External storage and codec server sample#307
Conversation
|
Semgrep found 6
Risk: Affected versions of aiohttp are vulnerable to Allocation of Resources Without Limits or Throttling / Improper Handling of Highly Compressed Data (Data Amplification). Unbounded decompression of compressed request bodies in aiohttp's server allows an attacker to send a specially crafted "zip bomb" (e.g. via Content-Encoding: gzip) that expands to an arbitrarily large payload in memory, exhausting host resources and causing a denial-of-service. Fix: Upgrade this library to at least version 3.13.3 at samples-python/uv.lock:65. Reference(s): GHSA-6mq8-rvhq-8wgg, CVE-2025-69223 |
cconstable
left a comment
There was a problem hiding this comment.
👍 Very neat. Learned about X-Namespace and preserveStorageRefs from reviewing this.
What was changed
Add sample for external storage with codec server that supports multiple namespaces and downloads.
Why?
Provide a baseline reference for how to use external storage with the S3 driver and an updated codec server.
Checklist