You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fixing mergeConfig was not defined. Using the config hook to get the current configs. Fixed visual editor not rendering because of style attritubes on Cloudscape components
// Parent doesn't exist, so we can't delete anything
472
527
return;
473
528
}
474
-
current=current[segments[i]];// nosemgrep: javascript.lang.security.audit.prototype-pollution.prototype-pollution-loop.prototype-pollution-loop - Index from controlled array iteration
529
+
current=current[segments[i]];// nosemgrep: javascript.lang.security.audit.prototype-pollution.prototype-pollution-loop.prototype-pollution-loop - Index from controlled array iteration
current=current[segment];// nosemgrep: javascript.lang.security.audit.prototype-pollution.prototype-pollution-loop.prototype-pollution-loop - Index from controlled array iteration
559
+
current=current[segment];// nosemgrep: javascript.lang.security.audit.prototype-pollution.prototype-pollution-loop.prototype-pollution-loop - Index from controlled array iteration
current=current[segment];// nosemgrep: javascript.lang.security.audit.prototype-pollution.prototype-pollution-loop.prototype-pollution-loop - Index from controlled array iteration
582
+
current=current[segment];// nosemgrep: javascript.lang.security.audit.prototype-pollution.prototype-pollution-loop.prototype-pollution-loop - Index from controlled array iteration
console.log(`DEBUG: Rendering granular field '${key}' at path '${currentPath}':`,{// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
597
+
console.log(`DEBUG: Rendering granular field '${key}' at path '${currentPath}':`,{
598
+
// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
console.log(`DEBUG renderField dependency check for ${key}:`,{// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
651
+
console.log(`DEBUG renderField dependency check for ${key}:`,{
652
+
// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
console.log(`Hiding field ${key} due to dependency mismatch:`,{// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Data from trusted internal source only
700
+
console.log(`Hiding field ${key} due to dependency mismatch:`,{
701
+
// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Data from trusted internal source only
console.log(`Field distribution for ${key}:`,{// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
1067
+
console.log(`Field distribution for ${key}:`,{
1068
+
// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
// Validation and debugging for field distribution
1069
-
console.log(`Distribution result for ${key}:`,{// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
1114
+
console.log(`Distribution result for ${key}:`,{
1115
+
// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
// Update the form values immediately to ensure dependency checking works
1260
-
updateValue(path,property.default);
1261
1304
}
1262
1305
1263
1306
// Dependencies are now checked in the main renderField function
1264
1307
1265
1308
// If this is an object type, it should be rendered as an object field, not an input field
1266
1309
if(property.type==='object'){
1267
-
console.log(`Redirecting object type ${key} to renderObjectField`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
1310
+
console.log(`Redirecting object type ${key} to renderObjectField`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
// Use the provided onResetToDefault function if available
1297
1340
onResetToDefault(path)
1298
1341
.then(()=>{
1299
-
console.log(`Restored default value for ${path} using onResetToDefault`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Data from trusted internal source only
1342
+
console.log(`Restored default value for ${path} using onResetToDefault`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Data from trusted internal source only
console.log(`Manually restored default value for ${path}: ${defaultValue}`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Data from trusted internal source only
1352
+
console.log(`Manually restored default value for ${path}: ${defaultValue}`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Data from trusted internal source only
console.log(`Manually restored default value for ${path}: ${defaultValue}`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Data from trusted internal source only
1361
+
console.log(`Manually restored default value for ${path}: ${defaultValue}`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Data from trusted internal source only
`Rendering top level property: ${key}, type: ${property.type}, sectionLabel: ${property.sectionLabel}`,// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
1488
+
`Rendering top level property: ${key}, type: ${property.type}, sectionLabel: ${property.sectionLabel}`,// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
1446
1489
property,
1447
1490
);
1448
1491
1449
1492
// If property should have a section container, wrap it
1450
1493
if(shouldUseContainer(key,property)){
1451
1494
constsectionTitle=property.sectionLabel;
1452
-
console.log(`Creating section container for ${key} with title: ${sectionTitle}`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
1495
+
console.log(`Creating section container for ${key} with title: ${sectionTitle}`);// nosemgrep: javascript.lang.security.audit.unsafe-formatstring.unsafe-formatstring - Debug logging with controlled internal data
0 commit comments