Unnamed: 0
int64 0
832k
| id
float64 2.49B
32.1B
| type
stringclasses 1
value | created_at
stringlengths 19
19
| repo
stringlengths 4
112
| repo_url
stringlengths 33
141
| action
stringclasses 3
values | title
stringlengths 1
1.02k
| labels
stringlengths 4
1.54k
| body
stringlengths 1
262k
| index
stringclasses 17
values | text_combine
stringlengths 95
262k
| label
stringclasses 2
values | text
stringlengths 96
252k
| binary_label
int64 0
1
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
85,208
| 3,688,026,741
|
IssuesEvent
|
2016-02-25 10:59:47
|
sklipus/testREST
|
https://api.github.com/repos/sklipus/testREST
|
opened
|
Git Origin: another PB
|
Priority: High Status: Ready for Package
|
**Git Origin: another PB**
Three days after the quarrel, Prince Stepan Arkadyevitch
Oblonsky--Stiva, as he was called in the fashionable world--woke
up at his usual hour, that is, at eight o'clock in the morning,
not in his wife's bedroom, but on the leather-covered sofa in his
study. He turned over his stout, well-cared-for person on the
springy sofa, as though he would sink into a long sleep again; he
vigorously embraced the pillow on the other side and buried his
face in it; but all at once he jumped up, sat up on the sofa, and
opened his eyes.
|
1.0
|
Git Origin: another PB - **Git Origin: another PB**
Three days after the quarrel, Prince Stepan Arkadyevitch
Oblonsky--Stiva, as he was called in the fashionable world--woke
up at his usual hour, that is, at eight o'clock in the morning,
not in his wife's bedroom, but on the leather-covered sofa in his
study. He turned over his stout, well-cared-for person on the
springy sofa, as though he would sink into a long sleep again; he
vigorously embraced the pillow on the other side and buried his
face in it; but all at once he jumped up, sat up on the sofa, and
opened his eyes.
|
non_test
|
git origin another pb git origin another pb three days after the quarrel prince stepan arkadyevitch oblonsky stiva as he was called in the fashionable world woke up at his usual hour that is at eight o clock in the morning not in his wife s bedroom but on the leather covered sofa in his study he turned over his stout well cared for person on the springy sofa as though he would sink into a long sleep again he vigorously embraced the pillow on the other side and buried his face in it but all at once he jumped up sat up on the sofa and opened his eyes
| 0
|
5,257
| 26,602,528,960
|
IssuesEvent
|
2023-01-23 16:45:04
|
webtorrent/webtorrent
|
https://api.github.com/repos/webtorrent/webtorrent
|
closed
|
Use Browserify builtins feature to specify Chrome App builtins instead of "chromeapp" package.json field
|
enhancement help wanted accepted discuss at maintainers call
|
To support a Chrome App build for the Brave Browser WebTorrent extension, I added replacements for the Node Builtins that work in a Chrome App environment. For example, `net` is replaced by `chrome-net`, `dgram` is replaced by `chrome-dgram`, and `dns` is replaced by `chrome-dns`, etc.
In order to pull this off, we had to add e.g. `chrome-net` as a dependency of any package that used `require('net')` and then we'd use a custom `package.json` "browser" field with the `chromeapp` key to specify that in a chrome app the following replacement should occur:
```json
{
"chromeapp": {
"net": "chrome-net"
}
}
```
And then we run browserify with the `--browser-field=chromeapp` argument.
However, this is hard to do for every WebTorrent dependency and it means that extra dependencies are installed even when the user is not using WebTorrent in a Chrome App.
Instead, let's remove all these `chrome-*` dependencies and just handle these replacements in the `webtorrent` repo. There's a description of how we can do this in this issue: https://github.com/jscissr/http-node/pull/2
Specifically, we'll tell browserify that instead of the usual replacements it does for browser builds, we want different replacements for `net`, `dgram`, and `dns`. We'll need to write a short build script using the Browserify API to do this, though eventually Browserify will support a command line option for this, as @goto-bus-stop mentioned in a comment in that issue.
|
True
|
Use Browserify builtins feature to specify Chrome App builtins instead of "chromeapp" package.json field - To support a Chrome App build for the Brave Browser WebTorrent extension, I added replacements for the Node Builtins that work in a Chrome App environment. For example, `net` is replaced by `chrome-net`, `dgram` is replaced by `chrome-dgram`, and `dns` is replaced by `chrome-dns`, etc.
In order to pull this off, we had to add e.g. `chrome-net` as a dependency of any package that used `require('net')` and then we'd use a custom `package.json` "browser" field with the `chromeapp` key to specify that in a chrome app the following replacement should occur:
```json
{
"chromeapp": {
"net": "chrome-net"
}
}
```
And then we run browserify with the `--browser-field=chromeapp` argument.
However, this is hard to do for every WebTorrent dependency and it means that extra dependencies are installed even when the user is not using WebTorrent in a Chrome App.
Instead, let's remove all these `chrome-*` dependencies and just handle these replacements in the `webtorrent` repo. There's a description of how we can do this in this issue: https://github.com/jscissr/http-node/pull/2
Specifically, we'll tell browserify that instead of the usual replacements it does for browser builds, we want different replacements for `net`, `dgram`, and `dns`. We'll need to write a short build script using the Browserify API to do this, though eventually Browserify will support a command line option for this, as @goto-bus-stop mentioned in a comment in that issue.
|
non_test
|
use browserify builtins feature to specify chrome app builtins instead of chromeapp package json field to support a chrome app build for the brave browser webtorrent extension i added replacements for the node builtins that work in a chrome app environment for example net is replaced by chrome net dgram is replaced by chrome dgram and dns is replaced by chrome dns etc in order to pull this off we had to add e g chrome net as a dependency of any package that used require net and then we d use a custom package json browser field with the chromeapp key to specify that in a chrome app the following replacement should occur json chromeapp net chrome net and then we run browserify with the browser field chromeapp argument however this is hard to do for every webtorrent dependency and it means that extra dependencies are installed even when the user is not using webtorrent in a chrome app instead let s remove all these chrome dependencies and just handle these replacements in the webtorrent repo there s a description of how we can do this in this issue specifically we ll tell browserify that instead of the usual replacements it does for browser builds we want different replacements for net dgram and dns we ll need to write a short build script using the browserify api to do this though eventually browserify will support a command line option for this as goto bus stop mentioned in a comment in that issue
| 0
|
175,933
| 13,617,598,770
|
IssuesEvent
|
2020-09-23 17:14:43
|
openshift/odo
|
https://api.github.com/repos/openshift/odo
|
closed
|
Add docker version coverage for docker devfile push
|
area/testing kind/feature lifecycle/rotten
|
/kind feature
<!--
Welcome! - We kindly ask you to:
1. Fill out the issue template below
2. Use the Google group if you have a question rather than a bug or feature request.
The group is at: https://groups.google.com/forum/#!forum/odo-users
Thanks for understanding, and for contributing to the project!
-->
## Which functionality do you think we should add?
We are now running the docker devfile push only on the default docker version available on ubuntu distribution. But completely missing other official docker version available for windows, mac and other linux distribution aswell. And ofcourse these docker version coverage matrix will be documented for the distribution we support
## Why is this needed?
More test coverage for devfile push docker target and provides more information about what docker version we support.
|
1.0
|
Add docker version coverage for docker devfile push - /kind feature
<!--
Welcome! - We kindly ask you to:
1. Fill out the issue template below
2. Use the Google group if you have a question rather than a bug or feature request.
The group is at: https://groups.google.com/forum/#!forum/odo-users
Thanks for understanding, and for contributing to the project!
-->
## Which functionality do you think we should add?
We are now running the docker devfile push only on the default docker version available on ubuntu distribution. But completely missing other official docker version available for windows, mac and other linux distribution aswell. And ofcourse these docker version coverage matrix will be documented for the distribution we support
## Why is this needed?
More test coverage for devfile push docker target and provides more information about what docker version we support.
|
test
|
add docker version coverage for docker devfile push kind feature welcome we kindly ask you to fill out the issue template below use the google group if you have a question rather than a bug or feature request the group is at thanks for understanding and for contributing to the project which functionality do you think we should add we are now running the docker devfile push only on the default docker version available on ubuntu distribution but completely missing other official docker version available for windows mac and other linux distribution aswell and ofcourse these docker version coverage matrix will be documented for the distribution we support why is this needed more test coverage for devfile push docker target and provides more information about what docker version we support
| 1
|
20,143
| 10,605,103,100
|
IssuesEvent
|
2019-10-10 19:41:37
|
toggl/mobileapp
|
https://api.github.com/repos/toggl/mobileapp
|
closed
|
Deduplicate expensive Rx calls
|
foundation performance
|
## 🚧 Refactor Proposal
We are doing some expensive calls on Rx more than once. this is impacting our startup times.
## Technical aspects
We need to check each expensive call we make using Rx and make sure that we are using Connect/RefCount correctly to avoid multiple subscribers making multiple calls.
|
True
|
Deduplicate expensive Rx calls - ## 🚧 Refactor Proposal
We are doing some expensive calls on Rx more than once. this is impacting our startup times.
## Technical aspects
We need to check each expensive call we make using Rx and make sure that we are using Connect/RefCount correctly to avoid multiple subscribers making multiple calls.
|
non_test
|
deduplicate expensive rx calls 🚧 refactor proposal we are doing some expensive calls on rx more than once this is impacting our startup times technical aspects we need to check each expensive call we make using rx and make sure that we are using connect refcount correctly to avoid multiple subscribers making multiple calls
| 0
|
194,358
| 14,676,357,641
|
IssuesEvent
|
2020-12-30 19:58:32
|
apache/buildstream
|
https://api.github.com/repos/apache/buildstream
|
closed
|
Loader tests are broken
|
bug important tests
|
[See original issue on GitLab](https://gitlab.com/BuildStream/buildstream/-/issues/335)
In GitLab by [[Gitlab user @tristanvb]](https://gitlab.com/tristanvb) on Apr 3, 2018, 06:46
Note that these tests are some of the last tests which still need to be ported to use the `Cli` fixture from `testutils`...
When running:
```sh
./setup.py test --addoptps 'tests/loader/'
```
The tests consistently fail with an assertion because the `Platform` instance has not been created. This is expected because these tests do not use a `Pipeline` object, which is what currently instantiates the platform.
This is also an indicator that we do not clean up state properly between tests, the only reason these tests are passing is because the `Platform` has been instantiated in a previous test.
These tests dont need to be fixed (they need to be ported to use the proper fixtures), but we would do well to clean up state better in between tests.
|
1.0
|
Loader tests are broken - [See original issue on GitLab](https://gitlab.com/BuildStream/buildstream/-/issues/335)
In GitLab by [[Gitlab user @tristanvb]](https://gitlab.com/tristanvb) on Apr 3, 2018, 06:46
Note that these tests are some of the last tests which still need to be ported to use the `Cli` fixture from `testutils`...
When running:
```sh
./setup.py test --addoptps 'tests/loader/'
```
The tests consistently fail with an assertion because the `Platform` instance has not been created. This is expected because these tests do not use a `Pipeline` object, which is what currently instantiates the platform.
This is also an indicator that we do not clean up state properly between tests, the only reason these tests are passing is because the `Platform` has been instantiated in a previous test.
These tests dont need to be fixed (they need to be ported to use the proper fixtures), but we would do well to clean up state better in between tests.
|
test
|
loader tests are broken in gitlab by on apr note that these tests are some of the last tests which still need to be ported to use the cli fixture from testutils when running sh setup py test addoptps tests loader the tests consistently fail with an assertion because the platform instance has not been created this is expected because these tests do not use a pipeline object which is what currently instantiates the platform this is also an indicator that we do not clean up state properly between tests the only reason these tests are passing is because the platform has been instantiated in a previous test these tests dont need to be fixed they need to be ported to use the proper fixtures but we would do well to clean up state better in between tests
| 1
|
279,068
| 24,196,414,302
|
IssuesEvent
|
2022-09-24 00:52:28
|
ValveSoftware/steam-for-linux
|
https://api.github.com/repos/ValveSoftware/steam-for-linux
|
closed
|
No more sound via Remote Play.
|
Audio Streaming Need Retest
|
I also notice that Steam is not in the pulseaudio list anymore.

#### Your system information
* Steam client version (build number or date): Mar 25 2020
* Distribution (e.g. Ubuntu): Manjaro
* Opted into Steam client beta?: [Yes/No] Yes
* Have you checked for system updates?: [Yes/No] Yes.
#### Please describe your issue in as much detail as possible:
No more sound via Remote Play.
#### Steps for reproducing this issue:
1. Stream every game.
2. No sound.
|
1.0
|
No more sound via Remote Play. - I also notice that Steam is not in the pulseaudio list anymore.

#### Your system information
* Steam client version (build number or date): Mar 25 2020
* Distribution (e.g. Ubuntu): Manjaro
* Opted into Steam client beta?: [Yes/No] Yes
* Have you checked for system updates?: [Yes/No] Yes.
#### Please describe your issue in as much detail as possible:
No more sound via Remote Play.
#### Steps for reproducing this issue:
1. Stream every game.
2. No sound.
|
test
|
no more sound via remote play i also notice that steam is not in the pulseaudio list anymore your system information steam client version build number or date mar distribution e g ubuntu manjaro opted into steam client beta yes have you checked for system updates yes please describe your issue in as much detail as possible no more sound via remote play steps for reproducing this issue stream every game no sound
| 1
|
24,393
| 4,076,855,231
|
IssuesEvent
|
2016-05-30 03:37:31
|
coreos/etcd
|
https://api.github.com/repos/coreos/etcd
|
closed
|
Test: TestIssue3699 times out
|
area/testing
|
```
goroutine 12943 [sleep]:
time.Sleep(0x989680)
/usr/local/golang/1.6.2/go/src/runtime/time.go:59 +0xf9
github.com/coreos/etcd/integration.(*cluster).waitMembersMatch(0xc8231b7200, 0xc82000ea20, 0xc820187e00, 0x4, 0x4)
/home/runner/workspace/src/github.com/coreos/etcd/gopath/src/github.com/coreos/etcd/integration/cluster.go:319 +0x405
github.com/coreos/etcd/integration.(*cluster).addMember(0xc8231b7200, 0xc82000ea20)
/home/runner/workspace/src/github.com/coreos/etcd/gopath/src/github.com/coreos/etcd/integration/cluster.go:251 +0x65b
github.com/coreos/etcd/integration.(*cluster).AddMember(0xc8231b7200, 0xc82000ea20)
/home/runner/workspace/src/github.com/coreos/etcd/gopath/src/github.com/coreos/etcd/integration/cluster.go:270 +0x2b
github.com/coreos/etcd/integration.TestIssue3699(0xc82000ea20)
/home/runner/workspace/src/github.com/coreos/etcd/gopath/src/github.com/coreos/etcd/integration/cluster_test.go:312 +0x146
testing.tRunner(0xc82000ea20, 0x1625238)
/usr/local/golang/1.6.2/go/src/testing/testing.go:473 +0x98
created by testing.RunTests
/usr/local/golang/1.6.2/go/src/testing/testing.go:582 +0x892
```
|
1.0
|
Test: TestIssue3699 times out - ```
goroutine 12943 [sleep]:
time.Sleep(0x989680)
/usr/local/golang/1.6.2/go/src/runtime/time.go:59 +0xf9
github.com/coreos/etcd/integration.(*cluster).waitMembersMatch(0xc8231b7200, 0xc82000ea20, 0xc820187e00, 0x4, 0x4)
/home/runner/workspace/src/github.com/coreos/etcd/gopath/src/github.com/coreos/etcd/integration/cluster.go:319 +0x405
github.com/coreos/etcd/integration.(*cluster).addMember(0xc8231b7200, 0xc82000ea20)
/home/runner/workspace/src/github.com/coreos/etcd/gopath/src/github.com/coreos/etcd/integration/cluster.go:251 +0x65b
github.com/coreos/etcd/integration.(*cluster).AddMember(0xc8231b7200, 0xc82000ea20)
/home/runner/workspace/src/github.com/coreos/etcd/gopath/src/github.com/coreos/etcd/integration/cluster.go:270 +0x2b
github.com/coreos/etcd/integration.TestIssue3699(0xc82000ea20)
/home/runner/workspace/src/github.com/coreos/etcd/gopath/src/github.com/coreos/etcd/integration/cluster_test.go:312 +0x146
testing.tRunner(0xc82000ea20, 0x1625238)
/usr/local/golang/1.6.2/go/src/testing/testing.go:473 +0x98
created by testing.RunTests
/usr/local/golang/1.6.2/go/src/testing/testing.go:582 +0x892
```
|
test
|
test times out goroutine time sleep usr local golang go src runtime time go github com coreos etcd integration cluster waitmembersmatch home runner workspace src github com coreos etcd gopath src github com coreos etcd integration cluster go github com coreos etcd integration cluster addmember home runner workspace src github com coreos etcd gopath src github com coreos etcd integration cluster go github com coreos etcd integration cluster addmember home runner workspace src github com coreos etcd gopath src github com coreos etcd integration cluster go github com coreos etcd integration home runner workspace src github com coreos etcd gopath src github com coreos etcd integration cluster test go testing trunner usr local golang go src testing testing go created by testing runtests usr local golang go src testing testing go
| 1
|
802
| 2,639,994,552
|
IssuesEvent
|
2015-03-11 08:44:47
|
FRosner/spawncamping-dds
|
https://api.github.com/repos/FRosner/spawncamping-dds
|
opened
|
Upgrade to Spark 1.3
|
Build Spark
|
- [ ] Upgrade dependency
- [ ] API for SchemaRDD / Data frame
This will probably end up in DDS 2.x because it breaks the API when working with Spark 1.2. Does it make sense to backport patches to 1.x branch?
|
1.0
|
Upgrade to Spark 1.3 - - [ ] Upgrade dependency
- [ ] API for SchemaRDD / Data frame
This will probably end up in DDS 2.x because it breaks the API when working with Spark 1.2. Does it make sense to backport patches to 1.x branch?
|
non_test
|
upgrade to spark upgrade dependency api for schemardd data frame this will probably end up in dds x because it breaks the api when working with spark does it make sense to backport patches to x branch
| 0
|
301,491
| 9,220,945,413
|
IssuesEvent
|
2019-03-11 18:43:16
|
chocolatey/choco
|
https://api.github.com/repos/chocolatey/choco
|
closed
|
Feature/switch to halt install if dependency requires a reboot
|
3 - Done Enhancement Priority_HIGH
|
As per https://groups.google.com/forum/#!topic/chocolatey/jP4cv8TDUcU, it's probably a good idea to add a switch so that install/upgrade will halt if a dependency requires a reboot. For example, I have a package that has a dependency on PowerShell 3+ - chocolately installed PowerShell v5 but then logged this and then continued to install packages with PowerShell 2 (and subsequently failed):
2016-11-02 12:05:55,829 [INFO ] - PowerShell.5.0 has been installed.
2016-11-02 12:05:55,829 [INFO ] -
2016-11-02 12:05:55,844 [WARN ] - WARNING: PowerShell.5.0 requires a reboot to complete the installation.
2016-11-02 12:05:55,844 [DEBUG] - Built-in PowerShell host called with ['[System.Threading.Thread]::CurrentThread.CurrentCulture = '';[System.Threading.Thread]::CurrentThread.CurrentUICulture = ''; & import-module -name 'C:\ProgramData\chocolatey\helpers\chocolateyInstaller.psm1'; & 'C:\ProgramData\chocolatey\helpers\chocolateyScriptRunner.ps1' -packageScript 'C:\ProgramData\chocolatey\lib\PowerShell\tools\ChocolateyInstall.ps1' -installArguments '' -packageParameters '''] exited with '3010'.
2016-11-02 12:05:55,844 [DEBUG] - Calling command ['"C:\Windows\System32\shutdown.exe" /a']
2016-11-02 12:05:55,870 [DEBUG] - Command ['"C:\Windows\System32\shutdown.exe" /a'] exited with '1116'
|
1.0
|
Feature/switch to halt install if dependency requires a reboot - As per https://groups.google.com/forum/#!topic/chocolatey/jP4cv8TDUcU, it's probably a good idea to add a switch so that install/upgrade will halt if a dependency requires a reboot. For example, I have a package that has a dependency on PowerShell 3+ - chocolately installed PowerShell v5 but then logged this and then continued to install packages with PowerShell 2 (and subsequently failed):
2016-11-02 12:05:55,829 [INFO ] - PowerShell.5.0 has been installed.
2016-11-02 12:05:55,829 [INFO ] -
2016-11-02 12:05:55,844 [WARN ] - WARNING: PowerShell.5.0 requires a reboot to complete the installation.
2016-11-02 12:05:55,844 [DEBUG] - Built-in PowerShell host called with ['[System.Threading.Thread]::CurrentThread.CurrentCulture = '';[System.Threading.Thread]::CurrentThread.CurrentUICulture = ''; & import-module -name 'C:\ProgramData\chocolatey\helpers\chocolateyInstaller.psm1'; & 'C:\ProgramData\chocolatey\helpers\chocolateyScriptRunner.ps1' -packageScript 'C:\ProgramData\chocolatey\lib\PowerShell\tools\ChocolateyInstall.ps1' -installArguments '' -packageParameters '''] exited with '3010'.
2016-11-02 12:05:55,844 [DEBUG] - Calling command ['"C:\Windows\System32\shutdown.exe" /a']
2016-11-02 12:05:55,870 [DEBUG] - Command ['"C:\Windows\System32\shutdown.exe" /a'] exited with '1116'
|
non_test
|
feature switch to halt install if dependency requires a reboot as per it s probably a good idea to add a switch so that install upgrade will halt if a dependency requires a reboot for example i have a package that has a dependency on powershell chocolately installed powershell but then logged this and then continued to install packages with powershell and subsequently failed powershell has been installed warning powershell requires a reboot to complete the installation built in powershell host called with currentthread currentculture currentthread currentuiculture import module name c programdata chocolatey helpers chocolateyinstaller c programdata chocolatey helpers chocolateyscriptrunner packagescript c programdata chocolatey lib powershell tools chocolateyinstall installarguments packageparameters exited with calling command command exited with
| 0
|
755,641
| 26,434,963,670
|
IssuesEvent
|
2023-01-15 09:12:13
|
projectdiscovery/tlsx
|
https://api.github.com/repos/projectdiscovery/tlsx
|
closed
|
Pre-Handshake doesn't work and completes the handshake
|
Priority: High Status: Completed Type: Bug
|
### tlsx version:
`main|dev`
### Current Behavior:
`-pre-handshake/-ps` completes the whole TLS handshake without early exit at certificate phase
### Expected Behavior:
Early exit at server certificate phase for TLS<1.2
### Steps To Reproduce:
```console
$ tlsx -ps -u scanme.sh -json
```

Credits: @PatrikFehrenbach
|
1.0
|
Pre-Handshake doesn't work and completes the handshake - ### tlsx version:
`main|dev`
### Current Behavior:
`-pre-handshake/-ps` completes the whole TLS handshake without early exit at certificate phase
### Expected Behavior:
Early exit at server certificate phase for TLS<1.2
### Steps To Reproduce:
```console
$ tlsx -ps -u scanme.sh -json
```

Credits: @PatrikFehrenbach
|
non_test
|
pre handshake doesn t work and completes the handshake tlsx version main dev current behavior pre handshake ps completes the whole tls handshake without early exit at certificate phase expected behavior early exit at server certificate phase for tls steps to reproduce console tlsx ps u scanme sh json credits patrikfehrenbach
| 0
|
445,937
| 31,388,244,048
|
IssuesEvent
|
2023-08-26 02:42:32
|
eBay/ebayui-core
|
https://api.github.com/repos/eBay/ebayui-core
|
closed
|
ebay-drawer-dialog: callbacks use wrong arguments
|
aspect: documentation component: drawer-dialog
|
# Bug Report
## Description
Documentation reads that:
- `onOpen/onClose/onExpand/onCollapse` callbacks should use `{ originalEvent }` as argument
but in storybook I get something else:
<img width="576" alt="image" src="https://user-images.githubusercontent.com/2737310/233406305-655b4507-8b17-418c-a0ca-d9b856cfd487.png">
|
1.0
|
ebay-drawer-dialog: callbacks use wrong arguments - # Bug Report
## Description
Documentation reads that:
- `onOpen/onClose/onExpand/onCollapse` callbacks should use `{ originalEvent }` as argument
but in storybook I get something else:
<img width="576" alt="image" src="https://user-images.githubusercontent.com/2737310/233406305-655b4507-8b17-418c-a0ca-d9b856cfd487.png">
|
non_test
|
ebay drawer dialog callbacks use wrong arguments bug report description documentation reads that onopen onclose onexpand oncollapse callbacks should use originalevent as argument but in storybook i get something else img width alt image src
| 0
|
40,192
| 5,281,529,835
|
IssuesEvent
|
2017-02-07 16:40:29
|
wp-cli/scaffold-package-command
|
https://api.github.com/repos/wp-cli/scaffold-package-command
|
closed
|
Only test WP_VERSION=nightly with one build
|
command:scaffold-package-tests
|
Our Travis matrix currently generates `WP_VERSION=nightly` for each PHP version, which is overkill. We should test `WP_VERSION=latest` on each PHP version, but `WP_VERSION=nightly` with only one PHP version. 5.6 is the likeliest candidate.
|
1.0
|
Only test WP_VERSION=nightly with one build - Our Travis matrix currently generates `WP_VERSION=nightly` for each PHP version, which is overkill. We should test `WP_VERSION=latest` on each PHP version, but `WP_VERSION=nightly` with only one PHP version. 5.6 is the likeliest candidate.
|
test
|
only test wp version nightly with one build our travis matrix currently generates wp version nightly for each php version which is overkill we should test wp version latest on each php version but wp version nightly with only one php version is the likeliest candidate
| 1
|
9,529
| 3,051,981,350
|
IssuesEvent
|
2015-08-12 12:19:26
|
MyrionPhoenixmoon/scenarioo
|
https://api.github.com/repos/MyrionPhoenixmoon/scenarioo
|
closed
|
Issue name and author should be editable in edit mode of the editor
|
3 - Done task user test outcome
|
<!---
@huboard:{"order":144.5,"milestone_order":6.103515625e-05,"custom_state":""}
-->
|
1.0
|
Issue name and author should be editable in edit mode of the editor -
<!---
@huboard:{"order":144.5,"milestone_order":6.103515625e-05,"custom_state":""}
-->
|
test
|
issue name and author should be editable in edit mode of the editor huboard order milestone order custom state
| 1
|
219,940
| 16,857,322,750
|
IssuesEvent
|
2021-06-21 08:31:48
|
DAGsHub/fds
|
https://api.github.com/repos/DAGsHub/fds
|
closed
|
Add About section for FDS
|
documentation
|
There is no about section for FDS. For example refer https://gitless.com/#main for inspiration
|
1.0
|
Add About section for FDS - There is no about section for FDS. For example refer https://gitless.com/#main for inspiration
|
non_test
|
add about section for fds there is no about section for fds for example refer for inspiration
| 0
|
244,360
| 26,388,809,509
|
IssuesEvent
|
2023-01-12 14:17:42
|
aayant-mend/onboardtraining
|
https://api.github.com/repos/aayant-mend/onboardtraining
|
closed
|
threadfix_api-1.1.1-py3-none-any.whl: 2 vulnerabilities (highest severity is: 7.5) - autoclosed
|
security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>threadfix_api-1.1.1-py3-none-any.whl</b></p></summary>
<p></p>
<p>Path to vulnerable library: /Python/Pip/requirements.txt</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (threadfix_api version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-33503](https://www.mend.io/vulnerability-database/CVE-2021-33503) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | urllib3-1.24.3-py2.py3-none-any.whl | Transitive | N/A* | ❌ |
| [CVE-2020-26137](https://www.mend.io/vulnerability-database/CVE-2020-26137) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | urllib3-1.24.3-py2.py3-none-any.whl | Transitive | N/A* | ❌ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-33503</summary>
### Vulnerable Library - <b>urllib3-1.24.3-py2.py3-none-any.whl</b></p>
<p>HTTP library with thread-safe connection pooling, file post, and more.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/01/11/525b02e4acc0c747de8b6ccdab376331597c569c42ea66ab0a1dbd36eca2/urllib3-1.24.3-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/01/11/525b02e4acc0c747de8b6ccdab376331597c569c42ea66ab0a1dbd36eca2/urllib3-1.24.3-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /Python/Pip/requirements.txt</p>
<p>Path to vulnerable library: /Python/Pip/requirements.txt</p>
<p>
Dependency Hierarchy:
- threadfix_api-1.1.1-py3-none-any.whl (Root Library)
- requests-2.20.0-py2.py3-none-any.whl
- :x: **urllib3-1.24.3-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
<p>Publish Date: 2021-06-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-33503>CVE-2021-33503</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg">https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg</a></p>
<p>Release Date: 2021-06-29</p>
<p>Fix Resolution: urllib3 - 1.26.5</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-26137</summary>
### Vulnerable Library - <b>urllib3-1.24.3-py2.py3-none-any.whl</b></p>
<p>HTTP library with thread-safe connection pooling, file post, and more.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/01/11/525b02e4acc0c747de8b6ccdab376331597c569c42ea66ab0a1dbd36eca2/urllib3-1.24.3-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/01/11/525b02e4acc0c747de8b6ccdab376331597c569c42ea66ab0a1dbd36eca2/urllib3-1.24.3-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /Python/Pip/requirements.txt</p>
<p>Path to vulnerable library: /Python/Pip/requirements.txt</p>
<p>
Dependency Hierarchy:
- threadfix_api-1.1.1-py3-none-any.whl (Root Library)
- requests-2.20.0-py2.py3-none-any.whl
- :x: **urllib3-1.24.3-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
<p>Publish Date: 2020-09-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-26137>CVE-2020-26137</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137</a></p>
<p>Release Date: 2020-09-30</p>
<p>Fix Resolution: 1.25.9</p>
</p>
<p></p>
</details>
|
True
|
threadfix_api-1.1.1-py3-none-any.whl: 2 vulnerabilities (highest severity is: 7.5) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>threadfix_api-1.1.1-py3-none-any.whl</b></p></summary>
<p></p>
<p>Path to vulnerable library: /Python/Pip/requirements.txt</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (threadfix_api version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-33503](https://www.mend.io/vulnerability-database/CVE-2021-33503) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | urllib3-1.24.3-py2.py3-none-any.whl | Transitive | N/A* | ❌ |
| [CVE-2020-26137](https://www.mend.io/vulnerability-database/CVE-2020-26137) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | urllib3-1.24.3-py2.py3-none-any.whl | Transitive | N/A* | ❌ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-33503</summary>
### Vulnerable Library - <b>urllib3-1.24.3-py2.py3-none-any.whl</b></p>
<p>HTTP library with thread-safe connection pooling, file post, and more.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/01/11/525b02e4acc0c747de8b6ccdab376331597c569c42ea66ab0a1dbd36eca2/urllib3-1.24.3-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/01/11/525b02e4acc0c747de8b6ccdab376331597c569c42ea66ab0a1dbd36eca2/urllib3-1.24.3-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /Python/Pip/requirements.txt</p>
<p>Path to vulnerable library: /Python/Pip/requirements.txt</p>
<p>
Dependency Hierarchy:
- threadfix_api-1.1.1-py3-none-any.whl (Root Library)
- requests-2.20.0-py2.py3-none-any.whl
- :x: **urllib3-1.24.3-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
<p>Publish Date: 2021-06-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-33503>CVE-2021-33503</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg">https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg</a></p>
<p>Release Date: 2021-06-29</p>
<p>Fix Resolution: urllib3 - 1.26.5</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-26137</summary>
### Vulnerable Library - <b>urllib3-1.24.3-py2.py3-none-any.whl</b></p>
<p>HTTP library with thread-safe connection pooling, file post, and more.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/01/11/525b02e4acc0c747de8b6ccdab376331597c569c42ea66ab0a1dbd36eca2/urllib3-1.24.3-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/01/11/525b02e4acc0c747de8b6ccdab376331597c569c42ea66ab0a1dbd36eca2/urllib3-1.24.3-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: /Python/Pip/requirements.txt</p>
<p>Path to vulnerable library: /Python/Pip/requirements.txt</p>
<p>
Dependency Hierarchy:
- threadfix_api-1.1.1-py3-none-any.whl (Root Library)
- requests-2.20.0-py2.py3-none-any.whl
- :x: **urllib3-1.24.3-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
<p>Publish Date: 2020-09-30
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-26137>CVE-2020-26137</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137</a></p>
<p>Release Date: 2020-09-30</p>
<p>Fix Resolution: 1.25.9</p>
</p>
<p></p>
</details>
|
non_test
|
threadfix api none any whl vulnerabilities highest severity is autoclosed vulnerable library threadfix api none any whl path to vulnerable library python pip requirements txt found in head commit a href vulnerabilities cve severity cvss dependency type fixed in threadfix api version remediation available high none any whl transitive n a medium none any whl transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library none any whl http library with thread safe connection pooling file post and more library home page a href path to dependency file python pip requirements txt path to vulnerable library python pip requirements txt dependency hierarchy threadfix api none any whl root library requests none any whl x none any whl vulnerable library found in head commit a href found in base branch main vulnerability details an issue was discovered in before when provided with a url containing many characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a url were passed as a parameter or redirected to via an http redirect publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable library none any whl http library with thread safe connection pooling file post and more library home page a href path to dependency file python pip requirements txt path to vulnerable library python pip requirements txt dependency hierarchy threadfix api none any whl root library requests none any whl x none any whl vulnerable library found in head commit a href found in base branch main vulnerability details before allows crlf injection if the attacker controls the http request method as demonstrated by inserting cr and lf control characters in the first argument of putrequest note this is similar to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution
| 0
|
85,648
| 24,647,595,327
|
IssuesEvent
|
2022-10-17 15:56:08
|
expo/expo
|
https://api.github.com/repos/expo/expo
|
closed
|
TypeError: undefined is not an object (evaluating 'gl.getProgramInfoLog(program).trim')
|
needs review incomplete issue: missing or invalid repro Development Builds
|
### Summary
I am working with `expo-bare-workflow`. My app is using `expo-gl` and `three.js` for rendering animations for my app.
While developing, app works smoothly and reflects the changes smoothly, but once I navigate from one navigation stack to another one application crashes with the following error:
```bash
ERROR TypeError: undefined is not an object (evaluating 'gl.getProgramInfoLog(program).trim')
```
it just goes on and on and I need to reload my app to restart it. After it, it works smooth for a while and after navigating from page to page it again crashes with the same error.
Additional Info
Developing for Platform : IOS
EXPO SDK version : "~46.0.9"
expo-gl package version : "~11.4.0"
Working with development build created using `npx eas run:ios` because my app uses some native code
Device used for testing : Iphone 13 (IOS 16)
package.json
```json
{
"main": "index.js",
"scripts": {
"android": "react-native run-android",
"ios": "react-native run-ios",
"web": "expo start --web",
"start": "expo start --dev-client",
"prebuild": "expo prebuild"
},
"dependencies": {
"@expo-google-fonts/cinzel": "^0.2.2",
"@expo-google-fonts/cinzel-decorative": "^0.2.2",
"@react-native-async-storage/async-storage": "~1.17.3",
"@react-navigation/stack": "^6.1.1",
"axios": "^0.25.0",
"expo": "~46.0.9",
"expo-app-loading": "~2.1.0",
"expo-auth-session": "~3.7.1",
"expo-av": "~12.0.4",
"expo-file-system": "~14.1.0",
"expo-gl": "~11.4.0",
"expo-random": "~12.3.0",
"expo-splash-screen": "~0.16.2",
"expo-status-bar": "~1.4.0",
"expo-three": "^6.0.1",
"expo-three-orbit-controls": "^2.0.0",
"expo-updates": "~0.14.5",
"gsap-rn": "^0.0.15",
"jwt-decode": "^3.1.2",
"moment": "^2.29.4",
"react": "18.0.0",
"react-dom": "18.0.0",
"react-native": "0.69.5",
"react-native-elements": "^3.4.2",
"react-native-gesture-handler": "^2.6.1",
"react-native-phone-number-input": "^2.1.0",
"react-native-purchases": "^5.0.2",
"react-native-reanimated": "~2.9.1",
"react-native-safe-area-context": "^4.3.3",
"react-native-screens": "~3.15.0",
"react-native-vector-icons": "^9.0.0",
"react-native-web": "~0.18.7",
"react-native-webview": "11.23.0",
"react-navigation": "^4.4.4",
"react-navigation-stack": "^2.10.4",
"react-navigation-tabs": "^2.11.2",
"three": "^0.127.0"
},
"devDependencies": {
"@babel/core": "^7.18.6"
},
"private": true,
"name": "Sample App",
"version": "1.0.0"
}
```
### Managed or bare workflow?
bare
### What platform(s) does this occur on?
iOS
### Package versions
"@expo-google-fonts/cinzel": "^0.2.2",
"@expo-google-fonts/cinzel-decorative": "^0.2.2",
"@react-native-async-storage/async-storage": "~1.17.3",
"@react-navigation/stack": "^6.1.1",
"axios": "^0.25.0",
"expo": "~46.0.9",
"expo-app-loading": "~2.1.0",
"expo-auth-session": "~3.7.1",
"expo-av": "~12.0.4",
"expo-file-system": "~14.1.0",
"expo-gl": "~11.4.0",
"expo-random": "~12.3.0",
"expo-splash-screen": "~0.16.2",
"expo-status-bar": "~1.4.0",
"expo-three": "^6.0.1",
"expo-three-orbit-controls": "^2.0.0",
"expo-updates": "~0.14.5",
"gsap-rn": "^0.0.15",
"jwt-decode": "^3.1.2",
"moment": "^2.29.4",
"react": "18.0.0",
"react-dom": "18.0.0",
"react-native": "0.69.5",
"react-native-elements": "^3.4.2",
"react-native-gesture-handler": "^2.6.1",
"react-native-phone-number-input": "^2.1.0",
"react-native-purchases": "^5.0.2",
"react-native-reanimated": "~2.9.1",
"react-native-safe-area-context": "^4.3.3",
"react-native-screens": "~3.15.0",
"react-native-vector-icons": "^9.0.0",
"react-native-web": "~0.18.7",
"react-native-webview": "11.23.0",
"react-navigation": "^4.4.4",
"react-navigation-stack": "^2.10.4",
"react-navigation-tabs": "^2.11.2",
"three": "^0.127.0"
### Environment
expo-env-info 1.0.5 environment info:
System:
OS: macOS 12.6
Shell: 5.8.1 - /bin/zsh
Binaries:
Node: 16.14.2 - ~/.nvm/versions/node/v16.14.2/bin/node
npm: 8.5.0 - ~/.nvm/versions/node/v16.14.2/bin/npm
Watchman: 2022.06.27.00 - /usr/local/bin/watchman
Managers:
CocoaPods: 1.11.3 - /usr/local/bin/pod
SDKs:
iOS SDK:
Platforms: DriverKit 21.4, iOS 16.0, macOS 12.3, tvOS 16.0, watchOS 9.0
IDEs:
Android Studio: 2021.2 AI-212.5712.43.2112.8609683
Xcode: 14.0/14A309 - /usr/bin/xcodebuild
npmPackages:
expo: ~46.0.9 => 46.0.10
react: 18.0.0 => 18.0.0
react-dom: 18.0.0 => 18.0.0
react-native: 0.69.5 => 0.69.5
react-native-web: ~0.18.7 => 0.18.9
react-navigation: ^4.4.4 => 4.4.4
npmGlobalPackages:
eas-cli: 2.1.0
expo-cli: 6.0.1
Expo Workflow: bare
### Reproducible demo
// create screens and instantiate expo-gl
const switchNavigator = createSwitchNavigator({
ResolveAuth: ResolveAuthScreen,
loginFlow: createStackNavigator({
SignUp: SignUpScreen,
SignIn: SignInScreen,
VerifyEmailAndPhone: VerifyEmailAndPhoneScreen,
},{
// initialRouteName: "Home",
defaultNavigationOptions: {
// title: "Home",
headerShown: false,
presentation: "modal",
detachPreviousScreen: true,
cardShadowEnabled: true,
animationEnabled: true,
animationTypeForReplace: "pop",
cardStyle: {
backgroundColor: "#000000",
// backgroundColor: "#ffffff",
},
cardStyleInterpolator: forFade,
// headerTintColor: "#999999",
// headerStyle: {
// backgroundColor: "#000",
// },
},
navigationOptions: {
// tabBarLabel: "Home!",
cardStyle: {
backgroundColor: "#000000",
// backgroundColor: "#ffffff",
},
},
}),
mainFlow: createStackNavigator(
{
Home: HomeScreen,
},
{
// initialRouteName: "Home",
defaultNavigationOptions: {
// title: "Home",
headerShown: false,
presentation: "modal",
detachPreviousScreen: true,
cardShadowEnabled: true,
animationEnabled: true,
animationTypeForReplace: "pop",
cardStyle: {
backgroundColor: "#000000",
// backgroundColor: "#ffffff",
},
cardStyleInterpolator: forFade,
// headerTintColor: "#999999",
// headerStyle: {
// backgroundColor: "#000",
// },
},
navigationOptions: {
// tabBarLabel: "Home!",
cardStyle: {
backgroundColor: "#000000",
// backgroundColor: "#ffffff",
},
},
}
),
// subsctiption navigator
subscriptionFlow: createStackNavigator({
SubscriptionsScreenSeparate: SubscriptionScreen,
},{
defaultNavigationOptions: {
headerShown: false,
presentation: "modal",
detachPreviousScreen: true,
cardShadowEnabled: true,
animationEnabled: true,
animationTypeForReplace: "pop",
cardStyle: {
backgroundColor: "#000000",
},
cardStyleInterpolator: forFade,
},
navigationOptions: {
cardStyle: {
backgroundColor: "#000000",
},
},
}),
});
### Stacktrace (if a crash is involved)
_No response_
|
1.0
|
TypeError: undefined is not an object (evaluating 'gl.getProgramInfoLog(program).trim') - ### Summary
I am working with `expo-bare-workflow`. My app is using `expo-gl` and `three.js` for rendering animations for my app.
While developing, app works smoothly and reflects the changes smoothly, but once I navigate from one navigation stack to another one application crashes with the following error:
```bash
ERROR TypeError: undefined is not an object (evaluating 'gl.getProgramInfoLog(program).trim')
```
it just goes on and on and I need to reload my app to restart it. After it, it works smooth for a while and after navigating from page to page it again crashes with the same error.
Additional Info
Developing for Platform : IOS
EXPO SDK version : "~46.0.9"
expo-gl package version : "~11.4.0"
Working with development build created using `npx eas run:ios` because my app uses some native code
Device used for testing : Iphone 13 (IOS 16)
package.json
```json
{
"main": "index.js",
"scripts": {
"android": "react-native run-android",
"ios": "react-native run-ios",
"web": "expo start --web",
"start": "expo start --dev-client",
"prebuild": "expo prebuild"
},
"dependencies": {
"@expo-google-fonts/cinzel": "^0.2.2",
"@expo-google-fonts/cinzel-decorative": "^0.2.2",
"@react-native-async-storage/async-storage": "~1.17.3",
"@react-navigation/stack": "^6.1.1",
"axios": "^0.25.0",
"expo": "~46.0.9",
"expo-app-loading": "~2.1.0",
"expo-auth-session": "~3.7.1",
"expo-av": "~12.0.4",
"expo-file-system": "~14.1.0",
"expo-gl": "~11.4.0",
"expo-random": "~12.3.0",
"expo-splash-screen": "~0.16.2",
"expo-status-bar": "~1.4.0",
"expo-three": "^6.0.1",
"expo-three-orbit-controls": "^2.0.0",
"expo-updates": "~0.14.5",
"gsap-rn": "^0.0.15",
"jwt-decode": "^3.1.2",
"moment": "^2.29.4",
"react": "18.0.0",
"react-dom": "18.0.0",
"react-native": "0.69.5",
"react-native-elements": "^3.4.2",
"react-native-gesture-handler": "^2.6.1",
"react-native-phone-number-input": "^2.1.0",
"react-native-purchases": "^5.0.2",
"react-native-reanimated": "~2.9.1",
"react-native-safe-area-context": "^4.3.3",
"react-native-screens": "~3.15.0",
"react-native-vector-icons": "^9.0.0",
"react-native-web": "~0.18.7",
"react-native-webview": "11.23.0",
"react-navigation": "^4.4.4",
"react-navigation-stack": "^2.10.4",
"react-navigation-tabs": "^2.11.2",
"three": "^0.127.0"
},
"devDependencies": {
"@babel/core": "^7.18.6"
},
"private": true,
"name": "Sample App",
"version": "1.0.0"
}
```
### Managed or bare workflow?
bare
### What platform(s) does this occur on?
iOS
### Package versions
"@expo-google-fonts/cinzel": "^0.2.2",
"@expo-google-fonts/cinzel-decorative": "^0.2.2",
"@react-native-async-storage/async-storage": "~1.17.3",
"@react-navigation/stack": "^6.1.1",
"axios": "^0.25.0",
"expo": "~46.0.9",
"expo-app-loading": "~2.1.0",
"expo-auth-session": "~3.7.1",
"expo-av": "~12.0.4",
"expo-file-system": "~14.1.0",
"expo-gl": "~11.4.0",
"expo-random": "~12.3.0",
"expo-splash-screen": "~0.16.2",
"expo-status-bar": "~1.4.0",
"expo-three": "^6.0.1",
"expo-three-orbit-controls": "^2.0.0",
"expo-updates": "~0.14.5",
"gsap-rn": "^0.0.15",
"jwt-decode": "^3.1.2",
"moment": "^2.29.4",
"react": "18.0.0",
"react-dom": "18.0.0",
"react-native": "0.69.5",
"react-native-elements": "^3.4.2",
"react-native-gesture-handler": "^2.6.1",
"react-native-phone-number-input": "^2.1.0",
"react-native-purchases": "^5.0.2",
"react-native-reanimated": "~2.9.1",
"react-native-safe-area-context": "^4.3.3",
"react-native-screens": "~3.15.0",
"react-native-vector-icons": "^9.0.0",
"react-native-web": "~0.18.7",
"react-native-webview": "11.23.0",
"react-navigation": "^4.4.4",
"react-navigation-stack": "^2.10.4",
"react-navigation-tabs": "^2.11.2",
"three": "^0.127.0"
### Environment
expo-env-info 1.0.5 environment info:
System:
OS: macOS 12.6
Shell: 5.8.1 - /bin/zsh
Binaries:
Node: 16.14.2 - ~/.nvm/versions/node/v16.14.2/bin/node
npm: 8.5.0 - ~/.nvm/versions/node/v16.14.2/bin/npm
Watchman: 2022.06.27.00 - /usr/local/bin/watchman
Managers:
CocoaPods: 1.11.3 - /usr/local/bin/pod
SDKs:
iOS SDK:
Platforms: DriverKit 21.4, iOS 16.0, macOS 12.3, tvOS 16.0, watchOS 9.0
IDEs:
Android Studio: 2021.2 AI-212.5712.43.2112.8609683
Xcode: 14.0/14A309 - /usr/bin/xcodebuild
npmPackages:
expo: ~46.0.9 => 46.0.10
react: 18.0.0 => 18.0.0
react-dom: 18.0.0 => 18.0.0
react-native: 0.69.5 => 0.69.5
react-native-web: ~0.18.7 => 0.18.9
react-navigation: ^4.4.4 => 4.4.4
npmGlobalPackages:
eas-cli: 2.1.0
expo-cli: 6.0.1
Expo Workflow: bare
### Reproducible demo
// create screens and instantiate expo-gl
const switchNavigator = createSwitchNavigator({
ResolveAuth: ResolveAuthScreen,
loginFlow: createStackNavigator({
SignUp: SignUpScreen,
SignIn: SignInScreen,
VerifyEmailAndPhone: VerifyEmailAndPhoneScreen,
},{
// initialRouteName: "Home",
defaultNavigationOptions: {
// title: "Home",
headerShown: false,
presentation: "modal",
detachPreviousScreen: true,
cardShadowEnabled: true,
animationEnabled: true,
animationTypeForReplace: "pop",
cardStyle: {
backgroundColor: "#000000",
// backgroundColor: "#ffffff",
},
cardStyleInterpolator: forFade,
// headerTintColor: "#999999",
// headerStyle: {
// backgroundColor: "#000",
// },
},
navigationOptions: {
// tabBarLabel: "Home!",
cardStyle: {
backgroundColor: "#000000",
// backgroundColor: "#ffffff",
},
},
}),
mainFlow: createStackNavigator(
{
Home: HomeScreen,
},
{
// initialRouteName: "Home",
defaultNavigationOptions: {
// title: "Home",
headerShown: false,
presentation: "modal",
detachPreviousScreen: true,
cardShadowEnabled: true,
animationEnabled: true,
animationTypeForReplace: "pop",
cardStyle: {
backgroundColor: "#000000",
// backgroundColor: "#ffffff",
},
cardStyleInterpolator: forFade,
// headerTintColor: "#999999",
// headerStyle: {
// backgroundColor: "#000",
// },
},
navigationOptions: {
// tabBarLabel: "Home!",
cardStyle: {
backgroundColor: "#000000",
// backgroundColor: "#ffffff",
},
},
}
),
// subsctiption navigator
subscriptionFlow: createStackNavigator({
SubscriptionsScreenSeparate: SubscriptionScreen,
},{
defaultNavigationOptions: {
headerShown: false,
presentation: "modal",
detachPreviousScreen: true,
cardShadowEnabled: true,
animationEnabled: true,
animationTypeForReplace: "pop",
cardStyle: {
backgroundColor: "#000000",
},
cardStyleInterpolator: forFade,
},
navigationOptions: {
cardStyle: {
backgroundColor: "#000000",
},
},
}),
});
### Stacktrace (if a crash is involved)
_No response_
|
non_test
|
typeerror undefined is not an object evaluating gl getprograminfolog program trim summary i am working with expo bare workflow my app is using expo gl and three js for rendering animations for my app while developing app works smoothly and reflects the changes smoothly but once i navigate from one navigation stack to another one application crashes with the following error bash error typeerror undefined is not an object evaluating gl getprograminfolog program trim it just goes on and on and i need to reload my app to restart it after it it works smooth for a while and after navigating from page to page it again crashes with the same error additional info developing for platform ios expo sdk version expo gl package version working with development build created using npx eas run ios because my app uses some native code device used for testing iphone ios package json json main index js scripts android react native run android ios react native run ios web expo start web start expo start dev client prebuild expo prebuild dependencies expo google fonts cinzel expo google fonts cinzel decorative react native async storage async storage react navigation stack axios expo expo app loading expo auth session expo av expo file system expo gl expo random expo splash screen expo status bar expo three expo three orbit controls expo updates gsap rn jwt decode moment react react dom react native react native elements react native gesture handler react native phone number input react native purchases react native reanimated react native safe area context react native screens react native vector icons react native web react native webview react navigation react navigation stack react navigation tabs three devdependencies babel core private true name sample app version managed or bare workflow bare what platform s does this occur on ios package versions expo google fonts cinzel expo google fonts cinzel decorative react native async storage async storage react navigation stack axios expo expo app loading expo auth session expo av expo file system expo gl expo random expo splash screen expo status bar expo three expo three orbit controls expo updates gsap rn jwt decode moment react react dom react native react native elements react native gesture handler react native phone number input react native purchases react native reanimated react native safe area context react native screens react native vector icons react native web react native webview react navigation react navigation stack react navigation tabs three environment expo env info environment info system os macos shell bin zsh binaries node nvm versions node bin node npm nvm versions node bin npm watchman usr local bin watchman managers cocoapods usr local bin pod sdks ios sdk platforms driverkit ios macos tvos watchos ides android studio ai xcode usr bin xcodebuild npmpackages expo react react dom react native react native web react navigation npmglobalpackages eas cli expo cli expo workflow bare reproducible demo create screens and instantiate expo gl const switchnavigator createswitchnavigator resolveauth resolveauthscreen loginflow createstacknavigator signup signupscreen signin signinscreen verifyemailandphone verifyemailandphonescreen initialroutename home defaultnavigationoptions title home headershown false presentation modal detachpreviousscreen true cardshadowenabled true animationenabled true animationtypeforreplace pop cardstyle backgroundcolor backgroundcolor ffffff cardstyleinterpolator forfade headertintcolor headerstyle backgroundcolor navigationoptions tabbarlabel home cardstyle backgroundcolor backgroundcolor ffffff mainflow createstacknavigator home homescreen initialroutename home defaultnavigationoptions title home headershown false presentation modal detachpreviousscreen true cardshadowenabled true animationenabled true animationtypeforreplace pop cardstyle backgroundcolor backgroundcolor ffffff cardstyleinterpolator forfade headertintcolor headerstyle backgroundcolor navigationoptions tabbarlabel home cardstyle backgroundcolor backgroundcolor ffffff subsctiption navigator subscriptionflow createstacknavigator subscriptionsscreenseparate subscriptionscreen defaultnavigationoptions headershown false presentation modal detachpreviousscreen true cardshadowenabled true animationenabled true animationtypeforreplace pop cardstyle backgroundcolor cardstyleinterpolator forfade navigationoptions cardstyle backgroundcolor stacktrace if a crash is involved no response
| 0
|
512,066
| 14,887,682,972
|
IssuesEvent
|
2021-01-20 18:41:50
|
neo-one-suite/neo-one
|
https://api.github.com/repos/neo-one-suite/neo-one
|
closed
|
Update blockchain for preview4 changes
|
area/node priority/important-soon
|
- [x] (1) investigate this change for calculating verificationCost https://github.com/neo-project/neo/pull/1931
- [x] (2) onPersist / postPersist + trigger changes https://github.com/neo-project/neo/pull/2022
- [x] (3) asynchronous oracle blockchain changes https://github.com/neo-project/neo/pull/1738
- [x] (4) check these changes in blockchain for oracle https://github.com/neo-project/neo/pull/1884
|
1.0
|
Update blockchain for preview4 changes - - [x] (1) investigate this change for calculating verificationCost https://github.com/neo-project/neo/pull/1931
- [x] (2) onPersist / postPersist + trigger changes https://github.com/neo-project/neo/pull/2022
- [x] (3) asynchronous oracle blockchain changes https://github.com/neo-project/neo/pull/1738
- [x] (4) check these changes in blockchain for oracle https://github.com/neo-project/neo/pull/1884
|
non_test
|
update blockchain for changes investigate this change for calculating verificationcost onpersist postpersist trigger changes asynchronous oracle blockchain changes check these changes in blockchain for oracle
| 0
|
268,085
| 23,343,672,357
|
IssuesEvent
|
2022-08-09 15:55:53
|
cockroachdb/cockroach
|
https://api.github.com/repos/cockroachdb/cockroach
|
opened
|
kvserver: add perf testing for long time until store dead + long node downtime
|
C-enhancement C-performance A-kv-distribution A-testing
|
**Describe the problem**
In a support case we saw that foreground app traffic was affected in v21.1 during a rolling restart:
- cluster had "time until store dead" set to 8 hours
- node was down for 20-30mn
- upon restart of node, SQL perf tanked
We're expecting the problem was caused due to KV snapshot hiccups in v21.1, which we assume were resolved since.
The problem here is that **even though this is a supported configuration, we do not have tests that exercise this combination**.
**Expected behavior**
There's a `roachtest` that verifies we have no foreground traffic impact caused by restarting a node that's been stopped for long (many writes, replicas behind) but not considered dead yet.
|
1.0
|
kvserver: add perf testing for long time until store dead + long node downtime - **Describe the problem**
In a support case we saw that foreground app traffic was affected in v21.1 during a rolling restart:
- cluster had "time until store dead" set to 8 hours
- node was down for 20-30mn
- upon restart of node, SQL perf tanked
We're expecting the problem was caused due to KV snapshot hiccups in v21.1, which we assume were resolved since.
The problem here is that **even though this is a supported configuration, we do not have tests that exercise this combination**.
**Expected behavior**
There's a `roachtest` that verifies we have no foreground traffic impact caused by restarting a node that's been stopped for long (many writes, replicas behind) but not considered dead yet.
|
test
|
kvserver add perf testing for long time until store dead long node downtime describe the problem in a support case we saw that foreground app traffic was affected in during a rolling restart cluster had time until store dead set to hours node was down for upon restart of node sql perf tanked we re expecting the problem was caused due to kv snapshot hiccups in which we assume were resolved since the problem here is that even though this is a supported configuration we do not have tests that exercise this combination expected behavior there s a roachtest that verifies we have no foreground traffic impact caused by restarting a node that s been stopped for long many writes replicas behind but not considered dead yet
| 1
|
176,584
| 13,646,617,757
|
IssuesEvent
|
2020-09-25 23:44:13
|
Azure/azure-sdk-for-java
|
https://api.github.com/repos/Azure/azure-sdk-for-java
|
closed
|
Keyvault keys Readme issues
|
Client Docs KeyVault needs-team-triage test-manual-pass
|
1.
Section [Link](https://github.com/Azure/azure-sdk-for-java/tree/master/sdk/keyvault/azure-security-keyvault-keys#prerequisites):

Suggestion:
Add hyperlink for `Java Development Kit(JDK) ` https://docs.microsoft.com/en-us/java/azure/jdk/?view=azure-java-stable
@jongio for notification.
|
1.0
|
Keyvault keys Readme issues - 1.
Section [Link](https://github.com/Azure/azure-sdk-for-java/tree/master/sdk/keyvault/azure-security-keyvault-keys#prerequisites):

Suggestion:
Add hyperlink for `Java Development Kit(JDK) ` https://docs.microsoft.com/en-us/java/azure/jdk/?view=azure-java-stable
@jongio for notification.
|
test
|
keyvault keys readme issues section suggestion add hyperlink for java development kit jdk jongio for notification
| 1
|
289,225
| 24,968,924,398
|
IssuesEvent
|
2022-11-01 22:14:14
|
gradido/gradido
|
https://api.github.com/repos/gradido/gradido
|
closed
|
🚀 [Feature] Implement Fullstack Tests as Github Workflow
|
feature test
|
<!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates -->
## 🚀 Feature
<!-- Give a short summary of the Feature. Use Screenshots if you want. -->
Implement Fullstack Tests as Github Workflow
- [x] Have at least one Fullstack-Test automatically running on each PR
|
1.0
|
🚀 [Feature] Implement Fullstack Tests as Github Workflow - <!-- You can find the latest issue templates here https://github.com/ulfgebhardt/issue-templates -->
## 🚀 Feature
<!-- Give a short summary of the Feature. Use Screenshots if you want. -->
Implement Fullstack Tests as Github Workflow
- [x] Have at least one Fullstack-Test automatically running on each PR
|
test
|
🚀 implement fullstack tests as github workflow 🚀 feature implement fullstack tests as github workflow have at least one fullstack test automatically running on each pr
| 1
|
309,896
| 23,310,770,875
|
IssuesEvent
|
2022-08-08 08:03:50
|
cri-o/cri-o
|
https://api.github.com/repos/cri-o/cri-o
|
closed
|
Rootless cri-o documentation
|
help wanted good first issue lifecycle/stale kind/documentation
|
I want to run rootless kubernetes, crio, crun. For the beginning, I want to run rootfull kubelet and rootless crio+crun. The information for this is very spare.
https://kubernetes.io/docs/tasks/administer-cluster/kubelet-in-userns/ suggests setting the variable `_CRIO_ROOTLESS=1`, but cri-o does not document this variable.
https://github.com/containers/crun/blob/main/crun.1.md#spec-options advises for creating a profile with ` crun spec --rootless -b DIR`, but this is not mentioned on the above page. The same parameters are also accepted by runc.
Please document, how to run cri-o rootless, with some discussion on _CRIO_ROOTLESS=1, what happens if kubelet is rootful, and how to adjust runc/crun to run rootless.
What happens, if cri-o is rootfull and kubelet is rootless?
|
1.0
|
Rootless cri-o documentation - I want to run rootless kubernetes, crio, crun. For the beginning, I want to run rootfull kubelet and rootless crio+crun. The information for this is very spare.
https://kubernetes.io/docs/tasks/administer-cluster/kubelet-in-userns/ suggests setting the variable `_CRIO_ROOTLESS=1`, but cri-o does not document this variable.
https://github.com/containers/crun/blob/main/crun.1.md#spec-options advises for creating a profile with ` crun spec --rootless -b DIR`, but this is not mentioned on the above page. The same parameters are also accepted by runc.
Please document, how to run cri-o rootless, with some discussion on _CRIO_ROOTLESS=1, what happens if kubelet is rootful, and how to adjust runc/crun to run rootless.
What happens, if cri-o is rootfull and kubelet is rootless?
|
non_test
|
rootless cri o documentation i want to run rootless kubernetes crio crun for the beginning i want to run rootfull kubelet and rootless crio crun the information for this is very spare suggests setting the variable crio rootless but cri o does not document this variable advises for creating a profile with crun spec rootless b dir but this is not mentioned on the above page the same parameters are also accepted by runc please document how to run cri o rootless with some discussion on crio rootless what happens if kubelet is rootful and how to adjust runc crun to run rootless what happens if cri o is rootfull and kubelet is rootless
| 0
|
236,390
| 7,749,003,553
|
IssuesEvent
|
2018-05-30 10:00:52
|
Gloirin/m2gTest
|
https://api.github.com/repos/Gloirin/m2gTest
|
closed
|
0003142:
mix of english and german ("denglisch") when sending mail
|
Felamimail low priority
|
**Reported by robert.lischke on 20 Oct 2010 09:05**
**Version:** git master
The message "Transferring Nachricht" is a mix of English and German, it should read "Übertrage Nachricht".
**Steps to reproduce:** Start the German version of Tine 2.0
Start Mail
Create a new message
Click on "Senden"
|
1.0
|
0003142:
mix of english and german ("denglisch") when sending mail - **Reported by robert.lischke on 20 Oct 2010 09:05**
**Version:** git master
The message "Transferring Nachricht" is a mix of English and German, it should read "Übertrage Nachricht".
**Steps to reproduce:** Start the German version of Tine 2.0
Start Mail
Create a new message
Click on "Senden"
|
non_test
|
mix of english and german denglisch when sending mail reported by robert lischke on oct version git master the message quot transferring nachricht quot is a mix of english and german it should read quot übertrage nachricht quot steps to reproduce start the german version of tine start mail create a new message click on quot senden quot
| 0
|
116,030
| 9,818,798,099
|
IssuesEvent
|
2019-06-13 20:13:05
|
magento-engcom/msi
|
https://api.github.com/repos/magento-engcom/msi
|
closed
|
MFTF Order with Configurable product with drop-down attribute on multy stock mode canceled from Admin
|
MFTF (Functional Test Coverage)
|
https://app.hiptest.com/projects/69435/test-plan/folders/432042/scenarios/1446500
|
1.0
|
MFTF Order with Configurable product with drop-down attribute on multy stock mode canceled from Admin - https://app.hiptest.com/projects/69435/test-plan/folders/432042/scenarios/1446500
|
test
|
mftf order with configurable product with drop down attribute on multy stock mode canceled from admin
| 1
|
302,013
| 26,118,061,098
|
IssuesEvent
|
2022-12-28 09:07:14
|
wazuh/wazuh
|
https://api.github.com/repos/wazuh/wazuh
|
closed
|
Release 4.4.0 - Alpha 2 - E2E UX tests - Wazuh Dashboard
|
type/release tracking type/release release test/4.4.0
|
The following issue aims to run the specified test for the current release candidate, report the results, and open new issues for any encountered errors.
## Modules test information
|||
|----------------------------------|------ |
| **Main release candidate issue** | https://github.com/wazuh/wazuh/issues/15746 |
| **Main E2E UX test issue** | https://github.com/wazuh/wazuh/issues/15749 |
| **Version** | 4.4.0 |
| **Release candidate #** | Alpha2 |
| **Tag** | https://github.com/wazuh/wazuh/tree/v4.4.0-alpha2 |
| **Previous modules tests issue** | https://github.com/wazuh/wazuh/issues/15519 |
## Installation procedure
- Wazuh Indexer
- [Step by Step](https://documentation-dev.wazuh.com/v4.4.0-alpha2/installation-guide/wazuh-indexer/step-by-step.html)
- Wazuh Server
- [Step by Step](https://documentation-dev.wazuh.com/v4.4.0-alpha2/installation-guide/wazuh-server/step-by-step.html)
- Wazuh Dashboard
- [Step by Step](https://documentation-dev.wazuh.com/v4.4.0-alpha2/installation-guide/wazuh-dashboard/step-by-step.html)
- Wazuh Agent
- Wazuh WUI one-liner deploy IP GROUP (created beforehand)
## Test description
Best effort to test Wazuh dashboard package. Think critically and at least review/test:
- [x] Wazuh dashboard package specs
- [x] Dashboard package size
- [x] Dashboard package metadata
- [x] Dashboard package digital signature
- [x] Installed files location, size, and permissions
- [x] Installation footprint (check that no unnecessary files are modified/broken in the file system. For example that operating system files do keep their right owner/permissions and that the installer did not break the system.)
- [x] Installed service (check that it works correctly)
- [x] Wazuh Dashboard logs when installed
- [x] Wazuh Dashboard configuration (Try to find anomalies compared with 4.3.10)
- [x] Wazuh Dashboard (included the Wazuh WUI) communication with Wazuh manager API and Wazuh indexer
- [x] Register Wazuh Agents
- [x] Basic browsing through the WUI
- [x] Basic experience with WUI performance.
- [x] Anything else that could have been overlooked when creating the new package
## Test report procedure
All test results must have one of the following statuses:
| | |
|---------------------------------|--------------------------------------------|
| 🟢 | All checks passed. |
| 🔴 | There is at least one failed result. |
| 🟡 | There is at least one expected failure or skipped test and no failures. |
Any failing test must be documented with a new issue, detailing the error and the possible cause.
An extended test results report can be attached as a ZIP or TXT file. Please attach any documents, screenshots, or tables to the issue update with the results. The auditors can use this report to dig deeper into possible failures and details.
## Conclusions
| **Status** | **Test** | **Failure type** | **Notes** |
|----------------|-------------|---------------------|----------------|
| 🟢 | Wazuh dashboard package specs | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365139825 |
| 🟢 | Dashboard package size | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365140251 |
| 🟢 | Dashboard package metadata (description) | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365140444 |
| 🟢 | Dashboard package digital signature | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365140696 |
| 🟢 | Installed files location, size, and permissions | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365142635 |
| 🟢 | Installation footprint | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365126827 |
| 🟢 | Wazuh Dashboard logs when installed | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365126827 |
| 🟢 | Wazuh Dashboard configuration | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365126827|
| 🟢 | Communication between dashboard, indexer & manager | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365195992 |
| 🔴 | Register Wazuh Agents | [The suggested agent installation command is incorrect](https://github.com/wazuh/wazuh-kibana-app/issues/5042) | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365148281|
| 🟢 | Basic browsing through the WUI | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365151250 |
| 🟢 | Basic experience with WUI performance | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365151250 |
| 🟢 | Wazuh server installation | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365126827 |
## Auditors' validation
The definition of done for this one is the validation of the conclusions and the test results from all auditors.
All checks from below must be accepted in order to close this issue.
- [x] @davidjiglesias
- [x] @wazuh/frontend
|
1.0
|
Release 4.4.0 - Alpha 2 - E2E UX tests - Wazuh Dashboard - The following issue aims to run the specified test for the current release candidate, report the results, and open new issues for any encountered errors.
## Modules test information
|||
|----------------------------------|------ |
| **Main release candidate issue** | https://github.com/wazuh/wazuh/issues/15746 |
| **Main E2E UX test issue** | https://github.com/wazuh/wazuh/issues/15749 |
| **Version** | 4.4.0 |
| **Release candidate #** | Alpha2 |
| **Tag** | https://github.com/wazuh/wazuh/tree/v4.4.0-alpha2 |
| **Previous modules tests issue** | https://github.com/wazuh/wazuh/issues/15519 |
## Installation procedure
- Wazuh Indexer
- [Step by Step](https://documentation-dev.wazuh.com/v4.4.0-alpha2/installation-guide/wazuh-indexer/step-by-step.html)
- Wazuh Server
- [Step by Step](https://documentation-dev.wazuh.com/v4.4.0-alpha2/installation-guide/wazuh-server/step-by-step.html)
- Wazuh Dashboard
- [Step by Step](https://documentation-dev.wazuh.com/v4.4.0-alpha2/installation-guide/wazuh-dashboard/step-by-step.html)
- Wazuh Agent
- Wazuh WUI one-liner deploy IP GROUP (created beforehand)
## Test description
Best effort to test Wazuh dashboard package. Think critically and at least review/test:
- [x] Wazuh dashboard package specs
- [x] Dashboard package size
- [x] Dashboard package metadata
- [x] Dashboard package digital signature
- [x] Installed files location, size, and permissions
- [x] Installation footprint (check that no unnecessary files are modified/broken in the file system. For example that operating system files do keep their right owner/permissions and that the installer did not break the system.)
- [x] Installed service (check that it works correctly)
- [x] Wazuh Dashboard logs when installed
- [x] Wazuh Dashboard configuration (Try to find anomalies compared with 4.3.10)
- [x] Wazuh Dashboard (included the Wazuh WUI) communication with Wazuh manager API and Wazuh indexer
- [x] Register Wazuh Agents
- [x] Basic browsing through the WUI
- [x] Basic experience with WUI performance.
- [x] Anything else that could have been overlooked when creating the new package
## Test report procedure
All test results must have one of the following statuses:
| | |
|---------------------------------|--------------------------------------------|
| 🟢 | All checks passed. |
| 🔴 | There is at least one failed result. |
| 🟡 | There is at least one expected failure or skipped test and no failures. |
Any failing test must be documented with a new issue, detailing the error and the possible cause.
An extended test results report can be attached as a ZIP or TXT file. Please attach any documents, screenshots, or tables to the issue update with the results. The auditors can use this report to dig deeper into possible failures and details.
## Conclusions
| **Status** | **Test** | **Failure type** | **Notes** |
|----------------|-------------|---------------------|----------------|
| 🟢 | Wazuh dashboard package specs | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365139825 |
| 🟢 | Dashboard package size | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365140251 |
| 🟢 | Dashboard package metadata (description) | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365140444 |
| 🟢 | Dashboard package digital signature | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365140696 |
| 🟢 | Installed files location, size, and permissions | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365142635 |
| 🟢 | Installation footprint | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365126827 |
| 🟢 | Wazuh Dashboard logs when installed | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365126827 |
| 🟢 | Wazuh Dashboard configuration | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365126827|
| 🟢 | Communication between dashboard, indexer & manager | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365195992 |
| 🔴 | Register Wazuh Agents | [The suggested agent installation command is incorrect](https://github.com/wazuh/wazuh-kibana-app/issues/5042) | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365148281|
| 🟢 | Basic browsing through the WUI | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365151250 |
| 🟢 | Basic experience with WUI performance | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365151250 |
| 🟢 | Wazuh server installation | - | https://github.com/wazuh/wazuh/issues/15767#issuecomment-1365126827 |
## Auditors' validation
The definition of done for this one is the validation of the conclusions and the test results from all auditors.
All checks from below must be accepted in order to close this issue.
- [x] @davidjiglesias
- [x] @wazuh/frontend
|
test
|
release alpha ux tests wazuh dashboard the following issue aims to run the specified test for the current release candidate report the results and open new issues for any encountered errors modules test information main release candidate issue main ux test issue version release candidate tag previous modules tests issue installation procedure wazuh indexer wazuh server wazuh dashboard wazuh agent wazuh wui one liner deploy ip group created beforehand test description best effort to test wazuh dashboard package think critically and at least review test wazuh dashboard package specs dashboard package size dashboard package metadata dashboard package digital signature installed files location size and permissions installation footprint check that no unnecessary files are modified broken in the file system for example that operating system files do keep their right owner permissions and that the installer did not break the system installed service check that it works correctly wazuh dashboard logs when installed wazuh dashboard configuration try to find anomalies compared with wazuh dashboard included the wazuh wui communication with wazuh manager api and wazuh indexer register wazuh agents basic browsing through the wui basic experience with wui performance anything else that could have been overlooked when creating the new package test report procedure all test results must have one of the following statuses 🟢 all checks passed 🔴 there is at least one failed result 🟡 there is at least one expected failure or skipped test and no failures any failing test must be documented with a new issue detailing the error and the possible cause an extended test results report can be attached as a zip or txt file please attach any documents screenshots or tables to the issue update with the results the auditors can use this report to dig deeper into possible failures and details conclusions status test failure type notes 🟢 wazuh dashboard package specs 🟢 dashboard package size 🟢 dashboard package metadata description 🟢 dashboard package digital signature 🟢 installed files location size and permissions 🟢 installation footprint 🟢 wazuh dashboard logs when installed 🟢 wazuh dashboard configuration 🟢 communication between dashboard indexer manager 🔴 register wazuh agents 🟢 basic browsing through the wui 🟢 basic experience with wui performance 🟢 wazuh server installation auditors validation the definition of done for this one is the validation of the conclusions and the test results from all auditors all checks from below must be accepted in order to close this issue davidjiglesias wazuh frontend
| 1
|
205,573
| 15,648,043,989
|
IssuesEvent
|
2021-03-23 04:48:33
|
YCPRadioTelescope/YCP-RT-ControlRoom
|
https://api.github.com/repos/YCPRadioTelescope/YCP-RT-ControlRoom
|
closed
|
Create unit tests for Acceleration in DatabaseOperationsTests
|
Entities Testing good first issue
|
We have database operations for Acceleration, but we don't use acceleration data anywhere in the control room, so...how do we know they really work? We don't, so we must test them.
For this, we want to create two test functions:
- `TestAddAndRetrieveAccelerationData`
- `TestAddAndRetrieveMultipleAccelerationData`
For troubleshooting purposes, we want to verify that a list of acceleration data and just one can be saved.
This implementation will be _very_ similar to the one in #211, so a lot of the logic will translate over to Acceleration fairly seamlessly.
We want to verify that the data we store is identical to the data we receive. A good testing point would be to use the max value of each field, as well as the minimum, to check for edge cases.
|
1.0
|
Create unit tests for Acceleration in DatabaseOperationsTests - We have database operations for Acceleration, but we don't use acceleration data anywhere in the control room, so...how do we know they really work? We don't, so we must test them.
For this, we want to create two test functions:
- `TestAddAndRetrieveAccelerationData`
- `TestAddAndRetrieveMultipleAccelerationData`
For troubleshooting purposes, we want to verify that a list of acceleration data and just one can be saved.
This implementation will be _very_ similar to the one in #211, so a lot of the logic will translate over to Acceleration fairly seamlessly.
We want to verify that the data we store is identical to the data we receive. A good testing point would be to use the max value of each field, as well as the minimum, to check for edge cases.
|
test
|
create unit tests for acceleration in databaseoperationstests we have database operations for acceleration but we don t use acceleration data anywhere in the control room so how do we know they really work we don t so we must test them for this we want to create two test functions testaddandretrieveaccelerationdata testaddandretrievemultipleaccelerationdata for troubleshooting purposes we want to verify that a list of acceleration data and just one can be saved this implementation will be very similar to the one in so a lot of the logic will translate over to acceleration fairly seamlessly we want to verify that the data we store is identical to the data we receive a good testing point would be to use the max value of each field as well as the minimum to check for edge cases
| 1
|
2,302
| 2,716,362,956
|
IssuesEvent
|
2015-04-10 18:37:05
|
swift-nav/libsbp
|
https://api.github.com/repos/swift-nav/libsbp
|
opened
|
Generate C bitmask #defines for bit fields
|
enhancement Message/Code Generation
|
* A single #define for single-bit fields
* Mask and offset #define for multi-bit fields
e.g. for MSG_HEARTBEAT,
```
#define SBP_MSG_HEARTBEAT_FLAGS_EXT_ANT (1<<31)
#define SBP_MSG_HEARTBEAT_FLAGS_NAP_ERR (1<<2)
#define SBP_MSG_HEARTBEAT_FLAGS_IO_ERR (1<<1)
#define SBP_MSG_HEARTBEAT_FLAGS_SYS_ERR (1<<0)
```
Need some way to specify the short name for the bit in the yaml.
|
1.0
|
Generate C bitmask #defines for bit fields - * A single #define for single-bit fields
* Mask and offset #define for multi-bit fields
e.g. for MSG_HEARTBEAT,
```
#define SBP_MSG_HEARTBEAT_FLAGS_EXT_ANT (1<<31)
#define SBP_MSG_HEARTBEAT_FLAGS_NAP_ERR (1<<2)
#define SBP_MSG_HEARTBEAT_FLAGS_IO_ERR (1<<1)
#define SBP_MSG_HEARTBEAT_FLAGS_SYS_ERR (1<<0)
```
Need some way to specify the short name for the bit in the yaml.
|
non_test
|
generate c bitmask defines for bit fields a single define for single bit fields mask and offset define for multi bit fields e g for msg heartbeat define sbp msg heartbeat flags ext ant define sbp msg heartbeat flags nap err define sbp msg heartbeat flags io err define sbp msg heartbeat flags sys err need some way to specify the short name for the bit in the yaml
| 0
|
6,548
| 14,859,905,031
|
IssuesEvent
|
2021-01-18 19:25:00
|
Lens-Platform/Startup
|
https://api.github.com/repos/Lens-Platform/Startup
|
opened
|
Authentication Handler & Authentication Service (Development & Production Deployment)
|
architecture: documentation documentation: core documentation: service domain: backend have: must
|
The primary goal of this feature is to serve as the primary means of authentication within the backend system. Authentication will be comprised of 2 services and through interactions between such services provide api-consumers with JWT tokens.
The below set of tasks are crucial in order to drive this feature to production.
### Service Skeleton & Configurations
- [ ] Build Service Skeleton
- [ ] Abstract configs to environment variables
- [ ] Configure CI/CD pipeline
- [ ] CI/CD pipeline should incorporate unit tests, stress tests, integration tests, chaos tests, and database tests
- [ ] Document CI/CD pipeline steps
- [ ] CI/CD should have docker and Kubernetes workflow through which the above set of tests are ran & ensure deployment of containers, helm files to Kubernetes
- [ ] Provision & properly configure LinkerD sidecar
- [ ] Configure Dependencies (RabbitMQ, Redis, S3 Buckets, ...etc)
### Service Business Logic
- [ ] Implement required business logic
- [ ] Implement accompanying unit and integration tests
### Service Telemetry
- [ ] Ensure the proper sets of metrics are emitted at the service level
- [ ] Ensure the proper sets of logs are emitted at the service level
- [ ] Ensure traces are present and provide the necessary details
- [ ] Ensure Datadog is able to obtain the expected metrics
- [ ] Implement request timeouts & circuit breakers
### Service Security
- [ ] Secure the service at the API level via SSL & TLS
### Deployment
- [ ] Automate deployment & Ensure working feature
### Documentation
- [ ] expand upon [documentation](https://docs.google.com/document/d/1_FIm6m8Vn26DE_sgCjB7j94_xSjMsIfCzEXbJ_BP_3c/edit?ts=6004fae1#heading=h.4d8nyskbzmks) throughout all phases of development
|
1.0
|
Authentication Handler & Authentication Service (Development & Production Deployment) - The primary goal of this feature is to serve as the primary means of authentication within the backend system. Authentication will be comprised of 2 services and through interactions between such services provide api-consumers with JWT tokens.
The below set of tasks are crucial in order to drive this feature to production.
### Service Skeleton & Configurations
- [ ] Build Service Skeleton
- [ ] Abstract configs to environment variables
- [ ] Configure CI/CD pipeline
- [ ] CI/CD pipeline should incorporate unit tests, stress tests, integration tests, chaos tests, and database tests
- [ ] Document CI/CD pipeline steps
- [ ] CI/CD should have docker and Kubernetes workflow through which the above set of tests are ran & ensure deployment of containers, helm files to Kubernetes
- [ ] Provision & properly configure LinkerD sidecar
- [ ] Configure Dependencies (RabbitMQ, Redis, S3 Buckets, ...etc)
### Service Business Logic
- [ ] Implement required business logic
- [ ] Implement accompanying unit and integration tests
### Service Telemetry
- [ ] Ensure the proper sets of metrics are emitted at the service level
- [ ] Ensure the proper sets of logs are emitted at the service level
- [ ] Ensure traces are present and provide the necessary details
- [ ] Ensure Datadog is able to obtain the expected metrics
- [ ] Implement request timeouts & circuit breakers
### Service Security
- [ ] Secure the service at the API level via SSL & TLS
### Deployment
- [ ] Automate deployment & Ensure working feature
### Documentation
- [ ] expand upon [documentation](https://docs.google.com/document/d/1_FIm6m8Vn26DE_sgCjB7j94_xSjMsIfCzEXbJ_BP_3c/edit?ts=6004fae1#heading=h.4d8nyskbzmks) throughout all phases of development
|
non_test
|
authentication handler authentication service development production deployment the primary goal of this feature is to serve as the primary means of authentication within the backend system authentication will be comprised of services and through interactions between such services provide api consumers with jwt tokens the below set of tasks are crucial in order to drive this feature to production service skeleton configurations build service skeleton abstract configs to environment variables configure ci cd pipeline ci cd pipeline should incorporate unit tests stress tests integration tests chaos tests and database tests document ci cd pipeline steps ci cd should have docker and kubernetes workflow through which the above set of tests are ran ensure deployment of containers helm files to kubernetes provision properly configure linkerd sidecar configure dependencies rabbitmq redis buckets etc service business logic implement required business logic implement accompanying unit and integration tests service telemetry ensure the proper sets of metrics are emitted at the service level ensure the proper sets of logs are emitted at the service level ensure traces are present and provide the necessary details ensure datadog is able to obtain the expected metrics implement request timeouts circuit breakers service security secure the service at the api level via ssl tls deployment automate deployment ensure working feature documentation expand upon throughout all phases of development
| 0
|
273,596
| 23,769,203,511
|
IssuesEvent
|
2022-09-01 14:59:49
|
Lightning-AI/lightning
|
https://api.github.com/repos/Lightning-AI/lightning
|
opened
|
Can sharded be resumed with a different number of devices?
|
priority: 2 tests strategy: sharded
|
## 🚀 Feature
Does this work?
```
model = BoringModel()
trainer = Trainer(strategy="ddp_sharded_spawn", fast_dev_run=True, gpus=2)
trainer.fit(model)
checkpoint_path = os.path.join(tmpdir, "model.pt")
trainer.save_checkpoint(checkpoint_path)
model = BoringModel()
trainer = Trainer(strategy="ddp_sharded_spawn", fast_dev_run=True, gpus=1)
trainer.fit(model, ckpt_path=checkpoint_path)
```
### Motivation
We had a legacy test skipped in our CI mentioning that this is unsupported.
### Pitch
We should check, and raise an appropriate error if that's the case.
### Additional context
https://github.com/Lightning-AI/lightning/pull/14476/files/38e10ba837dad423ecaa52f300609083de379e19#r960749044
______________________________________________________________________
#### If you enjoy Lightning, check out our other projects! ⚡
- [**Metrics**](https://github.com/Lightning-AI/metrics): Machine learning metrics for distributed, scalable PyTorch applications.
- [**Lite**](https://pytorch-lightning.readthedocs.io/en/latest/starter/lightning_lite.html): enables pure PyTorch users to scale their existing code on any kind of device while retaining full control over their own loops and optimization logic.
- [**Flash**](https://github.com/Lightning-AI/lightning-flash): The fastest way to get a Lightning baseline! A collection of tasks for fast prototyping, baselining, fine-tuning, and solving problems with deep learning.
- [**Bolts**](https://github.com/Lightning-AI/lightning-bolts): Pretrained SOTA Deep Learning models, callbacks, and more for research and production with PyTorch Lightning and PyTorch.
- [**Lightning Transformers**](https://github.com/Lightning-AI/lightning-transformers): Flexible interface for high-performance research using SOTA Transformers leveraging PyTorch Lightning, Transformers, and Hydra.
|
1.0
|
Can sharded be resumed with a different number of devices? - ## 🚀 Feature
Does this work?
```
model = BoringModel()
trainer = Trainer(strategy="ddp_sharded_spawn", fast_dev_run=True, gpus=2)
trainer.fit(model)
checkpoint_path = os.path.join(tmpdir, "model.pt")
trainer.save_checkpoint(checkpoint_path)
model = BoringModel()
trainer = Trainer(strategy="ddp_sharded_spawn", fast_dev_run=True, gpus=1)
trainer.fit(model, ckpt_path=checkpoint_path)
```
### Motivation
We had a legacy test skipped in our CI mentioning that this is unsupported.
### Pitch
We should check, and raise an appropriate error if that's the case.
### Additional context
https://github.com/Lightning-AI/lightning/pull/14476/files/38e10ba837dad423ecaa52f300609083de379e19#r960749044
______________________________________________________________________
#### If you enjoy Lightning, check out our other projects! ⚡
- [**Metrics**](https://github.com/Lightning-AI/metrics): Machine learning metrics for distributed, scalable PyTorch applications.
- [**Lite**](https://pytorch-lightning.readthedocs.io/en/latest/starter/lightning_lite.html): enables pure PyTorch users to scale their existing code on any kind of device while retaining full control over their own loops and optimization logic.
- [**Flash**](https://github.com/Lightning-AI/lightning-flash): The fastest way to get a Lightning baseline! A collection of tasks for fast prototyping, baselining, fine-tuning, and solving problems with deep learning.
- [**Bolts**](https://github.com/Lightning-AI/lightning-bolts): Pretrained SOTA Deep Learning models, callbacks, and more for research and production with PyTorch Lightning and PyTorch.
- [**Lightning Transformers**](https://github.com/Lightning-AI/lightning-transformers): Flexible interface for high-performance research using SOTA Transformers leveraging PyTorch Lightning, Transformers, and Hydra.
|
test
|
can sharded be resumed with a different number of devices 🚀 feature does this work model boringmodel trainer trainer strategy ddp sharded spawn fast dev run true gpus trainer fit model checkpoint path os path join tmpdir model pt trainer save checkpoint checkpoint path model boringmodel trainer trainer strategy ddp sharded spawn fast dev run true gpus trainer fit model ckpt path checkpoint path motivation we had a legacy test skipped in our ci mentioning that this is unsupported pitch we should check and raise an appropriate error if that s the case additional context if you enjoy lightning check out our other projects ⚡ machine learning metrics for distributed scalable pytorch applications enables pure pytorch users to scale their existing code on any kind of device while retaining full control over their own loops and optimization logic the fastest way to get a lightning baseline a collection of tasks for fast prototyping baselining fine tuning and solving problems with deep learning pretrained sota deep learning models callbacks and more for research and production with pytorch lightning and pytorch flexible interface for high performance research using sota transformers leveraging pytorch lightning transformers and hydra
| 1
|
90,093
| 18,059,167,612
|
IssuesEvent
|
2021-09-20 12:08:30
|
cosmos/cosmos-sdk
|
https://api.github.com/repos/cosmos/cosmos-sdk
|
reopened
|
Refactor client & server Configs
|
C:CLI Type: Code Hygiene pinned
|
<!-- < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < ☺
v ✰ Thanks for opening an issue! ✰
v Before smashing the submit button please review the template.
v Word of caution: poorly thought-out proposals may be rejected
v without deliberation
☺ > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -->
## Summary
Client and server configs are messy (viper vs no-viper, confusing env vars & flags binding...) We should refactor.
## Problem Definition
A quick summary: right now, in the CLI command, we create 2 instances of configs, one client and one server, see `simapp/simd/cmd.NewRootCmd()`. Then, all CLI commands can call either `GetServerContextFromCmd` or `GetClientContextFromCmd` to get the relevant config.
The confusing part comes with the difference between the 2 configs:
#### client.Context
Is a custom struct, has an internal [viper instance](https://github.com/cosmos/cosmos-sdk/blob/410d8edb38c541e5948821060831fcc1ec9399c3/client/context.go#L51). This Viper instance is only used for reading from `~/.simapp/config/client.toml` since #8953. This Viper instance does NOT read from flags, flags are handled separately by `client/cmd.go#Read*CommandFlags`.
#### server.Context
It has its own (separate) [instance of Viper](https://github.com/cosmos/cosmos-sdk/blob/410d8edb38c541e5948821060831fcc1ec9399c3/server/util.go#L41). This viper instance does multiple things: reads from Tendermint `~/.simapp/config/config.toml`, reads from flags & env vars, reads from SDK's `~/.simapp/config/app.toml`, and merge everything together.
#### Global viper
We also have a couple of instances where we use the global viper singleton: [example](https://github.com/cosmos/cosmos-sdk/blob/7568b6680a58a5e974b9126734dd62f95eb43b1b/x/auth/client/cli/tx_multisign.go#L356).
## Proposal
For one, we should remove usage of the global Viper singleton.
One proposal would be to keep client.Context and server.Context separate, each having its own Viper, and each Viper handling all {flags, env, config file} for its own context. We would remove [`client.Context` manually handling flags](https://github.com/cosmos/cosmos-sdk/blob/master/client/cmd.go).
Another idea is to not use Viper at all, maybe for client.Context and server.Context to use (separate instances of?) [koanf](https://github.com/knadh/koanf) that's used in [Atlas](https://github.com/cosmos/atlas).
ref:
- https://github.com/cosmos/cosmos-sdk/issues/8529#issuecomment-790836568 (this issue is step 2)
- https://github.com/cosmos/cosmos-sdk/issues/8132#issuecomment-754661227
____
#### For Admin Use
- [ ] Not duplicate issue
- [ ] Appropriate labels applied
- [ ] Appropriate contributors tagged
- [ ] Contributor assigned/self-assigned
|
1.0
|
Refactor client & server Configs - <!-- < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < ☺
v ✰ Thanks for opening an issue! ✰
v Before smashing the submit button please review the template.
v Word of caution: poorly thought-out proposals may be rejected
v without deliberation
☺ > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -->
## Summary
Client and server configs are messy (viper vs no-viper, confusing env vars & flags binding...) We should refactor.
## Problem Definition
A quick summary: right now, in the CLI command, we create 2 instances of configs, one client and one server, see `simapp/simd/cmd.NewRootCmd()`. Then, all CLI commands can call either `GetServerContextFromCmd` or `GetClientContextFromCmd` to get the relevant config.
The confusing part comes with the difference between the 2 configs:
#### client.Context
Is a custom struct, has an internal [viper instance](https://github.com/cosmos/cosmos-sdk/blob/410d8edb38c541e5948821060831fcc1ec9399c3/client/context.go#L51). This Viper instance is only used for reading from `~/.simapp/config/client.toml` since #8953. This Viper instance does NOT read from flags, flags are handled separately by `client/cmd.go#Read*CommandFlags`.
#### server.Context
It has its own (separate) [instance of Viper](https://github.com/cosmos/cosmos-sdk/blob/410d8edb38c541e5948821060831fcc1ec9399c3/server/util.go#L41). This viper instance does multiple things: reads from Tendermint `~/.simapp/config/config.toml`, reads from flags & env vars, reads from SDK's `~/.simapp/config/app.toml`, and merge everything together.
#### Global viper
We also have a couple of instances where we use the global viper singleton: [example](https://github.com/cosmos/cosmos-sdk/blob/7568b6680a58a5e974b9126734dd62f95eb43b1b/x/auth/client/cli/tx_multisign.go#L356).
## Proposal
For one, we should remove usage of the global Viper singleton.
One proposal would be to keep client.Context and server.Context separate, each having its own Viper, and each Viper handling all {flags, env, config file} for its own context. We would remove [`client.Context` manually handling flags](https://github.com/cosmos/cosmos-sdk/blob/master/client/cmd.go).
Another idea is to not use Viper at all, maybe for client.Context and server.Context to use (separate instances of?) [koanf](https://github.com/knadh/koanf) that's used in [Atlas](https://github.com/cosmos/atlas).
ref:
- https://github.com/cosmos/cosmos-sdk/issues/8529#issuecomment-790836568 (this issue is step 2)
- https://github.com/cosmos/cosmos-sdk/issues/8132#issuecomment-754661227
____
#### For Admin Use
- [ ] Not duplicate issue
- [ ] Appropriate labels applied
- [ ] Appropriate contributors tagged
- [ ] Contributor assigned/self-assigned
|
non_test
|
refactor client server configs ☺ v ✰ thanks for opening an issue ✰ v before smashing the submit button please review the template v word of caution poorly thought out proposals may be rejected v without deliberation ☺ summary client and server configs are messy viper vs no viper confusing env vars flags binding we should refactor problem definition a quick summary right now in the cli command we create instances of configs one client and one server see simapp simd cmd newrootcmd then all cli commands can call either getservercontextfromcmd or getclientcontextfromcmd to get the relevant config the confusing part comes with the difference between the configs client context is a custom struct has an internal this viper instance is only used for reading from simapp config client toml since this viper instance does not read from flags flags are handled separately by client cmd go read commandflags server context it has its own separate this viper instance does multiple things reads from tendermint simapp config config toml reads from flags env vars reads from sdk s simapp config app toml and merge everything together global viper we also have a couple of instances where we use the global viper singleton proposal for one we should remove usage of the global viper singleton one proposal would be to keep client context and server context separate each having its own viper and each viper handling all flags env config file for its own context we would remove another idea is to not use viper at all maybe for client context and server context to use separate instances of that s used in ref this issue is step for admin use not duplicate issue appropriate labels applied appropriate contributors tagged contributor assigned self assigned
| 0
|
336,024
| 30,114,755,851
|
IssuesEvent
|
2023-06-30 10:31:46
|
w7sst/MorseRunner
|
https://api.github.com/repos/w7sst/MorseRunner
|
opened
|
Add support for A1CLUB Weekly Contest (AWT)
|
contest
|
## Contest information
<!-- Describe the contest you would like to see added.
1. Contest name.
2. Please include the URL to the contest rules.
3. Please include the name of required contest call history file name.
N1MMLoggerPlus provides a searchable database at https://n1mmwp.hamdocs.com/mmfiles/categories/callhistory/ of call history files for the major contests. Please verify that this contest has a call history file.
Alternatively, you can attach a custom-built call history file to this Issue. -->
* **Contest Name:** A1CLUB Weekly Contest (AWT)
* **Contest Rules:** https://a1club.org/contest/awt/AWTen.pdf
* **Call History file name:** https://n1mmwp.hamdocs.com/mmfiles/a1awt-udc/
### Unique contest behaviors
<!-- Identify any unique contest behaviors that can add to the realism of the contest simulation.
1. Please point out any special requirements that we should know about when adding this contest to Morse Runner.
2. Describe any information regarding the contest exchange that you find special or out of the ordinary. Normally, contest exchanges are very simple. However some contests (e.g. ARRL Sweepstakes) have a more complex exchange that my have special processing within a contest logging program (e.g. N1MM).
3. Please describe any odd behaviors you have observed while operating this contest that would make this contest simulation more interesting. These could be common errors or things that have tripped up your copy during the contest. For example, the Morse Runner 'LID' option will randomly cause some stations to call you when you are working another station, make mistakes when they send code, copy your messages incorrectly, and send RST other than 599. We will consider whether these behaviors can be added to the simulation. -->
*
### Additional information
<!-- Add any other context or information about the contest request here. -->
*
### Can you help?
Please let us know if you are available to help. (replace '[ ]' with '[x]' to affirm)
- [ ] Yes, I'm available to discuss questions or alternatives regarding the implementation of this contest.
- [ ] Yes, I'd like to review and provide feedback on the proposed solution.
- [ ] Yes, I'm available to help test this contest. Let me know when it is ready for early testing.
<!--
To expedite issue processing please search open and closed issues before submitting a new one.
Please read our Rules of Conduct at this repository's `.github/CODE_OF_CONDUCT.md`
-->
|
1.0
|
Add support for A1CLUB Weekly Contest (AWT) - ## Contest information
<!-- Describe the contest you would like to see added.
1. Contest name.
2. Please include the URL to the contest rules.
3. Please include the name of required contest call history file name.
N1MMLoggerPlus provides a searchable database at https://n1mmwp.hamdocs.com/mmfiles/categories/callhistory/ of call history files for the major contests. Please verify that this contest has a call history file.
Alternatively, you can attach a custom-built call history file to this Issue. -->
* **Contest Name:** A1CLUB Weekly Contest (AWT)
* **Contest Rules:** https://a1club.org/contest/awt/AWTen.pdf
* **Call History file name:** https://n1mmwp.hamdocs.com/mmfiles/a1awt-udc/
### Unique contest behaviors
<!-- Identify any unique contest behaviors that can add to the realism of the contest simulation.
1. Please point out any special requirements that we should know about when adding this contest to Morse Runner.
2. Describe any information regarding the contest exchange that you find special or out of the ordinary. Normally, contest exchanges are very simple. However some contests (e.g. ARRL Sweepstakes) have a more complex exchange that my have special processing within a contest logging program (e.g. N1MM).
3. Please describe any odd behaviors you have observed while operating this contest that would make this contest simulation more interesting. These could be common errors or things that have tripped up your copy during the contest. For example, the Morse Runner 'LID' option will randomly cause some stations to call you when you are working another station, make mistakes when they send code, copy your messages incorrectly, and send RST other than 599. We will consider whether these behaviors can be added to the simulation. -->
*
### Additional information
<!-- Add any other context or information about the contest request here. -->
*
### Can you help?
Please let us know if you are available to help. (replace '[ ]' with '[x]' to affirm)
- [ ] Yes, I'm available to discuss questions or alternatives regarding the implementation of this contest.
- [ ] Yes, I'd like to review and provide feedback on the proposed solution.
- [ ] Yes, I'm available to help test this contest. Let me know when it is ready for early testing.
<!--
To expedite issue processing please search open and closed issues before submitting a new one.
Please read our Rules of Conduct at this repository's `.github/CODE_OF_CONDUCT.md`
-->
|
test
|
add support for weekly contest awt contest information describe the contest you would like to see added contest name please include the url to the contest rules please include the name of required contest call history file name provides a searchable database at of call history files for the major contests please verify that this contest has a call history file alternatively you can attach a custom built call history file to this issue contest name weekly contest awt contest rules call history file name unique contest behaviors identify any unique contest behaviors that can add to the realism of the contest simulation please point out any special requirements that we should know about when adding this contest to morse runner describe any information regarding the contest exchange that you find special or out of the ordinary normally contest exchanges are very simple however some contests e g arrl sweepstakes have a more complex exchange that my have special processing within a contest logging program e g please describe any odd behaviors you have observed while operating this contest that would make this contest simulation more interesting these could be common errors or things that have tripped up your copy during the contest for example the morse runner lid option will randomly cause some stations to call you when you are working another station make mistakes when they send code copy your messages incorrectly and send rst other than we will consider whether these behaviors can be added to the simulation additional information can you help please let us know if you are available to help replace with to affirm yes i m available to discuss questions or alternatives regarding the implementation of this contest yes i d like to review and provide feedback on the proposed solution yes i m available to help test this contest let me know when it is ready for early testing to expedite issue processing please search open and closed issues before submitting a new one please read our rules of conduct at this repository s github code of conduct md
| 1
|
192,983
| 14,634,300,949
|
IssuesEvent
|
2020-12-24 04:59:03
|
github-vet/rangeloop-pointer-findings
|
https://api.github.com/repos/github-vet/rangeloop-pointer-findings
|
closed
|
ovh/cds: engine/api/repositories_manager_test.go; 3 LoC
|
fresh test tiny
|
Found a possible issue in [ovh/cds](https://www.github.com/ovh/cds) at [engine/api/repositories_manager_test.go](https://github.com/ovh/cds/blob/56af877c7efa9dabf3a12147d7ae8e1caa6d69db/engine/api/repositories_manager_test.go#L35-L37)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> function call which takes a reference to srv at line 36 may start a goroutine
[Click here to see the code in its original context.](https://github.com/ovh/cds/blob/56af877c7efa9dabf3a12147d7ae8e1caa6d69db/engine/api/repositories_manager_test.go#L35-L37)
<details>
<summary>Click here to show the 3 line(s) of Go which triggered the analyzer.</summary>
```go
for _, srv := range srvs {
require.NoError(t, services.Delete(db, &srv))
}
```
</details>
<details>
<summary>Click here to show extra information the analyzer produced.</summary>
```
The following paths through the callgraph could lead to a goroutine:
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2) -> (getModels, 1) -> (Reconfigure, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (uploadHandler, 2) -> (RunArtifactUpload, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1) -> (RegisterGerritRepoHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Initialize, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (downloadHandler, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (buildFromSource, 1) -> (execCommand, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (Initialize, 2) -> (Flush, 0)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (downloadHandler, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2)
(Delete, 2) -> (New, 1) -> (init, 0)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (Initialize, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (configSetStartupData, 1) -> (SignJWS, 2) -> (Sign, 2) -> (CompactSerialize, 0) -> (Exec, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (start, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (dequeueTaskExecutions, 1) -> (startTask, 2) -> (startGerritHookTask, 1) -> (RegisterGerritRepoHook, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1) -> (deleteTaskExecutionsRoutine, 1) -> (deleteTask, 2) -> (DeleteTask, 2) -> (RemoveGerritRepoHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runTasks, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1) -> (RegisterGerritRepoHook, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (Initialize, 2) -> (Flush, 0) -> (StandardLogger, 0)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Initialize, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runTasks, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2) -> (getModels, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2) -> (getModels, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (do, 0) -> (process, 2) -> (Debugf, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (RunArtifactUpload, 4)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (RunsSecrets, 2) -> (migrateRuns, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6) -> (UpdateOutgoingHookRunStatus, 7) -> (computeAndUpdateWorkflowRunStatus, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6) -> (UpdateOutgoingHookRunStatus, 7) -> (processNodeOutGoingHook, 10)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (NewHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (NewHook, 3) -> (Flush, 0)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (migrateRuns, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1) -> (deleteTaskExecutionsRoutine, 1) -> (deleteTask, 2) -> (DeleteTask, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runTasks, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1) -> (RegisterGerritRepoHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (BeforeStart, 1) -> (Info, 3) -> (InfoWithFields, 4) -> (UpdateColumns, 3) -> (execCommand, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Start, 1) -> (start, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (getInitTokenFromExistingConfiguration, 1) -> (SignJWS, 2) -> (Sign, 2) -> (CompactSerialize, 0) -> (Exec, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (do, 0) -> (process, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (BeforeStart, 1) -> (Info, 3) -> (InfoWithFields, 4) -> (UpdateColumns, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Start, 1) -> (start, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (buildFromSource, 1) -> (execCommand, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (dequeueTaskExecutions, 1) -> (startTask, 2) -> (startGerritHookTask, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runTasks, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (serviceAPIHeartbeatUpdate, 2) -> (UpsertStatus, 3) -> (InsertCapabilityForModelID, 3) -> (UpdateSecret, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2) -> (getModels, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Exec, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (Create, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (serviceAPIHeartbeat, 1) -> (serviceAPIHeartbeatUpdate, 2) -> (UpsertStatus, 3) -> (InsertCapabilityForModelID, 3) -> (UpdateSecret, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6) -> (UpdateOutgoingHookRunStatus, 7) -> (processNodeOutGoingHook, 10)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (serviceAPIHeartbeat, 1) -> (serviceAPIHeartbeatUpdate, 2) -> (UpsertStatus, 3) -> (InsertCapabilityForModelID, 3) -> (UpdateSecret, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Exec, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (uploadHandler, 2) -> (RunArtifactUpload, 4)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1) -> (deleteTaskExecutionsRoutine, 1) -> (deleteTask, 2) -> (DeleteTask, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1) -> (deleteTaskExecutionsRoutine, 1) -> (deleteTask, 2) -> (DeleteTask, 2) -> (RemoveGerritRepoHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (RunsSecrets, 2) -> (migrateRuns, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2)
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: 56af877c7efa9dabf3a12147d7ae8e1caa6d69db
|
1.0
|
ovh/cds: engine/api/repositories_manager_test.go; 3 LoC -
Found a possible issue in [ovh/cds](https://www.github.com/ovh/cds) at [engine/api/repositories_manager_test.go](https://github.com/ovh/cds/blob/56af877c7efa9dabf3a12147d7ae8e1caa6d69db/engine/api/repositories_manager_test.go#L35-L37)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> function call which takes a reference to srv at line 36 may start a goroutine
[Click here to see the code in its original context.](https://github.com/ovh/cds/blob/56af877c7efa9dabf3a12147d7ae8e1caa6d69db/engine/api/repositories_manager_test.go#L35-L37)
<details>
<summary>Click here to show the 3 line(s) of Go which triggered the analyzer.</summary>
```go
for _, srv := range srvs {
require.NoError(t, services.Delete(db, &srv))
}
```
</details>
<details>
<summary>Click here to show extra information the analyzer produced.</summary>
```
The following paths through the callgraph could lead to a goroutine:
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2) -> (getModels, 1) -> (Reconfigure, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (uploadHandler, 2) -> (RunArtifactUpload, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1) -> (RegisterGerritRepoHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Initialize, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (downloadHandler, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (buildFromSource, 1) -> (execCommand, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (Initialize, 2) -> (Flush, 0)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (downloadHandler, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2)
(Delete, 2) -> (New, 1) -> (init, 0)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (Initialize, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (configSetStartupData, 1) -> (SignJWS, 2) -> (Sign, 2) -> (CompactSerialize, 0) -> (Exec, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (start, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (dequeueTaskExecutions, 1) -> (startTask, 2) -> (startGerritHookTask, 1) -> (RegisterGerritRepoHook, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1) -> (deleteTaskExecutionsRoutine, 1) -> (deleteTask, 2) -> (DeleteTask, 2) -> (RemoveGerritRepoHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runTasks, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1) -> (RegisterGerritRepoHook, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (Initialize, 2) -> (Flush, 0) -> (StandardLogger, 0)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Initialize, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runTasks, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2) -> (getModels, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2) -> (getModels, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (do, 0) -> (process, 2) -> (Debugf, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (RunArtifactUpload, 4)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (RunsSecrets, 2) -> (migrateRuns, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6) -> (UpdateOutgoingHookRunStatus, 7) -> (computeAndUpdateWorkflowRunStatus, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6) -> (UpdateOutgoingHookRunStatus, 7) -> (processNodeOutGoingHook, 10)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (NewHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (NewHook, 3) -> (Flush, 0)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (migrateRuns, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1) -> (deleteTaskExecutionsRoutine, 1) -> (deleteTask, 2) -> (DeleteTask, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runTasks, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1) -> (RegisterGerritRepoHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (BeforeStart, 1) -> (Info, 3) -> (InfoWithFields, 4) -> (UpdateColumns, 3) -> (execCommand, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Start, 1) -> (start, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (getInitTokenFromExistingConfiguration, 1) -> (SignJWS, 2) -> (Sign, 2) -> (CompactSerialize, 0) -> (Exec, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (do, 0) -> (process, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (BeforeStart, 1) -> (Info, 3) -> (InfoWithFields, 4) -> (UpdateColumns, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Start, 1) -> (start, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (buildFromSource, 1) -> (execCommand, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (dequeueTaskExecutions, 1) -> (startTask, 2) -> (startGerritHookTask, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runTasks, 1) -> (startTasks, 1) -> (startTask, 2) -> (startGerritHookTask, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (serviceAPIHeartbeatUpdate, 2) -> (UpsertStatus, 3) -> (InsertCapabilityForModelID, 3) -> (UpdateSecret, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2) -> (getModels, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Exec, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (Create, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (serviceAPIHeartbeat, 1) -> (serviceAPIHeartbeatUpdate, 2) -> (UpsertStatus, 3) -> (InsertCapabilityForModelID, 3) -> (UpdateSecret, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2) -> (updateParentWorkflowRun, 2) -> (UpdateParentWorkflowRun, 6) -> (UpdateOutgoingHookRunStatus, 7) -> (processNodeOutGoingHook, 10)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (start, 4) -> (serve, 4) -> (Serve, 1) -> (int32, 1) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (serviceAPIHeartbeat, 1) -> (serviceAPIHeartbeatUpdate, 2) -> (UpsertStatus, 3) -> (InsertCapabilityForModelID, 3) -> (UpdateSecret, 3)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (Exec, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (uploadHandler, 2) -> (RunArtifactUpload, 4)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1) -> (deleteTaskExecutionsRoutine, 1) -> (deleteTask, 2) -> (DeleteTask, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (CommonServe, 2) -> (Create, 2) -> (workerRegister, 3) -> (Path, 0) -> (ComputeWorkerModelPath, 2)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (runScheduler, 1) -> (deleteTaskExecutionsRoutine, 1) -> (deleteTask, 2) -> (DeleteTask, 2) -> (RemoveGerritRepoHook, 3)
(Delete, 2) -> (New, 1) -> (init, 0) -> (UTC, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (RunsSecrets, 2) -> (migrateRuns, 2)
(Delete, 2) -> (WithStack, 1) -> (New, 1) -> (init, 0) -> (, 0) -> (Distribution, 9) -> (genMarkdownTreeCustom, 4) -> (GenMarkdownCustom, 3) -> (WorkflowRunCraft, 2) -> (workflowRunCraft, 2) -> (UpdateCraftedWorkflowRun, 2)
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: 56af877c7efa9dabf3a12147d7ae8e1caa6d69db
|
test
|
ovh cds engine api repositories manager test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message function call which takes a reference to srv at line may start a goroutine click here to show the line s of go which triggered the analyzer go for srv range srvs require noerror t services delete db srv click here to show extra information the analyzer produced the following paths through the callgraph could lead to a goroutine delete new init utc start serve serve create workerregister path computeworkermodelpath getmodels reconfigure delete new init utc distribution genmarkdowntreecustom genmarkdowncustom delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom commonserve delete new init utc distribution genmarkdowntreecustom genmarkdowncustom commonserve create delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom uploadhandler runartifactupload delete new init utc start serve serve workflowruncraft updatecraftedworkflowrun updateparentworkflowrun updateparentworkflowrun delete new init utc start serve serve starttasks starttask startgerrithooktask registergerritrepohook delete new init utc distribution genmarkdowntreecustom genmarkdowncustom initialize delete new init utc distribution genmarkdowntreecustom genmarkdowncustom downloadhandler delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom buildfromsource execcommand delete withstack new init initialize flush delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom downloadhandler delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom commonserve create delete new init utc distribution genmarkdowntreecustom genmarkdowncustom workflowruncraft workflowruncraft updatecraftedworkflowrun updateparentworkflowrun delete new init delete new init utc delete withstack new init initialize delete new init utc configsetstartupdata signjws sign compactserialize exec delete new init utc start serve serve start delete new init utc start serve serve dequeuetaskexecutions starttask startgerrithooktask registergerritrepohook delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom runscheduler deletetaskexecutionsroutine deletetask deletetask removegerritrepohook delete new init utc distribution genmarkdowntreecustom genmarkdowncustom runtasks starttasks starttask startgerrithooktask registergerritrepohook delete withstack new init delete withstack new init initialize flush standardlogger delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom initialize delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom runtasks starttasks starttask startgerrithooktask delete new init utc start serve serve create workerregister path computeworkermodelpath getmodels delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom commonserve create workerregister path computeworkermodelpath getmodels delete new init utc do process debugf delete new init utc start serve serve runartifactupload delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom runssecrets migrateruns delete new init utc start serve serve workflowruncraft updatecraftedworkflowrun updateparentworkflowrun updateparentworkflowrun updateoutgoinghookrunstatus computeandupdateworkflowrunstatus delete new init utc distribution genmarkdowntreecustom genmarkdowncustom workflowruncraft workflowruncraft updatecraftedworkflowrun updateparentworkflowrun updateparentworkflowrun updateoutgoinghookrunstatus processnodeoutgoinghook delete new init utc newhook delete new init utc newhook flush delete new init utc start serve serve migrateruns delete new init utc start serve serve starttasks starttask startgerrithooktask delete new init utc distribution genmarkdowntreecustom genmarkdowncustom runscheduler deletetaskexecutionsroutine deletetask deletetask delete new init utc start serve serve create workerregister path computeworkermodelpath delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom runtasks starttasks starttask startgerrithooktask registergerritrepohook delete new init utc beforestart info infowithfields updatecolumns execcommand delete new init utc distribution genmarkdowntreecustom genmarkdowncustom start start delete new init utc start serve serve workflowruncraft updatecraftedworkflowrun updateparentworkflowrun delete new init utc distribution genmarkdowntreecustom genmarkdowncustom commonserve delete new init utc getinittokenfromexistingconfiguration signjws sign compactserialize exec delete new init utc distribution genmarkdowntreecustom genmarkdowncustom workflowruncraft workflowruncraft updatecraftedworkflowrun delete new init utc distribution genmarkdowntreecustom genmarkdowncustom workflowruncraft workflowruncraft updatecraftedworkflowrun updateparentworkflowrun updateparentworkflowrun delete new init utc do process delete new init utc start serve delete new init utc beforestart info infowithfields updatecolumns delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom start start delete new init utc distribution genmarkdowntreecustom genmarkdowncustom buildfromsource execcommand delete new init utc start serve serve dequeuetaskexecutions starttask startgerrithooktask delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom workflowruncraft workflowruncraft updatecraftedworkflowrun updateparentworkflowrun updateparentworkflowrun delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom commonserve create workerregister path computeworkermodelpath delete new init utc start serve serve delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom runscheduler delete new init utc distribution genmarkdowntreecustom genmarkdowncustom runscheduler delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom workflowruncraft workflowruncraft updatecraftedworkflowrun updateparentworkflowrun delete new init utc distribution genmarkdowntreecustom genmarkdowncustom runtasks starttasks starttask startgerrithooktask delete new init utc start serve serve serviceapiheartbeatupdate upsertstatus insertcapabilityformodelid updatesecret delete new init utc distribution genmarkdowntreecustom genmarkdowncustom commonserve create workerregister path computeworkermodelpath getmodels delete new init utc start serve serve delete new init utc distribution genmarkdowntreecustom genmarkdowncustom exec delete new init utc start serve serve create delete new init utc distribution genmarkdowntreecustom genmarkdowncustom serviceapiheartbeat serviceapiheartbeatupdate upsertstatus insertcapabilityformodelid updatesecret delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom workflowruncraft workflowruncraft updatecraftedworkflowrun updateparentworkflowrun updateparentworkflowrun updateoutgoinghookrunstatus processnodeoutgoinghook delete withstack new init distribution genmarkdowntreecustom delete new init utc start serve serve workflowruncraft updatecraftedworkflowrun delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom serviceapiheartbeat serviceapiheartbeatupdate upsertstatus insertcapabilityformodelid updatesecret delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom exec delete new init utc distribution genmarkdowntreecustom genmarkdowncustom uploadhandler runartifactupload delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom runscheduler deletetaskexecutionsroutine deletetask deletetask delete new init utc distribution genmarkdowntreecustom delete new init utc distribution genmarkdowntreecustom genmarkdowncustom commonserve create workerregister path computeworkermodelpath delete new init utc distribution genmarkdowntreecustom genmarkdowncustom runscheduler deletetaskexecutionsroutine deletetask deletetask removegerritrepohook delete new init utc distribution genmarkdowntreecustom genmarkdowncustom runssecrets migrateruns delete withstack new init distribution genmarkdowntreecustom genmarkdowncustom workflowruncraft workflowruncraft updatecraftedworkflowrun leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
| 1
|
42,181
| 5,428,258,914
|
IssuesEvent
|
2017-03-03 15:30:05
|
brave/browser-laptop
|
https://api.github.com/repos/brave/browser-laptop
|
opened
|
Linux test run for 0.13.5 RC3
|
OS/linux-distros tests
|
## Installer
1. [ ] Check that installer is close to the size of last release.
2. [ ] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properties, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window.
3. [ ] Check Brave, muon, and libchromiumcontent version in About and make sure it is EXACTLY as expected.
## Last changeset test
1. [ ] Test what is covered by the last changeset (you can find this by clicking on the SHA in about:brave).
## Per release specialty tests
1. [ ] Test closed issues to which `QA/step-specified` were added for the release that are going out.
https://github.com/brave/browser-laptop/issues?utf8=%E2%9C%93&q=is%3Aissue%20label%3AQA%2Fsteps-specified%20is%3Aclosed%20milestone%3A0.13.5%20
- [ ] Unable to create wallet when payments is enabled. ([#7464](https://github.com/brave/browser-laptop/issues/7464))
- [ ] Publisher icon not properly aligned with URL bar. ([#7449](https://github.com/brave/browser-laptop/issues/7449))
- [ ] URL bar becomes inaccessible after enabling payments. ([#7447](https://github.com/brave/browser-laptop/issues/7447))
- [ ] Multiple homepage not working . ([#7442](https://github.com/brave/browser-laptop/issues/7442))
- [ ] Pocket Icon appears to have regressed.. ([#7436](https://github.com/brave/browser-laptop/issues/7436))
- [ ] Add new state for locationInfo. ([#7435](https://github.com/brave/browser-laptop/issues/7435))
- [ ] Hit boxes on allow scripts are too small, create unintended modal closure when missed.. ([#7430](https://github.com/brave/browser-laptop/issues/7430))
- [ ] Include switch is enabled by default for publishers even though auto include is turned off. ([#7429](https://github.com/brave/browser-laptop/issues/7429))
- [ ] Helpful hints section shows scroll bars when screen size is reduced. ([#7404](https://github.com/brave/browser-laptop/issues/7404))
- [ ] Refactor ledgerBackupContent. ([#7382](https://github.com/brave/browser-laptop/issues/7382))
- [ ] Stop page load button doesn't stop loading the page, Esc does. ([#7340](https://github.com/brave/browser-laptop/issues/7340))
- [ ] Refactor about:passwords with Aphrodite. ([#7335](https://github.com/brave/browser-laptop/issues/7335))
- [ ] Printing stopped working. ([#7326](https://github.com/brave/browser-laptop/issues/7326))
- [ ] Refactor about:adblock with Aphrodite. ([#7320](https://github.com/brave/browser-laptop/issues/7320))
- [ ] Apply sync records in batches. ([#7308](https://github.com/brave/browser-laptop/issues/7308))
- [ ] Menu on macOS is unusable during sync. ([#7307](https://github.com/brave/browser-laptop/issues/7307))
- [ ] [Intermittent Issue] Bookmarks added before initial sync are not always copied over to pyramid 1. ([#7305](https://github.com/brave/browser-laptop/issues/7305))
- [ ] Tabs display wrong after exiting HTML5 fullscreen. ([#7301](https://github.com/brave/browser-laptop/issues/7301))
- [ ] Make more links HTTPS. ([#7297](https://github.com/brave/browser-laptop/issues/7297))
- [ ] Bookmark Favicons are not sync. ([#7294](https://github.com/brave/browser-laptop/issues/7294))
- [ ] Bookmark folder tree structure is not properly synced between devices. ([#7293](https://github.com/brave/browser-laptop/issues/7293))
- [ ] Bookmark title is missing in edit bookmark modal after it is synced. ([#7291](https://github.com/brave/browser-laptop/issues/7291))
- [ ] Improve wallet recovery algorithm. ([#7288](https://github.com/brave/browser-laptop/issues/7288))
- [ ] Editing/Deleting bookmark from toolbar causes the active tab to load the deleted bookmark. ([#7284](https://github.com/brave/browser-laptop/issues/7284))
- [ ] Deleting bookmark removes pinned item. ([#7283](https://github.com/brave/browser-laptop/issues/7283))
- [ ] Bookmark toolbar is not shown on adding bookmark when sync is enabled. ([#7282](https://github.com/brave/browser-laptop/issues/7282))
- [ ] Invalid sync code alert needs proper heading. ([#7280](https://github.com/brave/browser-laptop/issues/7280))
- [ ] Right click new tab icon (+) also processes left click event. ([#7267](https://github.com/brave/browser-laptop/issues/7267))
- [ ] Refactor download.js with Aphrodite. ([#7255](https://github.com/brave/browser-laptop/issues/7255))
- [ ] Refactor fullScreenWarning.js with Aphrodite. ([#7250](https://github.com/brave/browser-laptop/issues/7250))
- [ ] Transition missing on download item progress bar. ([#7248](https://github.com/brave/browser-laptop/issues/7248))
- [ ] Split and refactor to Aphrodite HelpfulHints preferences component. ([#7232](https://github.com/brave/browser-laptop/issues/7232))
- [ ] Change bold font in ledger column headers to normal. ([#7225](https://github.com/brave/browser-laptop/issues/7225))
- [ ] Export bookmarks option should be available in kabob menu . ([#7218](https://github.com/brave/browser-laptop/issues/7218))
- [ ] Brave crashed on macOS 10.12.3 via.window.open(). ([#7213](https://github.com/brave/browser-laptop/issues/7213))
- [ ] Refactor about:styles with Aphrodite. ([#7201](https://github.com/brave/browser-laptop/issues/7201))
- [ ] Empty bookmark folder should be exported and imported. ([#7193](https://github.com/brave/browser-laptop/issues/7193))
- [ ] Bookmarked PDF file should have the location of the PDF file itself. ([#7190](https://github.com/brave/browser-laptop/issues/7190))
- [ ] Refactor ReleaseNotes with Aphrodite. ([#7171](https://github.com/brave/browser-laptop/issues/7171))
- [ ] Refactor textarea with Aphrodite into TextArea. ([#7163](https://github.com/brave/browser-laptop/issues/7163))
- [ ] Use v2 ledger-publisher protocol. ([#7141](https://github.com/brave/browser-laptop/issues/7141))
- [ ] Pressing tab on autocomplete suggestion doesn't fill the input field. ([#7132](https://github.com/brave/browser-laptop/issues/7132))
- [ ] SanitizeTemplateItems should remove first item if it is a separator. ([#7109](https://github.com/brave/browser-laptop/issues/7109))
- [ ] Make plugins have its own preferences page. ([#7101](https://github.com/brave/browser-laptop/issues/7101))
- [ ] The Add Funds include button is enabled (or just displayed) on GitHub, Google. ([#7089](https://github.com/brave/browser-laptop/issues/7089))
- [ ] Bookmarks toolbar button text letters are clipped partially. ([#7034](https://github.com/brave/browser-laptop/issues/7034))
- [ ] Rework about:pref page SVG icons and clean up css/dom. ([#6931](https://github.com/brave/browser-laptop/issues/6931))
- [ ] Alert() popups should appear below tabs. ([#6901](https://github.com/brave/browser-laptop/issues/6901))
- [ ] Remove redundant dateline in contributions PDF. ([#6896](https://github.com/brave/browser-laptop/issues/6896))
- [ ] [hackerone] 201102 . ([#6894](https://github.com/brave/browser-laptop/issues/6894))
- [ ] Cursor should be default on find bar (follow-up of #5744). ([#6812](https://github.com/brave/browser-laptop/issues/6812))
- [ ] Change contact info on about:safebrowsing. ([#6781](https://github.com/brave/browser-laptop/issues/6781))
- [ ] Wallet preference page is not refreshing itself when a bitcoin handler is registered. ([#6770](https://github.com/brave/browser-laptop/issues/6770))
- [ ] Domains not displayed on my ledger shows up in payment receipt as payment recipients. ([#6531](https://github.com/brave/browser-laptop/issues/6531))
- [ ] Feature to allow scripts by origin. ([#6431](https://github.com/brave/browser-laptop/issues/6431))
- [ ] Clicking "copy to clipboard" buttons need an animation. ([#6297](https://github.com/brave/browser-laptop/issues/6297))
- [ ] Add windows specific font CSS for URL text and tab text. ([#5624](https://github.com/brave/browser-laptop/issues/5624))
- [ ] Remove data URL PNG from preferences.less. ([#5224](https://github.com/brave/browser-laptop/issues/5224))
- [ ] Hard to exit/close Brave when site spams you with message box / alerts. ([#3794](https://github.com/brave/browser-laptop/issues/3794))
- [ ] Popyard.org pictures does not display properly. ([#3181](https://github.com/brave/browser-laptop/issues/3181))
- [ ] Site specific script unblocking has no effect on URL containing an IP address.. ([#2988](https://github.com/brave/browser-laptop/issues/2988))
- [ ] Prevent js alert spoofing attacks. ([#2755](https://github.com/brave/browser-laptop/issues/2755))
- [ ] Add delete confirmation to downloads bar. ([#2604](https://github.com/brave/browser-laptop/issues/2604))
- [ ] Implement sync. ([#1854](https://github.com/brave/browser-laptop/issues/1854))
## Widevine/Netflix test
1. [ ] Test that you can log into Netflix and start a show.
## Ledger
1. [ ] Create a wallet with a value other than $5 selected in the monthly budget dropdown. Click on the 'Add Funds' button and check that Coinbase transactions are blocked.
2. [ ] Remove all `ledger-*.json` files from `~/Library/Application\ Support/Brave/`. Go to the Payments tab in about:preferences, enable payments, click on `create wallet`. Check that the `add funds` button appears after a wallet is created.
3. [ ] Click on `add funds` and verify that adding funds through Coinbase increases the account balance.
4. [ ] Repeat the step above but add funds by scanning the QR code in a mobile bitcoin app instead of through Coinbase.
5. [ ] Visit nytimes.com for a few seconds and make sure it shows up in the Payments table.
6. [ ] Go to https://jsfiddle.net/LnwtLckc/5/ and click the register button. In the Payments tab, click `add funds`. Verify that the `transfer funds` button is visible and that clicking on `transfer funds` opens a jsfiddle URL in a new tab.
7. [ ] Go to https://jsfiddle.net/LnwtLckc/5/ and click `unregister`. Verify that the `transfer funds` button no longer appears in the `add funds` modal.
8. [ ] Check that disabling payments and enabling them again does not lose state.
## Data
1. [ ] Make sure that data from the last version appears in the new version OK.
2. [ ] Test that the previous version's cookies are preserved in the next version.
## About pages
1. [ ] Test that about:adblock loads
2. [ ] Test that about:autofill loads
3. [ ] Test that about:bookmarks loads bookmarks
4. [ ] Test that about:downloads loads downloads
5. [ ] Test that about:extensions loads
6. [ ] Test that about:history loads history
7. [ ] Test that about:passwords loads
8. [ ] Test that about:styles loads
9. [ ] Test that about:preferences changing a preference takes effect right away
10. [ ] Test that about:preferences language change takes effect on re-start
11. [ ] Test that about.com without the http protocol is loaded from URL bar
## Bookmarks
1. [ ] Test that creating a bookmark on the bookmarks toolbar works
2. [ ] Test that creating a bookmark folder on the bookmarks toolbar works
3. [ ] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works
4. [ ] Test that clicking a bookmark in the toolbar loads the bookmark.
5. [ ] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark.
## Context menus
1. [ ] Make sure context menu items in the URL bar work
2. [ ] Make sure context menu items on content work with no selected text.
3. [ ] Make sure context menu items on content work with selected text.
4. [ ] Make sure context menu items on content work inside an editable control on `about:styles` (input, textarea, or contenteditable).
## Find on page
1. [ ] Ensure search box is shown with shortcut
2. [ ] Test successful find
3. [ ] Test forward and backward find navigation
4. [ ] Test failed find shows 0 results
5. [ ] Test match case find
## Geolocation
1. [ ] Check that https://developer.mozilla.org/en-US/docs/Web/API/Geolocation/Using_geolocation works
## Site hacks
1. [ ] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it
## Downloads
1. [ ] Test downloading a file works and that all actions on the download item works.
## Fullscreen
1. [ ] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc).
2. [ ] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Tabs and Pinning
1. [ ] Test that tabs are pinnable
2. [ ] Test that tabs are unpinnable
3. [ ] Test that tabs are draggable to same tabset
4. [ ] Test that tabs are draggable to alternate tabset
## Zoom
1. [ ] Test zoom in / out shortcut works
2. [ ] Test hamburger menu zooms.
3. [ ] Test zoom saved when you close the browser and restore on a single site.
4. [ ] Test zoom saved when you navigate within a single origin site.
5. [ ] Test that navigating to a different origin resets the zoom
## Bravery settings
1. [ ] Check that HTTPS Everywhere works by loading http://www.apple.com
2. [ ] Turning HTTPS Everywhere off and shields off both disable the redirect to https://www.apple.com
3. [ ] Check that ad replacement works on http://slashdot.org
4. [ ] Check that toggling to blocking and allow ads works as expected.
5. [ ] Test that clicking through a cert error in https://badssl.com/ works.
6. [ ] Test that Safe Browsing works (http://downloadme.org/)
7. [ ] Turning Safe Browsing off and shields off both disable safe browsing for http://downloadme.org/.
8. [ ] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work.
9. [ ] Test that about:preferences default Bravery settings take effect on pages with no site settings.
10. [ ] Test that turning on fingerprinting protection in about:preferences shows 3 fingerprints blocked at https://jsfiddle.net/bkf50r8v/13/. Test that turning it off in the Bravery menu shows 0 fingerprints blocked.
11. [ ] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/9/ when 3rd party cookies are blocked and not blank when 3rd party cookies are unblocked.
12. [ ] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on.
## Content tests
1. [ ] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab.
2. [ ] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows.
3. [ ] Go to http://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown.
4. [ ] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. Then reload https://trac.torproject.org/projects/tor/login and make sure the password is autofilled.
5. [ ] Open a github issue and type some misspellings, make sure they are underlined.
6. [ ] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text.
7. [ ] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded.
8. [ ] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works.
9. [ ] Test that PDF is loaded at http://www.orimi.com/pdf-test.pdf
10. [ ] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run).
## Flash tests
1. [ ] Turn on Flash in about:preferences#security. Test that clicking on 'Install Flash' banner on myspace.com shows a notification to allow Flash and that the banner disappears when 'Allow' is clicked.
2. [ ] Test that flash placeholder appears on http://www.y8.com/games/superfighters
## Autofill tests
1. [ ] Test that autofill works on http://www.roboform.com/filling-test-all-fields
## Session storage
Do not forget to make a backup of your entire `~/Library/Application\ Support/Brave` folder.
1. [ ] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave in Windows`, `./config/brave` in Ubuntu)
2. [ ] Test that windows and tabs restore when closed, including active tab.
3. [ ] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave in Windows`, `./config/brave` in Ubuntu)
## Cookie and Cache
1. [ ] Make a backup of your profile, turn on all clearing in preferences and shut down. Make sure when you bring the browser back up everything is gone that is specified.
2. [ ] Go to http://samy.pl/evercookie/ and set an evercookie. Check that going to prefs, clearing site data and cache, and going back to the Evercookie site does not remember the old evercookie value.
## Update tests
1. [ ] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly.
|
1.0
|
Linux test run for 0.13.5 RC3 - ## Installer
1. [ ] Check that installer is close to the size of last release.
2. [ ] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properties, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window.
3. [ ] Check Brave, muon, and libchromiumcontent version in About and make sure it is EXACTLY as expected.
## Last changeset test
1. [ ] Test what is covered by the last changeset (you can find this by clicking on the SHA in about:brave).
## Per release specialty tests
1. [ ] Test closed issues to which `QA/step-specified` were added for the release that are going out.
https://github.com/brave/browser-laptop/issues?utf8=%E2%9C%93&q=is%3Aissue%20label%3AQA%2Fsteps-specified%20is%3Aclosed%20milestone%3A0.13.5%20
- [ ] Unable to create wallet when payments is enabled. ([#7464](https://github.com/brave/browser-laptop/issues/7464))
- [ ] Publisher icon not properly aligned with URL bar. ([#7449](https://github.com/brave/browser-laptop/issues/7449))
- [ ] URL bar becomes inaccessible after enabling payments. ([#7447](https://github.com/brave/browser-laptop/issues/7447))
- [ ] Multiple homepage not working . ([#7442](https://github.com/brave/browser-laptop/issues/7442))
- [ ] Pocket Icon appears to have regressed.. ([#7436](https://github.com/brave/browser-laptop/issues/7436))
- [ ] Add new state for locationInfo. ([#7435](https://github.com/brave/browser-laptop/issues/7435))
- [ ] Hit boxes on allow scripts are too small, create unintended modal closure when missed.. ([#7430](https://github.com/brave/browser-laptop/issues/7430))
- [ ] Include switch is enabled by default for publishers even though auto include is turned off. ([#7429](https://github.com/brave/browser-laptop/issues/7429))
- [ ] Helpful hints section shows scroll bars when screen size is reduced. ([#7404](https://github.com/brave/browser-laptop/issues/7404))
- [ ] Refactor ledgerBackupContent. ([#7382](https://github.com/brave/browser-laptop/issues/7382))
- [ ] Stop page load button doesn't stop loading the page, Esc does. ([#7340](https://github.com/brave/browser-laptop/issues/7340))
- [ ] Refactor about:passwords with Aphrodite. ([#7335](https://github.com/brave/browser-laptop/issues/7335))
- [ ] Printing stopped working. ([#7326](https://github.com/brave/browser-laptop/issues/7326))
- [ ] Refactor about:adblock with Aphrodite. ([#7320](https://github.com/brave/browser-laptop/issues/7320))
- [ ] Apply sync records in batches. ([#7308](https://github.com/brave/browser-laptop/issues/7308))
- [ ] Menu on macOS is unusable during sync. ([#7307](https://github.com/brave/browser-laptop/issues/7307))
- [ ] [Intermittent Issue] Bookmarks added before initial sync are not always copied over to pyramid 1. ([#7305](https://github.com/brave/browser-laptop/issues/7305))
- [ ] Tabs display wrong after exiting HTML5 fullscreen. ([#7301](https://github.com/brave/browser-laptop/issues/7301))
- [ ] Make more links HTTPS. ([#7297](https://github.com/brave/browser-laptop/issues/7297))
- [ ] Bookmark Favicons are not sync. ([#7294](https://github.com/brave/browser-laptop/issues/7294))
- [ ] Bookmark folder tree structure is not properly synced between devices. ([#7293](https://github.com/brave/browser-laptop/issues/7293))
- [ ] Bookmark title is missing in edit bookmark modal after it is synced. ([#7291](https://github.com/brave/browser-laptop/issues/7291))
- [ ] Improve wallet recovery algorithm. ([#7288](https://github.com/brave/browser-laptop/issues/7288))
- [ ] Editing/Deleting bookmark from toolbar causes the active tab to load the deleted bookmark. ([#7284](https://github.com/brave/browser-laptop/issues/7284))
- [ ] Deleting bookmark removes pinned item. ([#7283](https://github.com/brave/browser-laptop/issues/7283))
- [ ] Bookmark toolbar is not shown on adding bookmark when sync is enabled. ([#7282](https://github.com/brave/browser-laptop/issues/7282))
- [ ] Invalid sync code alert needs proper heading. ([#7280](https://github.com/brave/browser-laptop/issues/7280))
- [ ] Right click new tab icon (+) also processes left click event. ([#7267](https://github.com/brave/browser-laptop/issues/7267))
- [ ] Refactor download.js with Aphrodite. ([#7255](https://github.com/brave/browser-laptop/issues/7255))
- [ ] Refactor fullScreenWarning.js with Aphrodite. ([#7250](https://github.com/brave/browser-laptop/issues/7250))
- [ ] Transition missing on download item progress bar. ([#7248](https://github.com/brave/browser-laptop/issues/7248))
- [ ] Split and refactor to Aphrodite HelpfulHints preferences component. ([#7232](https://github.com/brave/browser-laptop/issues/7232))
- [ ] Change bold font in ledger column headers to normal. ([#7225](https://github.com/brave/browser-laptop/issues/7225))
- [ ] Export bookmarks option should be available in kabob menu . ([#7218](https://github.com/brave/browser-laptop/issues/7218))
- [ ] Brave crashed on macOS 10.12.3 via.window.open(). ([#7213](https://github.com/brave/browser-laptop/issues/7213))
- [ ] Refactor about:styles with Aphrodite. ([#7201](https://github.com/brave/browser-laptop/issues/7201))
- [ ] Empty bookmark folder should be exported and imported. ([#7193](https://github.com/brave/browser-laptop/issues/7193))
- [ ] Bookmarked PDF file should have the location of the PDF file itself. ([#7190](https://github.com/brave/browser-laptop/issues/7190))
- [ ] Refactor ReleaseNotes with Aphrodite. ([#7171](https://github.com/brave/browser-laptop/issues/7171))
- [ ] Refactor textarea with Aphrodite into TextArea. ([#7163](https://github.com/brave/browser-laptop/issues/7163))
- [ ] Use v2 ledger-publisher protocol. ([#7141](https://github.com/brave/browser-laptop/issues/7141))
- [ ] Pressing tab on autocomplete suggestion doesn't fill the input field. ([#7132](https://github.com/brave/browser-laptop/issues/7132))
- [ ] SanitizeTemplateItems should remove first item if it is a separator. ([#7109](https://github.com/brave/browser-laptop/issues/7109))
- [ ] Make plugins have its own preferences page. ([#7101](https://github.com/brave/browser-laptop/issues/7101))
- [ ] The Add Funds include button is enabled (or just displayed) on GitHub, Google. ([#7089](https://github.com/brave/browser-laptop/issues/7089))
- [ ] Bookmarks toolbar button text letters are clipped partially. ([#7034](https://github.com/brave/browser-laptop/issues/7034))
- [ ] Rework about:pref page SVG icons and clean up css/dom. ([#6931](https://github.com/brave/browser-laptop/issues/6931))
- [ ] Alert() popups should appear below tabs. ([#6901](https://github.com/brave/browser-laptop/issues/6901))
- [ ] Remove redundant dateline in contributions PDF. ([#6896](https://github.com/brave/browser-laptop/issues/6896))
- [ ] [hackerone] 201102 . ([#6894](https://github.com/brave/browser-laptop/issues/6894))
- [ ] Cursor should be default on find bar (follow-up of #5744). ([#6812](https://github.com/brave/browser-laptop/issues/6812))
- [ ] Change contact info on about:safebrowsing. ([#6781](https://github.com/brave/browser-laptop/issues/6781))
- [ ] Wallet preference page is not refreshing itself when a bitcoin handler is registered. ([#6770](https://github.com/brave/browser-laptop/issues/6770))
- [ ] Domains not displayed on my ledger shows up in payment receipt as payment recipients. ([#6531](https://github.com/brave/browser-laptop/issues/6531))
- [ ] Feature to allow scripts by origin. ([#6431](https://github.com/brave/browser-laptop/issues/6431))
- [ ] Clicking "copy to clipboard" buttons need an animation. ([#6297](https://github.com/brave/browser-laptop/issues/6297))
- [ ] Add windows specific font CSS for URL text and tab text. ([#5624](https://github.com/brave/browser-laptop/issues/5624))
- [ ] Remove data URL PNG from preferences.less. ([#5224](https://github.com/brave/browser-laptop/issues/5224))
- [ ] Hard to exit/close Brave when site spams you with message box / alerts. ([#3794](https://github.com/brave/browser-laptop/issues/3794))
- [ ] Popyard.org pictures does not display properly. ([#3181](https://github.com/brave/browser-laptop/issues/3181))
- [ ] Site specific script unblocking has no effect on URL containing an IP address.. ([#2988](https://github.com/brave/browser-laptop/issues/2988))
- [ ] Prevent js alert spoofing attacks. ([#2755](https://github.com/brave/browser-laptop/issues/2755))
- [ ] Add delete confirmation to downloads bar. ([#2604](https://github.com/brave/browser-laptop/issues/2604))
- [ ] Implement sync. ([#1854](https://github.com/brave/browser-laptop/issues/1854))
## Widevine/Netflix test
1. [ ] Test that you can log into Netflix and start a show.
## Ledger
1. [ ] Create a wallet with a value other than $5 selected in the monthly budget dropdown. Click on the 'Add Funds' button and check that Coinbase transactions are blocked.
2. [ ] Remove all `ledger-*.json` files from `~/Library/Application\ Support/Brave/`. Go to the Payments tab in about:preferences, enable payments, click on `create wallet`. Check that the `add funds` button appears after a wallet is created.
3. [ ] Click on `add funds` and verify that adding funds through Coinbase increases the account balance.
4. [ ] Repeat the step above but add funds by scanning the QR code in a mobile bitcoin app instead of through Coinbase.
5. [ ] Visit nytimes.com for a few seconds and make sure it shows up in the Payments table.
6. [ ] Go to https://jsfiddle.net/LnwtLckc/5/ and click the register button. In the Payments tab, click `add funds`. Verify that the `transfer funds` button is visible and that clicking on `transfer funds` opens a jsfiddle URL in a new tab.
7. [ ] Go to https://jsfiddle.net/LnwtLckc/5/ and click `unregister`. Verify that the `transfer funds` button no longer appears in the `add funds` modal.
8. [ ] Check that disabling payments and enabling them again does not lose state.
## Data
1. [ ] Make sure that data from the last version appears in the new version OK.
2. [ ] Test that the previous version's cookies are preserved in the next version.
## About pages
1. [ ] Test that about:adblock loads
2. [ ] Test that about:autofill loads
3. [ ] Test that about:bookmarks loads bookmarks
4. [ ] Test that about:downloads loads downloads
5. [ ] Test that about:extensions loads
6. [ ] Test that about:history loads history
7. [ ] Test that about:passwords loads
8. [ ] Test that about:styles loads
9. [ ] Test that about:preferences changing a preference takes effect right away
10. [ ] Test that about:preferences language change takes effect on re-start
11. [ ] Test that about.com without the http protocol is loaded from URL bar
## Bookmarks
1. [ ] Test that creating a bookmark on the bookmarks toolbar works
2. [ ] Test that creating a bookmark folder on the bookmarks toolbar works
3. [ ] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works
4. [ ] Test that clicking a bookmark in the toolbar loads the bookmark.
5. [ ] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark.
## Context menus
1. [ ] Make sure context menu items in the URL bar work
2. [ ] Make sure context menu items on content work with no selected text.
3. [ ] Make sure context menu items on content work with selected text.
4. [ ] Make sure context menu items on content work inside an editable control on `about:styles` (input, textarea, or contenteditable).
## Find on page
1. [ ] Ensure search box is shown with shortcut
2. [ ] Test successful find
3. [ ] Test forward and backward find navigation
4. [ ] Test failed find shows 0 results
5. [ ] Test match case find
## Geolocation
1. [ ] Check that https://developer.mozilla.org/en-US/docs/Web/API/Geolocation/Using_geolocation works
## Site hacks
1. [ ] Test https://www.twitch.tv/adobe sub-page loads a video and you can play it
## Downloads
1. [ ] Test downloading a file works and that all actions on the download item works.
## Fullscreen
1. [ ] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc).
2. [ ] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Tabs and Pinning
1. [ ] Test that tabs are pinnable
2. [ ] Test that tabs are unpinnable
3. [ ] Test that tabs are draggable to same tabset
4. [ ] Test that tabs are draggable to alternate tabset
## Zoom
1. [ ] Test zoom in / out shortcut works
2. [ ] Test hamburger menu zooms.
3. [ ] Test zoom saved when you close the browser and restore on a single site.
4. [ ] Test zoom saved when you navigate within a single origin site.
5. [ ] Test that navigating to a different origin resets the zoom
## Bravery settings
1. [ ] Check that HTTPS Everywhere works by loading http://www.apple.com
2. [ ] Turning HTTPS Everywhere off and shields off both disable the redirect to https://www.apple.com
3. [ ] Check that ad replacement works on http://slashdot.org
4. [ ] Check that toggling to blocking and allow ads works as expected.
5. [ ] Test that clicking through a cert error in https://badssl.com/ works.
6. [ ] Test that Safe Browsing works (http://downloadme.org/)
7. [ ] Turning Safe Browsing off and shields off both disable safe browsing for http://downloadme.org/.
8. [ ] Visit https://brianbondy.com/ and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work.
9. [ ] Test that about:preferences default Bravery settings take effect on pages with no site settings.
10. [ ] Test that turning on fingerprinting protection in about:preferences shows 3 fingerprints blocked at https://jsfiddle.net/bkf50r8v/13/. Test that turning it off in the Bravery menu shows 0 fingerprints blocked.
11. [ ] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/9/ when 3rd party cookies are blocked and not blank when 3rd party cookies are unblocked.
12. [ ] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on.
## Content tests
1. [ ] Go to https://brianbondy.com/ and click on the twitter icon on the top right. Test that context menus work in the new twitter tab.
2. [ ] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows.
3. [ ] Go to http://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown.
4. [ ] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`. Then reload https://trac.torproject.org/projects/tor/login and make sure the password is autofilled.
5. [ ] Open a github issue and type some misspellings, make sure they are underlined.
6. [ ] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text.
7. [ ] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded.
8. [ ] Open an email on http://mail.google.com/ or inbox.google.com and click on a link. Make sure it works.
9. [ ] Test that PDF is loaded at http://www.orimi.com/pdf-test.pdf
10. [ ] Test that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run).
## Flash tests
1. [ ] Turn on Flash in about:preferences#security. Test that clicking on 'Install Flash' banner on myspace.com shows a notification to allow Flash and that the banner disappears when 'Allow' is clicked.
2. [ ] Test that flash placeholder appears on http://www.y8.com/games/superfighters
## Autofill tests
1. [ ] Test that autofill works on http://www.roboform.com/filling-test-all-fields
## Session storage
Do not forget to make a backup of your entire `~/Library/Application\ Support/Brave` folder.
1. [ ] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave in Windows`, `./config/brave` in Ubuntu)
2. [ ] Test that windows and tabs restore when closed, including active tab.
3. [ ] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave in Windows`, `./config/brave` in Ubuntu)
## Cookie and Cache
1. [ ] Make a backup of your profile, turn on all clearing in preferences and shut down. Make sure when you bring the browser back up everything is gone that is specified.
2. [ ] Go to http://samy.pl/evercookie/ and set an evercookie. Check that going to prefs, clearing site data and cache, and going back to the Evercookie site does not remember the old evercookie value.
## Update tests
1. [ ] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly.
|
test
|
linux test run for installer check that installer is close to the size of last release check signature if os run spctl assess verbose applications brave app and make sure it returns accepted if windows right click on the installer exe and go to properties go to the digital signatures tab and double click on the signature make sure it says the digital signature is ok in the popup window check brave muon and libchromiumcontent version in about and make sure it is exactly as expected last changeset test test what is covered by the last changeset you can find this by clicking on the sha in about brave per release specialty tests test closed issues to which qa step specified were added for the release that are going out unable to create wallet when payments is enabled publisher icon not properly aligned with url bar url bar becomes inaccessible after enabling payments multiple homepage not working pocket icon appears to have regressed add new state for locationinfo hit boxes on allow scripts are too small create unintended modal closure when missed include switch is enabled by default for publishers even though auto include is turned off helpful hints section shows scroll bars when screen size is reduced refactor ledgerbackupcontent stop page load button doesn t stop loading the page esc does refactor about passwords with aphrodite printing stopped working refactor about adblock with aphrodite apply sync records in batches menu on macos is unusable during sync bookmarks added before initial sync are not always copied over to pyramid tabs display wrong after exiting fullscreen make more links https bookmark favicons are not sync bookmark folder tree structure is not properly synced between devices bookmark title is missing in edit bookmark modal after it is synced improve wallet recovery algorithm editing deleting bookmark from toolbar causes the active tab to load the deleted bookmark deleting bookmark removes pinned item bookmark toolbar is not shown on adding bookmark when sync is enabled invalid sync code alert needs proper heading right click new tab icon also processes left click event refactor download js with aphrodite refactor fullscreenwarning js with aphrodite transition missing on download item progress bar split and refactor to aphrodite helpfulhints preferences component change bold font in ledger column headers to normal export bookmarks option should be available in kabob menu brave crashed on macos via window open refactor about styles with aphrodite empty bookmark folder should be exported and imported bookmarked pdf file should have the location of the pdf file itself refactor releasenotes with aphrodite refactor textarea with aphrodite into textarea use ledger publisher protocol pressing tab on autocomplete suggestion doesn t fill the input field sanitizetemplateitems should remove first item if it is a separator make plugins have its own preferences page the add funds include button is enabled or just displayed on github google bookmarks toolbar button text letters are clipped partially rework about pref page svg icons and clean up css dom alert popups should appear below tabs remove redundant dateline in contributions pdf cursor should be default on find bar follow up of change contact info on about safebrowsing wallet preference page is not refreshing itself when a bitcoin handler is registered domains not displayed on my ledger shows up in payment receipt as payment recipients feature to allow scripts by origin clicking copy to clipboard buttons need an animation add windows specific font css for url text and tab text remove data url png from preferences less hard to exit close brave when site spams you with message box alerts popyard org pictures does not display properly site specific script unblocking has no effect on url containing an ip address prevent js alert spoofing attacks add delete confirmation to downloads bar implement sync widevine netflix test test that you can log into netflix and start a show ledger create a wallet with a value other than selected in the monthly budget dropdown click on the add funds button and check that coinbase transactions are blocked remove all ledger json files from library application support brave go to the payments tab in about preferences enable payments click on create wallet check that the add funds button appears after a wallet is created click on add funds and verify that adding funds through coinbase increases the account balance repeat the step above but add funds by scanning the qr code in a mobile bitcoin app instead of through coinbase visit nytimes com for a few seconds and make sure it shows up in the payments table go to and click the register button in the payments tab click add funds verify that the transfer funds button is visible and that clicking on transfer funds opens a jsfiddle url in a new tab go to and click unregister verify that the transfer funds button no longer appears in the add funds modal check that disabling payments and enabling them again does not lose state data make sure that data from the last version appears in the new version ok test that the previous version s cookies are preserved in the next version about pages test that about adblock loads test that about autofill loads test that about bookmarks loads bookmarks test that about downloads loads downloads test that about extensions loads test that about history loads history test that about passwords loads test that about styles loads test that about preferences changing a preference takes effect right away test that about preferences language change takes effect on re start test that about com without the http protocol is loaded from url bar bookmarks test that creating a bookmark on the bookmarks toolbar works test that creating a bookmark folder on the bookmarks toolbar works test that moving a bookmark into a folder by drag and drop on the bookmarks folder works test that clicking a bookmark in the toolbar loads the bookmark test that clicking a bookmark in a bookmark toolbar folder loads the bookmark context menus make sure context menu items in the url bar work make sure context menu items on content work with no selected text make sure context menu items on content work with selected text make sure context menu items on content work inside an editable control on about styles input textarea or contenteditable find on page ensure search box is shown with shortcut test successful find test forward and backward find navigation test failed find shows results test match case find geolocation check that works site hacks test sub page loads a video and you can play it downloads test downloading a file works and that all actions on the download item works fullscreen test that entering full screen window works view toggle full screen and exit back not esc test that entering full screen works and esc to go back youtube com tabs and pinning test that tabs are pinnable test that tabs are unpinnable test that tabs are draggable to same tabset test that tabs are draggable to alternate tabset zoom test zoom in out shortcut works test hamburger menu zooms test zoom saved when you close the browser and restore on a single site test zoom saved when you navigate within a single origin site test that navigating to a different origin resets the zoom bravery settings check that https everywhere works by loading turning https everywhere off and shields off both disable the redirect to check that ad replacement works on check that toggling to blocking and allow ads works as expected test that clicking through a cert error in works test that safe browsing works turning safe browsing off and shields off both disable safe browsing for visit and then turn on script blocking nothing should load allow it from the script blocking ui in the url bar and it should work test that about preferences default bravery settings take effect on pages with no site settings test that turning on fingerprinting protection in about preferences shows fingerprints blocked at test that turning it off in the bravery menu shows fingerprints blocked test that party storage results are blank at when party cookies are blocked and not blank when party cookies are unblocked test that audio fingerprint is blocked at when fingerprinting protection is on content tests go to and click on the twitter icon on the top right test that context menus work in the new twitter tab load twitter and click on a tweet so the popup div shows click to dismiss and repeat with another div make sure it shows go to and test that clicking on show pops up a notification asking for permission make sure that clicking deny leads to no notifications being shown go to and make sure that the password can be saved make sure the saved password shows up in about passwords then reload and make sure the password is autofilled open a github issue and type some misspellings make sure they are underlined make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text make sure that command click control click on windows control click on ubuntu on a link opens a new tab but does not switch to it click on it and make sure it is already loaded open an email on or inbox google com and click on a link make sure it works test that pdf is loaded at test that shows up as grey not red no mixed content scripts are run flash tests turn on flash in about preferences security test that clicking on install flash banner on myspace com shows a notification to allow flash and that the banner disappears when allow is clicked test that flash placeholder appears on autofill tests test that autofill works on session storage do not forget to make a backup of your entire library application support brave folder temporarily move away your library application support brave session store and test that clean session storage works appdata brave in windows config brave in ubuntu test that windows and tabs restore when closed including active tab move away your entire library application support brave folder appdata brave in windows config brave in ubuntu cookie and cache make a backup of your profile turn on all clearing in preferences and shut down make sure when you bring the browser back up everything is gone that is specified go to and set an evercookie check that going to prefs clearing site data and cache and going back to the evercookie site does not remember the old evercookie value update tests test that updating using brave update version env variable works correctly
| 1
|
314,666
| 27,016,508,640
|
IssuesEvent
|
2023-02-10 19:56:41
|
hashicorp/terraform-provider-google
|
https://api.github.com/repos/hashicorp/terraform-provider-google
|
closed
|
Failing test(s): TestAccDNSManagedZone_dnsManagedZoneQuickstartExample
|
size/s priority/1 test failure crosslinked
|
### Affected Resource(s)
<!--- Please list the affected resources and data sources. --->
* google_dns_managed_zone
<!--- This is a template for reporting test failures on nightly builds. It should only be used by core contributors who have access to our CI/CD results. --->
<!-- i.e. "Consistently since X date" or "X% failure in MONTH" -->
Failure rate: 100% since 2022-09-24
<!-- List all impacted tests for searchability. The title of the issue can instead list one or more groups of tests, or describe the overall root cause. -->
Impacted tests:
- TestAccDNSManagedZone_dnsManagedZoneQuickstartExample
<!-- Link to the nightly build(s), ideally with one impacted test opened -->
Nightly builds:
- https://ci-oss.hashicorp.engineering/buildConfiguration/GoogleCloud_ProviderGoogleCloudGoogleProject/348525?buildTab=tests&expandedTest=-3604989738191621873
<!-- The error message that displays in the tests tab, for reference -->
Message:
```
Error: Error creating ManagedZone: googleapi: Error 400: Please verify ownership of the 'googlecloudexample.com.' domain (or a parent) at http://www.google.com/webmasters/verification/ and try again
```
Similar issue: https://github.com/hashicorp/terraform-provider-google/issues/12528
Previously this was failing with this error sporadically - possibly this was a new verification that rolled out?
|
1.0
|
Failing test(s): TestAccDNSManagedZone_dnsManagedZoneQuickstartExample - ### Affected Resource(s)
<!--- Please list the affected resources and data sources. --->
* google_dns_managed_zone
<!--- This is a template for reporting test failures on nightly builds. It should only be used by core contributors who have access to our CI/CD results. --->
<!-- i.e. "Consistently since X date" or "X% failure in MONTH" -->
Failure rate: 100% since 2022-09-24
<!-- List all impacted tests for searchability. The title of the issue can instead list one or more groups of tests, or describe the overall root cause. -->
Impacted tests:
- TestAccDNSManagedZone_dnsManagedZoneQuickstartExample
<!-- Link to the nightly build(s), ideally with one impacted test opened -->
Nightly builds:
- https://ci-oss.hashicorp.engineering/buildConfiguration/GoogleCloud_ProviderGoogleCloudGoogleProject/348525?buildTab=tests&expandedTest=-3604989738191621873
<!-- The error message that displays in the tests tab, for reference -->
Message:
```
Error: Error creating ManagedZone: googleapi: Error 400: Please verify ownership of the 'googlecloudexample.com.' domain (or a parent) at http://www.google.com/webmasters/verification/ and try again
```
Similar issue: https://github.com/hashicorp/terraform-provider-google/issues/12528
Previously this was failing with this error sporadically - possibly this was a new verification that rolled out?
|
test
|
failing test s testaccdnsmanagedzone dnsmanagedzonequickstartexample affected resource s google dns managed zone failure rate since impacted tests testaccdnsmanagedzone dnsmanagedzonequickstartexample nightly builds message error error creating managedzone googleapi error please verify ownership of the googlecloudexample com domain or a parent at and try again similar issue previously this was failing with this error sporadically possibly this was a new verification that rolled out
| 1
|
45,745
| 5,956,601,552
|
IssuesEvent
|
2017-05-28 18:20:25
|
ZeroK-RTS/Zero-K
|
https://api.github.com/repos/ZeroK-RTS/Zero-K
|
closed
|
Lagmonitor with AI ally: income distributed but units not
|
design decision
|
When you are the sole human player and have AI allies, and go AFK, your income gets distributed to the bots but your units are not.
I think income should stay in this case.
|
1.0
|
Lagmonitor with AI ally: income distributed but units not - When you are the sole human player and have AI allies, and go AFK, your income gets distributed to the bots but your units are not.
I think income should stay in this case.
|
non_test
|
lagmonitor with ai ally income distributed but units not when you are the sole human player and have ai allies and go afk your income gets distributed to the bots but your units are not i think income should stay in this case
| 0
|
539,831
| 15,795,599,345
|
IssuesEvent
|
2021-04-02 13:26:50
|
wso2/product-apim
|
https://api.github.com/repos/wso2/product-apim
|
closed
|
Issue in DB2 scripts
|
API-M 4.0.0 Priority/High Type/Bug
|
### Description:
Error thrown in following tables when running the DB2 scripts:
- **IDN_USER_FUNCTIONALITY_MAPPING**
```sql
CREATE TABLE IDN_USER_FUNCTIONALITY_MAPPING (
ID VARCHAR(255) NOT NULL,
USER_ID VARCHAR(255) NOT NULL,
TENANT_ID INTEGER NOT NULL,
FUNCTIONALITY_ID VARCHAR(255) NOT NULL,
IS_FUNCTIONALITY_LOCKED BOOLEAN NOT NULL,
FUNCTIONALITY_UNLOCK_TIME BIGINT NOT NULL,
FUNCTIONALITY_LOCK_REASON VARCHAR(1023),
FUNCTIONALITY_LOCK_REASON_CODE VARCHAR(255),
PRIMARY KEY (ID),
CONSTRAINT IDN_USER_FUNCTIONALITY_MAPPING_CONSTRAINT UNIQUE (USER_ID, TENANT_ID, FUNCTIONALITY_ID)
)
```
Error:
```
Error occurred during SQL script execution
Reason:
SQL Error [428H2]: A "BOOLEAN" data type is not supported in the context where it is being used.. SQLCODE=-20441, SQLSTATE=428H2, DRIVER=3.59.81
```
- **IDN_CORS_ORIGIN**
```sql
CREATE TABLE IF NOT EXISTS IDN_CORS_ORIGIN (
ID INTEGER NOT NULL,
TENANT_ID INTEGER NOT NULL,
ORIGIN VARCHAR(2048) NOT NULL,
UUID CHAR(36) NOT NULL,
PRIMARY KEY (ID),
UNIQUE (TENANT_ID, ORIGIN),
UNIQUE (UUID)
) INDEX IN TS32K
```
Error:
```
Error occurred during SQL script execution
Reason:
SQL Error [42601]: An unexpected token "CREATE TABLE IF NOT EXISTS IDN_CORS_ORIGIN" was found following "BEGIN-OF-STATEMENT". Expected tokens may include: "<values>".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
```
- **AM_GW_API_DEPLOYMENTS**
```sql
CREATE TABLE IF NOT EXISTS AM_GW_API_DEPLOYMENTS (
API_ID VARCHAR(255) NOT NULL,
REVISION_ID VARCHAR(255) NOT NULL,
LABEL VARCHAR(255) NOT NULL,
VHOST VARCHAR(255) NULL,
PRIMARY KEY (REVISION_ID, API_ID,LABEL),
FOREIGN KEY (API_ID) REFERENCES AM_GW_PUBLISHED_API_DETAILS(API_ID) ON UPDATE CASCADE ON DELETE NO ACTION
)
```
Error:
```
SQL Error [42601]: An unexpected token "NOT EXISTS AM_GW_API_DEPLOYMENTS" was found following "CREATE TABLE IF ". Expected tokens may include: "<space>".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
An unexpected token "NOT EXISTS AM_GW_API_DEPLOYMENTS" was found following "CREATE TABLE IF ". Expected tokens may include: "<space>".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
An unexpected token "NOT EXISTS AM_GW_API_DEPLOYMENTS" was found following "CREATE TABLE IF ". Expected tokens may include: "<space>".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
```
- **AM_DEPLOYMENT_REVISION_MAPPING**
```sql
CREATE TABLE AM_DEPLOYMENT_REVISION_MAPPING (
NAME VARCHAR(255) NOT NULL,
VHOST VARCHAR(255) NULL,
REVISION_UUID VARCHAR(255) NOT NULL,
DISPLAY_ON_DEVPORTAL BOOLEAN DEFAULT 0,
DEPLOYED_TIME TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
PRIMARY KEY (NAME, REVISION_UUID),
FOREIGN KEY (REVISION_UUID) REFERENCES AM_REVISION(REVISION_UUID) ON UPDATE CASCADE ON DELETE CASCADE)
```
Error:
```
SQL Error [428H2]: A "BOOLEAN" data type is not supported in the context where it is being used.. SQLCODE=-20441, SQLSTATE=428H2, DRIVER=3.59.81
A "BOOLEAN" data type is not supported in the context where it is being used.. SQLCODE=-20441, SQLSTATE=428H2, DRIVER=3.59.81
A "BOOLEAN" data type is not supported in the context where it is being used.. SQLCODE=-20441, SQLSTATE=428H2, DRIVER=3.59.81
```
- **AM_GATEWAY_ENVIRONMENT**
```sql
CREATE TABLE AM_GATEWAY_ENVIRONMENT (
ID INTEGER NOT NULL GENERATED ALWAYS AS IDENTITY (START WITH 1 INCREMENT BY 1),
UUID VARCHAR(45) NOT NULL,
NAME VARCHAR(255) NOT NULL,
TENANT_DOMAIN VARCHAR(255),
DISPLAY_NAME VARCHAR(255) NULL,
DESCRIPTION VARCHAR(1023) NULL,
UNIQUE (NAME, TENANT_DOMAIN),
UNIQUE (UUID),
PRIMARY KEY (ID))
```
Error:
```
QL Error [42831]: The column named "TENANT_DOMAIN" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
The column named "TENANT_DOMAIN" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
The column named "TENANT_DOMAIN" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
```
- **AM_GW_VHOST**
```sql
CREATE TABLE AM_GW_VHOST (
GATEWAY_ENV_ID INTEGER,
HOST VARCHAR(255) NOT NULL,
HTTP_CONTEXT VARCHAR(255) NULL,
HTTP_PORT VARCHAR(5) NOT NULL,
HTTPS_PORT VARCHAR(5) NOT NULL,
WS_PORT VARCHAR(5) NOT NULL,
WSS_PORT VARCHAR(5) NOT NULL,
FOREIGN KEY (GATEWAY_ENV_ID) REFERENCES AM_GATEWAY_ENVIRONMENT(ID) ON UPDATE CASCADE ON DELETE CASCADE,
PRIMARY KEY (GATEWAY_ENV_ID, HOST))
```
Error:
```
SQL Error [42704]: "DB2INST1.AM_GATEWAY_ENVIRONMENT" is an undefined name.. SQLCODE=-204, SQLSTATE=42704, DRIVER=3.59.81
"DB2INST1.AM_GATEWAY_ENVIRONMENT" is an undefined name.. SQLCODE=-204, SQLSTATE=42704, DRIVER=3.59.81
"DB2INST1.AM_GATEWAY_ENVIRONMENT" is an undefined name.. SQLCODE=-204, SQLSTATE=42704, DRIVER=3.59.81
```
- **AM_WEBHOOKS_SUBSCRIPTION**
```sql
CREATE TABLE AM_WEBHOOKS_SUBSCRIPTION (
WH_SUBSCRIPTION_ID INTEGER,
API_UUID VARCHAR(255) NOT NULL,
APPLICATION_ID VARCHAR(20) NOT NULL,
TENANT_DOMAIN VARCHAR(255) NOT NULL,
HUB_CALLBACK_URL VARCHAR(1024) NOT NULL,
HUB_TOPIC VARCHAR(255) NOT NULL,
HUB_SECRET VARCHAR(2048),
HUB_LEASE_SECONDS INTEGER,
UPDATED_AT TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
EXPIRY_AT BIGINT,
DELIVERED_AT TIMESTAMP NULL,
DELIVERY_STATE INTEGER NOT NULL DEFAULT 0,
PRIMARY KEY (WH_SUBSCRIPTION_ID))
```
Error:
```
SQL Error [42831]: The column named "WH_SUBSCRIPTION_ID" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
The column named "WH_SUBSCRIPTION_ID" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
The column named "WH_SUBSCRIPTION_ID" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
```
- **AM_WEBHOOKS_UNSUBSCRIPTION**
```sql
CREATE TABLE AM_WEBHOOKS_UNSUBSCRIPTION (
API_UUID VARCHAR(255) NOT NULL,
APPLICATION_ID VARCHAR(20) NOT NULL,
TENANT_DOMAIN VARCHAR(255) NOT NULL,
HUB_CALLBACK_URL VARCHAR(1024) NOT NULL,
HUB_TOPIC VARCHAR(255) NOT NULL,
HUB_SECRET VARCHAR(2048),
HUB_LEASE_SECONDS INTEGER,
ADDED_AT TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP
)ENGINE INNODB;
```
Error:
```
SQL Error [42601]: An unexpected token "ENGINE" was found following "CURRENT_TIMESTAMP
)". Expected tokens may include: "IN".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
An unexpected token "ENGINE" was found following "CURRENT_TIMESTAMP
)". Expected tokens may include: "IN".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
An unexpected token "ENGINE" was found following "CURRENT_TIMESTAMP
)". Expected tokens may include: "IN".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
```
|
1.0
|
Issue in DB2 scripts - ### Description:
Error thrown in following tables when running the DB2 scripts:
- **IDN_USER_FUNCTIONALITY_MAPPING**
```sql
CREATE TABLE IDN_USER_FUNCTIONALITY_MAPPING (
ID VARCHAR(255) NOT NULL,
USER_ID VARCHAR(255) NOT NULL,
TENANT_ID INTEGER NOT NULL,
FUNCTIONALITY_ID VARCHAR(255) NOT NULL,
IS_FUNCTIONALITY_LOCKED BOOLEAN NOT NULL,
FUNCTIONALITY_UNLOCK_TIME BIGINT NOT NULL,
FUNCTIONALITY_LOCK_REASON VARCHAR(1023),
FUNCTIONALITY_LOCK_REASON_CODE VARCHAR(255),
PRIMARY KEY (ID),
CONSTRAINT IDN_USER_FUNCTIONALITY_MAPPING_CONSTRAINT UNIQUE (USER_ID, TENANT_ID, FUNCTIONALITY_ID)
)
```
Error:
```
Error occurred during SQL script execution
Reason:
SQL Error [428H2]: A "BOOLEAN" data type is not supported in the context where it is being used.. SQLCODE=-20441, SQLSTATE=428H2, DRIVER=3.59.81
```
- **IDN_CORS_ORIGIN**
```sql
CREATE TABLE IF NOT EXISTS IDN_CORS_ORIGIN (
ID INTEGER NOT NULL,
TENANT_ID INTEGER NOT NULL,
ORIGIN VARCHAR(2048) NOT NULL,
UUID CHAR(36) NOT NULL,
PRIMARY KEY (ID),
UNIQUE (TENANT_ID, ORIGIN),
UNIQUE (UUID)
) INDEX IN TS32K
```
Error:
```
Error occurred during SQL script execution
Reason:
SQL Error [42601]: An unexpected token "CREATE TABLE IF NOT EXISTS IDN_CORS_ORIGIN" was found following "BEGIN-OF-STATEMENT". Expected tokens may include: "<values>".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
```
- **AM_GW_API_DEPLOYMENTS**
```sql
CREATE TABLE IF NOT EXISTS AM_GW_API_DEPLOYMENTS (
API_ID VARCHAR(255) NOT NULL,
REVISION_ID VARCHAR(255) NOT NULL,
LABEL VARCHAR(255) NOT NULL,
VHOST VARCHAR(255) NULL,
PRIMARY KEY (REVISION_ID, API_ID,LABEL),
FOREIGN KEY (API_ID) REFERENCES AM_GW_PUBLISHED_API_DETAILS(API_ID) ON UPDATE CASCADE ON DELETE NO ACTION
)
```
Error:
```
SQL Error [42601]: An unexpected token "NOT EXISTS AM_GW_API_DEPLOYMENTS" was found following "CREATE TABLE IF ". Expected tokens may include: "<space>".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
An unexpected token "NOT EXISTS AM_GW_API_DEPLOYMENTS" was found following "CREATE TABLE IF ". Expected tokens may include: "<space>".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
An unexpected token "NOT EXISTS AM_GW_API_DEPLOYMENTS" was found following "CREATE TABLE IF ". Expected tokens may include: "<space>".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
```
- **AM_DEPLOYMENT_REVISION_MAPPING**
```sql
CREATE TABLE AM_DEPLOYMENT_REVISION_MAPPING (
NAME VARCHAR(255) NOT NULL,
VHOST VARCHAR(255) NULL,
REVISION_UUID VARCHAR(255) NOT NULL,
DISPLAY_ON_DEVPORTAL BOOLEAN DEFAULT 0,
DEPLOYED_TIME TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
PRIMARY KEY (NAME, REVISION_UUID),
FOREIGN KEY (REVISION_UUID) REFERENCES AM_REVISION(REVISION_UUID) ON UPDATE CASCADE ON DELETE CASCADE)
```
Error:
```
SQL Error [428H2]: A "BOOLEAN" data type is not supported in the context where it is being used.. SQLCODE=-20441, SQLSTATE=428H2, DRIVER=3.59.81
A "BOOLEAN" data type is not supported in the context where it is being used.. SQLCODE=-20441, SQLSTATE=428H2, DRIVER=3.59.81
A "BOOLEAN" data type is not supported in the context where it is being used.. SQLCODE=-20441, SQLSTATE=428H2, DRIVER=3.59.81
```
- **AM_GATEWAY_ENVIRONMENT**
```sql
CREATE TABLE AM_GATEWAY_ENVIRONMENT (
ID INTEGER NOT NULL GENERATED ALWAYS AS IDENTITY (START WITH 1 INCREMENT BY 1),
UUID VARCHAR(45) NOT NULL,
NAME VARCHAR(255) NOT NULL,
TENANT_DOMAIN VARCHAR(255),
DISPLAY_NAME VARCHAR(255) NULL,
DESCRIPTION VARCHAR(1023) NULL,
UNIQUE (NAME, TENANT_DOMAIN),
UNIQUE (UUID),
PRIMARY KEY (ID))
```
Error:
```
QL Error [42831]: The column named "TENANT_DOMAIN" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
The column named "TENANT_DOMAIN" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
The column named "TENANT_DOMAIN" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
```
- **AM_GW_VHOST**
```sql
CREATE TABLE AM_GW_VHOST (
GATEWAY_ENV_ID INTEGER,
HOST VARCHAR(255) NOT NULL,
HTTP_CONTEXT VARCHAR(255) NULL,
HTTP_PORT VARCHAR(5) NOT NULL,
HTTPS_PORT VARCHAR(5) NOT NULL,
WS_PORT VARCHAR(5) NOT NULL,
WSS_PORT VARCHAR(5) NOT NULL,
FOREIGN KEY (GATEWAY_ENV_ID) REFERENCES AM_GATEWAY_ENVIRONMENT(ID) ON UPDATE CASCADE ON DELETE CASCADE,
PRIMARY KEY (GATEWAY_ENV_ID, HOST))
```
Error:
```
SQL Error [42704]: "DB2INST1.AM_GATEWAY_ENVIRONMENT" is an undefined name.. SQLCODE=-204, SQLSTATE=42704, DRIVER=3.59.81
"DB2INST1.AM_GATEWAY_ENVIRONMENT" is an undefined name.. SQLCODE=-204, SQLSTATE=42704, DRIVER=3.59.81
"DB2INST1.AM_GATEWAY_ENVIRONMENT" is an undefined name.. SQLCODE=-204, SQLSTATE=42704, DRIVER=3.59.81
```
- **AM_WEBHOOKS_SUBSCRIPTION**
```sql
CREATE TABLE AM_WEBHOOKS_SUBSCRIPTION (
WH_SUBSCRIPTION_ID INTEGER,
API_UUID VARCHAR(255) NOT NULL,
APPLICATION_ID VARCHAR(20) NOT NULL,
TENANT_DOMAIN VARCHAR(255) NOT NULL,
HUB_CALLBACK_URL VARCHAR(1024) NOT NULL,
HUB_TOPIC VARCHAR(255) NOT NULL,
HUB_SECRET VARCHAR(2048),
HUB_LEASE_SECONDS INTEGER,
UPDATED_AT TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
EXPIRY_AT BIGINT,
DELIVERED_AT TIMESTAMP NULL,
DELIVERY_STATE INTEGER NOT NULL DEFAULT 0,
PRIMARY KEY (WH_SUBSCRIPTION_ID))
```
Error:
```
SQL Error [42831]: The column named "WH_SUBSCRIPTION_ID" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
The column named "WH_SUBSCRIPTION_ID" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
The column named "WH_SUBSCRIPTION_ID" cannot be a column of a primary key or unique key constraint because it can contain null values.. SQLCODE=-542, SQLSTATE=42831, DRIVER=3.59.81
```
- **AM_WEBHOOKS_UNSUBSCRIPTION**
```sql
CREATE TABLE AM_WEBHOOKS_UNSUBSCRIPTION (
API_UUID VARCHAR(255) NOT NULL,
APPLICATION_ID VARCHAR(20) NOT NULL,
TENANT_DOMAIN VARCHAR(255) NOT NULL,
HUB_CALLBACK_URL VARCHAR(1024) NOT NULL,
HUB_TOPIC VARCHAR(255) NOT NULL,
HUB_SECRET VARCHAR(2048),
HUB_LEASE_SECONDS INTEGER,
ADDED_AT TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP
)ENGINE INNODB;
```
Error:
```
SQL Error [42601]: An unexpected token "ENGINE" was found following "CURRENT_TIMESTAMP
)". Expected tokens may include: "IN".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
An unexpected token "ENGINE" was found following "CURRENT_TIMESTAMP
)". Expected tokens may include: "IN".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
An unexpected token "ENGINE" was found following "CURRENT_TIMESTAMP
)". Expected tokens may include: "IN".. SQLCODE=-104, SQLSTATE=42601, DRIVER=3.59.81
```
|
non_test
|
issue in scripts description error thrown in following tables when running the scripts idn user functionality mapping sql create table idn user functionality mapping id varchar not null user id varchar not null tenant id integer not null functionality id varchar not null is functionality locked boolean not null functionality unlock time bigint not null functionality lock reason varchar functionality lock reason code varchar primary key id constraint idn user functionality mapping constraint unique user id tenant id functionality id error error occurred during sql script execution reason sql error a boolean data type is not supported in the context where it is being used sqlcode sqlstate driver idn cors origin sql create table if not exists idn cors origin id integer not null tenant id integer not null origin varchar not null uuid char not null primary key id unique tenant id origin unique uuid index in error error occurred during sql script execution reason sql error an unexpected token create table if not exists idn cors origin was found following begin of statement expected tokens may include sqlcode sqlstate driver am gw api deployments sql create table if not exists am gw api deployments api id varchar not null revision id varchar not null label varchar not null vhost varchar null primary key revision id api id label foreign key api id references am gw published api details api id on update cascade on delete no action error sql error an unexpected token not exists am gw api deployments was found following create table if expected tokens may include sqlcode sqlstate driver an unexpected token not exists am gw api deployments was found following create table if expected tokens may include sqlcode sqlstate driver an unexpected token not exists am gw api deployments was found following create table if expected tokens may include sqlcode sqlstate driver am deployment revision mapping sql create table am deployment revision mapping name varchar not null vhost varchar null revision uuid varchar not null display on devportal boolean default deployed time timestamp not null default current timestamp primary key name revision uuid foreign key revision uuid references am revision revision uuid on update cascade on delete cascade error sql error a boolean data type is not supported in the context where it is being used sqlcode sqlstate driver a boolean data type is not supported in the context where it is being used sqlcode sqlstate driver a boolean data type is not supported in the context where it is being used sqlcode sqlstate driver am gateway environment sql create table am gateway environment id integer not null generated always as identity start with increment by uuid varchar not null name varchar not null tenant domain varchar display name varchar null description varchar null unique name tenant domain unique uuid primary key id error ql error the column named tenant domain cannot be a column of a primary key or unique key constraint because it can contain null values sqlcode sqlstate driver the column named tenant domain cannot be a column of a primary key or unique key constraint because it can contain null values sqlcode sqlstate driver the column named tenant domain cannot be a column of a primary key or unique key constraint because it can contain null values sqlcode sqlstate driver am gw vhost sql create table am gw vhost gateway env id integer host varchar not null http context varchar null http port varchar not null https port varchar not null ws port varchar not null wss port varchar not null foreign key gateway env id references am gateway environment id on update cascade on delete cascade primary key gateway env id host error sql error am gateway environment is an undefined name sqlcode sqlstate driver am gateway environment is an undefined name sqlcode sqlstate driver am gateway environment is an undefined name sqlcode sqlstate driver am webhooks subscription sql create table am webhooks subscription wh subscription id integer api uuid varchar not null application id varchar not null tenant domain varchar not null hub callback url varchar not null hub topic varchar not null hub secret varchar hub lease seconds integer updated at timestamp not null default current timestamp expiry at bigint delivered at timestamp null delivery state integer not null default primary key wh subscription id error sql error the column named wh subscription id cannot be a column of a primary key or unique key constraint because it can contain null values sqlcode sqlstate driver the column named wh subscription id cannot be a column of a primary key or unique key constraint because it can contain null values sqlcode sqlstate driver the column named wh subscription id cannot be a column of a primary key or unique key constraint because it can contain null values sqlcode sqlstate driver am webhooks unsubscription sql create table am webhooks unsubscription api uuid varchar not null application id varchar not null tenant domain varchar not null hub callback url varchar not null hub topic varchar not null hub secret varchar hub lease seconds integer added at timestamp not null default current timestamp engine innodb error sql error an unexpected token engine was found following current timestamp expected tokens may include in sqlcode sqlstate driver an unexpected token engine was found following current timestamp expected tokens may include in sqlcode sqlstate driver an unexpected token engine was found following current timestamp expected tokens may include in sqlcode sqlstate driver
| 0
|
106,566
| 9,166,848,523
|
IssuesEvent
|
2019-03-02 07:40:34
|
elastic/kibana
|
https://api.github.com/repos/elastic/kibana
|
closed
|
WebDriver is stuck without logs and fails on mocha timeout
|
failed-test test test_infra
|
While working on WebDriver migration we noticed strange failures in CI when WebDriver is stuck (no logs provided) and fails within time on reaching mocha timeout for suite/test.
Example:
```
[00:07:48] │ debg Find.findByCssSelector('[data-test-subj~="visualizationLoader"]') with timeout=10000
[00:07:48] │ debg Readed rendering count 8 8
[00:07:48] │ debg --- retry.try error: expected 8 to equal 9
[00:07:49] │ debg TestSubjects.find(visualizationLoader)
[00:07:49] │ debg Find.findByCssSelector('[data-test-subj~="visualizationLoader"]') with timeout=10000
[00:07:49] │ debg Readed rendering count 8 9
[00:07:49] │ debg Find.findByCssSelector('div.visAxis__splitAxes--y > div > svg > g.ValueAxis-1 > g:last-of-type.tick') with timeout=10000
[00:07:49] │ debg maxYLabel = 500, maxYLabelYPosition = 226.9673309326172
[00:07:49] │ debg Find.findByCssSelector('div.visAxis__column--y.visAxis__column--left > div > div > svg:nth-child(2) > g > g:nth-child(1).tick') with timeout=10000
[00:07:49] │ debg Find.allByCssSelector('svg > g > g.series > rect[data-label="Count"]') with timeout=10000
[00:07:49] │ debg chartTypes count = 59
[00:10:55] └- ✖ fail: "visualize app vertical bar chart should have `drop partial buckets` option"
[00:10:55] │ Error: Timeout of 300000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves.
```
Here WebDriver stuck on running following code:
```javascript
const chartData = await Promise.all(chartTypes.map(async chart => {
const barHeight = await chart.getAttribute('height');
return Math.round(barHeight * yAxisRatio);
}));
```
Current guess is that WebDriver has issue when it is call in `Array.map`
List of failed tests:
- FailedJOB=x-pack-ciGroup2
- X-Pack Functional Tests.test/functional/apps/logstash/pipeline_list·js.logstash pipeline list route select all checkbox toggles selection for all rows
- FailedJOB=kibana-ciGroup12
- UI Functional Tests.test/functional/apps/visualize/_vertical_bar_chart·js.visualize app vertical bar chart should have drop partial buckets option
- FailedJOB=kibana-ciGroup3
- UI Functional Tests.test/functional/apps/dashboard/_dashboard_filtering·js.dashboard app using current data dashboard filtering adding a filter that excludes all data "before all" hook
- UI Functional Tests.test/functional/apps/dashboard/_dashboard_filtering·js.dashboard app using current data dashboard filtering nested filtering visualization saved with a query filters data
- FailedJOB=kibana-ciGroup11
- UI Functional Tests.test/functional/apps/visualize/_pie_chart·js.visualize app pie chart disabled aggs should show correct result when agg is re-enabled
|
3.0
|
WebDriver is stuck without logs and fails on mocha timeout - While working on WebDriver migration we noticed strange failures in CI when WebDriver is stuck (no logs provided) and fails within time on reaching mocha timeout for suite/test.
Example:
```
[00:07:48] │ debg Find.findByCssSelector('[data-test-subj~="visualizationLoader"]') with timeout=10000
[00:07:48] │ debg Readed rendering count 8 8
[00:07:48] │ debg --- retry.try error: expected 8 to equal 9
[00:07:49] │ debg TestSubjects.find(visualizationLoader)
[00:07:49] │ debg Find.findByCssSelector('[data-test-subj~="visualizationLoader"]') with timeout=10000
[00:07:49] │ debg Readed rendering count 8 9
[00:07:49] │ debg Find.findByCssSelector('div.visAxis__splitAxes--y > div > svg > g.ValueAxis-1 > g:last-of-type.tick') with timeout=10000
[00:07:49] │ debg maxYLabel = 500, maxYLabelYPosition = 226.9673309326172
[00:07:49] │ debg Find.findByCssSelector('div.visAxis__column--y.visAxis__column--left > div > div > svg:nth-child(2) > g > g:nth-child(1).tick') with timeout=10000
[00:07:49] │ debg Find.allByCssSelector('svg > g > g.series > rect[data-label="Count"]') with timeout=10000
[00:07:49] │ debg chartTypes count = 59
[00:10:55] └- ✖ fail: "visualize app vertical bar chart should have `drop partial buckets` option"
[00:10:55] │ Error: Timeout of 300000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves.
```
Here WebDriver stuck on running following code:
```javascript
const chartData = await Promise.all(chartTypes.map(async chart => {
const barHeight = await chart.getAttribute('height');
return Math.round(barHeight * yAxisRatio);
}));
```
Current guess is that WebDriver has issue when it is call in `Array.map`
List of failed tests:
- FailedJOB=x-pack-ciGroup2
- X-Pack Functional Tests.test/functional/apps/logstash/pipeline_list·js.logstash pipeline list route select all checkbox toggles selection for all rows
- FailedJOB=kibana-ciGroup12
- UI Functional Tests.test/functional/apps/visualize/_vertical_bar_chart·js.visualize app vertical bar chart should have drop partial buckets option
- FailedJOB=kibana-ciGroup3
- UI Functional Tests.test/functional/apps/dashboard/_dashboard_filtering·js.dashboard app using current data dashboard filtering adding a filter that excludes all data "before all" hook
- UI Functional Tests.test/functional/apps/dashboard/_dashboard_filtering·js.dashboard app using current data dashboard filtering nested filtering visualization saved with a query filters data
- FailedJOB=kibana-ciGroup11
- UI Functional Tests.test/functional/apps/visualize/_pie_chart·js.visualize app pie chart disabled aggs should show correct result when agg is re-enabled
|
test
|
webdriver is stuck without logs and fails on mocha timeout while working on webdriver migration we noticed strange failures in ci when webdriver is stuck no logs provided and fails within time on reaching mocha timeout for suite test example │ debg find findbycssselector with timeout │ debg readed rendering count │ debg retry try error expected to equal │ debg testsubjects find visualizationloader │ debg find findbycssselector with timeout │ debg readed rendering count │ debg find findbycssselector div visaxis splitaxes y div svg g valueaxis g last of type tick with timeout │ debg maxylabel maxylabelyposition │ debg find findbycssselector div visaxis column y visaxis column left div div svg nth child g g nth child tick with timeout │ debg find allbycssselector svg g g series rect with timeout │ debg charttypes count └ ✖ fail visualize app vertical bar chart should have drop partial buckets option │ error timeout of exceeded for async tests and hooks ensure done is called if returning a promise ensure it resolves here webdriver stuck on running following code javascript const chartdata await promise all charttypes map async chart const barheight await chart getattribute height return math round barheight yaxisratio current guess is that webdriver has issue when it is call in array map list of failed tests failedjob x pack x pack functional tests test functional apps logstash pipeline list·js logstash pipeline list route select all checkbox toggles selection for all rows failedjob kibana ui functional tests test functional apps visualize vertical bar chart·js visualize app vertical bar chart should have drop partial buckets option failedjob kibana ui functional tests test functional apps dashboard dashboard filtering·js dashboard app using current data dashboard filtering adding a filter that excludes all data before all hook ui functional tests test functional apps dashboard dashboard filtering·js dashboard app using current data dashboard filtering nested filtering visualization saved with a query filters data failedjob kibana ui functional tests test functional apps visualize pie chart·js visualize app pie chart disabled aggs should show correct result when agg is re enabled
| 1
|
446,753
| 31,558,400,716
|
IssuesEvent
|
2023-09-03 00:20:59
|
vercel/next.js
|
https://api.github.com/repos/vercel/next.js
|
closed
|
Docs: Does next/link scroll prop false disable scrolling to element?
|
template: documentation
|
### What is the improvement or update you wish to see?
I'm using the scroll prop as `scroll={false}` on some links and it doesn't stop from scrolling to the element. Just checking to see if the docs seen [here](https://nextjs.org/docs/api-reference/next/link#disable-scrolling-to-the-top-of-the-page:~:text=To%20prevent%20scrolling%20to%20the%20top%20/%20hash%20scroll%3D%7Bfalse%7D%20can%20be%20added%20to%20Link) are accurate about this.
### Is there any context that might help us understand?
Something like this
```
<Link scroll={false} href="/some-page#some-section"/>
```
still scrolls to the section.
### Does the docs page already exist? Please link to it.
_No response_
|
1.0
|
Docs: Does next/link scroll prop false disable scrolling to element? - ### What is the improvement or update you wish to see?
I'm using the scroll prop as `scroll={false}` on some links and it doesn't stop from scrolling to the element. Just checking to see if the docs seen [here](https://nextjs.org/docs/api-reference/next/link#disable-scrolling-to-the-top-of-the-page:~:text=To%20prevent%20scrolling%20to%20the%20top%20/%20hash%20scroll%3D%7Bfalse%7D%20can%20be%20added%20to%20Link) are accurate about this.
### Is there any context that might help us understand?
Something like this
```
<Link scroll={false} href="/some-page#some-section"/>
```
still scrolls to the section.
### Does the docs page already exist? Please link to it.
_No response_
|
non_test
|
docs does next link scroll prop false disable scrolling to element what is the improvement or update you wish to see i m using the scroll prop as scroll false on some links and it doesn t stop from scrolling to the element just checking to see if the docs seen are accurate about this is there any context that might help us understand something like this still scrolls to the section does the docs page already exist please link to it no response
| 0
|
89,471
| 8,204,533,973
|
IssuesEvent
|
2018-09-03 06:59:43
|
humera987/HumTestData
|
https://api.github.com/repos/humera987/HumTestData
|
opened
|
humz_proj_test : ApiV1DataRecords@randomDeleteAllDeleteOtherRbac
|
humz_proj_test
|
Project : humz_proj_test
Job : UAT
Env : UAT
Region : FXLabs/US_WEST_1
Result : fail
Status Code : 200
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Mon, 03 Sep 2018 06:59:42 GMT]}
Endpoint : http://13.56.210.25/api/v1/data-records/UWj6bMI1/delete-all
Request :
Response :
{
"requestId" : "None",
"requestTime" : "2018-09-03T06:59:42.824+0000",
"errors" : false,
"messages" : [ ],
"data" : "Deleted all Data Records for dataset UWj6bMI1",
"totalPages" : 0,
"totalElements" : 0
}
Logs :
Assertion [@StatusCode == 403] failed, expected value [403] but found [200]
--- FX Bot ---
|
1.0
|
humz_proj_test : ApiV1DataRecords@randomDeleteAllDeleteOtherRbac - Project : humz_proj_test
Job : UAT
Env : UAT
Region : FXLabs/US_WEST_1
Result : fail
Status Code : 200
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Mon, 03 Sep 2018 06:59:42 GMT]}
Endpoint : http://13.56.210.25/api/v1/data-records/UWj6bMI1/delete-all
Request :
Response :
{
"requestId" : "None",
"requestTime" : "2018-09-03T06:59:42.824+0000",
"errors" : false,
"messages" : [ ],
"data" : "Deleted all Data Records for dataset UWj6bMI1",
"totalPages" : 0,
"totalElements" : 0
}
Logs :
Assertion [@StatusCode == 403] failed, expected value [403] but found [200]
--- FX Bot ---
|
test
|
humz proj test randomdeletealldeleteotherrbac project humz proj test job uat env uat region fxlabs us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options content type transfer encoding date endpoint request response requestid none requesttime errors false messages data deleted all data records for dataset totalpages totalelements logs assertion failed expected value but found fx bot
| 1
|
233,914
| 19,086,112,867
|
IssuesEvent
|
2021-11-29 06:18:17
|
boostcampwm-2021/iOS06-MateRunner
|
https://api.github.com/repos/boostcampwm-2021/iOS06-MateRunner
|
opened
|
[단위 테스트] AddMateViewModel
|
test
|
## 🗣 설명
- Input에 대해 Output이 정상적으로 반환되는지 테스트합니다.
```swift
struct Input {
let searchButtonDidTap: Observable<Void>
let searchBarTextEvent: Observable<String>
}
struct Output {
let loadData = PublishRelay<Bool>()
}
```
## 📋 체크리스트
> 구현해야하는 이슈 체크리스트
- [ ] 단위테스트
|
1.0
|
[단위 테스트] AddMateViewModel - ## 🗣 설명
- Input에 대해 Output이 정상적으로 반환되는지 테스트합니다.
```swift
struct Input {
let searchButtonDidTap: Observable<Void>
let searchBarTextEvent: Observable<String>
}
struct Output {
let loadData = PublishRelay<Bool>()
}
```
## 📋 체크리스트
> 구현해야하는 이슈 체크리스트
- [ ] 단위테스트
|
test
|
addmateviewmodel 🗣 설명 input에 대해 output이 정상적으로 반환되는지 테스트합니다 swift struct input let searchbuttondidtap observable let searchbartextevent observable struct output let loaddata publishrelay 📋 체크리스트 구현해야하는 이슈 체크리스트 단위테스트
| 1
|
69,464
| 7,134,926,964
|
IssuesEvent
|
2018-01-22 22:36:49
|
SlateFoundation/slate-cbl
|
https://api.github.com/repos/SlateFoundation/slate-cbl
|
closed
|
Add course section to collapsed tasks
|
ready for testing
|
Instead of the Type of Experience or the examples in the screenshot (MYTHBUSTERS, etc) have that show the task's course section name.

|
1.0
|
Add course section to collapsed tasks - Instead of the Type of Experience or the examples in the screenshot (MYTHBUSTERS, etc) have that show the task's course section name.

|
test
|
add course section to collapsed tasks instead of the type of experience or the examples in the screenshot mythbusters etc have that show the task s course section name
| 1
|
93,805
| 8,444,889,991
|
IssuesEvent
|
2018-10-18 19:48:15
|
CoastalResilienceNetwork/GeositeFramework
|
https://api.github.com/repos/CoastalResilienceNetwork/GeositeFramework
|
closed
|
Ensure JS loads and works correctly
|
Task 1 tested/verified
|
Meant as a follow-up card in case fixes in #1108 does not address all of the issues.
The expectation that, after this card is completed, the site should generally be functional and resemble the existing site in functionality.
Requires #1108
|
1.0
|
Ensure JS loads and works correctly - Meant as a follow-up card in case fixes in #1108 does not address all of the issues.
The expectation that, after this card is completed, the site should generally be functional and resemble the existing site in functionality.
Requires #1108
|
test
|
ensure js loads and works correctly meant as a follow up card in case fixes in does not address all of the issues the expectation that after this card is completed the site should generally be functional and resemble the existing site in functionality requires
| 1
|
446,710
| 31,553,049,243
|
IssuesEvent
|
2023-09-02 09:43:15
|
nguyenvulong/QA
|
https://api.github.com/repos/nguyenvulong/QA
|
opened
|
[Latex] - cell color and resizebox, adjustbox in table
|
documentation
|
Use `adjustbox` instead of `resizebox`, see https://stackoverflow.com/questions/48272281/latex-how-to-fit-a-large-table-in-a-page. `adjustbox` will not screw up your row or cell color like `resizebox`.
Make sure to add this line in the preamble `\usepackage{adjustbox}`
<img width="1333" alt="image" src="https://github.com/nguyenvulong/QA/assets/1311412/3a3224cd-4a3e-4fa6-9ca8-02e65c17aed2">
|
1.0
|
[Latex] - cell color and resizebox, adjustbox in table - Use `adjustbox` instead of `resizebox`, see https://stackoverflow.com/questions/48272281/latex-how-to-fit-a-large-table-in-a-page. `adjustbox` will not screw up your row or cell color like `resizebox`.
Make sure to add this line in the preamble `\usepackage{adjustbox}`
<img width="1333" alt="image" src="https://github.com/nguyenvulong/QA/assets/1311412/3a3224cd-4a3e-4fa6-9ca8-02e65c17aed2">
|
non_test
|
cell color and resizebox adjustbox in table use adjustbox instead of resizebox see adjustbox will not screw up your row or cell color like resizebox make sure to add this line in the preamble usepackage adjustbox img width alt image src
| 0
|
202,993
| 15,864,062,726
|
IssuesEvent
|
2021-04-08 13:27:42
|
SAP/openui5
|
https://api.github.com/repos/SAP/openui5
|
closed
|
walkthrough step 16, reference to deprecated method in text
|
documentation enhancement in progress
|
OpenUI5 version: 1.81.0 and current nightly
Steps to reproduce the problem:
1. read doc for "step 16", below code for HelloPanel.controller.js
2. notice "sap.ui.xmlfragment", which is not used in code
What is the expected result?
the text should mention the method used in the code sample, that is sap.ui.core.Fragment.load
What happens instead?
the deprecated sap.ui.xmlfragment method is mentioned
|
1.0
|
walkthrough step 16, reference to deprecated method in text - OpenUI5 version: 1.81.0 and current nightly
Steps to reproduce the problem:
1. read doc for "step 16", below code for HelloPanel.controller.js
2. notice "sap.ui.xmlfragment", which is not used in code
What is the expected result?
the text should mention the method used in the code sample, that is sap.ui.core.Fragment.load
What happens instead?
the deprecated sap.ui.xmlfragment method is mentioned
|
non_test
|
walkthrough step reference to deprecated method in text version and current nightly steps to reproduce the problem read doc for step below code for hellopanel controller js notice sap ui xmlfragment which is not used in code what is the expected result the text should mention the method used in the code sample that is sap ui core fragment load what happens instead the deprecated sap ui xmlfragment method is mentioned
| 0
|
712,485
| 24,497,100,515
|
IssuesEvent
|
2022-10-10 09:36:49
|
AY2223S1-CS2103T-W13-4/tp
|
https://api.github.com/repos/AY2223S1-CS2103T-W13-4/tp
|
closed
|
Improve Testing for `AddTaskCommand` and `ListTasksCommand`
|
type.Task priority.Medium
|
To minimize bugs and also so that our test coverage doesn't drop too low.
Things to do:
- [ ] Add tests for `AddTaskCommand`
- [ ] Add tests for `Task`
- [ ] Add tests for `TaskList`
- [ ] Add tests for `ListTasksCommand`
|
1.0
|
Improve Testing for `AddTaskCommand` and `ListTasksCommand` - To minimize bugs and also so that our test coverage doesn't drop too low.
Things to do:
- [ ] Add tests for `AddTaskCommand`
- [ ] Add tests for `Task`
- [ ] Add tests for `TaskList`
- [ ] Add tests for `ListTasksCommand`
|
non_test
|
improve testing for addtaskcommand and listtaskscommand to minimize bugs and also so that our test coverage doesn t drop too low things to do add tests for addtaskcommand add tests for task add tests for tasklist add tests for listtaskscommand
| 0
|
389,227
| 11,499,420,667
|
IssuesEvent
|
2020-02-12 13:55:32
|
Longwelwind/swords-and-ravens
|
https://api.github.com/repos/Longwelwind/swords-and-ravens
|
closed
|
Resolving order of tracks is unhandy
|
priority:low type:qol
|

Cant make it work to place the order I want. Bara, Lanni, Tyrell, GJ
I guess on 6p games this might be even worse. How is this intended to work? Shall I click a house symbol and move it then?
I managed it finally but I don't know how I finally came to that result...
|
1.0
|
Resolving order of tracks is unhandy - 
Cant make it work to place the order I want. Bara, Lanni, Tyrell, GJ
I guess on 6p games this might be even worse. How is this intended to work? Shall I click a house symbol and move it then?
I managed it finally but I don't know how I finally came to that result...
|
non_test
|
resolving order of tracks is unhandy cant make it work to place the order i want bara lanni tyrell gj i guess on games this might be even worse how is this intended to work shall i click a house symbol and move it then i managed it finally but i don t know how i finally came to that result
| 0
|
202,006
| 15,244,013,352
|
IssuesEvent
|
2021-02-19 12:08:24
|
spring-projects/spring-framework
|
https://api.github.com/repos/spring-projects/spring-framework
|
closed
|
Dependency on Servlet 4.0 in spring-test makes it challenging to have Servlet 3.1 at runtime
|
in: test in: web type: regression
|
Spring Framework 5.x is documented as requiring only Servlet 3.1 (EE7). However, a recent change (commit f22e2ac578f6db8f988cbbee0af5f381a86fdd04 by @rstoyanchev, included in 5.3.4) introduces a reference to `javax.servlet.http.HttpServletMapping` into `MockHttpServletRequest`.
The referenced API is part of Servlet 4.0 (EE8) and is not present in Servlet 3.1.
It seems extremely unlikely that a dependency change to a new major version of the Servlet spec was intentionally introduced as part of a patch release of Spring Framework.
If I am not misunderstanding something here, it seems like this would need to be reverted.
|
1.0
|
Dependency on Servlet 4.0 in spring-test makes it challenging to have Servlet 3.1 at runtime - Spring Framework 5.x is documented as requiring only Servlet 3.1 (EE7). However, a recent change (commit f22e2ac578f6db8f988cbbee0af5f381a86fdd04 by @rstoyanchev, included in 5.3.4) introduces a reference to `javax.servlet.http.HttpServletMapping` into `MockHttpServletRequest`.
The referenced API is part of Servlet 4.0 (EE8) and is not present in Servlet 3.1.
It seems extremely unlikely that a dependency change to a new major version of the Servlet spec was intentionally introduced as part of a patch release of Spring Framework.
If I am not misunderstanding something here, it seems like this would need to be reverted.
|
test
|
dependency on servlet in spring test makes it challenging to have servlet at runtime spring framework x is documented as requiring only servlet however a recent change commit by rstoyanchev included in introduces a reference to javax servlet http httpservletmapping into mockhttpservletrequest the referenced api is part of servlet and is not present in servlet it seems extremely unlikely that a dependency change to a new major version of the servlet spec was intentionally introduced as part of a patch release of spring framework if i am not misunderstanding something here it seems like this would need to be reverted
| 1
|
157,309
| 12,369,703,647
|
IssuesEvent
|
2020-05-18 15:38:41
|
gtDMMB/RNAStructViz
|
https://api.github.com/repos/gtDMMB/RNAStructViz
|
closed
|
Mac OS load files browser bottom widget sometimes does not display correctly
|
Proposed fix in place >= v2.3.4-testing 🍎 Mac OSX
|
# Demonstration of the problem (active bug)
This error has been noticed on multiple Mac machine installs, but we have so far yet to be able to reproduce the bug exactly. After using RNAStructViz for a while, sometimes, when clicking on "*Load Files*" to open more structures, the bottom widget fails to display correctly. As in:

The correct display actually looks like the following:

# Suggestions of causes for the display issue:
* Loading and processing plots with the *StatsWindow*, followed by trying to open the *Load Files* dialog after closing that window?
* The following message gets printed to the terminal / console when the error occurs:
```bash
Fl_Text_Buffer::remove_modify_callback(): Can't find modify CB to remove
Fl_Text_Buffer::remove_predelete_callback(): Can't find pre-delete CB to remove
```
Any users that are able to accurately, i.e., predictably with steps, regenerate this issue with RNAStructViz, please follow up below and let me know so I can figure out a fix for the problem!
# Proposed solutions in the meantime:
In the meantime, whenever this happens, please just restart RNAStructViz again, or choose new structures to load without using the bottom widget in the dialog (less optimal solution).
|
1.0
|
Mac OS load files browser bottom widget sometimes does not display correctly - # Demonstration of the problem (active bug)
This error has been noticed on multiple Mac machine installs, but we have so far yet to be able to reproduce the bug exactly. After using RNAStructViz for a while, sometimes, when clicking on "*Load Files*" to open more structures, the bottom widget fails to display correctly. As in:

The correct display actually looks like the following:

# Suggestions of causes for the display issue:
* Loading and processing plots with the *StatsWindow*, followed by trying to open the *Load Files* dialog after closing that window?
* The following message gets printed to the terminal / console when the error occurs:
```bash
Fl_Text_Buffer::remove_modify_callback(): Can't find modify CB to remove
Fl_Text_Buffer::remove_predelete_callback(): Can't find pre-delete CB to remove
```
Any users that are able to accurately, i.e., predictably with steps, regenerate this issue with RNAStructViz, please follow up below and let me know so I can figure out a fix for the problem!
# Proposed solutions in the meantime:
In the meantime, whenever this happens, please just restart RNAStructViz again, or choose new structures to load without using the bottom widget in the dialog (less optimal solution).
|
test
|
mac os load files browser bottom widget sometimes does not display correctly demonstration of the problem active bug this error has been noticed on multiple mac machine installs but we have so far yet to be able to reproduce the bug exactly after using rnastructviz for a while sometimes when clicking on load files to open more structures the bottom widget fails to display correctly as in the correct display actually looks like the following suggestions of causes for the display issue loading and processing plots with the statswindow followed by trying to open the load files dialog after closing that window the following message gets printed to the terminal console when the error occurs bash fl text buffer remove modify callback can t find modify cb to remove fl text buffer remove predelete callback can t find pre delete cb to remove any users that are able to accurately i e predictably with steps regenerate this issue with rnastructviz please follow up below and let me know so i can figure out a fix for the problem proposed solutions in the meantime in the meantime whenever this happens please just restart rnastructviz again or choose new structures to load without using the bottom widget in the dialog less optimal solution
| 1
|
347,003
| 24,887,432,943
|
IssuesEvent
|
2022-10-28 08:59:35
|
HowSuen/ped
|
https://api.github.com/repos/HowSuen/ped
|
opened
|
Wrong command given in User Guide for undounmark
|
severity.Medium type.DocumentationBug
|

It is unclear whether it is supposed to be "undounmark" or "unmarkundo"
<!--session: 1666943648811-895d188d-8396-44b2-a6d6-5763549694a9-->
<!--Version: Web v3.4.4-->
|
1.0
|
Wrong command given in User Guide for undounmark - 
It is unclear whether it is supposed to be "undounmark" or "unmarkundo"
<!--session: 1666943648811-895d188d-8396-44b2-a6d6-5763549694a9-->
<!--Version: Web v3.4.4-->
|
non_test
|
wrong command given in user guide for undounmark it is unclear whether it is supposed to be undounmark or unmarkundo
| 0
|
191,275
| 22,215,728,893
|
IssuesEvent
|
2022-06-08 01:17:36
|
dreamboy9/mongo
|
https://api.github.com/repos/dreamboy9/mongo
|
opened
|
CVE-2022-31799 (Medium) detected in bottle-0.12.19-py3-none-any.whl
|
security vulnerability
|
## CVE-2022-31799 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bottle-0.12.19-py3-none-any.whl</b></p></summary>
<p>Fast and simple WSGI-framework for small web-applications.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/bf/44/aeafdd6ca05a8e1c3f91eeeb272a202d5cb1b3b23730a5ca686a81c48d24/bottle-0.12.19-py3-none-any.whl">https://files.pythonhosted.org/packages/bf/44/aeafdd6ca05a8e1c3f91eeeb272a202d5cb1b3b23730a5ca686a81c48d24/bottle-0.12.19-py3-none-any.whl</a></p>
<p>Path to dependency file: /src/third_party/wiredtiger/bench/workgen</p>
<p>Path to vulnerable library: /src/third_party/wiredtiger/bench/workgen</p>
<p>
Dependency Hierarchy:
- :x: **bottle-0.12.19-py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/dreamboy9/mongo/commit/60ef70ebd8d46f4c893b3fb90ccf2616f8e21d2b">60ef70ebd8d46f4c893b3fb90ccf2616f8e21d2b</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Bottle before 0.12.20 mishandles errors during early request binding.
<p>Publish Date: 2022-06-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-31799>CVE-2022-31799</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/bottlepy/bottle/commit/e140e1b54da721a660f2eb9d58a106b7b3ff2f00">https://github.com/bottlepy/bottle/commit/e140e1b54da721a660f2eb9d58a106b7b3ff2f00</a></p>
<p>Release Date: 2022-06-02</p>
<p>Fix Resolution: bottle - 0.12.20</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-31799 (Medium) detected in bottle-0.12.19-py3-none-any.whl - ## CVE-2022-31799 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bottle-0.12.19-py3-none-any.whl</b></p></summary>
<p>Fast and simple WSGI-framework for small web-applications.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/bf/44/aeafdd6ca05a8e1c3f91eeeb272a202d5cb1b3b23730a5ca686a81c48d24/bottle-0.12.19-py3-none-any.whl">https://files.pythonhosted.org/packages/bf/44/aeafdd6ca05a8e1c3f91eeeb272a202d5cb1b3b23730a5ca686a81c48d24/bottle-0.12.19-py3-none-any.whl</a></p>
<p>Path to dependency file: /src/third_party/wiredtiger/bench/workgen</p>
<p>Path to vulnerable library: /src/third_party/wiredtiger/bench/workgen</p>
<p>
Dependency Hierarchy:
- :x: **bottle-0.12.19-py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/dreamboy9/mongo/commit/60ef70ebd8d46f4c893b3fb90ccf2616f8e21d2b">60ef70ebd8d46f4c893b3fb90ccf2616f8e21d2b</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Bottle before 0.12.20 mishandles errors during early request binding.
<p>Publish Date: 2022-06-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-31799>CVE-2022-31799</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/bottlepy/bottle/commit/e140e1b54da721a660f2eb9d58a106b7b3ff2f00">https://github.com/bottlepy/bottle/commit/e140e1b54da721a660f2eb9d58a106b7b3ff2f00</a></p>
<p>Release Date: 2022-06-02</p>
<p>Fix Resolution: bottle - 0.12.20</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_test
|
cve medium detected in bottle none any whl cve medium severity vulnerability vulnerable library bottle none any whl fast and simple wsgi framework for small web applications library home page a href path to dependency file src third party wiredtiger bench workgen path to vulnerable library src third party wiredtiger bench workgen dependency hierarchy x bottle none any whl vulnerable library found in head commit a href found in base branch master vulnerability details bottle before mishandles errors during early request binding publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bottle step up your open source security game with mend
| 0
|
272,418
| 23,672,518,835
|
IssuesEvent
|
2022-08-27 15:30:24
|
red/red
|
https://api.github.com/repos/red/red
|
closed
|
[CRASH] on-deep-change* locals cannot point to itself & `local` corruption
|
status.built status.tested type.bug test.written
|
**Describe the bug**
Snippet 1:
```
?: func ['x] [print [x uppercase form type? x: get x tab mold/flat :x]]
o: make deep-reactor! [
on-deep-change*: func [o w t a n i p /local x] [
y: context? 'o
; local: p: x: :y
p: x: :y
? y
? p
? x
? local
]
x: []
append x 1
]
```
Produces output:
```
y FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
p FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
x WORD x
local FUNCTION func ['x][print [x uppercase form type? x: get x tab mold/flat :x]]
y FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
p FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
x WORD x
local FUNCTION func ['x][print [x uppercase form type? x: get x tab mold/flat :x]]
```
Note:
(1) `x` does not point to `on-deep-change*` whereas `p` (also local) does, as well as global `y`
(2) `local` referring to `?` (???)
---
Snippet 2 (added `local: `):
```
?: func ['x] [print [x uppercase form type? x: get x tab mold/flat :x]]
o: make deep-reactor! [
on-deep-change*: func [o w t a n i p /local x] [
y: context? 'o
local: p: x: :y
? y
? p
? x
? local
]
x: []
append x 1
]
```
Crashes (3):
```
*** Runtime Error 1: access violation
*** Cannot determine source file/line info.
***
```
**Expected behavior**
```
y FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
p FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
x FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
local FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
(and again)
```
(1) `x` should point to on-deep-change
(2) `local` should point to on-deep-change
(3) no crash
**Platform version**
```
Red 0.6.4 for Windows built 20-Dec-2020/21:04:56+03:00 commit #7a6d9a9
```
|
2.0
|
[CRASH] on-deep-change* locals cannot point to itself & `local` corruption - **Describe the bug**
Snippet 1:
```
?: func ['x] [print [x uppercase form type? x: get x tab mold/flat :x]]
o: make deep-reactor! [
on-deep-change*: func [o w t a n i p /local x] [
y: context? 'o
; local: p: x: :y
p: x: :y
? y
? p
? x
? local
]
x: []
append x 1
]
```
Produces output:
```
y FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
p FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
x WORD x
local FUNCTION func ['x][print [x uppercase form type? x: get x tab mold/flat :x]]
y FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
p FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
x WORD x
local FUNCTION func ['x][print [x uppercase form type? x: get x tab mold/flat :x]]
```
Note:
(1) `x` does not point to `on-deep-change*` whereas `p` (also local) does, as well as global `y`
(2) `local` referring to `?` (???)
---
Snippet 2 (added `local: `):
```
?: func ['x] [print [x uppercase form type? x: get x tab mold/flat :x]]
o: make deep-reactor! [
on-deep-change*: func [o w t a n i p /local x] [
y: context? 'o
local: p: x: :y
? y
? p
? x
? local
]
x: []
append x 1
]
```
Crashes (3):
```
*** Runtime Error 1: access violation
*** Cannot determine source file/line info.
***
```
**Expected behavior**
```
y FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
p FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
x FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
local FUNCTION func [o w t a n i p /local x][y: context? 'o p: x: :y ? y ? p ? x ? local]
(and again)
```
(1) `x` should point to on-deep-change
(2) `local` should point to on-deep-change
(3) no crash
**Platform version**
```
Red 0.6.4 for Windows built 20-Dec-2020/21:04:56+03:00 commit #7a6d9a9
```
|
test
|
on deep change locals cannot point to itself local corruption describe the bug snippet func o make deep reactor on deep change func y context o local p x y p x y y p x local x append x produces output y function func p function func x word x local function func y function func p function func x word x local function func note x does not point to on deep change whereas p also local does as well as global y local referring to snippet added local func o make deep reactor on deep change func y context o local p x y y p x local x append x crashes runtime error access violation cannot determine source file line info expected behavior y function func p function func x function func local function func and again x should point to on deep change local should point to on deep change no crash platform version red for windows built dec commit
| 1
|
198,811
| 22,674,138,935
|
IssuesEvent
|
2022-07-04 01:20:51
|
JMD60260/llsolidaires
|
https://api.github.com/repos/JMD60260/llsolidaires
|
opened
|
CVE-2022-25758 (Medium) detected in scss-tokenizer-0.2.3.tgz
|
security vulnerability
|
## CVE-2022-25758 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>scss-tokenizer-0.2.3.tgz</b></p></summary>
<p>A tokenzier for Sass' SCSS syntax</p>
<p>Library home page: <a href="https://registry.npmjs.org/scss-tokenizer/-/scss-tokenizer-0.2.3.tgz">https://registry.npmjs.org/scss-tokenizer/-/scss-tokenizer-0.2.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/scss-tokenizer/package.json</p>
<p>
Dependency Hierarchy:
- webpacker-5.1.1.tgz (Root Library)
- node-sass-4.14.0.tgz
- sass-graph-2.2.4.tgz
- :x: **scss-tokenizer-0.2.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/JMD60260/llsolidaires/commit/535ebefeb7ceab2131c4c881e0f0a569995bb6ef">535ebefeb7ceab2131c4c881e0f0a569995bb6ef</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
<p>Publish Date: 2022-07-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-25758>CVE-2022-25758</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25758">https://nvd.nist.gov/vuln/detail/CVE-2022-25758</a></p>
<p>Release Date: 2022-07-01</p>
<p>Fix Resolution: no_fix</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-25758 (Medium) detected in scss-tokenizer-0.2.3.tgz - ## CVE-2022-25758 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>scss-tokenizer-0.2.3.tgz</b></p></summary>
<p>A tokenzier for Sass' SCSS syntax</p>
<p>Library home page: <a href="https://registry.npmjs.org/scss-tokenizer/-/scss-tokenizer-0.2.3.tgz">https://registry.npmjs.org/scss-tokenizer/-/scss-tokenizer-0.2.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/scss-tokenizer/package.json</p>
<p>
Dependency Hierarchy:
- webpacker-5.1.1.tgz (Root Library)
- node-sass-4.14.0.tgz
- sass-graph-2.2.4.tgz
- :x: **scss-tokenizer-0.2.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/JMD60260/llsolidaires/commit/535ebefeb7ceab2131c4c881e0f0a569995bb6ef">535ebefeb7ceab2131c4c881e0f0a569995bb6ef</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
<p>Publish Date: 2022-07-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-25758>CVE-2022-25758</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-25758">https://nvd.nist.gov/vuln/detail/CVE-2022-25758</a></p>
<p>Release Date: 2022-07-01</p>
<p>Fix Resolution: no_fix</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_test
|
cve medium detected in scss tokenizer tgz cve medium severity vulnerability vulnerable library scss tokenizer tgz a tokenzier for sass scss syntax library home page a href path to dependency file package json path to vulnerable library node modules scss tokenizer package json dependency hierarchy webpacker tgz root library node sass tgz sass graph tgz x scss tokenizer tgz vulnerable library found in head commit a href vulnerability details all versions of package scss tokenizer are vulnerable to regular expression denial of service redos via the loadannotation function due to the usage of insecure regex publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution no fix step up your open source security game with mend
| 0
|
13,411
| 3,332,091,759
|
IssuesEvent
|
2015-11-11 18:36:52
|
zfsonlinux/zfs
|
https://api.github.com/repos/zfsonlinux/zfs
|
closed
|
Build bots can't handle dependencies
|
Test Suite
|
Just looked at #3656 and it occurred to me that the build-bots can't handle dependencies. This happen every now and then, especially to SPL (don't know if we have/need other dependencies than that).
We've talked about adding dependency info in the commit log before (last one I think was 6e9710f7c33a7440904b39fb4e6b68b3325cfeca). I don't know exactly how the build-bots are setup, but shouldn't it be possible to gather the information we/the build-bots need from the commit log?.
Maybe duplicate what we have for <code>Signed-off-by: …</code> and make it more standardized. Something like <code>Depend-on: …</code>? Then the build-bots would just build the dependency + PR/patch first, then zfs…
Should be fairly straight forward… ?
|
1.0
|
Build bots can't handle dependencies - Just looked at #3656 and it occurred to me that the build-bots can't handle dependencies. This happen every now and then, especially to SPL (don't know if we have/need other dependencies than that).
We've talked about adding dependency info in the commit log before (last one I think was 6e9710f7c33a7440904b39fb4e6b68b3325cfeca). I don't know exactly how the build-bots are setup, but shouldn't it be possible to gather the information we/the build-bots need from the commit log?.
Maybe duplicate what we have for <code>Signed-off-by: …</code> and make it more standardized. Something like <code>Depend-on: …</code>? Then the build-bots would just build the dependency + PR/patch first, then zfs…
Should be fairly straight forward… ?
|
test
|
build bots can t handle dependencies just looked at and it occurred to me that the build bots can t handle dependencies this happen every now and then especially to spl don t know if we have need other dependencies than that we ve talked about adding dependency info in the commit log before last one i think was i don t know exactly how the build bots are setup but shouldn t it be possible to gather the information we the build bots need from the commit log maybe duplicate what we have for signed off by … and make it more standardized something like depend on … then the build bots would just build the dependency pr patch first then zfs… should be fairly straight forward…
| 1
|
49,475
| 3,002,893,709
|
IssuesEvent
|
2015-07-24 19:55:37
|
jayway/powermock
|
https://api.github.com/repos/jayway/powermock
|
closed
|
maven dependency on powermock-api-easymock doesn't bring in easymock
|
bug imported Priority-Medium wontfix
|
_From [onlyn...@gmail.com](https://code.google.com/u/103888227351071805244/) on January 08, 2013 22:42:16_
What steps will reproduce the problem? 1. Added the following to my pom.xml:
\<dependency>
\<groupId>org.powermock</groupId>
\<artifactId>powermock-api-easymock</artifactId>
\<version>1.5</version>
\<scope>test</scope>
\</dependency>
2. Ran mvn test
3. Got the following error: package org.easymock does not exist What is the expected output? What do you see instead? I expected that since the pom for powermock-api-easymock says it depends on easymock, that it would be pulled in. However I get the error:
package org.easymock does not exist What version of the product are you using? On what operating system? Version 1.5 on linux. Please provide any additional information below. It appears to be due to the parent pom saying that easymock should be provided: http://stackoverflow.com/questions/10382220/maven-test-dependency-not-being-found
_Original issue: http://code.google.com/p/powermock/issues/detail?id=420_
|
1.0
|
maven dependency on powermock-api-easymock doesn't bring in easymock - _From [onlyn...@gmail.com](https://code.google.com/u/103888227351071805244/) on January 08, 2013 22:42:16_
What steps will reproduce the problem? 1. Added the following to my pom.xml:
\<dependency>
\<groupId>org.powermock</groupId>
\<artifactId>powermock-api-easymock</artifactId>
\<version>1.5</version>
\<scope>test</scope>
\</dependency>
2. Ran mvn test
3. Got the following error: package org.easymock does not exist What is the expected output? What do you see instead? I expected that since the pom for powermock-api-easymock says it depends on easymock, that it would be pulled in. However I get the error:
package org.easymock does not exist What version of the product are you using? On what operating system? Version 1.5 on linux. Please provide any additional information below. It appears to be due to the parent pom saying that easymock should be provided: http://stackoverflow.com/questions/10382220/maven-test-dependency-not-being-found
_Original issue: http://code.google.com/p/powermock/issues/detail?id=420_
|
non_test
|
maven dependency on powermock api easymock doesn t bring in easymock from on january what steps will reproduce the problem added the following to my pom xml org powermock powermock api easymock test ran mvn test got the following error package org easymock does not exist what is the expected output what do you see instead i expected that since the pom for powermock api easymock says it depends on easymock that it would be pulled in however i get the error package org easymock does not exist what version of the product are you using on what operating system version on linux please provide any additional information below it appears to be due to the parent pom saying that easymock should be provided original issue
| 0
|
5,157
| 2,776,127,922
|
IssuesEvent
|
2015-05-04 19:59:47
|
SvitlanaShepitsena/svet-newspaper-material
|
https://api.github.com/repos/SvitlanaShepitsena/svet-newspaper-material
|
closed
|
From the Editor/Radio section rendering bug on large screen (should be column starting from medium)
|
bug Design
|
d
|
1.0
|
From the Editor/Radio section rendering bug on large screen (should be column starting from medium) - d
|
non_test
|
from the editor radio section rendering bug on large screen should be column starting from medium d
| 0
|
100,908
| 21,558,839,920
|
IssuesEvent
|
2022-04-30 22:04:27
|
aws/aws-cli
|
https://api.github.com/repos/aws/aws-cli
|
closed
|
Response from AWS-CLI in Windows encoded ANSI independent of Terminal encoding
|
unicode guidance closed-for-staleness
|
### Describe the bug
I installed AWS-CLIv2 in Windows 10 and Git for Windows. Using Command Prompt or Git Bash I am able to execute queries like "aws s3 ls" and "aws connect xxxx". My query response includes a localized character "é". The query works and using --debug parameter I see the response back from the service being encoded as UTF. However when the command writes the response, it's encoded as ANSI. To test, I was redirecting the response to a text file and it is always encoded as ANSI (cp1252). This is what I used: aws s3 ls s3://<BucketName>/Joué-lès > textfile.txt. The character "é" appears encoded as E9 which is ANSI equivalent (cp1252).
### Expected Behavior
I was expecting the result from the command to be encoded UTF-8. The character "é" should be encoded as C3A9 (UTF-8).
### Current Behavior
The result from the command is encoded ANSI (cp1252). The character "é" is encoded as E9.
### Reproduction Steps
- Install Git For Windows
- Install AWS CLI v2 for Windows
- Add a bucket (In the command below replaced by "MyBucketName")
- Add a folder named “Joué-lès” to the bucket
- Open Command Prompt and execute “aws s3 ls s3://<BucketName>/Joué-lès > textfile.txt”
o Read the file with Notepadd++: The file is encoded as ANSI
- Open Git Bash and execute “aws s3 ls s3://MyBucketName/Joué-lès > textfile.txt”
o Read the file with Notepadd++: The file is encoded as ANSI
- Open Git Bash and execute “aws s3 ls s3://MyBucketName/Joué-lès | xxd -u -p -c1 | while read x; do printf "%%%s" "$x"; done”
o The outcome of the command is: “%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%50%52%45%20%4A%6F%75%E9%2D%6C%E8%73%2F%0D%0A”
o The string shows the character “é” encoded as E9 and “è” encoded as E8. Those are ANSI encoding. UTF will be encoded as “C3A9” and “C3A8”.
### Possible Solution
I think is something between AWS-CLI and its embedded Python 3.9. Python requires a variable to force UTF for encoding.
### Additional Information/Context
I tested in Windows machines using command prompt and Git Bash at it generates ANSI files consistently.
I tested in Windows using Powershell and it behaves different, the result is UTF-16 but is not encoded well.
I tested in Windows using WSL (Ubuntu) and the bug is not happening, the result is UTF-8.
I tested in Linux and the bug is not happening, the result is UTF-8.
I tested in MAC and the bug is not happening, the result is UTF-8.
### CLI version used
aws-cli/2.5.8 Python/3.9.11 Windows/10 exe/AMD64 prompt/off
### Environment details (OS name and version, etc.)
Windows 10, Gitbash 2.36
|
1.0
|
Response from AWS-CLI in Windows encoded ANSI independent of Terminal encoding - ### Describe the bug
I installed AWS-CLIv2 in Windows 10 and Git for Windows. Using Command Prompt or Git Bash I am able to execute queries like "aws s3 ls" and "aws connect xxxx". My query response includes a localized character "é". The query works and using --debug parameter I see the response back from the service being encoded as UTF. However when the command writes the response, it's encoded as ANSI. To test, I was redirecting the response to a text file and it is always encoded as ANSI (cp1252). This is what I used: aws s3 ls s3://<BucketName>/Joué-lès > textfile.txt. The character "é" appears encoded as E9 which is ANSI equivalent (cp1252).
### Expected Behavior
I was expecting the result from the command to be encoded UTF-8. The character "é" should be encoded as C3A9 (UTF-8).
### Current Behavior
The result from the command is encoded ANSI (cp1252). The character "é" is encoded as E9.
### Reproduction Steps
- Install Git For Windows
- Install AWS CLI v2 for Windows
- Add a bucket (In the command below replaced by "MyBucketName")
- Add a folder named “Joué-lès” to the bucket
- Open Command Prompt and execute “aws s3 ls s3://<BucketName>/Joué-lès > textfile.txt”
o Read the file with Notepadd++: The file is encoded as ANSI
- Open Git Bash and execute “aws s3 ls s3://MyBucketName/Joué-lès > textfile.txt”
o Read the file with Notepadd++: The file is encoded as ANSI
- Open Git Bash and execute “aws s3 ls s3://MyBucketName/Joué-lès | xxd -u -p -c1 | while read x; do printf "%%%s" "$x"; done”
o The outcome of the command is: “%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%50%52%45%20%4A%6F%75%E9%2D%6C%E8%73%2F%0D%0A”
o The string shows the character “é” encoded as E9 and “è” encoded as E8. Those are ANSI encoding. UTF will be encoded as “C3A9” and “C3A8”.
### Possible Solution
I think is something between AWS-CLI and its embedded Python 3.9. Python requires a variable to force UTF for encoding.
### Additional Information/Context
I tested in Windows machines using command prompt and Git Bash at it generates ANSI files consistently.
I tested in Windows using Powershell and it behaves different, the result is UTF-16 but is not encoded well.
I tested in Windows using WSL (Ubuntu) and the bug is not happening, the result is UTF-8.
I tested in Linux and the bug is not happening, the result is UTF-8.
I tested in MAC and the bug is not happening, the result is UTF-8.
### CLI version used
aws-cli/2.5.8 Python/3.9.11 Windows/10 exe/AMD64 prompt/off
### Environment details (OS name and version, etc.)
Windows 10, Gitbash 2.36
|
non_test
|
response from aws cli in windows encoded ansi independent of terminal encoding describe the bug i installed aws in windows and git for windows using command prompt or git bash i am able to execute queries like aws ls and aws connect xxxx my query response includes a localized character é the query works and using debug parameter i see the response back from the service being encoded as utf however when the command writes the response it s encoded as ansi to test i was redirecting the response to a text file and it is always encoded as ansi this is what i used aws ls joué lès textfile txt the character é appears encoded as which is ansi equivalent expected behavior i was expecting the result from the command to be encoded utf the character é should be encoded as utf current behavior the result from the command is encoded ansi the character é is encoded as reproduction steps install git for windows install aws cli for windows add a bucket in the command below replaced by mybucketname add a folder named “joué lès” to the bucket open command prompt and execute “aws ls joué lès textfile txt” o read the file with notepadd the file is encoded as ansi open git bash and execute “aws ls mybucketname joué lès textfile txt” o read the file with notepadd the file is encoded as ansi open git bash and execute “aws ls mybucketname joué lès xxd u p while read x do printf s x done” o the outcome of the command is “ ” o the string shows the character “é” encoded as and “è” encoded as those are ansi encoding utf will be encoded as “ ” and “ ” possible solution i think is something between aws cli and its embedded python python requires a variable to force utf for encoding additional information context i tested in windows machines using command prompt and git bash at it generates ansi files consistently i tested in windows using powershell and it behaves different the result is utf but is not encoded well i tested in windows using wsl ubuntu and the bug is not happening the result is utf i tested in linux and the bug is not happening the result is utf i tested in mac and the bug is not happening the result is utf cli version used aws cli python windows exe prompt off environment details os name and version etc windows gitbash
| 0
|
326,390
| 27,988,336,767
|
IssuesEvent
|
2023-03-26 23:14:10
|
unifyai/ivy
|
https://api.github.com/repos/unifyai/ivy
|
reopened
|
Fix jax_numpy_dtype.test_jax_numpy_can_cast
|
JAX Frontend Sub Task Failing Test
|
| | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4526951745/jobs/7972435662" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/4526951745/jobs/7972435662" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4526709521/jobs/7972060784" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/4526709521/jobs/7972060784" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_jax/test_jax_numpy_dtype.py::test_jax_numpy_can_cast[cpu-ivy.functional.backends.numpy-False-False]</summary>
2023-03-26T22:18:32.6512848Z E AssertionError: the results from backend numpy and ground truth framework jax do not match
2023-03-26T22:18:32.6513181Z E False!=True
2023-03-26T22:18:32.6513387Z E
2023-03-26T22:18:32.6513561Z E
2023-03-26T22:18:32.6513801Z E Falsifying example: test_jax_numpy_can_cast(
2023-03-26T22:18:32.6514163Z E from_=['complex128'],
2023-03-26T22:18:32.6514439Z E to=['complex64'],
2023-03-26T22:18:32.6514708Z E casting='same_kind',
2023-03-26T22:18:32.6515087Z E fn_tree='ivy.functional.frontends.jax.numpy.can_cast',
2023-03-26T22:18:32.6515438Z E test_flags=FrontendFunctionTestFlags(
2023-03-26T22:18:32.6515722Z E num_positional_args=0,
2023-03-26T22:18:32.6515961Z E with_out=False,
2023-03-26T22:18:32.6516196Z E inplace=False,
2023-03-26T22:18:32.6516431Z E as_variable=[False],
2023-03-26T22:18:32.6516677Z E native_arrays=[False],
2023-03-26T22:18:32.6516896Z E ),
2023-03-26T22:18:32.6517140Z E on_device='cpu',
2023-03-26T22:18:32.6517401Z E frontend='jax',
2023-03-26T22:18:32.6517596Z E )
2023-03-26T22:18:32.6517777Z E
2023-03-26T22:18:32.6518264Z E You can reproduce this example by temporarily adding @reproduce_failure('6.70.0', b'AAgGAwAAAA==') as a decorator on your test case
</details>
|
1.0
|
Fix jax_numpy_dtype.test_jax_numpy_can_cast - | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4526951745/jobs/7972435662" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/4526951745/jobs/7972435662" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4526709521/jobs/7972060784" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/4526709521/jobs/7972060784" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_jax/test_jax_numpy_dtype.py::test_jax_numpy_can_cast[cpu-ivy.functional.backends.numpy-False-False]</summary>
2023-03-26T22:18:32.6512848Z E AssertionError: the results from backend numpy and ground truth framework jax do not match
2023-03-26T22:18:32.6513181Z E False!=True
2023-03-26T22:18:32.6513387Z E
2023-03-26T22:18:32.6513561Z E
2023-03-26T22:18:32.6513801Z E Falsifying example: test_jax_numpy_can_cast(
2023-03-26T22:18:32.6514163Z E from_=['complex128'],
2023-03-26T22:18:32.6514439Z E to=['complex64'],
2023-03-26T22:18:32.6514708Z E casting='same_kind',
2023-03-26T22:18:32.6515087Z E fn_tree='ivy.functional.frontends.jax.numpy.can_cast',
2023-03-26T22:18:32.6515438Z E test_flags=FrontendFunctionTestFlags(
2023-03-26T22:18:32.6515722Z E num_positional_args=0,
2023-03-26T22:18:32.6515961Z E with_out=False,
2023-03-26T22:18:32.6516196Z E inplace=False,
2023-03-26T22:18:32.6516431Z E as_variable=[False],
2023-03-26T22:18:32.6516677Z E native_arrays=[False],
2023-03-26T22:18:32.6516896Z E ),
2023-03-26T22:18:32.6517140Z E on_device='cpu',
2023-03-26T22:18:32.6517401Z E frontend='jax',
2023-03-26T22:18:32.6517596Z E )
2023-03-26T22:18:32.6517777Z E
2023-03-26T22:18:32.6518264Z E You can reproduce this example by temporarily adding @reproduce_failure('6.70.0', b'AAgGAwAAAA==') as a decorator on your test case
</details>
|
test
|
fix jax numpy dtype test jax numpy can cast tensorflow img src torch img src numpy img src jax img src failed ivy tests test ivy test frontends test jax test jax numpy dtype py test jax numpy can cast e assertionerror the results from backend numpy and ground truth framework jax do not match e false true e e e falsifying example test jax numpy can cast e from e to e casting same kind e fn tree ivy functional frontends jax numpy can cast e test flags frontendfunctiontestflags e num positional args e with out false e inplace false e as variable e native arrays e e on device cpu e frontend jax e e e you can reproduce this example by temporarily adding reproduce failure b aaggawaaaa as a decorator on your test case
| 1
|
4,592
| 3,407,298,739
|
IssuesEvent
|
2015-12-04 01:47:20
|
mitchellh/packer
|
https://api.github.com/repos/mitchellh/packer
|
closed
|
vmware-vmx: HTTPIP and HTTPPort are empty in vmx_data
|
builder/vmware question
|
I'm using Packer to customize one of CoreOS's prebuild VMX/VMDKs. CoreOS has the ability to fetch its config by reading `guestinfo.coreos.config.url` from its VMX. The issue is, setting this in `vmx_data` to something like `http://{{.HTTPIP}}:{{.HTTPPort}}/cloud-config.yml` results in `http://<no value>:<no value>/cloud-config.yml`.
I believe this is because the [HTTP server is started later in the process](https://github.com/mitchellh/packer/blob/v0.8.6/builder/vmware/vmx/builder.go#L75-L79). Is it possible to move this *before* the [VMX configuration step](https://github.com/mitchellh/packer/blob/v0.8.6/builder/vmware/vmx/builder.go#L71-L73)?
|
1.0
|
vmware-vmx: HTTPIP and HTTPPort are empty in vmx_data - I'm using Packer to customize one of CoreOS's prebuild VMX/VMDKs. CoreOS has the ability to fetch its config by reading `guestinfo.coreos.config.url` from its VMX. The issue is, setting this in `vmx_data` to something like `http://{{.HTTPIP}}:{{.HTTPPort}}/cloud-config.yml` results in `http://<no value>:<no value>/cloud-config.yml`.
I believe this is because the [HTTP server is started later in the process](https://github.com/mitchellh/packer/blob/v0.8.6/builder/vmware/vmx/builder.go#L75-L79). Is it possible to move this *before* the [VMX configuration step](https://github.com/mitchellh/packer/blob/v0.8.6/builder/vmware/vmx/builder.go#L71-L73)?
|
non_test
|
vmware vmx httpip and httpport are empty in vmx data i m using packer to customize one of coreos s prebuild vmx vmdks coreos has the ability to fetch its config by reading guestinfo coreos config url from its vmx the issue is setting this in vmx data to something like results in value cloud config yml i believe this is because the is it possible to move this before the
| 0
|
568,441
| 16,979,802,082
|
IssuesEvent
|
2021-06-30 07:20:59
|
johnvanbreda/naturespot-d8
|
https://api.github.com/repos/johnvanbreda/naturespot-d8
|
closed
|
Wild Places / Parish page species links not working
|
Priority 1
|
The links to the species pages on the species list tabs of both Wild Places and Parish pages return the home page.

|
1.0
|
Wild Places / Parish page species links not working - The links to the species pages on the species list tabs of both Wild Places and Parish pages return the home page.

|
non_test
|
wild places parish page species links not working the links to the species pages on the species list tabs of both wild places and parish pages return the home page
| 0
|
95,298
| 10,869,585,810
|
IssuesEvent
|
2019-11-15 07:59:17
|
pfb1001/GESPRO_GESTION_DE_VERSIONES
|
https://api.github.com/repos/pfb1001/GESPRO_GESTION_DE_VERSIONES
|
closed
|
Pasar memoria doc a latex
|
documentation
|
* Revisar imágenes.
* Revisar bibliografía.
* bibentry (http://gking.harvard.edu/files/bibentry2.pdf).
### Documentación
* [x] Resumen
* [x] Introducción
* [x] Objetivos del proyecto
* [x] Conceptos teóricos
* [x] Técnicas y herramientas
* [x] Aspectos relevantes
* [x] Trabajos relacionados
* [x] Conclusiones y Líneas de trabajo futuras
|
1.0
|
Pasar memoria doc a latex - * Revisar imágenes.
* Revisar bibliografía.
* bibentry (http://gking.harvard.edu/files/bibentry2.pdf).
### Documentación
* [x] Resumen
* [x] Introducción
* [x] Objetivos del proyecto
* [x] Conceptos teóricos
* [x] Técnicas y herramientas
* [x] Aspectos relevantes
* [x] Trabajos relacionados
* [x] Conclusiones y Líneas de trabajo futuras
|
non_test
|
pasar memoria doc a latex revisar imágenes revisar bibliografía bibentry documentación resumen introducción objetivos del proyecto conceptos teóricos técnicas y herramientas aspectos relevantes trabajos relacionados conclusiones y líneas de trabajo futuras
| 0
|
276,379
| 23,990,015,035
|
IssuesEvent
|
2022-09-13 23:32:00
|
Azure/azure-sdk-tools
|
https://api.github.com/repos/Azure/azure-sdk-tools
|
closed
|
Shorten internal assets SHA link
|
Asset-Sync Test-Proxy
|
Right now, it's
```text
<language repo root>
/.assets
/Azure/azure-sdk-assets
/<SHA generated from relative path of assets.json>
/<cloned recordings>
```
I want to get that down to a single 10 character directory so that the structure is instead.
```text
<language repo root>
/.assets
/<10 character SHA generated from combined assets repo and relative path>
/<cloned recordings>
```
|
1.0
|
Shorten internal assets SHA link - Right now, it's
```text
<language repo root>
/.assets
/Azure/azure-sdk-assets
/<SHA generated from relative path of assets.json>
/<cloned recordings>
```
I want to get that down to a single 10 character directory so that the structure is instead.
```text
<language repo root>
/.assets
/<10 character SHA generated from combined assets repo and relative path>
/<cloned recordings>
```
|
test
|
shorten internal assets sha link right now it s text assets azure azure sdk assets i want to get that down to a single character directory so that the structure is instead text assets
| 1
|
121,588
| 10,180,013,583
|
IssuesEvent
|
2019-08-09 09:14:31
|
sylabs/singularity
|
https://api.github.com/repos/sylabs/singularity
|
closed
|
[E2E] Improve coverage for verify command
|
Testing e2e
|
## Version of Singularity:
All.
### Expected behavior
All commands expected to succeed should be tested.
Part of issue #4078
### Actual behavior
- [ ] singularity verify --groupid
- [ ] singularity verify --id
- [ ] singularity verify --url
### Steps to reproduce behavior
N/A.
|
1.0
|
[E2E] Improve coverage for verify command - ## Version of Singularity:
All.
### Expected behavior
All commands expected to succeed should be tested.
Part of issue #4078
### Actual behavior
- [ ] singularity verify --groupid
- [ ] singularity verify --id
- [ ] singularity verify --url
### Steps to reproduce behavior
N/A.
|
test
|
improve coverage for verify command version of singularity all expected behavior all commands expected to succeed should be tested part of issue actual behavior singularity verify groupid singularity verify id singularity verify url steps to reproduce behavior n a
| 1
|
378,876
| 26,342,121,358
|
IssuesEvent
|
2023-01-10 18:34:50
|
Epistimio/orion
|
https://api.github.com/repos/Epistimio/orion
|
opened
|
Add testing to checkpointing tutorial
|
documentation ci
|
There is no testing on the checkpointing tutorial: https://orion.readthedocs.io/en/stable/auto_tutorials/code_2_hyperband_checkpoint.html. Once we setup a local github worker to run the SpeechBrain tutorial tests (https://github.com/Epistimio/orion/pull/1007), we should also setup tests for the checkpointing tutorial.
|
1.0
|
Add testing to checkpointing tutorial - There is no testing on the checkpointing tutorial: https://orion.readthedocs.io/en/stable/auto_tutorials/code_2_hyperband_checkpoint.html. Once we setup a local github worker to run the SpeechBrain tutorial tests (https://github.com/Epistimio/orion/pull/1007), we should also setup tests for the checkpointing tutorial.
|
non_test
|
add testing to checkpointing tutorial there is no testing on the checkpointing tutorial once we setup a local github worker to run the speechbrain tutorial tests we should also setup tests for the checkpointing tutorial
| 0
|
63,202
| 15,500,045,336
|
IssuesEvent
|
2021-03-11 08:49:02
|
SciML/ModelingToolkit.jl
|
https://api.github.com/repos/SciML/ModelingToolkit.jl
|
closed
|
build_function (CTarget) generates wrong code
|
build_targets
|
The following model contains the cubic term `Δq^3 = (q - θ)^3`. This term does not appear to be present in the generated c-code, reproduced below
```julia
@parameters t, k, k₃, Jₘ, Jₐ, c, tx
@variables θ(t) q(t) #u(t)
@derivatives D'~t
Δq = q - θ
Δv = (D(q) - D(θ))
eqs = [
D(D(q)) ~ -(k * Δq + k₃ * Δq^3 + c * (Δv)) / Jₘ
D(D(θ)) ~ (k * Δq + k₃ * Δq^3 + c * (Δv)) / Jₐ
]
sys = ODESystem(eqs, name=:DMM) |> ode_order_lowering
ccode = build_function(
sys.eqs,
states(sys),
parameters(sys),
t,
target = ModelingToolkit.CTarget(),
)
```
```c
void diffeqf(double* du, double* RHS1, double* RHS2, double RHS3) {
du[0] = RHS1[2];
du[1] = RHS1[3];
du[2] = -((RHS2[0] * (RHS1[0] - RHS1[1]) + RHS2[3] * (RHS1[2] - RHS1[3]))) / RHS2[1];
du[3] = (RHS2[0] * (RHS1[0] - RHS1[1]) + RHS2[3] * (RHS1[2] - RHS1[3])) / RHS2[2];
}
```
The `sys.eqs` does correctly contain the cubic terms
```julia
julia> sys.eqs
4-element Array{Equation,1}:
Equation(derivative(qˍt(t), t), -(((k * (q(t) - θ(t)) + k₃ * (q(t) - θ(t)) ^ 3) + c * (qˍt(t) - θˍt(t)))) / Jₘ)
Equation(derivative(θˍt(t), t), ((k * (q(t) - θ(t)) + k₃ * (q(t) - θ(t)) ^ 3) + c * (qˍt(t) - θˍt(t))) / Jₐ)
Equation(derivative(q(t), t), qˍt(t))
Equation(derivative(θ(t), t), θˍt(t))
```
|
1.0
|
build_function (CTarget) generates wrong code - The following model contains the cubic term `Δq^3 = (q - θ)^3`. This term does not appear to be present in the generated c-code, reproduced below
```julia
@parameters t, k, k₃, Jₘ, Jₐ, c, tx
@variables θ(t) q(t) #u(t)
@derivatives D'~t
Δq = q - θ
Δv = (D(q) - D(θ))
eqs = [
D(D(q)) ~ -(k * Δq + k₃ * Δq^3 + c * (Δv)) / Jₘ
D(D(θ)) ~ (k * Δq + k₃ * Δq^3 + c * (Δv)) / Jₐ
]
sys = ODESystem(eqs, name=:DMM) |> ode_order_lowering
ccode = build_function(
sys.eqs,
states(sys),
parameters(sys),
t,
target = ModelingToolkit.CTarget(),
)
```
```c
void diffeqf(double* du, double* RHS1, double* RHS2, double RHS3) {
du[0] = RHS1[2];
du[1] = RHS1[3];
du[2] = -((RHS2[0] * (RHS1[0] - RHS1[1]) + RHS2[3] * (RHS1[2] - RHS1[3]))) / RHS2[1];
du[3] = (RHS2[0] * (RHS1[0] - RHS1[1]) + RHS2[3] * (RHS1[2] - RHS1[3])) / RHS2[2];
}
```
The `sys.eqs` does correctly contain the cubic terms
```julia
julia> sys.eqs
4-element Array{Equation,1}:
Equation(derivative(qˍt(t), t), -(((k * (q(t) - θ(t)) + k₃ * (q(t) - θ(t)) ^ 3) + c * (qˍt(t) - θˍt(t)))) / Jₘ)
Equation(derivative(θˍt(t), t), ((k * (q(t) - θ(t)) + k₃ * (q(t) - θ(t)) ^ 3) + c * (qˍt(t) - θˍt(t))) / Jₐ)
Equation(derivative(q(t), t), qˍt(t))
Equation(derivative(θ(t), t), θˍt(t))
```
|
non_test
|
build function ctarget generates wrong code the following model contains the cubic term δq q θ this term does not appear to be present in the generated c code reproduced below julia parameters t k k₃ jₘ jₐ c tx variables θ t q t u t derivatives d t δq q θ δv d q d θ eqs d d q k δq k₃ δq c δv jₘ d d θ k δq k₃ δq c δv jₐ sys odesystem eqs name dmm ode order lowering ccode build function sys eqs states sys parameters sys t target modelingtoolkit ctarget c void diffeqf double du double double double du du du du the sys eqs does correctly contain the cubic terms julia julia sys eqs element array equation equation derivative qˍt t t k q t θ t k₃ q t θ t c qˍt t θˍt t jₘ equation derivative θˍt t t k q t θ t k₃ q t θ t c qˍt t θˍt t jₐ equation derivative q t t qˍt t equation derivative θ t t θˍt t
| 0
|
168,778
| 13,102,420,069
|
IssuesEvent
|
2020-08-04 06:40:14
|
elastic/cloud-on-k8s
|
https://api.github.com/repos/elastic/cloud-on-k8s
|
closed
|
TestUpdateKibanaSecureSettings is flaky
|
>flaky_test v1.2.1
|
https://devops-ci.elastic.co/job/cloud-on-k8s-e2e-tests-snapshot-versions/106/testReport/
```
=== RUN TestUpdateKibanaSecureSettings/secure_settings_should_eventually_be_set_in_all_nodes_keystore
Retries (5m0s timeout): ................................................................................
utils.go:84:
Error Trace: utils.go:84
Error: Received unexpected error:
invalid keystore entries. Expected: [logging.verbose]. Actual: []
Test: TestUpdateKibanaSecureSettings/secure_settings_should_eventually_be_set_in_all_nodes_keystore
```
|
1.0
|
TestUpdateKibanaSecureSettings is flaky - https://devops-ci.elastic.co/job/cloud-on-k8s-e2e-tests-snapshot-versions/106/testReport/
```
=== RUN TestUpdateKibanaSecureSettings/secure_settings_should_eventually_be_set_in_all_nodes_keystore
Retries (5m0s timeout): ................................................................................
utils.go:84:
Error Trace: utils.go:84
Error: Received unexpected error:
invalid keystore entries. Expected: [logging.verbose]. Actual: []
Test: TestUpdateKibanaSecureSettings/secure_settings_should_eventually_be_set_in_all_nodes_keystore
```
|
test
|
testupdatekibanasecuresettings is flaky run testupdatekibanasecuresettings secure settings should eventually be set in all nodes keystore retries timeout utils go error trace utils go error received unexpected error invalid keystore entries expected actual test testupdatekibanasecuresettings secure settings should eventually be set in all nodes keystore
| 1
|
144,413
| 11,615,552,810
|
IssuesEvent
|
2020-02-26 14:23:51
|
ansible/awx
|
https://api.github.com/repos/ansible/awx
|
closed
|
Remove style overrides on Patternfly components and layouts
|
component:ui_next priority:medium state:needs_test
|
##### ISSUE TYPE
- Task
##### SUMMARY
We're moving away from our small style tweaks to stock Patternfly components in favor of using them out of the box. This means that things like [app.scss](https://github.com/ansible/awx/blob/devel/awx/ui_next/src/app.scss) and [Chip.jsx](https://github.com/ansible/awx/blob/devel/awx/ui_next/src/components/Chip/Chip.jsx) have got to go. This issue covers searching for and removing as many of those overriding styles as possible.
|
1.0
|
Remove style overrides on Patternfly components and layouts - ##### ISSUE TYPE
- Task
##### SUMMARY
We're moving away from our small style tweaks to stock Patternfly components in favor of using them out of the box. This means that things like [app.scss](https://github.com/ansible/awx/blob/devel/awx/ui_next/src/app.scss) and [Chip.jsx](https://github.com/ansible/awx/blob/devel/awx/ui_next/src/components/Chip/Chip.jsx) have got to go. This issue covers searching for and removing as many of those overriding styles as possible.
|
test
|
remove style overrides on patternfly components and layouts issue type task summary we re moving away from our small style tweaks to stock patternfly components in favor of using them out of the box this means that things like and have got to go this issue covers searching for and removing as many of those overriding styles as possible
| 1
|
32,047
| 2,743,371,738
|
IssuesEvent
|
2015-04-21 21:20:32
|
nprapps/graeae
|
https://api.github.com/repos/nprapps/graeae
|
closed
|
Seamus: is scraping by "date=current" going to mean we miss things?
|
Priority: High
|
If the story and pub dates diverge by more than a day? How does the dating work?
|
1.0
|
Seamus: is scraping by "date=current" going to mean we miss things? - If the story and pub dates diverge by more than a day? How does the dating work?
|
non_test
|
seamus is scraping by date current going to mean we miss things if the story and pub dates diverge by more than a day how does the dating work
| 0
|
7,863
| 2,938,440,772
|
IssuesEvent
|
2015-07-01 10:47:20
|
pfnet/chainer
|
https://api.github.com/repos/pfnet/chainer
|
closed
|
Make tests for examples
|
test
|
I want to run examples in CI environment to check their correctness.
|
1.0
|
Make tests for examples - I want to run examples in CI environment to check their correctness.
|
test
|
make tests for examples i want to run examples in ci environment to check their correctness
| 1
|
235,807
| 19,430,297,906
|
IssuesEvent
|
2021-12-21 11:07:55
|
cockroachdb/cockroach
|
https://api.github.com/repos/cockroachdb/cockroach
|
closed
|
roachtest: jepsen/monotonic/start-stop-2 failed
|
C-test-failure O-robot O-roachtest branch-master release-blocker
|
roachtest.jepsen/monotonic/start-stop-2 [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=3948712&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=3948712&tab=artifacts#/jepsen/monotonic/start-stop-2) on master @ [3f95a4bd83cce2952a12497de82692866b4da659](https://github.com/cockroachdb/cockroach/commits/3f95a4bd83cce2952a12497de82692866b4da659):
```
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2050
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runJepsen.func1
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/jepsen.go:172
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runJepsen.func3
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/jepsen.go:210
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1581
Wraps: (2) output in run_133253.609285337_n6_bash
Wraps: (3) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-3948712-1639818405-70-n6cpu4:6 -- bash -e -c "\
| cd /mnt/data1/jepsen/cockroachdb && set -eo pipefail && \
| ~/lein run test \
| --tarball file://${PWD}/cockroach.tgz \
| --username ${USER} \
| --ssh-private-key ~/.ssh/id_rsa \
| --os ubuntu \
| --time-limit 300 \
| --concurrency 30 \
| --recovery-time 25 \
| --test-count 1 \
| -n 10.142.1.24 -n 10.142.0.252 -n 10.142.1.154 -n 10.142.1.155 -n 10.142.0.250 \
| --test monotonic --nemesis start-stop-2 \
| > invoke.log 2>&1 \
| " returned
| stderr:
| Error: SSH_PROBLEM: exit status 255
| (1) SSH_PROBLEM
| Wraps: (2) Node 6. Command with error:
| | ``````
| | bash -e -c "\
| | cd /mnt/data1/jepsen/cockroachdb && set -eo pipefail && \
| | ~/lein run test \
| | --tarball file://${PWD}/cockroach.tgz \
| | --username ${USER} \
| | --ssh-private-key ~/.ssh/id_rsa \
| | --os ubuntu \
| | --time-limit 300 \
| | --concurrency 30 \
| | --recovery-time 25 \
| | --test-count 1 \
| | -n 10.142.1.24 -n 10.142.0.252 -n 10.142.1.154 -n 10.142.1.155 -n 10.142.0.250 \
| | --test monotonic --nemesis start-stop-2 \
| | > invoke.log 2>&1 \
| | "
| | ``````
| Wraps: (3) exit status 255
| Error types: (1) errors.SSH (2) *hintdetail.withDetail (3) *exec.ExitError
|
| stdout:
Wraps: (4) exit status 10
Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *cluster.WithCommandDetails (4) *exec.ExitError
```
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/kv-triage
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*jepsen/monotonic/start-stop-2.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
|
2.0
|
roachtest: jepsen/monotonic/start-stop-2 failed - roachtest.jepsen/monotonic/start-stop-2 [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=3948712&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=3948712&tab=artifacts#/jepsen/monotonic/start-stop-2) on master @ [3f95a4bd83cce2952a12497de82692866b4da659](https://github.com/cockroachdb/cockroach/commits/3f95a4bd83cce2952a12497de82692866b4da659):
```
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2050
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runJepsen.func1
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/jepsen.go:172
| github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests.runJepsen.func3
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/tests/jepsen.go:210
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1581
Wraps: (2) output in run_133253.609285337_n6_bash
Wraps: (3) /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-3948712-1639818405-70-n6cpu4:6 -- bash -e -c "\
| cd /mnt/data1/jepsen/cockroachdb && set -eo pipefail && \
| ~/lein run test \
| --tarball file://${PWD}/cockroach.tgz \
| --username ${USER} \
| --ssh-private-key ~/.ssh/id_rsa \
| --os ubuntu \
| --time-limit 300 \
| --concurrency 30 \
| --recovery-time 25 \
| --test-count 1 \
| -n 10.142.1.24 -n 10.142.0.252 -n 10.142.1.154 -n 10.142.1.155 -n 10.142.0.250 \
| --test monotonic --nemesis start-stop-2 \
| > invoke.log 2>&1 \
| " returned
| stderr:
| Error: SSH_PROBLEM: exit status 255
| (1) SSH_PROBLEM
| Wraps: (2) Node 6. Command with error:
| | ``````
| | bash -e -c "\
| | cd /mnt/data1/jepsen/cockroachdb && set -eo pipefail && \
| | ~/lein run test \
| | --tarball file://${PWD}/cockroach.tgz \
| | --username ${USER} \
| | --ssh-private-key ~/.ssh/id_rsa \
| | --os ubuntu \
| | --time-limit 300 \
| | --concurrency 30 \
| | --recovery-time 25 \
| | --test-count 1 \
| | -n 10.142.1.24 -n 10.142.0.252 -n 10.142.1.154 -n 10.142.1.155 -n 10.142.0.250 \
| | --test monotonic --nemesis start-stop-2 \
| | > invoke.log 2>&1 \
| | "
| | ``````
| Wraps: (3) exit status 255
| Error types: (1) errors.SSH (2) *hintdetail.withDetail (3) *exec.ExitError
|
| stdout:
Wraps: (4) exit status 10
Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *cluster.WithCommandDetails (4) *exec.ExitError
```
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/kv-triage
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*jepsen/monotonic/start-stop-2.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
|
test
|
roachtest jepsen monotonic start stop failed roachtest jepsen monotonic start stop with on master home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go github com cockroachdb cockroach pkg cmd roachtest tests runjepsen home agent work go src github com cockroachdb cockroach pkg cmd roachtest tests jepsen go github com cockroachdb cockroach pkg cmd roachtest tests runjepsen home agent work go src github com cockroachdb cockroach pkg cmd roachtest tests jepsen go runtime goexit usr local go src runtime asm s wraps output in run bash wraps home agent work go src github com cockroachdb cockroach bin roachprod run teamcity bash e c cd mnt jepsen cockroachdb set eo pipefail lein run test tarball file pwd cockroach tgz username user ssh private key ssh id rsa os ubuntu time limit concurrency recovery time test count n n n n n test monotonic nemesis start stop invoke log returned stderr error ssh problem exit status ssh problem wraps node command with error bash e c cd mnt jepsen cockroachdb set eo pipefail lein run test tarball file pwd cockroach tgz username user ssh private key ssh id rsa os ubuntu time limit concurrency recovery time test count n n n n n test monotonic nemesis start stop invoke log wraps exit status error types errors ssh hintdetail withdetail exec exiterror stdout wraps exit status error types withstack withstack errutil withprefix cluster withcommanddetails exec exiterror help see see cc cockroachdb kv triage
| 1
|
158,889
| 20,035,490,399
|
IssuesEvent
|
2022-02-02 11:25:00
|
kapseliboi/coronavirus-dashboard
|
https://api.github.com/repos/kapseliboi/coronavirus-dashboard
|
opened
|
CVE-2018-11694 (High) detected in node-sass-4.14.1.tgz
|
security vulnerability
|
## CVE-2018-11694 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sass-4.14.1.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-sass-4.14.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/coronavirus-dashboard/commit/4c0d18fe8dc22b989e9017e943fc5b7d5ef1d8d7">4c0d18fe8dc22b989e9017e943fc5b7d5ef1d8d7</a></p>
<p>Found in base branch: <b>v3-development</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Functions::selector_append which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11694>CVE-2018-11694</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sass/libsass/releases/tag/3.6.0">https://github.com/sass/libsass/releases/tag/3.6.0</a></p>
<p>Release Date: 2018-06-04</p>
<p>Fix Resolution: 5.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2018-11694 (High) detected in node-sass-4.14.1.tgz - ## CVE-2018-11694 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sass-4.14.1.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-sass-4.14.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kapseliboi/coronavirus-dashboard/commit/4c0d18fe8dc22b989e9017e943fc5b7d5ef1d8d7">4c0d18fe8dc22b989e9017e943fc5b7d5ef1d8d7</a></p>
<p>Found in base branch: <b>v3-development</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Functions::selector_append which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-11694>CVE-2018-11694</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sass/libsass/releases/tag/3.6.0">https://github.com/sass/libsass/releases/tag/3.6.0</a></p>
<p>Release Date: 2018-06-04</p>
<p>Fix Resolution: 5.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_test
|
cve high detected in node sass tgz cve high severity vulnerability vulnerable library node sass tgz wrapper around libsass library home page a href path to dependency file package json path to vulnerable library node modules node sass package json dependency hierarchy x node sass tgz vulnerable library found in head commit a href found in base branch development vulnerability details an issue was discovered in libsass through a null pointer dereference was found in the function sass functions selector append which could be leveraged by an attacker to cause a denial of service application crash or possibly have unspecified other impact publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
| 0
|
322,700
| 27,625,919,930
|
IssuesEvent
|
2023-03-10 06:45:01
|
cockroachdb/cockroach
|
https://api.github.com/repos/cockroachdb/cockroach
|
opened
|
pkg/ccl/importerccl/importerccl_test: TestImportMultiRegion failed
|
C-test-failure O-robot branch-master
|
pkg/ccl/importerccl/importerccl_test.TestImportMultiRegion [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/8997899?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/8997899?buildTab=artifacts#/) on master @ [d4a584e49f0b1ca89738376090939d7669c3b3db](https://github.com/cockroachdb/cockroach/commits/d4a584e49f0b1ca89738376090939d7669c3b3db):
```
github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:237 +0x9a
github.com/cockroachdb/cockroach/pkg/testutils/testcluster.NewTestCluster()
github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:333 +0xcec
github.com/cockroachdb/cockroach/pkg/testutils/testcluster.NewTestCluster()
github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:333 +0xcec
github.com/cockroachdb/cockroach/pkg/testutils/testcluster.StartTestCluster()
github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:236 +0x7d
github.com/cockroachdb/cockroach/pkg/ccl/multiregionccl/multiregionccltestutils.TestingCreateMultiRegionClusterWithRegionList()
github.com/cockroachdb/cockroach/pkg/ccl/multiregionccl/multiregionccltestutils/testutils.go:128 +0x1e4
github.com/cockroachdb/cockroach/pkg/ccl/multiregionccl/multiregionccltestutils.TestingCreateMultiRegionCluster()
github.com/cockroachdb/cockroach/pkg/ccl/multiregionccl/multiregionccltestutils/testutils.go:79 +0x1ef
pkg/ccl/importerccl/importerccl_test.TestImportMultiRegion()
pkg/ccl/importerccl/importerccl_test/pkg/ccl/importerccl/ccl_test.go:61 +0x19b
testing.tRunner()
GOROOT/src/testing/testing.go:1446 +0x216
testing.(*T).Run.func1()
GOROOT/src/testing/testing.go:1493 +0x47
Goroutine 11875 (running) created at:
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).resumeClaimedJobs()
github.com/cockroachdb/cockroach/pkg/jobs/adopt.go:208 +0x1b7
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).processClaimedJobs()
github.com/cockroachdb/cockroach/pkg/jobs/adopt.go:192 +0x470
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).Start.func7()
github.com/cockroachdb/cockroach/pkg/jobs/registry.go:1063 +0x150
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).withSession()
github.com/cockroachdb/cockroach/pkg/jobs/registry.go:958 +0x301
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).Start.func13()
github.com/cockroachdb/cockroach/pkg/jobs/registry.go:974 +0x52
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).Start.func10()
github.com/cockroachdb/cockroach/pkg/jobs/registry.go:1145 +0x42d
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTaskEx.func2()
github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:470 +0x1f6
Goroutine 36 (running) created at:
testing.(*T).Run()
GOROOT/src/testing/testing.go:1493 +0x75d
testing.runTests.func1()
GOROOT/src/testing/testing.go:1846 +0x99
testing.tRunner()
GOROOT/src/testing/testing.go:1446 +0x216
testing.runTests()
GOROOT/src/testing/testing.go:1844 +0x7ec
testing.(*M).Run()
GOROOT/src/testing/testing.go:1726 +0xa84
pkg/ccl/importerccl/importerccl_test.TestMain()
pkg/ccl/importerccl/importerccl_test/pkg/ccl/importerccl/main_test.go:31 +0x1c9
main.main()
main/bazel-out/k8-fastbuild/bin/pkg/ccl/importerccl/importerccl_test_/testmain.go:117 +0x748
==================
```
<p>Parameters: <code>TAGS=bazel,gss,race</code>
</p>
<details><summary>Help</summary>
<p>
See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM)
</p>
</details>
<details><summary>Same failure on other branches</summary>
<p>
- #79412 pkg/ccl/importerccl/importerccl_test: TestImportMultiRegion failed [C-test-failure O-robot branch-release-22.1]
</p>
</details>
/cc @cockroachdb/sql-sessions
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestImportMultiRegion.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
|
1.0
|
pkg/ccl/importerccl/importerccl_test: TestImportMultiRegion failed - pkg/ccl/importerccl/importerccl_test.TestImportMultiRegion [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/8997899?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/8997899?buildTab=artifacts#/) on master @ [d4a584e49f0b1ca89738376090939d7669c3b3db](https://github.com/cockroachdb/cockroach/commits/d4a584e49f0b1ca89738376090939d7669c3b3db):
```
github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:237 +0x9a
github.com/cockroachdb/cockroach/pkg/testutils/testcluster.NewTestCluster()
github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:333 +0xcec
github.com/cockroachdb/cockroach/pkg/testutils/testcluster.NewTestCluster()
github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:333 +0xcec
github.com/cockroachdb/cockroach/pkg/testutils/testcluster.StartTestCluster()
github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:236 +0x7d
github.com/cockroachdb/cockroach/pkg/ccl/multiregionccl/multiregionccltestutils.TestingCreateMultiRegionClusterWithRegionList()
github.com/cockroachdb/cockroach/pkg/ccl/multiregionccl/multiregionccltestutils/testutils.go:128 +0x1e4
github.com/cockroachdb/cockroach/pkg/ccl/multiregionccl/multiregionccltestutils.TestingCreateMultiRegionCluster()
github.com/cockroachdb/cockroach/pkg/ccl/multiregionccl/multiregionccltestutils/testutils.go:79 +0x1ef
pkg/ccl/importerccl/importerccl_test.TestImportMultiRegion()
pkg/ccl/importerccl/importerccl_test/pkg/ccl/importerccl/ccl_test.go:61 +0x19b
testing.tRunner()
GOROOT/src/testing/testing.go:1446 +0x216
testing.(*T).Run.func1()
GOROOT/src/testing/testing.go:1493 +0x47
Goroutine 11875 (running) created at:
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).resumeClaimedJobs()
github.com/cockroachdb/cockroach/pkg/jobs/adopt.go:208 +0x1b7
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).processClaimedJobs()
github.com/cockroachdb/cockroach/pkg/jobs/adopt.go:192 +0x470
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).Start.func7()
github.com/cockroachdb/cockroach/pkg/jobs/registry.go:1063 +0x150
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).withSession()
github.com/cockroachdb/cockroach/pkg/jobs/registry.go:958 +0x301
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).Start.func13()
github.com/cockroachdb/cockroach/pkg/jobs/registry.go:974 +0x52
github.com/cockroachdb/cockroach/pkg/jobs.(*Registry).Start.func10()
github.com/cockroachdb/cockroach/pkg/jobs/registry.go:1145 +0x42d
github.com/cockroachdb/cockroach/pkg/util/stop.(*Stopper).RunAsyncTaskEx.func2()
github.com/cockroachdb/cockroach/pkg/util/stop/stopper.go:470 +0x1f6
Goroutine 36 (running) created at:
testing.(*T).Run()
GOROOT/src/testing/testing.go:1493 +0x75d
testing.runTests.func1()
GOROOT/src/testing/testing.go:1846 +0x99
testing.tRunner()
GOROOT/src/testing/testing.go:1446 +0x216
testing.runTests()
GOROOT/src/testing/testing.go:1844 +0x7ec
testing.(*M).Run()
GOROOT/src/testing/testing.go:1726 +0xa84
pkg/ccl/importerccl/importerccl_test.TestMain()
pkg/ccl/importerccl/importerccl_test/pkg/ccl/importerccl/main_test.go:31 +0x1c9
main.main()
main/bazel-out/k8-fastbuild/bin/pkg/ccl/importerccl/importerccl_test_/testmain.go:117 +0x748
==================
```
<p>Parameters: <code>TAGS=bazel,gss,race</code>
</p>
<details><summary>Help</summary>
<p>
See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM)
</p>
</details>
<details><summary>Same failure on other branches</summary>
<p>
- #79412 pkg/ccl/importerccl/importerccl_test: TestImportMultiRegion failed [C-test-failure O-robot branch-release-22.1]
</p>
</details>
/cc @cockroachdb/sql-sessions
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestImportMultiRegion.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
|
test
|
pkg ccl importerccl importerccl test testimportmultiregion failed pkg ccl importerccl importerccl test testimportmultiregion with on master github com cockroachdb cockroach pkg testutils testcluster testcluster go github com cockroachdb cockroach pkg testutils testcluster newtestcluster github com cockroachdb cockroach pkg testutils testcluster testcluster go github com cockroachdb cockroach pkg testutils testcluster newtestcluster github com cockroachdb cockroach pkg testutils testcluster testcluster go github com cockroachdb cockroach pkg testutils testcluster starttestcluster github com cockroachdb cockroach pkg testutils testcluster testcluster go github com cockroachdb cockroach pkg ccl multiregionccl multiregionccltestutils testingcreatemultiregionclusterwithregionlist github com cockroachdb cockroach pkg ccl multiregionccl multiregionccltestutils testutils go github com cockroachdb cockroach pkg ccl multiregionccl multiregionccltestutils testingcreatemultiregioncluster github com cockroachdb cockroach pkg ccl multiregionccl multiregionccltestutils testutils go pkg ccl importerccl importerccl test testimportmultiregion pkg ccl importerccl importerccl test pkg ccl importerccl ccl test go testing trunner goroot src testing testing go testing t run goroot src testing testing go goroutine running created at github com cockroachdb cockroach pkg jobs registry resumeclaimedjobs github com cockroachdb cockroach pkg jobs adopt go github com cockroachdb cockroach pkg jobs registry processclaimedjobs github com cockroachdb cockroach pkg jobs adopt go github com cockroachdb cockroach pkg jobs registry start github com cockroachdb cockroach pkg jobs registry go github com cockroachdb cockroach pkg jobs registry withsession github com cockroachdb cockroach pkg jobs registry go github com cockroachdb cockroach pkg jobs registry start github com cockroachdb cockroach pkg jobs registry go github com cockroachdb cockroach pkg jobs registry start github com cockroachdb cockroach pkg jobs registry go github com cockroachdb cockroach pkg util stop stopper runasynctaskex github com cockroachdb cockroach pkg util stop stopper go goroutine running created at testing t run goroot src testing testing go testing runtests goroot src testing testing go testing trunner goroot src testing testing go testing runtests goroot src testing testing go testing m run goroot src testing testing go pkg ccl importerccl importerccl test testmain pkg ccl importerccl importerccl test pkg ccl importerccl main test go main main main bazel out fastbuild bin pkg ccl importerccl importerccl test testmain go parameters tags bazel gss race help see also same failure on other branches pkg ccl importerccl importerccl test testimportmultiregion failed cc cockroachdb sql sessions
| 1
|
292,382
| 25,207,358,825
|
IssuesEvent
|
2022-11-13 20:58:10
|
Test-Automation-Crash-Course-24-10-22/team_05
|
https://api.github.com/repos/Test-Automation-Crash-Course-24-10-22/team_05
|
opened
|
Test case 2. Oliinyk Vlad
|
TestCase
|
**Descriptions:**
Check if function Installing app for mobile device
**Preconditions:**
1. Open the website https://rozetka.com.ua/ua/
**Test steps**
| Title | Step | Expected result |
| ------------- | ------------- | ------------- |
| Installing app for mobile device | Click the button "Downoload application for IOS |User have redirect for site "Apple" |
| | Page with application "Rozetka" available |Application available for downoload in region Ukraine|
|
1.0
|
Test case 2. Oliinyk Vlad - **Descriptions:**
Check if function Installing app for mobile device
**Preconditions:**
1. Open the website https://rozetka.com.ua/ua/
**Test steps**
| Title | Step | Expected result |
| ------------- | ------------- | ------------- |
| Installing app for mobile device | Click the button "Downoload application for IOS |User have redirect for site "Apple" |
| | Page with application "Rozetka" available |Application available for downoload in region Ukraine|
|
test
|
test case oliinyk vlad descriptions check if function installing app for mobile device preconditions open the website test steps title step expected result installing app for mobile device click the button downoload application for ios user have redirect for site apple page with application rozetka available application available for downoload in region ukraine
| 1
|
160,771
| 20,118,451,084
|
IssuesEvent
|
2022-02-07 22:19:16
|
sureng-ws-ibm/t1
|
https://api.github.com/repos/sureng-ws-ibm/t1
|
opened
|
grunt-1.0.3.tgz: 7 vulnerabilities (highest severity is: 9.8)
|
security vulnerability
|
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>grunt-1.0.3.tgz</b></p></summary>
<p>The JavaScript Task Runner</p>
<p>Library home page: <a href="https://registry.npmjs.org/grunt/-/grunt-1.0.3.tgz">https://registry.npmjs.org/grunt/-/grunt-1.0.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/grunt/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2020-28282](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28282) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | getobject-0.1.0.tgz | Transitive | 1.3.0 | ✅ |
| [WS-2019-0063](https://github.com/nodeca/js-yaml/pull/480) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | js-yaml-3.5.5.tgz | Transitive | 1.0.4 | ✅ |
| [CVE-2021-33623](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33623) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | trim-newlines-1.0.0.tgz | Transitive | 1.2.0 | ✅ |
| [WS-2019-0032](https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | js-yaml-3.5.5.tgz | Transitive | 1.0.4 | ✅ |
| [CVE-2020-7729](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7729) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.1 | grunt-1.0.3.tgz | Direct | 1.3.0 | ✅ |
| [CVE-2020-7598](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | minimist-1.2.0.tgz | Transitive | 1.0.4 | ✅ |
| [CVE-2021-23362](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | hosted-git-info-2.7.1.tgz | Transitive | 1.0.4 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-28282</summary>
### Vulnerable Library - <b>getobject-0.1.0.tgz</b></p>
<p>get.and.set.deep.objects.easily = true</p>
<p>Library home page: <a href="https://registry.npmjs.org/getobject/-/getobject-0.1.0.tgz">https://registry.npmjs.org/getobject/-/getobject-0.1.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/getobject/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- grunt-legacy-util-1.1.1.tgz
- :x: **getobject-0.1.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
<p>Publish Date: 2020-12-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28282>CVE-2020-28282</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/package/getobject">https://www.npmjs.com/package/getobject</a></p>
<p>Release Date: 2020-12-29</p>
<p>Fix Resolution (getobject): 1.0.0</p>
<p>Direct dependency fix Resolution (grunt): 1.3.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0063</summary>
### Vulnerable Library - <b>js-yaml-3.5.5.tgz</b></p>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- :x: **js-yaml-3.5.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution (js-yaml): 3.13.1</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-33623</summary>
### Vulnerable Library - <b>trim-newlines-1.0.0.tgz</b></p>
<p>Trim newlines from the start and/or end of a string</p>
<p>Library home page: <a href="https://registry.npmjs.org/trim-newlines/-/trim-newlines-1.0.0.tgz">https://registry.npmjs.org/trim-newlines/-/trim-newlines-1.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/trim-newlines/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- dateformat-1.0.12.tgz
- meow-3.7.0.tgz
- :x: **trim-newlines-1.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
<p>Publish Date: 2021-05-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33623>CVE-2021-33623</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33623">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33623</a></p>
<p>Release Date: 2021-05-28</p>
<p>Fix Resolution (trim-newlines): 3.0.1</p>
<p>Direct dependency fix Resolution (grunt): 1.2.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0032</summary>
### Vulnerable Library - <b>js-yaml-3.5.5.tgz</b></p>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- :x: **js-yaml-3.5.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
<p>Publish Date: 2019-03-20
<p>URL: <a href=https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235>WS-2019-0032</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/788/versions">https://www.npmjs.com/advisories/788/versions</a></p>
<p>Release Date: 2019-03-20</p>
<p>Fix Resolution (js-yaml): 3.13.0</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7729</summary>
### Vulnerable Library - <b>grunt-1.0.3.tgz</b></p>
<p>The JavaScript Task Runner</p>
<p>Library home page: <a href="https://registry.npmjs.org/grunt/-/grunt-1.0.3.tgz">https://registry.npmjs.org/grunt/-/grunt-1.0.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/grunt/package.json</p>
<p>
Dependency Hierarchy:
- :x: **grunt-1.0.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
<p>Publish Date: 2020-09-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7729>CVE-2020-7729</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1684">https://www.npmjs.com/advisories/1684</a></p>
<p>Release Date: 2020-10-27</p>
<p>Fix Resolution: 1.3.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7598</summary>
### Vulnerable Library - <b>minimist-1.2.0.tgz</b></p>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- dateformat-1.0.12.tgz
- meow-3.7.0.tgz
- :x: **minimist-1.2.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
<p>Publish Date: 2020-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.6</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p>
<p>Release Date: 2020-03-11</p>
<p>Fix Resolution (minimist): 1.2.3</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-23362</summary>
### Vulnerable Library - <b>hosted-git-info-2.7.1.tgz</b></p>
<p>Provides metadata and conversions from repository urls for Github, Bitbucket and Gitlab</p>
<p>Library home page: <a href="https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.7.1.tgz">https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.7.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/hosted-git-info/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- dateformat-1.0.12.tgz
- meow-3.7.0.tgz
- normalize-package-data-2.4.0.tgz
- :x: **hosted-git-info-2.7.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362>CVE-2021-23362</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-43f8-2h32-f4cj">https://github.com/advisories/GHSA-43f8-2h32-f4cj</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution (hosted-git-info): 2.8.9</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.3.0","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-28282","vulnerabilityDetails":"Prototype pollution vulnerability in \u0027getobject\u0027 version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28282","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.4","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"WS-2019-0063","vulnerabilityDetails":"Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.","vulnerabilityUrl":"https://github.com/nodeca/js-yaml/pull/480","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.2.0","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-33623","vulnerabilityDetails":"The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33623","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.4","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"WS-2019-0032","vulnerabilityDetails":"Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.","vulnerabilityUrl":"https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.3.0","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-7729","vulnerabilityDetails":"The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7729","cvss3Severity":"high","cvss3Score":"7.1","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.4","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-7598","vulnerabilityDetails":"minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a \"constructor\" or \"__proto__\" payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.4","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-23362","vulnerabilityDetails":"The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> -->
|
True
|
grunt-1.0.3.tgz: 7 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>grunt-1.0.3.tgz</b></p></summary>
<p>The JavaScript Task Runner</p>
<p>Library home page: <a href="https://registry.npmjs.org/grunt/-/grunt-1.0.3.tgz">https://registry.npmjs.org/grunt/-/grunt-1.0.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/grunt/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2020-28282](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28282) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | getobject-0.1.0.tgz | Transitive | 1.3.0 | ✅ |
| [WS-2019-0063](https://github.com/nodeca/js-yaml/pull/480) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | js-yaml-3.5.5.tgz | Transitive | 1.0.4 | ✅ |
| [CVE-2021-33623](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33623) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | trim-newlines-1.0.0.tgz | Transitive | 1.2.0 | ✅ |
| [WS-2019-0032](https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | js-yaml-3.5.5.tgz | Transitive | 1.0.4 | ✅ |
| [CVE-2020-7729](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7729) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.1 | grunt-1.0.3.tgz | Direct | 1.3.0 | ✅ |
| [CVE-2020-7598](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | minimist-1.2.0.tgz | Transitive | 1.0.4 | ✅ |
| [CVE-2021-23362](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | hosted-git-info-2.7.1.tgz | Transitive | 1.0.4 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-28282</summary>
### Vulnerable Library - <b>getobject-0.1.0.tgz</b></p>
<p>get.and.set.deep.objects.easily = true</p>
<p>Library home page: <a href="https://registry.npmjs.org/getobject/-/getobject-0.1.0.tgz">https://registry.npmjs.org/getobject/-/getobject-0.1.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/getobject/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- grunt-legacy-util-1.1.1.tgz
- :x: **getobject-0.1.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
<p>Publish Date: 2020-12-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28282>CVE-2020-28282</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/package/getobject">https://www.npmjs.com/package/getobject</a></p>
<p>Release Date: 2020-12-29</p>
<p>Fix Resolution (getobject): 1.0.0</p>
<p>Direct dependency fix Resolution (grunt): 1.3.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0063</summary>
### Vulnerable Library - <b>js-yaml-3.5.5.tgz</b></p>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- :x: **js-yaml-3.5.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution (js-yaml): 3.13.1</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-33623</summary>
### Vulnerable Library - <b>trim-newlines-1.0.0.tgz</b></p>
<p>Trim newlines from the start and/or end of a string</p>
<p>Library home page: <a href="https://registry.npmjs.org/trim-newlines/-/trim-newlines-1.0.0.tgz">https://registry.npmjs.org/trim-newlines/-/trim-newlines-1.0.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/trim-newlines/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- dateformat-1.0.12.tgz
- meow-3.7.0.tgz
- :x: **trim-newlines-1.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
<p>Publish Date: 2021-05-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33623>CVE-2021-33623</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33623">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33623</a></p>
<p>Release Date: 2021-05-28</p>
<p>Fix Resolution (trim-newlines): 3.0.1</p>
<p>Direct dependency fix Resolution (grunt): 1.2.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2019-0032</summary>
### Vulnerable Library - <b>js-yaml-3.5.5.tgz</b></p>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- :x: **js-yaml-3.5.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
<p>Publish Date: 2019-03-20
<p>URL: <a href=https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235>WS-2019-0032</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/788/versions">https://www.npmjs.com/advisories/788/versions</a></p>
<p>Release Date: 2019-03-20</p>
<p>Fix Resolution (js-yaml): 3.13.0</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7729</summary>
### Vulnerable Library - <b>grunt-1.0.3.tgz</b></p>
<p>The JavaScript Task Runner</p>
<p>Library home page: <a href="https://registry.npmjs.org/grunt/-/grunt-1.0.3.tgz">https://registry.npmjs.org/grunt/-/grunt-1.0.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/grunt/package.json</p>
<p>
Dependency Hierarchy:
- :x: **grunt-1.0.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
<p>Publish Date: 2020-09-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7729>CVE-2020-7729</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/1684">https://www.npmjs.com/advisories/1684</a></p>
<p>Release Date: 2020-10-27</p>
<p>Fix Resolution: 1.3.0</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7598</summary>
### Vulnerable Library - <b>minimist-1.2.0.tgz</b></p>
<p>parse argument options</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- dateformat-1.0.12.tgz
- meow-3.7.0.tgz
- :x: **minimist-1.2.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
<p>Publish Date: 2020-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.6</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p>
<p>Release Date: 2020-03-11</p>
<p>Fix Resolution (minimist): 1.2.3</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-23362</summary>
### Vulnerable Library - <b>hosted-git-info-2.7.1.tgz</b></p>
<p>Provides metadata and conversions from repository urls for Github, Bitbucket and Gitlab</p>
<p>Library home page: <a href="https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.7.1.tgz">https://registry.npmjs.org/hosted-git-info/-/hosted-git-info-2.7.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/hosted-git-info/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- dateformat-1.0.12.tgz
- meow-3.7.0.tgz
- normalize-package-data-2.4.0.tgz
- :x: **hosted-git-info-2.7.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sureng-ws-ibm/t1/commit/98c35103c7cca4d27c850a6900767a9b0c81bda5">98c35103c7cca4d27c850a6900767a9b0c81bda5</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362>CVE-2021-23362</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.3</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-43f8-2h32-f4cj">https://github.com/advisories/GHSA-43f8-2h32-f4cj</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution (hosted-git-info): 2.8.9</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.3.0","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-28282","vulnerabilityDetails":"Prototype pollution vulnerability in \u0027getobject\u0027 version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28282","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.4","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"WS-2019-0063","vulnerabilityDetails":"Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.","vulnerabilityUrl":"https://github.com/nodeca/js-yaml/pull/480","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.2.0","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-33623","vulnerabilityDetails":"The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33623","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.4","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"WS-2019-0032","vulnerabilityDetails":"Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.","vulnerabilityUrl":"https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.3.0","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-7729","vulnerabilityDetails":"The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7729","cvss3Severity":"high","cvss3Score":"7.1","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":[null],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.4","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-7598","vulnerabilityDetails":"minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a \"constructor\" or \"__proto__\" payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598","cvss3Severity":"medium","cvss3Score":"5.6","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt","packageVersion":"1.0.3","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt:1.0.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.4","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-23362","vulnerabilityDetails":"The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23362","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> -->
|
non_test
|
grunt tgz vulnerabilities highest severity is vulnerable library grunt tgz the javascript task runner library home page a href path to dependency file package json path to vulnerable library node modules grunt package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high getobject tgz transitive ✅ high js yaml tgz transitive ✅ high trim newlines tgz transitive ✅ high js yaml tgz transitive ✅ high grunt tgz direct ✅ medium minimist tgz transitive ✅ medium hosted git info tgz transitive ✅ details cve vulnerable library getobject tgz get and set deep objects easily true library home page a href path to dependency file package json path to vulnerable library node modules getobject package json dependency hierarchy grunt tgz root library grunt legacy util tgz x getobject tgz vulnerable library found in head commit a href found in base branch develop vulnerability details prototype pollution vulnerability in getobject version allows an attacker to cause a denial of service and may lead to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution getobject direct dependency fix resolution grunt rescue worker helmet automatic remediation is available for this issue ws vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file package json path to vulnerable library node modules js yaml package json dependency hierarchy grunt tgz root library x js yaml tgz vulnerable library found in head commit a href found in base branch develop vulnerability details js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution js yaml direct dependency fix resolution grunt rescue worker helmet automatic remediation is available for this issue cve vulnerable library trim newlines tgz trim newlines from the start and or end of a string library home page a href path to dependency file package json path to vulnerable library node modules trim newlines package json dependency hierarchy grunt tgz root library dateformat tgz meow tgz x trim newlines tgz vulnerable library found in head commit a href found in base branch develop vulnerability details the trim newlines package before and x before for node js has an issue related to regular expression denial of service redos for the end method publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution trim newlines direct dependency fix resolution grunt rescue worker helmet automatic remediation is available for this issue ws vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file package json path to vulnerable library node modules js yaml package json dependency hierarchy grunt tgz root library x js yaml tgz vulnerable library found in head commit a href found in base branch develop vulnerability details versions js yaml prior to are vulnerable to denial of service by parsing a carefully crafted yaml file the node process stalls and may exhaust system resources leading to a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution js yaml direct dependency fix resolution grunt rescue worker helmet automatic remediation is available for this issue cve vulnerable library grunt tgz the javascript task runner library home page a href path to dependency file package json path to vulnerable library node modules grunt package json dependency hierarchy x grunt tgz vulnerable library found in head commit a href found in base branch develop vulnerability details the package grunt before are vulnerable to arbitrary code execution due to the default usage of the function load instead of its secure replacement safeload of the package js yaml inside grunt file readyaml publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library minimist tgz parse argument options library home page a href dependency hierarchy grunt tgz root library dateformat tgz meow tgz x minimist tgz vulnerable library found in head commit a href found in base branch develop vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimist direct dependency fix resolution grunt rescue worker helmet automatic remediation is available for this issue cve vulnerable library hosted git info tgz provides metadata and conversions from repository urls for github bitbucket and gitlab library home page a href path to dependency file package json path to vulnerable library node modules hosted git info package json dependency hierarchy grunt tgz root library dateformat tgz meow tgz normalize package data tgz x hosted git info tgz vulnerable library found in head commit a href found in base branch develop vulnerability details the package hosted git info before are vulnerable to regular expression denial of service redos via regular expression shortcutmatch in the fromurl function in index js the affected regular expression exhibits polynomial worst case time complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution hosted git info direct dependency fix resolution grunt rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue istransitivedependency false dependencytree grunt isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails prototype pollution vulnerability in version allows an attacker to cause a denial of service and may lead to remote code execution vulnerabilityurl istransitivedependency false dependencytree grunt isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file vulnerabilityurl istransitivedependency false dependencytree grunt isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the trim newlines package before and x before for node js has an issue related to regular expression denial of service redos for the end method vulnerabilityurl istransitivedependency false dependencytree grunt isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails versions js yaml prior to are vulnerable to denial of service by parsing a carefully crafted yaml file the node process stalls and may exhaust system resources leading to a denial of service vulnerabilityurl istransitivedependency false dependencytree grunt isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the package grunt before are vulnerable to arbitrary code execution due to the default usage of the function load instead of its secure replacement safeload of the package js yaml inside grunt file readyaml vulnerabilityurl istransitivedependency false dependencytree grunt isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload vulnerabilityurl istransitivedependency false dependencytree grunt isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the package hosted git info before are vulnerable to regular expression denial of service redos via regular expression shortcutmatch in the fromurl function in index js the affected regular expression exhibits polynomial worst case time complexity vulnerabilityurl
| 0
|
86,942
| 17,107,273,796
|
IssuesEvent
|
2021-07-09 20:01:53
|
paulevsGitch/BetterEnd
|
https://api.github.com/repos/paulevsGitch/BetterEnd
|
closed
|
[Suggestion] Allow recipe jsons to have an nbt tag on the output item.
|
enhancement in dev code suggestion
|
Allow recipe jsons to have an nbt tag on the output item, like this:
```
"input":
{
"item": "minecraft:book"
},
"output":
{
"item": "minecraft:enchanted_book",
"nbt": "{StoredEnchantments:[{id:\"ffenchants:buoyancy\"}]}"
},
|
1.0
|
[Suggestion] Allow recipe jsons to have an nbt tag on the output item. - Allow recipe jsons to have an nbt tag on the output item, like this:
```
"input":
{
"item": "minecraft:book"
},
"output":
{
"item": "minecraft:enchanted_book",
"nbt": "{StoredEnchantments:[{id:\"ffenchants:buoyancy\"}]}"
},
|
non_test
|
allow recipe jsons to have an nbt tag on the output item allow recipe jsons to have an nbt tag on the output item like this input item minecraft book output item minecraft enchanted book nbt storedenchantments
| 0
|
240,164
| 20,014,571,584
|
IssuesEvent
|
2022-02-01 10:42:08
|
limanmys/core
|
https://api.github.com/repos/limanmys/core
|
closed
|
Sunucu Bilgileri
|
testing
|
Sunucularda anahtar kullanılıyor ise sunucu bilgileri kısmında giriş yapmış kullanıcı gösterilmelidir.
Whoami komutunun çıktısı gösterilebilir. (Windows powershell ve linux bash'de aynı şekilde çalışmakta)

|
1.0
|
Sunucu Bilgileri - Sunucularda anahtar kullanılıyor ise sunucu bilgileri kısmında giriş yapmış kullanıcı gösterilmelidir.
Whoami komutunun çıktısı gösterilebilir. (Windows powershell ve linux bash'de aynı şekilde çalışmakta)

|
test
|
sunucu bilgileri sunucularda anahtar kullanılıyor ise sunucu bilgileri kısmında giriş yapmış kullanıcı gösterilmelidir whoami komutunun çıktısı gösterilebilir windows powershell ve linux bash de aynı şekilde çalışmakta
| 1
|
112,083
| 9,553,345,997
|
IssuesEvent
|
2019-05-02 18:59:58
|
certbot/certbot
|
https://api.github.com/repos/certbot/certbot
|
closed
|
Update INITIAL_VERSION in test_leauto_updates.sh
|
area: certbot-auto area: testing has pr
|
[This test](https://github.com/certbot/certbot/blob/master/tests/letstest/scripts/test_letsencrypt_auto_certonly_standalone.sh) no longer works on Debian 9 due to issues running the old, [INITIAL_VERSION](https://github.com/certbot/certbot/blob/60e734c9690dc84bcea968d1d2041d17cbdeec27/tests/letstest/scripts/test_leauto_upgrades.sh#L19) of `certbot-auto` which is set up to then test the upgrade to the latest version.
We can fix the problem by updating `INITIAL_VERSION` to 0.33.1 which also allows us to test on Fedora 29+.
|
1.0
|
Update INITIAL_VERSION in test_leauto_updates.sh - [This test](https://github.com/certbot/certbot/blob/master/tests/letstest/scripts/test_letsencrypt_auto_certonly_standalone.sh) no longer works on Debian 9 due to issues running the old, [INITIAL_VERSION](https://github.com/certbot/certbot/blob/60e734c9690dc84bcea968d1d2041d17cbdeec27/tests/letstest/scripts/test_leauto_upgrades.sh#L19) of `certbot-auto` which is set up to then test the upgrade to the latest version.
We can fix the problem by updating `INITIAL_VERSION` to 0.33.1 which also allows us to test on Fedora 29+.
|
test
|
update initial version in test leauto updates sh no longer works on debian due to issues running the old of certbot auto which is set up to then test the upgrade to the latest version we can fix the problem by updating initial version to which also allows us to test on fedora
| 1
|
418,977
| 12,216,182,348
|
IssuesEvent
|
2020-05-01 14:37:18
|
buddyboss/buddyboss-platform
|
https://api.github.com/repos/buddyboss/buddyboss-platform
|
closed
|
Server goes away when activate platform plugin with 60000 users
|
Has-PR bug component: activity priority: high
|
**Describe the bug**
When we activate the platform plugin with 60000 or more users server goes away.
Its happen due to function `bp_activity_favorites_upgrade_data()`
**To Reproduce**
Steps to reproduce the behavior:
1. Go to Admin
2. Click on Plugins
3. Activate BuddyBoss Platform
4. See error
**Expected behavior**
When we activate the plugin it should be activated smoothly.
**Screenshots**
http://prntscr.com/s18pqv
**Support ticket links**
https://secure.helpscout.net/conversation/1133557684/68047?folderId=3701249
https://secure.helpscout.net/conversation/1136798974/68727?folderId=3709080
|
1.0
|
Server goes away when activate platform plugin with 60000 users - **Describe the bug**
When we activate the platform plugin with 60000 or more users server goes away.
Its happen due to function `bp_activity_favorites_upgrade_data()`
**To Reproduce**
Steps to reproduce the behavior:
1. Go to Admin
2. Click on Plugins
3. Activate BuddyBoss Platform
4. See error
**Expected behavior**
When we activate the plugin it should be activated smoothly.
**Screenshots**
http://prntscr.com/s18pqv
**Support ticket links**
https://secure.helpscout.net/conversation/1133557684/68047?folderId=3701249
https://secure.helpscout.net/conversation/1136798974/68727?folderId=3709080
|
non_test
|
server goes away when activate platform plugin with users describe the bug when we activate the platform plugin with or more users server goes away its happen due to function bp activity favorites upgrade data to reproduce steps to reproduce the behavior go to admin click on plugins activate buddyboss platform see error expected behavior when we activate the plugin it should be activated smoothly screenshots support ticket links
| 0
|
543,235
| 15,879,067,940
|
IssuesEvent
|
2021-04-09 11:56:59
|
wso2/product-is
|
https://api.github.com/repos/wso2/product-is
|
closed
|
Per SP configs for consent receipt attributes
|
Priority/High Severity/Minor improvement
|
Following options should be available at the SP config level for user consent collection for SSO
- Jurisdiction
- Policy URL
- Language
|
1.0
|
Per SP configs for consent receipt attributes - Following options should be available at the SP config level for user consent collection for SSO
- Jurisdiction
- Policy URL
- Language
|
non_test
|
per sp configs for consent receipt attributes following options should be available at the sp config level for user consent collection for sso jurisdiction policy url language
| 0
|
227,917
| 18,109,773,610
|
IssuesEvent
|
2021-09-23 01:06:25
|
influxdata/ui
|
https://api.github.com/repos/influxdata/ui
|
opened
|
Telegraf Refresh: e2e test for adding a plugin to an existing Telegraf configuration
|
enhancement team/ui area/testing team/dumplings
|
Create a Cypress e2e test for Data > Sources > input plugin > Add to an existing configuration to ensure that:
- [ ] happy path of adding to an existing configuration works
- [ ] user can add a duplicate by confirming
- [ ] user can close the overlay during any step, restart from beginning, and then successfully complete happy path
- [ ] user can edit the configuration with any text
|
1.0
|
Telegraf Refresh: e2e test for adding a plugin to an existing Telegraf configuration - Create a Cypress e2e test for Data > Sources > input plugin > Add to an existing configuration to ensure that:
- [ ] happy path of adding to an existing configuration works
- [ ] user can add a duplicate by confirming
- [ ] user can close the overlay during any step, restart from beginning, and then successfully complete happy path
- [ ] user can edit the configuration with any text
|
test
|
telegraf refresh test for adding a plugin to an existing telegraf configuration create a cypress test for data sources input plugin add to an existing configuration to ensure that happy path of adding to an existing configuration works user can add a duplicate by confirming user can close the overlay during any step restart from beginning and then successfully complete happy path user can edit the configuration with any text
| 1
|
108,999
| 16,825,828,484
|
IssuesEvent
|
2021-06-17 18:25:49
|
brogers588/spring-boot
|
https://api.github.com/repos/brogers588/spring-boot
|
opened
|
CVE-2018-1000632 (High) detected in dom4j-1.6.1.jar
|
security vulnerability
|
## CVE-2018-1000632 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dom4j-1.6.1.jar</b></p></summary>
<p>dom4j: the flexible XML framework for Java</p>
<p>Library home page: <a href="http://dom4j.org">http://dom4j.org</a></p>
<p>Path to dependency file: spring-boot/spring-boot-tests/spring-boot-smoke-tests/spring-boot-smoke-test-hibernate52/build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua_20210617164721_AKFIHW/downloadResource_EFWDGU/20210617180915/dom4j-1.6.1.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-data-jpa-1.0 (Root Library)
- hibernate-core-5.2.17.Final.jar
- :x: **dom4j-1.6.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/brogers588/spring-boot/commits/12b99a3ee31b333f29415387505dfb45f75ced5f">12b99a3ee31b333f29415387505dfb45f75ced5f</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.
<p>Publish Date: 2018-08-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000632>CVE-2018-1000632</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000632">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000632</a></p>
<p>Release Date: 2018-08-20</p>
<p>Fix Resolution: org.dom4j:dom4j:2.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"dom4j","packageName":"dom4j","packageVersion":"1.6.1","packageFilePaths":["/spring-boot-tests/spring-boot-smoke-tests/spring-boot-smoke-test-hibernate52/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"spring-boot-starter-data-jpa:spring-boot-starter-data-jpa:1.0;org.hibernate:hibernate-core:5.2.17.Final;dom4j:dom4j:1.6.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.dom4j:dom4j:2.0.3"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-1000632","vulnerabilityDetails":"dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000632","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
|
True
|
CVE-2018-1000632 (High) detected in dom4j-1.6.1.jar - ## CVE-2018-1000632 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dom4j-1.6.1.jar</b></p></summary>
<p>dom4j: the flexible XML framework for Java</p>
<p>Library home page: <a href="http://dom4j.org">http://dom4j.org</a></p>
<p>Path to dependency file: spring-boot/spring-boot-tests/spring-boot-smoke-tests/spring-boot-smoke-test-hibernate52/build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua_20210617164721_AKFIHW/downloadResource_EFWDGU/20210617180915/dom4j-1.6.1.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-data-jpa-1.0 (Root Library)
- hibernate-core-5.2.17.Final.jar
- :x: **dom4j-1.6.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/brogers588/spring-boot/commits/12b99a3ee31b333f29415387505dfb45f75ced5f">12b99a3ee31b333f29415387505dfb45f75ced5f</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.
<p>Publish Date: 2018-08-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000632>CVE-2018-1000632</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000632">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000632</a></p>
<p>Release Date: 2018-08-20</p>
<p>Fix Resolution: org.dom4j:dom4j:2.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"dom4j","packageName":"dom4j","packageVersion":"1.6.1","packageFilePaths":["/spring-boot-tests/spring-boot-smoke-tests/spring-boot-smoke-test-hibernate52/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"spring-boot-starter-data-jpa:spring-boot-starter-data-jpa:1.0;org.hibernate:hibernate-core:5.2.17.Final;dom4j:dom4j:1.6.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.dom4j:dom4j:2.0.3"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-1000632","vulnerabilityDetails":"dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000632","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
|
non_test
|
cve high detected in jar cve high severity vulnerability vulnerable library jar the flexible xml framework for java library home page a href path to dependency file spring boot spring boot tests spring boot smoke tests spring boot smoke test build gradle path to vulnerable library tmp ws ua akfihw downloadresource efwdgu jar dependency hierarchy spring boot starter data jpa root library hibernate core final jar x jar vulnerable library found in head commit a href found in base branch main vulnerability details version prior to version contains a cwe xml injection vulnerability in class element methods addelement addattribute that can result in an attacker tampering with xml documents through xml injection this attack appear to be exploitable via an attacker specifying attributes or elements in the xml document this vulnerability appears to have been fixed in or later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree spring boot starter data jpa spring boot starter data jpa org hibernate hibernate core final isminimumfixversionavailable true minimumfixversion org basebranches vulnerabilityidentifier cve vulnerabilitydetails version prior to version contains a cwe xml injection vulnerability in class element methods addelement addattribute that can result in an attacker tampering with xml documents through xml injection this attack appear to be exploitable via an attacker specifying attributes or elements in the xml document this vulnerability appears to have been fixed in or later vulnerabilityurl
| 0
|
183,336
| 14,224,446,386
|
IssuesEvent
|
2020-11-17 19:41:09
|
angular/angular
|
https://api.github.com/repos/angular/angular
|
closed
|
Async in unit tests does not handle unresolved promises
|
P4 comp: docs comp: testing feature freq2: medium
|
## I'm submitting a...
<!-- Check one of the following options with "x" -->
<pre><code>
[ ] Regression (a behavior that used to work and stopped working in a new release)
[x] Bug report <!-- Please search GitHub for a similar issue or PR before submitting -->
[ ] Feature request
[ ] Documentation issue or request
[ ] Support request => Please do not submit support request here, instead see https://github.com/angular/angular/blob/master/CONTRIBUTING.md#question
</code></pre>
## Current behavior
Writing tests using async does not seem to wait for all promises to resolve.
```
it('should fail', async(() => {
const promise = new Promise(() => {});
promise.then(() => {
expect(false).toBe(true);
});
}));
```
This test should fail, but because the promise is never resolved and the test does not wait for it to be resolved it passes as success.
## Expected behavior
The test should fail or timeout because the promise is never resolved.
Base on the documentation for async test function here https://angular.io/api/core/testing/async and https://angular.io/guide/testing it seems like the intended behaviour of async is to not complete the test until all async calls are completed.
Not sure if this is a documentation problem or a bug with unresolved promises.
If this is the intended behaviour it should be described more clearly what situations async can actually be used in and what types of async calls it handles.
## Minimal reproduction of the problem with instructions
See current behaviour for a simple example using a promise that is never resolved.
This looks to be the same issue as observed in a issue from 2.0 beta when async was introduced https://github.com/angular/angular/issues/8736. But the submitter closed the issue when he found a workaround by not using async.
## What is the motivation / use case for changing the behaviour?
It currently seems unsafe to use async in tests when one is never sure if a test passed because there was no problems or because the async expect was never run.
Currently recommended our developers to stay away from async and write tests using fakeAsync so they can be written in a sync way to ensure all expects are actually executed.
## Environment
<pre><code>
Angular version: 5.0.5
</code></pre>
|
1.0
|
Async in unit tests does not handle unresolved promises - ## I'm submitting a...
<!-- Check one of the following options with "x" -->
<pre><code>
[ ] Regression (a behavior that used to work and stopped working in a new release)
[x] Bug report <!-- Please search GitHub for a similar issue or PR before submitting -->
[ ] Feature request
[ ] Documentation issue or request
[ ] Support request => Please do not submit support request here, instead see https://github.com/angular/angular/blob/master/CONTRIBUTING.md#question
</code></pre>
## Current behavior
Writing tests using async does not seem to wait for all promises to resolve.
```
it('should fail', async(() => {
const promise = new Promise(() => {});
promise.then(() => {
expect(false).toBe(true);
});
}));
```
This test should fail, but because the promise is never resolved and the test does not wait for it to be resolved it passes as success.
## Expected behavior
The test should fail or timeout because the promise is never resolved.
Base on the documentation for async test function here https://angular.io/api/core/testing/async and https://angular.io/guide/testing it seems like the intended behaviour of async is to not complete the test until all async calls are completed.
Not sure if this is a documentation problem or a bug with unresolved promises.
If this is the intended behaviour it should be described more clearly what situations async can actually be used in and what types of async calls it handles.
## Minimal reproduction of the problem with instructions
See current behaviour for a simple example using a promise that is never resolved.
This looks to be the same issue as observed in a issue from 2.0 beta when async was introduced https://github.com/angular/angular/issues/8736. But the submitter closed the issue when he found a workaround by not using async.
## What is the motivation / use case for changing the behaviour?
It currently seems unsafe to use async in tests when one is never sure if a test passed because there was no problems or because the async expect was never run.
Currently recommended our developers to stay away from async and write tests using fakeAsync so they can be written in a sync way to ensure all expects are actually executed.
## Environment
<pre><code>
Angular version: 5.0.5
</code></pre>
|
test
|
async in unit tests does not handle unresolved promises i m submitting a regression a behavior that used to work and stopped working in a new release bug report feature request documentation issue or request support request please do not submit support request here instead see current behavior writing tests using async does not seem to wait for all promises to resolve it should fail async const promise new promise promise then expect false tobe true this test should fail but because the promise is never resolved and the test does not wait for it to be resolved it passes as success expected behavior the test should fail or timeout because the promise is never resolved base on the documentation for async test function here and it seems like the intended behaviour of async is to not complete the test until all async calls are completed not sure if this is a documentation problem or a bug with unresolved promises if this is the intended behaviour it should be described more clearly what situations async can actually be used in and what types of async calls it handles minimal reproduction of the problem with instructions see current behaviour for a simple example using a promise that is never resolved this looks to be the same issue as observed in a issue from beta when async was introduced but the submitter closed the issue when he found a workaround by not using async what is the motivation use case for changing the behaviour it currently seems unsafe to use async in tests when one is never sure if a test passed because there was no problems or because the async expect was never run currently recommended our developers to stay away from async and write tests using fakeasync so they can be written in a sync way to ensure all expects are actually executed environment angular version
| 1
|
39,491
| 9,487,781,364
|
IssuesEvent
|
2019-04-22 17:50:40
|
extnet/Ext.NET
|
https://api.github.com/repos/extnet/Ext.NET
|
opened
|
Mouse wheel in NumberField and SpinnerField inverted between 4.7.x and 4.8.x
|
4.x defect review-after-extjs-upgrade sencha
|
Found: 4.8.1
Ext.NET forum thread: [Mouse wheel in number field has changed behavior](https://forums.ext.net/showthread.php?62640)
The mouse wheel behavior in form fields `Ext.form.field.Number` and "Ext.form.field.Spinner` has been inverted between Ext JS 6.6.0 and 6.7.0. Historically, at least about version 4 (Ext.NET 2), it also worked like it did in 6.6.0, so that was a rather unexpected change between minor releases.
To see the change reflect in Sencha, just check the fiddles included in the documentation pages:
- [6.6.0 Ext.form.field.Number](https://docs.sencha.com/extjs/6.6.0/classic/Ext.form.field.Number.html)
- [6.7.0 Ext.form.field.Number](https://docs.sencha.com/extjs/6.7.0/classic/Ext.form.field.Number.html)
- [6.6.0 Ext.form.field.Spinner](https://docs.sencha.com/extjs/6.6.0/classic/Ext.form.field.Spinner.html)
- [6.7.0 Ext.form.field.Spinner](https://docs.sencha.com/extjs/6.7.0/classic/Ext.form.field.Spinner.html)
|
1.0
|
Mouse wheel in NumberField and SpinnerField inverted between 4.7.x and 4.8.x - Found: 4.8.1
Ext.NET forum thread: [Mouse wheel in number field has changed behavior](https://forums.ext.net/showthread.php?62640)
The mouse wheel behavior in form fields `Ext.form.field.Number` and "Ext.form.field.Spinner` has been inverted between Ext JS 6.6.0 and 6.7.0. Historically, at least about version 4 (Ext.NET 2), it also worked like it did in 6.6.0, so that was a rather unexpected change between minor releases.
To see the change reflect in Sencha, just check the fiddles included in the documentation pages:
- [6.6.0 Ext.form.field.Number](https://docs.sencha.com/extjs/6.6.0/classic/Ext.form.field.Number.html)
- [6.7.0 Ext.form.field.Number](https://docs.sencha.com/extjs/6.7.0/classic/Ext.form.field.Number.html)
- [6.6.0 Ext.form.field.Spinner](https://docs.sencha.com/extjs/6.6.0/classic/Ext.form.field.Spinner.html)
- [6.7.0 Ext.form.field.Spinner](https://docs.sencha.com/extjs/6.7.0/classic/Ext.form.field.Spinner.html)
|
non_test
|
mouse wheel in numberfield and spinnerfield inverted between x and x found ext net forum thread the mouse wheel behavior in form fields ext form field number and ext form field spinner has been inverted between ext js and historically at least about version ext net it also worked like it did in so that was a rather unexpected change between minor releases to see the change reflect in sencha just check the fiddles included in the documentation pages
| 0
|
6,643
| 2,855,140,862
|
IssuesEvent
|
2015-06-02 07:38:07
|
glensc/nagios-plugin-check_raid
|
https://api.github.com/repos/glensc/nagios-plugin-check_raid
|
closed
|
uninitialized value when battery is failed
|
arcconf need test data
|
When the battery is failed got those error.
/usr/lib/nagios/plugins/check_raid
Use of uninitialized value in string ne at /usr/lib/nagios/plugins/check_raid line 2887.
Use of uninitialized value in concatenation (.) or string at /usr/lib/nagios/plugins/check_raid line 2889.
Use of uninitialized value in concatenation (.) or string at /usr/lib/nagios/plugins/check_raid line 2892.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2893.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2896.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2900.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2903.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2907.
Use of uninitialized value in concatenation (.) or string at /usr/lib/nagios/plugins/check_raid line 2908.
CRITICAL: arcconf:[Controller:Optimal, Battery Status: Failed, Battery Overtemp: , Battery Capacity Remaining: %, Battery Time: m, Logical Device 0(RAID10):Optimal, Drives: WD-WMATV3471115,WD-WMATV3047731,WD-WMATV3036928,WD-WMATV3086188=Online]
If you need more info do not hesitate.
Laurent Sauvé
|
1.0
|
uninitialized value when battery is failed - When the battery is failed got those error.
/usr/lib/nagios/plugins/check_raid
Use of uninitialized value in string ne at /usr/lib/nagios/plugins/check_raid line 2887.
Use of uninitialized value in concatenation (.) or string at /usr/lib/nagios/plugins/check_raid line 2889.
Use of uninitialized value in concatenation (.) or string at /usr/lib/nagios/plugins/check_raid line 2892.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2893.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2896.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2900.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2903.
Use of uninitialized value in numeric lt (<) at /usr/lib/nagios/plugins/check_raid line 2907.
Use of uninitialized value in concatenation (.) or string at /usr/lib/nagios/plugins/check_raid line 2908.
CRITICAL: arcconf:[Controller:Optimal, Battery Status: Failed, Battery Overtemp: , Battery Capacity Remaining: %, Battery Time: m, Logical Device 0(RAID10):Optimal, Drives: WD-WMATV3471115,WD-WMATV3047731,WD-WMATV3036928,WD-WMATV3086188=Online]
If you need more info do not hesitate.
Laurent Sauvé
|
test
|
uninitialized value when battery is failed when the battery is failed got those error usr lib nagios plugins check raid use of uninitialized value in string ne at usr lib nagios plugins check raid line use of uninitialized value in concatenation or string at usr lib nagios plugins check raid line use of uninitialized value in concatenation or string at usr lib nagios plugins check raid line use of uninitialized value in numeric lt at usr lib nagios plugins check raid line use of uninitialized value in numeric lt at usr lib nagios plugins check raid line use of uninitialized value in numeric lt at usr lib nagios plugins check raid line use of uninitialized value in numeric lt at usr lib nagios plugins check raid line use of uninitialized value in numeric lt at usr lib nagios plugins check raid line use of uninitialized value in concatenation or string at usr lib nagios plugins check raid line critical arcconf if you need more info do not hesitate laurent sauvé
| 1
|
127,272
| 5,027,777,569
|
IssuesEvent
|
2016-12-15 16:23:37
|
savoirfairelinux/sous-chef
|
https://api.github.com/repos/savoirfairelinux/sous-chef
|
opened
|
Too many information for the payment types
|
high priority member
|
### Expected Behaviour
The payment type should be optional in the client's creation form.
The values should be:
- EFT
- Credit
- 3rd Party
### Actual Behaviour
The payment type is mandatory in the client's creation form.
The values are:
- Check
- Cash
- EFT
- Credit
### Steps to reproduce
* Go to the client's creation form
* Go to the _Payment_ tab
|
1.0
|
Too many information for the payment types - ### Expected Behaviour
The payment type should be optional in the client's creation form.
The values should be:
- EFT
- Credit
- 3rd Party
### Actual Behaviour
The payment type is mandatory in the client's creation form.
The values are:
- Check
- Cash
- EFT
- Credit
### Steps to reproduce
* Go to the client's creation form
* Go to the _Payment_ tab
|
non_test
|
too many information for the payment types expected behaviour the payment type should be optional in the client s creation form the values should be eft credit party actual behaviour the payment type is mandatory in the client s creation form the values are check cash eft credit steps to reproduce go to the client s creation form go to the payment tab
| 0
|
27,774
| 4,328,889,943
|
IssuesEvent
|
2016-07-26 15:16:25
|
mautic/mautic
|
https://api.github.com/repos/mautic/mautic
|
closed
|
Date selection ends in a HTTP 500 error
|
Bug Ready To Test
|
## Description
When I browse email stats for a mailing and try to select a different time range using the widget, Mautic responds with a HTTP 500 error.
[2016-07-07 11:28:20] mautic.CRITICAL: Uncaught PHP Exception Symfony\Component\Debug\Exception\UndefinedMethodException: "Attempted to call an undefined method named "isMysql" of class "Mautic\CoreBundle\Helper\Chart\ChartQuery"." at /vagrant/app/bundles/CoreBundle/Helper/Chart/ChartQuery.php line 299 {"exception":"[object] (Symfony\\Component\\Debug\\Exception\\UndefinedMethodException(code: 0): Attempted to call an undefined method named \"isMysql\" of class \"Mautic\\CoreBundle\\Helper\\Chart\\ChartQuery\". at /vagrant/app/bundles/CoreBundle/Helper/Chart/ChartQuery.php:299)\n[stacktrace]\n#0 /vagrant/app/bundles/CoreBundle/Helper/Chart/ChartQuery.php(251): Mautic\\CoreBundle\\Helper\\Chart\\ChartQuery->completeTimeData(Array)\n#1 /vagrant/app/bundles/EmailBundle/Model/EmailModel.php(1496): Mautic\\CoreBundle\\Helper\\Chart\\ChartQuery->loadAndBuildTimeData(Object(Doctrine\\DBAL\\Query\\QueryBuilder))\n#2 /vagrant/app/bundles/EmailBundle/Model/EmailModel.php(758): Mautic\\EmailBundle\\Model\\EmailModel->getEmailsLineChartData(NULL, Object(DateTime), Object(DateTime), NULL, Array)\n#3 /vagrant/app/bundles/EmailBundle/Controller/EmailController.php(370): Mautic\\EmailBundle\\Model\\EmailModel->getEmailGeneralStats(Object(Mautic\\EmailBundle\\Entity\\Email), true, NULL, Object(DateTime), Object(DateTime))\n#4 /vagrant/app/bundles/CoreBundle/Controller/CommonController.php(367): Mautic\\EmailBundle\\Controller\\EmailController->viewAction('7', '')\n#5 [internal function]: Mautic\\CoreBundle\\Controller\\CommonController->executeAction('view', '7', 0, '')\n#6 /vagrant/vendor/symfony/http-kernel/HttpKernel.php(139): call_user_func_array(Array, Array)\n#7 /vagrant/vendor/symfony/http-kernel/HttpKernel.php(62): Symfony\\Component\\HttpKernel\\HttpKernel->handleRaw(Object(Symfony\\Component\\HttpFoundation\\Request), 1)\n#8 /vagrant/vendor/symfony/http-kernel/DependencyInjection/ContainerAwareHttpKernel.php(69): Symfony\\Component\\HttpKernel\\HttpKernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#9 /vagrant/vendor/symfony/http-kernel/Kernel.php(185): Symfony\\Component\\HttpKernel\\DependencyInjection\\ContainerAwareHttpKernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#10 /vagrant/app/AppKernel.php(131): Symfony\\Component\\HttpKernel\\Kernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#11 /vagrant/app/middlewares/CORSMiddleware.php(96): AppKernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#12 /vagrant/app/middlewares/CatchExceptionMiddleware.php(43): Mautic\\Middleware\\CORSMiddleware->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#13 /vagrant/app/middlewares/Prod/SetMauticHeaderMiddleware.php(41): Mautic\\Middleware\\CatchExceptionMiddleware->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#14 /vagrant/app/middlewares/VersionCheckMiddleware.php(56): Mautic\\Middleware\\Prod\\SetMauticHeaderMiddleware->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#15 /vagrant/vendor/stack/builder/src/Stack/StackedHttpKernel.php(23): Mautic\\Middleware\\VersionCheckMiddleware->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#16 /vagrant/vendor/stack/run/src/Stack/run.php(13): Stack\\StackedHttpKernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request))\n#17 /vagrant/index.php(30): Stack\\run(Object(Stack\\StackedHttpKernel))\n#18 {main}"} []
The isMysql function is not defined in either Mautic\CoreBundle\Helper\Chart\ChartQuery or Mautic\CoreBundle\Helper\Chart\AbstactChart. I think that commit accidentally removed the function: https://github.com/mautic/mautic/commit/172343628d182153d8f9c06234b2653c2fa2e218
|
1.0
|
Date selection ends in a HTTP 500 error - ## Description
When I browse email stats for a mailing and try to select a different time range using the widget, Mautic responds with a HTTP 500 error.
[2016-07-07 11:28:20] mautic.CRITICAL: Uncaught PHP Exception Symfony\Component\Debug\Exception\UndefinedMethodException: "Attempted to call an undefined method named "isMysql" of class "Mautic\CoreBundle\Helper\Chart\ChartQuery"." at /vagrant/app/bundles/CoreBundle/Helper/Chart/ChartQuery.php line 299 {"exception":"[object] (Symfony\\Component\\Debug\\Exception\\UndefinedMethodException(code: 0): Attempted to call an undefined method named \"isMysql\" of class \"Mautic\\CoreBundle\\Helper\\Chart\\ChartQuery\". at /vagrant/app/bundles/CoreBundle/Helper/Chart/ChartQuery.php:299)\n[stacktrace]\n#0 /vagrant/app/bundles/CoreBundle/Helper/Chart/ChartQuery.php(251): Mautic\\CoreBundle\\Helper\\Chart\\ChartQuery->completeTimeData(Array)\n#1 /vagrant/app/bundles/EmailBundle/Model/EmailModel.php(1496): Mautic\\CoreBundle\\Helper\\Chart\\ChartQuery->loadAndBuildTimeData(Object(Doctrine\\DBAL\\Query\\QueryBuilder))\n#2 /vagrant/app/bundles/EmailBundle/Model/EmailModel.php(758): Mautic\\EmailBundle\\Model\\EmailModel->getEmailsLineChartData(NULL, Object(DateTime), Object(DateTime), NULL, Array)\n#3 /vagrant/app/bundles/EmailBundle/Controller/EmailController.php(370): Mautic\\EmailBundle\\Model\\EmailModel->getEmailGeneralStats(Object(Mautic\\EmailBundle\\Entity\\Email), true, NULL, Object(DateTime), Object(DateTime))\n#4 /vagrant/app/bundles/CoreBundle/Controller/CommonController.php(367): Mautic\\EmailBundle\\Controller\\EmailController->viewAction('7', '')\n#5 [internal function]: Mautic\\CoreBundle\\Controller\\CommonController->executeAction('view', '7', 0, '')\n#6 /vagrant/vendor/symfony/http-kernel/HttpKernel.php(139): call_user_func_array(Array, Array)\n#7 /vagrant/vendor/symfony/http-kernel/HttpKernel.php(62): Symfony\\Component\\HttpKernel\\HttpKernel->handleRaw(Object(Symfony\\Component\\HttpFoundation\\Request), 1)\n#8 /vagrant/vendor/symfony/http-kernel/DependencyInjection/ContainerAwareHttpKernel.php(69): Symfony\\Component\\HttpKernel\\HttpKernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#9 /vagrant/vendor/symfony/http-kernel/Kernel.php(185): Symfony\\Component\\HttpKernel\\DependencyInjection\\ContainerAwareHttpKernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#10 /vagrant/app/AppKernel.php(131): Symfony\\Component\\HttpKernel\\Kernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#11 /vagrant/app/middlewares/CORSMiddleware.php(96): AppKernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#12 /vagrant/app/middlewares/CatchExceptionMiddleware.php(43): Mautic\\Middleware\\CORSMiddleware->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#13 /vagrant/app/middlewares/Prod/SetMauticHeaderMiddleware.php(41): Mautic\\Middleware\\CatchExceptionMiddleware->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#14 /vagrant/app/middlewares/VersionCheckMiddleware.php(56): Mautic\\Middleware\\Prod\\SetMauticHeaderMiddleware->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#15 /vagrant/vendor/stack/builder/src/Stack/StackedHttpKernel.php(23): Mautic\\Middleware\\VersionCheckMiddleware->handle(Object(Symfony\\Component\\HttpFoundation\\Request), 1, true)\n#16 /vagrant/vendor/stack/run/src/Stack/run.php(13): Stack\\StackedHttpKernel->handle(Object(Symfony\\Component\\HttpFoundation\\Request))\n#17 /vagrant/index.php(30): Stack\\run(Object(Stack\\StackedHttpKernel))\n#18 {main}"} []
The isMysql function is not defined in either Mautic\CoreBundle\Helper\Chart\ChartQuery or Mautic\CoreBundle\Helper\Chart\AbstactChart. I think that commit accidentally removed the function: https://github.com/mautic/mautic/commit/172343628d182153d8f9c06234b2653c2fa2e218
|
test
|
date selection ends in a http error description when i browse email stats for a mailing and try to select a different time range using the widget mautic responds with a http error mautic critical uncaught php exception symfony component debug exception undefinedmethodexception attempted to call an undefined method named ismysql of class mautic corebundle helper chart chartquery at vagrant app bundles corebundle helper chart chartquery php line exception symfony component debug exception undefinedmethodexception code attempted to call an undefined method named ismysql of class mautic corebundle helper chart chartquery at vagrant app bundles corebundle helper chart chartquery php n n vagrant app bundles corebundle helper chart chartquery php mautic corebundle helper chart chartquery completetimedata array n vagrant app bundles emailbundle model emailmodel php mautic corebundle helper chart chartquery loadandbuildtimedata object doctrine dbal query querybuilder n vagrant app bundles emailbundle model emailmodel php mautic emailbundle model emailmodel getemailslinechartdata null object datetime object datetime null array n vagrant app bundles emailbundle controller emailcontroller php mautic emailbundle model emailmodel getemailgeneralstats object mautic emailbundle entity email true null object datetime object datetime n vagrant app bundles corebundle controller commoncontroller php mautic emailbundle controller emailcontroller viewaction n mautic corebundle controller commoncontroller executeaction view n vagrant vendor symfony http kernel httpkernel php call user func array array array n vagrant vendor symfony http kernel httpkernel php symfony component httpkernel httpkernel handleraw object symfony component httpfoundation request n vagrant vendor symfony http kernel dependencyinjection containerawarehttpkernel php symfony component httpkernel httpkernel handle object symfony component httpfoundation request true n vagrant vendor symfony http kernel kernel php symfony component httpkernel dependencyinjection containerawarehttpkernel handle object symfony component httpfoundation request true n vagrant app appkernel php symfony component httpkernel kernel handle object symfony component httpfoundation request true n vagrant app middlewares corsmiddleware php appkernel handle object symfony component httpfoundation request true n vagrant app middlewares catchexceptionmiddleware php mautic middleware corsmiddleware handle object symfony component httpfoundation request true n vagrant app middlewares prod setmauticheadermiddleware php mautic middleware catchexceptionmiddleware handle object symfony component httpfoundation request true n vagrant app middlewares versioncheckmiddleware php mautic middleware prod setmauticheadermiddleware handle object symfony component httpfoundation request true n vagrant vendor stack builder src stack stackedhttpkernel php mautic middleware versioncheckmiddleware handle object symfony component httpfoundation request true n vagrant vendor stack run src stack run php stack stackedhttpkernel handle object symfony component httpfoundation request n vagrant index php stack run object stack stackedhttpkernel n main the ismysql function is not defined in either mautic corebundle helper chart chartquery or mautic corebundle helper chart abstactchart i think that commit accidentally removed the function
| 1
|
73,584
| 7,345,073,822
|
IssuesEvent
|
2018-03-07 16:23:07
|
PressForward/pressforward
|
https://api.github.com/repos/PressForward/pressforward
|
closed
|
Items nominated and then sent to draft from all content do not appear as drafts
|
Test bug
|
If an item is nominated and then sent to draft from all content, it does not appear as a drafted post. This issue was likely introduced while fixing the nomination count for the same process. See issue #959
|
1.0
|
Items nominated and then sent to draft from all content do not appear as drafts - If an item is nominated and then sent to draft from all content, it does not appear as a drafted post. This issue was likely introduced while fixing the nomination count for the same process. See issue #959
|
test
|
items nominated and then sent to draft from all content do not appear as drafts if an item is nominated and then sent to draft from all content it does not appear as a drafted post this issue was likely introduced while fixing the nomination count for the same process see issue
| 1
|
184,063
| 21,784,788,687
|
IssuesEvent
|
2022-05-14 01:19:21
|
rgordon95/ecommerce-react-redux-saga-demo
|
https://api.github.com/repos/rgordon95/ecommerce-react-redux-saga-demo
|
opened
|
CVE-2022-1650 (High) detected in eventsource-0.1.6.tgz
|
security vulnerability
|
## CVE-2022-1650 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>eventsource-0.1.6.tgz</b></p></summary>
<p>W3C compliant EventSource client for Node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/eventsource/-/eventsource-0.1.6.tgz">https://registry.npmjs.org/eventsource/-/eventsource-0.1.6.tgz</a></p>
<p>Path to dependency file: /ecommerce-react-redux-saga-demo/redux-saga-cart/package.json</p>
<p>Path to vulnerable library: /redux-saga-cart/node_modules/eventsource/package.json</p>
<p>
Dependency Hierarchy:
- webpack-dev-server-1.16.5.tgz (Root Library)
- sockjs-client-1.1.4.tgz
- :x: **eventsource-0.1.6.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2.
<p>Publish Date: 2022-05-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-1650>CVE-2022-1650</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/">https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/</a></p>
<p>Release Date: 2022-05-12</p>
<p>Fix Resolution: eventsource - 2.0.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2022-1650 (High) detected in eventsource-0.1.6.tgz - ## CVE-2022-1650 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>eventsource-0.1.6.tgz</b></p></summary>
<p>W3C compliant EventSource client for Node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/eventsource/-/eventsource-0.1.6.tgz">https://registry.npmjs.org/eventsource/-/eventsource-0.1.6.tgz</a></p>
<p>Path to dependency file: /ecommerce-react-redux-saga-demo/redux-saga-cart/package.json</p>
<p>Path to vulnerable library: /redux-saga-cart/node_modules/eventsource/package.json</p>
<p>
Dependency Hierarchy:
- webpack-dev-server-1.16.5.tgz (Root Library)
- sockjs-client-1.1.4.tgz
- :x: **eventsource-0.1.6.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2.
<p>Publish Date: 2022-05-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-1650>CVE-2022-1650</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/">https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/</a></p>
<p>Release Date: 2022-05-12</p>
<p>Fix Resolution: eventsource - 2.0.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_test
|
cve high detected in eventsource tgz cve high severity vulnerability vulnerable library eventsource tgz compliant eventsource client for node js library home page a href path to dependency file ecommerce react redux saga demo redux saga cart package json path to vulnerable library redux saga cart node modules eventsource package json dependency hierarchy webpack dev server tgz root library sockjs client tgz x eventsource tgz vulnerable library vulnerability details exposure of sensitive information to an unauthorized actor in github repository eventsource eventsource prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution eventsource step up your open source security game with whitesource
| 0
|
342,357
| 10,315,688,519
|
IssuesEvent
|
2019-08-30 08:12:40
|
gilesknap/gphotos-sync
|
https://api.github.com/repos/gilesknap/gphotos-sync
|
closed
|
Null response in mediaItems.batchGet
|
Bug in Google API? Low Priority
|
I've just noticed that my own library sync cron job has been getting a large number of these errors during July:-
```
07-31 21:39:28 Null response in mediaItems.batchGet dict_keys(['AIfuE
...
```
This is the same as shown in #98. Nothing new has ended up in my bad_ids file.
This needs to be investigated.
|
1.0
|
Null response in mediaItems.batchGet - I've just noticed that my own library sync cron job has been getting a large number of these errors during July:-
```
07-31 21:39:28 Null response in mediaItems.batchGet dict_keys(['AIfuE
...
```
This is the same as shown in #98. Nothing new has ended up in my bad_ids file.
This needs to be investigated.
|
non_test
|
null response in mediaitems batchget i ve just noticed that my own library sync cron job has been getting a large number of these errors during july null response in mediaitems batchget dict keys aifue this is the same as shown in nothing new has ended up in my bad ids file this needs to be investigated
| 0
|
212,280
| 16,437,492,395
|
IssuesEvent
|
2021-05-20 10:54:22
|
open-telemetry/opentelemetry-java-instrumentation
|
https://api.github.com/repos/open-telemetry/opentelemetry-java-instrumentation
|
opened
|
Flaky test ArmeriaHttpClientTest trace request with callback and parent
|
area:tests bug sporadic test failure
|
https://scans.gradle.com/s/gbcpfr5wicl5e
```
assert traces.size() == expectedSize
| | | |
| 2 | 1
| false
[[TestSpanData{spanContext=ImmutableSpanContext{traceId=0dc4c0c38d4cad64b0fef0231b6017ac, spanId=aa218e3cf3b2b8be, traceFlags=00, traceState=ArrayBasedTraceState{entries=[]}, remote=false, valid=true}, parentSpanContext=ImmutableSpanContext{traceId=00000000000000000000000000000000, spanId=0000000000000000, traceFlags=00, traceState=ArrayBasedTraceState{entries=[]}, remote=false, valid=false}, resource=Resource{attributes={host.arch="amd64", host.name="fv-az292-76", os.description="Linux 5.4.0-1047-azure", os.type="linux", process.command_line="/usr/lib/jvm/adoptopenjdk-11-hotspot-amd64:bin:java -Dio.opentelemetry.context.enableStrictContext=false -Dio.opentelemetry.javaagent.shaded.io.opentelemetry.context.enableStrictContext=false -Dorg.gradle.internal.worker.tmpdir=/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/instrumentation/armeria-1.3/javaagent/build/tmp/test/work -Dorg.gradle.native=false -Dotel.javaagent.debug=true -Dotel.javaagent.experimental.initializer.jar=/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/instrumentation/armeria-1.3/javaagent/build/libs/agent-testing.jar -Dotel.javaagent.testing.additional-library-ignores.enabled=false -Dotel.javaagent.testing.fail-on-context-leak=true -Dotel.javaagent.testing.transform-safe-logging.enabled=true -javaagent:/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/testing/agent-for-testing/build/libs/opentelemetry-agent-for-testing-1.3.0-SNAPSHOT.jar --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.lang=ALL-UNNAMED -Xmx512m -Dfile.encoding=UTF-8 -Duser.country -Duser.language=en -Duser.variant -ea", process.executable.path="/usr/lib/jvm/adoptopenjdk-11-hotspot-amd64:bin:java", process.pid=3073, process.runtime.description="AdoptOpenJDK OpenJDK 64-Bit Server VM 11.0.11+9", process.runtime.name="OpenJDK Runtime Environment", process.runtime.version="11.0.11+9", service.name="unknown_service:java", telemetry.auto.version="1.3.0-SNAPSHOT", telemetry.sdk.language="java", telemetry.sdk.name="opentelemetry", telemetry.sdk.version="1.2.0"}}, instrumentationLibraryInfo=InstrumentationLibraryInfo{name=test, version=}, name=parent, kind=INTERNAL, startEpochNanos=1621487760514734101, attributes={thread.id=15, thread.name="Test worker"}, events=[], links=[], status=ImmutableStatusData{statusCode=UNSET, description=}, endEpochNanos=1621487760540380694, totalRecordedEvents=0, totalRecordedLinks=0, totalAttributeCount=2, internalHasEnded=true}, TestSpanData{spanContext=ImmutableSpanContext{traceId=0dc4c0c38d4cad64b0fef0231b6017ac, spanId=4d67c05ebcf2511b, traceFlags=00, traceState=ArrayBasedTraceState{entries=[]}, remote=false, valid=true}, parentSpanContext=ImmutableSpanContext{traceId=0dc4c0c38d4cad64b0fef0231b6017ac, spanId=aa218e3cf3b2b8be, traceFlags=00, traceState=ArrayBasedTraceState{entries=[]}, remote=false, valid=true}, resource=Resource{attributes={host.arch="amd64", host.name="fv-az292-76", os.description="Linux 5.4.0-1047-azure", os.type="linux", process.command_line="/usr/lib/jvm/adoptopenjdk-11-hotspot-amd64:bin:java -Dio.opentelemetry.context.enableStrictContext=false -Dio.opentelemetry.javaagent.shaded.io.opentelemetry.context.enableStrictContext=false -Dorg.gradle.internal.worker.tmpdir=/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/instrumentation/armeria-1.3/javaagent/build/tmp/test/work -Dorg.gradle.native=false -Dotel.javaagent.debug=true -Dotel.javaagent.experimental.initializer.jar=/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/instrumentation/armeria-1.3/javaagent/build/libs/agent-testing.jar -Dotel.javaagent.testing.additional-library-ignores.enabled=false -Dotel.javaagent.testing.fail-on-context-leak=true -Dotel.javaagent.testing.transform-safe-logging.enabled=true -javaagent:/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/testing/agent-for-testing/build/libs/opentelemetry-agent-for-testing-1.3.0-SNAPSHOT.jar --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.lang=ALL-UNNAMED -Xmx512m -Dfile.encoding=UTF-8 -Duser.country -Duser.language=en -Duser.variant -ea", process.executable.path="/usr/lib/jvm/adoptopenjdk-11-hotspot-amd64:bin:java", process.pid=3073, process.runtime.description="AdoptOpenJDK OpenJDK 64-Bit Server VM 11.0.11+9", process.runtime.name="OpenJDK Runtime Environment", process.runtime.version="11.0.11+9", service.name="unknown_service:java", telemetry.auto.version="1.3.0-SNAPSHOT", telemetry.sdk.language="java", telemetry.sdk.name="opentelemetry", telemetry.sdk.version="1.2.0"}}, instrumentationLibraryInfo=InstrumentationLibraryInfo{name=io.opentelemetry.armeria-1.3, version=1.3.0-SNAPSHOT}, name=HTTP GET, kind=CLIENT, startEpochNanos=1621487760531834963, attributes={http.flavor="1.1", http.host="localhost:42923", http.method="GET", http.request_…
at io.opentelemetry.instrumentation.test.asserts.InMemoryExporterAssert.assertTraces(InMemoryExporterAssert.groovy:37)
at io.opentelemetry.instrumentation.test.InstrumentationSpecification.assertTraces(InstrumentationSpecification.groovy:99)
at io.opentelemetry.instrumentation.test.base.HttpClientTest.trace request with callback and parent(HttpClientTest.groovy:373)
```
|
2.0
|
Flaky test ArmeriaHttpClientTest trace request with callback and parent - https://scans.gradle.com/s/gbcpfr5wicl5e
```
assert traces.size() == expectedSize
| | | |
| 2 | 1
| false
[[TestSpanData{spanContext=ImmutableSpanContext{traceId=0dc4c0c38d4cad64b0fef0231b6017ac, spanId=aa218e3cf3b2b8be, traceFlags=00, traceState=ArrayBasedTraceState{entries=[]}, remote=false, valid=true}, parentSpanContext=ImmutableSpanContext{traceId=00000000000000000000000000000000, spanId=0000000000000000, traceFlags=00, traceState=ArrayBasedTraceState{entries=[]}, remote=false, valid=false}, resource=Resource{attributes={host.arch="amd64", host.name="fv-az292-76", os.description="Linux 5.4.0-1047-azure", os.type="linux", process.command_line="/usr/lib/jvm/adoptopenjdk-11-hotspot-amd64:bin:java -Dio.opentelemetry.context.enableStrictContext=false -Dio.opentelemetry.javaagent.shaded.io.opentelemetry.context.enableStrictContext=false -Dorg.gradle.internal.worker.tmpdir=/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/instrumentation/armeria-1.3/javaagent/build/tmp/test/work -Dorg.gradle.native=false -Dotel.javaagent.debug=true -Dotel.javaagent.experimental.initializer.jar=/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/instrumentation/armeria-1.3/javaagent/build/libs/agent-testing.jar -Dotel.javaagent.testing.additional-library-ignores.enabled=false -Dotel.javaagent.testing.fail-on-context-leak=true -Dotel.javaagent.testing.transform-safe-logging.enabled=true -javaagent:/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/testing/agent-for-testing/build/libs/opentelemetry-agent-for-testing-1.3.0-SNAPSHOT.jar --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.lang=ALL-UNNAMED -Xmx512m -Dfile.encoding=UTF-8 -Duser.country -Duser.language=en -Duser.variant -ea", process.executable.path="/usr/lib/jvm/adoptopenjdk-11-hotspot-amd64:bin:java", process.pid=3073, process.runtime.description="AdoptOpenJDK OpenJDK 64-Bit Server VM 11.0.11+9", process.runtime.name="OpenJDK Runtime Environment", process.runtime.version="11.0.11+9", service.name="unknown_service:java", telemetry.auto.version="1.3.0-SNAPSHOT", telemetry.sdk.language="java", telemetry.sdk.name="opentelemetry", telemetry.sdk.version="1.2.0"}}, instrumentationLibraryInfo=InstrumentationLibraryInfo{name=test, version=}, name=parent, kind=INTERNAL, startEpochNanos=1621487760514734101, attributes={thread.id=15, thread.name="Test worker"}, events=[], links=[], status=ImmutableStatusData{statusCode=UNSET, description=}, endEpochNanos=1621487760540380694, totalRecordedEvents=0, totalRecordedLinks=0, totalAttributeCount=2, internalHasEnded=true}, TestSpanData{spanContext=ImmutableSpanContext{traceId=0dc4c0c38d4cad64b0fef0231b6017ac, spanId=4d67c05ebcf2511b, traceFlags=00, traceState=ArrayBasedTraceState{entries=[]}, remote=false, valid=true}, parentSpanContext=ImmutableSpanContext{traceId=0dc4c0c38d4cad64b0fef0231b6017ac, spanId=aa218e3cf3b2b8be, traceFlags=00, traceState=ArrayBasedTraceState{entries=[]}, remote=false, valid=true}, resource=Resource{attributes={host.arch="amd64", host.name="fv-az292-76", os.description="Linux 5.4.0-1047-azure", os.type="linux", process.command_line="/usr/lib/jvm/adoptopenjdk-11-hotspot-amd64:bin:java -Dio.opentelemetry.context.enableStrictContext=false -Dio.opentelemetry.javaagent.shaded.io.opentelemetry.context.enableStrictContext=false -Dorg.gradle.internal.worker.tmpdir=/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/instrumentation/armeria-1.3/javaagent/build/tmp/test/work -Dorg.gradle.native=false -Dotel.javaagent.debug=true -Dotel.javaagent.experimental.initializer.jar=/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/instrumentation/armeria-1.3/javaagent/build/libs/agent-testing.jar -Dotel.javaagent.testing.additional-library-ignores.enabled=false -Dotel.javaagent.testing.fail-on-context-leak=true -Dotel.javaagent.testing.transform-safe-logging.enabled=true -javaagent:/home/runner/work/opentelemetry-java-instrumentation/opentelemetry-java-instrumentation/testing/agent-for-testing/build/libs/opentelemetry-agent-for-testing-1.3.0-SNAPSHOT.jar --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.lang=ALL-UNNAMED -Xmx512m -Dfile.encoding=UTF-8 -Duser.country -Duser.language=en -Duser.variant -ea", process.executable.path="/usr/lib/jvm/adoptopenjdk-11-hotspot-amd64:bin:java", process.pid=3073, process.runtime.description="AdoptOpenJDK OpenJDK 64-Bit Server VM 11.0.11+9", process.runtime.name="OpenJDK Runtime Environment", process.runtime.version="11.0.11+9", service.name="unknown_service:java", telemetry.auto.version="1.3.0-SNAPSHOT", telemetry.sdk.language="java", telemetry.sdk.name="opentelemetry", telemetry.sdk.version="1.2.0"}}, instrumentationLibraryInfo=InstrumentationLibraryInfo{name=io.opentelemetry.armeria-1.3, version=1.3.0-SNAPSHOT}, name=HTTP GET, kind=CLIENT, startEpochNanos=1621487760531834963, attributes={http.flavor="1.1", http.host="localhost:42923", http.method="GET", http.request_…
at io.opentelemetry.instrumentation.test.asserts.InMemoryExporterAssert.assertTraces(InMemoryExporterAssert.groovy:37)
at io.opentelemetry.instrumentation.test.InstrumentationSpecification.assertTraces(InstrumentationSpecification.groovy:99)
at io.opentelemetry.instrumentation.test.base.HttpClientTest.trace request with callback and parent(HttpClientTest.groovy:373)
```
|
test
|
flaky test armeriahttpclienttest trace request with callback and parent assert traces size expectedsize false remote false valid true parentspancontext immutablespancontext traceid spanid traceflags tracestate arraybasedtracestate entries remote false valid false resource resource attributes host arch host name fv os description linux azure os type linux process command line usr lib jvm adoptopenjdk hotspot bin java dio opentelemetry context enablestrictcontext false dio opentelemetry javaagent shaded io opentelemetry context enablestrictcontext false dorg gradle internal worker tmpdir home runner work opentelemetry java instrumentation opentelemetry java instrumentation instrumentation armeria javaagent build tmp test work dorg gradle native false dotel javaagent debug true dotel javaagent experimental initializer jar home runner work opentelemetry java instrumentation opentelemetry java instrumentation instrumentation armeria javaagent build libs agent testing jar dotel javaagent testing additional library ignores enabled false dotel javaagent testing fail on context leak true dotel javaagent testing transform safe logging enabled true javaagent home runner work opentelemetry java instrumentation opentelemetry java instrumentation testing agent for testing build libs opentelemetry agent for testing snapshot jar add opens java base java util all unnamed add opens java base java lang all unnamed dfile encoding utf duser country duser language en duser variant ea process executable path usr lib jvm adoptopenjdk hotspot bin java process pid process runtime description adoptopenjdk openjdk bit server vm process runtime name openjdk runtime environment process runtime version service name unknown service java telemetry auto version snapshot telemetry sdk language java telemetry sdk name opentelemetry telemetry sdk version instrumentationlibraryinfo instrumentationlibraryinfo name test version name parent kind internal startepochnanos attributes thread id thread name test worker events links status immutablestatusdata statuscode unset description endepochnanos totalrecordedevents totalrecordedlinks totalattributecount internalhasended true testspandata spancontext immutablespancontext traceid spanid traceflags tracestate arraybasedtracestate entries remote false valid true parentspancontext immutablespancontext traceid spanid traceflags tracestate arraybasedtracestate entries remote false valid true resource resource attributes host arch host name fv os description linux azure os type linux process command line usr lib jvm adoptopenjdk hotspot bin java dio opentelemetry context enablestrictcontext false dio opentelemetry javaagent shaded io opentelemetry context enablestrictcontext false dorg gradle internal worker tmpdir home runner work opentelemetry java instrumentation opentelemetry java instrumentation instrumentation armeria javaagent build tmp test work dorg gradle native false dotel javaagent debug true dotel javaagent experimental initializer jar home runner work opentelemetry java instrumentation opentelemetry java instrumentation instrumentation armeria javaagent build libs agent testing jar dotel javaagent testing additional library ignores enabled false dotel javaagent testing fail on context leak true dotel javaagent testing transform safe logging enabled true javaagent home runner work opentelemetry java instrumentation opentelemetry java instrumentation testing agent for testing build libs opentelemetry agent for testing snapshot jar add opens java base java util all unnamed add opens java base java lang all unnamed dfile encoding utf duser country duser language en duser variant ea process executable path usr lib jvm adoptopenjdk hotspot bin java process pid process runtime description adoptopenjdk openjdk bit server vm process runtime name openjdk runtime environment process runtime version service name unknown service java telemetry auto version snapshot telemetry sdk language java telemetry sdk name opentelemetry telemetry sdk version instrumentationlibraryinfo instrumentationlibraryinfo name io opentelemetry armeria version snapshot name http get kind client startepochnanos attributes http flavor http host localhost http method get http request … at io opentelemetry instrumentation test asserts inmemoryexporterassert asserttraces inmemoryexporterassert groovy at io opentelemetry instrumentation test instrumentationspecification asserttraces instrumentationspecification groovy at io opentelemetry instrumentation test base httpclienttest trace request with callback and parent httpclienttest groovy
| 1
|
18,349
| 5,624,816,235
|
IssuesEvent
|
2017-04-04 17:55:23
|
joomla/joomla-cms
|
https://api.github.com/repos/joomla/joomla-cms
|
closed
|
Filters set in com_content stay active in com_menu
|
No Code Attached Yet
|
### Steps to reproduce the issue

### Expected result
In com_menu when creating new article have no filters active
### Actual result
Filters set prior in com_content are active in com_menu when creating a new article by menu item
### System information (as much as possible)
### Additional comments
|
1.0
|
Filters set in com_content stay active in com_menu - ### Steps to reproduce the issue

### Expected result
In com_menu when creating new article have no filters active
### Actual result
Filters set prior in com_content are active in com_menu when creating a new article by menu item
### System information (as much as possible)
### Additional comments
|
non_test
|
filters set in com content stay active in com menu steps to reproduce the issue expected result in com menu when creating new article have no filters active actual result filters set prior in com content are active in com menu when creating a new article by menu item system information as much as possible additional comments
| 0
|
129,631
| 10,581,120,898
|
IssuesEvent
|
2019-10-08 08:31:46
|
hazelcast/hazelcast
|
https://api.github.com/repos/hazelcast/hazelcast
|
opened
|
CountDownLatchAdvancedTest.testNewRaftGroupMemberSchedulesTimeoutsWithSnapshot
|
Module: CP Subsystem Source: Internal Team: Core Type: Test-Failure
|
`master` (commit b90190b38324fbea8b9e5e26a5285ef9d39d0efd)
Failed on CorrettoJDK8 : http://jenkins.hazelcast.com/view/Official%20Builds/job/Hazelcast-3.x-CorrettoJDK8/33/testReport/junit/com.hazelcast.cp.internal.datastructures.countdownlatch/CountDownLatchAdvancedTest/testNewRaftGroupMemberSchedulesTimeoutsWithSnapshot/
**Stacktrace**
```
java.lang.AssertionError
at org.junit.Assert.fail(Assert.java:86)
at org.junit.Assert.assertTrue(Assert.java:41)
at org.junit.Assert.assertFalse(Assert.java:64)
at org.junit.Assert.assertFalse(Assert.java:74)
at com.hazelcast.cp.internal.datastructures.countdownlatch.CountDownLatchAdvancedTest.lambda$testNewRaftGroupMemberSchedulesTimeoutsWithSnapshot$2(CountDownLatchAdvancedTest.java:115)
at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1316)
at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1418)
at com.hazelcast.cp.internal.datastructures.countdownlatch.CountDownLatchAdvancedTest.testNewRaftGroupMemberSchedulesTimeoutsWithSnapshot(CountDownLatchAdvancedTest.java:105)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:114)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.lang.Thread.run(Thread.java:748)
```
|
1.0
|
CountDownLatchAdvancedTest.testNewRaftGroupMemberSchedulesTimeoutsWithSnapshot - `master` (commit b90190b38324fbea8b9e5e26a5285ef9d39d0efd)
Failed on CorrettoJDK8 : http://jenkins.hazelcast.com/view/Official%20Builds/job/Hazelcast-3.x-CorrettoJDK8/33/testReport/junit/com.hazelcast.cp.internal.datastructures.countdownlatch/CountDownLatchAdvancedTest/testNewRaftGroupMemberSchedulesTimeoutsWithSnapshot/
**Stacktrace**
```
java.lang.AssertionError
at org.junit.Assert.fail(Assert.java:86)
at org.junit.Assert.assertTrue(Assert.java:41)
at org.junit.Assert.assertFalse(Assert.java:64)
at org.junit.Assert.assertFalse(Assert.java:74)
at com.hazelcast.cp.internal.datastructures.countdownlatch.CountDownLatchAdvancedTest.lambda$testNewRaftGroupMemberSchedulesTimeoutsWithSnapshot$2(CountDownLatchAdvancedTest.java:115)
at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1316)
at com.hazelcast.test.HazelcastTestSupport.assertTrueEventually(HazelcastTestSupport.java:1418)
at com.hazelcast.cp.internal.datastructures.countdownlatch.CountDownLatchAdvancedTest.testNewRaftGroupMemberSchedulesTimeoutsWithSnapshot(CountDownLatchAdvancedTest.java:105)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:114)
at com.hazelcast.test.FailOnTimeoutStatement$CallableStatement.call(FailOnTimeoutStatement.java:106)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.lang.Thread.run(Thread.java:748)
```
|
test
|
countdownlatchadvancedtest testnewraftgroupmemberschedulestimeoutswithsnapshot master commit failed on stacktrace java lang assertionerror at org junit assert fail assert java at org junit assert asserttrue assert java at org junit assert assertfalse assert java at org junit assert assertfalse assert java at com hazelcast cp internal datastructures countdownlatch countdownlatchadvancedtest lambda testnewraftgroupmemberschedulestimeoutswithsnapshot countdownlatchadvancedtest java at com hazelcast test hazelcasttestsupport asserttrueeventually hazelcasttestsupport java at com hazelcast test hazelcasttestsupport asserttrueeventually hazelcasttestsupport java at com hazelcast cp internal datastructures countdownlatch countdownlatchadvancedtest testnewraftgroupmemberschedulestimeoutswithsnapshot countdownlatchadvancedtest java at sun reflect nativemethodaccessorimpl native method at sun reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at sun reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at com hazelcast test failontimeoutstatement callablestatement call failontimeoutstatement java at java util concurrent futuretask run futuretask java at java lang thread run thread java
| 1
|
393,085
| 11,609,916,992
|
IssuesEvent
|
2020-02-26 01:26:28
|
yidongnan/grpc-spring-boot-starter
|
https://api.github.com/repos/yidongnan/grpc-spring-boot-starter
|
closed
|
Support gRPC Java version 1.26.0+
|
enhancement high priority incompatibility
|
**The problem**
If you upgrade to gRPC Java 1.26.0 the GrpcClient annotated stub is no longer able to construct itself. It throws a NoSuchMethod exception for the constructor.
**The solution**
Revert back to 1.25.x
**Alternatives considered**
An alternative methodology of constructing this class by reflection is needed.
**Additional context**
upgraded this library’s dependencies in branch patch-1 to use 1.27.1 of grpc-java, but now i'm getting a ton of errors with this sort of exception: java.lang.NoSuchMethodException: net.devh.boot.grpc.test.proto.TestServiceGrpc$TestServiceStub.<init>(io.grpc.Channel)
|
1.0
|
Support gRPC Java version 1.26.0+ - **The problem**
If you upgrade to gRPC Java 1.26.0 the GrpcClient annotated stub is no longer able to construct itself. It throws a NoSuchMethod exception for the constructor.
**The solution**
Revert back to 1.25.x
**Alternatives considered**
An alternative methodology of constructing this class by reflection is needed.
**Additional context**
upgraded this library’s dependencies in branch patch-1 to use 1.27.1 of grpc-java, but now i'm getting a ton of errors with this sort of exception: java.lang.NoSuchMethodException: net.devh.boot.grpc.test.proto.TestServiceGrpc$TestServiceStub.<init>(io.grpc.Channel)
|
non_test
|
support grpc java version the problem if you upgrade to grpc java the grpcclient annotated stub is no longer able to construct itself it throws a nosuchmethod exception for the constructor the solution revert back to x alternatives considered an alternative methodology of constructing this class by reflection is needed additional context upgraded this library’s dependencies in branch patch to use of grpc java but now i m getting a ton of errors with this sort of exception java lang nosuchmethodexception net devh boot grpc test proto testservicegrpc testservicestub io grpc channel
| 0
|
56,062
| 6,499,966,670
|
IssuesEvent
|
2017-08-23 00:45:18
|
EFForg/https-everywhere
|
https://api.github.com/repos/EFForg/https-everywhere
|
closed
|
[Idea] Tor Onion services
|
Ruleset Testing
|
Some websites are providing access as a Tor Onion service, like:
- DuckDuckGo - http://3g2upl4pq6kufc4m.onion/
- Facebook - https://facebookcorewwwi.onion/
- Tor Project - http://bt3ehg7prnlm6tyv.onion/
- Wikileaks - http://gjlng65kwikileax.onion/
Roger Dingledine (original developer of Tor along with Nick Mathewson and Paul Syverson) says something like "Tor Onion services vs HTTPS only websites is like HTTPS vs HTTP few years ago".
-- https://media.ccc.de/v/32c3-7322-tor_onion_services_more_useful_than_you_think#video&t=1041
I think it would be cool to have an option in HTTPS Everywere which instead of replacing http:// with https:// could replace the domain with the equivalent .onion domain.
I submitted a new issue on https-everywhere because I know this program is a collaboration between EFF and The Tor Project and the aim is to making browsing more secure, so I think there could be an interest for this kind of feature.
> HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. [...]
> HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation.
> -- https://www.eff.org/https-everywhere
Would it makes sense to you? Or do you think it would be better to develop a different project, maybe using the same codebase of https-everywhere?
|
1.0
|
[Idea] Tor Onion services - Some websites are providing access as a Tor Onion service, like:
- DuckDuckGo - http://3g2upl4pq6kufc4m.onion/
- Facebook - https://facebookcorewwwi.onion/
- Tor Project - http://bt3ehg7prnlm6tyv.onion/
- Wikileaks - http://gjlng65kwikileax.onion/
Roger Dingledine (original developer of Tor along with Nick Mathewson and Paul Syverson) says something like "Tor Onion services vs HTTPS only websites is like HTTPS vs HTTP few years ago".
-- https://media.ccc.de/v/32c3-7322-tor_onion_services_more_useful_than_you_think#video&t=1041
I think it would be cool to have an option in HTTPS Everywere which instead of replacing http:// with https:// could replace the domain with the equivalent .onion domain.
I submitted a new issue on https-everywhere because I know this program is a collaboration between EFF and The Tor Project and the aim is to making browsing more secure, so I think there could be an interest for this kind of feature.
> HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. [...]
> HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation.
> -- https://www.eff.org/https-everywhere
Would it makes sense to you? Or do you think it would be better to develop a different project, maybe using the same codebase of https-everywhere?
|
test
|
tor onion services some websites are providing access as a tor onion service like duckduckgo facebook tor project wikileaks roger dingledine original developer of tor along with nick mathewson and paul syverson says something like tor onion services vs https only websites is like https vs http few years ago i think it would be cool to have an option in https everywere which instead of replacing http with https could replace the domain with the equivalent onion domain i submitted a new issue on https everywhere because i know this program is a collaboration between eff and the tor project and the aim is to making browsing more secure so i think there could be an interest for this kind of feature https everywhere is a firefox chrome and opera extension that encrypts your communications with many major websites making your browsing more secure https everywhere is produced as a collaboration between the tor project and the electronic frontier foundation would it makes sense to you or do you think it would be better to develop a different project maybe using the same codebase of https everywhere
| 1
|
370,535
| 10,933,530,142
|
IssuesEvent
|
2019-11-24 02:57:09
|
cuappdev/uplift-ios
|
https://api.github.com/repos/cuappdev/uplift-ios
|
closed
|
Convert MiscellaneousInfoView to a collection view cell
|
Priority: High
|
To accommodate for the overall framework for the facilities section, change `MiscellaneousInfoView` to be a subclass of `UICollectionViewCell`.
|
1.0
|
Convert MiscellaneousInfoView to a collection view cell - To accommodate for the overall framework for the facilities section, change `MiscellaneousInfoView` to be a subclass of `UICollectionViewCell`.
|
non_test
|
convert miscellaneousinfoview to a collection view cell to accommodate for the overall framework for the facilities section change miscellaneousinfoview to be a subclass of uicollectionviewcell
| 0
|
80,546
| 15,586,294,684
|
IssuesEvent
|
2021-03-18 01:36:57
|
saurockSaurav/weather-information-api
|
https://api.github.com/repos/saurockSaurav/weather-information-api
|
opened
|
CVE-2020-24750 (High) detected in jackson-databind-2.8.11.3.jar
|
security vulnerability
|
## CVE-2020-24750 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.11.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /weather-information-api/weather-rest-api-service/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.3/jackson-databind-2.8.11.3.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-1.5.20.RELEASE.jar (Root Library)
- :x: **jackson-databind-2.8.11.3.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
<p>Publish Date: 2020-09-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24750>CVE-2020-24750</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616</a></p>
<p>Release Date: 2020-08-28</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
True
|
CVE-2020-24750 (High) detected in jackson-databind-2.8.11.3.jar - ## CVE-2020-24750 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.8.11.3.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /weather-information-api/weather-rest-api-service/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.11.3/jackson-databind-2.8.11.3.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-1.5.20.RELEASE.jar (Root Library)
- :x: **jackson-databind-2.8.11.3.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
<p>Publish Date: 2020-09-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-24750>CVE-2020-24750</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24616</a></p>
<p>Release Date: 2020-08-28</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
|
non_test
|
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file weather information api weather rest api service pom xml path to vulnerable library root repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library x jackson databind jar vulnerable library vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com pastdev httpcomponents configuration jndiconfiguration publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
| 0
|
224,320
| 17,172,514,333
|
IssuesEvent
|
2021-07-15 07:16:58
|
cyberbotics/webots
|
https://api.github.com/repos/cyberbotics/webots
|
closed
|
Robotino: remove NUE restriction
|
documentation
|
https://cyberbotics.com/doc/guide/robotino3:
remove this line:
`And in WorldInfo the coordinateSystem must be set to "NUE".`
background:
the robotino uses asymmetric friction between wheels and floor (cylinder/box), coulombFriction [ 0, 2, 0]. there was a bug, robotino needed worlds with NUE coordinate system. now it can drive in any coordinate system, thanks to following bugfix:
[#3150](https://github.com/cyberbotics/webots/pull/3150)
|
1.0
|
Robotino: remove NUE restriction - https://cyberbotics.com/doc/guide/robotino3:
remove this line:
`And in WorldInfo the coordinateSystem must be set to "NUE".`
background:
the robotino uses asymmetric friction between wheels and floor (cylinder/box), coulombFriction [ 0, 2, 0]. there was a bug, robotino needed worlds with NUE coordinate system. now it can drive in any coordinate system, thanks to following bugfix:
[#3150](https://github.com/cyberbotics/webots/pull/3150)
|
non_test
|
robotino remove nue restriction remove this line and in worldinfo the coordinatesystem must be set to nue background the robotino uses asymmetric friction between wheels and floor cylinder box coulombfriction there was a bug robotino needed worlds with nue coordinate system now it can drive in any coordinate system thanks to following bugfix
| 0
|
193,935
| 14,665,620,388
|
IssuesEvent
|
2020-12-29 14:37:49
|
status-im/status-react
|
https://api.github.com/repos/status-im/status-react
|
opened
|
java.lang.NullPointerException when creating account or recovering it from seed phrase
|
bug e2e test blocker help to reproduce
|
# Bug Report
## Problem
Several times in weeks (so ~0.5% cases) e2e are failed on account creation (or recovering from seed phrase) with error.
Several times I faced with this error on real device.
#### Expected behavior
no error
#### Actual behavior

### Reproduction
[comment]: # (Describe how we can replicate the bug step by step.)
- Open Status
- Restore multiaccount from seed phrase
### Additional Information
- Status version: nightly 29/12/2020
- Operating System: Android
#### Logs
[logcat (4).log](https://github.com/status-im/status-react/files/5751055/logcat.4.log)
e2e where failed:
1) [test_recover_accounts_with_certain_seedphrase](https://ethstatus.testrail.net/index.php?/tests/view/2089408)
|
1.0
|
java.lang.NullPointerException when creating account or recovering it from seed phrase - # Bug Report
## Problem
Several times in weeks (so ~0.5% cases) e2e are failed on account creation (or recovering from seed phrase) with error.
Several times I faced with this error on real device.
#### Expected behavior
no error
#### Actual behavior

### Reproduction
[comment]: # (Describe how we can replicate the bug step by step.)
- Open Status
- Restore multiaccount from seed phrase
### Additional Information
- Status version: nightly 29/12/2020
- Operating System: Android
#### Logs
[logcat (4).log](https://github.com/status-im/status-react/files/5751055/logcat.4.log)
e2e where failed:
1) [test_recover_accounts_with_certain_seedphrase](https://ethstatus.testrail.net/index.php?/tests/view/2089408)
|
test
|
java lang nullpointerexception when creating account or recovering it from seed phrase bug report problem several times in weeks so cases are failed on account creation or recovering from seed phrase with error several times i faced with this error on real device expected behavior no error actual behavior reproduction describe how we can replicate the bug step by step open status restore multiaccount from seed phrase additional information status version nightly operating system android logs where failed
| 1
|
14,629
| 3,412,435,502
|
IssuesEvent
|
2015-12-05 21:58:27
|
galenframework/galen
|
https://api.github.com/repos/galenframework/galen
|
closed
|
For mobile resolutions, scrollbar need to be removed when page opens up while execution
|
c3 enhancement p3 ready for test
|
For mobile resolutions, scroll bar on right side of window need to be removed when page opens up while execution. scroll bar consumes almost 17 px of page and so the content of webpage behaves differently when same page is viewed using Ctrl+Shft+M
|
1.0
|
For mobile resolutions, scrollbar need to be removed when page opens up while execution - For mobile resolutions, scroll bar on right side of window need to be removed when page opens up while execution. scroll bar consumes almost 17 px of page and so the content of webpage behaves differently when same page is viewed using Ctrl+Shft+M
|
test
|
for mobile resolutions scrollbar need to be removed when page opens up while execution for mobile resolutions scroll bar on right side of window need to be removed when page opens up while execution scroll bar consumes almost px of page and so the content of webpage behaves differently when same page is viewed using ctrl shft m
| 1
|
66,221
| 6,993,211,979
|
IssuesEvent
|
2017-12-15 10:25:24
|
edenlabllc/ehealth.api
|
https://api.github.com/repos/edenlabllc/ehealth.api
|
closed
|
no_tax_id additional verifications
|
epic/no_tax_id kind/task status/test
|
- [x] In Employee Request and Create legal_entity make field 'no_tax_id' optional (set false by default)
- [x] for Create legal_entity if 'no_tax_id'=true answer with 422 verification error 'no_tax_id must be false'
- [x] for Employee_request if no_tax_id=false check that tax_id has next pattern: ^[0-9]{10}$
- [x] for Employee_request if no_tax_id=true check that tax_id has next pattern: ^([0-9]{9}|[А-ЯЁЇIЄҐ]{2}\d{6})$
|
1.0
|
no_tax_id additional verifications - - [x] In Employee Request and Create legal_entity make field 'no_tax_id' optional (set false by default)
- [x] for Create legal_entity if 'no_tax_id'=true answer with 422 verification error 'no_tax_id must be false'
- [x] for Employee_request if no_tax_id=false check that tax_id has next pattern: ^[0-9]{10}$
- [x] for Employee_request if no_tax_id=true check that tax_id has next pattern: ^([0-9]{9}|[А-ЯЁЇIЄҐ]{2}\d{6})$
|
test
|
no tax id additional verifications in employee request and create legal entity make field no tax id optional set false by default for create legal entity if no tax id true answer with verification error no tax id must be false for employee request if no tax id false check that tax id has next pattern for employee request if no tax id true check that tax id has next pattern d
| 1
|
26,126
| 2,684,185,139
|
IssuesEvent
|
2015-03-28 18:49:25
|
ConEmu/old-issues
|
https://api.github.com/repos/ConEmu/old-issues
|
closed
|
Infinite tab opening for jumplist item "Powershell -version 2.0"
|
1 star bug imported Priority-Medium
|
_From [zippy1...@gmail.com](https://code.google.com/u/104528604277004292328/) on September 26, 2012 06:45:40_
Required information! OS version: Win7 SP1 x64 ConEmu version: 120925
As of the latest build of ConEmu , I have been have been getting some "infinite tab" issues. It seems to occur whenever I start up PowerShell.exe with parameters. These jumplist tasks have worked fine with previous versions.
The following tasks opens up one PowerShell tab:
[HKEY_CURRENT_USER\Software\ ConEmu \.Vanilla\Tasks\Task1]
"Name"="{Powershell}"
"GuiArgs"="/single /Dir %userprofile%"
"Active"=dword:00000000
"Count"=dword:00000001
"Cmd1"="%SystemRoot%\\system32\\WindowsPowerShell\\v1.0\\powershell.exe"
[HKEY_CURRENT_USER\Software\ ConEmu \.Vanilla\Tasks\Task2]
"Name"="{Powershell x86}"
"GuiArgs"="/single /Dir %userprofile%"
"Cmd1"="%SystemRoot%\\syswow64\\WindowsPowerShell\\v1.0\\powershell.exe"
"Active"=dword:00000000
"Count"=dword:00000001
However, the following will cause a large recursion of tabs to open until I use pskill. Windows seems to stop the processbomb from happening eventually.
[HKEY_CURRENT_USER\Software\ ConEmu \.Vanilla\Tasks\Task3]
"Name"="{Powershell v2.0}"
"GuiArgs"="/single /Dir %userprofile%"
"Cmd1"="%SystemRoot%\\system32\\WindowsPowerShell\\v1.0\\powershell.exe -Version 2.0"
"Active"=dword:00000000
"Count"=dword:00000001
[HKEY_CURRENT_USER\Software\ ConEmu \.Vanilla\Tasks\Task4]
"Name"="{Powershell x86 v2.0}"
"GuiArgs"="/single /Dir %userprofile%"
"Active"=dword:00000000
"Count"=dword:00000001
"Cmd1"="%SystemRoot%\\syswow64\\WindowsPowerShell\\v1.0\\powershell.exe -Version 2.0"
While I'd like to resolve the root cause of this, it might be a good idea to introduce some defensive programming and limit (to a configurable number) the maximum amount of tabs spawned in a period of 3 seconds.
_Original issue: http://code.google.com/p/conemu-maximus5/issues/detail?id=725_
|
1.0
|
Infinite tab opening for jumplist item "Powershell -version 2.0" - _From [zippy1...@gmail.com](https://code.google.com/u/104528604277004292328/) on September 26, 2012 06:45:40_
Required information! OS version: Win7 SP1 x64 ConEmu version: 120925
As of the latest build of ConEmu , I have been have been getting some "infinite tab" issues. It seems to occur whenever I start up PowerShell.exe with parameters. These jumplist tasks have worked fine with previous versions.
The following tasks opens up one PowerShell tab:
[HKEY_CURRENT_USER\Software\ ConEmu \.Vanilla\Tasks\Task1]
"Name"="{Powershell}"
"GuiArgs"="/single /Dir %userprofile%"
"Active"=dword:00000000
"Count"=dword:00000001
"Cmd1"="%SystemRoot%\\system32\\WindowsPowerShell\\v1.0\\powershell.exe"
[HKEY_CURRENT_USER\Software\ ConEmu \.Vanilla\Tasks\Task2]
"Name"="{Powershell x86}"
"GuiArgs"="/single /Dir %userprofile%"
"Cmd1"="%SystemRoot%\\syswow64\\WindowsPowerShell\\v1.0\\powershell.exe"
"Active"=dword:00000000
"Count"=dword:00000001
However, the following will cause a large recursion of tabs to open until I use pskill. Windows seems to stop the processbomb from happening eventually.
[HKEY_CURRENT_USER\Software\ ConEmu \.Vanilla\Tasks\Task3]
"Name"="{Powershell v2.0}"
"GuiArgs"="/single /Dir %userprofile%"
"Cmd1"="%SystemRoot%\\system32\\WindowsPowerShell\\v1.0\\powershell.exe -Version 2.0"
"Active"=dword:00000000
"Count"=dword:00000001
[HKEY_CURRENT_USER\Software\ ConEmu \.Vanilla\Tasks\Task4]
"Name"="{Powershell x86 v2.0}"
"GuiArgs"="/single /Dir %userprofile%"
"Active"=dword:00000000
"Count"=dword:00000001
"Cmd1"="%SystemRoot%\\syswow64\\WindowsPowerShell\\v1.0\\powershell.exe -Version 2.0"
While I'd like to resolve the root cause of this, it might be a good idea to introduce some defensive programming and limit (to a configurable number) the maximum amount of tabs spawned in a period of 3 seconds.
_Original issue: http://code.google.com/p/conemu-maximus5/issues/detail?id=725_
|
non_test
|
infinite tab opening for jumplist item powershell version from on september required information os version conemu version as of the latest build of conemu i have been have been getting some infinite tab issues it seems to occur whenever i start up powershell exe with parameters these jumplist tasks have worked fine with previous versions the following tasks opens up one powershell tab name powershell guiargs single dir userprofile active dword count dword systemroot windowspowershell powershell exe name powershell guiargs single dir userprofile systemroot windowspowershell powershell exe active dword count dword however the following will cause a large recursion of tabs to open until i use pskill windows seems to stop the processbomb from happening eventually name powershell guiargs single dir userprofile systemroot windowspowershell powershell exe version active dword count dword name powershell guiargs single dir userprofile active dword count dword systemroot windowspowershell powershell exe version while i d like to resolve the root cause of this it might be a good idea to introduce some defensive programming and limit to a configurable number the maximum amount of tabs spawned in a period of seconds original issue
| 0
|
5,139
| 7,036,009,509
|
IssuesEvent
|
2017-12-28 05:33:08
|
Microsoft/vsts-tasks
|
https://api.github.com/repos/Microsoft/vsts-tasks
|
closed
|
Cannot Run Service Fabric Tasks on Deployment Groups
|
Area: Release Area: ServiceFabric enhancement Status: Resolved
|
Hi everyone, so we ran into an issue this week where we need to run the Service Fabric related tasks in a Deployment Group (details below). I found these pull requests (#3412, #3527) that add the `runsOn` property that limits the tasks to only build agents, making it so that we can't use them on Deployment Groups. I can create a pull request if needed (created: #5098), but in the short term I created a modified version of the tasks that changes the `runsOn` property to allow Deployment Groups.
### In short: The `runsOn` property artificially constrained a perfectly valid use case. Can we get it updated to allow Deployment Groups?
**Scenario:**
We are running Service Fabric inside of a virtual network with an internal load balancer (no public IP), and we have a JumpBox/Bastion VM that is available publicly that has access to the fabric cluster. Because of that we have set up the JumpBox to perform the actual deployment to the cluster, and also joined the JumpBox to VSTS as part of a Deployment Group. So the only thing we needed to do differently from a publicly available fabric cluster was to run the VSTS release in the context of the JumpBox, but since the task wasn't available to Deployment Groups we couldn't run the deployment tasks.
Now I understand the rational behind not making this available to deployment groups (talk to the cluster, not to individual VMs), but in this case we were artificially constrained by this. The only change we made was to change the `runsOn` property, and the task worked out of the box.
Thanks everyone!
|
1.0
|
Cannot Run Service Fabric Tasks on Deployment Groups - Hi everyone, so we ran into an issue this week where we need to run the Service Fabric related tasks in a Deployment Group (details below). I found these pull requests (#3412, #3527) that add the `runsOn` property that limits the tasks to only build agents, making it so that we can't use them on Deployment Groups. I can create a pull request if needed (created: #5098), but in the short term I created a modified version of the tasks that changes the `runsOn` property to allow Deployment Groups.
### In short: The `runsOn` property artificially constrained a perfectly valid use case. Can we get it updated to allow Deployment Groups?
**Scenario:**
We are running Service Fabric inside of a virtual network with an internal load balancer (no public IP), and we have a JumpBox/Bastion VM that is available publicly that has access to the fabric cluster. Because of that we have set up the JumpBox to perform the actual deployment to the cluster, and also joined the JumpBox to VSTS as part of a Deployment Group. So the only thing we needed to do differently from a publicly available fabric cluster was to run the VSTS release in the context of the JumpBox, but since the task wasn't available to Deployment Groups we couldn't run the deployment tasks.
Now I understand the rational behind not making this available to deployment groups (talk to the cluster, not to individual VMs), but in this case we were artificially constrained by this. The only change we made was to change the `runsOn` property, and the task worked out of the box.
Thanks everyone!
|
non_test
|
cannot run service fabric tasks on deployment groups hi everyone so we ran into an issue this week where we need to run the service fabric related tasks in a deployment group details below i found these pull requests that add the runson property that limits the tasks to only build agents making it so that we can t use them on deployment groups i can create a pull request if needed created but in the short term i created a modified version of the tasks that changes the runson property to allow deployment groups in short the runson property artificially constrained a perfectly valid use case can we get it updated to allow deployment groups scenario we are running service fabric inside of a virtual network with an internal load balancer no public ip and we have a jumpbox bastion vm that is available publicly that has access to the fabric cluster because of that we have set up the jumpbox to perform the actual deployment to the cluster and also joined the jumpbox to vsts as part of a deployment group so the only thing we needed to do differently from a publicly available fabric cluster was to run the vsts release in the context of the jumpbox but since the task wasn t available to deployment groups we couldn t run the deployment tasks now i understand the rational behind not making this available to deployment groups talk to the cluster not to individual vms but in this case we were artificially constrained by this the only change we made was to change the runson property and the task worked out of the box thanks everyone
| 0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.