-
-
Notifications
You must be signed in to change notification settings - Fork 241
feat: vector buckets #774
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
feat: vector buckets #774
Conversation
⛔ Snyk checks have failed. 7 issues have been found so far.
⛔ code/snyk check is complete. 7 issues have been found. (View Details) 💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
|
||
const bucketResult = await request.s3Vector.getBucket(request.body) | ||
|
||
return response.send(bucketResult) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from the HTTP request body
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 42 | CWE-79 | Priority score 799 | Learn more about this vulnerability
Data flow: 9 steps
Step 1 - 7
const bucketResult = await request.s3Vector.getBucket(request.body) |
Step 8 - 9
return response.send(bucketResult) |
|
||
const indexResult = await request.s3Vector.getVectors(request.body) | ||
|
||
return response.send(indexResult) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from the HTTP request body
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 46 | CWE-79 | Priority score 799 | Learn more about this vulnerability
Data flow: 9 steps
Step 1 - 7
const indexResult = await request.s3Vector.getVectors(request.body) |
Step 8 - 9
return response.send(indexResult) |
|
||
const listBucketsResult = await request.s3Vector.listBuckets(request.body) | ||
|
||
return response.send(listBucketsResult) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from the HTTP request body
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 43 | CWE-79 | Priority score 799 | Learn more about this vulnerability
Data flow: 9 steps
Step 1 - 7
const listBucketsResult = await request.s3Vector.listBuckets(request.body) |
Step 8 - 9
return response.send(listBucketsResult) |
vectorBucketName: request.body.vectorBucketName, | ||
}) | ||
|
||
return response.send(indexResult) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from the HTTP request body
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 48 | CWE-79 | Priority score 799 | Learn more about this vulnerability
Data flow: 13 steps
Step 1 - 6
vectorBucketName: request.body.vectorBucketName, |
Step 7 - 11
src/http/routes/vector/list-indexes.ts#L43
Step 12 - 13
return response.send(indexResult) |
|
||
const indexResult = await request.s3Vector.listVectors(request.body) | ||
|
||
return response.send(indexResult) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from the HTTP request body
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 57 | CWE-79 | Priority score 799 | Learn more about this vulnerability
Data flow: 9 steps
Step 1 - 7
const indexResult = await request.s3Vector.listVectors(request.body) |
Step 8 - 9
return response.send(indexResult) |
}), | ||
}) | ||
|
||
return response.send(indexResult) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from the HTTP request body
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 81 | CWE-79 | Priority score 849 | Learn more about this vulnerability
Data flow: 13 steps
Step 1 - 6
vectorBucketName: request.body.vectorBucketName, |
Step 7 - 11
src/http/routes/vector/put-vectors.ts#L70
Step 12 - 13
return response.send(indexResult) |
returnMetadata: request.body.returnMetadata, | ||
}) | ||
|
||
return response.send(indexResult) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cross-site Scripting (XSS)
Unsanitized input from the HTTP request body
flows into send
, where it is used to render an HTML page returned to the user. This may result in a Cross-Site Scripting attack (XSS).
Line 156 | CWE-79 | Priority score 849 | Learn more about this vulnerability
Data flow: 13 steps
Step 1 - 6
vectorBucketName: request.body.vectorBucketName, |
Step 7 - 11
src/http/routes/vector/query-vectors.ts#L145
Step 12 - 13
return response.send(indexResult) |
757522d
to
533ecf8
Compare
533ecf8
to
c94b7f9
Compare
What kind of change does this PR introduce?
Feature
What is the new behaviour?
Implement Vector Bucket data source
Supported Operations:
Authentication mechanisms: