lazedo
lazedo
@andreineculau what was wrong with the original pull request and why is it failing this part?
@arentrue i think the initial external validators may not be fully explained. we have draft3/draft4 schemas that validate data, and.., for business extensions (validate a customer in a database, ....)...
` curr_ipv4="$( (head -n1
i'll try to figure out a solution to preserve the IP from the original network, don't worry. i'm using multus on some nodes and need to attach the network to...
maybe this is relevant [100 responses are not forwarded by proxies, so only include the topmost Via header](https://github.com/signalwire/freeswitch/blob/master/libs/sofia-sip/libsofia-sip-ua/nta/nta.c#L6465) from this https://github.com/signalwire/freeswitch/commit/6ed86abf9f6ab1116a39b28c651dec1d4f6cf89f
@bradfordben but the changes are breaking things, no ? specially the knm_numbers.
@bradfordben Hi, can't you do this on the client side before submitting ?
we added a `admin_roles` config. feel free to use/adapt the below (needs rebase) ``` diff --git a/src/couch/src/couch_httpd_auth.erl b/src/couch/src/couch_httpd_auth.erl index 24a0c15ed..07d4df4f3 100644 --- a/src/couch/src/couch_httpd_auth.erl +++ b/src/couch/src/couch_httpd_auth.erl @@ -230,21 +230,10 @@ jwt_authentication_handler(Req)...
another alternative would be to use `JMESPath` to evaluate the _admins https://github.com/thehangedman/jmespath-erlang the below was added to a POC of grafana ``` admin_attribute_path = contains(groups[*], 'myawesomeorg:admins') role_attribute_path = contains(groups[*], 'myawesomeorg:admins')...