ssl
Here are 1,902 public repositories matching this topic...
Feature request
Feature description
The generated and installed config files permission are too open, any user logined on the system can read and write them. So i suggest append a chmod
command into Extract tar step to keep config files more safty.
How the feature is useful
-
Updated
Sep 4, 2021 - Shell
Context and Description
The READMEs and any example code in all projects should be updated to reflect the move from the IBM-Swift organization to the Kitura organization.
If anyone wants to take on all or part of this, please comment here so other's know what you're working on and submit PR's. :-)
Thanks!
-
Updated
Sep 1, 2021 - Shell
There's little information about what keys and values are in the output, what it means and how they are related to the screen output. In general that needs to be added. (special topics see #1675, #1674)
When closing the browser after a successful user sign in, the session is still alive for the time the oauth2-proxy cookie has not expired and tokens in session are still valid.
Expected Behavior
There could be an additional "browser session enabled" configuration. When the browser is closed (or when the browser defines the "current session" ends), the oauth2-proxy user session should also
Problem:
A common pattern is:
GUARD(s2n_stuffer_skip_write(stuffer, bytes_to_write));
uint8_t* ptr = suffer->blob.data + stuffer->write_cursor - bytes_to_write;
which could be simplified.
Solution:
*ptr
could be an *out
parameter to s2n_stuffer_skip_write
- Does this change what S2N sends over the wire? No.
- Does this change any public APIs? No.
-
Updated
Sep 2, 2021 - C
-
Updated
Sep 3, 2021 - Java
Suggested enhancement
The max_content_len (in and out) is configurable at compile time only. It is used in mbedtls_ssl_setup for alloc memory.
Justification
When in need of having 2 tls sessions to different servers, even if one server is not supporting max_content_len, both sessions are forced to have 16k of IN buffer since it is a compile time option. If configurable at run time,
-
Updated
Sep 4, 2021 - C++
-
Updated
Jul 23, 2021 - Python
-
Updated
Aug 1, 2021 - Kotlin
-
Updated
Mar 28, 2021 - Objective-C
-
Updated
Apr 1, 2021 - Go
-
Updated
Sep 4, 2021 - C#
Improve this page
Add a description, image, and links to the ssl topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the ssl topic, visit your repo's landing page and select "manage topics."
Checklist
Issue Description
When using the RateLimiter Middleware with a rate between 0 and 1 all events will be rejected instead of applying the specified rate. E.g.:
e.Use(middleware.RateLimiter(middleware.NewRateLimiterMemoryStore(0.5)))
I am not saying that it is a common use case to have