-
Notifications
You must be signed in to change notification settings - Fork 168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support SCRAM authentication #1
Labels
enhancement
New feature or request
Comments
Also (paradoxically) channel binding, both inbound from apps and outbound to the DB. |
Yes, we have SCRAM, but do not have channel binding yet... |
This was referenced Mar 12, 2022
chipitsine
added a commit
to chipitsine/odyssey
that referenced
this issue
Feb 23, 2024
found by Coverity 288error: 289 /* unlock hashmap entry */ 290 od_hashmap_unlock_key(storage->acache, keyhash, &key); CID 486482: (yandex#1 of 1): Missing unlock (LOCK) 8. missing_unlock: Returning without unlocking router->lock. 291 return NOT_OK_RESPONSE;
chipitsine
added a commit
to chipitsine/odyssey
that referenced
this issue
Feb 24, 2024
found by Coverity 288error: 289 /* unlock hashmap entry */ 290 od_hashmap_unlock_key(storage->acache, keyhash, &key); CID 486482: (yandex#1 of 1): Missing unlock (LOCK) 8. missing_unlock: Returning without unlocking router->lock. 291 return NOT_OK_RESPONSE;
chipitsine
added a commit
to chipitsine/odyssey
that referenced
this issue
Jun 4, 2024
1920 rule->user_name = strdup(route_usr); deref_ptr_in_call: Dereferencing pointer rule->user_name. 1921 rule->user_name_len = strlen(rule->user_name); CID 493651: (yandex#1 of 1): Dereference before null check (REVERSE_INULL) check_after_deref: Null-checking rule->user_name suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
chipitsine
added a commit
to chipitsine/odyssey
that referenced
this issue
Jun 4, 2024
deref_ptr_in_call: Dereferencing pointer rule->db_name. 1927 rule->db_name_len = strlen(rule->db_name); CID 493650: (yandex#1 of 1): Dereference before null check (REVERSE_INULL) check_after_deref: Null-checking rule->db_name suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
chipitsine
added a commit
to chipitsine/odyssey
that referenced
this issue
Jun 7, 2024
found by coverity CID 486268: (yandex#1 of 1): Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN) overflow_before_widen: Potentially overflowing expression timeout * 1000U with type unsigned int (32 bits, unsigned) is evaluated using 32-bit arithmetic, and then used in a context that expects an expression of type int64_t (64 bits, signed). To avoid overflow, cast either timeout or 1000U to type int64_t rather than casting the result of the potential overflow. 1428 (int64_t)(timeout * 1000 /
chipitsine
added a commit
to chipitsine/odyssey
that referenced
this issue
Jun 10, 2024
found by coverity CID 477241: (yandex#1 of 1): Out-of-bounds access (OVERRUN) 1. overrun-buffer-arg: Overrunning buffer pointed to by &rules of 8 bytes by passing it to a function which accesses it at byte offset 15 using argument 16UL. 37 memcpy(&hba->rules, &rules, sizeof(hba->rules));
x4m
pushed a commit
that referenced
this issue
Jun 11, 2024
found by coverity CID 477241: (#1 of 1): Out-of-bounds access (OVERRUN) 1. overrun-buffer-arg: Overrunning buffer pointed to by &rules of 8 bytes by passing it to a function which accesses it at byte offset 15 using argument 16UL. 37 memcpy(&hba->rules, &rules, sizeof(hba->rules));
chipitsine
added a commit
to chipitsine/odyssey
that referenced
this issue
Jun 12, 2024
found by coverity 10. var_decl: Declaring variable empty_va_list without initializer. 545 va_list empty_va_list; CID 477250: (yandex#1 of 1): Uninitialized pointer read (UNINIT) 11. uninit_use_in_call: Using uninitialized value empty_va_list when calling od_logger_format.["show details"]
chipitsine
added a commit
to chipitsine/odyssey
that referenced
this issue
Aug 18, 2024
527 while (retry_cnt--) { CID 508598: (yandex#1 of 1): Use after free (USE_AFTER_FREE) 13. deref_arg: Calling od_ldap_server_auth dereferences freed pointer serv.[show details] 528 ldap_rc = od_ldap_server_auth(serv, cl, tok); 529 530 od_ldap_endpoint_lock(cl->rule->ldap_endpoint); Signed-off-by: Ilia Shipitsin <chipitsine@gmail.com>
rkhapov
pushed a commit
that referenced
this issue
Jan 13, 2025
* sources/logger.c: initialize empty_va_list found by coverity 10. var_decl: Declaring variable empty_va_list without initializer. 545 va_list empty_va_list; CID 477250: (#1 of 1): Uninitialized pointer read (UNINIT) 11. uninit_use_in_call: Using uninitialized value empty_va_list when calling od_logger_format.["show details"] * ok, clang-format
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
No description provided.
The text was updated successfully, but these errors were encountered: