Tom Raganowicz

Results 44 comments of Tom Raganowicz

Here: https://github.com/rclone/rclone/compare/master...tomekit:rclone:envelope_encryption_7192_2#diff-d60621b19be9d97af46259d24a081ffd84864417b2cf80a8178f8e713db9264aR839 I've implemented truncation protection, that's approach from STREAM cipher: https://github.com/miscreant/meta/wiki/STREAM (I was also influenced by a helpful response on Crypto Stack Exchange: https://crypto.stackexchange.com/a/106992/70896) 24 bytes nonce consists now...

I've took time to integrate proposed changes into `crypt` command using the additional: `cipher_version` config param. By default existing: "1" version is used. User may enable new version: "2" explicitly...

Thanks for the heads up. I wasn't aware it's not publicly visible since I was viewing it from my own account. I've pushed these changes now to public fork. V2...

I was wondering if you managed to get to the root cause of this. We're also experiencing duplicate entries in the keychain.

Did anynone managed to find out new password?

In our case when app is closed for more than an hour, token expires which is expected. Problem happens when app is started again, we then issue the API request...

Hi @Vinzent03, Sorry for late reply. In our case we're using Supabase mostly for auth and then pass JWT to external APIs outside of Supabase ecosystem. I think it's fair...

Thanks for you reply. I've just double checked our codebase and that's actually what we've been doing already... and in fact it should behave as you describe. Sorry for the...

There is some breaking change in a minor release: `v2.67.1` (https://github.com/supabase/gotrue/compare/v2.67.0...v2.67.1). In our case, after upgrading Docker image to anything above `v2.67.1` (including current latest) turns the account confirmation URL...

I suspect that it's part of the: `isValidExternalHost` function which unintentionally modifies the URL, specifically: ```golang baseUrl := config.API.ExternalURL xForwardedHost := req.Header.Get("X-Forwarded-Host") xForwardedProto := req.Header.Get("X-Forwarded-Proto") if xForwardedHost != "" &&...