-
-
Notifications
You must be signed in to change notification settings - Fork 241
Iceberg Bucket support #720
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
⛔ Snyk checks have failed. 11 issues have been found so far.
⛔ code/snyk check is complete. 11 issues have been found. (View Details) Up to 10 code/snyk issues appear as inline comments below; view the rest through the details page.💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
parent: request.query.parent, | ||
}) | ||
|
||
return response.send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from an HTTP parameter
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 136 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 22 steps
Step 1 - 6
storage/src/http/routes/iceberg/namespace.ts
Line 126 in a232574
id: request.params.prefix, |
Step 7 - 11
src/http/routes/iceberg/namespace.ts#L124
Step 12 - 15
src/http/routes/iceberg/namespace.ts#L130
Step 16 - 20
src/http/routes/iceberg/namespace.ts#L129
Step 21 - 22
storage/src/http/routes/iceberg/namespace.ts
Line 136 in a232574
return response.send(result) |
namespace: request.params.namespace, | ||
}) | ||
|
||
return response.status(204).send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from an HTTP parameter
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 159 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 13 steps
Step 1 - 6
storage/src/http/routes/iceberg/namespace.ts
Line 156 in a232574
namespace: request.params.namespace, |
Step 7 - 11
src/http/routes/iceberg/namespace.ts#L155
Step 12 - 13
storage/src/http/routes/iceberg/namespace.ts
Line 159 in a232574
return response.status(204).send(result) |
namespace: request.params.namespace, | ||
}) | ||
|
||
return response.send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from an HTTP parameter
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 182 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 13 steps
Step 1 - 6
storage/src/http/routes/iceberg/namespace.ts
Line 179 in a232574
namespace: request.params.namespace, |
Step 7 - 11
src/http/routes/iceberg/namespace.ts#L178
Step 12 - 13
storage/src/http/routes/iceberg/namespace.ts
Line 182 in a232574
return response.send(result) |
namespace: request.params.namespace, | ||
}) | ||
|
||
return response.send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from an HTTP parameter
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 317 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 22 steps
Step 1 - 6
storage/src/http/routes/iceberg/table.ts
Line 308 in a232574
id: request.params.prefix, |
Step 7 - 11
src/http/routes/iceberg/table.ts#L306
Step 12 - 15
src/http/routes/iceberg/table.ts#L313
Step 16 - 20
src/http/routes/iceberg/table.ts#L311
Step 21 - 22
storage/src/http/routes/iceberg/table.ts
Line 317 in a232574
return response.send(result) |
pageToken: request.query.pageToken, | ||
}) | ||
|
||
return response.send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from an HTTP parameter
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 343 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 22 steps
Step 1 - 6
storage/src/http/routes/iceberg/table.ts
Line 333 in a232574
id: request.params.prefix, |
Step 7 - 11
src/http/routes/iceberg/table.ts#L331
Step 12 - 15
src/http/routes/iceberg/table.ts#L337
Step 16 - 20
src/http/routes/iceberg/table.ts#L336
Step 21 - 22
storage/src/http/routes/iceberg/table.ts
Line 343 in a232574
return response.send(result) |
table: request.params.table, | ||
}) | ||
|
||
return response.send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from an HTTP parameter
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 369 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 22 steps
Step 1 - 6
storage/src/http/routes/iceberg/table.ts
Line 360 in a232574
id: request.params.prefix, |
Step 7 - 11
src/http/routes/iceberg/table.ts#L358
Step 12 - 15
src/http/routes/iceberg/table.ts#L364
Step 16 - 20
src/http/routes/iceberg/table.ts#L363
Step 21 - 22
storage/src/http/routes/iceberg/table.ts
Line 369 in a232574
return response.send(result) |
table: request.params.table, | ||
}) | ||
|
||
return response.status(204).send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from an HTTP parameter
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 393 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 13 steps
Step 1 - 6
storage/src/http/routes/iceberg/table.ts
Line 389 in a232574
namespace: request.params.namespace, |
Step 7 - 11
src/http/routes/iceberg/table.ts#L388
Step 12 - 13
storage/src/http/routes/iceberg/table.ts
Line 393 in a232574
return response.status(204).send(result) |
table: request.params.table, | ||
}) | ||
|
||
return response.status(204).send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from an HTTP parameter
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 426 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 13 steps
Step 1 - 6
storage/src/http/routes/iceberg/table.ts
Line 422 in a232574
namespace: request.params.namespace, |
Step 7 - 11
src/http/routes/iceberg/table.ts#L421
Step 12 - 13
storage/src/http/routes/iceberg/table.ts
Line 426 in a232574
return response.status(204).send(result) |
table: request.params.table, | ||
}) | ||
|
||
return response.send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from an HTTP parameter
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 452 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 13 steps
Step 1 - 6
storage/src/http/routes/iceberg/table.ts
Line 448 in a232574
namespace: request.params.namespace, |
Step 7 - 11
src/http/routes/iceberg/table.ts#L446
Step 12 - 13
storage/src/http/routes/iceberg/table.ts
Line 452 in a232574
return response.send(result) |
warehouse: bucket.id, | ||
}) | ||
|
||
return response.send(result) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from the HTTP request body
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 110 | CWE-79 | Priority score 847 | Learn more about this vulnerability
Data flow: 14 steps
Step 1 - 7
storage/src/http/routes/iceberg/namespace.ts
Line 106 in a232574
namespace: [request.body.namespace], |
Step 8 - 12
src/http/routes/iceberg/namespace.ts#L105
Step 13 - 14
storage/src/http/routes/iceberg/namespace.ts
Line 110 in a232574
return response.send(result) |
a232574
to
3a9c533
Compare
3a9c533
to
e9705ee
Compare
514e3f3
to
e7db982
Compare
e7db982
to
03c59eb
Compare
.then((response) => response.data) | ||
.catch((error) => { | ||
if (error instanceof AxiosError) { | ||
console.error('Error fetching configuration:', error.response?.data) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Several console.error and one console.log in this file. These should probably use logSchema
What kind of change does this PR introduce?
Feature
What is the new behavior?
Implement a multi-tenant iceberg catalog proxy, currently supported S3Tables catalog
Additional context
Add any other context or screenshots.