-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature/resync #605
Feature/resync #605
Conversation
…ve_shacl_validation Feature/improve_shacl_validation
…_bugs Bug/fix_small_bugs
…at_increase_dialers increase no of connections
…e_p2p_deps Feature/update_p2p_deps
…uce-build-time Reduce build time
…-readme Issue 490 dev readme
Fix compute flow
…-logs Logging all errors
…arge_main use barge main
…ys-compute Add remote keys for compute stages
* Create CollectFeesHandler for admin. Added tests. * Print balance. * Add debug log. * Added regex validation for ethereum addresses. * Added checks for zero address. Refactor transfer call. * Debug logs. * Tweak for addresses length in regex. * fix. * Added debug logs for handle function and refactored test for fee amount. * Fix call. * Fix provider wallet. * Fix breaking change for provider wallet. * Print error. * Replace ReadableString with Readable. * Added more debug logs. * More debug. * Use readStream instead of streamToString. * Move test position. * increase timeout. * remove message from handler response. * store tx receipt in a separate var. * Fix unit for parseUnit. * Fix wallet. * Change token address. * Print addresses. * Changed wallet private key. * Added logs for expected failure cases. * Fix log for balance. * cleanup. * Fix review part 1. * Fix review part 2. * Fix review part 3. * tweak. * Resolve conditions. Refactor code. * Fix review. * Updated provider wallet. * Make tokenAmount optional.
Adding class for SQLite and crud functions
…eementid-stop Issue 506 agreementid stop
…ndexing-networks Enable indexing networks
…e-cpu improve peer discovery time, avoid connect again on connection handler
…e-hash-git use only git tracked files for computing code hash
…rotection add unsafe URL & make config required for Storage classes
…elease_scripts add release script
} | ||
// split jobId (which is already in hash-jobId format) and get the hash | ||
// then get jobId which might contain dashes as well | ||
const index = task.jobId.indexOf('-') |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
this HTTP request parameter
// split jobId (which is already in hash-jobId format) and get the hash | ||
// then get jobId which might contain dashes as well | ||
const index = task.jobId.indexOf('-') | ||
const hash = task.jobId.slice(0, index) |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
this HTTP request parameter
// then get jobId which might contain dashes as well | ||
const index = task.jobId.indexOf('-') | ||
const hash = task.jobId.slice(0, index) | ||
const jobId = task.jobId.slice(index + 1) |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
this HTTP request parameter
if (task.jobId) { | ||
// split jobId (which is already in hash-jobId format) and get the hash | ||
// then get jobId which might contain dashes as well | ||
const index = task.jobId.indexOf('-') |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
this HTTP request parameter
// split jobId (which is already in hash-jobId format) and get the hash | ||
// then get jobId which might contain dashes as well | ||
const index = task.jobId.indexOf('-') | ||
const hash = task.jobId.slice(0, index) |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
this HTTP request parameter
// split compute env (which is already in hash-envId format) and get the hash | ||
// then get env which might contain dashes as well | ||
const eIndex = task.environment.indexOf('-') | ||
const hash = task.environment.slice(0, eIndex) |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
this HTTP request parameter
// then get env which might contain dashes as well | ||
const eIndex = task.environment.indexOf('-') | ||
const hash = task.environment.slice(0, eIndex) | ||
const envId = task.environment.slice(eIndex + 1) |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
this HTTP request parameter
try { | ||
// split jobId (which is already in hash-jobId format) and get the hash | ||
// then get jobId which might contain dashes as well | ||
const index = task.jobId.indexOf('-') |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
this HTTP request parameter
// split jobId (which is already in hash-jobId format) and get the hash | ||
// then get jobId which might contain dashes as well | ||
const index = task.jobId.indexOf('-') | ||
const hash = task.jobId.slice(0, index) |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
this HTTP request parameter
// then get jobId which might contain dashes as well | ||
const index = task.jobId.indexOf('-') | ||
const hash = task.jobId.slice(0, index) | ||
const jobId = task.jobId.slice(index + 1) |
Check failure
Code scanning / CodeQL
Type confusion through parameter tampering Critical
Fixes # .
Changes proposed in this PR: