs on the underlying datastore.
**Details:**
Screenshot attached : Container-Display-name.png which shows the display name of the container created.
container-display-name.PNG - Folder structure on the datastore on which the container got created


**Acceptance Criteria:**
Container folder that gets created on the datastore should have the same name as the display name in webclient for better usability.
#For bug reports, please include the information below:
**VIC version:**
./vic-machine-linux --version
vic-machine-linux version v1.1.0-rc3-10888-bc67e17
|
1.0
|
Create container folders on datastore with the display name as created and shown in webclient instead of ID - **User Statement:**
1. Create a container using docker command.
2. Automatically display name is picked and container gets created
3. On the compute datastore this display name is not retained but the folders are created with the ID
This is very inconvenient to look for container specific logs on the underlying datastore.
**Details:**
Screenshot attached : Container-Display-name.png which shows the display name of the container created.
container-display-name.PNG - Folder structure on the datastore on which the container got created


**Acceptance Criteria:**
Container folder that gets created on the datastore should have the same name as the display name in webclient for better usability.
#For bug reports, please include the information below:
**VIC version:**
./vic-machine-linux --version
vic-machine-linux version v1.1.0-rc3-10888-bc67e17
|
non_test
|
create container folders on datastore with the display name as created and shown in webclient instead of id user statement create a container using docker command automatically display name is picked and container gets created on the compute datastore this display name is not retained but the folders are created with the id this is very inconvenient to look for container specific logs on the underlying datastore details screenshot attached container display name png which shows the display name of the container created container display name png folder structure on the datastore on which the container got created acceptance criteria container folder that gets created on the datastore should have the same name as the display name in webclient for better usability for bug reports please include the information below vic version vic machine linux version vic machine linux version
| 0
|
43,011
| 5,513,240,736
|
IssuesEvent
|
2017-03-17 11:55:08
|
restrictcontentpro/restrict-content-pro
|
https://api.github.com/repos/restrictcontentpro/restrict-content-pro
|
closed
|
Stripe customer balance should be removed if payment fails
|
bug has PR needs testing
|
When using signup fees:
If a member tries to subscribe and the customer credit card is attached to the Stripe customer object, but the actual charge fails, the customer balance is not adjusted.
If the customer tries again, a second balance is added to their Stripe customer object. This makes it possible for the customer to be charged more than intended.
If the initial payment fails, we should remove the amount we added from the customer balance so that any additional attempts work as expected.
Stripe has a test card number that tests this scenario. It is: `4000000000000341`
|
1.0
|
Stripe customer balance should be removed if payment fails - When using signup fees:
If a member tries to subscribe and the customer credit card is attached to the Stripe customer object, but the actual charge fails, the customer balance is not adjusted.
If the customer tries again, a second balance is added to their Stripe customer object. This makes it possible for the customer to be charged more than intended.
If the initial payment fails, we should remove the amount we added from the customer balance so that any additional attempts work as expected.
Stripe has a test card number that tests this scenario. It is: `4000000000000341`
|
test
|
stripe customer balance should be removed if payment fails when using signup fees if a member tries to subscribe and the customer credit card is attached to the stripe customer object but the actual charge fails the customer balance is not adjusted if the customer tries again a second balance is added to their stripe customer object this makes it possible for the customer to be charged more than intended if the initial payment fails we should remove the amount we added from the customer balance so that any additional attempts work as expected stripe has a test card number that tests this scenario it is
| 1
|
27,410
| 5,346,002,999
|
IssuesEvent
|
2017-02-17 18:29:03
|
digitalutsc/islandora_web_annotations
|
https://api.github.com/repos/digitalutsc/islandora_web_annotations
|
closed
|
Documentation: Islandora Simple Workflow permissions
|
documentation
|
When the Islandora Simple Workflow utility module is enabled, new objects (including AnnotationContainers) have an Inactive state in Fedora, which causes issues with the annotation creation workflow.
Create documentation for the workaround (see comment https://github.com/digitalutsc/islandora_web_annotations/issues/58#issuecomment-274589156).
|
1.0
|
Documentation: Islandora Simple Workflow permissions - When the Islandora Simple Workflow utility module is enabled, new objects (including AnnotationContainers) have an Inactive state in Fedora, which causes issues with the annotation creation workflow.
Create documentation for the workaround (see comment https://github.com/digitalutsc/islandora_web_annotations/issues/58#issuecomment-274589156).
|
non_test
|
documentation islandora simple workflow permissions when the islandora simple workflow utility module is enabled new objects including annotationcontainers have an inactive state in fedora which causes issues with the annotation creation workflow create documentation for the workaround see comment
| 0
|
305,808
| 9,377,333,310
|
IssuesEvent
|
2019-04-04 10:03:38
|
webcompat/web-bugs
|
https://api.github.com/repos/webcompat/web-bugs
|
closed
|
www.target.com - see bug description
|
browser-firefox-mobile priority-important
|
<!-- @browser: Firefox Mobile 65.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 6.0.1; Mobile; rv:65.0) Gecko/65.0 Firefox/65.0 -->
<!-- @reported_with: -->
**URL**: https://www.target.com/s?searchTerm=univeral+thread+shoes
**Browser / Version**: Firefox Mobile 65.0
**Operating System**: Android 6.0.1
**Tested Another Browser**: No
**Problem type**: Something else
**Description**: the Intruder that has invaded my phone won't allow my phone to load pages
**Steps to Reproduce**:
the page I want to view it will not load or I will be moved to another website
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
1.0
|
www.target.com - see bug description - <!-- @browser: Firefox Mobile 65.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 6.0.1; Mobile; rv:65.0) Gecko/65.0 Firefox/65.0 -->
<!-- @reported_with: -->
**URL**: https://www.target.com/s?searchTerm=univeral+thread+shoes
**Browser / Version**: Firefox Mobile 65.0
**Operating System**: Android 6.0.1
**Tested Another Browser**: No
**Problem type**: Something else
**Description**: the Intruder that has invaded my phone won't allow my phone to load pages
**Steps to Reproduce**:
the page I want to view it will not load or I will be moved to another website
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
non_test
|
see bug description url browser version firefox mobile operating system android tested another browser no problem type something else description the intruder that has invaded my phone won t allow my phone to load pages steps to reproduce the page i want to view it will not load or i will be moved to another website browser configuration none from with ❤️
| 0
|
164,927
| 20,510,620,984
|
IssuesEvent
|
2022-03-01 05:51:34
|
Nivaskumark/external_libavc
|
https://api.github.com/repos/Nivaskumark/external_libavc
|
opened
|
libavcandroid-10.0.0_r47: 16 vulnerabilities (highest severity is: 8.8)
|
security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p></summary>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
</p>
</p></p>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2021-0325](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0325) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | libavcandroid-10.0.0_r47 | Direct | android-11.0.0_r29 | ❌ |
| [CVE-2017-0538](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0538) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-7.1.1_r31 | ❌ |
| [CVE-2021-0519](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0519) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | multiple | Direct | N/A | ❌ |
| [CVE-2017-0673](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-7.1.2_r18 | ❌ |
| [CVE-2017-0761](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0761) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-8.1.0_r10 | ❌ |
| [CVE-2017-0469](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0469) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-7.1.1_r7 | ❌ |
| [CVE-2017-0680](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0680) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-7.1.2_r18 | ❌ |
| [CVE-2017-0473](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0473) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | The vendor has issued a fix (patch level 2017-03-01, patch level 2017-03-05).
The vendor advisory is available at:
https://source.android.com/security/bulletin/2017-03-01.html | ❌ |
| [CVE-2017-0858](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0858) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | libavcandroid-10.0.0_r47 | Direct | android-8.0.0_r25 | ❌ |
| [CVE-2020-0191](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0191) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | libavcandroid-10.0.0_r47 | Direct | android-10.0.0_r37 | ❌ |
| [CVE-2021-0690](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0690) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | libavcandroid-10.0.0_r47 | Direct | android-11.0.0_r43 | ❌ |
| [CVE-2020-0192](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0192) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | libavcandroid-10.0.0_r47 | Direct | android-10.0.0_r37 | ❌ |
| [CVE-2017-0730](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0730) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | libavcandroid-10.0.0_r47 | Direct | android-7.1.2_r18 | ❌ |
| [CVE-2017-0484](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0484) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | libavcandroid-10.0.0_r47 | Direct | android-7.1.1_r23 | ❌ |
| [CVE-2016-6713](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6713) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | libavcandroid-10.0.0_r47 | Direct | android-6.0.1_r78;android-7.0.0_r15 | ❌ |
| [CVE-2021-0601](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0601) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | libavcandroid-10.0.0_r47 | Direct | android-11.0.0_r39 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-0325</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_slice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784
<p>Publish Date: 2021-02-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0325>CVE-2021-0325</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2021-02-01">https://source.android.com/security/bulletin/2021-02-01</a></p>
<p>Release Date: 2021-02-10</p>
<p>Fix Resolution: android-11.0.0_r29</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0538</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in libavc in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33641588.
<p>Publish Date: 2017-04-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0538>CVE-2017-0538</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-04-01">https://source.android.com/security/bulletin/2017-04-01</a></p>
<p>Release Date: 2018-12-22</p>
<p>Fix Resolution: android-7.1.1_r31</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-0519</summary>
### Vulnerable Libraries - <b>libavcandroid-10.0.0_r47</b>, <b>libavcandroid-10.0.0_r47</b>, <b>libavcandroid-10.0.0_r47</b>, <b>libavcandroid-10.0.0_r47</b>, <b>libavcandroid-10.0.0_r47</b></p>
<p>
</p>
<p></p>
### Vulnerability Details
<p>
In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109
<p>Publish Date: 2021-08-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0519>CVE-2021-0519</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0673</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-33974623.
<p>Publish Date: 2017-07-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0673>CVE-2017-0673</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-07-01">https://source.android.com/security/bulletin/2017-07-01</a></p>
<p>Release Date: 2017-07-06</p>
<p>Fix Resolution: android-7.1.2_r18</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0761</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_process_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38448381.
<p>Publish Date: 2017-09-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0761>CVE-2017-0761</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-09-01">https://source.android.com/security/bulletin/2017-09-01</a></p>
<p>Release Date: 2017-09-08</p>
<p>Fix Resolution: android-8.1.0_r10</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0469</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33450635.
<p>Publish Date: 2017-03-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0469>CVE-2017-0469</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-03-01">https://source.android.com/security/bulletin/2017-03-01</a></p>
<p>Release Date: 2017-03-08</p>
<p>Fix Resolution: android-7.1.1_r7</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0680</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37008096.
<p>Publish Date: 2017-07-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0680>CVE-2017-0680</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-07-01">https://source.android.com/security/bulletin/2017-07-01</a></p>
<p>Release Date: 2017-07-06</p>
<p>Fix Resolution: android-7.1.2_r18</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0473</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33982658.
<p>Publish Date: 2017-03-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0473>CVE-2017-0473</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://www.securitytracker.com/id/1037968">http://www.securitytracker.com/id/1037968</a></p>
<p>Fix Resolution: The vendor has issued a fix (patch level 2017-03-01, patch level 2017-03-05).
The vendor advisory is available at:
https://source.android.com/security/bulletin/2017-03-01.html</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0858</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
Another vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64836894.
<p>Publish Date: 2017-11-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0858>CVE-2017-0858</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/pixel/2017-11-01">https://source.android.com/security/bulletin/pixel/2017-11-01</a></p>
<p>Release Date: 2017-11-16</p>
<p>Fix Resolution: android-8.0.0_r25</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-0191</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_slice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In ih264d_update_default_index_list() of ih264d_dpb_mgr.c, there is a possible out of bounds read due to a logic error. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140561484
<p>Publish Date: 2020-06-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0191>CVE-2020-0191</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0191">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0191</a></p>
<p>Release Date: 2020-06-11</p>
<p>Fix Resolution: android-10.0.0_r37</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-0690</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_slice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757
<p>Publish Date: 2021-10-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0690>CVE-2021-0690</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2021-09-01">https://source.android.com/security/bulletin/2021-09-01</a></p>
<p>Release Date: 2021-10-06</p>
<p>Fix Resolution: android-11.0.0_r43</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-0192</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_slice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In ih264d_decode_slice_thread of ih264d_thread_parse_decode.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-144687080
<p>Publish Date: 2020-06-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0192>CVE-2020-0192</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0192</a></p>
<p>Release Date: 2020-06-11</p>
<p>Fix Resolution: android-10.0.0_r37</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-0730</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A denial of service vulnerability in the Android media framework (h264 decoder). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36279112.
<p>Publish Date: 2017-08-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0730>CVE-2017-0730</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-08-01">https://source.android.com/security/bulletin/2017-08-01</a></p>
<p>Release Date: 2017-08-09</p>
<p>Fix Resolution: android-7.1.2_r18</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-0484</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33298089.
<p>Publish Date: 2017-03-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0484>CVE-2017-0484</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-03-01">https://source.android.com/security/bulletin/2017-03-01</a></p>
<p>Release Date: 2017-03-08</p>
<p>Fix Resolution: android-7.1.1_r23</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-6713</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_inter_pred.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote denial of service vulnerability in Mediaserver in Android 6.x before 2016-11-01 and 7.0 before 2016-11-01 could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Android ID: A-30822755.
<p>Publish Date: 2016-11-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6713>CVE-2016-6713</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2016-11-01">https://source.android.com/security/bulletin/2016-11-01</a></p>
<p>Release Date: 2018-12-23</p>
<p>Fix Resolution: android-6.0.1_r78;android-7.0.0_r15</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-0601</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/encoder/ih264e_encode.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out of bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-180643802
<p>Publish Date: 2021-07-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0601>CVE-2021-0601</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2021-07-01">https://source.android.com/security/bulletin/2021-07-01</a></p>
<p>Release Date: 2020-11-07</p>
<p>Fix Resolution: android-11.0.0_r39</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0325","vulnerabilityDetails":"In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0325","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0538","vulnerabilityDetails":"A remote code execution vulnerability in libavc in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33641588.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0538","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0519","vulnerabilityDetails":"In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0519","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0673","vulnerabilityDetails":"A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-33974623.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0673","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0761","vulnerabilityDetails":"A remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38448381.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0761","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0469","vulnerabilityDetails":"A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33450635.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0469","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0680","vulnerabilityDetails":"A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37008096.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0680","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0473","vulnerabilityDetails":"A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33982658.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0473","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0858","vulnerabilityDetails":"Another vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64836894.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0858","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-0191","vulnerabilityDetails":"In ih264d_update_default_index_list() of ih264d_dpb_mgr.c, there is a possible out of bounds read due to a logic error. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140561484","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0191","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0690","vulnerabilityDetails":"In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0690","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-0192","vulnerabilityDetails":"In ih264d_decode_slice_thread of ih264d_thread_parse_decode.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-144687080","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0192","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0730","vulnerabilityDetails":"A denial of service vulnerability in the Android media framework (h264 decoder). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36279112.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0730","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0484","vulnerabilityDetails":"A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33298089.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0484","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2016-6713","vulnerabilityDetails":"A remote denial of service vulnerability in Mediaserver in Android 6.x before 2016-11-01 and 7.0 before 2016-11-01 could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Android ID: A-30822755.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6713","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0601","vulnerabilityDetails":"In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out of bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-180643802","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0601","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}]</REMEDIATE> -->
|
True
|
libavcandroid-10.0.0_r47: 16 vulnerabilities (highest severity is: 8.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p></summary>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
</p>
</p></p>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2021-0325](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0325) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | libavcandroid-10.0.0_r47 | Direct | android-11.0.0_r29 | ❌ |
| [CVE-2017-0538](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0538) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-7.1.1_r31 | ❌ |
| [CVE-2021-0519](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0519) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | multiple | Direct | N/A | ❌ |
| [CVE-2017-0673](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-7.1.2_r18 | ❌ |
| [CVE-2017-0761](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0761) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-8.1.0_r10 | ❌ |
| [CVE-2017-0469](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0469) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-7.1.1_r7 | ❌ |
| [CVE-2017-0680](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0680) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | android-7.1.2_r18 | ❌ |
| [CVE-2017-0473](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0473) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | libavcandroid-10.0.0_r47 | Direct | The vendor has issued a fix (patch level 2017-03-01, patch level 2017-03-05).
The vendor advisory is available at:
https://source.android.com/security/bulletin/2017-03-01.html | ❌ |
| [CVE-2017-0858](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0858) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | libavcandroid-10.0.0_r47 | Direct | android-8.0.0_r25 | ❌ |
| [CVE-2020-0191](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0191) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | libavcandroid-10.0.0_r47 | Direct | android-10.0.0_r37 | ❌ |
| [CVE-2021-0690](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0690) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | libavcandroid-10.0.0_r47 | Direct | android-11.0.0_r43 | ❌ |
| [CVE-2020-0192](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0192) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | libavcandroid-10.0.0_r47 | Direct | android-10.0.0_r37 | ❌ |
| [CVE-2017-0730](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0730) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | libavcandroid-10.0.0_r47 | Direct | android-7.1.2_r18 | ❌ |
| [CVE-2017-0484](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0484) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | libavcandroid-10.0.0_r47 | Direct | android-7.1.1_r23 | ❌ |
| [CVE-2016-6713](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6713) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | libavcandroid-10.0.0_r47 | Direct | android-6.0.1_r78;android-7.0.0_r15 | ❌ |
| [CVE-2021-0601](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0601) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | libavcandroid-10.0.0_r47 | Direct | android-11.0.0_r39 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-0325</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_slice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784
<p>Publish Date: 2021-02-10
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0325>CVE-2021-0325</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2021-02-01">https://source.android.com/security/bulletin/2021-02-01</a></p>
<p>Release Date: 2021-02-10</p>
<p>Fix Resolution: android-11.0.0_r29</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0538</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in libavc in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33641588.
<p>Publish Date: 2017-04-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0538>CVE-2017-0538</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-04-01">https://source.android.com/security/bulletin/2017-04-01</a></p>
<p>Release Date: 2018-12-22</p>
<p>Fix Resolution: android-7.1.1_r31</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-0519</summary>
### Vulnerable Libraries - <b>libavcandroid-10.0.0_r47</b>, <b>libavcandroid-10.0.0_r47</b>, <b>libavcandroid-10.0.0_r47</b>, <b>libavcandroid-10.0.0_r47</b>, <b>libavcandroid-10.0.0_r47</b></p>
<p>
</p>
<p></p>
### Vulnerability Details
<p>
In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109
<p>Publish Date: 2021-08-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0519>CVE-2021-0519</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0673</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-33974623.
<p>Publish Date: 2017-07-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0673>CVE-2017-0673</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-07-01">https://source.android.com/security/bulletin/2017-07-01</a></p>
<p>Release Date: 2017-07-06</p>
<p>Fix Resolution: android-7.1.2_r18</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0761</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_process_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38448381.
<p>Publish Date: 2017-09-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0761>CVE-2017-0761</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-09-01">https://source.android.com/security/bulletin/2017-09-01</a></p>
<p>Release Date: 2017-09-08</p>
<p>Fix Resolution: android-8.1.0_r10</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0469</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33450635.
<p>Publish Date: 2017-03-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0469>CVE-2017-0469</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-03-01">https://source.android.com/security/bulletin/2017-03-01</a></p>
<p>Release Date: 2017-03-08</p>
<p>Fix Resolution: android-7.1.1_r7</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0680</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37008096.
<p>Publish Date: 2017-07-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0680>CVE-2017-0680</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-07-01">https://source.android.com/security/bulletin/2017-07-01</a></p>
<p>Release Date: 2017-07-06</p>
<p>Fix Resolution: android-7.1.2_r18</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0473</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33982658.
<p>Publish Date: 2017-03-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0473>CVE-2017-0473</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://www.securitytracker.com/id/1037968">http://www.securitytracker.com/id/1037968</a></p>
<p>Fix Resolution: The vendor has issued a fix (patch level 2017-03-01, patch level 2017-03-05).
The vendor advisory is available at:
https://source.android.com/security/bulletin/2017-03-01.html</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-0858</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
Another vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64836894.
<p>Publish Date: 2017-11-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0858>CVE-2017-0858</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/pixel/2017-11-01">https://source.android.com/security/bulletin/pixel/2017-11-01</a></p>
<p>Release Date: 2017-11-16</p>
<p>Fix Resolution: android-8.0.0_r25</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-0191</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_slice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In ih264d_update_default_index_list() of ih264d_dpb_mgr.c, there is a possible out of bounds read due to a logic error. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140561484
<p>Publish Date: 2020-06-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0191>CVE-2020-0191</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0191">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0191</a></p>
<p>Release Date: 2020-06-11</p>
<p>Fix Resolution: android-10.0.0_r37</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-0690</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_slice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757
<p>Publish Date: 2021-10-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0690>CVE-2021-0690</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2021-09-01">https://source.android.com/security/bulletin/2021-09-01</a></p>
<p>Release Date: 2021-10-06</p>
<p>Fix Resolution: android-11.0.0_r43</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-0192</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_slice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In ih264d_decode_slice_thread of ih264d_thread_parse_decode.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-144687080
<p>Publish Date: 2020-06-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0192>CVE-2020-0192</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0192">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0192</a></p>
<p>Release Date: 2020-06-11</p>
<p>Fix Resolution: android-10.0.0_r37</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-0730</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A denial of service vulnerability in the Android media framework (h264 decoder). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36279112.
<p>Publish Date: 2017-08-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0730>CVE-2017-0730</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-08-01">https://source.android.com/security/bulletin/2017-08-01</a></p>
<p>Release Date: 2017-08-09</p>
<p>Fix Resolution: android-7.1.2_r18</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-0484</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_parse_pslice.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33298089.
<p>Publish Date: 2017-03-08
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0484>CVE-2017-0484</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2017-03-01">https://source.android.com/security/bulletin/2017-03-01</a></p>
<p>Release Date: 2017-03-08</p>
<p>Fix Resolution: android-7.1.1_r23</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-6713</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/decoder/ih264d_inter_pred.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
A remote denial of service vulnerability in Mediaserver in Android 6.x before 2016-11-01 and 7.0 before 2016-11-01 could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Android ID: A-30822755.
<p>Publish Date: 2016-11-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6713>CVE-2016-6713</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2016-11-01">https://source.android.com/security/bulletin/2016-11-01</a></p>
<p>Release Date: 2018-12-23</p>
<p>Fix Resolution: android-6.0.1_r78;android-7.0.0_r15</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-0601</summary>
### Vulnerable Library - <b>libavcandroid-10.0.0_r47</b></p>
<p>
<p>Library home page: <a href=https://android.googlesource.com/platform/external/libavc>https://android.googlesource.com/platform/external/libavc</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Nivaskumark/external_libavc/commit/9afe5625cefdb99f92e1ed7d544a6b19779ea522">9afe5625cefdb99f92e1ed7d544a6b19779ea522</a></p>
<p>Found in base branch: <b>master</b></p></p>
</p></p>
### Vulnerable Source Files (1)
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/encoder/ih264e_encode.c</b>
</p>
<p></p>
</p>
<p></p>
### Vulnerability Details
<p>
In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out of bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-180643802
<p>Publish Date: 2021-07-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0601>CVE-2021-0601</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://source.android.com/security/bulletin/2021-07-01">https://source.android.com/security/bulletin/2021-07-01</a></p>
<p>Release Date: 2020-11-07</p>
<p>Fix Resolution: android-11.0.0_r39</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0325","vulnerabilityDetails":"In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0325","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0538","vulnerabilityDetails":"A remote code execution vulnerability in libavc in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33641588.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0538","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0519","vulnerabilityDetails":"In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0519","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0673","vulnerabilityDetails":"A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-33974623.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0673","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0761","vulnerabilityDetails":"A remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38448381.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0761","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0469","vulnerabilityDetails":"A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33450635.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0469","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0680","vulnerabilityDetails":"A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37008096.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0680","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0473","vulnerabilityDetails":"A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33982658.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0473","cvss3Severity":"high","cvss3Score":"7.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Local","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0858","vulnerabilityDetails":"Another vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64836894.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0858","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-0191","vulnerabilityDetails":"In ih264d_update_default_index_list() of ih264d_dpb_mgr.c, there is a possible out of bounds read due to a logic error. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140561484","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0191","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0690","vulnerabilityDetails":"In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0690","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-0192","vulnerabilityDetails":"In ih264d_decode_slice_thread of ih264d_thread_parse_decode.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-144687080","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-0192","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0730","vulnerabilityDetails":"A denial of service vulnerability in the Android media framework (h264 decoder). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36279112.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0730","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2017-0484","vulnerabilityDetails":"A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33298089.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0484","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2016-6713","vulnerabilityDetails":"A remote denial of service vulnerability in Mediaserver in Android 6.x before 2016-11-01 and 7.0 before 2016-11-01 could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Android ID: A-30822755.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-6713","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Local","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-0601","vulnerabilityDetails":"In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out of bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-180643802","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-0601","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}]</REMEDIATE> -->
|
non_test
|
libavcandroid vulnerabilities highest severity is vulnerable library libavcandroid library home page a href found in head commit a href vulnerable source files decoder parse pslice c vulnerabilities cve severity cvss dependency type fixed in remediation available high libavcandroid direct android ❌ high libavcandroid direct android ❌ high multiple direct n a ❌ high libavcandroid direct android ❌ high libavcandroid direct android ❌ high libavcandroid direct android ❌ high libavcandroid direct android ❌ high libavcandroid direct the vendor has issued a fix patch level patch level the vendor advisory is available at ❌ high libavcandroid direct android ❌ medium libavcandroid direct android ❌ medium libavcandroid direct android ❌ medium libavcandroid direct android ❌ medium libavcandroid direct android ❌ medium libavcandroid direct android ❌ medium libavcandroid direct android android ❌ medium libavcandroid direct android ❌ details cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse slice c vulnerability details in parse pslice of parse pslice c there is a possible out of bounds write due to a heap buffer overflow this could lead to remote code execution with no additional execution privileges needed user interaction is needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse pslice c vulnerability details a remote code execution vulnerability in libavc in mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing this issue is rated as critical due to the possibility of remote code execution within the context of the mediaserver process product android versions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable libraries libavcandroid libavcandroid libavcandroid libavcandroid libavcandroid vulnerability details in bitstream flush of bitstream h there is a possible out of bounds write due to a heap buffer overflow this could lead to local information disclosure with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse pslice c vulnerability details a remote code execution vulnerability in the android media framework product android versions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder process pslice c vulnerability details a remote code execution vulnerability in the android media framework libavc product android versions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse pslice c vulnerability details a remote code execution vulnerability in mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing this issue is rated as critical due to the possibility of remote code execution within the context of the mediaserver process product android versions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse pslice c vulnerability details a remote code execution vulnerability in the android media framework product android versions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse pslice c vulnerability details a remote code execution vulnerability in mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing this issue is rated as critical due to the possibility of remote code execution within the context of the mediaserver process product android versions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href fix resolution the vendor has issued a fix patch level patch level the vendor advisory is available at step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse pslice c vulnerability details another vulnerability in the android media framework n a product android versions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse slice c vulnerability details in update default index list of dpb mgr c there is a possible out of bounds read due to a logic error this could lead to remote information disclosure with no additional execution privileges needed user interaction is needed for exploitation product androidversions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse slice c vulnerability details in mark err slice skip of parse pslice c there is a possible out of bounds write due to a heap buffer overflow this could lead to remote information disclosure with no additional execution privileges needed user interaction is needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse slice c vulnerability details in decode slice thread of thread parse decode c there is a possible out of bounds read due to improper input validation this could lead to remote information disclosure with no additional execution privileges needed user interaction is needed for exploitation product androidversions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse pslice c vulnerability details a denial of service vulnerability in the android media framework decoder product android versions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder parse pslice c vulnerability details a denial of service vulnerability in mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot this issue is rated as high severity due to the possibility of remote denial of service product android versions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files decoder inter pred c vulnerability details a remote denial of service vulnerability in mediaserver in android x before and before could enable an attacker to use a specially crafted file to cause a device hang or reboot this issue is rated as high due to the possibility of remote denial of service android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android android step up your open source security game with whitesource cve vulnerable library libavcandroid library home page a href found in head commit a href found in base branch master vulnerable source files encoder encode c vulnerability details in encodeframes of avc enc fuzzer cpp there is a possible out of bounds write due to a double free this could lead to local information disclosure with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with whitesource basebranches vulnerabilityidentifier cve vulnerabilitydetails in parse pslice of parse pslice c there is a possible out of bounds write due to a heap buffer overflow this could lead to remote code execution with no additional execution privileges needed user interaction is needed for exploitation product androidversions android android android android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails a remote code execution vulnerability in libavc in mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing this issue is rated as critical due to the possibility of remote code execution within the context of the mediaserver process product android versions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails in bitstream flush of bitstream h there is a possible out of bounds write due to a heap buffer overflow this could lead to local information disclosure with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails a remote code execution vulnerability in the android media framework product android versions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails a remote code execution vulnerability in the android media framework libavc product android versions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails a remote code execution vulnerability in mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing this issue is rated as critical due to the possibility of remote code execution within the context of the mediaserver process product android versions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails a remote code execution vulnerability in the android media framework product android versions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails a remote code execution vulnerability in mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing this issue is rated as critical due to the possibility of remote code execution within the context of the mediaserver process product android versions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails another vulnerability in the android media framework n a product android versions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails in update default index list of dpb mgr c there is a possible out of bounds read due to a logic error this could lead to remote information disclosure with no additional execution privileges needed user interaction is needed for exploitation product androidversions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails in mark err slice skip of parse pslice c there is a possible out of bounds write due to a heap buffer overflow this could lead to remote information disclosure with no additional execution privileges needed user interaction is needed for exploitation product androidversions android android android android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails in decode slice thread of thread parse decode c there is a possible out of bounds read due to improper input validation this could lead to remote information disclosure with no additional execution privileges needed user interaction is needed for exploitation product androidversions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails a denial of service vulnerability in the android media framework decoder product android versions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails a denial of service vulnerability in mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot this issue is rated as high severity due to the possibility of remote denial of service product android versions android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails a remote denial of service vulnerability in mediaserver in android x before and before could enable an attacker to use a specially crafted file to cause a device hang or reboot this issue is rated as high due to the possibility of remote denial of service android id a vulnerabilityurl basebranches vulnerabilityidentifier cve vulnerabilitydetails in encodeframes of avc enc fuzzer cpp there is a possible out of bounds write due to a double free this could lead to local information disclosure with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android android android android id a vulnerabilityurl
| 0
|
133,738
| 10,861,489,024
|
IssuesEvent
|
2019-11-14 11:11:42
|
cryptape/cita
|
https://api.github.com/repos/cryptape/cita
|
closed
|
Replace tx_tool
|
call for participation enhancement p:could-have test tool
|
## Description
Use Rust SDK ~~or Python SDK~~.
## Additional Information
------------Chinese-----------
tx_tool 现在只有 CI 在使用,替换其他工具~~或者一个更好的 Python SDK~~
|
1.0
|
Replace tx_tool - ## Description
Use Rust SDK ~~or Python SDK~~.
## Additional Information
------------Chinese-----------
tx_tool 现在只有 CI 在使用,替换其他工具~~或者一个更好的 Python SDK~~
|
test
|
replace tx tool description use rust sdk or python sdk additional information chinese tx tool 现在只有 ci 在使用,替换其他工具 或者一个更好的 python sdk
| 1
|
767,016
| 26,908,269,067
|
IssuesEvent
|
2023-02-06 21:02:38
|
ak2yny/Official-Character-Pack-v2-for-Ultimate-Alliance
|
https://api.github.com/repos/ak2yny/Official-Character-Pack-v2-for-Ultimate-Alliance
|
opened
|
Combat music issues
|
Bug Low Priority
|
Report by Cyborg Sun
- I think these are known, but there are some issues with the combat music in some areas. Some examples off the top of my head are the outdoor areas in Heli 3 being glitchy, the music outright disabling when the water bucket is used in the Great Forge, and the music being too fast and high-pitched on Pitfall compared to the other console versions, as well as inconsistent volume all around. Again, might be hell to actually go through everything.
|
1.0
|
Combat music issues - Report by Cyborg Sun
- I think these are known, but there are some issues with the combat music in some areas. Some examples off the top of my head are the outdoor areas in Heli 3 being glitchy, the music outright disabling when the water bucket is used in the Great Forge, and the music being too fast and high-pitched on Pitfall compared to the other console versions, as well as inconsistent volume all around. Again, might be hell to actually go through everything.
|
non_test
|
combat music issues report by cyborg sun i think these are known but there are some issues with the combat music in some areas some examples off the top of my head are the outdoor areas in heli being glitchy the music outright disabling when the water bucket is used in the great forge and the music being too fast and high pitched on pitfall compared to the other console versions as well as inconsistent volume all around again might be hell to actually go through everything
| 0
|
63,527
| 6,849,108,007
|
IssuesEvent
|
2017-11-13 20:53:34
|
GoogleCloudPlatform/google-cloud-ruby
|
https://api.github.com/repos/GoogleCloudPlatform/google-cloud-ruby
|
closed
|
Trace test warnings
|
api: trace testing type: cleanup
|
The Trace unit tests succeed, but the following errors are printed afterwards:
```
*******************************
*** google-cloud-trace test ***
*******************************
bundle exec rake test
[DEPRECATION] `last_comment` is deprecated. Please use `last_description` instead.
Run options: --seed 7963
# Running:
.......................................................
Finished in 1.229678s, 44.7272 runs/s, 156.1385 assertions/s.
55 runs, 192 assertions, 0 failures, 0 errors, 0 skips
NoMethodError: undefined method `to_grpc' for 2:Integer
Did you mean? to_r
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:96:in `block in patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `each'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/async_reporter.rb:79:in `run_backgrounder'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:291:in `async_run_job'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:315:in `block (2 levels) in ensure_thread'
NoMethodError: undefined method `to_grpc' for 1:Integer
Did you mean? to_r
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:96:in `block in patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `each'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/async_reporter.rb:79:in `run_backgrounder'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:291:in `async_run_job'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:315:in `block (2 levels) in ensure_thread'
NoMethodError: undefined method `to_grpc' for 0:Integer
Did you mean? to_r
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:96:in `block in patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `each'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/async_reporter.rb:79:in `run_backgrounder'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:291:in `async_run_job'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:315:in `block (2 levels) in ensure_thread'
```
|
1.0
|
Trace test warnings - The Trace unit tests succeed, but the following errors are printed afterwards:
```
*******************************
*** google-cloud-trace test ***
*******************************
bundle exec rake test
[DEPRECATION] `last_comment` is deprecated. Please use `last_description` instead.
Run options: --seed 7963
# Running:
.......................................................
Finished in 1.229678s, 44.7272 runs/s, 156.1385 assertions/s.
55 runs, 192 assertions, 0 failures, 0 errors, 0 skips
NoMethodError: undefined method `to_grpc' for 2:Integer
Did you mean? to_r
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:96:in `block in patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `each'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/async_reporter.rb:79:in `run_backgrounder'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:291:in `async_run_job'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:315:in `block (2 levels) in ensure_thread'
NoMethodError: undefined method `to_grpc' for 1:Integer
Did you mean? to_r
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:96:in `block in patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `each'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/async_reporter.rb:79:in `run_backgrounder'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:291:in `async_run_job'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:315:in `block (2 levels) in ensure_thread'
NoMethodError: undefined method `to_grpc' for 0:Integer
Did you mean? to_r
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:96:in `block in patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `each'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/service.rb:95:in `patch_traces'
/home/ubuntu/google-cloud-ruby/google-cloud-trace/lib/google/cloud/trace/async_reporter.rb:79:in `run_backgrounder'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:291:in `async_run_job'
/home/ubuntu/google-cloud-ruby/stackdriver-core/lib/stackdriver/core/async_actor.rb:315:in `block (2 levels) in ensure_thread'
```
|
test
|
trace test warnings the trace unit tests succeed but the following errors are printed afterwards google cloud trace test bundle exec rake test last comment is deprecated please use last description instead run options seed running finished in runs s assertions s runs assertions failures errors skips nomethoderror undefined method to grpc for integer did you mean to r home ubuntu google cloud ruby google cloud trace lib google cloud trace service rb in block in patch traces home ubuntu google cloud ruby google cloud trace lib google cloud trace service rb in each home ubuntu google cloud ruby google cloud trace lib google cloud trace service rb in patch traces home ubuntu google cloud ruby google cloud trace lib google cloud trace async reporter rb in run backgrounder home ubuntu google cloud ruby stackdriver core lib stackdriver core async actor rb in async run job home ubuntu google cloud ruby stackdriver core lib stackdriver core async actor rb in block levels in ensure thread nomethoderror undefined method to grpc for integer did you mean to r home ubuntu google cloud ruby google cloud trace lib google cloud trace service rb in block in patch traces home ubuntu google cloud ruby google cloud trace lib google cloud trace service rb in each home ubuntu google cloud ruby google cloud trace lib google cloud trace service rb in patch traces home ubuntu google cloud ruby google cloud trace lib google cloud trace async reporter rb in run backgrounder home ubuntu google cloud ruby stackdriver core lib stackdriver core async actor rb in async run job home ubuntu google cloud ruby stackdriver core lib stackdriver core async actor rb in block levels in ensure thread nomethoderror undefined method to grpc for integer did you mean to r home ubuntu google cloud ruby google cloud trace lib google cloud trace service rb in block in patch traces home ubuntu google cloud ruby google cloud trace lib google cloud trace service rb in each home ubuntu google cloud ruby google cloud trace lib google cloud trace service rb in patch traces home ubuntu google cloud ruby google cloud trace lib google cloud trace async reporter rb in run backgrounder home ubuntu google cloud ruby stackdriver core lib stackdriver core async actor rb in async run job home ubuntu google cloud ruby stackdriver core lib stackdriver core async actor rb in block levels in ensure thread
| 1
|
145,012
| 19,319,012,251
|
IssuesEvent
|
2021-12-14 01:49:49
|
peterwkc85/selenium-jupiter
|
https://api.github.com/repos/peterwkc85/selenium-jupiter
|
opened
|
CVE-2019-14540 (High) detected in jackson-databind-2.9.8.jar
|
security vulnerability
|
## CVE-2019-14540 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /selenium-jupiter/build.gradle</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- docker-client-8.15.2.jar (Root Library)
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
<p>Publish Date: 2019-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540>CVE-2019-14540</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p>
<p>Release Date: 2019-09-15</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.11.5,2.9.10,2.10.0.pr3,2.11.0.rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2019-14540 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2019-14540 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /selenium-jupiter/build.gradle</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar,/root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- docker-client-8.15.2.jar (Root Library)
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
<p>Publish Date: 2019-09-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14540>CVE-2019-14540</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p>
<p>Release Date: 2019-09-15</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.11.5,2.9.10,2.10.0.pr3,2.11.0.rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_test
|
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file selenium jupiter build gradle path to vulnerable library root repository com fasterxml jackson core jackson databind jackson databind jar root repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy docker client jar root library x jackson databind jar vulnerable library vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikariconfig publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
| 0
|
663,592
| 22,198,711,818
|
IssuesEvent
|
2022-06-07 09:15:36
|
webcompat/web-bugs
|
https://api.github.com/repos/webcompat/web-bugs
|
closed
|
readmanganato.com - see bug description
|
priority-important browser-fenix engine-gecko
|
<!-- @browser: Firefox Mobile 103.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 7.0; Mobile; rv:103.0) Gecko/103.0 Firefox/103.0 -->
<!-- @reported_with: android-components-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/105452 -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://readmanganato.com/manga-iy985707/chapter-10
**Browser / Version**: Firefox Mobile 103.0
**Operating System**: Android 7.0
**Tested Another Browser**: Yes Chrome
**Problem type**: Something else
**Description**: the next button at the bottom disappear if I scroll into the comment section, load another comment then scroll back up. It will appear if I tap near it.. seems to be visual bug but I never encountered it using another browser
**Steps to Reproduce**:
The row at the next chapter button at the bottom disappear if I scroll into the comment section, load another comment then scroll back up. It will appear if I tap near it.. seems to be visual bug but I never encountered it using another browser
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2022/6/e5f7d01d-9a32-483b-936d-07372ac22f78.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20220605065813</li><li>channel: nightly</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2022/6/b718d174-2a8c-4d9b-900e-087aba443a73)
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
1.0
|
readmanganato.com - see bug description - <!-- @browser: Firefox Mobile 103.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 7.0; Mobile; rv:103.0) Gecko/103.0 Firefox/103.0 -->
<!-- @reported_with: android-components-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/105452 -->
<!-- @extra_labels: browser-fenix -->
**URL**: https://readmanganato.com/manga-iy985707/chapter-10
**Browser / Version**: Firefox Mobile 103.0
**Operating System**: Android 7.0
**Tested Another Browser**: Yes Chrome
**Problem type**: Something else
**Description**: the next button at the bottom disappear if I scroll into the comment section, load another comment then scroll back up. It will appear if I tap near it.. seems to be visual bug but I never encountered it using another browser
**Steps to Reproduce**:
The row at the next chapter button at the bottom disappear if I scroll into the comment section, load another comment then scroll back up. It will appear if I tap near it.. seems to be visual bug but I never encountered it using another browser
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2022/6/e5f7d01d-9a32-483b-936d-07372ac22f78.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20220605065813</li><li>channel: nightly</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2022/6/b718d174-2a8c-4d9b-900e-087aba443a73)
_From [webcompat.com](https://webcompat.com/) with ❤️_
|
non_test
|
readmanganato com see bug description url browser version firefox mobile operating system android tested another browser yes chrome problem type something else description the next button at the bottom disappear if i scroll into the comment section load another comment then scroll back up it will appear if i tap near it seems to be visual bug but i never encountered it using another browser steps to reproduce the row at the next chapter button at the bottom disappear if i scroll into the comment section load another comment then scroll back up it will appear if i tap near it seems to be visual bug but i never encountered it using another browser view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel nightly hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️
| 0
|
230,826
| 7,614,312,124
|
IssuesEvent
|
2018-05-02 02:02:23
|
MyMICDS/MyMICDS-v2
|
https://api.github.com/repos/MyMICDS/MyMICDS-v2
|
closed
|
Image upload certain images fail with vague error
|
bug effort: medium priority: it can wait work length: medium
|
Some images, when uploaded in settings, returns a vague error "There was a problem."
|
1.0
|
Image upload certain images fail with vague error - Some images, when uploaded in settings, returns a vague error "There was a problem."
|
non_test
|
image upload certain images fail with vague error some images when uploaded in settings returns a vague error there was a problem
| 0
|
103,492
| 8,917,602,279
|
IssuesEvent
|
2019-01-20 06:08:51
|
BradleyA/docker-scripts
|
https://api.github.com/repos/BradleyA/docker-scripts
|
closed
|
./copy-user-2-remote-host.sh; test multiple times for port 22 timeout incident
|
additional testing bug
|
need to test ./copy-user-2-remote-host.sh multiple times because it seems like after 2 or 3 times port 22 closes and I had to reboot two.cptx86.com
|
1.0
|
./copy-user-2-remote-host.sh; test multiple times for port 22 timeout incident - need to test ./copy-user-2-remote-host.sh multiple times because it seems like after 2 or 3 times port 22 closes and I had to reboot two.cptx86.com
|
test
|
copy user remote host sh test multiple times for port timeout incident need to test copy user remote host sh multiple times because it seems like after or times port closes and i had to reboot two com
| 1
|
11,877
| 3,236,261,642
|
IssuesEvent
|
2015-10-14 03:18:29
|
kdahlquist/GRNmap
|
https://api.github.com/repos/kdahlquist/GRNmap
|
opened
|
Slight discrepancy when running the code on different computers (Math dept. vs. Seaver lab)
|
data analysis functionality priority 0 testing
|
I recently ran the code on both the math department computers and Seaver lab computers and found out that when the code is run in the math department, the calculations are off up to the 4th decimal place. Since we the test files originated in Seaver, there were no differences when comparing the test files to what GRNmap actually outputs at the moment.
|
1.0
|
Slight discrepancy when running the code on different computers (Math dept. vs. Seaver lab) - I recently ran the code on both the math department computers and Seaver lab computers and found out that when the code is run in the math department, the calculations are off up to the 4th decimal place. Since we the test files originated in Seaver, there were no differences when comparing the test files to what GRNmap actually outputs at the moment.
|
test
|
slight discrepancy when running the code on different computers math dept vs seaver lab i recently ran the code on both the math department computers and seaver lab computers and found out that when the code is run in the math department the calculations are off up to the decimal place since we the test files originated in seaver there were no differences when comparing the test files to what grnmap actually outputs at the moment
| 1
|
8,022
| 7,189,719,566
|
IssuesEvent
|
2018-02-02 14:58:42
|
sociomantic-tsunami/turtle
|
https://api.github.com/repos/sociomantic-tsunami/turtle
|
closed
|
D2: Automatically convert tags and push them
|
type-infrastructure
|
To move forward with D2 we need to provide automatically converted libraries for projects that are built only for D2.
Every time a new tag is pushed, we have to convert it to D2, tag the converted version with a `+d2` build metadata information appended (so tag `v2.3.4` --- conversion D2 ---> `v2.3.4+d2`) and push it back (making sure the new tag is not converted again!).
This capability will be probably [added to beaver](https://github.com/sociomantic-tsunami/beaver/issues/7), but at some point we need to use that feature from beaver here.
|
1.0
|
D2: Automatically convert tags and push them - To move forward with D2 we need to provide automatically converted libraries for projects that are built only for D2.
Every time a new tag is pushed, we have to convert it to D2, tag the converted version with a `+d2` build metadata information appended (so tag `v2.3.4` --- conversion D2 ---> `v2.3.4+d2`) and push it back (making sure the new tag is not converted again!).
This capability will be probably [added to beaver](https://github.com/sociomantic-tsunami/beaver/issues/7), but at some point we need to use that feature from beaver here.
|
non_test
|
automatically convert tags and push them to move forward with we need to provide automatically converted libraries for projects that are built only for every time a new tag is pushed we have to convert it to tag the converted version with a build metadata information appended so tag conversion and push it back making sure the new tag is not converted again this capability will be probably but at some point we need to use that feature from beaver here
| 0
|
125,385
| 10,341,280,450
|
IssuesEvent
|
2019-09-04 01:32:16
|
backdrop/backdrop-issues
|
https://api.github.com/repos/backdrop/backdrop-issues
|
closed
|
Core fieldable file entity bundles
|
pr - needs testing pr - ready to be committed status - has pull request type - feature request
|
Were working on adding all of the file_entity module to Backdrop core, including fieldable files.
### Before PR merge:
- [x] Convert file type info to config (move from DB table)
- [x] Remove the default alt and title fields provided out of box on the Image file type.
- [x] Make [UI changes](https://github.com/backdrop/backdrop-issues/issues/2632#issuecomment-526890267) to simplify the "Manage File Display" modes form.
- [x] Add the upgrade path from Backdrop 1.x
- [x] Test the upgrade path from Backdrop 1.x
- [x] Add an upgrade path from Drupal 7 for D7 file types and file_display settings.
- [x] Test the upgrade path from Drupal 7
### Before release (if possible):
- [ ] Move "Manage File Display" settings to the "Manage displays" tab (as settings for the "File" psuedofield.
- [x] Add a wrapper function for file_entity_access with watchdog_deprecated_function()
- [ ] Integrate with Path module (add to vertical tabs + Provide default path aliases for files)
### Optional UX improvements:
- [x] Remove the confirm form when disabling / enabling file types
- [x] Make the disabled types gray, and below the enabled ones.
- [ ] File type config form: Mimetypes should be a checklist or something helpfully clickable like tokens.
- [ ] Add the "Add file" link into admin bar?
### At a later time
* [Discuss adding back Alt and Title fields](https://github.com/backdrop/backdrop-issues/issues/4007)
* Add back-end breadcrumbs for front-end pages `/file/%/manage` and `/file/%/usage`, to allow easy navigation back to `/admin/content/files`
* add something like inline entity form so that we can get additional file fields to show up in other places like node forms and rich-text editor forms.
* there is no obvious way to add a video to a node, now that we allow uploading videos. Should there be an issue for that?
---
#3971 #Original Issue
We do have this task in File management meta issue #1448, but I didn't find separate issue for it.
Looks like we can make file entities fieldable with just one line of code:
`$entity_info['file']['fieldable'] = TRUE;`
So I merged "file types" and "fieldable file types" in one issue. Feel free to separate them if I'm wrong.
---
#Advocates: @docwilmot @jenlampton
----
~PR: https://github.com/backdrop/backdrop/pull/1924~ by @docwilmot
~PR: https://github.com/backdrop/backdrop/pull/2238~ by @jenlampton
~PR: https://github.com/backdrop/backdrop/pull/2832~ by @docwilmot
PR: https://github.com/backdrop/backdrop/pull/2838 by @jenlampton
|
1.0
|
Core fieldable file entity bundles - Were working on adding all of the file_entity module to Backdrop core, including fieldable files.
### Before PR merge:
- [x] Convert file type info to config (move from DB table)
- [x] Remove the default alt and title fields provided out of box on the Image file type.
- [x] Make [UI changes](https://github.com/backdrop/backdrop-issues/issues/2632#issuecomment-526890267) to simplify the "Manage File Display" modes form.
- [x] Add the upgrade path from Backdrop 1.x
- [x] Test the upgrade path from Backdrop 1.x
- [x] Add an upgrade path from Drupal 7 for D7 file types and file_display settings.
- [x] Test the upgrade path from Drupal 7
### Before release (if possible):
- [ ] Move "Manage File Display" settings to the "Manage displays" tab (as settings for the "File" psuedofield.
- [x] Add a wrapper function for file_entity_access with watchdog_deprecated_function()
- [ ] Integrate with Path module (add to vertical tabs + Provide default path aliases for files)
### Optional UX improvements:
- [x] Remove the confirm form when disabling / enabling file types
- [x] Make the disabled types gray, and below the enabled ones.
- [ ] File type config form: Mimetypes should be a checklist or something helpfully clickable like tokens.
- [ ] Add the "Add file" link into admin bar?
### At a later time
* [Discuss adding back Alt and Title fields](https://github.com/backdrop/backdrop-issues/issues/4007)
* Add back-end breadcrumbs for front-end pages `/file/%/manage` and `/file/%/usage`, to allow easy navigation back to `/admin/content/files`
* add something like inline entity form so that we can get additional file fields to show up in other places like node forms and rich-text editor forms.
* there is no obvious way to add a video to a node, now that we allow uploading videos. Should there be an issue for that?
---
#3971 #Original Issue
We do have this task in File management meta issue #1448, but I didn't find separate issue for it.
Looks like we can make file entities fieldable with just one line of code:
`$entity_info['file']['fieldable'] = TRUE;`
So I merged "file types" and "fieldable file types" in one issue. Feel free to separate them if I'm wrong.
---
#Advocates: @docwilmot @jenlampton
----
~PR: https://github.com/backdrop/backdrop/pull/1924~ by @docwilmot
~PR: https://github.com/backdrop/backdrop/pull/2238~ by @jenlampton
~PR: https://github.com/backdrop/backdrop/pull/2832~ by @docwilmot
PR: https://github.com/backdrop/backdrop/pull/2838 by @jenlampton
|
test
|
core fieldable file entity bundles were working on adding all of the file entity module to backdrop core including fieldable files before pr merge convert file type info to config move from db table remove the default alt and title fields provided out of box on the image file type make to simplify the manage file display modes form add the upgrade path from backdrop x test the upgrade path from backdrop x add an upgrade path from drupal for file types and file display settings test the upgrade path from drupal before release if possible move manage file display settings to the manage displays tab as settings for the file psuedofield add a wrapper function for file entity access with watchdog deprecated function integrate with path module add to vertical tabs provide default path aliases for files optional ux improvements remove the confirm form when disabling enabling file types make the disabled types gray and below the enabled ones file type config form mimetypes should be a checklist or something helpfully clickable like tokens add the add file link into admin bar at a later time add back end breadcrumbs for front end pages file manage and file usage to allow easy navigation back to admin content files add something like inline entity form so that we can get additional file fields to show up in other places like node forms and rich text editor forms there is no obvious way to add a video to a node now that we allow uploading videos should there be an issue for that original issue we do have this task in file management meta issue but i didn t find separate issue for it looks like we can make file entities fieldable with just one line of code entity info true so i merged file types and fieldable file types in one issue feel free to separate them if i m wrong advocates docwilmot jenlampton pr by docwilmot pr by jenlampton pr by docwilmot pr by jenlampton
| 1
|
69,298
| 17,619,703,035
|
IssuesEvent
|
2021-08-18 14:01:44
|
hashicorp/packer-plugin-vmware
|
https://api.github.com/repos/hashicorp/packer-plugin-vmware
|
closed
|
cd_files not working properly on vmware-iso
|
bug builder/vmware
|
_This issue was originally opened by @t0rr3sp3dr0 as hashicorp/packer#10935. It was migrated here as a result of the [Packer plugin split](https://github.com/hashicorp/packer/issues/8610#issuecomment-770034737). The original body of the issue is below._
<hr>
#### Overview of the Issue
The latest version of Packer doesn't seem to attach the cd_files generated ISO to the VM upon start.
It only works when adding the following setting:
```hcl
vmx_data = {
"sata1.present": "TRUE",
}
```
#### Reproduction Steps
1. run `packer build`
2. check that the VM doesn't have the generated ISO attached
### Packer version
```text
Packer v1.7.2
```
### Simplified Packer Buildfile
```hcl
source "vmware-iso" "big-sur" {
# VMware-ISO Builder Configuration Reference
cdrom_adapter_type = "sata"
guest_os_type = "darwin20-64"
version = 18
# Extra Disk Configuration
disk_adapter_type = "nvme"
disk_type_id = 0
# ISO Configuration
iso_checksum = "file:./Install macOS Big Sur.cdr.sum"
iso_url = "./Install macOS Big Sur.cdr"
# CD configuration
cd_files = [
"./init.sh",
]
# Shutdown configuration
shutdown_command = "sudo shutdown -h now"
# Communicator configuration
communicator = "ssh"
ssh_username = "user"
ssh_password = "pass"
}
build {
name = "vmware-iso"
sources = [
"sources.vmware-iso.big-sur",
]
}
```
### Operating system and Environment details
```
macOS Big Sur Version 11.2.3 (20D91)
VMware Fusion Player Version 12.1.1 (17801503)
```
### Log Fragments and crash.log files
```log
2021/04/20 00:01:31 [INFO] Packer version: 1.7.2 [go1.16.3 darwin amd64]
2021/04/20 00:01:31 [TRACE] discovering plugins in /usr/local/bin
2021/04/20 00:01:31 [TRACE] discovering plugins in /Users/pedro/.packer.d/plugins
2021/04/20 00:01:31 [TRACE] discovering plugins in .
2021/04/20 00:01:31 [INFO] PACKER_CONFIG env var not set; checking the default config file path
2021/04/20 00:01:31 [INFO] PACKER_CONFIG env var set; attempting to open config file: /Users/pedro/.packerconfig
2021/04/20 00:01:31 [WARN] Config file doesn't exist: /Users/pedro/.packerconfig
2021/04/20 00:01:31 [INFO] Setting cache directory: /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/tmp.FHZeHndKa0/packer_cache
2021/04/20 00:01:31 [TRACE] Starting internal plugin packer-builder-vmware-iso
2021/04/20 00:01:31 Starting plugin: /usr/local/bin/packer []string{"/usr/local/bin/packer", "plugin", "packer-builder-vmware-iso"}
2021/04/20 00:01:31 Waiting for RPC address for: /usr/local/bin/packer
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] Packer version: 1.7.2 [go1.16.3 darwin amd64]
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] PACKER_CONFIG env var not set; checking the default config file path
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] PACKER_CONFIG env var set; attempting to open config file: /Users/pedro/.packerconfig
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [WARN] Config file doesn't exist: /Users/pedro/.packerconfig
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] Setting cache directory: /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/tmp.FHZeHndKa0/packer_cache
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: args: []string{"packer-builder-vmware-iso"}
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Plugin address: unix /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer-plugin743236302
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Waiting for connection...
2021/04/20 00:01:31 Received unix RPC address for /usr/local/bin/packer: addr is /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer-plugin743236302
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Serving a plugin connection...
2021/04/20 00:01:31 Build debug mode: false
2021/04/20 00:01:31 Force build: false
2021/04/20 00:01:31 On error:
2021/04/20 00:01:31 Waiting on builds to complete...
2021/04/20 00:01:31 Starting build run: vmware-iso.vmware-iso.box
2021/04/20 00:01:31 Running builder:
2021/04/20 00:01:31 [INFO] (telemetry) Starting builder
vmware-iso.vmware-iso.box: output will be in this color.
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Detected VMware version: 12
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Testing against vmware driver *common.Fusion6Driver, Success: true
==> vmware-iso.vmware-iso.box: Retrieving ISO
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Acquiring lock for: ./Install%20macOS%20Big%20Sur.cdr?checksum=sha256%3Ae3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 (/var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/tmp.FHZeHndKa0/packer_cache/81fec7813499d6750363f9c7d57fbded7d9e232c.iso.lock)
==> vmware-iso.vmware-iso.box: Trying ./Install macOS Big Sur.cdr
==> vmware-iso.vmware-iso.box: Trying ./Install%20macOS%20Big%20Sur.cdr?checksum=sha256%3Ae3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Leaving retrieve loop for ISO
==> vmware-iso.vmware-iso.box: ./Install%20macOS%20Big%20Sur.cdr?checksum=sha256%3Ae3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 => /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/tmp.FHZeHndKa0/Install macOS Big Sur.cdr
==> vmware-iso.vmware-iso.box: Configuring output and export directories...
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: No floppy files specified. Floppy disk will not be made.
==> vmware-iso.vmware-iso.box: Creating CD disk...
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: CD path: /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer587008816.iso
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Wrote 0 bytes to init.sh
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Executing: /usr/bin/hdiutil [makehybrid -o /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer587008816.iso -hfs -joliet -iso -default-volume-name packer /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer_to_cdrom357419727]
vmware-iso.vmware-iso.box: Creating hybrid image...
vmware-iso.vmware-iso.box: Done copying paths from CD_dirs
==> vmware-iso.vmware-iso.box: Creating required virtual machine disks
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] Creating disk with Path: output-box/disk.vmdk and Size: 40000M
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Executing: /Applications/VMware Fusion.app/Contents/Library/vmware-vdiskmanager -c -s 40000M -a nvme -t 0 output-box/disk.vmdk
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: stdout: Creating disk 'output-box/disk.vmdk'
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Virtual disk creation successful.
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: stderr:
==> vmware-iso.vmware-iso.box: Building and writing VMX file
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Located networkmapper configuration file using Fusion6: /Library/Preferences/VMware Fusion/networking
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Writing VMX to: output-box/packer-box.vmx
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Configuring VMX...
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Writing VMX to: output-box/packer-box.vmx
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Suppressing messages in VMX
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Located networkmapper configuration file using Fusion6: /Library/Preferences/VMware Fusion/networking
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: HostIP discovered device matching nat: vmnet8
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Host IP for the VMware machine: 172.16.96.1
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Looking for available port between 5900 and 6000
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Found available port: 5967 on IP: 127.0.0.1
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Found available VNC port: 127.0.0.1:5967
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Writing VMX to: output-box/packer-box.vmx
==> vmware-iso.vmware-iso.box: Starting virtual machine...
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Executing: /Applications/VMware Fusion.app/Contents/Library/vmrun -T fusion start output-box/packer-box.vmx gui
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: stdout:
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: stderr:
```
|
1.0
|
cd_files not working properly on vmware-iso - _This issue was originally opened by @t0rr3sp3dr0 as hashicorp/packer#10935. It was migrated here as a result of the [Packer plugin split](https://github.com/hashicorp/packer/issues/8610#issuecomment-770034737). The original body of the issue is below._
<hr>
#### Overview of the Issue
The latest version of Packer doesn't seem to attach the cd_files generated ISO to the VM upon start.
It only works when adding the following setting:
```hcl
vmx_data = {
"sata1.present": "TRUE",
}
```
#### Reproduction Steps
1. run `packer build`
2. check that the VM doesn't have the generated ISO attached
### Packer version
```text
Packer v1.7.2
```
### Simplified Packer Buildfile
```hcl
source "vmware-iso" "big-sur" {
# VMware-ISO Builder Configuration Reference
cdrom_adapter_type = "sata"
guest_os_type = "darwin20-64"
version = 18
# Extra Disk Configuration
disk_adapter_type = "nvme"
disk_type_id = 0
# ISO Configuration
iso_checksum = "file:./Install macOS Big Sur.cdr.sum"
iso_url = "./Install macOS Big Sur.cdr"
# CD configuration
cd_files = [
"./init.sh",
]
# Shutdown configuration
shutdown_command = "sudo shutdown -h now"
# Communicator configuration
communicator = "ssh"
ssh_username = "user"
ssh_password = "pass"
}
build {
name = "vmware-iso"
sources = [
"sources.vmware-iso.big-sur",
]
}
```
### Operating system and Environment details
```
macOS Big Sur Version 11.2.3 (20D91)
VMware Fusion Player Version 12.1.1 (17801503)
```
### Log Fragments and crash.log files
```log
2021/04/20 00:01:31 [INFO] Packer version: 1.7.2 [go1.16.3 darwin amd64]
2021/04/20 00:01:31 [TRACE] discovering plugins in /usr/local/bin
2021/04/20 00:01:31 [TRACE] discovering plugins in /Users/pedro/.packer.d/plugins
2021/04/20 00:01:31 [TRACE] discovering plugins in .
2021/04/20 00:01:31 [INFO] PACKER_CONFIG env var not set; checking the default config file path
2021/04/20 00:01:31 [INFO] PACKER_CONFIG env var set; attempting to open config file: /Users/pedro/.packerconfig
2021/04/20 00:01:31 [WARN] Config file doesn't exist: /Users/pedro/.packerconfig
2021/04/20 00:01:31 [INFO] Setting cache directory: /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/tmp.FHZeHndKa0/packer_cache
2021/04/20 00:01:31 [TRACE] Starting internal plugin packer-builder-vmware-iso
2021/04/20 00:01:31 Starting plugin: /usr/local/bin/packer []string{"/usr/local/bin/packer", "plugin", "packer-builder-vmware-iso"}
2021/04/20 00:01:31 Waiting for RPC address for: /usr/local/bin/packer
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] Packer version: 1.7.2 [go1.16.3 darwin amd64]
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] PACKER_CONFIG env var not set; checking the default config file path
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] PACKER_CONFIG env var set; attempting to open config file: /Users/pedro/.packerconfig
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [WARN] Config file doesn't exist: /Users/pedro/.packerconfig
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] Setting cache directory: /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/tmp.FHZeHndKa0/packer_cache
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: args: []string{"packer-builder-vmware-iso"}
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Plugin address: unix /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer-plugin743236302
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Waiting for connection...
2021/04/20 00:01:31 Received unix RPC address for /usr/local/bin/packer: addr is /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer-plugin743236302
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Serving a plugin connection...
2021/04/20 00:01:31 Build debug mode: false
2021/04/20 00:01:31 Force build: false
2021/04/20 00:01:31 On error:
2021/04/20 00:01:31 Waiting on builds to complete...
2021/04/20 00:01:31 Starting build run: vmware-iso.vmware-iso.box
2021/04/20 00:01:31 Running builder:
2021/04/20 00:01:31 [INFO] (telemetry) Starting builder
vmware-iso.vmware-iso.box: output will be in this color.
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Detected VMware version: 12
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Testing against vmware driver *common.Fusion6Driver, Success: true
==> vmware-iso.vmware-iso.box: Retrieving ISO
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Acquiring lock for: ./Install%20macOS%20Big%20Sur.cdr?checksum=sha256%3Ae3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 (/var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/tmp.FHZeHndKa0/packer_cache/81fec7813499d6750363f9c7d57fbded7d9e232c.iso.lock)
==> vmware-iso.vmware-iso.box: Trying ./Install macOS Big Sur.cdr
==> vmware-iso.vmware-iso.box: Trying ./Install%20macOS%20Big%20Sur.cdr?checksum=sha256%3Ae3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Leaving retrieve loop for ISO
==> vmware-iso.vmware-iso.box: ./Install%20macOS%20Big%20Sur.cdr?checksum=sha256%3Ae3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 => /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/tmp.FHZeHndKa0/Install macOS Big Sur.cdr
==> vmware-iso.vmware-iso.box: Configuring output and export directories...
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: No floppy files specified. Floppy disk will not be made.
==> vmware-iso.vmware-iso.box: Creating CD disk...
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: CD path: /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer587008816.iso
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Wrote 0 bytes to init.sh
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Executing: /usr/bin/hdiutil [makehybrid -o /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer587008816.iso -hfs -joliet -iso -default-volume-name packer /var/folders/mc/smgjlfwx7x7dqzllygvlkly00000gn/T/packer_to_cdrom357419727]
vmware-iso.vmware-iso.box: Creating hybrid image...
vmware-iso.vmware-iso.box: Done copying paths from CD_dirs
==> vmware-iso.vmware-iso.box: Creating required virtual machine disks
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: [INFO] Creating disk with Path: output-box/disk.vmdk and Size: 40000M
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Executing: /Applications/VMware Fusion.app/Contents/Library/vmware-vdiskmanager -c -s 40000M -a nvme -t 0 output-box/disk.vmdk
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: stdout: Creating disk 'output-box/disk.vmdk'
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Virtual disk creation successful.
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: stderr:
==> vmware-iso.vmware-iso.box: Building and writing VMX file
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Located networkmapper configuration file using Fusion6: /Library/Preferences/VMware Fusion/networking
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Writing VMX to: output-box/packer-box.vmx
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Configuring VMX...
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Writing VMX to: output-box/packer-box.vmx
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Suppressing messages in VMX
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Located networkmapper configuration file using Fusion6: /Library/Preferences/VMware Fusion/networking
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: HostIP discovered device matching nat: vmnet8
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Host IP for the VMware machine: 172.16.96.1
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Looking for available port between 5900 and 6000
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Found available port: 5967 on IP: 127.0.0.1
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Found available VNC port: 127.0.0.1:5967
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Writing VMX to: output-box/packer-box.vmx
==> vmware-iso.vmware-iso.box: Starting virtual machine...
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: Executing: /Applications/VMware Fusion.app/Contents/Library/vmrun -T fusion start output-box/packer-box.vmx gui
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: stdout:
2021/04/20 00:01:31 packer-builder-vmware-iso plugin: stderr:
```
|
non_test
|
cd files not working properly on vmware iso this issue was originally opened by as hashicorp packer it was migrated here as a result of the the original body of the issue is below overview of the issue the latest version of packer doesn t seem to attach the cd files generated iso to the vm upon start it only works when adding the following setting hcl vmx data present true reproduction steps run packer build check that the vm doesn t have the generated iso attached packer version text packer simplified packer buildfile hcl source vmware iso big sur vmware iso builder configuration reference cdrom adapter type sata guest os type version extra disk configuration disk adapter type nvme disk type id iso configuration iso checksum file install macos big sur cdr sum iso url install macos big sur cdr cd configuration cd files init sh shutdown configuration shutdown command sudo shutdown h now communicator configuration communicator ssh ssh username user ssh password pass build name vmware iso sources sources vmware iso big sur operating system and environment details macos big sur version vmware fusion player version log fragments and crash log files log packer version discovering plugins in usr local bin discovering plugins in users pedro packer d plugins discovering plugins in packer config env var not set checking the default config file path packer config env var set attempting to open config file users pedro packerconfig config file doesn t exist users pedro packerconfig setting cache directory var folders mc t tmp packer cache starting internal plugin packer builder vmware iso starting plugin usr local bin packer string usr local bin packer plugin packer builder vmware iso waiting for rpc address for usr local bin packer packer builder vmware iso plugin packer version packer builder vmware iso plugin packer config env var not set checking the default config file path packer builder vmware iso plugin packer config env var set attempting to open config file users pedro packerconfig packer builder vmware iso plugin config file doesn t exist users pedro packerconfig packer builder vmware iso plugin setting cache directory var folders mc t tmp packer cache packer builder vmware iso plugin args string packer builder vmware iso packer builder vmware iso plugin plugin address unix var folders mc t packer packer builder vmware iso plugin waiting for connection received unix rpc address for usr local bin packer addr is var folders mc t packer packer builder vmware iso plugin serving a plugin connection build debug mode false force build false on error waiting on builds to complete starting build run vmware iso vmware iso box running builder telemetry starting builder vmware iso vmware iso box output will be in this color packer builder vmware iso plugin detected vmware version packer builder vmware iso plugin testing against vmware driver common success true vmware iso vmware iso box retrieving iso packer builder vmware iso plugin acquiring lock for install cdr checksum var folders mc t tmp packer cache iso lock vmware iso vmware iso box trying install macos big sur cdr vmware iso vmware iso box trying install cdr checksum packer builder vmware iso plugin leaving retrieve loop for iso vmware iso vmware iso box install cdr checksum var folders mc t tmp install macos big sur cdr vmware iso vmware iso box configuring output and export directories packer builder vmware iso plugin no floppy files specified floppy disk will not be made vmware iso vmware iso box creating cd disk packer builder vmware iso plugin cd path var folders mc t iso packer builder vmware iso plugin wrote bytes to init sh packer builder vmware iso plugin executing usr bin hdiutil vmware iso vmware iso box creating hybrid image vmware iso vmware iso box done copying paths from cd dirs vmware iso vmware iso box creating required virtual machine disks packer builder vmware iso plugin creating disk with path output box disk vmdk and size packer builder vmware iso plugin executing applications vmware fusion app contents library vmware vdiskmanager c s a nvme t output box disk vmdk packer builder vmware iso plugin stdout creating disk output box disk vmdk packer builder vmware iso plugin virtual disk creation successful packer builder vmware iso plugin stderr vmware iso vmware iso box building and writing vmx file packer builder vmware iso plugin located networkmapper configuration file using library preferences vmware fusion networking packer builder vmware iso plugin writing vmx to output box packer box vmx packer builder vmware iso plugin configuring vmx packer builder vmware iso plugin writing vmx to output box packer box vmx packer builder vmware iso plugin suppressing messages in vmx packer builder vmware iso plugin located networkmapper configuration file using library preferences vmware fusion networking packer builder vmware iso plugin hostip discovered device matching nat packer builder vmware iso plugin host ip for the vmware machine packer builder vmware iso plugin looking for available port between and packer builder vmware iso plugin found available port on ip packer builder vmware iso plugin found available vnc port packer builder vmware iso plugin writing vmx to output box packer box vmx vmware iso vmware iso box starting virtual machine packer builder vmware iso plugin executing applications vmware fusion app contents library vmrun t fusion start output box packer box vmx gui packer builder vmware iso plugin stdout packer builder vmware iso plugin stderr
| 0
|
31,261
| 6,476,435,573
|
IssuesEvent
|
2017-08-17 22:56:22
|
oleg-shilo/cs-script
|
https://api.github.com/repos/oleg-shilo/cs-script
|
closed
|
Minor issue related to platform dependent line breaks, e.g. in error messages
|
defect done
|
Hi Oleg,
Minor issue related to the following code:
`throw new FileNotFoundException(string.Format("Could not find file \"{0}\".\nEnsure it is in one of the CS-Script search/probing directories.", file));`
`\n` may not be detected as good-enough line break, in my case resulting in an error message with neither line break nor space:
> System.IO.FileNotFoundException: Could not find file "..\CommunicationObject.cs".Ensure it is in one of the CS-Script search/probing directories.
I suggest to use `Environment.NewLine` in such cases. Note that this may apply to several other locations.
Best regards,
Matthias
|
1.0
|
Minor issue related to platform dependent line breaks, e.g. in error messages - Hi Oleg,
Minor issue related to the following code:
`throw new FileNotFoundException(string.Format("Could not find file \"{0}\".\nEnsure it is in one of the CS-Script search/probing directories.", file));`
`\n` may not be detected as good-enough line break, in my case resulting in an error message with neither line break nor space:
> System.IO.FileNotFoundException: Could not find file "..\CommunicationObject.cs".Ensure it is in one of the CS-Script search/probing directories.
I suggest to use `Environment.NewLine` in such cases. Note that this may apply to several other locations.
Best regards,
Matthias
|
non_test
|
minor issue related to platform dependent line breaks e g in error messages hi oleg minor issue related to the following code throw new filenotfoundexception string format could not find file nensure it is in one of the cs script search probing directories file n may not be detected as good enough line break in my case resulting in an error message with neither line break nor space system io filenotfoundexception could not find file communicationobject cs ensure it is in one of the cs script search probing directories i suggest to use environment newline in such cases note that this may apply to several other locations best regards matthias
| 0
|
181,996
| 14,086,444,831
|
IssuesEvent
|
2020-11-05 03:43:36
|
krogowsk531/house-rules
|
https://api.github.com/repos/krogowsk531/house-rules
|
closed
|
Make CSS compatible with tests
|
Research priority: 1 test: unit
|
CSS will currently break tests. Below is some documentation we may want to look through.
https://jestjs.io/docs/en/webpack#handling-static-assets
|
1.0
|
Make CSS compatible with tests - CSS will currently break tests. Below is some documentation we may want to look through.
https://jestjs.io/docs/en/webpack#handling-static-assets
|
test
|
make css compatible with tests css will currently break tests below is some documentation we may want to look through
| 1
|
212,143
| 16,420,483,782
|
IssuesEvent
|
2021-05-19 11:59:35
|
mantidproject/mantid
|
https://api.github.com/repos/mantidproject/mantid
|
closed
|
Smoke Testing Updates for 6.1 release
|
Manual Tests
|
The first point is the only really important one, to try to get IDAaaS testing off the ground this release! The rest are just nice to have. Feel free to ask me for more explanation on any of these!
- [x] Add instructions for how to install a release candidate on Mantid Preprod environment on [IDAaaS test](https://isis-test.analysis.stfc.ac.uk/#/login) (ask @martyngigg what he wants public here, maybe testers should contact the QA manager for instructions?)
- [x] Include[ link to install instructions for .deb](https://download.mantidproject.org/ubuntu.html) Ubuntu umbrella
- [x] Remove the original [create_issues.py,](https://github.com/mantidproject/documents/blob/master/Project-Management/Tools/RoadmapUpdate/SmokeTesting/create_issues.py) as we now use create_issues_OS.py
- [x] You can probably also remove the "umbrella" Excel sheet, but double check this!
- [x] Update SmokeTesting [ReadMe](https://github.com/mantidproject/documents/blob/master/Project-Management/Tools/RoadmapUpdate/SmokeTesting/README.md) as you wish!
|
1.0
|
Smoke Testing Updates for 6.1 release - The first point is the only really important one, to try to get IDAaaS testing off the ground this release! The rest are just nice to have. Feel free to ask me for more explanation on any of these!
- [x] Add instructions for how to install a release candidate on Mantid Preprod environment on [IDAaaS test](https://isis-test.analysis.stfc.ac.uk/#/login) (ask @martyngigg what he wants public here, maybe testers should contact the QA manager for instructions?)
- [x] Include[ link to install instructions for .deb](https://download.mantidproject.org/ubuntu.html) Ubuntu umbrella
- [x] Remove the original [create_issues.py,](https://github.com/mantidproject/documents/blob/master/Project-Management/Tools/RoadmapUpdate/SmokeTesting/create_issues.py) as we now use create_issues_OS.py
- [x] You can probably also remove the "umbrella" Excel sheet, but double check this!
- [x] Update SmokeTesting [ReadMe](https://github.com/mantidproject/documents/blob/master/Project-Management/Tools/RoadmapUpdate/SmokeTesting/README.md) as you wish!
|
test
|
smoke testing updates for release the first point is the only really important one to try to get idaaas testing off the ground this release the rest are just nice to have feel free to ask me for more explanation on any of these add instructions for how to install a release candidate on mantid preprod environment on ask martyngigg what he wants public here maybe testers should contact the qa manager for instructions include ubuntu umbrella remove the original as we now use create issues os py you can probably also remove the umbrella excel sheet but double check this update smoketesting as you wish
| 1
|
414,890
| 28,008,635,957
|
IssuesEvent
|
2023-03-27 16:55:18
|
CarsOk/ADSO2698056PROJECT6
|
https://api.github.com/repos/CarsOk/ADSO2698056PROJECT6
|
closed
|
archivo de horas-semana-ivan
|
documentation
|
# yo como
Aprendiz sena
# quiero
cargar archivo con las horas de la semana
# para
evindenciar trabajo autonomo
# criterios de aceptacion
- [ ] archivo cargado en el sistema
|
1.0
|
archivo de horas-semana-ivan - # yo como
Aprendiz sena
# quiero
cargar archivo con las horas de la semana
# para
evindenciar trabajo autonomo
# criterios de aceptacion
- [ ] archivo cargado en el sistema
|
non_test
|
archivo de horas semana ivan yo como aprendiz sena quiero cargar archivo con las horas de la semana para evindenciar trabajo autonomo criterios de aceptacion archivo cargado en el sistema
| 0
|
199,354
| 15,035,806,491
|
IssuesEvent
|
2021-02-02 14:33:44
|
ucfopen/Obojobo
|
https://api.github.com/repos/ucfopen/Obojobo
|
closed
|
Stronger tests for KeyDownUtil.breakToText
|
enhancement testing
|
These tests simply ensure that various methods are called - Need to test to make sure the method converts the data structures as expected (Heading becomes a Heading and a Text Chunk, for example)
|
1.0
|
Stronger tests for KeyDownUtil.breakToText - These tests simply ensure that various methods are called - Need to test to make sure the method converts the data structures as expected (Heading becomes a Heading and a Text Chunk, for example)
|
test
|
stronger tests for keydownutil breaktotext these tests simply ensure that various methods are called need to test to make sure the method converts the data structures as expected heading becomes a heading and a text chunk for example
| 1
|
135,753
| 11,016,708,024
|
IssuesEvent
|
2019-12-05 06:21:15
|
microsoft/vscode-remote-release
|
https://api.github.com/repos/microsoft/vscode-remote-release
|
closed
|
Test: Remote Containers provisioning and startup performance
|
testplan-item
|
Test #1823
- [ ] linux @RMacfarlane
- [x] windows @roblourens
Complexity: 3
Use instructions [here](https://github.com/microsoft/vscode-remote-containers/blob/master/CONTRIBUTING.md#testing-remote-containers) to get a single container with a Dockerfile.
With a single container based on a Dockerfile, enable Debug log level to get timings in the Dev Container log terminal and measure on real hardware (not a VM, take at least 2 measurements each):
- Rebuilding the container.
- Opening the folder in the container after closing it for a while (there is a 10 seconds timeout).
- Reload the window.
Look for the `[xyz ms] Stop (xyz ms): Resolving remote` message for the measurement.
|
1.0
|
Test: Remote Containers provisioning and startup performance - Test #1823
- [ ] linux @RMacfarlane
- [x] windows @roblourens
Complexity: 3
Use instructions [here](https://github.com/microsoft/vscode-remote-containers/blob/master/CONTRIBUTING.md#testing-remote-containers) to get a single container with a Dockerfile.
With a single container based on a Dockerfile, enable Debug log level to get timings in the Dev Container log terminal and measure on real hardware (not a VM, take at least 2 measurements each):
- Rebuilding the container.
- Opening the folder in the container after closing it for a while (there is a 10 seconds timeout).
- Reload the window.
Look for the `[xyz ms] Stop (xyz ms): Resolving remote` message for the measurement.
|
test
|
test remote containers provisioning and startup performance test linux rmacfarlane windows roblourens complexity use instructions to get a single container with a dockerfile with a single container based on a dockerfile enable debug log level to get timings in the dev container log terminal and measure on real hardware not a vm take at least measurements each rebuilding the container opening the folder in the container after closing it for a while there is a seconds timeout reload the window look for the stop xyz ms resolving remote message for the measurement
| 1
|
267,557
| 23,306,754,337
|
IssuesEvent
|
2022-08-08 02:26:59
|
apache/pulsar
|
https://api.github.com/repos/apache/pulsar
|
closed
|
Flaky-test: TransactionMetaStoreAssignmentTest.testTransactionMetaStoreAssignAndFailover
|
flaky-tests lifecycle/stale
|
<!---
Instructions for reporting a flaky test using this issue template:
1. Replace [test class] in title and body with the test class name
2. Replace [test method] in title and body with the test method that failed. Multiple methods are flaky, remove the content that refers to the test method.
3. Replace "url here" with a url to an example failure. In the Github Actions workflow run logs, you can right click on the line number to copy a link to the line. Example of such url is https://github.com/apache/pulsar/pull/8892/checks?check_run_id=1531075794#step:9:377 . The logs are available for a limited amount of time (usually for a few weeks).
4. Replace "relevant parts of the exception stacktrace here" with the a few lines of the stack trace that shows at leat the exception message and the line of test code where the stacktrace occured.
5. Replace "full exception stacktrace here" with the full exception stacktrace from logs. This section will be hidded by default.
6. Remove all unused fields / content to unclutter the reported issue. Remove this comment too.
-->
TransactionMetaStoreAssignmentTest is flaky. The testTransactionMetaStoreAssignAndFailover test method fails sporadically.
[example failure](https://github.com/apache/pulsar/pull/10782/checks?check_run_id=2728428471#step:10:1649)
```
testTransactionMetaStoreAssignAndFailover(org.apache.pulsar.broker.transaction.coordinator.TransactionMetaStoreAssignmentTest) Time elapsed: 0.008 s <<< FAILURE!
java.lang.AssertionError: expected [16] but found [9]
at org.testng.Assert.fail(Assert.java:99)
at org.testng.Assert.failNotEquals(Assert.java:1037)
at org.testng.Assert.assertEqualsImpl(Assert.java:140)
at org.testng.Assert.assertEquals(Assert.java:122)
at org.testng.Assert.assertEquals(Assert.java:907)
at org.testng.Assert.assertEquals(Assert.java:917)
at org.apache.pulsar.broker.transaction.coordinator.TransactionMetaStoreAssignmentTest.testTransactionMetaStoreAssignAndFailover(TransactionMetaStoreAssignmentTest.java:40)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.testng.internal.MethodInvocationHelper.invokeMethod(MethodInvocationHelper.java:132)
at org.testng.internal.InvokeMethodRunnable.runOne(InvokeMethodRunnable.java:45)
at org.testng.internal.InvokeMethodRunnable.call(InvokeMethodRunnable.java:73)
at org.testng.internal.InvokeMethodRunnable.call(InvokeMethodRunnable.java:11)
at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.base/java.lang.Thread.run(Thread.java:829)
```
[another failure](https://github.com/apache/pulsar/pull/10782/checks?check_run_id=2728428471#step:10:925)
```
testTransactionMetaStoreAssignAndFailover(org.apache.pulsar.broker.transaction.coordinator.TransactionMetaStoreAssignmentTest) Time elapsed: 0.007 s <<< FAILURE!
java.lang.AssertionError: expected [16] but found [12]
at org.testng.Assert.fail(Assert.java:99)
at org.testng.Assert.failNotEquals(Assert.java:1037)
at org.testng.Assert.assertEqualsImpl(Assert.java:140)
at org.testng.Assert.assertEquals(Assert.java:122)
at org.testng.Assert.assertEquals(Assert.java:907)
at org.testng.Assert.assertEquals(Assert.java:917)
at org.apache.pulsar.broker.transaction.coordinator.TransactionMetaStoreAssignmentTest.testTransactionMetaStoreAssignAndFailover(TransactionMetaStoreAssignmentTest.java:40)
```
|
1.0
|
Flaky-test: TransactionMetaStoreAssignmentTest.testTransactionMetaStoreAssignAndFailover - <!---
Instructions for reporting a flaky test using this issue template:
1. Replace [test class] in title and body with the test class name
2. Replace [test method] in title and body with the test method that failed. Multiple methods are flaky, remove the content that refers to the test method.
3. Replace "url here" with a url to an example failure. In the Github Actions workflow run logs, you can right click on the line number to copy a link to the line. Example of such url is https://github.com/apache/pulsar/pull/8892/checks?check_run_id=1531075794#step:9:377 . The logs are available for a limited amount of time (usually for a few weeks).
4. Replace "relevant parts of the exception stacktrace here" with the a few lines of the stack trace that shows at leat the exception message and the line of test code where the stacktrace occured.
5. Replace "full exception stacktrace here" with the full exception stacktrace from logs. This section will be hidded by default.
6. Remove all unused fields / content to unclutter the reported issue. Remove this comment too.
-->
TransactionMetaStoreAssignmentTest is flaky. The testTransactionMetaStoreAssignAndFailover test method fails sporadically.
[example failure](https://github.com/apache/pulsar/pull/10782/checks?check_run_id=2728428471#step:10:1649)
```
testTransactionMetaStoreAssignAndFailover(org.apache.pulsar.broker.transaction.coordinator.TransactionMetaStoreAssignmentTest) Time elapsed: 0.008 s <<< FAILURE!
java.lang.AssertionError: expected [16] but found [9]
at org.testng.Assert.fail(Assert.java:99)
at org.testng.Assert.failNotEquals(Assert.java:1037)
at org.testng.Assert.assertEqualsImpl(Assert.java:140)
at org.testng.Assert.assertEquals(Assert.java:122)
at org.testng.Assert.assertEquals(Assert.java:907)
at org.testng.Assert.assertEquals(Assert.java:917)
at org.apache.pulsar.broker.transaction.coordinator.TransactionMetaStoreAssignmentTest.testTransactionMetaStoreAssignAndFailover(TransactionMetaStoreAssignmentTest.java:40)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.testng.internal.MethodInvocationHelper.invokeMethod(MethodInvocationHelper.java:132)
at org.testng.internal.InvokeMethodRunnable.runOne(InvokeMethodRunnable.java:45)
at org.testng.internal.InvokeMethodRunnable.call(InvokeMethodRunnable.java:73)
at org.testng.internal.InvokeMethodRunnable.call(InvokeMethodRunnable.java:11)
at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.base/java.lang.Thread.run(Thread.java:829)
```
[another failure](https://github.com/apache/pulsar/pull/10782/checks?check_run_id=2728428471#step:10:925)
```
testTransactionMetaStoreAssignAndFailover(org.apache.pulsar.broker.transaction.coordinator.TransactionMetaStoreAssignmentTest) Time elapsed: 0.007 s <<< FAILURE!
java.lang.AssertionError: expected [16] but found [12]
at org.testng.Assert.fail(Assert.java:99)
at org.testng.Assert.failNotEquals(Assert.java:1037)
at org.testng.Assert.assertEqualsImpl(Assert.java:140)
at org.testng.Assert.assertEquals(Assert.java:122)
at org.testng.Assert.assertEquals(Assert.java:907)
at org.testng.Assert.assertEquals(Assert.java:917)
at org.apache.pulsar.broker.transaction.coordinator.TransactionMetaStoreAssignmentTest.testTransactionMetaStoreAssignAndFailover(TransactionMetaStoreAssignmentTest.java:40)
```
|
test
|
flaky test transactionmetastoreassignmenttest testtransactionmetastoreassignandfailover instructions for reporting a flaky test using this issue template replace in title and body with the test class name replace in title and body with the test method that failed multiple methods are flaky remove the content that refers to the test method replace url here with a url to an example failure in the github actions workflow run logs you can right click on the line number to copy a link to the line example of such url is the logs are available for a limited amount of time usually for a few weeks replace relevant parts of the exception stacktrace here with the a few lines of the stack trace that shows at leat the exception message and the line of test code where the stacktrace occured replace full exception stacktrace here with the full exception stacktrace from logs this section will be hidded by default remove all unused fields content to unclutter the reported issue remove this comment too transactionmetastoreassignmenttest is flaky the testtransactionmetastoreassignandfailover test method fails sporadically testtransactionmetastoreassignandfailover org apache pulsar broker transaction coordinator transactionmetastoreassignmenttest time elapsed s failure java lang assertionerror expected but found at org testng assert fail assert java at org testng assert failnotequals assert java at org testng assert assertequalsimpl assert java at org testng assert assertequals assert java at org testng assert assertequals assert java at org testng assert assertequals assert java at org apache pulsar broker transaction coordinator transactionmetastoreassignmenttest testtransactionmetastoreassignandfailover transactionmetastoreassignmenttest java at java base jdk internal reflect nativemethodaccessorimpl native method at java base jdk internal reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at java base jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java base java lang reflect method invoke method java at org testng internal methodinvocationhelper invokemethod methodinvocationhelper java at org testng internal invokemethodrunnable runone invokemethodrunnable java at org testng internal invokemethodrunnable call invokemethodrunnable java at org testng internal invokemethodrunnable call invokemethodrunnable java at java base java util concurrent futuretask run futuretask java at java base java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java base java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java base java lang thread run thread java testtransactionmetastoreassignandfailover org apache pulsar broker transaction coordinator transactionmetastoreassignmenttest time elapsed s failure java lang assertionerror expected but found at org testng assert fail assert java at org testng assert failnotequals assert java at org testng assert assertequalsimpl assert java at org testng assert assertequals assert java at org testng assert assertequals assert java at org testng assert assertequals assert java at org apache pulsar broker transaction coordinator transactionmetastoreassignmenttest testtransactionmetastoreassignandfailover transactionmetastoreassignmenttest java
| 1
|
56,944
| 6,534,777,624
|
IssuesEvent
|
2017-08-31 12:17:13
|
hazelcast/hazelcast
|
https://api.github.com/repos/hazelcast/hazelcast
|
closed
|
[executor-service] ExecutorServiceTest.testExecutorServiceStats
|
Team: Core Type: Test-Failure
|
```
java.lang.AssertionError: expected:<11> but was:<10>
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.failNotEquals(Assert.java:834)
at org.junit.Assert.assertEquals(Assert.java:645)
at org.junit.Assert.assertEquals(Assert.java:631)
at com.hazelcast.executor.ExecutorServiceTest.testExecutorServiceStats(ExecutorServiceTest.java:946)
```
https://hazelcast-l337.ci.cloudbees.com/view/Hazelcast/job/Hazelcast-3.x-ZuluJDK6-freestyle/33/testReport/junit/com.hazelcast.executor/ExecutorServiceTest/testExecutorServiceStats/
|
1.0
|
[executor-service] ExecutorServiceTest.testExecutorServiceStats - ```
java.lang.AssertionError: expected:<11> but was:<10>
at org.junit.Assert.fail(Assert.java:88)
at org.junit.Assert.failNotEquals(Assert.java:834)
at org.junit.Assert.assertEquals(Assert.java:645)
at org.junit.Assert.assertEquals(Assert.java:631)
at com.hazelcast.executor.ExecutorServiceTest.testExecutorServiceStats(ExecutorServiceTest.java:946)
```
https://hazelcast-l337.ci.cloudbees.com/view/Hazelcast/job/Hazelcast-3.x-ZuluJDK6-freestyle/33/testReport/junit/com.hazelcast.executor/ExecutorServiceTest/testExecutorServiceStats/
|
test
|
executorservicetest testexecutorservicestats java lang assertionerror expected but was at org junit assert fail assert java at org junit assert failnotequals assert java at org junit assert assertequals assert java at org junit assert assertequals assert java at com hazelcast executor executorservicetest testexecutorservicestats executorservicetest java
| 1
|
85
| 2,504,543,906
|
IssuesEvent
|
2015-01-10 09:59:35
|
bitcoin/bitcoin
|
https://api.github.com/repos/bitcoin/bitcoin
|
closed
|
configure error on OSX: No working boost sleep implementation found
|
Bug Build system Priority Low
|
Trying to compile git head on OSX 10.7.5 with ```./configure --without-qt --disable-tests --disable-debug```, it fails with:
checking whether the Boost::Chrono library is available... yes
checking for exit in -lboost_chrono-mt... yes
configure: error: No working boost sleep implementation found
I have boost installed with MacPorts:
> port installed | grep boost
boost @1.54.0_0+no_single+no_static+python27 (active)
|
1.0
|
configure error on OSX: No working boost sleep implementation found - Trying to compile git head on OSX 10.7.5 with ```./configure --without-qt --disable-tests --disable-debug```, it fails with:
checking whether the Boost::Chrono library is available... yes
checking for exit in -lboost_chrono-mt... yes
configure: error: No working boost sleep implementation found
I have boost installed with MacPorts:
> port installed | grep boost
boost @1.54.0_0+no_single+no_static+python27 (active)
|
non_test
|
configure error on osx no working boost sleep implementation found trying to compile git head on osx with configure without qt disable tests disable debug it fails with checking whether the boost chrono library is available yes checking for exit in lboost chrono mt yes configure error no working boost sleep implementation found i have boost installed with macports port installed grep boost boost no single no static active
| 0
|
2,351
| 24,880,351,926
|
IssuesEvent
|
2022-10-28 00:03:10
|
dotnet/runtime
|
https://api.github.com/repos/dotnet/runtime
|
closed
|
StackOverflow in error handling under low memory conditions
|
area-System.Reflection.Metadata tenet-reliability no-recent-activity needs-author-action backlog-cleanup-candidate
|
Dump for this issue is here: https://drive.google.com/a/ayende.com/file/d/1f5HYZX3Q4-obubl6C1y4xKxcP5mCTMTV/view?usp=drive_web
We are testing our software under low memory conditions and we are seeing some crashes in this regard.
Related: https://github.com/dotnet/coreclr/issues/16004
We are testing what happens when we run out of room to allocate, and how we can survive that, and we started seeing `StackOverflowException`. We are now careful to not create any new threads while under this situation, so we investigated further.
I believe that the dump indicates an infinite recursion issue with the way errors are handled.
Note, we are using embedded PDBs, and that might be related.
In the attached stack trace (and the dump), you can see:
* 24 `DecodeEmbeddedPortablePdbDebugDirectoryData`
* 19 `ReadEmbeddedPortablePdbDebugDirectoryData`
* 11 `TryOpenEmbeddedPortablePdb`
I'm _guessing_ that this is called by the runtime as part of handling exceptions to get the proper stack trace.
Taking this line area as suspect: https://github.com/dotnet/corefx/blob/d5dc42495de7fa663642dd31765d2671c1758576/src/System.Reflection.Metadata/src/System/Reflection/PortableExecutable/PEReader.EmbeddedPortablePdb.cs#L86-L93
We are under memory pressure, so the allocation fails, but this is the part that read the exception information, so the CLR call into this again, repeating the cycle until we get the stack overflow exception.
The stack trace itself is short because we can't allocate too much stack space because we are constrained on memory.
```
0:048> !dumpstack
PDB symbol for clr.dll not loaded
OS Thread Id: 0x36d0 (48)
Current frame: coreclr + 0x23b4f
Child-SP RetAddr Caller, Callee
00000076a1ff3000 00007ffaff3b49bc coreclr + 0x249bc, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff3130 00007ffaff3b49bc coreclr + 0x249bc, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff3190 00007ffb61f87775 KERNELBASE!FlushViewOfFile + 0x25, calling ntdll!NtFlushVirtualMemory
00000076a1ff31a0 00007ffaff3e6235 coreclr + 0x56235, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff31c8 00007ffaff3b487b coreclr + 0x2487b, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff31e8 00007ffaff3b4a7a coreclr + 0x24a7a, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff3240 00007ffafeeb7d36 (MethodDesc 00007ffafe9dc080 + 0x36 System.Runtime.InteropServices.SafeBuffer.ReleasePointer()), calling 00007ffaff3b47f0 (stub for System.Runtime.InteropServices.SafeHandle.DangerousRelease())
00000076a1ff3280 00007ffb33acbfec (MethodDesc 00007ffaa07fcd28 + 0x15c System.IO.MemoryMappedFiles.MemoryMappedView.Flush(UIntPtr))
00000076a1ff32d0 00007ffb33acbb1c (MethodDesc 00007ffaa07fcce8 + 0x2c System.IO.MemoryMappedFiles.MemoryMappedView.Dispose(Boolean))
00000076a1ff3300 00007ffb33acc1fd (MethodDesc 00007ffaa07fd760 + 0xbd System.IO.MemoryMappedFiles.MemoryMappedViewAccessor.Dispose(Boolean))
00000076a1ff3310 00007ffaff4a2c5a coreclr!MetaDataGetDispenser + 0x5117a, calling coreclr + 0x72bbc
00000076a1ff3340 00007ffb33acc194 (MethodDesc 00007ffaa07fd760 + 0x54 System.IO.MemoryMappedFiles.MemoryMappedViewAccessor.Dispose(Boolean)), calling (MethodDesc 00007ffaa07fd760 + 0x87 System.IO.MemoryMappedFiles.MemoryMappedViewAccessor.Dispose(Boolean))
00000076a1ff3350 00007ffafedbee39 (MethodDesc 00007ffafe971f80 + 0x79 System.Threading.Interlocked.Exchange[[System.__Canon, System.Private.CoreLib]](System.__Canon ByRef, System.__Canon)), calling 00007ffaff4a2c30 (stub for System.Threading.Interlocked._Exchange(TypedReference, TypedReference))
00000076a1ff3380 00007ffafefa06fa (MethodDesc 00007ffafe9ef2b8 + 0x1a System.IO.UnmanagedMemoryAccessor.Dispose())
00000076a1ff33b0 00007ffb211df1ac (MethodDesc 00007ffaa07fd9c0 + 0x6c System.Reflection.Internal.MemoryMappedFileBlock+DisposableData.Release())
00000076a1ff33e0 00007ffb211df098 (MethodDesc 00007ffaa07fd888 + 0x18 System.Reflection.Internal.MemoryMappedFileBlock.Dispose())
00000076a1ff3400 00007ffaff46870d coreclr!MetaDataGetDispenser + 0x16c2d
00000076a1ff3410 00007ffb211aace8 (MethodDesc 00007ffaa07bdea8 + 0xf8 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff3460 00007ffaff3e4a04 coreclr + 0x54a04
00000076a1ff34c0 00007ffaff514e07 coreclr!MetaDataGetDispenser + 0xc3327, calling coreclr + 0x5492c
00000076a1ff35c0 00007ffaff468046 coreclr!MetaDataGetDispenser + 0x16566, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff3650 00007ffb64d8819f ntdll!RtlLookupFunctionEntry + 0xdf, calling ntdll!RtlpxLookupFunctionTable
00000076a1ff36b0 00007ffaff412f40 coreclr + 0x82f40, calling coreclr + 0x832a0
00000076a1ff3780 00007ffaff3e586c coreclr + 0x5586c, calling coreclr + 0x54aa0
00000076a1ff3858 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff39d0 00007ffaff3ca9fe coreclr + 0x3a9fe
00000076a1ff3a00 00007ffaff4690fd coreclr!MetaDataGetDispenser + 0x1761d, calling coreclr + 0x29a50
00000076a1ff3a60 00007ffaff3a0bd9 coreclr + 0x10bd9, calling coreclr + 0x10eec
00000076a1ff3ab0 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff3b90 00007ffaff3bb752 coreclr + 0x2b752, calling coreclr!MetaDataGetDispenser + 0x2ac30
00000076a1ff3c70 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff3e90 00007ffaff3b618e coreclr + 0x2618e, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff3f80 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff4030 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff4060 00007ffaff3bb752 coreclr + 0x2b752, calling coreclr!MetaDataGetDispenser + 0x2ac30
00000076a1ff4140 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff4360 00007ffaff3b618e coreclr + 0x2618e, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff4450 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff4500 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff4720 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff4770 00007ffaff3e43a1 coreclr + 0x543a1, calling coreclr + 0x55528
00000076a1ff4870 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff48a0 00007ffb64e223ad ntdll!RtlpExecuteHandlerForUnwind + 0xd
00000076a1ff48d0 00007ffb64d8780d ntdll!RtlUnwindEx + 0x47d, calling ntdll!RtlpExecuteHandlerForUnwind
00000076a1ff4930 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff4998 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff4a80 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff4ab0 00007ffaff3bb752 coreclr + 0x2b752, calling coreclr!MetaDataGetDispenser + 0x2ac30
00000076a1ff4b90 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff4db0 00007ffaff3b618e coreclr + 0x2618e, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff4ea0 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff4f50 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff4fb0 00007ffaff4b566c coreclr!MetaDataGetDispenser + 0x63b8c, calling KERNEL32!RtlUnwindExStub
00000076a1ff5050 00007ffaff4c35d3 coreclr!MetaDataGetDispenser + 0x71af3
00000076a1ff50e0 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff5480 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ff54d0 00007ffaff3e4438 coreclr + 0x54438, calling coreclr!MetaDataGetDispenser + 0x63b4c
00000076a1ff55c0 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff55e0 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff5600 00007ffb64e2232d ntdll!RtlpExecuteHandlerForException + 0xd
00000076a1ff5630 00007ffb64d86c26 ntdll!RtlDispatchException + 0x5c6, calling ntdll!RtlpExecuteHandlerForException
00000076a1ff56e8 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff5740 00007ffaff3b618e coreclr + 0x2618e, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff5830 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff58e0 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff5910 00007ffaff3bb752 coreclr + 0x2b752, calling coreclr!MetaDataGetDispenser + 0x2ac30
00000076a1ff59e0 00007ffaff4c35d3 coreclr!MetaDataGetDispenser + 0x71af3
00000076a1ff59f0 00007ffaff3c43a9 coreclr + 0x343a9, calling coreclr!MetaDataGetDispenser + 0x1dcc8
00000076a1ff5a60 00007ffaff3c357c coreclr + 0x3357c
00000076a1ff5d30 00007ffb64e2125e ntdll!KiUserExceptionDispatch + 0x2e, calling ntdll!RtlDispatchException
00000076a1ff6450 00007ffb61f52918 KERNELBASE!RaiseException + 0x68 ====> Exception Code e0434352 cxr@00000076a1ff5d40 exr@00000076a1ff6230
00000076a1ff5d40 00007ffaff3b1298 coreclr + 0x21298, calling coreclr + 0x3c7bc
00000076a1ff5d60 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ff5e30 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff5f30 00007ffaff44e970 coreclr!coreclr_execute_assembly + 0x1080, calling coreclr!coreclr_execute_assembly + 0x1808
00000076a1ff6030 00007ffaff44e970 coreclr!coreclr_execute_assembly + 0x1080, calling coreclr!coreclr_execute_assembly + 0x1808
00000076a1ff6238 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff62c8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff62d0 00007ffafee9fa3a (MethodDesc 00007ffafe9d8a80 + 0x3a System.IO.UnmanagedMemoryStream.ReadByte())
00000076a1ff6360 00007ffafee44eb9 (MethodDesc 00007ffafe9cd160 + 0x89 System.IO.BinaryReader.FillBuffer(Int32))
00000076a1ff63a0 00007ffafee9f3b5 (MethodDesc 00007ffafe9d8a40 + 0x15 System.IO.UnmanagedMemoryStream.get_Position())
00000076a1ff63e0 00007ffaff6b1e89 coreclr!GetCLRRuntimeHost + 0x12a939, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff6410 00007ffaff4027a0 coreclr + 0x727a0, calling coreclr + 0x728cc
00000076a1ff6440 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff6478 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff64c0 00007ffafee6d468 (MethodDesc 00007ffafe9d2428 + 0x88 System.Collections.Generic.Dictionary`2[[System.__Canon, System.Private.CoreLib],[System.Resources.ResourceLocator, System.Private.CoreLib]].Initialize(Int32)), calling coreclr!MetaDataGetDispenser + 0x70c50
00000076a1ff64f0 00007ffaff3df672 coreclr + 0x4f672, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff6520 00007ffaff3df5fd coreclr + 0x4f5fd, calling KERNEL32!RaiseExceptionStub
00000076a1ff6620 00007ffaff4ac21f coreclr!MetaDataGetDispenser + 0x5a73f, calling coreclr + 0x4f3b8
00000076a1ff6660 00007ffafedb337e (MethodDesc 00007ffafe9b86f8 + 0x3fe System.Resources.ResourceManager.GetString(System.String, System.Globalization.CultureInfo))
00000076a1ff66d0 00007ffafedb321d (MethodDesc 00007ffafe9b86f8 + 0x29d System.Resources.ResourceManager.GetString(System.String, System.Globalization.CultureInfo)), calling (MethodDesc 00007ffafe9b86f8 + 0x3d0 System.Resources.ResourceManager.GetString(System.String, System.Globalization.CultureInfo))
00000076a1ff6710 00007ffb211aaf98 (MethodDesc 00007ffaa07bdec8 + 0x1d8 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling System_Reflection_Metadata!Equals + 0x15 [E:\A\_work\1439\s\corefx\src\System.Reflection.Metadata\src\System\Reflection\Metadata\TypeSystem\Handles.TypeSystem.cs:1414]
00000076a1ff67a8 00007ffaff4ac16e coreclr!MetaDataGetDispenser + 0x5a68e, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff67d0 00007ffb211aaf98 (MethodDesc 00007ffaa07bdec8 + 0x1d8 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling System_Reflection_Metadata!Equals + 0x15 [E:\A\_work\1439\s\corefx\src\System.Reflection.Metadata\src\System\Reflection\Metadata\TypeSystem\Handles.TypeSystem.cs:1414]
00000076a1ff6830 00007ffaff3e4a04 coreclr + 0x54a04
00000076a1ff6890 00007ffaff3e5cb4 coreclr + 0x55cb4, calling coreclr + 0x5492c
00000076a1ff68e0 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff6900 00007ffaff3e5f26 coreclr + 0x55f26, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff6930 00007ffaff3e446c coreclr + 0x5446c, calling coreclr + 0x55c24
00000076a1ff69b0 00007ffaff4c7db9 coreclr!MetaDataGetDispenser + 0x762d9, calling coreclr!MetaDataGetDispenser + 0x762ec
00000076a1ff6a30 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff6a60 00007ffb64e223ad ntdll!RtlpExecuteHandlerForUnwind + 0xd
00000076a1ff6a90 00007ffb64d8780d ntdll!RtlUnwindEx + 0x47d, calling ntdll!RtlpExecuteHandlerForUnwind
00000076a1ff6af0 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff6b58 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff6c70 00007ffb64dcad17 ntdll!RtlpIsDosDeviceName_Ustr + 0x17, calling ntdll!RtlDetermineDosPathNameType_Ustr
00000076a1ff6d50 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff7060 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff7170 00007ffaff4b566c coreclr!MetaDataGetDispenser + 0x63b8c, calling KERNEL32!RtlUnwindExStub
00000076a1ff72a0 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff7640 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ff7690 00007ffaff3e4438 coreclr + 0x54438, calling coreclr!MetaDataGetDispenser + 0x63b4c
00000076a1ff7780 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff77a0 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff77c0 00007ffb64e2232d ntdll!RtlpExecuteHandlerForException + 0xd
00000076a1ff77f0 00007ffb64d86c26 ntdll!RtlDispatchException + 0x5c6, calling ntdll!RtlpExecuteHandlerForException
00000076a1ff78a8 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff79f0 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff7ad0 00007ffb64dcad17 ntdll!RtlpIsDosDeviceName_Ustr + 0x17, calling ntdll!RtlDetermineDosPathNameType_Ustr
00000076a1ff7c20 00007ffb64dca0a3 ntdll!RtlpDosPathNameToRelativeNtPathName + 0x2e3, calling ntdll!_security_check_cookie
00000076a1ff7e90 00007ffaff4045a7 coreclr + 0x745a7, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff7ef0 00007ffb64e2125e ntdll!KiUserExceptionDispatch + 0x2e, calling ntdll!RtlDispatchException
00000076a1ff8610 00007ffb61f52918 KERNELBASE!RaiseException + 0x68 ====> Exception Code e0434352 cxr@00000076a1ff7f00 exr@00000076a1ff83f0
00000076a1ff7f10 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ff7fc0 00007ffaff4c35d3 coreclr!MetaDataGetDispenser + 0x71af3
00000076a1ff7ff0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff80b0 00007ffaff6cf720 coreclr!GetCLRRuntimeHost + 0x1481d0, calling coreclr + 0x95588
00000076a1ff80e0 00007ffaff6cefba coreclr!GetCLRRuntimeHost + 0x147a6a, calling coreclr!GetCLRRuntimeHost + 0x12d024
00000076a1ff81b0 00007ffaff6cf720 coreclr!GetCLRRuntimeHost + 0x1481d0, calling coreclr + 0x95588
00000076a1ff81e0 00007ffaff6cefba coreclr!GetCLRRuntimeHost + 0x147a6a, calling coreclr!GetCLRRuntimeHost + 0x12d024
00000076a1ff82f0 00007ffaff6b8d15 coreclr!GetCLRRuntimeHost + 0x1317c5, calling coreclr!GetCLRRuntimeHost + 0x146f38
00000076a1ff8300 00007ffb61f3ba56 KERNELBASE!BaseSetLastNTError + 0x16, calling ntdll!RtlSetLastWin32Error
00000076a1ff8330 00007ffaff6cfe32 coreclr!GetCLRRuntimeHost + 0x1488e2, calling coreclr!GetCLRRuntimeHost + 0x12e870
00000076a1ff8380 00007ffaff6b5d9e coreclr!GetCLRRuntimeHost + 0x12e84e, calling coreclr!GetCLRRuntimeHost + 0x14869c
00000076a1ff83f8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff8488 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff84b0 00007ffaff6b3e47 coreclr!GetCLRRuntimeHost + 0x12c8f7, calling coreclr + 0x95588
00000076a1ff8580 00007ffaff597a92 coreclr!GetCLRRuntimeHost + 0x10542, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff8590 00007ffaff402963 coreclr + 0x72963
00000076a1ff85a0 00007ffaff6b1e89 coreclr!GetCLRRuntimeHost + 0x12a939, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff85d0 00007ffaff4027a0 coreclr + 0x727a0, calling coreclr + 0x728cc
00000076a1ff8600 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff8638 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff86b0 00007ffaff3df672 coreclr + 0x4f672, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff86e0 00007ffaff3df5fd coreclr + 0x4f5fd, calling KERNEL32!RaiseExceptionStub
00000076a1ff87e0 00007ffaff5bdaa1 coreclr!GetCLRRuntimeHost + 0x36551, calling coreclr + 0x4f3b8
00000076a1ff8830 00007ffaff401b5c coreclr + 0x71b5c, calling coreclr!GetCLRRuntimeHost + 0x364e0
00000076a1ff8880 00007ffafeeb7cf1 (MethodDesc 00007ffafe9dc070 + 0x51 System.Runtime.InteropServices.SafeBuffer.AcquirePointer(Byte* ByRef)), calling 00007ffaff3b49f0 (stub for System.Runtime.InteropServices.SafeHandle.DangerousAddRef(Boolean ByRef))
00000076a1ff88d8 00007ffaff3eb2bd coreclr + 0x5b2bd, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff8930 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff89c8 00007ffaff4018c7 coreclr + 0x718c7, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff8a10 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff8a20 00007ffb2118f232 (MethodDesc 00007ffaa07be2b8 + 0x42 System.Reflection.Internal.MemoryBlockProvider.GetMemoryBlock(Int32, Int32))
00000076a1ff8a40 00007ffb211ab2b4 (MethodDesc 00007ffaa07fb5f0 + 0x64 System.Reflection.Metadata.PathUtilities.CombinePathWithRelativePath(System.String, System.String)), calling (MethodDesc 00007ffafe9a7638 + 0 System.String.Concat(System.String, System.String, System.String))
00000076a1ff8aa0 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff8b10 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff8b80 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff8ba0 00007ffb5127ba52 (MethodDesc 00007ffa9fb5f030 + 0x32 System.IO.File.OpenRead(System.String)), calling (MethodDesc 00007ffafe9d25d0 + 0 System.IO.FileStream..ctor(System.String, System.IO.FileMode, System.IO.FileAccess, System.IO.FileShare))
00000076a1ff8c70 00007ffb25645e3b (MethodDesc 00007ffaa07b2e18 + 0x7b System.Diagnostics.StackTraceSymbols.TryOpenReaderFromAssemblyFile(System.String, IntPtr, Int32))
00000076a1ff8ce0 00007ffb25645c79 (MethodDesc 00007ffaa07b2de8 + 0xa9 System.Diagnostics.StackTraceSymbols.TryGetReader(System.String, IntPtr, Int32, IntPtr, Int32)), calling (MethodDesc 00007ffaa07b2e18 + 0 System.Diagnostics.StackTraceSymbols.TryOpenReaderFromAssemblyFile(System.String, IntPtr, Int32))
00000076a1ff8d40 00007ffb25645915 (MethodDesc 00007ffaa07b2dd8 + 0x65 System.Diagnostics.StackTraceSymbols.GetSourceLineInfo(System.String, IntPtr, Int32, IntPtr, Int32, Int32, Int32, System.String ByRef, Int32 ByRef, Int32 ByRef)), calling (MethodDesc 00007ffaa07b2de8 + 0 System.Diagnostics.StackTraceSymbols.TryGetReader(System.String, IntPtr, Int32, IntPtr, Int32))
00000076a1ff8ed0 00007ffafee4368a (MethodDesc 00007ffafe9ccf10 + 0x2ba System.Diagnostics.StackFrameHelper.InitializeSourceInfo(Int32, Boolean, System.Exception))
00000076a1ff8fa0 00007ffafee0078a (MethodDesc 00007ffafe9c32d0 + 0x5a System.Diagnostics.StackTrace.CaptureStackTrace(Int32, Boolean, System.Threading.Thread, System.Exception)), calling (MethodDesc 00007ffafe9ccf10 + 0 System.Diagnostics.StackFrameHelper.InitializeSourceInfo(Int32, Boolean, System.Exception))
00000076a1ff8fb0 00007ffafeddc7d8 (MethodDesc 00007ffafe9be990 + 0xa8 System.Text.StringBuilder.ToString()), calling (MethodDesc 00007ffafe9a7ea8 + 0 System.Buffer.Memmove(Byte*, Byte*, UInt64))
00000076a1ff9010 00007ffafee0058c (MethodDesc 00007ffafe9c3258 + 0x2c System.Diagnostics.StackTrace..ctor(System.Exception, Boolean)), calling (MethodDesc 00007ffafe9c32d0 + 0 System.Diagnostics.StackTrace.CaptureStackTrace(Int32, Boolean, System.Threading.Thread, System.Exception))
00000076a1ff9040 00007ffafed82fe5 (MethodDesc 00007ffafe9a7590 + 0x55 System.String.FillStringChecked(System.String, Int32, System.String)), calling (MethodDesc 00007ffafe9a7ea8 + 0 System.Buffer.Memmove(Byte*, Byte*, UInt64))
00000076a1ff9050 00007ffafedb04b4 (MethodDesc 00007ffafe9b8130 + 0x64 System.Environment.GetStackTrace(System.Exception, Boolean)), calling (MethodDesc 00007ffafe9c3258 + 0 System.Diagnostics.StackTrace..ctor(System.Exception, Boolean))
00000076a1ff9080 00007ffafed83797 (MethodDesc 00007ffafe9a7638 + 0xd7 System.String.Concat(System.String, System.String, System.String)), calling (MethodDesc 00007ffafe9a7590 + 0 System.String.FillStringChecked(System.String, Int32, System.String))
00000076a1ff90a0 00007ffafedb41ff (MethodDesc 00007ffafe9b88c8 + 0x3f System.Exception.GetStackTrace(Boolean)), calling (MethodDesc 00007ffafe9b8130 + 0 System.Environment.GetStackTrace(System.Exception, Boolean))
00000076a1ff90d0 00007ffafedb449e (MethodDesc 00007ffafe9b8910 + 0x12e System.Exception.ToString(Boolean, Boolean)), calling (MethodDesc 00007ffafe9b88c8 + 0 System.Exception.GetStackTrace(Boolean))
00000076a1ff90f0 00007ffafedb40bf (MethodDesc 00007ffafe9b8850 + 0x2f System.Exception.GetClassName()), calling coreclr!MetaDataGetDispenser + 0x70c50
00000076a1ff9120 00007ffafedb4428 (MethodDesc 00007ffafe9b8910 + 0xb8 System.Exception.ToString(Boolean, Boolean)), calling (MethodDesc 00007ffafe9b8910 + 0 System.Exception.ToString(Boolean, Boolean))
00000076a1ff9170 00007ffafee431a2 (MethodDesc 00007ffafe9cce88 + 0x22 System.AggregateException.ToString()), calling (MethodDesc 00007ffafe9b8910 + 0 System.Exception.ToString(Boolean, Boolean))
00000076a1ff91d0 00007ffafedde80d (MethodDesc 00007ffafe9bee48 + 0x5ed System.Text.StringBuilder.AppendFormatHelper(System.IFormatProvider, System.String, System.ParamsArray))
00000076a1ff9270 00007ffafed83e79 (MethodDesc 00007ffafe9a7720 + 0x69 System.String.FormatHelper(System.IFormatProvider, System.String, System.ParamsArray)), calling (MethodDesc 00007ffafe9bee48 + 0 System.Text.StringBuilder.AppendFormatHelper(System.IFormatProvider, System.String, System.ParamsArray))
00000076a1ff92d0 00007ffafed83aae (MethodDesc 00007ffafe9a7668 + 0x5e System.String.Format(System.String, System.Object)), calling (MethodDesc 00007ffafe9a7720 + 0 System.String.FormatHelper(System.IFormatProvider, System.String, System.ParamsArray))
00000076a1ff9330 00007ffaa1b0ffff (MethodDesc 00007ffa9fdb0830 + 0x4f Raven.Server.Documents.Replication.ReplicationRunStatsBase.AddError(System.Exception)), calling (MethodDesc 00007ffafe9a7668 + 0 System.String.Format(System.String, System.Object))
00000076a1ff9370 00007ffaa1b0ff8a (MethodDesc 00007ffa9fdb0c88 + 0x3a Raven.Server.Documents.Replication.IncomingReplicationStatsScope.AddError(System.Exception)), calling 00007ffa9fcbef10 (stub for Raven.Server.Documents.Replication.ReplicationRunStatsBase.AddError(System.Exception))
00000076a1ff93a0 00007ffaa05dcf35 (MethodDesc 00007ffa9fdb0338 + 0x905 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling 00007ffa9fcbeff0 (stub for Raven.Server.Documents.Replication.IncomingReplicationStatsScope.AddError(System.Exception))
00000076a1ff93f0 00007ffaff3e4a04 coreclr + 0x54a04
00000076a1ff9450 00007ffaff3e5cb4 coreclr + 0x55cb4, calling coreclr + 0x5492c
00000076a1ff94a0 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff94c0 00007ffaff3e5f26 coreclr + 0x55f26, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff94f0 00007ffaff3e446c coreclr + 0x5446c, calling coreclr + 0x55c24
00000076a1ff9578 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff95f0 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff9620 00007ffb64e223ad ntdll!RtlpExecuteHandlerForUnwind + 0xd
00000076a1ff9650 00007ffb64d8780d ntdll!RtlUnwindEx + 0x47d, calling ntdll!RtlpExecuteHandlerForUnwind
00000076a1ff96b0 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff9710 00007ffaff412f40 coreclr + 0x82f40, calling coreclr + 0x832a0
00000076a1ff9718 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff9910 00007ffaa05da994 (MethodDesc 00007ffa9fdb0328 + 0x2a4 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches()), calling (MethodDesc 00007ffa9fdb0338 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter))
00000076a1ff9ac0 00007ffb4fc7bc14 clrjit!Compiler::fgInsertInlineeBlocks + 0x504 [e:\a\_work\1791\s\src\jit\flowgraph.cpp:22449], calling clrjit!GenTree::CopyFrom [e:\a\_work\1791\s\src\jit\compiler.hpp:1393]
00000076a1ff9b10 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ff9b80 00007ffaff3e3869 coreclr + 0x53869
00000076a1ff9be0 00007ffaff412f40 coreclr + 0x82f40, calling coreclr + 0x832a0
00000076a1ff9c20 00007ffaa05da994 (MethodDesc 00007ffa9fdb0328 + 0x2a4 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches()), calling (MethodDesc 00007ffa9fdb0338 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter))
00000076a1ff9d30 00007ffaff4b566c coreclr!MetaDataGetDispenser + 0x63b8c, calling KERNEL32!RtlUnwindExStub
00000076a1ff9e60 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffa200 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ffa250 00007ffaff3e4438 coreclr + 0x54438, calling coreclr!MetaDataGetDispenser + 0x63b4c
00000076a1ffa330 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffa360 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffa380 00007ffb64e2232d ntdll!RtlpExecuteHandlerForException + 0xd
00000076a1ffa3b0 00007ffb64d86c26 ntdll!RtlDispatchException + 0x5c6, calling ntdll!RtlpExecuteHandlerForException
00000076a1ffa468 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffa488 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffa510 00007ffaff3e3869 coreclr + 0x53869
00000076a1ffa570 00007ffaff412f40 coreclr + 0x82f40, calling coreclr + 0x832a0
00000076a1ffa5b0 00007ffaa05da994 (MethodDesc 00007ffa9fdb0328 + 0x2a4 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches()), calling (MethodDesc 00007ffa9fdb0338 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter))
00000076a1ffa8a0 00007ffb4fcc7407 clrjit!GenTree::CopyFrom + 0x43 [e:\a\_work\1791\s\src\jit\compiler.hpp:1404], calling clrjit!memcpy [f:\dd\vctools\crt\vcruntime\src\string\amd64\memcpy.asm:101]
00000076a1ffa920 00007ffb4fc7bc14 clrjit!Compiler::fgInsertInlineeBlocks + 0x504 [e:\a\_work\1791\s\src\jit\flowgraph.cpp:22449], calling clrjit!GenTree::CopyFrom [e:\a\_work\1791\s\src\jit\compiler.hpp:1393]
00000076a1ffa970 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffaab0 00007ffb64e2125e ntdll!KiUserExceptionDispatch + 0x2e, calling ntdll!RtlDispatchException
00000076a1ffb1c0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68 ====> Exception Code e0434352 cxr@00000076a1ffaac0 exr@00000076a1ffafb0
00000076a1ffabb0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffaed0 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ffaee0 00007ffaff411808 coreclr + 0x81808, calling coreclr + 0x81914
00000076a1ffafb8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffb048 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffb150 00007ffaff6b1e89 coreclr!GetCLRRuntimeHost + 0x12a939, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffb180 00007ffaff4027a0 coreclr + 0x727a0, calling coreclr + 0x728cc
00000076a1ffb1b0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffb1e8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffb260 00007ffaff3df672 coreclr + 0x4f672, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffb290 00007ffaff3df5fd coreclr + 0x4f5fd, calling KERNEL32!RaiseExceptionStub
00000076a1ffb390 00007ffaff6032a1 coreclr!GetCLRRuntimeHost + 0x7bd51, calling coreclr + 0x4f3b8
00000076a1ffb3a0 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ffb3b0 00007ffaff411808 coreclr + 0x81808, calling coreclr + 0x81914
00000076a1ffb420 00007ffaa05e2151 (MethodDesc 00007ffa9fdb0398 + 0xa61 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling coreclr!GetCLRRuntimeHost + 0x7bcb0
00000076a1ffb4b8 00007ffaff603254 coreclr!GetCLRRuntimeHost + 0x7bd04, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ffb4e0 00007ffaa05e2151 (MethodDesc 00007ffa9fdb0398 + 0xa61 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling coreclr!GetCLRRuntimeHost + 0x7bcb0
00000076a1ffb530 00007ffaff3e4a04 coreclr + 0x54a04
00000076a1ffb590 00007ffaff3e5cb4 coreclr + 0x55cb4, calling coreclr + 0x5492c
00000076a1ffb5e0 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffb600 00007ffaff3e5f26 coreclr + 0x55f26, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffb630 00007ffaff3e446c coreclr + 0x5446c, calling coreclr + 0x55c24
00000076a1ffb6b0 00007ffaff4c7db9 coreclr!MetaDataGetDispenser + 0x762d9, calling coreclr!MetaDataGetDispenser + 0x762ec
00000076a1ffb6b8 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffb730 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffb760 00007ffb64e223ad ntdll!RtlpExecuteHandlerForUnwind + 0xd
00000076a1ffb790 00007ffb64d8780d ntdll!RtlUnwindEx + 0x47d, calling ntdll!RtlpExecuteHandlerForUnwind
00000076a1ffb7f0 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffb858 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffba50 00007ffaa05e16b6 (MethodDesc 00007ffa9fdb0348 + 0x216 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffa9fdb0398 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffbb00 00007ffaa03a44e3 (MethodDesc 00007ffa9fc87208 + 0x293 Sparrow.Json.Parsing.ObjectJsonParser.Read()), calling (MethodDesc 00007ffaa033b408 + 0 System.Collections.Generic.Queue`1[[System.ValueTuple`2[[System.__Canon, System.Private.CoreLib],[System.__Canon, System.Private.CoreLib]], System.Private.CoreLib]].get_Count())
00000076a1ffbb40 00007ffaff6b46dc coreclr!GetCLRRuntimeHost + 0x12d18c, calling coreclr!MetaDataGetDispenser + 0x76010
00000076a1ffbc00 00007ffaff6ceee1 coreclr!GetCLRRuntimeHost + 0x147991, calling coreclr!GetCLRRuntimeHost + 0x12caa4
00000076a1ffbc40 00007ffaff3e8c64 coreclr + 0x58c64, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffbc70 00007ffaff410236 coreclr + 0x80236, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ffbd60 00007ffaa05e16b6 (MethodDesc 00007ffa9fdb0348 + 0x216 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffa9fdb0398 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffbe70 00007ffaff4b566c coreclr!MetaDataGetDispenser + 0x63b8c, calling KERNEL32!RtlUnwindExStub
00000076a1ffbfa0 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffc340 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ffc350 00007ffaff411808 coreclr + 0x81808, calling coreclr + 0x81914
00000076a1ffc390 00007ffaff3e4438 coreclr + 0x54438, calling coreclr!MetaDataGetDispenser + 0x63b4c
00000076a1ffc470 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffc4a0 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffc4c0 00007ffb64e2232d ntdll!RtlpExecuteHandlerForException + 0xd
00000076a1ffc4f0 00007ffb64d86c26 ntdll!RtlDispatchException + 0x5c6, calling ntdll!RtlpExecuteHandlerForException
00000076a1ffc5a8 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffc600 00007ffaff410236 coreclr + 0x80236, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ffc6f0 00007ffaa05e16b6 (MethodDesc 00007ffa9fdb0348 + 0x216 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffa9fdb0398 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffc8b0 00007ffb4fb91c1a (MethodDesc 00007ffa9faf4100 + 0xaa System.Collections.Generic.HashSet`1[[System.__Canon, System.Private.CoreLib]].AddIfNotPresent(System.__Canon))
00000076a1ffc8e0 00007ffaa03a63cf (MethodDesc 00007ffa9fc4e190 + 0xcf Sparrow.Collections.FastStack`1[[System.__Canon, System.Private.CoreLib]].Pop()), calling coreclr!MetaDataGetDispenser + 0x70da0
00000076a1ffc930 00007ffb4fb909eb (MethodDesc 00007ffa9faf4058 + 0xb System.Collections.Generic.HashSet`1[[System.__Canon, System.Private.CoreLib]].Add(System.__Canon)), calling (MethodDesc 00007ffa9faf4100 + 0 System.Collections.Generic.HashSet`1[[System.__Canon, System.Private.CoreLib]].AddIfNotPresent(System.__Canon))
00000076a1ffc960 00007ffaa03a44e3 (MethodDesc 00007ffa9fc87208 + 0x293 Sparrow.Json.Parsing.ObjectJsonParser.Read()), calling (MethodDesc 00007ffaa033b408 + 0 System.Collections.Generic.Queue`1[[System.ValueTuple`2[[System.__Canon, System.Private.CoreLib],[System.__Canon, System.Private.CoreLib]], System.Private.CoreLib]].get_Count())
00000076a1ffc9a0 00007ffaff6b46dc coreclr!GetCLRRuntimeHost + 0x12d18c, calling coreclr!MetaDataGetDispenser + 0x76010
00000076a1ffc9f0 00007ffaff6b419d coreclr!GetCLRRuntimeHost + 0x12cc4d, calling coreclr!GetCLRRuntimeHost + 0x12d024
00000076a1ffca60 00007ffaff6ceee1 coreclr!GetCLRRuntimeHost + 0x147991, calling coreclr!GetCLRRuntimeHost + 0x12caa4
00000076a1ffcaa0 00007ffaff3e8c64 coreclr + 0x58c64, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffcb70 00007ffaff6b8d15 coreclr!GetCLRRuntimeHost + 0x1317c5, calling coreclr!GetCLRRuntimeHost + 0x146f38
00000076a1ffcbb0 00007ffaff6cfe32 coreclr!GetCLRRuntimeHost + 0x1488e2, calling coreclr!GetCLRRuntimeHost + 0x12e870
00000076a1ffcbf0 00007ffb64e2125e ntdll!KiUserExceptionDispatch + 0x2e, calling ntdll!RtlDispatchException
00000076a1ffd310 00007ffb61f52918 KERNELBASE!RaiseException + 0x68 ====> Exception Code e0434352 cxr@00000076a1ffcc00 exr@00000076a1ffd0f0
00000076a1ffcc80 00007ffaff3b7d4f coreclr + 0x27d4f
00000076a1ffccf0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffcdc0 00007ffaff3b882f coreclr + 0x2882f, calling coreclr + 0x279c4
00000076a1ffcec0 00007ffaff3b882f coreclr + 0x2882f, calling coreclr + 0x279c4
00000076a1ffcfe0 00007ffa9fca2138 (MethodDesc 00007ffa9fc80478 + 0x38 Sparrow.Json.UnmanagedWriteBuffer.WriteByte(Byte)), calling (MethodDesc 00007ffa9fc80428 + 0 Sparrow.Json.UnmanagedWriteBuffer.ThrowOnDisposed())
00000076a1ffd050 00007ffaff3ba10f coreclr + 0x2a10f, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ffd0a0 00007ffaff3a2a43 coreclr + 0x12a43, calling coreclr!MetaDataGetDispenser + 0x1a760
00000076a1ffd0f8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffd188 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffd230 00007ffafefdfa97 (MethodDesc 00007ffafe9f9430 + 0x117 System.Text.DecoderNLS.GetChars(Byte[], Int32, Int32, Char[], Int32, Boolean))
00000076a1ffd290 00007ffaff402963 coreclr + 0x72963
00000076a1ffd2a0 00007ffaff6b1e89 coreclr!GetCLRRuntimeHost + 0x12a939, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffd2d0 00007ffaff4027a0 coreclr + 0x727a0, calling coreclr + 0x728cc
00000076a1ffd300 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffd338 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffd380 00007ffaff4690fd coreclr!MetaDataGetDispenser + 0x1761d, calling coreclr + 0x29a50
00000076a1ffd3b0 00007ffaff3df672 coreclr + 0x4f672, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffd3e0 00007ffaff3df5fd coreclr + 0x4f5fd, calling KERNEL32!RaiseExceptionStub
00000076a1ffd4e0 00007ffaff4ac21f coreclr!MetaDataGetDispenser + 0x5a73f, calling coreclr + 0x4f3b8
00000076a1ffd5d0 00007ffaff23c4c4 (MethodDesc 00007ffafe9cdac0 System.Threading.Tasks.Task.ThrowIfExceptional(Boolean)), calling coreclr!MetaDataGetDispenser + 0x5a630
00000076a1ffd668 00007ffaff4ac16e coreclr!MetaDataGetDispenser + 0x5a68e, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ffd690 00007ffaff23c4c4 (MethodDesc 00007ffafe9cdac0 System.Threading.Tasks.Task.ThrowIfExceptional(Boolean)), calling coreclr!MetaDataGetDispenser + 0x5a630
00000076a1ffd6d0 00007ffafee4a4a7 (MethodDesc 00007ffafe9cdc68 + 0xa7 System.Threading.Tasks.Task.Wait(Int32, System.Threading.CancellationToken)), calling (MethodDesc 00007ffafe9cdac0 + 0 System.Threading.Tasks.Task.ThrowIfExceptional(Boolean))
00000076a1ffd700 00007ffafee4a3ed (MethodDesc 00007ffafe9cdc58 + 0xd System.Threading.Tasks.Task.Wait(Int32)), calling (MethodDesc 00007ffafe9cdc68 + 0 System.Threading.Tasks.Task.Wait(Int32, System.Threading.CancellationToken))
00000076a1ffd730 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffda50 00007ffaa05e16b6 (MethodDesc 00007ffa9fdb0348 + 0x216 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffa9fdb0398 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffdb20 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffde60 00007ffaa05da994 (MethodDesc 00007ffa9fdb0328 + 0x2a4 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches()), calling (MethodDesc 00007ffa9fdb0338 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter))
00000076a1ffe0c0 00007ffaa05da6cf (MethodDesc 00007ffa9fdb0450 + 0x2f Raven.Server.Documents.Replication.IncomingReplicationHandler.<Start>b__25_0(System.Object)), calling 00007ffa9fcbedf8 (stub for Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches())
00000076a1ffe0f0 00007ffaa0535fda (MethodDesc 00007ffa9ffb4718 + 0x18a Raven.Server.Utils.PoolOfThreads+PooledThread.Run())
00000076a1ffe1c0 00007ffb51f56e4d (MethodDesc 00007ffa9fb509d8 + 0x3d System.Threading.Thread.ThreadMain_ThreadStart())
00000076a1ffe1f0 00007ffafedbb3ee (MethodDesc 00007ffafe9ba670 + 0x6e System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object))
00000076a1ffe220 00007ffafedbd345 (MethodDesc 00007ffafe9bae50 + 0x25 System.Threading.ThreadHelper.ThreadStart()), calling coreclr!MetaDataGetDispenser + 0x739a0
00000076a1ffe260 00007ffaff4c35d3 coreclr!MetaDataGetDispenser + 0x71af3
00000076a1ffe2a0 00007ffaff3ed9bf coreclr + 0x5d9bf, calling coreclr!MetaDataGetDispenser + 0x71a70
00000076a1ffe2d0 00007ffaff3eedda coreclr + 0x5edda, calling coreclr + 0x1fa14
00000076a1ffe3f0 00007ffaff4b6a19 coreclr!MetaDataGetDispenser + 0x64f39, calling coreclr + 0x5d844
00000076a1ffe420 00007ffb64d90f05 ntdll!RtlpAllocateHeapInternal + 0x8c5, calling ntdll!RtlpLowFragHeapAllocFromContext
00000076a1ffe560 00007ffaff3ed66b coreclr + 0x5d66b
00000076a1ffe590 00007ffb64d90f05 ntdll!RtlpAllocateHeapInternal + 0x8c5, calling ntdll!RtlpLowFragHeapAllocFromContext
00000076a1ffe5a0 00007ffaff3ed586 coreclr + 0x5d586, calling coreclr + 0x5d628
00000076a1ffe640 00007ffaff3c5709 coreclr + 0x35709, calling ntdll!RtlAllocateHeap
00000076a1ffe660 00007ffaff4aa551 coreclr!MetaDataGetDispenser + 0x58a71
00000076a1ffe690 00007ffaff3dc403 coreclr + 0x4c403, calling coreclr!MetaDataGetDispenser + 0x58a48
00000076a1ffe6c0 00007ffaff494940 coreclr!MetaDataGetDispenser + 0x42e60, calling coreclr + 0x4c3d8
00000076a1ffe700 00007ffaff3ed498 coreclr + 0x5d498, calling coreclr + 0x5d504
00000076a1ffe7b0 00007ffaff4bb8b3 coreclr!MetaDataGetDispenser + 0x69dd3, calling coreclr + 0x5d3e4
00000076a1ffe810 00007ffaff4974e0 coreclr!MetaDataGetDispenser + 0x45a00, calling coreclr!MetaDataGetDispenser + 0x69da4
00000076a1ffe860 00007ffaff46f819 coreclr!MetaDataGetDispenser + 0x1dd39, calling KERNEL32!HeapFreeStub
00000076a1ffe8d0 00007ffaff4973fb coreclr!MetaDataGetDispenser + 0x4591b
00000076a1ffed30 00007ffb61f4eb24 KERNELBASE!ConsoleCallServerGeneric + 0xf4, calling KERNELBASE!_security_check_cookie
00000076a1ffee80 00007ffb64d8e168 ntdll!RtlpSubSegmentInitialize + 0x4a8, calling ntdll!RtlRunOnceBeginInitialize
00000076a1ffeec0 00007ffb64de0a49 ntdll!RtlSetLastWin32ErrorAndNtStatusFromNtStatus + 0x9, calling ntdll!RtlNtStatusToDosError
00000076a1ffef20 00007ffb64d92383 ntdll!RtlpLowFragHeapAllocFromContext + 0x1203, calling ntdll!memset
00000076a1ffef40 00007ffb61f4e2c5 KERNELBASE!KernelBaseBaseDllInitialize + 0x541, calling KERNELBASE!_security_check_cookie
00000076a1ffefe0 00007ffb64d90f05 ntdll!RtlpAllocateHeapInternal + 0x8c5, calling ntdll!RtlpLowFragHeapAllocFromContext
00000076a1fff070 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1fff090 00007ffb21f6a11a clrcompression!__vcrt_FlsSetValue + 0x4a [f:\dd\vctools\crt\vcruntime\src\internal\winapi_downlevel.cpp:400]
00000076a1fff0c0 00007ffb21f69d15 clrcompression!__vcrt_getptd_noexit + 0xa5 [f:\dd\vctools\crt\vcruntime\src\internal\per_thread_data.cpp:139], calling KERNEL32!SetLastErrorStub
00000076a1fff0f0 00007ffb21f69939 clrcompression!__vcrt_thread_attach + 0x9 [f:\dd\vctools\crt\vcruntime\src\internal\initialization.cpp:108], calling clrcompression!__vcrt_getptd_noexit [f:\dd\vctools\crt\vcruntime\src\internal\per_thread_data.cpp:90]
00000076a1fff120 00007ffb548eda7e webio!_scrt_dllmain_crt_thread_attach + 0x16, calling webio!_acrt_initialize
00000076a1fff130 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1fff140 00007ffb64dc8127 ntdll!RtlDeactivateActivationContextUnsafeFast + 0xc7, calling ntdll!_security_check_cookie
00000076a1fff150 00007ffb548ed2ad webio!_local_stdio_scanf_options + 0x55, calling webio!_scrt_dllmain_crt_thread_attach
00000076a1fff170 00007ffb64dc8243 ntdll!RtlActivateActivationContextUnsafeFast + 0x93, calling ntdll!_security_check_cookie
00000076a1fff180 00007ffb548ed50b webio!_local_stdio_scanf_options + 0x2b3, calling webio!WaDllMain
00000076a1fff1b0 00007ffb2ea7bf80 VCRUNTIME140!DllMainDispatch + 0x60 [f:\dd\vctools\crt\vcruntime\src\dll\vcruntime_dllmain.cpp:57], calling VCRUNTIME140!__vcrt_getptd_noexit [f:\dd\vctools\crt\vcruntime\src\internal\per_thread_data.cpp:92]
00000076a1fff1d0 00007ffb64dc836e ntdll!LdrpCallTlsInitializers + 0x36, calling ntdll!RtlReleaseSRWLockShared
00000076a1fff1e0 00007ffb64dc82d7 ntdll!LdrpCallInitRoutine + 0x6f
00000076a1fff210 00007ffb64da0663 ntdll!LdrpReleaseLoaderLock + 0x2f, calling ntdll!RtlGetCurrentServiceSessionId
00000076a1fff220 00007ffb64da13a4 ntdll!LdrpDropLastInProgressCount + 0x38, calling ntdll!RtlLeaveCriticalSection
00000076a1fff250 00007ffb64dc5e2e ntdll!LdrpInitializeThread + 0x1fa, calling ntdll!LdrpDropLastInProgressCount
00000076a1fff2c0 00007ffb64dc5d66 ntdll!LdrpInitializeThread + 0x132, calling ntdll!RtlActivateActivationContextUnsafeFast
00000076a1fff2c8 00007ffb64dc5d99 ntdll!LdrpInitializeThread + 0x165, calling ntdll!RtlDeactivateActivationContextUnsafeFast
00000076a1fff310 00007ffb64dc5df6 ntdll!LdrpInitializeThread + 0x1c2, calling ntdll!RtlActivateActivationContextUnsafeFast
00000076a1fff318 00007ffb64dc5e16 ntdll!LdrpInitializeThread + 0x1e2, calling ntdll!RtlDeactivateActivationContextUnsafeFast
00000076a1fff330 00007ffb64df6cce ntdll!_LdrpInitialize + 0x8e, calling ntdll!NtTestAlert
00000076a1fff3b0 00007ffb64df6c2b ntdll!LdrpInitialize + 0x3b, calling ntdll!_LdrpInitialize
00000076a1fff3e0 00007ffb64df6be8 ntdll!LdrInitializeThunk + 0x18, calling ntdll!NtContinue
00000076a1fff850 00007ffaff4973d6 coreclr!MetaDataGetDispenser + 0x458f6, calling coreclr!MetaDataGetDispenser + 0x78430
00000076a1fff890 00007ffb64864354 KERNEL32!BaseThreadInitThunk + 0x14, calling ntdll!LdrpDispatchUserCallTarget
00000076a1fff8c0 00007ffb64def051 ntdll!RtlUserThreadStart + 0x21, calling ntdll!LdrpDispatchUserCallTarget
```
|
True
|
StackOverflow in error handling under low memory conditions - Dump for this issue is here: https://drive.google.com/a/ayende.com/file/d/1f5HYZX3Q4-obubl6C1y4xKxcP5mCTMTV/view?usp=drive_web
We are testing our software under low memory conditions and we are seeing some crashes in this regard.
Related: https://github.com/dotnet/coreclr/issues/16004
We are testing what happens when we run out of room to allocate, and how we can survive that, and we started seeing `StackOverflowException`. We are now careful to not create any new threads while under this situation, so we investigated further.
I believe that the dump indicates an infinite recursion issue with the way errors are handled.
Note, we are using embedded PDBs, and that might be related.
In the attached stack trace (and the dump), you can see:
* 24 `DecodeEmbeddedPortablePdbDebugDirectoryData`
* 19 `ReadEmbeddedPortablePdbDebugDirectoryData`
* 11 `TryOpenEmbeddedPortablePdb`
I'm _guessing_ that this is called by the runtime as part of handling exceptions to get the proper stack trace.
Taking this line area as suspect: https://github.com/dotnet/corefx/blob/d5dc42495de7fa663642dd31765d2671c1758576/src/System.Reflection.Metadata/src/System/Reflection/PortableExecutable/PEReader.EmbeddedPortablePdb.cs#L86-L93
We are under memory pressure, so the allocation fails, but this is the part that read the exception information, so the CLR call into this again, repeating the cycle until we get the stack overflow exception.
The stack trace itself is short because we can't allocate too much stack space because we are constrained on memory.
```
0:048> !dumpstack
PDB symbol for clr.dll not loaded
OS Thread Id: 0x36d0 (48)
Current frame: coreclr + 0x23b4f
Child-SP RetAddr Caller, Callee
00000076a1ff3000 00007ffaff3b49bc coreclr + 0x249bc, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff3130 00007ffaff3b49bc coreclr + 0x249bc, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff3190 00007ffb61f87775 KERNELBASE!FlushViewOfFile + 0x25, calling ntdll!NtFlushVirtualMemory
00000076a1ff31a0 00007ffaff3e6235 coreclr + 0x56235, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff31c8 00007ffaff3b487b coreclr + 0x2487b, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff31e8 00007ffaff3b4a7a coreclr + 0x24a7a, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff3240 00007ffafeeb7d36 (MethodDesc 00007ffafe9dc080 + 0x36 System.Runtime.InteropServices.SafeBuffer.ReleasePointer()), calling 00007ffaff3b47f0 (stub for System.Runtime.InteropServices.SafeHandle.DangerousRelease())
00000076a1ff3280 00007ffb33acbfec (MethodDesc 00007ffaa07fcd28 + 0x15c System.IO.MemoryMappedFiles.MemoryMappedView.Flush(UIntPtr))
00000076a1ff32d0 00007ffb33acbb1c (MethodDesc 00007ffaa07fcce8 + 0x2c System.IO.MemoryMappedFiles.MemoryMappedView.Dispose(Boolean))
00000076a1ff3300 00007ffb33acc1fd (MethodDesc 00007ffaa07fd760 + 0xbd System.IO.MemoryMappedFiles.MemoryMappedViewAccessor.Dispose(Boolean))
00000076a1ff3310 00007ffaff4a2c5a coreclr!MetaDataGetDispenser + 0x5117a, calling coreclr + 0x72bbc
00000076a1ff3340 00007ffb33acc194 (MethodDesc 00007ffaa07fd760 + 0x54 System.IO.MemoryMappedFiles.MemoryMappedViewAccessor.Dispose(Boolean)), calling (MethodDesc 00007ffaa07fd760 + 0x87 System.IO.MemoryMappedFiles.MemoryMappedViewAccessor.Dispose(Boolean))
00000076a1ff3350 00007ffafedbee39 (MethodDesc 00007ffafe971f80 + 0x79 System.Threading.Interlocked.Exchange[[System.__Canon, System.Private.CoreLib]](System.__Canon ByRef, System.__Canon)), calling 00007ffaff4a2c30 (stub for System.Threading.Interlocked._Exchange(TypedReference, TypedReference))
00000076a1ff3380 00007ffafefa06fa (MethodDesc 00007ffafe9ef2b8 + 0x1a System.IO.UnmanagedMemoryAccessor.Dispose())
00000076a1ff33b0 00007ffb211df1ac (MethodDesc 00007ffaa07fd9c0 + 0x6c System.Reflection.Internal.MemoryMappedFileBlock+DisposableData.Release())
00000076a1ff33e0 00007ffb211df098 (MethodDesc 00007ffaa07fd888 + 0x18 System.Reflection.Internal.MemoryMappedFileBlock.Dispose())
00000076a1ff3400 00007ffaff46870d coreclr!MetaDataGetDispenser + 0x16c2d
00000076a1ff3410 00007ffb211aace8 (MethodDesc 00007ffaa07bdea8 + 0xf8 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff3460 00007ffaff3e4a04 coreclr + 0x54a04
00000076a1ff34c0 00007ffaff514e07 coreclr!MetaDataGetDispenser + 0xc3327, calling coreclr + 0x5492c
00000076a1ff35c0 00007ffaff468046 coreclr!MetaDataGetDispenser + 0x16566, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff3650 00007ffb64d8819f ntdll!RtlLookupFunctionEntry + 0xdf, calling ntdll!RtlpxLookupFunctionTable
00000076a1ff36b0 00007ffaff412f40 coreclr + 0x82f40, calling coreclr + 0x832a0
00000076a1ff3780 00007ffaff3e586c coreclr + 0x5586c, calling coreclr + 0x54aa0
00000076a1ff3858 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff39d0 00007ffaff3ca9fe coreclr + 0x3a9fe
00000076a1ff3a00 00007ffaff4690fd coreclr!MetaDataGetDispenser + 0x1761d, calling coreclr + 0x29a50
00000076a1ff3a60 00007ffaff3a0bd9 coreclr + 0x10bd9, calling coreclr + 0x10eec
00000076a1ff3ab0 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff3b90 00007ffaff3bb752 coreclr + 0x2b752, calling coreclr!MetaDataGetDispenser + 0x2ac30
00000076a1ff3c70 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff3e90 00007ffaff3b618e coreclr + 0x2618e, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff3f80 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff4030 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff4060 00007ffaff3bb752 coreclr + 0x2b752, calling coreclr!MetaDataGetDispenser + 0x2ac30
00000076a1ff4140 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff4360 00007ffaff3b618e coreclr + 0x2618e, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff4450 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff4500 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff4720 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff4770 00007ffaff3e43a1 coreclr + 0x543a1, calling coreclr + 0x55528
00000076a1ff4870 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff48a0 00007ffb64e223ad ntdll!RtlpExecuteHandlerForUnwind + 0xd
00000076a1ff48d0 00007ffb64d8780d ntdll!RtlUnwindEx + 0x47d, calling ntdll!RtlpExecuteHandlerForUnwind
00000076a1ff4930 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff4998 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff4a80 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff4ab0 00007ffaff3bb752 coreclr + 0x2b752, calling coreclr!MetaDataGetDispenser + 0x2ac30
00000076a1ff4b90 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff4db0 00007ffaff3b618e coreclr + 0x2618e, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff4ea0 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff4f50 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff4fb0 00007ffaff4b566c coreclr!MetaDataGetDispenser + 0x63b8c, calling KERNEL32!RtlUnwindExStub
00000076a1ff5050 00007ffaff4c35d3 coreclr!MetaDataGetDispenser + 0x71af3
00000076a1ff50e0 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff5480 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ff54d0 00007ffaff3e4438 coreclr + 0x54438, calling coreclr!MetaDataGetDispenser + 0x63b4c
00000076a1ff55c0 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff55e0 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff5600 00007ffb64e2232d ntdll!RtlpExecuteHandlerForException + 0xd
00000076a1ff5630 00007ffb64d86c26 ntdll!RtlDispatchException + 0x5c6, calling ntdll!RtlpExecuteHandlerForException
00000076a1ff56e8 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff5740 00007ffaff3b618e coreclr + 0x2618e, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff5830 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff58e0 00007ffb64d95ed4 ntdll!RtlFreeHeap + 0x204, calling ntdll!RtlpHpStackLoggingEnabled
00000076a1ff5910 00007ffaff3bb752 coreclr + 0x2b752, calling coreclr!MetaDataGetDispenser + 0x2ac30
00000076a1ff59e0 00007ffaff4c35d3 coreclr!MetaDataGetDispenser + 0x71af3
00000076a1ff59f0 00007ffaff3c43a9 coreclr + 0x343a9, calling coreclr!MetaDataGetDispenser + 0x1dcc8
00000076a1ff5a60 00007ffaff3c357c coreclr + 0x3357c
00000076a1ff5d30 00007ffb64e2125e ntdll!KiUserExceptionDispatch + 0x2e, calling ntdll!RtlDispatchException
00000076a1ff6450 00007ffb61f52918 KERNELBASE!RaiseException + 0x68 ====> Exception Code e0434352 cxr@00000076a1ff5d40 exr@00000076a1ff6230
00000076a1ff5d40 00007ffaff3b1298 coreclr + 0x21298, calling coreclr + 0x3c7bc
00000076a1ff5d60 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ff5e30 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff5f30 00007ffaff44e970 coreclr!coreclr_execute_assembly + 0x1080, calling coreclr!coreclr_execute_assembly + 0x1808
00000076a1ff6030 00007ffaff44e970 coreclr!coreclr_execute_assembly + 0x1080, calling coreclr!coreclr_execute_assembly + 0x1808
00000076a1ff6238 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff62c8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff62d0 00007ffafee9fa3a (MethodDesc 00007ffafe9d8a80 + 0x3a System.IO.UnmanagedMemoryStream.ReadByte())
00000076a1ff6360 00007ffafee44eb9 (MethodDesc 00007ffafe9cd160 + 0x89 System.IO.BinaryReader.FillBuffer(Int32))
00000076a1ff63a0 00007ffafee9f3b5 (MethodDesc 00007ffafe9d8a40 + 0x15 System.IO.UnmanagedMemoryStream.get_Position())
00000076a1ff63e0 00007ffaff6b1e89 coreclr!GetCLRRuntimeHost + 0x12a939, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff6410 00007ffaff4027a0 coreclr + 0x727a0, calling coreclr + 0x728cc
00000076a1ff6440 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff6478 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff64c0 00007ffafee6d468 (MethodDesc 00007ffafe9d2428 + 0x88 System.Collections.Generic.Dictionary`2[[System.__Canon, System.Private.CoreLib],[System.Resources.ResourceLocator, System.Private.CoreLib]].Initialize(Int32)), calling coreclr!MetaDataGetDispenser + 0x70c50
00000076a1ff64f0 00007ffaff3df672 coreclr + 0x4f672, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff6520 00007ffaff3df5fd coreclr + 0x4f5fd, calling KERNEL32!RaiseExceptionStub
00000076a1ff6620 00007ffaff4ac21f coreclr!MetaDataGetDispenser + 0x5a73f, calling coreclr + 0x4f3b8
00000076a1ff6660 00007ffafedb337e (MethodDesc 00007ffafe9b86f8 + 0x3fe System.Resources.ResourceManager.GetString(System.String, System.Globalization.CultureInfo))
00000076a1ff66d0 00007ffafedb321d (MethodDesc 00007ffafe9b86f8 + 0x29d System.Resources.ResourceManager.GetString(System.String, System.Globalization.CultureInfo)), calling (MethodDesc 00007ffafe9b86f8 + 0x3d0 System.Resources.ResourceManager.GetString(System.String, System.Globalization.CultureInfo))
00000076a1ff6710 00007ffb211aaf98 (MethodDesc 00007ffaa07bdec8 + 0x1d8 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling System_Reflection_Metadata!Equals + 0x15 [E:\A\_work\1439\s\corefx\src\System.Reflection.Metadata\src\System\Reflection\Metadata\TypeSystem\Handles.TypeSystem.cs:1414]
00000076a1ff67a8 00007ffaff4ac16e coreclr!MetaDataGetDispenser + 0x5a68e, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff67d0 00007ffb211aaf98 (MethodDesc 00007ffaa07bdec8 + 0x1d8 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling System_Reflection_Metadata!Equals + 0x15 [E:\A\_work\1439\s\corefx\src\System.Reflection.Metadata\src\System\Reflection\Metadata\TypeSystem\Handles.TypeSystem.cs:1414]
00000076a1ff6830 00007ffaff3e4a04 coreclr + 0x54a04
00000076a1ff6890 00007ffaff3e5cb4 coreclr + 0x55cb4, calling coreclr + 0x5492c
00000076a1ff68e0 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff6900 00007ffaff3e5f26 coreclr + 0x55f26, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff6930 00007ffaff3e446c coreclr + 0x5446c, calling coreclr + 0x55c24
00000076a1ff69b0 00007ffaff4c7db9 coreclr!MetaDataGetDispenser + 0x762d9, calling coreclr!MetaDataGetDispenser + 0x762ec
00000076a1ff6a30 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff6a60 00007ffb64e223ad ntdll!RtlpExecuteHandlerForUnwind + 0xd
00000076a1ff6a90 00007ffb64d8780d ntdll!RtlUnwindEx + 0x47d, calling ntdll!RtlpExecuteHandlerForUnwind
00000076a1ff6af0 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff6b58 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff6c70 00007ffb64dcad17 ntdll!RtlpIsDosDeviceName_Ustr + 0x17, calling ntdll!RtlDetermineDosPathNameType_Ustr
00000076a1ff6d50 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff7060 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff7170 00007ffaff4b566c coreclr!MetaDataGetDispenser + 0x63b8c, calling KERNEL32!RtlUnwindExStub
00000076a1ff72a0 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff7640 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ff7690 00007ffaff3e4438 coreclr + 0x54438, calling coreclr!MetaDataGetDispenser + 0x63b4c
00000076a1ff7780 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff77a0 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff77c0 00007ffb64e2232d ntdll!RtlpExecuteHandlerForException + 0xd
00000076a1ff77f0 00007ffb64d86c26 ntdll!RtlDispatchException + 0x5c6, calling ntdll!RtlpExecuteHandlerForException
00000076a1ff78a8 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff79f0 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff7ad0 00007ffb64dcad17 ntdll!RtlpIsDosDeviceName_Ustr + 0x17, calling ntdll!RtlDetermineDosPathNameType_Ustr
00000076a1ff7c20 00007ffb64dca0a3 ntdll!RtlpDosPathNameToRelativeNtPathName + 0x2e3, calling ntdll!_security_check_cookie
00000076a1ff7e90 00007ffaff4045a7 coreclr + 0x745a7, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff7ef0 00007ffb64e2125e ntdll!KiUserExceptionDispatch + 0x2e, calling ntdll!RtlDispatchException
00000076a1ff8610 00007ffb61f52918 KERNELBASE!RaiseException + 0x68 ====> Exception Code e0434352 cxr@00000076a1ff7f00 exr@00000076a1ff83f0
00000076a1ff7f10 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ff7fc0 00007ffaff4c35d3 coreclr!MetaDataGetDispenser + 0x71af3
00000076a1ff7ff0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff80b0 00007ffaff6cf720 coreclr!GetCLRRuntimeHost + 0x1481d0, calling coreclr + 0x95588
00000076a1ff80e0 00007ffaff6cefba coreclr!GetCLRRuntimeHost + 0x147a6a, calling coreclr!GetCLRRuntimeHost + 0x12d024
00000076a1ff81b0 00007ffaff6cf720 coreclr!GetCLRRuntimeHost + 0x1481d0, calling coreclr + 0x95588
00000076a1ff81e0 00007ffaff6cefba coreclr!GetCLRRuntimeHost + 0x147a6a, calling coreclr!GetCLRRuntimeHost + 0x12d024
00000076a1ff82f0 00007ffaff6b8d15 coreclr!GetCLRRuntimeHost + 0x1317c5, calling coreclr!GetCLRRuntimeHost + 0x146f38
00000076a1ff8300 00007ffb61f3ba56 KERNELBASE!BaseSetLastNTError + 0x16, calling ntdll!RtlSetLastWin32Error
00000076a1ff8330 00007ffaff6cfe32 coreclr!GetCLRRuntimeHost + 0x1488e2, calling coreclr!GetCLRRuntimeHost + 0x12e870
00000076a1ff8380 00007ffaff6b5d9e coreclr!GetCLRRuntimeHost + 0x12e84e, calling coreclr!GetCLRRuntimeHost + 0x14869c
00000076a1ff83f8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff8488 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff84b0 00007ffaff6b3e47 coreclr!GetCLRRuntimeHost + 0x12c8f7, calling coreclr + 0x95588
00000076a1ff8580 00007ffaff597a92 coreclr!GetCLRRuntimeHost + 0x10542, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ff8590 00007ffaff402963 coreclr + 0x72963
00000076a1ff85a0 00007ffaff6b1e89 coreclr!GetCLRRuntimeHost + 0x12a939, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff85d0 00007ffaff4027a0 coreclr + 0x727a0, calling coreclr + 0x728cc
00000076a1ff8600 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff8638 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ff86b0 00007ffaff3df672 coreclr + 0x4f672, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff86e0 00007ffaff3df5fd coreclr + 0x4f5fd, calling KERNEL32!RaiseExceptionStub
00000076a1ff87e0 00007ffaff5bdaa1 coreclr!GetCLRRuntimeHost + 0x36551, calling coreclr + 0x4f3b8
00000076a1ff8830 00007ffaff401b5c coreclr + 0x71b5c, calling coreclr!GetCLRRuntimeHost + 0x364e0
00000076a1ff8880 00007ffafeeb7cf1 (MethodDesc 00007ffafe9dc070 + 0x51 System.Runtime.InteropServices.SafeBuffer.AcquirePointer(Byte* ByRef)), calling 00007ffaff3b49f0 (stub for System.Runtime.InteropServices.SafeHandle.DangerousAddRef(Boolean ByRef))
00000076a1ff88d8 00007ffaff3eb2bd coreclr + 0x5b2bd, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff8930 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff89c8 00007ffaff4018c7 coreclr + 0x718c7, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ff8a10 00007ffb211aae20 (MethodDesc 00007ffaa07bdec8 + 0x60 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock)), calling 00007ffaa0578ec0
00000076a1ff8a20 00007ffb2118f232 (MethodDesc 00007ffaa07be2b8 + 0x42 System.Reflection.Internal.MemoryBlockProvider.GetMemoryBlock(Int32, Int32))
00000076a1ff8a40 00007ffb211ab2b4 (MethodDesc 00007ffaa07fb5f0 + 0x64 System.Reflection.Metadata.PathUtilities.CombinePathWithRelativePath(System.String, System.String)), calling (MethodDesc 00007ffafe9a7638 + 0 System.String.Concat(System.String, System.String, System.String))
00000076a1ff8aa0 00007ffb211aac8b (MethodDesc 00007ffaa07bdea8 + 0x9b System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry)), calling (MethodDesc 00007ffaa07bdec8 + 0 System.Reflection.PortableExecutable.PEReader.DecodeEmbeddedPortablePdbDebugDirectoryData(System.Reflection.Internal.AbstractMemoryBlock))
00000076a1ff8b10 00007ffb211aaafc (MethodDesc 00007ffaa07bde98 + 0x3c System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef)), calling (MethodDesc 00007ffaa07bdea8 + 0 System.Reflection.PortableExecutable.PEReader.ReadEmbeddedPortablePdbDebugDirectoryData(System.Reflection.PortableExecutable.DebugDirectoryEntry))
00000076a1ff8b80 00007ffb211aa518 (MethodDesc 00007ffaa07bde68 + 0x1c8 System.Reflection.PortableExecutable.PEReader.TryOpenAssociatedPortablePdb(System.String, System.Func`2<System.String,System.IO.Stream>, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.String ByRef)), calling (MethodDesc 00007ffaa07bde98 + 0 System.Reflection.PortableExecutable.PEReader.TryOpenEmbeddedPortablePdb(System.Reflection.PortableExecutable.DebugDirectoryEntry, Boolean ByRef, System.Reflection.Metadata.MetadataReaderProvider ByRef, System.Exception ByRef))
00000076a1ff8ba0 00007ffb5127ba52 (MethodDesc 00007ffa9fb5f030 + 0x32 System.IO.File.OpenRead(System.String)), calling (MethodDesc 00007ffafe9d25d0 + 0 System.IO.FileStream..ctor(System.String, System.IO.FileMode, System.IO.FileAccess, System.IO.FileShare))
00000076a1ff8c70 00007ffb25645e3b (MethodDesc 00007ffaa07b2e18 + 0x7b System.Diagnostics.StackTraceSymbols.TryOpenReaderFromAssemblyFile(System.String, IntPtr, Int32))
00000076a1ff8ce0 00007ffb25645c79 (MethodDesc 00007ffaa07b2de8 + 0xa9 System.Diagnostics.StackTraceSymbols.TryGetReader(System.String, IntPtr, Int32, IntPtr, Int32)), calling (MethodDesc 00007ffaa07b2e18 + 0 System.Diagnostics.StackTraceSymbols.TryOpenReaderFromAssemblyFile(System.String, IntPtr, Int32))
00000076a1ff8d40 00007ffb25645915 (MethodDesc 00007ffaa07b2dd8 + 0x65 System.Diagnostics.StackTraceSymbols.GetSourceLineInfo(System.String, IntPtr, Int32, IntPtr, Int32, Int32, Int32, System.String ByRef, Int32 ByRef, Int32 ByRef)), calling (MethodDesc 00007ffaa07b2de8 + 0 System.Diagnostics.StackTraceSymbols.TryGetReader(System.String, IntPtr, Int32, IntPtr, Int32))
00000076a1ff8ed0 00007ffafee4368a (MethodDesc 00007ffafe9ccf10 + 0x2ba System.Diagnostics.StackFrameHelper.InitializeSourceInfo(Int32, Boolean, System.Exception))
00000076a1ff8fa0 00007ffafee0078a (MethodDesc 00007ffafe9c32d0 + 0x5a System.Diagnostics.StackTrace.CaptureStackTrace(Int32, Boolean, System.Threading.Thread, System.Exception)), calling (MethodDesc 00007ffafe9ccf10 + 0 System.Diagnostics.StackFrameHelper.InitializeSourceInfo(Int32, Boolean, System.Exception))
00000076a1ff8fb0 00007ffafeddc7d8 (MethodDesc 00007ffafe9be990 + 0xa8 System.Text.StringBuilder.ToString()), calling (MethodDesc 00007ffafe9a7ea8 + 0 System.Buffer.Memmove(Byte*, Byte*, UInt64))
00000076a1ff9010 00007ffafee0058c (MethodDesc 00007ffafe9c3258 + 0x2c System.Diagnostics.StackTrace..ctor(System.Exception, Boolean)), calling (MethodDesc 00007ffafe9c32d0 + 0 System.Diagnostics.StackTrace.CaptureStackTrace(Int32, Boolean, System.Threading.Thread, System.Exception))
00000076a1ff9040 00007ffafed82fe5 (MethodDesc 00007ffafe9a7590 + 0x55 System.String.FillStringChecked(System.String, Int32, System.String)), calling (MethodDesc 00007ffafe9a7ea8 + 0 System.Buffer.Memmove(Byte*, Byte*, UInt64))
00000076a1ff9050 00007ffafedb04b4 (MethodDesc 00007ffafe9b8130 + 0x64 System.Environment.GetStackTrace(System.Exception, Boolean)), calling (MethodDesc 00007ffafe9c3258 + 0 System.Diagnostics.StackTrace..ctor(System.Exception, Boolean))
00000076a1ff9080 00007ffafed83797 (MethodDesc 00007ffafe9a7638 + 0xd7 System.String.Concat(System.String, System.String, System.String)), calling (MethodDesc 00007ffafe9a7590 + 0 System.String.FillStringChecked(System.String, Int32, System.String))
00000076a1ff90a0 00007ffafedb41ff (MethodDesc 00007ffafe9b88c8 + 0x3f System.Exception.GetStackTrace(Boolean)), calling (MethodDesc 00007ffafe9b8130 + 0 System.Environment.GetStackTrace(System.Exception, Boolean))
00000076a1ff90d0 00007ffafedb449e (MethodDesc 00007ffafe9b8910 + 0x12e System.Exception.ToString(Boolean, Boolean)), calling (MethodDesc 00007ffafe9b88c8 + 0 System.Exception.GetStackTrace(Boolean))
00000076a1ff90f0 00007ffafedb40bf (MethodDesc 00007ffafe9b8850 + 0x2f System.Exception.GetClassName()), calling coreclr!MetaDataGetDispenser + 0x70c50
00000076a1ff9120 00007ffafedb4428 (MethodDesc 00007ffafe9b8910 + 0xb8 System.Exception.ToString(Boolean, Boolean)), calling (MethodDesc 00007ffafe9b8910 + 0 System.Exception.ToString(Boolean, Boolean))
00000076a1ff9170 00007ffafee431a2 (MethodDesc 00007ffafe9cce88 + 0x22 System.AggregateException.ToString()), calling (MethodDesc 00007ffafe9b8910 + 0 System.Exception.ToString(Boolean, Boolean))
00000076a1ff91d0 00007ffafedde80d (MethodDesc 00007ffafe9bee48 + 0x5ed System.Text.StringBuilder.AppendFormatHelper(System.IFormatProvider, System.String, System.ParamsArray))
00000076a1ff9270 00007ffafed83e79 (MethodDesc 00007ffafe9a7720 + 0x69 System.String.FormatHelper(System.IFormatProvider, System.String, System.ParamsArray)), calling (MethodDesc 00007ffafe9bee48 + 0 System.Text.StringBuilder.AppendFormatHelper(System.IFormatProvider, System.String, System.ParamsArray))
00000076a1ff92d0 00007ffafed83aae (MethodDesc 00007ffafe9a7668 + 0x5e System.String.Format(System.String, System.Object)), calling (MethodDesc 00007ffafe9a7720 + 0 System.String.FormatHelper(System.IFormatProvider, System.String, System.ParamsArray))
00000076a1ff9330 00007ffaa1b0ffff (MethodDesc 00007ffa9fdb0830 + 0x4f Raven.Server.Documents.Replication.ReplicationRunStatsBase.AddError(System.Exception)), calling (MethodDesc 00007ffafe9a7668 + 0 System.String.Format(System.String, System.Object))
00000076a1ff9370 00007ffaa1b0ff8a (MethodDesc 00007ffa9fdb0c88 + 0x3a Raven.Server.Documents.Replication.IncomingReplicationStatsScope.AddError(System.Exception)), calling 00007ffa9fcbef10 (stub for Raven.Server.Documents.Replication.ReplicationRunStatsBase.AddError(System.Exception))
00000076a1ff93a0 00007ffaa05dcf35 (MethodDesc 00007ffa9fdb0338 + 0x905 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling 00007ffa9fcbeff0 (stub for Raven.Server.Documents.Replication.IncomingReplicationStatsScope.AddError(System.Exception))
00000076a1ff93f0 00007ffaff3e4a04 coreclr + 0x54a04
00000076a1ff9450 00007ffaff3e5cb4 coreclr + 0x55cb4, calling coreclr + 0x5492c
00000076a1ff94a0 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff94c0 00007ffaff3e5f26 coreclr + 0x55f26, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ff94f0 00007ffaff3e446c coreclr + 0x5446c, calling coreclr + 0x55c24
00000076a1ff9578 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff95f0 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff9620 00007ffb64e223ad ntdll!RtlpExecuteHandlerForUnwind + 0xd
00000076a1ff9650 00007ffb64d8780d ntdll!RtlUnwindEx + 0x47d, calling ntdll!RtlpExecuteHandlerForUnwind
00000076a1ff96b0 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff9710 00007ffaff412f40 coreclr + 0x82f40, calling coreclr + 0x832a0
00000076a1ff9718 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ff9910 00007ffaa05da994 (MethodDesc 00007ffa9fdb0328 + 0x2a4 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches()), calling (MethodDesc 00007ffa9fdb0338 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter))
00000076a1ff9ac0 00007ffb4fc7bc14 clrjit!Compiler::fgInsertInlineeBlocks + 0x504 [e:\a\_work\1791\s\src\jit\flowgraph.cpp:22449], calling clrjit!GenTree::CopyFrom [e:\a\_work\1791\s\src\jit\compiler.hpp:1393]
00000076a1ff9b10 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ff9b80 00007ffaff3e3869 coreclr + 0x53869
00000076a1ff9be0 00007ffaff412f40 coreclr + 0x82f40, calling coreclr + 0x832a0
00000076a1ff9c20 00007ffaa05da994 (MethodDesc 00007ffa9fdb0328 + 0x2a4 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches()), calling (MethodDesc 00007ffa9fdb0338 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter))
00000076a1ff9d30 00007ffaff4b566c coreclr!MetaDataGetDispenser + 0x63b8c, calling KERNEL32!RtlUnwindExStub
00000076a1ff9e60 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffa200 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ffa250 00007ffaff3e4438 coreclr + 0x54438, calling coreclr!MetaDataGetDispenser + 0x63b4c
00000076a1ffa330 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffa360 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffa380 00007ffb64e2232d ntdll!RtlpExecuteHandlerForException + 0xd
00000076a1ffa3b0 00007ffb64d86c26 ntdll!RtlDispatchException + 0x5c6, calling ntdll!RtlpExecuteHandlerForException
00000076a1ffa468 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffa488 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffa510 00007ffaff3e3869 coreclr + 0x53869
00000076a1ffa570 00007ffaff412f40 coreclr + 0x82f40, calling coreclr + 0x832a0
00000076a1ffa5b0 00007ffaa05da994 (MethodDesc 00007ffa9fdb0328 + 0x2a4 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches()), calling (MethodDesc 00007ffa9fdb0338 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter))
00000076a1ffa8a0 00007ffb4fcc7407 clrjit!GenTree::CopyFrom + 0x43 [e:\a\_work\1791\s\src\jit\compiler.hpp:1404], calling clrjit!memcpy [f:\dd\vctools\crt\vcruntime\src\string\amd64\memcpy.asm:101]
00000076a1ffa920 00007ffb4fc7bc14 clrjit!Compiler::fgInsertInlineeBlocks + 0x504 [e:\a\_work\1791\s\src\jit\flowgraph.cpp:22449], calling clrjit!GenTree::CopyFrom [e:\a\_work\1791\s\src\jit\compiler.hpp:1393]
00000076a1ffa970 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffaab0 00007ffb64e2125e ntdll!KiUserExceptionDispatch + 0x2e, calling ntdll!RtlDispatchException
00000076a1ffb1c0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68 ====> Exception Code e0434352 cxr@00000076a1ffaac0 exr@00000076a1ffafb0
00000076a1ffabb0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffaed0 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ffaee0 00007ffaff411808 coreclr + 0x81808, calling coreclr + 0x81914
00000076a1ffafb8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffb048 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffb150 00007ffaff6b1e89 coreclr!GetCLRRuntimeHost + 0x12a939, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffb180 00007ffaff4027a0 coreclr + 0x727a0, calling coreclr + 0x728cc
00000076a1ffb1b0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffb1e8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffb260 00007ffaff3df672 coreclr + 0x4f672, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffb290 00007ffaff3df5fd coreclr + 0x4f5fd, calling KERNEL32!RaiseExceptionStub
00000076a1ffb390 00007ffaff6032a1 coreclr!GetCLRRuntimeHost + 0x7bd51, calling coreclr + 0x4f3b8
00000076a1ffb3a0 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ffb3b0 00007ffaff411808 coreclr + 0x81808, calling coreclr + 0x81914
00000076a1ffb420 00007ffaa05e2151 (MethodDesc 00007ffa9fdb0398 + 0xa61 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling coreclr!GetCLRRuntimeHost + 0x7bcb0
00000076a1ffb4b8 00007ffaff603254 coreclr!GetCLRRuntimeHost + 0x7bd04, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ffb4e0 00007ffaa05e2151 (MethodDesc 00007ffa9fdb0398 + 0xa61 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling coreclr!GetCLRRuntimeHost + 0x7bcb0
00000076a1ffb530 00007ffaff3e4a04 coreclr + 0x54a04
00000076a1ffb590 00007ffaff3e5cb4 coreclr + 0x55cb4, calling coreclr + 0x5492c
00000076a1ffb5e0 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffb600 00007ffaff3e5f26 coreclr + 0x55f26, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffb630 00007ffaff3e446c coreclr + 0x5446c, calling coreclr + 0x55c24
00000076a1ffb6b0 00007ffaff4c7db9 coreclr!MetaDataGetDispenser + 0x762d9, calling coreclr!MetaDataGetDispenser + 0x762ec
00000076a1ffb6b8 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffb730 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffb760 00007ffb64e223ad ntdll!RtlpExecuteHandlerForUnwind + 0xd
00000076a1ffb790 00007ffb64d8780d ntdll!RtlUnwindEx + 0x47d, calling ntdll!RtlpExecuteHandlerForUnwind
00000076a1ffb7f0 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffb858 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffba50 00007ffaa05e16b6 (MethodDesc 00007ffa9fdb0348 + 0x216 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffa9fdb0398 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffbb00 00007ffaa03a44e3 (MethodDesc 00007ffa9fc87208 + 0x293 Sparrow.Json.Parsing.ObjectJsonParser.Read()), calling (MethodDesc 00007ffaa033b408 + 0 System.Collections.Generic.Queue`1[[System.ValueTuple`2[[System.__Canon, System.Private.CoreLib],[System.__Canon, System.Private.CoreLib]], System.Private.CoreLib]].get_Count())
00000076a1ffbb40 00007ffaff6b46dc coreclr!GetCLRRuntimeHost + 0x12d18c, calling coreclr!MetaDataGetDispenser + 0x76010
00000076a1ffbc00 00007ffaff6ceee1 coreclr!GetCLRRuntimeHost + 0x147991, calling coreclr!GetCLRRuntimeHost + 0x12caa4
00000076a1ffbc40 00007ffaff3e8c64 coreclr + 0x58c64, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffbc70 00007ffaff410236 coreclr + 0x80236, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ffbd60 00007ffaa05e16b6 (MethodDesc 00007ffa9fdb0348 + 0x216 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffa9fdb0398 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffbe70 00007ffaff4b566c coreclr!MetaDataGetDispenser + 0x63b8c, calling KERNEL32!RtlUnwindExStub
00000076a1ffbfa0 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffc340 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1ffc350 00007ffaff411808 coreclr + 0x81808, calling coreclr + 0x81914
00000076a1ffc390 00007ffaff3e4438 coreclr + 0x54438, calling coreclr!MetaDataGetDispenser + 0x63b4c
00000076a1ffc470 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffc4a0 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffc4c0 00007ffb64e2232d ntdll!RtlpExecuteHandlerForException + 0xd
00000076a1ffc4f0 00007ffb64d86c26 ntdll!RtlDispatchException + 0x5c6, calling ntdll!RtlpExecuteHandlerForException
00000076a1ffc5a8 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffc600 00007ffaff410236 coreclr + 0x80236, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ffc6f0 00007ffaa05e16b6 (MethodDesc 00007ffa9fdb0348 + 0x216 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffa9fdb0398 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffc8b0 00007ffb4fb91c1a (MethodDesc 00007ffa9faf4100 + 0xaa System.Collections.Generic.HashSet`1[[System.__Canon, System.Private.CoreLib]].AddIfNotPresent(System.__Canon))
00000076a1ffc8e0 00007ffaa03a63cf (MethodDesc 00007ffa9fc4e190 + 0xcf Sparrow.Collections.FastStack`1[[System.__Canon, System.Private.CoreLib]].Pop()), calling coreclr!MetaDataGetDispenser + 0x70da0
00000076a1ffc930 00007ffb4fb909eb (MethodDesc 00007ffa9faf4058 + 0xb System.Collections.Generic.HashSet`1[[System.__Canon, System.Private.CoreLib]].Add(System.__Canon)), calling (MethodDesc 00007ffa9faf4100 + 0 System.Collections.Generic.HashSet`1[[System.__Canon, System.Private.CoreLib]].AddIfNotPresent(System.__Canon))
00000076a1ffc960 00007ffaa03a44e3 (MethodDesc 00007ffa9fc87208 + 0x293 Sparrow.Json.Parsing.ObjectJsonParser.Read()), calling (MethodDesc 00007ffaa033b408 + 0 System.Collections.Generic.Queue`1[[System.ValueTuple`2[[System.__Canon, System.Private.CoreLib],[System.__Canon, System.Private.CoreLib]], System.Private.CoreLib]].get_Count())
00000076a1ffc9a0 00007ffaff6b46dc coreclr!GetCLRRuntimeHost + 0x12d18c, calling coreclr!MetaDataGetDispenser + 0x76010
00000076a1ffc9f0 00007ffaff6b419d coreclr!GetCLRRuntimeHost + 0x12cc4d, calling coreclr!GetCLRRuntimeHost + 0x12d024
00000076a1ffca60 00007ffaff6ceee1 coreclr!GetCLRRuntimeHost + 0x147991, calling coreclr!GetCLRRuntimeHost + 0x12caa4
00000076a1ffcaa0 00007ffaff3e8c64 coreclr + 0x58c64, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffcb70 00007ffaff6b8d15 coreclr!GetCLRRuntimeHost + 0x1317c5, calling coreclr!GetCLRRuntimeHost + 0x146f38
00000076a1ffcbb0 00007ffaff6cfe32 coreclr!GetCLRRuntimeHost + 0x1488e2, calling coreclr!GetCLRRuntimeHost + 0x12e870
00000076a1ffcbf0 00007ffb64e2125e ntdll!KiUserExceptionDispatch + 0x2e, calling ntdll!RtlDispatchException
00000076a1ffd310 00007ffb61f52918 KERNELBASE!RaiseException + 0x68 ====> Exception Code e0434352 cxr@00000076a1ffcc00 exr@00000076a1ffd0f0
00000076a1ffcc80 00007ffaff3b7d4f coreclr + 0x27d4f
00000076a1ffccf0 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffcdc0 00007ffaff3b882f coreclr + 0x2882f, calling coreclr + 0x279c4
00000076a1ffcec0 00007ffaff3b882f coreclr + 0x2882f, calling coreclr + 0x279c4
00000076a1ffcfe0 00007ffa9fca2138 (MethodDesc 00007ffa9fc80478 + 0x38 Sparrow.Json.UnmanagedWriteBuffer.WriteByte(Byte)), calling (MethodDesc 00007ffa9fc80428 + 0 Sparrow.Json.UnmanagedWriteBuffer.ThrowOnDisposed())
00000076a1ffd050 00007ffaff3ba10f coreclr + 0x2a10f, calling coreclr!MetaDataGetDispenser + 0x73c80
00000076a1ffd0a0 00007ffaff3a2a43 coreclr + 0x12a43, calling coreclr!MetaDataGetDispenser + 0x1a760
00000076a1ffd0f8 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffd188 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffd230 00007ffafefdfa97 (MethodDesc 00007ffafe9f9430 + 0x117 System.Text.DecoderNLS.GetChars(Byte[], Int32, Int32, Char[], Int32, Boolean))
00000076a1ffd290 00007ffaff402963 coreclr + 0x72963
00000076a1ffd2a0 00007ffaff6b1e89 coreclr!GetCLRRuntimeHost + 0x12a939, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffd2d0 00007ffaff4027a0 coreclr + 0x727a0, calling coreclr + 0x728cc
00000076a1ffd300 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffd338 00007ffb61f52918 KERNELBASE!RaiseException + 0x68, calling ntdll!RtlRaiseException
00000076a1ffd380 00007ffaff4690fd coreclr!MetaDataGetDispenser + 0x1761d, calling coreclr + 0x29a50
00000076a1ffd3b0 00007ffaff3df672 coreclr + 0x4f672, calling coreclr!MetaDataGetDispenser + 0x70cc0
00000076a1ffd3e0 00007ffaff3df5fd coreclr + 0x4f5fd, calling KERNEL32!RaiseExceptionStub
00000076a1ffd4e0 00007ffaff4ac21f coreclr!MetaDataGetDispenser + 0x5a73f, calling coreclr + 0x4f3b8
00000076a1ffd5d0 00007ffaff23c4c4 (MethodDesc 00007ffafe9cdac0 System.Threading.Tasks.Task.ThrowIfExceptional(Boolean)), calling coreclr!MetaDataGetDispenser + 0x5a630
00000076a1ffd668 00007ffaff4ac16e coreclr!MetaDataGetDispenser + 0x5a68e, calling coreclr!MetaDataGetDispenser + 0x71430
00000076a1ffd690 00007ffaff23c4c4 (MethodDesc 00007ffafe9cdac0 System.Threading.Tasks.Task.ThrowIfExceptional(Boolean)), calling coreclr!MetaDataGetDispenser + 0x5a630
00000076a1ffd6d0 00007ffafee4a4a7 (MethodDesc 00007ffafe9cdc68 + 0xa7 System.Threading.Tasks.Task.Wait(Int32, System.Threading.CancellationToken)), calling (MethodDesc 00007ffafe9cdac0 + 0 System.Threading.Tasks.Task.ThrowIfExceptional(Boolean))
00000076a1ffd700 00007ffafee4a3ed (MethodDesc 00007ffafe9cdc58 + 0xd System.Threading.Tasks.Task.Wait(Int32)), calling (MethodDesc 00007ffafe9cdc68 + 0 System.Threading.Tasks.Task.Wait(Int32, System.Threading.CancellationToken))
00000076a1ffd730 00007ffaa05e1d73 (MethodDesc 00007ffa9fdb0398 + 0x683 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffafe9cdc58 + 0 System.Threading.Tasks.Task.Wait(Int32))
00000076a1ffda50 00007ffaa05e16b6 (MethodDesc 00007ffa9fdb0348 + 0x216 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope)), calling (MethodDesc 00007ffa9fdb0398 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveSingleDocumentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Int32, Int32, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffdb20 00007ffaa05dc946 (MethodDesc 00007ffa9fdb0338 + 0x316 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter)), calling (MethodDesc 00007ffa9fdb0348 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleReceivedDocumentsAndAttachmentsBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Int64, Raven.Server.Documents.Replication.IncomingReplicationStatsScope))
00000076a1ffde60 00007ffaa05da994 (MethodDesc 00007ffa9fdb0328 + 0x2a4 Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches()), calling (MethodDesc 00007ffa9fdb0338 + 0 Raven.Server.Documents.Replication.IncomingReplicationHandler.HandleSingleReplicationBatch(Raven.Server.ServerWide.Context.DocumentsOperationContext, Sparrow.Json.BlittableJsonReaderObject, Sparrow.Json.BlittableJsonTextWriter))
00000076a1ffe0c0 00007ffaa05da6cf (MethodDesc 00007ffa9fdb0450 + 0x2f Raven.Server.Documents.Replication.IncomingReplicationHandler.<Start>b__25_0(System.Object)), calling 00007ffa9fcbedf8 (stub for Raven.Server.Documents.Replication.IncomingReplicationHandler.ReceiveReplicationBatches())
00000076a1ffe0f0 00007ffaa0535fda (MethodDesc 00007ffa9ffb4718 + 0x18a Raven.Server.Utils.PoolOfThreads+PooledThread.Run())
00000076a1ffe1c0 00007ffb51f56e4d (MethodDesc 00007ffa9fb509d8 + 0x3d System.Threading.Thread.ThreadMain_ThreadStart())
00000076a1ffe1f0 00007ffafedbb3ee (MethodDesc 00007ffafe9ba670 + 0x6e System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object))
00000076a1ffe220 00007ffafedbd345 (MethodDesc 00007ffafe9bae50 + 0x25 System.Threading.ThreadHelper.ThreadStart()), calling coreclr!MetaDataGetDispenser + 0x739a0
00000076a1ffe260 00007ffaff4c35d3 coreclr!MetaDataGetDispenser + 0x71af3
00000076a1ffe2a0 00007ffaff3ed9bf coreclr + 0x5d9bf, calling coreclr!MetaDataGetDispenser + 0x71a70
00000076a1ffe2d0 00007ffaff3eedda coreclr + 0x5edda, calling coreclr + 0x1fa14
00000076a1ffe3f0 00007ffaff4b6a19 coreclr!MetaDataGetDispenser + 0x64f39, calling coreclr + 0x5d844
00000076a1ffe420 00007ffb64d90f05 ntdll!RtlpAllocateHeapInternal + 0x8c5, calling ntdll!RtlpLowFragHeapAllocFromContext
00000076a1ffe560 00007ffaff3ed66b coreclr + 0x5d66b
00000076a1ffe590 00007ffb64d90f05 ntdll!RtlpAllocateHeapInternal + 0x8c5, calling ntdll!RtlpLowFragHeapAllocFromContext
00000076a1ffe5a0 00007ffaff3ed586 coreclr + 0x5d586, calling coreclr + 0x5d628
00000076a1ffe640 00007ffaff3c5709 coreclr + 0x35709, calling ntdll!RtlAllocateHeap
00000076a1ffe660 00007ffaff4aa551 coreclr!MetaDataGetDispenser + 0x58a71
00000076a1ffe690 00007ffaff3dc403 coreclr + 0x4c403, calling coreclr!MetaDataGetDispenser + 0x58a48
00000076a1ffe6c0 00007ffaff494940 coreclr!MetaDataGetDispenser + 0x42e60, calling coreclr + 0x4c3d8
00000076a1ffe700 00007ffaff3ed498 coreclr + 0x5d498, calling coreclr + 0x5d504
00000076a1ffe7b0 00007ffaff4bb8b3 coreclr!MetaDataGetDispenser + 0x69dd3, calling coreclr + 0x5d3e4
00000076a1ffe810 00007ffaff4974e0 coreclr!MetaDataGetDispenser + 0x45a00, calling coreclr!MetaDataGetDispenser + 0x69da4
00000076a1ffe860 00007ffaff46f819 coreclr!MetaDataGetDispenser + 0x1dd39, calling KERNEL32!HeapFreeStub
00000076a1ffe8d0 00007ffaff4973fb coreclr!MetaDataGetDispenser + 0x4591b
00000076a1ffed30 00007ffb61f4eb24 KERNELBASE!ConsoleCallServerGeneric + 0xf4, calling KERNELBASE!_security_check_cookie
00000076a1ffee80 00007ffb64d8e168 ntdll!RtlpSubSegmentInitialize + 0x4a8, calling ntdll!RtlRunOnceBeginInitialize
00000076a1ffeec0 00007ffb64de0a49 ntdll!RtlSetLastWin32ErrorAndNtStatusFromNtStatus + 0x9, calling ntdll!RtlNtStatusToDosError
00000076a1ffef20 00007ffb64d92383 ntdll!RtlpLowFragHeapAllocFromContext + 0x1203, calling ntdll!memset
00000076a1ffef40 00007ffb61f4e2c5 KERNELBASE!KernelBaseBaseDllInitialize + 0x541, calling KERNELBASE!_security_check_cookie
00000076a1ffefe0 00007ffb64d90f05 ntdll!RtlpAllocateHeapInternal + 0x8c5, calling ntdll!RtlpLowFragHeapAllocFromContext
00000076a1fff070 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1fff090 00007ffb21f6a11a clrcompression!__vcrt_FlsSetValue + 0x4a [f:\dd\vctools\crt\vcruntime\src\internal\winapi_downlevel.cpp:400]
00000076a1fff0c0 00007ffb21f69d15 clrcompression!__vcrt_getptd_noexit + 0xa5 [f:\dd\vctools\crt\vcruntime\src\internal\per_thread_data.cpp:139], calling KERNEL32!SetLastErrorStub
00000076a1fff0f0 00007ffb21f69939 clrcompression!__vcrt_thread_attach + 0x9 [f:\dd\vctools\crt\vcruntime\src\internal\initialization.cpp:108], calling clrcompression!__vcrt_getptd_noexit [f:\dd\vctools\crt\vcruntime\src\internal\per_thread_data.cpp:90]
00000076a1fff120 00007ffb548eda7e webio!_scrt_dllmain_crt_thread_attach + 0x16, calling webio!_acrt_initialize
00000076a1fff130 00007ffb64de0aa0 ntdll!RtlSetLastWin32Error + 0x40, calling ntdll!_security_check_cookie
00000076a1fff140 00007ffb64dc8127 ntdll!RtlDeactivateActivationContextUnsafeFast + 0xc7, calling ntdll!_security_check_cookie
00000076a1fff150 00007ffb548ed2ad webio!_local_stdio_scanf_options + 0x55, calling webio!_scrt_dllmain_crt_thread_attach
00000076a1fff170 00007ffb64dc8243 ntdll!RtlActivateActivationContextUnsafeFast + 0x93, calling ntdll!_security_check_cookie
00000076a1fff180 00007ffb548ed50b webio!_local_stdio_scanf_options + 0x2b3, calling webio!WaDllMain
00000076a1fff1b0 00007ffb2ea7bf80 VCRUNTIME140!DllMainDispatch + 0x60 [f:\dd\vctools\crt\vcruntime\src\dll\vcruntime_dllmain.cpp:57], calling VCRUNTIME140!__vcrt_getptd_noexit [f:\dd\vctools\crt\vcruntime\src\internal\per_thread_data.cpp:92]
00000076a1fff1d0 00007ffb64dc836e ntdll!LdrpCallTlsInitializers + 0x36, calling ntdll!RtlReleaseSRWLockShared
00000076a1fff1e0 00007ffb64dc82d7 ntdll!LdrpCallInitRoutine + 0x6f
00000076a1fff210 00007ffb64da0663 ntdll!LdrpReleaseLoaderLock + 0x2f, calling ntdll!RtlGetCurrentServiceSessionId
00000076a1fff220 00007ffb64da13a4 ntdll!LdrpDropLastInProgressCount + 0x38, calling ntdll!RtlLeaveCriticalSection
00000076a1fff250 00007ffb64dc5e2e ntdll!LdrpInitializeThread + 0x1fa, calling ntdll!LdrpDropLastInProgressCount
00000076a1fff2c0 00007ffb64dc5d66 ntdll!LdrpInitializeThread + 0x132, calling ntdll!RtlActivateActivationContextUnsafeFast
00000076a1fff2c8 00007ffb64dc5d99 ntdll!LdrpInitializeThread + 0x165, calling ntdll!RtlDeactivateActivationContextUnsafeFast
00000076a1fff310 00007ffb64dc5df6 ntdll!LdrpInitializeThread + 0x1c2, calling ntdll!RtlActivateActivationContextUnsafeFast
00000076a1fff318 00007ffb64dc5e16 ntdll!LdrpInitializeThread + 0x1e2, calling ntdll!RtlDeactivateActivationContextUnsafeFast
00000076a1fff330 00007ffb64df6cce ntdll!_LdrpInitialize + 0x8e, calling ntdll!NtTestAlert
00000076a1fff3b0 00007ffb64df6c2b ntdll!LdrpInitialize + 0x3b, calling ntdll!_LdrpInitialize
00000076a1fff3e0 00007ffb64df6be8 ntdll!LdrInitializeThunk + 0x18, calling ntdll!NtContinue
00000076a1fff850 00007ffaff4973d6 coreclr!MetaDataGetDispenser + 0x458f6, calling coreclr!MetaDataGetDispenser + 0x78430
00000076a1fff890 00007ffb64864354 KERNEL32!BaseThreadInitThunk + 0x14, calling ntdll!LdrpDispatchUserCallTarget
00000076a1fff8c0 00007ffb64def051 ntdll!RtlUserThreadStart + 0x21, calling ntdll!LdrpDispatchUserCallTarget
```
|
non_test
|
stackoverflow in error handling under low memory conditions dump for this issue is here we are testing our software under low memory conditions and we are seeing some crashes in this regard related we are testing what happens when we run out of room to allocate and how we can survive that and we started seeing stackoverflowexception we are now careful to not create any new threads while under this situation so we investigated further i believe that the dump indicates an infinite recursion issue with the way errors are handled note we are using embedded pdbs and that might be related in the attached stack trace and the dump you can see decodeembeddedportablepdbdebugdirectorydata readembeddedportablepdbdebugdirectorydata tryopenembeddedportablepdb i m guessing that this is called by the runtime as part of handling exceptions to get the proper stack trace taking this line area as suspect we are under memory pressure so the allocation fails but this is the part that read the exception information so the clr call into this again repeating the cycle until we get the stack overflow exception the stack trace itself is short because we can t allocate too much stack space because we are constrained on memory dumpstack pdb symbol for clr dll not loaded os thread id current frame coreclr child sp retaddr caller callee coreclr calling coreclr metadatagetdispenser coreclr calling coreclr metadatagetdispenser kernelbase flushviewoffile calling ntdll ntflushvirtualmemory coreclr calling coreclr metadatagetdispenser coreclr calling coreclr metadatagetdispenser coreclr calling coreclr metadatagetdispenser methoddesc system runtime interopservices safebuffer releasepointer calling stub for system runtime interopservices safehandle dangerousrelease methoddesc system io memorymappedfiles memorymappedview flush uintptr methoddesc system io memorymappedfiles memorymappedview dispose boolean methoddesc system io memorymappedfiles memorymappedviewaccessor dispose boolean coreclr metadatagetdispenser calling coreclr methoddesc system io memorymappedfiles memorymappedviewaccessor dispose boolean calling methoddesc system io memorymappedfiles memorymappedviewaccessor dispose boolean methoddesc system threading interlocked exchange system canon byref system canon calling stub for system threading interlocked exchange typedreference typedreference methoddesc system io unmanagedmemoryaccessor dispose methoddesc system reflection internal memorymappedfileblock disposabledata release methoddesc system reflection internal memorymappedfileblock dispose coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry coreclr coreclr metadatagetdispenser calling coreclr coreclr metadatagetdispenser calling coreclr metadatagetdispenser ntdll rtllookupfunctionentry calling ntdll rtlpxlookupfunctiontable coreclr calling coreclr coreclr calling coreclr methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock coreclr coreclr metadatagetdispenser calling coreclr coreclr calling coreclr methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader tryopenassociatedportablepdb system string system func system reflection metadata metadatareaderprovider byref system string byref calling methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref ntdll rtlfreeheap calling ntdll rtlphpstackloggingenabled coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref calling methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader tryopenassociatedportablepdb system string system func system reflection metadata metadatareaderprovider byref system string byref calling methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref ntdll rtlfreeheap calling ntdll rtlphpstackloggingenabled methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock coreclr calling coreclr methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock ntdll rtlpexecutehandlerforunwind ntdll rtlunwindex calling ntdll rtlpexecutehandlerforunwind methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock ntdll rtlfreeheap calling ntdll rtlphpstackloggingenabled coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader tryopenassociatedportablepdb system string system func system reflection metadata metadatareaderprovider byref system string byref calling methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref ntdll rtlfreeheap calling ntdll rtlphpstackloggingenabled coreclr metadatagetdispenser calling rtlunwindexstub coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref calling methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry ntdll calling ntdll security check cookie coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref calling methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref calling methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry ntdll rtlpexecutehandlerforexception ntdll rtldispatchexception calling ntdll rtlpexecutehandlerforexception methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref calling methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader tryopenassociatedportablepdb system string system func system reflection metadata metadatareaderprovider byref system string byref calling methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref ntdll rtlfreeheap calling ntdll rtlphpstackloggingenabled coreclr calling coreclr metadatagetdispenser coreclr metadatagetdispenser coreclr calling coreclr metadatagetdispenser coreclr ntdll kiuserexceptiondispatch calling ntdll rtldispatchexception kernelbase raiseexception exception code cxr exr coreclr calling coreclr ntdll calling ntdll security check cookie kernelbase raiseexception calling ntdll rtlraiseexception coreclr coreclr execute assembly calling coreclr coreclr execute assembly coreclr coreclr execute assembly calling coreclr coreclr execute assembly kernelbase raiseexception calling ntdll rtlraiseexception kernelbase raiseexception calling ntdll rtlraiseexception methoddesc system io unmanagedmemorystream readbyte methoddesc system io binaryreader fillbuffer methoddesc system io unmanagedmemorystream get position coreclr getclrruntimehost calling coreclr metadatagetdispenser coreclr calling coreclr kernelbase raiseexception calling ntdll rtlraiseexception kernelbase raiseexception calling ntdll rtlraiseexception methoddesc system collections generic dictionary initialize calling coreclr metadatagetdispenser coreclr calling coreclr metadatagetdispenser coreclr calling raiseexceptionstub coreclr metadatagetdispenser calling coreclr methoddesc system resources resourcemanager getstring system string system globalization cultureinfo methoddesc system resources resourcemanager getstring system string system globalization cultureinfo calling methoddesc system resources resourcemanager getstring system string system globalization cultureinfo methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling system reflection metadata equals coreclr metadatagetdispenser calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling system reflection metadata equals coreclr coreclr calling coreclr methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling coreclr calling coreclr metadatagetdispenser coreclr calling coreclr coreclr metadatagetdispenser calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling ntdll rtlpexecutehandlerforunwind ntdll rtlunwindex calling ntdll rtlpexecutehandlerforunwind methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling ntdll rtlpisdosdevicename ustr calling ntdll rtldeterminedospathnametype ustr methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock coreclr metadatagetdispenser calling rtlunwindexstub methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling ntdll calling ntdll security check cookie coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling ntdll rtlpexecutehandlerforexception ntdll rtldispatchexception calling ntdll rtlpexecutehandlerforexception methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock ntdll rtlpisdosdevicename ustr calling ntdll rtldeterminedospathnametype ustr ntdll rtlpdospathnametorelativentpathname calling ntdll security check cookie coreclr calling coreclr metadatagetdispenser ntdll kiuserexceptiondispatch calling ntdll rtldispatchexception kernelbase raiseexception exception code cxr exr ntdll calling ntdll security check cookie coreclr metadatagetdispenser kernelbase raiseexception calling ntdll rtlraiseexception coreclr getclrruntimehost calling coreclr coreclr getclrruntimehost calling coreclr getclrruntimehost coreclr getclrruntimehost calling coreclr coreclr getclrruntimehost calling coreclr getclrruntimehost coreclr getclrruntimehost calling coreclr getclrruntimehost kernelbase basesetlastnterror calling ntdll coreclr getclrruntimehost calling coreclr getclrruntimehost coreclr getclrruntimehost calling coreclr getclrruntimehost kernelbase raiseexception calling ntdll rtlraiseexception kernelbase raiseexception calling ntdll rtlraiseexception coreclr getclrruntimehost calling coreclr coreclr getclrruntimehost calling coreclr metadatagetdispenser coreclr coreclr getclrruntimehost calling coreclr metadatagetdispenser coreclr calling coreclr kernelbase raiseexception calling ntdll rtlraiseexception kernelbase raiseexception calling ntdll rtlraiseexception coreclr calling coreclr metadatagetdispenser coreclr calling raiseexceptionstub coreclr getclrruntimehost calling coreclr coreclr calling coreclr getclrruntimehost methoddesc system runtime interopservices safebuffer acquirepointer byte byref calling stub for system runtime interopservices safehandle dangerousaddref boolean byref coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling coreclr calling coreclr metadatagetdispenser methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock calling methoddesc system reflection internal memoryblockprovider getmemoryblock methoddesc system reflection metadata pathutilities combinepathwithrelativepath system string system string calling methoddesc system string concat system string system string system string methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry calling methoddesc system reflection portableexecutable pereader decodeembeddedportablepdbdebugdirectorydata system reflection internal abstractmemoryblock methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref calling methoddesc system reflection portableexecutable pereader readembeddedportablepdbdebugdirectorydata system reflection portableexecutable debugdirectoryentry methoddesc system reflection portableexecutable pereader tryopenassociatedportablepdb system string system func system reflection metadata metadatareaderprovider byref system string byref calling methoddesc system reflection portableexecutable pereader tryopenembeddedportablepdb system reflection portableexecutable debugdirectoryentry boolean byref system reflection metadata metadatareaderprovider byref system exception byref methoddesc system io file openread system string calling methoddesc system io filestream ctor system string system io filemode system io fileaccess system io fileshare methoddesc system diagnostics stacktracesymbols tryopenreaderfromassemblyfile system string intptr methoddesc system diagnostics stacktracesymbols trygetreader system string intptr intptr calling methoddesc system diagnostics stacktracesymbols tryopenreaderfromassemblyfile system string intptr methoddesc system diagnostics stacktracesymbols getsourcelineinfo system string intptr intptr system string byref byref byref calling methoddesc system diagnostics stacktracesymbols trygetreader system string intptr intptr methoddesc system diagnostics stackframehelper initializesourceinfo boolean system exception methoddesc system diagnostics stacktrace capturestacktrace boolean system threading thread system exception calling methoddesc system diagnostics stackframehelper initializesourceinfo boolean system exception methoddesc system text stringbuilder tostring calling methoddesc system buffer memmove byte byte methoddesc system diagnostics stacktrace ctor system exception boolean calling methoddesc system diagnostics stacktrace capturestacktrace boolean system threading thread system exception methoddesc system string fillstringchecked system string system string calling methoddesc system buffer memmove byte byte methoddesc system environment getstacktrace system exception boolean calling methoddesc system diagnostics stacktrace ctor system exception boolean methoddesc system string concat system string system string system string calling methoddesc system string fillstringchecked system string system string methoddesc system exception getstacktrace boolean calling methoddesc system environment getstacktrace system exception boolean methoddesc system exception tostring boolean boolean calling methoddesc system exception getstacktrace boolean methoddesc system exception getclassname calling coreclr metadatagetdispenser methoddesc system exception tostring boolean boolean calling methoddesc system exception tostring boolean boolean methoddesc system aggregateexception tostring calling methoddesc system exception tostring boolean boolean methoddesc system text stringbuilder appendformathelper system iformatprovider system string system paramsarray methoddesc system string formathelper system iformatprovider system string system paramsarray calling methoddesc system text stringbuilder appendformathelper system iformatprovider system string system paramsarray methoddesc system string format system string system object calling methoddesc system string formathelper system iformatprovider system string system paramsarray methoddesc raven server documents replication replicationrunstatsbase adderror system exception calling methoddesc system string format system string system object methoddesc raven server documents replication incomingreplicationstatsscope adderror system exception calling stub for raven server documents replication replicationrunstatsbase adderror system exception methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling stub for raven server documents replication incomingreplicationstatsscope adderror system exception coreclr coreclr calling coreclr methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope coreclr calling coreclr metadatagetdispenser coreclr calling coreclr methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope ntdll rtlpexecutehandlerforunwind ntdll rtlunwindex calling ntdll rtlpexecutehandlerforunwind methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope coreclr calling coreclr methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope methoddesc raven server documents replication incomingreplicationhandler receivereplicationbatches calling methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter clrjit compiler fginsertinlineeblocks calling clrjit gentree copyfrom methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait coreclr coreclr calling coreclr methoddesc raven server documents replication incomingreplicationhandler receivereplicationbatches calling methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter coreclr metadatagetdispenser calling rtlunwindexstub methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope ntdll calling ntdll security check cookie coreclr calling coreclr metadatagetdispenser methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope ntdll rtlpexecutehandlerforexception ntdll rtldispatchexception calling ntdll rtlpexecutehandlerforexception methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait coreclr coreclr calling coreclr methoddesc raven server documents replication incomingreplicationhandler receivereplicationbatches calling methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter clrjit gentree copyfrom calling clrjit memcpy clrjit compiler fginsertinlineeblocks calling clrjit gentree copyfrom methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait ntdll kiuserexceptiondispatch calling ntdll rtldispatchexception kernelbase raiseexception exception code cxr exr kernelbase raiseexception calling ntdll rtlraiseexception ntdll calling ntdll security check cookie coreclr calling coreclr kernelbase raiseexception calling ntdll rtlraiseexception kernelbase raiseexception calling ntdll rtlraiseexception coreclr getclrruntimehost calling coreclr metadatagetdispenser coreclr calling coreclr kernelbase raiseexception calling ntdll rtlraiseexception kernelbase raiseexception calling ntdll rtlraiseexception coreclr calling coreclr metadatagetdispenser coreclr calling raiseexceptionstub coreclr getclrruntimehost calling coreclr ntdll calling ntdll security check cookie coreclr calling coreclr methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling coreclr getclrruntimehost coreclr getclrruntimehost calling coreclr metadatagetdispenser methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling coreclr getclrruntimehost coreclr coreclr calling coreclr methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait coreclr calling coreclr metadatagetdispenser coreclr calling coreclr coreclr metadatagetdispenser calling coreclr metadatagetdispenser methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait ntdll rtlpexecutehandlerforunwind ntdll rtlunwindex calling ntdll rtlpexecutehandlerforunwind methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope calling methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope methoddesc sparrow json parsing objectjsonparser read calling methoddesc system collections generic queue system private corelib get count coreclr getclrruntimehost calling coreclr metadatagetdispenser coreclr getclrruntimehost calling coreclr getclrruntimehost coreclr calling coreclr metadatagetdispenser coreclr calling coreclr metadatagetdispenser methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope calling methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope coreclr metadatagetdispenser calling rtlunwindexstub methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait ntdll calling ntdll security check cookie coreclr calling coreclr coreclr calling coreclr metadatagetdispenser methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait ntdll rtlpexecutehandlerforexception ntdll rtldispatchexception calling ntdll rtlpexecutehandlerforexception methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait coreclr calling coreclr metadatagetdispenser methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope calling methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope methoddesc system collections generic hashset addifnotpresent system canon methoddesc sparrow collections faststack pop calling coreclr metadatagetdispenser methoddesc system collections generic hashset add system canon calling methoddesc system collections generic hashset addifnotpresent system canon methoddesc sparrow json parsing objectjsonparser read calling methoddesc system collections generic queue system private corelib get count coreclr getclrruntimehost calling coreclr metadatagetdispenser coreclr getclrruntimehost calling coreclr getclrruntimehost coreclr getclrruntimehost calling coreclr getclrruntimehost coreclr calling coreclr metadatagetdispenser coreclr getclrruntimehost calling coreclr getclrruntimehost coreclr getclrruntimehost calling coreclr getclrruntimehost ntdll kiuserexceptiondispatch calling ntdll rtldispatchexception kernelbase raiseexception exception code cxr exr coreclr kernelbase raiseexception calling ntdll rtlraiseexception coreclr calling coreclr coreclr calling coreclr methoddesc sparrow json unmanagedwritebuffer writebyte byte calling methoddesc sparrow json unmanagedwritebuffer throwondisposed coreclr calling coreclr metadatagetdispenser coreclr calling coreclr metadatagetdispenser kernelbase raiseexception calling ntdll rtlraiseexception kernelbase raiseexception calling ntdll rtlraiseexception methoddesc system text decodernls getchars byte char boolean coreclr coreclr getclrruntimehost calling coreclr metadatagetdispenser coreclr calling coreclr kernelbase raiseexception calling ntdll rtlraiseexception kernelbase raiseexception calling ntdll rtlraiseexception coreclr metadatagetdispenser calling coreclr coreclr calling coreclr metadatagetdispenser coreclr calling raiseexceptionstub coreclr metadatagetdispenser calling coreclr methoddesc system threading tasks task throwifexceptional boolean calling coreclr metadatagetdispenser coreclr metadatagetdispenser calling coreclr metadatagetdispenser methoddesc system threading tasks task throwifexceptional boolean calling coreclr metadatagetdispenser methoddesc system threading tasks task wait system threading cancellationtoken calling methoddesc system threading tasks task throwifexceptional boolean methoddesc system threading tasks task wait calling methoddesc system threading tasks task wait system threading cancellationtoken methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope calling methoddesc system threading tasks task wait methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope calling methoddesc raven server documents replication incomingreplicationhandler receivesingledocumentsbatch raven server serverwide context documentsoperationcontext raven server documents replication incomingreplicationstatsscope methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter calling methoddesc raven server documents replication incomingreplicationhandler handlereceiveddocumentsandattachmentsbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject raven server documents replication incomingreplicationstatsscope methoddesc raven server documents replication incomingreplicationhandler receivereplicationbatches calling methoddesc raven server documents replication incomingreplicationhandler handlesinglereplicationbatch raven server serverwide context documentsoperationcontext sparrow json blittablejsonreaderobject sparrow json blittablejsontextwriter methoddesc raven server documents replication incomingreplicationhandler b system object calling stub for raven server documents replication incomingreplicationhandler receivereplicationbatches methoddesc raven server utils poolofthreads pooledthread run methoddesc system threading thread threadmain threadstart methoddesc system threading executioncontext run system threading executioncontext system threading contextcallback system object methoddesc system threading threadhelper threadstart calling coreclr metadatagetdispenser coreclr metadatagetdispenser coreclr calling coreclr metadatagetdispenser coreclr calling coreclr coreclr metadatagetdispenser calling coreclr ntdll rtlpallocateheapinternal calling ntdll rtlplowfragheapallocfromcontext coreclr ntdll rtlpallocateheapinternal calling ntdll rtlplowfragheapallocfromcontext coreclr calling coreclr coreclr calling ntdll rtlallocateheap coreclr metadatagetdispenser coreclr calling coreclr metadatagetdispenser coreclr metadatagetdispenser calling coreclr coreclr calling coreclr coreclr metadatagetdispenser calling coreclr coreclr metadatagetdispenser calling coreclr metadatagetdispenser coreclr metadatagetdispenser calling heapfreestub coreclr metadatagetdispenser kernelbase consolecallservergeneric calling kernelbase security check cookie ntdll rtlpsubsegmentinitialize calling ntdll rtlrunoncebegininitialize ntdll calling ntdll rtlntstatustodoserror ntdll rtlplowfragheapallocfromcontext calling ntdll memset kernelbase kernelbasebasedllinitialize calling kernelbase security check cookie ntdll rtlpallocateheapinternal calling ntdll rtlplowfragheapallocfromcontext ntdll calling ntdll security check cookie clrcompression vcrt flssetvalue clrcompression vcrt getptd noexit calling setlasterrorstub clrcompression vcrt thread attach calling clrcompression vcrt getptd noexit webio scrt dllmain crt thread attach calling webio acrt initialize ntdll calling ntdll security check cookie ntdll rtldeactivateactivationcontextunsafefast calling ntdll security check cookie webio local stdio scanf options calling webio scrt dllmain crt thread attach ntdll rtlactivateactivationcontextunsafefast calling ntdll security check cookie webio local stdio scanf options calling webio wadllmain dllmaindispatch calling vcrt getptd noexit ntdll ldrpcalltlsinitializers calling ntdll rtlreleasesrwlockshared ntdll ldrpcallinitroutine ntdll ldrpreleaseloaderlock calling ntdll rtlgetcurrentservicesessionid ntdll ldrpdroplastinprogresscount calling ntdll rtlleavecriticalsection ntdll ldrpinitializethread calling ntdll ldrpdroplastinprogresscount ntdll ldrpinitializethread calling ntdll rtlactivateactivationcontextunsafefast ntdll ldrpinitializethread calling ntdll rtldeactivateactivationcontextunsafefast ntdll ldrpinitializethread calling ntdll rtlactivateactivationcontextunsafefast ntdll ldrpinitializethread calling ntdll rtldeactivateactivationcontextunsafefast ntdll ldrpinitialize calling ntdll nttestalert ntdll ldrpinitialize calling ntdll ldrpinitialize ntdll ldrinitializethunk calling ntdll ntcontinue coreclr metadatagetdispenser calling coreclr metadatagetdispenser basethreadinitthunk calling ntdll ldrpdispatchusercalltarget ntdll rtluserthreadstart calling ntdll ldrpdispatchusercalltarget
| 0
|
112,870
| 9,604,513,886
|
IssuesEvent
|
2019-05-10 20:14:43
|
emory-libraries/dlp-curate
|
https://api.github.com/repos/emory-libraries/dlp-curate
|
closed
|
Auto-suggest entries from the controlled vocabularies
|
Functional Test Software Engineering
|
- [ ] Ensure that properties with controlled vocabs can auto-suggest terms
- [ ] Extend or update the form's system test to show this works.
|
1.0
|
Auto-suggest entries from the controlled vocabularies - - [ ] Ensure that properties with controlled vocabs can auto-suggest terms
- [ ] Extend or update the form's system test to show this works.
|
test
|
auto suggest entries from the controlled vocabularies ensure that properties with controlled vocabs can auto suggest terms extend or update the form s system test to show this works
| 1
|
212,983
| 16,506,076,241
|
IssuesEvent
|
2021-05-25 19:29:46
|
trisacrypto/trisa
|
https://api.github.com/repos/trisacrypto/trisa
|
closed
|
Define and prototype address search algorithm
|
documentation enhancement wontfix
|
Define and prototype address search algorithm (perhaps with the Coinbase Bitcoin signing proof).
|
1.0
|
Define and prototype address search algorithm - Define and prototype address search algorithm (perhaps with the Coinbase Bitcoin signing proof).
|
non_test
|
define and prototype address search algorithm define and prototype address search algorithm perhaps with the coinbase bitcoin signing proof
| 0
|
61,390
| 6,735,015,204
|
IssuesEvent
|
2017-10-18 20:09:49
|
DevOps17-Bravo/orders
|
https://api.github.com/repos/DevOps17-Bravo/orders
|
closed
|
Action(cancel) on an order
|
test
|
**As a** customer
**I need to** be able to cancel an existed order
**So that** I can cancel the order and move it to history list
**Assumptions**:
- the order id of this order is provided
**Acceptance Criteria**:
**Given that** I am a customer with a valid order id
**When** I make a request to cancel the order
**Then** I get a successful response and the record will be moved to a history list
|
1.0
|
Action(cancel) on an order - **As a** customer
**I need to** be able to cancel an existed order
**So that** I can cancel the order and move it to history list
**Assumptions**:
- the order id of this order is provided
**Acceptance Criteria**:
**Given that** I am a customer with a valid order id
**When** I make a request to cancel the order
**Then** I get a successful response and the record will be moved to a history list
|
test
|
action cancel on an order as a customer i need to be able to cancel an existed order so that i can cancel the order and move it to history list assumptions the order id of this order is provided acceptance criteria given that i am a customer with a valid order id when i make a request to cancel the order then i get a successful response and the record will be moved to a history list
| 1
|
248,058
| 20,992,268,789
|
IssuesEvent
|
2022-03-29 10:21:43
|
microsoft/AzureStorageExplorer
|
https://api.github.com/repos/microsoft/AzureStorageExplorer
|
opened
|
Only display a successful activity log if selecting one of the source items on the 'Retry Azcopy' dialog regardless of whatever option is selected in the Overwrite part
|
🧪 testing :gear: blobs :gear: files :gear: azcopy
|
**Storage Explorer Version**: 1.23.0
**Build Number**: 20220329.2
**Branch**: main
**Platform/OS**: Windows 10
**Architecture** ia32
**How Found**: From running test cases
**Regression From**: Not a regression
## Bug Description ##
Only display a successful activity log if selecting one of the source items on the 'Retry Azcopy' dialog regardless of whatever option is selected in the Overwrite part.

## Steps to Reproduce ##
1. Expand one storage account -> Blob Containers.
2. Create one blob container -> Upload two blobs from one server.
3. Upload the same two blobs from the same source.
4. There is a conflict dialog -> Select 'Do not upload' -> Click 'Apply to All Conflicts'.
5. There is a skip activity log -> Click 'Retry...'.
6. Select one item on the 'Retry Azcopy' -> Select 'Prompt for overwrite' -> Click 'Retry Selected'.
7. Check whether there is a conflict dialog.
## Expected Experience ##
There is a conflict dialog.
## Actual Experience ##
1. There is no conflict dialog.
2. There is a successful activity log.

## Additional Context ##
1. This issue also reproduces for file shares.
2. Similar issue: [4694](https://github.com/microsoft/AzureStorageExplorer/issues/4694).
|
1.0
|
Only display a successful activity log if selecting one of the source items on the 'Retry Azcopy' dialog regardless of whatever option is selected in the Overwrite part - **Storage Explorer Version**: 1.23.0
**Build Number**: 20220329.2
**Branch**: main
**Platform/OS**: Windows 10
**Architecture** ia32
**How Found**: From running test cases
**Regression From**: Not a regression
## Bug Description ##
Only display a successful activity log if selecting one of the source items on the 'Retry Azcopy' dialog regardless of whatever option is selected in the Overwrite part.

## Steps to Reproduce ##
1. Expand one storage account -> Blob Containers.
2. Create one blob container -> Upload two blobs from one server.
3. Upload the same two blobs from the same source.
4. There is a conflict dialog -> Select 'Do not upload' -> Click 'Apply to All Conflicts'.
5. There is a skip activity log -> Click 'Retry...'.
6. Select one item on the 'Retry Azcopy' -> Select 'Prompt for overwrite' -> Click 'Retry Selected'.
7. Check whether there is a conflict dialog.
## Expected Experience ##
There is a conflict dialog.
## Actual Experience ##
1. There is no conflict dialog.
2. There is a successful activity log.

## Additional Context ##
1. This issue also reproduces for file shares.
2. Similar issue: [4694](https://github.com/microsoft/AzureStorageExplorer/issues/4694).
|
test
|
only display a successful activity log if selecting one of the source items on the retry azcopy dialog regardless of whatever option is selected in the overwrite part storage explorer version build number branch main platform os windows architecture how found from running test cases regression from not a regression bug description only display a successful activity log if selecting one of the source items on the retry azcopy dialog regardless of whatever option is selected in the overwrite part steps to reproduce expand one storage account blob containers create one blob container upload two blobs from one server upload the same two blobs from the same source there is a conflict dialog select do not upload click apply to all conflicts there is a skip activity log click retry select one item on the retry azcopy select prompt for overwrite click retry selected check whether there is a conflict dialog expected experience there is a conflict dialog actual experience there is no conflict dialog there is a successful activity log additional context this issue also reproduces for file shares similar issue
| 1
|
25,374
| 5,157,171,911
|
IssuesEvent
|
2017-01-16 04:54:06
|
DecentralVan/decentral
|
https://api.github.com/repos/DecentralVan/decentral
|
opened
|
Determine what "successful meetup" means.
|
documentation events onboarding publicity
|
We agreed successful meetups are our best avenue for recruitment. Finalise the rules that activate reward bounties/perks.
- X new faces?
- Full explanation of the space ethos & opportunity.
- Full description on meetup.com 72hrs prior to event.
- Matching dctrl google calendar entry.
Discuss...
|
1.0
|
Determine what "successful meetup" means. - We agreed successful meetups are our best avenue for recruitment. Finalise the rules that activate reward bounties/perks.
- X new faces?
- Full explanation of the space ethos & opportunity.
- Full description on meetup.com 72hrs prior to event.
- Matching dctrl google calendar entry.
Discuss...
|
non_test
|
determine what successful meetup means we agreed successful meetups are our best avenue for recruitment finalise the rules that activate reward bounties perks x new faces full explanation of the space ethos opportunity full description on meetup com prior to event matching dctrl google calendar entry discuss
| 0
|
710,153
| 24,407,762,114
|
IssuesEvent
|
2022-10-05 09:30:39
|
ngageoint/hootenanny
|
https://api.github.com/repos/ngageoint/hootenanny
|
opened
|
Translations: Deconflict historical and current features
|
Type: Bug Status: In Progress Priority: Medium Category: Translation Category: Schema
|
We handle `disused` features but sometimes the combination of disused and current features gives the wrong translation.
E.g. A disused railway that is now a highway should get translated to be a road not a railway.
|
1.0
|
Translations: Deconflict historical and current features - We handle `disused` features but sometimes the combination of disused and current features gives the wrong translation.
E.g. A disused railway that is now a highway should get translated to be a road not a railway.
|
non_test
|
translations deconflict historical and current features we handle disused features but sometimes the combination of disused and current features gives the wrong translation e g a disused railway that is now a highway should get translated to be a road not a railway
| 0
|
63,762
| 6,884,447,785
|
IssuesEvent
|
2017-11-21 13:05:07
|
SatelliteQE/robottelo
|
https://api.github.com/repos/SatelliteQE/robottelo
|
closed
|
CLI - name attribute not parsed from `auth-source ldap info`
|
6.3 Medium test-failure
|
```
KeyError: 'name'
```
```
2017-11-03 19:54:26 - robottelo.ssh - INFO - >>> LANG=en_US.UTF-8 hammer -v -u admin -p changeme auth-source ldap info --id="12"
2017-11-03 19:54:28 - robottelo.ssh - INFO - <<< stdout
Server:
Id: 12
Name: <hr>ARDvihNKTilFlIryL</hr>
Server: 10.8.104.52
LDAPS: no
Port: 389
Server Type: active_directory
```
|
1.0
|
CLI - name attribute not parsed from `auth-source ldap info` - ```
KeyError: 'name'
```
```
2017-11-03 19:54:26 - robottelo.ssh - INFO - >>> LANG=en_US.UTF-8 hammer -v -u admin -p changeme auth-source ldap info --id="12"
2017-11-03 19:54:28 - robottelo.ssh - INFO - <<< stdout
Server:
Id: 12
Name: <hr>ARDvihNKTilFlIryL</hr>
Server: 10.8.104.52
LDAPS: no
Port: 389
Server Type: active_directory
```
|
test
|
cli name attribute not parsed from auth source ldap info keyerror name robottelo ssh info lang en us utf hammer v u admin p changeme auth source ldap info id robottelo ssh info stdout server id name ardvihnktilfliryl server ldaps no port server type active directory
| 1
|
256,926
| 8,130,438,399
|
IssuesEvent
|
2018-08-17 18:28:59
|
resin-io/resin-supervisor
|
https://api.github.com/repos/resin-io/resin-supervisor
|
closed
|
Unique key constraint violated
|
High priority type/bug
|
This bug prevents any control over the user container.
```
Jun 01 10:11:01 6c3b082 healthdog[10047]: [2018-06-01T10:11:01.622Z] Error reporting initial configuration, will retry { t: Unique key constraint violated
Jun 01 10:11:01 6c3b082 healthdog[10047]: at /usr/src/app/dist/app.js:387:252909
Jun 01 10:11:01 6c3b082 healthdog[10047]: at u (/usr/src/app/dist/app.js:9:72709)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromiseFromHandler (/usr/src/app/dist/app.js:305:143488)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromise (/usr/src/app/dist/app.js:305:144388)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromise0 (/usr/src/app/dist/app.js:305:145087)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromises (/usr/src/app/dist/app.js:305:146414)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._fulfill (/usr/src/app/dist/app.js:305:145457)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at s._resolve (/usr/src/app/dist/app.js:305:154371)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at s._promiseFulfilled (/usr/src/app/dist/app.js:305:154712)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at s._iterate (/usr/src/app/dist/app.js:305:154192)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at s.t [as _init] (/usr/src/app/dist/app.js:305:153413)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromise (/usr/src/app/dist/app.js:305:144426)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromise0 (/usr/src/app/dist/app.js:305:145087)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromises (/usr/src/app/dist/app.js:305:146414)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._fulfill (/usr/src/app/dist/app.js:305:145457)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at H._callback (/usr/src/app/dist/app.js:114:22879)
Jun 01 10:11:01 6c3b082 healthdog[10047]: message: 'Unique key constraint violated',
Jun 01 10:11:01 6c3b082 healthdog[10047]: statusCode: 404,
Jun 01 10:11:01 6c3b082 healthdog[10047]: name: 't' }
```
|
1.0
|
Unique key constraint violated - This bug prevents any control over the user container.
```
Jun 01 10:11:01 6c3b082 healthdog[10047]: [2018-06-01T10:11:01.622Z] Error reporting initial configuration, will retry { t: Unique key constraint violated
Jun 01 10:11:01 6c3b082 healthdog[10047]: at /usr/src/app/dist/app.js:387:252909
Jun 01 10:11:01 6c3b082 healthdog[10047]: at u (/usr/src/app/dist/app.js:9:72709)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromiseFromHandler (/usr/src/app/dist/app.js:305:143488)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromise (/usr/src/app/dist/app.js:305:144388)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromise0 (/usr/src/app/dist/app.js:305:145087)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromises (/usr/src/app/dist/app.js:305:146414)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._fulfill (/usr/src/app/dist/app.js:305:145457)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at s._resolve (/usr/src/app/dist/app.js:305:154371)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at s._promiseFulfilled (/usr/src/app/dist/app.js:305:154712)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at s._iterate (/usr/src/app/dist/app.js:305:154192)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at s.t [as _init] (/usr/src/app/dist/app.js:305:153413)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromise (/usr/src/app/dist/app.js:305:144426)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromise0 (/usr/src/app/dist/app.js:305:145087)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._settlePromises (/usr/src/app/dist/app.js:305:146414)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at A._fulfill (/usr/src/app/dist/app.js:305:145457)
Jun 01 10:11:01 6c3b082 healthdog[10047]: at H._callback (/usr/src/app/dist/app.js:114:22879)
Jun 01 10:11:01 6c3b082 healthdog[10047]: message: 'Unique key constraint violated',
Jun 01 10:11:01 6c3b082 healthdog[10047]: statusCode: 404,
Jun 01 10:11:01 6c3b082 healthdog[10047]: name: 't' }
```
|
non_test
|
unique key constraint violated this bug prevents any control over the user container jun healthdog error reporting initial configuration will retry t unique key constraint violated jun healthdog at usr src app dist app js jun healthdog at u usr src app dist app js jun healthdog at a settlepromisefromhandler usr src app dist app js jun healthdog at a settlepromise usr src app dist app js jun healthdog at a usr src app dist app js jun healthdog at a settlepromises usr src app dist app js jun healthdog at a fulfill usr src app dist app js jun healthdog at s resolve usr src app dist app js jun healthdog at s promisefulfilled usr src app dist app js jun healthdog at s iterate usr src app dist app js jun healthdog at s t usr src app dist app js jun healthdog at a settlepromise usr src app dist app js jun healthdog at a usr src app dist app js jun healthdog at a settlepromises usr src app dist app js jun healthdog at a fulfill usr src app dist app js jun healthdog at h callback usr src app dist app js jun healthdog message unique key constraint violated jun healthdog statuscode jun healthdog name t
| 0
|
228,429
| 18,216,781,388
|
IssuesEvent
|
2021-09-30 06:00:40
|
cockroachdb/cockroach
|
https://api.github.com/repos/cockroachdb/cockroach
|
opened
|
sql/tests: TestRandomSyntaxFunctions failed
|
C-test-failure O-robot branch-master
|
sql/tests.TestRandomSyntaxFunctions [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=3518574&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=3518574&tab=artifacts#/) on master @ [ac885449c1fe74de23ea5d82858b3aa3674496f9](https://github.com/cockroachdb/cockroach/commits/ac885449c1fe74de23ea5d82858b3aa3674496f9):
Random syntax error:
```
rsg_test.go:779: Crash detected: server panic: statement exec timeout
```
Query:
```
SELECT crdb_internal.check_consistency(false, '\x':::BYTES, '\x':::BYTES) ;
```
<details><summary>Reproduce</summary>
<p>
To reproduce, try:
```bash
make stressrace TESTS=TestRandomSyntaxFunctions PKG=./pkg/sql/tests TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1
```
</p>
</details>
<details><summary>Same failure on other branches</summary>
<p>
- #66514 sql/tests: TestRandomSyntaxFunctions failed [C-test-failure O-robot branch-release-21.1]
- #63943 sql/tests: TestRandomSyntaxFunctions failed [C-test-failure O-robot T-sql-experience branch-release-20.2]
</p>
</details>
<details><summary>Internal log</summary>
<p>
```
mjibson marked as alumn{us/a}; resolving to rafiss instead
```
</p>
</details>
/cc @cockroachdb/sql-experience rafiss
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestRandomSyntaxFunctions.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
|
1.0
|
sql/tests: TestRandomSyntaxFunctions failed - sql/tests.TestRandomSyntaxFunctions [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=3518574&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=3518574&tab=artifacts#/) on master @ [ac885449c1fe74de23ea5d82858b3aa3674496f9](https://github.com/cockroachdb/cockroach/commits/ac885449c1fe74de23ea5d82858b3aa3674496f9):
Random syntax error:
```
rsg_test.go:779: Crash detected: server panic: statement exec timeout
```
Query:
```
SELECT crdb_internal.check_consistency(false, '\x':::BYTES, '\x':::BYTES) ;
```
<details><summary>Reproduce</summary>
<p>
To reproduce, try:
```bash
make stressrace TESTS=TestRandomSyntaxFunctions PKG=./pkg/sql/tests TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1
```
</p>
</details>
<details><summary>Same failure on other branches</summary>
<p>
- #66514 sql/tests: TestRandomSyntaxFunctions failed [C-test-failure O-robot branch-release-21.1]
- #63943 sql/tests: TestRandomSyntaxFunctions failed [C-test-failure O-robot T-sql-experience branch-release-20.2]
</p>
</details>
<details><summary>Internal log</summary>
<p>
```
mjibson marked as alumn{us/a}; resolving to rafiss instead
```
</p>
</details>
/cc @cockroachdb/sql-experience rafiss
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestRandomSyntaxFunctions.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
|
test
|
sql tests testrandomsyntaxfunctions failed sql tests testrandomsyntaxfunctions with on master random syntax error rsg test go crash detected server panic statement exec timeout query select crdb internal check consistency false x bytes x bytes reproduce to reproduce try bash make stressrace tests testrandomsyntaxfunctions pkg pkg sql tests testtimeout stressflags timeout same failure on other branches sql tests testrandomsyntaxfunctions failed sql tests testrandomsyntaxfunctions failed internal log mjibson marked as alumn us a resolving to rafiss instead cc cockroachdb sql experience rafiss
| 1
|
90,137
| 8,229,309,658
|
IssuesEvent
|
2018-09-07 08:59:08
|
humera987/HumTestData
|
https://api.github.com/repos/humera987/HumTestData
|
reopened
|
project_fx_test : ApiV1AccountsPostCreate
|
project_fx_test
|
Project : project_fx_test
Job : Stg
Env : Stg
Region : FXLabs/US_WEST_1
Result : fail
Status Code : 500
Headers : {}
Endpoint : http://13.57.51.56/api/v1/accounts
Request :
{
'accessKey' : null,
'accountType' : 'GitLab',
'allowedRegions' : [ ],
'createdBy' : null,
'createdDate' : null,
'id' : null,
'inactive' : null,
'modifiedBy' : null,
'modifiedDate' : null,
'name' : null,
'org' : {
'createdBy' : null,
'createdDate' : null,
'id' : null,
'inactive' : null,
'modifiedBy' : null,
'modifiedDate' : null,
'name' : null,
'version' : null
},
'prop1' : null,
'prop2' : null,
'prop3' : null,
'region' : null,
'secretKey' : null,
'version' : null
}
Response :
I/O error on POST request for "http://13.57.51.56/api/v1/accounts": Timeout waiting for connection from pool; nested exception is org.apache.http.conn.ConnectionPoolTimeoutException: Timeout waiting for connection from pool
Logs :
Assertion [@StatusCode != 404] passed, not expecting [404] and found [500]Assertion [@StatusCode != 500] failed, not expecting [500] but found [500]Assertion [@StatusCode != 200] passed, not expecting [200] and found [500]Assertion [@StatusCode != 401] passed, not expecting [401] and found [500]
--- FX Bot ---
|
1.0
|
project_fx_test : ApiV1AccountsPostCreate - Project : project_fx_test
Job : Stg
Env : Stg
Region : FXLabs/US_WEST_1
Result : fail
Status Code : 500
Headers : {}
Endpoint : http://13.57.51.56/api/v1/accounts
Request :
{
'accessKey' : null,
'accountType' : 'GitLab',
'allowedRegions' : [ ],
'createdBy' : null,
'createdDate' : null,
'id' : null,
'inactive' : null,
'modifiedBy' : null,
'modifiedDate' : null,
'name' : null,
'org' : {
'createdBy' : null,
'createdDate' : null,
'id' : null,
'inactive' : null,
'modifiedBy' : null,
'modifiedDate' : null,
'name' : null,
'version' : null
},
'prop1' : null,
'prop2' : null,
'prop3' : null,
'region' : null,
'secretKey' : null,
'version' : null
}
Response :
I/O error on POST request for "http://13.57.51.56/api/v1/accounts": Timeout waiting for connection from pool; nested exception is org.apache.http.conn.ConnectionPoolTimeoutException: Timeout waiting for connection from pool
Logs :
Assertion [@StatusCode != 404] passed, not expecting [404] and found [500]Assertion [@StatusCode != 500] failed, not expecting [500] but found [500]Assertion [@StatusCode != 200] passed, not expecting [200] and found [500]Assertion [@StatusCode != 401] passed, not expecting [401] and found [500]
--- FX Bot ---
|
test
|
project fx test project project fx test job stg env stg region fxlabs us west result fail status code headers endpoint request accesskey null accounttype gitlab allowedregions createdby null createddate null id null inactive null modifiedby null modifieddate null name null org createdby null createddate null id null inactive null modifiedby null modifieddate null name null version null null null null region null secretkey null version null response i o error on post request for timeout waiting for connection from pool nested exception is org apache http conn connectionpooltimeoutexception timeout waiting for connection from pool logs assertion passed not expecting and found assertion failed not expecting but found assertion passed not expecting and found assertion passed not expecting and found fx bot
| 1
|
199,168
| 15,026,204,876
|
IssuesEvent
|
2021-02-01 22:17:05
|
rancher/dashboard
|
https://api.github.com/repos/rancher/dashboard
|
closed
|
SAML Auth Keycloak - I can enable keycloak but if I log out and login again I'm getting an error
|
[zube]: To Test area/authentication kind/bug
|
Enabling Keycloak is working in this same setup using Ember UI.
I noticed that when enabling from Dashboard I click enable and I don't get the usual Pop Up we get in Ember UI to authenticate with a User to finish enabling the Auth.
This also seems to create a principal which uid is invalid for the auth
`[ERROR] SAML: Failed getting user with error: can't find unique user for principal keycloak_user://testuser1@keycloak.com`
Steps.
- Follow the steps from the official Rancher docs https://rancher.com/docs/rancher/v2.x/en/admin-settings/authentication/keycloak/
- Enable the Keycloak Auth
- Notice there isn't a pop up appearing but the Keycloak auth is enabled.
- Logout
- Try logging with a valid Keycloak user

Reference: https://github.com/rancher/dashboard/issues/2115
Rancher version `v2.5-head (01/21/2021)` _23a29c306_
|
1.0
|
SAML Auth Keycloak - I can enable keycloak but if I log out and login again I'm getting an error - Enabling Keycloak is working in this same setup using Ember UI.
I noticed that when enabling from Dashboard I click enable and I don't get the usual Pop Up we get in Ember UI to authenticate with a User to finish enabling the Auth.
This also seems to create a principal which uid is invalid for the auth
`[ERROR] SAML: Failed getting user with error: can't find unique user for principal keycloak_user://testuser1@keycloak.com`
Steps.
- Follow the steps from the official Rancher docs https://rancher.com/docs/rancher/v2.x/en/admin-settings/authentication/keycloak/
- Enable the Keycloak Auth
- Notice there isn't a pop up appearing but the Keycloak auth is enabled.
- Logout
- Try logging with a valid Keycloak user

Reference: https://github.com/rancher/dashboard/issues/2115
Rancher version `v2.5-head (01/21/2021)` _23a29c306_
|
test
|
saml auth keycloak i can enable keycloak but if i log out and login again i m getting an error enabling keycloak is working in this same setup using ember ui i noticed that when enabling from dashboard i click enable and i don t get the usual pop up we get in ember ui to authenticate with a user to finish enabling the auth this also seems to create a principal which uid is invalid for the auth saml failed getting user with error can t find unique user for principal keycloak user keycloak com steps follow the steps from the official rancher docs enable the keycloak auth notice there isn t a pop up appearing but the keycloak auth is enabled logout try logging with a valid keycloak user reference rancher version head
| 1
|
126,468
| 10,423,750,476
|
IssuesEvent
|
2019-09-16 12:12:59
|
tikv/tikv
|
https://api.github.com/repos/tikv/tikv
|
opened
|
unstable test: cases::test_replica_read::test_wait_for_apply_index'
|
C: Test/Bench T: Bug
|
I ran into it in a unrelated PR. Detail is here: https://internal.pingcap.net/idc-jenkins/blue/organizations/jenkins/tikv_ghpr_test/detail/tikv_ghpr_test/9016/pipeline
```
thread 'cases::test_replica_read::test_wait_for_apply_index' panicked at 'region Some(id: 1 region_epoch { conf_ver: 2 version: 1 } peers { id: 1 store_id: 1 } peers { id: 2 store_id: 2 }) has no peer id: 3 store_id: 3', components/test_raftstore/src/pd.rs:749:9
stack backtrace:
0: backtrace::backtrace::libunwind::trace
at /cargo/registry/src/github.com-1ecc6299db9ec823/backtrace-0.3.35/src/backtrace/libunwind.rs:88
1: backtrace::backtrace::trace_unsynchronized
at /cargo/registry/src/github.com-1ecc6299db9ec823/backtrace-0.3.35/src/backtrace/mod.rs:66
2: std::sys_common::backtrace::_print
at src/libstd/sys_common/backtrace.rs:47
3: std::sys_common::backtrace::print
at src/libstd/sys_common/backtrace.rs:36
4: std::panicking::default_hook::{{closure}}
at src/libstd/panicking.rs:200
5: std::panicking::default_hook
at src/libstd/panicking.rs:214
6: std::panicking::rust_panic_with_hook
at src/libstd/panicking.rs:477
7: std::panicking::continue_panic_fmt
at src/libstd/panicking.rs:384
8: std::panicking::begin_panic_fmt
at src/libstd/panicking.rs:339
9: test_raftstore::pd::TestPdClient::must_have_peer
at components/test_raftstore/src/pd.rs:749
10: test_raftstore::pd::TestPdClient::must_add_peer
at components/test_raftstore/src/pd.rs:845
11: failpoints::cases::test_replica_read::test_wait_for_apply_index
at tests/failpoints/cases/test_replica_read.rs:29
12: failpoints::cases::test_replica_read::test_wait_for_apply_index::{{closure}}
at tests/failpoints/cases/test_replica_read.rs:15
13: core::ops::function::FnOnce::call_once
at /rustc/c6e9c76c59e3c10acd63ca9ec157a8894ea1a068/src/libcore/ops/function.rs:227
14: <alloc::boxed::Box<F> as core::ops::function::FnOnce<A>>::call_once
at /rustc/c6e9c76c59e3c10acd63ca9ec157a8894ea1a068/src/liballoc/boxed.rs:922
15: __rust_maybe_catch_panic
at src/libpanic_unwind/lib.rs:80
16: std::panicking::try
at /rustc/c6e9c76c59e3c10acd63ca9ec157a8894ea1a068/src/libstd/panicking.rs:275
17: std::panic::catch_unwind
at /rustc/c6e9c76c59e3c10acd63ca9ec157a8894ea1a068/src/libstd/panic.rs:394
18: test::run_test::run_test_inner::{{closure}}
at src/libtest/lib.rs:1413
```
|
1.0
|
unstable test: cases::test_replica_read::test_wait_for_apply_index' - I ran into it in a unrelated PR. Detail is here: https://internal.pingcap.net/idc-jenkins/blue/organizations/jenkins/tikv_ghpr_test/detail/tikv_ghpr_test/9016/pipeline
```
thread 'cases::test_replica_read::test_wait_for_apply_index' panicked at 'region Some(id: 1 region_epoch { conf_ver: 2 version: 1 } peers { id: 1 store_id: 1 } peers { id: 2 store_id: 2 }) has no peer id: 3 store_id: 3', components/test_raftstore/src/pd.rs:749:9
stack backtrace:
0: backtrace::backtrace::libunwind::trace
at /cargo/registry/src/github.com-1ecc6299db9ec823/backtrace-0.3.35/src/backtrace/libunwind.rs:88
1: backtrace::backtrace::trace_unsynchronized
at /cargo/registry/src/github.com-1ecc6299db9ec823/backtrace-0.3.35/src/backtrace/mod.rs:66
2: std::sys_common::backtrace::_print
at src/libstd/sys_common/backtrace.rs:47
3: std::sys_common::backtrace::print
at src/libstd/sys_common/backtrace.rs:36
4: std::panicking::default_hook::{{closure}}
at src/libstd/panicking.rs:200
5: std::panicking::default_hook
at src/libstd/panicking.rs:214
6: std::panicking::rust_panic_with_hook
at src/libstd/panicking.rs:477
7: std::panicking::continue_panic_fmt
at src/libstd/panicking.rs:384
8: std::panicking::begin_panic_fmt
at src/libstd/panicking.rs:339
9: test_raftstore::pd::TestPdClient::must_have_peer
at components/test_raftstore/src/pd.rs:749
10: test_raftstore::pd::TestPdClient::must_add_peer
at components/test_raftstore/src/pd.rs:845
11: failpoints::cases::test_replica_read::test_wait_for_apply_index
at tests/failpoints/cases/test_replica_read.rs:29
12: failpoints::cases::test_replica_read::test_wait_for_apply_index::{{closure}}
at tests/failpoints/cases/test_replica_read.rs:15
13: core::ops::function::FnOnce::call_once
at /rustc/c6e9c76c59e3c10acd63ca9ec157a8894ea1a068/src/libcore/ops/function.rs:227
14: <alloc::boxed::Box<F> as core::ops::function::FnOnce<A>>::call_once
at /rustc/c6e9c76c59e3c10acd63ca9ec157a8894ea1a068/src/liballoc/boxed.rs:922
15: __rust_maybe_catch_panic
at src/libpanic_unwind/lib.rs:80
16: std::panicking::try
at /rustc/c6e9c76c59e3c10acd63ca9ec157a8894ea1a068/src/libstd/panicking.rs:275
17: std::panic::catch_unwind
at /rustc/c6e9c76c59e3c10acd63ca9ec157a8894ea1a068/src/libstd/panic.rs:394
18: test::run_test::run_test_inner::{{closure}}
at src/libtest/lib.rs:1413
```
|
test
|
unstable test cases test replica read test wait for apply index i ran into it in a unrelated pr detail is here thread cases test replica read test wait for apply index panicked at region some id region epoch conf ver version peers id store id peers id store id has no peer id store id components test raftstore src pd rs stack backtrace backtrace backtrace libunwind trace at cargo registry src github com backtrace src backtrace libunwind rs backtrace backtrace trace unsynchronized at cargo registry src github com backtrace src backtrace mod rs std sys common backtrace print at src libstd sys common backtrace rs std sys common backtrace print at src libstd sys common backtrace rs std panicking default hook closure at src libstd panicking rs std panicking default hook at src libstd panicking rs std panicking rust panic with hook at src libstd panicking rs std panicking continue panic fmt at src libstd panicking rs std panicking begin panic fmt at src libstd panicking rs test raftstore pd testpdclient must have peer at components test raftstore src pd rs test raftstore pd testpdclient must add peer at components test raftstore src pd rs failpoints cases test replica read test wait for apply index at tests failpoints cases test replica read rs failpoints cases test replica read test wait for apply index closure at tests failpoints cases test replica read rs core ops function fnonce call once at rustc src libcore ops function rs as core ops function fnonce call once at rustc src liballoc boxed rs rust maybe catch panic at src libpanic unwind lib rs std panicking try at rustc src libstd panicking rs std panic catch unwind at rustc src libstd panic rs test run test run test inner closure at src libtest lib rs
| 1
|
13,280
| 3,321,590,759
|
IssuesEvent
|
2015-11-09 09:52:09
|
snaekobbi/sprints
|
https://api.github.com/repos/snaekobbi/sprints
|
closed
|
[4.5:84] When printing double-sided, there shall be support for hard page breaks that jump to the next right- or left-hand page.
|
2 - Ready for test FAIL priority:1
|
### Requirement
[[4.5:84]](http://snaekobbi.github.io/requirements#4.5:84) When printing double-sided, there shall be support for hard page breaks that jump to the next right- or left-hand page.
## sprint#4
### Tasks
- [x] implementation
- [x] ~~Dotify~~
- [x] css-to-obfl: jump to right-hand page can be accomplished with a new OBFL sequence, jump to left-hand page will not be supported for now
- [x] example in braille CSS specification (@bertfrees): see http://snaekobbi.github.io/braille-css-spec/#controlling-page-breaks
- [ ] execute system tests
- [x] @mixa72 ![FAIL][]
- [x] ~~@KariRudjord~~
- [ ] @paivis ![Ready for test][]
- [ ] @dkager ![Ready for test][]
- [x] @stesk ![FAIL][]
- [x] @JC-MTM (MTM-script)
### Test results
- DE/DK: Left not supported (known issue)
[priority:1]: http://snaekobbi.github.io/sprints/priority_1.svg "priority:1"
[priority:2]: http://snaekobbi.github.io/sprints/priority_2.svg "priority:2"
[Ready for test]: http://snaekobbi.github.io/sprints/Ready_for_test.svg "Ready for text"
[PASS]: http://snaekobbi.github.io/sprints/PASS.svg "PASS"
[FAIL]: http://snaekobbi.github.io/sprints/FAIL.svg "FAIL"
<!---
@huboard:{"order":28.65625,"milestone_order":64,"custom_state":""}
-->
|
1.0
|
[4.5:84] When printing double-sided, there shall be support for hard page breaks that jump to the next right- or left-hand page. - ### Requirement
[[4.5:84]](http://snaekobbi.github.io/requirements#4.5:84) When printing double-sided, there shall be support for hard page breaks that jump to the next right- or left-hand page.
## sprint#4
### Tasks
- [x] implementation
- [x] ~~Dotify~~
- [x] css-to-obfl: jump to right-hand page can be accomplished with a new OBFL sequence, jump to left-hand page will not be supported for now
- [x] example in braille CSS specification (@bertfrees): see http://snaekobbi.github.io/braille-css-spec/#controlling-page-breaks
- [ ] execute system tests
- [x] @mixa72 ![FAIL][]
- [x] ~~@KariRudjord~~
- [ ] @paivis ![Ready for test][]
- [ ] @dkager ![Ready for test][]
- [x] @stesk ![FAIL][]
- [x] @JC-MTM (MTM-script)
### Test results
- DE/DK: Left not supported (known issue)
[priority:1]: http://snaekobbi.github.io/sprints/priority_1.svg "priority:1"
[priority:2]: http://snaekobbi.github.io/sprints/priority_2.svg "priority:2"
[Ready for test]: http://snaekobbi.github.io/sprints/Ready_for_test.svg "Ready for text"
[PASS]: http://snaekobbi.github.io/sprints/PASS.svg "PASS"
[FAIL]: http://snaekobbi.github.io/sprints/FAIL.svg "FAIL"
<!---
@huboard:{"order":28.65625,"milestone_order":64,"custom_state":""}
-->
|
test
|
when printing double sided there shall be support for hard page breaks that jump to the next right or left hand page requirement when printing double sided there shall be support for hard page breaks that jump to the next right or left hand page sprint tasks implementation dotify css to obfl jump to right hand page can be accomplished with a new obfl sequence jump to left hand page will not be supported for now example in braille css specification bertfrees see execute system tests karirudjord paivis dkager stesk jc mtm mtm script test results de dk left not supported known issue priority priority ready for text pass fail huboard order milestone order custom state
| 1
|
583,666
| 17,395,317,513
|
IssuesEvent
|
2021-08-02 12:48:29
|
microsoft/CogSLanguageUtilities
|
https://api.github.com/repos/microsoft/CogSLanguageUtilities
|
opened
|
update documentation/(code)
|
cognitive-search-integration enhancement high-priority
|
1. deploy azure function
- remove publish profile so users won't get confused
2. azure function
- how to create azure function
- users must update model id
3. indexer command
- understand parameters
- configs.json (need to clarify it's for indexer.exe)
|
1.0
|
update documentation/(code) - 1. deploy azure function
- remove publish profile so users won't get confused
2. azure function
- how to create azure function
- users must update model id
3. indexer command
- understand parameters
- configs.json (need to clarify it's for indexer.exe)
|
non_test
|
update documentation code deploy azure function remove publish profile so users won t get confused azure function how to create azure function users must update model id indexer command understand parameters configs json need to clarify it s for indexer exe
| 0
|
345,077
| 24,842,945,002
|
IssuesEvent
|
2022-10-26 13:58:46
|
SAP-samples/btp-setup-automator
|
https://api.github.com/repos/SAP-samples/btp-setup-automator
|
closed
|
[BUG] Documentation of parameters
|
bug documentation github_actions
|
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Are you using the latest docker image for BTPSA?
- [X] I'm using the latest docker image for BTPSA.
### Which area is mainly impacted
Documentation
### Current Behavior
The `documentation of the parameters for the `usecase.json` and the `parameters.json file are not easy to digest.
The information on what they do and how to use them is available in the JSON schemas and can be derived from the sample use case, but a markdown documentation is desirable.
This area needs to be improved in order to ease the adoption of the tool
### Expected Behavior
Dedicated and consistent documentation on the parameters as a README file.
### Steps To Reproduce
na
### Logs and configuration files available?
na
### Anything else?
_No response_
|
1.0
|
[BUG] Documentation of parameters - ### Is there an existing issue for this?
- [X] I have searched the existing issues
### Are you using the latest docker image for BTPSA?
- [X] I'm using the latest docker image for BTPSA.
### Which area is mainly impacted
Documentation
### Current Behavior
The `documentation of the parameters for the `usecase.json` and the `parameters.json file are not easy to digest.
The information on what they do and how to use them is available in the JSON schemas and can be derived from the sample use case, but a markdown documentation is desirable.
This area needs to be improved in order to ease the adoption of the tool
### Expected Behavior
Dedicated and consistent documentation on the parameters as a README file.
### Steps To Reproduce
na
### Logs and configuration files available?
na
### Anything else?
_No response_
|
non_test
|
documentation of parameters is there an existing issue for this i have searched the existing issues are you using the latest docker image for btpsa i m using the latest docker image for btpsa which area is mainly impacted documentation current behavior the documentation of the parameters for the usecase json and the parameters json file are not easy to digest the information on what they do and how to use them is available in the json schemas and can be derived from the sample use case but a markdown documentation is desirable this area needs to be improved in order to ease the adoption of the tool expected behavior dedicated and consistent documentation on the parameters as a readme file steps to reproduce na logs and configuration files available na anything else no response
| 0
|
177,639
| 13,734,058,044
|
IssuesEvent
|
2020-10-05 08:07:17
|
curl/curl
|
https://api.github.com/repos/curl/curl
|
closed
|
Test 2100 occasionally makes two POST requests
|
CI name lookup tests
|
### I did this
I checked recent travis CI builds. Spotted that the ASAN builds often cause test 2100 to fail and the stderr output and HTTP server log then show that curl issued **two** DoH POSTs instead of the single expected one. The test runs with "forced IPv4" using `-4`.
[example log](https://travis-ci.org/github/curl/curl/jobs/732607747#L5789)
I have not been able to reproduce this failure locally on my Linux boxes.
### I expected the following
Test 2100 should always run green.
### curl/libcurl version
current git master on travis
### operating system
The ASAN builds only run on Linux.
|
1.0
|
Test 2100 occasionally makes two POST requests - ### I did this
I checked recent travis CI builds. Spotted that the ASAN builds often cause test 2100 to fail and the stderr output and HTTP server log then show that curl issued **two** DoH POSTs instead of the single expected one. The test runs with "forced IPv4" using `-4`.
[example log](https://travis-ci.org/github/curl/curl/jobs/732607747#L5789)
I have not been able to reproduce this failure locally on my Linux boxes.
### I expected the following
Test 2100 should always run green.
### curl/libcurl version
current git master on travis
### operating system
The ASAN builds only run on Linux.
|
test
|
test occasionally makes two post requests i did this i checked recent travis ci builds spotted that the asan builds often cause test to fail and the stderr output and http server log then show that curl issued two doh posts instead of the single expected one the test runs with forced using i have not been able to reproduce this failure locally on my linux boxes i expected the following test should always run green curl libcurl version current git master on travis operating system the asan builds only run on linux
| 1
|
6,393
| 2,812,358,720
|
IssuesEvent
|
2015-05-18 08:09:46
|
osakagamba/7GIQSKRNE5P3AVTZCEFXE3ON
|
https://api.github.com/repos/osakagamba/7GIQSKRNE5P3AVTZCEFXE3ON
|
closed
|
nXegAoxMY+ZS8N2WStROGJyI36QXvNVXwstRnh/dtTUyEWgmdkVuhk7nGWws6lhNy+80UXs66rP04bD62MFXdgYCVurTKnJZK+Jf2UHKycdZo57SVs6gm0QYP9EtRbx1ArEbKNHSpZmjCky7wt08CeXOK/OmJ48AvLLA8qivUzI=
|
design
|
WM78nQlVxFr5CHm69ZABA/aK3cO5n0dhNarbWxtXBTwovylppmVIh5+qguFSuTabDOn5s/2lJp4BuWFsqxP0buEqwPbWkTNurANbpqEDQ60LbBmF7UbqmlTFwl5Mz0F+awDxVlwA/tr2EizWV4xsGqynBdFZGRFtulrHB7CISV88mdfPu1Vz+URqJo0EHlwvWKzs+RQ+LWI1R9qPjIl8VdE3jwIkpBdlpRokV6dR9fUTwkD/pTbCVu86KzamV5OElMRJW1Mt7EpP784XFRvcLqOaM1TW0uu/GUV8IpqHAbkTsJybMikKS3qhIZD4jVXUo3BQEsXJXYHjO5fJxd7YiuT9iiSKlePX6tvIZa0D7Uhg7UFJNpDEpmP8jQcQRC0I0oH6BypmG0lqSYzKYuIkJIWnHwvyeOLQjNX93BOymJgVUFjIG8m8a2PNVCnFX7DWwM+EGZqUvRyjaLIqevXUKH5/dR2qEqQSY/1Co6dnz57cUr1yy6A4f1Ef4bgTvBprhS0toH/xzlhaiRTJ1VkqXMQ79BIhUD6NxNoYY6vATpfsbwgunCiCjqiDttKhwUDKhVy+Jd3RCzYiviIe+idts1nEbB4hRC1dvAR1vimtNtmishQmxLRtjVuoUFK5N8qZNyTk/QlXJC/MYfdLKazU8DnifT+5AR+jYIXfugBC4TRXXWClejTR8WZL55ee5g02uO5qOyTNZ0QxY9HWF7QTqvXjj9cFs0SO/1UCfk2KZhlW3NvVtblqZt0WlMyQOCpMo3BQEsXJXYHjO5fJxd7YihFcQ7+gZc2QBbM1C4Jg8jC/agq7Z6rdaunB56mRqH2NFVadHVxH1KNSL7Eys9FHyrIdBUWku9JkkNexKHrBFUZg92W/SFZV0jkvRLq5MWxbkgYMH/Ct/4gFLvQiywoXyfd3O0LO4M1sQfBW1fFOpDNjDO6he39JXJqeJpnQTbHNH2N4FXUDdZ6P4aVyUpx+DHgrHo8d1KJBtNspE4tGHcxR6rfR2Cio+3e01jGyTFamh/f3DRFG/059sePSNXu21DB/ct6MTQawpMbuo2ql+Al0mUsoCDpjmmU563So19XHOn7Bv53KQq+7kZ1jHSS0+xqYjW5pGKhfYAEWvlXu5k3DBalFp8k2oxmnYsixCMWAyN3BbEwY/V57Ujo4nnL9DOziL8Z/FGsjDMmyZzr/OEle+VI8NNNqrOn32FIRmASCzQHFc8VAQeNtGRasVdlNE5upzOuFSYCWy0mCuDvdIG0PDLsHKg0J/zsyffJj7PF7nLXL5dIrxVHHtckxbB2cr8hwYUpNxb+AFtInpbg82gnTsMvx5NMsdu4z//p5TXYj5c2u0tZvyYx8XZZuPpKZhlfYp+rZnnAKEa4j92YaaXBhEFxnnY/sg4sBUY5iR+TO946MYOmh2X8g+oICz9REJxZMNrMH5TjC2PxxHhXPXm4=
|
1.0
|
nXegAoxMY+ZS8N2WStROGJyI36QXvNVXwstRnh/dtTUyEWgmdkVuhk7nGWws6lhNy+80UXs66rP04bD62MFXdgYCVurTKnJZK+Jf2UHKycdZo57SVs6gm0QYP9EtRbx1ArEbKNHSpZmjCky7wt08CeXOK/OmJ48AvLLA8qivUzI= - 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
|
non_test
|
nxegaoxmy awdxvlwa rq qlxjc ct fgsjdmmyzzr oele
| 0
|
5,519
| 2,577,167,800
|
IssuesEvent
|
2015-02-12 15:32:59
|
broadinstitute/orsp
|
https://api.github.com/repos/broadinstitute/orsp
|
closed
|
Funding Source Name(s) field not saved
|
bug priority ui
|
The "Funding Source Name(s)" field in IRB projects is not being saved at all.
|
1.0
|
Funding Source Name(s) field not saved - The "Funding Source Name(s)" field in IRB projects is not being saved at all.
|
non_test
|
funding source name s field not saved the funding source name s field in irb projects is not being saved at all
| 0
|
309,532
| 26,667,572,621
|
IssuesEvent
|
2023-01-26 06:44:08
|
open-telemetry/opentelemetry-collector-contrib
|
https://api.github.com/repos/open-telemetry/opentelemetry-collector-contrib
|
closed
|
[pkg/pdatatest] add more test for traces
|
enhancement pkg/pdatatest
|
### Component(s)
pkg/pdatatest
### Is your feature request related to a problem? Please describe.
add more test for traces
### Describe the solution you'd like
add more test for traces
### Describe alternatives you've considered
_No response_
### Additional context
partly of #17544
|
1.0
|
[pkg/pdatatest] add more test for traces - ### Component(s)
pkg/pdatatest
### Is your feature request related to a problem? Please describe.
add more test for traces
### Describe the solution you'd like
add more test for traces
### Describe alternatives you've considered
_No response_
### Additional context
partly of #17544
|
test
|
add more test for traces component s pkg pdatatest is your feature request related to a problem please describe add more test for traces describe the solution you d like add more test for traces describe alternatives you ve considered no response additional context partly of
| 1
|
129,497
| 10,576,482,430
|
IssuesEvent
|
2019-10-07 17:58:20
|
andes/app
|
https://api.github.com/repos/andes/app
|
closed
|
RUP - Consulta de Odontología (vinculaciones)
|
Testing
|
<!--
PASOS PARA REGISTRAR UN ISSUE
_____________________________________________
1) Seleccionar el proyecto al que pertenece (CITAS, RUP, MPI, ...)
2) Seleccionar un label de identificación (bug, feature, enhancement, etc.)
3) Asignar revisores que sean miembros del equipo responsable de solucionar el issue
4) Completar las siguientes secciones:
-->
### Comportamiento actual
Cuando se selecciona más de una cara de un mismo diente y se selecciona un concepto, el nuevo concepto figura relacionado con todas las caras seleccionadas:

Pero en la imagen del odontograma figura solo pintada con el color del concepto ingresado solo una de las caras seleccionadas. 
Luego, al desvincular solo una de las caras, desde el botón de desvinculación del item de *Relacionado con* del elemento del concepto seleccionado, desaparecen todos los items de *Relacionado con*. (Solo sucede cuando se seleccionan caras de un mismo diente)
### Resultado esperado
Todas las caras vinculadas al concepto seccionada deber aparecer pintadas con el color del concepto.
Se debe desvincular solo la cara seleccionada.
### Pasos para reproducir el problema
1. Agregar el odontograma a la consulta.
2. Tildar checkbox 'Seleccionar piezas/caras múltiples' . 
3. Seleccionar múltiples piezas.
3. Seleccionar varias caras de un mismo diente
4. Agregar un concepto Ej. Arreglo
5. Una vez agregado el concepto desvincular una de las caras vinculadas.
<!-- Agregar captura de pantalla, si fuera relevante -->
<!-- Código relevante
```
(pegar código aquí)
```
-->
|
1.0
|
RUP - Consulta de Odontología (vinculaciones) - <!--
PASOS PARA REGISTRAR UN ISSUE
_____________________________________________
1) Seleccionar el proyecto al que pertenece (CITAS, RUP, MPI, ...)
2) Seleccionar un label de identificación (bug, feature, enhancement, etc.)
3) Asignar revisores que sean miembros del equipo responsable de solucionar el issue
4) Completar las siguientes secciones:
-->
### Comportamiento actual
Cuando se selecciona más de una cara de un mismo diente y se selecciona un concepto, el nuevo concepto figura relacionado con todas las caras seleccionadas:

Pero en la imagen del odontograma figura solo pintada con el color del concepto ingresado solo una de las caras seleccionadas. 
Luego, al desvincular solo una de las caras, desde el botón de desvinculación del item de *Relacionado con* del elemento del concepto seleccionado, desaparecen todos los items de *Relacionado con*. (Solo sucede cuando se seleccionan caras de un mismo diente)
### Resultado esperado
Todas las caras vinculadas al concepto seccionada deber aparecer pintadas con el color del concepto.
Se debe desvincular solo la cara seleccionada.
### Pasos para reproducir el problema
1. Agregar el odontograma a la consulta.
2. Tildar checkbox 'Seleccionar piezas/caras múltiples' . 
3. Seleccionar múltiples piezas.
3. Seleccionar varias caras de un mismo diente
4. Agregar un concepto Ej. Arreglo
5. Una vez agregado el concepto desvincular una de las caras vinculadas.
<!-- Agregar captura de pantalla, si fuera relevante -->
<!-- Código relevante
```
(pegar código aquí)
```
-->
|
test
|
rup consulta de odontología vinculaciones pasos para registrar un issue seleccionar el proyecto al que pertenece citas rup mpi seleccionar un label de identificación bug feature enhancement etc asignar revisores que sean miembros del equipo responsable de solucionar el issue completar las siguientes secciones comportamiento actual cuando se selecciona más de una cara de un mismo diente y se selecciona un concepto el nuevo concepto figura relacionado con todas las caras seleccionadas pero en la imagen del odontograma figura solo pintada con el color del concepto ingresado solo una de las caras seleccionadas luego al desvincular solo una de las caras desde el botón de desvinculación del item de relacionado con del elemento del concepto seleccionado desaparecen todos los items de relacionado con solo sucede cuando se seleccionan caras de un mismo diente resultado esperado todas las caras vinculadas al concepto seccionada deber aparecer pintadas con el color del concepto se debe desvincular solo la cara seleccionada pasos para reproducir el problema agregar el odontograma a la consulta tildar checkbox seleccionar piezas caras múltiples seleccionar múltiples piezas seleccionar varias caras de un mismo diente agregar un concepto ej arreglo una vez agregado el concepto desvincular una de las caras vinculadas código relevante pegar código aquí
| 1
|
31,993
| 4,732,274,047
|
IssuesEvent
|
2016-10-19 07:07:54
|
handsontable/handsontable
|
https://api.github.com/repos/handsontable/handsontable
|
closed
|
Mousewheel scrolling on fixed columns not working
|
Plugin: freeze / resize / move Priority: high Status: Released Tested Type: Bug
|
Hi, i've noticed that vertical scrolling doesn't work when you target a fixed column, but fixed rows works great.
I'm using Chrome on OS X, haven't checked if this is a general issue yet, but it should nevertheless still work in Chrome on OS X.
The issue is present in the latest demos: https://docs.handsontable.com/0.26.1/demo-fixing.html
Move the cursor over the upper left cells and try scrolling, it doesn't scroll the HOT viewport, but the entire viewport instead. Now move the cursor over column C through AX, now it works as intended.
|
1.0
|
Mousewheel scrolling on fixed columns not working - Hi, i've noticed that vertical scrolling doesn't work when you target a fixed column, but fixed rows works great.
I'm using Chrome on OS X, haven't checked if this is a general issue yet, but it should nevertheless still work in Chrome on OS X.
The issue is present in the latest demos: https://docs.handsontable.com/0.26.1/demo-fixing.html
Move the cursor over the upper left cells and try scrolling, it doesn't scroll the HOT viewport, but the entire viewport instead. Now move the cursor over column C through AX, now it works as intended.
|
test
|
mousewheel scrolling on fixed columns not working hi i ve noticed that vertical scrolling doesn t work when you target a fixed column but fixed rows works great i m using chrome on os x haven t checked if this is a general issue yet but it should nevertheless still work in chrome on os x the issue is present in the latest demos move the cursor over the upper left cells and try scrolling it doesn t scroll the hot viewport but the entire viewport instead now move the cursor over column c through ax now it works as intended
| 1
|
123,355
| 10,264,984,127
|
IssuesEvent
|
2019-08-22 17:43:39
|
microsoft/VFSForGit
|
https://api.github.com/repos/microsoft/VFSForGit
|
opened
|
Improve test coverage around symlinks
|
affects: tests platform: linux platform: macOS platform: windows pri2
|
Recent issues (#1478, #1479) that were not caught by our tests highlight that we have room to improve our coverage around symlink scenarios.
Add tests that would have helped detect bugs where VFS4G and PrjFS were incorrectly following links when they should not.
|
1.0
|
Improve test coverage around symlinks - Recent issues (#1478, #1479) that were not caught by our tests highlight that we have room to improve our coverage around symlink scenarios.
Add tests that would have helped detect bugs where VFS4G and PrjFS were incorrectly following links when they should not.
|
test
|
improve test coverage around symlinks recent issues that were not caught by our tests highlight that we have room to improve our coverage around symlink scenarios add tests that would have helped detect bugs where and prjfs were incorrectly following links when they should not
| 1
|
75,782
| 9,320,907,839
|
IssuesEvent
|
2019-03-27 01:25:19
|
IanGRap/Squish
|
https://api.github.com/repos/IanGRap/Squish
|
closed
|
Walls should speed up the timer for when the compact during the match
|
design criticism
|
The wall should start compacting faster as the match progresses.
|
1.0
|
Walls should speed up the timer for when the compact during the match - The wall should start compacting faster as the match progresses.
|
non_test
|
walls should speed up the timer for when the compact during the match the wall should start compacting faster as the match progresses
| 0
|
699,570
| 24,021,881,209
|
IssuesEvent
|
2022-09-15 08:21:20
|
owid/etl
|
https://api.github.com/repos/owid/etl
|
opened
|
Consider using `pyright` for type checking
|
priority 3 - nice to have
|
Disclaimer - I'm satisfied with `mypy`, it's working well, I was just curious how does pyright compares in terms of speed.
Running mypy starts taking a long time. It takes more than 90s without mypy cache (in CI or my old laptop). It takes ~10s once cached, however in practice it rarely takes those 10s (perhaps we are using cache wrong or missing some arguments?). Running pyright without cache takes 10s and avoids problems such as same module names (we get around it by type checking steps separately in threads). It would be also consistent with VSCode type checks.
The main disadvantage of pyright is that it requires node and everyone would have to switch. So not worth it in my opinion.
|
1.0
|
Consider using `pyright` for type checking - Disclaimer - I'm satisfied with `mypy`, it's working well, I was just curious how does pyright compares in terms of speed.
Running mypy starts taking a long time. It takes more than 90s without mypy cache (in CI or my old laptop). It takes ~10s once cached, however in practice it rarely takes those 10s (perhaps we are using cache wrong or missing some arguments?). Running pyright without cache takes 10s and avoids problems such as same module names (we get around it by type checking steps separately in threads). It would be also consistent with VSCode type checks.
The main disadvantage of pyright is that it requires node and everyone would have to switch. So not worth it in my opinion.
|
non_test
|
consider using pyright for type checking disclaimer i m satisfied with mypy it s working well i was just curious how does pyright compares in terms of speed running mypy starts taking a long time it takes more than without mypy cache in ci or my old laptop it takes once cached however in practice it rarely takes those perhaps we are using cache wrong or missing some arguments running pyright without cache takes and avoids problems such as same module names we get around it by type checking steps separately in threads it would be also consistent with vscode type checks the main disadvantage of pyright is that it requires node and everyone would have to switch so not worth it in my opinion
| 0
|
269,796
| 23,466,253,889
|
IssuesEvent
|
2022-08-16 17:03:20
|
brave/brave-browser
|
https://api.github.com/repos/brave/brave-browser
|
closed
|
Test failure: brave_browser_tests.xml.[empty]
|
ci-concern bot/type/test bot/arch/x64 bot/channel/nightly bot/platform/macos bot/branch/v1.44
|
Greetings human!
Bad news. `brave_browser_tests.xml.[empty]` [failed on macos x64 nightly v1.44.15](https://ci.brave.com/job/brave-browser-build-macos-x64/5471/testReport/junit/brave_browser_tests/xml/test_browser____empty_).
<details>
<summary>Stack trace</summary>
```
Test report file /Users/jenkins/jenkins/workspace/brave-browser-build-macos-x64-nightly/src/brave_browser_tests.xml was length 0
```
</details>
|
1.0
|
Test failure: brave_browser_tests.xml.[empty] - Greetings human!
Bad news. `brave_browser_tests.xml.[empty]` [failed on macos x64 nightly v1.44.15](https://ci.brave.com/job/brave-browser-build-macos-x64/5471/testReport/junit/brave_browser_tests/xml/test_browser____empty_).
<details>
<summary>Stack trace</summary>
```
Test report file /Users/jenkins/jenkins/workspace/brave-browser-build-macos-x64-nightly/src/brave_browser_tests.xml was length 0
```
</details>
|
test
|
test failure brave browser tests xml greetings human bad news brave browser tests xml stack trace test report file users jenkins jenkins workspace brave browser build macos nightly src brave browser tests xml was length
| 1
|
663,572
| 22,197,689,973
|
IssuesEvent
|
2022-06-07 08:27:04
|
Stoobly/stoobly-agent
|
https://api.github.com/repos/Stoobly/stoobly-agent
|
closed
|
'project list' requires proxy config
|
bug priority/important-soon
|
```
$ stoobly-agent --version
stoobly-agent, version 0.9.5
$ stoobly-agent feature remote show
True
```
Without proxy config:
```
$ stoobly-agent project list ORG_KEY
Traceback (most recent call last):
File "/home/user/.local/bin/stoobly-agent", line 8, in <module>
sys.exit(main())
File "/usr/lib/python3/dist-packages/click/core.py", line 764, in __call__
return self.main(*args, **kwargs)
File "/usr/lib/python3/dist-packages/click/core.py", line 717, in main
rv = self.invoke(ctx)
File "/usr/lib/python3/dist-packages/click/core.py", line 1137, in invoke
return _process_result(sub_ctx.command.invoke(sub_ctx))
File "/usr/lib/python3/dist-packages/click/core.py", line 1137, in invoke
return _process_result(sub_ctx.command.invoke(sub_ctx))
File "/usr/lib/python3/dist-packages/click/core.py", line 956, in invoke
return ctx.invoke(self.callback, **ctx.params)
File "/usr/lib/python3/dist-packages/click/core.py", line 555, in invoke
return callback(*args, **kwargs)
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/app/cli/project_cli.py", line 72, in list
projects_response = project.index(kwargs)
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/app/cli/helpers/project_facade.py", line 53, in index
res = self.__api.index(**{ 'organization_id': organization_key.id, **kwargs })
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/lib/api/projects_resource.py", line 22, in index
return self.get(url, headers=self.default_headers, params=query_params)
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/lib/api/api.py", line 51, in get
return self.without_proxy(handler)
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/lib/api/api.py", line 16, in without_proxy
os.environ[key] = val
File "/usr/lib/python3.8/os.py", line 680, in __setitem__
value = self.encodevalue(value)
File "/usr/lib/python3.8/os.py", line 750, in encode
raise TypeError("str expected, not %s" % type(value).__name__)
TypeError: str expected, not NoneType
```
With proxy config:
```
$ export HTTPS_PROXY=localhost:8080 ; export HTTP_PROXY=localhost:8080
$ export https_proxy=localhost:8080 ; export http_proxy=localhost:8080
$ stoobly-agent project list ORG_KEY
# Successful response
```
We shouldn't require proxy config to access the remote api
|
1.0
|
'project list' requires proxy config - ```
$ stoobly-agent --version
stoobly-agent, version 0.9.5
$ stoobly-agent feature remote show
True
```
Without proxy config:
```
$ stoobly-agent project list ORG_KEY
Traceback (most recent call last):
File "/home/user/.local/bin/stoobly-agent", line 8, in <module>
sys.exit(main())
File "/usr/lib/python3/dist-packages/click/core.py", line 764, in __call__
return self.main(*args, **kwargs)
File "/usr/lib/python3/dist-packages/click/core.py", line 717, in main
rv = self.invoke(ctx)
File "/usr/lib/python3/dist-packages/click/core.py", line 1137, in invoke
return _process_result(sub_ctx.command.invoke(sub_ctx))
File "/usr/lib/python3/dist-packages/click/core.py", line 1137, in invoke
return _process_result(sub_ctx.command.invoke(sub_ctx))
File "/usr/lib/python3/dist-packages/click/core.py", line 956, in invoke
return ctx.invoke(self.callback, **ctx.params)
File "/usr/lib/python3/dist-packages/click/core.py", line 555, in invoke
return callback(*args, **kwargs)
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/app/cli/project_cli.py", line 72, in list
projects_response = project.index(kwargs)
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/app/cli/helpers/project_facade.py", line 53, in index
res = self.__api.index(**{ 'organization_id': organization_key.id, **kwargs })
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/lib/api/projects_resource.py", line 22, in index
return self.get(url, headers=self.default_headers, params=query_params)
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/lib/api/api.py", line 51, in get
return self.without_proxy(handler)
File "/home/user/.local/lib/python3.8/site-packages/stoobly_agent/lib/api/api.py", line 16, in without_proxy
os.environ[key] = val
File "/usr/lib/python3.8/os.py", line 680, in __setitem__
value = self.encodevalue(value)
File "/usr/lib/python3.8/os.py", line 750, in encode
raise TypeError("str expected, not %s" % type(value).__name__)
TypeError: str expected, not NoneType
```
With proxy config:
```
$ export HTTPS_PROXY=localhost:8080 ; export HTTP_PROXY=localhost:8080
$ export https_proxy=localhost:8080 ; export http_proxy=localhost:8080
$ stoobly-agent project list ORG_KEY
# Successful response
```
We shouldn't require proxy config to access the remote api
|
non_test
|
project list requires proxy config stoobly agent version stoobly agent version stoobly agent feature remote show true without proxy config stoobly agent project list org key traceback most recent call last file home user local bin stoobly agent line in sys exit main file usr lib dist packages click core py line in call return self main args kwargs file usr lib dist packages click core py line in main rv self invoke ctx file usr lib dist packages click core py line in invoke return process result sub ctx command invoke sub ctx file usr lib dist packages click core py line in invoke return process result sub ctx command invoke sub ctx file usr lib dist packages click core py line in invoke return ctx invoke self callback ctx params file usr lib dist packages click core py line in invoke return callback args kwargs file home user local lib site packages stoobly agent app cli project cli py line in list projects response project index kwargs file home user local lib site packages stoobly agent app cli helpers project facade py line in index res self api index organization id organization key id kwargs file home user local lib site packages stoobly agent lib api projects resource py line in index return self get url headers self default headers params query params file home user local lib site packages stoobly agent lib api api py line in get return self without proxy handler file home user local lib site packages stoobly agent lib api api py line in without proxy os environ val file usr lib os py line in setitem value self encodevalue value file usr lib os py line in encode raise typeerror str expected not s type value name typeerror str expected not nonetype with proxy config export https proxy localhost export http proxy localhost export https proxy localhost export http proxy localhost stoobly agent project list org key successful response we shouldn t require proxy config to access the remote api
| 0
|
133,512
| 10,832,370,454
|
IssuesEvent
|
2019-11-11 10:27:10
|
microsoft/AzureStorageExplorer
|
https://api.github.com/repos/microsoft/AzureStorageExplorer
|
opened
|
The service items under Quick Access are not broken when MSAL is enabled
|
:gear: quick access 🧪 testing
|
**Storage Explorer Version:** 1.11.0
**Build:** [20191110.1](https://devdiv.visualstudio.com/DevDiv/_build/results?buildId=3231473)
**Branch**: hotfix/1.11.1
**Platform/OS:** Windows 10
**Architecture:** ia32/x64
**Regression From:** Not a regression
**Steps to reproduce:**
1. Launch Storage Explorer -> Add storage accounts and services to Quick Access.
2. Open Settings panel -> Application -> Sign-in -> Enable MSAL.
3. Restart Storage Explorer -> Observe the Quick Access items.
**Expect Experience:**
Quick Access all items are broken.
**Actual Experience:**
The services item under Quick Access are not broken.

|
1.0
|
The service items under Quick Access are not broken when MSAL is enabled - **Storage Explorer Version:** 1.11.0
**Build:** [20191110.1](https://devdiv.visualstudio.com/DevDiv/_build/results?buildId=3231473)
**Branch**: hotfix/1.11.1
**Platform/OS:** Windows 10
**Architecture:** ia32/x64
**Regression From:** Not a regression
**Steps to reproduce:**
1. Launch Storage Explorer -> Add storage accounts and services to Quick Access.
2. Open Settings panel -> Application -> Sign-in -> Enable MSAL.
3. Restart Storage Explorer -> Observe the Quick Access items.
**Expect Experience:**
Quick Access all items are broken.
**Actual Experience:**
The services item under Quick Access are not broken.

|
test
|
the service items under quick access are not broken when msal is enabled storage explorer version build branch hotfix platform os windows architecture regression from not a regression steps to reproduce launch storage explorer add storage accounts and services to quick access open settings panel application sign in enable msal restart storage explorer observe the quick access items expect experience quick access all items are broken actual experience the services item under quick access are not broken
| 1
|
27,528
| 4,320,178,958
|
IssuesEvent
|
2016-07-25 02:44:07
|
zulip/zulip
|
https://api.github.com/repos/zulip/zulip
|
closed
|
GetOldMessagesTest.post_with_params -> GetOldMessagesTest.get_messages
|
help wanted testing
|
See #1315. I am just splitting it out into its own issue. This is also very closely tied to #1382
|
1.0
|
GetOldMessagesTest.post_with_params -> GetOldMessagesTest.get_messages - See #1315. I am just splitting it out into its own issue. This is also very closely tied to #1382
|
test
|
getoldmessagestest post with params getoldmessagestest get messages see i am just splitting it out into its own issue this is also very closely tied to
| 1
|
157,397
| 12,372,058,221
|
IssuesEvent
|
2020-05-18 19:41:16
|
golang/go
|
https://api.github.com/repos/golang/go
|
closed
|
x/tools: multiple tests consistently failing on "-nocgo" builders
|
NeedsInvestigation Testing Tools
|
[2020-05-18T17:24:58-c79c01b/darwin-amd64-nocgo](https://build.golang.org/log/9ba247877ecbed6e0bfc52742ed5960fc16cfc2f)
[2020-05-18T17:24:58-c79c01b/linux-amd64-nocgo](https://build.golang.org/log/f84b6968427003c6dff9b4acd311573170ceb6cf)
[2020-05-18T17:24:58-c79c01b/linux-ppc64-buildlet](https://build.golang.org/log/fb3f86b285de9acca7d1a6a812dad29d59e1199b)
[2020-05-18T17:24:58-c79c01b/plan9-386-0intro](https://build.golang.org/log/40426b5a7f056f0d58ea05290586ff2db24b4705)
[2020-05-18T17:24:58-c79c01b/plan9-arm](https://build.golang.org/log/6a7990a92dffba5b391012827960e74b684e58ff)
<details>
```
linux-amd64-nocgo at f296b7a6f045325a230f77e9bda1470b1270f817 building tools at c79c01b1c51c468123f4890fb7190cda24a42eb2
…
--- FAIL: TestGeneratedFiles (0.07s)
gorename_test.go:33: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/cmd/gorename 0.078s
…
--- FAIL: TestCgoNoSyntax (0.04s)
--- FAIL: TestCgoNoSyntax/GOPATH (0.02s)
packagescgo_test.go:74: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCgoNoSyntax/Modules (0.02s)
packagescgo_test.go:74: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCgoBadPkgConfig (0.05s)
--- FAIL: TestCgoBadPkgConfig/GOPATH (0.01s)
packagescgo_test.go:115: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCgoBadPkgConfig/Modules (0.04s)
packagescgo_test.go:115: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/go/packages 75.708s
…
--- FAIL: TestLSP (11.78s)
--- FAIL: TestLSP/GOPATH (5.68s)
--- FAIL: TestLSP/GOPATH/testdata/lsp (3.52s)
--- FAIL: TestLSP/GOPATH/testdata/lsp/Completion (2.37s)
--- FAIL: TestLSP/GOPATH/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.03s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/GOPATH/testdata/lsp/Completion/usecgo_8_8_0 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/GOPATH/testdata/lsp/Definition (0.04s)
--- FAIL: TestLSP/GOPATH/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/GOPATH/testdata/lsp/Definition/usecgo_8_8 (0.02s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/Modules (6.10s)
--- FAIL: TestLSP/Modules/testdata/lsp (2.65s)
--- FAIL: TestLSP/Modules/testdata/lsp/Completion (1.25s)
--- FAIL: TestLSP/Modules/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/Modules/testdata/lsp/Completion/usecgo_8_8_0 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/Modules/testdata/lsp/Definition (0.04s)
--- FAIL: TestLSP/Modules/testdata/lsp/Definition/usecgo_8_8 (0.02s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/Modules/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/internal/lsp 11.844s
…
--- FAIL: TestCommandLine (20.89s)
--- FAIL: TestCommandLine/GOPATH (9.94s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp (8.77s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion (0.08s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.04s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion/usecgo_8_8_0 (0.03s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition (0.48s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.05s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition/usecgo_8_8 (0.04s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules (10.95s)
--- FAIL: TestCommandLine/Modules/testdata/lsp (9.26s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion (0.06s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.02s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion/usecgo_8_8_0 (0.03s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition (0.41s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.03s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition/usecgo_8_8 (0.04s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/internal/lsp/cmd 21.277s
…
--- FAIL: TestSource (13.38s)
--- FAIL: TestSource/GOPATH (7.34s)
--- FAIL: TestSource/GOPATH/testdata/lsp (4.61s)
--- FAIL: TestSource/GOPATH/testdata/lsp/Completion (1.65s)
--- FAIL: TestSource/GOPATH/testdata/lsp/Completion/usecgo_8_8_0 (0.02s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/GOPATH/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.03s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/GOPATH/testdata/lsp/Definition (0.12s)
--- FAIL: TestSource/GOPATH/testdata/lsp/Definition/usecgo_8_8 (0.01s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/GOPATH/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.02s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/Modules (6.04s)
--- FAIL: TestSource/Modules/testdata/lsp (3.39s)
--- FAIL: TestSource/Modules/testdata/lsp/Completion (1.61s)
--- FAIL: TestSource/Modules/testdata/lsp/Completion/usecgo_8_8_0 (0.05s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/Modules/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.01s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/Modules/testdata/lsp/Definition (0.06s)
--- FAIL: TestSource/Modules/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.01s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/Modules/testdata/lsp/Definition/usecgo_8_8 (0.01s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/internal/lsp/source 13.418s
…
--- FAIL: TestCommandLine (16.10s)
--- FAIL: TestCommandLine/GOPATH (7.85s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp (7.52s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion (0.01s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion/usecgo_8_8_0 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition (1.15s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition/usecgo_8_8 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules (8.25s)
--- FAIL: TestCommandLine/Modules/testdata/lsp (7.60s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion (0.02s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion/usecgo_8_8_0 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition (1.27s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition/usecgo_8_8 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/gopls/test 16.184s
FAIL
```
</details>
This particular failure mode seems to start at [CL 234108](https://golang.org/cl/234108), but many of the same tests were already failing (with a different failure mode) before then.
CC @heschik @stamblerre
|
1.0
|
x/tools: multiple tests consistently failing on "-nocgo" builders - [2020-05-18T17:24:58-c79c01b/darwin-amd64-nocgo](https://build.golang.org/log/9ba247877ecbed6e0bfc52742ed5960fc16cfc2f)
[2020-05-18T17:24:58-c79c01b/linux-amd64-nocgo](https://build.golang.org/log/f84b6968427003c6dff9b4acd311573170ceb6cf)
[2020-05-18T17:24:58-c79c01b/linux-ppc64-buildlet](https://build.golang.org/log/fb3f86b285de9acca7d1a6a812dad29d59e1199b)
[2020-05-18T17:24:58-c79c01b/plan9-386-0intro](https://build.golang.org/log/40426b5a7f056f0d58ea05290586ff2db24b4705)
[2020-05-18T17:24:58-c79c01b/plan9-arm](https://build.golang.org/log/6a7990a92dffba5b391012827960e74b684e58ff)
<details>
```
linux-amd64-nocgo at f296b7a6f045325a230f77e9bda1470b1270f817 building tools at c79c01b1c51c468123f4890fb7190cda24a42eb2
…
--- FAIL: TestGeneratedFiles (0.07s)
gorename_test.go:33: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/cmd/gorename 0.078s
…
--- FAIL: TestCgoNoSyntax (0.04s)
--- FAIL: TestCgoNoSyntax/GOPATH (0.02s)
packagescgo_test.go:74: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCgoNoSyntax/Modules (0.02s)
packagescgo_test.go:74: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCgoBadPkgConfig (0.05s)
--- FAIL: TestCgoBadPkgConfig/GOPATH (0.01s)
packagescgo_test.go:115: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCgoBadPkgConfig/Modules (0.04s)
packagescgo_test.go:115: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/go/packages 75.708s
…
--- FAIL: TestLSP (11.78s)
--- FAIL: TestLSP/GOPATH (5.68s)
--- FAIL: TestLSP/GOPATH/testdata/lsp (3.52s)
--- FAIL: TestLSP/GOPATH/testdata/lsp/Completion (2.37s)
--- FAIL: TestLSP/GOPATH/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.03s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/GOPATH/testdata/lsp/Completion/usecgo_8_8_0 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/GOPATH/testdata/lsp/Definition (0.04s)
--- FAIL: TestLSP/GOPATH/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/GOPATH/testdata/lsp/Definition/usecgo_8_8 (0.02s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/Modules (6.10s)
--- FAIL: TestLSP/Modules/testdata/lsp (2.65s)
--- FAIL: TestLSP/Modules/testdata/lsp/Completion (1.25s)
--- FAIL: TestLSP/Modules/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/Modules/testdata/lsp/Completion/usecgo_8_8_0 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/Modules/testdata/lsp/Definition (0.04s)
--- FAIL: TestLSP/Modules/testdata/lsp/Definition/usecgo_8_8 (0.02s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestLSP/Modules/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.01s)
lsp_test.go:99: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/internal/lsp 11.844s
…
--- FAIL: TestCommandLine (20.89s)
--- FAIL: TestCommandLine/GOPATH (9.94s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp (8.77s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion (0.08s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.04s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion/usecgo_8_8_0 (0.03s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition (0.48s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.05s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition/usecgo_8_8 (0.04s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules (10.95s)
--- FAIL: TestCommandLine/Modules/testdata/lsp (9.26s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion (0.06s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.02s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion/usecgo_8_8_0 (0.03s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition (0.41s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.03s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition/usecgo_8_8 (0.04s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/internal/lsp/cmd 21.277s
…
--- FAIL: TestSource (13.38s)
--- FAIL: TestSource/GOPATH (7.34s)
--- FAIL: TestSource/GOPATH/testdata/lsp (4.61s)
--- FAIL: TestSource/GOPATH/testdata/lsp/Completion (1.65s)
--- FAIL: TestSource/GOPATH/testdata/lsp/Completion/usecgo_8_8_0 (0.02s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/GOPATH/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.03s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/GOPATH/testdata/lsp/Definition (0.12s)
--- FAIL: TestSource/GOPATH/testdata/lsp/Definition/usecgo_8_8 (0.01s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/GOPATH/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.02s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/Modules (6.04s)
--- FAIL: TestSource/Modules/testdata/lsp (3.39s)
--- FAIL: TestSource/Modules/testdata/lsp/Completion (1.61s)
--- FAIL: TestSource/Modules/testdata/lsp/Completion/usecgo_8_8_0 (0.05s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/Modules/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.01s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/Modules/testdata/lsp/Definition (0.06s)
--- FAIL: TestSource/Modules/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.01s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestSource/Modules/testdata/lsp/Definition/usecgo_8_8 (0.01s)
source_test.go:85: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/internal/lsp/source 13.418s
…
--- FAIL: TestCommandLine (16.10s)
--- FAIL: TestCommandLine/GOPATH (7.85s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp (7.52s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion (0.01s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Completion/usecgo_8_8_0 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition (1.15s)
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/GOPATH/testdata/lsp/Definition/usecgo_8_8 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules (8.25s)
--- FAIL: TestCommandLine/Modules/testdata/lsp (7.60s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion (0.02s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion/declarecgo_nocgo_6_12_0 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Completion/usecgo_8_8_0 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition (1.27s)
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition/declarecgo_nocgo_6_12 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
--- FAIL: TestCommandLine/Modules/testdata/lsp/Definition/usecgo_8_8 (0.00s)
cmdtest.go:59: cgo tool not available: cgo not enabled: CGO_ENABLED="0"
FAIL
FAIL golang.org/x/tools/gopls/test 16.184s
FAIL
```
</details>
This particular failure mode seems to start at [CL 234108](https://golang.org/cl/234108), but many of the same tests were already failing (with a different failure mode) before then.
CC @heschik @stamblerre
|
test
|
x tools multiple tests consistently failing on nocgo builders linux nocgo at building tools at … fail testgeneratedfiles gorename test go cgo tool not available cgo not enabled cgo enabled fail fail golang org x tools cmd gorename … fail testcgonosyntax fail testcgonosyntax gopath packagescgo test go cgo tool not available cgo not enabled cgo enabled fail testcgonosyntax modules packagescgo test go cgo tool not available cgo not enabled cgo enabled fail testcgobadpkgconfig fail testcgobadpkgconfig gopath packagescgo test go cgo tool not available cgo not enabled cgo enabled fail testcgobadpkgconfig modules packagescgo test go cgo tool not available cgo not enabled cgo enabled fail fail golang org x tools go packages … fail testlsp fail testlsp gopath fail testlsp gopath testdata lsp fail testlsp gopath testdata lsp completion fail testlsp gopath testdata lsp completion declarecgo nocgo lsp test go cgo tool not available cgo not enabled cgo enabled fail testlsp gopath testdata lsp completion usecgo lsp test go cgo tool not available cgo not enabled cgo enabled fail testlsp gopath testdata lsp definition fail testlsp gopath testdata lsp definition declarecgo nocgo lsp test go cgo tool not available cgo not enabled cgo enabled fail testlsp gopath testdata lsp definition usecgo lsp test go cgo tool not available cgo not enabled cgo enabled fail testlsp modules fail testlsp modules testdata lsp fail testlsp modules testdata lsp completion fail testlsp modules testdata lsp completion declarecgo nocgo lsp test go cgo tool not available cgo not enabled cgo enabled fail testlsp modules testdata lsp completion usecgo lsp test go cgo tool not available cgo not enabled cgo enabled fail testlsp modules testdata lsp definition fail testlsp modules testdata lsp definition usecgo lsp test go cgo tool not available cgo not enabled cgo enabled fail testlsp modules testdata lsp definition declarecgo nocgo lsp test go cgo tool not available cgo not enabled cgo enabled fail fail golang org x tools internal lsp … fail testcommandline fail testcommandline gopath fail testcommandline gopath testdata lsp fail testcommandline gopath testdata lsp completion fail testcommandline gopath testdata lsp completion declarecgo nocgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline gopath testdata lsp completion usecgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline gopath testdata lsp definition fail testcommandline gopath testdata lsp definition declarecgo nocgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline gopath testdata lsp definition usecgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline modules fail testcommandline modules testdata lsp fail testcommandline modules testdata lsp completion fail testcommandline modules testdata lsp completion declarecgo nocgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline modules testdata lsp completion usecgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline modules testdata lsp definition fail testcommandline modules testdata lsp definition declarecgo nocgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline modules testdata lsp definition usecgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail fail golang org x tools internal lsp cmd … fail testsource fail testsource gopath fail testsource gopath testdata lsp fail testsource gopath testdata lsp completion fail testsource gopath testdata lsp completion usecgo source test go cgo tool not available cgo not enabled cgo enabled fail testsource gopath testdata lsp completion declarecgo nocgo source test go cgo tool not available cgo not enabled cgo enabled fail testsource gopath testdata lsp definition fail testsource gopath testdata lsp definition usecgo source test go cgo tool not available cgo not enabled cgo enabled fail testsource gopath testdata lsp definition declarecgo nocgo source test go cgo tool not available cgo not enabled cgo enabled fail testsource modules fail testsource modules testdata lsp fail testsource modules testdata lsp completion fail testsource modules testdata lsp completion usecgo source test go cgo tool not available cgo not enabled cgo enabled fail testsource modules testdata lsp completion declarecgo nocgo source test go cgo tool not available cgo not enabled cgo enabled fail testsource modules testdata lsp definition fail testsource modules testdata lsp definition declarecgo nocgo source test go cgo tool not available cgo not enabled cgo enabled fail testsource modules testdata lsp definition usecgo source test go cgo tool not available cgo not enabled cgo enabled fail fail golang org x tools internal lsp source … fail testcommandline fail testcommandline gopath fail testcommandline gopath testdata lsp fail testcommandline gopath testdata lsp completion fail testcommandline gopath testdata lsp completion declarecgo nocgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline gopath testdata lsp completion usecgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline gopath testdata lsp definition fail testcommandline gopath testdata lsp definition declarecgo nocgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline gopath testdata lsp definition usecgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline modules fail testcommandline modules testdata lsp fail testcommandline modules testdata lsp completion fail testcommandline modules testdata lsp completion declarecgo nocgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline modules testdata lsp completion usecgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline modules testdata lsp definition fail testcommandline modules testdata lsp definition declarecgo nocgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail testcommandline modules testdata lsp definition usecgo cmdtest go cgo tool not available cgo not enabled cgo enabled fail fail golang org x tools gopls test fail this particular failure mode seems to start at but many of the same tests were already failing with a different failure mode before then cc heschik stamblerre
| 1
|
687,128
| 23,514,694,402
|
IssuesEvent
|
2022-08-18 20:02:40
|
adisve/tumble-for-kronox
|
https://api.github.com/repos/adisve/tumble-for-kronox
|
closed
|
Add event details options button
|
enhancement good first issue High Priority
|
Add a button to the event details modal, that opens the same floating options as longPress, to help with accessibility (seeing as longPress isn't necessarily understood by the users)
|
1.0
|
Add event details options button - Add a button to the event details modal, that opens the same floating options as longPress, to help with accessibility (seeing as longPress isn't necessarily understood by the users)
|
non_test
|
add event details options button add a button to the event details modal that opens the same floating options as longpress to help with accessibility seeing as longpress isn t necessarily understood by the users
| 0
|
29,459
| 4,501,258,322
|
IssuesEvent
|
2016-09-01 08:47:02
|
mattbearman/lime
|
https://api.github.com/repos/mattbearman/lime
|
closed
|
BugMuncher Feedback Report
|
bug BugMuncher other test
|
## Details ##
**Submitted:** January 04, 2016 14:29
**Category:** other
**Sender Email:** info@bugmuncher.com
**Website:** BugMuncher App
**URL:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**Operating System:** Mac OS X Yosemite
**Browser:** Chrome 47.0.2526.106
**Browser Size:** 1280 x 1341
**User Agent:**
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36
**Description:**
## Screenshot ##

1. Octocat!
## Custom Data ##
**user_id:** 1
**account_id:** 1
**plan:** BugMuncher Corporate
## Browser Plugins ##
Shockwave Flash
Widevine Content Decryption Module
Chrome PDF Viewer
Native Client
## Events ##
**method:** GET
**url:** https://beta.app.bugmuncher.com/session/new
**timestamp:** Mon Jan 04 2016 14:17:06 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/user/dashboard
**timestamp:** Mon Jan 04 2016 14:17:12 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:18:01 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1
**timestamp:** Mon Jan 04 2016 14:18:06 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:18:34 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:18:37 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:18:50 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:18:53 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/user/dashboard
**timestamp:** Mon Jan 04 2016 14:18:59 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/account/welcome
**timestamp:** Mon Jan 04 2016 14:19:11 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/user/dashboard?tour=part_1
**timestamp:** Mon Jan 04 2016 14:19:14 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles?tour=part_2
**timestamp:** Mon Jan 04 2016 14:19:24 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/new?tour=part_3
**timestamp:** Mon Jan 04 2016 14:19:32 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1223?tour=part_4
**timestamp:** Mon Jan 04 2016 14:19:46 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1223?tour=part_4
**timestamp:** Mon Jan 04 2016 14:20:06 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1223/notifiers
**timestamp:** Mon Jan 04 2016 14:26:19 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1223/notifiers
**timestamp:** Mon Jan 04 2016 14:26:28 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:26:29 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:26:32 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:26:33 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:26:34 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/emails/new
**timestamp:** Mon Jan 04 2016 14:26:35 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:26:37 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:26:38 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:26:38 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/zendesks/new
**timestamp:** Mon Jan 04 2016 14:26:40 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:26:53 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:26:54 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:26:54 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/jiras/new
**timestamp:** Mon Jan 04 2016 14:26:56 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/jiras
**timestamp:** Mon Jan 04 2016 14:27:08 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/jiras
**timestamp:** Mon Jan 04 2016 14:27:12 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:27:21 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:27:22 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:27:23 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/trellos/new?notifier_trello[oauth_token]=01c57e8aa2da7c77019bbfaca86e8a645e20937beadfbac456577f2b2639a703¬ifier_trello[oauth_token_secret]=25407a67a8396f7e7249a1d0c165e462
**timestamp:** Mon Jan 04 2016 14:27:28 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://api.trello.com/1/boards/5245998ea47aeb221f0035e0/lists?key=799f3a36c5bd62fe86443a8945d76251&token=01c57e8aa2da7c77019bbfaca86e8a645e20937beadfbac456577f2b2639a703
**timestamp:** Mon Jan 04 2016 14:27:32 GMT+0000 (GMT)
**type:** ajax
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:27:38 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:27:46 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:27:47 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/bitbuckets/new?notifier_bitbucket[oauth_token]=esgcBFEeCm5ME43g36¬ifier_bitbucket[oauth_token_secret]=XTf4h2BbZMUgc2yvX75bF5W2zG8WAzn6
**timestamp:** Mon Jan 04 2016 14:27:51 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:27:56 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:27:58 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:27:58 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/webhooks/new
**timestamp:** Mon Jan 04 2016 14:28:01 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:28:41 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:28:45 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:28:45 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:28:47 GMT+0000 (GMT)
**type:** page_load
---
**content:** Feedback Button Clicked
**timestamp:** Mon Jan 04 2016 14:28:52 GMT+0000 (GMT)
**type:** bugmuncher
---
**type:** bugmuncher
**content:** Feedback Report Submitted
**timestamp:** Mon Jan 04 2016 14:29:06 GMT+0000 (GMT)
---
|
1.0
|
BugMuncher Feedback Report - ## Details ##
**Submitted:** January 04, 2016 14:29
**Category:** other
**Sender Email:** info@bugmuncher.com
**Website:** BugMuncher App
**URL:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**Operating System:** Mac OS X Yosemite
**Browser:** Chrome 47.0.2526.106
**Browser Size:** 1280 x 1341
**User Agent:**
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36
**Description:**
## Screenshot ##

1. Octocat!
## Custom Data ##
**user_id:** 1
**account_id:** 1
**plan:** BugMuncher Corporate
## Browser Plugins ##
Shockwave Flash
Widevine Content Decryption Module
Chrome PDF Viewer
Native Client
## Events ##
**method:** GET
**url:** https://beta.app.bugmuncher.com/session/new
**timestamp:** Mon Jan 04 2016 14:17:06 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/user/dashboard
**timestamp:** Mon Jan 04 2016 14:17:12 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:18:01 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1
**timestamp:** Mon Jan 04 2016 14:18:06 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:18:34 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:18:37 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:18:50 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:18:53 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/user/dashboard
**timestamp:** Mon Jan 04 2016 14:18:59 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/account/welcome
**timestamp:** Mon Jan 04 2016 14:19:11 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/user/dashboard?tour=part_1
**timestamp:** Mon Jan 04 2016 14:19:14 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles?tour=part_2
**timestamp:** Mon Jan 04 2016 14:19:24 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/new?tour=part_3
**timestamp:** Mon Jan 04 2016 14:19:32 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1223?tour=part_4
**timestamp:** Mon Jan 04 2016 14:19:46 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1223?tour=part_4
**timestamp:** Mon Jan 04 2016 14:20:06 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1223/notifiers
**timestamp:** Mon Jan 04 2016 14:26:19 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/1223/notifiers
**timestamp:** Mon Jan 04 2016 14:26:28 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles
**timestamp:** Mon Jan 04 2016 14:26:29 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:26:32 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:26:33 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:26:34 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/emails/new
**timestamp:** Mon Jan 04 2016 14:26:35 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:26:37 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:26:38 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:26:38 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/zendesks/new
**timestamp:** Mon Jan 04 2016 14:26:40 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:26:53 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:26:54 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:26:54 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/jiras/new
**timestamp:** Mon Jan 04 2016 14:26:56 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/jiras
**timestamp:** Mon Jan 04 2016 14:27:08 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/jiras
**timestamp:** Mon Jan 04 2016 14:27:12 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:27:21 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:27:22 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:27:23 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/trellos/new?notifier_trello[oauth_token]=01c57e8aa2da7c77019bbfaca86e8a645e20937beadfbac456577f2b2639a703¬ifier_trello[oauth_token_secret]=25407a67a8396f7e7249a1d0c165e462
**timestamp:** Mon Jan 04 2016 14:27:28 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://api.trello.com/1/boards/5245998ea47aeb221f0035e0/lists?key=799f3a36c5bd62fe86443a8945d76251&token=01c57e8aa2da7c77019bbfaca86e8a645e20937beadfbac456577f2b2639a703
**timestamp:** Mon Jan 04 2016 14:27:32 GMT+0000 (GMT)
**type:** ajax
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:27:38 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:27:46 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:27:47 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/bitbuckets/new?notifier_bitbucket[oauth_token]=esgcBFEeCm5ME43g36¬ifier_bitbucket[oauth_token_secret]=XTf4h2BbZMUgc2yvX75bF5W2zG8WAzn6
**timestamp:** Mon Jan 04 2016 14:27:51 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:27:56 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:27:58 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:27:58 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/webhooks/new
**timestamp:** Mon Jan 04 2016 14:28:01 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:28:41 GMT+0000 (GMT)
**type:** page_load
---
**message:** Uncaught Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
**url:** https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js
**line:** 21
**column:** 11729
**stack_trace:** Error: Syntax error, unrecognized expression: /profiles/25/notifiers/new
at Function.a.error (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:11735)
at d (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:2203)
at w (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:4685)
at Function.a [as find] (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:1250)
at lt.fn.extend.find (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:21:17747)
at lt.fn.lt.init (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:11793)
at lt (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:14:10847)
at HTMLAnchorElement.<anonymous> (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:76:3130)
at HTMLDocument.lt.event.dispatch (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:5021)
at HTMLDocument.v.handle (https://beta.app.bugmuncher.com/assets/application-168c3725baee32981c879f6e028921b8.js:15:1693)
**timestamp:** Mon Jan 04 2016 14:28:45 GMT+0000 (GMT)
**type:** error
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers/new
**timestamp:** Mon Jan 04 2016 14:28:45 GMT+0000 (GMT)
**type:** page_load
---
**method:** GET
**url:** https://beta.app.bugmuncher.com/profiles/25/notifiers
**timestamp:** Mon Jan 04 2016 14:28:47 GMT+0000 (GMT)
**type:** page_load
---
**content:** Feedback Button Clicked
**timestamp:** Mon Jan 04 2016 14:28:52 GMT+0000 (GMT)
**type:** bugmuncher
---
**type:** bugmuncher
**content:** Feedback Report Submitted
**timestamp:** Mon Jan 04 2016 14:29:06 GMT+0000 (GMT)
---
|
test
|
bugmuncher feedback report details submitted january category other sender email info bugmuncher com website bugmuncher app url operating system mac os x yosemite browser chrome browser size x user agent mozilla macintosh intel mac os x applewebkit khtml like gecko chrome safari description screenshot octocat custom data user id account id plan bugmuncher corporate browser plugins shockwave flash widevine content decryption module chrome pdf viewer native client events method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load message uncaught error syntax error unrecognized expression profiles notifiers new url line column stack trace error syntax error unrecognized expression profiles notifiers new at function a error at d at w at function a at lt fn extend find at lt fn lt init at lt at htmlanchorelement at htmldocument lt event dispatch at htmldocument v handle timestamp mon jan gmt gmt type error method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load message uncaught error syntax error unrecognized expression profiles notifiers new url line column stack trace error syntax error unrecognized expression profiles notifiers new at function a error at d at w at function a at lt fn extend find at lt fn lt init at lt at htmlanchorelement at htmldocument lt event dispatch at htmldocument v handle timestamp mon jan gmt gmt type error method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load message uncaught error syntax error unrecognized expression profiles notifiers new url line column stack trace error syntax error unrecognized expression profiles notifiers new at function a error at d at w at function a at lt fn extend find at lt fn lt init at lt at htmlanchorelement at htmldocument lt event dispatch at htmldocument v handle timestamp mon jan gmt gmt type error method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load message uncaught error syntax error unrecognized expression profiles notifiers new url line column stack trace error syntax error unrecognized expression profiles notifiers new at function a error at d at w at function a at lt fn extend find at lt fn lt init at lt at htmlanchorelement at htmldocument lt event dispatch at htmldocument v handle timestamp mon jan gmt gmt type error method get url timestamp mon jan gmt gmt type page load method get url notifier trello timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type ajax method get url timestamp mon jan gmt gmt type page load message uncaught error syntax error unrecognized expression profiles notifiers new url line column stack trace error syntax error unrecognized expression profiles notifiers new at function a error at d at w at function a at lt fn extend find at lt fn lt init at lt at htmlanchorelement at htmldocument lt event dispatch at htmldocument v handle timestamp mon jan gmt gmt type error method get url timestamp mon jan gmt gmt type page load method get url notifier bitbucket timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load message uncaught error syntax error unrecognized expression profiles notifiers new url line column stack trace error syntax error unrecognized expression profiles notifiers new at function a error at d at w at function a at lt fn extend find at lt fn lt init at lt at htmlanchorelement at htmldocument lt event dispatch at htmldocument v handle timestamp mon jan gmt gmt type error method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load message uncaught error syntax error unrecognized expression profiles notifiers new url line column stack trace error syntax error unrecognized expression profiles notifiers new at function a error at d at w at function a at lt fn extend find at lt fn lt init at lt at htmlanchorelement at htmldocument lt event dispatch at htmldocument v handle timestamp mon jan gmt gmt type error method get url timestamp mon jan gmt gmt type page load method get url timestamp mon jan gmt gmt type page load content feedback button clicked timestamp mon jan gmt gmt type bugmuncher type bugmuncher content feedback report submitted timestamp mon jan gmt gmt
| 1
|
107,918
| 13,530,171,228
|
IssuesEvent
|
2020-09-15 19:28:40
|
cityofaustin/techstack
|
https://api.github.com/repos/cityofaustin/techstack
|
closed
|
Design Pin-up 9-15-20
|
Team: Content Team: Design
|
Agenda
- [x] Revisit event page requirements and virtual events
What else is needed besides the ability to indicate a virtual event and offer a link to that virtual event?
Do physical locations still necessary, ie, might be both physical and virtual?
Any other fields necessary for virtual events other than the link?
- [x] Simple flow for feedback
- [x] Dept and dept pages
#4348 Virtual event Joplin (https://share.goabstract.com/017dc239-f9fa-4300-94cf-198162b5ad36)
- [x] https://github.com/cityofaustin/techstack/issues/3968 Are there any tables anywhere?
|
1.0
|
Design Pin-up 9-15-20 - Agenda
- [x] Revisit event page requirements and virtual events
What else is needed besides the ability to indicate a virtual event and offer a link to that virtual event?
Do physical locations still necessary, ie, might be both physical and virtual?
Any other fields necessary for virtual events other than the link?
- [x] Simple flow for feedback
- [x] Dept and dept pages
#4348 Virtual event Joplin (https://share.goabstract.com/017dc239-f9fa-4300-94cf-198162b5ad36)
- [x] https://github.com/cityofaustin/techstack/issues/3968 Are there any tables anywhere?
|
non_test
|
design pin up agenda revisit event page requirements and virtual events what else is needed besides the ability to indicate a virtual event and offer a link to that virtual event do physical locations still necessary ie might be both physical and virtual any other fields necessary for virtual events other than the link simple flow for feedback dept and dept pages virtual event joplin are there any tables anywhere
| 0
|
23,923
| 23,120,839,919
|
IssuesEvent
|
2022-07-27 21:17:50
|
pulumi/pulumi
|
https://api.github.com/repos/pulumi/pulumi
|
closed
|
group `pulumi help` subcommands based on use-case
|
area/cli kind/enhancement impact/usability
|
## Hello!
<!-- Please leave this section as-is, it's designed to help others in the community know how to interact with our GitHub issues. -->
- Vote on this issue by adding a 👍 reaction
- If you want to implement this feature, comment to let us know (we'll work with you on design, scheduling, etc.)
## Issue details
some internal discussion around improving the usability of the help command has lead to an actionable improvement for the `pulumi help` subcommand.
- https://github.com/pulumi/home/issues/2181
The `pulumi help` command has too many commands to be easily searchable. Commands like `kubectl` and `git` organize their subcommands to make them more easy to grasp.
A comparison between current state and future state below(you may need to scroll right):
```
# scroll to the right =======================================>
kdixler@kdixler-20xw004aus ~ % ~/.pulumi/bin/pulumi help │kdixler@kdixler-20xw004aus ~ % pulumi help
Pulumi - Modern Infrastructure as Code │Pulumi - Modern Infrastructure as Code
│
To begin working with Pulumi, run the `pulumi new` command: │To begin working with Pulumi, run the `pulumi new` command:
│
$ pulumi new │ $ pulumi new
│
This will prompt you to create a new project for your cloud and language of choice. │This will prompt you to create a new project for your cloud and language of choice.
│
The most common commands from there are: │For more information, please visit the documentation page: https://www.pulumi.com/docs/
│
- pulumi up : Deploy code and/or resource changes │Usage:
- pulumi stack : Manage instances of your project │ pulumi [command]
- pulumi config : Alter your stack's configuration or secrets │
- pulumi destroy : Tear down your stack's resources entirely │Common Commands:
│ new Create a new Pulumi project
For more information, please visit the project page: https://www.pulumi.com/docs/ │ up Create or update the resources in a stack
│ preview Show a preview of updates to a stack's resources
Usage: │ destroy Destroy all existing resources in the stack
pulumi [command] │ watch [PREVIEW] Continuously update the resources in a stack
│
Available Commands: │Stack Management Commands:
about Print information about the Pulumi environment. │ stack Manage stacks
cancel Cancel a stack's currently running update, if any │ config Manage configuration
config Manage configuration │
console Opens the current stack in the Pulumi Console │Service Commands:
destroy Destroy all existing resources in the stack │ login Log in to the Pulumi service
help Help about any command │ logout Log out of the Pulumi service
import Import resources into an existing stack │ whoami Display the current logged-in user
login Log in to the Pulumi service │ org Manage Organization configuration
logout Log out of the Pulumi service │
logs [PREVIEW] Show aggregated resource logs for a stack │Policy Management Commands:
new Create a new Pulumi project │ policy Manage resource policies
org Manage Organization configuration │
plugin Manage language and resource provider plugins │Advanced Commands:
policy Manage resource policies │ cancel Cancel a stack's currently running update, if any
preview Show a preview of updates to a stack's resources │ import Import resources into an existing stack
refresh Refresh the resources in a stack │ refresh Refresh the resources in a stack
schema Analyze package schemas │ state Edit the current stack's state
stack Manage stacks │
state Edit the current stack's state │Other Commands:
up Create or update the resources in a stack │ logs [PREVIEW] Show aggregated resource logs for a stack
version Print Pulumi's version number │ plugin Manage language and resource provider plugins
watch [PREVIEW] Continuously update the resources in a stack │ version Print Pulumi's version number
whoami Display the current logged-in user │ console Opens the current stack in the Pulumi Console
│ about Print information about the Pulumi environment.
Flags: │ schema Analyze package schemas
--color string Colorize output. Choices are: always, never, raw, auto (default "auto") │
-C, --cwd string Run pulumi as if it had been started in another directory │Experimental Commands:
--disable-integrity-checking Disable integrity checking of checkpoint files │ convert Convert resource declarations into a pulumi program
-e, --emoji Enable emojis in the output │
-h, --help help for pulumi │Flags:
--logflow Flow log settings to child processes (like plugins) │ --color string Colorize output. Choices are: always, never, raw, auto (default "auto")
--logtostderr Log to stderr instead of to files │ -C, --cwd string Run pulumi as if it had been started in another directory
--non-interactive Disable interactive mode for all commands │ --disable-integrity-checking Disable integrity checking of checkpoint files
--profiling string Emit CPU and memory profiles and an execution trace to '[filename].[pid].{cpu,mem,trace}', respectively │ -e, --emoji Enable emojis in the output
--tracing file: Emit tracing to the specified endpoint. Use the file: scheme to write tracing data to a local file │ -h, --help help for pulumi
-v, --verbose int Enable verbose logging (e.g., v=3); anything >3 is very verbose │ --logflow Flow log settings to child processes (like plugins)
│ --logtostderr Log to stderr instead of to files
Use "pulumi [command] --help" for more information about a command. │ --non-interactive Disable interactive mode for all commands
warning: A new version of Pulumi is available. To upgrade from version '3.35.3' to '3.36.0', run │ --profiling string Emit CPU and memory profiles and an execution trace to '[filename].[pid].{cpu,mem,trace}', respectively
$ curl -sSL https://get.pulumi.com | sh │ --tracing file: Emit tracing to the specified endpoint. Use the file: scheme to write tracing data to a local file
or visit https://pulumi.com/docs/reference/install/ for manual instructions and release notes. │ -v, --verbose int Enable verbose logging (e.g., v=3); anything >3 is very verbose
```
<!-- Enhancement requests are most helpful when they describe the problem you're having as well as articulating the potential solution you'd like to see built. -->
### Affected area/feature
<!-- If you know the specific area where this feature request would go (e.g. Automation API, the Pulumi Service, the Terraform bridge, etc.), feel free to put that area here. -->
|
True
|
group `pulumi help` subcommands based on use-case - ## Hello!
<!-- Please leave this section as-is, it's designed to help others in the community know how to interact with our GitHub issues. -->
- Vote on this issue by adding a 👍 reaction
- If you want to implement this feature, comment to let us know (we'll work with you on design, scheduling, etc.)
## Issue details
some internal discussion around improving the usability of the help command has lead to an actionable improvement for the `pulumi help` subcommand.
- https://github.com/pulumi/home/issues/2181
The `pulumi help` command has too many commands to be easily searchable. Commands like `kubectl` and `git` organize their subcommands to make them more easy to grasp.
A comparison between current state and future state below(you may need to scroll right):
```
# scroll to the right =======================================>
kdixler@kdixler-20xw004aus ~ % ~/.pulumi/bin/pulumi help │kdixler@kdixler-20xw004aus ~ % pulumi help
Pulumi - Modern Infrastructure as Code │Pulumi - Modern Infrastructure as Code
│
To begin working with Pulumi, run the `pulumi new` command: │To begin working with Pulumi, run the `pulumi new` command:
│
$ pulumi new │ $ pulumi new
│
This will prompt you to create a new project for your cloud and language of choice. │This will prompt you to create a new project for your cloud and language of choice.
│
The most common commands from there are: │For more information, please visit the documentation page: https://www.pulumi.com/docs/
│
- pulumi up : Deploy code and/or resource changes │Usage:
- pulumi stack : Manage instances of your project │ pulumi [command]
- pulumi config : Alter your stack's configuration or secrets │
- pulumi destroy : Tear down your stack's resources entirely │Common Commands:
│ new Create a new Pulumi project
For more information, please visit the project page: https://www.pulumi.com/docs/ │ up Create or update the resources in a stack
│ preview Show a preview of updates to a stack's resources
Usage: │ destroy Destroy all existing resources in the stack
pulumi [command] │ watch [PREVIEW] Continuously update the resources in a stack
│
Available Commands: │Stack Management Commands:
about Print information about the Pulumi environment. │ stack Manage stacks
cancel Cancel a stack's currently running update, if any │ config Manage configuration
config Manage configuration │
console Opens the current stack in the Pulumi Console │Service Commands:
destroy Destroy all existing resources in the stack │ login Log in to the Pulumi service
help Help about any command │ logout Log out of the Pulumi service
import Import resources into an existing stack │ whoami Display the current logged-in user
login Log in to the Pulumi service │ org Manage Organization configuration
logout Log out of the Pulumi service │
logs [PREVIEW] Show aggregated resource logs for a stack │Policy Management Commands:
new Create a new Pulumi project │ policy Manage resource policies
org Manage Organization configuration │
plugin Manage language and resource provider plugins │Advanced Commands:
policy Manage resource policies │ cancel Cancel a stack's currently running update, if any
preview Show a preview of updates to a stack's resources │ import Import resources into an existing stack
refresh Refresh the resources in a stack │ refresh Refresh the resources in a stack
schema Analyze package schemas │ state Edit the current stack's state
stack Manage stacks │
state Edit the current stack's state │Other Commands:
up Create or update the resources in a stack │ logs [PREVIEW] Show aggregated resource logs for a stack
version Print Pulumi's version number │ plugin Manage language and resource provider plugins
watch [PREVIEW] Continuously update the resources in a stack │ version Print Pulumi's version number
whoami Display the current logged-in user │ console Opens the current stack in the Pulumi Console
│ about Print information about the Pulumi environment.
Flags: │ schema Analyze package schemas
--color string Colorize output. Choices are: always, never, raw, auto (default "auto") │
-C, --cwd string Run pulumi as if it had been started in another directory │Experimental Commands:
--disable-integrity-checking Disable integrity checking of checkpoint files │ convert Convert resource declarations into a pulumi program
-e, --emoji Enable emojis in the output │
-h, --help help for pulumi │Flags:
--logflow Flow log settings to child processes (like plugins) │ --color string Colorize output. Choices are: always, never, raw, auto (default "auto")
--logtostderr Log to stderr instead of to files │ -C, --cwd string Run pulumi as if it had been started in another directory
--non-interactive Disable interactive mode for all commands │ --disable-integrity-checking Disable integrity checking of checkpoint files
--profiling string Emit CPU and memory profiles and an execution trace to '[filename].[pid].{cpu,mem,trace}', respectively │ -e, --emoji Enable emojis in the output
--tracing file: Emit tracing to the specified endpoint. Use the file: scheme to write tracing data to a local file │ -h, --help help for pulumi
-v, --verbose int Enable verbose logging (e.g., v=3); anything >3 is very verbose │ --logflow Flow log settings to child processes (like plugins)
│ --logtostderr Log to stderr instead of to files
Use "pulumi [command] --help" for more information about a command. │ --non-interactive Disable interactive mode for all commands
warning: A new version of Pulumi is available. To upgrade from version '3.35.3' to '3.36.0', run │ --profiling string Emit CPU and memory profiles and an execution trace to '[filename].[pid].{cpu,mem,trace}', respectively
$ curl -sSL https://get.pulumi.com | sh │ --tracing file: Emit tracing to the specified endpoint. Use the file: scheme to write tracing data to a local file
or visit https://pulumi.com/docs/reference/install/ for manual instructions and release notes. │ -v, --verbose int Enable verbose logging (e.g., v=3); anything >3 is very verbose
```
<!-- Enhancement requests are most helpful when they describe the problem you're having as well as articulating the potential solution you'd like to see built. -->
### Affected area/feature
<!-- If you know the specific area where this feature request would go (e.g. Automation API, the Pulumi Service, the Terraform bridge, etc.), feel free to put that area here. -->
|
non_test
|
group pulumi help subcommands based on use case hello vote on this issue by adding a 👍 reaction if you want to implement this feature comment to let us know we ll work with you on design scheduling etc issue details some internal discussion around improving the usability of the help command has lead to an actionable improvement for the pulumi help subcommand the pulumi help command has too many commands to be easily searchable commands like kubectl and git organize their subcommands to make them more easy to grasp a comparison between current state and future state below you may need to scroll right scroll to the right kdixler kdixler pulumi bin pulumi help │kdixler kdixler pulumi help pulumi modern infrastructure as code │pulumi modern infrastructure as code │ to begin working with pulumi run the pulumi new command │to begin working with pulumi run the pulumi new command │ pulumi new │ pulumi new │ this will prompt you to create a new project for your cloud and language of choice │this will prompt you to create a new project for your cloud and language of choice │ the most common commands from there are │for more information please visit the documentation page │ pulumi up deploy code and or resource changes │usage pulumi stack manage instances of your project │ pulumi pulumi config alter your stack s configuration or secrets │ pulumi destroy tear down your stack s resources entirely │common commands │ new create a new pulumi project for more information please visit the project page │ up create or update the resources in a stack │ preview show a preview of updates to a stack s resources usage │ destroy destroy all existing resources in the stack pulumi │ watch continuously update the resources in a stack │ available commands │stack management commands about print information about the pulumi environment │ stack manage stacks cancel cancel a stack s currently running update if any │ config manage configuration config manage configuration │ console opens the current stack in the pulumi console │service commands destroy destroy all existing resources in the stack │ login log in to the pulumi service help help about any command │ logout log out of the pulumi service import import resources into an existing stack │ whoami display the current logged in user login log in to the pulumi service │ org manage organization configuration logout log out of the pulumi service │ logs show aggregated resource logs for a stack │policy management commands new create a new pulumi project │ policy manage resource policies org manage organization configuration │ plugin manage language and resource provider plugins │advanced commands policy manage resource policies │ cancel cancel a stack s currently running update if any preview show a preview of updates to a stack s resources │ import import resources into an existing stack refresh refresh the resources in a stack │ refresh refresh the resources in a stack schema analyze package schemas │ state edit the current stack s state stack manage stacks │ state edit the current stack s state │other commands up create or update the resources in a stack │ logs show aggregated resource logs for a stack version print pulumi s version number │ plugin manage language and resource provider plugins watch continuously update the resources in a stack │ version print pulumi s version number whoami display the current logged in user │ console opens the current stack in the pulumi console │ about print information about the pulumi environment flags │ schema analyze package schemas color string colorize output choices are always never raw auto default auto │ c cwd string run pulumi as if it had been started in another directory │experimental commands disable integrity checking disable integrity checking of checkpoint files │ convert convert resource declarations into a pulumi program e emoji enable emojis in the output │ h help help for pulumi │flags logflow flow log settings to child processes like plugins │ color string colorize output choices are always never raw auto default auto logtostderr log to stderr instead of to files │ c cwd string run pulumi as if it had been started in another directory non interactive disable interactive mode for all commands │ disable integrity checking disable integrity checking of checkpoint files profiling string emit cpu and memory profiles and an execution trace to cpu mem trace respectively │ e emoji enable emojis in the output tracing file emit tracing to the specified endpoint use the file scheme to write tracing data to a local file │ h help help for pulumi v verbose int enable verbose logging e g v anything is very verbose │ logflow flow log settings to child processes like plugins │ logtostderr log to stderr instead of to files use pulumi help for more information about a command │ non interactive disable interactive mode for all commands warning a new version of pulumi is available to upgrade from version to run │ profiling string emit cpu and memory profiles and an execution trace to cpu mem trace respectively curl ssl sh │ tracing file emit tracing to the specified endpoint use the file scheme to write tracing data to a local file or visit for manual instructions and release notes │ v verbose int enable verbose logging e g v anything is very verbose affected area feature
| 0
|
627,449
| 19,905,279,630
|
IssuesEvent
|
2022-01-25 12:09:13
|
brave/brave-browser
|
https://api.github.com/repos/brave/brave-browser
|
closed
|
Assertion thrown when running tests in debug on Android
|
bug priority/P3 QA/No release-notes/exclude feature/ads OS/Android
|
```
C 660.252s Main ********************************************************************************
C 660.252s Main Detailed Logs
C 660.252s Main ********************************************************************************
C 660.260s Main [CRASH] BatAdsEligibleAdNotificationsV1Issue17199Test.GetEligibleAds:
C 660.260s Main [ RUN ] BatAdsEligibleAdNotificationsV1Issue17199Test.GetEligibleAds
C 660.260s Main ../../brave/vendor/bat-native-rapidjson/include/rapidjson/document.h:1135: GenericValue<Encoding, Allocator> &rapidjson::GenericValue<rapidjson::UTF8<>>::operator[](const GenericValue<Encoding, SourceAllocator> &) [Encoding = rapidjson::UTF8<>, Allocator = rapidjson::MemoryPoolAllocator<>, SourceAllocator = rapidjson::MemoryPoolAllocator<>]: assertion "false" failed
C 660.260s Main [ CRASHED ]
C 660.260s Main ********************************************************************************
C 660.260s Main Summary
C 660.260s Main ********************************************************************************
C 660.268s Main [==========] 2645 tests ran.
C 660.268s Main [ PASSED ] 2644 tests.
C 660.268s Main [ FAILED ] 1 test, listed below:
C 660.268s Main [ FAILED ] BatAdsEligibleAdNotificationsV1Issue17199Test.GetEligibleAds (CRASHED)
C 660.268s Main
C 660.268s Main 1 FAILED TEST
C 660.268s Main ********************************************************************************
```
|
1.0
|
Assertion thrown when running tests in debug on Android - ```
C 660.252s Main ********************************************************************************
C 660.252s Main Detailed Logs
C 660.252s Main ********************************************************************************
C 660.260s Main [CRASH] BatAdsEligibleAdNotificationsV1Issue17199Test.GetEligibleAds:
C 660.260s Main [ RUN ] BatAdsEligibleAdNotificationsV1Issue17199Test.GetEligibleAds
C 660.260s Main ../../brave/vendor/bat-native-rapidjson/include/rapidjson/document.h:1135: GenericValue<Encoding, Allocator> &rapidjson::GenericValue<rapidjson::UTF8<>>::operator[](const GenericValue<Encoding, SourceAllocator> &) [Encoding = rapidjson::UTF8<>, Allocator = rapidjson::MemoryPoolAllocator<>, SourceAllocator = rapidjson::MemoryPoolAllocator<>]: assertion "false" failed
C 660.260s Main [ CRASHED ]
C 660.260s Main ********************************************************************************
C 660.260s Main Summary
C 660.260s Main ********************************************************************************
C 660.268s Main [==========] 2645 tests ran.
C 660.268s Main [ PASSED ] 2644 tests.
C 660.268s Main [ FAILED ] 1 test, listed below:
C 660.268s Main [ FAILED ] BatAdsEligibleAdNotificationsV1Issue17199Test.GetEligibleAds (CRASHED)
C 660.268s Main
C 660.268s Main 1 FAILED TEST
C 660.268s Main ********************************************************************************
```
|
non_test
|
assertion thrown when running tests in debug on android c main c main detailed logs c main c main geteligibleads c main geteligibleads c main brave vendor bat native rapidjson include rapidjson document h genericvalue rapidjson genericvalue operator const genericvalue assertion false failed c main c main c main summary c main c main tests ran c main tests c main test listed below c main geteligibleads crashed c main c main failed test c main
| 0
|
243,209
| 20,370,233,529
|
IssuesEvent
|
2022-02-21 10:29:42
|
PolicyEngine/openfisca-us
|
https://api.github.com/repos/PolicyEngine/openfisca-us
|
opened
|
Investigate GainsTax $200 discrepancy in unit test
|
testing
|
GainsTax unit test 2 differs from tax-calc by $162.
|
1.0
|
Investigate GainsTax $200 discrepancy in unit test - GainsTax unit test 2 differs from tax-calc by $162.
|
test
|
investigate gainstax discrepancy in unit test gainstax unit test differs from tax calc by
| 1
|
114,529
| 9,741,818,788
|
IssuesEvent
|
2019-06-02 12:12:14
|
berkeleyinc/Golem
|
https://api.github.com/repos/berkeleyinc/Golem
|
closed
|
Wrong timing config/drone switch when cancel fleeing because threat is gone
|
DarkOrbit Testing needed bug
|
**Describe the bug**
Wrong config/drone switch after cancel fleeing because threat is gone.
**To Reproduce**
Use NPC Killer, wait for an enemy. Then wait for cancel fleeing because threat is gone.
**Expected behavior**
A clear and concise description of what you expected to happen.
**Screenshots**
If applicable, add screenshots to help explain your problem.
**Additional context**
20:49:44 [info] Cancel fleeing because threat is gone.
20:49:44 [info] Threat recognized BabaYega
20:49:44 [trace] BB1619 BB1619 DOB2018 tick=199
20:49:46 [info] Changing to config 1...
20:49:46 [info] Threat recognized BabaYega
20:49:46 [info] Enemy 'BabaYega' in sight.
20:49:46 [trace] Send keys: c
20:49:46 [info] Fleeing to closest gate...
20:49:46 [trace] DOB1985 BB1619 DOB2018 tick=329
20:49:47 [trace] DOB1985 BB1619 BB1619 tick=113
20:49:47 [trace] BB1619 BB1619 BB1619 tick=124
20:49:48 [info] Cancel fleeing because threat is gone.
20:49:48 [info] Pressing After flee button(s)
**20:49:48** [trace] Send keys: 9 **<< Drone switch cooldown begins 3 Seconds.**
20:49:48 [info] Fleeing to closest gate...
20:49:48 [warning] Enemy 'BabaYega' got too close!
20:49:48 [trace] DOB1904 BB1619 BB1619 tick=61
20:49:48 [info] Pressing Flee button(s) **<< issue begins**
**20:49:48** [trace] Send keys: 0 **<< Drone switch still on cooldown** Bot should not switch the config before drone switch happened
20:49:48 [trace] BB1619 BB1619 BB1619 tick=129
20:49:51 [info] Changing to config 2...
20:49:51 [trace] Send keys: c
20:49:53 [trace] BB1619 BB1619 BB1619 tick=50
20:49:56 [info] Jumping ...
20:49:56 [trace] Send keys: j
|
1.0
|
Wrong timing config/drone switch when cancel fleeing because threat is gone - **Describe the bug**
Wrong config/drone switch after cancel fleeing because threat is gone.
**To Reproduce**
Use NPC Killer, wait for an enemy. Then wait for cancel fleeing because threat is gone.
**Expected behavior**
A clear and concise description of what you expected to happen.
**Screenshots**
If applicable, add screenshots to help explain your problem.
**Additional context**
20:49:44 [info] Cancel fleeing because threat is gone.
20:49:44 [info] Threat recognized BabaYega
20:49:44 [trace] BB1619 BB1619 DOB2018 tick=199
20:49:46 [info] Changing to config 1...
20:49:46 [info] Threat recognized BabaYega
20:49:46 [info] Enemy 'BabaYega' in sight.
20:49:46 [trace] Send keys: c
20:49:46 [info] Fleeing to closest gate...
20:49:46 [trace] DOB1985 BB1619 DOB2018 tick=329
20:49:47 [trace] DOB1985 BB1619 BB1619 tick=113
20:49:47 [trace] BB1619 BB1619 BB1619 tick=124
20:49:48 [info] Cancel fleeing because threat is gone.
20:49:48 [info] Pressing After flee button(s)
**20:49:48** [trace] Send keys: 9 **<< Drone switch cooldown begins 3 Seconds.**
20:49:48 [info] Fleeing to closest gate...
20:49:48 [warning] Enemy 'BabaYega' got too close!
20:49:48 [trace] DOB1904 BB1619 BB1619 tick=61
20:49:48 [info] Pressing Flee button(s) **<< issue begins**
**20:49:48** [trace] Send keys: 0 **<< Drone switch still on cooldown** Bot should not switch the config before drone switch happened
20:49:48 [trace] BB1619 BB1619 BB1619 tick=129
20:49:51 [info] Changing to config 2...
20:49:51 [trace] Send keys: c
20:49:53 [trace] BB1619 BB1619 BB1619 tick=50
20:49:56 [info] Jumping ...
20:49:56 [trace] Send keys: j
|
test
|
wrong timing config drone switch when cancel fleeing because threat is gone describe the bug wrong config drone switch after cancel fleeing because threat is gone to reproduce use npc killer wait for an enemy then wait for cancel fleeing because threat is gone expected behavior a clear and concise description of what you expected to happen screenshots if applicable add screenshots to help explain your problem additional context cancel fleeing because threat is gone threat recognized babayega tick changing to config threat recognized babayega enemy babayega in sight send keys c fleeing to closest gate tick tick tick cancel fleeing because threat is gone pressing after flee button s send keys drone switch cooldown begins seconds fleeing to closest gate enemy babayega got too close tick pressing flee button s issue begins send keys drone switch still on cooldown bot should not switch the config before drone switch happened tick changing to config send keys c tick jumping send keys j
| 1
|
340,623
| 30,532,494,979
|
IssuesEvent
|
2023-07-19 15:05:16
|
guram-asanidze-1-btu-edu-ge/shualeduri
|
https://api.github.com/repos/guram-asanidze-1-btu-edu-ge/shualeduri
|
opened
|
4e30825 failed unit and formatting tests.
|
ci-pytest ci-black
|
Automatically generated message
4e3082507e337c11405613425b22be4d682bf9c3 failed unit and formatting tests.
bfe21ef PYTEST Error commit
54ce250 BLACK Error commit
Pytest report: https://guram-asanidze-1-btu-edu-ge.github.io/shualeduri-ci/4e3082507e337c11405613425b22be4d682bf9c3-1689779108/pytest.html
Black report: https://guram-asanidze-1-btu-edu-ge.github.io/shualeduri-ci/4e3082507e337c11405613425b22be4d682bf9c3-1689779108/black.html
|
1.0
|
4e30825 failed unit and formatting tests. - Automatically generated message
4e3082507e337c11405613425b22be4d682bf9c3 failed unit and formatting tests.
bfe21ef PYTEST Error commit
54ce250 BLACK Error commit
Pytest report: https://guram-asanidze-1-btu-edu-ge.github.io/shualeduri-ci/4e3082507e337c11405613425b22be4d682bf9c3-1689779108/pytest.html
Black report: https://guram-asanidze-1-btu-edu-ge.github.io/shualeduri-ci/4e3082507e337c11405613425b22be4d682bf9c3-1689779108/black.html
|
test
|
failed unit and formatting tests automatically generated message failed unit and formatting tests pytest error commit black error commit pytest report black report
| 1
|
41,380
| 5,354,368,399
|
IssuesEvent
|
2017-02-20 09:43:26
|
QualiSystems/OpenStack-Shell
|
https://api.github.com/repos/QualiSystems/OpenStack-Shell
|
closed
|
Cancellation support for OpenStack "deploy from glance" deployment option
|
7.2 F-VM Deployment In Testing Test Plan Ready
|
We would like the OpenStack "deploy from glance" deployment option to have cancellation support so users will be able to cancel the deployment if needed and the system will be able end the sandbox setup in case needed.
@gabhijit-izel - please reefer to AWS or azure deployment options for example implementation.
|
2.0
|
Cancellation support for OpenStack "deploy from glance" deployment option - We would like the OpenStack "deploy from glance" deployment option to have cancellation support so users will be able to cancel the deployment if needed and the system will be able end the sandbox setup in case needed.
@gabhijit-izel - please reefer to AWS or azure deployment options for example implementation.
|
test
|
cancellation support for openstack deploy from glance deployment option we would like the openstack deploy from glance deployment option to have cancellation support so users will be able to cancel the deployment if needed and the system will be able end the sandbox setup in case needed gabhijit izel please reefer to aws or azure deployment options for example implementation
| 1
|
722,010
| 24,847,062,612
|
IssuesEvent
|
2022-10-26 16:42:12
|
tradingstrategy-ai/frontend
|
https://api.github.com/repos/tradingstrategy-ai/frontend
|
closed
|
Return 404 Not Found for URLs ending in "/"
|
priority: P1 size: S
|
Currently, a URL ending in a `/` will receive a `301 Moved Permanently` redirect to the equivalent URL minus the `/`. This is undesirable due to how it is interpreted by Google Search for SEO purposes. Instead, we should return `404 Not Found` error for requests ending in `/`'
Investigate where this slash-redirect behavior is configured (likely a Vite and/or SvelteKit config option) and disable it / set it to return `404`. We should also ensure that we are not constructing anchor paths anywhere that end in "/".
In addition, Google bot is hitting some API URLs directly – these should be added to `robots.txt`.
Background per @miohtama (from Discord chat):
> I was poking around Google Search console and found a super annoying issue
> We have a lot of non-indexed pages because of URL slash direct
> https://tradingstrategy.ai/trading-view/binance/pancakeswap-v2/hvt-busd/ -> https://tradingstrategy.ai/trading-view/binance/pancakeswap-v2/hvt-busd
> We should disable any such behavior in Vite or whatever is doing this for us
> Make it hard "Not found"
> Also need to figure out where Google sees the URLs with ending slash
> Ooh... also found out Google bot is hitting our API URLs directly, will add them to robots.txt
>
> After some research I think GoogleBot automatically "assumes" we have this URL ending with slash after visiting the pair inner page https://tradingstrategy.ai/trading-view/binance/pancakeswap-v2/hvt-busd/api-and-historical-data
|
1.0
|
Return 404 Not Found for URLs ending in "/" - Currently, a URL ending in a `/` will receive a `301 Moved Permanently` redirect to the equivalent URL minus the `/`. This is undesirable due to how it is interpreted by Google Search for SEO purposes. Instead, we should return `404 Not Found` error for requests ending in `/`'
Investigate where this slash-redirect behavior is configured (likely a Vite and/or SvelteKit config option) and disable it / set it to return `404`. We should also ensure that we are not constructing anchor paths anywhere that end in "/".
In addition, Google bot is hitting some API URLs directly – these should be added to `robots.txt`.
Background per @miohtama (from Discord chat):
> I was poking around Google Search console and found a super annoying issue
> We have a lot of non-indexed pages because of URL slash direct
> https://tradingstrategy.ai/trading-view/binance/pancakeswap-v2/hvt-busd/ -> https://tradingstrategy.ai/trading-view/binance/pancakeswap-v2/hvt-busd
> We should disable any such behavior in Vite or whatever is doing this for us
> Make it hard "Not found"
> Also need to figure out where Google sees the URLs with ending slash
> Ooh... also found out Google bot is hitting our API URLs directly, will add them to robots.txt
>
> After some research I think GoogleBot automatically "assumes" we have this URL ending with slash after visiting the pair inner page https://tradingstrategy.ai/trading-view/binance/pancakeswap-v2/hvt-busd/api-and-historical-data
|
non_test
|
return not found for urls ending in currently a url ending in a will receive a moved permanently redirect to the equivalent url minus the this is undesirable due to how it is interpreted by google search for seo purposes instead we should return not found error for requests ending in investigate where this slash redirect behavior is configured likely a vite and or sveltekit config option and disable it set it to return we should also ensure that we are not constructing anchor paths anywhere that end in in addition google bot is hitting some api urls directly – these should be added to robots txt background per miohtama from discord chat i was poking around google search console and found a super annoying issue we have a lot of non indexed pages because of url slash direct we should disable any such behavior in vite or whatever is doing this for us make it hard not found also need to figure out where google sees the urls with ending slash ooh also found out google bot is hitting our api urls directly will add them to robots txt after some research i think googlebot automatically assumes we have this url ending with slash after visiting the pair inner page
| 0
|
297,327
| 25,720,527,902
|
IssuesEvent
|
2022-12-07 13:23:44
|
pulp/Pulp-2-Tests
|
https://api.github.com/repos/pulp/Pulp-2-Tests
|
closed
|
Adds task-ids to logs
|
Issue Type: Test Case
|
> Migrated from https://github.com/PulpQE/pulp-smash/issues/483
> author: @bmbouter - https://github.com/bmbouter
> date created: 2017-01-13T20:34:21Z
This is for story: https://pulp.plan.io/issues/2324
### Verify a log statement running inside a task
1. Sync the zoo repo: `pulp-admin rpm repo sync run --repo-id zoo`
2. Verify that you see the log statement `[75suq9sy] pulp_rpm.plugins.importers.yum.sync:INFO: Parsing metadata.` Note that the characters between the brackets will be different.
### Verify a log statement running outside a task
1. Try to login with a bad username and password: `pulp-admin login -u admin -p notright`
2. Verify that you see the log statement `pulp.server.webservices.middleware.exception:INFO: Authentication with username admin failed: invalid username or password`
|
1.0
|
Adds task-ids to logs - > Migrated from https://github.com/PulpQE/pulp-smash/issues/483
> author: @bmbouter - https://github.com/bmbouter
> date created: 2017-01-13T20:34:21Z
This is for story: https://pulp.plan.io/issues/2324
### Verify a log statement running inside a task
1. Sync the zoo repo: `pulp-admin rpm repo sync run --repo-id zoo`
2. Verify that you see the log statement `[75suq9sy] pulp_rpm.plugins.importers.yum.sync:INFO: Parsing metadata.` Note that the characters between the brackets will be different.
### Verify a log statement running outside a task
1. Try to login with a bad username and password: `pulp-admin login -u admin -p notright`
2. Verify that you see the log statement `pulp.server.webservices.middleware.exception:INFO: Authentication with username admin failed: invalid username or password`
|
test
|
adds task ids to logs migrated from author bmbouter date created this is for story verify a log statement running inside a task sync the zoo repo pulp admin rpm repo sync run repo id zoo verify that you see the log statement pulp rpm plugins importers yum sync info parsing metadata note that the characters between the brackets will be different verify a log statement running outside a task try to login with a bad username and password pulp admin login u admin p notright verify that you see the log statement pulp server webservices middleware exception info authentication with username admin failed invalid username or password
| 1
|
31,651
| 7,431,184,580
|
IssuesEvent
|
2018-03-25 12:15:16
|
joomla/joomla-cms
|
https://api.github.com/repos/joomla/joomla-cms
|
closed
|
[4.0] Modals broken when trying to associate menu items
|
J4 Issue No Code Attached Yet
|
Create a multilang site with menu items tagged to different languages.
Associations should be enabled in the languagefilter.
Edit a menu item in one language (can be done with the Home).
Go to Associations tag
Whether one chooses Select/Create (depending on situation), the modal does not respect the task.
Select does not select the item. Create does not let Save/Save and Close/Close.
The Clear button is broken too.
@C-Lodder
|
1.0
|
[4.0] Modals broken when trying to associate menu items - Create a multilang site with menu items tagged to different languages.
Associations should be enabled in the languagefilter.
Edit a menu item in one language (can be done with the Home).
Go to Associations tag
Whether one chooses Select/Create (depending on situation), the modal does not respect the task.
Select does not select the item. Create does not let Save/Save and Close/Close.
The Clear button is broken too.
@C-Lodder
|
non_test
|
modals broken when trying to associate menu items create a multilang site with menu items tagged to different languages associations should be enabled in the languagefilter edit a menu item in one language can be done with the home go to associations tag whether one chooses select create depending on situation the modal does not respect the task select does not select the item create does not let save save and close close the clear button is broken too c lodder
| 0
|
86,818
| 8,051,130,707
|
IssuesEvent
|
2018-08-01 15:15:51
|
syndesisio/syndesis
|
https://api.github.com/repos/syndesisio/syndesis
|
closed
|
Logout on firefox does not work correctly
|
cat/bug prio/p1 qe/logout-test
|
I tried new logout endpoint on firefox from anonymous window and it does not work.
After I log out, I am on logout page. Then when I click on Login button, this happens:

Console looked like this:

@zregvart
|
1.0
|
Logout on firefox does not work correctly - I tried new logout endpoint on firefox from anonymous window and it does not work.
After I log out, I am on logout page. Then when I click on Login button, this happens:

Console looked like this:

@zregvart
|
test
|
logout on firefox does not work correctly i tried new logout endpoint on firefox from anonymous window and it does not work after i log out i am on logout page then when i click on login button this happens console looked like this zregvart
| 1
|
30,696
| 4,646,835,274
|
IssuesEvent
|
2016-10-01 04:34:35
|
NelsonCrosby/node-json-rpc
|
https://api.github.com/repos/NelsonCrosby/node-json-rpc
|
closed
|
Missing tests
|
tests
|
The entirety of the "testing" has been me `require`ing from the Node REPL.
We need some actual tests, which preferably we could run on CI.
|
1.0
|
Missing tests - The entirety of the "testing" has been me `require`ing from the Node REPL.
We need some actual tests, which preferably we could run on CI.
|
test
|
missing tests the entirety of the testing has been me require ing from the node repl we need some actual tests which preferably we could run on ci
| 1
|
184,997
| 6,718,137,173
|
IssuesEvent
|
2017-10-15 08:39:22
|
TauCetiStation/TauCetiClassic
|
https://api.github.com/repos/TauCetiStation/TauCetiClassic
|
closed
|
Можно реанимировать людей без головы.
|
Bug Priority: High
|
<!--
1. ОТВЕТЫ ОСТАВЛЯТЬ ПОД СООТВЕТСТВУЮЩИЕ ЗАГОЛОВКИ
(они в самом низу, после всех правил)
2. В ОДНОМ РЕПОРТЕ ДОЛЖНО БЫТЬ ОПИСАНИЕ ТОЛЬКО ОДНОЙ ПРОБЛЕМЫ
3. КОРРЕКТНОЕ НАЗВАНИЕ РЕПОРТА НЕ МЕНЕЕ ВАЖНО ЧЕМ ОПИСАНИЕ
-. Ниже описание каждого пункта.
1. Весь данный текст что уже написан до вас -
НЕ УДАЛЯТЬ И НЕ РЕДАКТИРОВАТЬ.
Если нечего написать в тот или иной пункт -
просто оставить пустым.
2. Не надо описывать пачку багов в одном репорте,
(!даже если там все описать можно парой слов!)
шанс что их исправят за раз, крайне мал.
А вот использовать на гите удобную функцию -
автозакрытия репорта при мерже пулл реквеста -
исправляющего данный репорт, будет невозможно.
3. Корректное и в меру подробное название репорта -
тоже очень важно! Чтобы даже не заходя в сам репорт -
было понятно что за проблема.
Плохой пример: "Ковер." - что мы должны понять из такого названия?
Хороший пример: "Некорректное отображение спрайтов ковра." -
а вот так уже будет понятно о чем репорт.
Это надо как минимум для того, чтобы вам же самим -
было видно, что репорта_нейм еще нет или наоборот,
уже есть, и это можно было понять не углубляясь в -
чтение каждого репорта внутри. Когда название не имеет конкретики, из -
которого нельзя понять о чем репорт, это также затрудняет функцию поиска.
-->
#### Подробное описание проблемы
Если мобу превратить голову в пепел лазерным оружием, то его возможно реанимировать и получить живого моба без головы.
#### Что должно было произойти
Никакой реанимации без головы.
#### Что произошло на самом деле
Живые мобы без головы
#### Как повторить
1. Превратить в пепел голову мобу (например, использовался lasercannon)
2. Реанимировать дефибами
#### Дополнительная информация:
|
1.0
|
Можно реанимировать людей без головы. - <!--
1. ОТВЕТЫ ОСТАВЛЯТЬ ПОД СООТВЕТСТВУЮЩИЕ ЗАГОЛОВКИ
(они в самом низу, после всех правил)
2. В ОДНОМ РЕПОРТЕ ДОЛЖНО БЫТЬ ОПИСАНИЕ ТОЛЬКО ОДНОЙ ПРОБЛЕМЫ
3. КОРРЕКТНОЕ НАЗВАНИЕ РЕПОРТА НЕ МЕНЕЕ ВАЖНО ЧЕМ ОПИСАНИЕ
-. Ниже описание каждого пункта.
1. Весь данный текст что уже написан до вас -
НЕ УДАЛЯТЬ И НЕ РЕДАКТИРОВАТЬ.
Если нечего написать в тот или иной пункт -
просто оставить пустым.
2. Не надо описывать пачку багов в одном репорте,
(!даже если там все описать можно парой слов!)
шанс что их исправят за раз, крайне мал.
А вот использовать на гите удобную функцию -
автозакрытия репорта при мерже пулл реквеста -
исправляющего данный репорт, будет невозможно.
3. Корректное и в меру подробное название репорта -
тоже очень важно! Чтобы даже не заходя в сам репорт -
было понятно что за проблема.
Плохой пример: "Ковер." - что мы должны понять из такого названия?
Хороший пример: "Некорректное отображение спрайтов ковра." -
а вот так уже будет понятно о чем репорт.
Это надо как минимум для того, чтобы вам же самим -
было видно, что репорта_нейм еще нет или наоборот,
уже есть, и это можно было понять не углубляясь в -
чтение каждого репорта внутри. Когда название не имеет конкретики, из -
которого нельзя понять о чем репорт, это также затрудняет функцию поиска.
-->
#### Подробное описание проблемы
Если мобу превратить голову в пепел лазерным оружием, то его возможно реанимировать и получить живого моба без головы.
#### Что должно было произойти
Никакой реанимации без головы.
#### Что произошло на самом деле
Живые мобы без головы
#### Как повторить
1. Превратить в пепел голову мобу (например, использовался lasercannon)
2. Реанимировать дефибами
#### Дополнительная информация:
|
non_test
|
можно реанимировать людей без головы ответы оставлять под соответствующие заголовки они в самом низу после всех правил в одном репорте должно быть описание только одной проблемы корректное название репорта не менее важно чем описание ниже описание каждого пункта весь данный текст что уже написан до вас не удалять и не редактировать если нечего написать в тот или иной пункт просто оставить пустым не надо описывать пачку багов в одном репорте даже если там все описать можно парой слов шанс что их исправят за раз крайне мал а вот использовать на гите удобную функцию автозакрытия репорта при мерже пулл реквеста исправляющего данный репорт будет невозможно корректное и в меру подробное название репорта тоже очень важно чтобы даже не заходя в сам репорт было понятно что за проблема плохой пример ковер что мы должны понять из такого названия хороший пример некорректное отображение спрайтов ковра а вот так уже будет понятно о чем репорт это надо как минимум для того чтобы вам же самим было видно что репорта нейм еще нет или наоборот уже есть и это можно было понять не углубляясь в чтение каждого репорта внутри когда название не имеет конкретики из которого нельзя понять о чем репорт это также затрудняет функцию поиска подробное описание проблемы если мобу превратить голову в пепел лазерным оружием то его возможно реанимировать и получить живого моба без головы что должно было произойти никакой реанимации без головы что произошло на самом деле живые мобы без головы как повторить превратить в пепел голову мобу например использовался lasercannon реанимировать дефибами дополнительная информация
| 0
|
102,306
| 8,824,300,369
|
IssuesEvent
|
2019-01-02 16:32:55
|
rancher/rancher
|
https://api.github.com/repos/rancher/rancher
|
closed
|
Able to see catalog apps from another projects catalog
|
area/catalog area/ui kind/bug-qa priority/0 status/resolved status/to-test team/az version/2.0
|
Version: master 2.2 (12/17/18)
**What kind of request is this (question/bug/enhancement/feature request):**
Bug
**Steps to reproduce (least amount of steps as possible):**
- Add a catalog to a project. In my case I added https://github.com/tfiduccia/charts to my "catalogs" project with project scope so only this project has access to this catalog.
- Launch the catalog apps. Filter the category down in my case to "Stuffs" and you'll see the nginx app. Now, using the global menu, change your project to another one that should not have access. In my case this is "catalogs2" and you can still see the app! You can also view details and deploy it on the separate project that should not have access. Refreshing will not fix the issue.
- Please see screenshots and additional information below!
**Result:**
Before switching we see our nginx app under our "catalogs" project:

After we switch to our other project, "catalogs2" (which does not have this catalog configured for this project) we can still see the nginx app from "catalogs" project!:

**Additional Info:**
- _If you click on view details you can see details still - no errors occur therefore giving the user potentially access to see apps from another project._
- _If you deploy the app it will indeed deploy under the separate project that should not have access!_
- _If you set up a catalog for a cluster you can still see the apps on a second cluster!_
|
1.0
|
Able to see catalog apps from another projects catalog - Version: master 2.2 (12/17/18)
**What kind of request is this (question/bug/enhancement/feature request):**
Bug
**Steps to reproduce (least amount of steps as possible):**
- Add a catalog to a project. In my case I added https://github.com/tfiduccia/charts to my "catalogs" project with project scope so only this project has access to this catalog.
- Launch the catalog apps. Filter the category down in my case to "Stuffs" and you'll see the nginx app. Now, using the global menu, change your project to another one that should not have access. In my case this is "catalogs2" and you can still see the app! You can also view details and deploy it on the separate project that should not have access. Refreshing will not fix the issue.
- Please see screenshots and additional information below!
**Result:**
Before switching we see our nginx app under our "catalogs" project:

After we switch to our other project, "catalogs2" (which does not have this catalog configured for this project) we can still see the nginx app from "catalogs" project!:

**Additional Info:**
- _If you click on view details you can see details still - no errors occur therefore giving the user potentially access to see apps from another project._
- _If you deploy the app it will indeed deploy under the separate project that should not have access!_
- _If you set up a catalog for a cluster you can still see the apps on a second cluster!_
|
test
|
able to see catalog apps from another projects catalog version master what kind of request is this question bug enhancement feature request bug steps to reproduce least amount of steps as possible add a catalog to a project in my case i added to my catalogs project with project scope so only this project has access to this catalog launch the catalog apps filter the category down in my case to stuffs and you ll see the nginx app now using the global menu change your project to another one that should not have access in my case this is and you can still see the app you can also view details and deploy it on the separate project that should not have access refreshing will not fix the issue please see screenshots and additional information below result before switching we see our nginx app under our catalogs project after we switch to our other project which does not have this catalog configured for this project we can still see the nginx app from catalogs project additional info if you click on view details you can see details still no errors occur therefore giving the user potentially access to see apps from another project if you deploy the app it will indeed deploy under the separate project that should not have access if you set up a catalog for a cluster you can still see the apps on a second cluster
| 1
|
291,497
| 25,152,184,369
|
IssuesEvent
|
2022-11-10 10:50:04
|
octue/django-gcp
|
https://api.github.com/repos/octue/django-gcp
|
closed
|
Include Django 4.x in testing
|
dependencies devops test
|
## Feature request
### Use Case
We currently only test on django 3.2 (the LTS version at the time of writing). Testing on Django 4.x is necessary to enable smooth upgrades to Django 4 for users of the application.
### Proposed solution
Extend the range of django that gets installed (see the `tox.ini` file). It should be just that.
|
1.0
|
Include Django 4.x in testing - ## Feature request
### Use Case
We currently only test on django 3.2 (the LTS version at the time of writing). Testing on Django 4.x is necessary to enable smooth upgrades to Django 4 for users of the application.
### Proposed solution
Extend the range of django that gets installed (see the `tox.ini` file). It should be just that.
|
test
|
include django x in testing feature request use case we currently only test on django the lts version at the time of writing testing on django x is necessary to enable smooth upgrades to django for users of the application proposed solution extend the range of django that gets installed see the tox ini file it should be just that
| 1
|
2,348
| 8,394,096,878
|
IssuesEvent
|
2018-10-09 22:52:33
|
MDAnalysis/mdanalysis
|
https://api.github.com/repos/MDAnalysis/mdanalysis
|
opened
|
Use versioneer (or similar)
|
Difficulty-easy maintainability release
|
Part of reducing release "friction".
The current method of incrementing the version number of the package involves editing 5 separate files*. This could be better. There is a script in `maintainer/` but it doesn't seem to work for me? (seems to `cat` a lot of the directory, no changes visible in git afterwards).
Ideally something like [versioneer](https://github.com/warner/python-versioneer) might be good, but it would have to handle the double-package that this repo is.
* MDAnalysis is 2 packages, `package/` and `testsuite`.
* 2 files per package (`setup.py`, `package/version.py`, `testsuite/__init__.py`)
* conda recipe
|
True
|
Use versioneer (or similar) - Part of reducing release "friction".
The current method of incrementing the version number of the package involves editing 5 separate files*. This could be better. There is a script in `maintainer/` but it doesn't seem to work for me? (seems to `cat` a lot of the directory, no changes visible in git afterwards).
Ideally something like [versioneer](https://github.com/warner/python-versioneer) might be good, but it would have to handle the double-package that this repo is.
* MDAnalysis is 2 packages, `package/` and `testsuite`.
* 2 files per package (`setup.py`, `package/version.py`, `testsuite/__init__.py`)
* conda recipe
|
non_test
|
use versioneer or similar part of reducing release friction the current method of incrementing the version number of the package involves editing separate files this could be better there is a script in maintainer but it doesn t seem to work for me seems to cat a lot of the directory no changes visible in git afterwards ideally something like might be good but it would have to handle the double package that this repo is mdanalysis is packages package and testsuite files per package setup py package version py testsuite init py conda recipe
| 0
|
255,204
| 21,912,100,899
|
IssuesEvent
|
2022-05-21 07:55:18
|
bitcoin/bitcoin
|
https://api.github.com/repos/bitcoin/bitcoin
|
closed
|
Tracking and reporting failures and repeated flakiness of functional tests
|
Brainstorming Tests
|
I'm sure anyone who runs the functional tests regularly will experience occasional failures. Often you run those failed tests again and they will pass. Occasionally a functional test will repeatedly fail which is more concerning. It is difficult to assess whether others are experiencing the same flakiness and/or repeated failures and whether it is worth spending time trying to understand and fix the issue.
In #25030 @MarcoFalke raised that there are some functional tests that have been flaky for a long time now.
This issue is a first attempt to track failures and repeated flakiness contributors experience with particular functional tests. I'm not sure how to organize this. Whether there should be a table of the functional tests that can be regularly updated and edited or whether to just have individual contributors adding comments below on which functional tests they are experiencing failures/flakiness with.
For now please comment below if you experience failures/flakiness with a particular functional test and certainly if you spend any time trying to understand why it failed feel free to add thoughts on what you think is causing the problem.
Ideally this issue would help identify which functional tests to prioritize to fix but we'll see if this is useful or not. If it isn't useful feel free to close.
|
1.0
|
Tracking and reporting failures and repeated flakiness of functional tests - I'm sure anyone who runs the functional tests regularly will experience occasional failures. Often you run those failed tests again and they will pass. Occasionally a functional test will repeatedly fail which is more concerning. It is difficult to assess whether others are experiencing the same flakiness and/or repeated failures and whether it is worth spending time trying to understand and fix the issue.
In #25030 @MarcoFalke raised that there are some functional tests that have been flaky for a long time now.
This issue is a first attempt to track failures and repeated flakiness contributors experience with particular functional tests. I'm not sure how to organize this. Whether there should be a table of the functional tests that can be regularly updated and edited or whether to just have individual contributors adding comments below on which functional tests they are experiencing failures/flakiness with.
For now please comment below if you experience failures/flakiness with a particular functional test and certainly if you spend any time trying to understand why it failed feel free to add thoughts on what you think is causing the problem.
Ideally this issue would help identify which functional tests to prioritize to fix but we'll see if this is useful or not. If it isn't useful feel free to close.
|
test
|
tracking and reporting failures and repeated flakiness of functional tests i m sure anyone who runs the functional tests regularly will experience occasional failures often you run those failed tests again and they will pass occasionally a functional test will repeatedly fail which is more concerning it is difficult to assess whether others are experiencing the same flakiness and or repeated failures and whether it is worth spending time trying to understand and fix the issue in marcofalke raised that there are some functional tests that have been flaky for a long time now this issue is a first attempt to track failures and repeated flakiness contributors experience with particular functional tests i m not sure how to organize this whether there should be a table of the functional tests that can be regularly updated and edited or whether to just have individual contributors adding comments below on which functional tests they are experiencing failures flakiness with for now please comment below if you experience failures flakiness with a particular functional test and certainly if you spend any time trying to understand why it failed feel free to add thoughts on what you think is causing the problem ideally this issue would help identify which functional tests to prioritize to fix but we ll see if this is useful or not if it isn t useful feel free to close
| 1
|
283,327
| 21,316,107,519
|
IssuesEvent
|
2022-04-16 09:54:23
|
edemirkirkan/pe
|
https://api.github.com/repos/edemirkirkan/pe
|
opened
|
DG - Lack of UML and Object Diagrams
|
type.DocumentationBug severity.Medium
|
I can see your sequential diagram, it is very well drawn and explained, however, you should also add UML and Object Diagrams to your developer guide so that developers entering the project after can understand the structure of the project more clearly.
<!--session: 1650094817731-931bde6d-a783-4b87-b44b-91cc8c291395-->
<!--Version: Web v3.4.2-->
|
1.0
|
DG - Lack of UML and Object Diagrams - I can see your sequential diagram, it is very well drawn and explained, however, you should also add UML and Object Diagrams to your developer guide so that developers entering the project after can understand the structure of the project more clearly.
<!--session: 1650094817731-931bde6d-a783-4b87-b44b-91cc8c291395-->
<!--Version: Web v3.4.2-->
|
non_test
|
dg lack of uml and object diagrams i can see your sequential diagram it is very well drawn and explained however you should also add uml and object diagrams to your developer guide so that developers entering the project after can understand the structure of the project more clearly
| 0
|
31,965
| 13,696,609,506
|
IssuesEvent
|
2020-10-01 00:34:00
|
microsoft/botbuilder-dotnet
|
https://api.github.com/repos/microsoft/botbuilder-dotnet
|
closed
|
Accessing UserState/ConversationState properties
|
Area: Adaptive Bot Services customer-replied-to customer-reported
|
Hi all,
I'm trying to set up a little bot architecture, where botframework composer will act as the leading part (easy deployment + set up). Im coding my own directline chat at the moment and trying to pass data objects around via webviews that will also be used by the facebook chat.
I came up with a little "middleware" concept, where I'm using azure functions for creating endpoints (such as for sending pro active messages to certain users) together with botbuilder js in order to use "adapter.continueConversation" for communicating with my deployed bot.
The communication works without any problem, I can for instance send pro active messages upon clicking a button in a webview. Now I want to pass more complex data into my conversation flows from the mentioned "middle ware".
I'm using Cosmos DB as a storage and created two dataAccessor objects, as I knew it from other tutorials in the past
```
const conversationState = new ConversationState(storage);
const userState = new UserState(storage);
let conversationDataAccessor = conversationState.createProperty("conversationData");
let userProfileAccessor = userState.createProperty("userProfile");
```
Now I'm struggling with accessing the "UserState" + "ConversationState" in botframework composer, what is the best way to achieve it? Does the approach via ConversationState and UserState even makes sense in this context or is there an easier way to achieve this shared data scenario?
Sorry for my bad English, I hope that I wrote it clearly and understandable, if there are open questions feel free to ask.
Best regards
|
1.0
|
Accessing UserState/ConversationState properties - Hi all,
I'm trying to set up a little bot architecture, where botframework composer will act as the leading part (easy deployment + set up). Im coding my own directline chat at the moment and trying to pass data objects around via webviews that will also be used by the facebook chat.
I came up with a little "middleware" concept, where I'm using azure functions for creating endpoints (such as for sending pro active messages to certain users) together with botbuilder js in order to use "adapter.continueConversation" for communicating with my deployed bot.
The communication works without any problem, I can for instance send pro active messages upon clicking a button in a webview. Now I want to pass more complex data into my conversation flows from the mentioned "middle ware".
I'm using Cosmos DB as a storage and created two dataAccessor objects, as I knew it from other tutorials in the past
```
const conversationState = new ConversationState(storage);
const userState = new UserState(storage);
let conversationDataAccessor = conversationState.createProperty("conversationData");
let userProfileAccessor = userState.createProperty("userProfile");
```
Now I'm struggling with accessing the "UserState" + "ConversationState" in botframework composer, what is the best way to achieve it? Does the approach via ConversationState and UserState even makes sense in this context or is there an easier way to achieve this shared data scenario?
Sorry for my bad English, I hope that I wrote it clearly and understandable, if there are open questions feel free to ask.
Best regards
|
non_test
|
accessing userstate conversationstate properties hi all i m trying to set up a little bot architecture where botframework composer will act as the leading part easy deployment set up im coding my own directline chat at the moment and trying to pass data objects around via webviews that will also be used by the facebook chat i came up with a little middleware concept where i m using azure functions for creating endpoints such as for sending pro active messages to certain users together with botbuilder js in order to use adapter continueconversation for communicating with my deployed bot the communication works without any problem i can for instance send pro active messages upon clicking a button in a webview now i want to pass more complex data into my conversation flows from the mentioned middle ware i m using cosmos db as a storage and created two dataaccessor objects as i knew it from other tutorials in the past const conversationstate new conversationstate storage const userstate new userstate storage let conversationdataaccessor conversationstate createproperty conversationdata let userprofileaccessor userstate createproperty userprofile now i m struggling with accessing the userstate conversationstate in botframework composer what is the best way to achieve it does the approach via conversationstate and userstate even makes sense in this context or is there an easier way to achieve this shared data scenario sorry for my bad english i hope that i wrote it clearly and understandable if there are open questions feel free to ask best regards
| 0
|
27,776
| 11,564,301,989
|
IssuesEvent
|
2020-02-20 08:21:09
|
RadkappenJoe/WebGoat
|
https://api.github.com/repos/RadkappenJoe/WebGoat
|
opened
|
CVE-2018-11693 (High) detected in opennms-opennms-source-22.0.1-1
|
security vulnerability
|
## CVE-2018-11693 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opennmsopennms-source-22.0.1-1</b></p></summary>
<p>
<p>A Java based fault and performance management system</p>
<p>Library home page: <a href=https://sourceforge.net/projects/opennms/>https://sourceforge.net/projects/opennms/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/RadkappenJoe/WebGoat/commit/b90abc0f2cdfd8b7573482e5b87c9282355e4b56">b90abc0f2cdfd8b7573482e5b87c9282355e4b56</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (68)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /WebGoat/docs/node_modules/nan/nan_callbacks_pre_12_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/expand.hpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/factory.cpp
- /WebGoat/docs/node_modules/nan/nan_maybe_pre_43_inl.h
- /WebGoat/docs/node_modules/js-base64/.attic/test-moment/./yoshinoya.js
- /WebGoat/docs/node_modules/node-sass/src/sass_types/boolean.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/value.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/emitter.hpp
- /WebGoat/docs/node_modules/nan/nan_converters_pre_43_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/file.cpp
- /WebGoat/docs/node_modules/nan/nan_persistent_12_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/operation.hpp
- /WebGoat/docs/node_modules/nan/nan_persistent_pre_12_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/operators.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/constants.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /WebGoat/docs/node_modules/nan/nan_implementation_pre_12_inl.h
- /WebGoat/docs/node_modules/js-base64/test/./dankogai.js
- /WebGoat/docs/node_modules/node-sass/src/custom_importer_bridge.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/constants.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/list.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/functions.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/util.cpp
- /WebGoat/docs/node_modules/node-sass/src/custom_function_bridge.cpp
- /WebGoat/docs/node_modules/nan/nan_typedarray_contents.h
- /WebGoat/docs/node_modules/node-sass/src/custom_importer_bridge.h
- /WebGoat/docs/node_modules/nan/nan_json.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/bind.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/eval.hpp
- /WebGoat/docs/node_modules/nan/nan_converters.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/backtrace.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/extend.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /WebGoat/docs/node_modules/nan/nan_converters_43_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/emitter.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/number.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/color.h
- /WebGoat/docs/node_modules/nan/nan_new.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/ast.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/output.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/null.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/cssize.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/ast.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/to_c.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/to_value.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /WebGoat/docs/node_modules/nan/nan_callbacks.h
- /WebGoat/docs/node_modules/node-sass/src/sass_types/color.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/inspect.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/values.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/list.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /WebGoat/docs/node_modules/nan/nan_define_own_property_helper.h
- /WebGoat/docs/node_modules/js-base64/.attic/test-moment/./es5.js
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/to_value.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/context.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/map.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/string.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/context.hpp
- /WebGoat/docs/node_modules/nan/nan_maybe_43_inl.h
- /WebGoat/docs/node_modules/node-sass/src/sass_types/boolean.h
- /WebGoat/docs/node_modules/nan/nan_private.h
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::Prelexer::skip_over_scopes which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11693>CVE-2018-11693</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11693">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11693</a></p>
<p>Release Date: 2018-06-04</p>
<p>Fix Resolution: LibSass - 3.5.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2018-11693 (High) detected in opennms-opennms-source-22.0.1-1 - ## CVE-2018-11693 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opennmsopennms-source-22.0.1-1</b></p></summary>
<p>
<p>A Java based fault and performance management system</p>
<p>Library home page: <a href=https://sourceforge.net/projects/opennms/>https://sourceforge.net/projects/opennms/</a></p>
<p>Found in HEAD commit: <a href="https://github.com/RadkappenJoe/WebGoat/commit/b90abc0f2cdfd8b7573482e5b87c9282355e4b56">b90abc0f2cdfd8b7573482e5b87c9282355e4b56</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (68)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /WebGoat/docs/node_modules/nan/nan_callbacks_pre_12_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/expand.hpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/factory.cpp
- /WebGoat/docs/node_modules/nan/nan_maybe_pre_43_inl.h
- /WebGoat/docs/node_modules/js-base64/.attic/test-moment/./yoshinoya.js
- /WebGoat/docs/node_modules/node-sass/src/sass_types/boolean.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/value.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/emitter.hpp
- /WebGoat/docs/node_modules/nan/nan_converters_pre_43_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/file.cpp
- /WebGoat/docs/node_modules/nan/nan_persistent_12_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/operation.hpp
- /WebGoat/docs/node_modules/nan/nan_persistent_pre_12_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/operators.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/constants.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /WebGoat/docs/node_modules/nan/nan_implementation_pre_12_inl.h
- /WebGoat/docs/node_modules/js-base64/test/./dankogai.js
- /WebGoat/docs/node_modules/node-sass/src/custom_importer_bridge.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/constants.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/list.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/functions.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/util.cpp
- /WebGoat/docs/node_modules/node-sass/src/custom_function_bridge.cpp
- /WebGoat/docs/node_modules/nan/nan_typedarray_contents.h
- /WebGoat/docs/node_modules/node-sass/src/custom_importer_bridge.h
- /WebGoat/docs/node_modules/nan/nan_json.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/bind.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/eval.hpp
- /WebGoat/docs/node_modules/nan/nan_converters.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/backtrace.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/extend.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /WebGoat/docs/node_modules/nan/nan_converters_43_inl.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/emitter.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/number.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/color.h
- /WebGoat/docs/node_modules/nan/nan_new.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/ast.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/output.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/null.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/cssize.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/ast.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/to_c.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/to_value.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /WebGoat/docs/node_modules/nan/nan_callbacks.h
- /WebGoat/docs/node_modules/node-sass/src/sass_types/color.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/inspect.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/values.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/list.h
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /WebGoat/docs/node_modules/nan/nan_define_own_property_helper.h
- /WebGoat/docs/node_modules/js-base64/.attic/test-moment/./es5.js
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/to_value.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/context.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/map.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /WebGoat/docs/node_modules/node-sass/src/sass_types/string.cpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /WebGoat/docs/node_modules/node-sass/src/libsass/src/context.hpp
- /WebGoat/docs/node_modules/nan/nan_maybe_43_inl.h
- /WebGoat/docs/node_modules/node-sass/src/sass_types/boolean.h
- /WebGoat/docs/node_modules/nan/nan_private.h
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::Prelexer::skip_over_scopes which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11693>CVE-2018-11693</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11693">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11693</a></p>
<p>Release Date: 2018-06-04</p>
<p>Fix Resolution: LibSass - 3.5.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_test
|
cve high detected in opennms opennms source cve high severity vulnerability vulnerable library opennmsopennms source a java based fault and performance management system library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries webgoat docs node modules nan nan callbacks pre inl h webgoat docs node modules node sass src libsass src expand hpp webgoat docs node modules node sass src sass types factory cpp webgoat docs node modules nan nan maybe pre inl h webgoat docs node modules js attic test moment yoshinoya js webgoat docs node modules node sass src sass types boolean cpp webgoat docs node modules node sass src sass types value h webgoat docs node modules node sass src libsass src emitter hpp webgoat docs node modules nan nan converters pre inl h webgoat docs node modules node sass src libsass src file cpp webgoat docs node modules nan nan persistent inl h webgoat docs node modules node sass src libsass src operation hpp webgoat docs node modules nan nan persistent pre inl h webgoat docs node modules node sass src libsass src operators hpp webgoat docs node modules node sass src libsass src constants hpp webgoat docs node modules node sass src libsass src error handling hpp webgoat docs node modules nan nan implementation pre inl h webgoat docs node modules js test dankogai js webgoat docs node modules node sass src custom importer bridge cpp webgoat docs node modules node sass src libsass src constants cpp webgoat docs node modules node sass src sass types list cpp webgoat docs node modules node sass src libsass src functions hpp webgoat docs node modules node sass src libsass src util cpp webgoat docs node modules node sass src custom function bridge cpp webgoat docs node modules nan nan typedarray contents h webgoat docs node modules node sass src custom importer bridge h webgoat docs node modules nan nan json h webgoat docs node modules node sass src libsass src bind cpp webgoat docs node modules node sass src libsass src eval hpp webgoat docs node modules nan nan converters h webgoat docs node modules node sass src libsass src backtrace cpp webgoat docs node modules node sass src libsass src extend cpp webgoat docs node modules node sass src sass types sass value wrapper h webgoat docs node modules node sass src libsass src error handling cpp webgoat docs node modules nan nan converters inl h webgoat docs node modules node sass src libsass src emitter cpp webgoat docs node modules node sass src sass types number cpp webgoat docs node modules node sass src sass types color h webgoat docs node modules nan nan new h webgoat docs node modules node sass src libsass src ast hpp webgoat docs node modules node sass src libsass src sass values cpp webgoat docs node modules node sass src libsass src output cpp webgoat docs node modules node sass src libsass src check nesting cpp webgoat docs node modules node sass src sass types null cpp webgoat docs node modules node sass src libsass src ast def macros hpp webgoat docs node modules node sass src libsass src cssize hpp webgoat docs node modules node sass src libsass src ast cpp webgoat docs node modules node sass src libsass src to c cpp webgoat docs node modules node sass src libsass src to value hpp webgoat docs node modules node sass src libsass src ast fwd decl hpp webgoat docs node modules nan nan callbacks h webgoat docs node modules node sass src sass types color cpp webgoat docs node modules node sass src libsass src inspect hpp webgoat docs node modules node sass src libsass src values cpp webgoat docs node modules node sass src sass types list h webgoat docs node modules node sass src libsass src check nesting hpp webgoat docs node modules nan nan define own property helper h webgoat docs node modules js attic test moment js webgoat docs node modules node sass src libsass src to value cpp webgoat docs node modules node sass src libsass src context cpp webgoat docs node modules node sass src sass types map cpp webgoat docs node modules node sass src libsass src sass context cpp webgoat docs node modules node sass src sass types string cpp webgoat docs node modules node sass src libsass src prelexer hpp webgoat docs node modules node sass src libsass src context hpp webgoat docs node modules nan nan maybe inl h webgoat docs node modules node sass src sass types boolean h webgoat docs node modules nan nan private h vulnerability details an issue was discovered in libsass through an out of bounds read of a memory region was found in the function sass prelexer skip over scopes which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass step up your open source security game with whitesource
| 0
|
158,752
| 12,424,683,851
|
IssuesEvent
|
2020-05-24 12:55:23
|
Gabriielfeliciano/SiteFA
|
https://api.github.com/repos/Gabriielfeliciano/SiteFA
|
closed
|
[FA - 30]Redirecionar de login e para dashboard
|
Concluído Testando
|
- [x] Ligar site demonstrativo (WordPress) e interativo (Dashboard);
- [x] Fazer autenticação de dados para login;
- [x] include para permissão de página(apenas para página principal por enquanto).
|
1.0
|
[FA - 30]Redirecionar de login e para dashboard - - [x] Ligar site demonstrativo (WordPress) e interativo (Dashboard);
- [x] Fazer autenticação de dados para login;
- [x] include para permissão de página(apenas para página principal por enquanto).
|
test
|
redirecionar de login e para dashboard ligar site demonstrativo wordpress e interativo dashboard fazer autenticação de dados para login include para permissão de página apenas para página principal por enquanto
| 1
|
91,145
| 8,292,634,613
|
IssuesEvent
|
2018-09-20 01:59:44
|
fixstars/clpy
|
https://api.github.com/repos/fixstars/clpy
|
closed
|
Pass clpy_tests/logic_tests/test_type_test.py
|
tests
|
We should support, remove, or fix clpy_tests/logic_tests/test_type_test.py
https://github.com/fixstars/clpy/blob/clpy/tests/clpy_tests/logic_tests/test_type_test.py
|
1.0
|
Pass clpy_tests/logic_tests/test_type_test.py - We should support, remove, or fix clpy_tests/logic_tests/test_type_test.py
https://github.com/fixstars/clpy/blob/clpy/tests/clpy_tests/logic_tests/test_type_test.py
|
test
|
pass clpy tests logic tests test type test py we should support remove or fix clpy tests logic tests test type test py
| 1
|
277,489
| 21,046,496,710
|
IssuesEvent
|
2022-03-31 16:29:14
|
APECS-Earth-Observation/Polar-EO-Database
|
https://api.github.com/repos/APECS-Earth-Observation/Polar-EO-Database
|
opened
|
Document how to make a contribution to this repository
|
documentation
|
For anyone wanting to make a change to the database, we should have step by step instructions on how to make additions/deletions/changes to the JSON files
- [ ] Make a screen recording of submitting a pull request
- [ ] Have a CONTRIBUTING.md text file documenting the step by step instructions
|
1.0
|
Document how to make a contribution to this repository - For anyone wanting to make a change to the database, we should have step by step instructions on how to make additions/deletions/changes to the JSON files
- [ ] Make a screen recording of submitting a pull request
- [ ] Have a CONTRIBUTING.md text file documenting the step by step instructions
|
non_test
|
document how to make a contribution to this repository for anyone wanting to make a change to the database we should have step by step instructions on how to make additions deletions changes to the json files make a screen recording of submitting a pull request have a contributing md text file documenting the step by step instructions
| 0
|
201,519
| 15,211,179,584
|
IssuesEvent
|
2021-02-17 08:42:55
|
enonic/app-contentstudio
|
https://api.github.com/repos/enonic/app-contentstudio
|
opened
|
Content Wizard - Save button remains enabled after creating a content with several text inputs
|
Bug Not in Changelog Test is Failing
|
1. Select Feature and open Article or Blog wizard.
2. Fill in the name input and click on `Save` button
**BUG**: Save button remains enabled after creating the content

|
1.0
|
Content Wizard - Save button remains enabled after creating a content with several text inputs - 1. Select Feature and open Article or Blog wizard.
2. Fill in the name input and click on `Save` button
**BUG**: Save button remains enabled after creating the content

|
test
|
content wizard save button remains enabled after creating a content with several text inputs select feature and open article or blog wizard fill in the name input and click on save button bug save button remains enabled after creating the content
| 1
|
165,619
| 6,279,518,580
|
IssuesEvent
|
2017-07-18 16:23:45
|
GoogleCloudPlatform/google-cloud-java
|
https://api.github.com/repos/GoogleCloudPlatform/google-cloud-java
|
closed
|
DEADLINE_EXCEEDED, google-cloud-vision
|
API: vision Priority: P1 Type: Bug
|
I am developing a Scala (2.10.6) app that uses the google-cloud-vision Java library (0.11.2-beta), but am getting the following exception: `com.google.api.gax.grpc.ApiException: io.grpc.StatusRuntimeException: DEADLINE_EXCEEDED`
I enabled FINE logging and see the following output before the exception occurs (certain values replaced with "BLAH"):
```
12:46:17.083 [ForkJoinPool-1-worker-3] INFO io.grpc.internal.ManagedChannelImpl - [ManagedChannelImpl@1e18908b] Created with target vision.googleapis.com:443
[ERROR] Apr 07, 2017 12:46:17 PM io.grpc.internal.ManagedChannelImpl <init>
[ERROR] INFO: [ManagedChannelImpl@1e18908b] Created with target vision.googleapis.com:443
12:46:17.202 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - -------------- REQUEST --------------
POST https://accounts.google.com/o/oauth2/token
Accept-Encoding: gzip
User-Agent: Google-HTTP-Java-Client/1.21.0 (gzip)
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 827
12:46:17.203 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - curl -v --compressed -X POST -H 'Accept-Encoding: gzip' -H 'User-Agent: Google-HTTP-Java-Client/1.21.0 (gz
ip)' -H 'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' -d '@-' -- 'https://accounts.google.com/o/oauth2/token' << $$$
12:46:17.251 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - Total: 827 bytes
12:46:17.252 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - grant_type=urn%3Aietf%3Aparams%3Aoauth%3Agrant-type%3Ajwt-bearer&assertion=BLAH
12:46:17.390 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - -------------- RESPONSE --------------
HTTP/1.1 200 OK
Transfer-Encoding: chunked
Alt-Svc: quic=":443"; ma=2592000; v="37,36,35"
Server: ESF
X-Content-Type-Options: nosniff
Pragma: no-cache
Date: Fri, 07 Apr 2017 19:46:17 GMT
X-Frame-Options: SAMEORIGIN
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Content-Disposition: attachment; filename="json.txt"; filename*=UTF-8''json.txt
Content-Encoding: gzip
Expires: Mon, 01 Jan 1990 00:00:00 GMT
X-XSS-Protection: 1; mode=block
Content-Type: application/json; charset=utf-8
12:46:17.396 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - Total: 203 bytes
12:46:17.397 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - {
"access_token" : "BLAH",
"expires_in" : 3600,
"token_type" : "Bearer"
}
```
It looks as if the request for a bearer token succeeded, and yet the method call (batchAnnotateImages) hangs and eventually times out. Here is the code that I'm using:
```
val imageBytes = ByteString.readFrom(new FileInputStream(filePath))
val image = Image.newBuilder().setContent(imageBytes).build
val request =
AnnotateImageRequest
.newBuilder()
.addFeatures(Feature.newBuilder().setType(Feature.Type.LABEL_DETECTION).build)
.setImage(image)
.build
val scopedCredentials = credentials.createScoped(ImageAnnotatorSettings.getDefaultServiceScopes)
val channelProvider =
ImageAnnotatorSettings
.defaultChannelProviderBuilder()
.setCredentialsProvider(FixedCredentialsProvider.create(scopedCredentials))
.build
val settingsBuilder =
ImageAnnotatorSettings
.defaultBuilder()
.setChannelProvider(channelProvider)
settingsBuilder.batchAnnotateImagesSettings().getRetrySettingsBuilder().setTotalTimeout(Duration.standardSeconds(60))
val response =
ImageAnnotatorClient
.create(settingsBuilder.build)
.batchAnnotateImages(List(request))
```
I do not see the `java.lang.UnsatisfiedLinkError` reported in: https://github.com/GoogleCloudPlatform/google-cloud-java/issues/1430
Any ideas as to what might be going wrong, or further debugging steps that I should try?
|
1.0
|
DEADLINE_EXCEEDED, google-cloud-vision - I am developing a Scala (2.10.6) app that uses the google-cloud-vision Java library (0.11.2-beta), but am getting the following exception: `com.google.api.gax.grpc.ApiException: io.grpc.StatusRuntimeException: DEADLINE_EXCEEDED`
I enabled FINE logging and see the following output before the exception occurs (certain values replaced with "BLAH"):
```
12:46:17.083 [ForkJoinPool-1-worker-3] INFO io.grpc.internal.ManagedChannelImpl - [ManagedChannelImpl@1e18908b] Created with target vision.googleapis.com:443
[ERROR] Apr 07, 2017 12:46:17 PM io.grpc.internal.ManagedChannelImpl <init>
[ERROR] INFO: [ManagedChannelImpl@1e18908b] Created with target vision.googleapis.com:443
12:46:17.202 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - -------------- REQUEST --------------
POST https://accounts.google.com/o/oauth2/token
Accept-Encoding: gzip
User-Agent: Google-HTTP-Java-Client/1.21.0 (gzip)
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 827
12:46:17.203 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - curl -v --compressed -X POST -H 'Accept-Encoding: gzip' -H 'User-Agent: Google-HTTP-Java-Client/1.21.0 (gz
ip)' -H 'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' -d '@-' -- 'https://accounts.google.com/o/oauth2/token' << $$$
12:46:17.251 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - Total: 827 bytes
12:46:17.252 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - grant_type=urn%3Aietf%3Aparams%3Aoauth%3Agrant-type%3Ajwt-bearer&assertion=BLAH
12:46:17.390 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - -------------- RESPONSE --------------
HTTP/1.1 200 OK
Transfer-Encoding: chunked
Alt-Svc: quic=":443"; ma=2592000; v="37,36,35"
Server: ESF
X-Content-Type-Options: nosniff
Pragma: no-cache
Date: Fri, 07 Apr 2017 19:46:17 GMT
X-Frame-Options: SAMEORIGIN
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Content-Disposition: attachment; filename="json.txt"; filename*=UTF-8''json.txt
Content-Encoding: gzip
Expires: Mon, 01 Jan 1990 00:00:00 GMT
X-XSS-Protection: 1; mode=block
Content-Type: application/json; charset=utf-8
12:46:17.396 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - Total: 203 bytes
12:46:17.397 [ForkJoinPool-1-worker-3] INFO c.g.api.client.http.HttpTransport - {
"access_token" : "BLAH",
"expires_in" : 3600,
"token_type" : "Bearer"
}
```
It looks as if the request for a bearer token succeeded, and yet the method call (batchAnnotateImages) hangs and eventually times out. Here is the code that I'm using:
```
val imageBytes = ByteString.readFrom(new FileInputStream(filePath))
val image = Image.newBuilder().setContent(imageBytes).build
val request =
AnnotateImageRequest
.newBuilder()
.addFeatures(Feature.newBuilder().setType(Feature.Type.LABEL_DETECTION).build)
.setImage(image)
.build
val scopedCredentials = credentials.createScoped(ImageAnnotatorSettings.getDefaultServiceScopes)
val channelProvider =
ImageAnnotatorSettings
.defaultChannelProviderBuilder()
.setCredentialsProvider(FixedCredentialsProvider.create(scopedCredentials))
.build
val settingsBuilder =
ImageAnnotatorSettings
.defaultBuilder()
.setChannelProvider(channelProvider)
settingsBuilder.batchAnnotateImagesSettings().getRetrySettingsBuilder().setTotalTimeout(Duration.standardSeconds(60))
val response =
ImageAnnotatorClient
.create(settingsBuilder.build)
.batchAnnotateImages(List(request))
```
I do not see the `java.lang.UnsatisfiedLinkError` reported in: https://github.com/GoogleCloudPlatform/google-cloud-java/issues/1430
Any ideas as to what might be going wrong, or further debugging steps that I should try?
|
non_test
|
deadline exceeded google cloud vision i am developing a scala app that uses the google cloud vision java library beta but am getting the following exception com google api gax grpc apiexception io grpc statusruntimeexception deadline exceeded i enabled fine logging and see the following output before the exception occurs certain values replaced with blah info io grpc internal managedchannelimpl created with target vision googleapis com apr pm io grpc internal managedchannelimpl info created with target vision googleapis com info c g api client http httptransport request post accept encoding gzip user agent google http java client gzip content type application x www form urlencoded charset utf content length info c g api client http httptransport curl v compressed x post h accept encoding gzip h user agent google http java client gz ip h content type application x www form urlencoded charset utf d info c g api client http httptransport total bytes info c g api client http httptransport grant type urn type bearer assertion blah info c g api client http httptransport response http ok transfer encoding chunked alt svc quic ma v server esf x content type options nosniff pragma no cache date fri apr gmt x frame options sameorigin cache control no cache no store max age must revalidate content disposition attachment filename json txt filename utf json txt content encoding gzip expires mon jan gmt x xss protection mode block content type application json charset utf info c g api client http httptransport total bytes info c g api client http httptransport access token blah expires in token type bearer it looks as if the request for a bearer token succeeded and yet the method call batchannotateimages hangs and eventually times out here is the code that i m using val imagebytes bytestring readfrom new fileinputstream filepath val image image newbuilder setcontent imagebytes build val request annotateimagerequest newbuilder addfeatures feature newbuilder settype feature type label detection build setimage image build val scopedcredentials credentials createscoped imageannotatorsettings getdefaultservicescopes val channelprovider imageannotatorsettings defaultchannelproviderbuilder setcredentialsprovider fixedcredentialsprovider create scopedcredentials build val settingsbuilder imageannotatorsettings defaultbuilder setchannelprovider channelprovider settingsbuilder batchannotateimagessettings getretrysettingsbuilder settotaltimeout duration standardseconds val response imageannotatorclient create settingsbuilder build batchannotateimages list request i do not see the java lang unsatisfiedlinkerror reported in any ideas as to what might be going wrong or further debugging steps that i should try
| 0
|
260,256
| 19,663,318,065
|
IssuesEvent
|
2022-01-10 19:24:42
|
dpinney/coopforecast
|
https://api.github.com/repos/dpinney/coopforecast
|
closed
|
Prepare for sharing with BurtCo
|
documentation chore Epic
|
- [ ] Upload BurtCo data and perform trial run
- [x] Writeup explanation of remaining features / current limitations
- [x] Point to instructions
|
1.0
|
Prepare for sharing with BurtCo - - [ ] Upload BurtCo data and perform trial run
- [x] Writeup explanation of remaining features / current limitations
- [x] Point to instructions
|
non_test
|
prepare for sharing with burtco upload burtco data and perform trial run writeup explanation of remaining features current limitations point to instructions
| 0
|
233,279
| 18,958,200,834
|
IssuesEvent
|
2021-11-18 23:20:31
|
apache/lucenenet
|
https://api.github.com/repos/apache/lucenenet
|
opened
|
Failing Test: Lucene.Net.Index.TestDuelingCodecs::TestEquals()
|
up-for-grabs help-wanted is:bug test-failure pri:high
|
> For information about how to help us debug tests, see #269.
This test has been failing randomly for some time but has not previously been documented. The test uses `SimpleText` to compare against all other codecs to ensure they return the same results.
Unfortunately the patch in #541 wasn't the only contributor to this failure.
I have been able to repeat it once with the following info seed and culture info (it failed under x64 .net5.0 Windows that time), but it doesn't fail consistently.
```
Lucene.Net.Tests._E-I - net5.0 - x86 - Windows | Tests failed: 1, passed: 531, ignored: 23TestEquals
Failed 15m ago on WIN-J8N18B59RQM
Duration0:00:02.174
Ownernot available
Date started11/19/2021, 5:47:42 AM
Date completed11/19/2021, 5:47:44 AM
Failing since7m ago
Failing since build4.8.0-ci0000002638
Expected: [31], Actual: [32]
left: SimpleText / right: Lucene46: {titleTokenized=PostingsFormat(name=Asserting), date=PostingsFormat(name=Asserting), body=Pulsing41 (freqCutoff=12, minBlockSize=31, maxBlockSize=87), docid=PostingsFormat(name=Asserting), title=FST41}, docValues:{sparsenumeric=DocValuesFormat(name=Disk), sortedset=DocValuesFormat(name=Asserting), titleDV=DocValuesFormat(name=Disk)}
To reproduce this test result:
Option 1:
Apply the following assembly-level attributes:
[assembly: Lucene.Net.Util.RandomSeed(0x1993c83d13f71207L)]
[assembly: NUnit.Framework.SetCulture("om")]
Option 2:
Use the following .runsettings file:
<RunSettings>
<TestRunParameters>
<Parameter name="tests:seed" value="0x1993c83d13f71207" />
<Parameter name="tests:culture" value="om" />
</TestRunParameters>
</RunSettings>
See the .runsettings documentation at: https://docs.microsoft.com/en-us/visualstudio/test/configure-unit-tests-by-using-a-dot-runsettings-file.
at Lucene.Net.Util.LuceneTestCase.AssertTermsEnumEquals(String info, IndexReader leftReader, TermsEnum leftTermsEnum, TermsEnum rightTermsEnum, Boolean deep) in D:\a\1\s\src\Lucene.Net.TestFramework\Util\LuceneTestCase.cs:line 2732
at Lucene.Net.Util.LuceneTestCase.AssertTermsEquals(String info, IndexReader leftReader, Terms leftTerms, Terms rightTerms, Boolean deep) in D:\a\1\s\src\Lucene.Net.TestFramework\Util\LuceneTestCase.cs:line 2672
at Lucene.Net.Util.LuceneTestCase.AssertFieldsEquals(String info, IndexReader leftReader, Fields leftFields, Fields rightFields, Boolean deep) in D:\a\1\s\src\Lucene.Net.TestFramework\Util\LuceneTestCase.cs:line 2623
at Lucene.Net.Util.LuceneTestCase.AssertReaderEquals(String info, IndexReader leftReader, IndexReader rightReader) in D:\a\1\s\src\Lucene.Net.TestFramework\Util\LuceneTestCase.cs:line 2580
at Lucene.Net.Index.TestDuelingCodecs.TestEquals() in D:\a\1\s\src\Lucene.Net.Tests\Index\TestDuelingCodecs.cs:line 176
```
> NOTE: I am working on a PR to fix the random seed functionality #288 now, and the settings in the error message don't exist in master yet.
|
1.0
|
Failing Test: Lucene.Net.Index.TestDuelingCodecs::TestEquals() - > For information about how to help us debug tests, see #269.
This test has been failing randomly for some time but has not previously been documented. The test uses `SimpleText` to compare against all other codecs to ensure they return the same results.
Unfortunately the patch in #541 wasn't the only contributor to this failure.
I have been able to repeat it once with the following info seed and culture info (it failed under x64 .net5.0 Windows that time), but it doesn't fail consistently.
```
Lucene.Net.Tests._E-I - net5.0 - x86 - Windows | Tests failed: 1, passed: 531, ignored: 23TestEquals
Failed 15m ago on WIN-J8N18B59RQM
Duration0:00:02.174
Ownernot available
Date started11/19/2021, 5:47:42 AM
Date completed11/19/2021, 5:47:44 AM
Failing since7m ago
Failing since build4.8.0-ci0000002638
Expected: [31], Actual: [32]
left: SimpleText / right: Lucene46: {titleTokenized=PostingsFormat(name=Asserting), date=PostingsFormat(name=Asserting), body=Pulsing41 (freqCutoff=12, minBlockSize=31, maxBlockSize=87), docid=PostingsFormat(name=Asserting), title=FST41}, docValues:{sparsenumeric=DocValuesFormat(name=Disk), sortedset=DocValuesFormat(name=Asserting), titleDV=DocValuesFormat(name=Disk)}
To reproduce this test result:
Option 1:
Apply the following assembly-level attributes:
[assembly: Lucene.Net.Util.RandomSeed(0x1993c83d13f71207L)]
[assembly: NUnit.Framework.SetCulture("om")]
Option 2:
Use the following .runsettings file:
<RunSettings>
<TestRunParameters>
<Parameter name="tests:seed" value="0x1993c83d13f71207" />
<Parameter name="tests:culture" value="om" />
</TestRunParameters>
</RunSettings>
See the .runsettings documentation at: https://docs.microsoft.com/en-us/visualstudio/test/configure-unit-tests-by-using-a-dot-runsettings-file.
at Lucene.Net.Util.LuceneTestCase.AssertTermsEnumEquals(String info, IndexReader leftReader, TermsEnum leftTermsEnum, TermsEnum rightTermsEnum, Boolean deep) in D:\a\1\s\src\Lucene.Net.TestFramework\Util\LuceneTestCase.cs:line 2732
at Lucene.Net.Util.LuceneTestCase.AssertTermsEquals(String info, IndexReader leftReader, Terms leftTerms, Terms rightTerms, Boolean deep) in D:\a\1\s\src\Lucene.Net.TestFramework\Util\LuceneTestCase.cs:line 2672
at Lucene.Net.Util.LuceneTestCase.AssertFieldsEquals(String info, IndexReader leftReader, Fields leftFields, Fields rightFields, Boolean deep) in D:\a\1\s\src\Lucene.Net.TestFramework\Util\LuceneTestCase.cs:line 2623
at Lucene.Net.Util.LuceneTestCase.AssertReaderEquals(String info, IndexReader leftReader, IndexReader rightReader) in D:\a\1\s\src\Lucene.Net.TestFramework\Util\LuceneTestCase.cs:line 2580
at Lucene.Net.Index.TestDuelingCodecs.TestEquals() in D:\a\1\s\src\Lucene.Net.Tests\Index\TestDuelingCodecs.cs:line 176
```
> NOTE: I am working on a PR to fix the random seed functionality #288 now, and the settings in the error message don't exist in master yet.
|
test
|
failing test lucene net index testduelingcodecs testequals for information about how to help us debug tests see this test has been failing randomly for some time but has not previously been documented the test uses simpletext to compare against all other codecs to ensure they return the same results unfortunately the patch in wasn t the only contributor to this failure i have been able to repeat it once with the following info seed and culture info it failed under windows that time but it doesn t fail consistently lucene net tests e i windows tests failed passed ignored failed ago on win ownernot available date am date am failing ago failing since expected actual left simpletext right titletokenized postingsformat name asserting date postingsformat name asserting body freqcutoff minblocksize maxblocksize docid postingsformat name asserting title docvalues sparsenumeric docvaluesformat name disk sortedset docvaluesformat name asserting titledv docvaluesformat name disk to reproduce this test result option apply the following assembly level attributes option use the following runsettings file see the runsettings documentation at at lucene net util lucenetestcase asserttermsenumequals string info indexreader leftreader termsenum lefttermsenum termsenum righttermsenum boolean deep in d a s src lucene net testframework util lucenetestcase cs line at lucene net util lucenetestcase asserttermsequals string info indexreader leftreader terms leftterms terms rightterms boolean deep in d a s src lucene net testframework util lucenetestcase cs line at lucene net util lucenetestcase assertfieldsequals string info indexreader leftreader fields leftfields fields rightfields boolean deep in d a s src lucene net testframework util lucenetestcase cs line at lucene net util lucenetestcase assertreaderequals string info indexreader leftreader indexreader rightreader in d a s src lucene net testframework util lucenetestcase cs line at lucene net index testduelingcodecs testequals in d a s src lucene net tests index testduelingcodecs cs line note i am working on a pr to fix the random seed functionality now and the settings in the error message don t exist in master yet
| 1
|
59,569
| 6,655,940,145
|
IssuesEvent
|
2017-09-29 18:30:12
|
Microsoft/PTVS
|
https://api.github.com/repos/Microsoft/PTVS
|
closed
|
Non-UI tests no longer time out
|
Tests
|
We have removed our old test settings file, and so now non-ui tests do not time out.
We should create a new runsettings file and enforce a per-test timeout so they don't get stuck forever.
|
1.0
|
Non-UI tests no longer time out - We have removed our old test settings file, and so now non-ui tests do not time out.
We should create a new runsettings file and enforce a per-test timeout so they don't get stuck forever.
|
test
|
non ui tests no longer time out we have removed our old test settings file and so now non ui tests do not time out we should create a new runsettings file and enforce a per test timeout so they don t get stuck forever
| 1
|
126,857
| 10,437,313,574
|
IssuesEvent
|
2019-09-17 21:42:44
|
cockroachdb/cockroach
|
https://api.github.com/repos/cockroachdb/cockroach
|
closed
|
roachtest: acceptance/cli/node-status failed
|
C-test-failure O-roachtest O-robot
|
SHA: https://github.com/cockroachdb/cockroach/commits/bd27eb358f558bb7598945318240335ebcfcdf13
Parameters:
To repro, try:
```
# Don't forget to check out a clean suitable branch and experiment with the
# stress invocation until the desired results present themselves. For example,
# using stress instead of stressrace and passing the '-p' stressflag which
# controls concurrency.
./scripts/gceworker.sh start && ./scripts/gceworker.sh mosh
cd ~/go/src/github.com/cockroachdb/cockroach && \
stdbuf -oL -eL \
make stressrace TESTS=acceptance/cli/node-status PKG=roachtest TESTTIMEOUT=5m STRESSFLAGS='-maxtime 20m -timeout 10m' 2>&1 | tee /tmp/stress.log
```
Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=1446993&tab=buildLog
```
The test failed on branch=provisional_201908202216_v19.2.0-beta.20190826, cloud=gce:
test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/20190821-1446993/acceptance/cli/node-status/run_1
cluster.go:2216,cli.go:108,acceptance.go:69,test_runner.go:673: read tcp 172.17.0.2:49542->35.224.127.40:26257: read: connection reset by peer
```
|
2.0
|
roachtest: acceptance/cli/node-status failed - SHA: https://github.com/cockroachdb/cockroach/commits/bd27eb358f558bb7598945318240335ebcfcdf13
Parameters:
To repro, try:
```
# Don't forget to check out a clean suitable branch and experiment with the
# stress invocation until the desired results present themselves. For example,
# using stress instead of stressrace and passing the '-p' stressflag which
# controls concurrency.
./scripts/gceworker.sh start && ./scripts/gceworker.sh mosh
cd ~/go/src/github.com/cockroachdb/cockroach && \
stdbuf -oL -eL \
make stressrace TESTS=acceptance/cli/node-status PKG=roachtest TESTTIMEOUT=5m STRESSFLAGS='-maxtime 20m -timeout 10m' 2>&1 | tee /tmp/stress.log
```
Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=1446993&tab=buildLog
```
The test failed on branch=provisional_201908202216_v19.2.0-beta.20190826, cloud=gce:
test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/20190821-1446993/acceptance/cli/node-status/run_1
cluster.go:2216,cli.go:108,acceptance.go:69,test_runner.go:673: read tcp 172.17.0.2:49542->35.224.127.40:26257: read: connection reset by peer
```
|
test
|
roachtest acceptance cli node status failed sha parameters to repro try don t forget to check out a clean suitable branch and experiment with the stress invocation until the desired results present themselves for example using stress instead of stressrace and passing the p stressflag which controls concurrency scripts gceworker sh start scripts gceworker sh mosh cd go src github com cockroachdb cockroach stdbuf ol el make stressrace tests acceptance cli node status pkg roachtest testtimeout stressflags maxtime timeout tee tmp stress log failed test the test failed on branch provisional beta cloud gce test artifacts and logs in home agent work go src github com cockroachdb cockroach artifacts acceptance cli node status run cluster go cli go acceptance go test runner go read tcp read connection reset by peer
| 1
|
230,261
| 18,527,319,109
|
IssuesEvent
|
2021-10-20 22:28:29
|
elastic/kibana
|
https://api.github.com/repos/elastic/kibana
|
closed
|
Failing test: X-Pack Detection Engine API Integration Tests.x-pack/test/detection_engine_api_integration/security_and_spaces/tests/exception_operators_data_types/text·ts - detection engine api security and spaces enabled Detection exceptions data types and operators Rule exception operators for data type text "is one of" operator should filter 2 text if both are set as exceptions
|
failed-test Team:SIEM Team: SecuritySolution Team:Detection Rules
|
A test failed on a tracked branch
```
Error: expected 200 "OK", got 409 "Conflict"
at Test._assertStatus (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:268:12)
at Test._assertFunction (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:283:11)
at Test.assert (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:173:18)
at assert (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:131:12)
at /opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:128:5
at Test.Request.callback (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:718:3)
at /opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:906:18
at IncomingMessage.<anonymous> (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/node_modules/superagent/lib/node/parsers/json.js:19:7)
at IncomingMessage.emit (node:events:402:35)
at endReadableNT (node:internal/streams/readable:1343:12)
at processTicksAndRejections (node:internal/process/task_queues:83:21)
```
First failure: [CI Build - master](https://buildkite.com/elastic/kibana-hourly/builds/1654#77505f58-71ec-4919-818d-f66ce74fd9d5)
<!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Detection Engine API Integration Tests.x-pack/test/detection_engine_api_integration/security_and_spaces/tests/exception_operators_data_types/text·ts","test.name":"detection engine api security and spaces enabled Detection exceptions data types and operators Rule exception operators for data type text \"is one of\" operator should filter 2 text if both are set as exceptions","test.failCount":1}} -->
|
1.0
|
Failing test: X-Pack Detection Engine API Integration Tests.x-pack/test/detection_engine_api_integration/security_and_spaces/tests/exception_operators_data_types/text·ts - detection engine api security and spaces enabled Detection exceptions data types and operators Rule exception operators for data type text "is one of" operator should filter 2 text if both are set as exceptions - A test failed on a tracked branch
```
Error: expected 200 "OK", got 409 "Conflict"
at Test._assertStatus (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:268:12)
at Test._assertFunction (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:283:11)
at Test.assert (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:173:18)
at assert (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:131:12)
at /opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/lib/test.js:128:5
at Test.Request.callback (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:718:3)
at /opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:906:18
at IncomingMessage.<anonymous> (/opt/local-ssd/buildkite/builds/kb-cigroup-6-ad0cfbfd5d19950a/elastic/kibana-hourly/kibana/node_modules/supertest/node_modules/superagent/lib/node/parsers/json.js:19:7)
at IncomingMessage.emit (node:events:402:35)
at endReadableNT (node:internal/streams/readable:1343:12)
at processTicksAndRejections (node:internal/process/task_queues:83:21)
```
First failure: [CI Build - master](https://buildkite.com/elastic/kibana-hourly/builds/1654#77505f58-71ec-4919-818d-f66ce74fd9d5)
<!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Detection Engine API Integration Tests.x-pack/test/detection_engine_api_integration/security_and_spaces/tests/exception_operators_data_types/text·ts","test.name":"detection engine api security and spaces enabled Detection exceptions data types and operators Rule exception operators for data type text \"is one of\" operator should filter 2 text if both are set as exceptions","test.failCount":1}} -->
|
test
|
failing test x pack detection engine api integration tests x pack test detection engine api integration security and spaces tests exception operators data types text·ts detection engine api security and spaces enabled detection exceptions data types and operators rule exception operators for data type text is one of operator should filter text if both are set as exceptions a test failed on a tracked branch error expected ok got conflict at test assertstatus opt local ssd buildkite builds kb cigroup elastic kibana hourly kibana node modules supertest lib test js at test assertfunction opt local ssd buildkite builds kb cigroup elastic kibana hourly kibana node modules supertest lib test js at test assert opt local ssd buildkite builds kb cigroup elastic kibana hourly kibana node modules supertest lib test js at assert opt local ssd buildkite builds kb cigroup elastic kibana hourly kibana node modules supertest lib test js at opt local ssd buildkite builds kb cigroup elastic kibana hourly kibana node modules supertest lib test js at test request callback opt local ssd buildkite builds kb cigroup elastic kibana hourly kibana node modules supertest node modules superagent lib node index js at opt local ssd buildkite builds kb cigroup elastic kibana hourly kibana node modules supertest node modules superagent lib node index js at incomingmessage opt local ssd buildkite builds kb cigroup elastic kibana hourly kibana node modules supertest node modules superagent lib node parsers json js at incomingmessage emit node events at endreadablent node internal streams readable at processticksandrejections node internal process task queues first failure
| 1
|
125,309
| 4,955,395,116
|
IssuesEvent
|
2016-12-01 20:17:20
|
yairodriguez/AngularJS
|
https://api.github.com/repos/yairodriguez/AngularJS
|
opened
|
Components
|
[priority] low [status] accepted [type] feature
|
### Description
Implements the component API introduced in Angular 1.5 that solidifies best practice patterns, streamlines APIs, and allows for more performant code to be written through hooks such as `$onChanges`. Everything in the component API is really just a relatively thin layer on top of existing directive and controller code.
---
### Issue Checklist
- [ ] About the reasons behind the introduction of the component API.
- [ ] How components can be registered in modules.
- [ ] That components are really just directives under the hood.
- [ ] How components are restricted so they can only be applied to elements, not attributes or classes.
- [ ] That a component always has an isolate scope.
- [ ] How component bindings are defined through the `bindings` object, and that they are always bound to the controller.
- [ ] That controller aliasing works for component just like it does for regular directives.
- [ ] That component controllers always have an alias, and how it is assigned to `$ctrl` by default.
- [ ] That components may have templates and template URLs.
- [ ] That the component template or template URL can be defined using a dependency–injected function.
- [ ] How the `$element` and `$attrs` injection locals are made available to the component template or template URL function.
- [ ] That components support transclusion like regular directives.
- [ ] That components support `require` like regular directives.
- [ ] That all component lifecycle hooks also work on regular directives.
- [ ] How the ´$onInit´ lifecycle hook works: by being called after the whole element has initialised, before linking.
- [ ] How the `$onDestroy` lifecycle hook works: by tapping into the `$destroy` event of the scope.
- [ ] How the `$postLink` lifecycle hook works: by being called after called after the element and all children have been linked and all post-link functions have been invoked.
- [ ] How the `$onChanges` lifecycle hook works: by being called with change record when changes occur.
- [ ] That the `$onChanges` hook is first called when the controller bindings are initialized.
- [ ] That the change records given to `$onChanges` are actually instances of a `SimpleChange` constructor, and have and `isFirstChange()` method available.
- [ ] How `$onChanges` is invoked in a separate digest after changes have been processed.
- [ ] How all the changes from a single digest are batched together using an internal queue inside the compiler.
- [ ] How cycles between `$onChanges` and bindings are protected against with a **TTL**, which is separate from the scope TTL.
- [ ] How the `$onChanges` TTL can be configured.
All issues in milestone: [0.6.0 milestone](https://github.com/yairodriguez/AngularJS/milestone/6)
---
### Assignees
- [ ] Final assign @yairodriguez
|
1.0
|
Components - ### Description
Implements the component API introduced in Angular 1.5 that solidifies best practice patterns, streamlines APIs, and allows for more performant code to be written through hooks such as `$onChanges`. Everything in the component API is really just a relatively thin layer on top of existing directive and controller code.
---
### Issue Checklist
- [ ] About the reasons behind the introduction of the component API.
- [ ] How components can be registered in modules.
- [ ] That components are really just directives under the hood.
- [ ] How components are restricted so they can only be applied to elements, not attributes or classes.
- [ ] That a component always has an isolate scope.
- [ ] How component bindings are defined through the `bindings` object, and that they are always bound to the controller.
- [ ] That controller aliasing works for component just like it does for regular directives.
- [ ] That component controllers always have an alias, and how it is assigned to `$ctrl` by default.
- [ ] That components may have templates and template URLs.
- [ ] That the component template or template URL can be defined using a dependency–injected function.
- [ ] How the `$element` and `$attrs` injection locals are made available to the component template or template URL function.
- [ ] That components support transclusion like regular directives.
- [ ] That components support `require` like regular directives.
- [ ] That all component lifecycle hooks also work on regular directives.
- [ ] How the ´$onInit´ lifecycle hook works: by being called after the whole element has initialised, before linking.
- [ ] How the `$onDestroy` lifecycle hook works: by tapping into the `$destroy` event of the scope.
- [ ] How the `$postLink` lifecycle hook works: by being called after called after the element and all children have been linked and all post-link functions have been invoked.
- [ ] How the `$onChanges` lifecycle hook works: by being called with change record when changes occur.
- [ ] That the `$onChanges` hook is first called when the controller bindings are initialized.
- [ ] That the change records given to `$onChanges` are actually instances of a `SimpleChange` constructor, and have and `isFirstChange()` method available.
- [ ] How `$onChanges` is invoked in a separate digest after changes have been processed.
- [ ] How all the changes from a single digest are batched together using an internal queue inside the compiler.
- [ ] How cycles between `$onChanges` and bindings are protected against with a **TTL**, which is separate from the scope TTL.
- [ ] How the `$onChanges` TTL can be configured.
All issues in milestone: [0.6.0 milestone](https://github.com/yairodriguez/AngularJS/milestone/6)
---
### Assignees
- [ ] Final assign @yairodriguez
|
non_test
|
components description implements the component api introduced in angular that solidifies best practice patterns streamlines apis and allows for more performant code to be written through hooks such as onchanges everything in the component api is really just a relatively thin layer on top of existing directive and controller code issue checklist about the reasons behind the introduction of the component api how components can be registered in modules that components are really just directives under the hood how components are restricted so they can only be applied to elements not attributes or classes that a component always has an isolate scope how component bindings are defined through the bindings object and that they are always bound to the controller that controller aliasing works for component just like it does for regular directives that component controllers always have an alias and how it is assigned to ctrl by default that components may have templates and template urls that the component template or template url can be defined using a dependency–injected function how the element and attrs injection locals are made available to the component template or template url function that components support transclusion like regular directives that components support require like regular directives that all component lifecycle hooks also work on regular directives how the ´ oninit´ lifecycle hook works by being called after the whole element has initialised before linking how the ondestroy lifecycle hook works by tapping into the destroy event of the scope how the postlink lifecycle hook works by being called after called after the element and all children have been linked and all post link functions have been invoked how the onchanges lifecycle hook works by being called with change record when changes occur that the onchanges hook is first called when the controller bindings are initialized that the change records given to onchanges are actually instances of a simplechange constructor and have and isfirstchange method available how onchanges is invoked in a separate digest after changes have been processed how all the changes from a single digest are batched together using an internal queue inside the compiler how cycles between onchanges and bindings are protected against with a ttl which is separate from the scope ttl how the onchanges ttl can be configured all issues in milestone assignees final assign yairodriguez
| 0
|
22,243
| 3,619,269,969
|
IssuesEvent
|
2016-02-08 15:26:05
|
pavva94/snake-os
|
https://api.github.com/repos/pavva94/snake-os
|
closed
|
FTP not running after admin port change
|
auto-migrated Priority-Medium Type-Defect
|
```
What steps will reproduce the problem?
1. Change HTTP Web Admin port: to 802
2. Save config, restart
3. FTP deamon couldn't be started.
What is the expected output? What do you see instead?
FTP should be able to run
What version of the product are you using? On what operating system?
Kernel version: 2.6.16-gazineu
NAS version: SNAKE OS V1.3.2 (20111019)
Storage Name: snake
Physical RAM: Total: 30444KB - Free: 23220KB - Buffers: 740KB - Cached: 1976KB
Swapfile: Total: 262136KB - Free: 262136KB
Uptime: 30 min
```
Original issue reported on code.google.com by `mrx23dot` on 1 Apr 2014 at 6:02
|
1.0
|
FTP not running after admin port change - ```
What steps will reproduce the problem?
1. Change HTTP Web Admin port: to 802
2. Save config, restart
3. FTP deamon couldn't be started.
What is the expected output? What do you see instead?
FTP should be able to run
What version of the product are you using? On what operating system?
Kernel version: 2.6.16-gazineu
NAS version: SNAKE OS V1.3.2 (20111019)
Storage Name: snake
Physical RAM: Total: 30444KB - Free: 23220KB - Buffers: 740KB - Cached: 1976KB
Swapfile: Total: 262136KB - Free: 262136KB
Uptime: 30 min
```
Original issue reported on code.google.com by `mrx23dot` on 1 Apr 2014 at 6:02
|
non_test
|
ftp not running after admin port change what steps will reproduce the problem change http web admin port to save config restart ftp deamon couldn t be started what is the expected output what do you see instead ftp should be able to run what version of the product are you using on what operating system kernel version gazineu nas version snake os storage name snake physical ram total free buffers cached swapfile total free uptime min original issue reported on code google com by on apr at
| 0
|
100,196
| 8,724,974,327
|
IssuesEvent
|
2018-12-10 07:51:42
|
humera987/FXLabs-Test-Automation
|
https://api.github.com/repos/humera987/FXLabs-Test-Automation
|
closed
|
testing10 : ApiV1IssueTrackersGetQueryParamPageInvalidDatatype
|
testing10
|
Project : testing10
Job : UAT
Env : UAT
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=NTU4ODIzYjgtNDBhOC00NjliLWFkMDYtY2E1OTQxYzY1NmNj; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Mon, 10 Dec 2018 05:33:23 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/issue-trackers?page=Y5nttL
Request :
Response :
{
"timestamp" : "2018-12-10T05:33:24.542+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/issue-trackers"
}
Logs :
Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot ---
|
1.0
|
testing10 : ApiV1IssueTrackersGetQueryParamPageInvalidDatatype - Project : testing10
Job : UAT
Env : UAT
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=NTU4ODIzYjgtNDBhOC00NjliLWFkMDYtY2E1OTQxYzY1NmNj; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Mon, 10 Dec 2018 05:33:23 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/issue-trackers?page=Y5nttL
Request :
Response :
{
"timestamp" : "2018-12-10T05:33:24.542+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/issue-trackers"
}
Logs :
Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot ---
|
test
|
project job uat env uat region us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options set cookie content type transfer encoding date endpoint request response timestamp status error not found message no message available path api api issue trackers logs assertion resolved to result assertion resolved to result fx bot
| 1
|
9,431
| 3,040,261,930
|
IssuesEvent
|
2015-08-07 14:30:48
|
SockDrawer/SockBot
|
https://api.github.com/repos/SockDrawer/SockBot
|
opened
|
Discourse in a box
|
ready Tests
|
1. Cut a hole in a box
2. Put discourse in that box
3. Make sockbot open the box
and that's the way you do it!
(AKA: bundle a vagrantfile that will run a local discourse install so we can integration test against an actual Discourse instance before unleashing someplace that matters)
|
1.0
|
Discourse in a box - 1. Cut a hole in a box
2. Put discourse in that box
3. Make sockbot open the box
and that's the way you do it!
(AKA: bundle a vagrantfile that will run a local discourse install so we can integration test against an actual Discourse instance before unleashing someplace that matters)
|
test
|
discourse in a box cut a hole in a box put discourse in that box make sockbot open the box and that s the way you do it aka bundle a vagrantfile that will run a local discourse install so we can integration test against an actual discourse instance before unleashing someplace that matters
| 1
|
173,603
| 21,176,957,243
|
IssuesEvent
|
2022-04-08 01:40:49
|
turkdevops/cloudflare-docs
|
https://api.github.com/repos/turkdevops/cloudflare-docs
|
opened
|
CVE-2022-24785 (High) detected in moment-2.29.1.tgz
|
security vulnerability
|
## CVE-2022-24785 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-2.29.1.tgz</b></p></summary>
<p>Parse, validate, manipulate, and display dates</p>
<p>Library home page: <a href="https://registry.npmjs.org/moment/-/moment-2.29.1.tgz">https://registry.npmjs.org/moment/-/moment-2.29.1.tgz</a></p>
<p>Path to dependency file: /products/client-ip-geolocation/package.json</p>
<p>Path to vulnerable library: /products/client-ip-geolocation/node_modules/moment/package.json,/products/api-security/node_modules/moment/package.json,/products/warp-client/node_modules/moment/package.json,/products/bots/node_modules/moment/package.json,/products/magic-wan/node_modules/moment/package.json,/products/stream/node_modules/moment/package.json,/products/cloudflare-one/node_modules/moment/package.json,/products/terraform/node_modules/moment/package.json,/products/byoip/node_modules/moment/package.json,/products/spectrum/node_modules/moment/package.json,/products/network-interconnect/node_modules/moment/package.json,/products/waiting-room/node_modules/moment/package.json,/products/http3/node_modules/moment/package.json,/products/image-resizing/node_modules/moment/package.json,/products/cache/node_modules/moment/package.json,/products/access/node_modules/moment/package.json,/products/images/node_modules/moment/package.json,/products/magic-transit/node_modules/moment/package.json,/products/pages/node_modules/moment/package.json,/products/api/node_modules/moment/package.json,/products/docs-engine/node_modules/moment/package.json,/products/logs/node_modules/moment/package.json,/products/fundamentals/node_modules/moment/package.json,/products/browser-isolation/node_modules/moment/package.json,/products/partners/node_modules/moment/package.json,/products/distributed-web/node_modules/moment/package.json,/products/time-services/node_modules/moment/package.json,/products/automatic-platform-optimization/node_modules/moment/package.json,/products/tenant/node_modules/moment/package.json,/products/railgun/node_modules/moment/package.json,/products/analytics/node_modules/moment/package.json,/products/firewall/node_modules/moment/package.json,/products/rules/node_modules/moment/package.json,/developers.cloudflare.com/node_modules/moment/package.json,/products/ssl/node_modules/moment/package.json,/products/registrar/node_modules/moment/package.json,/products/randomness-beacon/node_modules/moment/package.json,/products/page-shield/node_modules/moment/package.json,/products/waf/node_modules/moment/package.json,/products/workers/node_modules/moment/package.json,/products/magic-firewall/node_modules/moment/package.json,/products/events/node_modules/moment/package.json,/products/1.1.1.1/node_modules/moment/package.json,/products/load-balancing/node_modules/moment/package.json</p>
<p>
Dependency Hierarchy:
<p>Found in base branch: <b>production</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
<p>Publish Date: 2022-04-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24785>CVE-2022-24785</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4">https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4</a></p>
<p>Release Date: 2022-04-04</p>
<p>Fix Resolution: moment - 2.29.2,Moment.js - 2.29.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-24785 (High) detected in moment-2.29.1.tgz - ## CVE-2022-24785 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-2.29.1.tgz</b></p></summary>
<p>Parse, validate, manipulate, and display dates</p>
<p>Library home page: <a href="https://registry.npmjs.org/moment/-/moment-2.29.1.tgz">https://registry.npmjs.org/moment/-/moment-2.29.1.tgz</a></p>
<p>Path to dependency file: /products/client-ip-geolocation/package.json</p>
<p>Path to vulnerable library: /products/client-ip-geolocation/node_modules/moment/package.json,/products/api-security/node_modules/moment/package.json,/products/warp-client/node_modules/moment/package.json,/products/bots/node_modules/moment/package.json,/products/magic-wan/node_modules/moment/package.json,/products/stream/node_modules/moment/package.json,/products/cloudflare-one/node_modules/moment/package.json,/products/terraform/node_modules/moment/package.json,/products/byoip/node_modules/moment/package.json,/products/spectrum/node_modules/moment/package.json,/products/network-interconnect/node_modules/moment/package.json,/products/waiting-room/node_modules/moment/package.json,/products/http3/node_modules/moment/package.json,/products/image-resizing/node_modules/moment/package.json,/products/cache/node_modules/moment/package.json,/products/access/node_modules/moment/package.json,/products/images/node_modules/moment/package.json,/products/magic-transit/node_modules/moment/package.json,/products/pages/node_modules/moment/package.json,/products/api/node_modules/moment/package.json,/products/docs-engine/node_modules/moment/package.json,/products/logs/node_modules/moment/package.json,/products/fundamentals/node_modules/moment/package.json,/products/browser-isolation/node_modules/moment/package.json,/products/partners/node_modules/moment/package.json,/products/distributed-web/node_modules/moment/package.json,/products/time-services/node_modules/moment/package.json,/products/automatic-platform-optimization/node_modules/moment/package.json,/products/tenant/node_modules/moment/package.json,/products/railgun/node_modules/moment/package.json,/products/analytics/node_modules/moment/package.json,/products/firewall/node_modules/moment/package.json,/products/rules/node_modules/moment/package.json,/developers.cloudflare.com/node_modules/moment/package.json,/products/ssl/node_modules/moment/package.json,/products/registrar/node_modules/moment/package.json,/products/randomness-beacon/node_modules/moment/package.json,/products/page-shield/node_modules/moment/package.json,/products/waf/node_modules/moment/package.json,/products/workers/node_modules/moment/package.json,/products/magic-firewall/node_modules/moment/package.json,/products/events/node_modules/moment/package.json,/products/1.1.1.1/node_modules/moment/package.json,/products/load-balancing/node_modules/moment/package.json</p>
<p>
Dependency Hierarchy:
<p>Found in base branch: <b>production</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
<p>Publish Date: 2022-04-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24785>CVE-2022-24785</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4">https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4</a></p>
<p>Release Date: 2022-04-04</p>
<p>Fix Resolution: moment - 2.29.2,Moment.js - 2.29.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_test
|
cve high detected in moment tgz cve high severity vulnerability vulnerable library moment tgz parse validate manipulate and display dates library home page a href path to dependency file products client ip geolocation package json path to vulnerable library products client ip geolocation node modules moment package json products api security node modules moment package json products warp client node modules moment package json products bots node modules moment package json products magic wan node modules moment package json products stream node modules moment package json products cloudflare one node modules moment package json products terraform node modules moment package json products byoip node modules moment package json products spectrum node modules moment package json products network interconnect node modules moment package json products waiting room node modules moment package json products node modules moment package json products image resizing node modules moment package json products cache node modules moment package json products access node modules moment package json products images node modules moment package json products magic transit node modules moment package json products pages node modules moment package json products api node modules moment package json products docs engine node modules moment package json products logs node modules moment package json products fundamentals node modules moment package json products browser isolation node modules moment package json products partners node modules moment package json products distributed web node modules moment package json products time services node modules moment package json products automatic platform optimization node modules moment package json products tenant node modules moment package json products railgun node modules moment package json products analytics node modules moment package json products firewall node modules moment package json products rules node modules moment package json developers cloudflare com node modules moment package json products ssl node modules moment package json products registrar node modules moment package json products randomness beacon node modules moment package json products page shield node modules moment package json products waf node modules moment package json products workers node modules moment package json products magic firewall node modules moment package json products events node modules moment package json products node modules moment package json products load balancing node modules moment package json dependency hierarchy found in base branch production vulnerability details moment js is a javascript date library for parsing validating manipulating and formatting dates a path traversal vulnerability impacts npm server users of moment js between versions and especially if a user provided locale string is directly used to switch moment locale this problem is patched in and the patch can be applied to all affected versions as a workaround sanitize the user provided locale name before passing it to moment js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution moment moment js step up your open source security game with whitesource
| 0
|
22,221
| 7,133,872,005
|
IssuesEvent
|
2018-01-22 18:54:45
|
quikserve/Captain-Awesome
|
https://api.github.com/repos/quikserve/Captain-Awesome
|
opened
|
TJ JAT Request 2/1/18
|
Databuilding New Button
|
I am hoping I can still get this programmed by the first of the month, but we are running a 5 Tacos for $5.55 after 5pm promotion in February and I am hoping we can still get some buttons for this. I apologize for the delay but it has taken some time to get this through TJI with some of the recent changes in personnel.
Is it possible to get those buttons for both Crispy Tacos, Softshell Tacos, and a MIXED button?
Appreciate the help, thank you!
Aaron Holthaus
|
1.0
|
TJ JAT Request 2/1/18 - I am hoping I can still get this programmed by the first of the month, but we are running a 5 Tacos for $5.55 after 5pm promotion in February and I am hoping we can still get some buttons for this. I apologize for the delay but it has taken some time to get this through TJI with some of the recent changes in personnel.
Is it possible to get those buttons for both Crispy Tacos, Softshell Tacos, and a MIXED button?
Appreciate the help, thank you!
Aaron Holthaus
|
non_test
|
tj jat request i am hoping i can still get this programmed by the first of the month but we are running a tacos for after promotion in february and i am hoping we can still get some buttons for this i apologize for the delay but it has taken some time to get this through tji with some of the recent changes in personnel is it possible to get those buttons for both crispy tacos softshell tacos and a mixed button appreciate the help thank you aaron holthaus
| 0
|
368,611
| 10,882,000,212
|
IssuesEvent
|
2019-11-17 21:17:54
|
google/ground-android
|
https://api.github.com/repos/google/ground-android
|
opened
|
[Dev Setup] gnd/google-services.json not in .gitignore
|
priority: p1 type: bug
|
Hi @shobhitagarwal1612! I just realized that the README recommends we put our real `google-services.json` in `gnd/`, but that file is now not ignored in .gitignore. How do we prevent ourselves from accidentally checking our real config files in source control in this case?
@scolsen FYI.
|
1.0
|
[Dev Setup] gnd/google-services.json not in .gitignore - Hi @shobhitagarwal1612! I just realized that the README recommends we put our real `google-services.json` in `gnd/`, but that file is now not ignored in .gitignore. How do we prevent ourselves from accidentally checking our real config files in source control in this case?
@scolsen FYI.
|
non_test
|
gnd google services json not in gitignore hi i just realized that the readme recommends we put our real google services json in gnd but that file is now not ignored in gitignore how do we prevent ourselves from accidentally checking our real config files in source control in this case scolsen fyi
| 0
|
202,573
| 7,049,851,721
|
IssuesEvent
|
2018-01-03 00:58:17
|
wso2/product-apim
|
https://api.github.com/repos/wso2/product-apim
|
opened
|
Invalid Current State in publisher lifecycle
|
2.2.0 Priority/High Severity/Major Type/Bug
|
**Description:**
Invalid Current State in publisher's API lifecycle section once run the sample-scenario 7
_Note: we have a custom lifecycle state in this sample_
**Affected Version**
2.1.0-update4
**Steps to reproduce:**
1. Run the sample-scenario 7
2. Go to the publisher and click on the API Sales_promotions_API - 1.0.0
Both Current State label and lifecycle view are not correct with the state but lifecycle history captures the state change correctly.
please see the below image.

|
1.0
|
Invalid Current State in publisher lifecycle - **Description:**
Invalid Current State in publisher's API lifecycle section once run the sample-scenario 7
_Note: we have a custom lifecycle state in this sample_
**Affected Version**
2.1.0-update4
**Steps to reproduce:**
1. Run the sample-scenario 7
2. Go to the publisher and click on the API Sales_promotions_API - 1.0.0
Both Current State label and lifecycle view are not correct with the state but lifecycle history captures the state change correctly.
please see the below image.

|
non_test
|
invalid current state in publisher lifecycle description invalid current state in publisher s api lifecycle section once run the sample scenario note we have a custom lifecycle state in this sample affected version steps to reproduce run the sample scenario go to the publisher and click on the api sales promotions api both current state label and lifecycle view are not correct with the state but lifecycle history captures the state change correctly please see the below image
| 0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.