Code Monkey home page Code Monkey logo

logback-dendrobe-apollo's Introduction

logback-dendrobe-apollo

Build Maven Central MIT Licence GitHub code size

Quality Gate Status

Reliability Rating Bugs

Security Rating Vulnerabilities

Maintainability Rating Technical Debt Code Smells

Lines of Code Coverage Duplicated Lines (%)

使用Apollo热更新logback-dendrobe配置.

Maven Dependency
<dependency>
  <groupId>com.github.charlemaznable</groupId>
  <artifactId>logback-dendrobe-apollo</artifactId>
  <version>2024.0.0</version>
</dependency>
Maven Dependency SNAPSHOT
<dependency>
  <groupId>com.github.charlemaznable</groupId>
  <artifactId>logback-dendrobe-apollo</artifactId>
  <version>2024.0.1-SNAPSHOT</version>
</dependency>

本地配置需要读取的Apollo配置坐标

在本地类路径默认配置logback-dendrobe.properties文件中, 添加如下配置:

logback.apollo.namespace=XXX
logback.apollo.propertyName=YYY

即指定使用Apollo配置namespace:XXX property:YYY热更新logback-dendrobe配置.

logback.apollo.namespace配置默认值: Logback logback.apollo.propertyName配置默认值: default

使用Apollo配置logback-dendrobe数据库日志的Eql连接

当配置数据库日志为{logger-name}[eql.connection]=XXX时, 读取Apollo配置namespace:EqlConfig property:XXX作为Eql连接配置.

使用Apollo配置logback-dendrobe Vert.x日志的Vert.x实例

当配置Vert.x日志为{logger-name}[vertx.name]=XXX时, 读取Apollo配置namespace:VertxOptions property:XXX作为Vert.x实例配置.

使用Apollo配置logback-dendrobe ElasticSearch日志的es客户端

当配置ElasticSearch日志为{logger-name}[es.name]=XXX时, 读取Apollo配置namespace:EsConfig property:XXX作为es客户端配置.

logback-dendrobe-apollo's People

Contributors

charlemaznable avatar

Stargazers

Vince Fulco--Bighire.tools avatar

Watchers

James Cloos avatar  avatar  avatar

logback-dendrobe-apollo's Issues

同学,您这个项目引入了94个开源组件,存在2个漏洞,辛苦升级一下

检测到 CharLemAznable/logback-dendrobe-apollo 一共引入了94个开源组件,存在2个漏洞

漏洞标题:Apache Commons HttpClient Amazon FPS 输入验证错误漏洞
缺陷组件:commons-httpclient:[email protected]
漏洞编号:CVE-2012-5783
漏洞描述:HttpClient是Apache Jakarta Common下的子项目,用来提供高效的支持HTTP协议的客户端编程工具包。
Apache Commons HttpClient 3.x版本使用在Amazon Flexible Payments Service (FPS) merchant Java SDK以及其他产品中时存在漏洞,该漏洞源于在主题Common Name(CN)或X.509证书的subjectAltName字段中,程序没有对服务器主机名与域名的匹配进行校验。中间人攻击者利用该漏洞通过任意有效的证书欺骗SSL服务器。
影响范围:[0, ∞)
最小修复版本:
缺陷组件引入路径:com.github.charlemaznable:[email protected]>com.github.charlemaznable:[email protected]>com.github.bingoohuang:[email protected]>commons-httpclient:[email protected]

另外还有2个漏洞,详细报告:https://mofeisec.com/jr?p=a9079e

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.