Giter Site home page Giter Site logo

manageiq / manageiq-providers-lenovo Goto Github PK

View Code? Open in Web Editor NEW
16.0 11.0 66.0 8.85 MB

ManageIQ plugin for the Lenovo XClarity provider.

Home Page: https://www.lenovo.com/us/en/data-center/software/management/

License: Apache License 2.0

Ruby 90.56% JavaScript 8.93% CSS 0.18% Shell 0.33%

manageiq-providers-lenovo's Introduction

ManageIQ::Providers::Lenovo

CI Maintainability Test Coverage

Chat

Build history for master branch

ManageIQ plugin for the Lenovo XClarity provider.

Development

See the section on plugins in the ManageIQ Developer Setup

For quick local setup run bin/setup, which will clone the core ManageIQ repository under the spec directory and setup necessary config files. If you have already cloned it, you can run bin/update to bring the core ManageIQ code up to date.

License

The gem is available as open source under the terms of the Apache License 2.0.

Contributing

  1. Fork it
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Add some feature')
  4. Push to the branch (git push origin my-new-feature)
  5. Create new Pull Request

manageiq-providers-lenovo's People

Contributors

agrare avatar andreymenezes avatar bdunne avatar blomquisg avatar caiocmpaes avatar charlledaniel avatar chessbyte avatar d-m-u avatar douglasgabriel avatar durandom avatar esdrasvp avatar felipedf avatar fryguy avatar gabrielsvinha avatar jprause avatar jrafanie avatar juliancheal avatar kavyanekkalapu avatar kbrock avatar ladas avatar lucashsilva avatar maysamacedo avatar mzazrivec avatar nicklamuro avatar renovate[bot] avatar rodneyhbrown7 avatar saulotoledo avatar skateman avatar slemrmartin avatar walteraa avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

manageiq-providers-lenovo's Issues

CVE-2021-3647 (Medium) detected in urijs-1.19.5.tgz - autoclosed

CVE-2021-3647 - Medium Severity Vulnerability

Vulnerable Library - urijs-1.19.5.tgz

URI.js is a Javascript library for working with URLs.

Library home page: https://registry.npmjs.org/urijs/-/urijs-1.19.5.tgz

Dependency Hierarchy:

  • urijs-1.19.5.tgz (Vulnerable Library)

Found in HEAD commit: a1dbab5b7e16aa92eec7b573ad04e45b63357680

Found in base branch: master

Vulnerability Details

URI.js is vulnerable to URL Redirection to Untrusted Site

Publish Date: 2021-07-16

URL: CVE-2021-3647

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-89gv-h8wf-cg8r

Release Date: 2021-07-16

Fix Resolution: 1.19.7


Step up your Open Source Security Game with WhiteSource here

CVE-2022-0868 (Medium) detected in urijs-1.19.9.tgz - autoclosed

CVE-2022-0868 - Medium Severity Vulnerability

Vulnerable Library - urijs-1.19.9.tgz

URI.js is a Javascript library for working with URLs.

Library home page: https://registry.npmjs.org/urijs/-/urijs-1.19.9.tgz

Dependency Hierarchy:

  • urijs-1.19.9.tgz (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Open Redirect in GitHub repository medialize/uri.js prior to 1.19.10.

Publish Date: 2022-03-06

URL: CVE-2022-0868

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0868

Release Date: 2022-03-06

Fix Resolution: 1.19.10


Step up your Open Source Security Game with WhiteSource here

Warranty expire dates

LXCA looks up the warranty expire and displays this in the LXCA webui. Would it be possible to pull the warranty info from LXCA into ManageIQ?

CVE-2022-0613 (Medium) detected in urijs-1.19.7.tgz - autoclosed

CVE-2022-0613 - Medium Severity Vulnerability

Vulnerable Library - urijs-1.19.7.tgz

URI.js is a Javascript library for working with URLs.

Library home page: https://registry.npmjs.org/urijs/-/urijs-1.19.7.tgz

Dependency Hierarchy:

  • urijs-1.19.7.tgz (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Authorization Bypass Through User-Controlled Key in Bower URIjs prior to 1.19.8.

Publish Date: 2022-02-16

URL: CVE-2022-0613

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083/

Release Date: 2022-02-16

Fix Resolution: uri.js - v1.19.8


Step up your Open Source Security Game with WhiteSource here

yarn install stuck on s390x platfrom

When trying to run yarn on manageiq-providers-lenovo on s390x platfrom it stuck at below line

manageiq-providers-lenovo]# yarn
➤ YN0000: ┌ Resolution step
➤ YN0000: └ Completed in 0s 253ms
➤ YN0000: ┌ Fetch step
➤ YN0013: │ urijs@npm:1.19.11 can't be found in the cache and will be fetched from the remote registry
➤ YN0000: ⠙ ========================================----------------------------------------

when I do simple npm install [email protected] it adds the package but yarn is stuck on this line without success or error

CVE-2021-27516 (High) detected in urijs-1.19.5.tgz - autoclosed

CVE-2021-27516 - High Severity Vulnerability

Vulnerable Library - urijs-1.19.5.tgz

URI.js is a Javascript library for working with URLs.

Library home page: https://registry.npmjs.org/urijs/-/urijs-1.19.5.tgz

Dependency Hierarchy:

  • urijs-1.19.5.tgz (Vulnerable Library)

Found in HEAD commit: a1dbab5b7e16aa92eec7b573ad04e45b63357680

Found in base branch: master

Vulnerability Details

URI.js (aka urijs) before 1.19.6 mishandles certain uses of backslash such as http:/ and interprets the URI as a relative path.

Publish Date: 2021-02-22

URL: CVE-2021-27516

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27516

Release Date: 2021-02-22

Fix Resolution: 1.19.6


Step up your Open Source Security Game with WhiteSource here

CVE-2022-1233 (Medium) detected in urijs-1.19.9.tgz - autoclosed

CVE-2022-1233 - Medium Severity Vulnerability

Vulnerable Library - urijs-1.19.9.tgz

URI.js is a Javascript library for working with URLs.

Library home page: https://registry.npmjs.org/urijs/-/urijs-1.19.9.tgz

Dependency Hierarchy:

  • urijs-1.19.9.tgz (Vulnerable Library)

Found in base branch: master

Vulnerability Details

URL Confusion When Scheme Not Supplied in GitHub repository medialize/uri.js prior to 1.19.11.

Publish Date: 2022-04-04

URL: CVE-2022-1233

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1233

Release Date: 2022-04-04

Fix Resolution: urijs - 1.19.11


Step up your Open Source Security Game with WhiteSource here

Dependency Dashboard

This issue lists Renovate updates and detected dependencies. Read the Dependency Dashboard docs to learn more.

This repository currently has no open or pending branches.

Detected dependencies

github-actions
.github/workflows/ci.yaml
  • actions/checkout v4
  • ruby/setup-ruby v1
  • paambaati/codeclimate-action v6
  • manageiq/postgresql 13
npm
package.json
  • node >= 18.0.0
  • npm >= 8.6.0
  • yarn >= 0.20.1
  • yarn 4.2.2

  • Check this box to trigger a request for Renovate to run again on this repository

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.