Istio audit report - ADA Logics - 2023-01-30 - v1.0requests made on an h2c connection, which could lead to a denial of service scenario if a large request was sent. This is a vulnerability, however, to be vulnerable, users would need the MultiplexHTTP H2c requests which is: “The first request on an h2c connection is read entirely into memory before the Handler is called. To limit the memory consumed by this request, wrap the result of NewHandler in in an http.MaxBytesHandler.” John found that when the recommended MaxBytesHandler was used, the request body was not fully consumed, meaning that when a server attempts to read HTTP2 frames from the connection0 码力 | 55 页 | 703.94 KB | 1 年前3
Dapr september 2023 security audit reportapplication - this is the responsibility of the application to ensure. For example, if Dapr sends a request to a NodeJS application that triggers a remote code execution vulnerability in the NodeJS 10 Dapr be able to send any request to the Dapr sidecar without compromising Dapr; It is Daprs responsibility to take adequate measures to harden itself against any potentially harmful request. The trust boundary need to harden against compromises later in the dataflow; For example, an untrusted user may send a request to the user application that compromises neither the user application nor the Dapr sidecar nor a0 码力 | 47 页 | 1.05 MB | 1 年前3
BAETYL 1.0.0 Documentationservice instance as environment variables which can be read by instance and sent to the Master in request header. It should be noted that the dynamically launched instance cannot obtain the Token, so the the service instance to the Baetyl Master. The content of the report is placed in the body of the request, and JSON format is used. The first layer of the JSON field is used as the key and its value will development community has been growing fast, so we encourage developers to submit code. And please file Pull Requests from your fork. To make a fork, please refer to Github page and click on the “Fork” button0 码力 | 135 页 | 15.44 MB | 1 年前3
Apache Kyuubi 1.8.1 Documentationexecute ag LDAP Server. If this query returns a null resultset, the LDAP P fails the Authentication request, succeeds if the user is part of t resultset.For example: (&(objectClass=group)(objectClass (ins tokens boolean 1.4.0 kyuubi.credentials.hadoopfs.uris Extra Hadoop filesystem URIs for which to request delegation tokens. The filesystem that hosts fs.defaultFS does not need to be listed here. seq 1 kyuubi.ctl.rest.request.attempt.wait PT3S How long to wait between attempts of ctl rest request. duration 1.6.0 kyuubi.ctl.rest.request.max.attempts 3 The max attempts number for ctl rest request. int 1.6.00 码力 | 405 页 | 5.28 MB | 1 年前3
Apache Kyuubi 1.8.0-rc0 DocumentationLDAP Server. If this query returns a null resultset, the LDAP Provider fails the Authentication request, succeeds if the user is part of the resultset.For example: (&(objectClass=group) (objectClass=top) Meaning Type Since kyuubi.credentials. hadoopfs.uris Extra Hadoop filesystem URIs for which to request delegation tokens. The filesystem that hosts fs.defaultFS does not need to be listed here. seq 1 How long to wait between attempts of ctl rest request. durati on 1.6.0 kyuubi.ctl.rest.requ est.max.attempts 3 The max attempts number for ctl rest request. int 1.6.0 kyuubi.ctl.rest.sock et.timeout PT2M0 码力 | 428 页 | 5.28 MB | 1 年前3
Apache Kyuubi 1.8.0-rc1 DocumentationLDAP Server. If this query returns a null resultset, the LDAP Provider fails the Authentication request, succeeds if the user is part of the resultset.For example: (&(objectClass=group) (objectClass=top) Meaning Type Since kyuubi.credentials. hadoopfs.uris Extra Hadoop filesystem URIs for which to request delegation tokens. The filesystem that hosts fs.defaultFS does not need to be listed here. seq 1 How long to wait between attempts of ctl rest request. durati on 1.6.0 kyuubi.ctl.rest.requ est.max.attempts 3 The max attempts number for ctl rest request. int 1.6.0 kyuubi.ctl.rest.sock et.timeout PT2M0 码力 | 429 页 | 5.28 MB | 1 年前3
Apache Kyuubi 1.8.0 DocumentationLDAP Server. If this query returns a null resultset, the LDAP Provider fails the Authentication request, succeeds if the user is part of the resultset.For example: (&(objectClass=group) (objectClass=top) Meaning Type Since kyuubi.credentials. hadoopfs.uris Extra Hadoop filesystem URIs for which to request delegation tokens. The filesystem that hosts fs.defaultFS does not need to be listed here. seq 1 How long to wait between attempts of ctl rest request. durati on 1.6.0 kyuubi.ctl.rest.requ est.max.attempts 3 The max attempts number for ctl rest request. int 1.6.0 kyuubi.ctl.rest.sock et.timeout PT2M0 码力 | 429 页 | 5.28 MB | 1 年前3
Apache Kyuubi 1.9.0-SNAPSHOT Documentationexecute ag LDAP Server. If this query returns a null resultset, the LDAP P fails the Authentication request, succeeds if the user is part of t resultset.For example: (&(objectClass=group)(objectClass (ins tokens boolean 1.4.0 kyuubi.credentials.hadoopfs.uris Extra Hadoop filesystem URIs for which to request delegation tokens. The filesystem that hosts fs.defaultFS does not need to be listed here. seq 1 kyuubi.ctl.rest.request.attempt.wait PT3S How long to wait between attempts of ctl rest request. duration 1.6.0 kyuubi.ctl.rest.request.max.attempts 3 The max attempts number for ctl rest request. int 1.6.00 码力 | 405 页 | 4.96 MB | 1 年前3
Apache Kyuubi 1.3.0 Documentationmeans that an application may give resources back to the cluster if they are no longer used and request them again later when there is demand. This feature is handy if multiple applications share resources workloads. When dynamic allocation is enabled, and an engine has a backlog of pending tasks, it can request executors via ExecutorAllocationManager. When the engine has executors that become idle, the executors config called spark.dynamicAllocation.initialExecutors can be used to decide how many executors to request during engine bootstrapping or failover. Ideally, the size relationship between them should be as0 码力 | 129 页 | 6.15 MB | 1 年前3
Apache Kyuubi 1.3.1 Documentationmeans that an application may give resources back to the cluster if they are no longer used and request them again later when there is demand. This feature is handy if multiple applications share resources workloads. When dynamic allocation is enabled, and an engine has a backlog of pending tasks, it can request executors via ExecutorAllocationManager. When the engine has executors that become idle, the executors config called spark.dynamicAllocation.initialExecutors can be used to decide how many executors to request during engine bootstrapping or failover. Ideally, the size relationship between them should be as0 码力 | 129 页 | 6.16 MB | 1 年前3
共 380 条
- 1
- 2
- 3
- 4
- 5
- 6
- 38













