Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
4
112
repo_url
stringlengths
33
141
action
stringclasses
3 values
title
stringlengths
1
1.02k
labels
stringlengths
4
1.54k
body
stringlengths
1
262k
index
stringclasses
17 values
text_combine
stringlengths
95
262k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
149,102
19,565,302,096
IssuesEvent
2022-01-03 22:52:31
ghc-dev/Ashley-Barrett
https://api.github.com/repos/ghc-dev/Ashley-Barrett
opened
WS-2018-0590 (High) detected in diff-1.3.2.tgz
security vulnerability
## WS-2018-0590 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>diff-1.3.2.tgz</b></p></summary> <p>A javascript text diff implementation.</p> <p>Library home page: <a href="https://registry.npmjs.org/diff/-/diff-1.3.2.tgz">https://registry.npmjs.org/diff/-/diff-1.3.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/diff/package.json</p> <p> Dependency Hierarchy: - grunt-autoprefixer-3.0.4.tgz (Root Library) - :x: **diff-1.3.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Ashley-Barrett/commit/2785ec46344553450b12c57f3fe8c94dfb74fdaa">2785ec46344553450b12c57f3fe8c94dfb74fdaa</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. <p>Publish Date: 2018-03-05 <p>URL: <a href=https://bugzilla.redhat.com/show_bug.cgi?id=1552148>WS-2018-0590</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0">https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0</a></p> <p>Release Date: 2018-03-05</p> <p>Fix Resolution: 3.5.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"diff","packageVersion":"1.3.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-autoprefixer:3.0.4;diff:1.3.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.5.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2018-0590","vulnerabilityDetails":"A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.","vulnerabilityUrl":"https://bugzilla.redhat.com/show_bug.cgi?id\u003d1552148","cvss2Severity":"high","cvss2Score":"7.0","extraData":{}}</REMEDIATE> -->
True
WS-2018-0590 (High) detected in diff-1.3.2.tgz - ## WS-2018-0590 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>diff-1.3.2.tgz</b></p></summary> <p>A javascript text diff implementation.</p> <p>Library home page: <a href="https://registry.npmjs.org/diff/-/diff-1.3.2.tgz">https://registry.npmjs.org/diff/-/diff-1.3.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/diff/package.json</p> <p> Dependency Hierarchy: - grunt-autoprefixer-3.0.4.tgz (Root Library) - :x: **diff-1.3.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Ashley-Barrett/commit/2785ec46344553450b12c57f3fe8c94dfb74fdaa">2785ec46344553450b12c57f3fe8c94dfb74fdaa</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. <p>Publish Date: 2018-03-05 <p>URL: <a href=https://bugzilla.redhat.com/show_bug.cgi?id=1552148>WS-2018-0590</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0">https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0</a></p> <p>Release Date: 2018-03-05</p> <p>Fix Resolution: 3.5.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"diff","packageVersion":"1.3.2","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-autoprefixer:3.0.4;diff:1.3.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.5.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2018-0590","vulnerabilityDetails":"A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.","vulnerabilityUrl":"https://bugzilla.redhat.com/show_bug.cgi?id\u003d1552148","cvss2Severity":"high","cvss2Score":"7.0","extraData":{}}</REMEDIATE> -->
non_test
ws high detected in diff tgz ws high severity vulnerability vulnerable library diff tgz a javascript text diff implementation library home page a href path to dependency file package json path to vulnerable library node modules diff package json dependency hierarchy grunt autoprefixer tgz root library x diff tgz vulnerable library found in head commit a href found in base branch master vulnerability details a vulnerability was found in diff before the affected versions of this package are vulnerable to regular expression denial of service redos attacks publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree grunt autoprefixer diff isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails a vulnerability was found in diff before the affected versions of this package are vulnerable to regular expression denial of service redos attacks vulnerabilityurl
0
81,275
10,115,945,383
IssuesEvent
2019-07-30 23:40:19
microsoft/microsoft-ui-xaml
https://api.github.com/repos/microsoft/microsoft-ui-xaml
reopened
Proposal: Update hover visual
area-UIDesign feature proposal
## Summary Update the hover visual to align more with the depth model. When item is hovered over, the item is lifted. When you get closer to the item, the color becomes lighter. ## Rationale * The button today indicates hover via grid border lines. Removed the border and using color is more coherent and consistent. * Follows the other control updates being proposed.
1.0
Proposal: Update hover visual - ## Summary Update the hover visual to align more with the depth model. When item is hovered over, the item is lifted. When you get closer to the item, the color becomes lighter. ## Rationale * The button today indicates hover via grid border lines. Removed the border and using color is more coherent and consistent. * Follows the other control updates being proposed.
non_test
proposal update hover visual summary update the hover visual to align more with the depth model when item is hovered over the item is lifted when you get closer to the item the color becomes lighter rationale the button today indicates hover via grid border lines removed the border and using color is more coherent and consistent follows the other control updates being proposed
0
244,775
20,711,748,093
IssuesEvent
2022-03-12 02:24:09
Uuvana-Studios/longvinter-windows-client
https://api.github.com/repos/Uuvana-Studios/longvinter-windows-client
opened
Shop Can't Be Closed
bug Not Tested
**Describe the bug** A's Farming shop can't be closed **To Reproduce** Steps to reproduce the behavior: 1. Go to 'A's Farming Shop' 2. Click on the shop twice in quick succession **Expected behavior** The shop can't be closed even if you walk away. **Screenshots** ![image](https://user-images.githubusercontent.com/88564659/158000137-8c61da3d-337d-46df-809f-55c26880a212.png) **Desktop (please complete the following information):** - OS: Windows - Game Version 1.0.0 - Steam Version 020
1.0
Shop Can't Be Closed - **Describe the bug** A's Farming shop can't be closed **To Reproduce** Steps to reproduce the behavior: 1. Go to 'A's Farming Shop' 2. Click on the shop twice in quick succession **Expected behavior** The shop can't be closed even if you walk away. **Screenshots** ![image](https://user-images.githubusercontent.com/88564659/158000137-8c61da3d-337d-46df-809f-55c26880a212.png) **Desktop (please complete the following information):** - OS: Windows - Game Version 1.0.0 - Steam Version 020
test
shop can t be closed describe the bug a s farming shop can t be closed to reproduce steps to reproduce the behavior go to a s farming shop click on the shop twice in quick succession expected behavior the shop can t be closed even if you walk away screenshots desktop please complete the following information os windows game version steam version
1
61,479
7,471,331,007
IssuesEvent
2018-04-03 08:56:06
rafgardom/ISPP-Makai
https://api.github.com/repos/rafgardom/ISPP-Makai
closed
No se tabula los textos muy grandes
design
Si se crea un texto muy grande y se visualiza, tienes que mover el navegador con el scrollback hacia el lado para poder ver todo el texto al completo. Esto se puede comprobar por ejemplo cuando se visualiza una Request con una descripción muy grande. ![image](https://user-images.githubusercontent.com/26336058/38166111-9879cc02-351e-11e8-81df-3a0aa2e82baa.png)
1.0
No se tabula los textos muy grandes - Si se crea un texto muy grande y se visualiza, tienes que mover el navegador con el scrollback hacia el lado para poder ver todo el texto al completo. Esto se puede comprobar por ejemplo cuando se visualiza una Request con una descripción muy grande. ![image](https://user-images.githubusercontent.com/26336058/38166111-9879cc02-351e-11e8-81df-3a0aa2e82baa.png)
non_test
no se tabula los textos muy grandes si se crea un texto muy grande y se visualiza tienes que mover el navegador con el scrollback hacia el lado para poder ver todo el texto al completo esto se puede comprobar por ejemplo cuando se visualiza una request con una descripción muy grande
0
21,433
3,508,477,923
IssuesEvent
2016-01-08 18:02:11
nikizkyl/z4root
https://api.github.com/repos/nikizkyl/z4root
closed
z4root download
auto-migrated Priority-Medium Type-Defect
``` What steps will reproduce the problem? 1. 2. 3. What is the expected output? What do you see instead? What version of the product are you using? On what operating system? Please provide any additional information below. ``` Original issue reported on code.google.com by `dennis.h...@gmail.com` on 28 Feb 2015 at 4:58
1.0
z4root download - ``` What steps will reproduce the problem? 1. 2. 3. What is the expected output? What do you see instead? What version of the product are you using? On what operating system? Please provide any additional information below. ``` Original issue reported on code.google.com by `dennis.h...@gmail.com` on 28 Feb 2015 at 4:58
non_test
download what steps will reproduce the problem what is the expected output what do you see instead what version of the product are you using on what operating system please provide any additional information below original issue reported on code google com by dennis h gmail com on feb at
0
298,142
25,792,906,729
IssuesEvent
2022-12-10 08:34:24
notofonts/armenian
https://api.github.com/repos/notofonts/armenian
closed
Add test cases for Armenian GPOS/GSUB?
help wanted Script-Armenian TestSuite-Candidate A:Shaping
@marekjez86, in https://github.com/googlei18n/noto-fonts/pull/862#issuecomment-284557864 there was a concern that Noto Armenian may need contextual glyph substitution and positioning. Mind following up on this, and adding test cases to https://github.com/googlei18n/noto-source/tree/master/test/Armenian if needed?
1.0
Add test cases for Armenian GPOS/GSUB? - @marekjez86, in https://github.com/googlei18n/noto-fonts/pull/862#issuecomment-284557864 there was a concern that Noto Armenian may need contextual glyph substitution and positioning. Mind following up on this, and adding test cases to https://github.com/googlei18n/noto-source/tree/master/test/Armenian if needed?
test
add test cases for armenian gpos gsub in there was a concern that noto armenian may need contextual glyph substitution and positioning mind following up on this and adding test cases to if needed
1
109,878
9,417,692,983
IssuesEvent
2019-04-10 17:21:33
einsteinpy/einsteinpy
https://api.github.com/repos/einsteinpy/einsteinpy
closed
Remove all the unnecessary pytest.mark.parametrize
development good first issue tests
🐞 **Problem** Tests are currently parametrized on single set of values. `pytest.mark.parametrize` has a different essence. Remove the redundant test data from everywhere. Add pytest fixtures wherever required. https://docs.pytest.org/en/latest/parametrize.html 🎯 **Goal** <!--- Why is this change important to you? How would you use it? --> <!--- How can it benefit other users? --> 💡 **Possible solutions** <!--- Not obligatory, but suggest an idea for implementing addition or change --> 📋 **Steps to solve the problem** * Comment below about what you've started working on. * Add, commit, push your changes * Submit a pull request and add this in comments - `Addresses #<put issue number here>` * Ask for a review in comments section of pull request * Celebrate your contribution to this project 🎉
1.0
Remove all the unnecessary pytest.mark.parametrize - 🐞 **Problem** Tests are currently parametrized on single set of values. `pytest.mark.parametrize` has a different essence. Remove the redundant test data from everywhere. Add pytest fixtures wherever required. https://docs.pytest.org/en/latest/parametrize.html 🎯 **Goal** <!--- Why is this change important to you? How would you use it? --> <!--- How can it benefit other users? --> 💡 **Possible solutions** <!--- Not obligatory, but suggest an idea for implementing addition or change --> 📋 **Steps to solve the problem** * Comment below about what you've started working on. * Add, commit, push your changes * Submit a pull request and add this in comments - `Addresses #<put issue number here>` * Ask for a review in comments section of pull request * Celebrate your contribution to this project 🎉
test
remove all the unnecessary pytest mark parametrize 🐞 problem tests are currently parametrized on single set of values pytest mark parametrize has a different essence remove the redundant test data from everywhere add pytest fixtures wherever required 🎯 goal 💡 possible solutions 📋 steps to solve the problem comment below about what you ve started working on add commit push your changes submit a pull request and add this in comments addresses ask for a review in comments section of pull request celebrate your contribution to this project 🎉
1
150,393
11,958,843,627
IssuesEvent
2020-04-04 19:36:19
sqlalchemy/sqlalchemy
https://api.github.com/repos/sqlalchemy/sqlalchemy
opened
ComputedReflectionFixtureTest causes errors for dialects without schemas
bug tests
Current fixture assumes schema support. Discovered during testing re: https://github.com/pauldex/sqlalchemy-firebird/issues/4
1.0
ComputedReflectionFixtureTest causes errors for dialects without schemas - Current fixture assumes schema support. Discovered during testing re: https://github.com/pauldex/sqlalchemy-firebird/issues/4
test
computedreflectionfixturetest causes errors for dialects without schemas current fixture assumes schema support discovered during testing re
1
33,291
14,046,221,810
IssuesEvent
2020-11-02 04:02:19
vmware/singleton
https://api.github.com/repos/vmware/singleton
opened
[BUG] [Service]Add a switch for configuration (source.collect.locales)
area/service kind/bug priority/high
**Describe the bug** A configuration item (source.collect.locales) is configured to define the locale of source collection. Please add a switch to control this configuration. **Expected behavior** Add a switch for this configuraiton item.
1.0
[BUG] [Service]Add a switch for configuration (source.collect.locales) - **Describe the bug** A configuration item (source.collect.locales) is configured to define the locale of source collection. Please add a switch to control this configuration. **Expected behavior** Add a switch for this configuraiton item.
non_test
add a switch for configuration source collect locales describe the bug a configuration item source collect locales is configured to define the locale of source collection please add a switch to control this configuration expected behavior add a switch for this configuraiton item
0
12,262
3,593,720,850
IssuesEvent
2016-02-01 20:49:13
haffo/hit-iz-tool
https://api.github.com/repos/haffo/hit-iz-tool
closed
NIST Clarifications and Validation Guidelines Update
Documentation
Harold, please use the attached document for the release today. [NIST-Clarifications-and-Validation-Guidelines.docx](https://github.com/haffo/hit-iz-tool/files/100847/NIST-Clarifications-and-Validation-Guidelines.docx)
1.0
NIST Clarifications and Validation Guidelines Update - Harold, please use the attached document for the release today. [NIST-Clarifications-and-Validation-Guidelines.docx](https://github.com/haffo/hit-iz-tool/files/100847/NIST-Clarifications-and-Validation-Guidelines.docx)
non_test
nist clarifications and validation guidelines update harold please use the attached document for the release today
0
372,791
11,028,288,391
IssuesEvent
2019-12-06 11:18:53
balena-io/balena-supervisor
https://api.github.com/repos/balena-io/balena-supervisor
opened
The supervisor should throttle state endpoint patches
High priority
Currently (especially when downloading) the supervisor can hit the api fairly often. We should add a throttle to avoid hitting it so quickly and reduce bandwidth.
1.0
The supervisor should throttle state endpoint patches - Currently (especially when downloading) the supervisor can hit the api fairly often. We should add a throttle to avoid hitting it so quickly and reduce bandwidth.
non_test
the supervisor should throttle state endpoint patches currently especially when downloading the supervisor can hit the api fairly often we should add a throttle to avoid hitting it so quickly and reduce bandwidth
0
117,443
9,935,426,063
IssuesEvent
2019-07-02 16:30:58
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
Cluster with already expired certs shows an alert that it has expiring certs
[zube]: To Test area/ui kind/bug-qa team/az
**What kind of request is this (question/bug/enhancement/feature request):** bug **Steps to reproduce (least amount of steps as possible):** Have a cluster(DO cluster-3 nodes) in v2.2.4 - with custom image, giving 30 minutes of expiry for the cluster. Upgrade to v2.2-head with UI tag 2.2.81. Warning shown on the UI - This cluster has certs expiring in 30 days or less. Please rotate your certificates now. Wait for the cluster to expire. **Expected Result:** The alert can be made to show a message stating the cluster has **expired** certs **Actual Result:** Alert shown on the UI - `This cluster has certs expiring in 30 days or less. Please rotate your certificates now.` <img width="1088" alt="Screen Shot 2019-06-27 at 10 07 04 AM" src="https://user-images.githubusercontent.com/26032343/60288348-de2ec900-98c8-11e9-9625-e150606aa4e4.png"> **Other details that may be helpful:** **Environment information** - Rancher version (`rancher/rancher`/`rancher/server` image tag or shown bottom left in the UI): v2.2-head with UI tag `2.2.81` - Installation option (single install/HA): single <!-- If the reported issue is regarding a created cluster, please provide requested info below --> **Cluster information** - Cluster type (Hosted/Infrastructure Provider/Custom/Imported): do - Kubernetes version (use `kubectl version`): ``` 1.13 ```
1.0
Cluster with already expired certs shows an alert that it has expiring certs - **What kind of request is this (question/bug/enhancement/feature request):** bug **Steps to reproduce (least amount of steps as possible):** Have a cluster(DO cluster-3 nodes) in v2.2.4 - with custom image, giving 30 minutes of expiry for the cluster. Upgrade to v2.2-head with UI tag 2.2.81. Warning shown on the UI - This cluster has certs expiring in 30 days or less. Please rotate your certificates now. Wait for the cluster to expire. **Expected Result:** The alert can be made to show a message stating the cluster has **expired** certs **Actual Result:** Alert shown on the UI - `This cluster has certs expiring in 30 days or less. Please rotate your certificates now.` <img width="1088" alt="Screen Shot 2019-06-27 at 10 07 04 AM" src="https://user-images.githubusercontent.com/26032343/60288348-de2ec900-98c8-11e9-9625-e150606aa4e4.png"> **Other details that may be helpful:** **Environment information** - Rancher version (`rancher/rancher`/`rancher/server` image tag or shown bottom left in the UI): v2.2-head with UI tag `2.2.81` - Installation option (single install/HA): single <!-- If the reported issue is regarding a created cluster, please provide requested info below --> **Cluster information** - Cluster type (Hosted/Infrastructure Provider/Custom/Imported): do - Kubernetes version (use `kubectl version`): ``` 1.13 ```
test
cluster with already expired certs shows an alert that it has expiring certs what kind of request is this question bug enhancement feature request bug steps to reproduce least amount of steps as possible have a cluster do cluster nodes in with custom image giving minutes of expiry for the cluster upgrade to head with ui tag warning shown on the ui this cluster has certs expiring in days or less please rotate your certificates now wait for the cluster to expire expected result the alert can be made to show a message stating the cluster has expired certs actual result alert shown on the ui this cluster has certs expiring in days or less please rotate your certificates now img width alt screen shot at am src other details that may be helpful environment information rancher version rancher rancher rancher server image tag or shown bottom left in the ui head with ui tag installation option single install ha single if the reported issue is regarding a created cluster please provide requested info below cluster information cluster type hosted infrastructure provider custom imported do kubernetes version use kubectl version
1
13,023
8,068,484,586
IssuesEvent
2018-08-05 21:03:21
DedSecInside/TorBot
https://api.github.com/repos/DedSecInside/TorBot
closed
Switch to Twisted from requests
ENHANCEMENT MAJOR UPGRADE PERFORMANCE URGENT
We're currently using requests, which is a synchronous HTTP library. One of our features, which retrieves links and tests if the link is reachable via HTTP/HTTPS is extremely slow due to this. Switching to Twisted, which is asynchronous should provide a speed up as well as give us the ability to take advantage of the async nature of Twisted.
True
Switch to Twisted from requests - We're currently using requests, which is a synchronous HTTP library. One of our features, which retrieves links and tests if the link is reachable via HTTP/HTTPS is extremely slow due to this. Switching to Twisted, which is asynchronous should provide a speed up as well as give us the ability to take advantage of the async nature of Twisted.
non_test
switch to twisted from requests we re currently using requests which is a synchronous http library one of our features which retrieves links and tests if the link is reachable via http https is extremely slow due to this switching to twisted which is asynchronous should provide a speed up as well as give us the ability to take advantage of the async nature of twisted
0
31,331
13,494,919,825
IssuesEvent
2020-09-11 22:30:52
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
opened
[RPP Back Office] Update and Re-Import Customer Spreadsheets
Product: Residential Parking Permit Digitization Service: Apps Type: Data Workgroup: PE
Reformat Customer Import Spreadsheets w/ notes, updated format, and catching data errors - [ ] Blue - [ ] Green - [ ] Orange - [ ] Pink - [ ] Purple - [ ] Red - [ ] Teal Import new Customer Spreadsheets with missing or corrected data - [ ] Blue - [ ] Green - [ ] Orange - [ ] Pink - [ ] Purple - [ ] Red - [ ] Teal
1.0
[RPP Back Office] Update and Re-Import Customer Spreadsheets - Reformat Customer Import Spreadsheets w/ notes, updated format, and catching data errors - [ ] Blue - [ ] Green - [ ] Orange - [ ] Pink - [ ] Purple - [ ] Red - [ ] Teal Import new Customer Spreadsheets with missing or corrected data - [ ] Blue - [ ] Green - [ ] Orange - [ ] Pink - [ ] Purple - [ ] Red - [ ] Teal
non_test
update and re import customer spreadsheets reformat customer import spreadsheets w notes updated format and catching data errors blue green orange pink purple red teal import new customer spreadsheets with missing or corrected data blue green orange pink purple red teal
0
12,728
9,935,837,144
IssuesEvent
2019-07-02 17:33:43
dart-lang/sdk
https://api.github.com/repos/dart-lang/sdk
closed
Pub hangs and is unkillable on windows
area-infrastructure os-windows p2-medium type-bug
The pub get command that is run for each package, is slow, and timing out. All of these pub get commands are remaining alive, and slow down the system, making all future ones time out too. We get about 50 unkillable pub processes running.
1.0
Pub hangs and is unkillable on windows - The pub get command that is run for each package, is slow, and timing out. All of these pub get commands are remaining alive, and slow down the system, making all future ones time out too. We get about 50 unkillable pub processes running.
non_test
pub hangs and is unkillable on windows the pub get command that is run for each package is slow and timing out all of these pub get commands are remaining alive and slow down the system making all future ones time out too we get about unkillable pub processes running
0
811,783
30,299,842,648
IssuesEvent
2023-07-10 04:30:32
gperftools/gperftools
https://api.github.com/repos/gperftools/gperftools
closed
can't compile google-perftools on AIX6.1
Priority-Medium Type-Porting Status-New
Originally reported on Google Code with ID 419 ``` the following is the issue: 1.downloaded gperftools-2.0.tar.gz from http://code.google.com/p/gperftools/downloads/list which is updated as Feb 3rd 2.run configure after unzip and unpack, no error produced 3.run gmake and get errors which I put in the attachment gmake.log.zip os: AIX 6.1 TL6 gcc: 4.4.6 the config.log and config.h are also i attached. ``` Reported by `happysalay` on 2012-03-18 08:04:30 <hr> - _Attachment: [config.h.zip](https://storage.googleapis.com/google-code-attachments/gperftools/issue-419/comment-0/config.h.zip)_ - _Attachment: [config.log.zip](https://storage.googleapis.com/google-code-attachments/gperftools/issue-419/comment-0/config.log.zip)_ - _Attachment: [gmake.log.zip](https://storage.googleapis.com/google-code-attachments/gperftools/issue-419/comment-0/gmake.log.zip)_
1.0
can't compile google-perftools on AIX6.1 - Originally reported on Google Code with ID 419 ``` the following is the issue: 1.downloaded gperftools-2.0.tar.gz from http://code.google.com/p/gperftools/downloads/list which is updated as Feb 3rd 2.run configure after unzip and unpack, no error produced 3.run gmake and get errors which I put in the attachment gmake.log.zip os: AIX 6.1 TL6 gcc: 4.4.6 the config.log and config.h are also i attached. ``` Reported by `happysalay` on 2012-03-18 08:04:30 <hr> - _Attachment: [config.h.zip](https://storage.googleapis.com/google-code-attachments/gperftools/issue-419/comment-0/config.h.zip)_ - _Attachment: [config.log.zip](https://storage.googleapis.com/google-code-attachments/gperftools/issue-419/comment-0/config.log.zip)_ - _Attachment: [gmake.log.zip](https://storage.googleapis.com/google-code-attachments/gperftools/issue-419/comment-0/gmake.log.zip)_
non_test
can t compile google perftools on originally reported on google code with id the following is the issue downloaded gperftools tar gz from which is updated as feb run configure after unzip and unpack no error produced run gmake and get errors which i put in the attachment gmake log zip os aix gcc the config log and config h are also i attached reported by happysalay on attachment attachment attachment
0
15,434
11,502,992,918
IssuesEvent
2020-02-12 20:11:10
patternfly/patternfly-react
https://api.github.com/repos/patternfly/patternfly-react
closed
implement full clean target
infrastructure
List of files/dirs that the clean target should remove when called. ➜ patternfly-next git:(feat/size-report) git clean -ndfx Would remove .cache/ Would remove .circleci/css-size-report/node_modules/ Would remove .circleci/css-size-report/package-lock.json Would remove .circleci/css-size-report/report.html Would remove .vscode/ Would remove allure-report/ Would remove coverage/ Would remove dist/ Would remove node_modules/ Would remove public/ Would remove src/icons/PfIcons/ Would remove static/assets/fontawesome/ Would remove static/assets/fonts/ Would remove static/assets/pficon/ Would remove workspace/
1.0
implement full clean target - List of files/dirs that the clean target should remove when called. ➜ patternfly-next git:(feat/size-report) git clean -ndfx Would remove .cache/ Would remove .circleci/css-size-report/node_modules/ Would remove .circleci/css-size-report/package-lock.json Would remove .circleci/css-size-report/report.html Would remove .vscode/ Would remove allure-report/ Would remove coverage/ Would remove dist/ Would remove node_modules/ Would remove public/ Would remove src/icons/PfIcons/ Would remove static/assets/fontawesome/ Would remove static/assets/fonts/ Would remove static/assets/pficon/ Would remove workspace/
non_test
implement full clean target list of files dirs that the clean target should remove when called ➜ patternfly next git feat size report git clean ndfx would remove cache would remove circleci css size report node modules would remove circleci css size report package lock json would remove circleci css size report report html would remove vscode would remove allure report would remove coverage would remove dist would remove node modules would remove public would remove src icons pficons would remove static assets fontawesome would remove static assets fonts would remove static assets pficon would remove workspace
0
780,968
27,416,622,449
IssuesEvent
2023-03-01 14:11:57
brave/brave-browser
https://api.github.com/repos/brave/brave-browser
closed
Anr in rewards JSON Sanitize
crash feature/rewards priority/P2 QA/No release-notes/include OS/Android ANR
I found that crash stack in GPS in 1.48.160. We can try to move that task in the background thread as I don't see anything why it is in the main thread currently. ``` RELADDR FUNCTION FILE:LINE 000000000005c070 syscall+28 /apex/com.android.runtime/lib/bionic/libc.so 000000000014a873 art::ConditionVariable::WaitHoldingLocks(art::Thread*)+82 /apex/com.android.art/lib/libart.so 00000000002de46d art::JNI<false>::NewString(_JNIEnv*, unsigned short const*, int)+396 /apex/com.android.art/lib/libart.so v------> _JNIEnv::NewString(unsigned short const*, int) ../../third_party/android_ndk/toolchains/llvm/prebuilt/linux-x86_64/sysroot/usr/include/jni.h:828:14 v------> (anonymous namespace)::ConvertUTF16ToJavaStringImpl(_JNIEnv*, base::BasicStringPiece<char16_t, std::Cr::char_traits<char16_t>> const&) ../../base/android/jni_string.cc:17:25 00000000025f6079 base::android::ConvertUTF8ToJavaString(_JNIEnv*, base::BasicStringPiece<char, std::Cr::char_traits<char>> const&) ../../base/android/jni_string.cc:75:43 0000000001ba53bb data_decoder::JsonSanitizer::Sanitize(std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>> const&, base::OnceCallback<void (data_decoder::JsonSanitizer::Result)>) ../../services/data_decoder/public/cpp/json_sanitizer_android.cc:47:7 00000000044d2191 brave_rewards::RewardsServiceImpl::OnURLLoaderComplete(std::Cr::__list_iterator<std::Cr::unique_ptr<network::SimpleURLLoader, std::Cr::default_delete<network::SimpleURLLoader>>, void*>, base::OnceCallback<void (ledger::mojom::UrlResponse const&)>, std::Cr::unique_ptr<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>, std::Cr::default_delete<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>>>) ../../brave/components/brave_rewards/browser/rewards_service_impl.cc:1195:12 0000000001ae68b1 base::OnceCallback<void (std::Cr::unique_ptr<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>, std::Cr::default_delete<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>>>)>::Run(std::Cr::unique_ptr<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>, std::Cr::default_delete<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>>>) && ../../base/functional/callback.h:152:12 0000000002d7306b network::(anonymous namespace)::SimpleURLLoaderImpl::FinishWithResult(int) ../../services/network/public/cpp/simple_url_loader.cc:1630:18 00000000012ea44f network::mojom::URLLoaderClientStubDispatch::Accept(network::mojom::URLLoaderClient*, mojo::Message*) gen/services/network/public/mojom/url_loader.mojom.cc:1289:13 v------> mojo::InterfaceEndpointClient::HandleValidatedMessage(mojo::Message*) ../../mojo/public/cpp/bindings/lib/interface_endpoint_client.cc:1007:54 000000000276d11b mojo::InterfaceEndpointClient::HandleIncomingMessageThunk::Accept(mojo::Message*) ../../mojo/public/cpp/bindings/lib/interface_endpoint_client.cc:357:18 000000000276f4b3 mojo::MessageDispatcher::Accept(mojo::Message*) ../../mojo/public/cpp/bindings/lib/message_dispatcher.cc:43:19 000000000276df69 mojo::InterfaceEndpointClient::HandleIncomingMessage(mojo::Message*) ../../mojo/public/cpp/bindings/lib/interface_endpoint_client.cc:694:20 0000000002770ab9 mojo::internal::MultiplexRouter::ProcessIncomingMessage(mojo::internal::MultiplexRouter::MessageWrapper*, mojo::internal::MultiplexRouter::ClientCallBehavior, base::SequencedTaskRunner*) ../../mojo/public/cpp/bindings/lib/multiplex_router.cc:1096:42 00000000027707f5 mojo::internal::MultiplexRouter::Accept(mojo::Message*) ../../mojo/public/cpp/bindings/lib/multiplex_router.cc:710:7 000000000276f4b3 mojo::MessageDispatcher::Accept(mojo::Message*) ../../mojo/public/cpp/bindings/lib/message_dispatcher.cc:43:19 000000000276baef mojo::Connector::DispatchMessage(mojo::ScopedHandleBase<mojo::MessageHandle>) ../../mojo/public/cpp/bindings/lib/connector.cc:542:49 000000000276bf23 mojo::Connector::ReadAllAvailableMessages() ../../mojo/public/cpp/bindings/lib/connector.cc:599:14 v------> base::OnceCallback<void ()>::Run() && ../../base/functional/callback.h:152:12 00000000025b76ad base::TaskAnnotator::RunTaskImpl(base::PendingTask&) ../../base/task/common/task_annotator.cc:157:32 v------> void base::TaskAnnotator::RunTask<base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWorkImpl(base::LazyNow*)::$_0>(perfetto::StaticString, base::PendingTask&, base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWorkImpl(base::LazyNow*)::$_0&&) ../../base/task/common/task_annotator.h:85:5 v------> base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWorkImpl(base::LazyNow*) ../../base/task/sequence_manager/thread_controller_with_message_pump_impl.cc:484:23 00000000025c3a15 base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWork() ../../base/task/sequence_manager/thread_controller_with_message_pump_impl.cc:335:30 00000000025c4009 non-virtual thunk to base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWork() ../../base/task/sequence_manager/thread_controller_with_message_pump_impl.cc:0:0 00000000025e6d01 base::MessagePumpForUI::DoNonDelayedLooperWork(bool) ../../base/message_loop/message_pump_android.cc:285:33 v------> base::MessagePumpForUI::OnNonDelayedLooperCallback() ../../base/message_loop/message_pump_android.cc:271:3 00000000025e6865 base::(anonymous namespace)::NonDelayedLooperCallback(int, int, void*) ../../base/message_loop/message_pump_android.cc:75:9 00000000000102dd android::Looper::pollInner(int)+692 /system/lib/libutils.so 000000000000ffcf android::Looper::pollOnce(int, int*, int*, void**)+62 /system/lib/libutils.so 00000000000e0c6b android::android_os_MessageQueue_nativePollOnce(_JNIEnv*, _jobject*, long long, int)+24 /system/lib/libandroid_runtime.so ```
1.0
Anr in rewards JSON Sanitize - I found that crash stack in GPS in 1.48.160. We can try to move that task in the background thread as I don't see anything why it is in the main thread currently. ``` RELADDR FUNCTION FILE:LINE 000000000005c070 syscall+28 /apex/com.android.runtime/lib/bionic/libc.so 000000000014a873 art::ConditionVariable::WaitHoldingLocks(art::Thread*)+82 /apex/com.android.art/lib/libart.so 00000000002de46d art::JNI<false>::NewString(_JNIEnv*, unsigned short const*, int)+396 /apex/com.android.art/lib/libart.so v------> _JNIEnv::NewString(unsigned short const*, int) ../../third_party/android_ndk/toolchains/llvm/prebuilt/linux-x86_64/sysroot/usr/include/jni.h:828:14 v------> (anonymous namespace)::ConvertUTF16ToJavaStringImpl(_JNIEnv*, base::BasicStringPiece<char16_t, std::Cr::char_traits<char16_t>> const&) ../../base/android/jni_string.cc:17:25 00000000025f6079 base::android::ConvertUTF8ToJavaString(_JNIEnv*, base::BasicStringPiece<char, std::Cr::char_traits<char>> const&) ../../base/android/jni_string.cc:75:43 0000000001ba53bb data_decoder::JsonSanitizer::Sanitize(std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>> const&, base::OnceCallback<void (data_decoder::JsonSanitizer::Result)>) ../../services/data_decoder/public/cpp/json_sanitizer_android.cc:47:7 00000000044d2191 brave_rewards::RewardsServiceImpl::OnURLLoaderComplete(std::Cr::__list_iterator<std::Cr::unique_ptr<network::SimpleURLLoader, std::Cr::default_delete<network::SimpleURLLoader>>, void*>, base::OnceCallback<void (ledger::mojom::UrlResponse const&)>, std::Cr::unique_ptr<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>, std::Cr::default_delete<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>>>) ../../brave/components/brave_rewards/browser/rewards_service_impl.cc:1195:12 0000000001ae68b1 base::OnceCallback<void (std::Cr::unique_ptr<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>, std::Cr::default_delete<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>>>)>::Run(std::Cr::unique_ptr<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>, std::Cr::default_delete<std::Cr::basic_string<char, std::Cr::char_traits<char>, std::Cr::allocator<char>>>>) && ../../base/functional/callback.h:152:12 0000000002d7306b network::(anonymous namespace)::SimpleURLLoaderImpl::FinishWithResult(int) ../../services/network/public/cpp/simple_url_loader.cc:1630:18 00000000012ea44f network::mojom::URLLoaderClientStubDispatch::Accept(network::mojom::URLLoaderClient*, mojo::Message*) gen/services/network/public/mojom/url_loader.mojom.cc:1289:13 v------> mojo::InterfaceEndpointClient::HandleValidatedMessage(mojo::Message*) ../../mojo/public/cpp/bindings/lib/interface_endpoint_client.cc:1007:54 000000000276d11b mojo::InterfaceEndpointClient::HandleIncomingMessageThunk::Accept(mojo::Message*) ../../mojo/public/cpp/bindings/lib/interface_endpoint_client.cc:357:18 000000000276f4b3 mojo::MessageDispatcher::Accept(mojo::Message*) ../../mojo/public/cpp/bindings/lib/message_dispatcher.cc:43:19 000000000276df69 mojo::InterfaceEndpointClient::HandleIncomingMessage(mojo::Message*) ../../mojo/public/cpp/bindings/lib/interface_endpoint_client.cc:694:20 0000000002770ab9 mojo::internal::MultiplexRouter::ProcessIncomingMessage(mojo::internal::MultiplexRouter::MessageWrapper*, mojo::internal::MultiplexRouter::ClientCallBehavior, base::SequencedTaskRunner*) ../../mojo/public/cpp/bindings/lib/multiplex_router.cc:1096:42 00000000027707f5 mojo::internal::MultiplexRouter::Accept(mojo::Message*) ../../mojo/public/cpp/bindings/lib/multiplex_router.cc:710:7 000000000276f4b3 mojo::MessageDispatcher::Accept(mojo::Message*) ../../mojo/public/cpp/bindings/lib/message_dispatcher.cc:43:19 000000000276baef mojo::Connector::DispatchMessage(mojo::ScopedHandleBase<mojo::MessageHandle>) ../../mojo/public/cpp/bindings/lib/connector.cc:542:49 000000000276bf23 mojo::Connector::ReadAllAvailableMessages() ../../mojo/public/cpp/bindings/lib/connector.cc:599:14 v------> base::OnceCallback<void ()>::Run() && ../../base/functional/callback.h:152:12 00000000025b76ad base::TaskAnnotator::RunTaskImpl(base::PendingTask&) ../../base/task/common/task_annotator.cc:157:32 v------> void base::TaskAnnotator::RunTask<base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWorkImpl(base::LazyNow*)::$_0>(perfetto::StaticString, base::PendingTask&, base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWorkImpl(base::LazyNow*)::$_0&&) ../../base/task/common/task_annotator.h:85:5 v------> base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWorkImpl(base::LazyNow*) ../../base/task/sequence_manager/thread_controller_with_message_pump_impl.cc:484:23 00000000025c3a15 base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWork() ../../base/task/sequence_manager/thread_controller_with_message_pump_impl.cc:335:30 00000000025c4009 non-virtual thunk to base::sequence_manager::internal::ThreadControllerWithMessagePumpImpl::DoWork() ../../base/task/sequence_manager/thread_controller_with_message_pump_impl.cc:0:0 00000000025e6d01 base::MessagePumpForUI::DoNonDelayedLooperWork(bool) ../../base/message_loop/message_pump_android.cc:285:33 v------> base::MessagePumpForUI::OnNonDelayedLooperCallback() ../../base/message_loop/message_pump_android.cc:271:3 00000000025e6865 base::(anonymous namespace)::NonDelayedLooperCallback(int, int, void*) ../../base/message_loop/message_pump_android.cc:75:9 00000000000102dd android::Looper::pollInner(int)+692 /system/lib/libutils.so 000000000000ffcf android::Looper::pollOnce(int, int*, int*, void**)+62 /system/lib/libutils.so 00000000000e0c6b android::android_os_MessageQueue_nativePollOnce(_JNIEnv*, _jobject*, long long, int)+24 /system/lib/libandroid_runtime.so ```
non_test
anr in rewards json sanitize i found that crash stack in gps in we can try to move that task in the background thread as i don t see anything why it is in the main thread currently reladdr function file line syscall apex com android runtime lib bionic libc so art conditionvariable waitholdinglocks art thread apex com android art lib libart so art jni newstring jnienv unsigned short const int apex com android art lib libart so v jnienv newstring unsigned short const int third party android ndk toolchains llvm prebuilt linux sysroot usr include jni h v anonymous namespace jnienv base basicstringpiece const base android jni string cc base android jnienv base basicstringpiece const base android jni string cc data decoder jsonsanitizer sanitize std cr basic string std cr allocator const base oncecallback services data decoder public cpp json sanitizer android cc brave rewards rewardsserviceimpl onurlloadercomplete std cr list iterator void base oncecallback std cr unique ptr std cr allocator std cr default delete std cr allocator brave components brave rewards browser rewards service impl cc base oncecallback std cr allocator std cr default delete std cr allocator run std cr unique ptr std cr allocator std cr default delete std cr allocator base functional callback h network anonymous namespace simpleurlloaderimpl finishwithresult int services network public cpp simple url loader cc network mojom urlloaderclientstubdispatch accept network mojom urlloaderclient mojo message gen services network public mojom url loader mojom cc v mojo interfaceendpointclient handlevalidatedmessage mojo message mojo public cpp bindings lib interface endpoint client cc mojo interfaceendpointclient handleincomingmessagethunk accept mojo message mojo public cpp bindings lib interface endpoint client cc mojo messagedispatcher accept mojo message mojo public cpp bindings lib message dispatcher cc mojo interfaceendpointclient handleincomingmessage mojo message mojo public cpp bindings lib interface endpoint client cc mojo internal multiplexrouter processincomingmessage mojo internal multiplexrouter messagewrapper mojo internal multiplexrouter clientcallbehavior base sequencedtaskrunner mojo public cpp bindings lib multiplex router cc mojo internal multiplexrouter accept mojo message mojo public cpp bindings lib multiplex router cc mojo messagedispatcher accept mojo message mojo public cpp bindings lib message dispatcher cc mojo connector dispatchmessage mojo scopedhandlebase mojo public cpp bindings lib connector cc mojo connector readallavailablemessages mojo public cpp bindings lib connector cc v base oncecallback run base functional callback h base taskannotator runtaskimpl base pendingtask base task common task annotator cc v void base taskannotator runtask perfetto staticstring base pendingtask base sequence manager internal threadcontrollerwithmessagepumpimpl doworkimpl base lazynow base task common task annotator h v base sequence manager internal threadcontrollerwithmessagepumpimpl doworkimpl base lazynow base task sequence manager thread controller with message pump impl cc base sequence manager internal threadcontrollerwithmessagepumpimpl dowork base task sequence manager thread controller with message pump impl cc non virtual thunk to base sequence manager internal threadcontrollerwithmessagepumpimpl dowork base task sequence manager thread controller with message pump impl cc base messagepumpforui donondelayedlooperwork bool base message loop message pump android cc v base messagepumpforui onnondelayedloopercallback base message loop message pump android cc base anonymous namespace nondelayedloopercallback int int void base message loop message pump android cc android looper pollinner int system lib libutils so android looper pollonce int int int void system lib libutils so android android os messagequeue nativepollonce jnienv jobject long long int system lib libandroid runtime so
0
293,475
25,295,872,452
IssuesEvent
2022-11-17 06:34:50
lowRISC/opentitan
https://api.github.com/repos/lowRISC/opentitan
closed
[test-triage] chip_sw_alert_handler_sleep_mode_pings
Component:TestTriage
### Hierarchy of regression failure Chip Level ### Failure Description ``` UVM_ERROR @ * us: (sw_logger_if.sv:522) [alert_handler_lpg_sleep_mode_pings_test_prog_sim_dv(sw/device/tests/alert_handler_lpg_sleep_mode_pings.c:447)] CHECK-fail: Phase #*: No new alerts has been fired after wakeup! has 1 failures: Test chip_sw_alert_handler_lpg_sleep_mode_pings has 1 failures. 0.chip_sw_alert_handler_lpg_sleep_mode_pings.4264109033 Line 523, in log /container/opentitan-public/scratch/os_regression/chip_earlgrey_asic-sim-vcs/0.chip_sw_alert_handler_lpg_sleep_mode_pings/latest/run.log UVM_ERROR @ 16636.958198 us: (sw_logger_if.sv:522) [alert_handler_lpg_sleep_mode_pings_test_prog_sim_dv(sw/device/tests/alert_handler_lpg_sleep_mode_pings.c:447)] CHECK-fail: Phase #2: No new alerts has been fired after wakeup! UVM_INFO @ 16636.958198 us: (uvm_report_catcher.svh:705) [UVM/REPORT/CATCHER] --- UVM Report catcher Summary --- ``` This is related to PR #16062. It seems there was a problem with a few lines of the C code. Trying a fix on my local environment. Running with `reseed: 10` to make sure I get %100 coverage. I will submit a new PR and update the issue. ### Steps to Reproduce ./util/dvsim/dvsim.py hw/top_earlgrey/dv/chip_sim_cfg.hjson -i chip_sw_alert_handler_lpg_sleep_mode_pings --waves fsdb ### Tests with similar or related failures _No response_
1.0
[test-triage] chip_sw_alert_handler_sleep_mode_pings - ### Hierarchy of regression failure Chip Level ### Failure Description ``` UVM_ERROR @ * us: (sw_logger_if.sv:522) [alert_handler_lpg_sleep_mode_pings_test_prog_sim_dv(sw/device/tests/alert_handler_lpg_sleep_mode_pings.c:447)] CHECK-fail: Phase #*: No new alerts has been fired after wakeup! has 1 failures: Test chip_sw_alert_handler_lpg_sleep_mode_pings has 1 failures. 0.chip_sw_alert_handler_lpg_sleep_mode_pings.4264109033 Line 523, in log /container/opentitan-public/scratch/os_regression/chip_earlgrey_asic-sim-vcs/0.chip_sw_alert_handler_lpg_sleep_mode_pings/latest/run.log UVM_ERROR @ 16636.958198 us: (sw_logger_if.sv:522) [alert_handler_lpg_sleep_mode_pings_test_prog_sim_dv(sw/device/tests/alert_handler_lpg_sleep_mode_pings.c:447)] CHECK-fail: Phase #2: No new alerts has been fired after wakeup! UVM_INFO @ 16636.958198 us: (uvm_report_catcher.svh:705) [UVM/REPORT/CATCHER] --- UVM Report catcher Summary --- ``` This is related to PR #16062. It seems there was a problem with a few lines of the C code. Trying a fix on my local environment. Running with `reseed: 10` to make sure I get %100 coverage. I will submit a new PR and update the issue. ### Steps to Reproduce ./util/dvsim/dvsim.py hw/top_earlgrey/dv/chip_sim_cfg.hjson -i chip_sw_alert_handler_lpg_sleep_mode_pings --waves fsdb ### Tests with similar or related failures _No response_
test
chip sw alert handler sleep mode pings hierarchy of regression failure chip level failure description uvm error us sw logger if sv check fail phase no new alerts has been fired after wakeup has failures test chip sw alert handler lpg sleep mode pings has failures chip sw alert handler lpg sleep mode pings line in log container opentitan public scratch os regression chip earlgrey asic sim vcs chip sw alert handler lpg sleep mode pings latest run log uvm error us sw logger if sv check fail phase no new alerts has been fired after wakeup uvm info us uvm report catcher svh uvm report catcher summary this is related to pr it seems there was a problem with a few lines of the c code trying a fix on my local environment running with reseed to make sure i get coverage i will submit a new pr and update the issue steps to reproduce util dvsim dvsim py hw top earlgrey dv chip sim cfg hjson i chip sw alert handler lpg sleep mode pings waves fsdb tests with similar or related failures no response
1
236,392
26,009,787,282
IssuesEvent
2022-12-20 23:47:35
pferronMend/Case106160
https://api.github.com/repos/pferronMend/Case106160
opened
spring-boot-starter-cache-2.7.1.jar: 7 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-boot-starter-cache-2.7.1.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (spring-boot-starter-cache version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-1471](https://www.mend.io/vulnerability-database/CVE-2022-1471) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-25857](https://www.mend.io/vulnerability-database/CVE-2022-25857) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-41854](https://www.mend.io/vulnerability-database/CVE-2022-41854) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-38749](https://www.mend.io/vulnerability-database/CVE-2022-38749) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-38752](https://www.mend.io/vulnerability-database/CVE-2022-38752) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-38751](https://www.mend.io/vulnerability-database/CVE-2022-38751) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-38750](https://www.mend.io/vulnerability-database/CVE-2022-38750) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-1471</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. <p>Publish Date: 2022-12-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-1471>CVE-2022-1471</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1471">https://nvd.nist.gov/vuln/detail/CVE-2022-1471</a></p> <p>Release Date: 2022-12-01</p> <p>Fix Resolution: org.yaml:snakeyaml - 1.31</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-25857</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. <p>Publish Date: 2022-08-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25857>CVE-2022-25857</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857</a></p> <p>Release Date: 2022-08-30</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-41854</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. <p>Publish Date: 2022-11-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41854>CVE-2022-41854</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bitbucket.org/snakeyaml/snakeyaml/issues/531/">https://bitbucket.org/snakeyaml/snakeyaml/issues/531/</a></p> <p>Release Date: 2022-11-11</p> <p>Fix Resolution: org.yaml:snakeyaml:1.32</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-38749</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. <p>Publish Date: 2022-09-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38749>CVE-2022-38749</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027">https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027</a></p> <p>Release Date: 2022-09-05</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-38752</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. <p>Publish Date: 2022-09-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38752>CVE-2022-38752</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-9w3m-gqgf-c4p9">https://github.com/advisories/GHSA-9w3m-gqgf-c4p9</a></p> <p>Release Date: 2022-09-05</p> <p>Fix Resolution: org.yaml:snakeyaml:1.32 </p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-38751</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. <p>Publish Date: 2022-09-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38751>CVE-2022-38751</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039</a></p> <p>Release Date: 2022-09-05</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-38750</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. <p>Publish Date: 2022-09-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38750>CVE-2022-38750</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027</a></p> <p>Release Date: 2022-09-05</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> <p></p> </details>
True
spring-boot-starter-cache-2.7.1.jar: 7 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-boot-starter-cache-2.7.1.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (spring-boot-starter-cache version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-1471](https://www.mend.io/vulnerability-database/CVE-2022-1471) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-25857](https://www.mend.io/vulnerability-database/CVE-2022-25857) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-41854](https://www.mend.io/vulnerability-database/CVE-2022-41854) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-38749](https://www.mend.io/vulnerability-database/CVE-2022-38749) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-38752](https://www.mend.io/vulnerability-database/CVE-2022-38752) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-38751](https://www.mend.io/vulnerability-database/CVE-2022-38751) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | | [CVE-2022-38750](https://www.mend.io/vulnerability-database/CVE-2022-38750) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.5 | snakeyaml-1.30.jar | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-1471</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. <p>Publish Date: 2022-12-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-1471>CVE-2022-1471</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1471">https://nvd.nist.gov/vuln/detail/CVE-2022-1471</a></p> <p>Release Date: 2022-12-01</p> <p>Fix Resolution: org.yaml:snakeyaml - 1.31</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-25857</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. <p>Publish Date: 2022-08-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25857>CVE-2022-25857</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857</a></p> <p>Release Date: 2022-08-30</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-41854</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. <p>Publish Date: 2022-11-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41854>CVE-2022-41854</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bitbucket.org/snakeyaml/snakeyaml/issues/531/">https://bitbucket.org/snakeyaml/snakeyaml/issues/531/</a></p> <p>Release Date: 2022-11-11</p> <p>Fix Resolution: org.yaml:snakeyaml:1.32</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-38749</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. <p>Publish Date: 2022-09-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38749>CVE-2022-38749</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027">https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027</a></p> <p>Release Date: 2022-09-05</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-38752</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. <p>Publish Date: 2022-09-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38752>CVE-2022-38752</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-9w3m-gqgf-c4p9">https://github.com/advisories/GHSA-9w3m-gqgf-c4p9</a></p> <p>Release Date: 2022-09-05</p> <p>Fix Resolution: org.yaml:snakeyaml:1.32 </p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-38751</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. <p>Publish Date: 2022-09-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38751>CVE-2022-38751</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039</a></p> <p>Release Date: 2022-09-05</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-38750</summary> ### Vulnerable Library - <b>snakeyaml-1.30.jar</b></p> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="https://bitbucket.org/snakeyaml/snakeyaml">https://bitbucket.org/snakeyaml/snakeyaml</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/yaml/snakeyaml/1.30/snakeyaml-1.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-cache-2.7.1.jar (Root Library) - spring-boot-starter-2.7.1.jar - :x: **snakeyaml-1.30.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/pferronMend/Case106160/commit/a030b9f00a71bb93777301cdeaa112613cc6f32c">a030b9f00a71bb93777301cdeaa112613cc6f32c</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. <p>Publish Date: 2022-09-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38750>CVE-2022-38750</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027</a></p> <p>Release Date: 2022-09-05</p> <p>Fix Resolution: org.yaml:snakeyaml:1.31</p> </p> <p></p> </details>
non_test
spring boot starter cache jar vulnerabilities highest severity is vulnerable library spring boot starter cache jar path to dependency file pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in spring boot starter cache version remediation available high snakeyaml jar transitive n a high snakeyaml jar transitive n a medium snakeyaml jar transitive n a medium snakeyaml jar transitive n a medium snakeyaml jar transitive n a medium snakeyaml jar transitive n a medium snakeyaml jar transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar dependency hierarchy spring boot starter cache jar root library spring boot starter jar x snakeyaml jar vulnerable library found in head commit a href found in base branch main vulnerability details snakeyaml s constructor class does not restrict types which can be instantiated during deserialization deserializing yaml content provided by an attacker can lead to remote code execution we recommend using snakeyaml s safeconsturctor when parsing untrusted content to restrict deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org yaml snakeyaml cve vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar dependency hierarchy spring boot starter cache jar root library spring boot starter jar x snakeyaml jar vulnerable library found in head commit a href found in base branch main vulnerability details the package org yaml snakeyaml from and before are vulnerable to denial of service dos due missing to nested depth limitation for collections publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org yaml snakeyaml cve vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar dependency hierarchy spring boot starter cache jar root library spring boot starter jar x snakeyaml jar vulnerable library found in head commit a href found in base branch main vulnerability details those using snakeyaml to parse untrusted yaml files may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stack overflow this effect may support a denial of service attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org yaml snakeyaml cve vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar dependency hierarchy spring boot starter cache jar root library spring boot starter jar x snakeyaml jar vulnerable library found in head commit a href found in base branch main vulnerability details using snakeyaml to parse untrusted yaml files may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stackoverflow publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org yaml snakeyaml cve vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar dependency hierarchy spring boot starter cache jar root library spring boot starter jar x snakeyaml jar vulnerable library found in head commit a href found in base branch main vulnerability details using snakeyaml to parse untrusted yaml files may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stack overflow publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org yaml snakeyaml cve vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar dependency hierarchy spring boot starter cache jar root library spring boot starter jar x snakeyaml jar vulnerable library found in head commit a href found in base branch main vulnerability details using snakeyaml to parse untrusted yaml files may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stackoverflow publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org yaml snakeyaml cve vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org yaml snakeyaml snakeyaml jar dependency hierarchy spring boot starter cache jar root library spring boot starter jar x snakeyaml jar vulnerable library found in head commit a href found in base branch main vulnerability details using snakeyaml to parse untrusted yaml files may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stackoverflow publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org yaml snakeyaml
0
276,601
30,501,731,610
IssuesEvent
2023-07-18 14:20:40
JoshRMendDemo/NoWhitesource
https://api.github.com/repos/JoshRMendDemo/NoWhitesource
opened
slf4j-log4j12-1.5.0.jar: 8 vulnerabilities (highest severity is: 9.8)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>slf4j-log4j12-1.5.0.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (slf4j-log4j12 version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-23305](https://www.mend.io/vulnerability-database/CVE-2022-23305) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2019-17571](https://www.mend.io/vulnerability-database/CVE-2019-17571) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2020-9493](https://www.mend.io/vulnerability-database/CVE-2020-9493) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2022-23307](https://www.mend.io/vulnerability-database/CVE-2022-23307) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2022-23302](https://www.mend.io/vulnerability-database/CVE-2022-23302) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2021-4104](https://www.mend.io/vulnerability-database/CVE-2021-4104) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2023-26464](https://www.mend.io/vulnerability-database/CVE-2023-26464) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2020-9488](https://www.mend.io/vulnerability-database/CVE-2020-9488) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 3.7 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2022-23305</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23305>CVE-2022-23305</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p> <p>Release Date: 2022-01-18</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-17571</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17. <p>Publish Date: 2019-12-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17571>CVE-2019-17571</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E">https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E</a></p> <p>Release Date: 2019-12-20</p> <p>Fix Resolution: log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-9493</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution. <p>Publish Date: 2021-06-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9493>CVE-2020-9493</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.openwall.com/lists/oss-security/2021/06/16/1">https://www.openwall.com/lists/oss-security/2021/06/16/1</a></p> <p>Release Date: 2021-06-16</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23307</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23307>CVE-2022-23307</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-01-18</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23302</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23302>CVE-2022-23302</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p> <p>Release Date: 2022-01-18</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2021-4104</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2021-12-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-4104>CVE-2021-4104</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">https://nvd.nist.gov/vuln/detail/CVE-2021-4104</a></p> <p>Release Date: 2021-12-14</p> <p>Fix Resolution: uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2023-26464</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> ** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. <p>Publish Date: 2023-03-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-26464>CVE-2023-26464</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-vp98-w2p3-mv35">https://github.com/advisories/GHSA-vp98-w2p3-mv35</a></p> <p>Release Date: 2023-03-10</p> <p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2020-9488</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1 <p>Publish Date: 2020-04-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9488>CVE-2020-9488</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.7</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p> <p>Release Date: 2020-04-27</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.3</p> </p> <p></p> </details>
True
slf4j-log4j12-1.5.0.jar: 8 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>slf4j-log4j12-1.5.0.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (slf4j-log4j12 version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-23305](https://www.mend.io/vulnerability-database/CVE-2022-23305) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2019-17571](https://www.mend.io/vulnerability-database/CVE-2019-17571) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2020-9493](https://www.mend.io/vulnerability-database/CVE-2020-9493) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Critical | 9.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2022-23307](https://www.mend.io/vulnerability-database/CVE-2022-23307) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2022-23302](https://www.mend.io/vulnerability-database/CVE-2022-23302) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2021-4104](https://www.mend.io/vulnerability-database/CVE-2021-4104) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2023-26464](https://www.mend.io/vulnerability-database/CVE-2023-26464) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | | [CVE-2020-9488](https://www.mend.io/vulnerability-database/CVE-2020-9488) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 3.7 | log4j-1.2.13.jar | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2022-23305</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23305>CVE-2022-23305</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p> <p>Release Date: 2022-01-18</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2019-17571</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17. <p>Publish Date: 2019-12-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17571>CVE-2019-17571</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E">https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E</a></p> <p>Release Date: 2019-12-20</p> <p>Fix Resolution: log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> CVE-2020-9493</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution. <p>Publish Date: 2021-06-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9493>CVE-2020-9493</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.openwall.com/lists/oss-security/2021/06/16/1">https://www.openwall.com/lists/oss-security/2021/06/16/1</a></p> <p>Release Date: 2021-06-16</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23307</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23307>CVE-2022-23307</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-01-18</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23302</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23302>CVE-2022-23302</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p> <p>Release Date: 2022-01-18</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2021-4104</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2021-12-14 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-4104>CVE-2021-4104</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">https://nvd.nist.gov/vuln/detail/CVE-2021-4104</a></p> <p>Release Date: 2021-12-14</p> <p>Fix Resolution: uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2023-26464</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> ** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. <p>Publish Date: 2023-03-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-26464>CVE-2023-26464</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-vp98-w2p3-mv35">https://github.com/advisories/GHSA-vp98-w2p3-mv35</a></p> <p>Release Date: 2023-03-10</p> <p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2020-9488</summary> ### Vulnerable Library - <b>log4j-1.2.13.jar</b></p> <p>Log4j</p> <p>Library home page: <a href="http://logging.apache.org/log4j/">http://logging.apache.org/log4j/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.13/log4j-1.2.13.jar</p> <p> Dependency Hierarchy: - slf4j-log4j12-1.5.0.jar (Root Library) - :x: **log4j-1.2.13.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/JoshRMendDemo/NoWhitesource/commit/11ccb995e003d01120a68be0d160ddf5d2809abf">11ccb995e003d01120a68be0d160ddf5d2809abf</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1 <p>Publish Date: 2020-04-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9488>CVE-2020-9488</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.7</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p> <p>Release Date: 2020-04-27</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.3</p> </p> <p></p> </details>
non_test
jar vulnerabilities highest severity is vulnerable library jar path to dependency file pom xml path to vulnerable library home wss scanner repository jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in version remediation available critical jar transitive n a critical jar transitive n a critical jar transitive n a high jar transitive n a high jar transitive n a high jar transitive n a high jar transitive n a low jar transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the details section below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library jar library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jar root library x jar vulnerable library found in head commit a href found in base branch master vulnerability details by design the jdbcappender in x accepts an sql statement as a configuration parameter where the values to be inserted are converters from patternlayout the message converter m is likely to always be included this allows attackers to manipulate the sql by entering crafted strings into input fields or headers of an application that are logged allowing unintended sql queries to be executed note this issue only affects x when specifically configured to use the jdbcappender which is not the default beginning in version the jdbcappender was re introduced with proper support for parameterized sql queries and further customization over the columns written to in logs apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos cve vulnerable library jar library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jar root library x jar vulnerable library found in head commit a href found in base branch master vulnerability details included in is a socketserver class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data this affects versions up to up to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution manual javadoc cve vulnerable library jar library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jar root library x jar vulnerable library found in head commit a href found in base branch master vulnerability details a deserialization flaw was found in apache chainsaw versions prior to which could lead to malicious code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos cve vulnerable library jar library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jar root library x jar vulnerable library found in head commit a href found in base branch master vulnerability details cve identified a deserialization issue that was present in apache chainsaw prior to chainsaw chainsaw was a component of apache x where the same issue exists publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution ch qos cve vulnerable library jar library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jar root library x jar vulnerable library found in head commit a href found in base branch master vulnerability details jmssink in all versions of x is vulnerable to deserialization of untrusted data when the attacker has write access to the configuration or if the configuration references an ldap service the attacker has access to the attacker can provide a topicconnectionfactorybindingname configuration causing jmssink to perform jndi requests that result in remote code execution in a similar fashion to cve note this issue only affects x when specifically configured to use jmssink which is not the default apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos cve vulnerable library jar library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jar root library x jar vulnerable library found in head commit a href found in base branch master vulnerability details jmsappender in is vulnerable to deserialization of untrusted data when the attacker has write access to the configuration the attacker can provide topicbindingname and topicconnectionfactorybindingname configurations causing jmsappender to perform jndi requests that result in remote code execution in a similar fashion to cve note this issue only affects when specifically configured to use jmsappender which is not the default apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution uom parent module module uom se javadoc module parfait examples module manual si units javadoc module unit api module module unit api javadoc module parfait module module javadoc uom systems javadoc module uom lib javadoc module uom systems module module uom se module module uom lib module module parfait javadoc module pcp parfait agent module si units module module cve vulnerable library jar library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jar root library x jar vulnerable library found in head commit a href found in base branch master vulnerability details unsupported when assigned when using the chainsaw or socketappender components with x on jre less than an attacker that manages to cause a logging entry involving a specially crafted ie deeply nested hashmap or hashtable depending on which logging component is in use to be processed could exhaust the available memory in the virtual machine and achieve denial of service when the object is deserialized this issue affects apache before affected users are recommended to update to x note this vulnerability only affects products that are no longer supported by the maintainer publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache logging core cve vulnerable library jar library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jar root library x jar vulnerable library found in head commit a href found in base branch master vulnerability details improper validation of certificate with host mismatch in apache smtp appender this could allow an smtps connection to be intercepted by a man in the middle attack which could leak any log messages sent through that appender fixed in apache and publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos
0
18,279
24,368,616,491
IssuesEvent
2022-10-03 17:12:37
fadeoutsoftware/WASDI
https://api.github.com/repos/fadeoutsoftware/WASDI
closed
add a package manager for pip
enhancement P1 javascript java UI / frontend backend python launcher app / processor
enable CRUD operations on pip environment from the web-client. addPackage listPackages getPackage removePackage upgradePackage
1.0
add a package manager for pip - enable CRUD operations on pip environment from the web-client. addPackage listPackages getPackage removePackage upgradePackage
non_test
add a package manager for pip enable crud operations on pip environment from the web client addpackage listpackages getpackage removepackage upgradepackage
0
179,133
13,836,642,579
IssuesEvent
2020-10-14 01:38:00
elastic/kibana
https://api.github.com/repos/elastic/kibana
opened
Failing test: Chrome UI Functional Tests.test/functional/apps/dashboard/dashboard_state·js - dashboard app using legacy data dashboard state Tile map with no changes will update with visualization changes
failed-test
A test failed on a tracked branch ``` Error: Expected saveVisualization to respond with the saveMessage from the toast, got at VisualizePage.saveVisualizationExpectSuccess (test/functional/page_objects/visualize_page.ts:334:15) ``` First failure: [Jenkins Build](https://kibana-ci.elastic.co/job/elastic+kibana+master/8883/) <!-- kibanaCiData = {"failed-test":{"test.class":"Chrome UI Functional Tests.test/functional/apps/dashboard/dashboard_state·js","test.name":"dashboard app using legacy data dashboard state Tile map with no changes will update with visualization changes","test.failCount":1}} -->
1.0
Failing test: Chrome UI Functional Tests.test/functional/apps/dashboard/dashboard_state·js - dashboard app using legacy data dashboard state Tile map with no changes will update with visualization changes - A test failed on a tracked branch ``` Error: Expected saveVisualization to respond with the saveMessage from the toast, got at VisualizePage.saveVisualizationExpectSuccess (test/functional/page_objects/visualize_page.ts:334:15) ``` First failure: [Jenkins Build](https://kibana-ci.elastic.co/job/elastic+kibana+master/8883/) <!-- kibanaCiData = {"failed-test":{"test.class":"Chrome UI Functional Tests.test/functional/apps/dashboard/dashboard_state·js","test.name":"dashboard app using legacy data dashboard state Tile map with no changes will update with visualization changes","test.failCount":1}} -->
test
failing test chrome ui functional tests test functional apps dashboard dashboard state·js dashboard app using legacy data dashboard state tile map with no changes will update with visualization changes a test failed on a tracked branch error expected savevisualization to respond with the savemessage from the toast got at visualizepage savevisualizationexpectsuccess test functional page objects visualize page ts first failure
1
190,441
14,545,859,702
IssuesEvent
2020-12-15 20:18:31
DynamoRIO/dynamorio
https://api.github.com/repos/DynamoRIO/dynamorio
opened
CRASH in histogram.offline test on Server2016
Bug-ToolCrash Component-DrCacheSim Component-Tests Hotlist-ContinuousIntegration OpSys-Windows
First seen on Appveyor: https://github.com/DynamoRIO/dynamorio/issues/4058#issuecomment-581161162 Details: ``` [00:13:53] 230/262 Test #231: code_api|tool.histogram.offline ..............................***Failed 1.34 sec [00:13:53] Running cmd |C:/projects/dynamorio/build/build_debug-internal-32/bin32/drrun.exe;-s;180;-quiet;-debug;-use_dll;C:/projects/dynamorio/build/build_debug-internal-32/lib32/debug/dynamorio.dll;-exit0;-stderr_mask;0xC;-msgbox_mask;0;-dumpcore_mask;0x7d;-staged;-code_api;-t;drcachesim;-offline;-subdir_prefix;tool.histogram.offline;-trace_after_instrs;5K;-exit_after_tracing;50K;--;C:/projects/dynamorio/build/build_debug-internal-32/suite/tests/bin/client.winxfer.exe| [00:13:53] Running postcmd |C:/projects/dynamorio/build/build_debug-internal-32/clients/bin32/drcachesim.exe;-indir;C:/projects/dynamorio/build/build_debug-internal-32/suite/tests/tool.histogram.offline.client.winxfer.exe.05676.5907.dir| [00:13:53] CMake Error at C:/projects/dynamorio/suite/tests/runmulti.cmake:106 (message): [00:13:53] *** postcmd failed (Access violation): *** [00:13:53] [00:13:53] Call Stack (most recent call first): [00:13:53] C:/projects/dynamorio/suite/tests/runmulti.cmake:118 (process_cmdline) ``` But it continues to fail on GA.
1.0
CRASH in histogram.offline test on Server2016 - First seen on Appveyor: https://github.com/DynamoRIO/dynamorio/issues/4058#issuecomment-581161162 Details: ``` [00:13:53] 230/262 Test #231: code_api|tool.histogram.offline ..............................***Failed 1.34 sec [00:13:53] Running cmd |C:/projects/dynamorio/build/build_debug-internal-32/bin32/drrun.exe;-s;180;-quiet;-debug;-use_dll;C:/projects/dynamorio/build/build_debug-internal-32/lib32/debug/dynamorio.dll;-exit0;-stderr_mask;0xC;-msgbox_mask;0;-dumpcore_mask;0x7d;-staged;-code_api;-t;drcachesim;-offline;-subdir_prefix;tool.histogram.offline;-trace_after_instrs;5K;-exit_after_tracing;50K;--;C:/projects/dynamorio/build/build_debug-internal-32/suite/tests/bin/client.winxfer.exe| [00:13:53] Running postcmd |C:/projects/dynamorio/build/build_debug-internal-32/clients/bin32/drcachesim.exe;-indir;C:/projects/dynamorio/build/build_debug-internal-32/suite/tests/tool.histogram.offline.client.winxfer.exe.05676.5907.dir| [00:13:53] CMake Error at C:/projects/dynamorio/suite/tests/runmulti.cmake:106 (message): [00:13:53] *** postcmd failed (Access violation): *** [00:13:53] [00:13:53] Call Stack (most recent call first): [00:13:53] C:/projects/dynamorio/suite/tests/runmulti.cmake:118 (process_cmdline) ``` But it continues to fail on GA.
test
crash in histogram offline test on first seen on appveyor details test code api tool histogram offline failed sec running cmd c projects dynamorio build build debug internal drrun exe s quiet debug use dll c projects dynamorio build build debug internal debug dynamorio dll stderr mask msgbox mask dumpcore mask staged code api t drcachesim offline subdir prefix tool histogram offline trace after instrs exit after tracing c projects dynamorio build build debug internal suite tests bin client winxfer exe running postcmd c projects dynamorio build build debug internal clients drcachesim exe indir c projects dynamorio build build debug internal suite tests tool histogram offline client winxfer exe dir cmake error at c projects dynamorio suite tests runmulti cmake message postcmd failed access violation call stack most recent call first c projects dynamorio suite tests runmulti cmake process cmdline but it continues to fail on ga
1
234,353
19,144,406,975
IssuesEvent
2021-12-02 05:16:19
boostcampwm-2021/iOS06-MateRunner
https://api.github.com/repos/boostcampwm-2021/iOS06-MateRunner
closed
[단위 테스트] HomeUseCase
여훈 test
## 🗣 설명 - 비즈니스 로직이 정상적으로 동작하는지 확인합니다. ```swift protocol HomeUseCase { var authorizationStatus: BehaviorSubject<LocationAuthorizationStatus?> { get set } var userLocation: PublishSubject<CLLocation> { get set } init(locationService: LocationService) func checkAuthorization() func observeUserLocation() func stopUpdatingLocation() } ``` ## 📋 체크리스트 > 구현해야하는 이슈 체크리스트 - [ ] 단위 테스트 작성
1.0
[단위 테스트] HomeUseCase - ## 🗣 설명 - 비즈니스 로직이 정상적으로 동작하는지 확인합니다. ```swift protocol HomeUseCase { var authorizationStatus: BehaviorSubject<LocationAuthorizationStatus?> { get set } var userLocation: PublishSubject<CLLocation> { get set } init(locationService: LocationService) func checkAuthorization() func observeUserLocation() func stopUpdatingLocation() } ``` ## 📋 체크리스트 > 구현해야하는 이슈 체크리스트 - [ ] 단위 테스트 작성
test
homeusecase 🗣 설명 비즈니스 로직이 정상적으로 동작하는지 확인합니다 swift protocol homeusecase var authorizationstatus behaviorsubject get set var userlocation publishsubject get set init locationservice locationservice func checkauthorization func observeuserlocation func stopupdatinglocation 📋 체크리스트 구현해야하는 이슈 체크리스트 단위 테스트 작성
1
523,620
15,186,440,210
IssuesEvent
2021-02-15 12:23:09
10up/component-navigation
https://api.github.com/repos/10up/component-navigation
closed
Ability to change `sub-menu`
Priority -- Low enhancement
**Is your feature request related to a problem? Please describe.** I noticed there is hard coded `sub-menu` class used in the nav component. Could this be part of settings so it could be changed to something else. This would enable changing `sub-menu` class to something else that fits better for chosen naming convention. **Describe the solution you'd like** `sub-menu` can be default but this could be overwritten via settings.
1.0
Ability to change `sub-menu` - **Is your feature request related to a problem? Please describe.** I noticed there is hard coded `sub-menu` class used in the nav component. Could this be part of settings so it could be changed to something else. This would enable changing `sub-menu` class to something else that fits better for chosen naming convention. **Describe the solution you'd like** `sub-menu` can be default but this could be overwritten via settings.
non_test
ability to change sub menu is your feature request related to a problem please describe i noticed there is hard coded sub menu class used in the nav component could this be part of settings so it could be changed to something else this would enable changing sub menu class to something else that fits better for chosen naming convention describe the solution you d like sub menu can be default but this could be overwritten via settings
0
153,000
12,132,547,349
IssuesEvent
2020-04-23 07:29:03
kwk/test-llvm-bz-import-5
https://api.github.com/repos/kwk/test-llvm-bz-import-5
closed
[testsuite] Allow executing programs multiple times with different args for a single test "run"
BZ-BUG-STATUS: RESOLVED BZ-RESOLUTION: WONTFIX Test Suite/Programs Tests dummy import from bugzilla
This issue was imported from Bugzilla https://bugs.llvm.org/show_bug.cgi?id=317.
2.0
[testsuite] Allow executing programs multiple times with different args for a single test "run" - This issue was imported from Bugzilla https://bugs.llvm.org/show_bug.cgi?id=317.
test
allow executing programs multiple times with different args for a single test run this issue was imported from bugzilla
1
563,222
16,677,874,756
IssuesEvent
2021-06-07 18:39:36
adirh3/Fluent-Search
https://api.github.com/repos/adirh3/Fluent-Search
opened
File results showing "?" instead of icons
Medium Priority UI/UX bug
**Describe the bug** the thumbnail/icon for the first file result appears properly, but onwards it shows a '?' icon instead of the icons of the file types [not constant] **To Reproduce** Steps to reproduce the behavior: 1. Type a letter that invokes many results 2. Look at the icons 3. It may not be easy to reproduce as it's not constant **Expected behavior** Results will show the icon depending on the file type **Screenshots** most of the results below are pure file formats like pdf, mp4 ![image](https://user-images.githubusercontent.com/76395594/121070856-092e3100-c7f1-11eb-8846-4e4fac8aeb9d.png) **Desktop (please complete the following information):** - Windows 10 Version: [21H1] - Fluent Search Version [0.9.85.2] (facing it from a lot earlier)
1.0
File results showing "?" instead of icons - **Describe the bug** the thumbnail/icon for the first file result appears properly, but onwards it shows a '?' icon instead of the icons of the file types [not constant] **To Reproduce** Steps to reproduce the behavior: 1. Type a letter that invokes many results 2. Look at the icons 3. It may not be easy to reproduce as it's not constant **Expected behavior** Results will show the icon depending on the file type **Screenshots** most of the results below are pure file formats like pdf, mp4 ![image](https://user-images.githubusercontent.com/76395594/121070856-092e3100-c7f1-11eb-8846-4e4fac8aeb9d.png) **Desktop (please complete the following information):** - Windows 10 Version: [21H1] - Fluent Search Version [0.9.85.2] (facing it from a lot earlier)
non_test
file results showing instead of icons describe the bug the thumbnail icon for the first file result appears properly but onwards it shows a icon instead of the icons of the file types to reproduce steps to reproduce the behavior type a letter that invokes many results look at the icons it may not be easy to reproduce as it s not constant expected behavior results will show the icon depending on the file type screenshots most of the results below are pure file formats like pdf desktop please complete the following information windows version fluent search version facing it from a lot earlier
0
7,912
11,092,325,985
IssuesEvent
2019-12-15 18:14:27
Jeffail/benthos
https://api.github.com/repos/Jeffail/benthos
closed
Add new `sync_response` processor
annoying enhancement processors
It would be useful to have a `sync_response` processor that would enable more customized behaviour for pipelines containing responses. This is going to be simple to implement but we need to add extra care that it won't introduce race conditions (post-buffer alterations).
1.0
Add new `sync_response` processor - It would be useful to have a `sync_response` processor that would enable more customized behaviour for pipelines containing responses. This is going to be simple to implement but we need to add extra care that it won't introduce race conditions (post-buffer alterations).
non_test
add new sync response processor it would be useful to have a sync response processor that would enable more customized behaviour for pipelines containing responses this is going to be simple to implement but we need to add extra care that it won t introduce race conditions post buffer alterations
0
119,715
10,062,043,118
IssuesEvent
2019-07-22 23:24:40
rancher/rancher
https://api.github.com/repos/rancher/rancher
closed
Rancher 2 cannot add custom project role where it says it already exists
[zube]: To Test internal kind/bug team/ui
**What kind of request is this (question/bug/enhancement/feature request):** bug **Steps to reproduce (least amount of steps as possible):** Create two custom project roles. Go into the project and try to give a user the lower role (before custom) in the list. **Result:** Either defaults to the option above it or if the user already has the option above it, it will error saying it already exits. **Other details that may be helpful:** These custom roles are the same as the OOTB ones with just the create namespace removed. **Environment information** - Rancher version (`rancher/rancher`/`rancher/server` image tag or shown bottom left in the UI): Rancher | v2.2.2 User Interface | v2.2.41 Helm | v2.10.0-rancher10 Machine | v0.15.0-rancher6-1 - Installation option (single install/HA): HA ![Screen Shot 2019-04-29 at 10 25 28 AM](https://user-images.githubusercontent.com/4107699/56907067-24061700-6a69-11e9-886f-fa03c574f3e1.png)
1.0
Rancher 2 cannot add custom project role where it says it already exists - **What kind of request is this (question/bug/enhancement/feature request):** bug **Steps to reproduce (least amount of steps as possible):** Create two custom project roles. Go into the project and try to give a user the lower role (before custom) in the list. **Result:** Either defaults to the option above it or if the user already has the option above it, it will error saying it already exits. **Other details that may be helpful:** These custom roles are the same as the OOTB ones with just the create namespace removed. **Environment information** - Rancher version (`rancher/rancher`/`rancher/server` image tag or shown bottom left in the UI): Rancher | v2.2.2 User Interface | v2.2.41 Helm | v2.10.0-rancher10 Machine | v0.15.0-rancher6-1 - Installation option (single install/HA): HA ![Screen Shot 2019-04-29 at 10 25 28 AM](https://user-images.githubusercontent.com/4107699/56907067-24061700-6a69-11e9-886f-fa03c574f3e1.png)
test
rancher cannot add custom project role where it says it already exists what kind of request is this question bug enhancement feature request bug steps to reproduce least amount of steps as possible create two custom project roles go into the project and try to give a user the lower role before custom in the list result either defaults to the option above it or if the user already has the option above it it will error saying it already exits other details that may be helpful these custom roles are the same as the ootb ones with just the create namespace removed environment information rancher version rancher rancher rancher server image tag or shown bottom left in the ui rancher user interface helm machine installation option single install ha ha
1
240,252
20,019,618,739
IssuesEvent
2022-02-01 15:16:42
SPiN-Lab/connPFM
https://api.github.com/repos/SPiN-Lab/connPFM
opened
Change OSF input data to spc
testing
<!-- This is a suggested issue template for connPFM. If there is other information that would be helpful to include, please do not hesitate to add it! Before submitting, please check to make sure that the issue is not already addressed; if there is a related issue, then please cross-reference it by #. --> <!-- Summarize the issue in 1-2 sentences, linking other issues if they are relevant Note: simply typing # will prompt you for open issues to select from --> ### Summary OSF data input should be in signal percentage change (SPC) and we should also rerun the pipeline and modify the results in OSF for the debiasing <!-- If needed, add additional detail for: 1. Recreating a bug/problem 2. Any additional context necessary to understand the issue --> ### Additional Detail <!-- If desired, add suggested next steps. If you foresee them in a particular order or priority, please use numbering --> ### Next Steps - Change the input to SPC - run the pipeline to obtain the new results - upload everything to OSF <!-- Thank you for submitting your issue! If you do not receive a response within a calendar week, please post a comment on this issue to catch our attention. Some issues may not be resolved right away due to the volunteer nature of the project; thank you for your patience! -->
1.0
Change OSF input data to spc - <!-- This is a suggested issue template for connPFM. If there is other information that would be helpful to include, please do not hesitate to add it! Before submitting, please check to make sure that the issue is not already addressed; if there is a related issue, then please cross-reference it by #. --> <!-- Summarize the issue in 1-2 sentences, linking other issues if they are relevant Note: simply typing # will prompt you for open issues to select from --> ### Summary OSF data input should be in signal percentage change (SPC) and we should also rerun the pipeline and modify the results in OSF for the debiasing <!-- If needed, add additional detail for: 1. Recreating a bug/problem 2. Any additional context necessary to understand the issue --> ### Additional Detail <!-- If desired, add suggested next steps. If you foresee them in a particular order or priority, please use numbering --> ### Next Steps - Change the input to SPC - run the pipeline to obtain the new results - upload everything to OSF <!-- Thank you for submitting your issue! If you do not receive a response within a calendar week, please post a comment on this issue to catch our attention. Some issues may not be resolved right away due to the volunteer nature of the project; thank you for your patience! -->
test
change osf input data to spc this is a suggested issue template for connpfm if there is other information that would be helpful to include please do not hesitate to add it before submitting please check to make sure that the issue is not already addressed if there is a related issue then please cross reference it by summarize the issue in sentences linking other issues if they are relevant note simply typing will prompt you for open issues to select from summary osf data input should be in signal percentage change spc and we should also rerun the pipeline and modify the results in osf for the debiasing if needed add additional detail for recreating a bug problem any additional context necessary to understand the issue additional detail if desired add suggested next steps if you foresee them in a particular order or priority please use numbering next steps change the input to spc run the pipeline to obtain the new results upload everything to osf thank you for submitting your issue if you do not receive a response within a calendar week please post a comment on this issue to catch our attention some issues may not be resolved right away due to the volunteer nature of the project thank you for your patience
1
217,459
16,717,691,276
IssuesEvent
2021-06-10 00:32:36
dankamongmen/notcurses
https://api.github.com/repos/dankamongmen/notcurses
opened
ensure a common cursor position after printing a sixel in direct mode
documentation enhancement
It looks like xterm leaves the cursor at the last line of the image, one past the last column, while Alacritty leaves it on the first column of the line after the image. It sure would be nice if notcurses abstracted this difference away. :)
1.0
ensure a common cursor position after printing a sixel in direct mode - It looks like xterm leaves the cursor at the last line of the image, one past the last column, while Alacritty leaves it on the first column of the line after the image. It sure would be nice if notcurses abstracted this difference away. :)
non_test
ensure a common cursor position after printing a sixel in direct mode it looks like xterm leaves the cursor at the last line of the image one past the last column while alacritty leaves it on the first column of the line after the image it sure would be nice if notcurses abstracted this difference away
0
148,309
11,847,104,135
IssuesEvent
2020-03-24 11:23:45
microsoft/vscode
https://api.github.com/repos/microsoft/vscode
opened
Test: Change view with screen reader
accessibility testplan-item
Refs: https://github.com/microsoft/vscode/issues/88695 - [ ] win - [ ] anyOS Complexity: 3 **Note**: if you are assigned windows, please use the NVDA screen reader. If you are assigned anyOS please either use macOS with VoiceOver or Linux with Orca screen reader. We have improved our difference view with regards to accessibility. Have a git tracked repostiroy, some file with multiple changes in it and turn on your screen reader. Open the changes view of that file. Verify: * `F7` and `shift+F7` navigate you through all the diffs and the screen reader correctly reads the added and removed content * When you enter the accessible Diff view screen reader mentions to use "Stage/unstage/revert selected ranges" * As you navigte through the content, the content is first read out and at the end the line number is read out * You can use "Stage/unstage/revert selected ranges" to stage / unstage/ revert the currently active diff * Pressing `Esc` takes you out of this view and you are navigated to the regular changes view on the correct position with the right change selected * The whole flow makes sense. And any feedback on improving this is very welcome
1.0
Test: Change view with screen reader - Refs: https://github.com/microsoft/vscode/issues/88695 - [ ] win - [ ] anyOS Complexity: 3 **Note**: if you are assigned windows, please use the NVDA screen reader. If you are assigned anyOS please either use macOS with VoiceOver or Linux with Orca screen reader. We have improved our difference view with regards to accessibility. Have a git tracked repostiroy, some file with multiple changes in it and turn on your screen reader. Open the changes view of that file. Verify: * `F7` and `shift+F7` navigate you through all the diffs and the screen reader correctly reads the added and removed content * When you enter the accessible Diff view screen reader mentions to use "Stage/unstage/revert selected ranges" * As you navigte through the content, the content is first read out and at the end the line number is read out * You can use "Stage/unstage/revert selected ranges" to stage / unstage/ revert the currently active diff * Pressing `Esc` takes you out of this view and you are navigated to the regular changes view on the correct position with the right change selected * The whole flow makes sense. And any feedback on improving this is very welcome
test
test change view with screen reader refs win anyos complexity note if you are assigned windows please use the nvda screen reader if you are assigned anyos please either use macos with voiceover or linux with orca screen reader we have improved our difference view with regards to accessibility have a git tracked repostiroy some file with multiple changes in it and turn on your screen reader open the changes view of that file verify and shift navigate you through all the diffs and the screen reader correctly reads the added and removed content when you enter the accessible diff view screen reader mentions to use stage unstage revert selected ranges as you navigte through the content the content is first read out and at the end the line number is read out you can use stage unstage revert selected ranges to stage unstage revert the currently active diff pressing esc takes you out of this view and you are navigated to the regular changes view on the correct position with the right change selected the whole flow makes sense and any feedback on improving this is very welcome
1
76,299
9,418,636,409
IssuesEvent
2019-04-10 19:45:01
Opentrons/opentrons
https://api.github.com/repos/Opentrons/opentrons
opened
V2 Labware: Labware Selection Modal Uses V2 otIds
feature medium protocol designer
## Acceptance Criteria - [ ] Labware Selection Modal uses V2 otIds - [ ] Remove shim mapping in getLabwareDef
1.0
V2 Labware: Labware Selection Modal Uses V2 otIds - ## Acceptance Criteria - [ ] Labware Selection Modal uses V2 otIds - [ ] Remove shim mapping in getLabwareDef
non_test
labware labware selection modal uses otids acceptance criteria labware selection modal uses otids remove shim mapping in getlabwaredef
0
434,191
12,515,375,107
IssuesEvent
2020-06-03 07:33:27
canonical-web-and-design/build.snapcraft.io
https://api.github.com/repos/canonical-web-and-design/build.snapcraft.io
closed
Removing repo doesn't update in IE on Windows
Priority: Medium
Logged in on Windows 10 / IE 11 and tried to remove an old repo. When I hit the red remove button nothing appears to happen on screen. However if I visit the same dashboard in another browser I can see the repo has indeed been deleted. ![screenshot 4](https://cloud.githubusercontent.com/assets/1841272/24397430/1f7a245c-139e-11e7-8744-124f2a96b1d7.png) ![screenshot 5](https://cloud.githubusercontent.com/assets/1841272/24397434/22cc1e44-139e-11e7-90a4-8e2d960ecfe2.png)
1.0
Removing repo doesn't update in IE on Windows - Logged in on Windows 10 / IE 11 and tried to remove an old repo. When I hit the red remove button nothing appears to happen on screen. However if I visit the same dashboard in another browser I can see the repo has indeed been deleted. ![screenshot 4](https://cloud.githubusercontent.com/assets/1841272/24397430/1f7a245c-139e-11e7-8744-124f2a96b1d7.png) ![screenshot 5](https://cloud.githubusercontent.com/assets/1841272/24397434/22cc1e44-139e-11e7-90a4-8e2d960ecfe2.png)
non_test
removing repo doesn t update in ie on windows logged in on windows ie and tried to remove an old repo when i hit the red remove button nothing appears to happen on screen however if i visit the same dashboard in another browser i can see the repo has indeed been deleted
0
102,992
8,873,065,787
IssuesEvent
2019-01-11 17:00:13
pywbem/pywbem
https://api.github.com/repos/pywbem/pywbem
closed
End2end: Optimize non-reachable servers
area: test resolution: fixed type: enhancement
If a server is not reachable, every testcase currently tries again to reach it, which consumes a lot of time. In the wbem_connection fixture, the information whether a server is usable, could be remembered. There are two options: * on the server_definition object * using the pytest cache fixture
1.0
End2end: Optimize non-reachable servers - If a server is not reachable, every testcase currently tries again to reach it, which consumes a lot of time. In the wbem_connection fixture, the information whether a server is usable, could be remembered. There are two options: * on the server_definition object * using the pytest cache fixture
test
optimize non reachable servers if a server is not reachable every testcase currently tries again to reach it which consumes a lot of time in the wbem connection fixture the information whether a server is usable could be remembered there are two options on the server definition object using the pytest cache fixture
1
318,401
27,301,275,175
IssuesEvent
2023-02-24 02:19:18
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: lib/pq failed
C-test-failure O-robot O-roachtest branch-master T-sql-sessions
roachtest.lib/pq [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/8740106?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/8740106?buildTab=artifacts#/lib/pq) on master @ [7e2df35a2f6bf7a859bb0539c8ca43c4e72ed260](https://github.com/cockroachdb/cockroach/commits/7e2df35a2f6bf7a859bb0539c8ca43c4e72ed260): ``` test artifacts and logs in: /artifacts/lib/pq/run_1 (orm_helpers.go:201).summarizeFailed: Tests run on Cockroach v23.1.0-alpha.2-405-g7e2df35a2f Tests run against lib/pq v1.10.5 217 Total Tests Run 190 tests passed 27 tests failed 7 tests skipped 0 tests ignored 1 test passed unexpectedly 0 tests failed unexpectedly 0 tests expected failed but skipped 0 tests expected failed but not run --- --- PASS: pq.TestCopyFromError - https://github.com/cockroachdb/cockroach/issues/5807 (unexpected) For a full summary look at the lib/pq artifacts An updated blocklist (libPQBlocklist) is available in the artifacts' lib/pq log ``` <p>Parameters: <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=4</code> , <code>ROACHTEST_encrypted=false</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/sql-sessions <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*lib/pq.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-24610
2.0
roachtest: lib/pq failed - roachtest.lib/pq [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/8740106?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/8740106?buildTab=artifacts#/lib/pq) on master @ [7e2df35a2f6bf7a859bb0539c8ca43c4e72ed260](https://github.com/cockroachdb/cockroach/commits/7e2df35a2f6bf7a859bb0539c8ca43c4e72ed260): ``` test artifacts and logs in: /artifacts/lib/pq/run_1 (orm_helpers.go:201).summarizeFailed: Tests run on Cockroach v23.1.0-alpha.2-405-g7e2df35a2f Tests run against lib/pq v1.10.5 217 Total Tests Run 190 tests passed 27 tests failed 7 tests skipped 0 tests ignored 1 test passed unexpectedly 0 tests failed unexpectedly 0 tests expected failed but skipped 0 tests expected failed but not run --- --- PASS: pq.TestCopyFromError - https://github.com/cockroachdb/cockroach/issues/5807 (unexpected) For a full summary look at the lib/pq artifacts An updated blocklist (libPQBlocklist) is available in the artifacts' lib/pq log ``` <p>Parameters: <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=4</code> , <code>ROACHTEST_encrypted=false</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/sql-sessions <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*lib/pq.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-24610
test
roachtest lib pq failed roachtest lib pq with on master test artifacts and logs in artifacts lib pq run orm helpers go summarizefailed tests run on cockroach alpha tests run against lib pq total tests run tests passed tests failed tests skipped tests ignored test passed unexpectedly tests failed unexpectedly tests expected failed but skipped tests expected failed but not run pass pq testcopyfromerror unexpected for a full summary look at the lib pq artifacts an updated blocklist libpqblocklist is available in the artifacts lib pq log parameters roachtest cloud gce roachtest cpu roachtest encrypted false roachtest ssd help see see cc cockroachdb sql sessions jira issue crdb
1
170,564
13,193,204,285
IssuesEvent
2020-08-13 14:53:37
w3f/polkadot-spec
https://api.github.com/repos/w3f/polkadot-spec
closed
kagome-adapter: Implement host-api fixture
testsuite
We currently only test host-api-legacy, kagome added most of the latest API by now and we should update the adapter to support that. Work will be merged as part of #256.
1.0
kagome-adapter: Implement host-api fixture - We currently only test host-api-legacy, kagome added most of the latest API by now and we should update the adapter to support that. Work will be merged as part of #256.
test
kagome adapter implement host api fixture we currently only test host api legacy kagome added most of the latest api by now and we should update the adapter to support that work will be merged as part of
1
34,905
4,957,019,402
IssuesEvent
2016-12-02 02:04:05
kubernetes/kubernetes
https://api.github.com/repos/kubernetes/kubernetes
closed
ci-kubernetes-e2e-gke-alpha-features-release-1.5: broken test run
kind/flake priority/P1 team/test-infra
https://k8s-gubernator.appspot.com/build/kubernetes-jenkins/logs/ci-kubernetes-e2e-gke-alpha-features-release-1.5/177/ Multiple broken tests: Failed: [k8s.io] ESIPP [Slow][Feature:ExternalTrafficLocalOnly] should only target nodes with endpoints [Slow][Feature:ExternalTrafficLocalOnly] {Kubernetes e2e suite} ``` /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:1253 Nov 30 08:24:20.846: Timeout waiting for service "external-local" to have a load balancer /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:2342 ``` Issues about this test specifically: #36481 Failed: [k8s.io] ESIPP [Slow][Feature:ExternalTrafficLocalOnly] should work for type=LoadBalancer [Slow][Feature:ExternalTrafficLocalOnly] {Kubernetes e2e suite} ``` /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:1167 Nov 30 08:44:51.544: Timeout waiting for service "external-local" to have a load balancer /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:2342 ``` Issues about this test specifically: #36389 Failed: [k8s.io] ESIPP [Slow][Feature:ExternalTrafficLocalOnly] should handle updates to source ip annotation [Slow][Feature:ExternalTrafficLocalOnly] {Kubernetes e2e suite} ``` /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:1404 Nov 30 09:05:02.660: Timeout waiting for service "external-local" to have a load balancer /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:2342 ``` Issues about this test specifically: #35225 #35347 Failed: [k8s.io] ESIPP [Slow][Feature:ExternalTrafficLocalOnly] should work from pods [Slow][Feature:ExternalTrafficLocalOnly] {Kubernetes e2e suite} ``` /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:1298 Nov 30 09:25:17.414: Timeout waiting for service "external-local" to have a load balancer /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:2342 ```
1.0
ci-kubernetes-e2e-gke-alpha-features-release-1.5: broken test run - https://k8s-gubernator.appspot.com/build/kubernetes-jenkins/logs/ci-kubernetes-e2e-gke-alpha-features-release-1.5/177/ Multiple broken tests: Failed: [k8s.io] ESIPP [Slow][Feature:ExternalTrafficLocalOnly] should only target nodes with endpoints [Slow][Feature:ExternalTrafficLocalOnly] {Kubernetes e2e suite} ``` /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:1253 Nov 30 08:24:20.846: Timeout waiting for service "external-local" to have a load balancer /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:2342 ``` Issues about this test specifically: #36481 Failed: [k8s.io] ESIPP [Slow][Feature:ExternalTrafficLocalOnly] should work for type=LoadBalancer [Slow][Feature:ExternalTrafficLocalOnly] {Kubernetes e2e suite} ``` /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:1167 Nov 30 08:44:51.544: Timeout waiting for service "external-local" to have a load balancer /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:2342 ``` Issues about this test specifically: #36389 Failed: [k8s.io] ESIPP [Slow][Feature:ExternalTrafficLocalOnly] should handle updates to source ip annotation [Slow][Feature:ExternalTrafficLocalOnly] {Kubernetes e2e suite} ``` /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:1404 Nov 30 09:05:02.660: Timeout waiting for service "external-local" to have a load balancer /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:2342 ``` Issues about this test specifically: #35225 #35347 Failed: [k8s.io] ESIPP [Slow][Feature:ExternalTrafficLocalOnly] should work from pods [Slow][Feature:ExternalTrafficLocalOnly] {Kubernetes e2e suite} ``` /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:1298 Nov 30 09:25:17.414: Timeout waiting for service "external-local" to have a load balancer /go/src/k8s.io/kubernetes/_output/dockerized/go/src/k8s.io/kubernetes/test/e2e/service.go:2342 ```
test
ci kubernetes gke alpha features release broken test run multiple broken tests failed esipp should only target nodes with endpoints kubernetes suite go src io kubernetes output dockerized go src io kubernetes test service go nov timeout waiting for service external local to have a load balancer go src io kubernetes output dockerized go src io kubernetes test service go issues about this test specifically failed esipp should work for type loadbalancer kubernetes suite go src io kubernetes output dockerized go src io kubernetes test service go nov timeout waiting for service external local to have a load balancer go src io kubernetes output dockerized go src io kubernetes test service go issues about this test specifically failed esipp should handle updates to source ip annotation kubernetes suite go src io kubernetes output dockerized go src io kubernetes test service go nov timeout waiting for service external local to have a load balancer go src io kubernetes output dockerized go src io kubernetes test service go issues about this test specifically failed esipp should work from pods kubernetes suite go src io kubernetes output dockerized go src io kubernetes test service go nov timeout waiting for service external local to have a load balancer go src io kubernetes output dockerized go src io kubernetes test service go
1
113,826
17,154,176,588
IssuesEvent
2021-07-14 03:13:21
atlslscsrv-app/atlslscsrv-app
https://api.github.com/repos/atlslscsrv-app/atlslscsrv-app
closed
WS-2018-0590 (High) detected in diff-3.2.0.tgz - autoclosed
security vulnerability
## WS-2018-0590 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>diff-3.2.0.tgz</b></p></summary> <p>A javascript text diff implementation.</p> <p>Library home page: <a href="https://registry.npmjs.org/diff/-/diff-3.2.0.tgz">https://registry.npmjs.org/diff/-/diff-3.2.0.tgz</a></p> <p>Path to dependency file: atlslscsrv-app/dist/resources/app/package.json</p> <p>Path to vulnerable library: atlslscsrv-app/dist/resources/app/node_modules/diff/package.json,atlslscsrv-app/node_modules_native/node_modules_forked/node-pty/node_modules/diff/package.json</p> <p> Dependency Hierarchy: - mocha-3.5.3.tgz (Root Library) - :x: **diff-3.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/atlslscsrv-app/atlslscsrv-app/commit/9cd1d81ea40cec233263f3f83e4afad1985f0f0d">9cd1d81ea40cec233263f3f83e4afad1985f0f0d</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. <p>Publish Date: 2018-03-05 <p>URL: <a href=https://bugzilla.redhat.com/show_bug.cgi?id=1552148>WS-2018-0590</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0">https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0</a></p> <p>Release Date: 2019-06-11</p> <p>Fix Resolution: 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2018-0590 (High) detected in diff-3.2.0.tgz - autoclosed - ## WS-2018-0590 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>diff-3.2.0.tgz</b></p></summary> <p>A javascript text diff implementation.</p> <p>Library home page: <a href="https://registry.npmjs.org/diff/-/diff-3.2.0.tgz">https://registry.npmjs.org/diff/-/diff-3.2.0.tgz</a></p> <p>Path to dependency file: atlslscsrv-app/dist/resources/app/package.json</p> <p>Path to vulnerable library: atlslscsrv-app/dist/resources/app/node_modules/diff/package.json,atlslscsrv-app/node_modules_native/node_modules_forked/node-pty/node_modules/diff/package.json</p> <p> Dependency Hierarchy: - mocha-3.5.3.tgz (Root Library) - :x: **diff-3.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/atlslscsrv-app/atlslscsrv-app/commit/9cd1d81ea40cec233263f3f83e4afad1985f0f0d">9cd1d81ea40cec233263f3f83e4afad1985f0f0d</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. <p>Publish Date: 2018-03-05 <p>URL: <a href=https://bugzilla.redhat.com/show_bug.cgi?id=1552148>WS-2018-0590</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0">https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0</a></p> <p>Release Date: 2019-06-11</p> <p>Fix Resolution: 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_test
ws high detected in diff tgz autoclosed ws high severity vulnerability vulnerable library diff tgz a javascript text diff implementation library home page a href path to dependency file atlslscsrv app dist resources app package json path to vulnerable library atlslscsrv app dist resources app node modules diff package json atlslscsrv app node modules native node modules forked node pty node modules diff package json dependency hierarchy mocha tgz root library x diff tgz vulnerable library found in head commit a href found in base branch master vulnerability details a vulnerability was found in diff before the affected versions of this package are vulnerable to regular expression denial of service redos attacks publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
605,604
18,737,666,054
IssuesEvent
2021-11-04 09:46:58
Adyen/adyen-magento2
https://api.github.com/repos/Adyen/adyen-magento2
closed
[PW-5668] Orders staying in Payment Review after OFFER_CLOSED since 7.0.1 -> 7.2.0 upgrade
Bug report Priority: high Issue: Confirmed Webhooks
**Describe the bug** This has been occuring since upgrading to 7.2.0 from 7.0.1 - OFFER_CLOSED notifications should cancel the related order, however the order is staying in Payment Review. Status history is added to the order RE the closed offer, however the order stays open. Our downstream systems listen to the state of the M2 order and therefore we have a building list of orders that are pending in our ERP. **To Reproduce** Place order through Adyen, wait for OFFER_CLOSED, Magento accepts the notification but doesn't cancel the order. **Expected behavior** Order is to be cancelled with the acknowledgement of the OFFER_CLOSED notification. **Magento version** 2.3.7-p1 **Plugin version** 7.2.0 **Screenshots** ![image](https://user-images.githubusercontent.com/7424248/137464516-c8d1fc6a-e003-41ff-afd8-81f95a1a90f3.png)
1.0
[PW-5668] Orders staying in Payment Review after OFFER_CLOSED since 7.0.1 -> 7.2.0 upgrade - **Describe the bug** This has been occuring since upgrading to 7.2.0 from 7.0.1 - OFFER_CLOSED notifications should cancel the related order, however the order is staying in Payment Review. Status history is added to the order RE the closed offer, however the order stays open. Our downstream systems listen to the state of the M2 order and therefore we have a building list of orders that are pending in our ERP. **To Reproduce** Place order through Adyen, wait for OFFER_CLOSED, Magento accepts the notification but doesn't cancel the order. **Expected behavior** Order is to be cancelled with the acknowledgement of the OFFER_CLOSED notification. **Magento version** 2.3.7-p1 **Plugin version** 7.2.0 **Screenshots** ![image](https://user-images.githubusercontent.com/7424248/137464516-c8d1fc6a-e003-41ff-afd8-81f95a1a90f3.png)
non_test
orders staying in payment review after offer closed since upgrade describe the bug this has been occuring since upgrading to from offer closed notifications should cancel the related order however the order is staying in payment review status history is added to the order re the closed offer however the order stays open our downstream systems listen to the state of the order and therefore we have a building list of orders that are pending in our erp to reproduce place order through adyen wait for offer closed magento accepts the notification but doesn t cancel the order expected behavior order is to be cancelled with the acknowledgement of the offer closed notification magento version plugin version screenshots
0
16,226
3,510,839,088
IssuesEvent
2016-01-09 20:14:42
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
Failed tests (10918): TestReplicaCorruption
test-failure TestReplicaCorruption
The following test appears to have failed: [#10918](https://circleci.com/gh/cockroachdb/cockroach/10918): ``` I0109 19:55:13.048885 915 storage/replica.go:1609 gossiping sentinel from store 1, range 1 I0109 19:55:13.049195 915 storage/replica.go:1615 gossiping first range from store 1, range 1 I0109 19:55:13.050417 915 storage/replica.go:1154 reproposing 1 commands after empty entry E0109 19:55:13.052309 915 storage/replica.go:1249 error executing raft command: write too old: timestamp 0.000000000,12 <= 0.000000000,12 I0109 19:55:13.053591 915 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- FAIL: TestReplicaCorruption (0.01s) replica_test.go:2971: unexpected error: %!s(<nil>) === RUN TestChangeReplicasDuplicateError I0109 19:55:13.056533 915 raft/raft.go:446 [group 1] 1 became follower at term 5 I0109 19:55:13.056737 915 raft/raft.go:234 [group 1] newRaft 1 [peers: [1], term: 5, commit: 10, applied: 10, lastindex: 10, lastterm: 5] I0109 19:55:13.056857 915 raft/raft.go:526 [group 1] 1 is starting a new election at term 5 I0109 19:55:13.056941 915 raft/raft.go:459 [group 1] 1 became candidate at term 6 I0109 19:55:13.057059 915 raft/raft.go:508 [group 1] 1 received vote from 1 at term 6 I0109 19:55:13.057180 915 raft/raft.go:487 [group 1] 1 became leader at term 6 I0109 19:55:13.058747 915 storage/replica.go:1600 gossiping cluster id test from store 1, range 1 I0109 19:55:13.059945 915 storage/replica_command.go:1192 range 1: new leader lease replica {1 1 1} 1970-01-01 00:00:00 +0000 UTC +1.000s -- I0109 19:55:38.098695 915 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- PASS: TestLeaderAfterSplit (0.23s) <autogenerated>:28: prior leak detected, leaktest disabled === RUN Example_rebalancing --- PASS: Example_rebalancing (0.65s) FAIL FAIL github.com/cockroachdb/cockroach/storage 27.947s === RUN TestBatchBasics I0109 19:55:40.758063 985 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- PASS: TestBatchBasics (0.01s) === RUN TestBatchGet I0109 19:55:40.766002 985 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- PASS: TestBatchGet (0.02s) === RUN TestBatchMerge I0109 19:55:40.789888 985 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- PASS: TestBatchMerge (0.01s) === RUN TestBatchProto ``` Please assign, take a look and update the issue accordingly.
2.0
Failed tests (10918): TestReplicaCorruption - The following test appears to have failed: [#10918](https://circleci.com/gh/cockroachdb/cockroach/10918): ``` I0109 19:55:13.048885 915 storage/replica.go:1609 gossiping sentinel from store 1, range 1 I0109 19:55:13.049195 915 storage/replica.go:1615 gossiping first range from store 1, range 1 I0109 19:55:13.050417 915 storage/replica.go:1154 reproposing 1 commands after empty entry E0109 19:55:13.052309 915 storage/replica.go:1249 error executing raft command: write too old: timestamp 0.000000000,12 <= 0.000000000,12 I0109 19:55:13.053591 915 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- FAIL: TestReplicaCorruption (0.01s) replica_test.go:2971: unexpected error: %!s(<nil>) === RUN TestChangeReplicasDuplicateError I0109 19:55:13.056533 915 raft/raft.go:446 [group 1] 1 became follower at term 5 I0109 19:55:13.056737 915 raft/raft.go:234 [group 1] newRaft 1 [peers: [1], term: 5, commit: 10, applied: 10, lastindex: 10, lastterm: 5] I0109 19:55:13.056857 915 raft/raft.go:526 [group 1] 1 is starting a new election at term 5 I0109 19:55:13.056941 915 raft/raft.go:459 [group 1] 1 became candidate at term 6 I0109 19:55:13.057059 915 raft/raft.go:508 [group 1] 1 received vote from 1 at term 6 I0109 19:55:13.057180 915 raft/raft.go:487 [group 1] 1 became leader at term 6 I0109 19:55:13.058747 915 storage/replica.go:1600 gossiping cluster id test from store 1, range 1 I0109 19:55:13.059945 915 storage/replica_command.go:1192 range 1: new leader lease replica {1 1 1} 1970-01-01 00:00:00 +0000 UTC +1.000s -- I0109 19:55:38.098695 915 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- PASS: TestLeaderAfterSplit (0.23s) <autogenerated>:28: prior leak detected, leaktest disabled === RUN Example_rebalancing --- PASS: Example_rebalancing (0.65s) FAIL FAIL github.com/cockroachdb/cockroach/storage 27.947s === RUN TestBatchBasics I0109 19:55:40.758063 985 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- PASS: TestBatchBasics (0.01s) === RUN TestBatchGet I0109 19:55:40.766002 985 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- PASS: TestBatchGet (0.02s) === RUN TestBatchMerge I0109 19:55:40.789888 985 storage/engine/rocksdb.go:137 closing in-memory rocksdb instance --- PASS: TestBatchMerge (0.01s) === RUN TestBatchProto ``` Please assign, take a look and update the issue accordingly.
test
failed tests testreplicacorruption the following test appears to have failed storage replica go gossiping sentinel from store range storage replica go gossiping first range from store range storage replica go reproposing commands after empty entry storage replica go error executing raft command write too old timestamp storage engine rocksdb go closing in memory rocksdb instance fail testreplicacorruption replica test go unexpected error s run testchangereplicasduplicateerror raft raft go became follower at term raft raft go newraft term commit applied lastindex lastterm raft raft go is starting a new election at term raft raft go became candidate at term raft raft go received vote from at term raft raft go became leader at term storage replica go gossiping cluster id test from store range storage replica command go range new leader lease replica utc storage engine rocksdb go closing in memory rocksdb instance pass testleaderaftersplit prior leak detected leaktest disabled run example rebalancing pass example rebalancing fail fail github com cockroachdb cockroach storage run testbatchbasics storage engine rocksdb go closing in memory rocksdb instance pass testbatchbasics run testbatchget storage engine rocksdb go closing in memory rocksdb instance pass testbatchget run testbatchmerge storage engine rocksdb go closing in memory rocksdb instance pass testbatchmerge run testbatchproto please assign take a look and update the issue accordingly
1
106,666
9,178,901,564
IssuesEvent
2019-03-05 00:53:28
OrcaPracticas/happy-shell
https://api.github.com/repos/OrcaPracticas/happy-shell
closed
[ISSUE] Crear utilidad que permite levantar la UI
⚙️ Config 📝 Testing 🛠 Feature
**A Fin** de poder levantar cualquier **UI** **Quiero** contar con el comando que simplifique todo el proceso **Y** quiero poder levantar la ui en modo `DEBUG` **Y** de manera normal **Y** quiero poder indicar el valor de `CLUSTER_ENV` **Y** en caso de no indicarlo que tome el valor por defecto de las variables globales. ___ ## 📝Tareas adicionales - [x] **Comentar la función** - [x] **Agregar prueba de funcionalidad**
1.0
[ISSUE] Crear utilidad que permite levantar la UI - **A Fin** de poder levantar cualquier **UI** **Quiero** contar con el comando que simplifique todo el proceso **Y** quiero poder levantar la ui en modo `DEBUG` **Y** de manera normal **Y** quiero poder indicar el valor de `CLUSTER_ENV` **Y** en caso de no indicarlo que tome el valor por defecto de las variables globales. ___ ## 📝Tareas adicionales - [x] **Comentar la función** - [x] **Agregar prueba de funcionalidad**
test
crear utilidad que permite levantar la ui a fin de poder levantar cualquier ui quiero contar con el comando que simplifique todo el proceso y quiero poder levantar la ui en modo debug y de manera normal y quiero poder indicar el valor de cluster env y en caso de no indicarlo que tome el valor por defecto de las variables globales 📝tareas adicionales comentar la función agregar prueba de funcionalidad
1
169,426
13,146,448,443
IssuesEvent
2020-08-08 09:56:01
moodlebox/moodlebox
https://api.github.com/repos/moodlebox/moodlebox
closed
Refactor Ansible roles
Status: tests passed Type: enhancement
For modularity, we need to refactor Ansible roles, increasing granularity.
1.0
Refactor Ansible roles - For modularity, we need to refactor Ansible roles, increasing granularity.
test
refactor ansible roles for modularity we need to refactor ansible roles increasing granularity
1
275,385
23,912,216,831
IssuesEvent
2022-09-09 09:16:32
hotosm/galaxy-api
https://api.github.com/repos/hotosm/galaxy-api
closed
Feature : Add status filter on tasking manager validation stats
status:testing
Feature : Add status filter on tasking manager validation stats Project endpoint should be filtering by project status. _Originally posted by @kshitijrajsharma in https://github.com/hotosm/galaxy-api/issues/271#issuecomment-1210142049_
1.0
Feature : Add status filter on tasking manager validation stats - Feature : Add status filter on tasking manager validation stats Project endpoint should be filtering by project status. _Originally posted by @kshitijrajsharma in https://github.com/hotosm/galaxy-api/issues/271#issuecomment-1210142049_
test
feature add status filter on tasking manager validation stats feature add status filter on tasking manager validation stats project endpoint should be filtering by project status originally posted by kshitijrajsharma in
1
139,932
11,299,554,183
IssuesEvent
2020-01-17 11:28:53
prostomarkeloff/vk.py
https://api.github.com/repos/prostomarkeloff/vk.py
closed
Переработать MetaMixin
1.0.0-release need-docs need-tests
Нужно переработать MetaMixin для более подробного и гибкого описания объектов.
1.0
Переработать MetaMixin - Нужно переработать MetaMixin для более подробного и гибкого описания объектов.
test
переработать metamixin нужно переработать metamixin для более подробного и гибкого описания объектов
1
107,314
11,527,744,507
IssuesEvent
2020-02-16 00:05:10
laurentlaurent/ShutterFeed-a-soen-341-repo
https://api.github.com/repos/laurentlaurent/ShutterFeed-a-soen-341-repo
closed
Create templates
documentation
<!-- ==== Template for User Story Checklist ==== 1. Enter the name 2. Describe the feature or write the user story in a first-person point of view. 3. Write the acceptance test(s). Those are the validation tests that must be met to consider the issue to be closed. 4. Describe any related features or user stories. Doing so will help us create epics more easily. 5. List the tasks to be performed to complete the user story. 6. Label the issue 7. Add new user story to wiki ============================================--> <!-- Choose the type: User Story or Task. Don't worry if the pipes don't line up--> | Task | P | SP | |:-----------------------|:-:|:--:| | Create templates | 5 | 1 | <!-- Write a Description Below --> For Taxinomy on issue type to make into templates <!-- Don't write anything near the line --> ------------------------------------------ ## Task List Create a template for: - [x] User Story [#62] - [x] Task - [ ] For next meeting/Discussion - [ ] Requesting help for feature - [ ] Verify issue completion with Acceptance Test. Done! <!-- Enter some tasks above ~~~~~~~HELPER~~~~ Use checkboxes like this: - [ ] Task 1 (Add link to issue number if needed) - [ ] Task 2 (@ people assigned to the task ~~~~~~~~~~~~~~~ --> <!-- Don't write anything near the line --> ------------------------------------------ <!-- ## Requirements * List Requirements if there are any --> ## Acceptance Tests * Issue templates created <!-- Don't write anything near the line --> ------------------------------------------ ## Related features/user stories <!--~~~~HELPER~~~~~ Use bullet points like this: * Related feature [#A] * Related issue number [#B] ~~~~~~~~~~~~~~~--> ## Additional context The same way we now have a template for user stories, we should have one for these different types of issues. This will create a more homogeneous issue environment.
1.0
Create templates - <!-- ==== Template for User Story Checklist ==== 1. Enter the name 2. Describe the feature or write the user story in a first-person point of view. 3. Write the acceptance test(s). Those are the validation tests that must be met to consider the issue to be closed. 4. Describe any related features or user stories. Doing so will help us create epics more easily. 5. List the tasks to be performed to complete the user story. 6. Label the issue 7. Add new user story to wiki ============================================--> <!-- Choose the type: User Story or Task. Don't worry if the pipes don't line up--> | Task | P | SP | |:-----------------------|:-:|:--:| | Create templates | 5 | 1 | <!-- Write a Description Below --> For Taxinomy on issue type to make into templates <!-- Don't write anything near the line --> ------------------------------------------ ## Task List Create a template for: - [x] User Story [#62] - [x] Task - [ ] For next meeting/Discussion - [ ] Requesting help for feature - [ ] Verify issue completion with Acceptance Test. Done! <!-- Enter some tasks above ~~~~~~~HELPER~~~~ Use checkboxes like this: - [ ] Task 1 (Add link to issue number if needed) - [ ] Task 2 (@ people assigned to the task ~~~~~~~~~~~~~~~ --> <!-- Don't write anything near the line --> ------------------------------------------ <!-- ## Requirements * List Requirements if there are any --> ## Acceptance Tests * Issue templates created <!-- Don't write anything near the line --> ------------------------------------------ ## Related features/user stories <!--~~~~HELPER~~~~~ Use bullet points like this: * Related feature [#A] * Related issue number [#B] ~~~~~~~~~~~~~~~--> ## Additional context The same way we now have a template for user stories, we should have one for these different types of issues. This will create a more homogeneous issue environment.
non_test
create templates template for user story checklist enter the name describe the feature or write the user story in a first person point of view write the acceptance test s those are the validation tests that must be met to consider the issue to be closed describe any related features or user stories doing so will help us create epics more easily list the tasks to be performed to complete the user story label the issue add new user story to wiki task p sp create templates for taxinomy on issue type to make into templates task list create a template for user story task for next meeting discussion requesting help for feature verify issue completion with acceptance test done enter some tasks above helper use checkboxes like this task add link to issue number if needed task people assigned to the task requirements list requirements if there are any acceptance tests issue templates created related features user stories helper use bullet points like this related feature related issue number additional context the same way we now have a template for user stories we should have one for these different types of issues this will create a more homogeneous issue environment
0
109,960
9,421,299,995
IssuesEvent
2019-04-11 06:19:43
CARTAvis/carta-backend
https://api.github.com/repos/CARTAvis/carta-backend
closed
[Test] CURSOR_Z_PROFILE.test.ts failed since commit 023ce6c
ICD test failure
Cannot get response after sending set cursor. Currently this test is not included in CI test.
1.0
[Test] CURSOR_Z_PROFILE.test.ts failed since commit 023ce6c - Cannot get response after sending set cursor. Currently this test is not included in CI test.
test
cursor z profile test ts failed since commit cannot get response after sending set cursor currently this test is not included in ci test
1
80,317
9,994,337,053
IssuesEvent
2019-07-11 17:24:53
mhmdtshref/portfolio
https://api.github.com/repos/mhmdtshref/portfolio
reopened
Create Projects page component for admin app
design feature technical
Should create projects component design like the one created in Figma.
1.0
Create Projects page component for admin app - Should create projects component design like the one created in Figma.
non_test
create projects page component for admin app should create projects component design like the one created in figma
0
337,949
30,273,194,053
IssuesEvent
2023-07-07 17:06:56
pandas-dev/pandas
https://api.github.com/repos/pandas-dev/pandas
closed
BUG: `Series.replace` doesn't update `CategoricalDtype` when `inplace=True` in pandas-2.0
good first issue Needs Tests
### Pandas version checks - [X] I have checked that this issue has not already been reported. - [X] I have confirmed this bug exists on the [latest version](https://pandas.pydata.org/docs/whatsnew/index.html) of pandas. - [ ] I have confirmed this bug exists on the [main branch](https://pandas.pydata.org/docs/dev/getting_started/install.html#installing-the-development-version-of-pandas) of pandas. ### Reproducible Example ```python In [1]: import pandas as pd In [2]: s = pd.Series(["one", "two", "three"], dtype="category") In [3]: s Out[3]: 0 one 1 two 2 three dtype: category Categories (3, object): ['one', 'three', 'two'] In [4]: new_s = s.replace(to_replace="one", value="two") In [5]: new_s Out[5]: 0 two 1 two 2 three dtype: category Categories (2, object): ['three', 'two'] In [6]: new_s.dtype Out[6]: CategoricalDtype(categories=['three', 'two'], ordered=False) # Correct In [7]: s.replace(to_replace="one", value="two", inplace=True) In [8]: s Out[8]: 0 two 1 two 2 three dtype: category Categories (2, object): ['three', 'two'] # Correct __repr__ output In [9]: s.dtype Out[9]: CategoricalDtype(categories=['one', 'three', 'two'], ordered=False). # BUG: Incorrect dtype, dtype used to be updated pre pandas-2.0 ``` ### Issue Description When we replace values in a categorical Series, with `inplace=True`, the dtype is not being updated. ### Expected Behavior ```python In [9]: s.dtype Out[9]: CategoricalDtype(categories=['three', 'two'], ordered=False) ``` ### Installed Versions <details> INSTALLED VERSIONS ------------------ commit : 37ea63d540fd27274cad6585082c91b1283f963d python : 3.10.11.final.0 python-bits : 64 OS : Linux OS-release : 4.15.0-76-generic Version : #86-Ubuntu SMP Fri Jan 17 17:24:28 UTC 2020 machine : x86_64 processor : x86_64 byteorder : little LC_ALL : None LANG : en_US.UTF-8 LOCALE : en_US.UTF-8 pandas : 2.0.1 numpy : 1.23.5 pytz : 2023.3 dateutil : 2.8.2 setuptools : 67.7.2 pip : 23.1.2 Cython : 0.29.34 pytest : 7.3.1 hypothesis : 6.75.3 sphinx : 5.3.0 blosc : None feather : None xlsxwriter : None lxml.etree : None html5lib : None pymysql : None psycopg2 : None jinja2 : 3.1.2 IPython : 8.13.2 pandas_datareader: None bs4 : 4.12.2 bottleneck : None brotli : fastparquet : None fsspec : 2023.5.0 gcsfs : None matplotlib : None numba : 0.56.4 numexpr : None odfpy : None openpyxl : None pandas_gbq : None pyarrow : 11.0.0 pyreadstat : None pyxlsb : None s3fs : 2023.5.0 scipy : 1.10.1 snappy : sqlalchemy : 2.0.15 tables : None tabulate : 0.9.0 xarray : None xlrd : None zstandard : None tzdata : 2023.3 qtpy : None pyqt5 : None </details>
1.0
BUG: `Series.replace` doesn't update `CategoricalDtype` when `inplace=True` in pandas-2.0 - ### Pandas version checks - [X] I have checked that this issue has not already been reported. - [X] I have confirmed this bug exists on the [latest version](https://pandas.pydata.org/docs/whatsnew/index.html) of pandas. - [ ] I have confirmed this bug exists on the [main branch](https://pandas.pydata.org/docs/dev/getting_started/install.html#installing-the-development-version-of-pandas) of pandas. ### Reproducible Example ```python In [1]: import pandas as pd In [2]: s = pd.Series(["one", "two", "three"], dtype="category") In [3]: s Out[3]: 0 one 1 two 2 three dtype: category Categories (3, object): ['one', 'three', 'two'] In [4]: new_s = s.replace(to_replace="one", value="two") In [5]: new_s Out[5]: 0 two 1 two 2 three dtype: category Categories (2, object): ['three', 'two'] In [6]: new_s.dtype Out[6]: CategoricalDtype(categories=['three', 'two'], ordered=False) # Correct In [7]: s.replace(to_replace="one", value="two", inplace=True) In [8]: s Out[8]: 0 two 1 two 2 three dtype: category Categories (2, object): ['three', 'two'] # Correct __repr__ output In [9]: s.dtype Out[9]: CategoricalDtype(categories=['one', 'three', 'two'], ordered=False). # BUG: Incorrect dtype, dtype used to be updated pre pandas-2.0 ``` ### Issue Description When we replace values in a categorical Series, with `inplace=True`, the dtype is not being updated. ### Expected Behavior ```python In [9]: s.dtype Out[9]: CategoricalDtype(categories=['three', 'two'], ordered=False) ``` ### Installed Versions <details> INSTALLED VERSIONS ------------------ commit : 37ea63d540fd27274cad6585082c91b1283f963d python : 3.10.11.final.0 python-bits : 64 OS : Linux OS-release : 4.15.0-76-generic Version : #86-Ubuntu SMP Fri Jan 17 17:24:28 UTC 2020 machine : x86_64 processor : x86_64 byteorder : little LC_ALL : None LANG : en_US.UTF-8 LOCALE : en_US.UTF-8 pandas : 2.0.1 numpy : 1.23.5 pytz : 2023.3 dateutil : 2.8.2 setuptools : 67.7.2 pip : 23.1.2 Cython : 0.29.34 pytest : 7.3.1 hypothesis : 6.75.3 sphinx : 5.3.0 blosc : None feather : None xlsxwriter : None lxml.etree : None html5lib : None pymysql : None psycopg2 : None jinja2 : 3.1.2 IPython : 8.13.2 pandas_datareader: None bs4 : 4.12.2 bottleneck : None brotli : fastparquet : None fsspec : 2023.5.0 gcsfs : None matplotlib : None numba : 0.56.4 numexpr : None odfpy : None openpyxl : None pandas_gbq : None pyarrow : 11.0.0 pyreadstat : None pyxlsb : None s3fs : 2023.5.0 scipy : 1.10.1 snappy : sqlalchemy : 2.0.15 tables : None tabulate : 0.9.0 xarray : None xlrd : None zstandard : None tzdata : 2023.3 qtpy : None pyqt5 : None </details>
test
bug series replace doesn t update categoricaldtype when inplace true in pandas pandas version checks i have checked that this issue has not already been reported i have confirmed this bug exists on the of pandas i have confirmed this bug exists on the of pandas reproducible example python in import pandas as pd in s pd series dtype category in s out one two three dtype category categories object in new s s replace to replace one value two in new s out two two three dtype category categories object in new s dtype out categoricaldtype categories ordered false correct in s replace to replace one value two inplace true in s out two two three dtype category categories object correct repr output in s dtype out categoricaldtype categories ordered false bug incorrect dtype dtype used to be updated pre pandas issue description when we replace values in a categorical series with inplace true the dtype is not being updated expected behavior python in s dtype out categoricaldtype categories ordered false installed versions installed versions commit python final python bits os linux os release generic version ubuntu smp fri jan utc machine processor byteorder little lc all none lang en us utf locale en us utf pandas numpy pytz dateutil setuptools pip cython pytest hypothesis sphinx blosc none feather none xlsxwriter none lxml etree none none pymysql none none ipython pandas datareader none bottleneck none brotli fastparquet none fsspec gcsfs none matplotlib none numba numexpr none odfpy none openpyxl none pandas gbq none pyarrow pyreadstat none pyxlsb none scipy snappy sqlalchemy tables none tabulate xarray none xlrd none zstandard none tzdata qtpy none none
1
316,399
27,161,700,877
IssuesEvent
2023-02-17 12:25:00
wazuh/wazuh-qa
https://api.github.com/repos/wazuh/wazuh-qa
closed
Add coverage to new capabilities of the `sync-agent-groups-get` endpoint in `wazuh_db`
team/qa type/test-development role/qa-binary-beats subteam/qa-rainbow
| Target version | Related issue | Related PR/dev branch | |--------------------|--------------------|-----------------| | 4.4.0 | [#16196](https://github.com/wazuh/wazuh/issues/16196) | [#16202](https://github.com/wazuh/wazuh/pull/16202) | ## Description With the new changes in wazuh_db's endpoint `sync-agent-groups-get`, the parameter `condition` is optional and now there is the possibility to also obtain the _groups global hash_ from that endpoint. Integration tests `test_wazuh_db/test_sync_agent_groups_get.py` should be adapted to the new modifications, adding the new cases and changing the expected output of the **Test without condition** case where it was expected to fail and now it should work just fine. ## Proposed test cases <details><summary>Sync agent groups get - condition is optional and group hash added</summary> ```Gherkin Given a wazuh-manager with a wazuh-agent connected. And the wazuh-agent is assigned to 3 groups. When the query "<input>" is made to wazuh_db. Then `wazuh_db` responds "<output>" Examples: | input | output | | ------------------------------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------------ | | `global sync-agent-groups-get {"get_global_hash": true}` | `[{"data": [], "hash": "1945e0d9718edae6897a8c8777ad805a4fe6c9cd"}]` | | `global sync-agent-groups-get {}` | `[{"data": []}]` | | `global sync-agent-groups-get {"condition": "sync_status", "get_global_hash": true}` | `[{"data": [{"id": 1, "groups": ["g0", "g1", "g2" ]}], "hash": "1945e0d9718edae6897a8c8777ad805a4fe6c9cd"}]` | ``` </details>
1.0
Add coverage to new capabilities of the `sync-agent-groups-get` endpoint in `wazuh_db` - | Target version | Related issue | Related PR/dev branch | |--------------------|--------------------|-----------------| | 4.4.0 | [#16196](https://github.com/wazuh/wazuh/issues/16196) | [#16202](https://github.com/wazuh/wazuh/pull/16202) | ## Description With the new changes in wazuh_db's endpoint `sync-agent-groups-get`, the parameter `condition` is optional and now there is the possibility to also obtain the _groups global hash_ from that endpoint. Integration tests `test_wazuh_db/test_sync_agent_groups_get.py` should be adapted to the new modifications, adding the new cases and changing the expected output of the **Test without condition** case where it was expected to fail and now it should work just fine. ## Proposed test cases <details><summary>Sync agent groups get - condition is optional and group hash added</summary> ```Gherkin Given a wazuh-manager with a wazuh-agent connected. And the wazuh-agent is assigned to 3 groups. When the query "<input>" is made to wazuh_db. Then `wazuh_db` responds "<output>" Examples: | input | output | | ------------------------------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------------ | | `global sync-agent-groups-get {"get_global_hash": true}` | `[{"data": [], "hash": "1945e0d9718edae6897a8c8777ad805a4fe6c9cd"}]` | | `global sync-agent-groups-get {}` | `[{"data": []}]` | | `global sync-agent-groups-get {"condition": "sync_status", "get_global_hash": true}` | `[{"data": [{"id": 1, "groups": ["g0", "g1", "g2" ]}], "hash": "1945e0d9718edae6897a8c8777ad805a4fe6c9cd"}]` | ``` </details>
test
add coverage to new capabilities of the sync agent groups get endpoint in wazuh db target version related issue related pr dev branch description with the new changes in wazuh db s endpoint sync agent groups get the parameter condition is optional and now there is the possibility to also obtain the groups global hash from that endpoint integration tests test wazuh db test sync agent groups get py should be adapted to the new modifications adding the new cases and changing the expected output of the test without condition case where it was expected to fail and now it should work just fine proposed test cases sync agent groups get condition is optional and group hash added gherkin given a wazuh manager with a wazuh agent connected and the wazuh agent is assigned to groups when the query is made to wazuh db then wazuh db responds examples input output global sync agent groups get get global hash true hash global sync agent groups get global sync agent groups get condition sync status get global hash true hash
1
175,545
27,878,583,815
IssuesEvent
2023-03-21 17:37:51
WordPress/gutenberg
https://api.github.com/repos/WordPress/gutenberg
opened
Cover block: consolidate settings into one panel and remove Settings
[Type] Bug [Feature] Block API [Feature] Blocks [Feature] Design Tools
### Description With the addition of split settings https://github.com/WordPress/gutenberg/issues/40204 followed by the work to consolidate the settings when there's only an Advanced section https://github.com/WordPress/gutenberg/issues/47463, the Cover block shouldn't show split options. Right now, it does. Adding to 6.2 board since this was introduced in this release cycle. ### Step-by-step reproduction instructions 1. Add a cover block. 2. Notice that the settings are split but the settings tab only shows advanced section. ### Screenshots, screen recording, code snippet <img width="1244" alt="Screen Shot 2023-03-21 at 10 35 33 AM" src="https://user-images.githubusercontent.com/26996883/226694817-ed45eca2-dc45-44ef-aaf6-2ed251bd2c54.png"> ### Environment info - WP 6.2 RC2 - No GB ### Please confirm that you have searched existing issues in the repo. Yes ### Please confirm that you have tested with all plugins deactivated except Gutenberg. Yes
1.0
Cover block: consolidate settings into one panel and remove Settings - ### Description With the addition of split settings https://github.com/WordPress/gutenberg/issues/40204 followed by the work to consolidate the settings when there's only an Advanced section https://github.com/WordPress/gutenberg/issues/47463, the Cover block shouldn't show split options. Right now, it does. Adding to 6.2 board since this was introduced in this release cycle. ### Step-by-step reproduction instructions 1. Add a cover block. 2. Notice that the settings are split but the settings tab only shows advanced section. ### Screenshots, screen recording, code snippet <img width="1244" alt="Screen Shot 2023-03-21 at 10 35 33 AM" src="https://user-images.githubusercontent.com/26996883/226694817-ed45eca2-dc45-44ef-aaf6-2ed251bd2c54.png"> ### Environment info - WP 6.2 RC2 - No GB ### Please confirm that you have searched existing issues in the repo. Yes ### Please confirm that you have tested with all plugins deactivated except Gutenberg. Yes
non_test
cover block consolidate settings into one panel and remove settings description with the addition of split settings followed by the work to consolidate the settings when there s only an advanced section the cover block shouldn t show split options right now it does adding to board since this was introduced in this release cycle step by step reproduction instructions add a cover block notice that the settings are split but the settings tab only shows advanced section screenshots screen recording code snippet img width alt screen shot at am src environment info wp no gb please confirm that you have searched existing issues in the repo yes please confirm that you have tested with all plugins deactivated except gutenberg yes
0
717,663
24,686,281,711
IssuesEvent
2022-10-19 03:55:46
wso2/product-microgateway
https://api.github.com/repos/wso2/product-microgateway
opened
Enable security for prototyped APIs
Type/Improvement Priority/Normal Choreo
### Problem Currently authentication is not required for APIs with prototyped lifecyclestatus within choreo connect. Since prototyped lifecycle state is changed to PreRelease, we need to enable authentication for those APIs. ### Solution Currently auth filter is not engaged for prototyped APIs. We need to change that logic such that auth filter is engaged. ### Implementation _No response_ ### Related Issues _No response_ ### Suggested Labels _No response_
1.0
Enable security for prototyped APIs - ### Problem Currently authentication is not required for APIs with prototyped lifecyclestatus within choreo connect. Since prototyped lifecycle state is changed to PreRelease, we need to enable authentication for those APIs. ### Solution Currently auth filter is not engaged for prototyped APIs. We need to change that logic such that auth filter is engaged. ### Implementation _No response_ ### Related Issues _No response_ ### Suggested Labels _No response_
non_test
enable security for prototyped apis problem currently authentication is not required for apis with prototyped lifecyclestatus within choreo connect since prototyped lifecycle state is changed to prerelease we need to enable authentication for those apis solution currently auth filter is not engaged for prototyped apis we need to change that logic such that auth filter is engaged implementation no response related issues no response suggested labels no response
0
63,431
17,648,563,625
IssuesEvent
2021-08-20 09:51:14
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
opened
Read Receipts are sent when a user is changing its own settings
T-Defect
### Steps to reproduce 1. View a room 2. Open any modal, that will obstruct the room view (user settings, preferences, room settings, ...) 3. Wait for a new message to be received ### What happened? The read receipt is sent directly and the notification count is decremented ### What did you expect? For the notification count to remain the same and the read receipts to not be sent until the modal is closed and I can actually lay my eyes on the event ### Operating system _No response_ ### Browser information _No response_ ### URL for webapp app.element.io ### Have you submitted a rageshake? No
1.0
Read Receipts are sent when a user is changing its own settings - ### Steps to reproduce 1. View a room 2. Open any modal, that will obstruct the room view (user settings, preferences, room settings, ...) 3. Wait for a new message to be received ### What happened? The read receipt is sent directly and the notification count is decremented ### What did you expect? For the notification count to remain the same and the read receipts to not be sent until the modal is closed and I can actually lay my eyes on the event ### Operating system _No response_ ### Browser information _No response_ ### URL for webapp app.element.io ### Have you submitted a rageshake? No
non_test
read receipts are sent when a user is changing its own settings steps to reproduce view a room open any modal that will obstruct the room view user settings preferences room settings wait for a new message to be received what happened the read receipt is sent directly and the notification count is decremented what did you expect for the notification count to remain the same and the read receipts to not be sent until the modal is closed and i can actually lay my eyes on the event operating system no response browser information no response url for webapp app element io have you submitted a rageshake no
0
213,876
16,542,409,163
IssuesEvent
2021-05-27 18:37:14
hzi-braunschweig/SORMAS-Project
https://api.github.com/repos/hzi-braunschweig/SORMAS-Project
closed
Create the creation flow of person, contact, case, event, sample and task using the REST API
contacts e2e-tests events laboratory persons rest-api task tasks
### Proposed Solution Cover the basic creation of person, contact, case, event, sample and task using using the '/push' endpoint for each
1.0
Create the creation flow of person, contact, case, event, sample and task using the REST API - ### Proposed Solution Cover the basic creation of person, contact, case, event, sample and task using using the '/push' endpoint for each
test
create the creation flow of person contact case event sample and task using the rest api proposed solution cover the basic creation of person contact case event sample and task using using the push endpoint for each
1
16,778
9,527,270,682
IssuesEvent
2019-04-29 02:51:17
MUMT-IT/mis2018
https://api.github.com/repos/MUMT-IT/mis2018
opened
Index ของ ComHealth เริ่มโหลดช้า
performance issue
น่าจะเป็นที่โหลดรายการทั้งหมดและต้อง filter ด้วย JavaScript ใน template ควรปรับให้ query ตัวเลขจำนวนโดยตรงจากฐานข้อมูลน่าจะทำให้การโหลดไวมากขึ้น
True
Index ของ ComHealth เริ่มโหลดช้า - น่าจะเป็นที่โหลดรายการทั้งหมดและต้อง filter ด้วย JavaScript ใน template ควรปรับให้ query ตัวเลขจำนวนโดยตรงจากฐานข้อมูลน่าจะทำให้การโหลดไวมากขึ้น
non_test
index ของ comhealth เริ่มโหลดช้า น่าจะเป็นที่โหลดรายการทั้งหมดและต้อง filter ด้วย javascript ใน template ควรปรับให้ query ตัวเลขจำนวนโดยตรงจากฐานข้อมูลน่าจะทำให้การโหลดไวมากขึ้น
0
96,158
8,598,238,929
IssuesEvent
2018-11-15 21:09:47
WikiWatershed/model-my-watershed
https://api.github.com/repos/WikiWatershed/model-my-watershed
closed
Unit Conversion: Set User Preferred Units
NSF Unit Conversion User Accounts tested/verified
Add a variable to the `user` object that is their preferred unit scheme, Metric or US Customary. Make it so that this is saved to the database, and read at load. Add a section in the User Account section to be able to set preferred units. The default should be Metric. Users that are not logged in will not be able to change to US Customary.
1.0
Unit Conversion: Set User Preferred Units - Add a variable to the `user` object that is their preferred unit scheme, Metric or US Customary. Make it so that this is saved to the database, and read at load. Add a section in the User Account section to be able to set preferred units. The default should be Metric. Users that are not logged in will not be able to change to US Customary.
test
unit conversion set user preferred units add a variable to the user object that is their preferred unit scheme metric or us customary make it so that this is saved to the database and read at load add a section in the user account section to be able to set preferred units the default should be metric users that are not logged in will not be able to change to us customary
1
561,030
16,609,734,445
IssuesEvent
2021-06-02 09:58:51
jina-ai/jina
https://api.github.com/repos/jina-ai/jina
closed
Connect Flow to existing running Pod
area/network epic/2.0 priority/important-soon type/feature-request
As a user of Jina I would like to connect a Flow to an existing Pod, as discussed [here], (https://jinaai.slack.com/archives/C018F60RBL5/p1622135612117500) right now, the Flow only spawns new Pods
1.0
Connect Flow to existing running Pod - As a user of Jina I would like to connect a Flow to an existing Pod, as discussed [here], (https://jinaai.slack.com/archives/C018F60RBL5/p1622135612117500) right now, the Flow only spawns new Pods
non_test
connect flow to existing running pod as a user of jina i would like to connect a flow to an existing pod as discussed right now the flow only spawns new pods
0
38,228
5,169,894,105
IssuesEvent
2017-01-18 03:01:26
bitshares/bitshares-core
https://api.github.com/repos/bitshares/bitshares-core
closed
If no valid, up to date, price feed then....
needs testing
_From @vikramrajkumar on June 9, 2015 17:40_ > No new shorts No forced settling No margin calls. > > TODO: create test. _Copied from original issue: cryptonomex/graphene#8_
1.0
If no valid, up to date, price feed then.... - _From @vikramrajkumar on June 9, 2015 17:40_ > No new shorts No forced settling No margin calls. > > TODO: create test. _Copied from original issue: cryptonomex/graphene#8_
test
if no valid up to date price feed then from vikramrajkumar on june no new shorts no forced settling no margin calls todo create test copied from original issue cryptonomex graphene
1
190,102
14,533,106,291
IssuesEvent
2020-12-14 23:47:53
rancher/dashboard
https://api.github.com/repos/rancher/dashboard
closed
Scheduled scan's Config page does not show the values of the scheduled scan created
[zube]: To Test area/cis kind/bug product/cis
**On 2.5-head - commit id: `7e386ebab3f`** - Deploy CIS v2 - Create a scheduled scan <img width="1422" alt="Screen Shot 2020-12-04 at 2 01 38 PM" src="https://user-images.githubusercontent.com/26032343/101219691-3e3aaa80-3639-11eb-87e6-1313c479e205.png"> - Click on the scan to go to the Scan CR's details page, on the top right, click on Config. <img width="1438" alt="Screen Shot 2020-12-04 at 2 01 57 PM" src="https://user-images.githubusercontent.com/26032343/101219718-498dd600-3639-11eb-8fd3-0f061079b380.png"> - Selected values while creating the scheduled scan are NOT available
1.0
Scheduled scan's Config page does not show the values of the scheduled scan created - **On 2.5-head - commit id: `7e386ebab3f`** - Deploy CIS v2 - Create a scheduled scan <img width="1422" alt="Screen Shot 2020-12-04 at 2 01 38 PM" src="https://user-images.githubusercontent.com/26032343/101219691-3e3aaa80-3639-11eb-87e6-1313c479e205.png"> - Click on the scan to go to the Scan CR's details page, on the top right, click on Config. <img width="1438" alt="Screen Shot 2020-12-04 at 2 01 57 PM" src="https://user-images.githubusercontent.com/26032343/101219718-498dd600-3639-11eb-8fd3-0f061079b380.png"> - Selected values while creating the scheduled scan are NOT available
test
scheduled scan s config page does not show the values of the scheduled scan created on head commit id deploy cis create a scheduled scan img width alt screen shot at pm src click on the scan to go to the scan cr s details page on the top right click on config img width alt screen shot at pm src selected values while creating the scheduled scan are not available
1
83,933
24,173,360,169
IssuesEvent
2022-09-22 21:33:18
microsoft/onnxruntime
https://api.github.com/repos/microsoft/onnxruntime
opened
[Build] Onnxruntime C++ samples do not build off Cmake installed onnxruntime
build
### Describe the issue Build and install onnxruntime from source with `CMAKE_PREFIX` defined Install it and trying building samples. Imagenet `main.cc` fails to include `cpu_provider.h` because it is not installed my cmake install process. ### Urgency _No response_ ### Target platform Windows ### Build script .\build.bat --build_dir .\cpu_build --config Debug --cmake_generator "Visual Studio 17 2022" --build_shared_lib --parallel 11 --skip_submodule_sync --cmake_extra_defines CMAKE_INSTALL_PREFIX=D:\dev\oss\onnxruntime_debug ### Error / output 1>D:\dev\onnxruntime-inference-examples\c_cxx\include\providers.h(5,10): fatal error C1083: Cannot open include file: 'cpu_provider_factory.h': No such file or directory ### Visual Studio Version 2022 ### GCC / Compiler Version _No response_
1.0
[Build] Onnxruntime C++ samples do not build off Cmake installed onnxruntime - ### Describe the issue Build and install onnxruntime from source with `CMAKE_PREFIX` defined Install it and trying building samples. Imagenet `main.cc` fails to include `cpu_provider.h` because it is not installed my cmake install process. ### Urgency _No response_ ### Target platform Windows ### Build script .\build.bat --build_dir .\cpu_build --config Debug --cmake_generator "Visual Studio 17 2022" --build_shared_lib --parallel 11 --skip_submodule_sync --cmake_extra_defines CMAKE_INSTALL_PREFIX=D:\dev\oss\onnxruntime_debug ### Error / output 1>D:\dev\onnxruntime-inference-examples\c_cxx\include\providers.h(5,10): fatal error C1083: Cannot open include file: 'cpu_provider_factory.h': No such file or directory ### Visual Studio Version 2022 ### GCC / Compiler Version _No response_
non_test
onnxruntime c samples do not build off cmake installed onnxruntime describe the issue build and install onnxruntime from source with cmake prefix defined install it and trying building samples imagenet main cc fails to include cpu provider h because it is not installed my cmake install process urgency no response target platform windows build script build bat build dir cpu build config debug cmake generator visual studio build shared lib parallel skip submodule sync cmake extra defines cmake install prefix d dev oss onnxruntime debug error output d dev onnxruntime inference examples c cxx include providers h fatal error cannot open include file cpu provider factory h no such file or directory visual studio version gcc compiler version no response
0
82,019
7,810,175,336
IssuesEvent
2018-06-12 05:22:22
jruby/jruby
https://api.github.com/repos/jruby/jruby
closed
AsciidoctorJ fails on JRuby 9.2.0.0
java integration regression tests
### Environment JRuby 9.2.0.0 OS X: Darwin Roberts-MacBook-Air.local 17.5.0 Darwin Kernel Version 17.5.0: Fri Apr 13 19:32:32 PDT 2018; root:xnu-4570.51.2~1/RELEASE_X86_64 x86_64 ### Expected Behavior I tried upgrading the dependency in AsciidoctorJ to 9.2.0.0 and expected the build to run. ### Actual Behavior As soon as the Asciidoctor instance is created, it fails with a java.lang.VerifyError: ``` java.lang.VerifyError: Bad return type Exception Details: Location: org/jruby/gen/InterfaceImpl659984099.converters()Lorg/jruby/RubyArray; @45: areturn Reason: Type 'org/jruby/runtime/builtin/IRubyObject' (current frame, stack[0]) is not assignable to 'org/jruby/RubyArray' (from method signature) Current Frame: bci: @45 flags: { } locals: { 'org/jruby/gen/InterfaceImpl659984099', 'org/jruby/runtime/builtin/IRubyObject', 'org/jruby/Ruby' } stack: { 'org/jruby/runtime/builtin/IRubyObject' } Bytecode: 0000000: 2ab4 0015 4c2b b900 1d01 004d b200 1f2b 0000010: 126e 126f b600 272c b600 2d2b 2bb9 0031 0000020: 0100 126f b200 73b2 003d b600 43b0 at java.base/java.lang.Class.getDeclaredConstructors0(Native Method) at java.base/java.lang.Class.privateGetDeclaredConstructors(Class.java:3090) at java.base/java.lang.Class.getConstructor0(Class.java:3295) at java.base/java.lang.Class.getConstructor(Class.java:2110) at org.jruby.javasupport.Java.newInterfaceImpl(Java.java:1352) at org.jruby.java.proxies.JavaInterfaceTemplate.newInterfaceProxy(JavaInterfaceTemplate.java:285) at org.jruby.java.proxies.JavaInterfaceTemplate.access$100(JavaInterfaceTemplate.java:34) at org.jruby.java.proxies.JavaInterfaceTemplate$InterfaceProxyFactory.call(JavaInterfaceTemplate.java:233) at org.jruby.internal.runtime.methods.DynamicMethod.call(DynamicMethod.java:194) at org.jruby.RubyClass.finvoke(RubyClass.java:560) at org.jruby.runtime.Helpers.invoke(Helpers.java:353) at org.jruby.javasupport.JavaUtil.convertProcToInterface(JavaUtil.java:278) at org.jruby.RubyBasicObject.defaultToJava(RubyBasicObject.java:898) at org.jruby.RubyBasicObject.toJava(RubyBasicObject.java:876) at org.jruby.javasupport.JavaEmbedUtils.rubyToJava(JavaEmbedUtils.java:247) at org.asciidoctor.internal.RubyUtils.rubyToJava(RubyUtils.java:19) at org.asciidoctor.internal.JRubyAsciidoctorModuleFactory.createAsciidoctorModule(JRubyAsciidoctorModuleFactory.java:27) ... ``` At the moment the "glue" between the Java API and the Asciidoctor Ruby implementation is moved to JRuby, by having a Java interface `AsciidoctorModule` [1] and a Ruby class `AsciidoctorModule`[2] and letting JRuby implement this interface for this Ruby class [3]. It looks like this fails now exactly where JRuby creates the proxy for this interface. I created a test repository at https://github.com/robertpanzer/jruby92test where I also tried to reproduce the error with a simplified version, but there it succeeds. The repo also contains a test with Asciidoctor though, and that one fails. Maybe you have an idea if we did sth wrong in AsciidoctorJ or if this is a real bug. For the future I am considering to remove the dynamic implementation of this interface anyway, so that I have a workaround (https://github.com/asciidoctor/asciidoctorj/pull/652), but it would still be nice to know to cause of this error. [1] https://github.com/asciidoctor/asciidoctorj/blob/master/asciidoctorj-core/src/main/java/org/asciidoctor/internal/AsciidoctorModule.java [2] https://github.com/asciidoctor/asciidoctorj/blob/master/asciidoctorj-core/src/main/resources/org/asciidoctor/internal/asciidoctorclass.rb [3] https://github.com/asciidoctor/asciidoctorj/blob/master/asciidoctorj-core/src/main/java/org/asciidoctor/internal/JRubyAsciidoctorModuleFactory.java#L27
1.0
AsciidoctorJ fails on JRuby 9.2.0.0 - ### Environment JRuby 9.2.0.0 OS X: Darwin Roberts-MacBook-Air.local 17.5.0 Darwin Kernel Version 17.5.0: Fri Apr 13 19:32:32 PDT 2018; root:xnu-4570.51.2~1/RELEASE_X86_64 x86_64 ### Expected Behavior I tried upgrading the dependency in AsciidoctorJ to 9.2.0.0 and expected the build to run. ### Actual Behavior As soon as the Asciidoctor instance is created, it fails with a java.lang.VerifyError: ``` java.lang.VerifyError: Bad return type Exception Details: Location: org/jruby/gen/InterfaceImpl659984099.converters()Lorg/jruby/RubyArray; @45: areturn Reason: Type 'org/jruby/runtime/builtin/IRubyObject' (current frame, stack[0]) is not assignable to 'org/jruby/RubyArray' (from method signature) Current Frame: bci: @45 flags: { } locals: { 'org/jruby/gen/InterfaceImpl659984099', 'org/jruby/runtime/builtin/IRubyObject', 'org/jruby/Ruby' } stack: { 'org/jruby/runtime/builtin/IRubyObject' } Bytecode: 0000000: 2ab4 0015 4c2b b900 1d01 004d b200 1f2b 0000010: 126e 126f b600 272c b600 2d2b 2bb9 0031 0000020: 0100 126f b200 73b2 003d b600 43b0 at java.base/java.lang.Class.getDeclaredConstructors0(Native Method) at java.base/java.lang.Class.privateGetDeclaredConstructors(Class.java:3090) at java.base/java.lang.Class.getConstructor0(Class.java:3295) at java.base/java.lang.Class.getConstructor(Class.java:2110) at org.jruby.javasupport.Java.newInterfaceImpl(Java.java:1352) at org.jruby.java.proxies.JavaInterfaceTemplate.newInterfaceProxy(JavaInterfaceTemplate.java:285) at org.jruby.java.proxies.JavaInterfaceTemplate.access$100(JavaInterfaceTemplate.java:34) at org.jruby.java.proxies.JavaInterfaceTemplate$InterfaceProxyFactory.call(JavaInterfaceTemplate.java:233) at org.jruby.internal.runtime.methods.DynamicMethod.call(DynamicMethod.java:194) at org.jruby.RubyClass.finvoke(RubyClass.java:560) at org.jruby.runtime.Helpers.invoke(Helpers.java:353) at org.jruby.javasupport.JavaUtil.convertProcToInterface(JavaUtil.java:278) at org.jruby.RubyBasicObject.defaultToJava(RubyBasicObject.java:898) at org.jruby.RubyBasicObject.toJava(RubyBasicObject.java:876) at org.jruby.javasupport.JavaEmbedUtils.rubyToJava(JavaEmbedUtils.java:247) at org.asciidoctor.internal.RubyUtils.rubyToJava(RubyUtils.java:19) at org.asciidoctor.internal.JRubyAsciidoctorModuleFactory.createAsciidoctorModule(JRubyAsciidoctorModuleFactory.java:27) ... ``` At the moment the "glue" between the Java API and the Asciidoctor Ruby implementation is moved to JRuby, by having a Java interface `AsciidoctorModule` [1] and a Ruby class `AsciidoctorModule`[2] and letting JRuby implement this interface for this Ruby class [3]. It looks like this fails now exactly where JRuby creates the proxy for this interface. I created a test repository at https://github.com/robertpanzer/jruby92test where I also tried to reproduce the error with a simplified version, but there it succeeds. The repo also contains a test with Asciidoctor though, and that one fails. Maybe you have an idea if we did sth wrong in AsciidoctorJ or if this is a real bug. For the future I am considering to remove the dynamic implementation of this interface anyway, so that I have a workaround (https://github.com/asciidoctor/asciidoctorj/pull/652), but it would still be nice to know to cause of this error. [1] https://github.com/asciidoctor/asciidoctorj/blob/master/asciidoctorj-core/src/main/java/org/asciidoctor/internal/AsciidoctorModule.java [2] https://github.com/asciidoctor/asciidoctorj/blob/master/asciidoctorj-core/src/main/resources/org/asciidoctor/internal/asciidoctorclass.rb [3] https://github.com/asciidoctor/asciidoctorj/blob/master/asciidoctorj-core/src/main/java/org/asciidoctor/internal/JRubyAsciidoctorModuleFactory.java#L27
test
asciidoctorj fails on jruby environment jruby os x darwin roberts macbook air local darwin kernel version fri apr pdt root xnu release expected behavior i tried upgrading the dependency in asciidoctorj to and expected the build to run actual behavior as soon as the asciidoctor instance is created it fails with a java lang verifyerror java lang verifyerror bad return type exception details location org jruby gen converters lorg jruby rubyarray areturn reason type org jruby runtime builtin irubyobject current frame stack is not assignable to org jruby rubyarray from method signature current frame bci flags locals org jruby gen org jruby runtime builtin irubyobject org jruby ruby stack org jruby runtime builtin irubyobject bytecode at java base java lang class native method at java base java lang class privategetdeclaredconstructors class java at java base java lang class class java at java base java lang class getconstructor class java at org jruby javasupport java newinterfaceimpl java java at org jruby java proxies javainterfacetemplate newinterfaceproxy javainterfacetemplate java at org jruby java proxies javainterfacetemplate access javainterfacetemplate java at org jruby java proxies javainterfacetemplate interfaceproxyfactory call javainterfacetemplate java at org jruby internal runtime methods dynamicmethod call dynamicmethod java at org jruby rubyclass finvoke rubyclass java at org jruby runtime helpers invoke helpers java at org jruby javasupport javautil convertproctointerface javautil java at org jruby rubybasicobject defaulttojava rubybasicobject java at org jruby rubybasicobject tojava rubybasicobject java at org jruby javasupport javaembedutils rubytojava javaembedutils java at org asciidoctor internal rubyutils rubytojava rubyutils java at org asciidoctor internal jrubyasciidoctormodulefactory createasciidoctormodule jrubyasciidoctormodulefactory java at the moment the glue between the java api and the asciidoctor ruby implementation is moved to jruby by having a java interface asciidoctormodule and a ruby class asciidoctormodule and letting jruby implement this interface for this ruby class it looks like this fails now exactly where jruby creates the proxy for this interface i created a test repository at where i also tried to reproduce the error with a simplified version but there it succeeds the repo also contains a test with asciidoctor though and that one fails maybe you have an idea if we did sth wrong in asciidoctorj or if this is a real bug for the future i am considering to remove the dynamic implementation of this interface anyway so that i have a workaround but it would still be nice to know to cause of this error
1
193,350
6,884,142,412
IssuesEvent
2017-11-21 11:55:23
ZeusWPI/MOZAIC
https://api.github.com/repos/ZeusWPI/MOZAIC
closed
Log format
botdriver discussion priority:medium
Now that we should try to decide on an universal logger interface, it is important to think about the logging format that we want to support. As usual, being more restrictive will give the framework more power, but being permissive is just, well, generally being nice. The most important considerations, according to me™: - Do we force a line-based format - Do we force a JSON-based format - Do we force having a record for each turn played
1.0
Log format - Now that we should try to decide on an universal logger interface, it is important to think about the logging format that we want to support. As usual, being more restrictive will give the framework more power, but being permissive is just, well, generally being nice. The most important considerations, according to me™: - Do we force a line-based format - Do we force a JSON-based format - Do we force having a record for each turn played
non_test
log format now that we should try to decide on an universal logger interface it is important to think about the logging format that we want to support as usual being more restrictive will give the framework more power but being permissive is just well generally being nice the most important considerations according to me™ do we force a line based format do we force a json based format do we force having a record for each turn played
0
10,584
4,074,267,377
IssuesEvent
2016-05-28 09:55:08
SleepyTrousers/EnderIO
https://api.github.com/repos/SleepyTrousers/EnderIO
closed
Insane Amounts of XP EnderIO -1.7.10-2.2.6.313_beta
bug Code Complete
When ever i manually put in any dusts to be smelted in the alloy smelter in furnace mode and then pick it up once it has smelted up - 3 ingots picked up == to 17 LEVELS. XP gain increases the more ingots i pick up at in one go from the smelter EDIT: Seems to be happening with any ore from thermal foundation even if it is directly smelted,
1.0
Insane Amounts of XP EnderIO -1.7.10-2.2.6.313_beta - When ever i manually put in any dusts to be smelted in the alloy smelter in furnace mode and then pick it up once it has smelted up - 3 ingots picked up == to 17 LEVELS. XP gain increases the more ingots i pick up at in one go from the smelter EDIT: Seems to be happening with any ore from thermal foundation even if it is directly smelted,
non_test
insane amounts of xp enderio beta when ever i manually put in any dusts to be smelted in the alloy smelter in furnace mode and then pick it up once it has smelted up ingots picked up to levels xp gain increases the more ingots i pick up at in one go from the smelter edit seems to be happening with any ore from thermal foundation even if it is directly smelted
0
246,516
7,895,384,203
IssuesEvent
2018-06-29 02:55:48
aowen87/BAR
https://api.github.com/repos/aowen87/BAR
closed
Add a parallel mxterm host profile to all the LLNL hosts it makes sense for.
Expected Use: 3 - Occasional Feature Impact: 3 - Medium OS: All Priority: Normal Support Group: Any
Add a parallel mxterm host profile to all the LLNL hosts it makes sense for. -----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. The following information could not be accurately captured in the new ticket: Original author: Eric Brugger Original creation: 03/30/2015 07:24 pm Original update: 03/30/2015 07:46 pm Ticket number: 2195
1.0
Add a parallel mxterm host profile to all the LLNL hosts it makes sense for. - Add a parallel mxterm host profile to all the LLNL hosts it makes sense for. -----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. The following information could not be accurately captured in the new ticket: Original author: Eric Brugger Original creation: 03/30/2015 07:24 pm Original update: 03/30/2015 07:46 pm Ticket number: 2195
non_test
add a parallel mxterm host profile to all the llnl hosts it makes sense for add a parallel mxterm host profile to all the llnl hosts it makes sense for redmine migration this ticket was migrated from redmine the following information could not be accurately captured in the new ticket original author eric brugger original creation pm original update pm ticket number
0
365,794
25,552,105,953
IssuesEvent
2022-11-30 01:13:57
saltstack/salt
https://api.github.com/repos/saltstack/salt
closed
[BUG] Latest available pygit2 from Debian 11 and Pypi break GitFS
Documentation
**Description** The version of pygit2 included with Debian 11 (v1.4.0) only allows for RSA PEM keys (see [this issue](https://github.com/libgit2/pygit2/issues/1013)) and sends them with SHA-1 regardless of if they are SHA-256 or SHA-512 keys. GitHub has disabled all use of RSA SHA-1 keys. As of today (3/15/2022), RSA SHA-1 keys are not allowed: https://github.blog/2021-09-01-improving-git-protocol-security-github/ **Setup** (Please provide relevant configs and/or SLS files (be sure to remove sensitive info. There is no general set-up of Salt.) Please be as specific as possible and give set-up details. - [ ] on-prem machine - [x] VM (Virtualbox, KVM, etc. please specify): VMWare - [ ] VM running on a cloud service, please be explicit and add details - [ ] container (Kubernetes, Docker, containerd, etc. please specify) - [ ] or a combination, please be explicit - [ ] jails if it is FreeBSD **Steps to Reproduce the behavior** 1. First try a normal RSA key: `ssh-keygen -m PEM -t rsa -b 4096` 2. Also try a SHA-512 RSA key: `ssh-keygen -m PEM -t rsa -E sha512 -b 4096` 3. Also try a SHA-256 RSA key: `ssh-keygen -m PEM -t rsa -E sha256 -b 4096` 4. Also try an ed25519 key: `ssh-keygen -m PEM -a 100 -t ed25519 -E sha512` 5. Configure these keys as deploy keys for a private repo on GitHub 6. Configure a remote repo: ```yaml fileserver_backend: - gitfs gitfs_provider: pygit2 gitfs_remotes: - ssh://git@github.com/myorg/my-private-repo.git: - base: main - pubkey: /root/.ssh/id_my-key.pub - privkey: /root/.ssh/id_my-key ``` 7. Restart salt master 8. Try to pull `salt-run fileserver.update` With any RSA key, you will see: ``` [ERROR ] Error occurred fetching gitfs remote 'ssh://git@github.com/myorg/my-private-repo.git': ERROR: You're using an RSA key with SHA-1, which is no longer allowed. Please use a newer client or a different key type. Please see https://github.blog/2021-09-01-improving-git-protocol-security-github/ for more information. Traceback (most recent call last): File "/usr/lib/python3/dist-packages/salt/utils/gitfs.py", line 1870, in _fetch fetch_results = origin.fetch(**fetch_kwargs) File "/usr/lib/python3/dist-packages/pygit2/remote.py", line 128, in fetch payload.check_error(err) File "/usr/lib/python3/dist-packages/pygit2/callbacks.py", line 93, in check_error check_error(error_code) File "/usr/lib/python3/dist-packages/pygit2/errors.py", line 65, in check_error raise GitError(message) _pygit2.GitError: ERROR: You're using an RSA key with SHA-1, which is no longer allowed. Please use a newer client or a different key type. Please see https://github.blog/2021-09-01-improving-git-protocol-security-github/ for more information. ``` With any non-RSA key you will see: ``` [ERROR ] Error occurred fetching gitfs remote 'ssh://git@github.com/myorg/my-private-repo.git': callback failed to initialize SSH credentials Traceback (most recent call last): File "/usr/lib/python3/dist-packages/salt/utils/gitfs.py", line 1870, in _fetch fetch_results = origin.fetch(**fetch_kwargs) File "/usr/lib/python3/dist-packages/pygit2/remote.py", line 128, in fetch payload.check_error(err) File "/usr/lib/python3/dist-packages/pygit2/callbacks.py", line 93, in check_error check_error(error_code) File "/usr/lib/python3/dist-packages/pygit2/errors.py", line 65, in check_error raise GitError(message) _pygit2.GitError: callback failed to initialize SSH credentials ``` **Expected behavior** A clear and concise description of what you expected to happen. **Screenshots** If applicable, add screenshots to help explain your problem. **Versions Report** <details><summary>salt --versions-report</summary> (Provided by running salt --versions-report. Please also mention any differences in master/minion versions.) ```yaml Salt Version: Salt: 3004 Dependency Versions: cffi: Not Installed cherrypy: Not Installed dateutil: 2.8.1 docker-py: Not Installed gitdb: 4.0.5 gitpython: 3.1.14 Jinja2: 2.11.3 libgit2: 1.1.0 M2Crypto: Not Installed Mako: Not Installed msgpack: 1.0.0 msgpack-pure: Not Installed mysql-python: Not Installed pycparser: Not Installed pycrypto: Not Installed pycryptodome: 3.9.7 pygit2: 1.4.0 Python: 3.9.2 (default, Feb 28 2021, 17:03:44) python-gnupg: Not Installed PyYAML: 5.3.1 PyZMQ: 20.0.0 smmap: 4.0.0 timelib: Not Installed Tornado: 4.5.3 ZMQ: 4.3.4 System Versions: dist: debian 11 bullseye locale: utf-8 machine: x86_64 release: 5.10.0-12-amd64 system: Linux version: Debian GNU/Linux 11 bullseye ``` </details> **Additional context** Add any other context about the problem here.
1.0
[BUG] Latest available pygit2 from Debian 11 and Pypi break GitFS - **Description** The version of pygit2 included with Debian 11 (v1.4.0) only allows for RSA PEM keys (see [this issue](https://github.com/libgit2/pygit2/issues/1013)) and sends them with SHA-1 regardless of if they are SHA-256 or SHA-512 keys. GitHub has disabled all use of RSA SHA-1 keys. As of today (3/15/2022), RSA SHA-1 keys are not allowed: https://github.blog/2021-09-01-improving-git-protocol-security-github/ **Setup** (Please provide relevant configs and/or SLS files (be sure to remove sensitive info. There is no general set-up of Salt.) Please be as specific as possible and give set-up details. - [ ] on-prem machine - [x] VM (Virtualbox, KVM, etc. please specify): VMWare - [ ] VM running on a cloud service, please be explicit and add details - [ ] container (Kubernetes, Docker, containerd, etc. please specify) - [ ] or a combination, please be explicit - [ ] jails if it is FreeBSD **Steps to Reproduce the behavior** 1. First try a normal RSA key: `ssh-keygen -m PEM -t rsa -b 4096` 2. Also try a SHA-512 RSA key: `ssh-keygen -m PEM -t rsa -E sha512 -b 4096` 3. Also try a SHA-256 RSA key: `ssh-keygen -m PEM -t rsa -E sha256 -b 4096` 4. Also try an ed25519 key: `ssh-keygen -m PEM -a 100 -t ed25519 -E sha512` 5. Configure these keys as deploy keys for a private repo on GitHub 6. Configure a remote repo: ```yaml fileserver_backend: - gitfs gitfs_provider: pygit2 gitfs_remotes: - ssh://git@github.com/myorg/my-private-repo.git: - base: main - pubkey: /root/.ssh/id_my-key.pub - privkey: /root/.ssh/id_my-key ``` 7. Restart salt master 8. Try to pull `salt-run fileserver.update` With any RSA key, you will see: ``` [ERROR ] Error occurred fetching gitfs remote 'ssh://git@github.com/myorg/my-private-repo.git': ERROR: You're using an RSA key with SHA-1, which is no longer allowed. Please use a newer client or a different key type. Please see https://github.blog/2021-09-01-improving-git-protocol-security-github/ for more information. Traceback (most recent call last): File "/usr/lib/python3/dist-packages/salt/utils/gitfs.py", line 1870, in _fetch fetch_results = origin.fetch(**fetch_kwargs) File "/usr/lib/python3/dist-packages/pygit2/remote.py", line 128, in fetch payload.check_error(err) File "/usr/lib/python3/dist-packages/pygit2/callbacks.py", line 93, in check_error check_error(error_code) File "/usr/lib/python3/dist-packages/pygit2/errors.py", line 65, in check_error raise GitError(message) _pygit2.GitError: ERROR: You're using an RSA key with SHA-1, which is no longer allowed. Please use a newer client or a different key type. Please see https://github.blog/2021-09-01-improving-git-protocol-security-github/ for more information. ``` With any non-RSA key you will see: ``` [ERROR ] Error occurred fetching gitfs remote 'ssh://git@github.com/myorg/my-private-repo.git': callback failed to initialize SSH credentials Traceback (most recent call last): File "/usr/lib/python3/dist-packages/salt/utils/gitfs.py", line 1870, in _fetch fetch_results = origin.fetch(**fetch_kwargs) File "/usr/lib/python3/dist-packages/pygit2/remote.py", line 128, in fetch payload.check_error(err) File "/usr/lib/python3/dist-packages/pygit2/callbacks.py", line 93, in check_error check_error(error_code) File "/usr/lib/python3/dist-packages/pygit2/errors.py", line 65, in check_error raise GitError(message) _pygit2.GitError: callback failed to initialize SSH credentials ``` **Expected behavior** A clear and concise description of what you expected to happen. **Screenshots** If applicable, add screenshots to help explain your problem. **Versions Report** <details><summary>salt --versions-report</summary> (Provided by running salt --versions-report. Please also mention any differences in master/minion versions.) ```yaml Salt Version: Salt: 3004 Dependency Versions: cffi: Not Installed cherrypy: Not Installed dateutil: 2.8.1 docker-py: Not Installed gitdb: 4.0.5 gitpython: 3.1.14 Jinja2: 2.11.3 libgit2: 1.1.0 M2Crypto: Not Installed Mako: Not Installed msgpack: 1.0.0 msgpack-pure: Not Installed mysql-python: Not Installed pycparser: Not Installed pycrypto: Not Installed pycryptodome: 3.9.7 pygit2: 1.4.0 Python: 3.9.2 (default, Feb 28 2021, 17:03:44) python-gnupg: Not Installed PyYAML: 5.3.1 PyZMQ: 20.0.0 smmap: 4.0.0 timelib: Not Installed Tornado: 4.5.3 ZMQ: 4.3.4 System Versions: dist: debian 11 bullseye locale: utf-8 machine: x86_64 release: 5.10.0-12-amd64 system: Linux version: Debian GNU/Linux 11 bullseye ``` </details> **Additional context** Add any other context about the problem here.
non_test
latest available from debian and pypi break gitfs description the version of included with debian only allows for rsa pem keys see and sends them with sha regardless of if they are sha or sha keys github has disabled all use of rsa sha keys as of today rsa sha keys are not allowed setup please provide relevant configs and or sls files be sure to remove sensitive info there is no general set up of salt please be as specific as possible and give set up details on prem machine vm virtualbox kvm etc please specify vmware vm running on a cloud service please be explicit and add details container kubernetes docker containerd etc please specify or a combination please be explicit jails if it is freebsd steps to reproduce the behavior first try a normal rsa key ssh keygen m pem t rsa b also try a sha rsa key ssh keygen m pem t rsa e b also try a sha rsa key ssh keygen m pem t rsa e b also try an key ssh keygen m pem a t e configure these keys as deploy keys for a private repo on github configure a remote repo yaml fileserver backend gitfs gitfs provider gitfs remotes ssh git github com myorg my private repo git base main pubkey root ssh id my key pub privkey root ssh id my key restart salt master try to pull salt run fileserver update with any rsa key you will see error occurred fetching gitfs remote ssh git github com myorg my private repo git error you re using an rsa key with sha which is no longer allowed please use a newer client or a different key type please see for more information traceback most recent call last file usr lib dist packages salt utils gitfs py line in fetch fetch results origin fetch fetch kwargs file usr lib dist packages remote py line in fetch payload check error err file usr lib dist packages callbacks py line in check error check error error code file usr lib dist packages errors py line in check error raise giterror message giterror error you re using an rsa key with sha which is no longer allowed please use a newer client or a different key type please see for more information with any non rsa key you will see error occurred fetching gitfs remote ssh git github com myorg my private repo git callback failed to initialize ssh credentials traceback most recent call last file usr lib dist packages salt utils gitfs py line in fetch fetch results origin fetch fetch kwargs file usr lib dist packages remote py line in fetch payload check error err file usr lib dist packages callbacks py line in check error check error error code file usr lib dist packages errors py line in check error raise giterror message giterror callback failed to initialize ssh credentials expected behavior a clear and concise description of what you expected to happen screenshots if applicable add screenshots to help explain your problem versions report salt versions report provided by running salt versions report please also mention any differences in master minion versions yaml salt version salt dependency versions cffi not installed cherrypy not installed dateutil docker py not installed gitdb gitpython not installed mako not installed msgpack msgpack pure not installed mysql python not installed pycparser not installed pycrypto not installed pycryptodome python default feb python gnupg not installed pyyaml pyzmq smmap timelib not installed tornado zmq system versions dist debian bullseye locale utf machine release system linux version debian gnu linux bullseye additional context add any other context about the problem here
0
88,601
17,614,930,680
IssuesEvent
2021-08-18 08:33:07
SAP/fundamental-ngx
https://api.github.com/repos/SAP/fundamental-ngx
opened
refactor(core,platform): table navigatable
code refactoring platform core table
#### Is this a bug, enhancement, or feature request? Enhancement. #### Briefly describe your proposal. Navigatable feature of tables (core, platform) should be adjusted a bit * In the core component, there is no ability to make row activable, hoverable if the row is not navigatable. * In the platform component, there is no ability to make row navigatable without TS code, just from the template. Also, one more feature requested * Ability to trigger custom function on row navigation, not only go by the provided route. #### Which versions of Angular and Fundamental Library for Angular are affected? (If this is a feature request, use current version.) Latest #### If this is a bug, please provide steps for reproducing it. . #### Please provide relevant source code if applicable. . #### Is there anything else we should know? .
1.0
refactor(core,platform): table navigatable - #### Is this a bug, enhancement, or feature request? Enhancement. #### Briefly describe your proposal. Navigatable feature of tables (core, platform) should be adjusted a bit * In the core component, there is no ability to make row activable, hoverable if the row is not navigatable. * In the platform component, there is no ability to make row navigatable without TS code, just from the template. Also, one more feature requested * Ability to trigger custom function on row navigation, not only go by the provided route. #### Which versions of Angular and Fundamental Library for Angular are affected? (If this is a feature request, use current version.) Latest #### If this is a bug, please provide steps for reproducing it. . #### Please provide relevant source code if applicable. . #### Is there anything else we should know? .
non_test
refactor core platform table navigatable is this a bug enhancement or feature request enhancement briefly describe your proposal navigatable feature of tables core platform should be adjusted a bit in the core component there is no ability to make row activable hoverable if the row is not navigatable in the platform component there is no ability to make row navigatable without ts code just from the template also one more feature requested ability to trigger custom function on row navigation not only go by the provided route which versions of angular and fundamental library for angular are affected if this is a feature request use current version latest if this is a bug please provide steps for reproducing it please provide relevant source code if applicable is there anything else we should know
0
120,039
25,728,344,947
IssuesEvent
2022-12-07 18:14:36
letsintegreat/Tagify
https://api.github.com/repos/letsintegreat/Tagify
closed
Improve Google Sign In
bug Codepeak22
The google login option automatically uses the account last used by the user. It does not give the option to choose new account when signing out and logging in again. Ask to be assigned in the comments below before starting to work on this issue. Stick to the contribution guidelines as mentioned in the README file.
1.0
Improve Google Sign In - The google login option automatically uses the account last used by the user. It does not give the option to choose new account when signing out and logging in again. Ask to be assigned in the comments below before starting to work on this issue. Stick to the contribution guidelines as mentioned in the README file.
non_test
improve google sign in the google login option automatically uses the account last used by the user it does not give the option to choose new account when signing out and logging in again ask to be assigned in the comments below before starting to work on this issue stick to the contribution guidelines as mentioned in the readme file
0
94,387
27,180,730,510
IssuesEvent
2023-02-18 15:47:33
NixOS/nixpkgs
https://api.github.com/repos/NixOS/nixpkgs
closed
Build failure: `openimagedenoise`
0.kind: build failure
### Steps To Reproduce Steps to reproduce the behavior: 1. build `openimagedenoise` ### Build log ```console $ nix-channel --list nixos https://nixos.org/channels/nixos-unstable $ nix log /nix/store/2ay0ynwd7639msidi0f8xjbx518l7k4m-openimagedenoise-1.4.3.drv @nix { "action": "setPhase", "phase": "unpackPhase" } unpacking sources unpacking source archive /nix/store/gjqcn7495q4sqd9cm6lg3fyy936dbsa7-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } patching sources @nix { "action": "setPhase", "phase": "configurePhase" } configuring fixing cmake files... cmake flags: -DCMAKE_FIND_USE_SYSTEM_PACKAGE_REGISTRY=OFF -DCMAKE_FIND_USE_PACKAGE_REGISTRY=OFF -DCMAKE_EXPORT_NO_PACKAGE_REGISTRY=ON -DCMAKE_BUILD_TYPE=Release -DBUILD_TESTING=OFF -DCMAKE_INSTALL_LOCALEDIR=/nix/store/4p56q> -- The C compiler identification is GNU 12.2.0 -- The CXX compiler identification is GNU 12.2.0 -- Detecting C compiler ABI info -- Detecting C compiler ABI info - done -- Check for working C compiler: /nix/store/l0fvy72hpfdpjjs3dk4112f57x7r3dlm-gcc-wrapper-12.2.0/bin/gcc - skipped -- Detecting C compile features -- Detecting C compile features - done -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- Check for working CXX compiler: /nix/store/l0fvy72hpfdpjjs3dk4112f57x7r3dlm-gcc-wrapper-12.2.0/bin/g++ - skipped -- Detecting CXX compile features -- Detecting CXX compile features - done -- Found PythonInterp: /nix/store/0pyymzxf7n0fzpaqnvwv92ab72v3jq8d-python3-3.10.9/bin/python (found version "3.10.9") -- Performing Test CMAKE_HAVE_LIBC_PTHREAD -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success -- Found Threads: TRUE -- Looking for TBB components tbb; () -- Found TBB version 2020.3 at /nix/store/6y5ms2chn50ksw6fbsig8jm62fimqspr-tbb-2020.3-dev CMake Error at cmake/FindTBB.cmake:80 (message): Cannot find required components: ;tbb Call Stack (most recent call first): cmake/FindTBB.cmake:487 (rk_tbb_error) CMakeLists.txt:73 (find_package) -- Configuring incomplete, errors occurred! See also "/build/source/build/CMakeFiles/CMakeOutput.log". ``` ### Additional context Breaks `blender` since it depends on `openimagedenoise` ### Notify maintainers <!-- Please @ people who are in the `meta.maintainers` list of the offending package or module. If in doubt, check `git blame` for whoever last touched something. --> @LeshaInc (`openimagedenoise`); @thoughtpolice, @dizfer (`tbb`) ### Metadata Please run `nix-shell -p nix-info --run "nix-info -m"` and paste the result. ```console $ nix-shell -p nix-info --run "nix-info -m" - system: `"x86_64-linux"` - host os: `Linux 5.15.90, NixOS, 23.05 (Stoat), 23.05pre454549.545c7a31e5d` - multi-user?: `yes` - sandbox: `yes` - version: `nix-env (Nix) 2.13.2` - channels(USERNAME): `"home-manager"` - channels(root): `"nixos"` - nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos` ```
1.0
Build failure: `openimagedenoise` - ### Steps To Reproduce Steps to reproduce the behavior: 1. build `openimagedenoise` ### Build log ```console $ nix-channel --list nixos https://nixos.org/channels/nixos-unstable $ nix log /nix/store/2ay0ynwd7639msidi0f8xjbx518l7k4m-openimagedenoise-1.4.3.drv @nix { "action": "setPhase", "phase": "unpackPhase" } unpacking sources unpacking source archive /nix/store/gjqcn7495q4sqd9cm6lg3fyy936dbsa7-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } patching sources @nix { "action": "setPhase", "phase": "configurePhase" } configuring fixing cmake files... cmake flags: -DCMAKE_FIND_USE_SYSTEM_PACKAGE_REGISTRY=OFF -DCMAKE_FIND_USE_PACKAGE_REGISTRY=OFF -DCMAKE_EXPORT_NO_PACKAGE_REGISTRY=ON -DCMAKE_BUILD_TYPE=Release -DBUILD_TESTING=OFF -DCMAKE_INSTALL_LOCALEDIR=/nix/store/4p56q> -- The C compiler identification is GNU 12.2.0 -- The CXX compiler identification is GNU 12.2.0 -- Detecting C compiler ABI info -- Detecting C compiler ABI info - done -- Check for working C compiler: /nix/store/l0fvy72hpfdpjjs3dk4112f57x7r3dlm-gcc-wrapper-12.2.0/bin/gcc - skipped -- Detecting C compile features -- Detecting C compile features - done -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- Check for working CXX compiler: /nix/store/l0fvy72hpfdpjjs3dk4112f57x7r3dlm-gcc-wrapper-12.2.0/bin/g++ - skipped -- Detecting CXX compile features -- Detecting CXX compile features - done -- Found PythonInterp: /nix/store/0pyymzxf7n0fzpaqnvwv92ab72v3jq8d-python3-3.10.9/bin/python (found version "3.10.9") -- Performing Test CMAKE_HAVE_LIBC_PTHREAD -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success -- Found Threads: TRUE -- Looking for TBB components tbb; () -- Found TBB version 2020.3 at /nix/store/6y5ms2chn50ksw6fbsig8jm62fimqspr-tbb-2020.3-dev CMake Error at cmake/FindTBB.cmake:80 (message): Cannot find required components: ;tbb Call Stack (most recent call first): cmake/FindTBB.cmake:487 (rk_tbb_error) CMakeLists.txt:73 (find_package) -- Configuring incomplete, errors occurred! See also "/build/source/build/CMakeFiles/CMakeOutput.log". ``` ### Additional context Breaks `blender` since it depends on `openimagedenoise` ### Notify maintainers <!-- Please @ people who are in the `meta.maintainers` list of the offending package or module. If in doubt, check `git blame` for whoever last touched something. --> @LeshaInc (`openimagedenoise`); @thoughtpolice, @dizfer (`tbb`) ### Metadata Please run `nix-shell -p nix-info --run "nix-info -m"` and paste the result. ```console $ nix-shell -p nix-info --run "nix-info -m" - system: `"x86_64-linux"` - host os: `Linux 5.15.90, NixOS, 23.05 (Stoat), 23.05pre454549.545c7a31e5d` - multi-user?: `yes` - sandbox: `yes` - version: `nix-env (Nix) 2.13.2` - channels(USERNAME): `"home-manager"` - channels(root): `"nixos"` - nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos` ```
non_test
build failure openimagedenoise steps to reproduce steps to reproduce the behavior build openimagedenoise build log console nix channel list nixos nix log nix store openimagedenoise drv nix action setphase phase unpackphase unpacking sources unpacking source archive nix store source source root is source nix action setphase phase patchphase patching sources nix action setphase phase configurephase configuring fixing cmake files cmake flags dcmake find use system package registry off dcmake find use package registry off dcmake export no package registry on dcmake build type release dbuild testing off dcmake install localedir nix store the c compiler identification is gnu the cxx compiler identification is gnu detecting c compiler abi info detecting c compiler abi info done check for working c compiler nix store gcc wrapper bin gcc skipped detecting c compile features detecting c compile features done detecting cxx compiler abi info detecting cxx compiler abi info done check for working cxx compiler nix store gcc wrapper bin g skipped detecting cxx compile features detecting cxx compile features done found pythoninterp nix store bin python found version performing test cmake have libc pthread performing test cmake have libc pthread success found threads true looking for tbb components tbb found tbb version at nix store tbb dev cmake error at cmake findtbb cmake message cannot find required components tbb call stack most recent call first cmake findtbb cmake rk tbb error cmakelists txt find package configuring incomplete errors occurred see also build source build cmakefiles cmakeoutput log additional context breaks blender since it depends on openimagedenoise notify maintainers please people who are in the meta maintainers list of the offending package or module if in doubt check git blame for whoever last touched something leshainc openimagedenoise thoughtpolice dizfer tbb metadata please run nix shell p nix info run nix info m and paste the result console nix shell p nix info run nix info m system linux host os linux nixos stoat multi user yes sandbox yes version nix env nix channels username home manager channels root nixos nixpkgs nix var nix profiles per user root channels nixos
0
89,905
8,216,718,404
IssuesEvent
2018-09-05 10:01:43
humera987/HumTestData
https://api.github.com/repos/humera987/HumTestData
opened
project_test : ApiV1TestSuitesIdDeleteAnonymousInvalid
project_test
Project : project_test Job : UAT Env : UAT Region : FXLabs/US_WEST_1 Result : fail Status Code : 200 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Wed, 05 Sep 2018 10:01:42 GMT]} Endpoint : http://13.56.210.25/api/v1/test-suites/g6nT9gU3 Request : Response : { "requestId" : "None", "requestTime" : "2018-09-05T10:01:42.804+0000", "errors" : false, "messages" : [ ], "data" : null, "totalPages" : 0, "totalElements" : 0 } Logs : Assertion [@StatusCode != 200] failed, not expecting [200] but found [200] --- FX Bot ---
1.0
project_test : ApiV1TestSuitesIdDeleteAnonymousInvalid - Project : project_test Job : UAT Env : UAT Region : FXLabs/US_WEST_1 Result : fail Status Code : 200 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Wed, 05 Sep 2018 10:01:42 GMT]} Endpoint : http://13.56.210.25/api/v1/test-suites/g6nT9gU3 Request : Response : { "requestId" : "None", "requestTime" : "2018-09-05T10:01:42.804+0000", "errors" : false, "messages" : [ ], "data" : null, "totalPages" : 0, "totalElements" : 0 } Logs : Assertion [@StatusCode != 200] failed, not expecting [200] but found [200] --- FX Bot ---
test
project test project project test job uat env uat region fxlabs us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options content type transfer encoding date endpoint request response requestid none requesttime errors false messages data null totalpages totalelements logs assertion failed not expecting but found fx bot
1
20,296
10,700,293,889
IssuesEvent
2019-10-23 23:25:48
becurrie/titandash
https://api.github.com/repos/becurrie/titandash
closed
Upgrade In Game Actions Implementation
enhancement major performance
Currently, actions in game are a bit complex code wise and can be easily brought out into their own specific configuration settings category... We should ideally have the following actions settings configurations... - Master Action Settings - Hero Action Settings - Skills Level Action Settings - Skills Activate Action Settings Users should be able to determine the interval between each one taking place as well as enabling/disabling each one as needed. Users should be able to choose the level at which certain skills will stop being levelled up. The functionality for all of these should not rely on going to the master panel (unless explicitly needed)... We want to make this loop more efficient... Levels of skills should be stored on a prestige/prestige basis... Only levelling them when they're available/need an upgrade. Prestige should reset these variables. Most things can remain as they are here, implementation wise, but the skill levelling process will need a complete re write, to remove it from the activation process.
True
Upgrade In Game Actions Implementation - Currently, actions in game are a bit complex code wise and can be easily brought out into their own specific configuration settings category... We should ideally have the following actions settings configurations... - Master Action Settings - Hero Action Settings - Skills Level Action Settings - Skills Activate Action Settings Users should be able to determine the interval between each one taking place as well as enabling/disabling each one as needed. Users should be able to choose the level at which certain skills will stop being levelled up. The functionality for all of these should not rely on going to the master panel (unless explicitly needed)... We want to make this loop more efficient... Levels of skills should be stored on a prestige/prestige basis... Only levelling them when they're available/need an upgrade. Prestige should reset these variables. Most things can remain as they are here, implementation wise, but the skill levelling process will need a complete re write, to remove it from the activation process.
non_test
upgrade in game actions implementation currently actions in game are a bit complex code wise and can be easily brought out into their own specific configuration settings category we should ideally have the following actions settings configurations master action settings hero action settings skills level action settings skills activate action settings users should be able to determine the interval between each one taking place as well as enabling disabling each one as needed users should be able to choose the level at which certain skills will stop being levelled up the functionality for all of these should not rely on going to the master panel unless explicitly needed we want to make this loop more efficient levels of skills should be stored on a prestige prestige basis only levelling them when they re available need an upgrade prestige should reset these variables most things can remain as they are here implementation wise but the skill levelling process will need a complete re write to remove it from the activation process
0
198,435
15,709,440,104
IssuesEvent
2021-03-26 22:32:31
garoque/crud-eng-software
https://api.github.com/repos/garoque/crud-eng-software
closed
Relatório Iteração 4
documentation
## Relatório Iteração 4 Relatório das atividades feitas durante a iteração 4, o que funcionou ou deu errado durante a iteração. ### Período da iteração |Inicio:| 06/03/2021| |-------|-----------| | Fim: | 26/03/2021| ### Atividades planejadas - Criação de testes. - Desenvolvimento. - Modelo de dados. ### Atividades realizadas - [ ] ~~Criação de testes.~~ - [x] Desenvolvimento. - [x] Modelo de dados. ### Atividades não realizadas - [x] Criação de testes. - [ ] ~~Desenvolvimento.~~ - [ ] ~~Modelo de dados.~~ _Lições aprendidas_ - Conseguimos compreender que em ambiente remoto as vezes traz dificuldade em compartilhar ideias e resolver problemas ao longo do desenvolvimento por se tratar de reuniões online em que até são difíceis de ter todos integrantes, assim atrasando coisas que seriam simples em um ambiente de convívio comum. - E também faz falta de um programador experiente junto ao dia a dia de desenvolvimento para tirar dúvidas.
1.0
Relatório Iteração 4 - ## Relatório Iteração 4 Relatório das atividades feitas durante a iteração 4, o que funcionou ou deu errado durante a iteração. ### Período da iteração |Inicio:| 06/03/2021| |-------|-----------| | Fim: | 26/03/2021| ### Atividades planejadas - Criação de testes. - Desenvolvimento. - Modelo de dados. ### Atividades realizadas - [ ] ~~Criação de testes.~~ - [x] Desenvolvimento. - [x] Modelo de dados. ### Atividades não realizadas - [x] Criação de testes. - [ ] ~~Desenvolvimento.~~ - [ ] ~~Modelo de dados.~~ _Lições aprendidas_ - Conseguimos compreender que em ambiente remoto as vezes traz dificuldade em compartilhar ideias e resolver problemas ao longo do desenvolvimento por se tratar de reuniões online em que até são difíceis de ter todos integrantes, assim atrasando coisas que seriam simples em um ambiente de convívio comum. - E também faz falta de um programador experiente junto ao dia a dia de desenvolvimento para tirar dúvidas.
non_test
relatório iteração relatório iteração relatório das atividades feitas durante a iteração o que funcionou ou deu errado durante a iteração período da iteração inicio fim atividades planejadas criação de testes desenvolvimento modelo de dados atividades realizadas criação de testes desenvolvimento modelo de dados atividades não realizadas criação de testes desenvolvimento modelo de dados lições aprendidas conseguimos compreender que em ambiente remoto as vezes traz dificuldade em compartilhar ideias e resolver problemas ao longo do desenvolvimento por se tratar de reuniões online em que até são difíceis de ter todos integrantes assim atrasando coisas que seriam simples em um ambiente de convívio comum e também faz falta de um programador experiente junto ao dia a dia de desenvolvimento para tirar dúvidas
0
251,058
21,414,175,599
IssuesEvent
2022-04-22 09:16:25
microsoft/AzureStorageExplorer
https://api.github.com/repos/microsoft/AzureStorageExplorer
opened
Fail to select more than one item under snapshots view when right clicking them
🧪 testing :gear: blobs :computer: mac
**Storage Explorer Version**: 1.24.0 **Build Number**: 20220422.13 **Branch**: rel/1.24.0 **Platform/OS**: MacOS Monterey 12.3.1 (Apple M1 Pro) **Architecture** x64 **How Found**: From running test cases **Regression From**: Not a regression ## Steps to Reproduce ## 1. Expand one storage account -> Blob Containers. 2. Create a blob container -> Upload one blob. 3. Create snapshots for the blob. 4. Go to the snapshots view -> Click 'Select All -> Select All in Page/Cached'. 5. Right click the muti selection -> Check whether all items are still selected. ## Expected Experience ## All items are still selected. ## Actual Experience ## Only one snapshot is selected. ## Additional Context ## 1. This issue can't be reproduced consistently. 2. This issue only occurs on Mac. 3. We met this issue twice. 4. Here is the record: https://user-images.githubusercontent.com/41351993/164666330-5a4e8e4c-7f39-47b2-a360-d01818e29e26.mov
1.0
Fail to select more than one item under snapshots view when right clicking them - **Storage Explorer Version**: 1.24.0 **Build Number**: 20220422.13 **Branch**: rel/1.24.0 **Platform/OS**: MacOS Monterey 12.3.1 (Apple M1 Pro) **Architecture** x64 **How Found**: From running test cases **Regression From**: Not a regression ## Steps to Reproduce ## 1. Expand one storage account -> Blob Containers. 2. Create a blob container -> Upload one blob. 3. Create snapshots for the blob. 4. Go to the snapshots view -> Click 'Select All -> Select All in Page/Cached'. 5. Right click the muti selection -> Check whether all items are still selected. ## Expected Experience ## All items are still selected. ## Actual Experience ## Only one snapshot is selected. ## Additional Context ## 1. This issue can't be reproduced consistently. 2. This issue only occurs on Mac. 3. We met this issue twice. 4. Here is the record: https://user-images.githubusercontent.com/41351993/164666330-5a4e8e4c-7f39-47b2-a360-d01818e29e26.mov
test
fail to select more than one item under snapshots view when right clicking them storage explorer version build number branch rel platform os macos monterey apple pro architecture how found from running test cases regression from not a regression steps to reproduce expand one storage account blob containers create a blob container upload one blob create snapshots for the blob go to the snapshots view click select all select all in page cached right click the muti selection check whether all items are still selected expected experience all items are still selected actual experience only one snapshot is selected additional context this issue can t be reproduced consistently this issue only occurs on mac we met this issue twice here is the record
1
136,346
19,765,893,351
IssuesEvent
2022-01-17 02:11:06
hackforla/website
https://api.github.com/repos/hackforla/website
opened
DRAFT-Add paragraph classes 1-3 to codebase
Feature: Design system
### Overview As developers, we use reusable SCSS/CSS classes for styling Hack for LA webpages. For this issue, we will add the paragraph classes 1-3 defined in the [Design System](https://www.figma.com/file/0RRPy1Ph7HafI3qOITg0Mr/Hack-for-LA-Website?node-id=3464%3A3) to our codebase. <details> <summary>Paragraph Classes under Typography in the Design System in Figma</summary> <img width="815" alt="paragraph-classes-in-design-system" src="https://user-images.githubusercontent.com/31293603/149689444-acc7016e-20e9-433e-aa83-596ce22e70f1.png"> </details> ### Action Items - [ ] Locate the Paragraphs section under Typography in the [Design System](https://www.figma.com/file/0RRPy1Ph7HafI3qOITg0Mr/Hack-for-LA-Website?node-id=3464%3A3) in Figma - [ ] Based on how each paragraph class is defined, add paragraph classes 1-3 to ______link for file to add it to_________ file - [ ] When writing the SCSS/CSS classes in the code, the classes name should be lower case. For example, Paragraph1 in Figma should be `.paragraph1` ### Resources/Instructions - [Design System](https://www.figma.com/file/0RRPy1Ph7HafI3qOITg0Mr/Hack-for-LA-Website?node-id=3464%3A3)
1.0
DRAFT-Add paragraph classes 1-3 to codebase - ### Overview As developers, we use reusable SCSS/CSS classes for styling Hack for LA webpages. For this issue, we will add the paragraph classes 1-3 defined in the [Design System](https://www.figma.com/file/0RRPy1Ph7HafI3qOITg0Mr/Hack-for-LA-Website?node-id=3464%3A3) to our codebase. <details> <summary>Paragraph Classes under Typography in the Design System in Figma</summary> <img width="815" alt="paragraph-classes-in-design-system" src="https://user-images.githubusercontent.com/31293603/149689444-acc7016e-20e9-433e-aa83-596ce22e70f1.png"> </details> ### Action Items - [ ] Locate the Paragraphs section under Typography in the [Design System](https://www.figma.com/file/0RRPy1Ph7HafI3qOITg0Mr/Hack-for-LA-Website?node-id=3464%3A3) in Figma - [ ] Based on how each paragraph class is defined, add paragraph classes 1-3 to ______link for file to add it to_________ file - [ ] When writing the SCSS/CSS classes in the code, the classes name should be lower case. For example, Paragraph1 in Figma should be `.paragraph1` ### Resources/Instructions - [Design System](https://www.figma.com/file/0RRPy1Ph7HafI3qOITg0Mr/Hack-for-LA-Website?node-id=3464%3A3)
non_test
draft add paragraph classes to codebase overview as developers we use reusable scss css classes for styling hack for la webpages for this issue we will add the paragraph classes defined in the to our codebase paragraph classes under typography in the design system in figma img width alt paragraph classes in design system src action items locate the paragraphs section under typography in the in figma based on how each paragraph class is defined add paragraph classes to link for file to add it to file when writing the scss css classes in the code the classes name should be lower case for example in figma should be resources instructions
0
66,571
7,006,920,101
IssuesEvent
2017-12-19 10:18:17
Kademi/kademi-dev
https://api.github.com/repos/Kademi/kademi-dev
closed
Login-as component
bug enhancement Ready to Test - Dev
We need a component which can be added to front end websites to make the "login-as" capability available. For example, this is so that sales reps can view customers in their lead management site, and then login as a customer to a reward site. Note that we need to be very careful with authorisation. Any request to generate a login-as link should check that the current user has WRITE_ACL permission to the user they're logging as. This priviledge should come from the UserAdministrator or Administrator roles The component should allow selecting which website to login to.
1.0
Login-as component - We need a component which can be added to front end websites to make the "login-as" capability available. For example, this is so that sales reps can view customers in their lead management site, and then login as a customer to a reward site. Note that we need to be very careful with authorisation. Any request to generate a login-as link should check that the current user has WRITE_ACL permission to the user they're logging as. This priviledge should come from the UserAdministrator or Administrator roles The component should allow selecting which website to login to.
test
login as component we need a component which can be added to front end websites to make the login as capability available for example this is so that sales reps can view customers in their lead management site and then login as a customer to a reward site note that we need to be very careful with authorisation any request to generate a login as link should check that the current user has write acl permission to the user they re logging as this priviledge should come from the useradministrator or administrator roles the component should allow selecting which website to login to
1
263,962
23,093,372,831
IssuesEvent
2022-07-26 17:04:17
Uuvana-Studios/longvinter-windows-client
https://api.github.com/repos/Uuvana-Studios/longvinter-windows-client
closed
[AU] Uuvanna 1 server dissapearing from server list
Bug Not Tested
**Describe the bug** The AU1 server keeps dissapearing from the server list. It's been happening for 2 days now usually around this time. It was working fine earlier in the morning. It's 6pm at the time of posting so there should be more people online. Maybe there's a bug where only 1 person can be online at a given time? **To Reproduce** Steps to reproduce the behavior: 1. Go to server list 2. Select "Oceania" **Expected behavior** AU Uuvanna 1 server shows up on server list. **Screenshots** ![image](https://user-images.githubusercontent.com/54529136/180951745-722c7ba3-dfd0-49fd-af20-40b62cc011d3.png) **Desktop (please complete the following information):** - OS: Windows - Game Version 1.0.8 - Steam Version - latest **Additional context** The AU1 server also has been experiencing quite a lot of ping spikes this week. This may be related to the issue. Others have also informed me of them experiencing this issue.
1.0
[AU] Uuvanna 1 server dissapearing from server list - **Describe the bug** The AU1 server keeps dissapearing from the server list. It's been happening for 2 days now usually around this time. It was working fine earlier in the morning. It's 6pm at the time of posting so there should be more people online. Maybe there's a bug where only 1 person can be online at a given time? **To Reproduce** Steps to reproduce the behavior: 1. Go to server list 2. Select "Oceania" **Expected behavior** AU Uuvanna 1 server shows up on server list. **Screenshots** ![image](https://user-images.githubusercontent.com/54529136/180951745-722c7ba3-dfd0-49fd-af20-40b62cc011d3.png) **Desktop (please complete the following information):** - OS: Windows - Game Version 1.0.8 - Steam Version - latest **Additional context** The AU1 server also has been experiencing quite a lot of ping spikes this week. This may be related to the issue. Others have also informed me of them experiencing this issue.
test
uuvanna server dissapearing from server list describe the bug the server keeps dissapearing from the server list it s been happening for days now usually around this time it was working fine earlier in the morning it s at the time of posting so there should be more people online maybe there s a bug where only person can be online at a given time to reproduce steps to reproduce the behavior go to server list select oceania expected behavior au uuvanna server shows up on server list screenshots desktop please complete the following information os windows game version steam version latest additional context the server also has been experiencing quite a lot of ping spikes this week this may be related to the issue others have also informed me of them experiencing this issue
1
187,445
14,427,878,730
IssuesEvent
2020-12-06 06:45:40
kalexmills/github-vet-tests-dec2020
https://api.github.com/repos/kalexmills/github-vet-tests-dec2020
closed
terraform-providers/terraform-provider-oci: oci/core_vcn_test.go; 16 LoC
fresh small test
Found a possible issue in [terraform-providers/terraform-provider-oci](https://www.github.com/terraform-providers/terraform-provider-oci) at [oci/core_vcn_test.go](https://github.com/terraform-providers/terraform-provider-oci/blob/b79082228a6fabc06eb347d2a4a537e07f71b06f/oci/core_vcn_test.go#L303-L318) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > reference to vcnId is reassigned at line 307 [Click here to see the code in its original context.](https://github.com/terraform-providers/terraform-provider-oci/blob/b79082228a6fabc06eb347d2a4a537e07f71b06f/oci/core_vcn_test.go#L303-L318) <details> <summary>Click here to show the 16 line(s) of Go which triggered the analyzer.</summary> ```go for _, vcnId := range vcnIds { if ok := SweeperDefaultResourceId[vcnId]; !ok { deleteVcnRequest := oci_core.DeleteVcnRequest{} deleteVcnRequest.VcnId = &vcnId deleteVcnRequest.RequestMetadata.RetryPolicy = getRetryPolicy(true, "core") _, error := virtualNetworkClient.DeleteVcn(context.Background(), deleteVcnRequest) if error != nil { fmt.Printf("Error deleting Vcn %s %s, It is possible that the resource is already deleted. Please verify manually \n", vcnId, error) continue } waitTillCondition(testAccProvider, &vcnId, vcnSweepWaitCondition, time.Duration(3*time.Minute), vcnSweepResponseFetchOperation, "core", true) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: b79082228a6fabc06eb347d2a4a537e07f71b06f
1.0
terraform-providers/terraform-provider-oci: oci/core_vcn_test.go; 16 LoC - Found a possible issue in [terraform-providers/terraform-provider-oci](https://www.github.com/terraform-providers/terraform-provider-oci) at [oci/core_vcn_test.go](https://github.com/terraform-providers/terraform-provider-oci/blob/b79082228a6fabc06eb347d2a4a537e07f71b06f/oci/core_vcn_test.go#L303-L318) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > reference to vcnId is reassigned at line 307 [Click here to see the code in its original context.](https://github.com/terraform-providers/terraform-provider-oci/blob/b79082228a6fabc06eb347d2a4a537e07f71b06f/oci/core_vcn_test.go#L303-L318) <details> <summary>Click here to show the 16 line(s) of Go which triggered the analyzer.</summary> ```go for _, vcnId := range vcnIds { if ok := SweeperDefaultResourceId[vcnId]; !ok { deleteVcnRequest := oci_core.DeleteVcnRequest{} deleteVcnRequest.VcnId = &vcnId deleteVcnRequest.RequestMetadata.RetryPolicy = getRetryPolicy(true, "core") _, error := virtualNetworkClient.DeleteVcn(context.Background(), deleteVcnRequest) if error != nil { fmt.Printf("Error deleting Vcn %s %s, It is possible that the resource is already deleted. Please verify manually \n", vcnId, error) continue } waitTillCondition(testAccProvider, &vcnId, vcnSweepWaitCondition, time.Duration(3*time.Minute), vcnSweepResponseFetchOperation, "core", true) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: b79082228a6fabc06eb347d2a4a537e07f71b06f
test
terraform providers terraform provider oci oci core vcn test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message reference to vcnid is reassigned at line click here to show the line s of go which triggered the analyzer go for vcnid range vcnids if ok sweeperdefaultresourceid ok deletevcnrequest oci core deletevcnrequest deletevcnrequest vcnid vcnid deletevcnrequest requestmetadata retrypolicy getretrypolicy true core error virtualnetworkclient deletevcn context background deletevcnrequest if error nil fmt printf error deleting vcn s s it is possible that the resource is already deleted please verify manually n vcnid error continue waittillcondition testaccprovider vcnid vcnsweepwaitcondition time duration time minute vcnsweepresponsefetchoperation core true leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
1
320,478
27,436,774,685
IssuesEvent
2023-03-02 08:07:30
proarc/proarc-client
https://api.github.com/repos/proarc/proarc-client
closed
Import - nefunkční "převod stran"
1 chyba 6 k testování 6c otestováno: KNAV
Funkce převodu stran na NDK strany a zpět je funkční v editaci v úložišti, ale ne v importu
2.0
Import - nefunkční "převod stran" - Funkce převodu stran na NDK strany a zpět je funkční v editaci v úložišti, ale ne v importu
test
import nefunkční převod stran funkce převodu stran na ndk strany a zpět je funkční v editaci v úložišti ale ne v importu
1
184,613
14,289,809,303
IssuesEvent
2020-11-23 19:51:45
github-vet/rangeclosure-findings
https://api.github.com/repos/github-vet/rangeclosure-findings
closed
uber/tchannel-go: init_test.go; 37 LoC
fresh small test
Found a possible issue in [uber/tchannel-go](https://www.github.com/uber/tchannel-go) at [init_test.go](https://github.com/uber/tchannel-go/blob/0b71d5ed50c706c5a962d813a282981020440cac/init_test.go#L172-L208) The below snippet of Go code triggered static analysis which searches for goroutines and/or defer statements which capture loop variables. [Click here to see the code in its original context.](https://github.com/uber/tchannel-go/blob/0b71d5ed50c706c5a962d813a282981020440cac/init_test.go#L172-L208) <details> <summary>Click here to show the 37 line(s) of Go which triggered the analyzer.</summary> ```go for _, tt := range tests { ln, err := net.Listen("tcp", "127.0.0.1:0") require.NoError(t, err, "net.Listen failed") defer ln.Close() done := make(chan struct{}) go func() { defer close(done) ch, err := NewChannel("test", nil) require.NoError(t, err) defer ch.Close() ctx, cancel := NewContext(time.Second) defer cancel() _, err = ch.Peers().GetOrAdd(ln.Addr().String()).GetConnection(ctx) if !assert.Error(t, err, "Expected GetConnection to fail") { return } assert.Equal(t, ErrCodeProtocol, GetSystemErrorCode(err), "Unexpected error code, got error: %v", err) assert.Contains(t, err.Error(), tt.errMsg) }() conn, err := ln.Accept() require.NoError(t, err, "Failed to accept connection") // Read the frame and verify that it's an initReq. f, err := readFrame(conn) require.NoError(t, err, "read frame failed") if !assert.Equal(t, messageTypeInitReq, f.messageType(), "Expected first message to be initReq") { continue } // Write out the specified initRes wait for the channel to get an error. assert.NoError(t, writeMessage(conn, tt.msg), "write initRes failed") <-done } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 0b71d5ed50c706c5a962d813a282981020440cac
1.0
uber/tchannel-go: init_test.go; 37 LoC - Found a possible issue in [uber/tchannel-go](https://www.github.com/uber/tchannel-go) at [init_test.go](https://github.com/uber/tchannel-go/blob/0b71d5ed50c706c5a962d813a282981020440cac/init_test.go#L172-L208) The below snippet of Go code triggered static analysis which searches for goroutines and/or defer statements which capture loop variables. [Click here to see the code in its original context.](https://github.com/uber/tchannel-go/blob/0b71d5ed50c706c5a962d813a282981020440cac/init_test.go#L172-L208) <details> <summary>Click here to show the 37 line(s) of Go which triggered the analyzer.</summary> ```go for _, tt := range tests { ln, err := net.Listen("tcp", "127.0.0.1:0") require.NoError(t, err, "net.Listen failed") defer ln.Close() done := make(chan struct{}) go func() { defer close(done) ch, err := NewChannel("test", nil) require.NoError(t, err) defer ch.Close() ctx, cancel := NewContext(time.Second) defer cancel() _, err = ch.Peers().GetOrAdd(ln.Addr().String()).GetConnection(ctx) if !assert.Error(t, err, "Expected GetConnection to fail") { return } assert.Equal(t, ErrCodeProtocol, GetSystemErrorCode(err), "Unexpected error code, got error: %v", err) assert.Contains(t, err.Error(), tt.errMsg) }() conn, err := ln.Accept() require.NoError(t, err, "Failed to accept connection") // Read the frame and verify that it's an initReq. f, err := readFrame(conn) require.NoError(t, err, "read frame failed") if !assert.Equal(t, messageTypeInitReq, f.messageType(), "Expected first message to be initReq") { continue } // Write out the specified initRes wait for the channel to get an error. assert.NoError(t, writeMessage(conn, tt.msg), "write initRes failed") <-done } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 0b71d5ed50c706c5a962d813a282981020440cac
test
uber tchannel go init test go loc found a possible issue in at the below snippet of go code triggered static analysis which searches for goroutines and or defer statements which capture loop variables click here to show the line s of go which triggered the analyzer go for tt range tests ln err net listen tcp require noerror t err net listen failed defer ln close done make chan struct go func defer close done ch err newchannel test nil require noerror t err defer ch close ctx cancel newcontext time second defer cancel err ch peers getoradd ln addr string getconnection ctx if assert error t err expected getconnection to fail return assert equal t errcodeprotocol getsystemerrorcode err unexpected error code got error v err assert contains t err error tt errmsg conn err ln accept require noerror t err failed to accept connection read the frame and verify that it s an initreq f err readframe conn require noerror t err read frame failed if assert equal t messagetypeinitreq f messagetype expected first message to be initreq continue write out the specified initres wait for the channel to get an error assert noerror t writemessage conn tt msg write initres failed done leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
1
133,330
10,817,650,346
IssuesEvent
2019-11-08 10:12:23
microsoft/CCF
https://api.github.com/repos/microsoft/CCF
closed
Consortium-related functions should have their own class
enhancement hygiene testing
The `Network` class in `tests/infra/ccf.py` contains several functions related to member governance that should be moved to their own class (e.g. `Consortium`).
1.0
Consortium-related functions should have their own class - The `Network` class in `tests/infra/ccf.py` contains several functions related to member governance that should be moved to their own class (e.g. `Consortium`).
test
consortium related functions should have their own class the network class in tests infra ccf py contains several functions related to member governance that should be moved to their own class e g consortium
1
270,114
28,960,414,209
IssuesEvent
2023-05-10 01:40:00
praneethpanasala/linux
https://api.github.com/repos/praneethpanasala/linux
reopened
CVE-2020-25645 (High) detected in linuxlinux-4.19.6
Mend: dependency security vulnerability
## CVE-2020-25645 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/geneve.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. <p>Publish Date: 2020-10-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-25645>CVE-2020-25645</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1883988">https://bugzilla.redhat.com/show_bug.cgi?id=1883988</a></p> <p>Release Date: 2020-10-13</p> <p>Fix Resolution: v4.14.200,v4.19.148,v5.4.68,v5.8.12,v5.9-rc7</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-25645 (High) detected in linuxlinux-4.19.6 - ## CVE-2020-25645 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/geneve.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. <p>Publish Date: 2020-10-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-25645>CVE-2020-25645</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1883988">https://bugzilla.redhat.com/show_bug.cgi?id=1883988</a></p> <p>Release Date: 2020-10-13</p> <p>Fix Resolution: v4.14.200,v4.19.148,v5.4.68,v5.8.12,v5.9-rc7</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_test
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux apache software foundation asf library home page a href found in head commit a href found in base branch master vulnerable source files drivers net geneve c vulnerability details a flaw was found in the linux kernel in versions before traffic between two geneve endpoints may be unencrypted when ipsec is configured to encrypt traffic for the specific udp port used by the geneve tunnel allowing anyone between the two endpoints to read the traffic unencrypted the main threat from this vulnerability is to data confidentiality publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
4,488
6,996,090,513
IssuesEvent
2017-12-15 22:20:24
amcnulty/Whoop-It-Up
https://api.github.com/repos/amcnulty/Whoop-It-Up
closed
Insert new user into database
Requirement
Once a user is signed up their information needs to be stored into the database.
1.0
Insert new user into database - Once a user is signed up their information needs to be stored into the database.
non_test
insert new user into database once a user is signed up their information needs to be stored into the database
0
337,066
30,237,552,281
IssuesEvent
2023-07-06 11:19:50
WordPress/gutenberg
https://api.github.com/repos/WordPress/gutenberg
opened
[Flaky Test] Animation selector should appear if Behavior is Lightbox
[Type] Flaky Test
<!-- __META_DATA__:{} --> **Flaky test detected. This is an auto-generated issue by GitHub Actions. Please do NOT edit this manually.** ## Test title Animation selector should appear if Behavior is Lightbox ## Test path `/test/e2e/specs/editor/blocks/image.spec.js` ## Errors <!-- __TEST_RESULTS_LIST__ --> <!-- __TEST_RESULT__ --><details> <summary> <time datetime="2023-07-06T11:19:49.664Z"><code>[2023-07-06T11:19:49.664Z]</code></time> Test passed after 1 failed attempt on <a href="https://github.com/WordPress/gutenberg/actions/runs/5474540301"><code>trunk</code></a>. </summary> ``` Error: expect(received).toHaveAttribute(expected) Expected pattern: /ef1a566f-630c-4735-9eac-0b759d9526c1/ Received string: "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" Call log: - expect.toHaveAttribute with timeout 5000ms - waiting for locator('role=document[name="Block: Image"i]').locator('role=img') - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - waiting for locator('role=document[name="Block: Image"i]').locator('role=img') - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" at /home/runner/work/gutenberg/gutenberg/test/e2e/specs/editor/blocks/image.spec.js:789:26 ``` </details><!-- /__TEST_RESULT__ --> <!-- /__TEST_RESULTS_LIST__ -->
1.0
[Flaky Test] Animation selector should appear if Behavior is Lightbox - <!-- __META_DATA__:{} --> **Flaky test detected. This is an auto-generated issue by GitHub Actions. Please do NOT edit this manually.** ## Test title Animation selector should appear if Behavior is Lightbox ## Test path `/test/e2e/specs/editor/blocks/image.spec.js` ## Errors <!-- __TEST_RESULTS_LIST__ --> <!-- __TEST_RESULT__ --><details> <summary> <time datetime="2023-07-06T11:19:49.664Z"><code>[2023-07-06T11:19:49.664Z]</code></time> Test passed after 1 failed attempt on <a href="https://github.com/WordPress/gutenberg/actions/runs/5474540301"><code>trunk</code></a>. </summary> ``` Error: expect(received).toHaveAttribute(expected) Expected pattern: /ef1a566f-630c-4735-9eac-0b759d9526c1/ Received string: "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" Call log: - expect.toHaveAttribute with timeout 5000ms - waiting for locator('role=document[name="Block: Image"i]').locator('role=img') - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - waiting for locator('role=document[name="Block: Image"i]').locator('role=img') - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" - locator resolved to <img alt="This image has an empty alt attribute" src=…/> - unexpected value "blob:http://localhost:8889/b02f81db-714b-4374-832d-6bff596adddc" at /home/runner/work/gutenberg/gutenberg/test/e2e/specs/editor/blocks/image.spec.js:789:26 ``` </details><!-- /__TEST_RESULT__ --> <!-- /__TEST_RESULTS_LIST__ -->
test
animation selector should appear if behavior is lightbox flaky test detected this is an auto generated issue by github actions please do not edit this manually test title animation selector should appear if behavior is lightbox test path test specs editor blocks image spec js errors test passed after failed attempt on a href error expect received tohaveattribute expected expected pattern received string blob call log expect tohaveattribute with timeout waiting for locator role document locator role img locator resolved to unexpected value blob waiting for locator role document locator role img locator resolved to unexpected value blob locator resolved to unexpected value blob locator resolved to unexpected value blob locator resolved to unexpected value blob locator resolved to unexpected value blob locator resolved to unexpected value blob locator resolved to unexpected value blob locator resolved to unexpected value blob at home runner work gutenberg gutenberg test specs editor blocks image spec js
1
15,393
27,094,869,234
IssuesEvent
2023-02-15 01:23:10
renovatebot/renovate
https://api.github.com/repos/renovatebot/renovate
opened
Read-Only Filesystem Support
type:feature status:requirements priority-5-triage
### What would you like Renovate to be able to do? For security compliance, we have a strong requirement to run any container in Kubernetes with a read-only filesystem. We can then mount some writeable volumes at some pre-defined filesystem locations (e.g.: /tmp) For managers involving lockfiles, like Elixir/Python/Ruby/... managers, we're running into issues when configuring a read-only filesystem. For example: ``` Command failed: install-tool erlang 24.3.4.0 tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0/misc: Cannot mkdir: No such file or directory tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0/misc/format_man_pages: Cannot open: No such file or directory tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0/misc/makewhatis: Cannot open: No such file or directory tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0/activate.csh: Cannot open: No such file or directory tar: 24.3.4.0: Cannot mkdir: Read-only file system ... ``` After investigating by running things locally, it seems that renovate is installing missing tools under `/opt/buildpack/tools`, and under `/opt/buildpack/tools/erlang` for erlang/mix in particular 🤔 Unfortunately, we can't make mount an entire emptyDir to /opt because the renovate binary is located under `/opt/buildpack/tools/renovate/34.108.0/bin/renovate`. Even by mounting a writeable volume specifically for ``, we running into other cryptic errors: ``` Command failed: install-tool erlang 24.3.4.0 /usr/local/buildpack/utils/linking.sh: line 18: /usr/local/bin/erl: Read-only file system ``` Overall, the current filesystem structure/installation makes it very hard to find a proper configuration to make it work with a read-only filesystem. ### If you have any ideas on how this should be implemented, please tell us here. Not fully sure, but one idea: install renovate and any strong dependency at location other than `/opt/buildpack/tools`. This would allow us to mount a kubernetes emptydir for the whole `/opt/buildpack/tools` directory without erasing any renovate binary. ### Is this a feature you are interested in implementing yourself? Maybe
1.0
Read-Only Filesystem Support - ### What would you like Renovate to be able to do? For security compliance, we have a strong requirement to run any container in Kubernetes with a read-only filesystem. We can then mount some writeable volumes at some pre-defined filesystem locations (e.g.: /tmp) For managers involving lockfiles, like Elixir/Python/Ruby/... managers, we're running into issues when configuring a read-only filesystem. For example: ``` Command failed: install-tool erlang 24.3.4.0 tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0/misc: Cannot mkdir: No such file or directory tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0/misc/format_man_pages: Cannot open: No such file or directory tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0/misc/makewhatis: Cannot open: No such file or directory tar: 24.3.4.0: Cannot mkdir: Read-only file system tar: 24.3.4.0/activate.csh: Cannot open: No such file or directory tar: 24.3.4.0: Cannot mkdir: Read-only file system ... ``` After investigating by running things locally, it seems that renovate is installing missing tools under `/opt/buildpack/tools`, and under `/opt/buildpack/tools/erlang` for erlang/mix in particular 🤔 Unfortunately, we can't make mount an entire emptyDir to /opt because the renovate binary is located under `/opt/buildpack/tools/renovate/34.108.0/bin/renovate`. Even by mounting a writeable volume specifically for ``, we running into other cryptic errors: ``` Command failed: install-tool erlang 24.3.4.0 /usr/local/buildpack/utils/linking.sh: line 18: /usr/local/bin/erl: Read-only file system ``` Overall, the current filesystem structure/installation makes it very hard to find a proper configuration to make it work with a read-only filesystem. ### If you have any ideas on how this should be implemented, please tell us here. Not fully sure, but one idea: install renovate and any strong dependency at location other than `/opt/buildpack/tools`. This would allow us to mount a kubernetes emptydir for the whole `/opt/buildpack/tools` directory without erasing any renovate binary. ### Is this a feature you are interested in implementing yourself? Maybe
non_test
read only filesystem support what would you like renovate to be able to do for security compliance we have a strong requirement to run any container in kubernetes with a read only filesystem we can then mount some writeable volumes at some pre defined filesystem locations e g tmp for managers involving lockfiles like elixir python ruby managers we re running into issues when configuring a read only filesystem for example command failed install tool erlang tar cannot mkdir read only file system tar cannot mkdir read only file system tar misc cannot mkdir no such file or directory tar cannot mkdir read only file system tar misc format man pages cannot open no such file or directory tar cannot mkdir read only file system tar misc makewhatis cannot open no such file or directory tar cannot mkdir read only file system tar activate csh cannot open no such file or directory tar cannot mkdir read only file system after investigating by running things locally it seems that renovate is installing missing tools under opt buildpack tools and under opt buildpack tools erlang for erlang mix in particular 🤔 unfortunately we can t make mount an entire emptydir to opt because the renovate binary is located under opt buildpack tools renovate bin renovate even by mounting a writeable volume specifically for we running into other cryptic errors command failed install tool erlang usr local buildpack utils linking sh line usr local bin erl read only file system overall the current filesystem structure installation makes it very hard to find a proper configuration to make it work with a read only filesystem if you have any ideas on how this should be implemented please tell us here not fully sure but one idea install renovate and any strong dependency at location other than opt buildpack tools this would allow us to mount a kubernetes emptydir for the whole opt buildpack tools directory without erasing any renovate binary is this a feature you are interested in implementing yourself maybe
0
197,670
14,938,464,441
IssuesEvent
2021-01-25 15:48:24
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
My gamepad d-pad is executing is_action_just_pressed twice
bug needs testing topic:input
**Godot version:** 3.2.3.stable **OS/device including version:** OpenSUSE Tumbleweed 20210120 kernel Linux 5.10.7-1 **Issue description:** When I use the gamepad to control the sprite, it executes the function two times, on the keyboard and mouse button works well. I found a similar issue here: https://github.com/godotengine/godot/issues/43492 but it's related to mouse, and my mouse is working, so maybe it's a different bug. I even set Input.set_use_accumulated_input(false) as one comment suggests, it don't work. I created a video showing what happens: https://www.youtube.com/watch?v=WuNF8gArbb8 Notice that the output prints the message twice when I use the gamepad After that I discovered one more thing, it only happens on the D-Pad, I set to the analog and works correctly, and I set to the face buttons: up to Y, down to A, left to X and right to B and works well, so maybe it's a really specific bug to how it works with the D-Pad **Steps to reproduce:** 1 - Open and run the project 2 - Start moving the player with the d-pad of gamepad **Minimal reproduction project:** [TesteInput2.zip](https://github.com/godotengine/godot/files/5866927/TesteInput2.zip) It's a simple code if don't want to import the project, just put a sprite on the scene: ```gdscript const TILE_SIZE = 64 func _ready(): Input.set_use_accumulated_input(false) func _input(event): if Input.is_action_just_pressed("ui_up"): move_cursor( 0 , -1 ) print(Input) elif Input.is_action_pressed("ui_down") and not event.is_echo(): move_cursor( 0 , 1 ) print(Input) elif Input.is_action_just_pressed("ui_left") and event.is_pressed(): move_cursor( -1 , 0 ) print(Input) elif Input.is_action_just_pressed("ui_right"): move_cursor( 1 , 0 ) print(Input) return func move_cursor(x , y): $Sprite.position += Vector2(x , y) * TILE_SIZE ```
1.0
My gamepad d-pad is executing is_action_just_pressed twice - **Godot version:** 3.2.3.stable **OS/device including version:** OpenSUSE Tumbleweed 20210120 kernel Linux 5.10.7-1 **Issue description:** When I use the gamepad to control the sprite, it executes the function two times, on the keyboard and mouse button works well. I found a similar issue here: https://github.com/godotengine/godot/issues/43492 but it's related to mouse, and my mouse is working, so maybe it's a different bug. I even set Input.set_use_accumulated_input(false) as one comment suggests, it don't work. I created a video showing what happens: https://www.youtube.com/watch?v=WuNF8gArbb8 Notice that the output prints the message twice when I use the gamepad After that I discovered one more thing, it only happens on the D-Pad, I set to the analog and works correctly, and I set to the face buttons: up to Y, down to A, left to X and right to B and works well, so maybe it's a really specific bug to how it works with the D-Pad **Steps to reproduce:** 1 - Open and run the project 2 - Start moving the player with the d-pad of gamepad **Minimal reproduction project:** [TesteInput2.zip](https://github.com/godotengine/godot/files/5866927/TesteInput2.zip) It's a simple code if don't want to import the project, just put a sprite on the scene: ```gdscript const TILE_SIZE = 64 func _ready(): Input.set_use_accumulated_input(false) func _input(event): if Input.is_action_just_pressed("ui_up"): move_cursor( 0 , -1 ) print(Input) elif Input.is_action_pressed("ui_down") and not event.is_echo(): move_cursor( 0 , 1 ) print(Input) elif Input.is_action_just_pressed("ui_left") and event.is_pressed(): move_cursor( -1 , 0 ) print(Input) elif Input.is_action_just_pressed("ui_right"): move_cursor( 1 , 0 ) print(Input) return func move_cursor(x , y): $Sprite.position += Vector2(x , y) * TILE_SIZE ```
test
my gamepad d pad is executing is action just pressed twice godot version stable os device including version opensuse tumbleweed kernel linux issue description when i use the gamepad to control the sprite it executes the function two times on the keyboard and mouse button works well i found a similar issue here but it s related to mouse and my mouse is working so maybe it s a different bug i even set input set use accumulated input false as one comment suggests it don t work i created a video showing what happens notice that the output prints the message twice when i use the gamepad after that i discovered one more thing it only happens on the d pad i set to the analog and works correctly and i set to the face buttons up to y down to a left to x and right to b and works well so maybe it s a really specific bug to how it works with the d pad steps to reproduce open and run the project start moving the player with the d pad of gamepad minimal reproduction project it s a simple code if don t want to import the project just put a sprite on the scene gdscript const tile size func ready input set use accumulated input false func input event if input is action just pressed ui up move cursor print input elif input is action pressed ui down and not event is echo move cursor print input elif input is action just pressed ui left and event is pressed move cursor print input elif input is action just pressed ui right move cursor print input return func move cursor x y sprite position x y tile size
1
50,919
6,134,884,344
IssuesEvent
2017-06-26 02:19:56
kubernetes/kubernetes
https://api.github.com/repos/kubernetes/kubernetes
closed
K8s compile script can not trigger some syntax errors
sig/testing
**Is this a BUG REPORT or FEATURE REQUEST?**: BUG REPORT **What happened**: I ran into a syntax error but script can not trigger it. #47225 **What you expected to happen**: Script can show all the syntax errors /kind bug
1.0
K8s compile script can not trigger some syntax errors - **Is this a BUG REPORT or FEATURE REQUEST?**: BUG REPORT **What happened**: I ran into a syntax error but script can not trigger it. #47225 **What you expected to happen**: Script can show all the syntax errors /kind bug
test
compile script can not trigger some syntax errors is this a bug report or feature request bug report what happened i ran into a syntax error but script can not trigger it what you expected to happen script can show all the syntax errors kind bug
1
439,463
30,698,126,383
IssuesEvent
2023-07-26 20:22:08
nindaba/seke-delivery
https://api.github.com/repos/nindaba/seke-delivery
opened
DS | DOC | Remove the subscription to pricing topic
documentation
The subscription to Pricing topic is not necessary for now ![Image](https://github.com/nindaba/seke-delivery/assets/86868096/e2a7661f-70ac-42a8-8f04-850dd944aa3a)
1.0
DS | DOC | Remove the subscription to pricing topic - The subscription to Pricing topic is not necessary for now ![Image](https://github.com/nindaba/seke-delivery/assets/86868096/e2a7661f-70ac-42a8-8f04-850dd944aa3a)
non_test
ds doc remove the subscription to pricing topic the subscription to pricing topic is not necessary for now
0
218,135
16,750,366,602
IssuesEvent
2021-06-11 21:52:41
damienbod/angular-auth-oidc-client
https://api.github.com/repos/damienbod/angular-auth-oidc-client
closed
[HELP] Example or documentation for Silent Renew Code Flow with PKCE with refresh tokens
enhancement documentation
**Is your feature request related to a problem? Please describe.** I am trying to use Silent Renew Code Flow with PKCE with refresh tokens. Using configuration below I notice that if I refresh the page then a silent renew periodic check begins, after this time a new access token is retrieved. I am trying to determine how I can get `id_token` JWT using the `access_token`. ``` oidcConfigService.withConfig({ stsServer: server, authWellknownEndpoint: wellKnownEndpoint, redirectUrl: window.location.origin, postLogoutRedirectUri: window.location.origin, clientId: clientId, scope: 'openid profile email', responseType: 'code', useRefreshToken: true, renewTimeBeforeTokenExpiresInSeconds: 10, silentRenew: true, silentRenewTimeoutInSeconds: 20, logLevel: LogLevel.Debug, postLoginRoute: knownUser ? 'home' : 'documentation' }); ``` **Describe the solution you'd like** If there is any example or documentation about how the library suggest to use Silent Renew Code Flow with PKCE with refresh tokens it would be very helpful, on this page it does not have any example: https://github.com/damienbod/angular-auth-oidc-client/blob/main/docs/silent-renew.md#silent-renew-code-flow-with-pkce-with-refresh-tokens **Describe alternatives you've considered** I need ID token provided in every request to my back-end API, and I don't want the user to have to re-authenticate when the ID token expires. I considered using https://github.com/manfredsteyer/angular-oauth2-oidc library instead because documentation seems more thorough, but I would rather not have to re-do what is already working. **Additional context** The authentication server is PingID, please note I don't have access to `offline_access` scope and want to avoid iframe solutions.
1.0
[HELP] Example or documentation for Silent Renew Code Flow with PKCE with refresh tokens - **Is your feature request related to a problem? Please describe.** I am trying to use Silent Renew Code Flow with PKCE with refresh tokens. Using configuration below I notice that if I refresh the page then a silent renew periodic check begins, after this time a new access token is retrieved. I am trying to determine how I can get `id_token` JWT using the `access_token`. ``` oidcConfigService.withConfig({ stsServer: server, authWellknownEndpoint: wellKnownEndpoint, redirectUrl: window.location.origin, postLogoutRedirectUri: window.location.origin, clientId: clientId, scope: 'openid profile email', responseType: 'code', useRefreshToken: true, renewTimeBeforeTokenExpiresInSeconds: 10, silentRenew: true, silentRenewTimeoutInSeconds: 20, logLevel: LogLevel.Debug, postLoginRoute: knownUser ? 'home' : 'documentation' }); ``` **Describe the solution you'd like** If there is any example or documentation about how the library suggest to use Silent Renew Code Flow with PKCE with refresh tokens it would be very helpful, on this page it does not have any example: https://github.com/damienbod/angular-auth-oidc-client/blob/main/docs/silent-renew.md#silent-renew-code-flow-with-pkce-with-refresh-tokens **Describe alternatives you've considered** I need ID token provided in every request to my back-end API, and I don't want the user to have to re-authenticate when the ID token expires. I considered using https://github.com/manfredsteyer/angular-oauth2-oidc library instead because documentation seems more thorough, but I would rather not have to re-do what is already working. **Additional context** The authentication server is PingID, please note I don't have access to `offline_access` scope and want to avoid iframe solutions.
non_test
example or documentation for silent renew code flow with pkce with refresh tokens is your feature request related to a problem please describe i am trying to use silent renew code flow with pkce with refresh tokens using configuration below i notice that if i refresh the page then a silent renew periodic check begins after this time a new access token is retrieved i am trying to determine how i can get id token jwt using the access token oidcconfigservice withconfig stsserver server authwellknownendpoint wellknownendpoint redirecturl window location origin postlogoutredirecturi window location origin clientid clientid scope openid profile email responsetype code userefreshtoken true renewtimebeforetokenexpiresinseconds silentrenew true silentrenewtimeoutinseconds loglevel loglevel debug postloginroute knownuser home documentation describe the solution you d like if there is any example or documentation about how the library suggest to use silent renew code flow with pkce with refresh tokens it would be very helpful on this page it does not have any example describe alternatives you ve considered i need id token provided in every request to my back end api and i don t want the user to have to re authenticate when the id token expires i considered using library instead because documentation seems more thorough but i would rather not have to re do what is already working additional context the authentication server is pingid please note i don t have access to offline access scope and want to avoid iframe solutions
0
720,229
24,784,999,849
IssuesEvent
2022-10-24 09:03:44
opensquare-network/statescan-v2
https://api.github.com/repos/opensquare-network/statescan-v2
closed
Add extrinsics tab on account detail page
priority:high working
Currently we only have transfers tab on account detail page, but we also need the extrinsics tag. Api endpoint: `/accounts/:address/extrinsics`. ![jHxZ484fq8](https://user-images.githubusercontent.com/2264908/197436489-1325cf7c-0a0b-4ca8-8d79-2da708274806.jpg)
1.0
Add extrinsics tab on account detail page - Currently we only have transfers tab on account detail page, but we also need the extrinsics tag. Api endpoint: `/accounts/:address/extrinsics`. ![jHxZ484fq8](https://user-images.githubusercontent.com/2264908/197436489-1325cf7c-0a0b-4ca8-8d79-2da708274806.jpg)
non_test
add extrinsics tab on account detail page currently we only have transfers tab on account detail page but we also need the extrinsics tag api endpoint accounts address extrinsics
0
44,984
5,673,207,137
IssuesEvent
2017-04-12 05:21:17
FlightControl-Master/MOOSE
https://api.github.com/repos/FlightControl-Master/MOOSE
closed
SPAWN:SpawnFromUnit will not spawn 'Late Activation' Units
bug fixed ready for testing
Due to a fix in Issue #97 (IsAlive() should not count late activation units) the SpawnFromUnit function will not spawn a 'Late Activation' units because it checks to see if the unit it is spawning from is alive. Proposed solution: Add a function to the Units wrapper called IsLateActivation() that checks to see if the referenced unit is a Late Activation unit. How can we tell this? Because DCS:isActive() returns false AND the life of the unit is greater than (or equal to) 1.0 (Unit.getLife(Unit self) as defined in the ED DCS Lua Simulator Scripting Engine documentation (http://en.wiki.eagle.ru/wiki/Simulator_Scripting_Engine/DCS:_World/Part_2#Unit)). This proposed function would work the same as UNIT:IsAlive().
1.0
SPAWN:SpawnFromUnit will not spawn 'Late Activation' Units - Due to a fix in Issue #97 (IsAlive() should not count late activation units) the SpawnFromUnit function will not spawn a 'Late Activation' units because it checks to see if the unit it is spawning from is alive. Proposed solution: Add a function to the Units wrapper called IsLateActivation() that checks to see if the referenced unit is a Late Activation unit. How can we tell this? Because DCS:isActive() returns false AND the life of the unit is greater than (or equal to) 1.0 (Unit.getLife(Unit self) as defined in the ED DCS Lua Simulator Scripting Engine documentation (http://en.wiki.eagle.ru/wiki/Simulator_Scripting_Engine/DCS:_World/Part_2#Unit)). This proposed function would work the same as UNIT:IsAlive().
test
spawn spawnfromunit will not spawn late activation units due to a fix in issue isalive should not count late activation units the spawnfromunit function will not spawn a late activation units because it checks to see if the unit it is spawning from is alive proposed solution add a function to the units wrapper called islateactivation that checks to see if the referenced unit is a late activation unit how can we tell this because dcs isactive returns false and the life of the unit is greater than or equal to unit getlife unit self as defined in the ed dcs lua simulator scripting engine documentation this proposed function would work the same as unit isalive
1
188,221
14,441,598,274
IssuesEvent
2020-12-07 16:59:58
frontendbr/forum
https://api.github.com/repos/frontendbr/forum
closed
Testes de Integração e Testes E2E
Testes
Na _issue_ #43, o @lnfnunes me perguntou o seguinte: > @vitorbritto valeu pelos links! > Por favor, poderia me explicar melhor qual a diferença (prática), entre: > > Testes de Integração: Pioneer > Testes de E2E: DalekJS > > Me pareceu que com qualquer 1 dos dois eu consigo atingir o mesmo objetivo, então fiquei com essa dúvida do pq vc separou os dois em ferramentas diferentes. > Seria a questão das sintaxes ou envolve outros detalhes? Como vc utiliza no seu workflow? > Tks Resolvi abrir uma _issue_ para não perdermos o foco da discussão sobre **testes de perfomance** na #43 e falarmos um pouco mais sobre testes de integração e E2E (aceitação). =] --- @lnfnunes legal você perguntar isso! :+1: Bom, alguns desenvolvedores confundem o princípio básico para os testes de integração e testes E2E. Para mim, o **Teste de Integração** é realizado para cobrir o maior número possível de falhas entre componentes/módulos de um sistema. O princípio básico dos testes de integração é a verificação da estabilidade entre estes componentes em conjunto, bem como o fluxo apropriado dos dados entre eles. Você pode imaginar que um teste de integração é composto por vários testes unitários combinados entre sí, mas diferente dos testes unitários, os testes de integração fazem uso de qualquer meio necessário para comprovar que o código e o ambiente estejam adequados e seja candidato a ir para produção. Já os **Testes E2E** são baseados em regras e/ou requisitos associados à uma ação do usuário. Você parte do princípio que deverão existir reações satisfatórias para determinadas ações na sua interface (sucesso em um redirecionamento a partir de um link clicado, a validação de um formulário, se o pagamento de um produto foi confirmado, se o produto foi adicionado ao carrinho corretamente, etc). Eu considero que os testes E2E estejam inseridos no contexto para os **Testes de Aceitação**. E vocês? Utilizam ferramentas ou realizam testes de integração e aceitação também? =]
1.0
Testes de Integração e Testes E2E - Na _issue_ #43, o @lnfnunes me perguntou o seguinte: > @vitorbritto valeu pelos links! > Por favor, poderia me explicar melhor qual a diferença (prática), entre: > > Testes de Integração: Pioneer > Testes de E2E: DalekJS > > Me pareceu que com qualquer 1 dos dois eu consigo atingir o mesmo objetivo, então fiquei com essa dúvida do pq vc separou os dois em ferramentas diferentes. > Seria a questão das sintaxes ou envolve outros detalhes? Como vc utiliza no seu workflow? > Tks Resolvi abrir uma _issue_ para não perdermos o foco da discussão sobre **testes de perfomance** na #43 e falarmos um pouco mais sobre testes de integração e E2E (aceitação). =] --- @lnfnunes legal você perguntar isso! :+1: Bom, alguns desenvolvedores confundem o princípio básico para os testes de integração e testes E2E. Para mim, o **Teste de Integração** é realizado para cobrir o maior número possível de falhas entre componentes/módulos de um sistema. O princípio básico dos testes de integração é a verificação da estabilidade entre estes componentes em conjunto, bem como o fluxo apropriado dos dados entre eles. Você pode imaginar que um teste de integração é composto por vários testes unitários combinados entre sí, mas diferente dos testes unitários, os testes de integração fazem uso de qualquer meio necessário para comprovar que o código e o ambiente estejam adequados e seja candidato a ir para produção. Já os **Testes E2E** são baseados em regras e/ou requisitos associados à uma ação do usuário. Você parte do princípio que deverão existir reações satisfatórias para determinadas ações na sua interface (sucesso em um redirecionamento a partir de um link clicado, a validação de um formulário, se o pagamento de um produto foi confirmado, se o produto foi adicionado ao carrinho corretamente, etc). Eu considero que os testes E2E estejam inseridos no contexto para os **Testes de Aceitação**. E vocês? Utilizam ferramentas ou realizam testes de integração e aceitação também? =]
test
testes de integração e testes na issue o lnfnunes me perguntou o seguinte vitorbritto valeu pelos links por favor poderia me explicar melhor qual a diferença prática entre testes de integração pioneer testes de dalekjs me pareceu que com qualquer dos dois eu consigo atingir o mesmo objetivo então fiquei com essa dúvida do pq vc separou os dois em ferramentas diferentes seria a questão das sintaxes ou envolve outros detalhes como vc utiliza no seu workflow tks resolvi abrir uma issue para não perdermos o foco da discussão sobre testes de perfomance na e falarmos um pouco mais sobre testes de integração e aceitação lnfnunes legal você perguntar isso bom alguns desenvolvedores confundem o princípio básico para os testes de integração e testes para mim o teste de integração é realizado para cobrir o maior número possível de falhas entre componentes módulos de um sistema o princípio básico dos testes de integração é a verificação da estabilidade entre estes componentes em conjunto bem como o fluxo apropriado dos dados entre eles você pode imaginar que um teste de integração é composto por vários testes unitários combinados entre sí mas diferente dos testes unitários os testes de integração fazem uso de qualquer meio necessário para comprovar que o código e o ambiente estejam adequados e seja candidato a ir para produção já os testes são baseados em regras e ou requisitos associados à uma ação do usuário você parte do princípio que deverão existir reações satisfatórias para determinadas ações na sua interface sucesso em um redirecionamento a partir de um link clicado a validação de um formulário se o pagamento de um produto foi confirmado se o produto foi adicionado ao carrinho corretamente etc eu considero que os testes estejam inseridos no contexto para os testes de aceitação e vocês utilizam ferramentas ou realizam testes de integração e aceitação também
1
546,141
16,004,799,134
IssuesEvent
2021-04-20 00:41:29
flexpool/frontend
https://api.github.com/repos/flexpool/frontend
closed
New miner without data issues
priority:moderate type:bug
1) shows joined 51 years ago Seems like the data is not coming in or is undefined
1.0
New miner without data issues - 1) shows joined 51 years ago Seems like the data is not coming in or is undefined
non_test
new miner without data issues shows joined years ago seems like the data is not coming in or is undefined
0
28,613
4,424,045,858
IssuesEvent
2016-08-16 10:55:01
medic/medic-webapp
https://api.github.com/repos/medic/medic-webapp
closed
There is no link to medic-reporter in 2.x
4 - Acceptance Testing Bug v0.4 features in 2.x
On a server with `medic-reported` installed and visible in dashboard, there is no in-app link to `medic-reporter`. It can be accessed directly at `/medic-reporter/_design/medic-reporter/_rewrite`.
1.0
There is no link to medic-reporter in 2.x - On a server with `medic-reported` installed and visible in dashboard, there is no in-app link to `medic-reporter`. It can be accessed directly at `/medic-reporter/_design/medic-reporter/_rewrite`.
test
there is no link to medic reporter in x on a server with medic reported installed and visible in dashboard there is no in app link to medic reporter it can be accessed directly at medic reporter design medic reporter rewrite
1
29,624
11,764,517,206
IssuesEvent
2020-03-14 13:04:58
uniquelyparticular/sync-stripe-to-zendesk
https://api.github.com/repos/uniquelyparticular/sync-stripe-to-zendesk
opened
WS-2020-0042 (High) detected in acorn-5.7.3.tgz, acorn-6.1.1.tgz
security vulnerability
## WS-2020-0042 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>acorn-5.7.3.tgz</b>, <b>acorn-6.1.1.tgz</b></p></summary> <p> <details><summary><b>acorn-5.7.3.tgz</b></p></summary> <p>ECMAScript parser</p> <p>Library home page: <a href="https://registry.npmjs.org/acorn/-/acorn-5.7.3.tgz">https://registry.npmjs.org/acorn/-/acorn-5.7.3.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/sync-stripe-to-zendesk/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/sync-stripe-to-zendesk/node_modules/acorn/package.json</p> <p> Dependency Hierarchy: - jest-24.8.0.tgz (Root Library) - jest-cli-24.8.0.tgz - jest-config-24.8.0.tgz - jest-environment-jsdom-24.8.0.tgz - jsdom-11.12.0.tgz - :x: **acorn-5.7.3.tgz** (Vulnerable Library) </details> <details><summary><b>acorn-6.1.1.tgz</b></p></summary> <p>ECMAScript parser</p> <p>Library home page: <a href="https://registry.npmjs.org/acorn/-/acorn-6.1.1.tgz">https://registry.npmjs.org/acorn/-/acorn-6.1.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/sync-stripe-to-zendesk/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/sync-stripe-to-zendesk/node_modules/acorn-globals/node_modules/acorn/package.json</p> <p> Dependency Hierarchy: - jest-24.8.0.tgz (Root Library) - jest-cli-24.8.0.tgz - jest-config-24.8.0.tgz - jest-environment-jsdom-24.8.0.tgz - jsdom-11.12.0.tgz - acorn-globals-4.3.2.tgz - :x: **acorn-6.1.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/uniquelyparticular/sync-stripe-to-zendesk/commit/c455789b66d2278272d86c74f0d4b5970aee52d1">c455789b66d2278272d86c74f0d4b5970aee52d1</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> acorn is vulnerable to REGEX DoS. A regex of the form /[x-\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser. <p>Publish Date: 2020-03-08 <p>URL: <a href=https://github.com/acornjs/acorn/commit/b5c17877ac0511e31579ea31e7650ba1a5871e51>WS-2020-0042</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1488">https://www.npmjs.com/advisories/1488</a></p> <p>Release Date: 2020-03-08</p> <p>Fix Resolution: 7.1.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2020-0042 (High) detected in acorn-5.7.3.tgz, acorn-6.1.1.tgz - ## WS-2020-0042 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>acorn-5.7.3.tgz</b>, <b>acorn-6.1.1.tgz</b></p></summary> <p> <details><summary><b>acorn-5.7.3.tgz</b></p></summary> <p>ECMAScript parser</p> <p>Library home page: <a href="https://registry.npmjs.org/acorn/-/acorn-5.7.3.tgz">https://registry.npmjs.org/acorn/-/acorn-5.7.3.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/sync-stripe-to-zendesk/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/sync-stripe-to-zendesk/node_modules/acorn/package.json</p> <p> Dependency Hierarchy: - jest-24.8.0.tgz (Root Library) - jest-cli-24.8.0.tgz - jest-config-24.8.0.tgz - jest-environment-jsdom-24.8.0.tgz - jsdom-11.12.0.tgz - :x: **acorn-5.7.3.tgz** (Vulnerable Library) </details> <details><summary><b>acorn-6.1.1.tgz</b></p></summary> <p>ECMAScript parser</p> <p>Library home page: <a href="https://registry.npmjs.org/acorn/-/acorn-6.1.1.tgz">https://registry.npmjs.org/acorn/-/acorn-6.1.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/sync-stripe-to-zendesk/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/sync-stripe-to-zendesk/node_modules/acorn-globals/node_modules/acorn/package.json</p> <p> Dependency Hierarchy: - jest-24.8.0.tgz (Root Library) - jest-cli-24.8.0.tgz - jest-config-24.8.0.tgz - jest-environment-jsdom-24.8.0.tgz - jsdom-11.12.0.tgz - acorn-globals-4.3.2.tgz - :x: **acorn-6.1.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/uniquelyparticular/sync-stripe-to-zendesk/commit/c455789b66d2278272d86c74f0d4b5970aee52d1">c455789b66d2278272d86c74f0d4b5970aee52d1</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> acorn is vulnerable to REGEX DoS. A regex of the form /[x-\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser. <p>Publish Date: 2020-03-08 <p>URL: <a href=https://github.com/acornjs/acorn/commit/b5c17877ac0511e31579ea31e7650ba1a5871e51>WS-2020-0042</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1488">https://www.npmjs.com/advisories/1488</a></p> <p>Release Date: 2020-03-08</p> <p>Fix Resolution: 7.1.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_test
ws high detected in acorn tgz acorn tgz ws high severity vulnerability vulnerable libraries acorn tgz acorn tgz acorn tgz ecmascript parser library home page a href path to dependency file tmp ws scm sync stripe to zendesk package json path to vulnerable library tmp ws scm sync stripe to zendesk node modules acorn package json dependency hierarchy jest tgz root library jest cli tgz jest config tgz jest environment jsdom tgz jsdom tgz x acorn tgz vulnerable library acorn tgz ecmascript parser library home page a href path to dependency file tmp ws scm sync stripe to zendesk package json path to vulnerable library tmp ws scm sync stripe to zendesk node modules acorn globals node modules acorn package json dependency hierarchy jest tgz root library jest cli tgz jest config tgz jest environment jsdom tgz jsdom tgz acorn globals tgz x acorn tgz vulnerable library found in head commit a href vulnerability details acorn is vulnerable to regex dos a regex of the form u causes the parser to enter an infinite loop attackers may leverage the vulnerability leading to a denial of service since the string is not valid and it results in it being sanitized before reaching the parser publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
327,604
28,072,829,763
IssuesEvent
2023-03-29 20:28:22
solo-io/gloo
https://api.github.com/repos/solo-io/gloo
closed
E2E Suite Test Flakes (Dynamic Forward Proxy)
Type: Bug Type: CI Test Flake
### Gloo Edge Version 1.14.x (beta) ### Kubernetes Version None ### Describe the bug logs https://storage.googleapis.com/solo-public-build-logs/logs.html?buildid=6ffc68b6-601d-469b-8516-0940ef00f9bd ``` Step #1 - "run-tests": Step #8 - "run-e2e-tests": [FAILED] Timed out after 10.037s. Step #1 - "run-tests": Step #8 - "run-e2e-tests": The function passed to Eventually failed at /workspace/gloo/test/e2e/dynamic_forward_proxy_test.go:90 with: Step #1 - "run-tests": Step #8 - "run-e2e-tests": Unexpected error: Get "http://localhost:11177/get": context deadline exceeded (Client.Timeout exceeded while awaiting headers) Step #1 - "run-tests": Step #8 - "run-e2e-tests": <*url.Error | 0xc0088ddce0>: { Step #1 - "run-tests": Step #8 - "run-e2e-tests": Op: "Get", Step #1 - "run-tests": Step #8 - "run-e2e-tests": URL: "http://localhost:11177/get", Step #1 - "run-tests": Step #8 - "run-e2e-tests": Err: <*http.httpError | 0xc00a311068>{ Step #1 - "run-tests": Step #8 - "run-e2e-tests": err: "context deadline exceeded (Client.Timeout exceeded while awaiting headers)", Step #1 - "run-tests": Step #8 - "run-e2e-tests": timeout: true, Step #1 - "run-tests": Step #8 - "run-e2e-tests": }, Step #1 - "run-tests": Step #8 - "run-e2e-tests": } Step #1 - "run-tests": Step #8 - "run-e2e-tests": In [It] at: /workspace/gloo/test/e2e/dynamic_forward_proxy_test.go:94 @ 03/28/23 13:53:17.629 Step #1 - "run-tests": Step #8 - "run-e2e-tests": Step #1 - "run-tests": Step #8 - "run-e2e-tests": Full Stack Trace Step #1 - "run-tests": Step #8 - "run-e2e-tests": github.com/solo-io/gloo/test/e2e_test.glob..func11.5.2() Step #1 - "run-tests": Step #8 - "run-e2e-tests": /workspace/gloo/test/e2e/dynamic_forward_proxy_test.go:94 +0x283 Step #1 - "run-tests": Step #8 - "run-e2e-tests": ------------------------------ ``` ### Steps to reproduce the bug Run in CI, you might get this ### Expected Behavior Test to pass ### Additional Context _No response_
1.0
E2E Suite Test Flakes (Dynamic Forward Proxy) - ### Gloo Edge Version 1.14.x (beta) ### Kubernetes Version None ### Describe the bug logs https://storage.googleapis.com/solo-public-build-logs/logs.html?buildid=6ffc68b6-601d-469b-8516-0940ef00f9bd ``` Step #1 - "run-tests": Step #8 - "run-e2e-tests": [FAILED] Timed out after 10.037s. Step #1 - "run-tests": Step #8 - "run-e2e-tests": The function passed to Eventually failed at /workspace/gloo/test/e2e/dynamic_forward_proxy_test.go:90 with: Step #1 - "run-tests": Step #8 - "run-e2e-tests": Unexpected error: Get "http://localhost:11177/get": context deadline exceeded (Client.Timeout exceeded while awaiting headers) Step #1 - "run-tests": Step #8 - "run-e2e-tests": <*url.Error | 0xc0088ddce0>: { Step #1 - "run-tests": Step #8 - "run-e2e-tests": Op: "Get", Step #1 - "run-tests": Step #8 - "run-e2e-tests": URL: "http://localhost:11177/get", Step #1 - "run-tests": Step #8 - "run-e2e-tests": Err: <*http.httpError | 0xc00a311068>{ Step #1 - "run-tests": Step #8 - "run-e2e-tests": err: "context deadline exceeded (Client.Timeout exceeded while awaiting headers)", Step #1 - "run-tests": Step #8 - "run-e2e-tests": timeout: true, Step #1 - "run-tests": Step #8 - "run-e2e-tests": }, Step #1 - "run-tests": Step #8 - "run-e2e-tests": } Step #1 - "run-tests": Step #8 - "run-e2e-tests": In [It] at: /workspace/gloo/test/e2e/dynamic_forward_proxy_test.go:94 @ 03/28/23 13:53:17.629 Step #1 - "run-tests": Step #8 - "run-e2e-tests": Step #1 - "run-tests": Step #8 - "run-e2e-tests": Full Stack Trace Step #1 - "run-tests": Step #8 - "run-e2e-tests": github.com/solo-io/gloo/test/e2e_test.glob..func11.5.2() Step #1 - "run-tests": Step #8 - "run-e2e-tests": /workspace/gloo/test/e2e/dynamic_forward_proxy_test.go:94 +0x283 Step #1 - "run-tests": Step #8 - "run-e2e-tests": ------------------------------ ``` ### Steps to reproduce the bug Run in CI, you might get this ### Expected Behavior Test to pass ### Additional Context _No response_
test
suite test flakes dynamic forward proxy gloo edge version x beta kubernetes version none describe the bug logs step run tests step run tests  timed out after step run tests step run tests the function passed to eventually failed at workspace gloo test dynamic forward proxy test go with step run tests step run tests unexpected error get context deadline exceeded client timeout exceeded while awaiting headers step run tests step run tests step run tests step run tests op get step run tests step run tests url step run tests step run tests err step run tests step run tests err context deadline exceeded client timeout exceeded while awaiting headers step run tests step run tests timeout true step run tests step run tests step run tests step run tests  step run tests step run tests    at  workspace gloo test dynamic forward proxy test go    step run tests step run tests step run tests step run tests  stack trace step run tests step run tests github com solo io gloo test test glob step run tests step run tests workspace gloo test dynamic forward proxy test go step run tests step run tests   steps to reproduce the bug run in ci you might get this expected behavior test to pass additional context no response
1
97,646
8,665,015,196
IssuesEvent
2018-11-28 21:55:58
ONRR/doi-extractives-data
https://api.github.com/repos/ONRR/doi-extractives-data
closed
Even out padding on What's new section
Home Page bug:visual workflow:testing
There is unbalanced padding on the What's new section (more at the top than bottom). Let's even out the spacing. ![what's new and footer spacing issues](https://user-images.githubusercontent.com/32855580/48852385-1df56700-ed62-11e8-92a7-37c42189ba13.png)
1.0
Even out padding on What's new section - There is unbalanced padding on the What's new section (more at the top than bottom). Let's even out the spacing. ![what's new and footer spacing issues](https://user-images.githubusercontent.com/32855580/48852385-1df56700-ed62-11e8-92a7-37c42189ba13.png)
test
even out padding on what s new section there is unbalanced padding on the what s new section more at the top than bottom let s even out the spacing
1
111,228
9,523,415,510
IssuesEvent
2019-04-27 17:03:55
rootzoll/raspiblitz
https://api.github.com/repos/rootzoll/raspiblitz
closed
System/LND Scanning Rewrite
final testing
People get often stuck on the Lightning Scanning Process, seeing a ?/SOMENUMBER - which is done by 80scanLND.sh: https://github.com/rootzoll/raspiblitz/issues/450 So the goal was to rewrite this part to try to get rid of this situation or at least to provide more info/help on this situations.
1.0
System/LND Scanning Rewrite - People get often stuck on the Lightning Scanning Process, seeing a ?/SOMENUMBER - which is done by 80scanLND.sh: https://github.com/rootzoll/raspiblitz/issues/450 So the goal was to rewrite this part to try to get rid of this situation or at least to provide more info/help on this situations.
test
system lnd scanning rewrite people get often stuck on the lightning scanning process seeing a somenumber which is done by sh so the goal was to rewrite this part to try to get rid of this situation or at least to provide more info help on this situations
1
818,480
30,691,085,886
IssuesEvent
2023-07-26 15:13:16
GoogleChrome/lighthouse
https://api.github.com/repos/GoogleChrome/lighthouse
closed
Wrong viewport in screenshots with `headless: 'new'`
bug needs-priority
### FAQ - [X] Yes, my issue is not about [variability](https://github.com/GoogleChrome/lighthouse/blob/main/docs/variability.md) or [throttling](https://github.com/GoogleChrome/lighthouse/blob/main/docs/throttling.md). - [X] Yes, my issue is not about a specific accessibility audit (file with [axe-core](https://github.com/dequelabs/axe-core) instead). ### URL https://example.com ### What happened? Since we switched to launch puppeteer with `headless: 'new'`, the viewport of the screenshot is wrong. It appears as if it would use the default window size instead of the emulated screen. Repro: https://github.com/sokki/bug-new-headless-screenshot/blob/main/index.js With `headless: 'new'`: ![image](https://github.com/GoogleChrome/lighthouse/assets/665748/c84086d1-70fd-47ec-bf80-7d96a137212f) With `headless: true`: ![image](https://github.com/GoogleChrome/lighthouse/assets/665748/5e17ca7b-eba4-4c5d-b2be-b26e2a40491f) ### What did you expect? Properly sized screenshot. ### What have you tried? _No response_ ### How were you running Lighthouse? node ### Lighthouse Version 10.4.0 ### Chrome Version 115.0.0.0 ### Node Version 18 ### OS mac + linux ### Relevant log output _No response_
1.0
Wrong viewport in screenshots with `headless: 'new'` - ### FAQ - [X] Yes, my issue is not about [variability](https://github.com/GoogleChrome/lighthouse/blob/main/docs/variability.md) or [throttling](https://github.com/GoogleChrome/lighthouse/blob/main/docs/throttling.md). - [X] Yes, my issue is not about a specific accessibility audit (file with [axe-core](https://github.com/dequelabs/axe-core) instead). ### URL https://example.com ### What happened? Since we switched to launch puppeteer with `headless: 'new'`, the viewport of the screenshot is wrong. It appears as if it would use the default window size instead of the emulated screen. Repro: https://github.com/sokki/bug-new-headless-screenshot/blob/main/index.js With `headless: 'new'`: ![image](https://github.com/GoogleChrome/lighthouse/assets/665748/c84086d1-70fd-47ec-bf80-7d96a137212f) With `headless: true`: ![image](https://github.com/GoogleChrome/lighthouse/assets/665748/5e17ca7b-eba4-4c5d-b2be-b26e2a40491f) ### What did you expect? Properly sized screenshot. ### What have you tried? _No response_ ### How were you running Lighthouse? node ### Lighthouse Version 10.4.0 ### Chrome Version 115.0.0.0 ### Node Version 18 ### OS mac + linux ### Relevant log output _No response_
non_test
wrong viewport in screenshots with headless new faq yes my issue is not about or yes my issue is not about a specific accessibility audit file with instead url what happened since we switched to launch puppeteer with headless new the viewport of the screenshot is wrong it appears as if it would use the default window size instead of the emulated screen repro with headless new with headless true what did you expect properly sized screenshot what have you tried no response how were you running lighthouse node lighthouse version chrome version node version os mac linux relevant log output no response
0
1,096
14,006,839,267
IssuesEvent
2020-10-28 20:35:46
AzureAD/microsoft-identity-web
https://api.github.com/repos/AzureAD/microsoft-identity-web
closed
[Investigate] developer experience when required`"SignUpSignInPolicyId": "",` is not included in configuration options
b2c investigate supportability
Currently, we detect B2C if the `"SignUpSignInPolicyId": "b2c_1_susi",` is present in the configuration. with the changes i've made to checking the required options parameters, if the above is not present, we assume it's AAD (this has not changed) and then we will throw a missing tenant-id error, as tenant-id is required for AAD but not B2C: `System.ArgumentNullException: 'The TenantId parameter cannot be null or whitespace, and must be included in the configuration of the web app. For instance, in the appsettings.json file. (Parameter 'TenantId')'` Need to investigate further the developer experience and decide if this is the best way to detect b2c or not...probably not a better way as b2c can have custom domains (we'll hit the same issue MSAL has today with detecting B2C). PS. I'm not sure what happens today if the su-si policy is not present, will check and update here. @jmprieur thoughts?
True
[Investigate] developer experience when required`"SignUpSignInPolicyId": "",` is not included in configuration options - Currently, we detect B2C if the `"SignUpSignInPolicyId": "b2c_1_susi",` is present in the configuration. with the changes i've made to checking the required options parameters, if the above is not present, we assume it's AAD (this has not changed) and then we will throw a missing tenant-id error, as tenant-id is required for AAD but not B2C: `System.ArgumentNullException: 'The TenantId parameter cannot be null or whitespace, and must be included in the configuration of the web app. For instance, in the appsettings.json file. (Parameter 'TenantId')'` Need to investigate further the developer experience and decide if this is the best way to detect b2c or not...probably not a better way as b2c can have custom domains (we'll hit the same issue MSAL has today with detecting B2C). PS. I'm not sure what happens today if the su-si policy is not present, will check and update here. @jmprieur thoughts?
non_test
developer experience when required signupsigninpolicyid is not included in configuration options currently we detect if the signupsigninpolicyid susi is present in the configuration with the changes i ve made to checking the required options parameters if the above is not present we assume it s aad this has not changed and then we will throw a missing tenant id error as tenant id is required for aad but not system argumentnullexception the tenantid parameter cannot be null or whitespace and must be included in the configuration of the web app for instance in the appsettings json file parameter tenantid need to investigate further the developer experience and decide if this is the best way to detect or not probably not a better way as can have custom domains we ll hit the same issue msal has today with detecting ps i m not sure what happens today if the su si policy is not present will check and update here jmprieur thoughts
0
59,727
6,661,946,405
IssuesEvent
2017-10-02 10:56:08
puikinsh/illdy
https://api.github.com/repos/puikinsh/illdy
closed
Parallax jumping on mobile
tested
I’m noticing a strange issue on a site I’ve built at fazeducation.com. On Chrome/Firefox in iOS, the background “jumps” or zooms upon scrolling. I have tried a few workarounds to no avail, and also see the same effect on the Shapely demo. Videos here for reference: https://www.dropbox.com/s/6wmzsxcsgxp0pfy/shapely-demo.mov?dl=0 https://www.dropbox.com/s/lzs5py72ncbnig4/faz-education.mov?dl=0 https://colorlib.com/wp/forums/topic/parallax-image-jumping-effect-in-chromefirefox-ios/
1.0
Parallax jumping on mobile - I’m noticing a strange issue on a site I’ve built at fazeducation.com. On Chrome/Firefox in iOS, the background “jumps” or zooms upon scrolling. I have tried a few workarounds to no avail, and also see the same effect on the Shapely demo. Videos here for reference: https://www.dropbox.com/s/6wmzsxcsgxp0pfy/shapely-demo.mov?dl=0 https://www.dropbox.com/s/lzs5py72ncbnig4/faz-education.mov?dl=0 https://colorlib.com/wp/forums/topic/parallax-image-jumping-effect-in-chromefirefox-ios/
test
parallax jumping on mobile i’m noticing a strange issue on a site i’ve built at fazeducation com on chrome firefox in ios the background “jumps” or zooms upon scrolling i have tried a few workarounds to no avail and also see the same effect on the shapely demo videos here for reference
1