Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 4 112 | repo_url stringlengths 33 141 | action stringclasses 3 values | title stringlengths 1 1.02k | labels stringlengths 4 1.54k | body stringlengths 1 262k | index stringclasses 17 values | text_combine stringlengths 95 262k | label stringclasses 2 values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
185,670 | 15,027,999,931 | IssuesEvent | 2021-02-02 02:04:58 | open-telemetry/opentelemetry-java-instrumentation | https://api.github.com/repos/open-telemetry/opentelemetry-java-instrumentation | closed | Document which methods we typically static import | contributor experience documentation priority:p2 release:required-for-ga | This will help new contributors know and follow existing style / convention. | 1.0 | Document which methods we typically static import - This will help new contributors know and follow existing style / convention. | non_test | document which methods we typically static import this will help new contributors know and follow existing style convention | 0 |
27,317 | 4,300,609,119 | IssuesEvent | 2016-07-20 02:17:37 | tredly/tredly | https://api.github.com/repos/tredly/tredly | closed | tredly hostname of "tredly" appears in roots SSH keys | needs testing | Root ssh keys are set up during the first boot, and these come with a comment of root@tredly. If the hostname is changed during the installer these still end up as root@tredly. | 1.0 | tredly hostname of "tredly" appears in roots SSH keys - Root ssh keys are set up during the first boot, and these come with a comment of root@tredly. If the hostname is changed during the installer these still end up as root@tredly. | test | tredly hostname of tredly appears in roots ssh keys root ssh keys are set up during the first boot and these come with a comment of root tredly if the hostname is changed during the installer these still end up as root tredly | 1 |
270,916 | 29,146,867,814 | IssuesEvent | 2023-05-18 04:21:56 | momo-tong/io.netty-netty-all-4.1.41.Final | https://api.github.com/repos/momo-tong/io.netty-netty-all-4.1.41.Final | opened | log4j-1.2.17.jar: 8 vulnerabilities (highest severity is: 9.8) | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (log4j version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2022-23305](https://www.mend.io/vulnerability-database/CVE-2022-23305) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.8 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.2 | ❌ |
| [CVE-2019-17571](https://www.mend.io/vulnerability-database/CVE-2019-17571) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.8 | log4j-1.2.17.jar | Direct | log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16 | ❌ |
| [CVE-2020-9493](https://www.mend.io/vulnerability-database/CVE-2020-9493) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.8 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.1 | ❌ |
| [CVE-2022-23307](https://www.mend.io/vulnerability-database/CVE-2022-23307) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.1 | ❌ |
| [CVE-2022-23302](https://www.mend.io/vulnerability-database/CVE-2022-23302) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.1 | ❌ |
| [CVE-2021-4104](https://www.mend.io/vulnerability-database/CVE-2021-4104) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | log4j-1.2.17.jar | Direct | uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module | ❌ |
| [CVE-2023-26464](https://www.mend.io/vulnerability-database/CVE-2023-26464) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | log4j-1.2.17.jar | Direct | org.apache.logging.log4j:log4j-core:2.0 | ❌ |
| [CVE-2020-9488](https://www.mend.io/vulnerability-database/CVE-2020-9488) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 3.7 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.3 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23305</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23305>CVE-2022-23305</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.2</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-17571</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
<p>Publish Date: 2019-12-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17571>CVE-2019-17571</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E">https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E</a></p>
<p>Release Date: 2019-12-20</p>
<p>Fix Resolution: log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-9493</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
<p>Publish Date: 2021-06-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9493>CVE-2020-9493</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openwall.com/lists/oss-security/2021/06/16/1">https://www.openwall.com/lists/oss-security/2021/06/16/1</a></p>
<p>Release Date: 2021-06-16</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23307</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23307>CVE-2022-23307</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23302</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23302>CVE-2022-23302</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2021-4104</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2021-12-14
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-4104>CVE-2021-4104</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">https://nvd.nist.gov/vuln/detail/CVE-2021-4104</a></p>
<p>Release Date: 2021-12-14</p>
<p>Fix Resolution: uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2023-26464</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
** UNSUPPORTED WHEN ASSIGNED **
When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested)
hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized.
This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
<p>Publish Date: 2023-03-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-26464>CVE-2023-26464</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-vp98-w2p3-mv35">https://github.com/advisories/GHSA-vp98-w2p3-mv35</a></p>
<p>Release Date: 2023-03-10</p>
<p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.0</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2020-9488</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1
<p>Publish Date: 2020-04-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9488>CVE-2020-9488</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>3.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2020-04-27</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.3</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details> | True | log4j-1.2.17.jar: 8 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (log4j version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2022-23305](https://www.mend.io/vulnerability-database/CVE-2022-23305) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.8 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.2 | ❌ |
| [CVE-2019-17571](https://www.mend.io/vulnerability-database/CVE-2019-17571) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.8 | log4j-1.2.17.jar | Direct | log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16 | ❌ |
| [CVE-2020-9493](https://www.mend.io/vulnerability-database/CVE-2020-9493) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.8 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.1 | ❌ |
| [CVE-2022-23307](https://www.mend.io/vulnerability-database/CVE-2022-23307) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.1 | ❌ |
| [CVE-2022-23302](https://www.mend.io/vulnerability-database/CVE-2022-23302) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 8.8 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.1 | ❌ |
| [CVE-2021-4104](https://www.mend.io/vulnerability-database/CVE-2021-4104) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | log4j-1.2.17.jar | Direct | uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module | ❌ |
| [CVE-2023-26464](https://www.mend.io/vulnerability-database/CVE-2023-26464) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | log4j-1.2.17.jar | Direct | org.apache.logging.log4j:log4j-core:2.0 | ❌ |
| [CVE-2020-9488](https://www.mend.io/vulnerability-database/CVE-2020-9488) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low | 3.7 | log4j-1.2.17.jar | Direct | ch.qos.reload4j:reload4j:1.2.18.3 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23305</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23305>CVE-2022-23305</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.2</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-17571</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
<p>Publish Date: 2019-12-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17571>CVE-2019-17571</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E">https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E</a></p>
<p>Release Date: 2019-12-20</p>
<p>Fix Resolution: log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-9493</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
<p>Publish Date: 2021-06-16
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9493>CVE-2020-9493</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.openwall.com/lists/oss-security/2021/06/16/1">https://www.openwall.com/lists/oss-security/2021/06/16/1</a></p>
<p>Release Date: 2021-06-16</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23307</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23307>CVE-2022-23307</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2022-23302</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2022-01-18
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23302>CVE-2022-23302</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2022-01-18</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2021-4104</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2021-12-14
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-4104>CVE-2021-4104</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">https://nvd.nist.gov/vuln/detail/CVE-2021-4104</a></p>
<p>Release Date: 2021-12-14</p>
<p>Fix Resolution: uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2023-26464</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
** UNSUPPORTED WHEN ASSIGNED **
When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested)
hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized.
This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
<p>Publish Date: 2023-03-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-26464>CVE-2023-26464</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-vp98-w2p3-mv35">https://github.com/advisories/GHSA-vp98-w2p3-mv35</a></p>
<p>Release Date: 2023-03-10</p>
<p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.0</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> CVE-2020-9488</summary>
### Vulnerable Library - <b>log4j-1.2.17.jar</b></p>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1
<p>Publish Date: 2020-04-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9488>CVE-2020-9488</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>3.7</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p>
<p>Release Date: 2020-04-27</p>
<p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.3</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details> | non_test | jar vulnerabilities highest severity is vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in version remediation available high jar direct ch qos high jar direct manual javadoc high jar direct ch qos high jar direct ch qos high jar direct ch qos high jar direct uom parent module module uom se javadoc module parfait examples module manual si units javadoc module unit api module module unit api javadoc module parfait module module javadoc uom systems javadoc module uom lib javadoc module uom systems module module uom se module module uom lib module module parfait javadoc module pcp parfait agent module si units module module high jar direct org apache logging core low jar direct ch qos details cve vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy x jar vulnerable library found in head commit a href found in base branch master vulnerability details by design the jdbcappender in x accepts an sql statement as a configuration parameter where the values to be inserted are converters from patternlayout the message converter m is likely to always be included this allows attackers to manipulate the sql by entering crafted strings into input fields or headers of an application that are logged allowing unintended sql queries to be executed note this issue only affects x when specifically configured to use the jdbcappender which is not the default beginning in version the jdbcappender was re introduced with proper support for parameterized sql queries and further customization over the columns written to in logs apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos step up your open source security game with mend cve vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy x jar vulnerable library found in head commit a href found in base branch master vulnerability details included in is a socketserver class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data this affects versions up to up to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution manual javadoc step up your open source security game with mend cve vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy x jar vulnerable library found in head commit a href found in base branch master vulnerability details a deserialization flaw was found in apache chainsaw versions prior to which could lead to malicious code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos step up your open source security game with mend cve vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy x jar vulnerable library found in head commit a href found in base branch master vulnerability details cve identified a deserialization issue that was present in apache chainsaw prior to chainsaw chainsaw was a component of apache x where the same issue exists publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution ch qos step up your open source security game with mend cve vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy x jar vulnerable library found in head commit a href found in base branch master vulnerability details jmssink in all versions of x is vulnerable to deserialization of untrusted data when the attacker has write access to the configuration or if the configuration references an ldap service the attacker has access to the attacker can provide a topicconnectionfactorybindingname configuration causing jmssink to perform jndi requests that result in remote code execution in a similar fashion to cve note this issue only affects x when specifically configured to use jmssink which is not the default apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos step up your open source security game with mend cve vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy x jar vulnerable library found in head commit a href found in base branch master vulnerability details jmsappender in is vulnerable to deserialization of untrusted data when the attacker has write access to the configuration the attacker can provide topicbindingname and topicconnectionfactorybindingname configurations causing jmsappender to perform jndi requests that result in remote code execution in a similar fashion to cve note this issue only affects when specifically configured to use jmsappender which is not the default apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution uom parent module module uom se javadoc module parfait examples module manual si units javadoc module unit api module module unit api javadoc module parfait module module javadoc uom systems javadoc module uom lib javadoc module uom systems module module uom se module module uom lib module module parfait javadoc module pcp parfait agent module si units module module step up your open source security game with mend cve vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy x jar vulnerable library found in head commit a href found in base branch master vulnerability details unsupported when assigned when using the chainsaw or socketappender components with x on jre less than an attacker that manages to cause a logging entry involving a specially crafted ie deeply nested hashmap or hashtable depending on which logging component is in use to be processed could exhaust the available memory in the virtual machine and achieve denial of service when the object is deserialized this issue affects apache before affected users are recommended to update to x note this vulnerability only affects products that are no longer supported by the maintainer publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache logging core step up your open source security game with mend cve vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy x jar vulnerable library found in head commit a href found in base branch master vulnerability details improper validation of certificate with host mismatch in apache smtp appender this could allow an smtps connection to be intercepted by a man in the middle attack which could leak any log messages sent through that appender fixed in apache and publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos step up your open source security game with mend | 0 |
238,175 | 19,701,905,502 | IssuesEvent | 2022-01-12 17:26:06 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | Failing test: Chrome UI Functional Tests.test/functional/apps/dashboard_elements/index·ts - dashboard elements "before all" hook in "dashboard elements" | failed-test needs-team | A test failed on a tracked branch
```
ResponseError: illegal_argument_exception: [illegal_argument_exception] Reason: request [/.kibana_1] contains unrecognized parameter: [include_type_name]
at onBody (node_modules/@elastic/elasticsearch/lib/Transport.js:367:23)
at IncomingMessage.onEnd (node_modules/@elastic/elasticsearch/lib/Transport.js:291:11)
at IncomingMessage.emit (node:events:402:35)
at endReadableNT (node:internal/streams/readable:1343:12)
at processTicksAndRejections (node:internal/process/task_queues:83:21) {
meta: {
body: { error: [Object], status: 400 },
statusCode: 400,
headers: {
'x-elastic-product': 'Elasticsearch',
'content-type': 'application/json;charset=utf-8',
'content-length': '283'
},
meta: {
context: null,
request: [Object],
name: 'elasticsearch-js',
connection: [Object],
attempts: 0,
aborted: false
}
}
}
```
First failure: [CI Build - 7.17](https://buildkite.com/elastic/kibana-7-dot-latest-es-forward-compatibility/builds/1#05b02b56-d32e-48ab-9354-52d9b418bd0d)
<!-- kibanaCiData = {"failed-test":{"test.class":"Chrome UI Functional Tests.test/functional/apps/dashboard_elements/index·ts","test.name":"dashboard elements \"before all\" hook in \"dashboard elements\"","test.failCount":2}} --> | 1.0 | Failing test: Chrome UI Functional Tests.test/functional/apps/dashboard_elements/index·ts - dashboard elements "before all" hook in "dashboard elements" - A test failed on a tracked branch
```
ResponseError: illegal_argument_exception: [illegal_argument_exception] Reason: request [/.kibana_1] contains unrecognized parameter: [include_type_name]
at onBody (node_modules/@elastic/elasticsearch/lib/Transport.js:367:23)
at IncomingMessage.onEnd (node_modules/@elastic/elasticsearch/lib/Transport.js:291:11)
at IncomingMessage.emit (node:events:402:35)
at endReadableNT (node:internal/streams/readable:1343:12)
at processTicksAndRejections (node:internal/process/task_queues:83:21) {
meta: {
body: { error: [Object], status: 400 },
statusCode: 400,
headers: {
'x-elastic-product': 'Elasticsearch',
'content-type': 'application/json;charset=utf-8',
'content-length': '283'
},
meta: {
context: null,
request: [Object],
name: 'elasticsearch-js',
connection: [Object],
attempts: 0,
aborted: false
}
}
}
```
First failure: [CI Build - 7.17](https://buildkite.com/elastic/kibana-7-dot-latest-es-forward-compatibility/builds/1#05b02b56-d32e-48ab-9354-52d9b418bd0d)
<!-- kibanaCiData = {"failed-test":{"test.class":"Chrome UI Functional Tests.test/functional/apps/dashboard_elements/index·ts","test.name":"dashboard elements \"before all\" hook in \"dashboard elements\"","test.failCount":2}} --> | test | failing test chrome ui functional tests test functional apps dashboard elements index·ts dashboard elements before all hook in dashboard elements a test failed on a tracked branch responseerror illegal argument exception reason request contains unrecognized parameter at onbody node modules elastic elasticsearch lib transport js at incomingmessage onend node modules elastic elasticsearch lib transport js at incomingmessage emit node events at endreadablent node internal streams readable at processticksandrejections node internal process task queues meta body error status statuscode headers x elastic product elasticsearch content type application json charset utf content length meta context null request name elasticsearch js connection attempts aborted false first failure | 1 |
177,519 | 13,727,501,050 | IssuesEvent | 2020-10-04 06:48:17 | rust-lang/rust | https://api.github.com/repos/rust-lang/rust | closed | ICE when using nalgebra type in impl Trait type alias. | C-bug E-needs-test F-type_alias_impl_trait I-ICE T-compiler glacier | ### Code
src/lib.rs
```Rust
#![feature(type_alias_impl_trait)]
use nalgebra::Vector3;
pub type A = impl Fn(Vector3<f64>);
pub fn foo() -> A {
|_| ()
}
```
Cargo.toml
```toml
[package]
name = "bug"
version = "0.1.0"
edition = "2018"
[dependencies]
nalgebra = "0.21"
```
### Meta
`rustc --version --verbose`:
```
rustc 1.46.0-nightly (daecab3a7 2020-07-10)
binary: rustc
commit-hash: daecab3a784f28082df90cebb204998051f3557d
commit-date: 2020-07-10
host: x86_64-unknown-linux-gnu
release: 1.46.0-nightly
LLVM version: 10.0
```
### Error output
```
error: internal compiler error: src/librustc_mir/borrow_check/type_check/free_region_relations.rs:324:33: failed to compute implied bounds impl std::ops::Fn<(nalgebra::Matrix<f64, nalgebra::U3, nalgebra::U1, <nalgebra::DefaultAllocator as nalgebra::allocator::Allocator<f64, nalgebra::U3>>::Buffer>,)>
thread 'rustc' panicked at 'Box<Any>', src/librustc_errors/lib.rs:916:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
note: the compiler unexpectedly panicked. this is a bug.
note: we would appreciate a bug report: https://github.com/rust-lang/rust/blob/master/CONTRIBUTING.md#bug-reports
note: rustc 1.46.0-nightly (daecab3a7 2020-07-10) running on x86_64-unknown-linux-gnu
note: compiler flags: -C embed-bitcode=no -C debuginfo=2 -C incremental --crate-type lib
note: some of the compiler flags provided by cargo are hidden
error: aborting due to previous error
error: could not compile `bug`.
To learn more, run the command again with --verbose.
```
<details><summary><strong>Backtrace</strong></summary>
<p>
```
error: internal compiler error: src/librustc_mir/borrow_check/type_check/free_region_relations.rs:324:33: failed to compute implied bounds impl std::ops::Fn<(nalgebra::Matrix<f64, nalgebra::U3, nalgebra::U1, <nalgebra::DefaultAllocator as nalgebra::allocator::Allocator<f64, nalgebra::U3>>::Buffer>,)>
thread 'rustc' panicked at 'Box<Any>', src/librustc_errors/lib.rs:916:9
stack backtrace:
0: backtrace::backtrace::libunwind::trace
at /cargo/registry/src/github.com-1ecc6299db9ec823/backtrace-0.3.46/src/backtrace/libunwind.rs:86
1: backtrace::backtrace::trace_unsynchronized
at /cargo/registry/src/github.com-1ecc6299db9ec823/backtrace-0.3.46/src/backtrace/mod.rs:66
2: std::sys_common::backtrace::_print_fmt
at src/libstd/sys_common/backtrace.rs:78
3: <std::sys_common::backtrace::_print::DisplayBacktrace as core::fmt::Display>::fmt
at src/libstd/sys_common/backtrace.rs:59
4: core::fmt::write
at src/libcore/fmt/mod.rs:1076
5: std::io::Write::write_fmt
at src/libstd/io/mod.rs:1537
6: std::sys_common::backtrace::_print
at src/libstd/sys_common/backtrace.rs:62
7: std::sys_common::backtrace::print
at src/libstd/sys_common/backtrace.rs:49
8: std::panicking::default_hook::{{closure}}
at src/libstd/panicking.rs:198
9: std::panicking::default_hook
at src/libstd/panicking.rs:217
10: rustc_driver::report_ice
11: std::panicking::rust_panic_with_hook
at src/libstd/panicking.rs:530
12: std::panicking::begin_panic
13: rustc_errors::HandlerInner::bug
14: rustc_errors::Handler::bug
15: rustc_middle::util::bug::opt_span_bug_fmt::{{closure}}
16: rustc_middle::ty::context::tls::with_opt::{{closure}}
17: rustc_middle::ty::context::tls::with_opt
18: rustc_middle::util::bug::opt_span_bug_fmt
19: rustc_middle::util::bug::bug_fmt
20: rustc_mir::borrow_check::type_check::free_region_relations::UniversalRegionRelationsBuilder::add_implied_bounds::{{closure}}
21: core::ops::function::impls::<impl core::ops::function::FnOnce<A> for &mut F>::call_once
22: <core::iter::adapters::flatten::FlatMap<I,U,F> as core::iter::traits::iterator::Iterator>::next
23: <alloc::vec::Vec<T> as alloc::vec::SpecExtend<T,I>>::from_iter
24: rustc_mir::borrow_check::type_check::free_region_relations::create
25: rustc_mir::borrow_check::type_check::type_check
26: rustc_mir::borrow_check::nll::compute_regions
27: rustc_mir::borrow_check::do_mir_borrowck
28: rustc_infer::infer::InferCtxtBuilder::enter
29: rustc_mir::borrow_check::mir_borrowck
30: rustc_middle::ty::query::<impl rustc_query_system::query::config::QueryAccessors<rustc_middle::ty::context::TyCtxt> for rustc_middle::ty::query::queries::mir_borrowck>::compute
31: rustc_middle::dep_graph::<impl rustc_query_system::dep_graph::DepKind for rustc_middle::dep_graph::dep_node::DepKind>::with_deps
32: rustc_query_system::dep_graph::graph::DepGraph<K>::with_task_impl
33: rustc_data_structures::stack::ensure_sufficient_stack
34: rustc_query_system::query::plumbing::get_query_impl
35: rustc_typeck::collect::type_of::find_opaque_ty_constraints::ConstraintLocator::check
36: rustc_hir::intravisit::Visitor::visit_nested_item
37: rustc_typeck::collect::type_of::type_of
38: rustc_middle::ty::query::<impl rustc_query_system::query::config::QueryAccessors<rustc_middle::ty::context::TyCtxt> for rustc_middle::ty::query::queries::type_of>::compute
39: rustc_middle::dep_graph::<impl rustc_query_system::dep_graph::DepKind for rustc_middle::dep_graph::dep_node::DepKind>::with_deps
40: rustc_query_system::dep_graph::graph::DepGraph<K>::with_task_impl
41: rustc_data_structures::stack::ensure_sufficient_stack
42: rustc_query_system::query::plumbing::get_query_impl
43: rustc_query_system::query::plumbing::ensure_query_impl
44: <rustc_typeck::collect::CollectItemTypesVisitor as rustc_hir::intravisit::Visitor>::visit_item
45: rustc_middle::hir::map::Map::visit_item_likes_in_module
46: rustc_typeck::collect::collect_mod_item_types
47: rustc_middle::ty::query::<impl rustc_query_system::query::config::QueryAccessors<rustc_middle::ty::context::TyCtxt> for rustc_middle::ty::query::queries::collect_mod_item_types>::compute
48: rustc_middle::dep_graph::<impl rustc_query_system::dep_graph::DepKind for rustc_middle::dep_graph::dep_node::DepKind>::with_deps
49: rustc_query_system::dep_graph::graph::DepGraph<K>::with_task_impl
50: rustc_data_structures::stack::ensure_sufficient_stack
51: rustc_query_system::query::plumbing::get_query_impl
52: rustc_query_system::query::plumbing::ensure_query_impl
53: rustc_session::session::Session::track_errors
54: rustc_typeck::check_crate
55: rustc_interface::passes::analysis
56: rustc_middle::ty::query::<impl rustc_query_system::query::config::QueryAccessors<rustc_middle::ty::context::TyCtxt> for rustc_middle::ty::query::queries::analysis>::compute
57: rustc_middle::dep_graph::<impl rustc_query_system::dep_graph::DepKind for rustc_middle::dep_graph::dep_node::DepKind>::with_deps
58: rustc_query_system::dep_graph::graph::DepGraph<K>::with_task_impl
59: rustc_query_system::query::plumbing::get_query_impl
60: rustc_middle::ty::context::tls::enter_global
61: rustc_interface::queries::<impl rustc_interface::interface::Compiler>::enter
62: rustc_span::with_source_map
63: rustc_interface::interface::run_compiler_in_existing_thread_pool
64: scoped_tls::ScopedKey<T>::set
note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.
note: the compiler unexpectedly panicked. this is a bug.
note: we would appreciate a bug report: https://github.com/rust-lang/rust/blob/master/CONTRIBUTING.md#bug-reports
note: rustc 1.46.0-nightly (daecab3a7 2020-07-10) running on x86_64-unknown-linux-gnu
note: compiler flags: -C embed-bitcode=no -C debuginfo=2 -C incremental --crate-type lib
note: some of the compiler flags provided by cargo are hidden
query stack during panic:
#0 [mir_borrowck] borrow-checking `foo`
#1 [type_of] computing type of `A::{{opaque}}#0`
#2 [collect_mod_item_types] collecting item types in top-level module
#3 [analysis] running analysis passes on this crate
end of query stack
error: aborting due to previous error
error: could not compile `bug`.
To learn more, run the command again with --verbose.
```
</p>
</details>
### Bisection
searched nightlies: from nightly-2019-10-03 to nightly-2020-07-05
regressed nightly: nightly-2020-02-16
searched commits: from https://github.com/rust-lang/rust/commit/433aae93e4ef866a1fdfefad136b32ed89acd3e7 to https://github.com/rust-lang/rust/commit/61d9231ff2604a0467987042d9ebf9ff9ea739b5
regressed commit: https://github.com/rust-lang/rust/commit/19288ddfd6b3448c2c221d75610bff722a6582e8
<details>
<summary>bisected with <a href='https://github.com/rust-lang/cargo-bisect-rustc'>cargo-bisect-rustc</a> v0.5.1</summary>
Host triple: x86_64-unknown-linux-gnu
Reproduce with:
```bash
cargo bisect-rustc --start 2019-10-03 --end 2020-07-05 --with-cargo --prompt -- check
``` | 1.0 | ICE when using nalgebra type in impl Trait type alias. - ### Code
src/lib.rs
```Rust
#![feature(type_alias_impl_trait)]
use nalgebra::Vector3;
pub type A = impl Fn(Vector3<f64>);
pub fn foo() -> A {
|_| ()
}
```
Cargo.toml
```toml
[package]
name = "bug"
version = "0.1.0"
edition = "2018"
[dependencies]
nalgebra = "0.21"
```
### Meta
`rustc --version --verbose`:
```
rustc 1.46.0-nightly (daecab3a7 2020-07-10)
binary: rustc
commit-hash: daecab3a784f28082df90cebb204998051f3557d
commit-date: 2020-07-10
host: x86_64-unknown-linux-gnu
release: 1.46.0-nightly
LLVM version: 10.0
```
### Error output
```
error: internal compiler error: src/librustc_mir/borrow_check/type_check/free_region_relations.rs:324:33: failed to compute implied bounds impl std::ops::Fn<(nalgebra::Matrix<f64, nalgebra::U3, nalgebra::U1, <nalgebra::DefaultAllocator as nalgebra::allocator::Allocator<f64, nalgebra::U3>>::Buffer>,)>
thread 'rustc' panicked at 'Box<Any>', src/librustc_errors/lib.rs:916:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
note: the compiler unexpectedly panicked. this is a bug.
note: we would appreciate a bug report: https://github.com/rust-lang/rust/blob/master/CONTRIBUTING.md#bug-reports
note: rustc 1.46.0-nightly (daecab3a7 2020-07-10) running on x86_64-unknown-linux-gnu
note: compiler flags: -C embed-bitcode=no -C debuginfo=2 -C incremental --crate-type lib
note: some of the compiler flags provided by cargo are hidden
error: aborting due to previous error
error: could not compile `bug`.
To learn more, run the command again with --verbose.
```
<details><summary><strong>Backtrace</strong></summary>
<p>
```
error: internal compiler error: src/librustc_mir/borrow_check/type_check/free_region_relations.rs:324:33: failed to compute implied bounds impl std::ops::Fn<(nalgebra::Matrix<f64, nalgebra::U3, nalgebra::U1, <nalgebra::DefaultAllocator as nalgebra::allocator::Allocator<f64, nalgebra::U3>>::Buffer>,)>
thread 'rustc' panicked at 'Box<Any>', src/librustc_errors/lib.rs:916:9
stack backtrace:
0: backtrace::backtrace::libunwind::trace
at /cargo/registry/src/github.com-1ecc6299db9ec823/backtrace-0.3.46/src/backtrace/libunwind.rs:86
1: backtrace::backtrace::trace_unsynchronized
at /cargo/registry/src/github.com-1ecc6299db9ec823/backtrace-0.3.46/src/backtrace/mod.rs:66
2: std::sys_common::backtrace::_print_fmt
at src/libstd/sys_common/backtrace.rs:78
3: <std::sys_common::backtrace::_print::DisplayBacktrace as core::fmt::Display>::fmt
at src/libstd/sys_common/backtrace.rs:59
4: core::fmt::write
at src/libcore/fmt/mod.rs:1076
5: std::io::Write::write_fmt
at src/libstd/io/mod.rs:1537
6: std::sys_common::backtrace::_print
at src/libstd/sys_common/backtrace.rs:62
7: std::sys_common::backtrace::print
at src/libstd/sys_common/backtrace.rs:49
8: std::panicking::default_hook::{{closure}}
at src/libstd/panicking.rs:198
9: std::panicking::default_hook
at src/libstd/panicking.rs:217
10: rustc_driver::report_ice
11: std::panicking::rust_panic_with_hook
at src/libstd/panicking.rs:530
12: std::panicking::begin_panic
13: rustc_errors::HandlerInner::bug
14: rustc_errors::Handler::bug
15: rustc_middle::util::bug::opt_span_bug_fmt::{{closure}}
16: rustc_middle::ty::context::tls::with_opt::{{closure}}
17: rustc_middle::ty::context::tls::with_opt
18: rustc_middle::util::bug::opt_span_bug_fmt
19: rustc_middle::util::bug::bug_fmt
20: rustc_mir::borrow_check::type_check::free_region_relations::UniversalRegionRelationsBuilder::add_implied_bounds::{{closure}}
21: core::ops::function::impls::<impl core::ops::function::FnOnce<A> for &mut F>::call_once
22: <core::iter::adapters::flatten::FlatMap<I,U,F> as core::iter::traits::iterator::Iterator>::next
23: <alloc::vec::Vec<T> as alloc::vec::SpecExtend<T,I>>::from_iter
24: rustc_mir::borrow_check::type_check::free_region_relations::create
25: rustc_mir::borrow_check::type_check::type_check
26: rustc_mir::borrow_check::nll::compute_regions
27: rustc_mir::borrow_check::do_mir_borrowck
28: rustc_infer::infer::InferCtxtBuilder::enter
29: rustc_mir::borrow_check::mir_borrowck
30: rustc_middle::ty::query::<impl rustc_query_system::query::config::QueryAccessors<rustc_middle::ty::context::TyCtxt> for rustc_middle::ty::query::queries::mir_borrowck>::compute
31: rustc_middle::dep_graph::<impl rustc_query_system::dep_graph::DepKind for rustc_middle::dep_graph::dep_node::DepKind>::with_deps
32: rustc_query_system::dep_graph::graph::DepGraph<K>::with_task_impl
33: rustc_data_structures::stack::ensure_sufficient_stack
34: rustc_query_system::query::plumbing::get_query_impl
35: rustc_typeck::collect::type_of::find_opaque_ty_constraints::ConstraintLocator::check
36: rustc_hir::intravisit::Visitor::visit_nested_item
37: rustc_typeck::collect::type_of::type_of
38: rustc_middle::ty::query::<impl rustc_query_system::query::config::QueryAccessors<rustc_middle::ty::context::TyCtxt> for rustc_middle::ty::query::queries::type_of>::compute
39: rustc_middle::dep_graph::<impl rustc_query_system::dep_graph::DepKind for rustc_middle::dep_graph::dep_node::DepKind>::with_deps
40: rustc_query_system::dep_graph::graph::DepGraph<K>::with_task_impl
41: rustc_data_structures::stack::ensure_sufficient_stack
42: rustc_query_system::query::plumbing::get_query_impl
43: rustc_query_system::query::plumbing::ensure_query_impl
44: <rustc_typeck::collect::CollectItemTypesVisitor as rustc_hir::intravisit::Visitor>::visit_item
45: rustc_middle::hir::map::Map::visit_item_likes_in_module
46: rustc_typeck::collect::collect_mod_item_types
47: rustc_middle::ty::query::<impl rustc_query_system::query::config::QueryAccessors<rustc_middle::ty::context::TyCtxt> for rustc_middle::ty::query::queries::collect_mod_item_types>::compute
48: rustc_middle::dep_graph::<impl rustc_query_system::dep_graph::DepKind for rustc_middle::dep_graph::dep_node::DepKind>::with_deps
49: rustc_query_system::dep_graph::graph::DepGraph<K>::with_task_impl
50: rustc_data_structures::stack::ensure_sufficient_stack
51: rustc_query_system::query::plumbing::get_query_impl
52: rustc_query_system::query::plumbing::ensure_query_impl
53: rustc_session::session::Session::track_errors
54: rustc_typeck::check_crate
55: rustc_interface::passes::analysis
56: rustc_middle::ty::query::<impl rustc_query_system::query::config::QueryAccessors<rustc_middle::ty::context::TyCtxt> for rustc_middle::ty::query::queries::analysis>::compute
57: rustc_middle::dep_graph::<impl rustc_query_system::dep_graph::DepKind for rustc_middle::dep_graph::dep_node::DepKind>::with_deps
58: rustc_query_system::dep_graph::graph::DepGraph<K>::with_task_impl
59: rustc_query_system::query::plumbing::get_query_impl
60: rustc_middle::ty::context::tls::enter_global
61: rustc_interface::queries::<impl rustc_interface::interface::Compiler>::enter
62: rustc_span::with_source_map
63: rustc_interface::interface::run_compiler_in_existing_thread_pool
64: scoped_tls::ScopedKey<T>::set
note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.
note: the compiler unexpectedly panicked. this is a bug.
note: we would appreciate a bug report: https://github.com/rust-lang/rust/blob/master/CONTRIBUTING.md#bug-reports
note: rustc 1.46.0-nightly (daecab3a7 2020-07-10) running on x86_64-unknown-linux-gnu
note: compiler flags: -C embed-bitcode=no -C debuginfo=2 -C incremental --crate-type lib
note: some of the compiler flags provided by cargo are hidden
query stack during panic:
#0 [mir_borrowck] borrow-checking `foo`
#1 [type_of] computing type of `A::{{opaque}}#0`
#2 [collect_mod_item_types] collecting item types in top-level module
#3 [analysis] running analysis passes on this crate
end of query stack
error: aborting due to previous error
error: could not compile `bug`.
To learn more, run the command again with --verbose.
```
</p>
</details>
### Bisection
searched nightlies: from nightly-2019-10-03 to nightly-2020-07-05
regressed nightly: nightly-2020-02-16
searched commits: from https://github.com/rust-lang/rust/commit/433aae93e4ef866a1fdfefad136b32ed89acd3e7 to https://github.com/rust-lang/rust/commit/61d9231ff2604a0467987042d9ebf9ff9ea739b5
regressed commit: https://github.com/rust-lang/rust/commit/19288ddfd6b3448c2c221d75610bff722a6582e8
<details>
<summary>bisected with <a href='https://github.com/rust-lang/cargo-bisect-rustc'>cargo-bisect-rustc</a> v0.5.1</summary>
Host triple: x86_64-unknown-linux-gnu
Reproduce with:
```bash
cargo bisect-rustc --start 2019-10-03 --end 2020-07-05 --with-cargo --prompt -- check
``` | test | ice when using nalgebra type in impl trait type alias code src lib rs rust use nalgebra pub type a impl fn pub fn foo a cargo toml toml name bug version edition nalgebra meta rustc version verbose rustc nightly binary rustc commit hash commit date host unknown linux gnu release nightly llvm version error output error internal compiler error src librustc mir borrow check type check free region relations rs failed to compute implied bounds impl std ops fn buffer thread rustc panicked at box src librustc errors lib rs note run with rust backtrace environment variable to display a backtrace note the compiler unexpectedly panicked this is a bug note we would appreciate a bug report note rustc nightly running on unknown linux gnu note compiler flags c embed bitcode no c debuginfo c incremental crate type lib note some of the compiler flags provided by cargo are hidden error aborting due to previous error error could not compile bug to learn more run the command again with verbose backtrace error internal compiler error src librustc mir borrow check type check free region relations rs failed to compute implied bounds impl std ops fn buffer thread rustc panicked at box src librustc errors lib rs stack backtrace backtrace backtrace libunwind trace at cargo registry src github com backtrace src backtrace libunwind rs backtrace backtrace trace unsynchronized at cargo registry src github com backtrace src backtrace mod rs std sys common backtrace print fmt at src libstd sys common backtrace rs fmt at src libstd sys common backtrace rs core fmt write at src libcore fmt mod rs std io write write fmt at src libstd io mod rs std sys common backtrace print at src libstd sys common backtrace rs std sys common backtrace print at src libstd sys common backtrace rs std panicking default hook closure at src libstd panicking rs std panicking default hook at src libstd panicking rs rustc driver report ice std panicking rust panic with hook at src libstd panicking rs std panicking begin panic rustc errors handlerinner bug rustc errors handler bug rustc middle util bug opt span bug fmt closure rustc middle ty context tls with opt closure rustc middle ty context tls with opt rustc middle util bug opt span bug fmt rustc middle util bug bug fmt rustc mir borrow check type check free region relations universalregionrelationsbuilder add implied bounds closure core ops function impls for mut f call once as core iter traits iterator iterator next as alloc vec specextend from iter rustc mir borrow check type check free region relations create rustc mir borrow check type check type check rustc mir borrow check nll compute regions rustc mir borrow check do mir borrowck rustc infer infer inferctxtbuilder enter rustc mir borrow check mir borrowck rustc middle ty query for rustc middle ty query queries mir borrowck compute rustc middle dep graph with deps rustc query system dep graph graph depgraph with task impl rustc data structures stack ensure sufficient stack rustc query system query plumbing get query impl rustc typeck collect type of find opaque ty constraints constraintlocator check rustc hir intravisit visitor visit nested item rustc typeck collect type of type of rustc middle ty query for rustc middle ty query queries type of compute rustc middle dep graph with deps rustc query system dep graph graph depgraph with task impl rustc data structures stack ensure sufficient stack rustc query system query plumbing get query impl rustc query system query plumbing ensure query impl visit item rustc middle hir map map visit item likes in module rustc typeck collect collect mod item types rustc middle ty query for rustc middle ty query queries collect mod item types compute rustc middle dep graph with deps rustc query system dep graph graph depgraph with task impl rustc data structures stack ensure sufficient stack rustc query system query plumbing get query impl rustc query system query plumbing ensure query impl rustc session session session track errors rustc typeck check crate rustc interface passes analysis rustc middle ty query for rustc middle ty query queries analysis compute rustc middle dep graph with deps rustc query system dep graph graph depgraph with task impl rustc query system query plumbing get query impl rustc middle ty context tls enter global rustc interface queries enter rustc span with source map rustc interface interface run compiler in existing thread pool scoped tls scopedkey set note some details are omitted run with rust backtrace full for a verbose backtrace note the compiler unexpectedly panicked this is a bug note we would appreciate a bug report note rustc nightly running on unknown linux gnu note compiler flags c embed bitcode no c debuginfo c incremental crate type lib note some of the compiler flags provided by cargo are hidden query stack during panic borrow checking foo computing type of a opaque collecting item types in top level module running analysis passes on this crate end of query stack error aborting due to previous error error could not compile bug to learn more run the command again with verbose bisection searched nightlies from nightly to nightly regressed nightly nightly searched commits from to regressed commit bisected with host triple unknown linux gnu reproduce with bash cargo bisect rustc start end with cargo prompt check | 1 |
252,307 | 21,569,862,574 | IssuesEvent | 2022-05-02 06:41:07 | hackforla/tdm-calculator | https://api.github.com/repos/hackforla/tdm-calculator | opened | Standard address format | role: Project Management Feature - User Testing | ### Overview
Users wonder why both AIN# and address are required and what is a standard address format?
Provide clarification inside the tooltip
### Action Items
REPLACE THIS TEXT -If this is the beginning of the task this is most likely something to be researched and documented.
REPLACE THIS TEXT -If the issue has already been researched, and the course of action is clear, this will describe the steps. However, if the steps can be divided into tasks for more than one person, we recommend dividing it up into separate issues, or assigning it as a pair programming task.
### Resources/Instructions
REPLACE THIS TEXT -If there is a website which has documentation that helps with this issue provide the link(s) here.
| 1.0 | Standard address format - ### Overview
Users wonder why both AIN# and address are required and what is a standard address format?
Provide clarification inside the tooltip
### Action Items
REPLACE THIS TEXT -If this is the beginning of the task this is most likely something to be researched and documented.
REPLACE THIS TEXT -If the issue has already been researched, and the course of action is clear, this will describe the steps. However, if the steps can be divided into tasks for more than one person, we recommend dividing it up into separate issues, or assigning it as a pair programming task.
### Resources/Instructions
REPLACE THIS TEXT -If there is a website which has documentation that helps with this issue provide the link(s) here.
| test | standard address format overview users wonder why both ain and address are required and what is a standard address format provide clarification inside the tooltip action items replace this text if this is the beginning of the task this is most likely something to be researched and documented replace this text if the issue has already been researched and the course of action is clear this will describe the steps however if the steps can be divided into tasks for more than one person we recommend dividing it up into separate issues or assigning it as a pair programming task resources instructions replace this text if there is a website which has documentation that helps with this issue provide the link s here | 1 |
218,698 | 24,391,081,722 | IssuesEvent | 2022-10-04 15:16:21 | MendDemo-josh/juice-shop | https://api.github.com/repos/MendDemo-josh/juice-shop | opened | jquery-2.2.4.min.js: 4 vulnerabilities (highest severity is: 6.1) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.2.4.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2020-11023](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.4.min.js | Direct | jquery - 3.5.0;jquery-rails - 4.4.0 | ❌ |
| [CVE-2020-11022](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.4.min.js | Direct | jQuery - 3.5.0 | ❌ |
| [CVE-2015-9251](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.4.min.js | Direct | jQuery - v3.0.0 | ❌ |
| [CVE-2019-11358](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.4.min.js | Direct | 3.4.0 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary>
### Vulnerable Library - <b>jquery-2.2.4.min.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440">https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary>
### Vulnerable Library - <b>jquery-2.2.4.min.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jQuery - 3.5.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary>
### Vulnerable Library - <b>jquery-2.2.4.min.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v3.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary>
### Vulnerable Library - <b>jquery-2.2.4.min.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
<p>Publish Date: 2019-04-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p>
<p>Release Date: 2019-04-20</p>
<p>Fix Resolution: 3.4.0</p>
</p>
<p></p>
</details> | True | jquery-2.2.4.min.js: 4 vulnerabilities (highest severity is: 6.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-2.2.4.min.js</b></p></summary>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2020-11023](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.4.min.js | Direct | jquery - 3.5.0;jquery-rails - 4.4.0 | ❌ |
| [CVE-2020-11022](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.4.min.js | Direct | jQuery - 3.5.0 | ❌ |
| [CVE-2015-9251](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.4.min.js | Direct | jQuery - v3.0.0 | ❌ |
| [CVE-2019-11358](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | jquery-2.2.4.min.js | Direct | 3.4.0 | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11023</summary>
### Vulnerable Library - <b>jquery-2.2.4.min.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440">https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-11022</summary>
### Vulnerable Library - <b>jquery-2.2.4.min.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
<p>Publish Date: 2020-04-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11022>CVE-2020-11022</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/">https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/</a></p>
<p>Release Date: 2020-04-29</p>
<p>Fix Resolution: jQuery - 3.5.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2015-9251</summary>
### Vulnerable Library - <b>jquery-2.2.4.min.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
<p>Publish Date: 2018-01-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-9251>CVE-2015-9251</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">https://nvd.nist.gov/vuln/detail/CVE-2015-9251</a></p>
<p>Release Date: 2018-01-18</p>
<p>Fix Resolution: jQuery - v3.0.0</p>
</p>
<p></p>
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2019-11358</summary>
### Vulnerable Library - <b>jquery-2.2.4.min.js</b></p>
<p>JavaScript library for DOM operations</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js</a></p>
<p>Path to dependency file: /frontend/src/index.html</p>
<p>Path to vulnerable library: /frontend/src/index.html</p>
<p>
Dependency Hierarchy:
- :x: **jquery-2.2.4.min.js** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MendDemo-josh/juice-shop/commit/80dd1602d7448d929da2c5063d3b9a316d334d00">80dd1602d7448d929da2c5063d3b9a316d334d00</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
<p>Publish Date: 2019-04-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p>
<p>Release Date: 2019-04-20</p>
<p>Fix Resolution: 3.4.0</p>
</p>
<p></p>
</details> | non_test | jquery min js vulnerabilities highest severity is vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file frontend src index html path to vulnerable library frontend src index html found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available medium jquery min js direct jquery jquery rails medium jquery min js direct jquery medium jquery min js direct jquery medium jquery min js direct details cve vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file frontend src index html path to vulnerable library frontend src index html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery jquery rails cve vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file frontend src index html path to vulnerable library frontend src index html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details in jquery versions greater than or equal to and before passing html from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery cve vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file frontend src index html path to vulnerable library frontend src index html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before is vulnerable to cross site scripting xss attacks when a cross domain ajax request is performed without the datatype option causing text javascript responses to be executed publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery cve vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file frontend src index html path to vulnerable library frontend src index html dependency hierarchy x jquery min js vulnerable library found in head commit a href found in base branch master vulnerability details jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution | 0 |
48,965 | 5,995,224,035 | IssuesEvent | 2017-06-03 01:21:05 | kubernetes/kubernetes | https://api.github.com/repos/kubernetes/kubernetes | closed | remove infinite loop from test/e2e/service.go:validateEndpointsOrFail() | priority/backlog sig/network sig/testing | test should fail after some time, and should not block other tests.
| 1.0 | remove infinite loop from test/e2e/service.go:validateEndpointsOrFail() - test should fail after some time, and should not block other tests.
| test | remove infinite loop from test service go validateendpointsorfail test should fail after some time and should not block other tests | 1 |
771,374 | 27,082,746,846 | IssuesEvent | 2023-02-14 15:03:21 | slsdetectorgroup/slsDetectorPackage | https://api.github.com/repos/slsdetectorgroup/slsDetectorPackage | opened | Ctrl+c in acquire stops acquisition | action - Enhancement priority - Unclassified status - Pending | <!-- Preview changes before submitting -->
<!-- Please fill out everything with an *, as this report will be discarded otherwise -->
<!-- This is a comment, the syntax is a bit different from c++ or bash -->
##### *Detector type:
<!-- If applicable, Eiger, Jungfrau, Mythen3, Gotthard2, Gotthard, Moench, ChipTestBoard -->
##### *Software Package Version:
<!-- developer, 4.2.0, 4.1.1, etc -->
##### Priority:
<!-- Super Low, Low, Medium, High, Super High -->
##### *State the feature:
<!-- A clear and concise description of what the feature is -->
Like 'q' + enter
@mozzanica
##### Is your feature request related to a problem. Please describe:
<!-- A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] -->
##### Describe the solution you'd like:
<!-- A clear and concise description of what you want to happen -->
##### Describe alternatives you've considered:
<!-- A clear and concise description of any alternative solutions or features you've considered -->
##### Additional context:
<!-- Add any other context about the feature here -->
| 1.0 | Ctrl+c in acquire stops acquisition - <!-- Preview changes before submitting -->
<!-- Please fill out everything with an *, as this report will be discarded otherwise -->
<!-- This is a comment, the syntax is a bit different from c++ or bash -->
##### *Detector type:
<!-- If applicable, Eiger, Jungfrau, Mythen3, Gotthard2, Gotthard, Moench, ChipTestBoard -->
##### *Software Package Version:
<!-- developer, 4.2.0, 4.1.1, etc -->
##### Priority:
<!-- Super Low, Low, Medium, High, Super High -->
##### *State the feature:
<!-- A clear and concise description of what the feature is -->
Like 'q' + enter
@mozzanica
##### Is your feature request related to a problem. Please describe:
<!-- A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] -->
##### Describe the solution you'd like:
<!-- A clear and concise description of what you want to happen -->
##### Describe alternatives you've considered:
<!-- A clear and concise description of any alternative solutions or features you've considered -->
##### Additional context:
<!-- Add any other context about the feature here -->
| non_test | ctrl c in acquire stops acquisition detector type software package version priority state the feature like q enter mozzanica is your feature request related to a problem please describe describe the solution you d like describe alternatives you ve considered additional context | 0 |
188,459 | 22,046,449,625 | IssuesEvent | 2022-05-30 02:39:22 | DavidSpek/kale | https://api.github.com/repos/DavidSpek/kale | opened | CVE-2022-29195 (Medium) detected in tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl, tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl | security vulnerability | ## CVE-2022-29195 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl</b>, <b>tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl</b></p></summary>
<p>
<details><summary><b>tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/7b/c5/a97ed48fcc878e36bb05a3ea700c077360853c0994473a8f6b0ab4c2ddd2/tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/7b/c5/a97ed48fcc878e36bb05a3ea700c077360853c0994473a8f6b0ab4c2ddd2/tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl</a></p>
<p>Path to dependency file: /examples/dog-breed-classification/requirements/requirements.txt</p>
<p>Path to vulnerable library: /examples/dog-breed-classification/requirements/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)
</details>
<details><summary><b>tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/ef/73/205b5e7f8fe086ffe4165d984acb2c49fa3086f330f03099378753982d2e/tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/ef/73/205b5e7f8fe086ffe4165d984acb2c49fa3086f330f03099378753982d2e/tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /examples/taxi-cab-classification/requirements.txt</p>
<p>Path to vulnerable library: /examples/taxi-cab-classification/requirements.txt</p>
<p>
Dependency Hierarchy:
- tfx_bsl-0.21.4-cp27-cp27mu-manylinux2010_x86_64.whl (Root Library)
- :x: **tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://api.github.com/repos/DavidSpek/kale/commits/b3bfd7086d7e8afe9e0e3ed49d6cf60a9adcea21">b3bfd7086d7e8afe9e0e3ed49d6cf60a9adcea21</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
<p>Publish Date: 2022-05-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29195>CVE-2022-29195</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195</a></p>
<p>Release Date: 2022-05-20</p>
<p>Fix Resolution: tensorflow - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-cpu - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-gpu - 2.6.4,2.7.2,2.8.1,2.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-29195 (Medium) detected in tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl, tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl - ## CVE-2022-29195 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl</b>, <b>tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl</b></p></summary>
<p>
<details><summary><b>tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/7b/c5/a97ed48fcc878e36bb05a3ea700c077360853c0994473a8f6b0ab4c2ddd2/tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/7b/c5/a97ed48fcc878e36bb05a3ea700c077360853c0994473a8f6b0ab4c2ddd2/tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl</a></p>
<p>Path to dependency file: /examples/dog-breed-classification/requirements/requirements.txt</p>
<p>Path to vulnerable library: /examples/dog-breed-classification/requirements/requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)
</details>
<details><summary><b>tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/ef/73/205b5e7f8fe086ffe4165d984acb2c49fa3086f330f03099378753982d2e/tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl">https://files.pythonhosted.org/packages/ef/73/205b5e7f8fe086ffe4165d984acb2c49fa3086f330f03099378753982d2e/tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl</a></p>
<p>Path to dependency file: /examples/taxi-cab-classification/requirements.txt</p>
<p>Path to vulnerable library: /examples/taxi-cab-classification/requirements.txt</p>
<p>
Dependency Hierarchy:
- tfx_bsl-0.21.4-cp27-cp27mu-manylinux2010_x86_64.whl (Root Library)
- :x: **tensorflow-2.1.0-cp27-cp27mu-manylinux2010_x86_64.whl** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://api.github.com/repos/DavidSpek/kale/commits/b3bfd7086d7e8afe9e0e3ed49d6cf60a9adcea21">b3bfd7086d7e8afe9e0e3ed49d6cf60a9adcea21</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
<p>Publish Date: 2022-05-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-29195>CVE-2022-29195</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195</a></p>
<p>Release Date: 2022-05-20</p>
<p>Fix Resolution: tensorflow - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-cpu - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-gpu - 2.6.4,2.7.2,2.8.1,2.9.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve medium detected in tensorflow whl tensorflow whl cve medium severity vulnerability vulnerable libraries tensorflow whl tensorflow whl tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file examples dog breed classification requirements requirements txt path to vulnerable library examples dog breed classification requirements requirements txt dependency hierarchy x tensorflow whl vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file examples taxi cab classification requirements txt path to vulnerable library examples taxi cab classification requirements txt dependency hierarchy tfx bsl whl root library x tensorflow whl vulnerable library found in head commit a href found in base branch master vulnerability details tensorflow is an open source platform for machine learning prior to versions and the implementation of tf raw ops stagepeek does not fully validate the input arguments this results in a check failure which can be used to trigger a denial of service attack the code assumes index is a scalar but there is no validation for this before accessing its value versions and contain a patch for this issue publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with mend | 0 |
249,768 | 21,190,871,423 | IssuesEvent | 2022-04-08 17:15:26 | antrea-io/antrea | https://api.github.com/repos/antrea-io/antrea | opened | Antrea e2e tests consistently failing in Jenkins for TestFlowAggregator | kind/bug kind/failing-test | **Describe the bug**
I see e2e tests failing in Jenkins pretty much all the time with the following error:
```
fixtures.go:400: Deleting 'antrea-test' K8s Namespace
I0408 01:50:33.091871 1234845 framework.go:630] Deleting Namespace antrea-test took 49.033647974s
fixtures.go:386: Error when gracefully exiting Flow Aggregator: error when gracefully exiting Flow Aggregator - copy flow-aggregator coverage files out: cannot retrieve content of file 'flow-aggregator.cov.out' from Pod 'flow-aggregator-7cdb6f9849-hzmh7', stderr: <cat: flow-aggregator.cov.out: No such file or directory
>, err: <command terminated with exit code 1>
--- FAIL: TestFlowAggregator (248.43s)
```
It seems like it should be easy to fix.
| 1.0 | Antrea e2e tests consistently failing in Jenkins for TestFlowAggregator - **Describe the bug**
I see e2e tests failing in Jenkins pretty much all the time with the following error:
```
fixtures.go:400: Deleting 'antrea-test' K8s Namespace
I0408 01:50:33.091871 1234845 framework.go:630] Deleting Namespace antrea-test took 49.033647974s
fixtures.go:386: Error when gracefully exiting Flow Aggregator: error when gracefully exiting Flow Aggregator - copy flow-aggregator coverage files out: cannot retrieve content of file 'flow-aggregator.cov.out' from Pod 'flow-aggregator-7cdb6f9849-hzmh7', stderr: <cat: flow-aggregator.cov.out: No such file or directory
>, err: <command terminated with exit code 1>
--- FAIL: TestFlowAggregator (248.43s)
```
It seems like it should be easy to fix.
| test | antrea tests consistently failing in jenkins for testflowaggregator describe the bug i see tests failing in jenkins pretty much all the time with the following error fixtures go deleting antrea test namespace framework go deleting namespace antrea test took fixtures go error when gracefully exiting flow aggregator error when gracefully exiting flow aggregator copy flow aggregator coverage files out cannot retrieve content of file flow aggregator cov out from pod flow aggregator stderr cat flow aggregator cov out no such file or directory err fail testflowaggregator it seems like it should be easy to fix | 1 |
87,932 | 8,127,131,951 | IssuesEvent | 2018-08-17 06:46:17 | linkedpipes/dcat-ap-viewer | https://api.github.com/repos/linkedpipes/dcat-ap-viewer | closed | Change list of publishers to a list of cards | enhancement test | Change list of publishers to a list of cards (like distributions) | 1.0 | Change list of publishers to a list of cards - Change list of publishers to a list of cards (like distributions) | test | change list of publishers to a list of cards change list of publishers to a list of cards like distributions | 1 |
181,150 | 14,005,585,617 | IssuesEvent | 2020-10-28 18:40:22 | istio/istio | https://api.github.com/repos/istio/istio | closed | In MacOS environment, failure for "go test ./security/pkg/stsservice/test/success_sts/..." | area/test and release | (NOTE: This is used to report product bugs:
To report a security vulnerability, please visit <https://istio.io/about/security-vulnerabilities/>
To ask questions about how to use Istio, please visit <https://discuss.istio.io>
)
**Bug description**
In MacOS environment, sync to the latest istio master branch. "make clean; make build; go test ./security/pkg/stsservice/test/success_sts/...". and the following error occurs.
[2020-10-22 22:03:03.156][1506361][critical][main] external/envoy/source/server/server.cc:78] error initializing configuration '/Users/leitang/go/src/istio.io/istio/out/darwin_amd64/config.conf.20171.yaml': Unable to parse JSON as proto (INVALID_ARGUMENT:dynamic_resources.lds_config: invalid name resource_api_version: Cannot find field.): {"static_resources":{"listeners":{"filter_chains":[{"filters":[{"config":{"route_config":{"virtual_hosts":[{"routes":[{"route":{"cluster":"backend"},"match":{"prefix":"/"}}],"domains":["*"],"name":"backend"}],"name":"staticRoute"},"stat_prefix":"staticListener"},"name":"envoy.http_connection_manager"}]}],"address":{"socket_address":{"port_value":20170,"address":"127.0.0.1"}},"name":"listener_0"},"clusters":[{"hosts":[{"socket_address":{"port_value":20173,"address":"127.0.0.1"}}],"type":"STATIC","connect_timeout":"5s","name":"backend"}]},"dynamic_resources":{"ads_config":{"grpc_services":[{"google_grpc":{"call_credentials":{"sts_service":{"subject_token_type":"urn:ietf:params:oauth:token-type:jwt","subject_token_path":"/tmp/envoy-token-20175.jwt","scope":"https://www.googleapis.com/auth/cloud-platform","token_exchange_service_uri":"http://127.0.0.1:20175/token"}},"channel_credentials":{"ssl_credentials":{"root_certs":{"filename":"/tmp/ca-certificates-20175.crt"}}},"stat_prefix":"xdsStats","target_uri":"localhost:20174"}}],"transport_api_version":"V3","api_type":"GRPC"},"lds_config":{"resource_api_version":"V3","ads":{}}},"node":{"cluster":"unknown","id":"id"},"admin":{"address":{"socket_address":{"port_value":20171,"address":"127.0.0.1"}},"access_log_path":"/tmp/envoy-access.log"}}
[2020-10-22 22:03:03.156][1506361][info][main] external/envoy/source/server/server.cc:472] exiting
2020-10-23T05:03:03.159586Z info Envoy 'envoy-21' (epoch 0) exited with error: exit status 1
The error message seems to indicate that the Envoy binary rejects the Envoy configuration in the test.
The following command shows that the version of the Envoy binary used in test.
~$ /Users/leitang/go/src/istio.io/istio/out/darwin_amd64/envoy --version
/Users/leitang/go/src/istio.io/istio/out/darwin_amd64/envoy version: 0/1.8.0-dev//RELEASE
**Affected product area (please put an X in all that apply)**
[ ] Docs
[ ] Installation
[ ] Networking
[ ] Performance and Scalability
[ ] Extensions and Telemetry
[ ] Security
[ X] Test and Release
[ ] User Experience
[ X] Developer Infrastructure
**Affected features (please put an X in all that apply)**
[ ] Multi Cluster
[ ] Virtual Machine
[ ] Multi Control Plane
**Expected behavior**
In MacOS environment, "go test ./security/pkg/stsservice/test/success_sts/..." should succeed too.
**Steps to reproduce the bug**
In MacOS environment, sync to the latest istio master branch. "make clean; make build; go test ./security/pkg/stsservice/test/success_sts/...". and the following error occurs.
**Version (include the output of `istioctl version --remote` and `kubectl version --short` and `helm version` if you used Helm)**
**How was Istio installed?**
**Environment where bug was observed (cloud vendor, OS, etc)**
Additionally, please consider attaching a [cluster state archive](http://istio.io/help/bugs/#generating-a-cluster-state-archive) by attaching
the dump file to this issue.
| 1.0 | In MacOS environment, failure for "go test ./security/pkg/stsservice/test/success_sts/..." - (NOTE: This is used to report product bugs:
To report a security vulnerability, please visit <https://istio.io/about/security-vulnerabilities/>
To ask questions about how to use Istio, please visit <https://discuss.istio.io>
)
**Bug description**
In MacOS environment, sync to the latest istio master branch. "make clean; make build; go test ./security/pkg/stsservice/test/success_sts/...". and the following error occurs.
[2020-10-22 22:03:03.156][1506361][critical][main] external/envoy/source/server/server.cc:78] error initializing configuration '/Users/leitang/go/src/istio.io/istio/out/darwin_amd64/config.conf.20171.yaml': Unable to parse JSON as proto (INVALID_ARGUMENT:dynamic_resources.lds_config: invalid name resource_api_version: Cannot find field.): {"static_resources":{"listeners":{"filter_chains":[{"filters":[{"config":{"route_config":{"virtual_hosts":[{"routes":[{"route":{"cluster":"backend"},"match":{"prefix":"/"}}],"domains":["*"],"name":"backend"}],"name":"staticRoute"},"stat_prefix":"staticListener"},"name":"envoy.http_connection_manager"}]}],"address":{"socket_address":{"port_value":20170,"address":"127.0.0.1"}},"name":"listener_0"},"clusters":[{"hosts":[{"socket_address":{"port_value":20173,"address":"127.0.0.1"}}],"type":"STATIC","connect_timeout":"5s","name":"backend"}]},"dynamic_resources":{"ads_config":{"grpc_services":[{"google_grpc":{"call_credentials":{"sts_service":{"subject_token_type":"urn:ietf:params:oauth:token-type:jwt","subject_token_path":"/tmp/envoy-token-20175.jwt","scope":"https://www.googleapis.com/auth/cloud-platform","token_exchange_service_uri":"http://127.0.0.1:20175/token"}},"channel_credentials":{"ssl_credentials":{"root_certs":{"filename":"/tmp/ca-certificates-20175.crt"}}},"stat_prefix":"xdsStats","target_uri":"localhost:20174"}}],"transport_api_version":"V3","api_type":"GRPC"},"lds_config":{"resource_api_version":"V3","ads":{}}},"node":{"cluster":"unknown","id":"id"},"admin":{"address":{"socket_address":{"port_value":20171,"address":"127.0.0.1"}},"access_log_path":"/tmp/envoy-access.log"}}
[2020-10-22 22:03:03.156][1506361][info][main] external/envoy/source/server/server.cc:472] exiting
2020-10-23T05:03:03.159586Z info Envoy 'envoy-21' (epoch 0) exited with error: exit status 1
The error message seems to indicate that the Envoy binary rejects the Envoy configuration in the test.
The following command shows that the version of the Envoy binary used in test.
~$ /Users/leitang/go/src/istio.io/istio/out/darwin_amd64/envoy --version
/Users/leitang/go/src/istio.io/istio/out/darwin_amd64/envoy version: 0/1.8.0-dev//RELEASE
**Affected product area (please put an X in all that apply)**
[ ] Docs
[ ] Installation
[ ] Networking
[ ] Performance and Scalability
[ ] Extensions and Telemetry
[ ] Security
[ X] Test and Release
[ ] User Experience
[ X] Developer Infrastructure
**Affected features (please put an X in all that apply)**
[ ] Multi Cluster
[ ] Virtual Machine
[ ] Multi Control Plane
**Expected behavior**
In MacOS environment, "go test ./security/pkg/stsservice/test/success_sts/..." should succeed too.
**Steps to reproduce the bug**
In MacOS environment, sync to the latest istio master branch. "make clean; make build; go test ./security/pkg/stsservice/test/success_sts/...". and the following error occurs.
**Version (include the output of `istioctl version --remote` and `kubectl version --short` and `helm version` if you used Helm)**
**How was Istio installed?**
**Environment where bug was observed (cloud vendor, OS, etc)**
Additionally, please consider attaching a [cluster state archive](http://istio.io/help/bugs/#generating-a-cluster-state-archive) by attaching
the dump file to this issue.
| test | in macos environment failure for go test security pkg stsservice test success sts note this is used to report product bugs to report a security vulnerability please visit to ask questions about how to use istio please visit bug description in macos environment sync to the latest istio master branch make clean make build go test security pkg stsservice test success sts and the following error occurs external envoy source server server cc error initializing configuration users leitang go src istio io istio out darwin config conf yaml unable to parse json as proto invalid argument dynamic resources lds config invalid name resource api version cannot find field static resources listeners filter chains domains name backend name staticroute stat prefix staticlistener name envoy http connection manager address socket address port value address name listener clusters type static connect timeout name backend dynamic resources ads config grpc services transport api version api type grpc lds config resource api version ads node cluster unknown id id admin address socket address port value address access log path tmp envoy access log external envoy source server server cc exiting info envoy envoy epoch exited with error exit status the error message seems to indicate that the envoy binary rejects the envoy configuration in the test the following command shows that the version of the envoy binary used in test users leitang go src istio io istio out darwin envoy version users leitang go src istio io istio out darwin envoy version dev release affected product area please put an x in all that apply docs installation networking performance and scalability extensions and telemetry security test and release user experience developer infrastructure affected features please put an x in all that apply multi cluster virtual machine multi control plane expected behavior in macos environment go test security pkg stsservice test success sts should succeed too steps to reproduce the bug in macos environment sync to the latest istio master branch make clean make build go test security pkg stsservice test success sts and the following error occurs version include the output of istioctl version remote and kubectl version short and helm version if you used helm how was istio installed environment where bug was observed cloud vendor os etc additionally please consider attaching a by attaching the dump file to this issue | 1 |
324,652 | 27,814,167,379 | IssuesEvent | 2023-03-18 13:33:59 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | closed | roachtest: multitenant/tpch failed | C-test-failure O-robot O-roachtest branch-master release-blocker T-sql-queries | roachtest.multitenant/tpch [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/9121674?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/9121674?buildTab=artifacts#/multitenant/tpch) on master @ [6c99966f604f3521acdb925b9f689529ffd46df3](https://github.com/cockroachdb/cockroach/commits/6c99966f604f3521acdb925b9f689529ffd46df3):
```
test artifacts and logs in: /artifacts/multitenant/tpch/run_1
(multitenant_tpch.go:55).func1: pq: the backup is from a version older than our minimum restoreable version 22.2
```
<p>Parameters: <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=4</code>
, <code>ROACHTEST_encrypted=false</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/sql-queries
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*multitenant/tpch.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-25611 | 2.0 | roachtest: multitenant/tpch failed - roachtest.multitenant/tpch [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/9121674?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/9121674?buildTab=artifacts#/multitenant/tpch) on master @ [6c99966f604f3521acdb925b9f689529ffd46df3](https://github.com/cockroachdb/cockroach/commits/6c99966f604f3521acdb925b9f689529ffd46df3):
```
test artifacts and logs in: /artifacts/multitenant/tpch/run_1
(multitenant_tpch.go:55).func1: pq: the backup is from a version older than our minimum restoreable version 22.2
```
<p>Parameters: <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=4</code>
, <code>ROACHTEST_encrypted=false</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/sql-queries
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*multitenant/tpch.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-25611 | test | roachtest multitenant tpch failed roachtest multitenant tpch with on master test artifacts and logs in artifacts multitenant tpch run multitenant tpch go pq the backup is from a version older than our minimum restoreable version parameters roachtest cloud gce roachtest cpu roachtest encrypted false roachtest ssd help see see cc cockroachdb sql queries jira issue crdb | 1 |
261,568 | 27,809,804,015 | IssuesEvent | 2023-03-18 01:47:07 | madhans23/linux-4.1.15 | https://api.github.com/repos/madhans23/linux-4.1.15 | closed | CVE-2019-20794 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed | Mend: dependency security vulnerability | ## CVE-2019-20794 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/madhans23/linux-4.1.15/commit/f9d19044b0eef1965f9bc412d7d9e579b74ec968">f9d19044b0eef1965f9bc412d7d9e579b74ec968</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/pid_namespace.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/pid_namespace.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
<p>Publish Date: 2020-05-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20794>CVE-2019-20794</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794</a></p>
<p>Release Date: 2020-05-09</p>
<p>Fix Resolution: v5.3-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-20794 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed - ## CVE-2019-20794 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/madhans23/linux-4.1.15/commit/f9d19044b0eef1965f9bc412d7d9e579b74ec968">f9d19044b0eef1965f9bc412d7d9e579b74ec968</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/pid_namespace.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/kernel/pid_namespace.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
<p>Publish Date: 2020-05-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20794>CVE-2019-20794</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794</a></p>
<p>Release Date: 2020-05-09</p>
<p>Fix Resolution: v5.3-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve medium detected in linux stable autoclosed cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files kernel pid namespace c kernel pid namespace c vulnerability details an issue was discovered in the linux kernel through when unprivileged user namespaces are allowed a user can create their own pid namespace and mount a fuse filesystem upon interaction with this fuse filesystem if the userspace component is terminated via a kill of the pid namespace s pid it will result in a hung task and resources being permanently locked up until system reboot this can result in resource exhaustion publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
167,060 | 12,990,872,354 | IssuesEvent | 2020-07-23 01:33:07 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | closed | roachtest: transfer-leases/signal failed | C-test-failure O-roachtest O-robot branch-provisional_202007220233_v20.2.0-alpha.2 release-blocker | [(roachtest).transfer-leases/signal failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2107811&tab=buildLog) on [provisional_202007220233_v20.2.0-alpha.2@d3119926d33d808c6384cf3e99a7f7435f395489](https://github.com/cockroachdb/cockroach/commits/d3119926d33d808c6384cf3e99a7f7435f395489):
```
The test failed on branch=provisional_202007220233_v20.2.0-alpha.2, cloud=gce:
test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/transfer-leases/signal/run_1
quit.go:59,quit.go:269,soon.go:47,retry.go:197,soon.go:53,quit.go:216,quit.go:86,quit.go:142,context.go:135,quit.go:141,quit.go:86,quit.go:46,quit.go:340,test_runner.go:757: expected some ranges from RPC, got none
cluster.go:1571,context.go:135,cluster.go:1560,test_runner.go:826: dead node detection: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod monitor teamcity-2107811-1595392378-80-n3cpu4 --oneshot --ignore-empty-nodes: exit status 1 1: 4676
3: 3844
2: dead
Error: UNCLASSIFIED_PROBLEM: 2: dead
(1) UNCLASSIFIED_PROBLEM
Wraps: (2) attached stack trace
| main.glob..func13
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1115
| main.wrap.func1
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:266
| github.com/spf13/cobra.(*Command).execute
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:830
| github.com/spf13/cobra.(*Command).ExecuteC
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:914
| github.com/spf13/cobra.(*Command).Execute
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:864
| main.main
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1808
| runtime.main
| /usr/local/go/src/runtime/proc.go:203
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1373
Wraps: (3) 3 safe details enclosed
Wraps: (4) 2: dead
Error types: (1) errors.Unclassified (2) *withstack.withStack (3) *safedetails.withSafeDetails (4) *errors.errorString
```
<details><summary>More</summary><p>
Artifacts: [/transfer-leases/signal](https://teamcity.cockroachdb.com/viewLog.html?buildId=2107811&tab=artifacts#/transfer-leases/signal)
Related:
- #48429 roachtest: transfer-leases/signal failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-release-20.1](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-release-20.1) [release-blocker](https://api.github.com/repos/cockroachdb/cockroach/labels/release-blocker)
[See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Atransfer-leases%2Fsignal.%2A&sort=title&restgroup=false&display=lastcommented+project)
<sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
| 2.0 | roachtest: transfer-leases/signal failed - [(roachtest).transfer-leases/signal failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2107811&tab=buildLog) on [provisional_202007220233_v20.2.0-alpha.2@d3119926d33d808c6384cf3e99a7f7435f395489](https://github.com/cockroachdb/cockroach/commits/d3119926d33d808c6384cf3e99a7f7435f395489):
```
The test failed on branch=provisional_202007220233_v20.2.0-alpha.2, cloud=gce:
test artifacts and logs in: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/artifacts/transfer-leases/signal/run_1
quit.go:59,quit.go:269,soon.go:47,retry.go:197,soon.go:53,quit.go:216,quit.go:86,quit.go:142,context.go:135,quit.go:141,quit.go:86,quit.go:46,quit.go:340,test_runner.go:757: expected some ranges from RPC, got none
cluster.go:1571,context.go:135,cluster.go:1560,test_runner.go:826: dead node detection: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod monitor teamcity-2107811-1595392378-80-n3cpu4 --oneshot --ignore-empty-nodes: exit status 1 1: 4676
3: 3844
2: dead
Error: UNCLASSIFIED_PROBLEM: 2: dead
(1) UNCLASSIFIED_PROBLEM
Wraps: (2) attached stack trace
| main.glob..func13
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1115
| main.wrap.func1
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:266
| github.com/spf13/cobra.(*Command).execute
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:830
| github.com/spf13/cobra.(*Command).ExecuteC
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:914
| github.com/spf13/cobra.(*Command).Execute
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:864
| main.main
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1808
| runtime.main
| /usr/local/go/src/runtime/proc.go:203
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1373
Wraps: (3) 3 safe details enclosed
Wraps: (4) 2: dead
Error types: (1) errors.Unclassified (2) *withstack.withStack (3) *safedetails.withSafeDetails (4) *errors.errorString
```
<details><summary>More</summary><p>
Artifacts: [/transfer-leases/signal](https://teamcity.cockroachdb.com/viewLog.html?buildId=2107811&tab=artifacts#/transfer-leases/signal)
Related:
- #48429 roachtest: transfer-leases/signal failed [C-test-failure](https://api.github.com/repos/cockroachdb/cockroach/labels/C-test-failure) [O-roachtest](https://api.github.com/repos/cockroachdb/cockroach/labels/O-roachtest) [O-robot](https://api.github.com/repos/cockroachdb/cockroach/labels/O-robot) [branch-release-20.1](https://api.github.com/repos/cockroachdb/cockroach/labels/branch-release-20.1) [release-blocker](https://api.github.com/repos/cockroachdb/cockroach/labels/release-blocker)
[See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Atransfer-leases%2Fsignal.%2A&sort=title&restgroup=false&display=lastcommented+project)
<sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
| test | roachtest transfer leases signal failed on the test failed on branch provisional alpha cloud gce test artifacts and logs in home agent work go src github com cockroachdb cockroach artifacts transfer leases signal run quit go quit go soon go retry go soon go quit go quit go quit go context go quit go quit go quit go quit go test runner go expected some ranges from rpc got none cluster go context go cluster go test runner go dead node detection home agent work go src github com cockroachdb cockroach bin roachprod monitor teamcity oneshot ignore empty nodes exit status dead error unclassified problem dead unclassified problem wraps attached stack trace main glob home agent work go src github com cockroachdb cockroach pkg cmd roachprod main go main wrap home agent work go src github com cockroachdb cockroach pkg cmd roachprod main go github com cobra command execute home agent work go src github com cockroachdb cockroach vendor github com cobra command go github com cobra command executec home agent work go src github com cockroachdb cockroach vendor github com cobra command go github com cobra command execute home agent work go src github com cockroachdb cockroach vendor github com cobra command go main main home agent work go src github com cockroachdb cockroach pkg cmd roachprod main go runtime main usr local go src runtime proc go runtime goexit usr local go src runtime asm s wraps safe details enclosed wraps dead error types errors unclassified withstack withstack safedetails withsafedetails errors errorstring more artifacts related roachtest transfer leases signal failed powered by | 1 |
718,661 | 24,727,649,406 | IssuesEvent | 2022-10-20 15:05:55 | Aviuz/PrisonLabor | https://api.github.com/repos/Aviuz/PrisonLabor | closed | Jailor recruit prisoners instead of Warden | bug .low priority | when prisoner is set to work and recruit Jailor recruits prisoner instead of Warden | 1.0 | Jailor recruit prisoners instead of Warden - when prisoner is set to work and recruit Jailor recruits prisoner instead of Warden | non_test | jailor recruit prisoners instead of warden when prisoner is set to work and recruit jailor recruits prisoner instead of warden | 0 |
186,975 | 15,088,766,151 | IssuesEvent | 2021-02-06 02:08:10 | hackforla/marketing | https://api.github.com/repos/hackforla/marketing | opened | Define Marketing Objectives for Public Tree Map project | Level: Learning Skill: Brand Strategy Skill: Digital Marketing Skill: Media Strategy documentation | ### Overview
In order to help you market Public Tree Map project, we need to collect the following information:
### Action Items
- [ ] Identify the answers to each of these questions for your project putting your notes in the comments and checking off the boxes as you go:
- [ ] Mission
- [ ] Marketing Objective (KPI)
- [ ] Primary Target Audience
- [ ] Secondary Audience
- [ ] Location (of Target Audience)
- [ ] Timeline
- [ ] Key Events
- [ ] Budget
- [ ] Gifted Media (Digital, TV, OOH, etc.) - free media or partner website with significant levels of traffic
- [ ] Potential Business Partners
- [ ] Potential Spokespeople
- [ ] Free Press Opportunities
- [ ] Key Outreach Platforms
- [ ] Links to Digital Assets/Graphics
- [ ] Other Important Information
### Resources

| 1.0 | Define Marketing Objectives for Public Tree Map project - ### Overview
In order to help you market Public Tree Map project, we need to collect the following information:
### Action Items
- [ ] Identify the answers to each of these questions for your project putting your notes in the comments and checking off the boxes as you go:
- [ ] Mission
- [ ] Marketing Objective (KPI)
- [ ] Primary Target Audience
- [ ] Secondary Audience
- [ ] Location (of Target Audience)
- [ ] Timeline
- [ ] Key Events
- [ ] Budget
- [ ] Gifted Media (Digital, TV, OOH, etc.) - free media or partner website with significant levels of traffic
- [ ] Potential Business Partners
- [ ] Potential Spokespeople
- [ ] Free Press Opportunities
- [ ] Key Outreach Platforms
- [ ] Links to Digital Assets/Graphics
- [ ] Other Important Information
### Resources

| non_test | define marketing objectives for public tree map project overview in order to help you market public tree map project we need to collect the following information action items identify the answers to each of these questions for your project putting your notes in the comments and checking off the boxes as you go mission marketing objective kpi primary target audience secondary audience location of target audience timeline key events budget gifted media digital tv ooh etc free media or partner website with significant levels of traffic potential business partners potential spokespeople free press opportunities key outreach platforms links to digital assets graphics other important information resources | 0 |
104,671 | 8,997,053,969 | IssuesEvent | 2019-02-02 07:54:57 | elastic/elasticsearch | https://api.github.com/repos/elastic/elasticsearch | closed | CI DiscoveryDisruptionIT.testUnicastSinglePingResponseContainsMasterfailure | :Distributed/ZenDiscovery >test-failure | ## Example build failure
https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+intake/1377/
https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+intake/1375
https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+intake/1369
## Reproduction line
does not reproduce locally
```
./gradlew :server:integTest -Dtests.seed=E269587FA887C221 -Dtests.class=org.elasticsearch.discovery.DiscoveryDisruptionIT -Dtests.method="testUnicastSinglePingResponseContainsMaster" -Dtests.security.manager=true -Dtests.locale=uk-UA -Dtests.timezone=IET -Dcompiler.java=11 -Druntime.java=8
```
## Example relevant log:
```
00:07:18 FAILURE 17.3s J7 | DiscoveryDisruptionIT.testUnicastSinglePingResponseContainsMaster <<< FAILURES!
00:07:18 > Throwable #1: java.lang.AssertionError: wrong master on node [node_t0]. cluster_state:
00:07:18 > cluster uuid: NRyFo07tRb-QuuGQrEuyEw
00:07:18 > version: 8
00:07:18 > state uuid: -fgrQ6M5RY6F6y2s-C1PIg
00:07:18 > from_diff: false
00:07:18 > meta data version: 4
00:07:18 > coordination_metadata:
00:07:18 > term: 2
00:07:18 > last_committed_config: VotingConfiguration{i00fSbofRaOfrvZoINn5QA,MmwMKeSKRkyMHssX6pftrA,-9DRkF2gQDynx_Jpx0fqkQ}
00:07:18 > last_accepted_config: VotingConfiguration{i00fSbofRaOfrvZoINn5QA,MmwMKeSKRkyMHssX6pftrA,-9DRkF2gQDynx_Jpx0fqkQ}
00:07:18 > voting tombstones: []
00:07:18 > metadata customs:
00:07:18 > index-graveyard: IndexGraveyard[[]]
00:07:18 > nodes:
00:07:18 > {node_t2}{-9DRkF2gQDynx_Jpx0fqkQ}{L5K5FyglTWunHVgjNhaRnQ}{127.0.0.1}{127.0.0.1:45712}
00:07:18 > {node_t3}{MmwMKeSKRkyMHssX6pftrA}{ZAmOn4tYS5SQlv0hKLFskw}{127.0.0.1}{127.0.0.1:38247}, master
00:07:18 > {node_t1}{B6zx_LS-Sz69HrbcSOIWOg}{SH1j3f9iT32jK21tUbVMzw}{127.0.0.1}{127.0.0.1:33117}
00:07:18 > {node_t0}{i00fSbofRaOfrvZoINn5QA}{YuI45I7rSQucaiEQPWd1xg}{127.0.0.1}{127.0.0.1:43815}, local
00:07:18 > routing_table (version 1):
00:07:18 > routing_nodes:
00:07:18 > -----node_id[i00fSbofRaOfrvZoINn5QA][V]
00:07:18 > -----node_id[B6zx_LS-Sz69HrbcSOIWOg][V]
00:07:18 > -----node_id[MmwMKeSKRkyMHssX6pftrA][V]
00:07:18 > -----node_id[-9DRkF2gQDynx_Jpx0fqkQ][V]
00:07:18 > ---- unassigned
00:07:18 > Expected: "node_t2"
00:07:18 > but: was "node_t3"
00:07:18 > at __randomizedtesting.SeedInfo.seed([E269587FA887C221:251557C9F0D5A2CE]:0)
00:07:18 > at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:20)
00:07:18 > at org.elasticsearch.discovery.AbstractDisruptionTestCase.lambda$assertMaster$2(AbstractDisruptionTestCase.java:202)
00:07:18 > at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:847)
00:07:18 > at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:821)
00:07:18 > at org.elasticsearch.discovery.AbstractDisruptionTestCase.assertMaster(AbstractDisruptionTestCase.java:196)
00:07:18 > at org.elasticsearch.discovery.DiscoveryDisruptionIT.testUnicastSinglePingResponseContainsMaster(DiscoveryDisruptionIT.java:128)
00:07:18 > at java.lang.Thread.run(Thread.java:748)
00:07:18 > Suppressed: java.lang.AssertionError: wrong master on node [node_t0]. cluster_state:
00:07:18 > cluster uuid: NRyFo07tRb-QuuGQrEuyEw
00:07:18 > version: 8
00:07:18 > state uuid: -fgrQ6M5RY6F6y2s-C1PIg
00:07:18 > from_diff: false
00:07:18 > meta data version: 4
00:07:18 > coordination_metadata:
00:07:18 > term: 2
00:07:18 > last_committed_config: VotingConfiguration{i00fSbofRaOfrvZoINn5QA,MmwMKeSKRkyMHssX6pftrA,-9DRkF2gQDynx_Jpx0fqkQ}
00:07:18 > last_accepted_config: VotingConfiguration{i00fSbofRaOfrvZoINn5QA,MmwMKeSKRkyMHssX6pftrA,-9DRkF2gQDynx_Jpx0fqkQ}
00:07:18 > voting tombstones: []
00:07:18 > metadata customs:
00:07:18 > index-graveyard: IndexGraveyard[[]]
00:07:18 > nodes:
00:07:18 > {node_t2}{-9DRkF2gQDynx_Jpx0fqkQ}{L5K5FyglTWunHVgjNhaRnQ}{127.0.0.1}{127.0.0.1:45712}
00:07:18 > {node_t3}{MmwMKeSKRkyMHssX6pftrA}{ZAmOn4tYS5SQlv0hKLFskw}{127.0.0.1}{127.0.0.1:38247}, master
00:07:18 > {node_t1}{B6zx_LS-Sz69HrbcSOIWOg}{SH1j3f9iT32jK21tUbVMzw}{127.0.0.1}{127.0.0.1:33117}
00:07:18 > {node_t0}{i00fSbofRaOfrvZoINn5QA}{YuI45I7rSQucaiEQPWd1xg}{127.0.0.1}{127.0.0.1:43815}, local
00:07:18 > routing_table (version 1):
00:07:18 > routing_nodes:
00:07:18 > -----node_id[i00fSbofRaOfrvZoINn5QA][V]
00:07:18 > -----node_id[B6zx_LS-Sz69HrbcSOIWOg][V]
00:07:18 > -----node_id[MmwMKeSKRkyMHssX6pftrA][V]
00:07:18 > -----node_id[-9DRkF2gQDynx_Jpx0fqkQ][V]
00:07:18 > ---- unassigned
00:07:18 > Expected: "node_t2"
00:07:18 > but: was "node_t3"
00:07:18 > at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:20)
00:07:18 > at org.elasticsearch.discovery.AbstractDisruptionTestCase.lambda$assertMaster$2(AbstractDisruptionTestCase.java:202)
00:07:18 > at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:835)
00:07:18 > ... 40 more
00:07:18 > Suppressed: java.lang.AssertionError: wrong master on node [node_t0]. cluster_state:
```
## Frequency
111 / 7 days , 6 last 2 days | 1.0 | CI DiscoveryDisruptionIT.testUnicastSinglePingResponseContainsMasterfailure - ## Example build failure
https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+intake/1377/
https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+intake/1375
https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+intake/1369
## Reproduction line
does not reproduce locally
```
./gradlew :server:integTest -Dtests.seed=E269587FA887C221 -Dtests.class=org.elasticsearch.discovery.DiscoveryDisruptionIT -Dtests.method="testUnicastSinglePingResponseContainsMaster" -Dtests.security.manager=true -Dtests.locale=uk-UA -Dtests.timezone=IET -Dcompiler.java=11 -Druntime.java=8
```
## Example relevant log:
```
00:07:18 FAILURE 17.3s J7 | DiscoveryDisruptionIT.testUnicastSinglePingResponseContainsMaster <<< FAILURES!
00:07:18 > Throwable #1: java.lang.AssertionError: wrong master on node [node_t0]. cluster_state:
00:07:18 > cluster uuid: NRyFo07tRb-QuuGQrEuyEw
00:07:18 > version: 8
00:07:18 > state uuid: -fgrQ6M5RY6F6y2s-C1PIg
00:07:18 > from_diff: false
00:07:18 > meta data version: 4
00:07:18 > coordination_metadata:
00:07:18 > term: 2
00:07:18 > last_committed_config: VotingConfiguration{i00fSbofRaOfrvZoINn5QA,MmwMKeSKRkyMHssX6pftrA,-9DRkF2gQDynx_Jpx0fqkQ}
00:07:18 > last_accepted_config: VotingConfiguration{i00fSbofRaOfrvZoINn5QA,MmwMKeSKRkyMHssX6pftrA,-9DRkF2gQDynx_Jpx0fqkQ}
00:07:18 > voting tombstones: []
00:07:18 > metadata customs:
00:07:18 > index-graveyard: IndexGraveyard[[]]
00:07:18 > nodes:
00:07:18 > {node_t2}{-9DRkF2gQDynx_Jpx0fqkQ}{L5K5FyglTWunHVgjNhaRnQ}{127.0.0.1}{127.0.0.1:45712}
00:07:18 > {node_t3}{MmwMKeSKRkyMHssX6pftrA}{ZAmOn4tYS5SQlv0hKLFskw}{127.0.0.1}{127.0.0.1:38247}, master
00:07:18 > {node_t1}{B6zx_LS-Sz69HrbcSOIWOg}{SH1j3f9iT32jK21tUbVMzw}{127.0.0.1}{127.0.0.1:33117}
00:07:18 > {node_t0}{i00fSbofRaOfrvZoINn5QA}{YuI45I7rSQucaiEQPWd1xg}{127.0.0.1}{127.0.0.1:43815}, local
00:07:18 > routing_table (version 1):
00:07:18 > routing_nodes:
00:07:18 > -----node_id[i00fSbofRaOfrvZoINn5QA][V]
00:07:18 > -----node_id[B6zx_LS-Sz69HrbcSOIWOg][V]
00:07:18 > -----node_id[MmwMKeSKRkyMHssX6pftrA][V]
00:07:18 > -----node_id[-9DRkF2gQDynx_Jpx0fqkQ][V]
00:07:18 > ---- unassigned
00:07:18 > Expected: "node_t2"
00:07:18 > but: was "node_t3"
00:07:18 > at __randomizedtesting.SeedInfo.seed([E269587FA887C221:251557C9F0D5A2CE]:0)
00:07:18 > at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:20)
00:07:18 > at org.elasticsearch.discovery.AbstractDisruptionTestCase.lambda$assertMaster$2(AbstractDisruptionTestCase.java:202)
00:07:18 > at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:847)
00:07:18 > at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:821)
00:07:18 > at org.elasticsearch.discovery.AbstractDisruptionTestCase.assertMaster(AbstractDisruptionTestCase.java:196)
00:07:18 > at org.elasticsearch.discovery.DiscoveryDisruptionIT.testUnicastSinglePingResponseContainsMaster(DiscoveryDisruptionIT.java:128)
00:07:18 > at java.lang.Thread.run(Thread.java:748)
00:07:18 > Suppressed: java.lang.AssertionError: wrong master on node [node_t0]. cluster_state:
00:07:18 > cluster uuid: NRyFo07tRb-QuuGQrEuyEw
00:07:18 > version: 8
00:07:18 > state uuid: -fgrQ6M5RY6F6y2s-C1PIg
00:07:18 > from_diff: false
00:07:18 > meta data version: 4
00:07:18 > coordination_metadata:
00:07:18 > term: 2
00:07:18 > last_committed_config: VotingConfiguration{i00fSbofRaOfrvZoINn5QA,MmwMKeSKRkyMHssX6pftrA,-9DRkF2gQDynx_Jpx0fqkQ}
00:07:18 > last_accepted_config: VotingConfiguration{i00fSbofRaOfrvZoINn5QA,MmwMKeSKRkyMHssX6pftrA,-9DRkF2gQDynx_Jpx0fqkQ}
00:07:18 > voting tombstones: []
00:07:18 > metadata customs:
00:07:18 > index-graveyard: IndexGraveyard[[]]
00:07:18 > nodes:
00:07:18 > {node_t2}{-9DRkF2gQDynx_Jpx0fqkQ}{L5K5FyglTWunHVgjNhaRnQ}{127.0.0.1}{127.0.0.1:45712}
00:07:18 > {node_t3}{MmwMKeSKRkyMHssX6pftrA}{ZAmOn4tYS5SQlv0hKLFskw}{127.0.0.1}{127.0.0.1:38247}, master
00:07:18 > {node_t1}{B6zx_LS-Sz69HrbcSOIWOg}{SH1j3f9iT32jK21tUbVMzw}{127.0.0.1}{127.0.0.1:33117}
00:07:18 > {node_t0}{i00fSbofRaOfrvZoINn5QA}{YuI45I7rSQucaiEQPWd1xg}{127.0.0.1}{127.0.0.1:43815}, local
00:07:18 > routing_table (version 1):
00:07:18 > routing_nodes:
00:07:18 > -----node_id[i00fSbofRaOfrvZoINn5QA][V]
00:07:18 > -----node_id[B6zx_LS-Sz69HrbcSOIWOg][V]
00:07:18 > -----node_id[MmwMKeSKRkyMHssX6pftrA][V]
00:07:18 > -----node_id[-9DRkF2gQDynx_Jpx0fqkQ][V]
00:07:18 > ---- unassigned
00:07:18 > Expected: "node_t2"
00:07:18 > but: was "node_t3"
00:07:18 > at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:20)
00:07:18 > at org.elasticsearch.discovery.AbstractDisruptionTestCase.lambda$assertMaster$2(AbstractDisruptionTestCase.java:202)
00:07:18 > at org.elasticsearch.test.ESTestCase.assertBusy(ESTestCase.java:835)
00:07:18 > ... 40 more
00:07:18 > Suppressed: java.lang.AssertionError: wrong master on node [node_t0]. cluster_state:
```
## Frequency
111 / 7 days , 6 last 2 days | test | ci discoverydisruptionit testunicastsinglepingresponsecontainsmasterfailure example build failure reproduction line does not reproduce locally gradlew server integtest dtests seed dtests class org elasticsearch discovery discoverydisruptionit dtests method testunicastsinglepingresponsecontainsmaster dtests security manager true dtests locale uk ua dtests timezone iet dcompiler java druntime java example relevant log failure discoverydisruptionit testunicastsinglepingresponsecontainsmaster failures throwable java lang assertionerror wrong master on node cluster state cluster uuid quugqreuyew version state uuid from diff false meta data version coordination metadata term last committed config votingconfiguration last accepted config votingconfiguration voting tombstones metadata customs index graveyard indexgraveyard nodes node node master node ls node local routing table version routing nodes node id node id node id node id unassigned expected node but was node at randomizedtesting seedinfo seed at org hamcrest matcherassert assertthat matcherassert java at org elasticsearch discovery abstractdisruptiontestcase lambda assertmaster abstractdisruptiontestcase java at org elasticsearch test estestcase assertbusy estestcase java at org elasticsearch test estestcase assertbusy estestcase java at org elasticsearch discovery abstractdisruptiontestcase assertmaster abstractdisruptiontestcase java at org elasticsearch discovery discoverydisruptionit testunicastsinglepingresponsecontainsmaster discoverydisruptionit java at java lang thread run thread java suppressed java lang assertionerror wrong master on node cluster state cluster uuid quugqreuyew version state uuid from diff false meta data version coordination metadata term last committed config votingconfiguration last accepted config votingconfiguration voting tombstones metadata customs index graveyard indexgraveyard nodes node node master node ls node local routing table version routing nodes node id node id node id node id unassigned expected node but was node at org hamcrest matcherassert assertthat matcherassert java at org elasticsearch discovery abstractdisruptiontestcase lambda assertmaster abstractdisruptiontestcase java at org elasticsearch test estestcase assertbusy estestcase java more suppressed java lang assertionerror wrong master on node cluster state frequency days last days | 1 |
265,792 | 23,198,392,599 | IssuesEvent | 2022-08-01 18:46:11 | pytorch/pytorch | https://api.github.com/repos/pytorch/pytorch | opened | DISABLED test_matmul_cuda_float64 (__main__.TestNestedTensorDeviceTypeCUDA) | module: flaky-tests skipped module: unknown | Platforms: linux, rocm
This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_matmul_cuda_float64&suite=TestNestedTensorDeviceTypeCUDA&file=test_nestedtensor.py) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/7614514220).
Over the past 3 hours, it has been determined flaky in 1 workflow(s) with 1 red and 1 green. | 1.0 | DISABLED test_matmul_cuda_float64 (__main__.TestNestedTensorDeviceTypeCUDA) - Platforms: linux, rocm
This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_matmul_cuda_float64&suite=TestNestedTensorDeviceTypeCUDA&file=test_nestedtensor.py) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/7614514220).
Over the past 3 hours, it has been determined flaky in 1 workflow(s) with 1 red and 1 green. | test | disabled test matmul cuda main testnestedtensordevicetypecuda platforms linux rocm this test was disabled because it is failing in ci see and the most recent trunk over the past hours it has been determined flaky in workflow s with red and green | 1 |
299,949 | 25,938,357,716 | IssuesEvent | 2022-12-16 16:00:33 | bitcoin/bitcoin | https://api.github.com/repos/bitcoin/bitcoin | closed | Improve Transaction Tests Flags | Tests | _Originally posted by @glozow in https://github.com/bitcoin/bitcoin/pull/21702#r684235896_
While trying to write transaction tests for CTV i've come across the pathological case of trying to specify flags.
Suppose I have a script that is `<X> CTV`. CTV is an OP_NOP4 takeover, so when DISCOURAGE_UPGRADABLE_NOPS is set but VERIFY_CTV flag is not, then it should fail. Therefore we need to mark DISCOURAGE_UPGRADABLE_NOPS as excluded. However, when we exclude that flag, then the flag maximality check wants it to fail, but the txn is consensus valid.
If we were to just update the trim/fill flag functions, then we would be overly restrictive because we would set things up to e.g. always exlcude or include a flag when in reality it depends on the specific flags being set or unset.
I think this can be addressed by adding 2 new fields to the test:
1) flags that should be always on
2) transactions that should be exempt from the maximality check
We can then duplicate some tests to test the combo of flags to check that NONE are excluded + the new NOP4 passes as well as the case where DISCOURAGE_NOPS is excluded (i.e., never set) that turning it back on (during the maximality check) is not a failure.
Any thoughts on this approach?
| 1.0 | Improve Transaction Tests Flags - _Originally posted by @glozow in https://github.com/bitcoin/bitcoin/pull/21702#r684235896_
While trying to write transaction tests for CTV i've come across the pathological case of trying to specify flags.
Suppose I have a script that is `<X> CTV`. CTV is an OP_NOP4 takeover, so when DISCOURAGE_UPGRADABLE_NOPS is set but VERIFY_CTV flag is not, then it should fail. Therefore we need to mark DISCOURAGE_UPGRADABLE_NOPS as excluded. However, when we exclude that flag, then the flag maximality check wants it to fail, but the txn is consensus valid.
If we were to just update the trim/fill flag functions, then we would be overly restrictive because we would set things up to e.g. always exlcude or include a flag when in reality it depends on the specific flags being set or unset.
I think this can be addressed by adding 2 new fields to the test:
1) flags that should be always on
2) transactions that should be exempt from the maximality check
We can then duplicate some tests to test the combo of flags to check that NONE are excluded + the new NOP4 passes as well as the case where DISCOURAGE_NOPS is excluded (i.e., never set) that turning it back on (during the maximality check) is not a failure.
Any thoughts on this approach?
| test | improve transaction tests flags originally posted by glozow in while trying to write transaction tests for ctv i ve come across the pathological case of trying to specify flags suppose i have a script that is ctv ctv is an op takeover so when discourage upgradable nops is set but verify ctv flag is not then it should fail therefore we need to mark discourage upgradable nops as excluded however when we exclude that flag then the flag maximality check wants it to fail but the txn is consensus valid if we were to just update the trim fill flag functions then we would be overly restrictive because we would set things up to e g always exlcude or include a flag when in reality it depends on the specific flags being set or unset i think this can be addressed by adding new fields to the test flags that should be always on transactions that should be exempt from the maximality check we can then duplicate some tests to test the combo of flags to check that none are excluded the new passes as well as the case where discourage nops is excluded i e never set that turning it back on during the maximality check is not a failure any thoughts on this approach | 1 |
251,427 | 21,480,876,108 | IssuesEvent | 2022-04-26 17:36:17 | Josee9988/project-template | https://api.github.com/repos/Josee9988/project-template | opened | [Test] tai xiu | Type: Test | # **💉 Failing Test**
## **Which jobs/test(s) are failing**
<!-- The CI jobs or tests that are failing -->
*
---
## **Reason for failure/description**
<!-- Try to describe why the test is failing or what are we missing to make it pass. -->
---
### **Media prove**
<!-- If applicable, add screenshots or videos to help explain your problem. -->
---
### **Additional context**
<!-- Add any other context or additional information about the problem here. -->
*
<!--📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛
Oh hi there! 😄
To expedite issue processing please search open and closed issues before submitting a new one.
Please read our Rules of Conduct at this repository's `.github/CODE_OF_CONDUCT.md`
📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛-->
| 1.0 | [Test] tai xiu - # **💉 Failing Test**
## **Which jobs/test(s) are failing**
<!-- The CI jobs or tests that are failing -->
*
---
## **Reason for failure/description**
<!-- Try to describe why the test is failing or what are we missing to make it pass. -->
---
### **Media prove**
<!-- If applicable, add screenshots or videos to help explain your problem. -->
---
### **Additional context**
<!-- Add any other context or additional information about the problem here. -->
*
<!--📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛
Oh hi there! 😄
To expedite issue processing please search open and closed issues before submitting a new one.
Please read our Rules of Conduct at this repository's `.github/CODE_OF_CONDUCT.md`
📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛-->
| test | tai xiu 💉 failing test which jobs test s are failing reason for failure description media prove additional context 📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛 oh hi there 😄 to expedite issue processing please search open and closed issues before submitting a new one please read our rules of conduct at this repository s github code of conduct md 📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛📛 | 1 |
49,881 | 13,187,284,608 | IssuesEvent | 2020-08-13 02:55:41 | icecube-trac/tix3 | https://api.github.com/repos/icecube-trac/tix3 | opened | [simprod-scripts] Adapt PropagateMuons to the new PROPOSAL (Trac #2215) | Incomplete Migration Migrated from Trac analysis defect | <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/2215">https://code.icecube.wisc.edu/ticket/2215</a>, reported by olivas and owned by jsoedingrekso</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:15:23",
"description": "\"'module' object has no attribute 'BremsstrahlungParametrization'\"\n\nThat's the error I'm getting in combo/stable builds. Makes sense. PROPOSAL doesn't expose that anymore and it looks like a lot has been moved behind the scenes. It also looks like it's possible we won't have to manage separate propagators for muons and taus ourselves and I3PropagatorServicePROPOSAL handles this internally. Jan would be able to verify and probably the best person to handle this adaptation.",
"reporter": "olivas",
"cc": "",
"resolution": "fixed",
"_ts": "1550067323910946",
"component": "analysis",
"summary": "[simprod-scripts] Adapt PropagateMuons to the new PROPOSAL",
"priority": "blocker",
"keywords": "",
"time": "2018-12-04T01:21:20",
"milestone": "",
"owner": "jsoedingrekso",
"type": "defect"
}
```
</p>
</details>
| 1.0 | [simprod-scripts] Adapt PropagateMuons to the new PROPOSAL (Trac #2215) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/2215">https://code.icecube.wisc.edu/ticket/2215</a>, reported by olivas and owned by jsoedingrekso</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:15:23",
"description": "\"'module' object has no attribute 'BremsstrahlungParametrization'\"\n\nThat's the error I'm getting in combo/stable builds. Makes sense. PROPOSAL doesn't expose that anymore and it looks like a lot has been moved behind the scenes. It also looks like it's possible we won't have to manage separate propagators for muons and taus ourselves and I3PropagatorServicePROPOSAL handles this internally. Jan would be able to verify and probably the best person to handle this adaptation.",
"reporter": "olivas",
"cc": "",
"resolution": "fixed",
"_ts": "1550067323910946",
"component": "analysis",
"summary": "[simprod-scripts] Adapt PropagateMuons to the new PROPOSAL",
"priority": "blocker",
"keywords": "",
"time": "2018-12-04T01:21:20",
"milestone": "",
"owner": "jsoedingrekso",
"type": "defect"
}
```
</p>
</details>
| non_test | adapt propagatemuons to the new proposal trac migrated from json status closed changetime description module object has no attribute bremsstrahlungparametrization n nthat s the error i m getting in combo stable builds makes sense proposal doesn t expose that anymore and it looks like a lot has been moved behind the scenes it also looks like it s possible we won t have to manage separate propagators for muons and taus ourselves and handles this internally jan would be able to verify and probably the best person to handle this adaptation reporter olivas cc resolution fixed ts component analysis summary adapt propagatemuons to the new proposal priority blocker keywords time milestone owner jsoedingrekso type defect | 0 |
544,845 | 15,914,342,182 | IssuesEvent | 2021-04-13 00:24:15 | NuGet/NuGetGallery | https://api.github.com/repos/NuGet/NuGetGallery | closed | The correct ID casing should be displayed for the selected version | Area: Gallery UI Priority - 3 Type:Bug Verified-Dev Verified-Int Verified-Prod | # Problem
It seems like the casing of a package ID in the package web page is determined by the first version's ID casing. For example, consider the "sqlite" package ID.
ID | Version
---|---------
sqlite | 3.8.4.2
SQLite |3.9.1-test
SQLite | 3.12.2-alpha
SQLite | 3.12.2
SQLite | 3.12.3
SQLite | 3.13.0
If you go to a specific version on NuGet.org (e.g. https://www.nuget.org/packages/sqlite/3.13.0) the ID casing in the page's heading and example install command is not `SQLite`. It is `sqlite`.
The package author's intended case is apparent in the .nuspec contained in the .nupkg.

Package IDs are case insensitive, but the package author's intended case is still important.
Here is a list of popular packages affected by this bug:
LatestId | TotalDownloads
-- | --
Swashbuckle.AspNetCore.SwaggerUI | 96334268
Npgsql | 54283023
Hangfire.Core | 30446646
SendGrid | 25779632
Microsoft.Data.Sqlite | 20418313
SharpCompress | 19417928
NCrontab.Signed | 17268104
Hangfire.SqlServer | 17034720
StructureMap | 14500086
Serilog.Sinks.Elasticsearch | 14448135
morelinq | 14230167
iTextSharp | 13785720
NCrontab | 13670550
Hangfire | 12792338
Refit | 12481531
Topshelf | 11030897
MongoDB.LibMongocrypt | 10757761
NServiceBus | 9493951
NuGet.Core | 7609245
PDFsharp | 7562855
# Solution
1. Add a nullable `Id` column to the `Packages` table.
1. On package upload, store the package Id in the new column
1. Anywhere the package ID is displayed, display the `Package.Id` value if it is non-null, otherwise display the `PackageRegistration.Id` value.
1. Update reflow to set the `Package.Id` value if it is null.
1. Update Db2AzureSearch to use the `Package.Id` value if it is non-null, otherwise use the `PackageRegistration.Id` value. See: https://github.com/NuGet/NuGetGallery/issues/3349#issuecomment-730649782 | 1.0 | The correct ID casing should be displayed for the selected version - # Problem
It seems like the casing of a package ID in the package web page is determined by the first version's ID casing. For example, consider the "sqlite" package ID.
ID | Version
---|---------
sqlite | 3.8.4.2
SQLite |3.9.1-test
SQLite | 3.12.2-alpha
SQLite | 3.12.2
SQLite | 3.12.3
SQLite | 3.13.0
If you go to a specific version on NuGet.org (e.g. https://www.nuget.org/packages/sqlite/3.13.0) the ID casing in the page's heading and example install command is not `SQLite`. It is `sqlite`.
The package author's intended case is apparent in the .nuspec contained in the .nupkg.

Package IDs are case insensitive, but the package author's intended case is still important.
Here is a list of popular packages affected by this bug:
LatestId | TotalDownloads
-- | --
Swashbuckle.AspNetCore.SwaggerUI | 96334268
Npgsql | 54283023
Hangfire.Core | 30446646
SendGrid | 25779632
Microsoft.Data.Sqlite | 20418313
SharpCompress | 19417928
NCrontab.Signed | 17268104
Hangfire.SqlServer | 17034720
StructureMap | 14500086
Serilog.Sinks.Elasticsearch | 14448135
morelinq | 14230167
iTextSharp | 13785720
NCrontab | 13670550
Hangfire | 12792338
Refit | 12481531
Topshelf | 11030897
MongoDB.LibMongocrypt | 10757761
NServiceBus | 9493951
NuGet.Core | 7609245
PDFsharp | 7562855
# Solution
1. Add a nullable `Id` column to the `Packages` table.
1. On package upload, store the package Id in the new column
1. Anywhere the package ID is displayed, display the `Package.Id` value if it is non-null, otherwise display the `PackageRegistration.Id` value.
1. Update reflow to set the `Package.Id` value if it is null.
1. Update Db2AzureSearch to use the `Package.Id` value if it is non-null, otherwise use the `PackageRegistration.Id` value. See: https://github.com/NuGet/NuGetGallery/issues/3349#issuecomment-730649782 | non_test | the correct id casing should be displayed for the selected version problem it seems like the casing of a package id in the package web page is determined by the first version s id casing for example consider the sqlite package id id version sqlite sqlite test sqlite alpha sqlite sqlite sqlite if you go to a specific version on nuget org e g the id casing in the page s heading and example install command is not sqlite it is sqlite the package author s intended case is apparent in the nuspec contained in the nupkg package ids are case insensitive but the package author s intended case is still important here is a list of popular packages affected by this bug latestid totaldownloads swashbuckle aspnetcore swaggerui npgsql hangfire core sendgrid microsoft data sqlite sharpcompress ncrontab signed hangfire sqlserver structuremap serilog sinks elasticsearch morelinq itextsharp ncrontab hangfire refit topshelf mongodb libmongocrypt nservicebus nuget core pdfsharp solution add a nullable id column to the packages table on package upload store the package id in the new column anywhere the package id is displayed display the package id value if it is non null otherwise display the packageregistration id value update reflow to set the package id value if it is null update to use the package id value if it is non null otherwise use the packageregistration id value see | 0 |
2,727 | 8,214,512,973 | IssuesEvent | 2018-09-04 23:48:45 | airavata-courses/autobots | https://api.github.com/repos/airavata-courses/autobots | opened | Evaluate open source streaming frameworks | Design/Architecture discussion | For the use case of applying transformations or aggregating data from message queues, Evaluate existing stream data processing frameworks which may include
- [ ] Heron
- [ ] Flink
- [ ] Spark streaming
Document the trade offs and consider the trade offs while designing the architecture of project | 1.0 | Evaluate open source streaming frameworks - For the use case of applying transformations or aggregating data from message queues, Evaluate existing stream data processing frameworks which may include
- [ ] Heron
- [ ] Flink
- [ ] Spark streaming
Document the trade offs and consider the trade offs while designing the architecture of project | non_test | evaluate open source streaming frameworks for the use case of applying transformations or aggregating data from message queues evaluate existing stream data processing frameworks which may include heron flink spark streaming document the trade offs and consider the trade offs while designing the architecture of project | 0 |
179,129 | 21,517,305,227 | IssuesEvent | 2022-04-28 11:08:06 | finos/spring-bot | https://api.github.com/repos/finos/spring-bot | closed | CVE-2021-43797 (Medium) detected in netty-codec-http-4.1.68.Final.jar | security vulnerability | ## CVE-2021-43797 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-http-4.1.68.Final.jar</b></p></summary>
<p></p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /tools/reminder-bot/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar</p>
<p>
Dependency Hierarchy:
- bot-azure-4.14.2.jar (Root Library)
- azure-storage-queue-12.8.0.jar
- azure-storage-common-12.10.0.jar
- azure-core-http-netty-1.7.1.jar
- :x: **netty-codec-http-4.1.68.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/finos/spring-bot/commit/3da9e0f849079934eb92135cec1f523e22bdc1ad">3da9e0f849079934eb92135cec1f523e22bdc1ad</a></p>
<p>Found in base branch: <b>spring-bot-master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.
WhiteSource Note: After conducting further research, WhiteSource has determined that all versions of netty up to version 4.1.71.Final are vulnerable to CVE-2021-43797.
<p>Publish Date: 2021-12-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797>CVE-2021-43797</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="CVE-2021-43797">CVE-2021-43797</a></p>
<p>Release Date: 2021-12-09</p>
<p>Fix Resolution: io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec-http","packageVersion":"4.1.68.Final","packageFilePaths":["/tools/reminder-bot/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.microsoft.bot:bot-azure:4.14.2;com.azure:azure-storage-queue:12.8.0;com.azure:azure-storage-common:12.10.0;com.azure:azure-core-http-netty:1.7.1;io.netty:netty-codec-http:4.1.68.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final","isBinary":false}],"baseBranches":["spring-bot-master"],"vulnerabilityIdentifier":"CVE-2021-43797","vulnerabilityDetails":"Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can\u0027t see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.\n WhiteSource Note: After conducting further research, WhiteSource has determined that all versions of netty up to version 4.1.71.Final are vulnerable to CVE-2021-43797.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-43797 (Medium) detected in netty-codec-http-4.1.68.Final.jar - ## CVE-2021-43797 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-http-4.1.68.Final.jar</b></p></summary>
<p></p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /tools/reminder-bot/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar,/home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.68.Final/netty-codec-http-4.1.68.Final.jar</p>
<p>
Dependency Hierarchy:
- bot-azure-4.14.2.jar (Root Library)
- azure-storage-queue-12.8.0.jar
- azure-storage-common-12.10.0.jar
- azure-core-http-netty-1.7.1.jar
- :x: **netty-codec-http-4.1.68.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/finos/spring-bot/commit/3da9e0f849079934eb92135cec1f523e22bdc1ad">3da9e0f849079934eb92135cec1f523e22bdc1ad</a></p>
<p>Found in base branch: <b>spring-bot-master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.
WhiteSource Note: After conducting further research, WhiteSource has determined that all versions of netty up to version 4.1.71.Final are vulnerable to CVE-2021-43797.
<p>Publish Date: 2021-12-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797>CVE-2021-43797</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="CVE-2021-43797">CVE-2021-43797</a></p>
<p>Release Date: 2021-12-09</p>
<p>Fix Resolution: io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec-http","packageVersion":"4.1.68.Final","packageFilePaths":["/tools/reminder-bot/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.microsoft.bot:bot-azure:4.14.2;com.azure:azure-storage-queue:12.8.0;com.azure:azure-storage-common:12.10.0;com.azure:azure-core-http-netty:1.7.1;io.netty:netty-codec-http:4.1.68.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.71.Final,io.netty:netty-all:4.1.71.Final","isBinary":false}],"baseBranches":["spring-bot-master"],"vulnerabilityIdentifier":"CVE-2021-43797","vulnerabilityDetails":"Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers \u0026 clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to \"sanitize\" header names before it forward these to another remote system when used as proxy. This remote system can\u0027t see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.\n WhiteSource Note: After conducting further research, WhiteSource has determined that all versions of netty up to version 4.1.71.Final are vulnerable to CVE-2021-43797.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-43797","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_test | cve medium detected in netty codec http final jar cve medium severity vulnerability vulnerable library netty codec http final jar library home page a href path to dependency file tools reminder bot pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar home wss scanner repository io netty netty codec http final netty codec http final jar home wss scanner repository io netty netty codec http final netty codec http final jar home wss scanner repository io netty netty codec http final netty codec http final jar home wss scanner repository io netty netty codec http final netty codec http final jar dependency hierarchy bot azure jar root library azure storage queue jar azure storage common jar azure core http netty jar x netty codec http final jar vulnerable library found in head commit a href found in base branch spring bot master vulnerability details netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients netty prior to version final skips control chars when they are present at the beginning end of the header name it should instead fail fast as these are not allowed by the spec and could lead to http request smuggling failing to do the validation might cause netty to sanitize header names before it forward these to another remote system when used as proxy this remote system can t see the invalid usage anymore and therefore does not do the validation itself users should upgrade to version final whitesource note after conducting further research whitesource has determined that all versions of netty up to version final are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin cve release date fix resolution io netty netty codec http final io netty netty all final isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com microsoft bot bot azure com azure azure storage queue com azure azure storage common com azure azure core http netty io netty netty codec http final isminimumfixversionavailable true minimumfixversion io netty netty codec http final io netty netty all final isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients netty prior to version final skips control chars when they are present at the beginning end of the header name it should instead fail fast as these are not allowed by the spec and could lead to http request smuggling failing to do the validation might cause netty to sanitize header names before it forward these to another remote system when used as proxy this remote system can see the invalid usage anymore and therefore does not do the validation itself users should upgrade to version final n whitesource note after conducting further research whitesource has determined that all versions of netty up to version final are vulnerable to cve vulnerabilityurl | 0 |
750,558 | 26,205,955,612 | IssuesEvent | 2023-01-03 22:39:36 | googleapis/google-api-java-client | https://api.github.com/repos/googleapis/google-api-java-client | closed | GMB API error model does not match GoogleJsonError model | type: feature request priority: p3 | The error response model of the GMB APIs ([https://developers.google.com/my-business/ref_overview](https://developers.google.com/my-business/ref_overview)) currently looks like this:
```
{
"error": {
"code": 400,
"message": "Request contains an invalid argument.",
"status": "INVALID_ARGUMENT",
"details": [{
"@type": "type.googleapis.com/google.mybusiness.v4.ValidationError",
"errorDetails": [{
"code": 3,
"field": "regular_hours.periods.close_time",
"message": "Time field must follow hh:mm format.",
"value": "25:00"
}
]
}
]
}
}
```
The subclass [Details](https://github.com/googleapis/google-api-java-client/blob/ef26931d0b3392d7e4354d22d38c1f95fcd9c6a0/google-api-client/src/main/java/com/google/api/client/googleapis/json/GoogleJsonError.java#L187) of the [GoogleJsonError](https://github.com/googleapis/google-api-java-client/blob/main/google-api-client/src/main/java/com/google/api/client/googleapis/json/GoogleJsonError.java) class, however, does not feature an errorDetails property.
Once the [JsonParser](https://github.com/googleapis/google-http-java-client/blob/main/google-http-client/src/main/java/com/google/api/client/json/JsonParser.java) is reached, we thus reach [ customizeParser.handleUnrecognizedKey(destination, key);](https://github.com/googleapis/google-http-java-client/blob/f7948014150d0205ffb6abf322e97e0c03b4ee16/google-http-client/src/main/java/com/google/api/client/json/JsonParser.java#L462) for the errorDetails field.
| 1.0 | GMB API error model does not match GoogleJsonError model - The error response model of the GMB APIs ([https://developers.google.com/my-business/ref_overview](https://developers.google.com/my-business/ref_overview)) currently looks like this:
```
{
"error": {
"code": 400,
"message": "Request contains an invalid argument.",
"status": "INVALID_ARGUMENT",
"details": [{
"@type": "type.googleapis.com/google.mybusiness.v4.ValidationError",
"errorDetails": [{
"code": 3,
"field": "regular_hours.periods.close_time",
"message": "Time field must follow hh:mm format.",
"value": "25:00"
}
]
}
]
}
}
```
The subclass [Details](https://github.com/googleapis/google-api-java-client/blob/ef26931d0b3392d7e4354d22d38c1f95fcd9c6a0/google-api-client/src/main/java/com/google/api/client/googleapis/json/GoogleJsonError.java#L187) of the [GoogleJsonError](https://github.com/googleapis/google-api-java-client/blob/main/google-api-client/src/main/java/com/google/api/client/googleapis/json/GoogleJsonError.java) class, however, does not feature an errorDetails property.
Once the [JsonParser](https://github.com/googleapis/google-http-java-client/blob/main/google-http-client/src/main/java/com/google/api/client/json/JsonParser.java) is reached, we thus reach [ customizeParser.handleUnrecognizedKey(destination, key);](https://github.com/googleapis/google-http-java-client/blob/f7948014150d0205ffb6abf322e97e0c03b4ee16/google-http-client/src/main/java/com/google/api/client/json/JsonParser.java#L462) for the errorDetails field.
| non_test | gmb api error model does not match googlejsonerror model the error response model of the gmb apis currently looks like this error code message request contains an invalid argument status invalid argument details type type googleapis com google mybusiness validationerror errordetails code field regular hours periods close time message time field must follow hh mm format value the subclass of the class however does not feature an errordetails property once the is reached we thus reach for the errordetails field | 0 |
2,149 | 2,883,725,666 | IssuesEvent | 2015-06-11 13:49:21 | mitchellh/packer | https://api.github.com/repos/mitchellh/packer | closed | clean_ami_name improperly squashes space char | bug builder/amazon | Maybe back in 2013 a space was illegal but it's in very common use these days.
module: packer/builder/amazon/common/template_funcs.go | 1.0 | clean_ami_name improperly squashes space char - Maybe back in 2013 a space was illegal but it's in very common use these days.
module: packer/builder/amazon/common/template_funcs.go | non_test | clean ami name improperly squashes space char maybe back in a space was illegal but it s in very common use these days module packer builder amazon common template funcs go | 0 |
608,456 | 18,839,703,709 | IssuesEvent | 2021-11-11 08:00:49 | SAP/xsk | https://api.github.com/repos/SAP/xsk | opened | [IDE] No option to create a .xsaccess file | enhancement priority-medium IDE | Currently, there's no option to create a .`xsaccess` file through right click --> New--> filetype. None of the options available through this menu creates a `.xsaccess` file.
<img width="359" alt="Screenshot 2021-11-11 at 9 55 45" src="https://user-images.githubusercontent.com/61655573/141260122-576c5697-1a42-4e2b-81e1-9fe72c4e0770.png">
**Expected behavior**
Such option should be available.
| 1.0 | [IDE] No option to create a .xsaccess file - Currently, there's no option to create a .`xsaccess` file through right click --> New--> filetype. None of the options available through this menu creates a `.xsaccess` file.
<img width="359" alt="Screenshot 2021-11-11 at 9 55 45" src="https://user-images.githubusercontent.com/61655573/141260122-576c5697-1a42-4e2b-81e1-9fe72c4e0770.png">
**Expected behavior**
Such option should be available.
| non_test | no option to create a xsaccess file currently there s no option to create a xsaccess file through right click new filetype none of the options available through this menu creates a xsaccess file img width alt screenshot at src expected behavior such option should be available | 0 |
233,037 | 18,944,814,050 | IssuesEvent | 2021-11-18 09:02:51 | mozilla-mobile/fenix | https://api.github.com/repos/mozilla-mobile/fenix | opened | Intermittent debug(T) - org.mozilla.fenix.tabstray.browser.InactiveTabsControllerTest - WHEN expanded THEN notify filtered card - java.lang.AssertionError: Verification failed: call 1 of 1: TabsTray(#632).updateTabs(slotCapture<List>(), any())) was not called | eng:intermittent-test eng:ui-test | ### Firebase Test Run:
https://treeherder.mozilla.org/logviewer?job_id=358368907&repo=fenix
### Stacktrace:
```
SUITE: org.mozilla.fenix.tabstray.browser.InactiveTabsControllerTest
TEST: WHEN expanded THEN notify filtered card
FAILURE
java.lang.AssertionError: Verification failed: call 1 of 1: TabsTray(#632).updateTabs(slotCapture<List>(), any())) was not called
at io.mockk.impl.recording.states.VerifyingState.failIfNotPassed(VerifyingState.kt:66)
at io.mockk.impl.recording.states.VerifyingState.recordingDone(VerifyingState.kt:42)
at io.mockk.impl.recording.CommonCallRecorder.done(CommonCallRecorder.kt:47)
at io.mockk.impl.eval.RecordedBlockEvaluator.record(RecordedBlockEvaluator.kt:64)
at io.mockk.impl.eval.VerifyBlockEvaluator.verify(VerifyBlockEvaluator.kt:30)
at io.mockk.MockKDsl.internalVerify(API.kt:118)
at io.mockk.MockKKt.verify(MockK.kt:149)
at io.mockk.MockKKt.verify$default(MockK.kt:146)
at org.mozilla.fenix.tabstray.browser.InactiveTabsControllerTest.WHEN expanded THEN notify filtered card(InactiveTabsControllerTest.kt:50)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.runTestClass(JUnitTestClassExecutor.java:110)
at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.execute(JUnitTestClassExecutor.java:58)
at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.execute(JUnitTestClassExecutor.java:38)
at org.gradle.api.internal.tasks.testing.junit.AbstractJUnitTestClassProcessor.processTestClass(AbstractJUnitTestClassProcessor.java:62)
at org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
at jdk.internal.reflect.GeneratedMethodAccessor104.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:36)
at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
at org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:33)
at org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:94)
at com.sun.proxy.$Proxy5.processTestClass(Unknown Source)
at org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:121)
at jdk.internal.reflect.GeneratedMethodAccessor103.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:36)
at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
at org.gradle.internal.remote.internal.hub.MessageHubBackedObjectConnection$DispatchWrapper.dispatch(MessageHubBackedObjectConnection.java:182)
at org.gradle.internal.remote.internal.hub.MessageHubBackedObjectConnection$DispatchWrapper.dispatch(MessageHubBackedObjectConnection.java:164)
at org.gradle.internal.remote.internal.hub.MessageHub$Handler.run(MessageHub.java:414)
at org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:64)
at org.gradle.internal.concurrent.ManagedExecutorImpl$1.run(ManagedExecutorImpl.java:48)
at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at org.gradle.internal.concurrent.ThreadFactoryImpl$ManagedThreadRunnable.run(ThreadFactoryImpl.java:56)
at java.base/java.lang.Thread.run(Thread.java:829)
```
### Build:
https://github.com/mozilla-mobile/fenix/commit/33e266ca67152f2ab36918fefaa056b3782787d1 | 2.0 | Intermittent debug(T) - org.mozilla.fenix.tabstray.browser.InactiveTabsControllerTest - WHEN expanded THEN notify filtered card - java.lang.AssertionError: Verification failed: call 1 of 1: TabsTray(#632).updateTabs(slotCapture<List>(), any())) was not called - ### Firebase Test Run:
https://treeherder.mozilla.org/logviewer?job_id=358368907&repo=fenix
### Stacktrace:
```
SUITE: org.mozilla.fenix.tabstray.browser.InactiveTabsControllerTest
TEST: WHEN expanded THEN notify filtered card
FAILURE
java.lang.AssertionError: Verification failed: call 1 of 1: TabsTray(#632).updateTabs(slotCapture<List>(), any())) was not called
at io.mockk.impl.recording.states.VerifyingState.failIfNotPassed(VerifyingState.kt:66)
at io.mockk.impl.recording.states.VerifyingState.recordingDone(VerifyingState.kt:42)
at io.mockk.impl.recording.CommonCallRecorder.done(CommonCallRecorder.kt:47)
at io.mockk.impl.eval.RecordedBlockEvaluator.record(RecordedBlockEvaluator.kt:64)
at io.mockk.impl.eval.VerifyBlockEvaluator.verify(VerifyBlockEvaluator.kt:30)
at io.mockk.MockKDsl.internalVerify(API.kt:118)
at io.mockk.MockKKt.verify(MockK.kt:149)
at io.mockk.MockKKt.verify$default(MockK.kt:146)
at org.mozilla.fenix.tabstray.browser.InactiveTabsControllerTest.WHEN expanded THEN notify filtered card(InactiveTabsControllerTest.kt:50)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50)
at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47)
at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:325)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:78)
at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:57)
at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290)
at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71)
at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288)
at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58)
at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268)
at org.junit.runners.ParentRunner.run(ParentRunner.java:363)
at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.runTestClass(JUnitTestClassExecutor.java:110)
at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.execute(JUnitTestClassExecutor.java:58)
at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.execute(JUnitTestClassExecutor.java:38)
at org.gradle.api.internal.tasks.testing.junit.AbstractJUnitTestClassProcessor.processTestClass(AbstractJUnitTestClassProcessor.java:62)
at org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
at jdk.internal.reflect.GeneratedMethodAccessor104.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:36)
at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
at org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:33)
at org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:94)
at com.sun.proxy.$Proxy5.processTestClass(Unknown Source)
at org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:121)
at jdk.internal.reflect.GeneratedMethodAccessor103.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:36)
at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
at org.gradle.internal.remote.internal.hub.MessageHubBackedObjectConnection$DispatchWrapper.dispatch(MessageHubBackedObjectConnection.java:182)
at org.gradle.internal.remote.internal.hub.MessageHubBackedObjectConnection$DispatchWrapper.dispatch(MessageHubBackedObjectConnection.java:164)
at org.gradle.internal.remote.internal.hub.MessageHub$Handler.run(MessageHub.java:414)
at org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:64)
at org.gradle.internal.concurrent.ManagedExecutorImpl$1.run(ManagedExecutorImpl.java:48)
at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at org.gradle.internal.concurrent.ThreadFactoryImpl$ManagedThreadRunnable.run(ThreadFactoryImpl.java:56)
at java.base/java.lang.Thread.run(Thread.java:829)
```
### Build:
https://github.com/mozilla-mobile/fenix/commit/33e266ca67152f2ab36918fefaa056b3782787d1 | test | intermittent debug t org mozilla fenix tabstray browser inactivetabscontrollertest when expanded then notify filtered card java lang assertionerror verification failed call of tabstray updatetabs slotcapture any was not called firebase test run stacktrace suite org mozilla fenix tabstray browser inactivetabscontrollertest test when expanded then notify filtered card failure java lang assertionerror verification failed call of tabstray updatetabs slotcapture any was not called at io mockk impl recording states verifyingstate failifnotpassed verifyingstate kt at io mockk impl recording states verifyingstate recordingdone verifyingstate kt at io mockk impl recording commoncallrecorder done commoncallrecorder kt at io mockk impl eval recordedblockevaluator record recordedblockevaluator kt at io mockk impl eval verifyblockevaluator verify verifyblockevaluator kt at io mockk mockkdsl internalverify api kt at io mockk mockkkt verify mockk kt at io mockk mockkkt verify default mockk kt at org mozilla fenix tabstray browser inactivetabscontrollertest when expanded then notify filtered card inactivetabscontrollertest kt at java base jdk internal reflect nativemethodaccessorimpl native method at java base jdk internal reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java at java base jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java base java lang reflect method invoke method java at org junit runners model frameworkmethod runreflectivecall frameworkmethod java at org junit internal runners model reflectivecallable run reflectivecallable java at org junit runners model frameworkmethod invokeexplosively frameworkmethod java at org junit internal runners statements invokemethod evaluate invokemethod java at org junit runners parentrunner runleaf parentrunner java at org junit runners runchild java at org junit runners runchild java at org junit runners parentrunner run parentrunner java at org junit runners parentrunner schedule parentrunner java at org junit runners parentrunner runchildren parentrunner java at org junit runners parentrunner access parentrunner java at org junit runners parentrunner evaluate parentrunner java at org junit runners parentrunner run parentrunner java at org gradle api internal tasks testing junit junittestclassexecutor runtestclass junittestclassexecutor java at org gradle api internal tasks testing junit junittestclassexecutor execute junittestclassexecutor java at org gradle api internal tasks testing junit junittestclassexecutor execute junittestclassexecutor java at org gradle api internal tasks testing junit abstractjunittestclassprocessor processtestclass abstractjunittestclassprocessor java at org gradle api internal tasks testing suitetestclassprocessor processtestclass suitetestclassprocessor java at jdk internal reflect invoke unknown source at java base jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java base java lang reflect method invoke method java at org gradle internal dispatch reflectiondispatch dispatch reflectiondispatch java at org gradle internal dispatch reflectiondispatch dispatch reflectiondispatch java at org gradle internal dispatch contextclassloaderdispatch dispatch contextclassloaderdispatch java at org gradle internal dispatch proxydispatchadapter dispatchinginvocationhandler invoke proxydispatchadapter java at com sun proxy processtestclass unknown source at org gradle api internal tasks testing worker testworker processtestclass testworker java at jdk internal reflect invoke unknown source at java base jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java base java lang reflect method invoke method java at org gradle internal dispatch reflectiondispatch dispatch reflectiondispatch java at org gradle internal dispatch reflectiondispatch dispatch reflectiondispatch java at org gradle internal remote internal hub messagehubbackedobjectconnection dispatchwrapper dispatch messagehubbackedobjectconnection java at org gradle internal remote internal hub messagehubbackedobjectconnection dispatchwrapper dispatch messagehubbackedobjectconnection java at org gradle internal remote internal hub messagehub handler run messagehub java at org gradle internal concurrent executorpolicy catchandrecordfailures onexecute executorpolicy java at org gradle internal concurrent managedexecutorimpl run managedexecutorimpl java at java base java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java base java util concurrent threadpoolexecutor worker run threadpoolexecutor java at org gradle internal concurrent threadfactoryimpl managedthreadrunnable run threadfactoryimpl java at java base java lang thread run thread java build | 1 |
1,428 | 2,596,517,087 | IssuesEvent | 2015-02-20 21:15:41 | divio/django-cms | https://api.github.com/repos/divio/django-cms | closed | better error message with custom user model | component: documentation kind: bug status: accepted | Hi and thanks for the project.
I was trying to reorganize my installed apps settings while also using a custom user model and my app `account` (where the custom user model is defined) was placed after `cms`. With this my app failed to boot with [this exception](https://github.com/divio/django-cms/blob/develop/cms/models/permissionmodels.py#L39-L42). It might make sense to mention that the `cms` app should come before the app that defines the custom user model in the exception text or elsewhere. | 1.0 | better error message with custom user model - Hi and thanks for the project.
I was trying to reorganize my installed apps settings while also using a custom user model and my app `account` (where the custom user model is defined) was placed after `cms`. With this my app failed to boot with [this exception](https://github.com/divio/django-cms/blob/develop/cms/models/permissionmodels.py#L39-L42). It might make sense to mention that the `cms` app should come before the app that defines the custom user model in the exception text or elsewhere. | non_test | better error message with custom user model hi and thanks for the project i was trying to reorganize my installed apps settings while also using a custom user model and my app account where the custom user model is defined was placed after cms with this my app failed to boot with it might make sense to mention that the cms app should come before the app that defines the custom user model in the exception text or elsewhere | 0 |
186,910 | 14,426,868,290 | IssuesEvent | 2020-12-06 00:28:35 | kalexmills/github-vet-tests-dec2020 | https://api.github.com/repos/kalexmills/github-vet-tests-dec2020 | closed | futurewei-cloud/global-scheduler: pkg/scheduler/algorithm/predicates/predicates_test.go; 34 LoC | fresh small test |
Found a possible issue in [futurewei-cloud/global-scheduler](https://www.github.com/futurewei-cloud/global-scheduler) at [pkg/scheduler/algorithm/predicates/predicates_test.go](https://github.com/futurewei-cloud/global-scheduler/blob/b9329a9fbcd5ca571c8acc498b9d42f5e8b9c19e/pkg/scheduler/algorithm/predicates/predicates_test.go#L4017-L4050)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> function call which takes a reference to node at line 4035 may start a goroutine
[Click here to see the code in its original context.](https://github.com/futurewei-cloud/global-scheduler/blob/b9329a9fbcd5ca571c8acc498b9d42f5e8b9c19e/pkg/scheduler/algorithm/predicates/predicates_test.go#L4017-L4050)
<details>
<summary>Click here to show the 34 line(s) of Go which triggered the analyzer.</summary>
```go
for indexNode, node := range test.nodes {
testFit := PodAffinityChecker{
info: nodeListInfo,
podLister: schedulertesting.FakePodLister(test.pods),
}
var meta PredicateMetadata
if !test.nometa {
meta = GetPredicateMetadata(test.pod, nodeInfoMap)
}
fits, reasons, _ := testFit.InterPodAffinityMatches(test.pod, meta, nodeInfoMap[node.Name])
if !fits && !reflect.DeepEqual(reasons, test.nodesExpectAffinityFailureReasons[indexNode]) {
t.Errorf("index: %d unexpected failure reasons: %v expect: %v", indexTest, reasons, test.nodesExpectAffinityFailureReasons[indexNode])
}
affinity := test.pod.Spec.Affinity
if affinity != nil && affinity.NodeAffinity != nil {
nodeInfo := schedulernodeinfo.NewNodeInfo()
nodeInfo.SetNode(&node)
nodeInfoMap := map[string]*schedulernodeinfo.NodeInfo{node.Name: nodeInfo}
fits2, reasons, err := PodMatchNodeSelector(test.pod, GetPredicateMetadata(test.pod, nodeInfoMap), nodeInfo)
if err != nil {
t.Errorf("unexpected error: %v", err)
}
if !fits2 && !reflect.DeepEqual(reasons, selectorExpectedFailureReasons) {
t.Errorf("unexpected failure reasons: %v, want: %v", reasons, selectorExpectedFailureReasons)
}
fits = fits && fits2
}
if fits != test.fits[node.Name] {
t.Errorf("expected %v for %s got %v", test.fits[node.Name], node.Name, fits)
}
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: b9329a9fbcd5ca571c8acc498b9d42f5e8b9c19e
| 1.0 | futurewei-cloud/global-scheduler: pkg/scheduler/algorithm/predicates/predicates_test.go; 34 LoC -
Found a possible issue in [futurewei-cloud/global-scheduler](https://www.github.com/futurewei-cloud/global-scheduler) at [pkg/scheduler/algorithm/predicates/predicates_test.go](https://github.com/futurewei-cloud/global-scheduler/blob/b9329a9fbcd5ca571c8acc498b9d42f5e8b9c19e/pkg/scheduler/algorithm/predicates/predicates_test.go#L4017-L4050)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> function call which takes a reference to node at line 4035 may start a goroutine
[Click here to see the code in its original context.](https://github.com/futurewei-cloud/global-scheduler/blob/b9329a9fbcd5ca571c8acc498b9d42f5e8b9c19e/pkg/scheduler/algorithm/predicates/predicates_test.go#L4017-L4050)
<details>
<summary>Click here to show the 34 line(s) of Go which triggered the analyzer.</summary>
```go
for indexNode, node := range test.nodes {
testFit := PodAffinityChecker{
info: nodeListInfo,
podLister: schedulertesting.FakePodLister(test.pods),
}
var meta PredicateMetadata
if !test.nometa {
meta = GetPredicateMetadata(test.pod, nodeInfoMap)
}
fits, reasons, _ := testFit.InterPodAffinityMatches(test.pod, meta, nodeInfoMap[node.Name])
if !fits && !reflect.DeepEqual(reasons, test.nodesExpectAffinityFailureReasons[indexNode]) {
t.Errorf("index: %d unexpected failure reasons: %v expect: %v", indexTest, reasons, test.nodesExpectAffinityFailureReasons[indexNode])
}
affinity := test.pod.Spec.Affinity
if affinity != nil && affinity.NodeAffinity != nil {
nodeInfo := schedulernodeinfo.NewNodeInfo()
nodeInfo.SetNode(&node)
nodeInfoMap := map[string]*schedulernodeinfo.NodeInfo{node.Name: nodeInfo}
fits2, reasons, err := PodMatchNodeSelector(test.pod, GetPredicateMetadata(test.pod, nodeInfoMap), nodeInfo)
if err != nil {
t.Errorf("unexpected error: %v", err)
}
if !fits2 && !reflect.DeepEqual(reasons, selectorExpectedFailureReasons) {
t.Errorf("unexpected failure reasons: %v, want: %v", reasons, selectorExpectedFailureReasons)
}
fits = fits && fits2
}
if fits != test.fits[node.Name] {
t.Errorf("expected %v for %s got %v", test.fits[node.Name], node.Name, fits)
}
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: b9329a9fbcd5ca571c8acc498b9d42f5e8b9c19e
| test | futurewei cloud global scheduler pkg scheduler algorithm predicates predicates test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message function call which takes a reference to node at line may start a goroutine click here to show the line s of go which triggered the analyzer go for indexnode node range test nodes testfit podaffinitychecker info nodelistinfo podlister schedulertesting fakepodlister test pods var meta predicatemetadata if test nometa meta getpredicatemetadata test pod nodeinfomap fits reasons testfit interpodaffinitymatches test pod meta nodeinfomap if fits reflect deepequal reasons test nodesexpectaffinityfailurereasons t errorf index d unexpected failure reasons v expect v indextest reasons test nodesexpectaffinityfailurereasons affinity test pod spec affinity if affinity nil affinity nodeaffinity nil nodeinfo schedulernodeinfo newnodeinfo nodeinfo setnode node nodeinfomap map schedulernodeinfo nodeinfo node name nodeinfo reasons err podmatchnodeselector test pod getpredicatemetadata test pod nodeinfomap nodeinfo if err nil t errorf unexpected error v err if reflect deepequal reasons selectorexpectedfailurereasons t errorf unexpected failure reasons v want v reasons selectorexpectedfailurereasons fits fits if fits test fits t errorf expected v for s got v test fits node name fits leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id | 1 |
209,284 | 16,013,943,737 | IssuesEvent | 2021-04-20 13:59:56 | elastic/elasticsearch | https://api.github.com/repos/elastic/elasticsearch | closed | [CI] RetrySearchIntegTests testSearcherId failing | :Distributed/Snapshot/Restore >test-failure Team:Distributed | I've seen this twice now on Windows. We're getting an `AccessDeniedException` but I wonder if the _real_ problem is us hitting path length limits on Windows.
**Build scan:**
https://gradle-enterprise.elastic.co/s/az3mlzx6obs6e/tests/:x-pack:plugin:searchable-snapshots:internalClusterTest/org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests/testSearcherId
**Reproduction line:**
`gradlew ':x-pack:plugin:searchable-snapshots:internalClusterTest' --tests "org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests.testSearcherId" -Dtests.seed=C1C5C5DD639AFC9C -Dtests.security.manager=true -Dtests.locale=es-PY -Dtests.timezone=Pacific/Truk -Druntime.java=11`
**Applicable branches:**
master
**Reproduces locally?:**
Didn't try
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests&tests.test=testSearcherId
**Failure excerpt:**
```
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=1115, name=elasticsearch[node_s1][generic][T#5], state=RUNNABLE, group=TGRP-RetrySearchIntegTests]
at __randomizedtesting.SeedInfo.seed([C1C5C5DD639AFC9C:2346010D078D876E]:0)
Caused by: java.lang.AssertionError: java.io.UncheckedIOException: java.nio.file.AccessDeniedException: C:\Users\jenkins\workspace\elastic+elasticsearch+master+multijob-windows-compatibility\os\windows-2019\x-pack\plugin\searchable-snapshots\build\testrun\internalClusterTest\temp\org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests_C1C5C5DD639AFC9C-001\tempDir-002\node_s1\indices\tGDphX3nTiO2W3sIN_5IDQ\0\snapshot_cache\y4BzhBEPTjWtxQzB9FgToQ\l-wM3LV7R_6aCfijDfCBXw
at __randomizedtesting.SeedInfo.seed([C1C5C5DD639AFC9C]:0)
at org.elasticsearch.common.util.concurrent.AbstractRefCounted.decRef(AbstractRefCounted.java:57)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.decrementRefCount(CacheFile.java:247)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.startEviction(CacheFile.java:275)
at org.elasticsearch.core.internal.io.IOUtils.close(IOUtils.java:74)
at org.elasticsearch.core.internal.io.IOUtils.closeWhileHandlingException(IOUtils.java:164)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.onCacheFileEviction(CacheService.java:485)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.lambda$new$1(CacheService.java:161)
at org.elasticsearch.common.cache.Cache.delete(Cache.java:788)
at org.elasticsearch.common.cache.Cache.lambda$new$6(Cache.java:488)
at org.elasticsearch.common.cache.Cache$CacheSegment.remove(Cache.java:305)
at org.elasticsearch.common.cache.Cache.invalidate(Cache.java:518)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.processShardEviction(CacheService.java:409)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService$1.doRun(CacheService.java:345)
at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
at java.util.concurrent.FutureTask.run(FutureTask.java:264)
at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:669)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.lang.Thread.run(Thread.java:834)
Caused by: java.io.UncheckedIOException: java.nio.file.AccessDeniedException: C:\Users\jenkins\workspace\elastic+elasticsearch+master+multijob-windows-compatibility\os\windows-2019\x-pack\plugin\searchable-snapshots\build\testrun\internalClusterTest\temp\org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests_C1C5C5DD639AFC9C-001\tempDir-002\node_s1\indices\tGDphX3nTiO2W3sIN_5IDQ\0\snapshot_cache\y4BzhBEPTjWtxQzB9FgToQ\l-wM3LV7R_6aCfijDfCBXw
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile$1.closeInternal(CacheFile.java:71)
at org.elasticsearch.common.util.concurrent.AbstractRefCounted.decRef(AbstractRefCounted.java:55)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.decrementRefCount(CacheFile.java:247)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.startEviction(CacheFile.java:275)
at org.elasticsearch.core.internal.io.IOUtils.close(IOUtils.java:74)
at org.elasticsearch.core.internal.io.IOUtils.closeWhileHandlingException(IOUtils.java:164)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.onCacheFileEviction(CacheService.java:485)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.lambda$new$1(CacheService.java:161)
at org.elasticsearch.common.cache.Cache.delete(Cache.java:788)
at org.elasticsearch.common.cache.Cache.lambda$new$6(Cache.java:488)
at org.elasticsearch.common.cache.Cache$CacheSegment.remove(Cache.java:305)
at org.elasticsearch.common.cache.Cache.invalidate(Cache.java:518)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.processShardEviction(CacheService.java:409)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService$1.doRun(CacheService.java:345)
at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
at java.util.concurrent.FutureTask.run(FutureTask.java:264)
at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:669)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.lang.Thread.run(Thread.java:834)
Caused by: java.nio.file.AccessDeniedException: C:\Users\jenkins\workspace\elastic+elasticsearch+master+multijob-windows-compatibility\os\windows-2019\x-pack\plugin\searchable-snapshots\build\testrun\internalClusterTest\temp\org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests_C1C5C5DD639AFC9C-001\tempDir-002\node_s1\indices\tGDphX3nTiO2W3sIN_5IDQ\0\snapshot_cache\y4BzhBEPTjWtxQzB9FgToQ\l-wM3LV7R_6aCfijDfCBXw
at sun.nio.fs.WindowsException.translateToIOException(WindowsException.java:89)
at sun.nio.fs.WindowsException.rethrowAsIOException(WindowsException.java:103)
at sun.nio.fs.WindowsException.rethrowAsIOException(WindowsException.java:108)
at sun.nio.fs.WindowsFileSystemProvider.implDelete(WindowsFileSystemProvider.java:270)
at sun.nio.fs.AbstractFileSystemProvider.deleteIfExists(AbstractFileSystemProvider.java:110)
at org.apache.lucene.mockfile.FilterFileSystemProvider.deleteIfExists(FilterFileSystemProvider.java:238)
at org.apache.lucene.mockfile.FilterFileSystemProvider.deleteIfExists(FilterFileSystemProvider.java:238)
at org.apache.lucene.mockfile.FilterFileSystemProvider.deleteIfExists(FilterFileSystemProvider.java:238)
at org.apache.lucene.mockfile.FilterFileSystemProvider.deleteIfExists(FilterFileSystemProvider.java:238)
at java.nio.file.Files.deleteIfExists(Files.java:1180)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile$1.closeInternal(CacheFile.java:69)
at org.elasticsearch.common.util.concurrent.AbstractRefCounted.decRef(AbstractRefCounted.java:55)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.decrementRefCount(CacheFile.java:247)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.startEviction(CacheFile.java:275)
at org.elasticsearch.core.internal.io.IOUtils.close(IOUtils.java:74)
at org.elasticsearch.core.internal.io.IOUtils.closeWhileHandlingException(IOUtils.java:164)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.onCacheFileEviction(CacheService.java:485)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.lambda$new$1(CacheService.java:161)
at org.elasticsearch.common.cache.Cache.delete(Cache.java:788)
at org.elasticsearch.common.cache.Cache.lambda$new$6(Cache.java:488)
at org.elasticsearch.common.cache.Cache$CacheSegment.remove(Cache.java:305)
at org.elasticsearch.common.cache.Cache.invalidate(Cache.java:518)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.processShardEviction(CacheService.java:409)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService$1.doRun(CacheService.java:345)
at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
at java.util.concurrent.FutureTask.run(FutureTask.java:264)
at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:669)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.lang.Thread.run(Thread.java:834)
``` | 1.0 | [CI] RetrySearchIntegTests testSearcherId failing - I've seen this twice now on Windows. We're getting an `AccessDeniedException` but I wonder if the _real_ problem is us hitting path length limits on Windows.
**Build scan:**
https://gradle-enterprise.elastic.co/s/az3mlzx6obs6e/tests/:x-pack:plugin:searchable-snapshots:internalClusterTest/org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests/testSearcherId
**Reproduction line:**
`gradlew ':x-pack:plugin:searchable-snapshots:internalClusterTest' --tests "org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests.testSearcherId" -Dtests.seed=C1C5C5DD639AFC9C -Dtests.security.manager=true -Dtests.locale=es-PY -Dtests.timezone=Pacific/Truk -Druntime.java=11`
**Applicable branches:**
master
**Reproduces locally?:**
Didn't try
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests&tests.test=testSearcherId
**Failure excerpt:**
```
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=1115, name=elasticsearch[node_s1][generic][T#5], state=RUNNABLE, group=TGRP-RetrySearchIntegTests]
at __randomizedtesting.SeedInfo.seed([C1C5C5DD639AFC9C:2346010D078D876E]:0)
Caused by: java.lang.AssertionError: java.io.UncheckedIOException: java.nio.file.AccessDeniedException: C:\Users\jenkins\workspace\elastic+elasticsearch+master+multijob-windows-compatibility\os\windows-2019\x-pack\plugin\searchable-snapshots\build\testrun\internalClusterTest\temp\org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests_C1C5C5DD639AFC9C-001\tempDir-002\node_s1\indices\tGDphX3nTiO2W3sIN_5IDQ\0\snapshot_cache\y4BzhBEPTjWtxQzB9FgToQ\l-wM3LV7R_6aCfijDfCBXw
at __randomizedtesting.SeedInfo.seed([C1C5C5DD639AFC9C]:0)
at org.elasticsearch.common.util.concurrent.AbstractRefCounted.decRef(AbstractRefCounted.java:57)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.decrementRefCount(CacheFile.java:247)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.startEviction(CacheFile.java:275)
at org.elasticsearch.core.internal.io.IOUtils.close(IOUtils.java:74)
at org.elasticsearch.core.internal.io.IOUtils.closeWhileHandlingException(IOUtils.java:164)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.onCacheFileEviction(CacheService.java:485)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.lambda$new$1(CacheService.java:161)
at org.elasticsearch.common.cache.Cache.delete(Cache.java:788)
at org.elasticsearch.common.cache.Cache.lambda$new$6(Cache.java:488)
at org.elasticsearch.common.cache.Cache$CacheSegment.remove(Cache.java:305)
at org.elasticsearch.common.cache.Cache.invalidate(Cache.java:518)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.processShardEviction(CacheService.java:409)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService$1.doRun(CacheService.java:345)
at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
at java.util.concurrent.FutureTask.run(FutureTask.java:264)
at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:669)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.lang.Thread.run(Thread.java:834)
Caused by: java.io.UncheckedIOException: java.nio.file.AccessDeniedException: C:\Users\jenkins\workspace\elastic+elasticsearch+master+multijob-windows-compatibility\os\windows-2019\x-pack\plugin\searchable-snapshots\build\testrun\internalClusterTest\temp\org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests_C1C5C5DD639AFC9C-001\tempDir-002\node_s1\indices\tGDphX3nTiO2W3sIN_5IDQ\0\snapshot_cache\y4BzhBEPTjWtxQzB9FgToQ\l-wM3LV7R_6aCfijDfCBXw
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile$1.closeInternal(CacheFile.java:71)
at org.elasticsearch.common.util.concurrent.AbstractRefCounted.decRef(AbstractRefCounted.java:55)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.decrementRefCount(CacheFile.java:247)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.startEviction(CacheFile.java:275)
at org.elasticsearch.core.internal.io.IOUtils.close(IOUtils.java:74)
at org.elasticsearch.core.internal.io.IOUtils.closeWhileHandlingException(IOUtils.java:164)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.onCacheFileEviction(CacheService.java:485)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.lambda$new$1(CacheService.java:161)
at org.elasticsearch.common.cache.Cache.delete(Cache.java:788)
at org.elasticsearch.common.cache.Cache.lambda$new$6(Cache.java:488)
at org.elasticsearch.common.cache.Cache$CacheSegment.remove(Cache.java:305)
at org.elasticsearch.common.cache.Cache.invalidate(Cache.java:518)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.processShardEviction(CacheService.java:409)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService$1.doRun(CacheService.java:345)
at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
at java.util.concurrent.FutureTask.run(FutureTask.java:264)
at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:669)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.lang.Thread.run(Thread.java:834)
Caused by: java.nio.file.AccessDeniedException: C:\Users\jenkins\workspace\elastic+elasticsearch+master+multijob-windows-compatibility\os\windows-2019\x-pack\plugin\searchable-snapshots\build\testrun\internalClusterTest\temp\org.elasticsearch.xpack.searchablesnapshots.RetrySearchIntegTests_C1C5C5DD639AFC9C-001\tempDir-002\node_s1\indices\tGDphX3nTiO2W3sIN_5IDQ\0\snapshot_cache\y4BzhBEPTjWtxQzB9FgToQ\l-wM3LV7R_6aCfijDfCBXw
at sun.nio.fs.WindowsException.translateToIOException(WindowsException.java:89)
at sun.nio.fs.WindowsException.rethrowAsIOException(WindowsException.java:103)
at sun.nio.fs.WindowsException.rethrowAsIOException(WindowsException.java:108)
at sun.nio.fs.WindowsFileSystemProvider.implDelete(WindowsFileSystemProvider.java:270)
at sun.nio.fs.AbstractFileSystemProvider.deleteIfExists(AbstractFileSystemProvider.java:110)
at org.apache.lucene.mockfile.FilterFileSystemProvider.deleteIfExists(FilterFileSystemProvider.java:238)
at org.apache.lucene.mockfile.FilterFileSystemProvider.deleteIfExists(FilterFileSystemProvider.java:238)
at org.apache.lucene.mockfile.FilterFileSystemProvider.deleteIfExists(FilterFileSystemProvider.java:238)
at org.apache.lucene.mockfile.FilterFileSystemProvider.deleteIfExists(FilterFileSystemProvider.java:238)
at java.nio.file.Files.deleteIfExists(Files.java:1180)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile$1.closeInternal(CacheFile.java:69)
at org.elasticsearch.common.util.concurrent.AbstractRefCounted.decRef(AbstractRefCounted.java:55)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.decrementRefCount(CacheFile.java:247)
at org.elasticsearch.xpack.searchablesnapshots.cache.common.CacheFile.startEviction(CacheFile.java:275)
at org.elasticsearch.core.internal.io.IOUtils.close(IOUtils.java:74)
at org.elasticsearch.core.internal.io.IOUtils.closeWhileHandlingException(IOUtils.java:164)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.onCacheFileEviction(CacheService.java:485)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.lambda$new$1(CacheService.java:161)
at org.elasticsearch.common.cache.Cache.delete(Cache.java:788)
at org.elasticsearch.common.cache.Cache.lambda$new$6(Cache.java:488)
at org.elasticsearch.common.cache.Cache$CacheSegment.remove(Cache.java:305)
at org.elasticsearch.common.cache.Cache.invalidate(Cache.java:518)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService.processShardEviction(CacheService.java:409)
at org.elasticsearch.xpack.searchablesnapshots.cache.full.CacheService$1.doRun(CacheService.java:345)
at org.elasticsearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:26)
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
at java.util.concurrent.FutureTask.run(FutureTask.java:264)
at org.elasticsearch.common.util.concurrent.ThreadContext$ContextPreservingRunnable.run(ThreadContext.java:669)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
at java.lang.Thread.run(Thread.java:834)
``` | test | retrysearchintegtests testsearcherid failing i ve seen this twice now on windows we re getting an accessdeniedexception but i wonder if the real problem is us hitting path length limits on windows build scan reproduction line gradlew x pack plugin searchable snapshots internalclustertest tests org elasticsearch xpack searchablesnapshots retrysearchintegtests testsearcherid dtests seed dtests security manager true dtests locale es py dtests timezone pacific truk druntime java applicable branches master reproduces locally didn t try failure history failure excerpt com carrotsearch randomizedtesting uncaughtexceptionerror captured an uncaught exception in thread thread state runnable group tgrp retrysearchintegtests at randomizedtesting seedinfo seed caused by java lang assertionerror java io uncheckedioexception java nio file accessdeniedexception c users jenkins workspace elastic elasticsearch master multijob windows compatibility os windows x pack plugin searchable snapshots build testrun internalclustertest temp org elasticsearch xpack searchablesnapshots retrysearchintegtests tempdir node indices snapshot cache l at randomizedtesting seedinfo seed at org elasticsearch common util concurrent abstractrefcounted decref abstractrefcounted java at org elasticsearch xpack searchablesnapshots cache common cachefile decrementrefcount cachefile java at org elasticsearch xpack searchablesnapshots cache common cachefile starteviction cachefile java at org elasticsearch core internal io ioutils close ioutils java at org elasticsearch core internal io ioutils closewhilehandlingexception ioutils java at org elasticsearch xpack searchablesnapshots cache full cacheservice oncachefileeviction cacheservice java at org elasticsearch xpack searchablesnapshots cache full cacheservice lambda new cacheservice java at org elasticsearch common cache cache delete cache java at org elasticsearch common cache cache lambda new cache java at org elasticsearch common cache cache cachesegment remove cache java at org elasticsearch common cache cache invalidate cache java at org elasticsearch xpack searchablesnapshots cache full cacheservice processshardeviction cacheservice java at org elasticsearch xpack searchablesnapshots cache full cacheservice dorun cacheservice java at org elasticsearch common util concurrent abstractrunnable run abstractrunnable java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at org elasticsearch common util concurrent threadcontext contextpreservingrunnable run threadcontext java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java caused by java io uncheckedioexception java nio file accessdeniedexception c users jenkins workspace elastic elasticsearch master multijob windows compatibility os windows x pack plugin searchable snapshots build testrun internalclustertest temp org elasticsearch xpack searchablesnapshots retrysearchintegtests tempdir node indices snapshot cache l at org elasticsearch xpack searchablesnapshots cache common cachefile closeinternal cachefile java at org elasticsearch common util concurrent abstractrefcounted decref abstractrefcounted java at org elasticsearch xpack searchablesnapshots cache common cachefile decrementrefcount cachefile java at org elasticsearch xpack searchablesnapshots cache common cachefile starteviction cachefile java at org elasticsearch core internal io ioutils close ioutils java at org elasticsearch core internal io ioutils closewhilehandlingexception ioutils java at org elasticsearch xpack searchablesnapshots cache full cacheservice oncachefileeviction cacheservice java at org elasticsearch xpack searchablesnapshots cache full cacheservice lambda new cacheservice java at org elasticsearch common cache cache delete cache java at org elasticsearch common cache cache lambda new cache java at org elasticsearch common cache cache cachesegment remove cache java at org elasticsearch common cache cache invalidate cache java at org elasticsearch xpack searchablesnapshots cache full cacheservice processshardeviction cacheservice java at org elasticsearch xpack searchablesnapshots cache full cacheservice dorun cacheservice java at org elasticsearch common util concurrent abstractrunnable run abstractrunnable java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at org elasticsearch common util concurrent threadcontext contextpreservingrunnable run threadcontext java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java caused by java nio file accessdeniedexception c users jenkins workspace elastic elasticsearch master multijob windows compatibility os windows x pack plugin searchable snapshots build testrun internalclustertest temp org elasticsearch xpack searchablesnapshots retrysearchintegtests tempdir node indices snapshot cache l at sun nio fs windowsexception translatetoioexception windowsexception java at sun nio fs windowsexception rethrowasioexception windowsexception java at sun nio fs windowsexception rethrowasioexception windowsexception java at sun nio fs windowsfilesystemprovider impldelete windowsfilesystemprovider java at sun nio fs abstractfilesystemprovider deleteifexists abstractfilesystemprovider java at org apache lucene mockfile filterfilesystemprovider deleteifexists filterfilesystemprovider java at org apache lucene mockfile filterfilesystemprovider deleteifexists filterfilesystemprovider java at org apache lucene mockfile filterfilesystemprovider deleteifexists filterfilesystemprovider java at org apache lucene mockfile filterfilesystemprovider deleteifexists filterfilesystemprovider java at java nio file files deleteifexists files java at org elasticsearch xpack searchablesnapshots cache common cachefile closeinternal cachefile java at org elasticsearch common util concurrent abstractrefcounted decref abstractrefcounted java at org elasticsearch xpack searchablesnapshots cache common cachefile decrementrefcount cachefile java at org elasticsearch xpack searchablesnapshots cache common cachefile starteviction cachefile java at org elasticsearch core internal io ioutils close ioutils java at org elasticsearch core internal io ioutils closewhilehandlingexception ioutils java at org elasticsearch xpack searchablesnapshots cache full cacheservice oncachefileeviction cacheservice java at org elasticsearch xpack searchablesnapshots cache full cacheservice lambda new cacheservice java at org elasticsearch common cache cache delete cache java at org elasticsearch common cache cache lambda new cache java at org elasticsearch common cache cache cachesegment remove cache java at org elasticsearch common cache cache invalidate cache java at org elasticsearch xpack searchablesnapshots cache full cacheservice processshardeviction cacheservice java at org elasticsearch xpack searchablesnapshots cache full cacheservice dorun cacheservice java at org elasticsearch common util concurrent abstractrunnable run abstractrunnable java at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at org elasticsearch common util concurrent threadcontext contextpreservingrunnable run threadcontext java at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java | 1 |
113,982 | 17,173,979,304 | IssuesEvent | 2021-07-15 09:06:25 | lukebroganws/NodeGoat | https://api.github.com/repos/lukebroganws/NodeGoat | opened | WS-2018-0084 (High) detected in sshpk-1.10.1.tgz | security vulnerability | ## WS-2018-0084 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sshpk-1.10.1.tgz</b></p></summary>
<p>A library for finding and using SSH public keys</p>
<p>Library home page: <a href="https://registry.npmjs.org/sshpk/-/sshpk-1.10.1.tgz">https://registry.npmjs.org/sshpk/-/sshpk-1.10.1.tgz</a></p>
<p>Path to dependency file: NodeGoat/package.json</p>
<p>Path to vulnerable library: NodeGoat/node_modules/npm/node_modules/request/node_modules/http-signature/node_modules/sshpk/package.json</p>
<p>
Dependency Hierarchy:
- grunt-npm-install-0.3.1.tgz (Root Library)
- npm-3.10.10.tgz
- request-2.75.0.tgz
- http-signature-1.1.1.tgz
- :x: **sshpk-1.10.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebroganws/NodeGoat/commit/10466ceb1764b7cac5eccc6ac6c9c060b13777ac">10466ceb1764b7cac5eccc6ac6c9c060b13777ac</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of sshpk before 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.
<p>Publish Date: 2018-04-25
<p>URL: <a href=https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17>WS-2018-0084</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/606">https://nodesecurity.io/advisories/606</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 1.14.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"sshpk","packageVersion":"1.10.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;http-signature:1.1.1;sshpk:1.10.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.14.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2018-0084","vulnerabilityDetails":"Versions of sshpk before 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.\n\n","vulnerabilityUrl":"https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> --> | True | WS-2018-0084 (High) detected in sshpk-1.10.1.tgz - ## WS-2018-0084 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sshpk-1.10.1.tgz</b></p></summary>
<p>A library for finding and using SSH public keys</p>
<p>Library home page: <a href="https://registry.npmjs.org/sshpk/-/sshpk-1.10.1.tgz">https://registry.npmjs.org/sshpk/-/sshpk-1.10.1.tgz</a></p>
<p>Path to dependency file: NodeGoat/package.json</p>
<p>Path to vulnerable library: NodeGoat/node_modules/npm/node_modules/request/node_modules/http-signature/node_modules/sshpk/package.json</p>
<p>
Dependency Hierarchy:
- grunt-npm-install-0.3.1.tgz (Root Library)
- npm-3.10.10.tgz
- request-2.75.0.tgz
- http-signature-1.1.1.tgz
- :x: **sshpk-1.10.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/lukebroganws/NodeGoat/commit/10466ceb1764b7cac5eccc6ac6c9c060b13777ac">10466ceb1764b7cac5eccc6ac6c9c060b13777ac</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of sshpk before 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.
<p>Publish Date: 2018-04-25
<p>URL: <a href=https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17>WS-2018-0084</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/606">https://nodesecurity.io/advisories/606</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 1.14.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"sshpk","packageVersion":"1.10.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"grunt-npm-install:0.3.1;npm:3.10.10;request:2.75.0;http-signature:1.1.1;sshpk:1.10.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.14.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2018-0084","vulnerabilityDetails":"Versions of sshpk before 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.\n\n","vulnerabilityUrl":"https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> --> | non_test | ws high detected in sshpk tgz ws high severity vulnerability vulnerable library sshpk tgz a library for finding and using ssh public keys library home page a href path to dependency file nodegoat package json path to vulnerable library nodegoat node modules npm node modules request node modules http signature node modules sshpk package json dependency hierarchy grunt npm install tgz root library npm tgz request tgz http signature tgz x sshpk tgz vulnerable library found in head commit a href found in base branch master vulnerability details versions of sshpk before are vulnerable to regular expression denial of service when parsing crafted invalid public keys publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree grunt npm install npm request http signature sshpk isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier ws vulnerabilitydetails versions of sshpk before are vulnerable to regular expression denial of service when parsing crafted invalid public keys n n vulnerabilityurl | 0 |
153,495 | 12,148,611,550 | IssuesEvent | 2020-04-24 14:51:18 | javaparser/javaparser | https://api.github.com/repos/javaparser/javaparser | closed | ParserCollectionStrategy and modules | Question (JP usage) Reproducible testcase provided | I'm running into an issue when trying to use `ParserCollectionStrategy` with a directory that contains a module declaration.
When there is no `module-info.java` file, I get the expected behavior. As soon as I add a module declaration, the source root is completely ignored.
I tried building a minimal demo:
https://github.com/wmdietl/javaparser-module-bug
Is this the expected behavior or am I misusing `ParserCollectionStrategy`?
Thanks! | 1.0 | ParserCollectionStrategy and modules - I'm running into an issue when trying to use `ParserCollectionStrategy` with a directory that contains a module declaration.
When there is no `module-info.java` file, I get the expected behavior. As soon as I add a module declaration, the source root is completely ignored.
I tried building a minimal demo:
https://github.com/wmdietl/javaparser-module-bug
Is this the expected behavior or am I misusing `ParserCollectionStrategy`?
Thanks! | test | parsercollectionstrategy and modules i m running into an issue when trying to use parsercollectionstrategy with a directory that contains a module declaration when there is no module info java file i get the expected behavior as soon as i add a module declaration the source root is completely ignored i tried building a minimal demo is this the expected behavior or am i misusing parsercollectionstrategy thanks | 1 |
74,421 | 25,122,028,302 | IssuesEvent | 2022-11-09 08:56:01 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | opened | Jumping up to first unread clears timeline and issues error message | T-Defect | ### Steps to reproduce
1. Entered a room
2. clicked on marker to jump up to first unread message
### Outcome
#### What did you expect?
jumping up to first unread message
#### What happened instead?
timeline is cleared to empty screen and error message is displayed

### Operating system
Windows 11
### Application version
_No response_
### How did you install the app?
from element.io
### Homeserver
_No response_
### Will you send logs?
Yes | 1.0 | Jumping up to first unread clears timeline and issues error message - ### Steps to reproduce
1. Entered a room
2. clicked on marker to jump up to first unread message
### Outcome
#### What did you expect?
jumping up to first unread message
#### What happened instead?
timeline is cleared to empty screen and error message is displayed

### Operating system
Windows 11
### Application version
_No response_
### How did you install the app?
from element.io
### Homeserver
_No response_
### Will you send logs?
Yes | non_test | jumping up to first unread clears timeline and issues error message steps to reproduce entered a room clicked on marker to jump up to first unread message outcome what did you expect jumping up to first unread message what happened instead timeline is cleared to empty screen and error message is displayed operating system windows application version no response how did you install the app from element io homeserver no response will you send logs yes | 0 |
470,216 | 13,534,396,427 | IssuesEvent | 2020-09-16 05:35:56 | moibit/tracy-mobile-app | https://api.github.com/repos/moibit/tracy-mobile-app | closed | UX/Messaging - No error message when user does not select the "I Agree" button | PRIORITY-2 bug | When user does not select the "I Agree" checkbox in the sign-up page and click on SIGN-UP button, we need to return a suitable error message: "You need to agree to our Terms of Use and Privacy Policy in order to create an account." | 1.0 | UX/Messaging - No error message when user does not select the "I Agree" button - When user does not select the "I Agree" checkbox in the sign-up page and click on SIGN-UP button, we need to return a suitable error message: "You need to agree to our Terms of Use and Privacy Policy in order to create an account." | non_test | ux messaging no error message when user does not select the i agree button when user does not select the i agree checkbox in the sign up page and click on sign up button we need to return a suitable error message you need to agree to our terms of use and privacy policy in order to create an account | 0 |
207,694 | 15,831,991,369 | IssuesEvent | 2021-04-06 14:11:00 | lenaschimmel/schnelltestrechner | https://api.github.com/repos/lenaschimmel/schnelltestrechner | closed | Filter "Unabhängige Studien" macht nix | bug rapidtests-feedback | In der Rechneransicht hat der Filter "Unabhängige Studien" keine Wirkung mehr. Das ging schonmal und sollte schnell zu fixen sein. | 1.0 | Filter "Unabhängige Studien" macht nix - In der Rechneransicht hat der Filter "Unabhängige Studien" keine Wirkung mehr. Das ging schonmal und sollte schnell zu fixen sein. | test | filter unabhängige studien macht nix in der rechneransicht hat der filter unabhängige studien keine wirkung mehr das ging schonmal und sollte schnell zu fixen sein | 1 |
22,026 | 10,719,717,658 | IssuesEvent | 2019-10-26 12:23:42 | perezLamed/lamed_flowchart | https://api.github.com/repos/perezLamed/lamed_flowchart | opened | CVE-2018-20834 (High) detected in tar-4.4.1.tgz | security vulnerability | ## CVE-2018-20834 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-4.4.1.tgz</b></p></summary>
<p>tar for node</p>
<p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.1.tgz">https://registry.npmjs.org/tar/-/tar-4.4.1.tgz</a></p>
<p>
Dependency Hierarchy:
- karma-3.1.1.tgz (Root Library)
- chokidar-2.0.4.tgz
- fsevents-1.2.4.tgz
- node-pre-gyp-0.10.0.tgz
- :x: **tar-4.4.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/perezLamed/lamed_flowchart/commit/fbeea62740f6b535f5b0b2886e673876dded64af">fbeea62740f6b535f5b0b2886e673876dded64af</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2).
<p>Publish Date: 2019-04-30
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20834>CVE-2018-20834</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Change files</p>
<p>Origin: <a href="https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d">https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d</a></p>
<p>Release Date: 2019-05-15</p>
<p>Fix Resolution: Replace or update the following files: bad-link.tar, parse.js, link-file-entry-collision.js, package.json, bad-link.hex</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-20834 (High) detected in tar-4.4.1.tgz - ## CVE-2018-20834 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-4.4.1.tgz</b></p></summary>
<p>tar for node</p>
<p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-4.4.1.tgz">https://registry.npmjs.org/tar/-/tar-4.4.1.tgz</a></p>
<p>
Dependency Hierarchy:
- karma-3.1.1.tgz (Root Library)
- chokidar-2.0.4.tgz
- fsevents-1.2.4.tgz
- node-pre-gyp-0.10.0.tgz
- :x: **tar-4.4.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/perezLamed/lamed_flowchart/commit/fbeea62740f6b535f5b0b2886e673876dded64af">fbeea62740f6b535f5b0b2886e673876dded64af</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2).
<p>Publish Date: 2019-04-30
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20834>CVE-2018-20834</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Change files</p>
<p>Origin: <a href="https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d">https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d</a></p>
<p>Release Date: 2019-05-15</p>
<p>Fix Resolution: Replace or update the following files: bad-link.tar, parse.js, link-file-entry-collision.js, package.json, bad-link.hex</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve high detected in tar tgz cve high severity vulnerability vulnerable library tar tgz tar for node library home page a href dependency hierarchy karma tgz root library chokidar tgz fsevents tgz node pre gyp tgz x tar tgz vulnerable library found in head commit a href vulnerability details a vulnerability was found in node tar before version excluding version an arbitrary file overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system in conjunction with a later plain file with the same name as the hardlink this plain file content replaces the existing file content a patch has been applied to node tar publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type change files origin a href release date fix resolution replace or update the following files bad link tar parse js link file entry collision js package json bad link hex step up your open source security game with whitesource | 0 |
100,955 | 30,830,312,457 | IssuesEvent | 2023-08-02 00:48:16 | elementor/elementor | https://api.github.com/repos/elementor/elementor | closed | ✅ 🔗 🐞 Bug Report: Responsive CSS is not loaded - CUSTOM POST TYPE (Duplicate of #19394, #22670) | bug type/responsive product/pro component/theme-builder status/merged component/document type/templates 🚀 shipped type/experiment mod* component/theme-builder/single-template component/document/page-assets | ### Prerequisites
- [X] I have searched for similar issues in both open and closed tickets and cannot find a duplicate.
- [X] The issue still exists against the latest stable version of Elementor.
### Description
Hi,
I created an issue about this [#22670](https://github.com/elementor/elementor/issues/22670). But, your team marked it to be duplicated. But, it is not duplicated. In my case, issue comes with a CUSTOM POST TYPE, not a default post type/page. For example, I created a custom post type which allows user to add footer content and add it to a main page content. In this case, it does not work correctly. Please check it again.
Thank you!
### Steps to reproduce
1. Edit a custom post type with Elementor (create one if don't have https://developer.wordpress.org/reference/functions/register_post_type/)
2. Switch to tablet or mobile editor
3. Change some things which need to update CSS (Ex: margin/padding, ...)
4. Check frontend
### Isolating the problem
- [ ] This bug happens with only Elementor plugin active (and Elementor Pro).
- [ ] This bug happens with a Blank WordPress theme active ([Hello theme](https://wordpress.org/themes/hello-elementor/)).
- [ ] I can reproduce this bug consistently following the steps above.
### System Info
<html>
<body>
<!--StartFragment-->
Operating System: | Linux |
-- | -- | --
Software: | Apache |
MySQL version: | MariaDB Server v10.3.39 |
PHP Version: | 8.0.29 |
PHP Memory Limit: | 4G |
PHP Max Input Vars: | 1000 |
PHP Max Post Size: | 256M |
GD Installed: | Yes |
ZIP Installed: | Yes |
Write Permissions: | All right |
Elementor Library: | Connected
<!--EndFragment-->
</body>
</html> | 2.0 | ✅ 🔗 🐞 Bug Report: Responsive CSS is not loaded - CUSTOM POST TYPE (Duplicate of #19394, #22670) - ### Prerequisites
- [X] I have searched for similar issues in both open and closed tickets and cannot find a duplicate.
- [X] The issue still exists against the latest stable version of Elementor.
### Description
Hi,
I created an issue about this [#22670](https://github.com/elementor/elementor/issues/22670). But, your team marked it to be duplicated. But, it is not duplicated. In my case, issue comes with a CUSTOM POST TYPE, not a default post type/page. For example, I created a custom post type which allows user to add footer content and add it to a main page content. In this case, it does not work correctly. Please check it again.
Thank you!
### Steps to reproduce
1. Edit a custom post type with Elementor (create one if don't have https://developer.wordpress.org/reference/functions/register_post_type/)
2. Switch to tablet or mobile editor
3. Change some things which need to update CSS (Ex: margin/padding, ...)
4. Check frontend
### Isolating the problem
- [ ] This bug happens with only Elementor plugin active (and Elementor Pro).
- [ ] This bug happens with a Blank WordPress theme active ([Hello theme](https://wordpress.org/themes/hello-elementor/)).
- [ ] I can reproduce this bug consistently following the steps above.
### System Info
<html>
<body>
<!--StartFragment-->
Operating System: | Linux |
-- | -- | --
Software: | Apache |
MySQL version: | MariaDB Server v10.3.39 |
PHP Version: | 8.0.29 |
PHP Memory Limit: | 4G |
PHP Max Input Vars: | 1000 |
PHP Max Post Size: | 256M |
GD Installed: | Yes |
ZIP Installed: | Yes |
Write Permissions: | All right |
Elementor Library: | Connected
<!--EndFragment-->
</body>
</html> | non_test | ✅ 🔗 🐞 bug report responsive css is not loaded custom post type duplicate of prerequisites i have searched for similar issues in both open and closed tickets and cannot find a duplicate the issue still exists against the latest stable version of elementor description hi i created an issue about this but your team marked it to be duplicated but it is not duplicated in my case issue comes with a custom post type not a default post type page for example i created a custom post type which allows user to add footer content and add it to a main page content in this case it does not work correctly please check it again thank you steps to reproduce edit a custom post type with elementor create one if don t have switch to tablet or mobile editor change some things which need to update css ex margin padding check frontend isolating the problem this bug happens with only elementor plugin active and elementor pro this bug happens with a blank wordpress theme active i can reproduce this bug consistently following the steps above system info operating system linux software apache mysql version mariadb server php version php memory limit php max input vars php max post size gd installed yes zip installed yes write permissions all right elementor library connected | 0 |
326,334 | 27,984,463,612 | IssuesEvent | 2023-03-26 14:37:59 | Active-CSS/active-css | https://api.github.com/repos/Active-CSS/active-css | closed | Issue with new combinators | bug done on branch testing needed | Something's busted on this - not working on a specific project - investigate. Failing scenario basic "& < div". | 1.0 | Issue with new combinators - Something's busted on this - not working on a specific project - investigate. Failing scenario basic "& < div". | test | issue with new combinators something s busted on this not working on a specific project investigate failing scenario basic div | 1 |
287,421 | 24,829,094,775 | IssuesEvent | 2022-10-26 00:33:33 | gravitational/teleport | https://api.github.com/repos/gravitational/teleport | opened | `TestIntegrations/TrustedTunnelNode` flakiness | flaky tests | ## Failure
#### Link(s) to logs
- https://console.cloud.google.com/cloud-build/builds/347dcec3-5488-4071-8791-01dc446021d4?project=ci-account
#### Relevant snippet
```
--- FAIL: TestIntegrations/TrustedTunnelNode (7.47s)
{"caller":"sshutils/server.go:490","component":"ssh:proxy","level":"debug","message":"Closed connection 127.0.0.1:41550.","timestamp":"2022-10-21T20:50:57Z"}
Test: TestIntegrations/TrustedTunnelNode
failed connecting to node cluster-aux-node. connection rejected: failed dialing through tunnel (no tunnel connection found: no node reverse tunnel for found) or directly (dial tcp: lookup cluster-aux-node on 127.0.0.11:53: no such host)
Error: Received unexpected error:
/workspace/integration/integration_test.go:97
Error Trace: /workspace/integration/integration_test.go:2764
integration_test.go:2764:
``` | 1.0 | `TestIntegrations/TrustedTunnelNode` flakiness - ## Failure
#### Link(s) to logs
- https://console.cloud.google.com/cloud-build/builds/347dcec3-5488-4071-8791-01dc446021d4?project=ci-account
#### Relevant snippet
```
--- FAIL: TestIntegrations/TrustedTunnelNode (7.47s)
{"caller":"sshutils/server.go:490","component":"ssh:proxy","level":"debug","message":"Closed connection 127.0.0.1:41550.","timestamp":"2022-10-21T20:50:57Z"}
Test: TestIntegrations/TrustedTunnelNode
failed connecting to node cluster-aux-node. connection rejected: failed dialing through tunnel (no tunnel connection found: no node reverse tunnel for found) or directly (dial tcp: lookup cluster-aux-node on 127.0.0.11:53: no such host)
Error: Received unexpected error:
/workspace/integration/integration_test.go:97
Error Trace: /workspace/integration/integration_test.go:2764
integration_test.go:2764:
``` | test | testintegrations trustedtunnelnode flakiness failure link s to logs relevant snippet fail testintegrations trustedtunnelnode caller sshutils server go component ssh proxy level debug message closed connection timestamp test testintegrations trustedtunnelnode failed connecting to node cluster aux node connection rejected failed dialing through tunnel no tunnel connection found no node reverse tunnel for found or directly dial tcp lookup cluster aux node on no such host error received unexpected error workspace integration integration test go error trace workspace integration integration test go integration test go | 1 |
383,995 | 26,572,089,841 | IssuesEvent | 2023-01-21 09:41:07 | HelloHailie/stock-value-finer | https://api.github.com/repos/HelloHailie/stock-value-finer | opened | [Init]기획의도 파악(요구사항 정의서) 및 프로젝트 초기 설정 | documentation | ## 📚 요구사항정의서
[주식추천서비스_요구사항정의서.pdf](https://github.com/HelloHailie/stock-value-finer/files/10471848/_.pdf)
<br/>
## 🔎 Directory Structure
```
📦src
┣ 📂api // 서버 통신을 위한 폴더
┣ 📂assets // image나 svg 파일일 위한 폴더
┃ ┣ 📜chartImage.png
┃ ┗ 📜logo.png
┣ 📂components // 화면 설계서에서 사용자의 인풋을 받는 부분, 결과부분, 특징에 따라 컴포넌트를 담는 폴더
┃ ┣ 📜Description.tsx
┃ ┣ 📜Footer.tsx
┃ ┣ 📜Header.tsx
┃ ┣ 📜Point.tsx
┃ ┗ 📜Result.tsx
┣ 📂layout // 헤더와 푸터를 담을 레이아웃 (페이지 확장성을 위해서 따로 설정)
┃ ┗ 📜Layout.tsx
┣ 📂pages // 컴포넌트를 담을 페이지 폴더
┃ ┗ 📜Home.tsx
┣ 📂types // 타입스크립트의 타입을 관리하는 폴더
┣ 📜index.css
┣ 📜main.tsx
┗ 📜vite-env.d.ts
```
## 📦 폴더 구조를 위해 고민한 점
```
요구사항이 한 페이지로 구성된 애플리케이션이지만 가독성과 유지 보수성 높이기 위해서 최소 기능 단위에 따라 컴포넌트를 분리하려고 노력했습니다.
``` | 1.0 | [Init]기획의도 파악(요구사항 정의서) 및 프로젝트 초기 설정 - ## 📚 요구사항정의서
[주식추천서비스_요구사항정의서.pdf](https://github.com/HelloHailie/stock-value-finer/files/10471848/_.pdf)
<br/>
## 🔎 Directory Structure
```
📦src
┣ 📂api // 서버 통신을 위한 폴더
┣ 📂assets // image나 svg 파일일 위한 폴더
┃ ┣ 📜chartImage.png
┃ ┗ 📜logo.png
┣ 📂components // 화면 설계서에서 사용자의 인풋을 받는 부분, 결과부분, 특징에 따라 컴포넌트를 담는 폴더
┃ ┣ 📜Description.tsx
┃ ┣ 📜Footer.tsx
┃ ┣ 📜Header.tsx
┃ ┣ 📜Point.tsx
┃ ┗ 📜Result.tsx
┣ 📂layout // 헤더와 푸터를 담을 레이아웃 (페이지 확장성을 위해서 따로 설정)
┃ ┗ 📜Layout.tsx
┣ 📂pages // 컴포넌트를 담을 페이지 폴더
┃ ┗ 📜Home.tsx
┣ 📂types // 타입스크립트의 타입을 관리하는 폴더
┣ 📜index.css
┣ 📜main.tsx
┗ 📜vite-env.d.ts
```
## 📦 폴더 구조를 위해 고민한 점
```
요구사항이 한 페이지로 구성된 애플리케이션이지만 가독성과 유지 보수성 높이기 위해서 최소 기능 단위에 따라 컴포넌트를 분리하려고 노력했습니다.
``` | non_test | 기획의도 파악 요구사항 정의서 및 프로젝트 초기 설정 📚 요구사항정의서 🔎 directory structure 📦src ┣ 📂api 서버 통신을 위한 폴더 ┣ 📂assets image나 svg 파일일 위한 폴더 ┃ ┣ 📜chartimage png ┃ ┗ 📜logo png ┣ 📂components 화면 설계서에서 사용자의 인풋을 받는 부분 결과부분 특징에 따라 컴포넌트를 담는 폴더 ┃ ┣ 📜description tsx ┃ ┣ 📜footer tsx ┃ ┣ 📜header tsx ┃ ┣ 📜point tsx ┃ ┗ 📜result tsx ┣ 📂layout 헤더와 푸터를 담을 레이아웃 페이지 확장성을 위해서 따로 설정 ┃ ┗ 📜layout tsx ┣ 📂pages 컴포넌트를 담을 페이지 폴더 ┃ ┗ 📜home tsx ┣ 📂types 타입스크립트의 타입을 관리하는 폴더 ┣ 📜index css ┣ 📜main tsx ┗ 📜vite env d ts 📦 폴더 구조를 위해 고민한 점 요구사항이 한 페이지로 구성된 애플리케이션이지만 가독성과 유지 보수성 높이기 위해서 최소 기능 단위에 따라 컴포넌트를 분리하려고 노력했습니다 | 0 |
594,221 | 18,040,775,223 | IssuesEvent | 2021-09-18 02:30:51 | zephyrproject-rtos/zephyr | https://api.github.com/repos/zephyrproject-rtos/zephyr | closed | [Coverity CID :219656] Uninitialized scalar variable in file /tests/kernel/threads/thread_stack/src/main.c | bug priority: low Coverity | **Describe the bug**
Category: Uninitialized scalar variable
Function: stack_buffer_scenarios
Component: Tests
CID: 219656
Static code scan issues found in file:
https://github.com/zephyrproject-rtos/zephyr/tree/main/tests/kernel/threads/thread_stack/src/main.c
1. In function `void stack_buffer_scenarios(void)` declaring variable `val` without initializer in L95.
2. Then in L164 assigning `stack_ptr = &val`, which points to uninitialized data.
3. In for loop in L165 assigning `pos = stack_ptr`, which points to uninitialized data.
4. Then in L167 `val = *pos;` Coverity raised next violation that uninitialized scalar variable (UNINIT), using uninitialized value `*pos`.
Please fix or provide comments in coverity using the link:
[scan9.coverity.com/reports.htm#v32951/p12996](https://scan9.coverity.com/reports.htm#v32951/p12996)
Note: This issue was created manually. | 1.0 | [Coverity CID :219656] Uninitialized scalar variable in file /tests/kernel/threads/thread_stack/src/main.c - **Describe the bug**
Category: Uninitialized scalar variable
Function: stack_buffer_scenarios
Component: Tests
CID: 219656
Static code scan issues found in file:
https://github.com/zephyrproject-rtos/zephyr/tree/main/tests/kernel/threads/thread_stack/src/main.c
1. In function `void stack_buffer_scenarios(void)` declaring variable `val` without initializer in L95.
2. Then in L164 assigning `stack_ptr = &val`, which points to uninitialized data.
3. In for loop in L165 assigning `pos = stack_ptr`, which points to uninitialized data.
4. Then in L167 `val = *pos;` Coverity raised next violation that uninitialized scalar variable (UNINIT), using uninitialized value `*pos`.
Please fix or provide comments in coverity using the link:
[scan9.coverity.com/reports.htm#v32951/p12996](https://scan9.coverity.com/reports.htm#v32951/p12996)
Note: This issue was created manually. | non_test | uninitialized scalar variable in file tests kernel threads thread stack src main c describe the bug category uninitialized scalar variable function stack buffer scenarios component tests cid static code scan issues found in file in function void stack buffer scenarios void declaring variable val without initializer in then in assigning stack ptr val which points to uninitialized data in for loop in assigning pos stack ptr which points to uninitialized data then in val pos coverity raised next violation that uninitialized scalar variable uninit using uninitialized value pos please fix or provide comments in coverity using the link note this issue was created manually | 0 |
41,056 | 5,294,415,940 | IssuesEvent | 2017-02-09 10:43:39 | wellcometrust/wellcomecollection.org | https://api.github.com/repos/wellcometrust/wellcomecollection.org | opened | Featured collapse | design | When scaling down in size, as soon as the nav collapses into a burger and we are in tabled territory. The 3 smaller articles within the featured section should convert into the sliding tray.
We should never get an odd 1-2-1 stacking of these modules


| 1.0 | Featured collapse - When scaling down in size, as soon as the nav collapses into a burger and we are in tabled territory. The 3 smaller articles within the featured section should convert into the sliding tray.
We should never get an odd 1-2-1 stacking of these modules


| non_test | featured collapse when scaling down in size as soon as the nav collapses into a burger and we are in tabled territory the smaller articles within the featured section should convert into the sliding tray we should never get an odd stacking of these modules | 0 |
177,460 | 13,724,975,808 | IssuesEvent | 2020-10-03 16:28:29 | ayumi-cloud/oc2-security-module | https://api.github.com/repos/ayumi-cloud/oc2-security-module | closed | Production mode checks section - add warning to samesite third party cookie setups | FINSIHED Priority: Medium Production Mode Checks Testing - Passed | ### Enhancement idea
- [x] Production mode checks section - add warning to samesite third party cookie setups.
See this pr for base code details: https://github.com/octobercms/october/pull/5293/files
| 1.0 | Production mode checks section - add warning to samesite third party cookie setups - ### Enhancement idea
- [x] Production mode checks section - add warning to samesite third party cookie setups.
See this pr for base code details: https://github.com/octobercms/october/pull/5293/files
| test | production mode checks section add warning to samesite third party cookie setups enhancement idea production mode checks section add warning to samesite third party cookie setups see this pr for base code details | 1 |
279,895 | 24,261,967,556 | IssuesEvent | 2022-09-28 00:14:20 | ethereum/solidity | https://api.github.com/repos/ethereum/solidity | closed | Wrong address computed for CREATE2 in semantic tests | bug :bug: testing :hammer: should compile without error medium effort low impact should have | ## Description
The example we have in our documentation for computing the address that `create2` would deploy a contract to ([Salted contract creations / create2](https://docs.soliditylang.org/en/latest/control-structures.html#salted-contract-creations-create2)) does not pass when added as a semantic test. The addresses are different and the `require` fails.
I think that the code is correct and it fails due to a bug either in isoltest or in evmone.
## Steps to Reproduce
```solidity
contract D {
uint public x;
constructor(uint a) {
x = a;
}
}
contract C {
function createDSalted(bytes32 salt, uint arg) public {
address predictedAddress = address(uint160(uint(keccak256(abi.encodePacked(
bytes1(0xff),
address(this),
salt,
keccak256(abi.encodePacked(
type(D).creationCode,
arg
))
)))));
D d = new D{salt: salt}(arg);
require(address(d) == predictedAddress, "Address mismatch.");
}
}
// ====
// EVMVersion: >=constantinople
// compileViaYul: also
// ----
// createDSalted(bytes32,uint256): 42, 64 ->
```
```
Running 3 test cases...
/solidity/test/boostTest.cpp(111): error: in "semanticTests/salted_create/salted_create_deterministic_address": Test expectation mismatch.
Expected result:
// createDSalted(bytes32,uint256): 42, 64 ->
Obtained result:
// createDSalted(bytes32,uint256): 42, 64 -> FAILURE, hex"08c379a0", 0x20, 0x11, "Address mismatch."
Warning: The call to "createDSalted(bytes32,uint256)" returned
[8,c3,79,a0]
[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,20]
[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,11]
[41,64,64,72,65,73,73,20,6d,69,73,6d,61,74,63,68,2e,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]
Attention: Updates on the test will apply the detected format displayed.
Note that the test also has to pass via Yul.
*** 1 failure is detected in the test module "SolidityTests"
``` | 1.0 | Wrong address computed for CREATE2 in semantic tests - ## Description
The example we have in our documentation for computing the address that `create2` would deploy a contract to ([Salted contract creations / create2](https://docs.soliditylang.org/en/latest/control-structures.html#salted-contract-creations-create2)) does not pass when added as a semantic test. The addresses are different and the `require` fails.
I think that the code is correct and it fails due to a bug either in isoltest or in evmone.
## Steps to Reproduce
```solidity
contract D {
uint public x;
constructor(uint a) {
x = a;
}
}
contract C {
function createDSalted(bytes32 salt, uint arg) public {
address predictedAddress = address(uint160(uint(keccak256(abi.encodePacked(
bytes1(0xff),
address(this),
salt,
keccak256(abi.encodePacked(
type(D).creationCode,
arg
))
)))));
D d = new D{salt: salt}(arg);
require(address(d) == predictedAddress, "Address mismatch.");
}
}
// ====
// EVMVersion: >=constantinople
// compileViaYul: also
// ----
// createDSalted(bytes32,uint256): 42, 64 ->
```
```
Running 3 test cases...
/solidity/test/boostTest.cpp(111): error: in "semanticTests/salted_create/salted_create_deterministic_address": Test expectation mismatch.
Expected result:
// createDSalted(bytes32,uint256): 42, 64 ->
Obtained result:
// createDSalted(bytes32,uint256): 42, 64 -> FAILURE, hex"08c379a0", 0x20, 0x11, "Address mismatch."
Warning: The call to "createDSalted(bytes32,uint256)" returned
[8,c3,79,a0]
[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,20]
[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,11]
[41,64,64,72,65,73,73,20,6d,69,73,6d,61,74,63,68,2e,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]
Attention: Updates on the test will apply the detected format displayed.
Note that the test also has to pass via Yul.
*** 1 failure is detected in the test module "SolidityTests"
``` | test | wrong address computed for in semantic tests description the example we have in our documentation for computing the address that would deploy a contract to does not pass when added as a semantic test the addresses are different and the require fails i think that the code is correct and it fails due to a bug either in isoltest or in evmone steps to reproduce solidity contract d uint public x constructor uint a x a contract c function createdsalted salt uint arg public address predictedaddress address uint abi encodepacked address this salt abi encodepacked type d creationcode arg d d new d salt salt arg require address d predictedaddress address mismatch evmversion constantinople compileviayul also createdsalted running test cases solidity test boosttest cpp error in semantictests salted create salted create deterministic address test expectation mismatch expected result createdsalted obtained result createdsalted failure hex address mismatch warning the call to createdsalted returned attention updates on the test will apply the detected format displayed note that the test also has to pass via yul failure is detected in the test module soliditytests | 1 |
31,439 | 4,706,538,809 | IssuesEvent | 2016-10-13 17:28:06 | imixs/imixs-office-workflow | https://api.github.com/repos/imixs/imixs-office-workflow | closed | Implement new WorklfowController - @ConversationScoped | enhancement testing | depends on new implementation of worklowController in Marty Project | 1.0 | Implement new WorklfowController - @ConversationScoped - depends on new implementation of worklowController in Marty Project | test | implement new worklfowcontroller conversationscoped depends on new implementation of worklowcontroller in marty project | 1 |
128,847 | 10,553,498,055 | IssuesEvent | 2019-10-03 17:21:18 | istio/istio | https://api.github.com/repos/istio/istio | closed | [test-framework] Add mTLS support for local environment | area/test and release | All communication for local testing is currently plaintext. We need to support mTLS within the local mesh. | 1.0 | [test-framework] Add mTLS support for local environment - All communication for local testing is currently plaintext. We need to support mTLS within the local mesh. | test | add mtls support for local environment all communication for local testing is currently plaintext we need to support mtls within the local mesh | 1 |
75,903 | 3,477,903,981 | IssuesEvent | 2015-12-28 07:19:10 | PapaJulietTango/aston | https://api.github.com/repos/PapaJulietTango/aston | closed | Method library needs to be added | auto-migrated Milestone-Release1.0 Priority-Medium Type-Enhancement | ```
Aston should use either a local or network database to store information
related to methods. This can include temperature profiles, solvent
compositions, column types, etc. This database should be able to be generated
from data obtained from individual chromatograms and should be able to be
applied to chromatograms that lack essential method data.
Ideally, such a database will allow for retention time prediction and other
advanced method development features.
```
Original issue reported on code.google.com by `rbo...@gmail.com` on 10 Jan 2012 at 4:27 | 1.0 | Method library needs to be added - ```
Aston should use either a local or network database to store information
related to methods. This can include temperature profiles, solvent
compositions, column types, etc. This database should be able to be generated
from data obtained from individual chromatograms and should be able to be
applied to chromatograms that lack essential method data.
Ideally, such a database will allow for retention time prediction and other
advanced method development features.
```
Original issue reported on code.google.com by `rbo...@gmail.com` on 10 Jan 2012 at 4:27 | non_test | method library needs to be added aston should use either a local or network database to store information related to methods this can include temperature profiles solvent compositions column types etc this database should be able to be generated from data obtained from individual chromatograms and should be able to be applied to chromatograms that lack essential method data ideally such a database will allow for retention time prediction and other advanced method development features original issue reported on code google com by rbo gmail com on jan at | 0 |
167,920 | 20,730,409,798 | IssuesEvent | 2022-03-14 08:54:55 | zettatips/ex10-website | https://api.github.com/repos/zettatips/ex10-website | closed | CVE-2021-39199 (Medium) detected in remark-html-13.0.1.tgz - autoclosed | security vulnerability | ## CVE-2021-39199 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>remark-html-13.0.1.tgz</b></p></summary>
<p>remark plugin to compile Markdown to HTML</p>
<p>Library home page: <a href="https://registry.npmjs.org/remark-html/-/remark-html-13.0.1.tgz">https://registry.npmjs.org/remark-html/-/remark-html-13.0.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/remark-html/package.json</p>
<p>
Dependency Hierarchy:
- :x: **remark-html-13.0.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/zettatips/ex10-website/commit/ccd1fa96ac3b5406cb8231dc95b0496a05a23586">ccd1fa96ac3b5406cb8231dc95b0496a05a23586</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
remark-html is an open source nodejs library which compiles Markdown to HTML. In affected versions the documentation of remark-html has mentioned that it was safe by default. In practice the default was never safe and had to be opted into. That is, user input was not sanitized. This means arbitrary HTML can be passed through leading to potential XSS attacks. The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. On older affected versions, pass `sanitize: true` if you cannot update.
<p>Publish Date: 2021-09-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39199>CVE-2021-39199</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m">https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m</a></p>
<p>Release Date: 2021-09-07</p>
<p>Fix Resolution: 13.0.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-39199 (Medium) detected in remark-html-13.0.1.tgz - autoclosed - ## CVE-2021-39199 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>remark-html-13.0.1.tgz</b></p></summary>
<p>remark plugin to compile Markdown to HTML</p>
<p>Library home page: <a href="https://registry.npmjs.org/remark-html/-/remark-html-13.0.1.tgz">https://registry.npmjs.org/remark-html/-/remark-html-13.0.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/remark-html/package.json</p>
<p>
Dependency Hierarchy:
- :x: **remark-html-13.0.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/zettatips/ex10-website/commit/ccd1fa96ac3b5406cb8231dc95b0496a05a23586">ccd1fa96ac3b5406cb8231dc95b0496a05a23586</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
remark-html is an open source nodejs library which compiles Markdown to HTML. In affected versions the documentation of remark-html has mentioned that it was safe by default. In practice the default was never safe and had to be opted into. That is, user input was not sanitized. This means arbitrary HTML can be passed through leading to potential XSS attacks. The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. On older affected versions, pass `sanitize: true` if you cannot update.
<p>Publish Date: 2021-09-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-39199>CVE-2021-39199</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m">https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m</a></p>
<p>Release Date: 2021-09-07</p>
<p>Fix Resolution: 13.0.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve medium detected in remark html tgz autoclosed cve medium severity vulnerability vulnerable library remark html tgz remark plugin to compile markdown to html library home page a href path to dependency file package json path to vulnerable library node modules remark html package json dependency hierarchy x remark html tgz vulnerable library found in head commit a href found in base branch master vulnerability details remark html is an open source nodejs library which compiles markdown to html in affected versions the documentation of remark html has mentioned that it was safe by default in practice the default was never safe and had to be opted into that is user input was not sanitized this means arbitrary html can be passed through leading to potential xss attacks the problem has been patched in and remark html is now safe by default and the implementation matches the documentation on older affected versions pass sanitize true if you cannot update publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
5,020 | 5,391,775,036 | IssuesEvent | 2017-02-26 03:01:27 | jquery/esprima | https://api.github.com/repos/jquery/esprima | closed | Failing AppVeyor CI | infrastructure | Example log: https://ci.appveyor.com/project/ariya/esprima/build/536.
Looks like this is due to Google Chrome installation problem:
```
[00:00:31] Progress: 100% - Completed download of C:\Users\appveyor\AppData\Local\Temp\1\chocolatey\GoogleChrome\56.0.2924.87\googlechromestandaloneenterprise64.msi (48.26 MB).
[00:00:31] Download of googlechromestandaloneenterprise64.msi (48.26 MB) completed.
[00:00:35] Error - hashes do not match. Actual value was '1450DE87F0289CE725DF1C138BBA2666304FB94BF4476B03C06D058C999D4805'.
[00:00:35] ERROR: Checksum for 'C:\Users\appveyor\AppData\Local\Temp\1\chocolatey\GoogleChrome\56.0.2924.87\googlechromestandaloneenterprise64.msi' did not meet 'c47ff551ff8b251268905cd87fb299959e6bcb3640a3e60085a3a7dbf176845f' for checksum type 'sha256'. Consider passing --ignore-checksums if necessary.
[00:00:35] The install of googlechrome was NOT successful.
``` | 1.0 | Failing AppVeyor CI - Example log: https://ci.appveyor.com/project/ariya/esprima/build/536.
Looks like this is due to Google Chrome installation problem:
```
[00:00:31] Progress: 100% - Completed download of C:\Users\appveyor\AppData\Local\Temp\1\chocolatey\GoogleChrome\56.0.2924.87\googlechromestandaloneenterprise64.msi (48.26 MB).
[00:00:31] Download of googlechromestandaloneenterprise64.msi (48.26 MB) completed.
[00:00:35] Error - hashes do not match. Actual value was '1450DE87F0289CE725DF1C138BBA2666304FB94BF4476B03C06D058C999D4805'.
[00:00:35] ERROR: Checksum for 'C:\Users\appveyor\AppData\Local\Temp\1\chocolatey\GoogleChrome\56.0.2924.87\googlechromestandaloneenterprise64.msi' did not meet 'c47ff551ff8b251268905cd87fb299959e6bcb3640a3e60085a3a7dbf176845f' for checksum type 'sha256'. Consider passing --ignore-checksums if necessary.
[00:00:35] The install of googlechrome was NOT successful.
``` | non_test | failing appveyor ci example log looks like this is due to google chrome installation problem progress completed download of c users appveyor appdata local temp chocolatey googlechrome msi mb download of msi mb completed error hashes do not match actual value was error checksum for c users appveyor appdata local temp chocolatey googlechrome msi did not meet for checksum type consider passing ignore checksums if necessary the install of googlechrome was not successful | 0 |
473,545 | 13,644,062,602 | IssuesEvent | 2020-09-25 18:13:22 | NuGet/Home | https://api.github.com/repos/NuGet/Home | closed | Show requested version in the Solution Level UI | Functionality:VisualStudioUI Pipeline:In Review Priority:2 Product:VS.Client Style:PackageReference Type:Feature | Currently we only show the installed version in the Solution Level, we are going to add a column "Requested" version.
It only applies to PackageReference projects. | 1.0 | Show requested version in the Solution Level UI - Currently we only show the installed version in the Solution Level, we are going to add a column "Requested" version.
It only applies to PackageReference projects. | non_test | show requested version in the solution level ui currently we only show the installed version in the solution level we are going to add a column requested version it only applies to packagereference projects | 0 |
206,162 | 15,712,774,199 | IssuesEvent | 2021-03-27 13:34:01 | Idorobots/foof | https://api.github.com/repos/Idorobots/foof | opened | Property-based testing | test | With the new AST in place [some of the tests]( https://github.com/Idorobots/foof/pull/103/commits/da5cdb93e335e9d87b320ab4fccb1274937f5407) are growing to unwieldy proportions. It's about time to invest some time into converting them to property-based testing. | 1.0 | Property-based testing - With the new AST in place [some of the tests]( https://github.com/Idorobots/foof/pull/103/commits/da5cdb93e335e9d87b320ab4fccb1274937f5407) are growing to unwieldy proportions. It's about time to invest some time into converting them to property-based testing. | test | property based testing with the new ast in place are growing to unwieldy proportions it s about time to invest some time into converting them to property based testing | 1 |
102,921 | 8,870,812,969 | IssuesEvent | 2019-01-11 10:35:49 | elastic/elasticsearch | https://api.github.com/repos/elastic/elasticsearch | closed | [CI] UnicastZenPingTests.testInvalidHosts | :Distributed/ZenDiscovery >test-failure v6.7.0 v7.0.0 | ## Example build failure
https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+release-tests/309/console
## Reproduction line
does not reproduce locally
```
REPRODUCE WITH: ./gradlew :server:unitTest \
-Dtests.seed=86FB7F4B57514FBE \
-Dtests.class=org.elasticsearch.discovery.zen.UnicastZenPingTests \
-Dtests.method="testInvalidHosts" \
-Dtests.security.manager=true \
-Dbuild.snapshot=false \
-Dtests.jvm.argline="-Dbuild.snapshot=false" \
-Dtests.locale=ar-YE \
-Dtests.timezone=Asia/Brunei \
-Dcompiler.java=11 \
-Druntime.java=8
```
## Example relevant log:
```
FAILURE 21.5s J2 | UnicastZenPingTests.testInvalidHosts <<< FAILURES!
> Throwable #1: java.lang.AssertionError:
> Expected: a collection with size <1>
> but: collection size was <0>
> at __randomizedtesting.SeedInfo.seed([86FB7F4B57514FBE:97CE97BE380F6D4A]:0)
> at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:20)
> at org.elasticsearch.discovery.zen.UnicastZenPingTests.testInvalidHosts(UnicastZenPingTests.java:726)
> at java.lang.Thread.run(Thread.java:748)
```
## Frequency
4 times Today.
Related: #23738 | 1.0 | [CI] UnicastZenPingTests.testInvalidHosts - ## Example build failure
https://elasticsearch-ci.elastic.co/job/elastic+elasticsearch+master+release-tests/309/console
## Reproduction line
does not reproduce locally
```
REPRODUCE WITH: ./gradlew :server:unitTest \
-Dtests.seed=86FB7F4B57514FBE \
-Dtests.class=org.elasticsearch.discovery.zen.UnicastZenPingTests \
-Dtests.method="testInvalidHosts" \
-Dtests.security.manager=true \
-Dbuild.snapshot=false \
-Dtests.jvm.argline="-Dbuild.snapshot=false" \
-Dtests.locale=ar-YE \
-Dtests.timezone=Asia/Brunei \
-Dcompiler.java=11 \
-Druntime.java=8
```
## Example relevant log:
```
FAILURE 21.5s J2 | UnicastZenPingTests.testInvalidHosts <<< FAILURES!
> Throwable #1: java.lang.AssertionError:
> Expected: a collection with size <1>
> but: collection size was <0>
> at __randomizedtesting.SeedInfo.seed([86FB7F4B57514FBE:97CE97BE380F6D4A]:0)
> at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:20)
> at org.elasticsearch.discovery.zen.UnicastZenPingTests.testInvalidHosts(UnicastZenPingTests.java:726)
> at java.lang.Thread.run(Thread.java:748)
```
## Frequency
4 times Today.
Related: #23738 | test | unicastzenpingtests testinvalidhosts example build failure reproduction line does not reproduce locally reproduce with gradlew server unittest dtests seed dtests class org elasticsearch discovery zen unicastzenpingtests dtests method testinvalidhosts dtests security manager true dbuild snapshot false dtests jvm argline dbuild snapshot false dtests locale ar ye dtests timezone asia brunei dcompiler java druntime java example relevant log failure unicastzenpingtests testinvalidhosts failures throwable java lang assertionerror expected a collection with size but collection size was at randomizedtesting seedinfo seed at org hamcrest matcherassert assertthat matcherassert java at org elasticsearch discovery zen unicastzenpingtests testinvalidhosts unicastzenpingtests java at java lang thread run thread java frequency times today related | 1 |
249,434 | 21,160,675,054 | IssuesEvent | 2022-04-07 09:04:47 | WordPress/gutenberg | https://api.github.com/repos/WordPress/gutenberg | closed | [Flaky Test] should handle esc key events | [Type] Flaky Test | <!-- __META_DATA__:{"failedTimes":2,"totalCommits":1004,"baseCommit":"f37f80fb4ee73b6a30d12063a4479376be137ceb"} -->
**Flaky test detected. This is an auto-generated issue by GitHub Actions. Please do NOT edit this manually.**
## Test title
should handle esc key events
## Test path
`specs/widgets/customizing-widgets.test.js`
## Flaky rate (_estimated_)
`2 / 1006` runs
## Errors
<!-- __TEST_RESULTS_LIST__ -->
<!-- __TEST_RESULT__ --><details>
<summary>
<time datetime="2021-10-11T05:53:59.208Z"><code>[2021-10-11T05:53:59.208Z]</code></time>
Test passed after 1 failed attempts on <a href="https://github.com/WordPress/gutenberg/actions/runs/1327643766"><code>trunk</code></a>.
</summary>
```
● Widgets Customizer › should handle esc key events
QueryEmptyError: Unable to find any nodes within 3000ms.
664 | await widgetsPanel.click();
665 |
> 666 | const footer1Section = await find( {
| ^
667 | role: 'heading',
668 | name: /^Footer #1/,
669 | level: 3,
at Object.<anonymous> (specs/widgets/customizing-widgets.test.js:666:32)
at runMicrotasks (<anonymous>)
```
</details><!-- /__TEST_RESULT__ -->
<!-- __TEST_RESULT__ --><details>
<summary>
<time datetime="2021-12-22T09:57:25.173Z"><code>[2021-12-22T09:57:25.173Z]</code></time>
Test passed after 1 failed attempts on <a href="https://github.com/WordPress/gutenberg/actions/runs/1610684528"><code>trunk</code></a>.
</summary>
```
● Widgets Customizer › should handle esc key events
QueryEmptyError: Unable to find any nodes within 3000ms.
664 | await widgetsPanel.click();
665 |
> 666 | const footer1Section = await find( {
| ^
667 | role: 'heading',
668 | name: /^Footer #1/,
669 | level: 3,
at Object.<anonymous> (specs/widgets/customizing-widgets.test.js:666:32)
at runMicrotasks (<anonymous>)
```
</details><!-- /__TEST_RESULT__ -->
<!-- __TEST_RESULT__ --><details>
<summary>
<time datetime="2022-02-23T14:25:06.540Z"><code>[2022-02-23T14:25:06.540Z]</code></time>
Test passed after 1 failed attempts on <a href="https://github.com/WordPress/gutenberg/actions/runs/1887562081"><code>release/12.7</code></a>.
</summary>
```
● Widgets Customizer › should handle esc key events
QueryEmptyError: Unable to find any nodes within 3000ms.
650 | await widgetsPanel.click();
651 |
> 652 | const footer1Section = await find( {
| ^
653 | role: 'heading',
654 | name: /^Footer #1/,
655 | level: 3,
at Object.<anonymous> (specs/widgets/customizing-widgets.test.js:652:32)
at runMicrotasks (<anonymous>)
```
</details><!-- /__TEST_RESULT__ -->
<!-- __TEST_RESULT__ --><details>
<summary>
<time datetime="2022-03-07T05:52:13.230Z"><code>[2022-03-07T05:52:13.230Z]</code></time>
Test passed after 1 failed attempts on <a href="https://github.com/WordPress/gutenberg/actions/runs/1943672610"><code>try/add-background-image-block-support</code></a>.
</summary>
```
● Widgets Customizer › should handle esc key events
QueryEmptyError: Unable to find any nodes within 3000ms.
651 | await widgetsPanel.click();
652 |
> 653 | const footer1Section = await find( {
| ^
654 | role: 'heading',
655 | name: /^Footer #1/,
656 | level: 3,
at Object.<anonymous> (specs/widgets/customizing-widgets.test.js:653:32)
```
</details><!-- /__TEST_RESULT__ -->
<!-- /__TEST_RESULTS_LIST__ --> | 1.0 | [Flaky Test] should handle esc key events - <!-- __META_DATA__:{"failedTimes":2,"totalCommits":1004,"baseCommit":"f37f80fb4ee73b6a30d12063a4479376be137ceb"} -->
**Flaky test detected. This is an auto-generated issue by GitHub Actions. Please do NOT edit this manually.**
## Test title
should handle esc key events
## Test path
`specs/widgets/customizing-widgets.test.js`
## Flaky rate (_estimated_)
`2 / 1006` runs
## Errors
<!-- __TEST_RESULTS_LIST__ -->
<!-- __TEST_RESULT__ --><details>
<summary>
<time datetime="2021-10-11T05:53:59.208Z"><code>[2021-10-11T05:53:59.208Z]</code></time>
Test passed after 1 failed attempts on <a href="https://github.com/WordPress/gutenberg/actions/runs/1327643766"><code>trunk</code></a>.
</summary>
```
● Widgets Customizer › should handle esc key events
QueryEmptyError: Unable to find any nodes within 3000ms.
664 | await widgetsPanel.click();
665 |
> 666 | const footer1Section = await find( {
| ^
667 | role: 'heading',
668 | name: /^Footer #1/,
669 | level: 3,
at Object.<anonymous> (specs/widgets/customizing-widgets.test.js:666:32)
at runMicrotasks (<anonymous>)
```
</details><!-- /__TEST_RESULT__ -->
<!-- __TEST_RESULT__ --><details>
<summary>
<time datetime="2021-12-22T09:57:25.173Z"><code>[2021-12-22T09:57:25.173Z]</code></time>
Test passed after 1 failed attempts on <a href="https://github.com/WordPress/gutenberg/actions/runs/1610684528"><code>trunk</code></a>.
</summary>
```
● Widgets Customizer › should handle esc key events
QueryEmptyError: Unable to find any nodes within 3000ms.
664 | await widgetsPanel.click();
665 |
> 666 | const footer1Section = await find( {
| ^
667 | role: 'heading',
668 | name: /^Footer #1/,
669 | level: 3,
at Object.<anonymous> (specs/widgets/customizing-widgets.test.js:666:32)
at runMicrotasks (<anonymous>)
```
</details><!-- /__TEST_RESULT__ -->
<!-- __TEST_RESULT__ --><details>
<summary>
<time datetime="2022-02-23T14:25:06.540Z"><code>[2022-02-23T14:25:06.540Z]</code></time>
Test passed after 1 failed attempts on <a href="https://github.com/WordPress/gutenberg/actions/runs/1887562081"><code>release/12.7</code></a>.
</summary>
```
● Widgets Customizer › should handle esc key events
QueryEmptyError: Unable to find any nodes within 3000ms.
650 | await widgetsPanel.click();
651 |
> 652 | const footer1Section = await find( {
| ^
653 | role: 'heading',
654 | name: /^Footer #1/,
655 | level: 3,
at Object.<anonymous> (specs/widgets/customizing-widgets.test.js:652:32)
at runMicrotasks (<anonymous>)
```
</details><!-- /__TEST_RESULT__ -->
<!-- __TEST_RESULT__ --><details>
<summary>
<time datetime="2022-03-07T05:52:13.230Z"><code>[2022-03-07T05:52:13.230Z]</code></time>
Test passed after 1 failed attempts on <a href="https://github.com/WordPress/gutenberg/actions/runs/1943672610"><code>try/add-background-image-block-support</code></a>.
</summary>
```
● Widgets Customizer › should handle esc key events
QueryEmptyError: Unable to find any nodes within 3000ms.
651 | await widgetsPanel.click();
652 |
> 653 | const footer1Section = await find( {
| ^
654 | role: 'heading',
655 | name: /^Footer #1/,
656 | level: 3,
at Object.<anonymous> (specs/widgets/customizing-widgets.test.js:653:32)
```
</details><!-- /__TEST_RESULT__ -->
<!-- /__TEST_RESULTS_LIST__ --> | test | should handle esc key events flaky test detected this is an auto generated issue by github actions please do not edit this manually test title should handle esc key events test path specs widgets customizing widgets test js flaky rate estimated runs errors test passed after failed attempts on a href ● widgets customizer › should handle esc key events queryemptyerror unable to find any nodes within await widgetspanel click const await find role heading name footer level at object specs widgets customizing widgets test js at runmicrotasks test passed after failed attempts on a href ● widgets customizer › should handle esc key events queryemptyerror unable to find any nodes within await widgetspanel click const await find role heading name footer level at object specs widgets customizing widgets test js at runmicrotasks test passed after failed attempts on a href ● widgets customizer › should handle esc key events queryemptyerror unable to find any nodes within await widgetspanel click const await find role heading name footer level at object specs widgets customizing widgets test js at runmicrotasks test passed after failed attempts on a href ● widgets customizer › should handle esc key events queryemptyerror unable to find any nodes within await widgetspanel click const await find role heading name footer level at object specs widgets customizing widgets test js | 1 |
748,985 | 26,146,881,903 | IssuesEvent | 2022-12-30 06:59:52 | gamefreedomgit/Maelstrom | https://api.github.com/repos/gamefreedomgit/Maelstrom | closed | [Quest] One With the Ground | Quest - Cataclysm (80+) Quest - Event Priority: Medium Status: Needs Confirmation | One With the Ground (Deepholm)
Arckangel3
OP
— Today at 12:10 AM
When you take the ritual from the NPC he sends you on a path in the ground. You are still targetable by monsters and the path goes right under a monster. The monster hits you and knocks you out of the ritual. | 1.0 | [Quest] One With the Ground - One With the Ground (Deepholm)
Arckangel3
OP
— Today at 12:10 AM
When you take the ritual from the NPC he sends you on a path in the ground. You are still targetable by monsters and the path goes right under a monster. The monster hits you and knocks you out of the ritual. | non_test | one with the ground one with the ground deepholm op — today at am when you take the ritual from the npc he sends you on a path in the ground you are still targetable by monsters and the path goes right under a monster the monster hits you and knocks you out of the ritual | 0 |
27,588 | 6,887,352,797 | IssuesEvent | 2017-11-21 23:02:45 | bcgov/DBC-APIM | https://api.github.com/repos/bcgov/DBC-APIM | closed | OpenAPI spec - Gated Geocoder | enhancement GEOCODER OpenAPI spec | Update the gated Geocoder spec to match the public geocoder spec at the following location.
https://github.com/bcgov/api-specs/tree/master/geocoder/
Exceptions include the api key (not used in public) as well as the host. Otherwise, parameters, resources and examples should be the same. | 1.0 | OpenAPI spec - Gated Geocoder - Update the gated Geocoder spec to match the public geocoder spec at the following location.
https://github.com/bcgov/api-specs/tree/master/geocoder/
Exceptions include the api key (not used in public) as well as the host. Otherwise, parameters, resources and examples should be the same. | non_test | openapi spec gated geocoder update the gated geocoder spec to match the public geocoder spec at the following location exceptions include the api key not used in public as well as the host otherwise parameters resources and examples should be the same | 0 |
274,351 | 23,833,271,596 | IssuesEvent | 2022-09-06 01:22:52 | thesofproject/sof | https://api.github.com/repos/thesofproject/sof | closed | [BUG] xrun after TRIG_PAUSE on ADLP_GMB_I2S_ZEPHYR when testing multiple pause resume | bug Zephyr xrun ADL Intel Linux Daily tests | **Describe the bug**
CI detected the xrun after receiving TRIG_PAUSE on ADLP_GMB_I2S_ZEPHYR when testing multiple pause resume.
**To Reproduce**
```
TPLG=/lib/firmware/intel/sof-tplg/sof-adl-max98390-rt5682.tplg MODEL=ADLP_GMB_I2S_ZEPHYR ~/sof-test/test-case/multiple-pause-resume.sh -r 50
```
**Reproduction Rate**
Observe only once in CI.
**Environment**
1) Branch name and commit hash of the 2 repositories: sof (firmware/topology) and linux (kernel driver).
* Kernel: topic/sof-dev|https://github.com/thesofproject/linux/commit/68b76766e8ba
* SOF: main|https://github.com/thesofproject/sof/commit/b36db45a7da7
2) Name of the topology file
* Topology: sof-adl-max98390-rt5682.tplg
3) Name of the platform(s) on which the bug is observed.
* Platform: ADLP_GMB_I2S_ZEPHYR
**Screenshots or console output**
**slogger**:
```
[ 30674272.218614] ( 61003.851562) c0 ipc src/ipc/ipc3/handler.c:1604 INFO ipc: new cmd 0x60060000
[ 30674368.208193] ( 95.989578) c1 pipe 10.51 ....../pipeline-stream.c:267 INFO pipe trigger cmd 2
[ 30675165.656078] ( 797.447876) c1 dw-dma src/drivers/dw/dma.c:376 INFO dw_dma_pause(): dma 1 channel 0 pause
[ 30675188.624828] ( 22.968750) c1 dmic-dai 2.0 ....../intel/dmic/dmic.c:418 INFO dmic_stop(), dmic_active_fifos_mask = 0x1
[ 30675225.864409] ( 37.239582) c1 zll-schedule src/schedule/zephyr_ll.c:69 INFO task complete 0xbe092a00 pipe-task
[ 30603190.815188] ( 2373.697754) c0 hda-dma ..../intel/hda/hda-dma.c:948 ERROR hda_dma_link_check_xrun(): underrun detected
[ 30611276.439867] ( 8085.624512) c0 hda-dma ..../intel/hda/hda-dma.c:948 ERROR hda_dma_link_check_xrun(): underrun detected
[ 30613268.366871] ( 1991.927002) c0 hda-dma ..../intel/hda/hda-dma.c:948 ERROR hda_dma_link_check_xrun(): underrun detected
[ 30675245.916492] ( 20.052082) c1 zll-schedule src/schedule/zephyr_ll.c:71 INFO num_tasks 2 total_num_tasks 4
[ 30675265.968574] ( 20.052082) c1 zll-schedule src/schedule/zephyr_ll.c:69 INFO task complete 0x9e086808 dmic-work <59c87728-d8f9-42f6-b89d-5870a87b0e1e>
[ 30675282.947740] ( 16.979166) c1 zll-schedule src/schedule/zephyr_ll.c:71 INFO num_tasks 1 total_num_tasks 3
[ 30675302.999823] ( 20.052082) c1 zll-schedule ......../zephyr_domain.c:210 INFO zephyr_domain_unregister domain->type 1 domain->clk 4
```
**dmesg**:
```
[ 3639.913213] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: pcm: trigger stream 99 dir 1 cmd 3
[ 3639.913228] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ipc tx: 0x60060000: GLB_STREAM_MSG: TRIG_PAUSE
[ 3640.416796] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ipc tx timed out for 0x60060000 (msg/reply size: 12/12)
[ 3640.416835] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: preventing DSP entering D3 state to preserve context
[ 3640.416845] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ------------[ IPC dump start ]------------
[ 3640.416872] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: hda irq intsts 0x00000000 intlctl 0xc0000083 rirb 00
[ 3640.416886] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: dsp irq ppsts 0x00000000 adspis 0x00000000
[ 3640.416906] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: error: host status 0x00000000 dsp status 0x00000000 mask 0x00000003
[ 3640.416918] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ------------[ IPC dump end ]------------
[ 3640.416928] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ------------[ DSP dump start ]------------
[ 3640.416937] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: IPC timeout
[ 3640.416948] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: fw_state: SOF_FW_BOOT_COMPLETE (6)
[ 3640.416969] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: status: fw entered - code 00000005
[ 3640.417110] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: unexpected fault 0x00000000 trace 0x00004000
[ 3640.417124] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ------------[ DSP dump end ]------------
[ 3640.417164] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: FW Poll Status: reg[0xa0]=0x20240000 successful
[ 3640.417185] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ASoC: error at soc_component_trigger on 0000:00:1f.3: -110
[ 3640.417202] kernel: DMIC: ASoC: trigger FE cmd: 3 failed: -110
```
[full_slogger.txt](https://github.com/thesofproject/sof/files/8650061/full_slogger.txt)
[full_dmesg.txt](https://github.com/thesofproject/sof/files/8650062/full_dmesg.txt)
| 1.0 | [BUG] xrun after TRIG_PAUSE on ADLP_GMB_I2S_ZEPHYR when testing multiple pause resume - **Describe the bug**
CI detected the xrun after receiving TRIG_PAUSE on ADLP_GMB_I2S_ZEPHYR when testing multiple pause resume.
**To Reproduce**
```
TPLG=/lib/firmware/intel/sof-tplg/sof-adl-max98390-rt5682.tplg MODEL=ADLP_GMB_I2S_ZEPHYR ~/sof-test/test-case/multiple-pause-resume.sh -r 50
```
**Reproduction Rate**
Observe only once in CI.
**Environment**
1) Branch name and commit hash of the 2 repositories: sof (firmware/topology) and linux (kernel driver).
* Kernel: topic/sof-dev|https://github.com/thesofproject/linux/commit/68b76766e8ba
* SOF: main|https://github.com/thesofproject/sof/commit/b36db45a7da7
2) Name of the topology file
* Topology: sof-adl-max98390-rt5682.tplg
3) Name of the platform(s) on which the bug is observed.
* Platform: ADLP_GMB_I2S_ZEPHYR
**Screenshots or console output**
**slogger**:
```
[ 30674272.218614] ( 61003.851562) c0 ipc src/ipc/ipc3/handler.c:1604 INFO ipc: new cmd 0x60060000
[ 30674368.208193] ( 95.989578) c1 pipe 10.51 ....../pipeline-stream.c:267 INFO pipe trigger cmd 2
[ 30675165.656078] ( 797.447876) c1 dw-dma src/drivers/dw/dma.c:376 INFO dw_dma_pause(): dma 1 channel 0 pause
[ 30675188.624828] ( 22.968750) c1 dmic-dai 2.0 ....../intel/dmic/dmic.c:418 INFO dmic_stop(), dmic_active_fifos_mask = 0x1
[ 30675225.864409] ( 37.239582) c1 zll-schedule src/schedule/zephyr_ll.c:69 INFO task complete 0xbe092a00 pipe-task
[ 30603190.815188] ( 2373.697754) c0 hda-dma ..../intel/hda/hda-dma.c:948 ERROR hda_dma_link_check_xrun(): underrun detected
[ 30611276.439867] ( 8085.624512) c0 hda-dma ..../intel/hda/hda-dma.c:948 ERROR hda_dma_link_check_xrun(): underrun detected
[ 30613268.366871] ( 1991.927002) c0 hda-dma ..../intel/hda/hda-dma.c:948 ERROR hda_dma_link_check_xrun(): underrun detected
[ 30675245.916492] ( 20.052082) c1 zll-schedule src/schedule/zephyr_ll.c:71 INFO num_tasks 2 total_num_tasks 4
[ 30675265.968574] ( 20.052082) c1 zll-schedule src/schedule/zephyr_ll.c:69 INFO task complete 0x9e086808 dmic-work <59c87728-d8f9-42f6-b89d-5870a87b0e1e>
[ 30675282.947740] ( 16.979166) c1 zll-schedule src/schedule/zephyr_ll.c:71 INFO num_tasks 1 total_num_tasks 3
[ 30675302.999823] ( 20.052082) c1 zll-schedule ......../zephyr_domain.c:210 INFO zephyr_domain_unregister domain->type 1 domain->clk 4
```
**dmesg**:
```
[ 3639.913213] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: pcm: trigger stream 99 dir 1 cmd 3
[ 3639.913228] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ipc tx: 0x60060000: GLB_STREAM_MSG: TRIG_PAUSE
[ 3640.416796] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ipc tx timed out for 0x60060000 (msg/reply size: 12/12)
[ 3640.416835] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: preventing DSP entering D3 state to preserve context
[ 3640.416845] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ------------[ IPC dump start ]------------
[ 3640.416872] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: hda irq intsts 0x00000000 intlctl 0xc0000083 rirb 00
[ 3640.416886] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: dsp irq ppsts 0x00000000 adspis 0x00000000
[ 3640.416906] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: error: host status 0x00000000 dsp status 0x00000000 mask 0x00000003
[ 3640.416918] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ------------[ IPC dump end ]------------
[ 3640.416928] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ------------[ DSP dump start ]------------
[ 3640.416937] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: IPC timeout
[ 3640.416948] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: fw_state: SOF_FW_BOOT_COMPLETE (6)
[ 3640.416969] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: status: fw entered - code 00000005
[ 3640.417110] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: unexpected fault 0x00000000 trace 0x00004000
[ 3640.417124] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ------------[ DSP dump end ]------------
[ 3640.417164] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: FW Poll Status: reg[0xa0]=0x20240000 successful
[ 3640.417185] kernel: sof-audio-pci-intel-tgl 0000:00:1f.3: ASoC: error at soc_component_trigger on 0000:00:1f.3: -110
[ 3640.417202] kernel: DMIC: ASoC: trigger FE cmd: 3 failed: -110
```
[full_slogger.txt](https://github.com/thesofproject/sof/files/8650061/full_slogger.txt)
[full_dmesg.txt](https://github.com/thesofproject/sof/files/8650062/full_dmesg.txt)
| test | xrun after trig pause on adlp gmb zephyr when testing multiple pause resume describe the bug ci detected the xrun after receiving trig pause on adlp gmb zephyr when testing multiple pause resume to reproduce tplg lib firmware intel sof tplg sof adl tplg model adlp gmb zephyr sof test test case multiple pause resume sh r reproduction rate observe only once in ci environment branch name and commit hash of the repositories sof firmware topology and linux kernel driver kernel topic sof dev sof main name of the topology file topology sof adl tplg name of the platform s on which the bug is observed platform adlp gmb zephyr screenshots or console output slogger ipc src ipc handler c info ipc new cmd pipe pipeline stream c info pipe trigger cmd dw dma src drivers dw dma c info dw dma pause dma channel pause dmic dai intel dmic dmic c info dmic stop dmic active fifos mask zll schedule src schedule zephyr ll c info task complete pipe task hda dma intel hda hda dma c error hda dma link check xrun underrun detected hda dma intel hda hda dma c error hda dma link check xrun underrun detected hda dma intel hda hda dma c error hda dma link check xrun underrun detected zll schedule src schedule zephyr ll c info num tasks total num tasks zll schedule src schedule zephyr ll c info task complete dmic work zll schedule src schedule zephyr ll c info num tasks total num tasks zll schedule zephyr domain c info zephyr domain unregister domain type domain clk dmesg kernel sof audio pci intel tgl pcm trigger stream dir cmd kernel sof audio pci intel tgl ipc tx glb stream msg trig pause kernel sof audio pci intel tgl ipc tx timed out for msg reply size kernel sof audio pci intel tgl preventing dsp entering state to preserve context kernel sof audio pci intel tgl kernel sof audio pci intel tgl hda irq intsts intlctl rirb kernel sof audio pci intel tgl dsp irq ppsts adspis kernel sof audio pci intel tgl error host status dsp status mask kernel sof audio pci intel tgl kernel sof audio pci intel tgl kernel sof audio pci intel tgl ipc timeout kernel sof audio pci intel tgl fw state sof fw boot complete kernel sof audio pci intel tgl status fw entered code kernel sof audio pci intel tgl unexpected fault trace kernel sof audio pci intel tgl kernel sof audio pci intel tgl fw poll status reg successful kernel sof audio pci intel tgl asoc error at soc component trigger on kernel dmic asoc trigger fe cmd failed | 1 |
280,524 | 21,280,316,525 | IssuesEvent | 2022-04-14 00:37:24 | Solid-Project/core | https://api.github.com/repos/Solid-Project/core | opened | Definição da camada de Entidade e Repositório | documentation | Criar interface de entidade e repositório bem como suas classes concretas de acordo com os domínios | 1.0 | Definição da camada de Entidade e Repositório - Criar interface de entidade e repositório bem como suas classes concretas de acordo com os domínios | non_test | definição da camada de entidade e repositório criar interface de entidade e repositório bem como suas classes concretas de acordo com os domínios | 0 |
95,302 | 8,555,452,775 | IssuesEvent | 2018-11-08 10:04:55 | humera987/FXLabs-Test-Automation | https://api.github.com/repos/humera987/FXLabs-Test-Automation | closed | testing8 : ApiV1OrgsByUserGetPathParamPagesizeMysqlSqlInjectionTimebound | testing8 testing8 | Project : testing8
Job : UAT
Env : UAT
Region : US_WEST_3
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Thu, 08 Nov 2018 09:52:42 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/orgs/by-user?pageSize=' OR sleep(7)=0; --
Request :
Response :
{
"timestamp" : "2018-11-08T09:52:42.715+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/orgs/by-user"
}
Logs :
Assertion [@ResponseTime < 7000 OR @ResponseTime > 10000] resolved-to [1360 < 7000 OR 1360 > 10000] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | 2.0 | testing8 : ApiV1OrgsByUserGetPathParamPagesizeMysqlSqlInjectionTimebound - Project : testing8
Job : UAT
Env : UAT
Region : US_WEST_3
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Thu, 08 Nov 2018 09:52:42 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/orgs/by-user?pageSize=' OR sleep(7)=0; --
Request :
Response :
{
"timestamp" : "2018-11-08T09:52:42.715+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/orgs/by-user"
}
Logs :
Assertion [@ResponseTime < 7000 OR @ResponseTime > 10000] resolved-to [1360 < 7000 OR 1360 > 10000] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | test | project job uat env uat region us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options content type transfer encoding date endpoint or sleep request response timestamp status error not found message no message available path api api orgs by user logs assertion resolved to result assertion resolved to result fx bot | 1 |
286,666 | 24,769,375,830 | IssuesEvent | 2022-10-23 00:04:30 | godotengine/godot | https://api.github.com/repos/godotengine/godot | closed | Floor not detected and movement is glitchy | topic:physics needs testing | ### Godot version
Godot 4 Beta 3
### System information
Ubuntu 22.04 Running on Vulkan Mesa Intel® UHD Graphics 620 (WHL GT2)
### Issue description
So back in Godot 3, I also had a similar issue. All I did was to add Vector2.UP to the 2nd param of MoveAndSlide()
Now in Godot 4, there is no parameters for MoveAndSlide()
Jump doesn't work as an result of this.
Also, the movement just stops after you try to move around for a bit; I think its when u change direction of movement on the ground
### Steps to reproduce
Clone https://github.com/coder2195text/tile-craft
Set a breakpoint at Scripts/GameScene/Player.cs at line 31.
Play the game.
When you press jump, something like this should appear

For the movement testing, let the player touch the ground, move left then move right.
### Minimal reproduction project
_No response_ | 1.0 | Floor not detected and movement is glitchy - ### Godot version
Godot 4 Beta 3
### System information
Ubuntu 22.04 Running on Vulkan Mesa Intel® UHD Graphics 620 (WHL GT2)
### Issue description
So back in Godot 3, I also had a similar issue. All I did was to add Vector2.UP to the 2nd param of MoveAndSlide()
Now in Godot 4, there is no parameters for MoveAndSlide()
Jump doesn't work as an result of this.
Also, the movement just stops after you try to move around for a bit; I think its when u change direction of movement on the ground
### Steps to reproduce
Clone https://github.com/coder2195text/tile-craft
Set a breakpoint at Scripts/GameScene/Player.cs at line 31.
Play the game.
When you press jump, something like this should appear

For the movement testing, let the player touch the ground, move left then move right.
### Minimal reproduction project
_No response_ | test | floor not detected and movement is glitchy godot version godot beta system information ubuntu running on vulkan mesa intel® uhd graphics whl issue description so back in godot i also had a similar issue all i did was to add up to the param of moveandslide now in godot there is no parameters for moveandslide jump doesn t work as an result of this also the movement just stops after you try to move around for a bit i think its when u change direction of movement on the ground steps to reproduce clone set a breakpoint at scripts gamescene player cs at line play the game when you press jump something like this should appear for the movement testing let the player touch the ground move left then move right minimal reproduction project no response | 1 |
221,137 | 17,293,198,233 | IssuesEvent | 2021-07-25 07:26:30 | ReliaQualAssociates/ramstk | https://api.github.com/repos/ReliaQualAssociates/ramstk | closed | Make docstrings in Failure Mode Test Methods Consistent | priority: normal status: backlog type: test | **Describe the test that is missing or needs to be fixed.**
docstrings in failure mode test files need to be updated to be consistent and concise with no copy-paste reference errors.
- [ ] This issue is an epic issue which subsumes the following:
| 1.0 | Make docstrings in Failure Mode Test Methods Consistent - **Describe the test that is missing or needs to be fixed.**
docstrings in failure mode test files need to be updated to be consistent and concise with no copy-paste reference errors.
- [ ] This issue is an epic issue which subsumes the following:
| test | make docstrings in failure mode test methods consistent describe the test that is missing or needs to be fixed docstrings in failure mode test files need to be updated to be consistent and concise with no copy paste reference errors this issue is an epic issue which subsumes the following | 1 |
19,427 | 25,588,290,296 | IssuesEvent | 2022-12-01 11:00:43 | kdgregory/log4j-aws-appenders | https://api.github.com/repos/kdgregory/log4j-aws-appenders | closed | Synchronous mode: queue messages if writer not initialized | bug in-process | When running in synchronous mode, the `LogWriter.addMessage()` will attempt to send the batch on the invoking thread. However, this causes a race condition in the case of long-running initialization (made worse because we won't delay appender startup in 3.1.0).
Add a conditional test on `isRunning` at `AbstractLogWriter` line 233. | 1.0 | Synchronous mode: queue messages if writer not initialized - When running in synchronous mode, the `LogWriter.addMessage()` will attempt to send the batch on the invoking thread. However, this causes a race condition in the case of long-running initialization (made worse because we won't delay appender startup in 3.1.0).
Add a conditional test on `isRunning` at `AbstractLogWriter` line 233. | non_test | synchronous mode queue messages if writer not initialized when running in synchronous mode the logwriter addmessage will attempt to send the batch on the invoking thread however this causes a race condition in the case of long running initialization made worse because we won t delay appender startup in add a conditional test on isrunning at abstractlogwriter line | 0 |
206,308 | 15,724,720,756 | IssuesEvent | 2021-03-29 09:08:30 | dzhw/SiD | https://api.github.com/repos/dzhw/SiD | closed | C1_7 | Layout testing | - [x] ao8 ("keine der genannten Einrichtungen") soll etwas abgesetzt werden.
- [x] Layoutproblem: Die Ausfüllanweisung überlappt etwas mit den ao's

| 1.0 | C1_7 - - [x] ao8 ("keine der genannten Einrichtungen") soll etwas abgesetzt werden.
- [x] Layoutproblem: Die Ausfüllanweisung überlappt etwas mit den ao's

| test | keine der genannten einrichtungen soll etwas abgesetzt werden layoutproblem die ausfüllanweisung überlappt etwas mit den ao s | 1 |
27,020 | 6,813,118,308 | IssuesEvent | 2017-11-06 07:50:08 | BTDF/DeploymentFramework | https://api.github.com/repos/BTDF/DeploymentFramework | closed | Feature: When server MSI is installed, create registry key to hold install path and version | CodePlexMigrationInitiated enhancement Impact: Low MSI Creation and WiX Release 5.5 | When server MSI is installed, create registry key to hold install path and version
#### This work item was migrated from CodePlex
CodePlex work item ID: '7178'
Assigned to: 'tfabraham'
Vote count: '2'
| 1.0 | Feature: When server MSI is installed, create registry key to hold install path and version - When server MSI is installed, create registry key to hold install path and version
#### This work item was migrated from CodePlex
CodePlex work item ID: '7178'
Assigned to: 'tfabraham'
Vote count: '2'
| non_test | feature when server msi is installed create registry key to hold install path and version when server msi is installed create registry key to hold install path and version this work item was migrated from codeplex codeplex work item id assigned to tfabraham vote count | 0 |
293,971 | 25,337,760,651 | IssuesEvent | 2022-11-18 18:23:38 | certbot/certbot | https://api.github.com/repos/certbot/certbot | closed | Create Apache integration tests | area: apache area: testing priority: unplanned | See https://github.com/certbot/certbot/pull/7359 whose work was added to the `apache-integration-tests` branch. | 1.0 | Create Apache integration tests - See https://github.com/certbot/certbot/pull/7359 whose work was added to the `apache-integration-tests` branch. | test | create apache integration tests see whose work was added to the apache integration tests branch | 1 |
575,346 | 17,027,816,411 | IssuesEvent | 2021-07-03 23:13:00 | 1ForeverHD/TopbarPlus | https://api.github.com/repos/1ForeverHD/TopbarPlus | opened | Documentation additions | Priority: Low Scope: Docs Type: Enhancement | - [ ] In features, intro and/or Events API, consider changing .selected to :bindEvent()
- [ ] Within themes details, also demonstrate how to use :set(settingName)
- [ ] Remove 'themes is better warning' and update setTheme and set API
| 1.0 | Documentation additions - - [ ] In features, intro and/or Events API, consider changing .selected to :bindEvent()
- [ ] Within themes details, also demonstrate how to use :set(settingName)
- [ ] Remove 'themes is better warning' and update setTheme and set API
| non_test | documentation additions in features intro and or events api consider changing selected to bindevent within themes details also demonstrate how to use set settingname remove themes is better warning and update settheme and set api | 0 |
270,807 | 23,538,185,729 | IssuesEvent | 2022-08-20 01:28:33 | E3SM-Project/scream | https://api.github.com/repos/E3SM-Project/scream | opened | In jenkins script, run cov/memcheck builds along with others | enhancement testing scripts priority:wishlist | E.g., on mappy, our nightlies run test-all-scream three times. The first, it runs the "default" tests, the second it runs "cov", and the third it runs memcheck.
Instead, we could figure out how to tell test-all-scream to run all the defaults _plus_ some others, to save compilation/testing time. Esp on weaver, compilation takes some time (no ETI, and p3/shoc take up to 5min to build).
For instance, we could add a test name called "default". The test-factory in `test_all_scream.py` could interpret this as "build the default tests" (usually [dbg,sp,fpe,opt], but gpu does not build fpe). This should then be the default value for the tests list. | 1.0 | In jenkins script, run cov/memcheck builds along with others - E.g., on mappy, our nightlies run test-all-scream three times. The first, it runs the "default" tests, the second it runs "cov", and the third it runs memcheck.
Instead, we could figure out how to tell test-all-scream to run all the defaults _plus_ some others, to save compilation/testing time. Esp on weaver, compilation takes some time (no ETI, and p3/shoc take up to 5min to build).
For instance, we could add a test name called "default". The test-factory in `test_all_scream.py` could interpret this as "build the default tests" (usually [dbg,sp,fpe,opt], but gpu does not build fpe). This should then be the default value for the tests list. | test | in jenkins script run cov memcheck builds along with others e g on mappy our nightlies run test all scream three times the first it runs the default tests the second it runs cov and the third it runs memcheck instead we could figure out how to tell test all scream to run all the defaults plus some others to save compilation testing time esp on weaver compilation takes some time no eti and shoc take up to to build for instance we could add a test name called default the test factory in test all scream py could interpret this as build the default tests usually but gpu does not build fpe this should then be the default value for the tests list | 1 |
79,918 | 7,733,302,555 | IssuesEvent | 2018-05-26 09:54:36 | zetkin/organize.zetk.in | https://api.github.com/repos/zetkin/organize.zetk.in | opened | Save button obscures form | user test | A user describes how they use the `AddActionPane` on a smallish screen. Parts of the form are below the fold, but because the save button is visible (fixed to bottom) they think they've reached the end of the form and save without finishing. This closes the pane but fails to save the action (due to lack of validation as tracked in #43). | 1.0 | Save button obscures form - A user describes how they use the `AddActionPane` on a smallish screen. Parts of the form are below the fold, but because the save button is visible (fixed to bottom) they think they've reached the end of the form and save without finishing. This closes the pane but fails to save the action (due to lack of validation as tracked in #43). | test | save button obscures form a user describes how they use the addactionpane on a smallish screen parts of the form are below the fold but because the save button is visible fixed to bottom they think they ve reached the end of the form and save without finishing this closes the pane but fails to save the action due to lack of validation as tracked in | 1 |
144,030 | 11,592,624,618 | IssuesEvent | 2020-02-24 11:54:14 | EyeSeeTea/project-monitoring-app | https://api.github.com/repos/EyeSeeTea/project-monitoring-app | closed | Funder refinement | alpha testing | - [x] Move IHQ funder on top
- [x] Rename it to Samaritan's Purse - IHQ (it should be renamed in the excel)
- [x] Import again funders excel without cutting off funders
https://drive.google.com/drive/u/0/folders/1hJ5LLOtOZLepGYcGRfrFytOV-l3TPNot | 1.0 | Funder refinement - - [x] Move IHQ funder on top
- [x] Rename it to Samaritan's Purse - IHQ (it should be renamed in the excel)
- [x] Import again funders excel without cutting off funders
https://drive.google.com/drive/u/0/folders/1hJ5LLOtOZLepGYcGRfrFytOV-l3TPNot | test | funder refinement move ihq funder on top rename it to samaritan s purse ihq it should be renamed in the excel import again funders excel without cutting off funders | 1 |
67,345 | 27,806,626,835 | IssuesEvent | 2023-03-17 20:37:05 | hashicorp/terraform-provider-aws | https://api.github.com/repos/hashicorp/terraform-provider-aws | closed | [Bug]: failed to create ecr repo | bug crash service/ecr needs-triage | ### Terraform Core Version
1.4.0
### AWS Provider Version
4.56.0
### Affected Resource(s)
* aws_ecr
### Expected Behavior
The resource to be created, and traced by Terraform
### Actual Behavior
The resource is created, but crashed to be added to state
### Relevant Error/Panic Output Snippet
```shell
panic: interface conversion: interface {} is nil, not *ecr.Repository
goroutine 44 [running]:
github.com/hashicorp/terraform-provider-aws/internal/service/ecr.resourceRepositoryRead({0xe5376c0?, 0xc003cc33b0}, 0xc003359b80, {0xd091680?, 0xc00043d400})
github.com/hashicorp/terraform-provider-aws/internal/service/ecr/repository.go:185 +0x12cc
github.com/hashicorp/terraform-provider-aws/internal/service/ecr.resourceRepositoryCreate({0xe5376c0, 0xc003cc33b0}, 0xc003359b80, {0xd091680?, 0xc00043d400})
github.com/hashicorp/terraform-provider-aws/internal/service/ecr/repository.go:166 +0xe3e
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).create(0xe5376c0?, {0xe5376c0?, 0xc003cc33b0?}, 0xd?, {0xd091680?, 0xc00043d400?})
github.com/hashicorp/terraform-plugin-sdk/v2@v2.25.0/helper/schema/resource.go:702 +0x84
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).Apply(0xc001105500, {0xe5376c0, 0xc003cc33b0}, 0xc0037eda00, 0xc003359a00, {0xd091680, 0xc00043d400})
github.com/hashicorp/terraform-plugin-sdk/v2@v2.25.0/helper/schema/resource.go:837 +0xa85
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*GRPCProviderServer).ApplyResourceChange(0xc000281a70, {0xe5376c0?, 0xc003cc3290?}, 0xc001fa6190)
github.com/hashicorp/terraform-plugin-sdk/v2@v2.25.0/helper/schema/grpc_provider.go:1021 +0xe8d
github.com/hashicorp/terraform-plugin-mux/tf5muxserver.muxServer.ApplyResourceChange({0xc003250b10, 0xc003250b70, {0xc004b07160, 0x2, 0x2}, {0x0, 0x0, 0x0}, {0x0, 0x0, ...}, ...}, ...)
github.com/hashicorp/terraform-plugin-mux@v0.9.0/tf5muxserver/mux_server_ApplyResourceChange.go:27 +0x102
github.com/hashicorp/terraform-plugin-go/tfprotov5/tf5server.(*server).ApplyResourceChange(0xc0023bd900, {0xe5376c0?, 0xc003cbbb60?}, 0xc003e11030)
github.com/hashicorp/terraform-plugin-go@v0.14.3/tfprotov5/tf5server/server.go:818 +0x574
github.com/hashicorp/terraform-plugin-go/tfprotov5/internal/tfplugin5._Provider_ApplyResourceChange_Handler({0xcda6b00?, 0xc0023bd900}, {0xe5376c0, 0xc003cbbb60}, 0xc003e10fc0, 0x0)
github.com/hashicorp/terraform-plugin-go@v0.14.3/tfprotov5/internal/tfplugin5/tfplugin5_grpc.pb.go:385 +0x170
google.golang.org/grpc.(*Server).processUnaryRPC(0xc00464e3c0, {0xe546640, 0xc0007ae4e0}, 0xc003eb6ea0, 0xc004973fb0, 0x14c30480, 0x0)
google.golang.org/grpc@v1.53.0/server.go:1336 +0xd23
google.golang.org/grpc.(*Server).handleStream(0xc00464e3c0, {0xe546640, 0xc0007ae4e0}, 0xc003eb6ea0, 0x0)
google.golang.org/grpc@v1.53.0/server.go:1704 +0xa2f
google.golang.org/grpc.(*Server).serveStreams.func1.2()
google.golang.org/grpc@v1.53.0/server.go:965 +0x98
created by google.golang.org/grpc.(*Server).serveStreams.func1
google.golang.org/grpc@v1.53.0/server.go:963 +0x28a
Error: The terraform-provider-aws_v4.56.0_x5 plugin crashed!
```
### Terraform Configuration Files
terraform apply
confirm apply
### Steps to Reproduce
```terraform
resource "aws_ecr_repository" "cact" {
name = "cact"
image_tag_mutability = "MUTABLE"
image_scanning_configuration {
scan_on_push = true
}
}
```
### Debug Output
_No response_
### Panic Output
_No response_
### Important Factoids
_No response_
### References
_No response_
### Would you like to implement a fix?
None | 1.0 | [Bug]: failed to create ecr repo - ### Terraform Core Version
1.4.0
### AWS Provider Version
4.56.0
### Affected Resource(s)
* aws_ecr
### Expected Behavior
The resource to be created, and traced by Terraform
### Actual Behavior
The resource is created, but crashed to be added to state
### Relevant Error/Panic Output Snippet
```shell
panic: interface conversion: interface {} is nil, not *ecr.Repository
goroutine 44 [running]:
github.com/hashicorp/terraform-provider-aws/internal/service/ecr.resourceRepositoryRead({0xe5376c0?, 0xc003cc33b0}, 0xc003359b80, {0xd091680?, 0xc00043d400})
github.com/hashicorp/terraform-provider-aws/internal/service/ecr/repository.go:185 +0x12cc
github.com/hashicorp/terraform-provider-aws/internal/service/ecr.resourceRepositoryCreate({0xe5376c0, 0xc003cc33b0}, 0xc003359b80, {0xd091680?, 0xc00043d400})
github.com/hashicorp/terraform-provider-aws/internal/service/ecr/repository.go:166 +0xe3e
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).create(0xe5376c0?, {0xe5376c0?, 0xc003cc33b0?}, 0xd?, {0xd091680?, 0xc00043d400?})
github.com/hashicorp/terraform-plugin-sdk/v2@v2.25.0/helper/schema/resource.go:702 +0x84
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).Apply(0xc001105500, {0xe5376c0, 0xc003cc33b0}, 0xc0037eda00, 0xc003359a00, {0xd091680, 0xc00043d400})
github.com/hashicorp/terraform-plugin-sdk/v2@v2.25.0/helper/schema/resource.go:837 +0xa85
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*GRPCProviderServer).ApplyResourceChange(0xc000281a70, {0xe5376c0?, 0xc003cc3290?}, 0xc001fa6190)
github.com/hashicorp/terraform-plugin-sdk/v2@v2.25.0/helper/schema/grpc_provider.go:1021 +0xe8d
github.com/hashicorp/terraform-plugin-mux/tf5muxserver.muxServer.ApplyResourceChange({0xc003250b10, 0xc003250b70, {0xc004b07160, 0x2, 0x2}, {0x0, 0x0, 0x0}, {0x0, 0x0, ...}, ...}, ...)
github.com/hashicorp/terraform-plugin-mux@v0.9.0/tf5muxserver/mux_server_ApplyResourceChange.go:27 +0x102
github.com/hashicorp/terraform-plugin-go/tfprotov5/tf5server.(*server).ApplyResourceChange(0xc0023bd900, {0xe5376c0?, 0xc003cbbb60?}, 0xc003e11030)
github.com/hashicorp/terraform-plugin-go@v0.14.3/tfprotov5/tf5server/server.go:818 +0x574
github.com/hashicorp/terraform-plugin-go/tfprotov5/internal/tfplugin5._Provider_ApplyResourceChange_Handler({0xcda6b00?, 0xc0023bd900}, {0xe5376c0, 0xc003cbbb60}, 0xc003e10fc0, 0x0)
github.com/hashicorp/terraform-plugin-go@v0.14.3/tfprotov5/internal/tfplugin5/tfplugin5_grpc.pb.go:385 +0x170
google.golang.org/grpc.(*Server).processUnaryRPC(0xc00464e3c0, {0xe546640, 0xc0007ae4e0}, 0xc003eb6ea0, 0xc004973fb0, 0x14c30480, 0x0)
google.golang.org/grpc@v1.53.0/server.go:1336 +0xd23
google.golang.org/grpc.(*Server).handleStream(0xc00464e3c0, {0xe546640, 0xc0007ae4e0}, 0xc003eb6ea0, 0x0)
google.golang.org/grpc@v1.53.0/server.go:1704 +0xa2f
google.golang.org/grpc.(*Server).serveStreams.func1.2()
google.golang.org/grpc@v1.53.0/server.go:965 +0x98
created by google.golang.org/grpc.(*Server).serveStreams.func1
google.golang.org/grpc@v1.53.0/server.go:963 +0x28a
Error: The terraform-provider-aws_v4.56.0_x5 plugin crashed!
```
### Terraform Configuration Files
terraform apply
confirm apply
### Steps to Reproduce
```terraform
resource "aws_ecr_repository" "cact" {
name = "cact"
image_tag_mutability = "MUTABLE"
image_scanning_configuration {
scan_on_push = true
}
}
```
### Debug Output
_No response_
### Panic Output
_No response_
### Important Factoids
_No response_
### References
_No response_
### Would you like to implement a fix?
None | non_test | failed to create ecr repo terraform core version aws provider version affected resource s aws ecr expected behavior the resource to be created and traced by terraform actual behavior the resource is created but crashed to be added to state relevant error panic output snippet shell panic interface conversion interface is nil not ecr repository goroutine github com hashicorp terraform provider aws internal service ecr resourcerepositoryread github com hashicorp terraform provider aws internal service ecr repository go github com hashicorp terraform provider aws internal service ecr resourcerepositorycreate github com hashicorp terraform provider aws internal service ecr repository go github com hashicorp terraform plugin sdk helper schema resource create github com hashicorp terraform plugin sdk helper schema resource go github com hashicorp terraform plugin sdk helper schema resource apply github com hashicorp terraform plugin sdk helper schema resource go github com hashicorp terraform plugin sdk helper schema grpcproviderserver applyresourcechange github com hashicorp terraform plugin sdk helper schema grpc provider go github com hashicorp terraform plugin mux muxserver applyresourcechange github com hashicorp terraform plugin mux mux server applyresourcechange go github com hashicorp terraform plugin go server applyresourcechange github com hashicorp terraform plugin go server go github com hashicorp terraform plugin go internal provider applyresourcechange handler github com hashicorp terraform plugin go internal grpc pb go google golang org grpc server processunaryrpc google golang org grpc server go google golang org grpc server handlestream google golang org grpc server go google golang org grpc server servestreams google golang org grpc server go created by google golang org grpc server servestreams google golang org grpc server go error the terraform provider aws plugin crashed terraform configuration files terraform apply confirm apply steps to reproduce terraform resource aws ecr repository cact name cact image tag mutability mutable image scanning configuration scan on push true debug output no response panic output no response important factoids no response references no response would you like to implement a fix none | 0 |
16,548 | 21,568,599,050 | IssuesEvent | 2022-05-02 04:17:56 | lynnandtonic/nestflix.fun | https://api.github.com/repos/lynnandtonic/nestflix.fun | closed | Add Roscoe | suggested title in process | Please add as much of the following info as you can:
Title:
Roscoe.
Type (film/tv show):
TV show.
Film or show in which it appears:
Mythic Quest.
Is the parent film/show streaming anywhere?
Apple TV+
About when in the parent film/show does it appear?
Season 1, episode 8, around 20 minutes in.
Actual footage of the film/show can be seen (yes/no)?
Yes. | 1.0 | Add Roscoe - Please add as much of the following info as you can:
Title:
Roscoe.
Type (film/tv show):
TV show.
Film or show in which it appears:
Mythic Quest.
Is the parent film/show streaming anywhere?
Apple TV+
About when in the parent film/show does it appear?
Season 1, episode 8, around 20 minutes in.
Actual footage of the film/show can be seen (yes/no)?
Yes. | non_test | add roscoe please add as much of the following info as you can title roscoe type film tv show tv show film or show in which it appears mythic quest is the parent film show streaming anywhere apple tv about when in the parent film show does it appear season episode around minutes in actual footage of the film show can be seen yes no yes | 0 |
459,020 | 13,185,002,632 | IssuesEvent | 2020-08-12 20:31:19 | certbot-docker/certbot-docker | https://api.github.com/repos/certbot-docker/certbot-docker | closed | Fixing Tags on Dockerhub | priority: unplanned | you fixed recently the multiarch problem.
Help others to see which arch now are supported and add the matching tags on docker hub. | 1.0 | Fixing Tags on Dockerhub - you fixed recently the multiarch problem.
Help others to see which arch now are supported and add the matching tags on docker hub. | non_test | fixing tags on dockerhub you fixed recently the multiarch problem help others to see which arch now are supported and add the matching tags on docker hub | 0 |
406,779 | 27,582,543,952 | IssuesEvent | 2023-03-08 17:10:36 | Arquisoft/lomap_es3a | https://api.github.com/repos/Arquisoft/lomap_es3a | closed | Corregir el diagrama de la sección 5 | documentation | # Tarea
Se debe corregir el diagrama de la sección 5.
- [x] Quitar el pod service.
- [x] Añadir una flecha discontinua en el acceso al mapa. | 1.0 | Corregir el diagrama de la sección 5 - # Tarea
Se debe corregir el diagrama de la sección 5.
- [x] Quitar el pod service.
- [x] Añadir una flecha discontinua en el acceso al mapa. | non_test | corregir el diagrama de la sección tarea se debe corregir el diagrama de la sección quitar el pod service añadir una flecha discontinua en el acceso al mapa | 0 |
331,899 | 29,170,234,037 | IssuesEvent | 2023-05-19 00:36:36 | ray-project/ray | https://api.github.com/repos/ray-project/ray | closed | [Ray release infra] Flaky tests caused by autoscaling group killing instances while tests are running | P1 release-test | We autoscale the number of instances in our release BK queue:

They are not spot instances:
https://github.com/ray-project/buildkite-ci-stack/blob/c6041eb2a7245e683fd4b8f4c74090cdde56ebe5/ci-release-test-module/queues.tf#L43-L48
But we see cancellations (I notice it on a long running test) https://buildkite.com/ray-project/release-tests-branch/builds/1305#0185eb0c-78ed-4c0c-af6a-384ddf0fa193
```
[INFO 2023-01-26 12:42:55,298] sdk_runner.py: 135 ... command still running ...(78000 seconds) ...
[INFO 2023-01-26 12:43:25,272] sdk_runner.py: 135 ... command still running ...(78030 seconds) ...
[INFO 2023-01-26 12:43:55,668] sdk_runner.py: 135 ... command still running ...(78060 seconds) ...
[INFO 2023-01-26 12:44:25,548] sdk_runner.py: 135 ... command still running ...(78090 seconds) ...
[90m# Received cancellation signal, interrupting[0m
[31m🚨 Error: The command exited with status -1[0m
```
This adds to flaky noise when running release tests. To reduce flakiness we should only kill instances that aren't running tests. Might be doable via BK metrics or a custom termination policy (lambda).
cc @krfricke | 1.0 | [Ray release infra] Flaky tests caused by autoscaling group killing instances while tests are running - We autoscale the number of instances in our release BK queue:

They are not spot instances:
https://github.com/ray-project/buildkite-ci-stack/blob/c6041eb2a7245e683fd4b8f4c74090cdde56ebe5/ci-release-test-module/queues.tf#L43-L48
But we see cancellations (I notice it on a long running test) https://buildkite.com/ray-project/release-tests-branch/builds/1305#0185eb0c-78ed-4c0c-af6a-384ddf0fa193
```
[INFO 2023-01-26 12:42:55,298] sdk_runner.py: 135 ... command still running ...(78000 seconds) ...
[INFO 2023-01-26 12:43:25,272] sdk_runner.py: 135 ... command still running ...(78030 seconds) ...
[INFO 2023-01-26 12:43:55,668] sdk_runner.py: 135 ... command still running ...(78060 seconds) ...
[INFO 2023-01-26 12:44:25,548] sdk_runner.py: 135 ... command still running ...(78090 seconds) ...
[90m# Received cancellation signal, interrupting[0m
[31m🚨 Error: The command exited with status -1[0m
```
This adds to flaky noise when running release tests. To reduce flakiness we should only kill instances that aren't running tests. Might be doable via BK metrics or a custom termination policy (lambda).
cc @krfricke | test | flaky tests caused by autoscaling group killing instances while tests are running we autoscale the number of instances in our release bk queue they are not spot instances but we see cancellations i notice it on a long running test sdk runner py command still running seconds sdk runner py command still running seconds sdk runner py command still running seconds sdk runner py command still running seconds received cancellation signal interrupting ¨ error the command exited with status this adds to flaky noise when running release tests to reduce flakiness we should only kill instances that aren t running tests might be doable via bk metrics or a custom termination policy lambda cc krfricke | 1 |
111,559 | 9,534,907,542 | IssuesEvent | 2019-04-30 04:10:18 | apple/turicreate | https://api.github.com/repos/apple/turicreate | closed | Test error in test_style_transfer.py | bug style transfer testing toolkits | Appears to be caused by https://github.com/apple/turicreate/commit/627d606932026578e41613203e5363f7e07bda24#diff-8417551e311f3f53a64ca3fbd0e2c8f2
```
____________ ERROR at setup of StyleTransferTest.test_single_image _____________
self = <class 'turicreate.test.test_style_transfer.StyleTransferTest'>
@classmethod
def setUpClass(self):
"""
The setup class method for the basic test case with all default values.
"""
self.style_feature = 'style_feature_name'
self.content_feature = 'content_feature_name'
self.pre_trained_model = 'resnet-16'
## Create the model
# Model
self.style_sf = _get_data(feature=self.style_feature, num_examples=_NUM_STYLES)
self.content_sf = _get_data(feature=self.content_feature)
self.num_styles = _NUM_STYLES
self.model = tc.style_transfer.create(self.style_sf,
self.content_sf,
style_feature=self.style_feature,
content_feature=self.content_feature,
max_iterations=0,
> model=self.pre_trained_model)
test_style_transfer.py:83:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
../toolkits/style_transfer/style_transfer.py:201: in create
transformer = _Transformer(num_styles, batch_size_each)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = Transformer(
), num_styles = 4, batch_size = 6
def __init__(self, num_styles, batch_size):
super(Transformer, self).__init__(prefix='transformer_')
self.num_styles = num_styles
block = ResidualBlock
self.scale255 = False
with self.name_scope():
> self.refl1 = nn.ReflectionPad2D(4)
E NameError: global name 'nn' is not defined
../toolkits/style_transfer/_model.py:118: NameError
____________ ERROR at setup of StyleTransferTest.test_stylize_fail _____________
self = <class 'turicreate.test.test_style_transfer.StyleTransferTest'>
@classmethod
def setUpClass(self):
"""
The setup class method for the basic test case with all default values.
"""
self.style_feature = 'style_feature_name'
self.content_feature = 'content_feature_name'
self.pre_trained_model = 'resnet-16'
## Create the model
# Model
self.style_sf = _get_data(feature=self.style_feature, num_examples=_NUM_STYLES)
self.content_sf = _get_data(feature=self.content_feature)
self.num_styles = _NUM_STYLES
self.model = tc.style_transfer.create(self.style_sf,
self.content_sf,
style_feature=self.style_feature,
content_feature=self.content_feature,
max_iterations=0,
> model=self.pre_trained_model)
test_style_transfer.py:83:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
../toolkits/style_transfer/style_transfer.py:201: in create
transformer = _Transformer(num_styles, batch_size_each)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = Transformer(
), num_styles = 4, batch_size = 6
def __init__(self, num_styles, batch_size):
super(Transformer, self).__init__(prefix='transformer_')
self.num_styles = num_styles
block = ResidualBlock
self.scale255 = False
with self.name_scope():
> self.refl1 = nn.ReflectionPad2D(4)
E NameError: global name 'nn' is not defined
../toolkits/style_transfer/_model.py:118: NameError
``` | 1.0 | Test error in test_style_transfer.py - Appears to be caused by https://github.com/apple/turicreate/commit/627d606932026578e41613203e5363f7e07bda24#diff-8417551e311f3f53a64ca3fbd0e2c8f2
```
____________ ERROR at setup of StyleTransferTest.test_single_image _____________
self = <class 'turicreate.test.test_style_transfer.StyleTransferTest'>
@classmethod
def setUpClass(self):
"""
The setup class method for the basic test case with all default values.
"""
self.style_feature = 'style_feature_name'
self.content_feature = 'content_feature_name'
self.pre_trained_model = 'resnet-16'
## Create the model
# Model
self.style_sf = _get_data(feature=self.style_feature, num_examples=_NUM_STYLES)
self.content_sf = _get_data(feature=self.content_feature)
self.num_styles = _NUM_STYLES
self.model = tc.style_transfer.create(self.style_sf,
self.content_sf,
style_feature=self.style_feature,
content_feature=self.content_feature,
max_iterations=0,
> model=self.pre_trained_model)
test_style_transfer.py:83:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
../toolkits/style_transfer/style_transfer.py:201: in create
transformer = _Transformer(num_styles, batch_size_each)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = Transformer(
), num_styles = 4, batch_size = 6
def __init__(self, num_styles, batch_size):
super(Transformer, self).__init__(prefix='transformer_')
self.num_styles = num_styles
block = ResidualBlock
self.scale255 = False
with self.name_scope():
> self.refl1 = nn.ReflectionPad2D(4)
E NameError: global name 'nn' is not defined
../toolkits/style_transfer/_model.py:118: NameError
____________ ERROR at setup of StyleTransferTest.test_stylize_fail _____________
self = <class 'turicreate.test.test_style_transfer.StyleTransferTest'>
@classmethod
def setUpClass(self):
"""
The setup class method for the basic test case with all default values.
"""
self.style_feature = 'style_feature_name'
self.content_feature = 'content_feature_name'
self.pre_trained_model = 'resnet-16'
## Create the model
# Model
self.style_sf = _get_data(feature=self.style_feature, num_examples=_NUM_STYLES)
self.content_sf = _get_data(feature=self.content_feature)
self.num_styles = _NUM_STYLES
self.model = tc.style_transfer.create(self.style_sf,
self.content_sf,
style_feature=self.style_feature,
content_feature=self.content_feature,
max_iterations=0,
> model=self.pre_trained_model)
test_style_transfer.py:83:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
../toolkits/style_transfer/style_transfer.py:201: in create
transformer = _Transformer(num_styles, batch_size_each)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
self = Transformer(
), num_styles = 4, batch_size = 6
def __init__(self, num_styles, batch_size):
super(Transformer, self).__init__(prefix='transformer_')
self.num_styles = num_styles
block = ResidualBlock
self.scale255 = False
with self.name_scope():
> self.refl1 = nn.ReflectionPad2D(4)
E NameError: global name 'nn' is not defined
../toolkits/style_transfer/_model.py:118: NameError
``` | test | test error in test style transfer py appears to be caused by error at setup of styletransfertest test single image self classmethod def setupclass self the setup class method for the basic test case with all default values self style feature style feature name self content feature content feature name self pre trained model resnet create the model model self style sf get data feature self style feature num examples num styles self content sf get data feature self content feature self num styles num styles self model tc style transfer create self style sf self content sf style feature self style feature content feature self content feature max iterations model self pre trained model test style transfer py toolkits style transfer style transfer py in create transformer transformer num styles batch size each self transformer num styles batch size def init self num styles batch size super transformer self init prefix transformer self num styles num styles block residualblock self false with self name scope self nn e nameerror global name nn is not defined toolkits style transfer model py nameerror error at setup of styletransfertest test stylize fail self classmethod def setupclass self the setup class method for the basic test case with all default values self style feature style feature name self content feature content feature name self pre trained model resnet create the model model self style sf get data feature self style feature num examples num styles self content sf get data feature self content feature self num styles num styles self model tc style transfer create self style sf self content sf style feature self style feature content feature self content feature max iterations model self pre trained model test style transfer py toolkits style transfer style transfer py in create transformer transformer num styles batch size each self transformer num styles batch size def init self num styles batch size super transformer self init prefix transformer self num styles num styles block residualblock self false with self name scope self nn e nameerror global name nn is not defined toolkits style transfer model py nameerror | 1 |
314,696 | 23,533,472,180 | IssuesEvent | 2022-08-19 17:47:32 | kevin218/Eureka | https://api.github.com/repos/kevin218/Eureka | closed | Eureka flowchart | documentation enhancement | I think it would be useful to have some kind of flow chart or visual guide to all of the moving pieces in eureka, because there are a lot! It doesn't have to be super fancy, just something that outlines what's done in S1, S2, S3, and what tools are available in S4 and S5. | 1.0 | Eureka flowchart - I think it would be useful to have some kind of flow chart or visual guide to all of the moving pieces in eureka, because there are a lot! It doesn't have to be super fancy, just something that outlines what's done in S1, S2, S3, and what tools are available in S4 and S5. | non_test | eureka flowchart i think it would be useful to have some kind of flow chart or visual guide to all of the moving pieces in eureka because there are a lot it doesn t have to be super fancy just something that outlines what s done in and what tools are available in and | 0 |
14,422 | 24,846,322,821 | IssuesEvent | 2022-10-26 16:08:37 | ict2201P7G1Project/ICT2201_P7-1 | https://api.github.com/repos/ict2201P7G1Project/ICT2201_P7-1 | closed | DUE 26/10 - Relook into gantt chart and update the writeup | M1 - Software Requirements and Planning | Post-M1 Submission Review:
Write up should reflect waterfall or hybrid model
Gantt chart should be filled up and reflect the full planned timeline | 1.0 | DUE 26/10 - Relook into gantt chart and update the writeup - Post-M1 Submission Review:
Write up should reflect waterfall or hybrid model
Gantt chart should be filled up and reflect the full planned timeline | non_test | due relook into gantt chart and update the writeup post submission review write up should reflect waterfall or hybrid model gantt chart should be filled up and reflect the full planned timeline | 0 |
757,099 | 26,496,129,594 | IssuesEvent | 2023-01-18 05:56:30 | OpenMined/PySyft | https://api.github.com/repos/OpenMined/PySyft | closed | Publish fails for insufficient budget scenario. | Type: Bug :bug: Priority: 1 - Immediate :fire: DP Syft | ## Description
Publish Operation fails for insufficient budget scenario.
When we try to publish a DP annotated tensor for insufficient budget scenario.we receive a stack trace at the celery work side.
The screenshots contains details to reproduce the error.
## How to Reproduce

Error Stack Trace:

Expected Behaviour:
To be able to publish on insufficient budget scenario.
| 1.0 | Publish fails for insufficient budget scenario. - ## Description
Publish Operation fails for insufficient budget scenario.
When we try to publish a DP annotated tensor for insufficient budget scenario.we receive a stack trace at the celery work side.
The screenshots contains details to reproduce the error.
## How to Reproduce

Error Stack Trace:

Expected Behaviour:
To be able to publish on insufficient budget scenario.
| non_test | publish fails for insufficient budget scenario description publish operation fails for insufficient budget scenario when we try to publish a dp annotated tensor for insufficient budget scenario we receive a stack trace at the celery work side the screenshots contains details to reproduce the error how to reproduce error stack trace expected behaviour to be able to publish on insufficient budget scenario | 0 |
26,389 | 4,218,141,862 | IssuesEvent | 2016-06-30 15:08:38 | brave/browser-laptop | https://api.github.com/repos/brave/browser-laptop | closed | Manual tests for macOS 0.10.5 RC2 | tests | 1. [x] Check that installer is close to the size of last release.
2. [x] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properies, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window.
3. [x] Check Brave, electron, and libchromiumcontent version in About and make sure it is EXACTLY as expected.
## About pages
1. [x] Test that about:bookmarks loads bookmarks
2. [x] Test that about:downloads loads downloads
3. [x] Test that about:preferences changing a preference takes effect right away
4. [x] Test that about:preferences language change takes effect on re-start
5. [x] Test that about:passwords loads
## Context menus
1. [x] Make sure context menu items in the URL bar work
2. [x] Make sure context menu items on content work with no selected text.
3. [x] Make sure context menu items on content work with selected text.
4. [x] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable).
## Find on page
1. [x] Ensure search box is shown with shortcut
2. [x] Test successful find
3. [x] Test forward and backward find navigation
4. [x] Test failed find shows 0 results
5. [x] Test match case find
## Site hacks
1. [x] Test twitch.tv sub-page loads a video and you can play it
## Downloads
1. [x] Test downloading a file works and that all actions on the download item works.
## Fullscreen
1. [x] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc).
2. [x] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Tabs and Pinning
1. [x] Test that tabs are pinnable
2. [x] Test that tabs are unpinnable
3. [x] Test that tabs are draggable to same tabset
4. [x] Test that tabs are draggable to alternate tabset
## Zoom
1. [x] Test zoom in / out shortcut works
2. [x] Test hamburger menu zooms.
3. [x] Test zoom saved when you close the browser and restore on a single site.
4. [x] Test zoom saved when you navigate within a single origin site.
5. [x] Test that navigating to a different origin resets the zoom
## Bookmarks
1. [x] Test that creating a bookmark on the bookmarks toolbar works
2. [x] Test that creating a bookmark folder on the bookmarks toolbar works
3. [x] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works
4. [x] Test that clicking a bookmark in the toolbar loads the bookmark.
5. [x] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark.
## Bravery settings
1. [x] Check that HTTPS Everywhere works by loading http://www.apple.com
2. [x] Turning HTTPS Everywhere off and shields off both disable the redirect to apple.com
3. [x] Check that ad replacement works on http://slashdot.org
4. [x] Check that toggling to blocking and allow ads works as expected.
5. [x] Test that clicking through a cert error in badssl.com works.
6. [x] Test that Safe Browsing works (excellentmovies.net)
7. [x] Turning Safe Browsing off and shields off both disable safe browsing for excellentmovies.net.
8. [x] Visit brianbondy.com and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work.
9. [x] Test that about:preferences default Bravery settings take effect on pages with no site settings.
10. [x] Test that turning on fingerprinting protection in about:preferences blocks fingerprint at http://browserleaks.com/canvas. Test that turning it off in the Bravery menu shows the fingerprint again.
11. [x] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/7/ when 3rd party cookies are blocked.
12. [x] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on.
## Content tests
1. [x] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows.
2. [x] Go to brianbondy.com and click on the twitter icon on the top right. Test that context menus work in the new twitter tab.
3. [x] Go to http://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown.
4. [x] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`.
5. [x] Open a github issue and type some misspellings, make sure they are underlined.
6. [x] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text.
7. [x] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded.
8. [x] Make sure that clicking links from gmail or inbox.google.com works.
# Flash tests
1. [x] Turn on Flash in about:preferences#security. Test that clicking on 'Install Flash' banner on myspace.com shows a notification to allow Flash and that the banner disappears when 'Allow' is clicked.
## Per release specialty tests
1. [x] Added LastPass support add (#2316)
2. [x] Added Flash Click to Play support (Flash is only available after enabling Flash in preferences explicitly) (#2279)
3. [x] Added lookup selection to context menu for macOS (#1627)
4. [x] Changed pin tab option to not show for about:blank and about:newtab (#2253)
5. [x] Changed user agent for Adobe Flash website Brave detection (811e742)
6. [x] Fixed 1password auto-start (#2298)
7. [x] Fixed 1password auto-fill regression (#2308)
8. [x] Fixed session tabs 1password bug (#2303)
9. [x] Fixed downloads bar overflow (#2322)
10. [x] Fixed selection menu to truncate properly (#2240)
## Session storage
1. [x] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave in Windows`, `./config/brave` in Ubuntu)
2. [x] Make sure that data from the last version appears in the new version OK.
3. [x] Test that windows and tabs restore when closed, including active tab.
4. [x] Test that the previous version's cookies are preserved in the next version.
5. [x] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave in Windows`, `./config/brave` in Ubuntu)
## Update tests
1. [x] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly. | 1.0 | Manual tests for macOS 0.10.5 RC2 - 1. [x] Check that installer is close to the size of last release.
2. [x] Check signature: If OS Run `spctl --assess --verbose /Applications/Brave.app/` and make sure it returns `accepted`. If Windows right click on the installer exe and go to Properies, go to the Digital Signatures tab and double click on the signature. Make sure it says "The digital signature is OK" in the popup window.
3. [x] Check Brave, electron, and libchromiumcontent version in About and make sure it is EXACTLY as expected.
## About pages
1. [x] Test that about:bookmarks loads bookmarks
2. [x] Test that about:downloads loads downloads
3. [x] Test that about:preferences changing a preference takes effect right away
4. [x] Test that about:preferences language change takes effect on re-start
5. [x] Test that about:passwords loads
## Context menus
1. [x] Make sure context menu items in the URL bar work
2. [x] Make sure context menu items on content work with no selected text.
3. [x] Make sure context menu items on content work with selected text.
4. [x] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable).
## Find on page
1. [x] Ensure search box is shown with shortcut
2. [x] Test successful find
3. [x] Test forward and backward find navigation
4. [x] Test failed find shows 0 results
5. [x] Test match case find
## Site hacks
1. [x] Test twitch.tv sub-page loads a video and you can play it
## Downloads
1. [x] Test downloading a file works and that all actions on the download item works.
## Fullscreen
1. [x] Test that entering full screen window works View -> Toggle Full Screen. And exit back (Not Esc).
2. [x] Test that entering HTML5 full screen works. And Esc to go back. (youtube.com)
## Tabs and Pinning
1. [x] Test that tabs are pinnable
2. [x] Test that tabs are unpinnable
3. [x] Test that tabs are draggable to same tabset
4. [x] Test that tabs are draggable to alternate tabset
## Zoom
1. [x] Test zoom in / out shortcut works
2. [x] Test hamburger menu zooms.
3. [x] Test zoom saved when you close the browser and restore on a single site.
4. [x] Test zoom saved when you navigate within a single origin site.
5. [x] Test that navigating to a different origin resets the zoom
## Bookmarks
1. [x] Test that creating a bookmark on the bookmarks toolbar works
2. [x] Test that creating a bookmark folder on the bookmarks toolbar works
3. [x] Test that moving a bookmark into a folder by drag and drop on the bookmarks folder works
4. [x] Test that clicking a bookmark in the toolbar loads the bookmark.
5. [x] Test that clicking a bookmark in a bookmark toolbar folder loads the bookmark.
## Bravery settings
1. [x] Check that HTTPS Everywhere works by loading http://www.apple.com
2. [x] Turning HTTPS Everywhere off and shields off both disable the redirect to apple.com
3. [x] Check that ad replacement works on http://slashdot.org
4. [x] Check that toggling to blocking and allow ads works as expected.
5. [x] Test that clicking through a cert error in badssl.com works.
6. [x] Test that Safe Browsing works (excellentmovies.net)
7. [x] Turning Safe Browsing off and shields off both disable safe browsing for excellentmovies.net.
8. [x] Visit brianbondy.com and then turn on script blocking, nothing should load. Allow it from the script blocking UI in the URL bar and it should work.
9. [x] Test that about:preferences default Bravery settings take effect on pages with no site settings.
10. [x] Test that turning on fingerprinting protection in about:preferences blocks fingerprint at http://browserleaks.com/canvas. Test that turning it off in the Bravery menu shows the fingerprint again.
11. [x] Test that 3rd party storage results are blank at https://jsfiddle.net/7ke9r14a/7/ when 3rd party cookies are blocked.
12. [x] Test that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on.
## Content tests
1. [x] Load twitter and click on a tweet so the popup div shows. Click to dismiss and repeat with another div. Make sure it shows.
2. [x] Go to brianbondy.com and click on the twitter icon on the top right. Test that context menus work in the new twitter tab.
3. [x] Go to http://www.bennish.net/web-notifications.html and test that clicking on 'Show' pops up a notification asking for permission. Make sure that clicking 'Deny' leads to no notifications being shown.
4. [x] Go to https://trac.torproject.org/projects/tor/login and make sure that the password can be saved. Make sure the saved password shows up in `about:passwords`.
5. [x] Open a github issue and type some misspellings, make sure they are underlined.
6. [x] Make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text.
7. [x] Make sure that Command + Click (Control + Click on Windows, Control + Click on Ubuntu) on a link opens a new tab but does NOT switch to it. Click on it and make sure it is already loaded.
8. [x] Make sure that clicking links from gmail or inbox.google.com works.
# Flash tests
1. [x] Turn on Flash in about:preferences#security. Test that clicking on 'Install Flash' banner on myspace.com shows a notification to allow Flash and that the banner disappears when 'Allow' is clicked.
## Per release specialty tests
1. [x] Added LastPass support add (#2316)
2. [x] Added Flash Click to Play support (Flash is only available after enabling Flash in preferences explicitly) (#2279)
3. [x] Added lookup selection to context menu for macOS (#1627)
4. [x] Changed pin tab option to not show for about:blank and about:newtab (#2253)
5. [x] Changed user agent for Adobe Flash website Brave detection (811e742)
6. [x] Fixed 1password auto-start (#2298)
7. [x] Fixed 1password auto-fill regression (#2308)
8. [x] Fixed session tabs 1password bug (#2303)
9. [x] Fixed downloads bar overflow (#2322)
10. [x] Fixed selection menu to truncate properly (#2240)
## Session storage
1. [x] Temporarily move away your `~/Library/Application\ Support/Brave/session-store-1` and test that clean session storage works. (`%appdata%\Brave in Windows`, `./config/brave` in Ubuntu)
2. [x] Make sure that data from the last version appears in the new version OK.
3. [x] Test that windows and tabs restore when closed, including active tab.
4. [x] Test that the previous version's cookies are preserved in the next version.
5. [x] Move away your entire `~/Library/Application\ Support/Brave` folder (`%appdata%\Brave in Windows`, `./config/brave` in Ubuntu)
## Update tests
1. [x] Test that updating using `BRAVE_UPDATE_VERSION=0.8.3` env variable works correctly. | test | manual tests for macos check that installer is close to the size of last release check signature if os run spctl assess verbose applications brave app and make sure it returns accepted if windows right click on the installer exe and go to properies go to the digital signatures tab and double click on the signature make sure it says the digital signature is ok in the popup window check brave electron and libchromiumcontent version in about and make sure it is exactly as expected about pages test that about bookmarks loads bookmarks test that about downloads loads downloads test that about preferences changing a preference takes effect right away test that about preferences language change takes effect on re start test that about passwords loads context menus make sure context menu items in the url bar work make sure context menu items on content work with no selected text make sure context menu items on content work with selected text make sure context menu items on content work inside an editable control input textarea or contenteditable find on page ensure search box is shown with shortcut test successful find test forward and backward find navigation test failed find shows results test match case find site hacks test twitch tv sub page loads a video and you can play it downloads test downloading a file works and that all actions on the download item works fullscreen test that entering full screen window works view toggle full screen and exit back not esc test that entering full screen works and esc to go back youtube com tabs and pinning test that tabs are pinnable test that tabs are unpinnable test that tabs are draggable to same tabset test that tabs are draggable to alternate tabset zoom test zoom in out shortcut works test hamburger menu zooms test zoom saved when you close the browser and restore on a single site test zoom saved when you navigate within a single origin site test that navigating to a different origin resets the zoom bookmarks test that creating a bookmark on the bookmarks toolbar works test that creating a bookmark folder on the bookmarks toolbar works test that moving a bookmark into a folder by drag and drop on the bookmarks folder works test that clicking a bookmark in the toolbar loads the bookmark test that clicking a bookmark in a bookmark toolbar folder loads the bookmark bravery settings check that https everywhere works by loading turning https everywhere off and shields off both disable the redirect to apple com check that ad replacement works on check that toggling to blocking and allow ads works as expected test that clicking through a cert error in badssl com works test that safe browsing works excellentmovies net turning safe browsing off and shields off both disable safe browsing for excellentmovies net visit brianbondy com and then turn on script blocking nothing should load allow it from the script blocking ui in the url bar and it should work test that about preferences default bravery settings take effect on pages with no site settings test that turning on fingerprinting protection in about preferences blocks fingerprint at test that turning it off in the bravery menu shows the fingerprint again test that party storage results are blank at when party cookies are blocked test that audio fingerprint is blocked at when fingerprinting protection is on content tests load twitter and click on a tweet so the popup div shows click to dismiss and repeat with another div make sure it shows go to brianbondy com and click on the twitter icon on the top right test that context menus work in the new twitter tab go to and test that clicking on show pops up a notification asking for permission make sure that clicking deny leads to no notifications being shown go to and make sure that the password can be saved make sure the saved password shows up in about passwords open a github issue and type some misspellings make sure they are underlined make sure that right clicking on a word with suggestions gives a suggestion and that clicking on the suggestion replaces the text make sure that command click control click on windows control click on ubuntu on a link opens a new tab but does not switch to it click on it and make sure it is already loaded make sure that clicking links from gmail or inbox google com works flash tests turn on flash in about preferences security test that clicking on install flash banner on myspace com shows a notification to allow flash and that the banner disappears when allow is clicked per release specialty tests added lastpass support add added flash click to play support flash is only available after enabling flash in preferences explicitly added lookup selection to context menu for macos changed pin tab option to not show for about blank and about newtab changed user agent for adobe flash website brave detection fixed auto start fixed auto fill regression fixed session tabs bug fixed downloads bar overflow fixed selection menu to truncate properly session storage temporarily move away your library application support brave session store and test that clean session storage works appdata brave in windows config brave in ubuntu make sure that data from the last version appears in the new version ok test that windows and tabs restore when closed including active tab test that the previous version s cookies are preserved in the next version move away your entire library application support brave folder appdata brave in windows config brave in ubuntu update tests test that updating using brave update version env variable works correctly | 1 |
802,517 | 28,965,692,604 | IssuesEvent | 2023-05-10 07:45:18 | TalaoDAO/AltMe | https://api.github.com/repos/TalaoDAO/AltMe | opened | PolygonID, verifier side , screen design issue | Priority AltMe polygon ID | Our screen design is not acceptable. See difference with PolygonID wallet with exactly the same VC content
. See Hugo to improve the design and content display


| 1.0 | PolygonID, verifier side , screen design issue - Our screen design is not acceptable. See difference with PolygonID wallet with exactly the same VC content
. See Hugo to improve the design and content display


| non_test | polygonid verifier side screen design issue our screen design is not acceptable see difference with polygonid wallet with exactly the same vc content see hugo to improve the design and content display | 0 |
21,529 | 10,660,565,629 | IssuesEvent | 2019-10-18 10:12:08 | stefanfreitag/ledborg | https://api.github.com/repos/stefanfreitag/ledborg | closed | CVE-2017-15095 (High) detected in jackson-databind-2.9.1.jar | security vulnerability | ## CVE-2017-15095 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: le/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.1/716da1830a2043f18882fc036ec26eb32cbe5aff/jackson-databind-2.9.1.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.1/716da1830a2043f18882fc036ec26eb32cbe5aff/jackson-databind-2.9.1.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.1/716da1830a2043f18882fc036ec26eb32cbe5aff/jackson-databind-2.9.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/stefanfreitag/ledborg/commit/4e110be27d8cc8673a6943df27aebbe99dd6d29a">4e110be27d8cc8673a6943df27aebbe99dd6d29a</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
<p>Publish Date: 2018-02-06
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15095>CVE-2017-15095</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15095">https://nvd.nist.gov/vuln/detail/CVE-2017-15095</a></p>
<p>Release Date: 2018-02-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.10,com.fasterxml.jackson.core:jackson-databind:2.9.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2017-15095 (High) detected in jackson-databind-2.9.1.jar - ## CVE-2017-15095 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: le/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.1/716da1830a2043f18882fc036ec26eb32cbe5aff/jackson-databind-2.9.1.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.1/716da1830a2043f18882fc036ec26eb32cbe5aff/jackson-databind-2.9.1.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.1/716da1830a2043f18882fc036ec26eb32cbe5aff/jackson-databind-2.9.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/stefanfreitag/ledborg/commit/4e110be27d8cc8673a6943df27aebbe99dd6d29a">4e110be27d8cc8673a6943df27aebbe99dd6d29a</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
<p>Publish Date: 2018-02-06
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15095>CVE-2017-15095</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15095">https://nvd.nist.gov/vuln/detail/CVE-2017-15095</a></p>
<p>Release Date: 2018-02-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.10,com.fasterxml.jackson.core:jackson-databind:2.9.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library le caches modules files com fasterxml jackson core jackson databind jackson databind jar root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href vulnerability details a deserialization flaw was discovered in the jackson databind in versions before and which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readvalue method of the objectmapper this issue extends the previous flaw cve by blacklisting more classes that could be used maliciously publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
301,489 | 26,052,422,661 | IssuesEvent | 2022-12-22 20:14:25 | ibuttimer/soapbox | https://api.github.com/repos/ibuttimer/soapbox | closed | User Test: Add all opinions feed | enhancement kanban user test | User testing identified the need for an all opinions feed on the home screen as it is not immediately obvious to a new user where to find content.
_Acceptance Criteria:_
* All opinion feed available on home screen
_Tasks:_
- [ ] Add all opinion feed
_Estimate (XS, S, M, L, XL):_ **S**
| 1.0 | User Test: Add all opinions feed - User testing identified the need for an all opinions feed on the home screen as it is not immediately obvious to a new user where to find content.
_Acceptance Criteria:_
* All opinion feed available on home screen
_Tasks:_
- [ ] Add all opinion feed
_Estimate (XS, S, M, L, XL):_ **S**
| test | user test add all opinions feed user testing identified the need for an all opinions feed on the home screen as it is not immediately obvious to a new user where to find content acceptance criteria all opinion feed available on home screen tasks add all opinion feed estimate xs s m l xl s | 1 |
201,211 | 22,946,833,183 | IssuesEvent | 2022-07-19 01:25:47 | Chiencc/Spring5-Login_Prioritize-Sample | https://api.github.com/repos/Chiencc/Spring5-Login_Prioritize-Sample | closed | CVE-2018-1000873 (Medium) detected in jackson-datatype-jsr310-2.9.6.jar - autoclosed | security vulnerability | ## CVE-2018-1000873 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-datatype-jsr310-2.9.6.jar</b></p></summary>
<p>Add-on module to support JSR-310 (Java 8 Date & Time API) data types.</p>
<p>Library home page: <a href="https://github.com/FasterXML/jackson-modules-java8/">https://github.com/FasterXML/jackson-modules-java8/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/datatype/jackson-datatype-jsr310/2.9.6/jackson-datatype-jsr310-2.9.6.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.0.3.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.0.3.RELEASE.jar
- :x: **jackson-datatype-jsr310-2.9.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Chiencc/Spring5-Login_Prioritize-Sample/commit/0c3ecc11668698a0cc14027974dc1381483dcfa8">0c3ecc11668698a0cc14027974dc1381483dcfa8</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Modules-Java8 that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.
<p>Publish Date: 2018-12-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000873>CVE-2018-1000873</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000873">https://nvd.nist.gov/vuln/detail/CVE-2018-1000873</a></p>
<p>Release Date: 2018-12-20</p>
<p>Fix Resolution (com.fasterxml.jackson.datatype:jackson-datatype-jsr310): 2.9.8</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.0.8.RELEASE</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-1000873 (Medium) detected in jackson-datatype-jsr310-2.9.6.jar - autoclosed - ## CVE-2018-1000873 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-datatype-jsr310-2.9.6.jar</b></p></summary>
<p>Add-on module to support JSR-310 (Java 8 Date & Time API) data types.</p>
<p>Library home page: <a href="https://github.com/FasterXML/jackson-modules-java8/">https://github.com/FasterXML/jackson-modules-java8/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/datatype/jackson-datatype-jsr310/2.9.6/jackson-datatype-jsr310-2.9.6.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.0.3.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.0.3.RELEASE.jar
- :x: **jackson-datatype-jsr310-2.9.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Chiencc/Spring5-Login_Prioritize-Sample/commit/0c3ecc11668698a0cc14027974dc1381483dcfa8">0c3ecc11668698a0cc14027974dc1381483dcfa8</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Modules-Java8 that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.
<p>Publish Date: 2018-12-20
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000873>CVE-2018-1000873</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000873">https://nvd.nist.gov/vuln/detail/CVE-2018-1000873</a></p>
<p>Release Date: 2018-12-20</p>
<p>Fix Resolution (com.fasterxml.jackson.datatype:jackson-datatype-jsr310): 2.9.8</p>
<p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.0.8.RELEASE</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve medium detected in jackson datatype jar autoclosed cve medium severity vulnerability vulnerable library jackson datatype jar add on module to support jsr java date time api data types library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository com fasterxml jackson datatype jackson datatype jackson datatype jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson datatype jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson version before contains a cwe improper input validation vulnerability in jackson modules that can result in causes a denial of service dos this attack appear to be exploitable via the victim deserializes malicious input specifically very large values in the nanoseconds field of a time value this vulnerability appears to have been fixed in publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson datatype jackson datatype direct dependency fix resolution org springframework boot spring boot starter web release step up your open source security game with whitesource | 0 |
120,219 | 12,061,579,561 | IssuesEvent | 2020-04-16 00:14:50 | leomelki/LoupGarou | https://api.github.com/repos/leomelki/LoupGarou | closed | Loup Noir inutile dans certain cas | documentation | Lorsqu'il y a un loup noir, aucun loup normal et un grand méchant loup, le tour des loups normaux ne se passe pas, en conséquent le loup noir ne joue jamais non plus et ne peut donc jamais infecter quelqu'un.
(De plus le grand méchant loup ne fait donc qu'une victime lors de son tour alors qu'il devrait en voter deux, lors de son tour et lors du tour des loups global, qui ne se passe donc pas) | 1.0 | Loup Noir inutile dans certain cas - Lorsqu'il y a un loup noir, aucun loup normal et un grand méchant loup, le tour des loups normaux ne se passe pas, en conséquent le loup noir ne joue jamais non plus et ne peut donc jamais infecter quelqu'un.
(De plus le grand méchant loup ne fait donc qu'une victime lors de son tour alors qu'il devrait en voter deux, lors de son tour et lors du tour des loups global, qui ne se passe donc pas) | non_test | loup noir inutile dans certain cas lorsqu il y a un loup noir aucun loup normal et un grand méchant loup le tour des loups normaux ne se passe pas en conséquent le loup noir ne joue jamais non plus et ne peut donc jamais infecter quelqu un de plus le grand méchant loup ne fait donc qu une victime lors de son tour alors qu il devrait en voter deux lors de son tour et lors du tour des loups global qui ne se passe donc pas | 0 |
233,353 | 18,975,985,604 | IssuesEvent | 2021-11-20 01:49:21 | calidad-de-software-2021/Calidad_Udemy | https://api.github.com/repos/calidad-de-software-2021/Calidad_Udemy | closed | [Suite de preguntas a instructores] No se pueden realizar preguntas al instructor - Fail | bug TestQuality resolution_Fixed Medium | #### Precondition
El usuario ha iniciado sesión y se encuentra en la sección del curso escogido.

#### Steps to Reproduce:
| Step | Action | Expected | Status |
| -------- | -------- | -------- | -------- |
| 1| El usuario se dirige al final de la lista de preguntas para realizar una; presionando el botón de hacer otra pregunta.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27479.png" alt="" />| Se visualiza un popup preguntando por el asunto de la pregunta.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27480.png" alt="" />| Fail |
| 2| El usuario escoge el asunto de su pregunta y presiona continuar.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27486.png" alt="" />| Se presenta una lista de opciones para obtener información de la pregunta en cuestión.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27491.png" alt="" />| Fail |
| 3| Las opciones presentadas se encuentran activas, sin embargo, no se puede visualizar un boton para continuar con el proceso.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27492.png" alt="" />| | Fail|
| 1.0 | [Suite de preguntas a instructores] No se pueden realizar preguntas al instructor - Fail - #### Precondition
El usuario ha iniciado sesión y se encuentra en la sección del curso escogido.

#### Steps to Reproduce:
| Step | Action | Expected | Status |
| -------- | -------- | -------- | -------- |
| 1| El usuario se dirige al final de la lista de preguntas para realizar una; presionando el botón de hacer otra pregunta.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27479.png" alt="" />| Se visualiza un popup preguntando por el asunto de la pregunta.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27480.png" alt="" />| Fail |
| 2| El usuario escoge el asunto de su pregunta y presiona continuar.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27486.png" alt="" />| Se presenta una lista de opciones para obtener información de la pregunta en cuestión.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27491.png" alt="" />| Fail |
| 3| Las opciones presentadas se encuentran activas, sin embargo, no se puede visualizar un boton para continuar con el proceso.<br /><br><img src="https://bitmodern-testquality-server-storage.s3.us-west-2.amazonaws.com/attachment_Test_27492.png" alt="" />| | Fail|
| test | no se pueden realizar preguntas al instructor fail precondition el usuario ha iniciado sesión y se encuentra en la sección del curso escogido steps to reproduce step action expected status el usuario se dirige al final de la lista de preguntas para realizar una presionando el botón de hacer otra pregunta se visualiza un popup preguntando por el asunto de la pregunta fail el usuario escoge el asunto de su pregunta y presiona continuar se presenta una lista de opciones para obtener información de la pregunta en cuestión fail las opciones presentadas se encuentran activas sin embargo no se puede visualizar un boton para continuar con el proceso fail | 1 |
125,136 | 10,338,059,602 | IssuesEvent | 2019-09-03 16:03:12 | WorldHealthOrganization/herams-backend | https://api.github.com/repos/WorldHealthOrganization/herams-backend | closed | Error deleting dashboard pages with elements | test on staging | It's not possible to delete a dashboard page that still contains elements. If you delete a page with elements you get the following error.
```
SQLSTATE[23000]: Integrity constraint violation: 1451 Cannot delete or update a parent row: a foreign key constraint fails (`herams2`.`prime2_element`, CONSTRAINT `element_page` FOREIGN KEY (`page_id`) REFERENCES `prime2_page` (`id`))
The SQL being executed was: DELETE FROM `prime2_page` WHERE `id`=46
```
Based on the above error message, I removed the elements first and then delete the page. This is working.
| 1.0 | Error deleting dashboard pages with elements - It's not possible to delete a dashboard page that still contains elements. If you delete a page with elements you get the following error.
```
SQLSTATE[23000]: Integrity constraint violation: 1451 Cannot delete or update a parent row: a foreign key constraint fails (`herams2`.`prime2_element`, CONSTRAINT `element_page` FOREIGN KEY (`page_id`) REFERENCES `prime2_page` (`id`))
The SQL being executed was: DELETE FROM `prime2_page` WHERE `id`=46
```
Based on the above error message, I removed the elements first and then delete the page. This is working.
| test | error deleting dashboard pages with elements it s not possible to delete a dashboard page that still contains elements if you delete a page with elements you get the following error sqlstate integrity constraint violation cannot delete or update a parent row a foreign key constraint fails element constraint element page foreign key page id references page id the sql being executed was delete from page where id based on the above error message i removed the elements first and then delete the page this is working | 1 |
4,496 | 5,114,536,500 | IssuesEvent | 2017-01-06 18:49:06 | dotnet/corefx | https://api.github.com/repos/dotnet/corefx | closed | Command files (*.cmd) can't use directories with spaces | area-Infrastructure bug up for grabs | When creating or evaluating an environment variable, quotes are not required:
``` batchfile
set INIT_TOOLS_LOG=%~dp0init-tools.log
if [%PACKAGES_DIR%]==[] set PACKAGES_DIR=%~dp0packages\
```
However, when turning that environment variable into a file to be used, quotes are required. Instead of:
``` batchfile
set /P BUILDTOOLS_VERSION=< %~dp0BuildToolsVersion.txt
echo %PROJECT_JSON_CONTENTS% > %PROJECT_JSON_FILE%
echo Running %0 > %INIT_TOOLS_LOG%
```
The correct syntax is:
``` batchfile
set /P BUILDTOOLS_VERSION=< "%~dp0BuildToolsVersion.txt"
echo %PROJECT_JSON_CONTENTS% > "%PROJECT_JSON_FILE%"
echo Running %0 > "%INIT_TOOLS_LOG%"
```
Because of the lack of quotes, any attempt to use these command files in a directory with spaces will fail.
-Neil
| 1.0 | Command files (*.cmd) can't use directories with spaces - When creating or evaluating an environment variable, quotes are not required:
``` batchfile
set INIT_TOOLS_LOG=%~dp0init-tools.log
if [%PACKAGES_DIR%]==[] set PACKAGES_DIR=%~dp0packages\
```
However, when turning that environment variable into a file to be used, quotes are required. Instead of:
``` batchfile
set /P BUILDTOOLS_VERSION=< %~dp0BuildToolsVersion.txt
echo %PROJECT_JSON_CONTENTS% > %PROJECT_JSON_FILE%
echo Running %0 > %INIT_TOOLS_LOG%
```
The correct syntax is:
``` batchfile
set /P BUILDTOOLS_VERSION=< "%~dp0BuildToolsVersion.txt"
echo %PROJECT_JSON_CONTENTS% > "%PROJECT_JSON_FILE%"
echo Running %0 > "%INIT_TOOLS_LOG%"
```
Because of the lack of quotes, any attempt to use these command files in a directory with spaces will fail.
-Neil
| non_test | command files cmd can t use directories with spaces when creating or evaluating an environment variable quotes are not required batchfile set init tools log tools log if set packages dir however when turning that environment variable into a file to be used quotes are required instead of batchfile set p buildtools version txt echo project json contents project json file echo running init tools log the correct syntax is batchfile set p buildtools version txt echo project json contents project json file echo running init tools log because of the lack of quotes any attempt to use these command files in a directory with spaces will fail neil | 0 |
48,503 | 13,384,009,467 | IssuesEvent | 2020-09-02 11:17:37 | jgeraigery/FHIR | https://api.github.com/repos/jgeraigery/FHIR | opened | CVE-2019-6284 (Medium) detected in node-sass-v4.13.1, node-sass-4.14.1.tgz | security vulnerability | ## CVE-2019-6284 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.14.1.tgz</b></p></summary>
<p>
<details><summary><b>node-sass-4.14.1.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/FHIR/docs/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/FHIR/docs/node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- gatsby-theme-carbon-1.24.3.tgz (Root Library)
- :x: **node-sass-4.14.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/FHIR/commit/fa9189dae07fc8992deaf05151b43882e2fc00aa">fa9189dae07fc8992deaf05151b43882e2fc00aa</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp.
<p>Publish Date: 2019-01-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6284>CVE-2019-6284</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284</a></p>
<p>Release Date: 2019-08-06</p>
<p>Fix Resolution: LibSass - 3.6.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-sass","packageVersion":"4.14.1","isTransitiveDependency":true,"dependencyTree":"gatsby-theme-carbon:1.24.3;node-sass:4.14.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"LibSass - 3.6.0"}],"vulnerabilityIdentifier":"CVE-2019-6284","vulnerabilityDetails":"In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6284","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2019-6284 (Medium) detected in node-sass-v4.13.1, node-sass-4.14.1.tgz - ## CVE-2019-6284 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.14.1.tgz</b></p></summary>
<p>
<details><summary><b>node-sass-4.14.1.tgz</b></p></summary>
<p>Wrapper around libsass</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/FHIR/docs/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/FHIR/docs/node_modules/node-sass/package.json</p>
<p>
Dependency Hierarchy:
- gatsby-theme-carbon-1.24.3.tgz (Root Library)
- :x: **node-sass-4.14.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/jgeraigery/FHIR/commit/fa9189dae07fc8992deaf05151b43882e2fc00aa">fa9189dae07fc8992deaf05151b43882e2fc00aa</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp.
<p>Publish Date: 2019-01-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6284>CVE-2019-6284</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6284</a></p>
<p>Release Date: 2019-08-06</p>
<p>Fix Resolution: LibSass - 3.6.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-sass","packageVersion":"4.14.1","isTransitiveDependency":true,"dependencyTree":"gatsby-theme-carbon:1.24.3;node-sass:4.14.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"LibSass - 3.6.0"}],"vulnerabilityIdentifier":"CVE-2019-6284","vulnerabilityDetails":"In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::alternatives in prelexer.hpp.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6284","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_test | cve medium detected in node sass node sass tgz cve medium severity vulnerability vulnerable libraries node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file tmp ws scm fhir docs package json path to vulnerable library tmp ws scm fhir docs node modules node sass package json dependency hierarchy gatsby theme carbon tgz root library x node sass tgz vulnerable library found in head commit a href vulnerability details in libsass a heap based buffer over read exists in sass prelexer alternatives in prelexer hpp publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails in libsass a heap based buffer over read exists in sass prelexer alternatives in prelexer hpp vulnerabilityurl | 0 |
71,177 | 30,825,310,431 | IssuesEvent | 2023-08-01 19:33:28 | hashicorp/terraform-provider-azurerm | https://api.github.com/repos/hashicorp/terraform-provider-azurerm | closed | Unable to create azurerm_role_assignment for global scope | bug service/roles v/2.x (legacy) | ### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
### Terraform (and AzureRM Provider) Version
Terraform 0.14.6
```
- Installing hashicorp/azuread v1.3.0...
- Installed hashicorp/azuread v1.3.0 (signed by HashiCorp)
- Installing hashicorp/azurerm v2.47.0...
- Installed hashicorp/azurerm v2.47.0 (signed by HashiCorp)
- Installing hashicorp/null v3.0.0...
- Installed hashicorp/null v3.0.0 (signed by HashiCorp)
- Installing hashicorp/time v0.6.0...
- Installed hashicorp/time v0.6.0 (signed by HashiCorp)
- Installing hashicorp/random v3.0.1...
- Installed hashicorp/random v3.0.1 (signed by HashiCorp)
- Installing databrickslabs/databricks v0.3.0...
- Installed databrickslabs/databricks v0.3.0 (signed by a HashiCorp partner, key ID 905AA25F2E92C2D5)
```
### Affected Resource(s)
* `azurerm_role_assignment`
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
```hcl
resource "azurerm_role_assignment" "redacted" {
principal_id = some.principal_id
role_definition_name = "Directory Readers"
scope = "/"
}
```
### Output
```
Error: Can not parse "scope" as a management group id: Unable to parse Management Group ID "/"
on redacted.tf line 61, in resource "azurerm_role_assignment" "redacted":
61: resource "azurerm_role_assignment" "redacted" {
Error: "scope" expected to be valid subscription ID, got "/"
on redacted.tf line 61, in resource "azurerm_role_assignment" "redacted":
61: resource "azurerm_role_assignment" "redacted" {
Error: The number of path segments is not divisible by 2 in ""
on redacted.tf line 61, in resource "azurerm_role_assignment" "redacted":
61: resource "azurerm_role_assignment" "redacted" {
Error: Can not parse "scope" as a resource id: The number of path segments is not divisible by 2 in ""
on redacted.tf line 61, in resource "azurerm_role_assignment" "redacted":
61: resource "azurerm_role_assignment" "redacted" {
```
### Expected Behaviour
Scopes for the global scope should be allowed and created.
### Actual Behaviour
Errors I got above.
### Steps to Reproduce
1. `terraform validate`
### References
I think this error was introduced in https://github.com/terraform-providers/terraform-provider-azurerm/pull/10438/files ( cc @tombuildsstuff ) | 1.0 | Unable to create azurerm_role_assignment for global scope - ### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
### Terraform (and AzureRM Provider) Version
Terraform 0.14.6
```
- Installing hashicorp/azuread v1.3.0...
- Installed hashicorp/azuread v1.3.0 (signed by HashiCorp)
- Installing hashicorp/azurerm v2.47.0...
- Installed hashicorp/azurerm v2.47.0 (signed by HashiCorp)
- Installing hashicorp/null v3.0.0...
- Installed hashicorp/null v3.0.0 (signed by HashiCorp)
- Installing hashicorp/time v0.6.0...
- Installed hashicorp/time v0.6.0 (signed by HashiCorp)
- Installing hashicorp/random v3.0.1...
- Installed hashicorp/random v3.0.1 (signed by HashiCorp)
- Installing databrickslabs/databricks v0.3.0...
- Installed databrickslabs/databricks v0.3.0 (signed by a HashiCorp partner, key ID 905AA25F2E92C2D5)
```
### Affected Resource(s)
* `azurerm_role_assignment`
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
```hcl
resource "azurerm_role_assignment" "redacted" {
principal_id = some.principal_id
role_definition_name = "Directory Readers"
scope = "/"
}
```
### Output
```
Error: Can not parse "scope" as a management group id: Unable to parse Management Group ID "/"
on redacted.tf line 61, in resource "azurerm_role_assignment" "redacted":
61: resource "azurerm_role_assignment" "redacted" {
Error: "scope" expected to be valid subscription ID, got "/"
on redacted.tf line 61, in resource "azurerm_role_assignment" "redacted":
61: resource "azurerm_role_assignment" "redacted" {
Error: The number of path segments is not divisible by 2 in ""
on redacted.tf line 61, in resource "azurerm_role_assignment" "redacted":
61: resource "azurerm_role_assignment" "redacted" {
Error: Can not parse "scope" as a resource id: The number of path segments is not divisible by 2 in ""
on redacted.tf line 61, in resource "azurerm_role_assignment" "redacted":
61: resource "azurerm_role_assignment" "redacted" {
```
### Expected Behaviour
Scopes for the global scope should be allowed and created.
### Actual Behaviour
Errors I got above.
### Steps to Reproduce
1. `terraform validate`
### References
I think this error was introduced in https://github.com/terraform-providers/terraform-provider-azurerm/pull/10438/files ( cc @tombuildsstuff ) | non_test | unable to create azurerm role assignment for global scope community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or me too comments they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform and azurerm provider version terraform installing hashicorp azuread installed hashicorp azuread signed by hashicorp installing hashicorp azurerm installed hashicorp azurerm signed by hashicorp installing hashicorp null installed hashicorp null signed by hashicorp installing hashicorp time installed hashicorp time signed by hashicorp installing hashicorp random installed hashicorp random signed by hashicorp installing databrickslabs databricks installed databrickslabs databricks signed by a hashicorp partner key id affected resource s azurerm role assignment terraform configuration files hcl resource azurerm role assignment redacted principal id some principal id role definition name directory readers scope output error can not parse scope as a management group id unable to parse management group id on redacted tf line in resource azurerm role assignment redacted resource azurerm role assignment redacted error scope expected to be valid subscription id got on redacted tf line in resource azurerm role assignment redacted resource azurerm role assignment redacted error the number of path segments is not divisible by in on redacted tf line in resource azurerm role assignment redacted resource azurerm role assignment redacted error can not parse scope as a resource id the number of path segments is not divisible by in on redacted tf line in resource azurerm role assignment redacted resource azurerm role assignment redacted expected behaviour scopes for the global scope should be allowed and created actual behaviour errors i got above steps to reproduce terraform validate references i think this error was introduced in cc tombuildsstuff | 0 |
102,047 | 8,816,517,048 | IssuesEvent | 2018-12-30 11:55:25 | swentel/indieweb | https://api.github.com/repos/swentel/indieweb | closed | fix imagecache external and media cache tests | tests | Follow up to #251
For that we need a patch for imagecache external too | 1.0 | fix imagecache external and media cache tests - Follow up to #251
For that we need a patch for imagecache external too | test | fix imagecache external and media cache tests follow up to for that we need a patch for imagecache external too | 1 |
307,437 | 26,531,592,590 | IssuesEvent | 2023-01-19 12:56:06 | prgrms-fe-devcourse/FEDC3_Bigtoria_Off | https://api.github.com/repos/prgrms-fe-devcourse/FEDC3_Bigtoria_Off | closed | 실시간 통신을 위한 swr 패키지 도입 검토 | feature test | ## 작업 목록
- socket 서버는 따로 없는 것으로 보임.
- 일정 주기마다 refetch 하여 마치 실시간 통신을 하는 듯한 기능(알림 혹은 채팅 등을 위한)을 구현하기 위해 swr 패키지 도입 검토 | 1.0 | 실시간 통신을 위한 swr 패키지 도입 검토 - ## 작업 목록
- socket 서버는 따로 없는 것으로 보임.
- 일정 주기마다 refetch 하여 마치 실시간 통신을 하는 듯한 기능(알림 혹은 채팅 등을 위한)을 구현하기 위해 swr 패키지 도입 검토 | test | 실시간 통신을 위한 swr 패키지 도입 검토 작업 목록 socket 서버는 따로 없는 것으로 보임 일정 주기마다 refetch 하여 마치 실시간 통신을 하는 듯한 기능 알림 혹은 채팅 등을 위한 을 구현하기 위해 swr 패키지 도입 검토 | 1 |
307,342 | 26,525,381,739 | IssuesEvent | 2023-01-19 08:16:34 | unifyai/ivy | https://api.github.com/repos/unifyai/ivy | closed | Fix non_linear_activation_functions.test_torch_log_softmax | PyTorch Frontend Sub Task Failing Test | | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/3933758276/jobs/6727803395" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/3941620207/jobs/6744304501" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/3933758276/jobs/6727803395" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/3941620207/jobs/6744279327" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_torch/test_non_linear_activation_functions.py::test_torch_log_softmax[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-01-17T17:37:30.3415724Z E AssertionError: [[-0.69140625 -2.125 ]
2023-01-17T17:37:30.3416402Z E [-0.69140625 -0.12451172]] != [[-0.69140625 -2.125 ]
2023-01-17T17:37:30.3416818Z E [-0.69140625 -0.12695312]]
2023-01-17T17:37:30.3417201Z E Falsifying example: test_torch_log_softmax(
2023-01-17T17:37:30.3417693Z E dtype_x_and_axis=(['float32'], [array([[-1., -1.],
2023-01-17T17:37:30.3418318Z E [-1., 1.]], dtype=float32)], 0),
2023-01-17T17:37:30.3419168Z E dtypes=['bfloat16'],
2023-01-17T17:37:30.3419580Z E test_flags=num_positional_args=0. with_out=False. inplace=False. native_arrays=[False]. as_variable=[False]. ,
2023-01-17T17:37:30.3420148Z E fn_tree='ivy.functional.frontends.torch.nn.functional.log_softmax',
2023-01-17T17:37:30.3420548Z E on_device='cpu',
2023-01-17T17:37:30.3420840Z E frontend='torch',
2023-01-17T17:37:30.3421070Z E )
2023-01-17T17:37:30.3421276Z E
2023-01-17T17:37:30.3421879Z E You can reproduce this example by temporarily adding @reproduce_failure('6.55.0', b'AXicY2BkYAQiBiAAE1AaKxvGgIgxgRkAAjkADw==') as a decorator on your test case
</details>
| 1.0 | Fix non_linear_activation_functions.test_torch_log_softmax - | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/3933758276/jobs/6727803395" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/3941620207/jobs/6744304501" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/3933758276/jobs/6727803395" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/3941620207/jobs/6744279327" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_torch/test_non_linear_activation_functions.py::test_torch_log_softmax[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-01-17T17:37:30.3415724Z E AssertionError: [[-0.69140625 -2.125 ]
2023-01-17T17:37:30.3416402Z E [-0.69140625 -0.12451172]] != [[-0.69140625 -2.125 ]
2023-01-17T17:37:30.3416818Z E [-0.69140625 -0.12695312]]
2023-01-17T17:37:30.3417201Z E Falsifying example: test_torch_log_softmax(
2023-01-17T17:37:30.3417693Z E dtype_x_and_axis=(['float32'], [array([[-1., -1.],
2023-01-17T17:37:30.3418318Z E [-1., 1.]], dtype=float32)], 0),
2023-01-17T17:37:30.3419168Z E dtypes=['bfloat16'],
2023-01-17T17:37:30.3419580Z E test_flags=num_positional_args=0. with_out=False. inplace=False. native_arrays=[False]. as_variable=[False]. ,
2023-01-17T17:37:30.3420148Z E fn_tree='ivy.functional.frontends.torch.nn.functional.log_softmax',
2023-01-17T17:37:30.3420548Z E on_device='cpu',
2023-01-17T17:37:30.3420840Z E frontend='torch',
2023-01-17T17:37:30.3421070Z E )
2023-01-17T17:37:30.3421276Z E
2023-01-17T17:37:30.3421879Z E You can reproduce this example by temporarily adding @reproduce_failure('6.55.0', b'AXicY2BkYAQiBiAAE1AaKxvGgIgxgRkAAjkADw==') as a decorator on your test case
</details>
| test | fix non linear activation functions test torch log softmax tensorflow img src torch img src numpy img src jax img src failed ivy tests test ivy test frontends test torch test non linear activation functions py test torch log softmax e assertionerror e e e falsifying example test torch log softmax e dtype x and axis e dtype e dtypes e test flags num positional args with out false inplace false native arrays as variable e fn tree ivy functional frontends torch nn functional log softmax e on device cpu e frontend torch e e e you can reproduce this example by temporarily adding reproduce failure b as a decorator on your test case | 1 |
4,519 | 2,858,978,568 | IssuesEvent | 2015-06-03 07:49:35 | nijel/weblate | https://api.github.com/repos/nijel/weblate | closed | unable to add a complex php file | documentation | Hello there,
According to:
http://docs.translatehouse.org/projects/translate-toolkit/en/latest/formats/php.html
I should be able to use:
https://github.com/CristianGheonea/IPTV-Professional-Edition-Translation/blob/master/english.php
as main translation file in a sub project.
Unfortunately, every time when i try with different configurations, It fail adding the file and create the subproject.
Mainly, I receive 2 error messages when changing the parameter:
File format:
When i set it to: Automatic Detection, the error "Format of 1 matched files could not be recognized. english.php" pops up.
The error messages in apache2 error.log are:
[Wed Jun 03 05:05:48 2015] [error] INFO xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:05:48 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:05:50 2015] [error] INFO xtream-codes-iptv/iptv-pro: update took 2.10 seconds:
[Wed Jun 03 05:05:50 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: update took 2.10 seconds:
[Wed Jun 03 05:05:50 2015] [error] DEBUG xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:05:50 2015] [error] DEBUG:weblate:xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:05:50 2015] [error] INFO xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:05:50 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:05:52 2015] [error] INFO xtream-codes-iptv/iptv-pro: update took 1.87 seconds:
[Wed Jun 03 05:05:52 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: update took 1.87 seconds:
[Wed Jun 03 05:05:52 2015] [error] DEBUG xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:05:52 2015] [error] DEBUG:weblate:xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:05:52 2015] [error] INFO xtream-codes-iptv/iptv-pro: merge remote into repo
[Wed Jun 03 05:05:52 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: merge remote into repo
[Wed Jun 03 01:05:53 2015] [error] [client 80.246.130.135] File does not exist: /usr/lib/python2.7/dist-packages/django/contrib/admin/static/admin/js/related-widget-wrapper.js, referer: http://translate.xtream-codes.com/admin/trans/subproject/add/
when i set it to: "PHP strings" the error message i see in the web is:
"Chosen file format does not support adding new translations as chosen in project settings."
The error message i see in apache2 error.log is:
[Wed Jun 03 05:07:24 2015] [error] INFO xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:07:24 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:07:26 2015] [error] INFO xtream-codes-iptv/iptv-pro: update took 2.46 seconds:
[Wed Jun 03 05:07:26 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: update took 2.46 seconds:
[Wed Jun 03 05:07:26 2015] [error] DEBUG xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:07:26 2015] [error] DEBUG:weblate:xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:07:26 2015] [error] INFO xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:07:26 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:07:28 2015] [error] INFO xtream-codes-iptv/iptv-pro: update took 1.86 seconds:
[Wed Jun 03 05:07:28 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: update took 1.86 seconds:
[Wed Jun 03 05:07:28 2015] [error] DEBUG xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:07:28 2015] [error] DEBUG:weblate:xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:07:28 2015] [error] INFO xtream-codes-iptv/iptv-pro: merge remote into repo
[Wed Jun 03 05:07:28 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: merge remote into repo
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'edit_bouquet' in :413, first occurrence in line 406
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'delete_bouquet' in :414, first occurrence in line 412
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'manage_packages' in :530, first occurrence in line 211
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'connections' in :555, first occurrence in line 341
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'stream_name' in :628, first occurrence in line 197
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'notes' in :630, first occurrence in line 545
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'edit_epg' in :637, first occurrence in line 235
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'connections' in :679, first occurrence in line 341
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'cast' in :726, first occurrence in line 716
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'edit_user' in :765, first occurrence in line 466
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'group_exists' in :801, first occurrence in line 100
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'user_kicked' in :815, first occurrence in line 654
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'connection_killed' in :821, first occurrence in line 770
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'remove_argument' in :922, first occurrence in line 364
[Wed Jun 03 01:07:29 2015] [error] [client 80.246.130.135] File does not exist: /usr/lib/python2.7/dist-packages/django/contrib/admin/static/admin/js/related-widget-wrapper.js, referer: http://translate.xtream-codes.com/admin/trans/subproject/add/
[Wed Jun 03 01:07:29 2015] [error] [client 80.246.130.135] File does not exist: /usr/lib/python2.7/dist-packages/django/contrib/admin/static/admin/js/related-widget-wrapper.js, referer: http://translate.xtream-codes.com/admin/trans/subproject/add/
Indeed, there are duplicates... Still, this should not be a problem, right?
<bountysource-plugin>
---
Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/19966805-unable-to-add-a-complex-php-file?utm_campaign=plugin&utm_content=tracker%2F253393&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F253393&utm_medium=issues&utm_source=github).
</bountysource-plugin> | 1.0 | unable to add a complex php file - Hello there,
According to:
http://docs.translatehouse.org/projects/translate-toolkit/en/latest/formats/php.html
I should be able to use:
https://github.com/CristianGheonea/IPTV-Professional-Edition-Translation/blob/master/english.php
as main translation file in a sub project.
Unfortunately, every time when i try with different configurations, It fail adding the file and create the subproject.
Mainly, I receive 2 error messages when changing the parameter:
File format:
When i set it to: Automatic Detection, the error "Format of 1 matched files could not be recognized. english.php" pops up.
The error messages in apache2 error.log are:
[Wed Jun 03 05:05:48 2015] [error] INFO xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:05:48 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:05:50 2015] [error] INFO xtream-codes-iptv/iptv-pro: update took 2.10 seconds:
[Wed Jun 03 05:05:50 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: update took 2.10 seconds:
[Wed Jun 03 05:05:50 2015] [error] DEBUG xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:05:50 2015] [error] DEBUG:weblate:xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:05:50 2015] [error] INFO xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:05:50 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:05:52 2015] [error] INFO xtream-codes-iptv/iptv-pro: update took 1.87 seconds:
[Wed Jun 03 05:05:52 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: update took 1.87 seconds:
[Wed Jun 03 05:05:52 2015] [error] DEBUG xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:05:52 2015] [error] DEBUG:weblate:xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:05:52 2015] [error] INFO xtream-codes-iptv/iptv-pro: merge remote into repo
[Wed Jun 03 05:05:52 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: merge remote into repo
[Wed Jun 03 01:05:53 2015] [error] [client 80.246.130.135] File does not exist: /usr/lib/python2.7/dist-packages/django/contrib/admin/static/admin/js/related-widget-wrapper.js, referer: http://translate.xtream-codes.com/admin/trans/subproject/add/
when i set it to: "PHP strings" the error message i see in the web is:
"Chosen file format does not support adding new translations as chosen in project settings."
The error message i see in apache2 error.log is:
[Wed Jun 03 05:07:24 2015] [error] INFO xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:07:24 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:07:26 2015] [error] INFO xtream-codes-iptv/iptv-pro: update took 2.46 seconds:
[Wed Jun 03 05:07:26 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: update took 2.46 seconds:
[Wed Jun 03 05:07:26 2015] [error] DEBUG xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:07:26 2015] [error] DEBUG:weblate:xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:07:26 2015] [error] INFO xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:07:26 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: updating repository
[Wed Jun 03 05:07:28 2015] [error] INFO xtream-codes-iptv/iptv-pro: update took 1.86 seconds:
[Wed Jun 03 05:07:28 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: update took 1.86 seconds:
[Wed Jun 03 05:07:28 2015] [error] DEBUG xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:07:28 2015] [error] DEBUG:weblate:xtream-codes-iptv/iptv-pro: update: Fetching origin
[Wed Jun 03 05:07:28 2015] [error] INFO xtream-codes-iptv/iptv-pro: merge remote into repo
[Wed Jun 03 05:07:28 2015] [error] INFO:weblate:xtream-codes-iptv/iptv-pro: merge remote into repo
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'edit_bouquet' in :413, first occurrence in line 406
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'delete_bouquet' in :414, first occurrence in line 412
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'manage_packages' in :530, first occurrence in line 211
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'connections' in :555, first occurrence in line 341
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'stream_name' in :628, first occurrence in line 197
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'notes' in :630, first occurrence in line 545
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'edit_epg' in :637, first occurrence in line 235
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'connections' in :679, first occurrence in line 341
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'cast' in :726, first occurrence in line 716
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'edit_user' in :765, first occurrence in line 466
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'group_exists' in :801, first occurrence in line 100
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'user_kicked' in :815, first occurrence in line 654
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'connection_killed' in :821, first occurrence in line 770
[Wed Jun 03 05:07:28 2015] [error] ERROR:root:Duplicate key $_LANG->'remove_argument' in :922, first occurrence in line 364
[Wed Jun 03 01:07:29 2015] [error] [client 80.246.130.135] File does not exist: /usr/lib/python2.7/dist-packages/django/contrib/admin/static/admin/js/related-widget-wrapper.js, referer: http://translate.xtream-codes.com/admin/trans/subproject/add/
[Wed Jun 03 01:07:29 2015] [error] [client 80.246.130.135] File does not exist: /usr/lib/python2.7/dist-packages/django/contrib/admin/static/admin/js/related-widget-wrapper.js, referer: http://translate.xtream-codes.com/admin/trans/subproject/add/
Indeed, there are duplicates... Still, this should not be a problem, right?
<bountysource-plugin>
---
Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/19966805-unable-to-add-a-complex-php-file?utm_campaign=plugin&utm_content=tracker%2F253393&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F253393&utm_medium=issues&utm_source=github).
</bountysource-plugin> | non_test | unable to add a complex php file hello there according to i should be able to use as main translation file in a sub project unfortunately every time when i try with different configurations it fail adding the file and create the subproject mainly i receive error messages when changing the parameter file format when i set it to automatic detection the error format of matched files could not be recognized english php pops up the error messages in error log are info xtream codes iptv iptv pro updating repository info weblate xtream codes iptv iptv pro updating repository info xtream codes iptv iptv pro update took seconds info weblate xtream codes iptv iptv pro update took seconds debug xtream codes iptv iptv pro update fetching origin debug weblate xtream codes iptv iptv pro update fetching origin info xtream codes iptv iptv pro updating repository info weblate xtream codes iptv iptv pro updating repository info xtream codes iptv iptv pro update took seconds info weblate xtream codes iptv iptv pro update took seconds debug xtream codes iptv iptv pro update fetching origin debug weblate xtream codes iptv iptv pro update fetching origin info xtream codes iptv iptv pro merge remote into repo info weblate xtream codes iptv iptv pro merge remote into repo file does not exist usr lib dist packages django contrib admin static admin js related widget wrapper js referer when i set it to php strings the error message i see in the web is chosen file format does not support adding new translations as chosen in project settings the error message i see in error log is info xtream codes iptv iptv pro updating repository info weblate xtream codes iptv iptv pro updating repository info xtream codes iptv iptv pro update took seconds info weblate xtream codes iptv iptv pro update took seconds debug xtream codes iptv iptv pro update fetching origin debug weblate xtream codes iptv iptv pro update fetching origin info xtream codes iptv iptv pro updating repository info weblate xtream codes iptv iptv pro updating repository info xtream codes iptv iptv pro update took seconds info weblate xtream codes iptv iptv pro update took seconds debug xtream codes iptv iptv pro update fetching origin debug weblate xtream codes iptv iptv pro update fetching origin info xtream codes iptv iptv pro merge remote into repo info weblate xtream codes iptv iptv pro merge remote into repo error root duplicate key lang edit bouquet in first occurrence in line error root duplicate key lang delete bouquet in first occurrence in line error root duplicate key lang manage packages in first occurrence in line error root duplicate key lang connections in first occurrence in line error root duplicate key lang stream name in first occurrence in line error root duplicate key lang notes in first occurrence in line error root duplicate key lang edit epg in first occurrence in line error root duplicate key lang connections in first occurrence in line error root duplicate key lang cast in first occurrence in line error root duplicate key lang edit user in first occurrence in line error root duplicate key lang group exists in first occurrence in line error root duplicate key lang user kicked in first occurrence in line error root duplicate key lang connection killed in first occurrence in line error root duplicate key lang remove argument in first occurrence in line file does not exist usr lib dist packages django contrib admin static admin js related widget wrapper js referer file does not exist usr lib dist packages django contrib admin static admin js related widget wrapper js referer indeed there are duplicates still this should not be a problem right want to back this issue we accept bounties via | 0 |
232,339 | 18,869,561,927 | IssuesEvent | 2021-11-13 00:43:48 | danilok/instalura | https://api.github.com/repos/danilok/instalura | closed | Teste de integração de criação de imagem | test | Criar um Teste no cypress fazendo o fluxo de adicionar uma imagem no Feed | 1.0 | Teste de integração de criação de imagem - Criar um Teste no cypress fazendo o fluxo de adicionar uma imagem no Feed | test | teste de integração de criação de imagem criar um teste no cypress fazendo o fluxo de adicionar uma imagem no feed | 1 |
235,616 | 19,405,111,383 | IssuesEvent | 2021-12-19 21:31:06 | ROCmSoftwarePlatform/MIOpen | https://api.github.com/repos/ROCmSoftwarePlatform/MIOpen | closed | WORKAROUND_ISSUE_1317 must disable `test_regression_opencl_float_mi100` | urgency_blocker testing | WORKAROUND_ISSUE_1317 must also disable `test_regression_opencl_float_mi100` which is intended to test some NCHW configs on OCL BE with `ConvAsmImplicitGemmGTCDynamicWrwXdlops` (see #1012). The reason is that PR totally disables `ConvAsmImplicitGemmGTCDynamic*Xdlops` for NCHW && OCL.
_Originally posted by @atamazov in https://github.com/ROCmSoftwarePlatform/MIOpen/issues/1321#issuecomment-997294924_
:warning: Otherwise some false failure may happen during testing. | 1.0 | WORKAROUND_ISSUE_1317 must disable `test_regression_opencl_float_mi100` - WORKAROUND_ISSUE_1317 must also disable `test_regression_opencl_float_mi100` which is intended to test some NCHW configs on OCL BE with `ConvAsmImplicitGemmGTCDynamicWrwXdlops` (see #1012). The reason is that PR totally disables `ConvAsmImplicitGemmGTCDynamic*Xdlops` for NCHW && OCL.
_Originally posted by @atamazov in https://github.com/ROCmSoftwarePlatform/MIOpen/issues/1321#issuecomment-997294924_
:warning: Otherwise some false failure may happen during testing. | test | workaround issue must disable test regression opencl float workaround issue must also disable test regression opencl float which is intended to test some nchw configs on ocl be with convasmimplicitgemmgtcdynamicwrwxdlops see the reason is that pr totally disables convasmimplicitgemmgtcdynamic xdlops for nchw ocl originally posted by atamazov in warning otherwise some false failure may happen during testing | 1 |
6,341 | 14,268,585,441 | IssuesEvent | 2020-11-20 22:48:39 | octue/octue-sdk-python | https://api.github.com/repos/octue/octue-sdk-python | closed | CLI raises TypeError when running an app from IDE | architecture decision needed dependencies devops experience (UX) | While running octue 0.1.3 app from IDE:
```
python app.py run
```
Traceback (most recent call last):
File "app.py", line 56, in <module>
octue_cli(args)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 829, in __call__
return self.main(*args, **kwargs)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 782, in main
rv = self.invoke(ctx)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 1256, in invoke
Command.invoke(self, ctx)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 1066, in invoke
return ctx.invoke(self.callback, **ctx.params)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 610, in invoke
return callback(*args, **kwargs)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/decorators.py", line 21, in new_func
return f(get_current_context(), *args, **kwargs)
TypeError: octue_cli() missing 3 required positional arguments: 'data_dir', 'input_dir', and 'tmp_dir' | 1.0 | CLI raises TypeError when running an app from IDE - While running octue 0.1.3 app from IDE:
```
python app.py run
```
Traceback (most recent call last):
File "app.py", line 56, in <module>
octue_cli(args)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 829, in __call__
return self.main(*args, **kwargs)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 782, in main
rv = self.invoke(ctx)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 1256, in invoke
Command.invoke(self, ctx)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 1066, in invoke
return ctx.invoke(self.callback, **ctx.params)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/core.py", line 610, in invoke
return callback(*args, **kwargs)
File "/home/batman/Software/anaconda3/envs/foam_2d_twine/lib/python3.8/site-packages/click/decorators.py", line 21, in new_func
return f(get_current_context(), *args, **kwargs)
TypeError: octue_cli() missing 3 required positional arguments: 'data_dir', 'input_dir', and 'tmp_dir' | non_test | cli raises typeerror when running an app from ide while running octue app from ide python app py run traceback most recent call last file app py line in octue cli args file home batman software envs foam twine lib site packages click core py line in call return self main args kwargs file home batman software envs foam twine lib site packages click core py line in main rv self invoke ctx file home batman software envs foam twine lib site packages click core py line in invoke command invoke self ctx file home batman software envs foam twine lib site packages click core py line in invoke return ctx invoke self callback ctx params file home batman software envs foam twine lib site packages click core py line in invoke return callback args kwargs file home batman software envs foam twine lib site packages click decorators py line in new func return f get current context args kwargs typeerror octue cli missing required positional arguments data dir input dir and tmp dir | 0 |
120,557 | 10,128,153,059 | IssuesEvent | 2019-08-01 12:05:36 | Optum/mockiato | https://api.github.com/repos/Optum/mockiato | closed | Live invocation details not getting reflected in the Archive services on Deleting a service from Service History Page. | ready for testing | Also on restoring an Archive services the Live invocation details do not reflect back in the restored services. | 1.0 | Live invocation details not getting reflected in the Archive services on Deleting a service from Service History Page. - Also on restoring an Archive services the Live invocation details do not reflect back in the restored services. | test | live invocation details not getting reflected in the archive services on deleting a service from service history page also on restoring an archive services the live invocation details do not reflect back in the restored services | 1 |
193,782 | 6,888,084,022 | IssuesEvent | 2017-11-22 03:23:47 | Glavin001/atom-beautify | https://api.github.com/repos/Glavin001/atom-beautify | closed | Refactor beautify on save to take advantage of onWillSave allowing async | enhancement high priority published | # Description
Referencing @Glavin001 's question here: https://discuss.atom.io/t/best-way-to-change-the-texteditor-textbuffer-on-save-when-my-function-is-asynchronous/43531. The `onWillSave` callback function now looks for a returned promise, and will not save the buffer until the promise is resolved. Atom Beautify's beautify on save feature should make use of this.
This will require significant code changes of core atom-beautify code, but will result in performance improvements as well as less code. This will also require users to be on Atom 1.21 or higher, so have to make sure package.json atom engine version is also updated.
# Checklist
I have:
- [ ] Tried uninstalling and reinstalling Atom Beautify to ensure it installed properly
- [ ] Reloaded (or restarted) Atom to ensure it is not a caching issue
- [ ] Searched through existing Atom Beautify Issues at https://github.com/Glavin001/atom-beautify/issues
so I know this is not a duplicate issue
- [ ] Filled out the Input, Expected, and Actual sections above or have edited/removed them in a way that fully describes the issue.
- [ ] Generated debugging information by executing `Atom Beautify: Help Debug Editor` command in Atom and added link for `debug.md` Gist to this issue
| 1.0 | Refactor beautify on save to take advantage of onWillSave allowing async - # Description
Referencing @Glavin001 's question here: https://discuss.atom.io/t/best-way-to-change-the-texteditor-textbuffer-on-save-when-my-function-is-asynchronous/43531. The `onWillSave` callback function now looks for a returned promise, and will not save the buffer until the promise is resolved. Atom Beautify's beautify on save feature should make use of this.
This will require significant code changes of core atom-beautify code, but will result in performance improvements as well as less code. This will also require users to be on Atom 1.21 or higher, so have to make sure package.json atom engine version is also updated.
# Checklist
I have:
- [ ] Tried uninstalling and reinstalling Atom Beautify to ensure it installed properly
- [ ] Reloaded (or restarted) Atom to ensure it is not a caching issue
- [ ] Searched through existing Atom Beautify Issues at https://github.com/Glavin001/atom-beautify/issues
so I know this is not a duplicate issue
- [ ] Filled out the Input, Expected, and Actual sections above or have edited/removed them in a way that fully describes the issue.
- [ ] Generated debugging information by executing `Atom Beautify: Help Debug Editor` command in Atom and added link for `debug.md` Gist to this issue
| non_test | refactor beautify on save to take advantage of onwillsave allowing async description referencing s question here the onwillsave callback function now looks for a returned promise and will not save the buffer until the promise is resolved atom beautify s beautify on save feature should make use of this this will require significant code changes of core atom beautify code but will result in performance improvements as well as less code this will also require users to be on atom or higher so have to make sure package json atom engine version is also updated checklist i have tried uninstalling and reinstalling atom beautify to ensure it installed properly reloaded or restarted atom to ensure it is not a caching issue searched through existing atom beautify issues at so i know this is not a duplicate issue filled out the input expected and actual sections above or have edited removed them in a way that fully describes the issue generated debugging information by executing atom beautify help debug editor command in atom and added link for debug md gist to this issue | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.