Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 4 112 | repo_url stringlengths 33 141 | action stringclasses 3 values | title stringlengths 1 1.02k | labels stringlengths 4 1.54k | body stringlengths 1 262k | index stringclasses 17 values | text_combine stringlengths 95 262k | label stringclasses 2 values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
99,888 | 8,714,287,713 | IssuesEvent | 2018-12-07 07:15:09 | mars-sim/mars-sim | https://api.github.com/repos/mars-sim/mars-sim | reopened | Failure to compile mars-sim-core, google guice reflection issue | maven test question | After reading up on http://maven.apache.org/guides/getting-started/index.html#How_do_I_compile_my_application_sources
I started on compiling and packaging the individual components so that they are in .m2/repository (for now) .
What I don't understand when installing why does mvn install it into /sf directory ?
just sharing the last few lines from the successful installation of mars-sim-mapdata in .m2/repository -
```
[INFO] Installing /home/shirish/games/mars-sim/mars-sim-mapdata/target/mars-sim-mapdata-3.1.0-b2.jar to /home/shirish/.m2/repository/net/sf/mars-sim/mars-sim-mapdata/3.1.0-b2/mars-sim-mapdata-3.1.0-b2.jar
[INFO] Installing /home/shirish/games/mars-sim/mars-sim-mapdata/pom.xml to /home/shirish/.m2/repository/net/sf/mars-sim/mars-sim-mapdata/3.1.0-b2/mars-sim-mapdata-3.1.0-b2.pom
[INFO] ------------------------------------------------------------------------
[INFO] BUILD SUCCESS
[INFO] ------------------------------------------------------------------------
[INFO] Total time: 8.587 s
[INFO] Finished at: 2018-09-30T08:28:42+05:30
[INFO] ------------------------------------------------------------------------
```
After this bit was done, tried compiling mars-sim-core -
```
~/games/mars-sim/mars-sim-core$ mvn compile
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by com.google.inject.internal.cglib.core.$ReflectUtils$1 (file:/usr/share/maven/lib/guice.jar) to method java.lang.ClassLoader.defineClass(java.lang.String,byte[],int,int,java.security.ProtectionDomain)
WARNING: Please consider reporting this to the maintainers of com.google.inject.internal.cglib.core.$ReflectUtils$1
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
[INFO] Scanning for projects...
[INFO]
[INFO] -------------------< net.sf.mars-sim:mars-sim-core >--------------------
[INFO] Building mars-sim-core 3.1.0-b2
[INFO] --------------------------------[ jar ]---------------------------------
Downloading from sonatype: https://oss.sonatype.org/content/repositories/releases/net/sf/mars-sim/3.1.0-b2/mars-sim-3.1.0-b2.pom
Downloading from oss.sonatype.org-snapshot: http://oss.sonatype.org/content/repositories/snapshots/net/sf/mars-sim/3.1.0-b2/mars-sim-3.1.0-b2.pom
Downloading from mars-sim: https://mars-sim.sourceforge.io/maven-repo/net/sf/mars-sim/3.1.0-b2/mars-sim-3.1.0-b2.pom
Downloading from central: https://repo.maven.apache.org/maven2/net/sf/mars-sim/3.1.0-b2/mars-sim-3.1.0-b2.pom
[INFO] ------------------------------------------------------------------------
[INFO] BUILD FAILURE
[INFO] ------------------------------------------------------------------------
[INFO] Total time: 5.750 s
[INFO] Finished at: 2018-09-30T08:29:21+05:30
[INFO] ------------------------------------------------------------------------
[ERROR] Failed to execute goal on project mars-sim-core: Could not resolve dependencies for project net.sf.mars-sim:mars-sim-core:jar:3.1.0-b2: Failed to collect dependencies at net.sf.mars-sim:mars-sim-mapdata:jar:3.1.0-b2: Failed to read artifact descriptor for net.sf.mars-sim:mars-sim-mapdata:jar:3.1.0-b2: Could not transfer artifact net.sf:mars-sim:pom:3.1.0-b2 from/to sourceforge.net (scp://shell.sourceforge.net/home/project-web/mars-sim/htdocs/maven-repo): Cannot access scp://shell.sourceforge.net/home/project-web/mars-sim/htdocs/maven-repo with type default using the available connector factories: BasicRepositoryConnectorFactory: Cannot access scp://shell.sourceforge.net/home/project-web/mars-sim/htdocs/maven-repo using the registered transporter factories: WagonTransporterFactory: java.util.NoSuchElementException
[ERROR] role: org.apache.maven.wagon.Wagon
[ERROR] roleHint: scp
[ERROR] -> [Help 1]
[ERROR]
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR]
[ERROR] For more information about the errors and possible solutions, please read the following articles:
[ERROR] [Help 1] http://cwiki.apache.org/confluence/display/MAVEN/DependencyResolutionException
```
It seems at at least from the first glance that the mars-sim-core still tries to find stuff from sourceforge.net which it shouldn't and instead should have tried to use /home/shirish/games/mars-sim/mars-sim-mapdata/target/mars-sim-mapdata-3.1.0-b2.jar instead of trying for a remote resource. | 1.0 | Failure to compile mars-sim-core, google guice reflection issue - After reading up on http://maven.apache.org/guides/getting-started/index.html#How_do_I_compile_my_application_sources
I started on compiling and packaging the individual components so that they are in .m2/repository (for now) .
What I don't understand when installing why does mvn install it into /sf directory ?
just sharing the last few lines from the successful installation of mars-sim-mapdata in .m2/repository -
```
[INFO] Installing /home/shirish/games/mars-sim/mars-sim-mapdata/target/mars-sim-mapdata-3.1.0-b2.jar to /home/shirish/.m2/repository/net/sf/mars-sim/mars-sim-mapdata/3.1.0-b2/mars-sim-mapdata-3.1.0-b2.jar
[INFO] Installing /home/shirish/games/mars-sim/mars-sim-mapdata/pom.xml to /home/shirish/.m2/repository/net/sf/mars-sim/mars-sim-mapdata/3.1.0-b2/mars-sim-mapdata-3.1.0-b2.pom
[INFO] ------------------------------------------------------------------------
[INFO] BUILD SUCCESS
[INFO] ------------------------------------------------------------------------
[INFO] Total time: 8.587 s
[INFO] Finished at: 2018-09-30T08:28:42+05:30
[INFO] ------------------------------------------------------------------------
```
After this bit was done, tried compiling mars-sim-core -
```
~/games/mars-sim/mars-sim-core$ mvn compile
WARNING: An illegal reflective access operation has occurred
WARNING: Illegal reflective access by com.google.inject.internal.cglib.core.$ReflectUtils$1 (file:/usr/share/maven/lib/guice.jar) to method java.lang.ClassLoader.defineClass(java.lang.String,byte[],int,int,java.security.ProtectionDomain)
WARNING: Please consider reporting this to the maintainers of com.google.inject.internal.cglib.core.$ReflectUtils$1
WARNING: Use --illegal-access=warn to enable warnings of further illegal reflective access operations
WARNING: All illegal access operations will be denied in a future release
[INFO] Scanning for projects...
[INFO]
[INFO] -------------------< net.sf.mars-sim:mars-sim-core >--------------------
[INFO] Building mars-sim-core 3.1.0-b2
[INFO] --------------------------------[ jar ]---------------------------------
Downloading from sonatype: https://oss.sonatype.org/content/repositories/releases/net/sf/mars-sim/3.1.0-b2/mars-sim-3.1.0-b2.pom
Downloading from oss.sonatype.org-snapshot: http://oss.sonatype.org/content/repositories/snapshots/net/sf/mars-sim/3.1.0-b2/mars-sim-3.1.0-b2.pom
Downloading from mars-sim: https://mars-sim.sourceforge.io/maven-repo/net/sf/mars-sim/3.1.0-b2/mars-sim-3.1.0-b2.pom
Downloading from central: https://repo.maven.apache.org/maven2/net/sf/mars-sim/3.1.0-b2/mars-sim-3.1.0-b2.pom
[INFO] ------------------------------------------------------------------------
[INFO] BUILD FAILURE
[INFO] ------------------------------------------------------------------------
[INFO] Total time: 5.750 s
[INFO] Finished at: 2018-09-30T08:29:21+05:30
[INFO] ------------------------------------------------------------------------
[ERROR] Failed to execute goal on project mars-sim-core: Could not resolve dependencies for project net.sf.mars-sim:mars-sim-core:jar:3.1.0-b2: Failed to collect dependencies at net.sf.mars-sim:mars-sim-mapdata:jar:3.1.0-b2: Failed to read artifact descriptor for net.sf.mars-sim:mars-sim-mapdata:jar:3.1.0-b2: Could not transfer artifact net.sf:mars-sim:pom:3.1.0-b2 from/to sourceforge.net (scp://shell.sourceforge.net/home/project-web/mars-sim/htdocs/maven-repo): Cannot access scp://shell.sourceforge.net/home/project-web/mars-sim/htdocs/maven-repo with type default using the available connector factories: BasicRepositoryConnectorFactory: Cannot access scp://shell.sourceforge.net/home/project-web/mars-sim/htdocs/maven-repo using the registered transporter factories: WagonTransporterFactory: java.util.NoSuchElementException
[ERROR] role: org.apache.maven.wagon.Wagon
[ERROR] roleHint: scp
[ERROR] -> [Help 1]
[ERROR]
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR]
[ERROR] For more information about the errors and possible solutions, please read the following articles:
[ERROR] [Help 1] http://cwiki.apache.org/confluence/display/MAVEN/DependencyResolutionException
```
It seems at at least from the first glance that the mars-sim-core still tries to find stuff from sourceforge.net which it shouldn't and instead should have tried to use /home/shirish/games/mars-sim/mars-sim-mapdata/target/mars-sim-mapdata-3.1.0-b2.jar instead of trying for a remote resource. | test | failure to compile mars sim core google guice reflection issue after reading up on i started on compiling and packaging the individual components so that they are in repository for now what i don t understand when installing why does mvn install it into sf directory just sharing the last few lines from the successful installation of mars sim mapdata in repository installing home shirish games mars sim mars sim mapdata target mars sim mapdata jar to home shirish repository net sf mars sim mars sim mapdata mars sim mapdata jar installing home shirish games mars sim mars sim mapdata pom xml to home shirish repository net sf mars sim mars sim mapdata mars sim mapdata pom build success total time s finished at after this bit was done tried compiling mars sim core games mars sim mars sim core mvn compile warning an illegal reflective access operation has occurred warning illegal reflective access by com google inject internal cglib core reflectutils file usr share maven lib guice jar to method java lang classloader defineclass java lang string byte int int java security protectiondomain warning please consider reporting this to the maintainers of com google inject internal cglib core reflectutils warning use illegal access warn to enable warnings of further illegal reflective access operations warning all illegal access operations will be denied in a future release scanning for projects building mars sim core downloading from sonatype downloading from oss sonatype org snapshot downloading from mars sim downloading from central build failure total time s finished at failed to execute goal on project mars sim core could not resolve dependencies for project net sf mars sim mars sim core jar failed to collect dependencies at net sf mars sim mars sim mapdata jar failed to read artifact descriptor for net sf mars sim mars sim mapdata jar could not transfer artifact net sf mars sim pom from to sourceforge net scp shell sourceforge net home project web mars sim htdocs maven repo cannot access scp shell sourceforge net home project web mars sim htdocs maven repo with type default using the available connector factories basicrepositoryconnectorfactory cannot access scp shell sourceforge net home project web mars sim htdocs maven repo using the registered transporter factories wagontransporterfactory java util nosuchelementexception role org apache maven wagon wagon rolehint scp to see the full stack trace of the errors re run maven with the e switch re run maven using the x switch to enable full debug logging for more information about the errors and possible solutions please read the following articles it seems at at least from the first glance that the mars sim core still tries to find stuff from sourceforge net which it shouldn t and instead should have tried to use home shirish games mars sim mars sim mapdata target mars sim mapdata jar instead of trying for a remote resource | 1 |
190,354 | 14,543,079,887 | IssuesEvent | 2020-12-15 16:27:19 | dmwm/WMCore | https://api.github.com/repos/dmwm/WMCore | closed | Mock Rucio Service class unit tests | Low Priority Rucio Transition Unittest | Just as we do for PhEDEx, we should mock the Rucio data and unit tests to avoid hammering the service from the WMCore CI infrastructure and make sure the tests won't be affected by any glitch or instabilities in the service. | 1.0 | Mock Rucio Service class unit tests - Just as we do for PhEDEx, we should mock the Rucio data and unit tests to avoid hammering the service from the WMCore CI infrastructure and make sure the tests won't be affected by any glitch or instabilities in the service. | test | mock rucio service class unit tests just as we do for phedex we should mock the rucio data and unit tests to avoid hammering the service from the wmcore ci infrastructure and make sure the tests won t be affected by any glitch or instabilities in the service | 1 |
202,247 | 15,277,944,916 | IssuesEvent | 2021-02-23 00:22:10 | Peppermint-Lab/Peppermint | https://api.github.com/repos/Peppermint-Lab/Peppermint | closed | Invalid login causes redirect to main page and does't display error message | Complete - Awaiting release into latest Version enhancement good first issue | Click on `Log in` button always leads to redirect and newer displays error:
```
<Button
...
onClick={() => {
onSubmit();
setTimeout(() => history.push("/"), 1000);
}}
>
```
A better way is to block login button while request is sending and then redirect user or display error without refreshing and don't clean values in form. Antd buttons have `loading` attribute that looks good for this goal. | 1.0 | Invalid login causes redirect to main page and does't display error message - Click on `Log in` button always leads to redirect and newer displays error:
```
<Button
...
onClick={() => {
onSubmit();
setTimeout(() => history.push("/"), 1000);
}}
>
```
A better way is to block login button while request is sending and then redirect user or display error without refreshing and don't clean values in form. Antd buttons have `loading` attribute that looks good for this goal. | test | invalid login causes redirect to main page and does t display error message click on log in button always leads to redirect and newer displays error button onclick onsubmit settimeout history push a better way is to block login button while request is sending and then redirect user or display error without refreshing and don t clean values in form antd buttons have loading attribute that looks good for this goal | 1 |
30,039 | 14,381,502,394 | IssuesEvent | 2020-12-02 05:33:44 | ConsenSys/teku | https://api.github.com/repos/ConsenSys/teku | closed | Avoid requesting fork info multiple times | P4 bug 🐞 performance 🚀 | ### Description
When the remote validator client starts up, it requests the fork info many, many times (I suspect once per validator). We should coalesce these requests into a single one.
```
duties for epoch 1450","throwable":""}
{"timestamp":"2020-11-24T22:38:19,043","level":"TRACE","thread":"ValidatorTimingChannel-0","class":"AbstractDutyLoader","message":"Requesting attestation duties for epoch 1450","throwable":""}
{"timestamp":"2020-11-24T22:38:22,223","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/validator/duties/proposer/1449 200","throwable":""}
{"timestamp":"2020-11-24T22:38:23,535","level":"TRACE","thread":"validator-async-4","class":"OkHttpValidatorRestApiClient","message":"POST http://127.0.0.1:5051/eth/v1/validator/duties/attester/1449 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,020","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/genesis 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,024","level":"TRACE","thread":"validator-async-2","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,028","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,037","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,080","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,083","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,086","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,088","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,092","level":"TRACE","thread":"validator-async-2","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,096","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,099","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,102","level":"TRACE","thread":"validator-async-2","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,117","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,118","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
<many many more>
``` | True | Avoid requesting fork info multiple times - ### Description
When the remote validator client starts up, it requests the fork info many, many times (I suspect once per validator). We should coalesce these requests into a single one.
```
duties for epoch 1450","throwable":""}
{"timestamp":"2020-11-24T22:38:19,043","level":"TRACE","thread":"ValidatorTimingChannel-0","class":"AbstractDutyLoader","message":"Requesting attestation duties for epoch 1450","throwable":""}
{"timestamp":"2020-11-24T22:38:22,223","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/validator/duties/proposer/1449 200","throwable":""}
{"timestamp":"2020-11-24T22:38:23,535","level":"TRACE","thread":"validator-async-4","class":"OkHttpValidatorRestApiClient","message":"POST http://127.0.0.1:5051/eth/v1/validator/duties/attester/1449 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,020","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/genesis 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,024","level":"TRACE","thread":"validator-async-2","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,028","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,037","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,080","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,083","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,086","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,088","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,092","level":"TRACE","thread":"validator-async-2","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,096","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,099","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,102","level":"TRACE","thread":"validator-async-2","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,117","level":"TRACE","thread":"validator-async-0","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
{"timestamp":"2020-11-24T22:38:24,118","level":"TRACE","thread":"validator-async-3","class":"OkHttpValidatorRestApiClient","message":"GET http://127.0.0.1:5051/eth/v1/beacon/states/head/fork 200","throwable":""}
<many many more>
``` | non_test | avoid requesting fork info multiple times description when the remote validator client starts up it requests the fork info many many times i suspect once per validator we should coalesce these requests into a single one duties for epoch throwable timestamp level trace thread validatortimingchannel class abstractdutyloader message requesting attestation duties for epoch throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message post throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable timestamp level trace thread validator async class okhttpvalidatorrestapiclient message get throwable | 0 |
100,092 | 30,613,197,909 | IssuesEvent | 2023-07-23 21:40:08 | NixOS/nixpkgs | https://api.github.com/repos/NixOS/nixpkgs | closed | Build failure: tp_smapi | 0.kind: build failure | ### Steps To Reproduce
Steps to reproduce the behavior:
1. run `sudo nixos-rebuild switch --flake git+https://git.sual.in/casual/nixos-devices.git` on old thinkpad
### Build log
```
sudo nixos-rebuild switch --flake git+https://git.sual.in/casual/nixos-devices.git
building the system configuration...
error: builder for '/nix/store/jvvg6n6k326v2l22i6zx0khffbx7qvwd-tp_smapi-0.43-6.4.1.drv' failed with exit code 2;
last 10 log lines:
> | ^~~~~~~~~~~
> /build/tp-smapi-0.43/tp_smapi.c: At top level:
> /build/tp-smapi-0.43/tp_smapi.c:115:8: warning: 'DEFINE_SEMAPHORE' defined but not used [8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wunused-variable-Wunused-variable8;;]
> 115 | static DEFINE_SEMAPHORE(smapi_mutex);
> | ^~~~~~~~~~~~~~~~
> cc1: some warnings being treated as errors
> make[2]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/scripts/Makefile.build:252: /build/tp-smapi-0.43/tp_smapi.o] Error 1
> make[1]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/Makefile:2024: /build/tp-smapi-0.43] Error 2
> make[1]: Leaving directory '/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/build'
> make: *** [Makefile:46: modules] Error 2
For full logs, run 'nix log /nix/store/jvvg6n6k326v2l22i6zx0khffbx7qvwd-tp_smapi-0.43-6.4.1.drv'.
error: 1 dependencies of derivation '/nix/store/qv0nlq4904ymx1gsz1ywx5iysh0xa6hg-kernel-modules.drv' failed to build
error: 1 dependencies of derivation '/nix/store/ffl8bnics12ycmy7czml17a7cjxln97g-linux-6.4.1-modules.drv' failed to build
error: 1 dependencies of derivation '/nix/store/gp6f39px43r6nhxq8y3dy72fcg69yj06-nixos-system-Thinking-23.11.20230706.3c74875.drv' failed to build
[root@Thinking:/home/casual]# nix log /nix/store/jvvg6n6k326v2l22i6zx0khffbx7qvwd-tp_smapi-0.43-6.4.1.drv
@nix { "action": "setPhase", "phase": "unpackPhase" }
unpacking sources
unpacking source archive /nix/store/kpnl1b6qvi38gy7blh0k68gzdfzh08wq-tp-smapi-0.43
source root is tp-smapi-0.43
@nix { "action": "setPhase", "phase": "patchPhase" }
patching sources
@nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" }
updateAutotoolsGnuConfigScriptsPhase
@nix { "action": "setPhase", "phase": "configurePhase" }
configuring
no configure script, doing nothing
@nix { "action": "setPhase", "phase": "buildPhase" }
building
build flags: -j4 SHELL=/nix/store/51sszqz1d9kpx480scb1vllc00kxlx79-bash-5.2-p15/bin/bash KBASE=/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1->
make -C /nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/build M=/build/tp-smapi-0.43 O=/nix/store/l45kxrj5wsc71lz3mp>
make[1]: Entering directory '/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/build'
CC [M] /build/tp-smapi-0.43/thinkpad_ec.o
CC [M] /build/tp-smapi-0.43/tp_smapi.o
CC [M] /build/tp-smapi-0.43/hdaps.o
/build/tp-smapi-0.43/thinkpad_ec.c:94:42: error: macro "DEFINE_SEMAPHORE" requires 2 arguments, but only 1 given
94 | static DEFINE_SEMAPHORE(thinkpad_ec_mutex);
| ^
In file included from /build/tp-smapi-0.43/thinkpad_ec.c:45:
/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/include/linux/semaphore.h:34: note: macro "DEFINE_SEMAPHORE" >
34 | #define DEFINE_SEMAPHORE(_name, _n) \
|
/build/tp-smapi-0.43/thinkpad_ec.c:94:8: error: type defaults to 'int' in declaration of 'DEFINE_SEMAPHORE' [-Werror=implicit-int]
94 | static DEFINE_SEMAPHORE(thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~
/build/tp-smapi-0.43/thinkpad_ec.c: In function 'thinkpad_ec_lock':
/build/tp-smapi-0.43/thinkpad_ec.c:112:35: error: 'thinkpad_ec_mutex' undeclared (first use in this function); did you mean 'thinkpad_ec_lock'?
112 | ret = down_interruptible(&thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~~
| thinkpad_ec_lock
/build/tp-smapi-0.43/thinkpad_ec.c:112:35: note: each undeclared identifier is reported only once for each function it appears in
/build/tp-smapi-0.43/thinkpad_ec.c: In function 'thinkpad_ec_try_lock':
/build/tp-smapi-0.43/thinkpad_ec.c:126:30: error: 'thinkpad_ec_mutex' undeclared (first use in this function); did you mean 'thinkpad_ec_lock'?
126 | return down_trylock(&thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~~
| thinkpad_ec_lock
/build/tp-smapi-0.43/thinkpad_ec.c: In function 'thinkpad_ec_unlock':
/build/tp-smapi-0.43/thinkpad_ec.c:138:13: error: 'thinkpad_ec_mutex' undeclared (first use in this function); did you mean 'thinkpad_ec_lock'?
138 | up(&thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~~
| thinkpad_ec_lock
/build/tp-smapi-0.43/thinkpad_ec.c: In function 'thinkpad_ec_try_lock':
/build/tp-smapi-0.43/thinkpad_ec.c:127:1: error: control reaches end of non-void function [-Werror=return-type]
127 | }
| ^
/build/tp-smapi-0.43/thinkpad_ec.c: At top level:
/build/tp-smapi-0.43/thinkpad_ec.c:94:8: warning: 'DEFINE_SEMAPHORE' defined but not used [-Wunused-variable]
94 | static DEFINE_SEMAPHORE(thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~
cc1: some warnings being treated as errors
make[2]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/scripts/Makefile.build:252: /build/tp-smapi-0.4>
make[2]: *** Waiting for unfinished jobs....
/build/tp-smapi-0.43/tp_smapi.c:115:36: error: macro "DEFINE_SEMAPHORE" requires 2 arguments, but only 1 given
115 | static DEFINE_SEMAPHORE(smapi_mutex);
| ^
In file included from /nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/include/linux/fs.h:25,
from /nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/include/linux/proc_fs.h:10,
from /build/tp-smapi-0.43/tp_smapi.c:41:
/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/include/linux/semaphore.h:34: note: macro "DEFINE_SEMAPHORE" >
34 | #define DEFINE_SEMAPHORE(_name, _n) \
|
/build/tp-smapi-0.43/tp_smapi.c:115:8: error: type defaults to 'int' in declaration of 'DEFINE_SEMAPHORE' [-Werror=implicit-int]
115 | static DEFINE_SEMAPHORE(smapi_mutex);
| ^~~~~~~~~~~~~~~~
/build/tp-smapi-0.43/tp_smapi.c: In function 'store_battery_start_charge_thresh':
/build/tp-smapi-0.43/tp_smapi.c:780:15: error: 'smapi_mutex' undeclared (first use in this function)
780 | down(&smapi_mutex);
| ^~~~~~~~~~~
/build/tp-smapi-0.43/tp_smapi.c:780:15: note: each undeclared identifier is reported only once for each function it appears in
/build/tp-smapi-0.43/tp_smapi.c: In function 'store_battery_stop_charge_thresh':
/build/tp-smapi-0.43/tp_smapi.c:822:15: error: 'smapi_mutex' undeclared (first use in this function)
822 | down(&smapi_mutex);
| ^~~~~~~~~~~
/build/tp-smapi-0.43/tp_smapi.c: At top level:
/build/tp-smapi-0.43/tp_smapi.c:115:8: warning: 'DEFINE_SEMAPHORE' defined but not used [-Wunused-variable]
115 | static DEFINE_SEMAPHORE(smapi_mutex);
| ^~~~~~~~~~~~~~~~
cc1: some warnings being treated as errors
make[2]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/scripts/Makefile.build:252: /build/tp-smapi-0.4>
make[1]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/Makefile:2024: /build/tp-smapi-0.43] Error 2
make[1]: Leaving directory '/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/build'
make: *** [Makefile:46: modules] Error 2
```
### Additional context
Device: Thinkpad X220
### Notify maintainers
<!--
Please @ people who are in the `meta.maintainers` list of the offending package or module.
If in doubt, check `git blame` for whoever last touched something.
-->
### Metadata
Please run `nix-shell -p nix-info --run "nix-info -m"` and paste the result.
```console
[user@system:~]$ nix-shell -p nix-info --run "nix-info -m"
- system: `"x86_64-linux"`
- host os: `Linux 6.3.1-zen1, NixOS, 23.11 (Tapir), 23.11.20230523.d30264c`
- multi-user?: `yes`
- sandbox: `yes`
- version: `nix-env (Nix) 2.13.3`
- nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos`
```
| 1.0 | Build failure: tp_smapi - ### Steps To Reproduce
Steps to reproduce the behavior:
1. run `sudo nixos-rebuild switch --flake git+https://git.sual.in/casual/nixos-devices.git` on old thinkpad
### Build log
```
sudo nixos-rebuild switch --flake git+https://git.sual.in/casual/nixos-devices.git
building the system configuration...
error: builder for '/nix/store/jvvg6n6k326v2l22i6zx0khffbx7qvwd-tp_smapi-0.43-6.4.1.drv' failed with exit code 2;
last 10 log lines:
> | ^~~~~~~~~~~
> /build/tp-smapi-0.43/tp_smapi.c: At top level:
> /build/tp-smapi-0.43/tp_smapi.c:115:8: warning: 'DEFINE_SEMAPHORE' defined but not used [8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wunused-variable-Wunused-variable8;;]
> 115 | static DEFINE_SEMAPHORE(smapi_mutex);
> | ^~~~~~~~~~~~~~~~
> cc1: some warnings being treated as errors
> make[2]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/scripts/Makefile.build:252: /build/tp-smapi-0.43/tp_smapi.o] Error 1
> make[1]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/Makefile:2024: /build/tp-smapi-0.43] Error 2
> make[1]: Leaving directory '/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/build'
> make: *** [Makefile:46: modules] Error 2
For full logs, run 'nix log /nix/store/jvvg6n6k326v2l22i6zx0khffbx7qvwd-tp_smapi-0.43-6.4.1.drv'.
error: 1 dependencies of derivation '/nix/store/qv0nlq4904ymx1gsz1ywx5iysh0xa6hg-kernel-modules.drv' failed to build
error: 1 dependencies of derivation '/nix/store/ffl8bnics12ycmy7czml17a7cjxln97g-linux-6.4.1-modules.drv' failed to build
error: 1 dependencies of derivation '/nix/store/gp6f39px43r6nhxq8y3dy72fcg69yj06-nixos-system-Thinking-23.11.20230706.3c74875.drv' failed to build
[root@Thinking:/home/casual]# nix log /nix/store/jvvg6n6k326v2l22i6zx0khffbx7qvwd-tp_smapi-0.43-6.4.1.drv
@nix { "action": "setPhase", "phase": "unpackPhase" }
unpacking sources
unpacking source archive /nix/store/kpnl1b6qvi38gy7blh0k68gzdfzh08wq-tp-smapi-0.43
source root is tp-smapi-0.43
@nix { "action": "setPhase", "phase": "patchPhase" }
patching sources
@nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" }
updateAutotoolsGnuConfigScriptsPhase
@nix { "action": "setPhase", "phase": "configurePhase" }
configuring
no configure script, doing nothing
@nix { "action": "setPhase", "phase": "buildPhase" }
building
build flags: -j4 SHELL=/nix/store/51sszqz1d9kpx480scb1vllc00kxlx79-bash-5.2-p15/bin/bash KBASE=/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1->
make -C /nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/build M=/build/tp-smapi-0.43 O=/nix/store/l45kxrj5wsc71lz3mp>
make[1]: Entering directory '/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/build'
CC [M] /build/tp-smapi-0.43/thinkpad_ec.o
CC [M] /build/tp-smapi-0.43/tp_smapi.o
CC [M] /build/tp-smapi-0.43/hdaps.o
/build/tp-smapi-0.43/thinkpad_ec.c:94:42: error: macro "DEFINE_SEMAPHORE" requires 2 arguments, but only 1 given
94 | static DEFINE_SEMAPHORE(thinkpad_ec_mutex);
| ^
In file included from /build/tp-smapi-0.43/thinkpad_ec.c:45:
/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/include/linux/semaphore.h:34: note: macro "DEFINE_SEMAPHORE" >
34 | #define DEFINE_SEMAPHORE(_name, _n) \
|
/build/tp-smapi-0.43/thinkpad_ec.c:94:8: error: type defaults to 'int' in declaration of 'DEFINE_SEMAPHORE' [-Werror=implicit-int]
94 | static DEFINE_SEMAPHORE(thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~
/build/tp-smapi-0.43/thinkpad_ec.c: In function 'thinkpad_ec_lock':
/build/tp-smapi-0.43/thinkpad_ec.c:112:35: error: 'thinkpad_ec_mutex' undeclared (first use in this function); did you mean 'thinkpad_ec_lock'?
112 | ret = down_interruptible(&thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~~
| thinkpad_ec_lock
/build/tp-smapi-0.43/thinkpad_ec.c:112:35: note: each undeclared identifier is reported only once for each function it appears in
/build/tp-smapi-0.43/thinkpad_ec.c: In function 'thinkpad_ec_try_lock':
/build/tp-smapi-0.43/thinkpad_ec.c:126:30: error: 'thinkpad_ec_mutex' undeclared (first use in this function); did you mean 'thinkpad_ec_lock'?
126 | return down_trylock(&thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~~
| thinkpad_ec_lock
/build/tp-smapi-0.43/thinkpad_ec.c: In function 'thinkpad_ec_unlock':
/build/tp-smapi-0.43/thinkpad_ec.c:138:13: error: 'thinkpad_ec_mutex' undeclared (first use in this function); did you mean 'thinkpad_ec_lock'?
138 | up(&thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~~
| thinkpad_ec_lock
/build/tp-smapi-0.43/thinkpad_ec.c: In function 'thinkpad_ec_try_lock':
/build/tp-smapi-0.43/thinkpad_ec.c:127:1: error: control reaches end of non-void function [-Werror=return-type]
127 | }
| ^
/build/tp-smapi-0.43/thinkpad_ec.c: At top level:
/build/tp-smapi-0.43/thinkpad_ec.c:94:8: warning: 'DEFINE_SEMAPHORE' defined but not used [-Wunused-variable]
94 | static DEFINE_SEMAPHORE(thinkpad_ec_mutex);
| ^~~~~~~~~~~~~~~~
cc1: some warnings being treated as errors
make[2]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/scripts/Makefile.build:252: /build/tp-smapi-0.4>
make[2]: *** Waiting for unfinished jobs....
/build/tp-smapi-0.43/tp_smapi.c:115:36: error: macro "DEFINE_SEMAPHORE" requires 2 arguments, but only 1 given
115 | static DEFINE_SEMAPHORE(smapi_mutex);
| ^
In file included from /nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/include/linux/fs.h:25,
from /nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/include/linux/proc_fs.h:10,
from /build/tp-smapi-0.43/tp_smapi.c:41:
/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/include/linux/semaphore.h:34: note: macro "DEFINE_SEMAPHORE" >
34 | #define DEFINE_SEMAPHORE(_name, _n) \
|
/build/tp-smapi-0.43/tp_smapi.c:115:8: error: type defaults to 'int' in declaration of 'DEFINE_SEMAPHORE' [-Werror=implicit-int]
115 | static DEFINE_SEMAPHORE(smapi_mutex);
| ^~~~~~~~~~~~~~~~
/build/tp-smapi-0.43/tp_smapi.c: In function 'store_battery_start_charge_thresh':
/build/tp-smapi-0.43/tp_smapi.c:780:15: error: 'smapi_mutex' undeclared (first use in this function)
780 | down(&smapi_mutex);
| ^~~~~~~~~~~
/build/tp-smapi-0.43/tp_smapi.c:780:15: note: each undeclared identifier is reported only once for each function it appears in
/build/tp-smapi-0.43/tp_smapi.c: In function 'store_battery_stop_charge_thresh':
/build/tp-smapi-0.43/tp_smapi.c:822:15: error: 'smapi_mutex' undeclared (first use in this function)
822 | down(&smapi_mutex);
| ^~~~~~~~~~~
/build/tp-smapi-0.43/tp_smapi.c: At top level:
/build/tp-smapi-0.43/tp_smapi.c:115:8: warning: 'DEFINE_SEMAPHORE' defined but not used [-Wunused-variable]
115 | static DEFINE_SEMAPHORE(smapi_mutex);
| ^~~~~~~~~~~~~~~~
cc1: some warnings being treated as errors
make[2]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/scripts/Makefile.build:252: /build/tp-smapi-0.4>
make[1]: *** [/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/source/Makefile:2024: /build/tp-smapi-0.43] Error 2
make[1]: Leaving directory '/nix/store/l45kxrj5wsc71lz3mpap21mf7bk5ihrs-linux-6.4.1-dev/lib/modules/6.4.1-zen1/build'
make: *** [Makefile:46: modules] Error 2
```
### Additional context
Device: Thinkpad X220
### Notify maintainers
<!--
Please @ people who are in the `meta.maintainers` list of the offending package or module.
If in doubt, check `git blame` for whoever last touched something.
-->
### Metadata
Please run `nix-shell -p nix-info --run "nix-info -m"` and paste the result.
```console
[user@system:~]$ nix-shell -p nix-info --run "nix-info -m"
- system: `"x86_64-linux"`
- host os: `Linux 6.3.1-zen1, NixOS, 23.11 (Tapir), 23.11.20230523.d30264c`
- multi-user?: `yes`
- sandbox: `yes`
- version: `nix-env (Nix) 2.13.3`
- nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos`
```
| non_test | build failure tp smapi steps to reproduce steps to reproduce the behavior run sudo nixos rebuild switch flake git on old thinkpad build log sudo nixos rebuild switch flake git building the system configuration error builder for nix store tp smapi drv failed with exit code last log lines build tp smapi tp smapi c at top level build tp smapi tp smapi c warning define semaphore defined but not used static define semaphore smapi mutex some warnings being treated as errors make error make error make leaving directory nix store linux dev lib modules build make error for full logs run nix log nix store tp smapi drv error dependencies of derivation nix store kernel modules drv failed to build error dependencies of derivation nix store linux modules drv failed to build error dependencies of derivation nix store nixos system thinking drv failed to build nix log nix store tp smapi drv nix action setphase phase unpackphase unpacking sources unpacking source archive nix store tp smapi source root is tp smapi nix action setphase phase patchphase patching sources nix action setphase phase updateautotoolsgnuconfigscriptsphase updateautotoolsgnuconfigscriptsphase nix action setphase phase configurephase configuring no configure script doing nothing nix action setphase phase buildphase building build flags shell nix store bash bin bash kbase nix store linux make c nix store linux dev lib modules build m build tp smapi o nix store make entering directory nix store linux dev lib modules build cc build tp smapi thinkpad ec o cc build tp smapi tp smapi o cc build tp smapi hdaps o build tp smapi thinkpad ec c error macro define semaphore requires arguments but only given static define semaphore thinkpad ec mutex in file included from build tp smapi thinkpad ec c nix store linux dev lib modules source include linux semaphore h note macro define semaphore define define semaphore name n build tp smapi thinkpad ec c error type defaults to int in declaration of define semaphore static define semaphore thinkpad ec mutex build tp smapi thinkpad ec c in function thinkpad ec lock build tp smapi thinkpad ec c error thinkpad ec mutex undeclared first use in this function did you mean thinkpad ec lock ret down interruptible thinkpad ec mutex thinkpad ec lock build tp smapi thinkpad ec c note each undeclared identifier is reported only once for each function it appears in build tp smapi thinkpad ec c in function thinkpad ec try lock build tp smapi thinkpad ec c error thinkpad ec mutex undeclared first use in this function did you mean thinkpad ec lock return down trylock thinkpad ec mutex thinkpad ec lock build tp smapi thinkpad ec c in function thinkpad ec unlock build tp smapi thinkpad ec c error thinkpad ec mutex undeclared first use in this function did you mean thinkpad ec lock up thinkpad ec mutex thinkpad ec lock build tp smapi thinkpad ec c in function thinkpad ec try lock build tp smapi thinkpad ec c error control reaches end of non void function build tp smapi thinkpad ec c at top level build tp smapi thinkpad ec c warning define semaphore defined but not used static define semaphore thinkpad ec mutex some warnings being treated as errors make nix store linux dev lib modules source scripts makefile build build tp smapi make waiting for unfinished jobs build tp smapi tp smapi c error macro define semaphore requires arguments but only given static define semaphore smapi mutex in file included from nix store linux dev lib modules source include linux fs h from nix store linux dev lib modules source include linux proc fs h from build tp smapi tp smapi c nix store linux dev lib modules source include linux semaphore h note macro define semaphore define define semaphore name n build tp smapi tp smapi c error type defaults to int in declaration of define semaphore static define semaphore smapi mutex build tp smapi tp smapi c in function store battery start charge thresh build tp smapi tp smapi c error smapi mutex undeclared first use in this function down smapi mutex build tp smapi tp smapi c note each undeclared identifier is reported only once for each function it appears in build tp smapi tp smapi c in function store battery stop charge thresh build tp smapi tp smapi c error smapi mutex undeclared first use in this function down smapi mutex build tp smapi tp smapi c at top level build tp smapi tp smapi c warning define semaphore defined but not used static define semaphore smapi mutex some warnings being treated as errors make nix store linux dev lib modules source scripts makefile build build tp smapi make error make leaving directory nix store linux dev lib modules build make error additional context device thinkpad notify maintainers please people who are in the meta maintainers list of the offending package or module if in doubt check git blame for whoever last touched something metadata please run nix shell p nix info run nix info m and paste the result console nix shell p nix info run nix info m system linux host os linux nixos tapir multi user yes sandbox yes version nix env nix nixpkgs nix var nix profiles per user root channels nixos | 0 |
245,254 | 20,756,401,586 | IssuesEvent | 2022-03-15 12:38:14 | aburrell/ocbpy | https://api.github.com/repos/aburrell/ocbpy | closed | TST: see if filecmp works on Windows | testing | **Is your feature request related to a problem? Please describe.**
Coveralls shows that the special Windows file comparison tests for SuperMAG and vorticity data are not being run, but nothing is failing in the Windows CI tests.
**Describe the solution you'd like**
Only have necessary lines of code in the unit tests.
**Describe alternatives you've considered**
Leaving things as they are.
**Additional context**
In the past, the AppVeyor system setup for earlier versions of Python didn't support filecmp. However, things improve and it might be possible to use it now. | 1.0 | TST: see if filecmp works on Windows - **Is your feature request related to a problem? Please describe.**
Coveralls shows that the special Windows file comparison tests for SuperMAG and vorticity data are not being run, but nothing is failing in the Windows CI tests.
**Describe the solution you'd like**
Only have necessary lines of code in the unit tests.
**Describe alternatives you've considered**
Leaving things as they are.
**Additional context**
In the past, the AppVeyor system setup for earlier versions of Python didn't support filecmp. However, things improve and it might be possible to use it now. | test | tst see if filecmp works on windows is your feature request related to a problem please describe coveralls shows that the special windows file comparison tests for supermag and vorticity data are not being run but nothing is failing in the windows ci tests describe the solution you d like only have necessary lines of code in the unit tests describe alternatives you ve considered leaving things as they are additional context in the past the appveyor system setup for earlier versions of python didn t support filecmp however things improve and it might be possible to use it now | 1 |
35,862 | 5,011,622,808 | IssuesEvent | 2016-12-13 08:38:03 | f2etw/jobs | https://api.github.com/repos/f2etw/jobs | opened | 【徵才】KaiOS 徵求前端工程師 | GIT unit test [F] React 年薪百萬 求才 | ## 團隊簡介/地點
[KaiOS Technologies](https://www.104.com.tw/jobbank/custjob/index.php?r=cust&j=6476492b60724f2b3648426c58343c6533e4048713a3c446d424840232323232194b504c3725j52) is a systems software company specializing in creating innovative experiences for mobile, wearable, and IoT devices. We work with industry partners around the world to enable end to end experiences connecting new users in previously untapped markets.
## 工作內容
開發/維護 KaiOS 系統上以網頁前端建置的操作環境
## 能力需求
1. Proficient understanding of web technologies, including HTML5, CSS3 and JavaScript.
2. Good understanding of code versioning tools, such as Git/Mercurial/SVN.
3. Develop new user-facing web applications/features on IoT OS.
4. Build JavaScript based framework/libraries/API on IoT OS.
5. Optimize web applications for maximum speed and scalability.
6. Basic understanding of unit/automated testing frameworks.
7. Ensure the technical feasibility of UI/UX designs.
8. Fluent in English reading/writing.
### 加分
1. React 我很熟!
2. JS unit test 我麻吉!
3. FireOS app 我寫過!
4. CI 流程交給我!
## 薪資範圍
年薪一百萬台幣以上(所得稅前)
## 工時/特休
週一~週五 每日八小時
早上九點到十點彈性上班,不用打卡
## 福利/推薦項
> 位於捷運松山線小巨蛋站旁交通便捷,明亮開放的舒適辦公環境。
訂製人體工學辦公桌椅。
自由、彈性、人性化、高科技的工作環境。
全年15天特別休假。
定期部門活動與聚餐。
通暢的組織溝通。
年度健康檢查
年度旅遊補助。
每日中餐補助。
每週五 Happy Hour 下午茶
全天供應鮮奶、現磨現煮咖啡、健康穀物、豐富飲料、可口零食。
## 聯絡方式
歡迎來信應徵
> 附簡歷/履歷 & 方便的聯絡方式、聯絡時間
前端主管: dominic.kuo@kaiostech.com
or
104 徵才頁面:
[凱歐斯通訊科技有限公司(籌備處) > Frontend Developer](https://www.104.com.tw/job/?jobno=53veq)
-----
> 代 PO | 1.0 | 【徵才】KaiOS 徵求前端工程師 - ## 團隊簡介/地點
[KaiOS Technologies](https://www.104.com.tw/jobbank/custjob/index.php?r=cust&j=6476492b60724f2b3648426c58343c6533e4048713a3c446d424840232323232194b504c3725j52) is a systems software company specializing in creating innovative experiences for mobile, wearable, and IoT devices. We work with industry partners around the world to enable end to end experiences connecting new users in previously untapped markets.
## 工作內容
開發/維護 KaiOS 系統上以網頁前端建置的操作環境
## 能力需求
1. Proficient understanding of web technologies, including HTML5, CSS3 and JavaScript.
2. Good understanding of code versioning tools, such as Git/Mercurial/SVN.
3. Develop new user-facing web applications/features on IoT OS.
4. Build JavaScript based framework/libraries/API on IoT OS.
5. Optimize web applications for maximum speed and scalability.
6. Basic understanding of unit/automated testing frameworks.
7. Ensure the technical feasibility of UI/UX designs.
8. Fluent in English reading/writing.
### 加分
1. React 我很熟!
2. JS unit test 我麻吉!
3. FireOS app 我寫過!
4. CI 流程交給我!
## 薪資範圍
年薪一百萬台幣以上(所得稅前)
## 工時/特休
週一~週五 每日八小時
早上九點到十點彈性上班,不用打卡
## 福利/推薦項
> 位於捷運松山線小巨蛋站旁交通便捷,明亮開放的舒適辦公環境。
訂製人體工學辦公桌椅。
自由、彈性、人性化、高科技的工作環境。
全年15天特別休假。
定期部門活動與聚餐。
通暢的組織溝通。
年度健康檢查
年度旅遊補助。
每日中餐補助。
每週五 Happy Hour 下午茶
全天供應鮮奶、現磨現煮咖啡、健康穀物、豐富飲料、可口零食。
## 聯絡方式
歡迎來信應徵
> 附簡歷/履歷 & 方便的聯絡方式、聯絡時間
前端主管: dominic.kuo@kaiostech.com
or
104 徵才頁面:
[凱歐斯通訊科技有限公司(籌備處) > Frontend Developer](https://www.104.com.tw/job/?jobno=53veq)
-----
> 代 PO | test | 【徵才】kaios 徵求前端工程師 團隊簡介 地點 is a systems software company specializing in creating innovative experiences for mobile wearable and iot devices we work with industry partners around the world to enable end to end experiences connecting new users in previously untapped markets 工作內容 開發 維護 kaios 系統上以網頁前端建置的操作環境 能力需求 proficient understanding of web technologies including and javascript good understanding of code versioning tools such as git mercurial svn develop new user facing web applications features on iot os build javascript based framework libraries api on iot os optimize web applications for maximum speed and scalability basic understanding of unit automated testing frameworks ensure the technical feasibility of ui ux designs fluent in english reading writing 加分 react 我很熟! js unit test 我麻吉! fireos app 我寫過! ci 流程交給我! 薪資範圍 年薪一百萬台幣以上 所得稅前 工時 特休 週一 週五 每日八小時 早上九點到十點彈性上班,不用打卡 福利 推薦項 位於捷運松山線小巨蛋站旁交通便捷,明亮開放的舒適辦公環境。 訂製人體工學辦公桌椅。 自由、彈性、人性化、高科技的工作環境。 。 定期部門活動與聚餐。 通暢的組織溝通。 年度健康檢查 年度旅遊補助。 每日中餐補助。 每週五 happy hour 下午茶 全天供應鮮奶、現磨現煮咖啡、健康穀物、豐富飲料、可口零食。 聯絡方式 歡迎來信應徵 附簡歷 履歷 方便的聯絡方式、聯絡時間 前端主管 dominic kuo kaiostech com or 徵才頁面: 代 po | 1 |
233,052 | 25,726,605,486 | IssuesEvent | 2022-12-07 17:04:56 | hugh-mend/skf-labs | https://api.github.com/repos/hugh-mend/skf-labs | opened | ejs-3.1.6.tgz: 2 vulnerabilities (highest severity is: 9.8) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ejs-3.1.6.tgz</b></p></summary>
<p>Embedded JavaScript templates</p>
<p>Library home page: <a href="https://registry.npmjs.org/ejs/-/ejs-3.1.6.tgz">https://registry.npmjs.org/ejs/-/ejs-3.1.6.tgz</a></p>
<p>Path to dependency file: /nodeJs/LFI-2/package.json</p>
<p>Path to vulnerable library: /nodeJs/LFI-2/node_modules/ejs/package.json,/nodeJs/Http-response-splitting/node_modules/ejs/package.json,/nodeJs/CMD2/node_modules/ejs/package.json,/nodeJs/CSP/node_modules/ejs/package.json,/nodeJs/ParameterBinding/node_modules/ejs/package.json,/nodeJs/CMD4/node_modules/ejs/package.json,/nodeJs/Credentials-guessing-1/node_modules/ejs/package.json,/nodeJs/Graphql-Mutations/node_modules/ejs/package.json,/nodeJs/XXE/node_modules/ejs/package.json,/nodeJs/SQLI-blind/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-3/node_modules/ejs/package.json,/nodeJs/Ldap-Injection/node_modules/ejs/package.json,/nodeJs/Client-side-restriction-bypass/node_modules/ejs/package.json,/nodeJs/CMD/node_modules/ejs/package.json,/nodeJs/SessionPuzzle/node_modules/ejs/package.json,/nodeJs/CSRF-weak/node_modules/ejs/package.json,/nodeJs/RaceCondition-file-write/node_modules/ejs/package.json,/nodeJs/SQLI-like/node_modules/ejs/package.json,/nodeJs/XSS/node_modules/ejs/package.json,/nodeJs/Info-leakage-comments/node_modules/ejs/package.json,/nodeJs/Auth-Bypass/node_modules/ejs/package.json,/nodeJs/Session-hijacking-xss/node_modules/ejs/package.json,/nodeJs/Clickjacking/node_modules/ejs/package.json,/nodeJs/Formula-Injection/node_modules/ejs/package.json,/nodeJs/CMD-Blind/node_modules/ejs/package.json,/nodeJs/RaceCondition/node_modules/ejs/package.json,/nodeJs/Url-redirection-harder/node_modules/ejs/package.json,/nodeJs/Graphql-Injection/node_modules/ejs/package.json,/nodeJs/JWT-secret/node_modules/ejs/package.json,/nodeJs/Url-redirection/node_modules/ejs/package.json,/nodeJs/RTLO/node_modules/ejs/package.json,/nodeJs/CSTI/node_modules/ejs/package.json,/nodeJs/DOS-regex/node_modules/ejs/package.json,/nodeJs/XSS-url/node_modules/ejs/package.json,/nodeJs/LFI/node_modules/ejs/package.json,/nodeJs/RFI/node_modules/ejs/package.json,/nodeJs/File-upload/node_modules/ejs/package.json,/nodeJs/XSS-DOM/node_modules/ejs/package.json,/nodeJs/IDOR/node_modules/ejs/package.json,/nodeJs/Url-redirection-harder2/node_modules/ejs/package.json,/nodeJs/Prototype-Pollution/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-2/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-1/node_modules/ejs/package.json,/nodeJs/Info-leakage-metadata/node_modules/ejs/package.json,/nodeJs/Content-type/node_modules/ejs/package.json,/nodeJs/Ldap-Injection-harder/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-simple/node_modules/ejs/package.json,/nodeJs/Client-side-restriction-bypass-2/node_modules/ejs/package.json,/nodeJs/Credentials-guessing-2/node_modules/ejs/package.json,/nodeJs/LFI-3/node_modules/ejs/package.json,/nodeJs/XSS-attribute/node_modules/ejs/package.json,/nodeJs/SQLI/node_modules/ejs/package.json,/nodeJs/XSS-DOM-2/node_modules/ejs/package.json,/nodeJs/Untrusted-sources-js/node_modules/ejs/package.json,/nodeJs/CSRF-samesite/node_modules/ejs/package.json,/nodeJs/JWT-null/node_modules/ejs/package.json,/nodeJs/Graphql-Introspection/node_modules/ejs/package.json,/nodeJs/Ratelimiting/node_modules/ejs/package.json,/nodeJs/CORS/node_modules/ejs/package.json,/nodeJs/CSSI/node_modules/ejs/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/hugh-mend/skf-labs/commit/269637411137fa47e8931c885cbae774775bfe97">269637411137fa47e8931c885cbae774775bfe97</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (ejs version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2022-29078](https://www.mend.io/vulnerability-database/CVE-2022-29078) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | ejs-3.1.6.tgz | Direct | 3.1.7 | ✅ |
| [CVE-2021-43138](https://www.mend.io/vulnerability-database/CVE-2021-43138) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | async-0.9.2.tgz | Transitive | 3.1.7 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-29078</summary>
### Vulnerable Library - <b>ejs-3.1.6.tgz</b></p>
<p>Embedded JavaScript templates</p>
<p>Library home page: <a href="https://registry.npmjs.org/ejs/-/ejs-3.1.6.tgz">https://registry.npmjs.org/ejs/-/ejs-3.1.6.tgz</a></p>
<p>Path to dependency file: /nodeJs/LFI-2/package.json</p>
<p>Path to vulnerable library: /nodeJs/LFI-2/node_modules/ejs/package.json,/nodeJs/Http-response-splitting/node_modules/ejs/package.json,/nodeJs/CMD2/node_modules/ejs/package.json,/nodeJs/CSP/node_modules/ejs/package.json,/nodeJs/ParameterBinding/node_modules/ejs/package.json,/nodeJs/CMD4/node_modules/ejs/package.json,/nodeJs/Credentials-guessing-1/node_modules/ejs/package.json,/nodeJs/Graphql-Mutations/node_modules/ejs/package.json,/nodeJs/XXE/node_modules/ejs/package.json,/nodeJs/SQLI-blind/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-3/node_modules/ejs/package.json,/nodeJs/Ldap-Injection/node_modules/ejs/package.json,/nodeJs/Client-side-restriction-bypass/node_modules/ejs/package.json,/nodeJs/CMD/node_modules/ejs/package.json,/nodeJs/SessionPuzzle/node_modules/ejs/package.json,/nodeJs/CSRF-weak/node_modules/ejs/package.json,/nodeJs/RaceCondition-file-write/node_modules/ejs/package.json,/nodeJs/SQLI-like/node_modules/ejs/package.json,/nodeJs/XSS/node_modules/ejs/package.json,/nodeJs/Info-leakage-comments/node_modules/ejs/package.json,/nodeJs/Auth-Bypass/node_modules/ejs/package.json,/nodeJs/Session-hijacking-xss/node_modules/ejs/package.json,/nodeJs/Clickjacking/node_modules/ejs/package.json,/nodeJs/Formula-Injection/node_modules/ejs/package.json,/nodeJs/CMD-Blind/node_modules/ejs/package.json,/nodeJs/RaceCondition/node_modules/ejs/package.json,/nodeJs/Url-redirection-harder/node_modules/ejs/package.json,/nodeJs/Graphql-Injection/node_modules/ejs/package.json,/nodeJs/JWT-secret/node_modules/ejs/package.json,/nodeJs/Url-redirection/node_modules/ejs/package.json,/nodeJs/RTLO/node_modules/ejs/package.json,/nodeJs/CSTI/node_modules/ejs/package.json,/nodeJs/DOS-regex/node_modules/ejs/package.json,/nodeJs/XSS-url/node_modules/ejs/package.json,/nodeJs/LFI/node_modules/ejs/package.json,/nodeJs/RFI/node_modules/ejs/package.json,/nodeJs/File-upload/node_modules/ejs/package.json,/nodeJs/XSS-DOM/node_modules/ejs/package.json,/nodeJs/IDOR/node_modules/ejs/package.json,/nodeJs/Url-redirection-harder2/node_modules/ejs/package.json,/nodeJs/Prototype-Pollution/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-2/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-1/node_modules/ejs/package.json,/nodeJs/Info-leakage-metadata/node_modules/ejs/package.json,/nodeJs/Content-type/node_modules/ejs/package.json,/nodeJs/Ldap-Injection-harder/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-simple/node_modules/ejs/package.json,/nodeJs/Client-side-restriction-bypass-2/node_modules/ejs/package.json,/nodeJs/Credentials-guessing-2/node_modules/ejs/package.json,/nodeJs/LFI-3/node_modules/ejs/package.json,/nodeJs/XSS-attribute/node_modules/ejs/package.json,/nodeJs/SQLI/node_modules/ejs/package.json,/nodeJs/XSS-DOM-2/node_modules/ejs/package.json,/nodeJs/Untrusted-sources-js/node_modules/ejs/package.json,/nodeJs/CSRF-samesite/node_modules/ejs/package.json,/nodeJs/JWT-null/node_modules/ejs/package.json,/nodeJs/Graphql-Introspection/node_modules/ejs/package.json,/nodeJs/Ratelimiting/node_modules/ejs/package.json,/nodeJs/CORS/node_modules/ejs/package.json,/nodeJs/CSSI/node_modules/ejs/package.json</p>
<p>
Dependency Hierarchy:
- :x: **ejs-3.1.6.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/hugh-mend/skf-labs/commit/269637411137fa47e8931c885cbae774775bfe97">269637411137fa47e8931c885cbae774775bfe97</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
<p>Publish Date: 2022-04-25
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-29078>CVE-2022-29078</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29078~">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29078~</a></p>
<p>Release Date: 2022-04-25</p>
<p>Fix Resolution: 3.1.7</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-43138</summary>
### Vulnerable Library - <b>async-0.9.2.tgz</b></p>
<p>Higher-order functions and common patterns for asynchronous code</p>
<p>Library home page: <a href="https://registry.npmjs.org/async/-/async-0.9.2.tgz">https://registry.npmjs.org/async/-/async-0.9.2.tgz</a></p>
<p>Path to dependency file: /nodeJs/Credentials-guessing-1/package.json</p>
<p>Path to vulnerable library: /nodeJs/Credentials-guessing-1/node_modules/async/package.json,/nodeJs/Session-hijacking-xss/node_modules/async/package.json,/nodeJs/Graphql-Injection/node_modules/async/package.json,/nodeJs/Url-redirection-harder2/node_modules/async/package.json,/nodeJs/SQLI/node_modules/async/package.json,/nodeJs/Formula-Injection/node_modules/async/package.json,/nodeJs/SQLI-like/node_modules/async/package.json,/nodeJs/Client-side-restriction-bypass/node_modules/async/package.json,/nodeJs/Client-side-restriction-bypass-2/node_modules/async/package.json,/nodeJs/Graphql-Introspection/node_modules/async/package.json,/nodeJs/Info-leakage-metadata/node_modules/async/package.json,/nodeJs/XSS-attribute/node_modules/async/package.json,/nodeJs/CMD2/node_modules/async/package.json,/nodeJs/Graphql-Mutations/node_modules/async/package.json,/nodeJs/CMD/node_modules/async/package.json,/nodeJs/LFI-3/node_modules/async/package.json,/nodeJs/ParameterBinding/node_modules/async/package.json,/nodeJs/Http-response-splitting/node_modules/async/package.json,/nodeJs/Auth-Bypass-simple/node_modules/async/package.json,/nodeJs/Url-redirection-harder/node_modules/async/package.json,/nodeJs/RaceCondition/node_modules/async/package.json,/nodeJs/Credentials-guessing-2/node_modules/async/package.json,/nodeJs/CSP/node_modules/async/package.json,/nodeJs/Url-redirection/node_modules/async/package.json,/nodeJs/XSS-DOM/node_modules/async/package.json,/nodeJs/Clickjacking/node_modules/async/package.json,/nodeJs/Ratelimiting/node_modules/async/package.json,/nodeJs/JWT-secret/node_modules/async/package.json,/nodeJs/CMD4/node_modules/async/package.json,/nodeJs/Content-type/node_modules/async/package.json,/nodeJs/LFI/node_modules/async/package.json,/nodeJs/JWT-null/node_modules/async/package.json,/nodeJs/DOS-regex/node_modules/async/package.json,/nodeJs/SQLI-blind/node_modules/async/package.json,/nodeJs/Ldap-Injection-harder/node_modules/async/package.json,/nodeJs/XSS/node_modules/async/package.json,/nodeJs/CMD-Blind/node_modules/async/package.json,/nodeJs/RaceCondition-file-write/node_modules/async/package.json,/nodeJs/LFI-2/node_modules/async/package.json,/nodeJs/CSTI/node_modules/async/package.json,/nodeJs/File-upload/node_modules/async/package.json,/nodeJs/Prototype-Pollution/node_modules/async/package.json,/nodeJs/XXE/node_modules/async/package.json,/nodeJs/RTLO/node_modules/async/package.json,/nodeJs/CSRF-samesite/node_modules/async/package.json,/nodeJs/XSS-url/node_modules/async/package.json,/nodeJs/CSSI/node_modules/async/package.json,/nodeJs/Auth-Bypass-1/node_modules/async/package.json,/nodeJs/SessionPuzzle/node_modules/async/package.json,/nodeJs/IDOR/node_modules/async/package.json,/nodeJs/CORS/node_modules/async/package.json,/nodeJs/Auth-Bypass-3/node_modules/async/package.json,/nodeJs/Untrusted-sources-js/node_modules/async/package.json,/nodeJs/RFI/node_modules/async/package.json,/nodeJs/XSS-DOM-2/node_modules/async/package.json,/nodeJs/Auth-Bypass/node_modules/async/package.json,/nodeJs/CSRF-weak/node_modules/async/package.json,/nodeJs/Info-leakage-comments/node_modules/async/package.json,/nodeJs/Ldap-Injection/node_modules/async/package.json,/nodeJs/Auth-Bypass-2/node_modules/async/package.json</p>
<p>
Dependency Hierarchy:
- ejs-3.1.6.tgz (Root Library)
- jake-10.8.2.tgz
- :x: **async-0.9.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/hugh-mend/skf-labs/commit/269637411137fa47e8931c885cbae774775bfe97">269637411137fa47e8931c885cbae774775bfe97</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
<p>Publish Date: 2022-04-06
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-43138>CVE-2021-43138</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43138">https://nvd.nist.gov/vuln/detail/CVE-2021-43138</a></p>
<p>Release Date: 2022-04-06</p>
<p>Fix Resolution (async): 2.6.4</p>
<p>Direct dependency fix Resolution (ejs): 3.1.7</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | ejs-3.1.6.tgz: 2 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ejs-3.1.6.tgz</b></p></summary>
<p>Embedded JavaScript templates</p>
<p>Library home page: <a href="https://registry.npmjs.org/ejs/-/ejs-3.1.6.tgz">https://registry.npmjs.org/ejs/-/ejs-3.1.6.tgz</a></p>
<p>Path to dependency file: /nodeJs/LFI-2/package.json</p>
<p>Path to vulnerable library: /nodeJs/LFI-2/node_modules/ejs/package.json,/nodeJs/Http-response-splitting/node_modules/ejs/package.json,/nodeJs/CMD2/node_modules/ejs/package.json,/nodeJs/CSP/node_modules/ejs/package.json,/nodeJs/ParameterBinding/node_modules/ejs/package.json,/nodeJs/CMD4/node_modules/ejs/package.json,/nodeJs/Credentials-guessing-1/node_modules/ejs/package.json,/nodeJs/Graphql-Mutations/node_modules/ejs/package.json,/nodeJs/XXE/node_modules/ejs/package.json,/nodeJs/SQLI-blind/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-3/node_modules/ejs/package.json,/nodeJs/Ldap-Injection/node_modules/ejs/package.json,/nodeJs/Client-side-restriction-bypass/node_modules/ejs/package.json,/nodeJs/CMD/node_modules/ejs/package.json,/nodeJs/SessionPuzzle/node_modules/ejs/package.json,/nodeJs/CSRF-weak/node_modules/ejs/package.json,/nodeJs/RaceCondition-file-write/node_modules/ejs/package.json,/nodeJs/SQLI-like/node_modules/ejs/package.json,/nodeJs/XSS/node_modules/ejs/package.json,/nodeJs/Info-leakage-comments/node_modules/ejs/package.json,/nodeJs/Auth-Bypass/node_modules/ejs/package.json,/nodeJs/Session-hijacking-xss/node_modules/ejs/package.json,/nodeJs/Clickjacking/node_modules/ejs/package.json,/nodeJs/Formula-Injection/node_modules/ejs/package.json,/nodeJs/CMD-Blind/node_modules/ejs/package.json,/nodeJs/RaceCondition/node_modules/ejs/package.json,/nodeJs/Url-redirection-harder/node_modules/ejs/package.json,/nodeJs/Graphql-Injection/node_modules/ejs/package.json,/nodeJs/JWT-secret/node_modules/ejs/package.json,/nodeJs/Url-redirection/node_modules/ejs/package.json,/nodeJs/RTLO/node_modules/ejs/package.json,/nodeJs/CSTI/node_modules/ejs/package.json,/nodeJs/DOS-regex/node_modules/ejs/package.json,/nodeJs/XSS-url/node_modules/ejs/package.json,/nodeJs/LFI/node_modules/ejs/package.json,/nodeJs/RFI/node_modules/ejs/package.json,/nodeJs/File-upload/node_modules/ejs/package.json,/nodeJs/XSS-DOM/node_modules/ejs/package.json,/nodeJs/IDOR/node_modules/ejs/package.json,/nodeJs/Url-redirection-harder2/node_modules/ejs/package.json,/nodeJs/Prototype-Pollution/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-2/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-1/node_modules/ejs/package.json,/nodeJs/Info-leakage-metadata/node_modules/ejs/package.json,/nodeJs/Content-type/node_modules/ejs/package.json,/nodeJs/Ldap-Injection-harder/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-simple/node_modules/ejs/package.json,/nodeJs/Client-side-restriction-bypass-2/node_modules/ejs/package.json,/nodeJs/Credentials-guessing-2/node_modules/ejs/package.json,/nodeJs/LFI-3/node_modules/ejs/package.json,/nodeJs/XSS-attribute/node_modules/ejs/package.json,/nodeJs/SQLI/node_modules/ejs/package.json,/nodeJs/XSS-DOM-2/node_modules/ejs/package.json,/nodeJs/Untrusted-sources-js/node_modules/ejs/package.json,/nodeJs/CSRF-samesite/node_modules/ejs/package.json,/nodeJs/JWT-null/node_modules/ejs/package.json,/nodeJs/Graphql-Introspection/node_modules/ejs/package.json,/nodeJs/Ratelimiting/node_modules/ejs/package.json,/nodeJs/CORS/node_modules/ejs/package.json,/nodeJs/CSSI/node_modules/ejs/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/hugh-mend/skf-labs/commit/269637411137fa47e8931c885cbae774775bfe97">269637411137fa47e8931c885cbae774775bfe97</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (ejs version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2022-29078](https://www.mend.io/vulnerability-database/CVE-2022-29078) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | ejs-3.1.6.tgz | Direct | 3.1.7 | ✅ |
| [CVE-2021-43138](https://www.mend.io/vulnerability-database/CVE-2021-43138) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | async-0.9.2.tgz | Transitive | 3.1.7 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-29078</summary>
### Vulnerable Library - <b>ejs-3.1.6.tgz</b></p>
<p>Embedded JavaScript templates</p>
<p>Library home page: <a href="https://registry.npmjs.org/ejs/-/ejs-3.1.6.tgz">https://registry.npmjs.org/ejs/-/ejs-3.1.6.tgz</a></p>
<p>Path to dependency file: /nodeJs/LFI-2/package.json</p>
<p>Path to vulnerable library: /nodeJs/LFI-2/node_modules/ejs/package.json,/nodeJs/Http-response-splitting/node_modules/ejs/package.json,/nodeJs/CMD2/node_modules/ejs/package.json,/nodeJs/CSP/node_modules/ejs/package.json,/nodeJs/ParameterBinding/node_modules/ejs/package.json,/nodeJs/CMD4/node_modules/ejs/package.json,/nodeJs/Credentials-guessing-1/node_modules/ejs/package.json,/nodeJs/Graphql-Mutations/node_modules/ejs/package.json,/nodeJs/XXE/node_modules/ejs/package.json,/nodeJs/SQLI-blind/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-3/node_modules/ejs/package.json,/nodeJs/Ldap-Injection/node_modules/ejs/package.json,/nodeJs/Client-side-restriction-bypass/node_modules/ejs/package.json,/nodeJs/CMD/node_modules/ejs/package.json,/nodeJs/SessionPuzzle/node_modules/ejs/package.json,/nodeJs/CSRF-weak/node_modules/ejs/package.json,/nodeJs/RaceCondition-file-write/node_modules/ejs/package.json,/nodeJs/SQLI-like/node_modules/ejs/package.json,/nodeJs/XSS/node_modules/ejs/package.json,/nodeJs/Info-leakage-comments/node_modules/ejs/package.json,/nodeJs/Auth-Bypass/node_modules/ejs/package.json,/nodeJs/Session-hijacking-xss/node_modules/ejs/package.json,/nodeJs/Clickjacking/node_modules/ejs/package.json,/nodeJs/Formula-Injection/node_modules/ejs/package.json,/nodeJs/CMD-Blind/node_modules/ejs/package.json,/nodeJs/RaceCondition/node_modules/ejs/package.json,/nodeJs/Url-redirection-harder/node_modules/ejs/package.json,/nodeJs/Graphql-Injection/node_modules/ejs/package.json,/nodeJs/JWT-secret/node_modules/ejs/package.json,/nodeJs/Url-redirection/node_modules/ejs/package.json,/nodeJs/RTLO/node_modules/ejs/package.json,/nodeJs/CSTI/node_modules/ejs/package.json,/nodeJs/DOS-regex/node_modules/ejs/package.json,/nodeJs/XSS-url/node_modules/ejs/package.json,/nodeJs/LFI/node_modules/ejs/package.json,/nodeJs/RFI/node_modules/ejs/package.json,/nodeJs/File-upload/node_modules/ejs/package.json,/nodeJs/XSS-DOM/node_modules/ejs/package.json,/nodeJs/IDOR/node_modules/ejs/package.json,/nodeJs/Url-redirection-harder2/node_modules/ejs/package.json,/nodeJs/Prototype-Pollution/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-2/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-1/node_modules/ejs/package.json,/nodeJs/Info-leakage-metadata/node_modules/ejs/package.json,/nodeJs/Content-type/node_modules/ejs/package.json,/nodeJs/Ldap-Injection-harder/node_modules/ejs/package.json,/nodeJs/Auth-Bypass-simple/node_modules/ejs/package.json,/nodeJs/Client-side-restriction-bypass-2/node_modules/ejs/package.json,/nodeJs/Credentials-guessing-2/node_modules/ejs/package.json,/nodeJs/LFI-3/node_modules/ejs/package.json,/nodeJs/XSS-attribute/node_modules/ejs/package.json,/nodeJs/SQLI/node_modules/ejs/package.json,/nodeJs/XSS-DOM-2/node_modules/ejs/package.json,/nodeJs/Untrusted-sources-js/node_modules/ejs/package.json,/nodeJs/CSRF-samesite/node_modules/ejs/package.json,/nodeJs/JWT-null/node_modules/ejs/package.json,/nodeJs/Graphql-Introspection/node_modules/ejs/package.json,/nodeJs/Ratelimiting/node_modules/ejs/package.json,/nodeJs/CORS/node_modules/ejs/package.json,/nodeJs/CSSI/node_modules/ejs/package.json</p>
<p>
Dependency Hierarchy:
- :x: **ejs-3.1.6.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/hugh-mend/skf-labs/commit/269637411137fa47e8931c885cbae774775bfe97">269637411137fa47e8931c885cbae774775bfe97</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
<p>Publish Date: 2022-04-25
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-29078>CVE-2022-29078</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29078~">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29078~</a></p>
<p>Release Date: 2022-04-25</p>
<p>Fix Resolution: 3.1.7</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-43138</summary>
### Vulnerable Library - <b>async-0.9.2.tgz</b></p>
<p>Higher-order functions and common patterns for asynchronous code</p>
<p>Library home page: <a href="https://registry.npmjs.org/async/-/async-0.9.2.tgz">https://registry.npmjs.org/async/-/async-0.9.2.tgz</a></p>
<p>Path to dependency file: /nodeJs/Credentials-guessing-1/package.json</p>
<p>Path to vulnerable library: /nodeJs/Credentials-guessing-1/node_modules/async/package.json,/nodeJs/Session-hijacking-xss/node_modules/async/package.json,/nodeJs/Graphql-Injection/node_modules/async/package.json,/nodeJs/Url-redirection-harder2/node_modules/async/package.json,/nodeJs/SQLI/node_modules/async/package.json,/nodeJs/Formula-Injection/node_modules/async/package.json,/nodeJs/SQLI-like/node_modules/async/package.json,/nodeJs/Client-side-restriction-bypass/node_modules/async/package.json,/nodeJs/Client-side-restriction-bypass-2/node_modules/async/package.json,/nodeJs/Graphql-Introspection/node_modules/async/package.json,/nodeJs/Info-leakage-metadata/node_modules/async/package.json,/nodeJs/XSS-attribute/node_modules/async/package.json,/nodeJs/CMD2/node_modules/async/package.json,/nodeJs/Graphql-Mutations/node_modules/async/package.json,/nodeJs/CMD/node_modules/async/package.json,/nodeJs/LFI-3/node_modules/async/package.json,/nodeJs/ParameterBinding/node_modules/async/package.json,/nodeJs/Http-response-splitting/node_modules/async/package.json,/nodeJs/Auth-Bypass-simple/node_modules/async/package.json,/nodeJs/Url-redirection-harder/node_modules/async/package.json,/nodeJs/RaceCondition/node_modules/async/package.json,/nodeJs/Credentials-guessing-2/node_modules/async/package.json,/nodeJs/CSP/node_modules/async/package.json,/nodeJs/Url-redirection/node_modules/async/package.json,/nodeJs/XSS-DOM/node_modules/async/package.json,/nodeJs/Clickjacking/node_modules/async/package.json,/nodeJs/Ratelimiting/node_modules/async/package.json,/nodeJs/JWT-secret/node_modules/async/package.json,/nodeJs/CMD4/node_modules/async/package.json,/nodeJs/Content-type/node_modules/async/package.json,/nodeJs/LFI/node_modules/async/package.json,/nodeJs/JWT-null/node_modules/async/package.json,/nodeJs/DOS-regex/node_modules/async/package.json,/nodeJs/SQLI-blind/node_modules/async/package.json,/nodeJs/Ldap-Injection-harder/node_modules/async/package.json,/nodeJs/XSS/node_modules/async/package.json,/nodeJs/CMD-Blind/node_modules/async/package.json,/nodeJs/RaceCondition-file-write/node_modules/async/package.json,/nodeJs/LFI-2/node_modules/async/package.json,/nodeJs/CSTI/node_modules/async/package.json,/nodeJs/File-upload/node_modules/async/package.json,/nodeJs/Prototype-Pollution/node_modules/async/package.json,/nodeJs/XXE/node_modules/async/package.json,/nodeJs/RTLO/node_modules/async/package.json,/nodeJs/CSRF-samesite/node_modules/async/package.json,/nodeJs/XSS-url/node_modules/async/package.json,/nodeJs/CSSI/node_modules/async/package.json,/nodeJs/Auth-Bypass-1/node_modules/async/package.json,/nodeJs/SessionPuzzle/node_modules/async/package.json,/nodeJs/IDOR/node_modules/async/package.json,/nodeJs/CORS/node_modules/async/package.json,/nodeJs/Auth-Bypass-3/node_modules/async/package.json,/nodeJs/Untrusted-sources-js/node_modules/async/package.json,/nodeJs/RFI/node_modules/async/package.json,/nodeJs/XSS-DOM-2/node_modules/async/package.json,/nodeJs/Auth-Bypass/node_modules/async/package.json,/nodeJs/CSRF-weak/node_modules/async/package.json,/nodeJs/Info-leakage-comments/node_modules/async/package.json,/nodeJs/Ldap-Injection/node_modules/async/package.json,/nodeJs/Auth-Bypass-2/node_modules/async/package.json</p>
<p>
Dependency Hierarchy:
- ejs-3.1.6.tgz (Root Library)
- jake-10.8.2.tgz
- :x: **async-0.9.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/hugh-mend/skf-labs/commit/269637411137fa47e8931c885cbae774775bfe97">269637411137fa47e8931c885cbae774775bfe97</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
<p>Publish Date: 2022-04-06
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-43138>CVE-2021-43138</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-43138">https://nvd.nist.gov/vuln/detail/CVE-2021-43138</a></p>
<p>Release Date: 2022-04-06</p>
<p>Fix Resolution (async): 2.6.4</p>
<p>Direct dependency fix Resolution (ejs): 3.1.7</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_test | ejs tgz vulnerabilities highest severity is vulnerable library ejs tgz embedded javascript templates library home page a href path to dependency file nodejs lfi package json path to vulnerable library nodejs lfi node modules ejs package json nodejs http response splitting node modules ejs package json nodejs node modules ejs package json nodejs csp node modules ejs package json nodejs parameterbinding node modules ejs package json nodejs node modules ejs package json nodejs credentials guessing node modules ejs package json nodejs graphql mutations node modules ejs package json nodejs xxe node modules ejs package json nodejs sqli blind node modules ejs package json nodejs auth bypass node modules ejs package json nodejs ldap injection node modules ejs package json nodejs client side restriction bypass node modules ejs package json nodejs cmd node modules ejs package json nodejs sessionpuzzle node modules ejs package json nodejs csrf weak node modules ejs package json nodejs racecondition file write node modules ejs package json nodejs sqli like node modules ejs package json nodejs xss node modules ejs package json nodejs info leakage comments node modules ejs package json nodejs auth bypass node modules ejs package json nodejs session hijacking xss node modules ejs package json nodejs clickjacking node modules ejs package json nodejs formula injection node modules ejs package json nodejs cmd blind node modules ejs package json nodejs racecondition node modules ejs package json nodejs url redirection harder node modules ejs package json nodejs graphql injection node modules ejs package json nodejs jwt secret node modules ejs package json nodejs url redirection node modules ejs package json nodejs rtlo node modules ejs package json nodejs csti node modules ejs package json nodejs dos regex node modules ejs package json nodejs xss url node modules ejs package json nodejs lfi node modules ejs package json nodejs rfi node modules ejs package json nodejs file upload node modules ejs package json nodejs xss dom node modules ejs package json nodejs idor node modules ejs package json nodejs url redirection node modules ejs package json nodejs prototype pollution node modules ejs package json nodejs auth bypass node modules ejs package json nodejs auth bypass node modules ejs package json nodejs info leakage metadata node modules ejs package json nodejs content type node modules ejs package json nodejs ldap injection harder node modules ejs package json nodejs auth bypass simple node modules ejs package json nodejs client side restriction bypass node modules ejs package json nodejs credentials guessing node modules ejs package json nodejs lfi node modules ejs package json nodejs xss attribute node modules ejs package json nodejs sqli node modules ejs package json nodejs xss dom node modules ejs package json nodejs untrusted sources js node modules ejs package json nodejs csrf samesite node modules ejs package json nodejs jwt null node modules ejs package json nodejs graphql introspection node modules ejs package json nodejs ratelimiting node modules ejs package json nodejs cors node modules ejs package json nodejs cssi node modules ejs package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in ejs version remediation available high ejs tgz direct high async tgz transitive details cve vulnerable library ejs tgz embedded javascript templates library home page a href path to dependency file nodejs lfi package json path to vulnerable library nodejs lfi node modules ejs package json nodejs http response splitting node modules ejs package json nodejs node modules ejs package json nodejs csp node modules ejs package json nodejs parameterbinding node modules ejs package json nodejs node modules ejs package json nodejs credentials guessing node modules ejs package json nodejs graphql mutations node modules ejs package json nodejs xxe node modules ejs package json nodejs sqli blind node modules ejs package json nodejs auth bypass node modules ejs package json nodejs ldap injection node modules ejs package json nodejs client side restriction bypass node modules ejs package json nodejs cmd node modules ejs package json nodejs sessionpuzzle node modules ejs package json nodejs csrf weak node modules ejs package json nodejs racecondition file write node modules ejs package json nodejs sqli like node modules ejs package json nodejs xss node modules ejs package json nodejs info leakage comments node modules ejs package json nodejs auth bypass node modules ejs package json nodejs session hijacking xss node modules ejs package json nodejs clickjacking node modules ejs package json nodejs formula injection node modules ejs package json nodejs cmd blind node modules ejs package json nodejs racecondition node modules ejs package json nodejs url redirection harder node modules ejs package json nodejs graphql injection node modules ejs package json nodejs jwt secret node modules ejs package json nodejs url redirection node modules ejs package json nodejs rtlo node modules ejs package json nodejs csti node modules ejs package json nodejs dos regex node modules ejs package json nodejs xss url node modules ejs package json nodejs lfi node modules ejs package json nodejs rfi node modules ejs package json nodejs file upload node modules ejs package json nodejs xss dom node modules ejs package json nodejs idor node modules ejs package json nodejs url redirection node modules ejs package json nodejs prototype pollution node modules ejs package json nodejs auth bypass node modules ejs package json nodejs auth bypass node modules ejs package json nodejs info leakage metadata node modules ejs package json nodejs content type node modules ejs package json nodejs ldap injection harder node modules ejs package json nodejs auth bypass simple node modules ejs package json nodejs client side restriction bypass node modules ejs package json nodejs credentials guessing node modules ejs package json nodejs lfi node modules ejs package json nodejs xss attribute node modules ejs package json nodejs sqli node modules ejs package json nodejs xss dom node modules ejs package json nodejs untrusted sources js node modules ejs package json nodejs csrf samesite node modules ejs package json nodejs jwt null node modules ejs package json nodejs graphql introspection node modules ejs package json nodejs ratelimiting node modules ejs package json nodejs cors node modules ejs package json nodejs cssi node modules ejs package json dependency hierarchy x ejs tgz vulnerable library found in head commit a href found in base branch master vulnerability details the ejs aka embedded javascript templates package for node js allows server side template injection in settings this is parsed as an internal option and overwrites the outputfunctionname option with an arbitrary os command which is executed upon template compilation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library async tgz higher order functions and common patterns for asynchronous code library home page a href path to dependency file nodejs credentials guessing package json path to vulnerable library nodejs credentials guessing node modules async package json nodejs session hijacking xss node modules async package json nodejs graphql injection node modules async package json nodejs url redirection node modules async package json nodejs sqli node modules async package json nodejs formula injection node modules async package json nodejs sqli like node modules async package json nodejs client side restriction bypass node modules async package json nodejs client side restriction bypass node modules async package json nodejs graphql introspection node modules async package json nodejs info leakage metadata node modules async package json nodejs xss attribute node modules async package json nodejs node modules async package json nodejs graphql mutations node modules async package json nodejs cmd node modules async package json nodejs lfi node modules async package json nodejs parameterbinding node modules async package json nodejs http response splitting node modules async package json nodejs auth bypass simple node modules async package json nodejs url redirection harder node modules async package json nodejs racecondition node modules async package json nodejs credentials guessing node modules async package json nodejs csp node modules async package json nodejs url redirection node modules async package json nodejs xss dom node modules async package json nodejs clickjacking node modules async package json nodejs ratelimiting node modules async package json nodejs jwt secret node modules async package json nodejs node modules async package json nodejs content type node modules async package json nodejs lfi node modules async package json nodejs jwt null node modules async package json nodejs dos regex node modules async package json nodejs sqli blind node modules async package json nodejs ldap injection harder node modules async package json nodejs xss node modules async package json nodejs cmd blind node modules async package json nodejs racecondition file write node modules async package json nodejs lfi node modules async package json nodejs csti node modules async package json nodejs file upload node modules async package json nodejs prototype pollution node modules async package json nodejs xxe node modules async package json nodejs rtlo node modules async package json nodejs csrf samesite node modules async package json nodejs xss url node modules async package json nodejs cssi node modules async package json nodejs auth bypass node modules async package json nodejs sessionpuzzle node modules async package json nodejs idor node modules async package json nodejs cors node modules async package json nodejs auth bypass node modules async package json nodejs untrusted sources js node modules async package json nodejs rfi node modules async package json nodejs xss dom node modules async package json nodejs auth bypass node modules async package json nodejs csrf weak node modules async package json nodejs info leakage comments node modules async package json nodejs ldap injection node modules async package json nodejs auth bypass node modules async package json dependency hierarchy ejs tgz root library jake tgz x async tgz vulnerable library found in head commit a href found in base branch master vulnerability details in async before and x before a malicious user can obtain privileges via the mapvalues method aka lib internal iterator js createobjectiterator prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution async direct dependency fix resolution ejs rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue | 0 |
230,314 | 18,537,215,042 | IssuesEvent | 2021-10-21 12:49:26 | brave/brave-ios | https://api.github.com/repos/brave/brave-ios | opened | Manual test run for 1.32.1 on iPhone | QA/Yes release-notes/exclude tests iPhone |
## Installer
- [ ] Check that installer is close to the size of the last release
- [ ] Check the Brave version in About and make sure it is EXACTLY as expected
## Data
- [ ] Verify that data from the previous build appears in the updated build as expected (bookmarks, etc)
- [ ] Verify that the cookies from the previous build are preserved after upgrade
- [ ] Verify saved password are retained after upgrade
- [ ] Verify stats are retained after upgrade
- [ ] Verify sync chain created in the previous version is still retained on upgrade
- [ ] Verify per-site settings are preserved after upgrade
## Bookmarks
- [ ] Verify that creating a bookmark works
- [ ] Verify that clicking a bookmark from bookmark manager loads the bookmark
- [ ] Verify that deleting a bookmark works
- [ ] Verify that creating a bookmark folder works
- [ ] Verify that creating a bookmark inside the created folder works
- [ ] Verify that you can add a bookmark directly inside a bookmark folder
- [ ] Verify that you can delete a bookmark in edit mode
- [ ] Verify that you can delete a bookmark folder with bookmarks inside
- [ ] Verify adding a bookmark domain, subpaths is retained and you are successfully able to visit the domain subpath in a new tab
## Favourites
- [ ] Verify editing favourite and changing URL updates the favicons accordingly
- [ ] Verify that you can remove favourites
- [ ] Verify that you can add new favourites from the share menu
## Context menus
- [ ] Make sure context menu items in the URL bar work
- [ ] Make sure context menu items on content work with no selected text
- [ ] Make sure context menu items on content work with selected text
- [ ] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable)
- [ ] Context menu: verify you can Open in Background Tab, and Open in Private Tab
## Downloads
- [ ] Verify that you can save an image from a site
- [ ] Verify that you are able to save a gif image
## Reader Mode
- [ ] Visit http://theverge.com, open any article, verify the reader mode icon is shown in the URL bar
- [ ] Verify tapping on the reader mode icon opens the article in reader mode
- [ ] Edit reader mode settings and open different pages in reader mode and verify if the setting is retained across each article
## Gestures
- [ ] Verify zoom in / out gestures work on https://www.homedepot.com/
- [ ] Verify that navigating to a different origin resets the zoom
- [ ] Swipe back and forward to navigate, verify this works as expected
## Password Managers
- [ ] Verify tapping on 1Password on the slide-out keyboard launches 1Password App and able to select the stored credentials
- [ ] Verify tapping on bitwarden password manager in the autofill field launches the app and auto-fills the stored data
## Shields Settings
- [ ] Enable all switches in settings and visit a site and disable block scripts. Kill and relaunch the app and verify if the site shield settings are retained
## Browser Lock
- [ ] Verify browser lock enables device passcode to be lock/unlock the browser
- [ ] Verify swipe up/swipe down with browser in focus doesn't ask for device passcode
- [ ] Verify cancel passcode shows unlock message
- [ ] Remove the app from memory and relaunch, enter a wrong passcode, the browser should not be unlocked
- [ ] Verify cancel fingerprint confirmation/face unlock shows enter passcode window when fingerprint/face unlock is set up on the device
## Brave Rewards/Ads
- [ ] Verify wallet is auto-created after enabling rewards
- [ ] Verify when you click on the BR panel while on a site, the panel displays if the site is verified or not
- [ ] Verify ads are only shown when the app is being used
- [ ] Verify clicking on an ad notification shows the landing page
- [ ] Verify inline-ads show on Brave News and is correctly redeemed from the server
- [ ] Verify `view`,`clicked` and `landed` and `dismiss` states are logged based on the action
## Sync
- [ ] Verify you are able to join sync chain by scanning the QR code
- [ ] Verify you are able to join sync chain using code words
- [ ] Verify you are able to create a sync chain on the device and add other devices to the chain via QR code/Codewords
- [ ] Verify that bookmarks from other devices on the chain show up on the mobile device after sync completes
- [ ] Verify newly created bookmarks get synced to all devices on the sync chain
- [ ] Verify existing bookmarks before joining sync chain also gets sync'd to all devices on the sync chain
- [ ] Verify histroy sync is disabled by default. Enabling it starts sync'ing history items as well (limited to 200 entries)
- [ ] Verify sync works on an upgrade profile and new bookmarks added post-upgrade sync's across devices on the chain
- [ ] Verify you can create a standalone sync chain with one device
## Playlist & Autoplay
- [ ] Verify Playlist is enabled by default on a clean install
- [ ] Verify when a site with audio/video is detected, playlist button is shown in URL bar and a notification badge on the menu
- [ ] Verify clicking the playlist button adds audio/video to playlist and initiates offline play
- [ ] Verify able to add audio/video to playlist via share menu
- [ ] Verify able to add audio/video to playlist via long press context menu
- [ ] Verify Autoplay is enabled by default
- [ ] Verify with autoplay enabled, able to play audio/video automatically
- [ ] Verify with background audio enabled, able to play audio/video with device locked or app in background
## Brave News
- [ ] Verify Brave News opt-in is shown on a clean install
- [ ] Verify once opted-in Brave news starts showing artciles
- [ ] Verify promoted content is shown on Brave News
- [ ] Verify in-line ads are shown on Brave News
- [ ] Verify able to add custom RSS feed to the list of sources
- [ ] Verify able to disable content from a particular publisher by long press on the card
## Bravery settings
- [ ] Check that HTTPS Everywhere works by loading http://https-everywhere.badssl.com/
- [ ] Turning HTTPS Everywhere off or shields off both disable the redirect to https://https-everywhere.badssl.com/
- [ ] Check that block ad and unblock ad works on http://slashdot.org
- [ ] Check that toggling to blocking and allow ads works as expected
- [ ] Verify that clicking through a cert error in https://badssl.com/ works
- [ ] Verify that Safe Browsing works (https://www.raisegame.com/)
- [ ] Enable block script globally from settings, Visit https://twitter.com/, nothing should load. Tap on Shields and disable block script, the page should load properly
- [ ] Verify that preferences default Brave Shields settings take effect on pages with no site settings
### Fingerprint Tests
- [ ] Verify that turning on fingerprinting protection in preferences shows 3 fingerprint blocked at https://browserleaks.com/canvas . Verify that turning it off in the Bravery menu shows 0 fingerprints blocked
- [ ] Verify that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on
- [ ] Verify that https://diafygi.github.io/webrtc-ips/ doesn't leak IP address when `Block all fingerprinting protection` is on
## Content tests
- [ ] Go to https://feedly.com/ and make sure that the password can be saved. Make sure the saved password is auto-populated when you visit the site again
- [ ] Open an email on http://mail.google.com/ or `inbox.google.com` and click on a link. Make sure it works
- [ ] Verify that PDF is loaded over https at https://basicattentiontoken.org/BasicAttentionTokenWhitePaper-4.pdf
- [ ] Verify that PDF is loaded over HTTP at http://www.pdf995.com/samples/pdf.pdf
- [ ] Verify that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run)
- [ ] Verify that search results from https://startpage.com/ open in a new tab (due to target being _blank_)
## WebAuthn
- [ ] Verify browser prompts for security key when trying to login to accounts
- [ ] Verify you are able to successfully authenticate an account using security key when prompted
- [ ] Verify quickly connect and disconnect doesn't cause issue authenticating using security keys
- [ ] Verify you are able to use security keys on both normal and private tabs
- [ ] Verify you are able to use security keys to authenticate using NFC
## App linker
- [ ] Long press on a link in the Twitter app to get the share picker, choose Brave. Verify Brave doesn't crash after opening the link
## Session storage
- [ ] Verify that tabs restore when closed, including active tab
| 1.0 | Manual test run for 1.32.1 on iPhone -
## Installer
- [ ] Check that installer is close to the size of the last release
- [ ] Check the Brave version in About and make sure it is EXACTLY as expected
## Data
- [ ] Verify that data from the previous build appears in the updated build as expected (bookmarks, etc)
- [ ] Verify that the cookies from the previous build are preserved after upgrade
- [ ] Verify saved password are retained after upgrade
- [ ] Verify stats are retained after upgrade
- [ ] Verify sync chain created in the previous version is still retained on upgrade
- [ ] Verify per-site settings are preserved after upgrade
## Bookmarks
- [ ] Verify that creating a bookmark works
- [ ] Verify that clicking a bookmark from bookmark manager loads the bookmark
- [ ] Verify that deleting a bookmark works
- [ ] Verify that creating a bookmark folder works
- [ ] Verify that creating a bookmark inside the created folder works
- [ ] Verify that you can add a bookmark directly inside a bookmark folder
- [ ] Verify that you can delete a bookmark in edit mode
- [ ] Verify that you can delete a bookmark folder with bookmarks inside
- [ ] Verify adding a bookmark domain, subpaths is retained and you are successfully able to visit the domain subpath in a new tab
## Favourites
- [ ] Verify editing favourite and changing URL updates the favicons accordingly
- [ ] Verify that you can remove favourites
- [ ] Verify that you can add new favourites from the share menu
## Context menus
- [ ] Make sure context menu items in the URL bar work
- [ ] Make sure context menu items on content work with no selected text
- [ ] Make sure context menu items on content work with selected text
- [ ] Make sure context menu items on content work inside an editable control (input, textarea, or contenteditable)
- [ ] Context menu: verify you can Open in Background Tab, and Open in Private Tab
## Downloads
- [ ] Verify that you can save an image from a site
- [ ] Verify that you are able to save a gif image
## Reader Mode
- [ ] Visit http://theverge.com, open any article, verify the reader mode icon is shown in the URL bar
- [ ] Verify tapping on the reader mode icon opens the article in reader mode
- [ ] Edit reader mode settings and open different pages in reader mode and verify if the setting is retained across each article
## Gestures
- [ ] Verify zoom in / out gestures work on https://www.homedepot.com/
- [ ] Verify that navigating to a different origin resets the zoom
- [ ] Swipe back and forward to navigate, verify this works as expected
## Password Managers
- [ ] Verify tapping on 1Password on the slide-out keyboard launches 1Password App and able to select the stored credentials
- [ ] Verify tapping on bitwarden password manager in the autofill field launches the app and auto-fills the stored data
## Shields Settings
- [ ] Enable all switches in settings and visit a site and disable block scripts. Kill and relaunch the app and verify if the site shield settings are retained
## Browser Lock
- [ ] Verify browser lock enables device passcode to be lock/unlock the browser
- [ ] Verify swipe up/swipe down with browser in focus doesn't ask for device passcode
- [ ] Verify cancel passcode shows unlock message
- [ ] Remove the app from memory and relaunch, enter a wrong passcode, the browser should not be unlocked
- [ ] Verify cancel fingerprint confirmation/face unlock shows enter passcode window when fingerprint/face unlock is set up on the device
## Brave Rewards/Ads
- [ ] Verify wallet is auto-created after enabling rewards
- [ ] Verify when you click on the BR panel while on a site, the panel displays if the site is verified or not
- [ ] Verify ads are only shown when the app is being used
- [ ] Verify clicking on an ad notification shows the landing page
- [ ] Verify inline-ads show on Brave News and is correctly redeemed from the server
- [ ] Verify `view`,`clicked` and `landed` and `dismiss` states are logged based on the action
## Sync
- [ ] Verify you are able to join sync chain by scanning the QR code
- [ ] Verify you are able to join sync chain using code words
- [ ] Verify you are able to create a sync chain on the device and add other devices to the chain via QR code/Codewords
- [ ] Verify that bookmarks from other devices on the chain show up on the mobile device after sync completes
- [ ] Verify newly created bookmarks get synced to all devices on the sync chain
- [ ] Verify existing bookmarks before joining sync chain also gets sync'd to all devices on the sync chain
- [ ] Verify histroy sync is disabled by default. Enabling it starts sync'ing history items as well (limited to 200 entries)
- [ ] Verify sync works on an upgrade profile and new bookmarks added post-upgrade sync's across devices on the chain
- [ ] Verify you can create a standalone sync chain with one device
## Playlist & Autoplay
- [ ] Verify Playlist is enabled by default on a clean install
- [ ] Verify when a site with audio/video is detected, playlist button is shown in URL bar and a notification badge on the menu
- [ ] Verify clicking the playlist button adds audio/video to playlist and initiates offline play
- [ ] Verify able to add audio/video to playlist via share menu
- [ ] Verify able to add audio/video to playlist via long press context menu
- [ ] Verify Autoplay is enabled by default
- [ ] Verify with autoplay enabled, able to play audio/video automatically
- [ ] Verify with background audio enabled, able to play audio/video with device locked or app in background
## Brave News
- [ ] Verify Brave News opt-in is shown on a clean install
- [ ] Verify once opted-in Brave news starts showing artciles
- [ ] Verify promoted content is shown on Brave News
- [ ] Verify in-line ads are shown on Brave News
- [ ] Verify able to add custom RSS feed to the list of sources
- [ ] Verify able to disable content from a particular publisher by long press on the card
## Bravery settings
- [ ] Check that HTTPS Everywhere works by loading http://https-everywhere.badssl.com/
- [ ] Turning HTTPS Everywhere off or shields off both disable the redirect to https://https-everywhere.badssl.com/
- [ ] Check that block ad and unblock ad works on http://slashdot.org
- [ ] Check that toggling to blocking and allow ads works as expected
- [ ] Verify that clicking through a cert error in https://badssl.com/ works
- [ ] Verify that Safe Browsing works (https://www.raisegame.com/)
- [ ] Enable block script globally from settings, Visit https://twitter.com/, nothing should load. Tap on Shields and disable block script, the page should load properly
- [ ] Verify that preferences default Brave Shields settings take effect on pages with no site settings
### Fingerprint Tests
- [ ] Verify that turning on fingerprinting protection in preferences shows 3 fingerprint blocked at https://browserleaks.com/canvas . Verify that turning it off in the Bravery menu shows 0 fingerprints blocked
- [ ] Verify that audio fingerprint is blocked at https://audiofingerprint.openwpm.com/ when fingerprinting protection is on
- [ ] Verify that https://diafygi.github.io/webrtc-ips/ doesn't leak IP address when `Block all fingerprinting protection` is on
## Content tests
- [ ] Go to https://feedly.com/ and make sure that the password can be saved. Make sure the saved password is auto-populated when you visit the site again
- [ ] Open an email on http://mail.google.com/ or `inbox.google.com` and click on a link. Make sure it works
- [ ] Verify that PDF is loaded over https at https://basicattentiontoken.org/BasicAttentionTokenWhitePaper-4.pdf
- [ ] Verify that PDF is loaded over HTTP at http://www.pdf995.com/samples/pdf.pdf
- [ ] Verify that https://mixed-script.badssl.com/ shows up as grey not red (no mixed content scripts are run)
- [ ] Verify that search results from https://startpage.com/ open in a new tab (due to target being _blank_)
## WebAuthn
- [ ] Verify browser prompts for security key when trying to login to accounts
- [ ] Verify you are able to successfully authenticate an account using security key when prompted
- [ ] Verify quickly connect and disconnect doesn't cause issue authenticating using security keys
- [ ] Verify you are able to use security keys on both normal and private tabs
- [ ] Verify you are able to use security keys to authenticate using NFC
## App linker
- [ ] Long press on a link in the Twitter app to get the share picker, choose Brave. Verify Brave doesn't crash after opening the link
## Session storage
- [ ] Verify that tabs restore when closed, including active tab
| test | manual test run for on iphone installer check that installer is close to the size of the last release check the brave version in about and make sure it is exactly as expected data verify that data from the previous build appears in the updated build as expected bookmarks etc verify that the cookies from the previous build are preserved after upgrade verify saved password are retained after upgrade verify stats are retained after upgrade verify sync chain created in the previous version is still retained on upgrade verify per site settings are preserved after upgrade bookmarks verify that creating a bookmark works verify that clicking a bookmark from bookmark manager loads the bookmark verify that deleting a bookmark works verify that creating a bookmark folder works verify that creating a bookmark inside the created folder works verify that you can add a bookmark directly inside a bookmark folder verify that you can delete a bookmark in edit mode verify that you can delete a bookmark folder with bookmarks inside verify adding a bookmark domain subpaths is retained and you are successfully able to visit the domain subpath in a new tab favourites verify editing favourite and changing url updates the favicons accordingly verify that you can remove favourites verify that you can add new favourites from the share menu context menus make sure context menu items in the url bar work make sure context menu items on content work with no selected text make sure context menu items on content work with selected text make sure context menu items on content work inside an editable control input textarea or contenteditable context menu verify you can open in background tab and open in private tab downloads verify that you can save an image from a site verify that you are able to save a gif image reader mode visit open any article verify the reader mode icon is shown in the url bar verify tapping on the reader mode icon opens the article in reader mode edit reader mode settings and open different pages in reader mode and verify if the setting is retained across each article gestures verify zoom in out gestures work on verify that navigating to a different origin resets the zoom swipe back and forward to navigate verify this works as expected password managers verify tapping on on the slide out keyboard launches app and able to select the stored credentials verify tapping on bitwarden password manager in the autofill field launches the app and auto fills the stored data shields settings enable all switches in settings and visit a site and disable block scripts kill and relaunch the app and verify if the site shield settings are retained browser lock verify browser lock enables device passcode to be lock unlock the browser verify swipe up swipe down with browser in focus doesn t ask for device passcode verify cancel passcode shows unlock message remove the app from memory and relaunch enter a wrong passcode the browser should not be unlocked verify cancel fingerprint confirmation face unlock shows enter passcode window when fingerprint face unlock is set up on the device brave rewards ads verify wallet is auto created after enabling rewards verify when you click on the br panel while on a site the panel displays if the site is verified or not verify ads are only shown when the app is being used verify clicking on an ad notification shows the landing page verify inline ads show on brave news and is correctly redeemed from the server verify view clicked and landed and dismiss states are logged based on the action sync verify you are able to join sync chain by scanning the qr code verify you are able to join sync chain using code words verify you are able to create a sync chain on the device and add other devices to the chain via qr code codewords verify that bookmarks from other devices on the chain show up on the mobile device after sync completes verify newly created bookmarks get synced to all devices on the sync chain verify existing bookmarks before joining sync chain also gets sync d to all devices on the sync chain verify histroy sync is disabled by default enabling it starts sync ing history items as well limited to entries verify sync works on an upgrade profile and new bookmarks added post upgrade sync s across devices on the chain verify you can create a standalone sync chain with one device playlist autoplay verify playlist is enabled by default on a clean install verify when a site with audio video is detected playlist button is shown in url bar and a notification badge on the menu verify clicking the playlist button adds audio video to playlist and initiates offline play verify able to add audio video to playlist via share menu verify able to add audio video to playlist via long press context menu verify autoplay is enabled by default verify with autoplay enabled able to play audio video automatically verify with background audio enabled able to play audio video with device locked or app in background brave news verify brave news opt in is shown on a clean install verify once opted in brave news starts showing artciles verify promoted content is shown on brave news verify in line ads are shown on brave news verify able to add custom rss feed to the list of sources verify able to disable content from a particular publisher by long press on the card bravery settings check that https everywhere works by loading turning https everywhere off or shields off both disable the redirect to check that block ad and unblock ad works on check that toggling to blocking and allow ads works as expected verify that clicking through a cert error in works verify that safe browsing works enable block script globally from settings visit nothing should load tap on shields and disable block script the page should load properly verify that preferences default brave shields settings take effect on pages with no site settings fingerprint tests verify that turning on fingerprinting protection in preferences shows fingerprint blocked at verify that turning it off in the bravery menu shows fingerprints blocked verify that audio fingerprint is blocked at when fingerprinting protection is on verify that doesn t leak ip address when block all fingerprinting protection is on content tests go to and make sure that the password can be saved make sure the saved password is auto populated when you visit the site again open an email on or inbox google com and click on a link make sure it works verify that pdf is loaded over https at verify that pdf is loaded over http at verify that shows up as grey not red no mixed content scripts are run verify that search results from open in a new tab due to target being blank webauthn verify browser prompts for security key when trying to login to accounts verify you are able to successfully authenticate an account using security key when prompted verify quickly connect and disconnect doesn t cause issue authenticating using security keys verify you are able to use security keys on both normal and private tabs verify you are able to use security keys to authenticate using nfc app linker long press on a link in the twitter app to get the share picker choose brave verify brave doesn t crash after opening the link session storage verify that tabs restore when closed including active tab | 1 |
68,861 | 21,930,466,311 | IssuesEvent | 2022-05-23 09:17:11 | SeleniumHQ/selenium | https://api.github.com/repos/SeleniumHQ/selenium | opened | [🐛 Bug]: The previously configured ChromeDriver service is still running. (wrong error message for unsupported chromedriver version?) | I-defect needs-triaging | ### What happened?
My tests ran fine before a system upgrade. Now I get: Even if running my tests is the first thing I do after booting my computer.
```
Error: The previously configured ChromeDriver service is still running. You must shut it down before you may adjust its configuration.
at Object.setDefaultService (/home/ploppz/oa/minos/ui/node_modules/.pnpm/selenium-webdriver@4.1.2/node_modules/selenium-webdriver/chrome.js:262:11)
at buildChromeDriver (/home/ploppz/oa/minos/ui/tests/features/support/world.js:20:10)
```
### How can we reproduce the issue?
```shell
The code is not open source, but I have a suspicion that it has to do with my version of `chromium`. I'm on Arch Linux, and after the system update, my `chromium` version is `101`. Does Selenium support this chromium version? If not, then perhaps the error message could be improved.
```
### Relevant log output
```shell
.
```
### Operating System
Arch Linux
### Selenium version
4.1.2
### What are the browser(s) and version(s) where you see this issue?
chromium 101
### What are the browser driver(s) and version(s) where you see this issue?
chromedriver 101
### Are you using Selenium Grid?
_No response_ | 1.0 | [🐛 Bug]: The previously configured ChromeDriver service is still running. (wrong error message for unsupported chromedriver version?) - ### What happened?
My tests ran fine before a system upgrade. Now I get: Even if running my tests is the first thing I do after booting my computer.
```
Error: The previously configured ChromeDriver service is still running. You must shut it down before you may adjust its configuration.
at Object.setDefaultService (/home/ploppz/oa/minos/ui/node_modules/.pnpm/selenium-webdriver@4.1.2/node_modules/selenium-webdriver/chrome.js:262:11)
at buildChromeDriver (/home/ploppz/oa/minos/ui/tests/features/support/world.js:20:10)
```
### How can we reproduce the issue?
```shell
The code is not open source, but I have a suspicion that it has to do with my version of `chromium`. I'm on Arch Linux, and after the system update, my `chromium` version is `101`. Does Selenium support this chromium version? If not, then perhaps the error message could be improved.
```
### Relevant log output
```shell
.
```
### Operating System
Arch Linux
### Selenium version
4.1.2
### What are the browser(s) and version(s) where you see this issue?
chromium 101
### What are the browser driver(s) and version(s) where you see this issue?
chromedriver 101
### Are you using Selenium Grid?
_No response_ | non_test | the previously configured chromedriver service is still running wrong error message for unsupported chromedriver version what happened my tests ran fine before a system upgrade now i get even if running my tests is the first thing i do after booting my computer error the previously configured chromedriver service is still running you must shut it down before you may adjust its configuration at object setdefaultservice home ploppz oa minos ui node modules pnpm selenium webdriver node modules selenium webdriver chrome js at buildchromedriver home ploppz oa minos ui tests features support world js how can we reproduce the issue shell the code is not open source but i have a suspicion that it has to do with my version of chromium i m on arch linux and after the system update my chromium version is does selenium support this chromium version if not then perhaps the error message could be improved relevant log output shell operating system arch linux selenium version what are the browser s and version s where you see this issue chromium what are the browser driver s and version s where you see this issue chromedriver are you using selenium grid no response | 0 |
305,859 | 26,416,528,004 | IssuesEvent | 2023-01-13 16:24:17 | unifyai/ivy | https://api.github.com/repos/unifyai/ivy | closed | Fix extrema_finding.test_numpy_minimum | NumPy Frontend Sub Task Failing Test | | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/3892381568/jobs/6643729625" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="null" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="null" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/3892381568/jobs/6643729625" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_mathematical_functions/test_extrema_finding.py::test_numpy_minimum[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-01-11T11:48:41.9822443Z E AssertionError: [ -1 -1 -1 -1 -128] != [-1 -1 -1 -1 -1]
2023-01-11T11:48:41.9823074Z E Falsifying example: test_numpy_minimum(
2023-01-11T11:48:41.9823834Z E dtypes_values_casting=(['float32', 'float32'],
2023-01-11T11:48:41.9824619Z E [array([-1., -1., -1., -1., -1.], dtype=float32),
2023-01-11T11:48:41.9825422Z E array([ -1., -1., -1., -1., -129.], dtype=float32)],
2023-01-11T11:48:41.9826022Z E 'unsafe',
2023-01-11T11:48:41.9826509Z E 'int8'),
2023-01-11T11:48:41.9827072Z E where=[array([ True, False, False, False, False])],
2023-01-11T11:48:41.9827667Z E num_positional_args=2,
2023-01-11T11:48:41.9828165Z E native_array=[False],
2023-01-11T11:48:41.9828657Z E as_variable=[False],
2023-01-11T11:48:41.9829113Z E with_out=False,
2023-01-11T11:48:41.9829894Z E fn_tree='ivy.functional.frontends.numpy.minimum',
2023-01-11T11:48:41.9830806Z E frontend='numpy',
2023-01-11T11:48:41.9831353Z E on_device='cpu',
2023-01-11T11:48:41.9831782Z E )
2023-01-11T11:48:41.9832156Z E
2023-01-11T11:48:41.9833440Z E You can reproduce this example by temporarily adding @reproduce_failure('6.55.0', b'AXicY2FgZGBhAAJGBghgpCO7kRHGAgIAEXUAoA==') as a decorator on your test case
</details>
| 1.0 | Fix extrema_finding.test_numpy_minimum - | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/3892381568/jobs/6643729625" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="null" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="null" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/3892381568/jobs/6643729625" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_mathematical_functions/test_extrema_finding.py::test_numpy_minimum[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-01-11T11:48:41.9822443Z E AssertionError: [ -1 -1 -1 -1 -128] != [-1 -1 -1 -1 -1]
2023-01-11T11:48:41.9823074Z E Falsifying example: test_numpy_minimum(
2023-01-11T11:48:41.9823834Z E dtypes_values_casting=(['float32', 'float32'],
2023-01-11T11:48:41.9824619Z E [array([-1., -1., -1., -1., -1.], dtype=float32),
2023-01-11T11:48:41.9825422Z E array([ -1., -1., -1., -1., -129.], dtype=float32)],
2023-01-11T11:48:41.9826022Z E 'unsafe',
2023-01-11T11:48:41.9826509Z E 'int8'),
2023-01-11T11:48:41.9827072Z E where=[array([ True, False, False, False, False])],
2023-01-11T11:48:41.9827667Z E num_positional_args=2,
2023-01-11T11:48:41.9828165Z E native_array=[False],
2023-01-11T11:48:41.9828657Z E as_variable=[False],
2023-01-11T11:48:41.9829113Z E with_out=False,
2023-01-11T11:48:41.9829894Z E fn_tree='ivy.functional.frontends.numpy.minimum',
2023-01-11T11:48:41.9830806Z E frontend='numpy',
2023-01-11T11:48:41.9831353Z E on_device='cpu',
2023-01-11T11:48:41.9831782Z E )
2023-01-11T11:48:41.9832156Z E
2023-01-11T11:48:41.9833440Z E You can reproduce this example by temporarily adding @reproduce_failure('6.55.0', b'AXicY2FgZGBhAAJGBghgpCO7kRHGAgIAEXUAoA==') as a decorator on your test case
</details>
| test | fix extrema finding test numpy minimum tensorflow img src torch img src numpy img src jax img src failed ivy tests test ivy test frontends test numpy test mathematical functions test extrema finding py test numpy minimum e assertionerror e falsifying example test numpy minimum e dtypes values casting e dtype e array dtype e unsafe e e where e num positional args e native array e as variable e with out false e fn tree ivy functional frontends numpy minimum e frontend numpy e on device cpu e e e you can reproduce this example by temporarily adding reproduce failure b as a decorator on your test case | 1 |
1,865 | 10,987,498,009 | IssuesEvent | 2019-12-02 09:20:42 | sourcegraph/sourcegraph | https://api.github.com/repos/sourcegraph/sourcegraph | reopened | a8n: Implement retryCampaign mutation | automation | This is a follow-up to [RFC 42](https://docs.google.com/document/d/1j85PoL6NOzLX_PHFzBQogZcnttYK0BXj9XnrxF3DYmA/edit).
Right now, when the `createCampaign` mutation with a given `CampaignPlan` ID fails due to various reasons (GitHub not reachable, token invalid, gitserver down, ...) the conversion of `ChangesetJobs` into `Changesets` in the `(&a8n.Service).runChangesetJob` ends with the `ChangesetJobs` having its `Error` field populated. [See the code here](https://sourcegraph.com/github.com/sourcegraph/sourcegraph@034cee47c83a7734cf04a4b5720717665b5a69db/-/blob/enterprise/pkg/a8n/service.go#L114)
What we want is a `retryCampaign` mutation that
* takes in a `Campaign` ID
* loads all the failed `ChangesetJobs` (definition: `finished_at` is null, or `error` is non-blank, or no `Changeset` with its `changeset_job_id` exists)
* uses `(&a8n.Service).runChangesetJob` to try again to create a commit from the given diff in the connected CampaignJob, push the commit, open a pull request on the codehost, save the pull request as an external service
**Important**: for that to work, the `runChangesetJob` method must be idempotent! That means: if it runs twice with the same `ChangesetJob` is **cannot create duplicate pull requests!**. That means it needs to check that new commits are not added to same branch, check for `ErrAlreadyExists` response from code hosts, early-exit if a `Changset` with the given `changeset_job_id` exists, etc.
| 1.0 | a8n: Implement retryCampaign mutation - This is a follow-up to [RFC 42](https://docs.google.com/document/d/1j85PoL6NOzLX_PHFzBQogZcnttYK0BXj9XnrxF3DYmA/edit).
Right now, when the `createCampaign` mutation with a given `CampaignPlan` ID fails due to various reasons (GitHub not reachable, token invalid, gitserver down, ...) the conversion of `ChangesetJobs` into `Changesets` in the `(&a8n.Service).runChangesetJob` ends with the `ChangesetJobs` having its `Error` field populated. [See the code here](https://sourcegraph.com/github.com/sourcegraph/sourcegraph@034cee47c83a7734cf04a4b5720717665b5a69db/-/blob/enterprise/pkg/a8n/service.go#L114)
What we want is a `retryCampaign` mutation that
* takes in a `Campaign` ID
* loads all the failed `ChangesetJobs` (definition: `finished_at` is null, or `error` is non-blank, or no `Changeset` with its `changeset_job_id` exists)
* uses `(&a8n.Service).runChangesetJob` to try again to create a commit from the given diff in the connected CampaignJob, push the commit, open a pull request on the codehost, save the pull request as an external service
**Important**: for that to work, the `runChangesetJob` method must be idempotent! That means: if it runs twice with the same `ChangesetJob` is **cannot create duplicate pull requests!**. That means it needs to check that new commits are not added to same branch, check for `ErrAlreadyExists` response from code hosts, early-exit if a `Changset` with the given `changeset_job_id` exists, etc.
| non_test | implement retrycampaign mutation this is a follow up to right now when the createcampaign mutation with a given campaignplan id fails due to various reasons github not reachable token invalid gitserver down the conversion of changesetjobs into changesets in the service runchangesetjob ends with the changesetjobs having its error field populated what we want is a retrycampaign mutation that takes in a campaign id loads all the failed changesetjobs definition finished at is null or error is non blank or no changeset with its changeset job id exists uses service runchangesetjob to try again to create a commit from the given diff in the connected campaignjob push the commit open a pull request on the codehost save the pull request as an external service important for that to work the runchangesetjob method must be idempotent that means if it runs twice with the same changesetjob is cannot create duplicate pull requests that means it needs to check that new commits are not added to same branch check for erralreadyexists response from code hosts early exit if a changset with the given changeset job id exists etc | 0 |
5,972 | 2,797,837,235 | IssuesEvent | 2015-05-12 15:37:01 | LinDA-tools/LindaWorkbench | https://api.github.com/repos/LinDA-tools/LindaWorkbench | opened | Undo functionality | enhancement LinDA Query Designer | Important: undo functionality it would be vital, so that we do not mess the saved queries, by mistake. | 1.0 | Undo functionality - Important: undo functionality it would be vital, so that we do not mess the saved queries, by mistake. | non_test | undo functionality important undo functionality it would be vital so that we do not mess the saved queries by mistake | 0 |
137,940 | 30,778,994,881 | IssuesEvent | 2023-07-31 08:42:54 | Makkuusen/TimingSystem | https://api.github.com/repos/Makkuusen/TimingSystem | closed | Sorting by position in trackpage gui's is really slow. | code smell user experience | Add some sort of caching for player positions to make sure the sort goes faster. | 1.0 | Sorting by position in trackpage gui's is really slow. - Add some sort of caching for player positions to make sure the sort goes faster. | non_test | sorting by position in trackpage gui s is really slow add some sort of caching for player positions to make sure the sort goes faster | 0 |
93,233 | 8,405,972,370 | IssuesEvent | 2018-10-11 16:35:41 | italia/spid | https://api.github.com/repos/italia/spid | closed | Richiesta di validazione dei metadati - Comune di Vellezzo Bellini | metadata nuovo md test | Buongiorno,
per conto del Comune di Vellezzo Bellini si richiede la verifica e il deploy dei metadati esposti all'URL:
https://sportellotelematico.comune.vellezzobellini.pv.it/simplesaml/module.php/saml/sp/metadata.php/spid | 1.0 | Richiesta di validazione dei metadati - Comune di Vellezzo Bellini - Buongiorno,
per conto del Comune di Vellezzo Bellini si richiede la verifica e il deploy dei metadati esposti all'URL:
https://sportellotelematico.comune.vellezzobellini.pv.it/simplesaml/module.php/saml/sp/metadata.php/spid | test | richiesta di validazione dei metadati comune di vellezzo bellini buongiorno per conto del comune di vellezzo bellini si richiede la verifica e il deploy dei metadati esposti all url | 1 |
308,417 | 26,606,060,196 | IssuesEvent | 2023-01-23 19:26:24 | podkrepi-bg/api | https://api.github.com/repos/podkrepi-bg/api | closed | Investigate and fix jest warnings | type: bug area: testing | ### Which area(s) of Podkrepi.bg are affected? (leave empty if unsure)
Testing
### Describe the Bug
During the testing phase we observe the following in the logs
```
● Validation Warning:
Unknown option "coverageDirectory" with value "../../coverage/apps/api" was found.
This is probably a typing mistake. Fixing it will remove this message.
Configuration Documentation:
https://jestjs.io/docs/configuration
ts-jest[ts-jest-transformer] (WARN) Define `ts-jest` config under `globals` is deprecated. Please do
transform: {
<transform_regex>: ['ts-jest', { /* ts-jest config goes here in Jest */ }],
},
```
### To Reproduce
run
```
yarn jest
```
### Expected Behavior
No warnings
### Which browser are you using? (if relevant)
_No response_ | 1.0 | Investigate and fix jest warnings - ### Which area(s) of Podkrepi.bg are affected? (leave empty if unsure)
Testing
### Describe the Bug
During the testing phase we observe the following in the logs
```
● Validation Warning:
Unknown option "coverageDirectory" with value "../../coverage/apps/api" was found.
This is probably a typing mistake. Fixing it will remove this message.
Configuration Documentation:
https://jestjs.io/docs/configuration
ts-jest[ts-jest-transformer] (WARN) Define `ts-jest` config under `globals` is deprecated. Please do
transform: {
<transform_regex>: ['ts-jest', { /* ts-jest config goes here in Jest */ }],
},
```
### To Reproduce
run
```
yarn jest
```
### Expected Behavior
No warnings
### Which browser are you using? (if relevant)
_No response_ | test | investigate and fix jest warnings which area s of podkrepi bg are affected leave empty if unsure testing describe the bug during the testing phase we observe the following in the logs ● validation warning unknown option coveragedirectory with value coverage apps api was found this is probably a typing mistake fixing it will remove this message configuration documentation ts jest warn define ts jest config under globals is deprecated please do transform to reproduce run yarn jest expected behavior no warnings which browser are you using if relevant no response | 1 |
23,668 | 4,031,524,812 | IssuesEvent | 2016-05-18 17:28:18 | bazelbuild/bazel | https://api.github.com/repos/bazelbuild/bazel | reopened | RemoteWorker broken on JDK 7 | category: testing P1 type: bug | See http://ci.bazel.io/job/bazel-tests/BAZEL_VERSION=HEAD-jdk7,PLATFORM_NAME=darwin-x86_64/5/console:
```
Note: Recompile with -Xlint:deprecation for details.
____[2,328 / 2,425] Extracting interface //src/main/java/com/google/devtools/build/lib/remote:remote
ERROR: /Users/ci/workspace/bazel-tests/BAZEL_VERSION/HEAD-jdk7/PLATFORM_NAME/darwin-x86_64/src/tools/remote_worker/src/main/java/com/google/devtools/build/remote/BUILD:1:1: Couldn't build file src/tools/remote_worker/src/main/java/com/google/devtools/build/remote/libremote.jar: Java compilation in rule '//src/tools/remote_worker/src/main/java/com/google/devtools/build/remote:remote' failed: java failed: error executing command
(cd /private/var/tmp/_bazel_ci/14bf93ceb0c9200fc39d844714861a53/execroot/darwin-x86_64 && \
exec env - \
LC_CTYPE=en_US.UTF-8 \
external/local_jdk/bin/java -Xbootclasspath/p:external/bazel_tools/third_party/java/jdk/langtools/javac7.jar -client -jar external/bazel_tools/tools/jdk/JavaBuilder_deploy.jar @bazel-out/local-fastbuild/bin/src/tools/remote_worker/src/main/java/com/google/devtools/build/remote/libremote.jar-2.params): com.google.devtools.build.lib.shell.BadExitStatusException: Process exited with status 1.
src/tools/remote_worker/src/main/java/com/google/devtools/build/remote/RemoteWorker.java:153: error: local variable server is accessed from within inner class; needs to be declared final
server.shutdown();
^
1 error
```
CC @hhclam
| 1.0 | RemoteWorker broken on JDK 7 - See http://ci.bazel.io/job/bazel-tests/BAZEL_VERSION=HEAD-jdk7,PLATFORM_NAME=darwin-x86_64/5/console:
```
Note: Recompile with -Xlint:deprecation for details.
____[2,328 / 2,425] Extracting interface //src/main/java/com/google/devtools/build/lib/remote:remote
ERROR: /Users/ci/workspace/bazel-tests/BAZEL_VERSION/HEAD-jdk7/PLATFORM_NAME/darwin-x86_64/src/tools/remote_worker/src/main/java/com/google/devtools/build/remote/BUILD:1:1: Couldn't build file src/tools/remote_worker/src/main/java/com/google/devtools/build/remote/libremote.jar: Java compilation in rule '//src/tools/remote_worker/src/main/java/com/google/devtools/build/remote:remote' failed: java failed: error executing command
(cd /private/var/tmp/_bazel_ci/14bf93ceb0c9200fc39d844714861a53/execroot/darwin-x86_64 && \
exec env - \
LC_CTYPE=en_US.UTF-8 \
external/local_jdk/bin/java -Xbootclasspath/p:external/bazel_tools/third_party/java/jdk/langtools/javac7.jar -client -jar external/bazel_tools/tools/jdk/JavaBuilder_deploy.jar @bazel-out/local-fastbuild/bin/src/tools/remote_worker/src/main/java/com/google/devtools/build/remote/libremote.jar-2.params): com.google.devtools.build.lib.shell.BadExitStatusException: Process exited with status 1.
src/tools/remote_worker/src/main/java/com/google/devtools/build/remote/RemoteWorker.java:153: error: local variable server is accessed from within inner class; needs to be declared final
server.shutdown();
^
1 error
```
CC @hhclam
| test | remoteworker broken on jdk see note recompile with xlint deprecation for details extracting interface src main java com google devtools build lib remote remote error users ci workspace bazel tests bazel version head platform name darwin src tools remote worker src main java com google devtools build remote build couldn t build file src tools remote worker src main java com google devtools build remote libremote jar java compilation in rule src tools remote worker src main java com google devtools build remote remote failed java failed error executing command cd private var tmp bazel ci execroot darwin exec env lc ctype en us utf external local jdk bin java xbootclasspath p external bazel tools third party java jdk langtools jar client jar external bazel tools tools jdk javabuilder deploy jar bazel out local fastbuild bin src tools remote worker src main java com google devtools build remote libremote jar params com google devtools build lib shell badexitstatusexception process exited with status src tools remote worker src main java com google devtools build remote remoteworker java error local variable server is accessed from within inner class needs to be declared final server shutdown error cc hhclam | 1 |
66,328 | 20,153,328,356 | IssuesEvent | 2022-02-09 14:25:29 | idaholab/raven | https://api.github.com/repos/idaholab/raven | opened | [DEFECT] Some EconomicRatio Metrics | priority_normal defect | ### Thank you for the defect report
- [X] I am using the latest version of `RAVEN`.
- [X] I have read the [Wiki](https://github.com/idaholab/raven/wiki).
- [X] I have created a [minimum, reproducible example](https://stackoverflow.com/help/minimal-reproducible-example)
that demonstrates the defect.
### Defect Description
Requesting sortinoRatio or gainLossRatio from the EconomicRatio PostProcessor with inputs/outputs containing a pivotParameter (HistorySet or DataSet) result in an error. All other metrics (sharpeRatio, expectedShortfall, and valueAtRisk) can handle these inputs.
### Steps to Reproduce
Use HistorySet data as input to EconomicRatio PostProcessor and request sortinoRatio or gainLossRatio metrics.
### Expected Behavior
Calculate the requested metrics and return them as HistorySet or DataSet.
### Screenshots and Input Files
_No response_
### OS
Windows
### OS Version
_No response_
### Dependency Manager
CONDA
### For Change Control Board: Issue Review
- [X] Is it tagged with a type: defect or task?
- [X] Is it tagged with a priority: critical, normal or minor?
- [X] If it will impact requirements or requirements tests, is it tagged with requirements?
- [X] If it is a defect, can it cause wrong results for users? If so an email needs to be sent to the users.
- [X] Is a rationale provided? (Such as explaining why the improvement is needed or why current code is wrong.)
### For Change Control Board: Issue Closure
- [ ] If the issue is a defect, is the defect fixed?
- [ ] If the issue is a defect, is the defect tested for in the regression test system? (If not explain why not.)
- [ ] If the issue can impact users, has an email to the users group been written (the email should specify if the defect impacts stable or master)?
- [ ] If the issue is a defect, does it impact the latest release branch? If yes, is there any issue tagged with release (create if needed)?
- [ ] If the issue is being closed without a pull request, has an explanation of why it is being closed been provided? | 1.0 | [DEFECT] Some EconomicRatio Metrics - ### Thank you for the defect report
- [X] I am using the latest version of `RAVEN`.
- [X] I have read the [Wiki](https://github.com/idaholab/raven/wiki).
- [X] I have created a [minimum, reproducible example](https://stackoverflow.com/help/minimal-reproducible-example)
that demonstrates the defect.
### Defect Description
Requesting sortinoRatio or gainLossRatio from the EconomicRatio PostProcessor with inputs/outputs containing a pivotParameter (HistorySet or DataSet) result in an error. All other metrics (sharpeRatio, expectedShortfall, and valueAtRisk) can handle these inputs.
### Steps to Reproduce
Use HistorySet data as input to EconomicRatio PostProcessor and request sortinoRatio or gainLossRatio metrics.
### Expected Behavior
Calculate the requested metrics and return them as HistorySet or DataSet.
### Screenshots and Input Files
_No response_
### OS
Windows
### OS Version
_No response_
### Dependency Manager
CONDA
### For Change Control Board: Issue Review
- [X] Is it tagged with a type: defect or task?
- [X] Is it tagged with a priority: critical, normal or minor?
- [X] If it will impact requirements or requirements tests, is it tagged with requirements?
- [X] If it is a defect, can it cause wrong results for users? If so an email needs to be sent to the users.
- [X] Is a rationale provided? (Such as explaining why the improvement is needed or why current code is wrong.)
### For Change Control Board: Issue Closure
- [ ] If the issue is a defect, is the defect fixed?
- [ ] If the issue is a defect, is the defect tested for in the regression test system? (If not explain why not.)
- [ ] If the issue can impact users, has an email to the users group been written (the email should specify if the defect impacts stable or master)?
- [ ] If the issue is a defect, does it impact the latest release branch? If yes, is there any issue tagged with release (create if needed)?
- [ ] If the issue is being closed without a pull request, has an explanation of why it is being closed been provided? | non_test | some economicratio metrics thank you for the defect report i am using the latest version of raven i have read the i have created a that demonstrates the defect defect description requesting sortinoratio or gainlossratio from the economicratio postprocessor with inputs outputs containing a pivotparameter historyset or dataset result in an error all other metrics sharperatio expectedshortfall and valueatrisk can handle these inputs steps to reproduce use historyset data as input to economicratio postprocessor and request sortinoratio or gainlossratio metrics expected behavior calculate the requested metrics and return them as historyset or dataset screenshots and input files no response os windows os version no response dependency manager conda for change control board issue review is it tagged with a type defect or task is it tagged with a priority critical normal or minor if it will impact requirements or requirements tests is it tagged with requirements if it is a defect can it cause wrong results for users if so an email needs to be sent to the users is a rationale provided such as explaining why the improvement is needed or why current code is wrong for change control board issue closure if the issue is a defect is the defect fixed if the issue is a defect is the defect tested for in the regression test system if not explain why not if the issue can impact users has an email to the users group been written the email should specify if the defect impacts stable or master if the issue is a defect does it impact the latest release branch if yes is there any issue tagged with release create if needed if the issue is being closed without a pull request has an explanation of why it is being closed been provided | 0 |
251,415 | 18,949,396,115 | IssuesEvent | 2021-11-18 13:46:05 | greenplum-db/sre-test | https://api.github.com/repos/greenplum-db/sre-test | opened | Hyperlink Text in release note is misleading | PXF Documentation 6.2 | Location : https://gpdb.docs.pivotal.io/pxf/6-2/release/release-notes.html
Under the release note for version 6.0.0, under topic "files, configuration and commands" 5th bullet mentions :
Run this command after your first installation of PXF, and/or after you upgrade your "Greenplum Database installation"
The hyperlink correctly points to the upgrade PXF documents , however the hyperlink text highlights only "Greenplum Database installation". This gives the impression that the URL is pointing to the installation guide and not the upgrade guide.
| 1.0 | Hyperlink Text in release note is misleading - Location : https://gpdb.docs.pivotal.io/pxf/6-2/release/release-notes.html
Under the release note for version 6.0.0, under topic "files, configuration and commands" 5th bullet mentions :
Run this command after your first installation of PXF, and/or after you upgrade your "Greenplum Database installation"
The hyperlink correctly points to the upgrade PXF documents , however the hyperlink text highlights only "Greenplum Database installation". This gives the impression that the URL is pointing to the installation guide and not the upgrade guide.
| non_test | hyperlink text in release note is misleading location under the release note for version under topic files configuration and commands bullet mentions run this command after your first installation of pxf and or after you upgrade your greenplum database installation the hyperlink correctly points to the upgrade pxf documents however the hyperlink text highlights only greenplum database installation this gives the impression that the url is pointing to the installation guide and not the upgrade guide | 0 |
163,503 | 20,363,826,949 | IssuesEvent | 2022-02-21 01:33:03 | rgordon95/simple-react-redux-demo | https://api.github.com/repos/rgordon95/simple-react-redux-demo | opened | CVE-2022-0512 (High) detected in url-parse-1.4.4.tgz | security vulnerability | ## CVE-2022-0512 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.4.4.tgz</b></p></summary>
<p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p>
<p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.4.4.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.4.4.tgz</a></p>
<p>Path to dependency file: /simple-react-redux-demo/package.json</p>
<p>Path to vulnerable library: /node_modules/url-parse/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-2.1.8.tgz (Root Library)
- react-dev-utils-8.0.0.tgz
- sockjs-client-1.3.0.tgz
- :x: **url-parse-1.4.4.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
<p>Publish Date: 2022-02-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0512>CVE-2022-0512</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0512</a></p>
<p>Release Date: 2022-02-14</p>
<p>Fix Resolution: url-parse - 1.5.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-0512 (High) detected in url-parse-1.4.4.tgz - ## CVE-2022-0512 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>url-parse-1.4.4.tgz</b></p></summary>
<p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p>
<p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.4.4.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.4.4.tgz</a></p>
<p>Path to dependency file: /simple-react-redux-demo/package.json</p>
<p>Path to vulnerable library: /node_modules/url-parse/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-2.1.8.tgz (Root Library)
- react-dev-utils-8.0.0.tgz
- sockjs-client-1.3.0.tgz
- :x: **url-parse-1.4.4.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
<p>Publish Date: 2022-02-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0512>CVE-2022-0512</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0512">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0512</a></p>
<p>Release Date: 2022-02-14</p>
<p>Fix Resolution: url-parse - 1.5.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve high detected in url parse tgz cve high severity vulnerability vulnerable library url parse tgz small footprint url parser that works seamlessly across node js and browser environments library home page a href path to dependency file simple react redux demo package json path to vulnerable library node modules url parse package json dependency hierarchy react scripts tgz root library react dev utils tgz sockjs client tgz x url parse tgz vulnerable library vulnerability details authorization bypass through user controlled key in npm url parse prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution url parse step up your open source security game with whitesource | 0 |
227,695 | 18,093,434,852 | IssuesEvent | 2021-09-22 06:07:59 | zcash/zcash | https://api.github.com/repos/zcash/zcash | opened | low priority test bug: z_sendmany argument (parameter) boost unit tests are inoperable | A-wallet A-testing A-rpc-interface | This bug is low-priority (test only).
You can run the `z_sendmany` argument checking [tests](https://github.com/zcash/zcash/blob/a88a98af235a2eb83e2fcdb18d26714d0cb1a1ad/src/wallet/test/rpc_wallet_tests.cpp#L993) by running:
```
src/test/test_bitcoin --run_test=rpc_wallet_tests/rpc_z_sendmany_parameters
```
and of course they currently all pass, and what that actually means is that executing `z_sendmany` with various invalid parameters causes it to throw an (expected) exception. But since #4349 was merged, they pass because the test environment is in "initial block download" (IBD) state, and almost the first thing `z_sendmany` checks is if we're in IBD, and if so, it throws an exception. So these tests never actually reach the argument parsing and checking that's being done farther down in `z_sendmany`.
One solution would be to take the test environment out of IBD state before running these tests. It's not obvious how to do that, the best way may be to mock the `IsInitialBlockDownload()` function (to make it return `false`).
There are two other wallet RPCs that do this same early IBD check, `z_shieldcoinbase` and `z_mergetoaddress`, and they likely have the same problem (I didn't investigate to be sure). | 1.0 | low priority test bug: z_sendmany argument (parameter) boost unit tests are inoperable - This bug is low-priority (test only).
You can run the `z_sendmany` argument checking [tests](https://github.com/zcash/zcash/blob/a88a98af235a2eb83e2fcdb18d26714d0cb1a1ad/src/wallet/test/rpc_wallet_tests.cpp#L993) by running:
```
src/test/test_bitcoin --run_test=rpc_wallet_tests/rpc_z_sendmany_parameters
```
and of course they currently all pass, and what that actually means is that executing `z_sendmany` with various invalid parameters causes it to throw an (expected) exception. But since #4349 was merged, they pass because the test environment is in "initial block download" (IBD) state, and almost the first thing `z_sendmany` checks is if we're in IBD, and if so, it throws an exception. So these tests never actually reach the argument parsing and checking that's being done farther down in `z_sendmany`.
One solution would be to take the test environment out of IBD state before running these tests. It's not obvious how to do that, the best way may be to mock the `IsInitialBlockDownload()` function (to make it return `false`).
There are two other wallet RPCs that do this same early IBD check, `z_shieldcoinbase` and `z_mergetoaddress`, and they likely have the same problem (I didn't investigate to be sure). | test | low priority test bug z sendmany argument parameter boost unit tests are inoperable this bug is low priority test only you can run the z sendmany argument checking by running src test test bitcoin run test rpc wallet tests rpc z sendmany parameters and of course they currently all pass and what that actually means is that executing z sendmany with various invalid parameters causes it to throw an expected exception but since was merged they pass because the test environment is in initial block download ibd state and almost the first thing z sendmany checks is if we re in ibd and if so it throws an exception so these tests never actually reach the argument parsing and checking that s being done farther down in z sendmany one solution would be to take the test environment out of ibd state before running these tests it s not obvious how to do that the best way may be to mock the isinitialblockdownload function to make it return false there are two other wallet rpcs that do this same early ibd check z shieldcoinbase and z mergetoaddress and they likely have the same problem i didn t investigate to be sure | 1 |
343,540 | 30,671,616,134 | IssuesEvent | 2023-07-25 23:14:40 | microsoft/react-native-windows | https://api.github.com/repos/microsoft/react-native-windows | reopened | Error occuring when trying to run e2e-test-app | bug Area: Tests Needs: Repro | ### Problem Description
TypeError is being thrown when trying to run the e2e-test-app. Error occurs before test suite can run, and results in all tests failing.
### Steps To Reproduce
1. From root of `react-native-windows` repo, `cd package/e2e-test-app`
2. Run `yarn start`
3. In a separate window, run `yarn e2etest`
### Expected Results
Produces the following error message for all the tests that are attempted to be run:
TypeError: D:\react-native-windows\node_modules\safe-buffer\index.js: Cannot read property 'from' of undefined
at Converter.toBase64 (../../node_modules/convert-source-map/index.js:61:29)
at Converter.toComment (../../node_modules/convert-source-map/index.js:65:21)
at generateCode (../../node_modules/@babel/core/lib/transformation/file/generate.js:68:68)
at run (../../node_modules/@babel/core/lib/transformation/index.js:39:33)
at run.next (<anonymous>)
at transform (../../node_modules/@babel/core/lib/transform.js:22:41)
at transform.next (<anonymous>)
at evaluateSync (../../node_modules/gensync/index.js:251:28)
at sync (../../node_modules/gensync/index.js:89:14)
at stopHiding - secret - don't use this - v1 (../../node_modules/@babel/core/lib/errors/rewrite-stack-trace.js:47:12)
at transformSync (../../node_modules/@babel/core/lib/transform.js:43:76)
at ScriptTransformer.transformSource (../../node_modules/@jest/transform/build/ScriptTransformer.js:519:31)
at revertHook.exts (../../node_modules/@jest/transform/build/ScriptTransformer.js:750:18)
at Module._compile (../../node_modules/pirates/lib/index.js:130:29)
at Object.newLoader (../../node_modules/pirates/lib/index.js:141:7)
at Module.patchedRequire [as require] (../../node_modules/diagnostic-channel/dist/src/patchRequire.js:16:46)
at Object.<anonymous> (../../node_modules/lazystream/node_modules/readable-stream/lib/_stream_readable.js:12:14)
at Module._compile (../../node_modules/pirates/lib/index.js:136:24)
at Object.newLoader (../../node_modules/pirates/lib/index.js:141:7)
at Module.patchedRequire [as require] (../../node_modules/diagnostic-channel/dist/src/patchRequire.js:16:46)
at Object.<anonymous> (../../node_modules/lazystream/node_modules/readable-stream/readable.js:12:30)
at Module._compile (../../node_modules/pirates/lib/index.js:136:24)
at Object.newLoader (../../node_modules/pirates/lib/index.js:141:7)
at Module.patchedRequire [as require] (../../node_modules/diagnostic-channel/dist/src/patchRequire.js:16:46)
at Object.<anonymous> (../../node_modules/lazystream/node_modules/readable-stream/passthrough.js:1:18)
at Module._compile (../../node_modules/pirates/lib/index.js:136:24)
at Object.newLoader (../../node_modules/pirates/lib/index.js:141:7)
### CLI version
10.0.0-alpha.5
### Environment
```markdown
System:
OS: Windows 10 10.0.22621
CPU: (24) x64 AMD Ryzen Threadripper PRO 3945WX 12-Cores
Memory: 52.17 GB / 63.86 GB
Binaries:
Node: 18.12.1 - C:\Program Files\nodejs\node.EXE
Yarn: 1.22.19 - C:\Program Files (x86)\Yarn\bin\yarn.CMD
npm: 8.19.2 - C:\Program Files\nodejs\npm.CMD
Watchman: Not Found
SDKs:
Android SDK:
API Levels: 30, 31, 33
Build Tools: 30.0.3, 31.0.0, 33.0.0
System Images: android-29 | Google APIs Intel x86 Atom, android-30 | Google APIs Intel x86 Atom, android-30 | Google Play Intel x86 Atom, android-31 | Intel x86 Atom_64, android-31 | Google Play Intel x86 Atom_64, android-33 | Google APIs Intel x86 Atom_64
Android NDK: Not Found
Windows SDK:
AllowDevelopmentWithoutDevLicense: Enabled
AllowAllTrustedApps: Enabled
Versions: 10.0.18362.0, 10.0.19041.0, 10.0.22000.0
IDEs:
Android Studio: AI-213.7172.25.2113.9123335
Visual Studio: 17.4.33110.190 (Visual Studio Enterprise 2022), 16.11.33027.164 (Visual Studio Enterprise 2019)
Languages:
Java: 18.0.1.1 - C:\Program Files\Common Files\Oracle\Java\javapath\javac.EXE
npmPackages:
@react-native-community/cli: Not Found
react: Not Found
react-native: Not Found
react-native-windows: Not Found
npmGlobalPackages:
*react-native*: Not Found
```
### Target Platform Version
10.0.19041
### Target Device(s)
Desktop
### Visual Studio Version
Visual Studio 2022
### Build Configuration
Debug
### Snack, code example, screenshot, or link to a repository
[Repository](https://github.com/microsoft/react-native-windows/tree/main/packages/e2e-test-app)
Test Fail Screenshot:
 | 1.0 | Error occuring when trying to run e2e-test-app - ### Problem Description
TypeError is being thrown when trying to run the e2e-test-app. Error occurs before test suite can run, and results in all tests failing.
### Steps To Reproduce
1. From root of `react-native-windows` repo, `cd package/e2e-test-app`
2. Run `yarn start`
3. In a separate window, run `yarn e2etest`
### Expected Results
Produces the following error message for all the tests that are attempted to be run:
TypeError: D:\react-native-windows\node_modules\safe-buffer\index.js: Cannot read property 'from' of undefined
at Converter.toBase64 (../../node_modules/convert-source-map/index.js:61:29)
at Converter.toComment (../../node_modules/convert-source-map/index.js:65:21)
at generateCode (../../node_modules/@babel/core/lib/transformation/file/generate.js:68:68)
at run (../../node_modules/@babel/core/lib/transformation/index.js:39:33)
at run.next (<anonymous>)
at transform (../../node_modules/@babel/core/lib/transform.js:22:41)
at transform.next (<anonymous>)
at evaluateSync (../../node_modules/gensync/index.js:251:28)
at sync (../../node_modules/gensync/index.js:89:14)
at stopHiding - secret - don't use this - v1 (../../node_modules/@babel/core/lib/errors/rewrite-stack-trace.js:47:12)
at transformSync (../../node_modules/@babel/core/lib/transform.js:43:76)
at ScriptTransformer.transformSource (../../node_modules/@jest/transform/build/ScriptTransformer.js:519:31)
at revertHook.exts (../../node_modules/@jest/transform/build/ScriptTransformer.js:750:18)
at Module._compile (../../node_modules/pirates/lib/index.js:130:29)
at Object.newLoader (../../node_modules/pirates/lib/index.js:141:7)
at Module.patchedRequire [as require] (../../node_modules/diagnostic-channel/dist/src/patchRequire.js:16:46)
at Object.<anonymous> (../../node_modules/lazystream/node_modules/readable-stream/lib/_stream_readable.js:12:14)
at Module._compile (../../node_modules/pirates/lib/index.js:136:24)
at Object.newLoader (../../node_modules/pirates/lib/index.js:141:7)
at Module.patchedRequire [as require] (../../node_modules/diagnostic-channel/dist/src/patchRequire.js:16:46)
at Object.<anonymous> (../../node_modules/lazystream/node_modules/readable-stream/readable.js:12:30)
at Module._compile (../../node_modules/pirates/lib/index.js:136:24)
at Object.newLoader (../../node_modules/pirates/lib/index.js:141:7)
at Module.patchedRequire [as require] (../../node_modules/diagnostic-channel/dist/src/patchRequire.js:16:46)
at Object.<anonymous> (../../node_modules/lazystream/node_modules/readable-stream/passthrough.js:1:18)
at Module._compile (../../node_modules/pirates/lib/index.js:136:24)
at Object.newLoader (../../node_modules/pirates/lib/index.js:141:7)
### CLI version
10.0.0-alpha.5
### Environment
```markdown
System:
OS: Windows 10 10.0.22621
CPU: (24) x64 AMD Ryzen Threadripper PRO 3945WX 12-Cores
Memory: 52.17 GB / 63.86 GB
Binaries:
Node: 18.12.1 - C:\Program Files\nodejs\node.EXE
Yarn: 1.22.19 - C:\Program Files (x86)\Yarn\bin\yarn.CMD
npm: 8.19.2 - C:\Program Files\nodejs\npm.CMD
Watchman: Not Found
SDKs:
Android SDK:
API Levels: 30, 31, 33
Build Tools: 30.0.3, 31.0.0, 33.0.0
System Images: android-29 | Google APIs Intel x86 Atom, android-30 | Google APIs Intel x86 Atom, android-30 | Google Play Intel x86 Atom, android-31 | Intel x86 Atom_64, android-31 | Google Play Intel x86 Atom_64, android-33 | Google APIs Intel x86 Atom_64
Android NDK: Not Found
Windows SDK:
AllowDevelopmentWithoutDevLicense: Enabled
AllowAllTrustedApps: Enabled
Versions: 10.0.18362.0, 10.0.19041.0, 10.0.22000.0
IDEs:
Android Studio: AI-213.7172.25.2113.9123335
Visual Studio: 17.4.33110.190 (Visual Studio Enterprise 2022), 16.11.33027.164 (Visual Studio Enterprise 2019)
Languages:
Java: 18.0.1.1 - C:\Program Files\Common Files\Oracle\Java\javapath\javac.EXE
npmPackages:
@react-native-community/cli: Not Found
react: Not Found
react-native: Not Found
react-native-windows: Not Found
npmGlobalPackages:
*react-native*: Not Found
```
### Target Platform Version
10.0.19041
### Target Device(s)
Desktop
### Visual Studio Version
Visual Studio 2022
### Build Configuration
Debug
### Snack, code example, screenshot, or link to a repository
[Repository](https://github.com/microsoft/react-native-windows/tree/main/packages/e2e-test-app)
Test Fail Screenshot:
 | test | error occuring when trying to run test app problem description typeerror is being thrown when trying to run the test app error occurs before test suite can run and results in all tests failing steps to reproduce from root of react native windows repo cd package test app run yarn start in a separate window run yarn expected results produces the following error message for all the tests that are attempted to be run typeerror d react native windows node modules safe buffer index js cannot read property from of undefined at converter node modules convert source map index js at converter tocomment node modules convert source map index js at generatecode node modules babel core lib transformation file generate js at run node modules babel core lib transformation index js at run next at transform node modules babel core lib transform js at transform next at evaluatesync node modules gensync index js at sync node modules gensync index js at stophiding secret don t use this node modules babel core lib errors rewrite stack trace js at transformsync node modules babel core lib transform js at scripttransformer transformsource node modules jest transform build scripttransformer js at reverthook exts node modules jest transform build scripttransformer js at module compile node modules pirates lib index js at object newloader node modules pirates lib index js at module patchedrequire node modules diagnostic channel dist src patchrequire js at object node modules lazystream node modules readable stream lib stream readable js at module compile node modules pirates lib index js at object newloader node modules pirates lib index js at module patchedrequire node modules diagnostic channel dist src patchrequire js at object node modules lazystream node modules readable stream readable js at module compile node modules pirates lib index js at object newloader node modules pirates lib index js at module patchedrequire node modules diagnostic channel dist src patchrequire js at object node modules lazystream node modules readable stream passthrough js at module compile node modules pirates lib index js at object newloader node modules pirates lib index js cli version alpha environment markdown system os windows cpu amd ryzen threadripper pro cores memory gb gb binaries node c program files nodejs node exe yarn c program files yarn bin yarn cmd npm c program files nodejs npm cmd watchman not found sdks android sdk api levels build tools system images android google apis intel atom android google apis intel atom android google play intel atom android intel atom android google play intel atom android google apis intel atom android ndk not found windows sdk allowdevelopmentwithoutdevlicense enabled allowalltrustedapps enabled versions ides android studio ai visual studio visual studio enterprise visual studio enterprise languages java c program files common files oracle java javapath javac exe npmpackages react native community cli not found react not found react native not found react native windows not found npmglobalpackages react native not found target platform version target device s desktop visual studio version visual studio build configuration debug snack code example screenshot or link to a repository test fail screenshot | 1 |
267,760 | 28,509,207,222 | IssuesEvent | 2023-04-19 01:44:38 | dpteam/RK3188_TABLET | https://api.github.com/repos/dpteam/RK3188_TABLET | closed | CVE-2013-2546 (Medium) detected in randomv3.0.66, linuxv3.0 - autoclosed | Mend: dependency security vulnerability | ## CVE-2013-2546 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>randomv3.0.66</b>, <b>linuxv3.0</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability.
<p>Publish Date: 2013-03-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-2546>CVE-2013-2546</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2546">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2546</a></p>
<p>Release Date: 2013-03-15</p>
<p>Fix Resolution: v3.9-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2013-2546 (Medium) detected in randomv3.0.66, linuxv3.0 - autoclosed - ## CVE-2013-2546 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>randomv3.0.66</b>, <b>linuxv3.0</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability.
<p>Publish Date: 2013-03-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-2546>CVE-2013-2546</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2546">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2546</a></p>
<p>Release Date: 2013-03-15</p>
<p>Fix Resolution: v3.9-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve medium detected in autoclosed cve medium severity vulnerability vulnerable libraries vulnerability details the report api in the crypto user configuration api in the linux kernel through uses an incorrect c library function for copying strings which allows local users to obtain sensitive information from kernel stack memory by leveraging the cap net admin capability publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
322,354 | 27,598,063,656 | IssuesEvent | 2023-03-09 08:08:54 | unifyai/ivy | https://api.github.com/repos/unifyai/ivy | reopened | Fix methods.test_numpy_matrix_any | NumPy Frontend Sub Task Failing Test | | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4371761697/jobs/7647955822" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/4371761697/jobs/7647955822" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4371761697/jobs/7647955822" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/4371761697/jobs/7647955822" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_matrix/test_methods.py::test_numpy_matrix_any[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-03-09T06:41:55.8560906Z E TypeError: test_frontend_method() missing 1 required keyword-only argument: 'on_device'
2023-03-09T06:41:55.8561666Z E Falsifying example: test_numpy_matrix_any(
2023-03-09T06:41:55.8563097Z E dtype_x_axis=(['int8'], [array([[0, 0],
2023-03-09T06:41:55.8563648Z E [0, 0]], dtype=int8)], 0),
2023-03-09T06:41:55.8564060Z E to_str=False,
2023-03-09T06:41:55.8564450Z E init_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8616924Z E num_positional_args=0,
2023-03-09T06:41:55.8617178Z E as_variable=[False],
2023-03-09T06:41:55.8617415Z E native_arrays=[False],
2023-03-09T06:41:55.8617630Z E ),
2023-03-09T06:41:55.8617883Z E method_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8618147Z E num_positional_args=0,
2023-03-09T06:41:55.8618373Z E as_variable=[False],
2023-03-09T06:41:55.8618603Z E native_arrays=[False],
2023-03-09T06:41:55.8618811Z E ),
2023-03-09T06:41:55.8619653Z E frontend_method_data=FrontendMethodData(ivy_init_module=<module 'ivy.functional.frontends.numpy' from '/ivy/ivy/functional/frontends/numpy/__init__.py'>, framework_init_module=<module 'numpy' from '/usr/local/lib/python3.8/dist-packages/numpy/__init__.py'>, init_name='matrix', method_name='any'),
2023-03-09T06:41:55.8620409Z E frontend='numpy',
2023-03-09T06:41:55.8620619Z E )
2023-03-09T06:41:55.8620794Z E
2023-03-09T06:41:55.8621291Z E You can reproduce this example by temporarily adding @reproduce_failure('6.68.2', b'AXicY2LAAQAASwAD') as a decorator on your test case
</details>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_matrix/test_methods.py::test_numpy_matrix_any[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-03-09T06:41:55.8560906Z E TypeError: test_frontend_method() missing 1 required keyword-only argument: 'on_device'
2023-03-09T06:41:55.8561666Z E Falsifying example: test_numpy_matrix_any(
2023-03-09T06:41:55.8563097Z E dtype_x_axis=(['int8'], [array([[0, 0],
2023-03-09T06:41:55.8563648Z E [0, 0]], dtype=int8)], 0),
2023-03-09T06:41:55.8564060Z E to_str=False,
2023-03-09T06:41:55.8564450Z E init_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8616924Z E num_positional_args=0,
2023-03-09T06:41:55.8617178Z E as_variable=[False],
2023-03-09T06:41:55.8617415Z E native_arrays=[False],
2023-03-09T06:41:55.8617630Z E ),
2023-03-09T06:41:55.8617883Z E method_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8618147Z E num_positional_args=0,
2023-03-09T06:41:55.8618373Z E as_variable=[False],
2023-03-09T06:41:55.8618603Z E native_arrays=[False],
2023-03-09T06:41:55.8618811Z E ),
2023-03-09T06:41:55.8619653Z E frontend_method_data=FrontendMethodData(ivy_init_module=<module 'ivy.functional.frontends.numpy' from '/ivy/ivy/functional/frontends/numpy/__init__.py'>, framework_init_module=<module 'numpy' from '/usr/local/lib/python3.8/dist-packages/numpy/__init__.py'>, init_name='matrix', method_name='any'),
2023-03-09T06:41:55.8620409Z E frontend='numpy',
2023-03-09T06:41:55.8620619Z E )
2023-03-09T06:41:55.8620794Z E
2023-03-09T06:41:55.8621291Z E You can reproduce this example by temporarily adding @reproduce_failure('6.68.2', b'AXicY2LAAQAASwAD') as a decorator on your test case
</details>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_matrix/test_methods.py::test_numpy_matrix_any[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-03-09T06:41:55.8560906Z E TypeError: test_frontend_method() missing 1 required keyword-only argument: 'on_device'
2023-03-09T06:41:55.8561666Z E Falsifying example: test_numpy_matrix_any(
2023-03-09T06:41:55.8563097Z E dtype_x_axis=(['int8'], [array([[0, 0],
2023-03-09T06:41:55.8563648Z E [0, 0]], dtype=int8)], 0),
2023-03-09T06:41:55.8564060Z E to_str=False,
2023-03-09T06:41:55.8564450Z E init_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8616924Z E num_positional_args=0,
2023-03-09T06:41:55.8617178Z E as_variable=[False],
2023-03-09T06:41:55.8617415Z E native_arrays=[False],
2023-03-09T06:41:55.8617630Z E ),
2023-03-09T06:41:55.8617883Z E method_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8618147Z E num_positional_args=0,
2023-03-09T06:41:55.8618373Z E as_variable=[False],
2023-03-09T06:41:55.8618603Z E native_arrays=[False],
2023-03-09T06:41:55.8618811Z E ),
2023-03-09T06:41:55.8619653Z E frontend_method_data=FrontendMethodData(ivy_init_module=<module 'ivy.functional.frontends.numpy' from '/ivy/ivy/functional/frontends/numpy/__init__.py'>, framework_init_module=<module 'numpy' from '/usr/local/lib/python3.8/dist-packages/numpy/__init__.py'>, init_name='matrix', method_name='any'),
2023-03-09T06:41:55.8620409Z E frontend='numpy',
2023-03-09T06:41:55.8620619Z E )
2023-03-09T06:41:55.8620794Z E
2023-03-09T06:41:55.8621291Z E You can reproduce this example by temporarily adding @reproduce_failure('6.68.2', b'AXicY2LAAQAASwAD') as a decorator on your test case
</details>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_matrix/test_methods.py::test_numpy_matrix_any[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-03-09T06:41:55.8560906Z E TypeError: test_frontend_method() missing 1 required keyword-only argument: 'on_device'
2023-03-09T06:41:55.8561666Z E Falsifying example: test_numpy_matrix_any(
2023-03-09T06:41:55.8563097Z E dtype_x_axis=(['int8'], [array([[0, 0],
2023-03-09T06:41:55.8563648Z E [0, 0]], dtype=int8)], 0),
2023-03-09T06:41:55.8564060Z E to_str=False,
2023-03-09T06:41:55.8564450Z E init_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8616924Z E num_positional_args=0,
2023-03-09T06:41:55.8617178Z E as_variable=[False],
2023-03-09T06:41:55.8617415Z E native_arrays=[False],
2023-03-09T06:41:55.8617630Z E ),
2023-03-09T06:41:55.8617883Z E method_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8618147Z E num_positional_args=0,
2023-03-09T06:41:55.8618373Z E as_variable=[False],
2023-03-09T06:41:55.8618603Z E native_arrays=[False],
2023-03-09T06:41:55.8618811Z E ),
2023-03-09T06:41:55.8619653Z E frontend_method_data=FrontendMethodData(ivy_init_module=<module 'ivy.functional.frontends.numpy' from '/ivy/ivy/functional/frontends/numpy/__init__.py'>, framework_init_module=<module 'numpy' from '/usr/local/lib/python3.8/dist-packages/numpy/__init__.py'>, init_name='matrix', method_name='any'),
2023-03-09T06:41:55.8620409Z E frontend='numpy',
2023-03-09T06:41:55.8620619Z E )
2023-03-09T06:41:55.8620794Z E
2023-03-09T06:41:55.8621291Z E You can reproduce this example by temporarily adding @reproduce_failure('6.68.2', b'AXicY2LAAQAASwAD') as a decorator on your test case
</details>
| 1.0 | Fix methods.test_numpy_matrix_any - | | |
|---|---|
|tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/4371761697/jobs/7647955822" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/4371761697/jobs/7647955822" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/4371761697/jobs/7647955822" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/4371761697/jobs/7647955822" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-failure-red></a>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_matrix/test_methods.py::test_numpy_matrix_any[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-03-09T06:41:55.8560906Z E TypeError: test_frontend_method() missing 1 required keyword-only argument: 'on_device'
2023-03-09T06:41:55.8561666Z E Falsifying example: test_numpy_matrix_any(
2023-03-09T06:41:55.8563097Z E dtype_x_axis=(['int8'], [array([[0, 0],
2023-03-09T06:41:55.8563648Z E [0, 0]], dtype=int8)], 0),
2023-03-09T06:41:55.8564060Z E to_str=False,
2023-03-09T06:41:55.8564450Z E init_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8616924Z E num_positional_args=0,
2023-03-09T06:41:55.8617178Z E as_variable=[False],
2023-03-09T06:41:55.8617415Z E native_arrays=[False],
2023-03-09T06:41:55.8617630Z E ),
2023-03-09T06:41:55.8617883Z E method_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8618147Z E num_positional_args=0,
2023-03-09T06:41:55.8618373Z E as_variable=[False],
2023-03-09T06:41:55.8618603Z E native_arrays=[False],
2023-03-09T06:41:55.8618811Z E ),
2023-03-09T06:41:55.8619653Z E frontend_method_data=FrontendMethodData(ivy_init_module=<module 'ivy.functional.frontends.numpy' from '/ivy/ivy/functional/frontends/numpy/__init__.py'>, framework_init_module=<module 'numpy' from '/usr/local/lib/python3.8/dist-packages/numpy/__init__.py'>, init_name='matrix', method_name='any'),
2023-03-09T06:41:55.8620409Z E frontend='numpy',
2023-03-09T06:41:55.8620619Z E )
2023-03-09T06:41:55.8620794Z E
2023-03-09T06:41:55.8621291Z E You can reproduce this example by temporarily adding @reproduce_failure('6.68.2', b'AXicY2LAAQAASwAD') as a decorator on your test case
</details>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_matrix/test_methods.py::test_numpy_matrix_any[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-03-09T06:41:55.8560906Z E TypeError: test_frontend_method() missing 1 required keyword-only argument: 'on_device'
2023-03-09T06:41:55.8561666Z E Falsifying example: test_numpy_matrix_any(
2023-03-09T06:41:55.8563097Z E dtype_x_axis=(['int8'], [array([[0, 0],
2023-03-09T06:41:55.8563648Z E [0, 0]], dtype=int8)], 0),
2023-03-09T06:41:55.8564060Z E to_str=False,
2023-03-09T06:41:55.8564450Z E init_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8616924Z E num_positional_args=0,
2023-03-09T06:41:55.8617178Z E as_variable=[False],
2023-03-09T06:41:55.8617415Z E native_arrays=[False],
2023-03-09T06:41:55.8617630Z E ),
2023-03-09T06:41:55.8617883Z E method_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8618147Z E num_positional_args=0,
2023-03-09T06:41:55.8618373Z E as_variable=[False],
2023-03-09T06:41:55.8618603Z E native_arrays=[False],
2023-03-09T06:41:55.8618811Z E ),
2023-03-09T06:41:55.8619653Z E frontend_method_data=FrontendMethodData(ivy_init_module=<module 'ivy.functional.frontends.numpy' from '/ivy/ivy/functional/frontends/numpy/__init__.py'>, framework_init_module=<module 'numpy' from '/usr/local/lib/python3.8/dist-packages/numpy/__init__.py'>, init_name='matrix', method_name='any'),
2023-03-09T06:41:55.8620409Z E frontend='numpy',
2023-03-09T06:41:55.8620619Z E )
2023-03-09T06:41:55.8620794Z E
2023-03-09T06:41:55.8621291Z E You can reproduce this example by temporarily adding @reproduce_failure('6.68.2', b'AXicY2LAAQAASwAD') as a decorator on your test case
</details>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_matrix/test_methods.py::test_numpy_matrix_any[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-03-09T06:41:55.8560906Z E TypeError: test_frontend_method() missing 1 required keyword-only argument: 'on_device'
2023-03-09T06:41:55.8561666Z E Falsifying example: test_numpy_matrix_any(
2023-03-09T06:41:55.8563097Z E dtype_x_axis=(['int8'], [array([[0, 0],
2023-03-09T06:41:55.8563648Z E [0, 0]], dtype=int8)], 0),
2023-03-09T06:41:55.8564060Z E to_str=False,
2023-03-09T06:41:55.8564450Z E init_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8616924Z E num_positional_args=0,
2023-03-09T06:41:55.8617178Z E as_variable=[False],
2023-03-09T06:41:55.8617415Z E native_arrays=[False],
2023-03-09T06:41:55.8617630Z E ),
2023-03-09T06:41:55.8617883Z E method_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8618147Z E num_positional_args=0,
2023-03-09T06:41:55.8618373Z E as_variable=[False],
2023-03-09T06:41:55.8618603Z E native_arrays=[False],
2023-03-09T06:41:55.8618811Z E ),
2023-03-09T06:41:55.8619653Z E frontend_method_data=FrontendMethodData(ivy_init_module=<module 'ivy.functional.frontends.numpy' from '/ivy/ivy/functional/frontends/numpy/__init__.py'>, framework_init_module=<module 'numpy' from '/usr/local/lib/python3.8/dist-packages/numpy/__init__.py'>, init_name='matrix', method_name='any'),
2023-03-09T06:41:55.8620409Z E frontend='numpy',
2023-03-09T06:41:55.8620619Z E )
2023-03-09T06:41:55.8620794Z E
2023-03-09T06:41:55.8621291Z E You can reproduce this example by temporarily adding @reproduce_failure('6.68.2', b'AXicY2LAAQAASwAD') as a decorator on your test case
</details>
<details>
<summary>FAILED ivy_tests/test_ivy/test_frontends/test_numpy/test_matrix/test_methods.py::test_numpy_matrix_any[cpu-ivy.functional.backends.jax-False-False]</summary>
2023-03-09T06:41:55.8560906Z E TypeError: test_frontend_method() missing 1 required keyword-only argument: 'on_device'
2023-03-09T06:41:55.8561666Z E Falsifying example: test_numpy_matrix_any(
2023-03-09T06:41:55.8563097Z E dtype_x_axis=(['int8'], [array([[0, 0],
2023-03-09T06:41:55.8563648Z E [0, 0]], dtype=int8)], 0),
2023-03-09T06:41:55.8564060Z E to_str=False,
2023-03-09T06:41:55.8564450Z E init_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8616924Z E num_positional_args=0,
2023-03-09T06:41:55.8617178Z E as_variable=[False],
2023-03-09T06:41:55.8617415Z E native_arrays=[False],
2023-03-09T06:41:55.8617630Z E ),
2023-03-09T06:41:55.8617883Z E method_flags=FrontendMethodTestFlags(
2023-03-09T06:41:55.8618147Z E num_positional_args=0,
2023-03-09T06:41:55.8618373Z E as_variable=[False],
2023-03-09T06:41:55.8618603Z E native_arrays=[False],
2023-03-09T06:41:55.8618811Z E ),
2023-03-09T06:41:55.8619653Z E frontend_method_data=FrontendMethodData(ivy_init_module=<module 'ivy.functional.frontends.numpy' from '/ivy/ivy/functional/frontends/numpy/__init__.py'>, framework_init_module=<module 'numpy' from '/usr/local/lib/python3.8/dist-packages/numpy/__init__.py'>, init_name='matrix', method_name='any'),
2023-03-09T06:41:55.8620409Z E frontend='numpy',
2023-03-09T06:41:55.8620619Z E )
2023-03-09T06:41:55.8620794Z E
2023-03-09T06:41:55.8621291Z E You can reproduce this example by temporarily adding @reproduce_failure('6.68.2', b'AXicY2LAAQAASwAD') as a decorator on your test case
</details>
| test | fix methods test numpy matrix any tensorflow img src torch img src numpy img src jax img src failed ivy tests test ivy test frontends test numpy test matrix test methods py test numpy matrix any e typeerror test frontend method missing required keyword only argument on device e falsifying example test numpy matrix any e dtype x axis e dtype e to str false e init flags frontendmethodtestflags e num positional args e as variable e native arrays e e method flags frontendmethodtestflags e num positional args e as variable e native arrays e e frontend method data frontendmethoddata ivy init module framework init module init name matrix method name any e frontend numpy e e e you can reproduce this example by temporarily adding reproduce failure b as a decorator on your test case failed ivy tests test ivy test frontends test numpy test matrix test methods py test numpy matrix any e typeerror test frontend method missing required keyword only argument on device e falsifying example test numpy matrix any e dtype x axis e dtype e to str false e init flags frontendmethodtestflags e num positional args e as variable e native arrays e e method flags frontendmethodtestflags e num positional args e as variable e native arrays e e frontend method data frontendmethoddata ivy init module framework init module init name matrix method name any e frontend numpy e e e you can reproduce this example by temporarily adding reproduce failure b as a decorator on your test case failed ivy tests test ivy test frontends test numpy test matrix test methods py test numpy matrix any e typeerror test frontend method missing required keyword only argument on device e falsifying example test numpy matrix any e dtype x axis e dtype e to str false e init flags frontendmethodtestflags e num positional args e as variable e native arrays e e method flags frontendmethodtestflags e num positional args e as variable e native arrays e e frontend method data frontendmethoddata ivy init module framework init module init name matrix method name any e frontend numpy e e e you can reproduce this example by temporarily adding reproduce failure b as a decorator on your test case failed ivy tests test ivy test frontends test numpy test matrix test methods py test numpy matrix any e typeerror test frontend method missing required keyword only argument on device e falsifying example test numpy matrix any e dtype x axis e dtype e to str false e init flags frontendmethodtestflags e num positional args e as variable e native arrays e e method flags frontendmethodtestflags e num positional args e as variable e native arrays e e frontend method data frontendmethoddata ivy init module framework init module init name matrix method name any e frontend numpy e e e you can reproduce this example by temporarily adding reproduce failure b as a decorator on your test case | 1 |
12,236 | 14,743,676,043 | IssuesEvent | 2021-01-07 14:15:39 | kdjstudios/SABillingGitlab | https://api.github.com/repos/kdjstudios/SABillingGitlab | closed | Portland - VCC Transition in SA Billing | anc-process anp-urgent ant-support | In GitLab by @kdjstudios on Sep 12, 2019, 09:02
**Submitted by:** Kyle
**Helpdesk:** http://www.servicedesk.answernet.com/profiles/ticket/9309908
**Server:** Internal
**Client/Site:** Portland
**Account:** NA
**Issue:**
We are writing as your site has just switched over to the VCC and as such we need to know a few things in regards to your transition in SA Billing too.
* What date you will need to have SA Billing updated to use the new VCC upload process, HR Report, and have the VCC Codes added at the site? Ops will need to add them at the account level.
* If for your next billing cycle in SA Billing you will be using your old switches billing export or if you will be using the VCC switches billing export?
* We will need to know how many days are being missed from the next billing cycle in the usage period? This will allow us to adjust the posting factor accordingly to accommodate for the missed usage.
Please let us know if you have any questions and we thank you for your response. | 1.0 | Portland - VCC Transition in SA Billing - In GitLab by @kdjstudios on Sep 12, 2019, 09:02
**Submitted by:** Kyle
**Helpdesk:** http://www.servicedesk.answernet.com/profiles/ticket/9309908
**Server:** Internal
**Client/Site:** Portland
**Account:** NA
**Issue:**
We are writing as your site has just switched over to the VCC and as such we need to know a few things in regards to your transition in SA Billing too.
* What date you will need to have SA Billing updated to use the new VCC upload process, HR Report, and have the VCC Codes added at the site? Ops will need to add them at the account level.
* If for your next billing cycle in SA Billing you will be using your old switches billing export or if you will be using the VCC switches billing export?
* We will need to know how many days are being missed from the next billing cycle in the usage period? This will allow us to adjust the posting factor accordingly to accommodate for the missed usage.
Please let us know if you have any questions and we thank you for your response. | non_test | portland vcc transition in sa billing in gitlab by kdjstudios on sep submitted by kyle helpdesk server internal client site portland account na issue we are writing as your site has just switched over to the vcc and as such we need to know a few things in regards to your transition in sa billing too what date you will need to have sa billing updated to use the new vcc upload process hr report and have the vcc codes added at the site ops will need to add them at the account level if for your next billing cycle in sa billing you will be using your old switches billing export or if you will be using the vcc switches billing export we will need to know how many days are being missed from the next billing cycle in the usage period this will allow us to adjust the posting factor accordingly to accommodate for the missed usage please let us know if you have any questions and we thank you for your response | 0 |
372,401 | 25,999,941,033 | IssuesEvent | 2022-12-20 14:35:35 | nf-core/rnaseq | https://api.github.com/repos/nf-core/rnaseq | closed | Add proviso in docs about iGenomes usage | documentation enhancement | ### Description of feature
The transcriptome and GTF files in iGenomes are vastly out of date with respect to current annotations from Ensembl et al. E.g. human annotations are from Ensembl 75, while the current Ensembl release is 108.
Only a subset of Ensembl releases would have included updates for any given species, but I think it's fair to say they're all a little obsolete now.
I'm not sure where this should go, but a health warning somewhere encouraging the use of alternative reference sources would probably be good.
Issue prompted by https://nfcore.slack.com/archives/CE8SSJV3N/p1666879141666699 | 1.0 | Add proviso in docs about iGenomes usage - ### Description of feature
The transcriptome and GTF files in iGenomes are vastly out of date with respect to current annotations from Ensembl et al. E.g. human annotations are from Ensembl 75, while the current Ensembl release is 108.
Only a subset of Ensembl releases would have included updates for any given species, but I think it's fair to say they're all a little obsolete now.
I'm not sure where this should go, but a health warning somewhere encouraging the use of alternative reference sources would probably be good.
Issue prompted by https://nfcore.slack.com/archives/CE8SSJV3N/p1666879141666699 | non_test | add proviso in docs about igenomes usage description of feature the transcriptome and gtf files in igenomes are vastly out of date with respect to current annotations from ensembl et al e g human annotations are from ensembl while the current ensembl release is only a subset of ensembl releases would have included updates for any given species but i think it s fair to say they re all a little obsolete now i m not sure where this should go but a health warning somewhere encouraging the use of alternative reference sources would probably be good issue prompted by | 0 |
231,609 | 7,641,236,740 | IssuesEvent | 2018-05-08 03:33:07 | minio/minio | https://api.github.com/repos/minio/minio | closed | Distributed minio does not start with hostnames when is used inside lxd | priority: medium working as intended | Steps to reproduce, including configuring lxd:
1. Install lxd (OS-specific, trivial)
2. `lxc launch ubuntu:xenial minio-1` (up to minio-4)
3. setup DNS to resolve your hostnames to IPs of LXD containers
4. `lxc exec minio-1 bash`
5. download minio, edit `config.json` if necessary
6. try to start minio in distributed mode
2 attempts are following, with implicit and explicit server address
```
$ /usr/local/bin/minio server --config-dir=/path/to/config/dir.minio http://minio-1.company.tld/srv/minio http://minio-2.company.tld/srv/minio http://minio-3.company.tld/srv/minio http://minio-4.company.tld/srv/minio
Error: Invalid address ‘minio-4.company.tld:9000’ in command line argument.
```
```
$ /usr/local/bin/minio server --address minio-4.company.tld:9000 --config-dir=/path/to/config/dir.minio http://minio-1.company.tld/srv/minio http://minio-2.company.tld/srv/minio http://minio-3.company.tld/srv/minio http://minio-4.company.tld/srv/minio
Error: Invalid address ‘minio-4.company.tld:9000’ in command line argument.
```
With IP the same configuration starts with no issues. Even more: you only need to specify the current host with IP, remote disks may still use hostnames (but it's a wrong configuration, so it was tried just for test). | 1.0 | Distributed minio does not start with hostnames when is used inside lxd - Steps to reproduce, including configuring lxd:
1. Install lxd (OS-specific, trivial)
2. `lxc launch ubuntu:xenial minio-1` (up to minio-4)
3. setup DNS to resolve your hostnames to IPs of LXD containers
4. `lxc exec minio-1 bash`
5. download minio, edit `config.json` if necessary
6. try to start minio in distributed mode
2 attempts are following, with implicit and explicit server address
```
$ /usr/local/bin/minio server --config-dir=/path/to/config/dir.minio http://minio-1.company.tld/srv/minio http://minio-2.company.tld/srv/minio http://minio-3.company.tld/srv/minio http://minio-4.company.tld/srv/minio
Error: Invalid address ‘minio-4.company.tld:9000’ in command line argument.
```
```
$ /usr/local/bin/minio server --address minio-4.company.tld:9000 --config-dir=/path/to/config/dir.minio http://minio-1.company.tld/srv/minio http://minio-2.company.tld/srv/minio http://minio-3.company.tld/srv/minio http://minio-4.company.tld/srv/minio
Error: Invalid address ‘minio-4.company.tld:9000’ in command line argument.
```
With IP the same configuration starts with no issues. Even more: you only need to specify the current host with IP, remote disks may still use hostnames (but it's a wrong configuration, so it was tried just for test). | non_test | distributed minio does not start with hostnames when is used inside lxd steps to reproduce including configuring lxd install lxd os specific trivial lxc launch ubuntu xenial minio up to minio setup dns to resolve your hostnames to ips of lxd containers lxc exec minio bash download minio edit config json if necessary try to start minio in distributed mode attempts are following with implicit and explicit server address usr local bin minio server config dir path to config dir minio error invalid address ‘minio company tld ’ in command line argument usr local bin minio server address minio company tld config dir path to config dir minio error invalid address ‘minio company tld ’ in command line argument with ip the same configuration starts with no issues even more you only need to specify the current host with ip remote disks may still use hostnames but it s a wrong configuration so it was tried just for test | 0 |
12,998 | 3,297,839,871 | IssuesEvent | 2015-11-02 11:12:59 | agilecube/Amigo | https://api.github.com/repos/agilecube/Amigo | closed | Taxi - Queue of taxi drivers is not updating | bug Fixed HIGH Ready for Test Released | For example if I am 3rd in a queue and someone before me changes status to busy, I don't see it. So no refresh anywhere. If I change my status to busy and then available then queue refreshes. This is very urgent cause taxi driver sees that he have time cause he is 5th in example but actually he is next | 1.0 | Taxi - Queue of taxi drivers is not updating - For example if I am 3rd in a queue and someone before me changes status to busy, I don't see it. So no refresh anywhere. If I change my status to busy and then available then queue refreshes. This is very urgent cause taxi driver sees that he have time cause he is 5th in example but actually he is next | test | taxi queue of taxi drivers is not updating for example if i am in a queue and someone before me changes status to busy i don t see it so no refresh anywhere if i change my status to busy and then available then queue refreshes this is very urgent cause taxi driver sees that he have time cause he is in example but actually he is next | 1 |
48,035 | 13,067,406,485 | IssuesEvent | 2020-07-31 00:21:10 | icecube-trac/tix2 | https://api.github.com/repos/icecube-trac/tix2 | closed | [cmake] correct svn not found on Mac if homebrew version is installed (Trac #1689) | Migrated from Trac cmake defect | The svn on my Mac is ancient and has stopped working, so I had to install an newer version with homebrew. Now I have two svn executables, the wrong one in /usr/bin and the right one in /usr/local/bin.
Unfortunately, CMake always finds the wrong one. The following patch fixes this:
Index: config.cmake
===================================================================
--- config.cmake (revision 2562)
+++ config.cmake (working copy)
@@ -164,8 +164,9 @@
#
# Find the svn program
#
-find_program(SVN_EXECUTABLE svn)
-
+find_program(SVN_EXECUTABLE svn
+ PATHS ENV PATH /usr/bin
+ NO_DEFAULT_PATH)
#
# Get SVN_REVISION from svn info
#
I am happy to apply this myself if I get green light for this change.
Migrated from https://code.icecube.wisc.edu/ticket/1689
```json
{
"status": "closed",
"changetime": "2016-05-04T18:44:43",
"description": "The svn on my Mac is ancient and has stopped working, so I had to install an newer version with homebrew. Now I have two svn executables, the wrong one in /usr/bin and the right one in /usr/local/bin.\n\nUnfortunately, CMake always finds the wrong one. The following patch fixes this:\n\nIndex: config.cmake\n===================================================================\n--- config.cmake\t(revision 2562)\n+++ config.cmake\t(working copy)\n@@ -164,8 +164,9 @@\n #\n # Find the svn program\n #\n-find_program(SVN_EXECUTABLE svn)\n-\n+find_program(SVN_EXECUTABLE svn\n+ PATHS ENV PATH /usr/bin\n+ NO_DEFAULT_PATH)\n #\n # Get SVN_REVISION from svn info\n #\n\nI am happy to apply this myself if I get green light for this change.",
"reporter": "hdembinski",
"cc": "",
"resolution": "fixed",
"_ts": "1462387483464525",
"component": "cmake",
"summary": "[cmake] correct svn not found on Mac if homebrew version is installed",
"priority": "normal",
"keywords": "",
"time": "2016-05-04T18:00:16",
"milestone": "",
"owner": "nega",
"type": "defect"
}
```
| 1.0 | [cmake] correct svn not found on Mac if homebrew version is installed (Trac #1689) - The svn on my Mac is ancient and has stopped working, so I had to install an newer version with homebrew. Now I have two svn executables, the wrong one in /usr/bin and the right one in /usr/local/bin.
Unfortunately, CMake always finds the wrong one. The following patch fixes this:
Index: config.cmake
===================================================================
--- config.cmake (revision 2562)
+++ config.cmake (working copy)
@@ -164,8 +164,9 @@
#
# Find the svn program
#
-find_program(SVN_EXECUTABLE svn)
-
+find_program(SVN_EXECUTABLE svn
+ PATHS ENV PATH /usr/bin
+ NO_DEFAULT_PATH)
#
# Get SVN_REVISION from svn info
#
I am happy to apply this myself if I get green light for this change.
Migrated from https://code.icecube.wisc.edu/ticket/1689
```json
{
"status": "closed",
"changetime": "2016-05-04T18:44:43",
"description": "The svn on my Mac is ancient and has stopped working, so I had to install an newer version with homebrew. Now I have two svn executables, the wrong one in /usr/bin and the right one in /usr/local/bin.\n\nUnfortunately, CMake always finds the wrong one. The following patch fixes this:\n\nIndex: config.cmake\n===================================================================\n--- config.cmake\t(revision 2562)\n+++ config.cmake\t(working copy)\n@@ -164,8 +164,9 @@\n #\n # Find the svn program\n #\n-find_program(SVN_EXECUTABLE svn)\n-\n+find_program(SVN_EXECUTABLE svn\n+ PATHS ENV PATH /usr/bin\n+ NO_DEFAULT_PATH)\n #\n # Get SVN_REVISION from svn info\n #\n\nI am happy to apply this myself if I get green light for this change.",
"reporter": "hdembinski",
"cc": "",
"resolution": "fixed",
"_ts": "1462387483464525",
"component": "cmake",
"summary": "[cmake] correct svn not found on Mac if homebrew version is installed",
"priority": "normal",
"keywords": "",
"time": "2016-05-04T18:00:16",
"milestone": "",
"owner": "nega",
"type": "defect"
}
```
| non_test | correct svn not found on mac if homebrew version is installed trac the svn on my mac is ancient and has stopped working so i had to install an newer version with homebrew now i have two svn executables the wrong one in usr bin and the right one in usr local bin unfortunately cmake always finds the wrong one the following patch fixes this index config cmake config cmake revision config cmake working copy find the svn program find program svn executable svn find program svn executable svn paths env path usr bin no default path get svn revision from svn info i am happy to apply this myself if i get green light for this change migrated from json status closed changetime description the svn on my mac is ancient and has stopped working so i had to install an newer version with homebrew now i have two svn executables the wrong one in usr bin and the right one in usr local bin n nunfortunately cmake always finds the wrong one the following patch fixes this n nindex config cmake n n config cmake t revision n config cmake t working copy n n n find the svn program n n find program svn executable svn n n find program svn executable svn n paths env path usr bin n no default path n n get svn revision from svn info n n ni am happy to apply this myself if i get green light for this change reporter hdembinski cc resolution fixed ts component cmake summary correct svn not found on mac if homebrew version is installed priority normal keywords time milestone owner nega type defect | 0 |
76,554 | 9,955,905,304 | IssuesEvent | 2019-07-05 12:29:16 | kyma-project/kyma | https://api.github.com/repos/kyma-project/kyma | closed | Update the location of the Azure Service Classes images | area/documentation bug | **Description**
Update the location of the Azure Service Classes images in the `azure-service-classes-docu.yaml` file to reflect the current setup (`develop/` dir):
https://github.com/kyma-project/kyma/blob/master/resources/core/charts/azure-broker/templates/azure-service-classes-docu.yaml#L20
https://github.com/kyma-project/kyma/blob/master/resources/core/charts/azure-broker/templates/azure-service-classes-docu.yaml#L27
https://github.com/kyma-project/kyma/blob/master/resources/core/charts/azure-broker/templates/azure-service-classes-docu.yaml#L34 | 1.0 | Update the location of the Azure Service Classes images - **Description**
Update the location of the Azure Service Classes images in the `azure-service-classes-docu.yaml` file to reflect the current setup (`develop/` dir):
https://github.com/kyma-project/kyma/blob/master/resources/core/charts/azure-broker/templates/azure-service-classes-docu.yaml#L20
https://github.com/kyma-project/kyma/blob/master/resources/core/charts/azure-broker/templates/azure-service-classes-docu.yaml#L27
https://github.com/kyma-project/kyma/blob/master/resources/core/charts/azure-broker/templates/azure-service-classes-docu.yaml#L34 | non_test | update the location of the azure service classes images description update the location of the azure service classes images in the azure service classes docu yaml file to reflect the current setup develop dir | 0 |
179,045 | 13,821,017,220 | IssuesEvent | 2020-10-13 01:12:44 | elastic/kibana | https://api.github.com/repos/elastic/kibana | opened | [test-failed]: X-Pack Endpoint API Integration Tests1.x-pack/test/security_solution_endpoint_api_int/apis/resolver/children·ts - Endpoint plugin Resolver tests Resolver children edge cases info and exec children "before all" hook for "finds all the children of the origin" | failed-test test-cloud | **Version: 7.10.0**
**Class: X-Pack Endpoint API Integration Tests1.x-pack/test/security_solution_endpoint_api_int/apis/resolver/children·ts**
**Stack Trace:**
```
{ ResponseError: illegal_state_exception
at IncomingMessage.response.on (/var/lib/jenkins/workspace/elastic+estf-cloud-kibana-tests/JOB/xpackExtGrp2/TASK/saas_run_kibana_tests/node/linux-immutable/ci/cloud/common/build/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:257:25)
at endReadableNT (_stream_readable.js:1145:12)
at process._tickCallback (internal/process/next_tick.js:63:19)
name: 'ResponseError',
meta:
{ body: { error: [Object], status: 500 },
statusCode: 500,
headers:
{ 'content-length': '305',
'content-type': 'application/json; charset=UTF-8',
'x-cloud-request-id': 'xxxE6uJJTMOSc_i6oU7SbQ',
'x-found-handling-cluster': '7b189bb30fb36734a05a8d5b7c7f6584',
'x-found-handling-instance': 'instance-0000000000',
date: 'Mon, 12 Oct 2020 14:11:19 GMT' },
meta:
{ context: null,
request: [Object],
name: 'elasticsearch-js',
connection: [Object],
attempts: 0,
aborted: false } } }
```
**Other test failures:**
- Endpoint plugin Resolver tests Resolver children edge cases info and exec children "after all" hook for "finds all the children of the origin"
- Endpoint plugin Resolver tests Resolver children edge cases duplicate process running events "before all" hook for "only retrieves the start event for the child node"
- Endpoint plugin Resolver tests Resolver children edge cases duplicate process running events "after all" hook for "only retrieves the start event for the child node"
- Endpoint plugin Resolver tests Resolver children edge cases children api returns same node multiple times "before all" hook for "retrieves the same node three times"
- Endpoint plugin Resolver tests Resolver children edge cases children api returns same node multiple times "after all" hook for "retrieves the same node three times"
_Test Report: https://internal-ci.elastic.co/view/Stack%20Tests/job/elastic+estf-cloud-kibana-tests/845/testReport/_ | 2.0 | [test-failed]: X-Pack Endpoint API Integration Tests1.x-pack/test/security_solution_endpoint_api_int/apis/resolver/children·ts - Endpoint plugin Resolver tests Resolver children edge cases info and exec children "before all" hook for "finds all the children of the origin" - **Version: 7.10.0**
**Class: X-Pack Endpoint API Integration Tests1.x-pack/test/security_solution_endpoint_api_int/apis/resolver/children·ts**
**Stack Trace:**
```
{ ResponseError: illegal_state_exception
at IncomingMessage.response.on (/var/lib/jenkins/workspace/elastic+estf-cloud-kibana-tests/JOB/xpackExtGrp2/TASK/saas_run_kibana_tests/node/linux-immutable/ci/cloud/common/build/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:257:25)
at endReadableNT (_stream_readable.js:1145:12)
at process._tickCallback (internal/process/next_tick.js:63:19)
name: 'ResponseError',
meta:
{ body: { error: [Object], status: 500 },
statusCode: 500,
headers:
{ 'content-length': '305',
'content-type': 'application/json; charset=UTF-8',
'x-cloud-request-id': 'xxxE6uJJTMOSc_i6oU7SbQ',
'x-found-handling-cluster': '7b189bb30fb36734a05a8d5b7c7f6584',
'x-found-handling-instance': 'instance-0000000000',
date: 'Mon, 12 Oct 2020 14:11:19 GMT' },
meta:
{ context: null,
request: [Object],
name: 'elasticsearch-js',
connection: [Object],
attempts: 0,
aborted: false } } }
```
**Other test failures:**
- Endpoint plugin Resolver tests Resolver children edge cases info and exec children "after all" hook for "finds all the children of the origin"
- Endpoint plugin Resolver tests Resolver children edge cases duplicate process running events "before all" hook for "only retrieves the start event for the child node"
- Endpoint plugin Resolver tests Resolver children edge cases duplicate process running events "after all" hook for "only retrieves the start event for the child node"
- Endpoint plugin Resolver tests Resolver children edge cases children api returns same node multiple times "before all" hook for "retrieves the same node three times"
- Endpoint plugin Resolver tests Resolver children edge cases children api returns same node multiple times "after all" hook for "retrieves the same node three times"
_Test Report: https://internal-ci.elastic.co/view/Stack%20Tests/job/elastic+estf-cloud-kibana-tests/845/testReport/_ | test | x pack endpoint api integration x pack test security solution endpoint api int apis resolver children·ts endpoint plugin resolver tests resolver children edge cases info and exec children before all hook for finds all the children of the origin version class x pack endpoint api integration x pack test security solution endpoint api int apis resolver children·ts stack trace responseerror illegal state exception at incomingmessage response on var lib jenkins workspace elastic estf cloud kibana tests job task saas run kibana tests node linux immutable ci cloud common build kibana node modules elastic elasticsearch lib transport js at endreadablent stream readable js at process tickcallback internal process next tick js name responseerror meta body error status statuscode headers content length content type application json charset utf x cloud request id x found handling cluster x found handling instance instance date mon oct gmt meta context null request name elasticsearch js connection attempts aborted false other test failures endpoint plugin resolver tests resolver children edge cases info and exec children after all hook for finds all the children of the origin endpoint plugin resolver tests resolver children edge cases duplicate process running events before all hook for only retrieves the start event for the child node endpoint plugin resolver tests resolver children edge cases duplicate process running events after all hook for only retrieves the start event for the child node endpoint plugin resolver tests resolver children edge cases children api returns same node multiple times before all hook for retrieves the same node three times endpoint plugin resolver tests resolver children edge cases children api returns same node multiple times after all hook for retrieves the same node three times test report | 1 |
73,566 | 9,670,892,564 | IssuesEvent | 2019-05-21 21:04:35 | jpype-project/jpype | https://api.github.com/repos/jpype-project/jpype | opened | User Guide v2 | documentation | My coworker feels that our current guide is poorly organized. It is in random order, doesn't define terms, is compelling, and buries the most important information.
He recommends reordering it something like
- Introduction
- What and why JPype
- Use cases examples
- Limitations
- Basic usage
- Definition of terms (Class, ClassFactory, wrapper, etc)
- Importing and Class factories
- Class, fields, methods, overloading , casting
- Type conversions
- Arrays, inner classes
- Advanced usage
- Threading
- Proxies
- Customizers
- Performance tips
Obviously not something to bite off before 0.7 release, but certainly a goal.
| 1.0 | User Guide v2 - My coworker feels that our current guide is poorly organized. It is in random order, doesn't define terms, is compelling, and buries the most important information.
He recommends reordering it something like
- Introduction
- What and why JPype
- Use cases examples
- Limitations
- Basic usage
- Definition of terms (Class, ClassFactory, wrapper, etc)
- Importing and Class factories
- Class, fields, methods, overloading , casting
- Type conversions
- Arrays, inner classes
- Advanced usage
- Threading
- Proxies
- Customizers
- Performance tips
Obviously not something to bite off before 0.7 release, but certainly a goal.
| non_test | user guide my coworker feels that our current guide is poorly organized it is in random order doesn t define terms is compelling and buries the most important information he recommends reordering it something like introduction what and why jpype use cases examples limitations basic usage definition of terms class classfactory wrapper etc importing and class factories class fields methods overloading casting type conversions arrays inner classes advanced usage threading proxies customizers performance tips obviously not something to bite off before release but certainly a goal | 0 |
93,513 | 19,255,326,130 | IssuesEvent | 2021-12-09 10:38:49 | Regalis11/Barotrauma | https://api.github.com/repos/Regalis11/Barotrauma | opened | Pirate Captain/Lord should stop giving orders once they get captured | Feature request Code | - [x] I have searched the issue tracker to check if the issue has already been reported.
**Description**
Taking a Pirate Captain as a hostage causes the captain to spam your chat

**Steps To Reproduce**
How I tested this was
1. Take control of Pirate Captain
2. Put handcuffs on them and teleport to your submarine
3. Notice that the captain will start spamming the chat with orders
**Version**
0.15.19.0
Branch: Bugfixes
Commit: https://github.com/Regalis11/Barotrauma-development/commit/76cf4c344adeeeb357f8e05746d739daea6f6ba5
| 1.0 | Pirate Captain/Lord should stop giving orders once they get captured - - [x] I have searched the issue tracker to check if the issue has already been reported.
**Description**
Taking a Pirate Captain as a hostage causes the captain to spam your chat

**Steps To Reproduce**
How I tested this was
1. Take control of Pirate Captain
2. Put handcuffs on them and teleport to your submarine
3. Notice that the captain will start spamming the chat with orders
**Version**
0.15.19.0
Branch: Bugfixes
Commit: https://github.com/Regalis11/Barotrauma-development/commit/76cf4c344adeeeb357f8e05746d739daea6f6ba5
| non_test | pirate captain lord should stop giving orders once they get captured i have searched the issue tracker to check if the issue has already been reported description taking a pirate captain as a hostage causes the captain to spam your chat steps to reproduce how i tested this was take control of pirate captain put handcuffs on them and teleport to your submarine notice that the captain will start spamming the chat with orders version branch bugfixes commit | 0 |
32,546 | 15,435,768,694 | IssuesEvent | 2021-03-07 10:20:18 | PyO3/pyo3 | https://api.github.com/repos/PyO3/pyo3 | closed | Why is the plugins built by pyo3 run slower than cython ones? | performance question | ### 🌍 Environment
- Your operating system and version: Ubuntu 20.04
- Your python version: Python 3.8.2
- How did you install python (e.g. apt or pyenv)? Did you use a virtualenv?: Build from source code / NO
- Your Rust version (`rustc --version`): 1.50.0
- Your PyO3 version: latest
### Details
As a rust beginner, I found that using the pyo3 plugins had more overhead when called than the traditional cython approach, this is no good news to make fine-grained embedded development with pyo3.
I asked a question on stackoverflow, a number of people who have followed up on this issue have replicated similar results, but due to the lack of underlying knowledge, we can't explain how this came about. Can I find the answer here? thanks
The question link is [https://stackoverflow.com/questions/66467640/why-cython-embeded-plugins-has-higher-performance-in-cpython-interpreter-than-ru](https://stackoverflow.com/questions/66467640/why-cython-embeded-plugins-has-higher-performance-in-cpython-interpreter-than-ru) | True | Why is the plugins built by pyo3 run slower than cython ones? - ### 🌍 Environment
- Your operating system and version: Ubuntu 20.04
- Your python version: Python 3.8.2
- How did you install python (e.g. apt or pyenv)? Did you use a virtualenv?: Build from source code / NO
- Your Rust version (`rustc --version`): 1.50.0
- Your PyO3 version: latest
### Details
As a rust beginner, I found that using the pyo3 plugins had more overhead when called than the traditional cython approach, this is no good news to make fine-grained embedded development with pyo3.
I asked a question on stackoverflow, a number of people who have followed up on this issue have replicated similar results, but due to the lack of underlying knowledge, we can't explain how this came about. Can I find the answer here? thanks
The question link is [https://stackoverflow.com/questions/66467640/why-cython-embeded-plugins-has-higher-performance-in-cpython-interpreter-than-ru](https://stackoverflow.com/questions/66467640/why-cython-embeded-plugins-has-higher-performance-in-cpython-interpreter-than-ru) | non_test | why is the plugins built by run slower than cython ones 🌍 environment your operating system and version ubuntu your python version python how did you install python e g apt or pyenv did you use a virtualenv build from source code no your rust version rustc version your version latest details as a rust beginner i found that using the plugins had more overhead when called than the traditional cython approach this is no good news to make fine grained embedded development with i asked a question on stackoverflow a number of people who have followed up on this issue have replicated similar results but due to the lack of underlying knowledge we can t explain how this came about can i find the answer here thanks the question link is | 0 |
246,460 | 20,866,445,133 | IssuesEvent | 2022-03-22 07:45:54 | IntellectualSites/FastAsyncWorldEdit | https://api.github.com/repos/IntellectualSites/FastAsyncWorldEdit | closed | TAGS PATTERN NOT WORKING on any server (including Builder's Refuge) | Requires Testing | ### Server Implementation
Paper
### Server Version
1.17.1
### Describe the bug

FAWE dont work properly when **Tag patterns** are used on mask camps. For some reason it always says "_Too many arguments_" or "_Unknown mask_"
Here's a screenshot from the WE wiki, explaining how tags should work

ps: that error just occurs with **Tag patterns**. **Type patterns** works fine, altho they were both added at the same version of we
### To Reproduce
using a region with random wools, type
//replace ##wool stone
### Expected behaviour
All wools are supposed to be replaced for stone, independently of it's color


^ (Illustrative images, since the command doest work... thats how it SHOULD work)
### Screenshots / Videos
_No response_
### Error log (if applicable)
_No response_
### Fawe Debugpaste
https://athion.net/ISPaster/paste/view/640b133fecc242749cf6e72647cd8c03
### Fawe Version
FastAsyncWorldEdit-2.1.1-SNAPSHOT-134
### Checklist
- [X] I have included a Fawe debugpaste.
- [X] I am using the newest build from https://ci.athion.net/job/FastAsyncWorldEdit/ and the issue still persists.
### Anything else?
_No response_ | 1.0 | TAGS PATTERN NOT WORKING on any server (including Builder's Refuge) - ### Server Implementation
Paper
### Server Version
1.17.1
### Describe the bug

FAWE dont work properly when **Tag patterns** are used on mask camps. For some reason it always says "_Too many arguments_" or "_Unknown mask_"
Here's a screenshot from the WE wiki, explaining how tags should work

ps: that error just occurs with **Tag patterns**. **Type patterns** works fine, altho they were both added at the same version of we
### To Reproduce
using a region with random wools, type
//replace ##wool stone
### Expected behaviour
All wools are supposed to be replaced for stone, independently of it's color


^ (Illustrative images, since the command doest work... thats how it SHOULD work)
### Screenshots / Videos
_No response_
### Error log (if applicable)
_No response_
### Fawe Debugpaste
https://athion.net/ISPaster/paste/view/640b133fecc242749cf6e72647cd8c03
### Fawe Version
FastAsyncWorldEdit-2.1.1-SNAPSHOT-134
### Checklist
- [X] I have included a Fawe debugpaste.
- [X] I am using the newest build from https://ci.athion.net/job/FastAsyncWorldEdit/ and the issue still persists.
### Anything else?
_No response_ | test | tags pattern not working on any server including builder s refuge server implementation paper server version describe the bug fawe dont work properly when tag patterns are used on mask camps for some reason it always says too many arguments or unknown mask here s a screenshot from the we wiki explaining how tags should work ps that error just occurs with tag patterns type patterns works fine altho they were both added at the same version of we to reproduce using a region with random wools type replace wool stone expected behaviour all wools are supposed to be replaced for stone independently of it s color illustrative images since the command doest work thats how it should work screenshots videos no response error log if applicable no response fawe debugpaste fawe version fastasyncworldedit snapshot checklist i have included a fawe debugpaste i am using the newest build from and the issue still persists anything else no response | 1 |
342,874 | 10,322,839,630 | IssuesEvent | 2019-08-31 15:56:27 | Laravel-Backpack/CRUD | https://api.github.com/repos/Laravel-Backpack/CRUD | closed | [4.0][Performance Improvement] Columns, filters and fields should be loaded when needed | Feature Request Priority: MUST breaking change working on it | # Bug report
Not a bug, improvement. If you have several relations in relatively big table, page loading takes too much time.
### What I did:
Defult CRUD controller created.
### What I expected to happen:
addFilters, addFields and addColumns should be populated when needed.
### What happened:
On every request addFilters, addFields and addColumns are populated.
### What I've already tried to fix it:
```
$currentScreen = $this->getCurrentScreen();
if (in_array($currentScreen, ['index', 'show', 'search'])) {
$this->addColumns();
$this->addFilters();
}
elseif (in_array($currentScreen, ['create', 'edit'])) {
$this->addFields();
}
```
### Backpack, Laravel, PHP, DB version:
BP: 3.4.6., L:5.6.18, PHP: 7.2.4, Mysql: 5.7.x
| 1.0 | [4.0][Performance Improvement] Columns, filters and fields should be loaded when needed - # Bug report
Not a bug, improvement. If you have several relations in relatively big table, page loading takes too much time.
### What I did:
Defult CRUD controller created.
### What I expected to happen:
addFilters, addFields and addColumns should be populated when needed.
### What happened:
On every request addFilters, addFields and addColumns are populated.
### What I've already tried to fix it:
```
$currentScreen = $this->getCurrentScreen();
if (in_array($currentScreen, ['index', 'show', 'search'])) {
$this->addColumns();
$this->addFilters();
}
elseif (in_array($currentScreen, ['create', 'edit'])) {
$this->addFields();
}
```
### Backpack, Laravel, PHP, DB version:
BP: 3.4.6., L:5.6.18, PHP: 7.2.4, Mysql: 5.7.x
| non_test | columns filters and fields should be loaded when needed bug report not a bug improvement if you have several relations in relatively big table page loading takes too much time what i did defult crud controller created what i expected to happen addfilters addfields and addcolumns should be populated when needed what happened on every request addfilters addfields and addcolumns are populated what i ve already tried to fix it currentscreen this getcurrentscreen if in array currentscreen this addcolumns this addfilters elseif in array currentscreen this addfields backpack laravel php db version bp l php mysql x | 0 |
168,829 | 6,387,542,399 | IssuesEvent | 2017-08-03 13:53:21 | JamieMason/Jasmine-Matchers | https://api.github.com/repos/JamieMason/Jasmine-Matchers | opened | expect(object).toBeObjectOf...(); | Priority: Low Type: Feat | Needs some more thought and discussion but, as it is quite common to create indexes of values by a given key, these could be a nice way of describing those indexes in a similar way to how we do with Arrays now.
```js
expect(object).toBeObjectOf(any.iso8601());
expect(object).toBeObjectOfBooleans();
expect(object).toBeObjectOfNumbers();
expect(object).toBeObjectOfObjects();
expect(object).toBeObjectOfSize(number);
expect(object).toBeObjectOfStrings();
``` | 1.0 | expect(object).toBeObjectOf...(); - Needs some more thought and discussion but, as it is quite common to create indexes of values by a given key, these could be a nice way of describing those indexes in a similar way to how we do with Arrays now.
```js
expect(object).toBeObjectOf(any.iso8601());
expect(object).toBeObjectOfBooleans();
expect(object).toBeObjectOfNumbers();
expect(object).toBeObjectOfObjects();
expect(object).toBeObjectOfSize(number);
expect(object).toBeObjectOfStrings();
``` | non_test | expect object tobeobjectof needs some more thought and discussion but as it is quite common to create indexes of values by a given key these could be a nice way of describing those indexes in a similar way to how we do with arrays now js expect object tobeobjectof any expect object tobeobjectofbooleans expect object tobeobjectofnumbers expect object tobeobjectofobjects expect object tobeobjectofsize number expect object tobeobjectofstrings | 0 |
28,009 | 22,753,721,560 | IssuesEvent | 2022-07-07 14:55:46 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | closed | Publish .netstandard2.0 dlls as Unity packages to NPM feed | api-suggestion area-Infrastructure-libraries untriaged | ### Background and motivation
Starting from Unity 2021 the game engine supports custom "Scoped Registry" for packages. Here is documentation: https://docs.unity3d.com/Manual/upm-scoped.html
The basic idea behind it that one can set up a custom NPM registry with packages that Unity can consume.
I've made a proof-of-concept application that fetches nuget packages from nuget.org and repacks them into NPM packages. The package contains .netstandard2.0 dlls from nuget package and a package.json file that has package description and dependency references.
This worked really well. For example, I can fetch System.Text.Json and the Unity brings in System.Buffers, System.Memory, etc.
I think it worth doing that. The whole Unity community going to be happy not to copy dlls manually.
### API Proposal
Here is a link to Unity NPM registry integration: https://docs.unity3d.com/Manual/upm-scoped.html
### API Usage
The Unity users would be able to add NPM feed to project configuration and consume dependencies via it.
### Alternative Designs
There is an opensource project https://github.com/GlitchEnzo/NuGetForUnity but it doesn't always work to my experience.
### Risks
_No response_ | 1.0 | Publish .netstandard2.0 dlls as Unity packages to NPM feed - ### Background and motivation
Starting from Unity 2021 the game engine supports custom "Scoped Registry" for packages. Here is documentation: https://docs.unity3d.com/Manual/upm-scoped.html
The basic idea behind it that one can set up a custom NPM registry with packages that Unity can consume.
I've made a proof-of-concept application that fetches nuget packages from nuget.org and repacks them into NPM packages. The package contains .netstandard2.0 dlls from nuget package and a package.json file that has package description and dependency references.
This worked really well. For example, I can fetch System.Text.Json and the Unity brings in System.Buffers, System.Memory, etc.
I think it worth doing that. The whole Unity community going to be happy not to copy dlls manually.
### API Proposal
Here is a link to Unity NPM registry integration: https://docs.unity3d.com/Manual/upm-scoped.html
### API Usage
The Unity users would be able to add NPM feed to project configuration and consume dependencies via it.
### Alternative Designs
There is an opensource project https://github.com/GlitchEnzo/NuGetForUnity but it doesn't always work to my experience.
### Risks
_No response_ | non_test | publish dlls as unity packages to npm feed background and motivation starting from unity the game engine supports custom scoped registry for packages here is documentation the basic idea behind it that one can set up a custom npm registry with packages that unity can consume i ve made a proof of concept application that fetches nuget packages from nuget org and repacks them into npm packages the package contains dlls from nuget package and a package json file that has package description and dependency references this worked really well for example i can fetch system text json and the unity brings in system buffers system memory etc i think it worth doing that the whole unity community going to be happy not to copy dlls manually api proposal here is a link to unity npm registry integration api usage the unity users would be able to add npm feed to project configuration and consume dependencies via it alternative designs there is an opensource project but it doesn t always work to my experience risks no response | 0 |
105,586 | 9,087,238,810 | IssuesEvent | 2019-02-18 13:14:11 | nicklashersen/numpy | https://api.github.com/repos/nicklashersen/numpy | opened | Unittest get_atlas_version failed to get version from file | testing | Create a unittest that makes an exception so that this branch https://codecov.io/gh/numpy/numpy/src/master/numpy/distutils/system_info.py#L1496 is run. Then assert on the return value.
Difficulty should be medium to hard. | 1.0 | Unittest get_atlas_version failed to get version from file - Create a unittest that makes an exception so that this branch https://codecov.io/gh/numpy/numpy/src/master/numpy/distutils/system_info.py#L1496 is run. Then assert on the return value.
Difficulty should be medium to hard. | test | unittest get atlas version failed to get version from file create a unittest that makes an exception so that this branch is run then assert on the return value difficulty should be medium to hard | 1 |
366,535 | 25,590,439,501 | IssuesEvent | 2022-12-01 12:36:10 | ESMValGroup/ESMValTool | https://api.github.com/repos/ESMValGroup/ESMValTool | closed | Make CMORizer documentation available on readthedocs | documentation | Currently the documentation of the CMORization scripts is burried inside the code, for example:
https://github.com/ESMValGroup/ESMValTool/blob/582d3bbbabfd3696fc25432d34d6edd67482d3a1/esmvaltool/cmorizers/obs/cmorize_obs_aura_tes.ncl#L1-L25
I think this should be made available on readthedocs, probably somewhere here: https://esmvaltool.readthedocs.io/en/latest/getting_started/inputdata.html#observations
but I guess it would be nicer to make it a separate chapter. | 1.0 | Make CMORizer documentation available on readthedocs - Currently the documentation of the CMORization scripts is burried inside the code, for example:
https://github.com/ESMValGroup/ESMValTool/blob/582d3bbbabfd3696fc25432d34d6edd67482d3a1/esmvaltool/cmorizers/obs/cmorize_obs_aura_tes.ncl#L1-L25
I think this should be made available on readthedocs, probably somewhere here: https://esmvaltool.readthedocs.io/en/latest/getting_started/inputdata.html#observations
but I guess it would be nicer to make it a separate chapter. | non_test | make cmorizer documentation available on readthedocs currently the documentation of the cmorization scripts is burried inside the code for example i think this should be made available on readthedocs probably somewhere here but i guess it would be nicer to make it a separate chapter | 0 |
720,697 | 24,802,231,137 | IssuesEvent | 2022-10-24 23:07:20 | googleapis/google-cloud-go | https://api.github.com/repos/googleapis/google-cloud-go | closed | bigtable/bttest: Empty regex row filters are not rejected | type: bug api: bigtable priority: p3 | **Client**
Bigtable (bttest)
**Environment**
All
**Go Environment**
All
**Code**
Take the following snippet:
```go
filter := bigtable.RowFilter(bigtable.RowKeyFilter(""))
err = tbl.ReadRows(ctx, rr, func(r bigtable.Row) bool {
for _, vs := range r {
for _, v := range vs {
fmt.Printf("%s :: %s :: %s\n", v.Row, v.Column, v.Value)
}
}
return true
}, filter)
```
- When this snippet is used with bttest, bttest doesn't reject the invalid filter.
- When this snippet is used with Bigtable proper, the message `rpc error: code = InvalidArgument desc = Error in field 'row_key_regex_filter' : argument must not be empty` is returned.
**Expected behavior**
The invalid argument is rejected.
**Actual behavior**
The invalid argument is accepted. | 1.0 | bigtable/bttest: Empty regex row filters are not rejected - **Client**
Bigtable (bttest)
**Environment**
All
**Go Environment**
All
**Code**
Take the following snippet:
```go
filter := bigtable.RowFilter(bigtable.RowKeyFilter(""))
err = tbl.ReadRows(ctx, rr, func(r bigtable.Row) bool {
for _, vs := range r {
for _, v := range vs {
fmt.Printf("%s :: %s :: %s\n", v.Row, v.Column, v.Value)
}
}
return true
}, filter)
```
- When this snippet is used with bttest, bttest doesn't reject the invalid filter.
- When this snippet is used with Bigtable proper, the message `rpc error: code = InvalidArgument desc = Error in field 'row_key_regex_filter' : argument must not be empty` is returned.
**Expected behavior**
The invalid argument is rejected.
**Actual behavior**
The invalid argument is accepted. | non_test | bigtable bttest empty regex row filters are not rejected client bigtable bttest environment all go environment all code take the following snippet go filter bigtable rowfilter bigtable rowkeyfilter err tbl readrows ctx rr func r bigtable row bool for vs range r for v range vs fmt printf s s s n v row v column v value return true filter when this snippet is used with bttest bttest doesn t reject the invalid filter when this snippet is used with bigtable proper the message rpc error code invalidargument desc error in field row key regex filter argument must not be empty is returned expected behavior the invalid argument is rejected actual behavior the invalid argument is accepted | 0 |
205,902 | 15,698,422,514 | IssuesEvent | 2021-03-26 06:49:18 | xbmc/kodi-tv | https://api.github.com/repos/xbmc/kodi-tv | closed | Reorganise media tiles in About page | layout needs-testing | Is it possible to move the "Games" tile in **What can Kodi do for me?** section up with the rest of the media tiles?
Not too concerned about how the last two lines are ordered so it does not need to be a direct swap of the two tiles.

| 1.0 | Reorganise media tiles in About page - Is it possible to move the "Games" tile in **What can Kodi do for me?** section up with the rest of the media tiles?
Not too concerned about how the last two lines are ordered so it does not need to be a direct swap of the two tiles.

| test | reorganise media tiles in about page is it possible to move the games tile in what can kodi do for me section up with the rest of the media tiles not too concerned about how the last two lines are ordered so it does not need to be a direct swap of the two tiles | 1 |
144,045 | 13,094,113,142 | IssuesEvent | 2020-08-03 11:45:56 | rte-france/Grid2Op | https://api.github.com/repos/rte-france/Grid2Op | closed | Docstring documents a removed attribute | documentation | ## Documentation issue description
See https://github.com/jhmenke/grid2op_pp_baseline/issues/5
## Suggested modifications
Remove `indisponibility` in docstring of `BaseObservation.state_of`
| 1.0 | Docstring documents a removed attribute - ## Documentation issue description
See https://github.com/jhmenke/grid2op_pp_baseline/issues/5
## Suggested modifications
Remove `indisponibility` in docstring of `BaseObservation.state_of`
| non_test | docstring documents a removed attribute documentation issue description see suggested modifications remove indisponibility in docstring of baseobservation state of | 0 |
167,698 | 20,726,283,584 | IssuesEvent | 2022-03-14 02:32:45 | kapseliboi/webuild | https://api.github.com/repos/kapseliboi/webuild | opened | WS-2019-0063 (High) detected in multiple libraries | security vulnerability | ## WS-2019-0063 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>js-yaml-3.5.5.tgz</b>, <b>js-yaml-3.12.0.tgz</b>, <b>js-yaml-3.4.6.tgz</b></p></summary>
<p>
<details><summary><b>js-yaml-3.5.5.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/grunt/node_modules/js-yaml/package.json,/node_modules/grunt-jsbeautifier/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- :x: **js-yaml-3.5.5.tgz** (Vulnerable Library)
</details>
<details><summary><b>js-yaml-3.12.0.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.0.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- coveralls-3.0.2.tgz (Root Library)
- :x: **js-yaml-3.12.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>js-yaml-3.4.6.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.6.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.6.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/jscs/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- grunt-jscs-3.0.1.tgz (Root Library)
- jscs-3.0.7.tgz
- :x: **js-yaml-3.4.6.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution (js-yaml): 3.13.1</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p><p>Fix Resolution (js-yaml): 3.13.1</p>
<p>Direct dependency fix Resolution (coveralls): 3.0.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2019-0063 (High) detected in multiple libraries - ## WS-2019-0063 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>js-yaml-3.5.5.tgz</b>, <b>js-yaml-3.12.0.tgz</b>, <b>js-yaml-3.4.6.tgz</b></p></summary>
<p>
<details><summary><b>js-yaml-3.5.5.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.5.5.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/grunt/node_modules/js-yaml/package.json,/node_modules/grunt-jsbeautifier/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- grunt-1.0.3.tgz (Root Library)
- :x: **js-yaml-3.5.5.tgz** (Vulnerable Library)
</details>
<details><summary><b>js-yaml-3.12.0.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.0.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- coveralls-3.0.2.tgz (Root Library)
- :x: **js-yaml-3.12.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>js-yaml-3.4.6.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.6.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.4.6.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/jscs/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- grunt-jscs-3.0.1.tgz (Root Library)
- jscs-3.0.7.tgz
- :x: **js-yaml-3.4.6.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution (js-yaml): 3.13.1</p>
<p>Direct dependency fix Resolution (grunt): 1.0.4</p><p>Fix Resolution (js-yaml): 3.13.1</p>
<p>Direct dependency fix Resolution (coveralls): 3.0.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | ws high detected in multiple libraries ws high severity vulnerability vulnerable libraries js yaml tgz js yaml tgz js yaml tgz js yaml tgz yaml parser and serializer library home page a href path to dependency file package json path to vulnerable library node modules grunt node modules js yaml package json node modules grunt jsbeautifier node modules js yaml package json dependency hierarchy grunt tgz root library x js yaml tgz vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file package json path to vulnerable library node modules js yaml package json dependency hierarchy coveralls tgz root library x js yaml tgz vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file package json path to vulnerable library node modules jscs node modules js yaml package json dependency hierarchy grunt jscs tgz root library jscs tgz x js yaml tgz vulnerable library found in base branch master vulnerability details js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution js yaml direct dependency fix resolution grunt fix resolution js yaml direct dependency fix resolution coveralls step up your open source security game with whitesource | 0 |
53,484 | 6,730,569,438 | IssuesEvent | 2017-10-18 01:50:31 | HabitRPG/habitica | https://api.github.com/repos/HabitRPG/habitica | opened | Markdown in Tags on Task Edit doesn't work | hacktoberfest help wanted POST-REDESIGN priority: medium section: Task Page | When editing tasks, the tags that appear in the tag selection option dropdown do not display markdown correctly.
<img width="138" alt="screen shot 2017-10-17 at 6 48 18 pm" src="https://user-images.githubusercontent.com/3494081/31697368-00da0c92-b36c-11e7-9ca6-ef65afe52557.png">
| 1.0 | Markdown in Tags on Task Edit doesn't work - When editing tasks, the tags that appear in the tag selection option dropdown do not display markdown correctly.
<img width="138" alt="screen shot 2017-10-17 at 6 48 18 pm" src="https://user-images.githubusercontent.com/3494081/31697368-00da0c92-b36c-11e7-9ca6-ef65afe52557.png">
| non_test | markdown in tags on task edit doesn t work when editing tasks the tags that appear in the tag selection option dropdown do not display markdown correctly img width alt screen shot at pm src | 0 |
307,614 | 26,546,576,231 | IssuesEvent | 2023-01-20 01:05:54 | vidstack/player | https://api.github.com/repos/vidstack/player | closed | Visual Regression Tests | test ci/cd test:visual | ## Tasks
- [ ] Investigate whether this type of testing would be valuable.
- [ ] **If valuable.** Setup visual regression testing on skins/providers using Pixelmatch and CI Artifacts.
## References
- https://github.com/mapbox/pixelmatch
- https://docs.github.com/en/actions/guides/storing-workflow-data-as-artifacts
- https://github.com/adobe/spectrum-web-components
- https://github.com/vidstack/player/blob/main/docs/architecture/overview.md#testing | 2.0 | Visual Regression Tests - ## Tasks
- [ ] Investigate whether this type of testing would be valuable.
- [ ] **If valuable.** Setup visual regression testing on skins/providers using Pixelmatch and CI Artifacts.
## References
- https://github.com/mapbox/pixelmatch
- https://docs.github.com/en/actions/guides/storing-workflow-data-as-artifacts
- https://github.com/adobe/spectrum-web-components
- https://github.com/vidstack/player/blob/main/docs/architecture/overview.md#testing | test | visual regression tests tasks investigate whether this type of testing would be valuable if valuable setup visual regression testing on skins providers using pixelmatch and ci artifacts references | 1 |
201,664 | 15,217,097,707 | IssuesEvent | 2021-02-17 16:13:42 | labgrid-project/labgrid | https://api.github.com/repos/labgrid-project/labgrid | opened | Fix SSHManager cleanup exceptions during tests on NixOS | enhancement tests | NixOS does not have `ssh` available within the build environment when running the tests, the following error is subsequently raised:
```
=============== 201 passed, 31 skipped, 27 deselected in 36.30s ================
An exception occured during cleanup, call the cleanup() method on targets yourself to handle exceptions explictly.
Error: {} [Errno 2] No such file or directory: 'ssh'
An exception occured during cleanup, call the cleanup() method on targets yourself to handle exceptions explictly.
Error: {} [Errno 2] No such file or directory: 'ssh'
An exception occured during cleanup, call the cleanup() method on targets yourself to handle exceptions explictly.
Error: {} child has vanished
Finished executing pytestCheckPhase
```
We should ensure that we cleanup test connections ourselves in the tests, so the global cleanup function doesn't catch those. | 1.0 | Fix SSHManager cleanup exceptions during tests on NixOS - NixOS does not have `ssh` available within the build environment when running the tests, the following error is subsequently raised:
```
=============== 201 passed, 31 skipped, 27 deselected in 36.30s ================
An exception occured during cleanup, call the cleanup() method on targets yourself to handle exceptions explictly.
Error: {} [Errno 2] No such file or directory: 'ssh'
An exception occured during cleanup, call the cleanup() method on targets yourself to handle exceptions explictly.
Error: {} [Errno 2] No such file or directory: 'ssh'
An exception occured during cleanup, call the cleanup() method on targets yourself to handle exceptions explictly.
Error: {} child has vanished
Finished executing pytestCheckPhase
```
We should ensure that we cleanup test connections ourselves in the tests, so the global cleanup function doesn't catch those. | test | fix sshmanager cleanup exceptions during tests on nixos nixos does not have ssh available within the build environment when running the tests the following error is subsequently raised passed skipped deselected in an exception occured during cleanup call the cleanup method on targets yourself to handle exceptions explictly error no such file or directory ssh an exception occured during cleanup call the cleanup method on targets yourself to handle exceptions explictly error no such file or directory ssh an exception occured during cleanup call the cleanup method on targets yourself to handle exceptions explictly error child has vanished finished executing pytestcheckphase we should ensure that we cleanup test connections ourselves in the tests so the global cleanup function doesn t catch those | 1 |
68,870 | 7,112,623,058 | IssuesEvent | 2018-01-17 17:36:59 | Azure/azure-cli | https://api.github.com/repos/Azure/azure-cli | opened | [Test] Need test to detect unacceptable command module loading performance | Performance Test | We've had many regressions in this area, and need an automated way to detect when performance regressions creep in, and when new modules have unacceptable loading characteristics. | 1.0 | [Test] Need test to detect unacceptable command module loading performance - We've had many regressions in this area, and need an automated way to detect when performance regressions creep in, and when new modules have unacceptable loading characteristics. | test | need test to detect unacceptable command module loading performance we ve had many regressions in this area and need an automated way to detect when performance regressions creep in and when new modules have unacceptable loading characteristics | 1 |
668,123 | 22,553,222,101 | IssuesEvent | 2022-06-27 07:58:36 | owid/etl | https://api.github.com/repos/owid/etl | closed | Checksum mismatch on backported data causes ETL failure | bug data priority 1 - essential | Running the ETL locally on my machine:
```
Running 124 steps:
1. backport://backport/owid/latest/dataset_70_population__gapminder__hyde__and__un...
Traceback (most recent call last):
File "/Users/lars/Documents/owid/etl/.venv/bin/etl", line 5, in <module>
main()
File "/Users/lars/Documents/owid/etl/.venv/lib/python3.9/site-packages/click/core.py", line 1130, in __call__
return self.main(*args, **kwargs)
File "/Users/lars/Documents/owid/etl/.venv/lib/python3.9/site-packages/click/core.py", line 1055, in main
rv = self.invoke(ctx)
File "/Users/lars/Documents/owid/etl/.venv/lib/python3.9/site-packages/click/core.py", line 1404, in invoke
return ctx.invoke(self.callback, **ctx.params)
File "/Users/lars/Documents/owid/etl/.venv/lib/python3.9/site-packages/click/core.py", line 760, in invoke
return __callback(*args, **kwargs)
File "/Users/lars/Documents/owid/etl/etl/command.py", line 81, in main
run_dag(
File "/Users/lars/Documents/owid/etl/etl/command.py", line 143, in run_dag
time_taken = timed_run(lambda: step.run())
File "/Users/lars/Documents/owid/etl/etl/command.py", line 150, in timed_run
f()
File "/Users/lars/Documents/owid/etl/etl/command.py", line 143, in <lambda>
time_taken = timed_run(lambda: step.run())
File "/Users/lars/Documents/owid/etl/etl/steps/__init__.py", line 649, in run
dataset = backport_helpers.create_dataset(
File "/Users/lars/Documents/owid/etl/etl/backport_helpers.py", line 80, in create_dataset
values = load_values(short_name)
File "/Users/lars/Documents/owid/etl/etl/backport_helpers.py", line 21, in load_values
local_path = walden_ds.ensure_downloaded()
File "/Users/lars/Documents/owid/etl/vendor/walden/owid/walden/catalog.py", line 196, in ensure_downloaded
files.download(url, filename, expected_md5=self.md5, quiet=quiet)
File "/Users/lars/Documents/owid/etl/vendor/walden/owid/walden/files.py", line 88, in download
raise ChecksumDoesNotMatch(f"for file downloaded from {url}")
owid.walden.files.ChecksumDoesNotMatch: for file downloaded from https://walden.nyc3.digitaloceanspaces.com/backport/latest/dataset_70_population__gapminder__hyde__and__un_values.feather
``` | 1.0 | Checksum mismatch on backported data causes ETL failure - Running the ETL locally on my machine:
```
Running 124 steps:
1. backport://backport/owid/latest/dataset_70_population__gapminder__hyde__and__un...
Traceback (most recent call last):
File "/Users/lars/Documents/owid/etl/.venv/bin/etl", line 5, in <module>
main()
File "/Users/lars/Documents/owid/etl/.venv/lib/python3.9/site-packages/click/core.py", line 1130, in __call__
return self.main(*args, **kwargs)
File "/Users/lars/Documents/owid/etl/.venv/lib/python3.9/site-packages/click/core.py", line 1055, in main
rv = self.invoke(ctx)
File "/Users/lars/Documents/owid/etl/.venv/lib/python3.9/site-packages/click/core.py", line 1404, in invoke
return ctx.invoke(self.callback, **ctx.params)
File "/Users/lars/Documents/owid/etl/.venv/lib/python3.9/site-packages/click/core.py", line 760, in invoke
return __callback(*args, **kwargs)
File "/Users/lars/Documents/owid/etl/etl/command.py", line 81, in main
run_dag(
File "/Users/lars/Documents/owid/etl/etl/command.py", line 143, in run_dag
time_taken = timed_run(lambda: step.run())
File "/Users/lars/Documents/owid/etl/etl/command.py", line 150, in timed_run
f()
File "/Users/lars/Documents/owid/etl/etl/command.py", line 143, in <lambda>
time_taken = timed_run(lambda: step.run())
File "/Users/lars/Documents/owid/etl/etl/steps/__init__.py", line 649, in run
dataset = backport_helpers.create_dataset(
File "/Users/lars/Documents/owid/etl/etl/backport_helpers.py", line 80, in create_dataset
values = load_values(short_name)
File "/Users/lars/Documents/owid/etl/etl/backport_helpers.py", line 21, in load_values
local_path = walden_ds.ensure_downloaded()
File "/Users/lars/Documents/owid/etl/vendor/walden/owid/walden/catalog.py", line 196, in ensure_downloaded
files.download(url, filename, expected_md5=self.md5, quiet=quiet)
File "/Users/lars/Documents/owid/etl/vendor/walden/owid/walden/files.py", line 88, in download
raise ChecksumDoesNotMatch(f"for file downloaded from {url}")
owid.walden.files.ChecksumDoesNotMatch: for file downloaded from https://walden.nyc3.digitaloceanspaces.com/backport/latest/dataset_70_population__gapminder__hyde__and__un_values.feather
``` | non_test | checksum mismatch on backported data causes etl failure running the etl locally on my machine running steps backport backport owid latest dataset population gapminder hyde and un traceback most recent call last file users lars documents owid etl venv bin etl line in main file users lars documents owid etl venv lib site packages click core py line in call return self main args kwargs file users lars documents owid etl venv lib site packages click core py line in main rv self invoke ctx file users lars documents owid etl venv lib site packages click core py line in invoke return ctx invoke self callback ctx params file users lars documents owid etl venv lib site packages click core py line in invoke return callback args kwargs file users lars documents owid etl etl command py line in main run dag file users lars documents owid etl etl command py line in run dag time taken timed run lambda step run file users lars documents owid etl etl command py line in timed run f file users lars documents owid etl etl command py line in time taken timed run lambda step run file users lars documents owid etl etl steps init py line in run dataset backport helpers create dataset file users lars documents owid etl etl backport helpers py line in create dataset values load values short name file users lars documents owid etl etl backport helpers py line in load values local path walden ds ensure downloaded file users lars documents owid etl vendor walden owid walden catalog py line in ensure downloaded files download url filename expected self quiet quiet file users lars documents owid etl vendor walden owid walden files py line in download raise checksumdoesnotmatch f for file downloaded from url owid walden files checksumdoesnotmatch for file downloaded from | 0 |
333,078 | 29,508,052,701 | IssuesEvent | 2023-06-03 15:08:22 | unifyai/ivy | https://api.github.com/repos/unifyai/ivy | reopened | Fix array_contents.test_numpy_isneginf | NumPy Frontend Sub Task Failing Test | | | |
|---|---|
|tensorflow|<a href="null" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/5033374297/jobs/9027558057" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5033374297/jobs/9027558057" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/5033374297/jobs/9027558057" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|paddle|<a href="null" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
| 1.0 | Fix array_contents.test_numpy_isneginf - | | |
|---|---|
|tensorflow|<a href="null" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|torch|<a href="https://github.com/unifyai/ivy/actions/runs/5033374297/jobs/9027558057" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5033374297/jobs/9027558057" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|jax|<a href="https://github.com/unifyai/ivy/actions/runs/5033374297/jobs/9027558057" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
|paddle|<a href="null" rel="noopener noreferrer" target="_blank"><img src=https://img.shields.io/badge/-success-success></a>
| test | fix array contents test numpy isneginf tensorflow img src torch img src numpy img src jax img src paddle img src | 1 |
13,816 | 2,610,303,798 | IssuesEvent | 2015-02-26 19:37:40 | chrsmith/hedgewars | https://api.github.com/repos/chrsmith/hedgewars | opened | display total count of hedges per clan during room creation | auto-migrated Priority-Low Type-Enhancement | ```
during room creation it would be nice - especially in clan mode - to know what
is the total number of hedges per clan without having to count each hedge one
by one.
therefore i suggest to add a small digit in lower right corner of clan colour
indicator. so it could look something like this:
team alpha [red 12] ******
team beta [red 12] ******
team gamma [pink 12] ****
team delta [pink 12] ****
team omega [pink 12] ****
```
-----
Original issue reported on code.google.com by `jose1...@gmail.com` on 19 Jul 2011 at 1:06 | 1.0 | display total count of hedges per clan during room creation - ```
during room creation it would be nice - especially in clan mode - to know what
is the total number of hedges per clan without having to count each hedge one
by one.
therefore i suggest to add a small digit in lower right corner of clan colour
indicator. so it could look something like this:
team alpha [red 12] ******
team beta [red 12] ******
team gamma [pink 12] ****
team delta [pink 12] ****
team omega [pink 12] ****
```
-----
Original issue reported on code.google.com by `jose1...@gmail.com` on 19 Jul 2011 at 1:06 | non_test | display total count of hedges per clan during room creation during room creation it would be nice especially in clan mode to know what is the total number of hedges per clan without having to count each hedge one by one therefore i suggest to add a small digit in lower right corner of clan colour indicator so it could look something like this team alpha team beta team gamma team delta team omega original issue reported on code google com by gmail com on jul at | 0 |
270,915 | 29,146,867,405 | IssuesEvent | 2023-05-18 04:21:53 | momo-tong/io.netty-netty-all-4.1.41.Final | https://api.github.com/repos/momo-tong/io.netty-netty-all-4.1.41.Final | opened | netty-codec-http-4.1.41.Final.jar: 7 vulnerabilities (highest severity is: 9.1) | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (netty-codec-http version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-20445](https://www.mend.io/vulnerability-database/CVE-2019-20445) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.1 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.44.Final | ❌ |
| [CVE-2019-20444](https://www.mend.io/vulnerability-database/CVE-2019-20444) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.1 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.44.Final | ❌ |
| [CVE-2020-7238](https://www.mend.io/vulnerability-database/CVE-2020-7238) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.44.Final | ❌ |
| [CVE-2019-16869](https://www.mend.io/vulnerability-database/CVE-2019-16869) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.42.Final | ❌ |
| [CVE-2021-43797](https://www.mend.io/vulnerability-database/CVE-2021-43797) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.5 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.71.Final | ❌ |
| [CVE-2021-21295](https://www.mend.io/vulnerability-database/CVE-2021-21295) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.9 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.60.Final | ❌ |
| [CVE-2021-21290](https://www.mend.io/vulnerability-database/CVE-2021-21290) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.59.Final | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-20445</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
<p>Publish Date: 2020-01-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20445>CVE-2019-20445</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20445">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20445</a></p>
<p>Release Date: 2020-01-29</p>
<p>Fix Resolution: 4.1.44.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-20444</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."
<p>Publish Date: 2020-01-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20444>CVE-2019-20444</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444</a></p>
<p>Release Date: 2020-01-29</p>
<p>Fix Resolution: 4.1.44.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-7238</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869.
<p>Publish Date: 2020-01-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7238>CVE-2020-7238</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-01-27</p>
<p>Fix Resolution: 4.1.44.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-16869</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.
<p>Publish Date: 2019-09-26
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16869>CVE-2019-16869</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16869">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16869</a></p>
<p>Release Date: 2019-09-26</p>
<p>Fix Resolution: 4.1.42.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-43797</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.
Mend Note: After conducting further research, Mend has determined that all versions of netty up to version 4.1.71.Final are vulnerable to CVE-2021-43797.
<p>Publish Date: 2021-12-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-43797>CVE-2021-43797</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="CVE-2021-43797">CVE-2021-43797</a></p>
<p>Release Date: 2021-12-09</p>
<p>Fix Resolution: 4.1.71.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-21295</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: `HTTP2MultiplexCodec` or `Http2FrameCodec` is used, `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`.
<p>Publish Date: 2021-03-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21295>CVE-2021-21295</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-wm47-8v5p-wjpj">https://github.com/advisories/GHSA-wm47-8v5p-wjpj</a></p>
<p>Release Date: 2021-03-09</p>
<p>Fix Resolution: 4.1.60.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-21290</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user.
<p>Publish Date: 2021-02-08
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21290>CVE-2021-21290</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2">https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2</a></p>
<p>Release Date: 2021-02-08</p>
<p>Fix Resolution: 4.1.59.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details> | True | netty-codec-http-4.1.41.Final.jar: 7 vulnerabilities (highest severity is: 9.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (netty-codec-http version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2019-20445](https://www.mend.io/vulnerability-database/CVE-2019-20445) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.1 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.44.Final | ❌ |
| [CVE-2019-20444](https://www.mend.io/vulnerability-database/CVE-2019-20444) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 9.1 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.44.Final | ❌ |
| [CVE-2020-7238](https://www.mend.io/vulnerability-database/CVE-2020-7238) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.44.Final | ❌ |
| [CVE-2019-16869](https://www.mend.io/vulnerability-database/CVE-2019-16869) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High | 7.5 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.42.Final | ❌ |
| [CVE-2021-43797](https://www.mend.io/vulnerability-database/CVE-2021-43797) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 6.5 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.71.Final | ❌ |
| [CVE-2021-21295](https://www.mend.io/vulnerability-database/CVE-2021-21295) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.9 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.60.Final | ❌ |
| [CVE-2021-21290](https://www.mend.io/vulnerability-database/CVE-2021-21290) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | netty-codec-http-4.1.41.Final.jar | Direct | 4.1.59.Final | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-20445</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
<p>Publish Date: 2020-01-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20445>CVE-2019-20445</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20445">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20445</a></p>
<p>Release Date: 2020-01-29</p>
<p>Fix Resolution: 4.1.44.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-20444</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."
<p>Publish Date: 2020-01-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20444>CVE-2019-20444</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>9.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444</a></p>
<p>Release Date: 2020-01-29</p>
<p>Fix Resolution: 4.1.44.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2020-7238</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869.
<p>Publish Date: 2020-01-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7238>CVE-2020-7238</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-01-27</p>
<p>Fix Resolution: 4.1.44.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> CVE-2019-16869</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.
<p>Publish Date: 2019-09-26
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16869>CVE-2019-16869</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16869">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16869</a></p>
<p>Release Date: 2019-09-26</p>
<p>Fix Resolution: 4.1.42.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-43797</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.
Mend Note: After conducting further research, Mend has determined that all versions of netty up to version 4.1.71.Final are vulnerable to CVE-2021-43797.
<p>Publish Date: 2021-12-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-43797>CVE-2021-43797</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="CVE-2021-43797">CVE-2021-43797</a></p>
<p>Release Date: 2021-12-09</p>
<p>Fix Resolution: 4.1.71.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-21295</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. For an example attack refer to the linked GitHub Advisory. Users are only affected if all of this is true: `HTTP2MultiplexCodec` or `Http2FrameCodec` is used, `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer. This has been patched in 4.1.60.Final As a workaround, the user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`.
<p>Publish Date: 2021-03-09
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21295>CVE-2021-21295</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.9</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-wm47-8v5p-wjpj">https://github.com/advisories/GHSA-wm47-8v5p-wjpj</a></p>
<p>Release Date: 2021-03-09</p>
<p>Fix Resolution: 4.1.60.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-21290</summary>
### Vulnerable Library - <b>netty-codec-http-4.1.41.Final.jar</b></p>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.41.Final/netty-codec-http-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- :x: **netty-codec-http-4.1.41.Final.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/momo-tong/io.netty-netty-all-4.1.41.Final/commit/32f7f78cde89852ff753050a71bc5d27639a31ca">32f7f78cde89852ff753050a71bc5d27639a31ca</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user.
<p>Publish Date: 2021-02-08
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21290>CVE-2021-21290</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2">https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2</a></p>
<p>Release Date: 2021-02-08</p>
<p>Fix Resolution: 4.1.59.Final</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details> | non_test | netty codec http final jar vulnerabilities highest severity is vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in netty codec http version remediation available high netty codec http final jar direct final high netty codec http final jar direct final high netty codec http final jar direct final high netty codec http final jar direct final medium netty codec http final jar direct final medium netty codec http final jar direct final medium netty codec http final jar direct final details cve vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar dependency hierarchy x netty codec http final jar vulnerable library found in head commit a href found in base branch master vulnerability details httpobjectdecoder java in netty before allows a content length header to be accompanied by a second content length header or by a transfer encoding header publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution final step up your open source security game with mend cve vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar dependency hierarchy x netty codec http final jar vulnerable library found in head commit a href found in base branch master vulnerability details httpobjectdecoder java in netty before allows an http header that lacks a colon which might be interpreted as a separate header with an incorrect syntax or might be interpreted as an invalid fold publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution final step up your open source security game with mend cve vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar dependency hierarchy x netty codec http final jar vulnerable library found in head commit a href found in base branch master vulnerability details netty final allows http request smuggling because it mishandles transfer encoding whitespace such as a transfer encoding chunked line and a later content length header this issue exists because of an incomplete fix for cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution final step up your open source security game with mend cve vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar dependency hierarchy x netty codec http final jar vulnerable library found in head commit a href found in base branch master vulnerability details netty before final mishandles whitespace before the colon in http headers such as a transfer encoding chunked line which leads to http request smuggling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution final step up your open source security game with mend cve vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar dependency hierarchy x netty codec http final jar vulnerable library found in head commit a href found in base branch master vulnerability details netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients netty prior to version final skips control chars when they are present at the beginning end of the header name it should instead fail fast as these are not allowed by the spec and could lead to http request smuggling failing to do the validation might cause netty to sanitize header names before it forward these to another remote system when used as proxy this remote system can t see the invalid usage anymore and therefore does not do the validation itself users should upgrade to version final mend note after conducting further research mend has determined that all versions of netty up to version final are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin cve release date fix resolution final step up your open source security game with mend cve vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar dependency hierarchy x netty codec http final jar vulnerable library found in head commit a href found in base branch master vulnerability details netty is an open source asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients in netty io netty netty codec before version final there is a vulnerability that enables request smuggling if a content length header is present in the original http request the field is not validated by as it is propagated up this is fine as long as the request is not proxied through as http if the request comes in as an http stream gets converted into the http domain objects httprequest httpcontent etc via and then sent up to the child channel s pipeline and proxied through a remote peer as http this may result in request smuggling in a proxy case users may assume the content length is validated somehow which is not the case if the request is forwarded to a backend channel that is a http connection the content length now has meaning and needs to be checked an attacker can smuggle requests inside the body as it gets downgraded from http to http for an example attack refer to the linked github advisory users are only affected if all of this is true or is used is used to convert to http objects and these http objects are forwarded to another remote peer this has been patched in final as a workaround the user can do the validation by themselves by implementing a custom channelinboundhandler that is put in the channelpipeline behind publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution final step up your open source security game with mend cve vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository io netty netty codec http final netty codec http final jar dependency hierarchy x netty codec http final jar vulnerable library found in head commit a href found in base branch master vulnerability details netty is an open source asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers clients in netty before version final there is a vulnerability on unix like systems involving an insecure temp file when netty s multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled on unix like systems the temporary directory is shared between all user as such writing to this directory using apis that do not explicitly set the file directory permissions can lead to information disclosure of note this does not impact modern macos operating systems the method file createtempfile on unix like systems creates a random file but by default will create this file with the permissions rw r r thus if sensitive information is written to this file other local users can read this information this is the case in netty s abstractdiskhttpdata is vulnerable this has been fixed in version final as a workaround one may specify your own java io tmpdir when you start the jvm or use defaulthttpdatafactory setbasedir to set the directory to something that is only readable by the current user publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution final step up your open source security game with mend | 0 |
72,752 | 7,310,899,460 | IssuesEvent | 2018-02-28 16:13:43 | eclipse/openj9 | https://api.github.com/repos/eclipse/openj9 | closed | Merging Panama & Valhalla test projects | comp:test | Project Panama and Project Valhalla are both ongoing projects to develop future Java features. Project Panama's goal is to develop a bridge between Java and non-Java libraries (eg. C, C++). Project Valhalla proposes new language features for Java 10 onward.
Both projects are for future features. As their contents become relevant to the current Java version, tests will likely need to be moved from from the Panama/Valhalla test project to another test project. Given that both test projects are similar, it makes sense to merge the Panama tests and Valhalla tests into a joint 'FutureJEP' test project. | 1.0 | Merging Panama & Valhalla test projects - Project Panama and Project Valhalla are both ongoing projects to develop future Java features. Project Panama's goal is to develop a bridge between Java and non-Java libraries (eg. C, C++). Project Valhalla proposes new language features for Java 10 onward.
Both projects are for future features. As their contents become relevant to the current Java version, tests will likely need to be moved from from the Panama/Valhalla test project to another test project. Given that both test projects are similar, it makes sense to merge the Panama tests and Valhalla tests into a joint 'FutureJEP' test project. | test | merging panama valhalla test projects project panama and project valhalla are both ongoing projects to develop future java features project panama s goal is to develop a bridge between java and non java libraries eg c c project valhalla proposes new language features for java onward both projects are for future features as their contents become relevant to the current java version tests will likely need to be moved from from the panama valhalla test project to another test project given that both test projects are similar it makes sense to merge the panama tests and valhalla tests into a joint futurejep test project | 1 |
17,190 | 3,600,074,349 | IssuesEvent | 2016-02-03 02:48:08 | openshift/origin | https://api.github.com/repos/openshift/origin | closed | github.com/openshift/origin/pkg/cmd/server/admin times out generating server certificate | area/tests kind/test-flake priority/P2 | ERROR: type should be string, got "https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_origin/8658/console\r\n\r\nok \tgithub.com/openshift/origin/pkg/cmd/cli/describe\t1.765s\tcoverage: 59.4% of statements\r\nok \tgithub.com/openshift/origin/pkg/cmd/cli/secrets\t0.261s\tcoverage: 19.8% of statements\r\nok \tgithub.com/openshift/origin/pkg/cmd/flagtypes\t0.061s\tcoverage: 58.9% of statements\r\nok \tgithub.com/openshift/origin/pkg/cmd/infra/deployer\t0.228s\tcoverage: 51.5% of statements\r\nok \tgithub.com/openshift/origin/pkg/cmd/openshift\t0.569s\tcoverage: 65.5% of statements\r\nok \tgithub.com/openshift/origin/pkg/cmd/recycle\t0.141s\tcoverage: 69.6% of statements\r\npanic: test timed out after 1m0s\r\n\r\ngoroutine 43 [running]:\r\ntesting.func·008()\r\n\t/usr/lib/golang/src/testing/testing.go:681 +0x168\r\ncreated by time.goFunc\r\n\t/usr/lib/golang/src/time/sleep.go:129 +0x59\r\n\r\ngoroutine 1 [chan receive]:\r\ntesting.RunTests(0x19b2d60, 0x204b260, 0x2, 0x2, 0xc208059e01)\r\n\t/usr/lib/golang/src/testing/testing.go:556 +0xdc3\r\ntesting.(*M).Run(0xc208179720, 0x2a015e0)\r\n\t/usr/lib/golang/src/testing/testing.go:485 +0xe1\r\nmain.main()\r\n\tgithub.com/openshift/origin/pkg/cmd/server/admin/_test/_testmain.go:126 +0x382\r\n\r\ngoroutine 9 [syscall, 1 minutes]:\r\nos/signal.loop()\r\n\t/usr/lib/golang/src/os/signal/signal_unix.go:21 +0x2d\r\ncreated by os/signal.init·1\r\n\t/usr/lib/golang/src/os/signal/signal_unix.go:27 +0x43\r\n\r\ngoroutine 42 [runnable]:\r\nmath/big.nat.norm(0xc2084c5400, 0x11, 0x25, 0xc20818b0e0, 0x21, 0x24)\r\n\t/usr/lib/golang/src/math/big/nat.go:61\r\nmath/big.nat.divLarge(0xc2084c5400, 0x10, 0x25, 0xc20818b0e0, 0x21, 0x24, 0xc20818afc0, 0x20, 0x24, 0xc2082ee000, ...)\r\n\t/usr/lib/golang/src/math/big/nat.go:594 +0xfa0\r\nmath/big.nat.div(0xc2084c5400, 0x10, 0x25, 0xc20818b0e0, 0x20, 0x24, 0xc20818afc0, 0x20, 0x24, 0xc2082ee000, ...)\r\n\t/usr/lib/golang/src/math/big/nat.go:519 +0x3cc\r\nmath/big.nat.expNNWindowed(0xc20818afc0, 0x20, 0x24, 0xc2082ef4a0, 0x10, 0x14, 0xc2082ef040, 0x10, 0x14, 0xc2082ee000, ...)\r\n\t/usr/lib/golang/src/math/big/nat.go:1372 +0xa3a\r\nmath/big.nat.expNN(0xc2082ef540, 0x10, 0x14, 0xc2082ef4a0, 0x10, 0x14, 0xc2082ef040, 0x10, 0x14, 0xc2082ee000, ...)\r\n\t/usr/lib/golang/src/math/big/nat.go:1260 +0x4f1\r\nmath/big.nat.probablyPrime(0xc2082ee000, 0x10, 0x14, 0x14, 0x14)\r\n\t/usr/lib/golang/src/math/big/nat.go:1445 +0x9d4\r\nmath/big.(*Int).ProbablyPrime(0xc208284000, 0x14, 0xc208284020)\r\n\t/usr/lib/golang/src/math/big/int.go:741 +0x7c\r\ncrypto/rand.Prime(0x7fb0417e1678, 0xc20803cd20, 0x400, 0xc208284000, 0x0, 0x0)\r\n\t/usr/lib/golang/src/crypto/rand/util.go:99 +0x654\r\ncrypto/rsa.GenerateMultiPrimeKey(0x7fb0417e1678, 0xc20803cd20, 0x2, 0x800, 0xc20837aea0, 0x0, 0x0)\r\n\t/usr/lib/golang/src/crypto/rsa/rsa.go:187 +0x2c9\r\ncrypto/rsa.GenerateKey(0x7fb0417e1678, 0xc20803cd20, 0x800, 0xc2081d4e20, 0x0, 0x0)\r\n\t/usr/lib/golang/src/crypto/rsa/rsa.go:145 +0x65\r\ngithub.com/openshift/origin/pkg/cmd/server/crypto.NewKeyPair(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)\r\n\t/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/crypto/crypto.go:338 +0xa6\r\ngithub.com/openshift/origin/pkg/cmd/server/crypto.(*CA).MakeServerCert(0xc208174e70, 0xc2083def60, 0x29, 0xc2083defc0, 0x29, 0xc2081f56b0, 0x7fb0417f3100, 0x0, 0x0)\r\n\t/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/crypto/crypto.go:251 +0x22d\r\ngithub.com/openshift/origin/pkg/cmd/server/crypto.(*CA).EnsureServerCert(0xc208174e70, 0xc2083def60, 0x29, 0xc2083defc0, 0x29, 0xc2081f56b0, 0x46d08c, 0x4ad4a0, 0x0, 0x0)\r\n\t/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/crypto/crypto.go:223 +0xe5\r\ngithub.com/openshift/origin/pkg/cmd/server/admin.CreateServerCertOptions.CreateServerCert(0xc2083db0c0, 0xc2083def60, 0x29, 0xc2083defc0, 0x29, 0xc2081d58b0, 0x1, 0x1, 0x0, 0x7fb0417e0400, ...)\r\n\tgithub.com/openshift/origin/pkg/cmd/server/admin/_test/_obj_test/create_servercert.go:143 +0x756\r\ngithub.com/openshift/origin/pkg/cmd/server/admin.CreateNodeConfigOptions.MakeServerCert(0xc2083db0c0, 0xc2083de99b, 0x1e, 0x1665457, 0x7, 0xc2081d58b0, 0x1, 0x1, 0x1711730, 0x17, ...)\r\n\tgithub.com/openshift/origin/pkg/cmd/server/admin/_test/_obj_test/create_nodeconfig.go:386 +0x235\r\ngithub.com/openshift/origin/pkg/cmd/server/admin.CreateNodeConfigOptions.CreateNodeFolder(0xc2083db0c0, 0xc2083de99b, 0x1e, 0x1665457, 0x7, 0xc2081d58b0, 0x1, 0x1, 0x1711730, 0x17, ...)\r\n\tgithub.com/openshift/origin/pkg/cmd/server/admin/_test/_obj_test/create_nodeconfig.go:285 +0x62a\r\ngithub.com/openshift/origin/pkg/cmd/server/admin.func·014(0xc20817e200, 0xc20846d3b0, 0x0, 0x9)\r\n\tgithub.com/openshift/origin/pkg/cmd/server/admin/_test/_obj_test/create_nodeconfig.go:73 +0x221\r\ngithub.com/spf13/cobra.(*Command).execute(0xc20817e200, 0xc20846d200, 0x9, 0x9, 0x0, 0x0)\r\n\t/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/spf13/cobra/command.go:572 +0xb41\r\ngithub.com/spf13/cobra.(*Command).ExecuteC(0xc20817e000, 0xc20817e200, 0x0, 0x0)\r\n\t/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/spf13/cobra/command.go:662 +0x635\r\ngithub.com/spf13/cobra.(*Command).Execute(0xc20817e000, 0x0, 0x0)\r\n\t/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/spf13/cobra/command.go:618 +0x48\r\ngithub.com/openshift/origin/pkg/cmd/server/admin.executeNodeConfig(0xc2084cfe58, 0x8, 0x8, 0x0, 0x0)\r\n\t/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/admin/create_nodeconfig_test.go:107 +0x721\r\ngithub.com/openshift/origin/pkg/cmd/server/admin.TestNodeConfigTLS(0xc20842bcb0)\r\n\t/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/admin/create_nodeconfig_test.go:45 +0x402\r\ntesting.tRunner(0xc20842bcb0, 0x204b278)\r\n\t/usr/lib/golang/src/testing/testing.go:447 +0x134\r\ncreated by testing.RunTests\r\n\t/usr/lib/golang/src/testing/testing.go:555 +0xd4e\r\n\r\ngoroutine 25 [chan receive]:\r\ngithub.com/golang/glog.(*loggingT).flushDaemon(0x29f5700)\r\n\t/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/golang/glog/glog.go:879 +0x99\r\ncreated by github.com/golang/glog.init·1\r\n\t/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/golang/glog/glog.go:410 +0x2ca\r\n\r\ngoroutine 33 [syscall, 1 minutes, locked to thread]:\r\nruntime.goexit()\r\n\t/usr/lib/golang/src/runtime/asm_amd64.s:2232 +0x1\r\nFAIL\tgithub.com/openshift/origin/pkg/cmd/server/admin\t60.391s\r\nok \tgithub.com/openshift/origin/pkg/cmd/server/api\t0.217s\tcoverage: 15.6% of statements\r\nok \tgithub.com/openshift/origin/pkg/cmd/server/api/v1\t0.284s\tcoverage: 20.3% of statements" | 2.0 | github.com/openshift/origin/pkg/cmd/server/admin times out generating server certificate - https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_origin/8658/console
ok github.com/openshift/origin/pkg/cmd/cli/describe 1.765s coverage: 59.4% of statements
ok github.com/openshift/origin/pkg/cmd/cli/secrets 0.261s coverage: 19.8% of statements
ok github.com/openshift/origin/pkg/cmd/flagtypes 0.061s coverage: 58.9% of statements
ok github.com/openshift/origin/pkg/cmd/infra/deployer 0.228s coverage: 51.5% of statements
ok github.com/openshift/origin/pkg/cmd/openshift 0.569s coverage: 65.5% of statements
ok github.com/openshift/origin/pkg/cmd/recycle 0.141s coverage: 69.6% of statements
panic: test timed out after 1m0s
goroutine 43 [running]:
testing.func·008()
/usr/lib/golang/src/testing/testing.go:681 +0x168
created by time.goFunc
/usr/lib/golang/src/time/sleep.go:129 +0x59
goroutine 1 [chan receive]:
testing.RunTests(0x19b2d60, 0x204b260, 0x2, 0x2, 0xc208059e01)
/usr/lib/golang/src/testing/testing.go:556 +0xdc3
testing.(*M).Run(0xc208179720, 0x2a015e0)
/usr/lib/golang/src/testing/testing.go:485 +0xe1
main.main()
github.com/openshift/origin/pkg/cmd/server/admin/_test/_testmain.go:126 +0x382
goroutine 9 [syscall, 1 minutes]:
os/signal.loop()
/usr/lib/golang/src/os/signal/signal_unix.go:21 +0x2d
created by os/signal.init·1
/usr/lib/golang/src/os/signal/signal_unix.go:27 +0x43
goroutine 42 [runnable]:
math/big.nat.norm(0xc2084c5400, 0x11, 0x25, 0xc20818b0e0, 0x21, 0x24)
/usr/lib/golang/src/math/big/nat.go:61
math/big.nat.divLarge(0xc2084c5400, 0x10, 0x25, 0xc20818b0e0, 0x21, 0x24, 0xc20818afc0, 0x20, 0x24, 0xc2082ee000, ...)
/usr/lib/golang/src/math/big/nat.go:594 +0xfa0
math/big.nat.div(0xc2084c5400, 0x10, 0x25, 0xc20818b0e0, 0x20, 0x24, 0xc20818afc0, 0x20, 0x24, 0xc2082ee000, ...)
/usr/lib/golang/src/math/big/nat.go:519 +0x3cc
math/big.nat.expNNWindowed(0xc20818afc0, 0x20, 0x24, 0xc2082ef4a0, 0x10, 0x14, 0xc2082ef040, 0x10, 0x14, 0xc2082ee000, ...)
/usr/lib/golang/src/math/big/nat.go:1372 +0xa3a
math/big.nat.expNN(0xc2082ef540, 0x10, 0x14, 0xc2082ef4a0, 0x10, 0x14, 0xc2082ef040, 0x10, 0x14, 0xc2082ee000, ...)
/usr/lib/golang/src/math/big/nat.go:1260 +0x4f1
math/big.nat.probablyPrime(0xc2082ee000, 0x10, 0x14, 0x14, 0x14)
/usr/lib/golang/src/math/big/nat.go:1445 +0x9d4
math/big.(*Int).ProbablyPrime(0xc208284000, 0x14, 0xc208284020)
/usr/lib/golang/src/math/big/int.go:741 +0x7c
crypto/rand.Prime(0x7fb0417e1678, 0xc20803cd20, 0x400, 0xc208284000, 0x0, 0x0)
/usr/lib/golang/src/crypto/rand/util.go:99 +0x654
crypto/rsa.GenerateMultiPrimeKey(0x7fb0417e1678, 0xc20803cd20, 0x2, 0x800, 0xc20837aea0, 0x0, 0x0)
/usr/lib/golang/src/crypto/rsa/rsa.go:187 +0x2c9
crypto/rsa.GenerateKey(0x7fb0417e1678, 0xc20803cd20, 0x800, 0xc2081d4e20, 0x0, 0x0)
/usr/lib/golang/src/crypto/rsa/rsa.go:145 +0x65
github.com/openshift/origin/pkg/cmd/server/crypto.NewKeyPair(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/crypto/crypto.go:338 +0xa6
github.com/openshift/origin/pkg/cmd/server/crypto.(*CA).MakeServerCert(0xc208174e70, 0xc2083def60, 0x29, 0xc2083defc0, 0x29, 0xc2081f56b0, 0x7fb0417f3100, 0x0, 0x0)
/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/crypto/crypto.go:251 +0x22d
github.com/openshift/origin/pkg/cmd/server/crypto.(*CA).EnsureServerCert(0xc208174e70, 0xc2083def60, 0x29, 0xc2083defc0, 0x29, 0xc2081f56b0, 0x46d08c, 0x4ad4a0, 0x0, 0x0)
/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/crypto/crypto.go:223 +0xe5
github.com/openshift/origin/pkg/cmd/server/admin.CreateServerCertOptions.CreateServerCert(0xc2083db0c0, 0xc2083def60, 0x29, 0xc2083defc0, 0x29, 0xc2081d58b0, 0x1, 0x1, 0x0, 0x7fb0417e0400, ...)
github.com/openshift/origin/pkg/cmd/server/admin/_test/_obj_test/create_servercert.go:143 +0x756
github.com/openshift/origin/pkg/cmd/server/admin.CreateNodeConfigOptions.MakeServerCert(0xc2083db0c0, 0xc2083de99b, 0x1e, 0x1665457, 0x7, 0xc2081d58b0, 0x1, 0x1, 0x1711730, 0x17, ...)
github.com/openshift/origin/pkg/cmd/server/admin/_test/_obj_test/create_nodeconfig.go:386 +0x235
github.com/openshift/origin/pkg/cmd/server/admin.CreateNodeConfigOptions.CreateNodeFolder(0xc2083db0c0, 0xc2083de99b, 0x1e, 0x1665457, 0x7, 0xc2081d58b0, 0x1, 0x1, 0x1711730, 0x17, ...)
github.com/openshift/origin/pkg/cmd/server/admin/_test/_obj_test/create_nodeconfig.go:285 +0x62a
github.com/openshift/origin/pkg/cmd/server/admin.func·014(0xc20817e200, 0xc20846d3b0, 0x0, 0x9)
github.com/openshift/origin/pkg/cmd/server/admin/_test/_obj_test/create_nodeconfig.go:73 +0x221
github.com/spf13/cobra.(*Command).execute(0xc20817e200, 0xc20846d200, 0x9, 0x9, 0x0, 0x0)
/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/spf13/cobra/command.go:572 +0xb41
github.com/spf13/cobra.(*Command).ExecuteC(0xc20817e000, 0xc20817e200, 0x0, 0x0)
/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/spf13/cobra/command.go:662 +0x635
github.com/spf13/cobra.(*Command).Execute(0xc20817e000, 0x0, 0x0)
/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/spf13/cobra/command.go:618 +0x48
github.com/openshift/origin/pkg/cmd/server/admin.executeNodeConfig(0xc2084cfe58, 0x8, 0x8, 0x0, 0x0)
/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/admin/create_nodeconfig_test.go:107 +0x721
github.com/openshift/origin/pkg/cmd/server/admin.TestNodeConfigTLS(0xc20842bcb0)
/data/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/pkg/cmd/server/admin/create_nodeconfig_test.go:45 +0x402
testing.tRunner(0xc20842bcb0, 0x204b278)
/usr/lib/golang/src/testing/testing.go:447 +0x134
created by testing.RunTests
/usr/lib/golang/src/testing/testing.go:555 +0xd4e
goroutine 25 [chan receive]:
github.com/golang/glog.(*loggingT).flushDaemon(0x29f5700)
/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/golang/glog/glog.go:879 +0x99
created by github.com/golang/glog.init·1
/data/src/github.com/openshift/origin/Godeps/_workspace/src/github.com/golang/glog/glog.go:410 +0x2ca
goroutine 33 [syscall, 1 minutes, locked to thread]:
runtime.goexit()
/usr/lib/golang/src/runtime/asm_amd64.s:2232 +0x1
FAIL github.com/openshift/origin/pkg/cmd/server/admin 60.391s
ok github.com/openshift/origin/pkg/cmd/server/api 0.217s coverage: 15.6% of statements
ok github.com/openshift/origin/pkg/cmd/server/api/v1 0.284s coverage: 20.3% of statements | test | github com openshift origin pkg cmd server admin times out generating server certificate ok github com openshift origin pkg cmd cli describe coverage of statements ok github com openshift origin pkg cmd cli secrets coverage of statements ok github com openshift origin pkg cmd flagtypes coverage of statements ok github com openshift origin pkg cmd infra deployer coverage of statements ok github com openshift origin pkg cmd openshift coverage of statements ok github com openshift origin pkg cmd recycle coverage of statements panic test timed out after goroutine testing func· usr lib golang src testing testing go created by time gofunc usr lib golang src time sleep go goroutine testing runtests usr lib golang src testing testing go testing m run usr lib golang src testing testing go main main github com openshift origin pkg cmd server admin test testmain go goroutine os signal loop usr lib golang src os signal signal unix go created by os signal init· usr lib golang src os signal signal unix go goroutine math big nat norm usr lib golang src math big nat go math big nat divlarge usr lib golang src math big nat go math big nat div usr lib golang src math big nat go math big nat expnnwindowed usr lib golang src math big nat go math big nat expnn usr lib golang src math big nat go math big nat probablyprime usr lib golang src math big nat go math big int probablyprime usr lib golang src math big int go crypto rand prime usr lib golang src crypto rand util go crypto rsa generatemultiprimekey usr lib golang src crypto rsa rsa go crypto rsa generatekey usr lib golang src crypto rsa rsa go github com openshift origin pkg cmd server crypto newkeypair data src github com openshift origin output local go src github com openshift origin pkg cmd server crypto crypto go github com openshift origin pkg cmd server crypto ca makeservercert data src github com openshift origin output local go src github com openshift origin pkg cmd server crypto crypto go github com openshift origin pkg cmd server crypto ca ensureservercert data src github com openshift origin output local go src github com openshift origin pkg cmd server crypto crypto go github com openshift origin pkg cmd server admin createservercertoptions createservercert github com openshift origin pkg cmd server admin test obj test create servercert go github com openshift origin pkg cmd server admin createnodeconfigoptions makeservercert github com openshift origin pkg cmd server admin test obj test create nodeconfig go github com openshift origin pkg cmd server admin createnodeconfigoptions createnodefolder github com openshift origin pkg cmd server admin test obj test create nodeconfig go github com openshift origin pkg cmd server admin func· github com openshift origin pkg cmd server admin test obj test create nodeconfig go github com cobra command execute data src github com openshift origin godeps workspace src github com cobra command go github com cobra command executec data src github com openshift origin godeps workspace src github com cobra command go github com cobra command execute data src github com openshift origin godeps workspace src github com cobra command go github com openshift origin pkg cmd server admin executenodeconfig data src github com openshift origin output local go src github com openshift origin pkg cmd server admin create nodeconfig test go github com openshift origin pkg cmd server admin testnodeconfigtls data src github com openshift origin output local go src github com openshift origin pkg cmd server admin create nodeconfig test go testing trunner usr lib golang src testing testing go created by testing runtests usr lib golang src testing testing go goroutine github com golang glog loggingt flushdaemon data src github com openshift origin godeps workspace src github com golang glog glog go created by github com golang glog init· data src github com openshift origin godeps workspace src github com golang glog glog go goroutine runtime goexit usr lib golang src runtime asm s fail github com openshift origin pkg cmd server admin ok github com openshift origin pkg cmd server api coverage of statements ok github com openshift origin pkg cmd server api coverage of statements | 1 |
233,371 | 18,976,650,582 | IssuesEvent | 2021-11-20 04:40:49 | Azure/azure-sdk-for-net | https://api.github.com/repos/Azure/azure-sdk-for-net | opened | [Flaky Test] Champion_BasicCheckpointing | Search Client test-reliability | https://dev.azure.com/azure-sdk/public/_build/results?buildId=1206187&view=ms.vss-test-web.build-test-results-tab&runId=25960692&resultId=116513&paneView=debug
```
Error message
Expected: 489
But was: 500
Stack trace
at Azure.Search.Documents.Tests.BatchingTests.Champion_BasicCheckpointing() in D:\a\_work\1\s\sdk\search\Azure.Search.Documents\tests\Batching\BatchingTests.cs:line 385
at Azure.Search.Documents.Tests.BatchingTests.Champion_BasicCheckpointing() in D:\a\_work\1\s\sdk\search\Azure.Search.Documents\tests\Batching\BatchingTests.cs:line 390
at Azure.Search.Documents.Tests.BatchingTests.Champion_BasicCheckpointing() in D:\a\_work\1\s\sdk\search\Azure.Search.Documents\tests\Batching\BatchingTests.cs:line 390
at NUnit.Framework.Internal.TaskAwaitAdapter.GenericAdapter`1.BlockUntilCompleted()
at NUnit.Framework.Internal.MessagePumpStrategy.NoMessagePumpStrategy.WaitForCompletion(AwaitAdapter awaiter)
at NUnit.Framework.Internal.AsyncToSyncAdapter.Await(Func`1 invoke)
at NUnit.Framework.Internal.Commands.TestMethodCommand.RunTestMethod(TestExecutionContext context)
at NUnit.Framework.Internal.Commands.TestMethodCommand.Execute(TestExecutionContext context)
at NUnit.Framework.Internal.Commands.BeforeAndAfterTestCommand.<>c__DisplayClass1_0.<Execute>b__0()
at NUnit.Framework.Internal.Commands.BeforeAndAfterTestCommand.RunTestMethodInThreadAbortSafeZone(TestExecutionContext context, Action action)
``` | 1.0 | [Flaky Test] Champion_BasicCheckpointing - https://dev.azure.com/azure-sdk/public/_build/results?buildId=1206187&view=ms.vss-test-web.build-test-results-tab&runId=25960692&resultId=116513&paneView=debug
```
Error message
Expected: 489
But was: 500
Stack trace
at Azure.Search.Documents.Tests.BatchingTests.Champion_BasicCheckpointing() in D:\a\_work\1\s\sdk\search\Azure.Search.Documents\tests\Batching\BatchingTests.cs:line 385
at Azure.Search.Documents.Tests.BatchingTests.Champion_BasicCheckpointing() in D:\a\_work\1\s\sdk\search\Azure.Search.Documents\tests\Batching\BatchingTests.cs:line 390
at Azure.Search.Documents.Tests.BatchingTests.Champion_BasicCheckpointing() in D:\a\_work\1\s\sdk\search\Azure.Search.Documents\tests\Batching\BatchingTests.cs:line 390
at NUnit.Framework.Internal.TaskAwaitAdapter.GenericAdapter`1.BlockUntilCompleted()
at NUnit.Framework.Internal.MessagePumpStrategy.NoMessagePumpStrategy.WaitForCompletion(AwaitAdapter awaiter)
at NUnit.Framework.Internal.AsyncToSyncAdapter.Await(Func`1 invoke)
at NUnit.Framework.Internal.Commands.TestMethodCommand.RunTestMethod(TestExecutionContext context)
at NUnit.Framework.Internal.Commands.TestMethodCommand.Execute(TestExecutionContext context)
at NUnit.Framework.Internal.Commands.BeforeAndAfterTestCommand.<>c__DisplayClass1_0.<Execute>b__0()
at NUnit.Framework.Internal.Commands.BeforeAndAfterTestCommand.RunTestMethodInThreadAbortSafeZone(TestExecutionContext context, Action action)
``` | test | champion basiccheckpointing error message expected but was stack trace at azure search documents tests batchingtests champion basiccheckpointing in d a work s sdk search azure search documents tests batching batchingtests cs line at azure search documents tests batchingtests champion basiccheckpointing in d a work s sdk search azure search documents tests batching batchingtests cs line at azure search documents tests batchingtests champion basiccheckpointing in d a work s sdk search azure search documents tests batching batchingtests cs line at nunit framework internal taskawaitadapter genericadapter blockuntilcompleted at nunit framework internal messagepumpstrategy nomessagepumpstrategy waitforcompletion awaitadapter awaiter at nunit framework internal asynctosyncadapter await func invoke at nunit framework internal commands testmethodcommand runtestmethod testexecutioncontext context at nunit framework internal commands testmethodcommand execute testexecutioncontext context at nunit framework internal commands beforeandaftertestcommand c b at nunit framework internal commands beforeandaftertestcommand runtestmethodinthreadabortsafezone testexecutioncontext context action action | 1 |
108,695 | 9,322,029,603 | IssuesEvent | 2019-03-27 06:46:08 | standard-things/esm | https://api.github.com/repos/standard-things/esm | closed | repro misleading error messages | bug needs tests | repro for error message case which `--experimental-modules` seems to be more specific about:
```js
// index.js
import { ControllerA } from "./controllers/index.js"
```
```js
// /controllers/index.js
export { default as ControllerA } from "./ControllerA.js"
```
```js
// /controllers/ControllerA.js
export {}
```
esm:
```shell
node -r esm index.js
SyntaxError: The requested module 'file:///Users/daniel/dev/repros/esm/error-prop/controllers/index.js' does not provide an export named 'ControllerA'
at internal/main/run_main_module.js:21:11
```
--experimental modules:
```shell
node --experimental-modules index.mjs
(node:3693) ExperimentalWarning: The ESM module loader is experimental.
file:///Users/daniel/dev/repros/esm/error-prop/controllers/index.mjs:1
export { default as ControllerA } from "./ControllerA.mjs";
^^^^^^^^^^^^^^^^^^^^^^
SyntaxError: The requested module './ControllerA.mjs' does not provide an export named 'default'
at ModuleJob._instantiate (internal/modules/esm/module_job.js:88:21)
```
to be more specific:
`esm`: The requested module 'file:///Users/daniel/dev/repros/esm/error-prop/controllers/index.js' **does not provide an export named 'ControllerA'**
vs:
`--exp mod`: The requested module './ControllerA.mjs' **does not provide an export named 'default'**
when you compare the two above, --experimental-modules points out directly where and what is wrong. with esm you [kinda] don't know. | 1.0 | repro misleading error messages - repro for error message case which `--experimental-modules` seems to be more specific about:
```js
// index.js
import { ControllerA } from "./controllers/index.js"
```
```js
// /controllers/index.js
export { default as ControllerA } from "./ControllerA.js"
```
```js
// /controllers/ControllerA.js
export {}
```
esm:
```shell
node -r esm index.js
SyntaxError: The requested module 'file:///Users/daniel/dev/repros/esm/error-prop/controllers/index.js' does not provide an export named 'ControllerA'
at internal/main/run_main_module.js:21:11
```
--experimental modules:
```shell
node --experimental-modules index.mjs
(node:3693) ExperimentalWarning: The ESM module loader is experimental.
file:///Users/daniel/dev/repros/esm/error-prop/controllers/index.mjs:1
export { default as ControllerA } from "./ControllerA.mjs";
^^^^^^^^^^^^^^^^^^^^^^
SyntaxError: The requested module './ControllerA.mjs' does not provide an export named 'default'
at ModuleJob._instantiate (internal/modules/esm/module_job.js:88:21)
```
to be more specific:
`esm`: The requested module 'file:///Users/daniel/dev/repros/esm/error-prop/controllers/index.js' **does not provide an export named 'ControllerA'**
vs:
`--exp mod`: The requested module './ControllerA.mjs' **does not provide an export named 'default'**
when you compare the two above, --experimental-modules points out directly where and what is wrong. with esm you [kinda] don't know. | test | repro misleading error messages repro for error message case which experimental modules seems to be more specific about js index js import controllera from controllers index js js controllers index js export default as controllera from controllera js js controllers controllera js export esm shell node r esm index js syntaxerror the requested module file users daniel dev repros esm error prop controllers index js does not provide an export named controllera at internal main run main module js experimental modules shell node experimental modules index mjs node experimentalwarning the esm module loader is experimental file users daniel dev repros esm error prop controllers index mjs export default as controllera from controllera mjs syntaxerror the requested module controllera mjs does not provide an export named default at modulejob instantiate internal modules esm module job js to be more specific esm the requested module file users daniel dev repros esm error prop controllers index js does not provide an export named controllera vs exp mod the requested module controllera mjs does not provide an export named default when you compare the two above experimental modules points out directly where and what is wrong with esm you don t know | 1 |
23,076 | 11,840,158,645 | IssuesEvent | 2020-03-23 18:21:42 | Azure/azure-sdk-for-net | https://api.github.com/repos/Azure/azure-sdk-for-net | opened | [ServiceBus] Deserialize message sent from WindowsAzure.ServiceBus (Track 1) | Client Service Bus | We might want to add an API, sample, or document explaining how to deserialize a message sent from `WindowsAzure.ServiceBus` (the "Track 1" SDK). To run the following repro, create a .NET Framework console app (not .NET Core) and add package references to `WindowsAzure.ServiceBus` (Track 1) and `Azure.Messaging.ServiceBus` (Track 2).
```C#
// Send from WindowsAzure.ServiceBus (Track 1)
var factory1 = MessagingFactory.CreateFromConnectionString(connectionString);
var client1 = factory1.CreateQueueClient("test");
client1.Send(new BrokeredMessage("WindowsAzure.ServiceBus"));
// Receive from Azure.Messaging.ServiceBus (Track 2)
var client2 = new ServiceBusClient(connectionString);
var receiver2 = client2.GetReceiver("test");
var message2 = await receiver2.ReceiveAsync();
var body2Bytes = message2.Body.ToArray();
var invalidBody2 = Encoding.UTF8.GetString(body2Bytes);
Console.WriteLine(invalidBody2);
// @strin3http://schemas.microsoft.com/2003/10/Serialization/?WindowsAzure.ServiceBus
var validBody2 = Deserialize<string>(body2Bytes);
Console.WriteLine(validBody2);
// WindowsAzure.ServiceBus
await receiver2.CompleteAsync(message2);
public static T Deserialize<T>(byte[] data)
{
var serializer = new DataContractSerializer(typeof(T));
using (var stream = new MemoryStream(data))
using (var reader = XmlDictionaryReader.CreateBinaryReader(stream, XmlDictionaryReaderQuotas.Max))
{
return (T)serializer.ReadObject(reader);
}
}
```
| 1.0 | [ServiceBus] Deserialize message sent from WindowsAzure.ServiceBus (Track 1) - We might want to add an API, sample, or document explaining how to deserialize a message sent from `WindowsAzure.ServiceBus` (the "Track 1" SDK). To run the following repro, create a .NET Framework console app (not .NET Core) and add package references to `WindowsAzure.ServiceBus` (Track 1) and `Azure.Messaging.ServiceBus` (Track 2).
```C#
// Send from WindowsAzure.ServiceBus (Track 1)
var factory1 = MessagingFactory.CreateFromConnectionString(connectionString);
var client1 = factory1.CreateQueueClient("test");
client1.Send(new BrokeredMessage("WindowsAzure.ServiceBus"));
// Receive from Azure.Messaging.ServiceBus (Track 2)
var client2 = new ServiceBusClient(connectionString);
var receiver2 = client2.GetReceiver("test");
var message2 = await receiver2.ReceiveAsync();
var body2Bytes = message2.Body.ToArray();
var invalidBody2 = Encoding.UTF8.GetString(body2Bytes);
Console.WriteLine(invalidBody2);
// @strin3http://schemas.microsoft.com/2003/10/Serialization/?WindowsAzure.ServiceBus
var validBody2 = Deserialize<string>(body2Bytes);
Console.WriteLine(validBody2);
// WindowsAzure.ServiceBus
await receiver2.CompleteAsync(message2);
public static T Deserialize<T>(byte[] data)
{
var serializer = new DataContractSerializer(typeof(T));
using (var stream = new MemoryStream(data))
using (var reader = XmlDictionaryReader.CreateBinaryReader(stream, XmlDictionaryReaderQuotas.Max))
{
return (T)serializer.ReadObject(reader);
}
}
```
| non_test | deserialize message sent from windowsazure servicebus track we might want to add an api sample or document explaining how to deserialize a message sent from windowsazure servicebus the track sdk to run the following repro create a net framework console app not net core and add package references to windowsazure servicebus track and azure messaging servicebus track c send from windowsazure servicebus track var messagingfactory createfromconnectionstring connectionstring var createqueueclient test send new brokeredmessage windowsazure servicebus receive from azure messaging servicebus track var new servicebusclient connectionstring var getreceiver test var await receiveasync var body toarray var encoding getstring console writeline var deserialize console writeline windowsazure servicebus await completeasync public static t deserialize byte data var serializer new datacontractserializer typeof t using var stream new memorystream data using var reader xmldictionaryreader createbinaryreader stream xmldictionaryreaderquotas max return t serializer readobject reader | 0 |
55,611 | 14,013,066,158 | IssuesEvent | 2020-10-29 09:55:04 | gamer4life1/second-django-app | https://api.github.com/repos/gamer4life1/second-django-app | opened | CVE-2020-26137 (Medium) detected in urllib3-1.25.7-py2.py3-none-any.whl | security vulnerability | ## CVE-2020-26137 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>urllib3-1.25.7-py2.py3-none-any.whl</b></p></summary>
<p>HTTP library with thread-safe connection pooling, file post, and more.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/b4/40/a9837291310ee1ccc242ceb6ebfd9eb21539649f193a7c8c86ba15b98539/urllib3-1.25.7-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/b4/40/a9837291310ee1ccc242ceb6ebfd9eb21539649f193a7c8c86ba15b98539/urllib3-1.25.7-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: second-django-app/requirements.txt</p>
<p>Path to vulnerable library: second-django-app/requirements.txt</p>
<p>
Dependency Hierarchy:
- codacy_coverage-1.3.11-py2.py3-none-any.whl (Root Library)
- requests-2.22.0-py2.py3-none-any.whl
- :x: **urllib3-1.25.7-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gamer4life1/second-django-app/commit/f45267ce40e0fb5f8285588473e89c50febabe95">f45267ce40e0fb5f8285588473e89c50febabe95</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
<p>Publish Date: 2020-09-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26137>CVE-2020-26137</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137</a></p>
<p>Release Date: 2020-09-30</p>
<p>Fix Resolution: 1.25.9</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-26137 (Medium) detected in urllib3-1.25.7-py2.py3-none-any.whl - ## CVE-2020-26137 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>urllib3-1.25.7-py2.py3-none-any.whl</b></p></summary>
<p>HTTP library with thread-safe connection pooling, file post, and more.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/b4/40/a9837291310ee1ccc242ceb6ebfd9eb21539649f193a7c8c86ba15b98539/urllib3-1.25.7-py2.py3-none-any.whl">https://files.pythonhosted.org/packages/b4/40/a9837291310ee1ccc242ceb6ebfd9eb21539649f193a7c8c86ba15b98539/urllib3-1.25.7-py2.py3-none-any.whl</a></p>
<p>Path to dependency file: second-django-app/requirements.txt</p>
<p>Path to vulnerable library: second-django-app/requirements.txt</p>
<p>
Dependency Hierarchy:
- codacy_coverage-1.3.11-py2.py3-none-any.whl (Root Library)
- requests-2.22.0-py2.py3-none-any.whl
- :x: **urllib3-1.25.7-py2.py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gamer4life1/second-django-app/commit/f45267ce40e0fb5f8285588473e89c50febabe95">f45267ce40e0fb5f8285588473e89c50febabe95</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
<p>Publish Date: 2020-09-30
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26137>CVE-2020-26137</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137</a></p>
<p>Release Date: 2020-09-30</p>
<p>Fix Resolution: 1.25.9</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve medium detected in none any whl cve medium severity vulnerability vulnerable library none any whl http library with thread safe connection pooling file post and more library home page a href path to dependency file second django app requirements txt path to vulnerable library second django app requirements txt dependency hierarchy codacy coverage none any whl root library requests none any whl x none any whl vulnerable library found in head commit a href vulnerability details before allows crlf injection if the attacker controls the http request method as demonstrated by inserting cr and lf control characters in the first argument of putrequest note this is similar to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
412,625 | 27,865,501,538 | IssuesEvent | 2023-03-21 09:59:01 | kubeshop/tracetest | https://api.github.com/repos/kubeshop/tracetest | closed | [docs] Add Testkube example app + recipe | documentation good first issue | - [ ] Add a example app for using the Testkube integration with Tracetest.
- [x] Write a recipe with detailed instructions for creating and running the sample.
| 1.0 | [docs] Add Testkube example app + recipe - - [ ] Add a example app for using the Testkube integration with Tracetest.
- [x] Write a recipe with detailed instructions for creating and running the sample.
| non_test | add testkube example app recipe add a example app for using the testkube integration with tracetest write a recipe with detailed instructions for creating and running the sample | 0 |
158,088 | 13,725,927,610 | IssuesEvent | 2020-10-03 20:48:23 | yashvardhan-kukreja/nail-hacktoberfest | https://api.github.com/repos/yashvardhan-kukreja/nail-hacktoberfest | closed | add automated tests | documentation feature hacktoberfest testing | **Is your feature request related to a problem? Please describe.**
Currently, the code does not have any automated test to verify whether the code is behaving rightfully at runtime the way it is expected to do so.
**Describe the solution you'd like**
Implement automated tests using something like mocha/chai and those tests should run on `npm test` command. Add documentation around running tests too under README.md
**Describe alternatives you've considered**
NA
**Additional context**
NA | 1.0 | add automated tests - **Is your feature request related to a problem? Please describe.**
Currently, the code does not have any automated test to verify whether the code is behaving rightfully at runtime the way it is expected to do so.
**Describe the solution you'd like**
Implement automated tests using something like mocha/chai and those tests should run on `npm test` command. Add documentation around running tests too under README.md
**Describe alternatives you've considered**
NA
**Additional context**
NA | non_test | add automated tests is your feature request related to a problem please describe currently the code does not have any automated test to verify whether the code is behaving rightfully at runtime the way it is expected to do so describe the solution you d like implement automated tests using something like mocha chai and those tests should run on npm test command add documentation around running tests too under readme md describe alternatives you ve considered na additional context na | 0 |
46,227 | 19,009,231,694 | IssuesEvent | 2021-11-23 07:00:20 | Azure/azure-cli | https://api.github.com/repos/Azure/azure-cli | closed | WebApp:Azure webapp backup restore is not working in version 2.30.0 | Web Apps Service Attention customer-reported | **Describe the bug**
Running a restore of an App Service backup is returning an error:
Command
az webapp config backup restore --resource-group RGName --webapp-name AppServiceName --backup-name BackupID --container-url "URLofStorageaccountURL"
The command failed with an unexpected error. Here is the traceback:
'WebAppsOperations' object has no attribute 'restore'
Traceback (most recent call last):
File "/opt/az/lib/python3.6/site-packages/knack/cli.py", line 231, in invoke
cmd_result = self.invocation.execute(args)
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 657, in execute
raise ex
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 720, in _run_jobs_serially
results.append(self._run_job(expanded_arg, cmd_copy))
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 712, in _run_job
return cmd_copy.exception_handler(ex)
File "/opt/az/lib/python3.6/site-packages/azure/cli/command_modules/appservice/commands.py", line 37, in _ex_handler
raise ex
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 691, in _run_job
result = cmd_copy(params)
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 328, in __call__
return self.handler(*args, **kwargs)
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/command_operation.py", line 121, in handler
return op(**command_args)
File "/opt/az/lib/python3.6/site-packages/azure/cli/command_modules/appservice/custom.py", line 1861, in restore_backup
return client.web_apps.restore(resource_group_name, webapp_name, 0, restore_request)
AttributeError: 'WebAppsOperations' object has no attribute 'restore
This happens with this version:
az --version
azure-cli 2.30.0
core 2.30.0
telemetry 1.0.6
Extensions:
vm-repair 0.2.5
ai-examples 0.2.5
ssh 0.1.8
Python location '/opt/az/bin/python3'
Extensions directory '/home/ignacio/.azure/cliextensions'
Extensions system directory '/opt/az/lib/python3.6/site-packages/azure-cli-extensions'
**To Reproduce**
Run AzureCLI in the Portal (version 2.30.0):
az webapp config backup restore --resource-group RGName --webapp-name AppServiceName --backup-name BackupID --container-url "URLofStorageaccountURL"
**Expected behavior**
It should trigger a backup restore
**Environment summary**
App Service without any Networking features enabled
| 1.0 | WebApp:Azure webapp backup restore is not working in version 2.30.0 - **Describe the bug**
Running a restore of an App Service backup is returning an error:
Command
az webapp config backup restore --resource-group RGName --webapp-name AppServiceName --backup-name BackupID --container-url "URLofStorageaccountURL"
The command failed with an unexpected error. Here is the traceback:
'WebAppsOperations' object has no attribute 'restore'
Traceback (most recent call last):
File "/opt/az/lib/python3.6/site-packages/knack/cli.py", line 231, in invoke
cmd_result = self.invocation.execute(args)
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 657, in execute
raise ex
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 720, in _run_jobs_serially
results.append(self._run_job(expanded_arg, cmd_copy))
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 712, in _run_job
return cmd_copy.exception_handler(ex)
File "/opt/az/lib/python3.6/site-packages/azure/cli/command_modules/appservice/commands.py", line 37, in _ex_handler
raise ex
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 691, in _run_job
result = cmd_copy(params)
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/__init__.py", line 328, in __call__
return self.handler(*args, **kwargs)
File "/opt/az/lib/python3.6/site-packages/azure/cli/core/commands/command_operation.py", line 121, in handler
return op(**command_args)
File "/opt/az/lib/python3.6/site-packages/azure/cli/command_modules/appservice/custom.py", line 1861, in restore_backup
return client.web_apps.restore(resource_group_name, webapp_name, 0, restore_request)
AttributeError: 'WebAppsOperations' object has no attribute 'restore
This happens with this version:
az --version
azure-cli 2.30.0
core 2.30.0
telemetry 1.0.6
Extensions:
vm-repair 0.2.5
ai-examples 0.2.5
ssh 0.1.8
Python location '/opt/az/bin/python3'
Extensions directory '/home/ignacio/.azure/cliextensions'
Extensions system directory '/opt/az/lib/python3.6/site-packages/azure-cli-extensions'
**To Reproduce**
Run AzureCLI in the Portal (version 2.30.0):
az webapp config backup restore --resource-group RGName --webapp-name AppServiceName --backup-name BackupID --container-url "URLofStorageaccountURL"
**Expected behavior**
It should trigger a backup restore
**Environment summary**
App Service without any Networking features enabled
| non_test | webapp azure webapp backup restore is not working in version describe the bug running a restore of an app service backup is returning an error command az webapp config backup restore resource group rgname webapp name appservicename backup name backupid container url urlofstorageaccounturl the command failed with an unexpected error here is the traceback webappsoperations object has no attribute restore traceback most recent call last file opt az lib site packages knack cli py line in invoke cmd result self invocation execute args file opt az lib site packages azure cli core commands init py line in execute raise ex file opt az lib site packages azure cli core commands init py line in run jobs serially results append self run job expanded arg cmd copy file opt az lib site packages azure cli core commands init py line in run job return cmd copy exception handler ex file opt az lib site packages azure cli command modules appservice commands py line in ex handler raise ex file opt az lib site packages azure cli core commands init py line in run job result cmd copy params file opt az lib site packages azure cli core commands init py line in call return self handler args kwargs file opt az lib site packages azure cli core commands command operation py line in handler return op command args file opt az lib site packages azure cli command modules appservice custom py line in restore backup return client web apps restore resource group name webapp name restore request attributeerror webappsoperations object has no attribute restore this happens with this version az version azure cli core telemetry extensions vm repair ai examples ssh python location opt az bin extensions directory home ignacio azure cliextensions extensions system directory opt az lib site packages azure cli extensions to reproduce run azurecli in the portal version az webapp config backup restore resource group rgname webapp name appservicename backup name backupid container url urlofstorageaccounturl expected behavior it should trigger a backup restore environment summary app service without any networking features enabled | 0 |
46,592 | 13,175,138,297 | IssuesEvent | 2020-08-12 00:38:06 | gate5/react-16.0.0 | https://api.github.com/repos/gate5/react-16.0.0 | opened | CVE-2020-8175 (Medium) detected in jpeg-js-0.1.2.tgz | security vulnerability | ## CVE-2020-8175 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jpeg-js-0.1.2.tgz</b></p></summary>
<p>A pure javascript JPEG encoder and decoder</p>
<p>Library home page: <a href="https://registry.npmjs.org/jpeg-js/-/jpeg-js-0.1.2.tgz">https://registry.npmjs.org/jpeg-js/-/jpeg-js-0.1.2.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/react-16.0.0/scripts/bench/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/react-16.0.0/scripts/bench/node_modules/jpeg-js/package.json</p>
<p>
Dependency Hierarchy:
- lighthouse-2.9.4.tgz (Root Library)
- :x: **jpeg-js-0.1.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gate5/react-16.0.0/commit/dbfdcb7b069e0c12d45447c4e3f325a8d5fbc063">dbfdcb7b069e0c12d45447c4e3f325a8d5fbc063</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
<p>Publish Date: 2020-07-24
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8175>CVE-2020-8175</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8175</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 0.4.0</p>
</p>
</details>
<p></p>
| True | CVE-2020-8175 (Medium) detected in jpeg-js-0.1.2.tgz - ## CVE-2020-8175 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jpeg-js-0.1.2.tgz</b></p></summary>
<p>A pure javascript JPEG encoder and decoder</p>
<p>Library home page: <a href="https://registry.npmjs.org/jpeg-js/-/jpeg-js-0.1.2.tgz">https://registry.npmjs.org/jpeg-js/-/jpeg-js-0.1.2.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/react-16.0.0/scripts/bench/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/react-16.0.0/scripts/bench/node_modules/jpeg-js/package.json</p>
<p>
Dependency Hierarchy:
- lighthouse-2.9.4.tgz (Root Library)
- :x: **jpeg-js-0.1.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gate5/react-16.0.0/commit/dbfdcb7b069e0c12d45447c4e3f325a8d5fbc063">dbfdcb7b069e0c12d45447c4e3f325a8d5fbc063</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
<p>Publish Date: 2020-07-24
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8175>CVE-2020-8175</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8175">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8175</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: 0.4.0</p>
</p>
</details>
<p></p>
| non_test | cve medium detected in jpeg js tgz cve medium severity vulnerability vulnerable library jpeg js tgz a pure javascript jpeg encoder and decoder library home page a href path to dependency file tmp ws scm react scripts bench package json path to vulnerable library tmp ws scm react scripts bench node modules jpeg js package json dependency hierarchy lighthouse tgz root library x jpeg js tgz vulnerable library found in head commit a href vulnerability details uncontrolled resource consumption in jpeg js before may allow attacker to launch denial of service attacks using specially a crafted jpeg image publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution | 0 |
66,503 | 20,250,949,672 | IssuesEvent | 2022-02-14 17:49:21 | primefaces/primefaces | https://api.github.com/repos/primefaces/primefaces | closed | TreeTable: Swapping nodes with Collections.swap causes NPE | defect |
**Describe the defect**
If you swap items inside TreeNode#getChildren with Collections.swap, it causes an NPE with mojarra when the update="treeID" is triggered. With MyFaces NPE is only thrown with quarkus for some reason, with jetty it doesn't throw an NPE but it doesn't seem to work either. @FlipWarthog has noticed that this is because TreeNodeChildren#.set clears the parent node for some reason
```
java.lang.NullPointerException: Cannot invoke "org.primefaces.model.TreeNode.getRowKey()" because the return value of "org.primefaces.model.TreeNode.getParent()" is null
at org.primefaces.component.treetable.TreeTableRenderer.encodeNode(TreeTableRenderer.java:528)
at org.primefaces.component.treetable.TreeTableRenderer.encodeNodeChildren(TreeTableRenderer.java:849)
at org.primefaces.component.treetable.TreeTableRenderer.encodeNodeChildren(TreeTableRenderer.java:836)
at org.primefaces.component.treetable.TreeTableRenderer.encodeTbody(TreeTableRenderer.java:514)
at org.primefaces.component.treetable.TreeTableRenderer.encodeRegularMarkup(TreeTableRenderer.java:386)
at org.primefaces.component.treetable.TreeTableRenderer.encodeMarkup(TreeTableRenderer.java:262)
at org.primefaces.component.treetable.TreeTableRenderer.render(TreeTableRenderer.java:145)
at org.primefaces.component.treetable.TreeTableRenderer.encodeEnd(TreeTableRenderer.java:138)
at javax.faces.component.UIComponentBase.encodeEnd(UIComponentBase.java:649)
at javax.faces.component.UIComponentBase.encodeAll(UIComponentBase.java:530)
```
**Reproducer**
[primefaces-test.zip](https://github.com/primefaces/primefaces/files/7935585/primefaces-test.zip)
**Environment:**
- PF Version: _11.0_
- JSF + version: all profiles on the primefaces-test project
- Affected browsers: _ALL_
**To Reproduce**
Steps to reproduce the behavior:
1. Run with mojarra
2. Click on 'Move up' button on the last row
| 1.0 | TreeTable: Swapping nodes with Collections.swap causes NPE -
**Describe the defect**
If you swap items inside TreeNode#getChildren with Collections.swap, it causes an NPE with mojarra when the update="treeID" is triggered. With MyFaces NPE is only thrown with quarkus for some reason, with jetty it doesn't throw an NPE but it doesn't seem to work either. @FlipWarthog has noticed that this is because TreeNodeChildren#.set clears the parent node for some reason
```
java.lang.NullPointerException: Cannot invoke "org.primefaces.model.TreeNode.getRowKey()" because the return value of "org.primefaces.model.TreeNode.getParent()" is null
at org.primefaces.component.treetable.TreeTableRenderer.encodeNode(TreeTableRenderer.java:528)
at org.primefaces.component.treetable.TreeTableRenderer.encodeNodeChildren(TreeTableRenderer.java:849)
at org.primefaces.component.treetable.TreeTableRenderer.encodeNodeChildren(TreeTableRenderer.java:836)
at org.primefaces.component.treetable.TreeTableRenderer.encodeTbody(TreeTableRenderer.java:514)
at org.primefaces.component.treetable.TreeTableRenderer.encodeRegularMarkup(TreeTableRenderer.java:386)
at org.primefaces.component.treetable.TreeTableRenderer.encodeMarkup(TreeTableRenderer.java:262)
at org.primefaces.component.treetable.TreeTableRenderer.render(TreeTableRenderer.java:145)
at org.primefaces.component.treetable.TreeTableRenderer.encodeEnd(TreeTableRenderer.java:138)
at javax.faces.component.UIComponentBase.encodeEnd(UIComponentBase.java:649)
at javax.faces.component.UIComponentBase.encodeAll(UIComponentBase.java:530)
```
**Reproducer**
[primefaces-test.zip](https://github.com/primefaces/primefaces/files/7935585/primefaces-test.zip)
**Environment:**
- PF Version: _11.0_
- JSF + version: all profiles on the primefaces-test project
- Affected browsers: _ALL_
**To Reproduce**
Steps to reproduce the behavior:
1. Run with mojarra
2. Click on 'Move up' button on the last row
| non_test | treetable swapping nodes with collections swap causes npe describe the defect if you swap items inside treenode getchildren with collections swap it causes an npe with mojarra when the update treeid is triggered with myfaces npe is only thrown with quarkus for some reason with jetty it doesn t throw an npe but it doesn t seem to work either flipwarthog has noticed that this is because treenodechildren set clears the parent node for some reason java lang nullpointerexception cannot invoke org primefaces model treenode getrowkey because the return value of org primefaces model treenode getparent is null at org primefaces component treetable treetablerenderer encodenode treetablerenderer java at org primefaces component treetable treetablerenderer encodenodechildren treetablerenderer java at org primefaces component treetable treetablerenderer encodenodechildren treetablerenderer java at org primefaces component treetable treetablerenderer encodetbody treetablerenderer java at org primefaces component treetable treetablerenderer encoderegularmarkup treetablerenderer java at org primefaces component treetable treetablerenderer encodemarkup treetablerenderer java at org primefaces component treetable treetablerenderer render treetablerenderer java at org primefaces component treetable treetablerenderer encodeend treetablerenderer java at javax faces component uicomponentbase encodeend uicomponentbase java at javax faces component uicomponentbase encodeall uicomponentbase java reproducer environment pf version jsf version all profiles on the primefaces test project affected browsers all to reproduce steps to reproduce the behavior run with mojarra click on move up button on the last row | 0 |
69,739 | 13,337,344,280 | IssuesEvent | 2020-08-28 09:06:10 | nhn/tui.editor | https://api.github.com/repos/nhn/tui.editor | closed | Parsing is broken when the input content is wrapped in an opening code fence syntax | Bug Category: Code Block Mode: Markdown NHN P 2 TOAST Mark TOAST UI | ## Describe the bug
Parsing is broken in special cases when using a fenced code block syntax in the markdown editor. If an opening code fence and a closing code fence are sequentially entered or pasted as follows, parsing is correct.

But parsing is broken if you enter the content first and then an opening code fence and a closing code fence. In particular, there is a problem when parsing if there are blank lines between the contents of a code block.

## To Reproduce
Steps to reproduce the behavior:
1. Enter the text `foo` in markdown mode.
2. After `foo`, enter a newline twice, followed by `bar`.
3. Enter an opening code fence before `foo`.
4. Enter a closing code fence after the `bar`.
## Cause
When text is changed in the markdown editor, it is parsed in ToastMark. In the case of a fenced code block, **if there is no a closing code fence after an opening code fence, it is recognized as a code block until the end of the document**.
> Reference : https://spec.commonmark.org/0.29/#example-96
### Wrong Parsing

### Correct Parsing (TODO)

## Expected behavior

## Desktop (please complete the following information):
- OS: All
- Browser All
- Version 2.3.1 | 1.0 | Parsing is broken when the input content is wrapped in an opening code fence syntax - ## Describe the bug
Parsing is broken in special cases when using a fenced code block syntax in the markdown editor. If an opening code fence and a closing code fence are sequentially entered or pasted as follows, parsing is correct.

But parsing is broken if you enter the content first and then an opening code fence and a closing code fence. In particular, there is a problem when parsing if there are blank lines between the contents of a code block.

## To Reproduce
Steps to reproduce the behavior:
1. Enter the text `foo` in markdown mode.
2. After `foo`, enter a newline twice, followed by `bar`.
3. Enter an opening code fence before `foo`.
4. Enter a closing code fence after the `bar`.
## Cause
When text is changed in the markdown editor, it is parsed in ToastMark. In the case of a fenced code block, **if there is no a closing code fence after an opening code fence, it is recognized as a code block until the end of the document**.
> Reference : https://spec.commonmark.org/0.29/#example-96
### Wrong Parsing

### Correct Parsing (TODO)

## Expected behavior

## Desktop (please complete the following information):
- OS: All
- Browser All
- Version 2.3.1 | non_test | parsing is broken when the input content is wrapped in an opening code fence syntax describe the bug parsing is broken in special cases when using a fenced code block syntax in the markdown editor if an opening code fence and a closing code fence are sequentially entered or pasted as follows parsing is correct but parsing is broken if you enter the content first and then an opening code fence and a closing code fence in particular there is a problem when parsing if there are blank lines between the contents of a code block to reproduce steps to reproduce the behavior enter the text foo in markdown mode after foo enter a newline twice followed by bar enter an opening code fence before foo enter a closing code fence after the bar cause when text is changed in the markdown editor it is parsed in toastmark in the case of a fenced code block if there is no a closing code fence after an opening code fence it is recognized as a code block until the end of the document reference wrong parsing correct parsing todo expected behavior desktop please complete the following information os all browser all version | 0 |
440,338 | 12,697,983,951 | IssuesEvent | 2020-06-22 12:45:11 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | mobile.twitter.com - see bug description | browser-firefox-mobile engine-gecko ml-needsdiagnosis-false priority-critical | <!-- @browser: Firefox Mobile 79.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:79.0) Gecko/79.0 Firefox/79.0 -->
<!-- @reported_with: desktop-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/54463 -->
**URL**: https://mobile.twitter.com/
**Browser / Version**: Firefox Mobile 79.0
**Operating System**: Android
**Tested Another Browser**: Yes Chrome
**Problem type**: Something else
**Description**: Can't disable site notifications
**Steps to Reproduce**:
Firefox Mobile (Nightly) keeps showing me notifications for Twitter (some irrelevant interaction count thing) that keeps reappearing, and I want to get rid of it without having to erase all app data.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20200612094620</li><li>channel: nightly</li><li>hasTouchScreen: true</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | mobile.twitter.com - see bug description - <!-- @browser: Firefox Mobile 79.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:79.0) Gecko/79.0 Firefox/79.0 -->
<!-- @reported_with: desktop-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/54463 -->
**URL**: https://mobile.twitter.com/
**Browser / Version**: Firefox Mobile 79.0
**Operating System**: Android
**Tested Another Browser**: Yes Chrome
**Problem type**: Something else
**Description**: Can't disable site notifications
**Steps to Reproduce**:
Firefox Mobile (Nightly) keeps showing me notifications for Twitter (some irrelevant interaction count thing) that keeps reappearing, and I want to get rid of it without having to erase all app data.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20200612094620</li><li>channel: nightly</li><li>hasTouchScreen: true</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | non_test | mobile twitter com see bug description url browser version firefox mobile operating system android tested another browser yes chrome problem type something else description can t disable site notifications steps to reproduce firefox mobile nightly keeps showing me notifications for twitter some irrelevant interaction count thing that keeps reappearing and i want to get rid of it without having to erase all app data browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel nightly hastouchscreen true from with ❤️ | 0 |
467,841 | 13,456,579,511 | IssuesEvent | 2020-09-09 08:03:03 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.amazon.com - design is broken | browser-firefox-mobile engine-gecko ml-needsdiagnosis-false priority-critical | <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: mobile-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/57964 -->
**URL**: https://www.amazon.com/gp/aw/ls/?ref_=navm_em_lists_0_1_1_5
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android
**Tested Another Browser**: No
**Problem type**: Design is broken
**Description**: Items not fully visible
**Steps to Reproduce**:
Cannot scroll
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2020/9/87a33b23-033d-418e-afc8-097f10b56b02.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20200316183117</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2020/9/59bbb973-25e9-436f-af02-4643930e5389)
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | www.amazon.com - design is broken - <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: mobile-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/57964 -->
**URL**: https://www.amazon.com/gp/aw/ls/?ref_=navm_em_lists_0_1_1_5
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android
**Tested Another Browser**: No
**Problem type**: Design is broken
**Description**: Items not fully visible
**Steps to Reproduce**:
Cannot scroll
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2020/9/87a33b23-033d-418e-afc8-097f10b56b02.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20200316183117</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2020/9/59bbb973-25e9-436f-af02-4643930e5389)
_From [webcompat.com](https://webcompat.com/) with ❤️_ | non_test | design is broken url browser version firefox mobile operating system android tested another browser no problem type design is broken description items not fully visible steps to reproduce cannot scroll view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️ | 0 |
295,074 | 22,193,311,003 | IssuesEvent | 2022-06-07 02:58:14 | HappyFamilyCS/Web-Server-Application | https://api.github.com/repos/HappyFamilyCS/Web-Server-Application | closed | web and server | documentation | I will present WEB and SERVER
what is web and server
also I will present relationship between web and server
and history | 1.0 | web and server - I will present WEB and SERVER
what is web and server
also I will present relationship between web and server
and history | non_test | web and server i will present web and server what is web and server also i will present relationship between web and server and history | 0 |
310,535 | 26,721,999,001 | IssuesEvent | 2023-01-29 08:41:08 | opensergo/opensergo-java-sdk | https://api.github.com/repos/opensergo/opensergo-java-sdk | opened | Add unit tests for transport module (gRPC client and observer) | area/test | Add unit tests for the transport module (gRPC client and observer workflow). | 1.0 | Add unit tests for transport module (gRPC client and observer) - Add unit tests for the transport module (gRPC client and observer workflow). | test | add unit tests for transport module grpc client and observer add unit tests for the transport module grpc client and observer workflow | 1 |
165,873 | 26,246,391,505 | IssuesEvent | 2023-01-05 15:34:42 | mi6/ic-ui-kit | https://api.github.com/repos/mi6/ic-ui-kit | opened | Date picker | status: needs more information design type: feature request | ## Summary
Input component to allow users to select dates with multiple input methods.
Very high complexity
Match to existing component definition:
Text entry + calendar picker.
Label + helper text.
Required.
Disabled.
Interaction states.
Open to date . Open at pre-defined date.
Default and dense sizing.
Validation
Select time too. Granularity = milliseconds.
Selectable month and year dropdowns.
Limits (grey out past/future for example) Min and max dates.
## 💰 User value
Helps developers make clearer, more specific inputs for forms. Helps end users by simplifying interactions when inputting a date rather than using a standard text box/input.
## 📚 User Stories
If relevant, describe the high-level functionality as user stories.
*As an* ICDS user:
*I need*
*So that*
## 📝 Acceptance Criteria
If relevant, describe in full detail the different interactions and edge cases that the component or patterns needs to fulfil.
*Given*
*When*
*Then*
## ✏ Designs
If there's a Figma design file (or other mock-up), include it here.
## 🧾 Guidance
If there's written guidance or documentation, include it here.
| 1.0 | Date picker - ## Summary
Input component to allow users to select dates with multiple input methods.
Very high complexity
Match to existing component definition:
Text entry + calendar picker.
Label + helper text.
Required.
Disabled.
Interaction states.
Open to date . Open at pre-defined date.
Default and dense sizing.
Validation
Select time too. Granularity = milliseconds.
Selectable month and year dropdowns.
Limits (grey out past/future for example) Min and max dates.
## 💰 User value
Helps developers make clearer, more specific inputs for forms. Helps end users by simplifying interactions when inputting a date rather than using a standard text box/input.
## 📚 User Stories
If relevant, describe the high-level functionality as user stories.
*As an* ICDS user:
*I need*
*So that*
## 📝 Acceptance Criteria
If relevant, describe in full detail the different interactions and edge cases that the component or patterns needs to fulfil.
*Given*
*When*
*Then*
## ✏ Designs
If there's a Figma design file (or other mock-up), include it here.
## 🧾 Guidance
If there's written guidance or documentation, include it here.
| non_test | date picker summary input component to allow users to select dates with multiple input methods very high complexity match to existing component definition text entry calendar picker label helper text required disabled interaction states open to date open at pre defined date default and dense sizing validation select time too granularity milliseconds selectable month and year dropdowns limits grey out past future for example min and max dates 💰 user value helps developers make clearer more specific inputs for forms helps end users by simplifying interactions when inputting a date rather than using a standard text box input 📚 user stories if relevant describe the high level functionality as user stories as an icds user i need so that 📝 acceptance criteria if relevant describe in full detail the different interactions and edge cases that the component or patterns needs to fulfil given when then ✏ designs if there s a figma design file or other mock up include it here 🧾 guidance if there s written guidance or documentation include it here | 0 |
138,998 | 20,755,615,047 | IssuesEvent | 2022-03-15 11:54:55 | pnp/cli-microsoft365 | https://api.github.com/repos/pnp/cli-microsoft365 | reopened | Bug report: the spfx project upgrade command returns badly formatted text | by design | ### Description
When running the `spfx project upgrade` command, the returned text is not formatted in a helpful way.
**This probably has to do with the default output type being json. If I run the command with `--output text` the text is formatted fine.**
### Steps to reproduce
Run `spfx project upgrade` on a project that needs an upgrade.
### Expected results
The expected result would be helpfully formatted text, like:

### Actual results
The actual result is it will show the upgrade lines with all kinds of new line characters and escape characters:

### Diagnostics
_No response_
### CLI for Microsoft 365 version
4.4.0
### nodejs version
14.18,1
### Operating system (environment)
Windows, Linux
### Shell
PowerShell, bash
### cli doctor
_No response_
### Additional Info
| 1.0 | Bug report: the spfx project upgrade command returns badly formatted text - ### Description
When running the `spfx project upgrade` command, the returned text is not formatted in a helpful way.
**This probably has to do with the default output type being json. If I run the command with `--output text` the text is formatted fine.**
### Steps to reproduce
Run `spfx project upgrade` on a project that needs an upgrade.
### Expected results
The expected result would be helpfully formatted text, like:

### Actual results
The actual result is it will show the upgrade lines with all kinds of new line characters and escape characters:

### Diagnostics
_No response_
### CLI for Microsoft 365 version
4.4.0
### nodejs version
14.18,1
### Operating system (environment)
Windows, Linux
### Shell
PowerShell, bash
### cli doctor
_No response_
### Additional Info
| non_test | bug report the spfx project upgrade command returns badly formatted text description when running the spfx project upgrade command the returned text is not formatted in a helpful way this probably has to do with the default output type being json if i run the command with output text the text is formatted fine steps to reproduce run spfx project upgrade on a project that needs an upgrade expected results the expected result would be helpfully formatted text like actual results the actual result is it will show the upgrade lines with all kinds of new line characters and escape characters diagnostics no response cli for microsoft version nodejs version operating system environment windows linux shell powershell bash cli doctor no response additional info | 0 |
104,461 | 8,972,675,419 | IssuesEvent | 2019-01-29 18:55:46 | codercom/bugs | https://api.github.com/repos/codercom/bugs | opened | Python debugger receives wrong environment when building debugging commands | bug testing | Jan 29, 2019 at 12:48:05 PM
**Describe the bug**
A user on discord has reported that the Python extension/debugger appears to intercept the OS the browser is running on when building the command to run the debugger. As a result, if a user is on windows, the command is built using `cmd` which will fail as a result of the container running Ubuntu.
**Environment**
Production
**To Reproduce**
Steps to reproduce the behavior:
1. Open the IDE (on windows)
2. Install flask
3. Create a hello world file
4. Click the debugger in the activity bar
5. Click start
6. See that the command that is built is incorrect
**Expected behavior**
The command should be based on the Ubuntu container it is running on
**Screenshots**

**Desktop:**
Windows (I assume)
Chrome
| 1.0 | Python debugger receives wrong environment when building debugging commands - Jan 29, 2019 at 12:48:05 PM
**Describe the bug**
A user on discord has reported that the Python extension/debugger appears to intercept the OS the browser is running on when building the command to run the debugger. As a result, if a user is on windows, the command is built using `cmd` which will fail as a result of the container running Ubuntu.
**Environment**
Production
**To Reproduce**
Steps to reproduce the behavior:
1. Open the IDE (on windows)
2. Install flask
3. Create a hello world file
4. Click the debugger in the activity bar
5. Click start
6. See that the command that is built is incorrect
**Expected behavior**
The command should be based on the Ubuntu container it is running on
**Screenshots**

**Desktop:**
Windows (I assume)
Chrome
| test | python debugger receives wrong environment when building debugging commands jan at pm describe the bug a user on discord has reported that the python extension debugger appears to intercept the os the browser is running on when building the command to run the debugger as a result if a user is on windows the command is built using cmd which will fail as a result of the container running ubuntu environment production to reproduce steps to reproduce the behavior open the ide on windows install flask create a hello world file click the debugger in the activity bar click start see that the command that is built is incorrect expected behavior the command should be based on the ubuntu container it is running on screenshots desktop windows i assume chrome | 1 |
78,567 | 22,307,337,512 | IssuesEvent | 2022-06-13 14:05:14 | atlas-engineer/nyxt | https://api.github.com/repos/atlas-engineer/nyxt | opened | Extend ASDF class for Nyxt | build low | Currently we have quite some code in our ASD.
It's bad practice to write define globals in an .asd, because it may clash with other libraries.
But it's also bad practice to use a different package, because, well, we can do better: write an ASDF extension.
This would be useful to make it trivial for extension writers to embed our Git submodule logic in their extension. All they'd have to do is add
```lisp
:defsystem-depends-on :nyxt-asdf
```
to their definition. | 1.0 | Extend ASDF class for Nyxt - Currently we have quite some code in our ASD.
It's bad practice to write define globals in an .asd, because it may clash with other libraries.
But it's also bad practice to use a different package, because, well, we can do better: write an ASDF extension.
This would be useful to make it trivial for extension writers to embed our Git submodule logic in their extension. All they'd have to do is add
```lisp
:defsystem-depends-on :nyxt-asdf
```
to their definition. | non_test | extend asdf class for nyxt currently we have quite some code in our asd it s bad practice to write define globals in an asd because it may clash with other libraries but it s also bad practice to use a different package because well we can do better write an asdf extension this would be useful to make it trivial for extension writers to embed our git submodule logic in their extension all they d have to do is add lisp defsystem depends on nyxt asdf to their definition | 0 |
266,744 | 23,257,115,382 | IssuesEvent | 2022-08-04 10:14:08 | Open-Systems-Pharmacology/OSPSuite.ReportingEngine | https://api.github.com/repos/Open-Systems-Pharmacology/OSPSuite.ReportingEngine | closed | test-pop-pk-parameters: reduce test time | effort: low (hours) subsystem: unit testing type: task | In this testfile, 3 population workflows are executed.
The only difference between those 3 workflows is the workflow subtype (pediatric vs. parallel vs ratio)
```
workflowPediatric$activateTasks(c("simulate", "calculatePKParameters", "plotPKParameters"))
workflowParallel$activateTasks(c("simulate", "calculatePKParameters", "plotPKParameters"))
workflowRatio$activateTasks(c("simulate", "calculatePKParameters", "plotPKParameters"))
workflowPediatric$runWorkflow()
workflowParallel$runWorkflow()
workflowRatio$runWorkflow()
```
The tests in this testfile take almost 40% of all tests:

Can we improve the testing behaviour e.g. by doing the following:
* Create and execute the workflow for the 1st subtype (e.g.) "pediatric"
* Deactivate the tasks "simulate" and "calculatePKParameters"
* Change the workflow subtype to "parallelComparison", change the output folder of the "plotPKParameters" task and execute
```
workflow$workflowType = "parallelComparison"
workflow$plotPKParameters$outputFolder = "PKAnalysis_parallelComparison"
workflow$runWorkflow()
```
* Change the workflow subtype to "ratioComparison", change the output folder of the "plotPKParameters" task and execute
Then population simulation calculation and pk parameters calculation will be executed only once | 1.0 | test-pop-pk-parameters: reduce test time - In this testfile, 3 population workflows are executed.
The only difference between those 3 workflows is the workflow subtype (pediatric vs. parallel vs ratio)
```
workflowPediatric$activateTasks(c("simulate", "calculatePKParameters", "plotPKParameters"))
workflowParallel$activateTasks(c("simulate", "calculatePKParameters", "plotPKParameters"))
workflowRatio$activateTasks(c("simulate", "calculatePKParameters", "plotPKParameters"))
workflowPediatric$runWorkflow()
workflowParallel$runWorkflow()
workflowRatio$runWorkflow()
```
The tests in this testfile take almost 40% of all tests:

Can we improve the testing behaviour e.g. by doing the following:
* Create and execute the workflow for the 1st subtype (e.g.) "pediatric"
* Deactivate the tasks "simulate" and "calculatePKParameters"
* Change the workflow subtype to "parallelComparison", change the output folder of the "plotPKParameters" task and execute
```
workflow$workflowType = "parallelComparison"
workflow$plotPKParameters$outputFolder = "PKAnalysis_parallelComparison"
workflow$runWorkflow()
```
* Change the workflow subtype to "ratioComparison", change the output folder of the "plotPKParameters" task and execute
Then population simulation calculation and pk parameters calculation will be executed only once | test | test pop pk parameters reduce test time in this testfile population workflows are executed the only difference between those workflows is the workflow subtype pediatric vs parallel vs ratio workflowpediatric activatetasks c simulate calculatepkparameters plotpkparameters workflowparallel activatetasks c simulate calculatepkparameters plotpkparameters workflowratio activatetasks c simulate calculatepkparameters plotpkparameters workflowpediatric runworkflow workflowparallel runworkflow workflowratio runworkflow the tests in this testfile take almost of all tests can we improve the testing behaviour e g by doing the following create and execute the workflow for the subtype e g pediatric deactivate the tasks simulate and calculatepkparameters change the workflow subtype to parallelcomparison change the output folder of the plotpkparameters task and execute workflow workflowtype parallelcomparison workflow plotpkparameters outputfolder pkanalysis parallelcomparison workflow runworkflow change the workflow subtype to ratiocomparison change the output folder of the plotpkparameters task and execute then population simulation calculation and pk parameters calculation will be executed only once | 1 |
173,428 | 6,524,880,612 | IssuesEvent | 2017-08-29 14:10:52 | McStasMcXtrace/iFit | https://api.github.com/repos/McStasMcXtrace/iFit | closed | Models: Phonons: ifit.py: return the number of remaining displacement instead of T/F | easy enhancement priority | Currently, only a flag T/F is returned from the ifit iterations.
Returning the number of remaining steps would allow a better estimate of the remaining time. | 1.0 | Models: Phonons: ifit.py: return the number of remaining displacement instead of T/F - Currently, only a flag T/F is returned from the ifit iterations.
Returning the number of remaining steps would allow a better estimate of the remaining time. | non_test | models phonons ifit py return the number of remaining displacement instead of t f currently only a flag t f is returned from the ifit iterations returning the number of remaining steps would allow a better estimate of the remaining time | 0 |
90,966 | 8,288,029,946 | IssuesEvent | 2018-09-19 10:37:52 | humera987/HumTestData | https://api.github.com/repos/humera987/HumTestData | opened | testing_hums : api_v1_dashboard_count-bytes_get_query_param_sql_injection_oracle_pageSize | testing_hums | Project : testing_hums
Job : UAT
Env : UAT
Region : FXLabs/US_WEST_1
Result : fail
Status Code : 200
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Wed, 19 Sep 2018 10:37:51 GMT]}
Endpoint : http://13.56.210.25/api/v1/dashboard/count-bytes?pageSize=
Request :
Response :
{
"requestId" : "None",
"requestTime" : "2018-09-19T10:37:52.388+0000",
"errors" : false,
"messages" : [ ],
"data" : 25519645,
"totalPages" : 0,
"totalElements" : 0
}
Logs :
Assertion [@StatusCode != 200] resolved-to [200 != 200] result [Failed]
--- FX Bot --- | 1.0 | testing_hums : api_v1_dashboard_count-bytes_get_query_param_sql_injection_oracle_pageSize - Project : testing_hums
Job : UAT
Env : UAT
Region : FXLabs/US_WEST_1
Result : fail
Status Code : 200
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Wed, 19 Sep 2018 10:37:51 GMT]}
Endpoint : http://13.56.210.25/api/v1/dashboard/count-bytes?pageSize=
Request :
Response :
{
"requestId" : "None",
"requestTime" : "2018-09-19T10:37:52.388+0000",
"errors" : false,
"messages" : [ ],
"data" : 25519645,
"totalPages" : 0,
"totalElements" : 0
}
Logs :
Assertion [@StatusCode != 200] resolved-to [200 != 200] result [Failed]
--- FX Bot --- | test | testing hums api dashboard count bytes get query param sql injection oracle pagesize project testing hums job uat env uat region fxlabs us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options content type transfer encoding date endpoint request response requestid none requesttime errors false messages data totalpages totalelements logs assertion resolved to result fx bot | 1 |
346,201 | 24,886,622,470 | IssuesEvent | 2022-10-28 08:20:40 | sjoann/ped | https://api.github.com/repos/sjoann/ped | opened | Missing feature in UG | severity.Low type.DocumentationBug | 
I was able to use this find command. However, this feature was not written in the UG. Also, there seem to be no difference between this find command and get command.
<!--session: 1666943991997-d0271cf5-6577-4789-80d7-2bb3024d8faf-->
<!--Version: Web v3.4.4--> | 1.0 | Missing feature in UG - 
I was able to use this find command. However, this feature was not written in the UG. Also, there seem to be no difference between this find command and get command.
<!--session: 1666943991997-d0271cf5-6577-4789-80d7-2bb3024d8faf-->
<!--Version: Web v3.4.4--> | non_test | missing feature in ug i was able to use this find command however this feature was not written in the ug also there seem to be no difference between this find command and get command | 0 |
191,762 | 14,596,159,248 | IssuesEvent | 2020-12-20 14:43:17 | Plant-for-the-Planet-org/treecounter-app | https://api.github.com/repos/Plant-for-the-Planet-org/treecounter-app | closed | TypeError in node_modules/reactotron-react-native/node_modules/query-string/index.js:166 - undefined is not an object (evaluating 't.selectedProject.paymentSetup.gateways[L].stripe.stripePublishableKey') | 1.49.43 bug bugsnag testflight | ## Error in Plant-for-the-Planet App
**TypeError** in **node_modules/reactotron-react-native/node_modules/query-string/index.js:166**
undefined is not an object (evaluating 't.selectedProject.paymentSetup.gateways[L].stripe.stripePublishableKey')
[View on Bugsnag](https://app.bugsnag.com/plant-for-the-planet/plant-for-the-planet-app/errors/5eedce4a7b22c3001782c081?event_id=5eedce4a005b7dc303540000&i=gh&m=ci)
## Stacktrace
node_modules/reactotron-react-native/node_modules/query-string/index.js:166 - getHash
[View full stacktrace](https://app.bugsnag.com/plant-for-the-planet/plant-for-the-planet-app/errors/5eedce4a7b22c3001782c081?event_id=5eedce4a005b7dc303540000&i=gh&m=ci)
*Created automatically via Bugsnag* | 1.0 | TypeError in node_modules/reactotron-react-native/node_modules/query-string/index.js:166 - undefined is not an object (evaluating 't.selectedProject.paymentSetup.gateways[L].stripe.stripePublishableKey') - ## Error in Plant-for-the-Planet App
**TypeError** in **node_modules/reactotron-react-native/node_modules/query-string/index.js:166**
undefined is not an object (evaluating 't.selectedProject.paymentSetup.gateways[L].stripe.stripePublishableKey')
[View on Bugsnag](https://app.bugsnag.com/plant-for-the-planet/plant-for-the-planet-app/errors/5eedce4a7b22c3001782c081?event_id=5eedce4a005b7dc303540000&i=gh&m=ci)
## Stacktrace
node_modules/reactotron-react-native/node_modules/query-string/index.js:166 - getHash
[View full stacktrace](https://app.bugsnag.com/plant-for-the-planet/plant-for-the-planet-app/errors/5eedce4a7b22c3001782c081?event_id=5eedce4a005b7dc303540000&i=gh&m=ci)
*Created automatically via Bugsnag* | test | typeerror in node modules reactotron react native node modules query string index js undefined is not an object evaluating t selectedproject paymentsetup gateways stripe stripepublishablekey error in plant for the planet app typeerror in node modules reactotron react native node modules query string index js undefined is not an object evaluating t selectedproject paymentsetup gateways stripe stripepublishablekey stacktrace node modules reactotron react native node modules query string index js gethash created automatically via bugsnag | 1 |
262,470 | 27,951,114,598 | IssuesEvent | 2023-03-24 08:57:02 | Satheesh575555/linux-4.1.15_CVE-2022-45934 | https://api.github.com/repos/Satheesh575555/linux-4.1.15_CVE-2022-45934 | opened | CVE-2015-8812 (High) detected in linuxlinux-4.6 | Mend: dependency security vulnerability | ## CVE-2015-8812 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/linux-4.1.15_CVE-2022-45934/commit/7c0b143b43394df131d83e9aecb3c5518edc127a">7c0b143b43394df131d83e9aecb3c5518edc127a</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/infiniband/hw/cxgb3/iwch_cm.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/infiniband/hw/cxgb3/iwch_cm.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
<p>Publish Date: 2016-04-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-8812>CVE-2015-8812</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">https://nvd.nist.gov/vuln/detail/CVE-2015-8812</a></p>
<p>Release Date: 2016-04-27</p>
<p>Fix Resolution: 4.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2015-8812 (High) detected in linuxlinux-4.6 - ## CVE-2015-8812 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/linux-4.1.15_CVE-2022-45934/commit/7c0b143b43394df131d83e9aecb3c5518edc127a">7c0b143b43394df131d83e9aecb3c5518edc127a</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/infiniband/hw/cxgb3/iwch_cm.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/infiniband/hw/cxgb3/iwch_cm.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
<p>Publish Date: 2016-04-27
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2015-8812>CVE-2015-8812</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">https://nvd.nist.gov/vuln/detail/CVE-2015-8812</a></p>
<p>Release Date: 2016-04-27</p>
<p>Fix Resolution: 4.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_test | cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch main vulnerable source files drivers infiniband hw iwch cm c drivers infiniband hw iwch cm c vulnerability details drivers infiniband hw iwch cm c in the linux kernel before does not properly identify error conditions which allows remote attackers to execute arbitrary code or cause a denial of service use after free via crafted packets publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
242,858 | 20,268,079,212 | IssuesEvent | 2022-02-15 13:57:00 | nanocurrency/nano-node | https://api.github.com/repos/nanocurrency/nano-node | opened | telemetry.remove_peer_different_genesis_udp fails occasionally in unit tests | unit test | ```
[ RUN ] telemetry.remove_peer_different_genesis_udp
/workspace/nano/core_test/telemetry.cpp:671: Failure
Expected equality of these values:
1
node0->network.excluded_peers.peers.get<nano::peer_exclusion::tag_endpoint> ().count (node1->network.endpoint ().address ())
Which is: 0
[ FAILED ] telemetry.remove_peer_different_genesis_udp (3354 ms)
```
https://github.com/nanocurrency/nano-node/runs/5193293048?check_suite_focus=true#step:5:1434
This is long term failure, I remember seeing this occasionally every now and then.
It occurs infrequently. | 1.0 | telemetry.remove_peer_different_genesis_udp fails occasionally in unit tests - ```
[ RUN ] telemetry.remove_peer_different_genesis_udp
/workspace/nano/core_test/telemetry.cpp:671: Failure
Expected equality of these values:
1
node0->network.excluded_peers.peers.get<nano::peer_exclusion::tag_endpoint> ().count (node1->network.endpoint ().address ())
Which is: 0
[ FAILED ] telemetry.remove_peer_different_genesis_udp (3354 ms)
```
https://github.com/nanocurrency/nano-node/runs/5193293048?check_suite_focus=true#step:5:1434
This is long term failure, I remember seeing this occasionally every now and then.
It occurs infrequently. | test | telemetry remove peer different genesis udp fails occasionally in unit tests telemetry remove peer different genesis udp workspace nano core test telemetry cpp failure expected equality of these values network excluded peers peers get count network endpoint address which is telemetry remove peer different genesis udp ms this is long term failure i remember seeing this occasionally every now and then it occurs infrequently | 1 |
71,679 | 3,367,399,344 | IssuesEvent | 2015-11-22 04:52:55 | FLEXIcontent/flexicontent-cck | https://api.github.com/repos/FLEXIcontent/flexicontent-cck | closed | Image field existing file dropdown select is duplicated when "Toggle All Thubmnails" is clicked multiple times | bug Priority Low | Hello,
I'm using FLEXIcontent 3.0.9-rc4.
When clicking 3 times in "toggle all tumbnails" a second dropdown appears.
 | 1.0 | Image field existing file dropdown select is duplicated when "Toggle All Thubmnails" is clicked multiple times - Hello,
I'm using FLEXIcontent 3.0.9-rc4.
When clicking 3 times in "toggle all tumbnails" a second dropdown appears.
 | non_test | image field existing file dropdown select is duplicated when toggle all thubmnails is clicked multiple times hello i m using flexicontent when clicking times in toggle all tumbnails a second dropdown appears | 0 |
23,096 | 4,876,438,540 | IssuesEvent | 2016-11-16 12:52:57 | zammad/zammad | https://api.github.com/repos/zammad/zammad | closed | apache configuration | documentation | Hallo,
I'm trying to run zammad with apache instead of nginx but I have no idea how to convert the nginx configuration into an apache configuration. Maybe somebody did this already? I searched a lot in the internet but nothing worked. I only get a screen with Loading... and the rest files the browser wants to load has an 404 Error.
At the moment my configuration file looks like but there is missing a lot.
`<VirtualHost *:80>
ServerName raspberrypi
DocumentRoot /opt/zammad/public
ProxyRequests Off
ProxyPass / http://localhost:3000/
ProxyPassReverse / http://localhost:3000/
<Proxy http://localhost:3000/>
Order deny,allow
Allow from all
</Proxy>
</VirtualHost>`
Greets,
chris | 1.0 | apache configuration - Hallo,
I'm trying to run zammad with apache instead of nginx but I have no idea how to convert the nginx configuration into an apache configuration. Maybe somebody did this already? I searched a lot in the internet but nothing worked. I only get a screen with Loading... and the rest files the browser wants to load has an 404 Error.
At the moment my configuration file looks like but there is missing a lot.
`<VirtualHost *:80>
ServerName raspberrypi
DocumentRoot /opt/zammad/public
ProxyRequests Off
ProxyPass / http://localhost:3000/
ProxyPassReverse / http://localhost:3000/
<Proxy http://localhost:3000/>
Order deny,allow
Allow from all
</Proxy>
</VirtualHost>`
Greets,
chris | non_test | apache configuration hallo i m trying to run zammad with apache instead of nginx but i have no idea how to convert the nginx configuration into an apache configuration maybe somebody did this already i searched a lot in the internet but nothing worked i only get a screen with loading and the rest files the browser wants to load has an error at the moment my configuration file looks like but there is missing a lot servername raspberrypi documentroot opt zammad public proxyrequests off proxypass proxypassreverse proxy order deny allow allow from all greets chris | 0 |
671,321 | 22,755,935,922 | IssuesEvent | 2022-07-07 16:32:42 | awslabs/seed-farmer | https://api.github.com/repos/awslabs/seed-farmer | closed | [BUG] Initialization for project points to old gitlab | bug High Priority |
**Describe the bug**
The default repo for the init of the CLI (template) is pointing at gitlab, not this repo
| 1.0 | [BUG] Initialization for project points to old gitlab -
**Describe the bug**
The default repo for the init of the CLI (template) is pointing at gitlab, not this repo
| non_test | initialization for project points to old gitlab describe the bug the default repo for the init of the cli template is pointing at gitlab not this repo | 0 |
605,982 | 18,752,925,074 | IssuesEvent | 2021-11-05 06:21:31 | FlexibleSUSY/FlexibleSUSY | https://api.github.com/repos/FlexibleSUSY/FlexibleSUSY | closed | configure check of FeynArts/FormCalc version | enhancement priority low someday | `configure` should make sure that if version of FC or FA changes, files in `Output/MODEL/EWSB/{FeynArts FormCalc NPointFunctions}` should be removed. | 1.0 | configure check of FeynArts/FormCalc version - `configure` should make sure that if version of FC or FA changes, files in `Output/MODEL/EWSB/{FeynArts FormCalc NPointFunctions}` should be removed. | non_test | configure check of feynarts formcalc version configure should make sure that if version of fc or fa changes files in output model ewsb feynarts formcalc npointfunctions should be removed | 0 |
596,937 | 18,151,053,851 | IssuesEvent | 2021-09-26 09:14:39 | AY2122S1-CS2103-F09-3/tp | https://api.github.com/repos/AY2122S1-CS2103-F09-3/tp | closed | Update README | priority.High type.docs | - Add a UI mockup of your intended final product.
- Update the link of the GitHub Actions build status badge
- Update all contents to match your own project. | 1.0 | Update README - - Add a UI mockup of your intended final product.
- Update the link of the GitHub Actions build status badge
- Update all contents to match your own project. | non_test | update readme add a ui mockup of your intended final product update the link of the github actions build status badge update all contents to match your own project | 0 |
185,969 | 14,394,532,905 | IssuesEvent | 2020-12-03 01:31:00 | github-vet/rangeclosure-findings | https://api.github.com/repos/github-vet/rangeclosure-findings | closed | deferpanic/gorump: 1.7/go/src/net/interface_test.go; 17 LoC | fresh small test |
Found a possible issue in [deferpanic/gorump](https://www.github.com/deferpanic/gorump) at [1.7/go/src/net/interface_test.go](https://github.com/deferpanic/gorump/blob/313ecc2ef408fbfd85123cdfcf448042787b53ea/1.7/go/src/net/interface_test.go#L56-L72)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> function call which takes a reference to ifi at line 61 may start a goroutine
[Click here to see the code in its original context.](https://github.com/deferpanic/gorump/blob/313ecc2ef408fbfd85123cdfcf448042787b53ea/1.7/go/src/net/interface_test.go#L56-L72)
<details>
<summary>Click here to show the 17 line(s) of Go which triggered the analyzer.</summary>
```go
for _, ifi := range ift {
ifxi, err := InterfaceByIndex(ifi.Index)
if err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(ifxi, &ifi) {
t.Errorf("got %v; want %v", ifxi, ifi)
}
ifxn, err := InterfaceByName(ifi.Name)
if err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(ifxn, &ifi) {
t.Errorf("got %v; want %v", ifxn, ifi)
}
t.Logf("%s: flags=%v index=%d mtu=%d hwaddr=%v", ifi.Name, ifi.Flags, ifi.Index, ifi.MTU, ifi.HardwareAddr)
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: 313ecc2ef408fbfd85123cdfcf448042787b53ea
| 1.0 | deferpanic/gorump: 1.7/go/src/net/interface_test.go; 17 LoC -
Found a possible issue in [deferpanic/gorump](https://www.github.com/deferpanic/gorump) at [1.7/go/src/net/interface_test.go](https://github.com/deferpanic/gorump/blob/313ecc2ef408fbfd85123cdfcf448042787b53ea/1.7/go/src/net/interface_test.go#L56-L72)
Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first
issue it finds, so please do not limit your consideration to the contents of the below message.
> function call which takes a reference to ifi at line 61 may start a goroutine
[Click here to see the code in its original context.](https://github.com/deferpanic/gorump/blob/313ecc2ef408fbfd85123cdfcf448042787b53ea/1.7/go/src/net/interface_test.go#L56-L72)
<details>
<summary>Click here to show the 17 line(s) of Go which triggered the analyzer.</summary>
```go
for _, ifi := range ift {
ifxi, err := InterfaceByIndex(ifi.Index)
if err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(ifxi, &ifi) {
t.Errorf("got %v; want %v", ifxi, ifi)
}
ifxn, err := InterfaceByName(ifi.Name)
if err != nil {
t.Fatal(err)
}
if !reflect.DeepEqual(ifxn, &ifi) {
t.Errorf("got %v; want %v", ifxn, ifi)
}
t.Logf("%s: flags=%v index=%d mtu=%d hwaddr=%v", ifi.Name, ifi.Flags, ifi.Index, ifi.MTU, ifi.HardwareAddr)
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: 313ecc2ef408fbfd85123cdfcf448042787b53ea
| test | deferpanic gorump go src net interface test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message function call which takes a reference to ifi at line may start a goroutine click here to show the line s of go which triggered the analyzer go for ifi range ift ifxi err interfacebyindex ifi index if err nil t fatal err if reflect deepequal ifxi ifi t errorf got v want v ifxi ifi ifxn err interfacebyname ifi name if err nil t fatal err if reflect deepequal ifxn ifi t errorf got v want v ifxn ifi t logf s flags v index d mtu d hwaddr v ifi name ifi flags ifi index ifi mtu ifi hardwareaddr leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id | 1 |
169,327 | 13,134,080,523 | IssuesEvent | 2020-08-06 22:23:51 | kubeflow/kfp-tekton | https://api.github.com/repos/kubeflow/kfp-tekton | closed | Replace the image of kubeclient with the official image from Tekton | area/front-end area/sdk area/testing kind/feature | /kind feature
/area sdk
/area testing
Description:
Part of #230 - SDK TODO for new contributors
Per [_op_to_template#104](https://github.com/kubeflow/kfp-tekton/blob/master/sdk/python/kfp_tekton/compiler/_op_to_template.py#L104), the image of kubeclient referenced should be replaced with an official image from Tekton. Check if a comparable image is available and swap the reference to the official image.
**Additional information:**
[Miscellaneous information that will assist in solving the issue.]
| 1.0 | Replace the image of kubeclient with the official image from Tekton - /kind feature
/area sdk
/area testing
Description:
Part of #230 - SDK TODO for new contributors
Per [_op_to_template#104](https://github.com/kubeflow/kfp-tekton/blob/master/sdk/python/kfp_tekton/compiler/_op_to_template.py#L104), the image of kubeclient referenced should be replaced with an official image from Tekton. Check if a comparable image is available and swap the reference to the official image.
**Additional information:**
[Miscellaneous information that will assist in solving the issue.]
| test | replace the image of kubeclient with the official image from tekton kind feature area sdk area testing description part of sdk todo for new contributors per the image of kubeclient referenced should be replaced with an official image from tekton check if a comparable image is available and swap the reference to the official image additional information | 1 |
180,804 | 14,813,673,114 | IssuesEvent | 2021-01-14 02:41:12 | hajimehoshi/ebiten | https://api.github.com/repos/hajimehoshi/ebiten | closed | Solus need additional dependency | documentation | Hi,
I started installing ebiten to Solus Distro to try out game development. I'm getting error regarding glfw when trying to install.
# github.com/go-gl/glfw/v3.3/glfw
/usr/bin/ld: cannot find -lXxf86vm
collect2: error: ld returned 1 exit status
I saw another issue similar to this with Ubuntu and fixes it with installing another dependency 'libxxf86vm-dev'.
For Solus the equivalent dependency is '**libxxf86vm-devel**'
It would be helpful to add it ebiten documentation
Thank you | 1.0 | Solus need additional dependency - Hi,
I started installing ebiten to Solus Distro to try out game development. I'm getting error regarding glfw when trying to install.
# github.com/go-gl/glfw/v3.3/glfw
/usr/bin/ld: cannot find -lXxf86vm
collect2: error: ld returned 1 exit status
I saw another issue similar to this with Ubuntu and fixes it with installing another dependency 'libxxf86vm-dev'.
For Solus the equivalent dependency is '**libxxf86vm-devel**'
It would be helpful to add it ebiten documentation
Thank you | non_test | solus need additional dependency hi i started installing ebiten to solus distro to try out game development i m getting error regarding glfw when trying to install github com go gl glfw glfw usr bin ld cannot find error ld returned exit status i saw another issue similar to this with ubuntu and fixes it with installing another dependency dev for solus the equivalent dependency is devel it would be helpful to add it ebiten documentation thank you | 0 |
77,629 | 14,892,076,859 | IssuesEvent | 2021-01-21 01:58:37 | markedjs/marked | https://api.github.com/repos/markedjs/marked | closed | Codes in lists appear broken | L2 - annoying category: code blocks category: lists | **Describe the bug**
Code snippets ("```") in lists appear broken.
**To Reproduce**
Steps to reproduce the behavior:
1. [Marked Demo](https://marked.js.org/demo/?text=*%20a%0A%60%60%60gdscript%0Ab%0A%0A%23%20comment%0Ac%0A%60%60%60%0A&options=%7B%0A%20%22baseUrl%22%3A%20null%2C%0A%20%22breaks%22%3A%20false%2C%0A%20%22gfm%22%3A%20true%2C%0A%20%22headerIds%22%3A%20true%2C%0A%20%22headerPrefix%22%3A%20%22%22%2C%0A%20%22highlight%22%3A%20null%2C%0A%20%22langPrefix%22%3A%20%22language-%22%2C%0A%20%22mangle%22%3A%20true%2C%0A%20%22pedantic%22%3A%20false%2C%0A%20%22sanitize%22%3A%20false%2C%0A%20%22sanitizer%22%3A%20null%2C%0A%20%22silent%22%3A%20false%2C%0A%20%22smartLists%22%3A%20false%2C%0A%20%22smartypants%22%3A%20false%2C%0A%20%22tokenizer%22%3A%20null%2C%0A%20%22walkTokens%22%3A%20null%2C%0A%20%22xhtml%22%3A%20false%0A%7D&version=master)
2. [CommonMark Demo](https://spec.commonmark.org/dingus/?text=*%20a%0A%60%60%60gdscript%0Ab%0A%0A%23%20comment%0Ac%0A%60%60%60%0A)
**Expected behavior**
Proper display of code elements inside lists, consistent with Common Mark's behavior. | 1.0 | Codes in lists appear broken - **Describe the bug**
Code snippets ("```") in lists appear broken.
**To Reproduce**
Steps to reproduce the behavior:
1. [Marked Demo](https://marked.js.org/demo/?text=*%20a%0A%60%60%60gdscript%0Ab%0A%0A%23%20comment%0Ac%0A%60%60%60%0A&options=%7B%0A%20%22baseUrl%22%3A%20null%2C%0A%20%22breaks%22%3A%20false%2C%0A%20%22gfm%22%3A%20true%2C%0A%20%22headerIds%22%3A%20true%2C%0A%20%22headerPrefix%22%3A%20%22%22%2C%0A%20%22highlight%22%3A%20null%2C%0A%20%22langPrefix%22%3A%20%22language-%22%2C%0A%20%22mangle%22%3A%20true%2C%0A%20%22pedantic%22%3A%20false%2C%0A%20%22sanitize%22%3A%20false%2C%0A%20%22sanitizer%22%3A%20null%2C%0A%20%22silent%22%3A%20false%2C%0A%20%22smartLists%22%3A%20false%2C%0A%20%22smartypants%22%3A%20false%2C%0A%20%22tokenizer%22%3A%20null%2C%0A%20%22walkTokens%22%3A%20null%2C%0A%20%22xhtml%22%3A%20false%0A%7D&version=master)
2. [CommonMark Demo](https://spec.commonmark.org/dingus/?text=*%20a%0A%60%60%60gdscript%0Ab%0A%0A%23%20comment%0Ac%0A%60%60%60%0A)
**Expected behavior**
Proper display of code elements inside lists, consistent with Common Mark's behavior. | non_test | codes in lists appear broken describe the bug code snippets in lists appear broken to reproduce steps to reproduce the behavior expected behavior proper display of code elements inside lists consistent with common mark s behavior | 0 |
311,288 | 26,780,312,207 | IssuesEvent | 2023-01-31 20:34:17 | elastic/elasticsearch | https://api.github.com/repos/elastic/elasticsearch | closed | [CI] XPackRestIT test {p0=data_streams/10_data_stream_resolvability/Verify data stream resolvability in migrations API} failing | >test-failure :Data Management/Data streams Team:Data Management | **Build scan:**
https://gradle-enterprise.elastic.co/s/wtc3um24jfrpg/tests/:x-pack:plugin:yamlRestTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=data_streams%2F10_data_stream_resolvability%2FVerify%20data%20stream%20resolvability%20in%20migrations%20API%7D
**Reproduction line:**
```
./gradlew ':x-pack:plugin:yamlRestTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=data_streams/10_data_stream_resolvability/Verify data stream resolvability in migrations API}" -Dtests.seed=ACEA8E48DEDB71B3 -Dtests.locale=pt-PT -Dtests.timezone=Africa/Harare -Druntime.java=17
```
**Applicable branches:**
main
**Reproduces locally?:**
No
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Ddata_streams/10_data_stream_resolvability/Verify%20data%20stream%20resolvability%20in%20migrations%20API%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [data_streams/10_data_stream_resolvability:347]: field [node_settings] doesn't have length [0]
Expected: <0>
but: was <1>
at __randomizedtesting.SeedInfo.seed([ACEA8E48DEDB71B3:24BEB19270271C4B]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:520)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:480)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.lang.AssertionError: field [node_settings] doesn't have length [0]
Expected: <0>
but: was <1>
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.elasticsearch.test.rest.yaml.section.LengthAssertion.doAssert(LengthAssertion.java:65)
at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:500)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:480)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
at java.lang.Thread.run(Thread.java:833)
``` | 1.0 | [CI] XPackRestIT test {p0=data_streams/10_data_stream_resolvability/Verify data stream resolvability in migrations API} failing - **Build scan:**
https://gradle-enterprise.elastic.co/s/wtc3um24jfrpg/tests/:x-pack:plugin:yamlRestTest/org.elasticsearch.xpack.test.rest.XPackRestIT/test%20%7Bp0=data_streams%2F10_data_stream_resolvability%2FVerify%20data%20stream%20resolvability%20in%20migrations%20API%7D
**Reproduction line:**
```
./gradlew ':x-pack:plugin:yamlRestTest' --tests "org.elasticsearch.xpack.test.rest.XPackRestIT.test {p0=data_streams/10_data_stream_resolvability/Verify data stream resolvability in migrations API}" -Dtests.seed=ACEA8E48DEDB71B3 -Dtests.locale=pt-PT -Dtests.timezone=Africa/Harare -Druntime.java=17
```
**Applicable branches:**
main
**Reproduces locally?:**
No
**Failure history:**
https://gradle-enterprise.elastic.co/scans/tests?tests.container=org.elasticsearch.xpack.test.rest.XPackRestIT&tests.test=test%20%7Bp0%3Ddata_streams/10_data_stream_resolvability/Verify%20data%20stream%20resolvability%20in%20migrations%20API%7D
**Failure excerpt:**
```
java.lang.AssertionError: Failure at [data_streams/10_data_stream_resolvability:347]: field [node_settings] doesn't have length [0]
Expected: <0>
but: was <1>
at __randomizedtesting.SeedInfo.seed([ACEA8E48DEDB71B3:24BEB19270271C4B]:0)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:520)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:480)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
at java.lang.Thread.run(Thread.java:833)
Caused by: java.lang.AssertionError: field [node_settings] doesn't have length [0]
Expected: <0>
but: was <1>
at org.hamcrest.MatcherAssert.assertThat(MatcherAssert.java:18)
at org.junit.Assert.assertThat(Assert.java:956)
at org.elasticsearch.test.rest.yaml.section.LengthAssertion.doAssert(LengthAssertion.java:65)
at org.elasticsearch.test.rest.yaml.section.Assertion.execute(Assertion.java:65)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.executeSection(ESClientYamlSuiteTestCase.java:500)
at org.elasticsearch.test.rest.yaml.ESClientYamlSuiteTestCase.test(ESClientYamlSuiteTestCase.java:480)
at jdk.internal.reflect.GeneratedMethodAccessor13.invoke(null:-1)
at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:568)
at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
at java.lang.Thread.run(Thread.java:833)
``` | test | xpackrestit test data streams data stream resolvability verify data stream resolvability in migrations api failing build scan reproduction line gradlew x pack plugin yamlresttest tests org elasticsearch xpack test rest xpackrestit test data streams data stream resolvability verify data stream resolvability in migrations api dtests seed dtests locale pt pt dtests timezone africa harare druntime java applicable branches main reproduces locally no failure history failure excerpt java lang assertionerror failure at field doesn t have length expected but was at randomizedtesting seedinfo seed at org elasticsearch test rest yaml esclientyamlsuitetestcase executesection esclientyamlsuitetestcase java at org elasticsearch test rest yaml esclientyamlsuitetestcase test esclientyamlsuitetestcase java at jdk internal reflect invoke null at jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at com carrotsearch randomizedtesting randomizedrunner invoke randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulesetupteardownchained evaluate testrulesetupteardownchained java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulethreadandtestname evaluate testrulethreadandtestname java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol forktimeoutingtask threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol evaluate threadleakcontrol java at com carrotsearch randomizedtesting randomizedrunner runsingletest randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulestoreclassname evaluate testrulestoreclassname java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testruleassertionsrequired evaluate testruleassertionsrequired java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testruleignoretestsuites evaluate testruleignoretestsuites java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol lambda forktimeoutingtask threadleakcontrol java at java lang thread run thread java caused by java lang assertionerror field doesn t have length expected but was at org hamcrest matcherassert assertthat matcherassert java at org junit assert assertthat assert java at org elasticsearch test rest yaml section lengthassertion doassert lengthassertion java at org elasticsearch test rest yaml section assertion execute assertion java at org elasticsearch test rest yaml esclientyamlsuitetestcase executesection esclientyamlsuitetestcase java at org elasticsearch test rest yaml esclientyamlsuitetestcase test esclientyamlsuitetestcase java at jdk internal reflect invoke null at jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java at java lang reflect method invoke method java at com carrotsearch randomizedtesting randomizedrunner invoke randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulesetupteardownchained evaluate testrulesetupteardownchained java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulethreadandtestname evaluate testrulethreadandtestname java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol forktimeoutingtask threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol evaluate threadleakcontrol java at com carrotsearch randomizedtesting randomizedrunner runsingletest randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at com carrotsearch randomizedtesting randomizedrunner evaluate randomizedrunner java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testrulestoreclassname evaluate testrulestoreclassname java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules noshadowingoroverridesonmethodsrule evaluate noshadowingoroverridesonmethodsrule java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at org apache lucene tests util testruleassertionsrequired evaluate testruleassertionsrequired java at org apache lucene tests util abstractbeforeafterrule evaluate abstractbeforeafterrule java at org apache lucene tests util testrulemarkfailure evaluate testrulemarkfailure java at org apache lucene tests util testruleignoreaftermaxfailures evaluate testruleignoreaftermaxfailures java at org apache lucene tests util testruleignoretestsuites evaluate testruleignoretestsuites java at com carrotsearch randomizedtesting rules statementadapter evaluate statementadapter java at com carrotsearch randomizedtesting threadleakcontrol statementrunner run threadleakcontrol java at com carrotsearch randomizedtesting threadleakcontrol lambda forktimeoutingtask threadleakcontrol java at java lang thread run thread java | 1 |
519,610 | 15,054,597,756 | IssuesEvent | 2021-02-03 17:38:24 | qutebrowser/qutebrowser | https://api.github.com/repos/qutebrowser/qutebrowser | closed | hints.leave_on_load is True, in contrary to what the changelog stated | priority: 0 - high | **Version info**:
qutebrowser v2.0.1
Git commit:
Backend: QtWebEngine (Chromium 83.0.4103.122)
Qt: 5.15.2
**Does the bug happen if you start with `--temp-basedir`?**:
Yes.
**Description**
`hints.leave_on_load` is not `False` by default, as it was stated in the changelog for the 2.0 release.

| 1.0 | hints.leave_on_load is True, in contrary to what the changelog stated - **Version info**:
qutebrowser v2.0.1
Git commit:
Backend: QtWebEngine (Chromium 83.0.4103.122)
Qt: 5.15.2
**Does the bug happen if you start with `--temp-basedir`?**:
Yes.
**Description**
`hints.leave_on_load` is not `False` by default, as it was stated in the changelog for the 2.0 release.

| non_test | hints leave on load is true in contrary to what the changelog stated version info qutebrowser git commit backend qtwebengine chromium qt does the bug happen if you start with temp basedir yes description hints leave on load is not false by default as it was stated in the changelog for the release | 0 |
6,286 | 3,007,717,048 | IssuesEvent | 2015-07-27 17:30:02 | docker/distribution | https://api.github.com/repos/docker/distribution | closed | Docs for storage drivers versioned in external repositories | documentation question | I'm looking to write an experimental storage driver based on [IPFS][], but I'm not sure how to build/install/deploy an [in-process driver][1] without forking docker/distribution and building my driver there. Alternatively, I could try and get my driver landed in *this* repository, but I doubt I can commit to [the one-year maintenance requirement][2]. Since the storage-driver API is fairly stable, is there a way for me to easliy maintain my storage driver in an external repository and then build it into the most recent distribution release (ideally building on the [registry image][3]) without forcing me to maintain a fork of your registry core or you to maintain a fork of my storage driver? This seems easier for everyone than building all of the storage drivers (or other pluggable parts) into this repository.
If there is no way to do this cleanly for in-process drivers (and, with Go's avoidance of dynamic linking, that might be the case), then maybe I have to use an [out-of-process driver][4]. In this case, there are a number of details that are unclear from the docs. What do I call my compiled process? How to I run a test suite based on `RegisterIPCSuite` from my external repository?
I imagine someone has thought these issues through and can quickly point me in the right direction. I'm happy to write up and PR docs for anything folks can sketch out for me. Otherwise I'll see what I can come up with by poking around in the source ;).
[IPFS]: http://ipfs.io/
[1]: https://github.com/docker/distribution/blob/master/docs/storagedrivers.md#in-process-drivers
[2]: https://github.com/docker/distribution/pull/493#issuecomment-99174009
[3]: https://github.com/docker/distribution/blob/master/docs/deploying.md
[4]: https://github.com/docker/distribution/blob/master/docs/storagedrivers.md#out-of-process-drivers | 1.0 | Docs for storage drivers versioned in external repositories - I'm looking to write an experimental storage driver based on [IPFS][], but I'm not sure how to build/install/deploy an [in-process driver][1] without forking docker/distribution and building my driver there. Alternatively, I could try and get my driver landed in *this* repository, but I doubt I can commit to [the one-year maintenance requirement][2]. Since the storage-driver API is fairly stable, is there a way for me to easliy maintain my storage driver in an external repository and then build it into the most recent distribution release (ideally building on the [registry image][3]) without forcing me to maintain a fork of your registry core or you to maintain a fork of my storage driver? This seems easier for everyone than building all of the storage drivers (or other pluggable parts) into this repository.
If there is no way to do this cleanly for in-process drivers (and, with Go's avoidance of dynamic linking, that might be the case), then maybe I have to use an [out-of-process driver][4]. In this case, there are a number of details that are unclear from the docs. What do I call my compiled process? How to I run a test suite based on `RegisterIPCSuite` from my external repository?
I imagine someone has thought these issues through and can quickly point me in the right direction. I'm happy to write up and PR docs for anything folks can sketch out for me. Otherwise I'll see what I can come up with by poking around in the source ;).
[IPFS]: http://ipfs.io/
[1]: https://github.com/docker/distribution/blob/master/docs/storagedrivers.md#in-process-drivers
[2]: https://github.com/docker/distribution/pull/493#issuecomment-99174009
[3]: https://github.com/docker/distribution/blob/master/docs/deploying.md
[4]: https://github.com/docker/distribution/blob/master/docs/storagedrivers.md#out-of-process-drivers | non_test | docs for storage drivers versioned in external repositories i m looking to write an experimental storage driver based on but i m not sure how to build install deploy an without forking docker distribution and building my driver there alternatively i could try and get my driver landed in this repository but i doubt i can commit to since the storage driver api is fairly stable is there a way for me to easliy maintain my storage driver in an external repository and then build it into the most recent distribution release ideally building on the without forcing me to maintain a fork of your registry core or you to maintain a fork of my storage driver this seems easier for everyone than building all of the storage drivers or other pluggable parts into this repository if there is no way to do this cleanly for in process drivers and with go s avoidance of dynamic linking that might be the case then maybe i have to use an in this case there are a number of details that are unclear from the docs what do i call my compiled process how to i run a test suite based on registeripcsuite from my external repository i imagine someone has thought these issues through and can quickly point me in the right direction i m happy to write up and pr docs for anything folks can sketch out for me otherwise i ll see what i can come up with by poking around in the source | 0 |
272,605 | 23,686,825,399 | IssuesEvent | 2022-08-29 07:12:22 | apache/shardingsphere | https://api.github.com/repos/apache/shardingsphere | closed | Refactor the transaction IT to merge the JDBCContainer and ProxyContainer | type: refactor in: test | currently the container management code in transaction are like followings :
```java
private final ShardingSphereProxyClusterContainer proxyContainer;
private final ShardingSphereJDBCContainer jdbcContainer;
private final DockerStorageContainer storageContainer;
public DockerComposedContainer(final TransactionParameterized parameterized) {
this.databaseType = parameterized.getDatabaseType();
governanceContainer = getContainers().registerContainer(new ZookeeperContainer());
storageContainer = getContainers().registerContainer((DockerStorageContainer)
if (TransactionTestConstants.PROXY.equalsIgnoreCase(parameterized.getAdapter())) {
jdbcContainer = null;
proxyContainer = (ShardingSphereProxyClusterContainer) AdapterContainerFactory.newInstance();
proxyContainer.dependsOn(governanceContainer, storageContainer);
getContainers().registerContainer(proxyContainer);
} else {
proxyContainer = null;
ShardingSphereJDBCContainer jdbcContainer = new ShardingSphereJDBCContainer();
this.jdbcContainer = getContainers().registerContainer(jdbcContainer);
}
}
```
the proxyContainer and jdbcConainer should not seperate, there should be a `AdapterContainer` and initialized by configuration. | 1.0 | Refactor the transaction IT to merge the JDBCContainer and ProxyContainer - currently the container management code in transaction are like followings :
```java
private final ShardingSphereProxyClusterContainer proxyContainer;
private final ShardingSphereJDBCContainer jdbcContainer;
private final DockerStorageContainer storageContainer;
public DockerComposedContainer(final TransactionParameterized parameterized) {
this.databaseType = parameterized.getDatabaseType();
governanceContainer = getContainers().registerContainer(new ZookeeperContainer());
storageContainer = getContainers().registerContainer((DockerStorageContainer)
if (TransactionTestConstants.PROXY.equalsIgnoreCase(parameterized.getAdapter())) {
jdbcContainer = null;
proxyContainer = (ShardingSphereProxyClusterContainer) AdapterContainerFactory.newInstance();
proxyContainer.dependsOn(governanceContainer, storageContainer);
getContainers().registerContainer(proxyContainer);
} else {
proxyContainer = null;
ShardingSphereJDBCContainer jdbcContainer = new ShardingSphereJDBCContainer();
this.jdbcContainer = getContainers().registerContainer(jdbcContainer);
}
}
```
the proxyContainer and jdbcConainer should not seperate, there should be a `AdapterContainer` and initialized by configuration. | test | refactor the transaction it to merge the jdbccontainer and proxycontainer currently the container management code in transaction are like followings java private final shardingsphereproxyclustercontainer proxycontainer private final shardingspherejdbccontainer jdbccontainer private final dockerstoragecontainer storagecontainer public dockercomposedcontainer final transactionparameterized parameterized this databasetype parameterized getdatabasetype governancecontainer getcontainers registercontainer new zookeepercontainer storagecontainer getcontainers registercontainer dockerstoragecontainer if transactiontestconstants proxy equalsignorecase parameterized getadapter jdbccontainer null proxycontainer shardingsphereproxyclustercontainer adaptercontainerfactory newinstance proxycontainer dependson governancecontainer storagecontainer getcontainers registercontainer proxycontainer else proxycontainer null shardingspherejdbccontainer jdbccontainer new shardingspherejdbccontainer this jdbccontainer getcontainers registercontainer jdbccontainer the proxycontainer and jdbcconainer should not seperate there should be a adaptercontainer and initialized by configuration | 1 |
194,141 | 14,670,354,979 | IssuesEvent | 2020-12-30 04:32:51 | atom-ide-community/atom-script | https://api.github.com/repos/atom-ide-community/atom-script | closed | Installation issue over firewaled network | installation please-try-the-latest-version | Cannot install using npm because it downloads over git:// (which is blocked) instead of https:// .
`npm ERR! fatal: unable to connect to github.com:`
`npm ERR! github.com[0: 192.30.252.131]: errno=No error
`
| 1.0 | Installation issue over firewaled network - Cannot install using npm because it downloads over git:// (which is blocked) instead of https:// .
`npm ERR! fatal: unable to connect to github.com:`
`npm ERR! github.com[0: 192.30.252.131]: errno=No error
`
| test | installation issue over firewaled network cannot install using npm because it downloads over git which is blocked instead of https npm err fatal unable to connect to github com npm err github com errno no error | 1 |
774,548 | 27,202,088,537 | IssuesEvent | 2023-02-20 10:25:17 | kubernetes/release | https://api.github.com/repos/kubernetes/release | closed | Deprecated k8s.gcr.io container image registry still in use | kind/bug priority/important-soon sig/release kind/cleanup area/release-eng | #### What happened:
There are several uses of the deprecating k8s.gcr.io registry in k/release. These need to be updated and moved prior to the April 3rd freeze of the registry.
Tracking: https://github.com/kubernetes/k8s.io/issues/4738
Search results: https://cs.k8s.io/?q=k8s.gcr.io&i=nope&files=&excludeFiles=vendor%2F&repos=kubernetes/release
| 1.0 | Deprecated k8s.gcr.io container image registry still in use - #### What happened:
There are several uses of the deprecating k8s.gcr.io registry in k/release. These need to be updated and moved prior to the April 3rd freeze of the registry.
Tracking: https://github.com/kubernetes/k8s.io/issues/4738
Search results: https://cs.k8s.io/?q=k8s.gcr.io&i=nope&files=&excludeFiles=vendor%2F&repos=kubernetes/release
| non_test | deprecated gcr io container image registry still in use what happened there are several uses of the deprecating gcr io registry in k release these need to be updated and moved prior to the april freeze of the registry tracking search results | 0 |
19,854 | 10,428,319,518 | IssuesEvent | 2019-09-16 22:11:54 | gate5/test2 | https://api.github.com/repos/gate5/test2 | opened | CVE-2018-14335 (Medium) detected in h2-1.4.187.jar | security vulnerability | ## CVE-2018-14335 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>h2-1.4.187.jar</b></p></summary>
<p>null</p>
<p>Path to dependency file: /tmp/ws-scm/test2/pom.xml</p>
<p>Path to vulnerable library: epository/com/h2database/h2/1.4.187/h2-1.4.187.jar</p>
<p>
Dependency Hierarchy:
- :x: **h2-1.4.187.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gate5/test2/commit/9caf3d214cc15f500423a2e431ea111cf9526739">9caf3d214cc15f500423a2e431ea111cf9526739</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.
<p>Publish Date: 2018-07-24
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14335>CVE-2018-14335</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14335">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14335</a></p>
<p>Release Date: 2018-07-24</p>
<p>Fix Resolution: 1.4.198</p>
</p>
</details>
<p></p>
| True | CVE-2018-14335 (Medium) detected in h2-1.4.187.jar - ## CVE-2018-14335 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>h2-1.4.187.jar</b></p></summary>
<p>null</p>
<p>Path to dependency file: /tmp/ws-scm/test2/pom.xml</p>
<p>Path to vulnerable library: epository/com/h2database/h2/1.4.187/h2-1.4.187.jar</p>
<p>
Dependency Hierarchy:
- :x: **h2-1.4.187.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/gate5/test2/commit/9caf3d214cc15f500423a2e431ea111cf9526739">9caf3d214cc15f500423a2e431ea111cf9526739</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.
<p>Publish Date: 2018-07-24
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14335>CVE-2018-14335</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14335">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14335</a></p>
<p>Release Date: 2018-07-24</p>
<p>Fix Resolution: 1.4.198</p>
</p>
</details>
<p></p>
| non_test | cve medium detected in jar cve medium severity vulnerability vulnerable library jar null path to dependency file tmp ws scm pom xml path to vulnerable library epository com jar dependency hierarchy x jar vulnerable library found in head commit a href vulnerability details an issue was discovered in insecure handling of permissions in the backup function allows attackers to read sensitive files outside of their permissions via a symlink to a fake database file publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution | 0 |
62,567 | 26,048,121,538 | IssuesEvent | 2022-12-22 16:03:42 | Azure/azure-sdk-for-python | https://api.github.com/repos/Azure/azure-sdk-for-python | closed | ServiceBus subscription_receiver abandon_message until | feature-request Service Bus Client customer-reported Messaging issue-addressed | Deferring messages is painful.
Contortions are discussed @ https://markheath.net/post/defer-processing-azure-service-bus-message.
There should be something like
```
receiver.abandon_message(message=message, until=datetime.utcnow() + timedelta(minutes=5))
```
| 1.0 | ServiceBus subscription_receiver abandon_message until - Deferring messages is painful.
Contortions are discussed @ https://markheath.net/post/defer-processing-azure-service-bus-message.
There should be something like
```
receiver.abandon_message(message=message, until=datetime.utcnow() + timedelta(minutes=5))
```
| non_test | servicebus subscription receiver abandon message until deferring messages is painful contortions are discussed there should be something like receiver abandon message message message until datetime utcnow timedelta minutes | 0 |
90,210 | 3,812,865,816 | IssuesEvent | 2016-03-27 22:10:12 | 29th/personnel | https://api.github.com/repos/29th/personnel | closed | [Feature Request] Remove the ImageResized message | low-priority | We don't really need the intrusive text telling us that the images have been re-sized and we can click on it to enlarge. It makes formatting ugly.
https://github.com/vanilla/vanilla/pull/2801
https://github.com/vanilla/vanilla/commit/fe2302af6e1903d726b417516448ad8d91878100 | 1.0 | [Feature Request] Remove the ImageResized message - We don't really need the intrusive text telling us that the images have been re-sized and we can click on it to enlarge. It makes formatting ugly.
https://github.com/vanilla/vanilla/pull/2801
https://github.com/vanilla/vanilla/commit/fe2302af6e1903d726b417516448ad8d91878100 | non_test | remove the imageresized message we don t really need the intrusive text telling us that the images have been re sized and we can click on it to enlarge it makes formatting ugly | 0 |
121,087 | 4,804,632,002 | IssuesEvent | 2016-11-02 14:07:26 | gtagency/buzzmobile | https://api.github.com/repos/gtagency/buzzmobile | opened | Update controller node in architecture image | low hanging fruit low priority | Architecture has to have controller. Not car interface. And it's cpp.
Although I believe car_interface is *also* a node we need to run, correct? I'll take a look at these later and see exactly what the interactions are there. | 1.0 | Update controller node in architecture image - Architecture has to have controller. Not car interface. And it's cpp.
Although I believe car_interface is *also* a node we need to run, correct? I'll take a look at these later and see exactly what the interactions are there. | non_test | update controller node in architecture image architecture has to have controller not car interface and it s cpp although i believe car interface is also a node we need to run correct i ll take a look at these later and see exactly what the interactions are there | 0 |
168,355 | 13,081,138,706 | IssuesEvent | 2020-08-01 09:59:15 | asc-community/AngouriMath | https://api.github.com/repos/asc-community/AngouriMath | closed | Differentiation etc. as Entities | Done & requires further testing Proposal | Differentiation can appear inside other math operations in normal mathematics. This should be supported. | 1.0 | Differentiation etc. as Entities - Differentiation can appear inside other math operations in normal mathematics. This should be supported. | test | differentiation etc as entities differentiation can appear inside other math operations in normal mathematics this should be supported | 1 |
181,747 | 30,734,474,571 | IssuesEvent | 2023-07-28 06:21:50 | hlxsites/mammotome | https://api.github.com/repos/hlxsites/mammotome | closed | Implement "subnavigation" and "metrics" columns styles | enhancement refresh-design | As per spec.
Subnavigation:

Metrics:

| 1.0 | Implement "subnavigation" and "metrics" columns styles - As per spec.
Subnavigation:

Metrics:

| non_test | implement subnavigation and metrics columns styles as per spec subnavigation metrics | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.