-
**Describe the problem**
During txn conflicts/deadlock detection, we issue PushTxns[^1] and QueryTxns[^2] as requests that bypass AC (note the missing AC headers in the references below). Bypassing…
-
Hi,
I'm working on a traffic camera that should record footage from intersections within a defined time period, such as from 6 to 10 a.m. and from 3 to 7 p.m. I want the videos to be split into seg…
-
**Describe the bug**
Found a repeatable condition to bid below the price of my previous bid. It's possible to obtain all currency achievements using this method because each rejected bid counts a…
-
I got modelz running (haven't gotten openmodelz running yet) but it looks like "import openai" poisons something, not sure what, and complain that "any" is not the password, as well as endpoints have …
-
-
On 1.33 at random in the middle of a game, chips become "unreachable" : attacker pass through them without being affect.
I get the issue after level 30 at least.
-
Currently, when we do an `InMemoryLayer::write_to_disk`, there is a tremendous amount of random read I/O, as deltas from the ephemeral file (written in LSN order) are written out to the delta layer in…
-
### Link
https://bit.ly/3TGoW1Z
### Version
Manifest-v2
### What browser(s) are you using?
Firefox browsers
### What platform are you using?
Computer (Windows, Linux, MacOS)
### (Optional) Any…
-
## Expected Behavior
omr-bypass should continue to route traffic through one wan or the other
## Current Behavior
omr-bypass does not seem to have much effect at all. I have tried by domain, by …
-
Is it possible to bypass the built in auth methods in case there are other Auth mechanisms in place that you never the lass have to pass until you reach the headlamp frontend?