-
Updated
Dec 31, 2021
identity
Here are 1,101 public repositories matching this topic...
-
Updated
Dec 9, 2021 - C#
-
Updated
Dec 18, 2021 - Ruby
The upstream issues got closed. It is referenced in:
This issue was created by the ORY Closed Reference Notifier GitHub action.
Is your feature request related to a problem? Please describe.
As observed during #261, users can accidentally set timeouts inconsistently. A concrete example is that one can set a User facing timeout lower than any backend timeout, such that requests may fail early.
Describe the solution you'd like
We should provide some sanity checking to prevent unintended timeout behavior.
Is your feature request related to a problem? Please describe.
Similar to how Bitcoin has a prune=1 option that removes old blocks, Stacks should have this too to save storage space on nodes.
Describe the solution you'd like
An option in the config to prune chaindata via RPC or limiting it to a certain number of MiB
Describe alternatives you've considered
None
-
Updated
Dec 23, 2021 - Python
Fix credo lint
Merge of ockam-network/ockam#2237 is blocked until we fix:
https://github.com/ockam-network/ockam/runs/4669292104?check_suite_focus=true#step:6:167
Refactoring opportunities
┃
┃ [F] ↗ the `with` statement is redundant
┃ lib/ockam/transport/udp/listener.ex:57 #(Ockam.Transport.UDP.Listener.setup_routed
cc @jcnelson from this forum post.
There should be a setting added that allows the user to adjust the URL for the transaction broadcaster in regards to acquiring names. Should be fairly simple to implement unless it is tied within blockstack.js, in which case an issue would need to
-
Updated
Dec 11, 2021 - Java
-
Updated
Dec 30, 2021 - Rust
msal 4.37
error message from AAD
{
"error": "invalid_scope",
"error_description": "AADSTS70011: The provided value for the input parameter 'scope' is not valid. The scope https://example.contoso.com/activity.read is not valid.\r\nTrace ID: 255d1aef-8c98-452f-ac51-23d051240864\r\nCorrelation ID: fb3d2015-bc17-4bb9-bb85-30c5cf1aaaa7\r\nTimestamp: 2016-01-09 02:02:12Z",
"error_cod
-
Updated
Jan 3, 2022 - C#
-
Updated
Jan 6, 2022 - C
-
Updated
Aug 1, 2021 - HTML
Describe the bug
If the environment (in my case the stage environment) is not setup as a a secure origin the library break up cause of the crypto library is not in window object
To Reproduce
Steps to reproduce the behavior:
- A server work on http that is setup as 'insecure origin'
- Start the login sequence
Expected behavior
Warning on library loading that check secure or
-
Updated
Jul 24, 2021 - Shell
-
Updated
Jan 2, 2022 - TypeScript
-
Updated
Jan 6, 2022 - Python
-
Updated
Dec 28, 2021 - Dart
-
Updated
May 31, 2021
Describe the issue:
The links not show hover states on hover on the getting started page.
How to reproduce:
- Navigate to getting started page
- hover over any link
Expected behavior:
Should indicate hover state for links
-
Updated
Jan 6, 2022 - JavaScript
-
Updated
Dec 19, 2021 - Java
-
Updated
Dec 20, 2021 - C#
-
Updated
Jan 7, 2022 - Java
-
Updated
Jun 12, 2021 - HTML
-
Updated
Dec 31, 2021 - C#
Improve this page
Add a description, image, and links to the identity topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the identity topic, visit your repo's landing page and select "manage topics."


Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit