• 2 Posts
  • 109 Comments
Joined 3 years ago
cake
Cake day: July 1st, 2023

help-circle




  • A lot of that pain can be reduced by writing and running your code locally before pushing it to a CI environment. Generally with our automation we write a CLI, And GitHub actions is just an execution environment that calls the CLI.

    And if what you’re trying to do must execute inside an action. You can run workflows locally with docker!




  • Development time and user support?

    These are two pretty obvious reasons. It takes time and time is a limited resource. Therefore, time should be spent on solving impactful problems. Lemmy account login is extremely low impact, it’s not a bad thing, it’s just not something that improves immich for a large portion of its user base.

    Another thing is user support. Since the many instances are self-hosted for the most part, and they will go offline, and they will go away forever in some instances. Users asking for support for this login type and asking for additional features to make up for this baked in instability.

    Essentially. Low impact work that may drive a higher volume of support efforts.

    It’s the same reason some niche projects stop supporting Linux. Low user volume and disproportionately high “neediness” of those users.










  • douglasg14b@lemmy.worldtoSelfhosted@lemmy.worldJellyfin over the internet
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    3
    ·
    edit-2
    7 months ago

    These are all holes in the Swiss cheese model.

    Just because you and I cannot immediately consider ways of exploiting these vulnerabilities doesn’t mean they don’t exist or are not already in use (Including other endpoints of vulnerabilities not listed)


    This is one of the biggest mindset gaps that exist in technology, which tends to result in a whole internet filled with exploitable services and devices. Which are more often than not used as proxies for crime or traffic, and not directly exploited.

    Meaning that unless you have incredibly robust network traffic analysis, you won’t notice a thing.

    There are so many sonarr and similar instances out there with minor vulnerabilities being exploited in the wild because of the same"Well, what can someone do with these vulnerabilities anyways" mindset. Turns out all it takes is a common deployment misconfiguration in several seedbox providers to turn it into an RCE, which wouldn’t have been possible if the vulnerability was patched.

    Which is just holes in the swiss cheese model lining up. Something as simple as allowing an admin user access to their own password when they are logged in enables an entirely separate class of attacks. Excused because “If they’re already logged in, they know the password”. Well, not of there’s another vulnerability with authentication…

    See how that works?