talmeme
talmeme
I get the same error as in the issue subject with Keycloak. Making the following change worked for me: ``` --- a/Sources/ImperialKeycloak/KeycloakRouter.swift +++ b/Sources/ImperialKeycloak/KeycloakRouter.swift @@ -9,6 +9,7 @@ public class...
I have litestream working with Oracle Cloud S3-compatible storage. The key is to use https endpoint, like this in my config: ``` dbs: - path: app.db replicas: - type: s3...
litestream works with more than just AWS S3. I'm using litestream with Oracle Cloud's S3-compatible storage. It would be confusing to be using `AWS_` variables with non-AWS S3-type storage.
Do it in two steps. Here's my Bun snippet using Zenity to input the passphrase: ``` const fileprovider: oci.ConfigFileAuthenticationDetailsProvider = new oci.ConfigFileAuthenticationDetailsProvider(); const cmd = ["/bin/zenity", "--entry", "--width", "300", "--title",...
See my [SQLcipher integration](https://github.com/talmeme/litestream/tree/sqlcipher) for the WAL version of litestream. I'm using this with a Swift [Vapor](https://github.com/vapor/vapor/) app backing up to S3-compatible storage. New LTX litestream uses a different underlying...
So, LTX uses [modernc-sqlite](https://gitlab.com/cznic/sqlite), and the work to [add SQLcipher](https://gitlab.com/cznic/sqlite/-/issues/138) to it appears to be substantially more than adding to [mattn-sqlite3](https://github.com/mattn/go-sqlite3/) which the WAL version uses.
libsql uses [SQLite3 Multiple Ciphers](https://utelle.github.io/SQLite3MultipleCiphers/), not SQLcipher. SQLite3 Multiple Ciphers uses SQLite's VFS mechanism, unlike SQLcipher which uses SQLite's old codec hooks. The question becomes: Does modernc-sqlite support SQLite3 Multiple...
I have a [working integration](https://github.com/talmeme/sqlite-nio/tree/sqlcipher), with corresponding [SQLite-Kit](https://github.com/talmeme/sqlite-kit/tree/sqlcipher) and [Fluent SQLite driver](https://github.com/talmeme/fluent-sqlite-driver/tree/sqlcipher). And a [demo](https://github.com/talmeme/vapor-sqlcipher-demo). Tested working on macOS Sonoma aarch64 and Ubuntu 22.04 aarch64 with Swift v5.10.
> If this can be achieved using Swift Crypto we can probably looking at merging it. Otherwise it's probably a no go SQLcipher is implemented in C using SQLite's deprecated...
I agree on tomcrypt. I use it because that's what [Skip](https://github.com/skiptools/skip-sql) does, so I started with something known working. I now see that it is easy to link SQLcipher with...