Stephan

Results 11 issues of Stephan

Hi everyone, we accidentally leaked the `SECRET_KEY` of a test environment that was used for decrypting model fields using this library. In such a case, to be on the safe...

Hi :) I have just noticed that there is duplicate documentation about the `--requests-only` feature: First occurrence: * makes it sounds like the feature is well suited to satisfy “pip...

documentation

Exported data contains long floating point numbers such as `0.0000032120027740023963`. Due to the nature of the floating points numbers, aggregating those can lead to unstable results as the addition is...

From the [Elastic documentation](https://www.elastic.co/guide/en/apm/guide/8.9/sampling.html): > Head-based sampling is implemented in the APM agents and SDKs, and requires the sample rate to be propagated between services and the APM Server. This...

**APM Server version** (`apm-server version`): 8.13.2 **Description of the problem including expected versus actual behavior**: I believe there is a regression in the number of bulk requests/s emitted by APM...

bug

@msolo @multicharts and others: You seem to be maintaining various forks with several fixes (e.g zk re-auth). Would anyone of you consider to contribute your patches back here? Right now...

If I create a DB and an associated user, I also get the permission to view and potentially edit other database instances.

I have successfully validated my config using the command `devpi-ldap`. I can also start the server either without the `--ldap-config` flag or without the `--start`flag. However, when using _both_, the...

not in devpi-ldap

This great playbook supports a variety of usecases. Unfortunately, it is rather difficult for a beginner to get started. - A few simple examples will be rather helpful. For inspiration,...

Inspired by the [Server Side Request Forgery](https://cwe.mitre.org/data/definitions/918.html) security incident described [here](https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/) with [important background on HN](https://news.ycombinator.com/item?id=10079554), I would like to filter access originating and targeting the loopback interface. In order...