Changes to run laconic-console app with laconicd #75

Merged
nikugogoi merged 5 commits from console into main 2023-01-11 07:36:43 +00:00
2 changed files with 2 additions and 2 deletions
Showing only changes of commit 3dd433cbef - Show all commits

View File

@ -33,7 +33,7 @@ func PlaygroundHandler(apiURL string) http.HandlerFunc {
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
}
w.Header().Set("Content-Type", "text/html")
err := page.Execute(w, map[string]interface{}{
"apiUrl": apiURL,
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
"apiURL": apiURL,
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
})
if err != nil {
panic(err)

github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.

Show more details

## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
github-code-scanning[bot] commented 2023-01-11 05:53:20 +00:00 (Migrated from github.com)
Review

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.

Show more details

## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. [Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)

View File

@ -111,7 +111,7 @@ func (k Keeper) GetRecord(ctx sdk.Context, id string) (record types.Record) {
store := ctx.KVStore(k.storeKey)
result := store.Get(GetRecordIndexKey(id))
k.cdc.MustUnmarshal(result, &record)
return record
return recordObjToRecord(store, record)
}
// ListRecords - get all records.