Embedded Web Device Security

Total Page:16

File Type:pdf, Size:1020Kb

Embedded Web Device Security SECURWARE 2014 : The Eighth International Conference on Emerging Security Information, Systems and Technologies Embedded Web Device Security Michael Riegler Johannes Sametinger IT Solutions Dept. of Information Systems – Software Engineering RMTec Johannes Kepler University Baumgartenberg, Austria Linz, Austria [email protected] [email protected] Abstract —Due to the increasing networking of devices and access. We will outline the importance of the security of services to the Internet of Things, security requirements are such devices, demonstrate how neglected it is, and also pre- rising. Systems that were previously operated in isolation can sent a case study of a water supply facility. The paper is be attacked over the Internet today. Industrial control systems structured as follows. Section II introduces embedded web often form the core of critical infrastructures. Their vulnera- devices. In Section III, we outline security aspects. Risks to bilities and too lax security management can have fatal conse- industrial control systems are described in Section IV. Sec- quences. With the help of vulnerability databases and search tion V explains how vulnerable web devices can be found on engines, hackers can get instructions and targets to exploit. the Internet. A case study is given in Section VI. Related Routers, printers, cameras and other devices can be the gate- work and a conclusion follow in Sections VII and VIII, re- way to the home or corporate network. Cyber criminals can spectively. enter sensitive areas through inadequately protected remote access. In a case study of a central water supply control system, II. EMBEDDED WEB DEVICES we present typical security problems. We show that security vulnerabilities are wide-spread in current embedded web devi- The Internet has started as a DARPA project, intercon- ces and demonstrate that appropriate countermeasures can necting computers through which everyone could quickly reduce the attack surface significantly. access data and programs from any site. Today’s Internet provides access to a plethora of information from not just Keywords-web; embedded devices; web security; industrial computers – back then only mainframes were available – but control systems. from devices like smartphones, and television sets. Ad- ditionally, access is not limited to other computers but is I. INTRODUCTION increasingly available to other devices like printers, routers Embedded devices increasingly include connectivity as a or webcams. Web devices are any devices that are connected standard feature, putting them at risk to malicious attack if to the Internet via the Hypertext Transfer Protocol (HTTP) not secured properly. Some device vendors are offering protocol, including web servers, personal computers and solutions to protect their embedded devices, including anti- smartphones. Embedded web devices are with a different malware technology, access control, data encryption, and focus than just providing and retrieving information on the real-time threat analysis, as well as maintenance, support, web. We have already mentioned printers, routers, and and update/patch services [8]. However, there is insufficient webcams. Additional examples include network devices, awareness of both device manufacturers and their users sensors in smart homes, smart meters in smart grids, smart about the risks that stem from lacking protection. Take medi- TVs, etc. cal devices as an example. Today, even heart pacemakers communicate wirelessly. Parameter settings can be sent to A. Embedded Web Servers the devices, and usage data including alerts are automatically Web servers are running on a combination of hardware sent to manufacturers and clinics. If not properly secured, and software. They deliver web content to be accessed these devices are a threat to patients’ privacy as well as to through the Internet. Embedded web servers are components their well-being and even life [12]. Users of devices like of systems that, like web servers, communicate via the HTTP personal computers, smartphones as well as operators of web protocol. Typically, they provide a thin client interface for servers are typically aware to some extent about the security traditional applications. Lightweight web servers work with risks. Security risks of devices that we use more unobtrusive- small resources and are often used in embedded systems. ly often go unnoticed. Such devices include printers, routers, Examples include Barracuda [41], Mongoose [26], Appweb and cameras [14]. Their use is widespread, they are connect- [2], and RomPager [33]. Embedded web servers are used for ed to the Internet, they often provide web interfaces, and they special purpose and are not as extensive as major web serv- are often unprotected. On the road to a secure Internet of ers like Apache [1] and Microsoft’s IIS [25]. Things (IoT) [3], we will have to do our homework and Embedded web servers are important for the IoT. Today provide security as needed to all devices. computers and the Internet are almost completely dependent In this paper, we will describe security issues of what we on humans for information. Radio-frequency Identification call embedded web devices, i.e., embedded devices with web (RFID) and sensor technology enable computers to observe Copyright (c) IARIA, 2014. ISBN: 978-1-61208-376-6 1 SECURWARE 2014 : The Eighth International Conference on Emerging Security Information, Systems and Technologies and identify the world without the limitations of data entered ment. We can assess risks by enumerating the most critical by humans [3]. IoT refers to uniquely identifiable objects, and most likely threats, by evaluating their levels of risk as a e.g., sensors having an Internet Protocol (IP) address, and function of the probability of a threat and the associated cost their virtual representations in the Internet. if the threat becomes true. Secure devices have to continue to function correctly even if under malicious attack. Vulnerabil- B. ICS – Industrial Control Systems ities are mistakes in devices, typically in software, which can The term Industrial Control System (ICS) encompasses be directly used to gain access to the device. They pose a several types of control systems that are used in industrial threat to the device itself, to the information it contains, to production. Examples are Supervisory Control and Data other devices it communicates with, and to the environment Acquisition (SCADA) systems, Distributed Control Systems that it manipulates. (DCS), and Programmable Logic Controllers (PLC). ICSs are instrumental in the production of goods and in the provi- B. ICS Security sion of essential services, e.g., to monitor and control pro- ICSs are often found in critical infrastructures, thus have cesses like gas and electricity distribution or water treatment. a high need for security. A typical information network will The largest group of ICS is SCADA. For example, all nine prioritize its security objectives as CIA, i.e., first confidenti- Austrian Danube power plants are controlled centrally from ality and integrity, and then availability. Industrial control Vienna. The stations are connected with optical fibers to the systems often have a high need for availability, reversing the central control room and cannot easily be accessed over the security objectives for most control entities [8]. Table 1 Internet [42]. shows these different security goals. There are other crucial differences that have an influence C. CPS – Cyber Physical Systems on the security of these systems. Table 2 summarizes some Embedded systems contain computer systems with dedi- of these differences. For example, ICSs are usually real-time cated functions within larger mechanical or electrical sys- systems, whereas in IT systems delays are acceptable most tems, often having real-time computing constraints [13]. In of the time. Also, an ICS has to run continuously and cannot Cyber Physical Systems (CPS) computational elements col- simply be rebooted. More details are given by Stouffer et al. laborate to control physical entities. CPSs have a tight inte- [36]. gration of cyber objects and physical objects. They can be According to a security survey, 70% of SCADA system systems at various scales, e.g., large smart bridges with fluc- operators consider the risks to their systems to be high to tuation detection and responding functions, autonomous cars, severe, and 33% suspect they may have had incidents [21]. and tiny implanted medical devices [15]. While IT security is not entirely different from ICS security, there are several differences; see [22]: III. SECURITY Security is about protecting information and information • ICS security failures often have physical conse- systems, including embedded devices, from unauthorized quences, thus having more severe and immediate access and use. The core goals are to retain confidentiality, impact. integrity and availability of information. Often used terms • ICS security failures can easily and wrongly be in- include IT security, network security, computer security, web terpreted as traditional maintenance failures, making security, mobile security, and software security. They de- them more difficult to diagnose and remedy. scribe different, but sometimes overlapping aspects of reach- ing the above mentioned core goals. For example, software Security management of an ICS is often much more dif- security is “the idea of engineering software so that it contin- ficult than of a regular IT system. They more often rely
Recommended publications
  • 공개sw 솔루션 목록(2015.12.30)
    OS/DBMS/WEB/WAS 공개SW 솔루션 목록(2015.12.30) 순번 분류 솔루션명 라이선스 기술지원 홈페이지 제품개요 1 DBMS C-JDBC LGPL community http://c-jdbc.ow2.org/ 데이터베이스 클러스터 2 DBMS DB4 오브젝트(db4o) GPL & dOCL prof/community http://www.db4o.com 객체지향 메모리 데이터베이스 엔진 GPL v2, GPL v3, 3 DBMS Drizzle community http://www.drizzle.org/ MySQL 6.0에서 파생된 RDBMS BSD 4 DBMS H2 EPL, MPL community http://www.h2database.com/ 자바기반 RDBMS HSQLDB 5 DBMS (Hyper Structured Query BSD community http://www.hsqldb.org 경량의 Java 기반 관계형 데이터베이스 Language Database) 데이터 웨어하우스, OLAP서버, BI 시스템 운용을 목적으 6 DBMS LucidDB GPL v2, LGPL v2 community http://luciddb.sourceforge.net 로 개발된 오픈소스 DBMS GPL v3, AGPL v3, 7 DBMS Neo4j community http://www.neo4j.org 그래프 데이터베이스 commercial AGPL v3, 8 DBMS VoltDB Proprietary prof/community http://voltdb.com/ 인메모리기반 RDBMS License 오픈소스 관계형 데이터베이스 관리 시스템. 9 DBMS 마리아DB(MariaDB) GPLv2, LGPL prof/community https://mariadb.org/ MySQL과 동일한 소스 코드를 기반 세계에서 가장 널리 사용되고 있는 대표적인 10 DBMS 마이에스큐엘(MySQL) GPL v2 prof/community http://www.mysql.com 관계형 데이터베이스 ※ prof : Professional Support(전문업체 기술지원) ※ community : Community Support(커뮤니티 기술지원) OS/DBMS/WEB/WAS 공개SW 솔루션 목록(2015.12.30) 순번 분류 솔루션명 라이선스 기술지원 홈페이지 제품개요 IBM에서 기증한 cloudscape 소스 기반으로 11 DBMS 아파치 더비(Apache Derby) Apache v2 community http://db.apache.org/derby/ 개발된 Java 기반의 관계형 데이터베이스 Berkeley 오라클 버클리 DB Database License http://www.oracle.com/kr/products/database/ 슬리피캣을 인수한 오라클에서 제공하는 12 DBMS prof/community (Oracle Berkeley DB) or berkeley-db/index.html 고성능 임베디드 데이터베이스 Sleepycat License GPL or Postgresql 데이터베이스의 기반으로 상용화된 13 DBMS 잉그레스(Ingres) prof/community
    [Show full text]
  • Deviceside Software Update Strategies for Automotive Grade Linux
    Device­side Software Update Strategies for Automotive Grade Linux Konsulko Group, sponsored by ATS Advanced Telematic Systems GmbH Overview This whitepaper explores the area of software update strategies for devices running Automotive Grade Linux. The starting point is understanding several key use cases for updating software in an AGL1 system. Several open source device­side software update mechanisms are compared with a focus on their ability to meet the stated use cases. Finally, recommendations are made for an approach that can be implemented for inclusion in AGL. Use Cases and Requirements The topic of software update on any computing device is very broad and can only be examined properly by narrowing the scope of the system, operating conditions, and the policies established for executing a software update. The following sections describe the use cases considered when evaluating the various mechanisms that could be employed in an AGL software update strategy. System Description AGL systems include both IVI2 and ADAS3 devices that run Linux on at least one processor in the system. The complete IVI or ADAS system is not necessarily limited to a single processing node, but is normally part of a larger network that includes a number of ECU4 nodes throughout the automobile. Due to this distributed architecture it is often necessary to update software on 1 Automotive Grade Linux (https://www.automotivelinux.org/agl­specification) ​ 2 In­Vehicle Infotainment 3 Advanced Driver Assistance System 4 Electronic Control Unit Copyright 2016 Konsulko Group and ATS Advanced Telematic Systems GmbH CC BY­SA 3.0 US (https://creativecommons.org/licenses/by­sa/3.0/us/) ​ ​ the ECUs as well as the node running AGL.
    [Show full text]
  • Python Language
    Python Language #python Table of Contents About 1 Chapter 1: Getting started with Python Language 2 Remarks 2 Versions 3 Python 3.x 3 Python 2.x 3 Examples 4 Getting Started 4 Verify if Python is installed 4 Hello, World in Python using IDLE 5 Hello World Python file 5 Launch an interactive Python shell 6 Other Online Shells 7 Run commands as a string 7 Shells and Beyond 8 Creating variables and assigning values 8 User Input 12 IDLE - Python GUI 13 Troubleshooting 14 Datatypes 15 Built-in Types 15 Booleans 15 Numbers 15 Strings 16 Sequences and collections 16 Built-in constants 17 Testing the type of variables 18 Converting between datatypes 18 Explicit string type at definition of literals 19 Mutable and Immutable Data Types 19 Built in Modules and Functions 20 Block Indentation 24 Spaces vs. Tabs 25 Collection Types 25 Help Utility 30 Creating a module 31 String function - str() and repr() 32 repr() 33 str() 33 Installing external modules using pip 34 Finding / installing a package 34 Upgrading installed packages 34 Upgrading pip 35 Installation of Python 2.7.x and 3.x 35 Chapter 2: *args and **kwargs 38 Remarks 38 h11 38 h12 38 h13 38 Examples 39 Using *args when writing functions 39 Using **kwargs when writing functions 39 Using *args when calling functions 40 Using **kwargs when calling functions 41 Using *args when calling functions 41 Keyword-only and Keyword-required arguments 42 Populating kwarg values with a dictionary 42 **kwargs and default values 42 Chapter 3: 2to3 tool 43 Syntax 43 Parameters 43 Remarks 44 Examples 44 Basic
    [Show full text]
  • An Analysis of Python's Topics, Trends, and Technologies Through Mining Stack Overflow Discussions
    1 An Analysis of Python’s Topics, Trends, and Technologies Through Mining Stack Overflow Discussions Hamed Tahmooresi, Abbas Heydarnoori, and Alireza Aghamohammadi F Abstract—Python is a popular, widely used, and general-purpose pro- (LDA) [3] to categorize discussions in specific areas such gramming language. In spite of its ever-growing community, researchers as web programming [4], mobile application development [5], have not performed much analysis on Python’s topics, trends, and tech- security [6], and blockchain [7]. However, none of them has nologies which provides insights for developers about Python commu- focused on Python. In this study, we shed light on the nity trends and main issues. In this article, we examine the main topics Python’s main areas of discussion through mining 2 461 876 related to this language being discussed by developers on one of the most popular Q&A websites, Stack Overflow, as well as temporal trends posts, from August 2008 to January 2019, using LDA based through mining 2 461 876 posts. To be more useful for the software topic modeling . We also analyze the temporal trends of engineers, we study what Python provides as the alternative to popular the extracted topics to find out how the developers’ interest technologies offered by common programming languages like Java. is changing over the time. After explaining the topics and Our results indicate that discussions about Python standard features, trends of Python, we investigate the technologies offered web programming, and scientific programming 1 are the most popular by Python, which are not properly revealed by the topic areas in the Python community.
    [Show full text]
  • Comparison of Web Server Software from Wikipedia, the Free Encyclopedia
    Create account Log in Article Talk Read Edit ViewM ohrisetory Search Comparison of web server software From Wikipedia, the free encyclopedia Main page This article is a comparison of web server software. Contents Featured content Contents [hide] Current events 1 Overview Random article 2 Features Donate to Wikipedia 3 Operating system support Wikimedia Shop 4 See also Interaction 5 References Help 6 External links About Wikipedia Community portal Recent changes Overview [edit] Contact page Tools Server Developed by Software license Last stable version Latest release date What links here AOLserver NaviSoft Mozilla 4.5.2 2012-09-19 Related changes Apache HTTP Server Apache Software Foundation Apache 2.4.10 2014-07-21 Upload file Special pages Apache Tomcat Apache Software Foundation Apache 7.0.53 2014-03-30 Permanent link Boa Paul Phillips GPL 0.94.13 2002-07-30 Page information Caudium The Caudium Group GPL 1.4.18 2012-02-24 Wikidata item Cite this page Cherokee HTTP Server Álvaro López Ortega GPL 1.2.103 2013-04-21 Hiawatha HTTP Server Hugo Leisink GPLv2 9.6 2014-06-01 Print/export Create a book HFS Rejetto GPL 2.2f 2009-02-17 Download as PDF IBM HTTP Server IBM Non-free proprietary 8.5.5 2013-06-14 Printable version Internet Information Services Microsoft Non-free proprietary 8.5 2013-09-09 Languages Jetty Eclipse Foundation Apache 9.1.4 2014-04-01 Čeština Jexus Bing Liu Non-free proprietary 5.5.2 2014-04-27 Galego Nederlands lighttpd Jan Kneschke (Incremental) BSD variant 1.4.35 2014-03-12 Português LiteSpeed Web Server LiteSpeed Technologies Non-free proprietary 4.2.3 2013-05-22 Русский Mongoose Cesanta Software GPLv2 / commercial 5.5 2014-10-28 中文 Edit links Monkey HTTP Server Monkey Software LGPLv2 1.5.1 2014-06-10 NaviServer Various Mozilla 1.1 4.99.6 2014-06-29 NCSA HTTPd Robert McCool Non-free proprietary 1.5.2a 1996 Nginx NGINX, Inc.
    [Show full text]
  • Pweb Peer-To-Peer Web Hosting Communication System and Dynamic Web Hosting
    pWeb Peer-to-Peer Web Hosting Communication System and Dynamic Web Hosting Alexander Pokluda1, Abdalla Aartail2, Md. Faizul Bari1, Reaz Ahmed1, and Raouf Boutaba1 1David R. Cheriton School of Computer Science University of Waterloo [apokluda | mfbari | r5ahmed | rboutaba]@uwaterloo.ca 2American University of Beirut [email protected] University of Waterloo Technical Report: CS-2013-15∗ ∗This report is a modified version of an internal technical report produced for Orange Labs, the project's sponsor. The original technical report was submitted to Orange Labs in August 2013. Abstract During the main phase of this project we identified and provided solution for the major challenges related to peer-to-peer (P2P) web hosting. More specifically, our solutions for naming, availability, ranking, indexing and dynamic web-hosting have been provided in previous reports. In this report we present a more concrete view of the pWeb infrastructure and address the issues related to a real-life deployment of the system. First we provide an overview of the light-weight P2P communication protocol between pWeb clients for signaling and media streaming in Part I. In Part II we provide an architectural overview of pWeb system and show the mapping of the abstract components in pWeb architec- ture to real life devices and technologies. In order to make pWeb compatible with the existing Web technology we have developed a DNS gateway. In Part II Section 3, we provide the design and implementation of this DNS gateway. For efficient indexing and fast discovery of end-user devices and multimedia content, we have developed a cloud-based solution for crawling, indexing and searching.
    [Show full text]
  • STONE FAB CATALOG 2020-V1 Your Stone, Tile and Concrete Tool Supply Experts Since 1971
    STONE FAB CATALOG 2020-V1 Your stone, tile and concrete tool supply experts since 1971 C • Less risk of damaging tools • Increase tools life • Quicker set up • Better accuracy • Increase productivity • Increase parameters • Overall better quality © Grabo Nemo Portable Aardwolf Thin Material ® Electric Vacuum Cup Diarex VB Core Drills Slab Gripper Alpha AIR-830/850 see page 166 see page 78 & 81 see page 156 see page 231 STONE FAB CATALOG, 2020-V1 WWW.GRANQUARTZ.CA Dear valued customers, It’s just now been a year since we’ve implemented our new Enterprise Resource Planning (ERP) System. Despite the amount of preparation involved in this transition, it was a rough period to adapt to our new system and still offer the same level of service. Even after the change of system, we faced many unpredictable issues necessitating quick and efficient decisions altering the processes that were previously agreed on. Throughout all these challenges, our team worked together to ensure that we continued to offer the best possible service to you. We thank you for your patience and understanding as we sorted out those issues. Now that we have a solid foundation, we plan to work on numerous other projects that will connect with our ERP database to offer better and quicker solutions to you. During the previous year we have begun offering what we call the “Zoller service” for calibrating CNC tools so that you can save hours when you set up new tools or redressed tools on your CNC machine. If you haven’t heard of this service please ask your local sales and service representative or our customer service agents for more information.
    [Show full text]
  • SOPHOS IPS Signature Update Release Notes
    SOPHOS IPS Signature Update Release Notes Version : 9.16.41 Release Date : 31st October 2019 IPS Signature Update Release Information Upgrade Applicable on IPS Signature Release Version 9.16.40 CR250i, CR300i, CR500i-4P, CR500i-6P, CR500i-8P, CR500ia, CR500ia-RP, CR500ia1F, CR500ia10F, CR750ia, CR750ia1F, CR750ia10F, CR1000i-11P, CR1000i-12P, CR1000ia, CR1000ia10F, CR1500i-11P, CR1500i-12P, CR1500ia, CR1500ia10F Sophos Appliance Models CR25iNG, CR25iNG-6P, CR35iNG, CR50iNG, CR100iNG, CR200iNG/XP, CR300iNG/XP, CR500iNG- XP, CR750iNG-XP, CR2500iNG, CR25wiNG, CR25wiNG-6P, CR35wiNG, CRiV1C, CRiV2C, CRiV4C, CRiV8C, CRiV12C, XG85 to XG450, SG105 to SG650 Upgrade Information Upgrade type: Automatic Compatibility Annotations: None Introduction The Release Note document for IPS Signature Database Version 9.16.41 includes support for the new signatures. The following sections describe the release in detail. New IPS Signatures The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms. Report false positives at [email protected], along with the application details. October 2019 Page 2 of 27 IPS Signature Update This IPS Release includes Two Hundred and Fifteen(215) signatures to address One Hundred and Eighty One(181) vulnerabilities. New signatures are added for the following vulnerabilities: Name CVE–ID Category Severity BROWSER-IE Microsoft
    [Show full text]
  • Code of Federal Regulations GPO Access
    6±11±97 Wednesday Vol. 62 No. 112 June 11, 1997 Pages 31701±32020 Briefings on how to use the Federal Register For information on a briefing in Washington, DC, see the announcement on the inside cover of this issue. Now Available Online Code of Federal Regulations via GPO Access (Selected Volumes) Free, easy, online access to selected Code of Federal Regulations (CFR) volumes is now available via GPO Access, a service of the United States Government Printing Office (GPO). CFR titles will be added to GPO Access incrementally throughout calendar years 1996 and 1997 until a complete set is available. GPO is taking steps so that the online and printed versions of the CFR will be released concurrently. The CFR and Federal Register on GPO Access, are the official online editions authorized by the Administrative Committee of the Federal Register. New titles and/or volumes will be added to this online service as they become available. http://www.access.gpo.gov/nara/cfr For additional information on GPO Access products, services and access methods, see page II or contact the GPO Access User Support Team via: ★ Phone: toll-free: 1-888-293-6498 ★ Email: [email protected] federal register 1 II Federal Register / Vol. 62, No. 112 / Wednesday, June 11, 1997 SUBSCRIPTIONS AND COPIES PUBLIC Subscriptions: Paper or fiche 202±512±1800 Assistance with public subscriptions 512±1806 General online information 202±512±1530; 1±888±293±6498 FEDERAL REGISTER Published daily, Monday through Friday, (not published on Saturdays, Sundays, or on official holidays), Single copies/back copies: by the Office of the Federal Register, National Archives and Paper or fiche 512±1800 Records Administration, Washington, DC 20408, under the Federal Assistance with public single copies 512±1803 Register Act (49 Stat.
    [Show full text]
  • Server Push and Web Sockets
    Server push and web sockets http://kaazing.com CSCI 470: Web Science • Keith Vertanen • Copyright © 2014 Responsive web apps, v1.0 • Problem: Client page needs info from server • Solution: AJAX allows client to pull info – XMLHttpRequest makes asynchronous requests • Hacks to get around cross-domain restrictions – Uses standard HTTP request/response protocol • Small payload messages have high overhead • Latency introduced by HTTP processing 2 Responsive web apps, v2.0 • Problem: Server needs to push info to client – e.g. update stock price, movement of players, etc. • Possible solutions: – Polling: Client makes periodic AJAX requests • Works well if you know the correct polling interval • Otherwise wastes network/server resources http://jfarcand.wordpress.com/2007/05/15/new-adventures-in-comet-polling-long-polling-or-http-streaming-with-ajax-which-one-to-choose/ 3 Responsive web apps, v2.0 • Problem: Server needs to push info to client – e.g. update stock price, movement of players, etc. • Possible solutions: – Long-polling: Client sends HTTP request, server waits until it has data to send in response • Hanging request may have high resource costs http://jfarcand.wordpress.com/2007/05/15/new-adventures-in-comet-polling-long-polling-or-http-streaming-with-ajax-which-one-to-choose/ 4 Responsive web apps, v2.0 • Problem: Server needs to push info to client – e.g. update stock price, movement of players, etc. • Possible solutions: – Streaming: Server maintains open response continuously updated with push events • Subject to buffering by agents
    [Show full text]
  • Hunter Documentation Release 0.23
    Hunter Documentation Release 0.23 Ruslan Baratov Aug 20, 2021 Contents 1 Brief overview 3 2 Quick start 15 3 User guides 19 4 Packages 51 5 Creating new package 245 6 FAQ 273 7 Contributing 295 8 Contacts 299 9 Reference 301 Index 345 i ii Hunter Documentation, Release 0.23 Welcome to the Hunter package manager documentation! Hunter is a CMake driven cross-platform package manager for C/C++1 projects. With the help of Hunter you can organize builds for Linux, Windows, macOS, iOS, Android, Raspberry Pi and other platforms. Third-party external projects are highly customizable, effectively allowing you to have myriad variants of directories with them based on combinations of version to build, static/shared, CMake -D options, Release/Debug, etc. Separate root directories will be created for each variant, so they all can be used simultaneously on one machine without conflicts (just like virtualenv but automatically). Going further: each such root directory can be shared between several local projects if configuration of externals matches. So when you are starting another project from scratch and use the same external packages, there will be no additional copy or build triggered; the only overhead is checking the existence of a DONE stamp file for each package. In case your local environment is similar enough to the continuous integration environment of Travis/AppVeyor service, then build will not be triggered at all - cached binaries will be downloaded from GitHub server instead. Mainly Hunter is designed to manage packages with CMake build system under the hood and existing CMake packages can be quite easily integrated into system, but non-CMake packages are also supported too using custom templates (build schemes) with ExternalProject_Add command(s).
    [Show full text]
  • Should You Test Mongoose Schema
    Should You Test Mongoose Schema Is Chevy spermophytic when Gil imbitter prolixly? If opposed or patrilineal Anthony usually dispart his Bohemianism bedim heatedly or dogmatises but and invalidly, how plutocratic is Wells? Loudish and inartistic Bing often sneezings some Fleur manifoldly or cackled restively. Its schemas schema you should apply validators and testing and how the mongo db query and risks being lavish in joint attention, we will fail. Extreme Results app using Node. What i would do not advisable in your own separate graphql playground template: joi to create emotions of. Js, we have to write npm install mongoose. If you can we should be more stable application with jest by a json schema when it checks if not that is a json representation of. In mongoose schema for tests to test as well for authentication active: we started me on a person. Array schema mongoose should see full line experience for testing database in with pretty. The full scientific name of the order in which the taxon is classified. WITHOUT WARRANTY OF ANY KIND, real OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR before PARTICULAR eye AND NONINFRINGEMENT. Make fast your software up my date with always following versions Full text search is the ability to efficiently search strings within strings like finding a keyword in beautiful large text. Now that circumstance have a connection to our database, which need simply create the mechanism by ample data path be added to customer database. User object in multiple Groups. We test some examples you? TDD to guide me define it.
    [Show full text]