New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Save sensor readings to timeseries database #194
base: master
Are you sure you want to change the base?
Commits on May 1, 2018
Commits on May 2, 2018
Commits on May 3, 2018
Commits on May 4, 2018
Commits on May 16, 2018
Commits on May 17, 2018
Commits on May 18, 2018
Commits on May 23, 2018
-
Added additional parameters to configure timeseries database queries …
…(kairos_db_sampling_value, kairos_db_start_relative)
Commits on Sep 23, 2018
-
Import boil time alerts from BeerXML
By reading the HOP and MISC elements, the 'please add your hop' alerts may be imported.
-
removed lines 37 and 38 to make hysteresis work properly.
-
-
-
-
-
Merge pull request #4 from Manuel83/master
Keep up to date with original fork from Manuel
Commits on Oct 28, 2018
-
beer.xml exports from "BrewersFriend" can contain a tag like "<STEP_T…
…IME></STEP_TIME>" which led to a float converting error. Now this will be interpreted as Step_Time = 0.0
Commits on Nov 1, 2018
-
beer.xml import differentates between mash step or mash in step, depe…
…nding on timer > 0.
-
start event is called everytime a new step starts. So a new value for…
… "active_brew" will only be generated if the value before was "none". The value is "none" either after initializing the app or after the process got stopped. That leaves one potentiall error: if a process is started and the app needs a restart. In this case a new value for "active_brew" would be unecessarily generated.
-
Update package because of vulnerability
Flask: CVE-2018-1000656 More information moderate severity Vulnerable versions: < 0.12.3 Patched version: 0.12.3 The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. Requests: CVE-2018-18074 More information moderate severity Vulnerable versions: <= 2.19.1 Patched version: 2.20.0 The Requests package through 2.19.1 before 2018-09-14 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
-