Block or Report
Block or report BruceMacD
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abusePinned
-
-
panoptic-future/vvallet Public
Proof of online identity using your cryptocurrency wallet
TypeScript 1
-
Adversarial-Faces Public
Testing the effectiveness of practical implementations of adversarial examples against facial recognition.
-
-
MNIST-Blackbox-Attack Public
A Jupyter Notebook Demo of the CleverHans MNIST Blackbox Attack
1,352 contributions in the last year
Activity overview
Contribution activity
June 2022
Created 32 commits in 2 repositories
Created a pull request in infrahq/infra that received 8 comments
fix: migrate destination request CA from string
Summary
When using a connector on versions 0.13.1
and earlier they were unable to parse the CA response on destination requests as they were expect…
Opened 21 other pull requests in 1 repository
infrahq/infra
20
merged
1
open
- fix: do not update provider user groups in sync
- OIDC Provider Tests
- fix: update providers add example
- feat: azure groups
- maintain: update azure setup docs for groups
- maintain: add kind to providers
- fix: remove agent message
- maintain: document default connector key lifetime
- maintain: make the agent optional
- maintain: document general oidc config
- maintain: document google oidc config
- fix: set the auth cookie to the bearer value
- maintain: document azure oidc config
- fix: specify email fields in the API doc
- fix: do not warn about the connector identity
- fix: remove period from users cmd help
- maintain: validate contents of user info response
- fix: deadlock before ingress ready
- fix: require user to have an email
- fix: remove identity from CLI help
- maintain: extended infra sessions
Reviewed 105 pull requests in 1 repository
infrahq/infra
25 pull requests
- OIDC Provider Tests
- improve: add indications for end page
- maintain(ui): lint and format ui code
- tls: generate server TLS cert from CA
- maintain(deps): bump github.com/goware/urlx from 0.3.1 to 0.3.2
- maintain(deps): bump github.com/aws/aws-sdk-go from 1.44.37 to 1.44.42
- maintain(deps-dev): bump tailwindcss from 3.1.3 to 3.1.4 in /ui
- maintain(deps): bump @headlessui/react from 1.6.4 to 1.6.5 in /ui
- fix: connector service query
- maintain(docs): revert openapi json version to the next version to avoid dirty checkouts
- server: accept TLS certificate and key
- Add rm users and groups
- improve: log authn errors
- maintain: revert build changes temporarily
- feat(ui): Improved experience around granting and listing access
- improve: bump dev pods after docker upload
- Temporary password should only allow for updating password
- fix: db migration from 0.13.3
- feat: azure groups
- fix(ui): fix a few edge cases around missing namespaces and no admin access
- maintain: remove additional* helm server values
- improve: errors on duplicate grant
- improve: build and release candidate artifacts
- data: add a migration for dropped tables
- Use request context for oidc calls
- Some pull request reviews not shown.
Created an issue in infrahq/infra that received 2 comments
Errors parsings Snowflake IDs that are not in the expected format should be handled
Describe the bug If an ID is encountered that is not in the expected base58 encoding this causes an error to be thrown. It has been observed in som…
Opened 14 other issues in 1 repository
infrahq/infra
9
open
5
closed
- Azure OIDC Providers client ID and client secret cannot be valdiated on creation
- Infra providers should be editable
- Consistency in opening/closing cluster namespaces
- OIDC testing
- Send identity provider auth URL in providers list
- Better error message from CLI on EOF response
- Change internal Infra provider look-up to be done by kind rather than name
- Keys created for the connector expire after 30 days by default
- Track Identity Provider Kind
- Removing provider should revoke all access keys issued using that provider
- Validate User Info has Required Fields
- Google OIDC + group support
- Docs: setup for various identity providers
- UI doesn't redirect to login on 401 response