-
Notifications
You must be signed in to change notification settings - Fork 513
Contribute: zfs driver and zfs driver shared over ISCSI #5654
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: one-6.2
Are you sure you want to change the base?
Conversation
0b269ff to
b94dad5
Compare
| enabled: true | ||
| actions: | ||
| change_authentication: true | ||
| update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
9e1985e to
d019bd4
Compare
| settings_auth_tab: true | ||
| actions: | ||
| # Buttons for settings_info_tab | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| # Buttons for settings_config_tab | ||
| Settings.change_language: true | ||
| Settings.change_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| settings_auth_tab: true | ||
| actions: | ||
| # Buttons for settings_info_tab | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| User.two_factor_auth: true | ||
| # Buttons for settings_config_tab | ||
| Settings.change_language: true | ||
| Settings.change_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| settings_auth_tab: true | ||
| actions: | ||
| # Buttons for settings_info_tab | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| settings_showback_tab: true | ||
| actions: | ||
| # Buttons for settings_info_tab | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| User.two_factor_auth: true | ||
| # Buttons for settings_config_tab | ||
| Settings.change_language: true | ||
| Settings.change_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| # Buttons for settings_config_tab | ||
| Settings.change_language: true | ||
| Settings.change_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| User.two_factor_auth: true | ||
| # Buttons for settings_config_tab | ||
| Settings.change_language: true | ||
| Settings.change_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| actions: | ||
| User.refresh: true | ||
| User.create_dialog: true | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| settings_auth_tab: true | ||
| actions: | ||
| # Buttons for settings_info_tab | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| actions: | ||
| User.refresh: true | ||
| User.create_dialog: true | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| actions: | ||
| # Buttons for settings_info_tab | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| User.two_factor_auth: true | ||
| # Buttons for settings_config_tab | ||
| Settings.change_language: true | ||
| Settings.change_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| actions: | ||
| User.refresh: true | ||
| User.create_dialog: true | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| actions: | ||
| User.refresh: true | ||
| User.create_dialog: true | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| actions: | ||
| User.refresh: true | ||
| User.create_dialog: true | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| User.two_factor_auth: true | ||
| # Buttons for settings_config_tab | ||
| Settings.change_language: true | ||
| Settings.change_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| actions: | ||
| User.refresh: true | ||
| User.create_dialog: true | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
| actions: | ||
| # Buttons for settings_info_tab | ||
| User.update_password: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Recommendation generated by Amazon CodeGuru Reviewer. Leave feedback on this recommendation by replying to the comment or by reacting to the comment using emoji.
It appears your code contains a hardcoded password. Hardcoded secrets or credentials can allow attackers to bypass authentication methods and perform malicious actions. We recommend revoking access to resources using this credential and storing future credentials in a management service such as AWS Secrets Manager.
Signed-off-by: Miguel E. Ruiz <[email protected]> Co-authored-by: Tino Vázquez <[email protected]>
* Removes stripping of non-matching schema attributes when casting initial values into VM Template. This is necessary due to some schemas not being strictly defined on initial loading. If this is set to true, those initial values will be dropped, i.e. placement constraints. Signed-off-by: Victor Hansson <[email protected]> (cherry picked from commit bca79a4)
Signed-off-by: dcarracedo <[email protected]>
Signed-off-by: josepselga <[email protected]> Co-authored-by: Pavel Czerný <[email protected]>
xmllint versions between 2.11 and 2.12 (both included) contain a regression which makes it not return an error code. This commit uses xpath.rb in places where logic requires checking the return code, as well as some backwards-compatible modifications in xpath.rb to support it. Discussion: https://gitlab.gnome.org/GNOME/libxml2/-/issues/673 + https://gitlab.gnome.org/GNOME/libxml2/-/issues/690 Commit introducing regression: https://gitlab.gnome.org/GNOME/libxml2/-/commit/e85f9b98a5389c69167176ae6600091e719ec38f Commit fixing it: https://gitlab.gnome.org/GNOME/libxml2/-/commit/87bebd25f11be333f0742ee5dc80e07d306c76df Signed-off-by: Guillermo Ramos <[email protected]>
- Adds the vGPU profile selector to the VM Template's update/create dialog, under the PCI Devices tab. Signed-off-by: Victor Hansson <[email protected]>
(cherry picked from commit 365e95b)
Signed-off-by: Victor Hansson <[email protected]>
Signed-off-by: dcarracedo <[email protected]>
Signed-off-by: ArnauGabrielAtienza <[email protected]> Co-authored-by: Tino Vázquez <[email protected]>
Signed-off-by: josepselga <[email protected]>
* Upgrade fast-xml-parser to v4 * Refresh actions * Update PCI profile selector Signed-off-by: Victor Hansson <[email protected]> Co-authored-by: Jorge Miguel Lobo Escalona <[email protected]>
(cherry picked from commit 39e72cd)
- Upgrade zeromq to 6.5.1 - Upgrade fast-xml-parser to v4 - Remove manual HE encoding - Update PCI profile selector - Add missing data-cy selector(s) - Reverts 524da99 (This needs to be further tested to measure performance impact => Uploaded files are not deleted from /var/tmp one#7252) - Fixes sec_group update call Signed-off-by: Victor Hansson <[email protected]> Co-authored-by: Jorge Miguel Lobo Escalona <[email protected]>
Signed-off-by: Mirko Stojiljkovic <[email protected]>
Signed-off-by: Miguel E. Ruiz <[email protected]> Co-authored-by: Tino Vázquez <[email protected]>
Signed-off-by: Victor Hansson <[email protected]> (cherry picked from commit 20d2c06)
Signed-off-by: Victor Hansson <[email protected]>
Signed-off-by: Victor Hansson <[email protected]>
allowed character are the alphanumeric, dot, dash and underscore to avoid possible shell escapes (cherry picked from commit a1c7ebb) (cherry picked from commit 1c728211bc3adf7f3653e2567b76bcdcc09f3946)
Signed-off-by: Ross <[email protected]> Co-authored-by: Tino Vázquez <[email protected]>
Signed-off-by: dcarracedo <[email protected]> Co-authored-by: Tino Vázquez <[email protected]>
Signed-off-by: dcarracedo <[email protected]>
I make available my integration work on zfs, based on the ceph driver.
zfs is for single node and zfs_iscsi for shared
https://github.com/openmilanese/zfs_iscsi.git
https://github.com/openmilanese/zfs.git