Skip to content

Conversation

@openmilanese
Copy link

@openmilanese openmilanese commented Nov 29, 2021

I make available my integration work on zfs, based on the ceph driver.

zfs is for single node and zfs_iscsi for shared

https://github.com/openmilanese/zfs_iscsi.git
https://github.com/openmilanese/zfs.git

enabled: true
actions:
change_authentication: true
update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

settings_auth_tab: true
actions:
# Buttons for settings_info_tab
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

# Buttons for settings_config_tab
Settings.change_language: true
Settings.change_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

settings_auth_tab: true
actions:
# Buttons for settings_info_tab
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

User.two_factor_auth: true
# Buttons for settings_config_tab
Settings.change_language: true
Settings.change_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

settings_auth_tab: true
actions:
# Buttons for settings_info_tab
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

settings_showback_tab: true
actions:
# Buttons for settings_info_tab
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

User.two_factor_auth: true
# Buttons for settings_config_tab
Settings.change_language: true
Settings.change_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

# Buttons for settings_config_tab
Settings.change_language: true
Settings.change_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

User.two_factor_auth: true
# Buttons for settings_config_tab
Settings.change_language: true
Settings.change_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

actions:
User.refresh: true
User.create_dialog: true
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

settings_auth_tab: true
actions:
# Buttons for settings_info_tab
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

actions:
User.refresh: true
User.create_dialog: true
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

actions:
# Buttons for settings_info_tab
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

User.two_factor_auth: true
# Buttons for settings_config_tab
Settings.change_language: true
Settings.change_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

actions:
User.refresh: true
User.create_dialog: true
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

actions:
User.refresh: true
User.create_dialog: true
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

actions:
User.refresh: true
User.create_dialog: true
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

User.two_factor_auth: true
# Buttons for settings_config_tab
Settings.change_language: true
Settings.change_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

actions:
User.refresh: true
User.create_dialog: true
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

actions:
# Buttons for settings_info_tab
User.update_password: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.

Learn more about the use of hardcoded credentials

miracleheras and others added 8 commits December 19, 2025 14:32
Setting the MACHINE default when parsing VM attributes make the default
available when assigning the CD-ROM prefix.

NOTE: This prvents to set MACHINE at host or cluster level.
On q35 machines, OpenNebula < 7.0 sets the hd bus to IDE or SATA.
As a side effect, CDROM devices using the hd prefix (e.g. context disks)
were not attached to the SCSI bus.

In some cases, virtio-scsi fails to initialize during boot due to
resource exhaustion, causing CDROM devices on that bus not being
detected.

Observed kernel errors:
  scsi host6: error handler thread failed to spawn, error = -11
  virtio_scsi: probe of virtio1 failed with error -12

(Probably EAGAIN / ENOMEM errors)
Signed-off-by: Guillermo Ramos <gramos@opennebula.io>
RHEL-family on ARM64 does not support SATA bus in the stock libvirt/qemu stack

const colorBox = `<span style="display:inline-block;width:10px;height:10px;background:${seriesColors[seriesIdx - 1]};border-radius:2px;margin-right:6px;"></span>`;

tooltip.innerHTML = `
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential code injection vulnerability has been detected, where untrusted input is passed to a method that may execute arbitrary code. This issue allows attackers to inject and execute arbitrary code within the application, which could lead to unauthorized access to sensitive data or other malicious actions. To mitigate this, ensure that all user-supplied input is properly sanitized and validated before being processed. Avoid passing untrusted input to methods like eval, render etc, that can execute arbitrary code. Where possible, use safer alternatives such as parameterized queries or more controlled methods for handling user input. Learn more


const colorBox = `<span style="display:inline-block;width:10px;height:10px;background:${seriesColors[seriesIdx - 1]};border-radius:2px;margin-right:6px;"></span>`;

tooltip.innerHTML = `
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html

renderCell: (params) => {
if (!isVr) return null

return (
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html

renderCell: (params) => {
if (!isVr) return null

return (
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html

}
}, [getSupport])

return (
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html

!isDisconnect && setConnectionState({ state: stateString })
}

guac.current.client.onerror = (status) => {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html

RELATIVE_CHARTER_SCHEMA,
RELATIVE_CHARTER_FIELDS,
{
description: (leases) => <FixedLeases leases={leases} />,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html

}
}, [clearInvalid, optionsOnly, renderValue, values, multiple, onChange])

return (
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html

}

useEffect(() => {
guac.current.tunnel.onerror = (status) => {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html

}

const CreateCharterForm = createForm(CHARTER_SCHEMA, CHARTER_FIELDS, {
description: (leases) => <FixedLeases leases={leases} />,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html


if (!isSelected || !availableAliases?.length) return null

return (
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

A potential Cross-Site Scripting (XSS) vulnerability has been identified, where untrusted input is being reflected in the response without proper sanitization. This can allow an attacker to inject and execute malicious scripts in the user's browser, potentially compromising sensitive data or application behavior. To mitigate this risk, it is strongly recommended to sanitize or encode all user input before rendering it in the DOM or returning it in a response. Commonly used methods include DOMPurify.sanitize(), encodeURIComponent(), escape(), etc., depending on the use case and framework in use. Learn more - https://cwe.mitre.org/data/definitions/79.html

// Group by TYPE attribute
const metadata = userInputsMetadata
? mapValues(
groupBy(userInputsMetadata, (obj) => obj.TYPE || obj.type),
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

CSRF protection missing for state-changing requests. Implement CSRF tokens for POST/PUT/PATCH/DELETE operations.

groupBy(userInputsMetadata, (obj) => obj.TYPE || obj.type),
(group) =>
mapValues(
groupBy(group, (obj) => obj.NAME || obj.name),
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

CSRF protection missing for state-changing requests. Implement CSRF tokens for POST/PUT/PATCH/DELETE operations.

const groupUserInputs = (userInputs, userInputsMetadata, prefix) => {
// Group by TYPE attribute
const metadata = userInputsMetadata
? mapValues(
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

CSRF protection missing for state-changing requests. Implement CSRF tokens for POST/PUT/PATCH/DELETE operations.

const rect = over.getBoundingClientRect()

// wheel scroll zoom
over.addEventListener('wheel', (e) => {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

CSRF protection missing for state-changing requests. Implement CSRF tokens for POST/PUT/PATCH/DELETE operations.

/** @type {ObjectSchema} Common schema with relative */
const COMMON_SCHEMA = object({
[ACTION_FIELD_NAME]: ACTION_FIELD_VALIDATION,
ARGS: object().when(ACTION_FIELD_NAME, (action) =>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

CSRF protection missing for state-changing requests. Implement CSRF tokens for POST/PUT/PATCH/DELETE operations.

? mapValues(
groupBy(userInputsMetadata, (obj) => obj.TYPE || obj.type),
(group) =>
mapValues(
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

CSRF protection missing for state-changing requests. Implement CSRF tokens for POST/PUT/PATCH/DELETE operations.

if (pci?.TYPE === 'NIC') return <></>

// Search for pci devices in the host
const pciHostDevice = find(
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

CSRF protection missing for state-changing requests. Implement CSRF tokens for POST/PUT/PATCH/DELETE operations.

icon={<RefreshDouble />}
tooltip={Tr(T.Refresh)}
isSubmitting={isFetching}
onClick={() => getLogs()}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

Using Function.prototype.bind and arrows functions as attributes will negatively impact performance in React. Each time the parent is rendered, the function will be re-created and trigger a render of the component causing excessive renders and more memory use.

helperText={error && !text ? 'Text is required' : ''}
placeholder="Display value in list"
/>
<TextField
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

Found non-internationalized text in JSX component label. The label text is directly hardcoded instead of using the i18n translation function. This makes the application difficult to translate and maintain across different languages. Learn more - https://cwe.mitre.org/data/definitions/116.html.

null
}
onChange={(_, newValue) => handleAlias(params.row.id, newValue)}
renderInput={(args) => (
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

Found non-internationalized text in JSX component label. The label text is directly hardcoded instead of using the i18n translation function. This makes the application difficult to translate and maintain across different languages. Learn more - https://cwe.mitre.org/data/definitions/116.html.

</Button>
</Box>

<TextField
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.

Found non-internationalized text in JSX component label. The label text is directly hardcoded instead of using the i18n translation function. This makes the application difficult to translate and maintain across different languages. Learn more - https://cwe.mitre.org/data/definitions/116.html.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.