Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(cactus-plugin-ledger-connector-cdl-socketio): remove old connector #2965

Merged
merged 1 commit into from
Jan 26, 2024

Conversation

outSH
Copy link
Contributor

@outSH outSH commented Dec 27, 2023

  • Remove old connector cactus-plugin-ledger-connector-cdl-socketio. It's been
    replaced with socketio-based cactus-plugin-ledger-connector-cdl.

Depends on #2962

Signed-off-by: Michal Bajer [email protected]

Pull Request Requirements

  • Rebased onto upstream/main branch and squashed into single commit to help maintainers review it more efficient and to avoid spaghetti git commit graphs that obfuscate which commit did exactly what change, when and, why.
  • Have git sign off at the end of commit message to avoid being marked red. You can add -s flag when using git commit command. You may refer to this link for more information.
  • Follow the Commit Linting specification. You may refer to this link for more information.

Character Limit

  • Pull Request Title and Commit Subject must not exceed 72 characters (including spaces and special characters).
  • Commit Message per line must not exceed 80 characters (including spaces and special characters).

A Must Read for Beginners
For rebasing and squashing, here's a must read guide for beginners.

Comment on lines 103 to 116
const requestResponse = await axios({
httpsAgent,
method: httpMethod,
baseURL,
url,
responseType: "json",
headers: {
"User-Agent": userAgent,
"Content-Type": "application/json;charset=UTF-8",
...authHeaders,
},
params: queryParams,
data: dataPayload,
});

Check failure

Code scanning / CodeQL

Server-side request forgery Critical

The
URL
of this request depends on a
user-provided value
.
this.log.info(
`Allowing self signed CDL API GW certificates (skipCertCheck=${skipCertCheck})`,
);
agentOptions.rejectUnauthorized = false;

Check failure

Code scanning / CodeQL

Disabling certificate validation High

Disabling certificate validation is strongly discouraged.
Copy link
Contributor

@izuru0 izuru0 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@sandeepnRES sandeepnRES force-pushed the remove_cdl_socketio_pr branch from 1f1c62c to 09cc017 Compare January 4, 2024 12:27
Copy link
Contributor

@petermetz petermetz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link

This PR/issue depends on:

- Remove old connector cactus-plugin-ledger-connector-cdl-socketio. It's been
    replaced with socketio-based cactus-plugin-ledger-connector-cdl.

Depends on hyperledger-cacti#2962

Signed-off-by: Michal Bajer <[email protected]>
@petermetz petermetz force-pushed the remove_cdl_socketio_pr branch from 09cc017 to 19cd7c5 Compare January 26, 2024 00:27
@petermetz petermetz enabled auto-merge (rebase) January 26, 2024 00:27
@petermetz petermetz merged commit d71b30b into hyperledger-cacti:main Jan 26, 2024
129 of 146 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants