est.social on üks paljudest sõltumatutest Mastodoni serveritest, mida saab fediversumis osalemiseks kasutada.
est.social on mõeldud Eestis üldkasutatavaks Mastodoni serveriks. est.social is meant to be a general use Mastodon server for Estonia.

Administraator:

Serveri statistika:

85
aktiivsed kasutajad

#gitlab

1 postitusega1 osalejaga0 postitust täna
Sébastien Maret<p>Many universities and research institutes have their own <a href="https://scholar.social/tags/Gitlab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gitlab</span></a> or <a href="https://scholar.social/tags/Gitea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gitea</span></a> instances, which is a good thing. But are there any plans for these instances to be federated ? It's a bit cumbersome to open a new account on a new instance every time I want to collaborate on a project. <a href="https://scholar.social/tags/openscience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openscience</span></a></p>
iverbpunkt<p>Nachdem ich gerade zwei Issues in einem Github-Repositoryy aufgemacht habe:</p><p>Wollen wir nicht einfach auch alle Projekte von <a href="https://norden.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> auf <a href="https://norden.social/tags/GitLab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitLab</span></a> oder zu <a href="https://norden.social/tags/Codeberg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Codeberg</span></a> umziehen?</p><p><a href="https://norden.social/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unplugtrump</span></a></p>
Kevin Karhan :verified:<p>Anyone else having issues with <a href="https://infosec.space/tags/PyCharm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PyCharm</span></a> randomly <em>"forgetting"</em> / bricking <a href="https://infosec.space/tags/logins" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>logins</span></a> on <a href="https://infosec.space/tags/UbuntuLTS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UbuntuLTS</span></a> Desktop?</p><ul><li>And it's not just <a href="https://infosec.space/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> and <a href="https://infosec.space/tags/GitLab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitLab</span></a> but any <a href="https://infosec.space/tags/git" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>git</span></a>.</li></ul><p>The only workaround is to literally delete the configs and manually reenter the credentials, only for those to get fucked up with an update or at random.</p><ul><li>Seriously, why???</li></ul><p><span class="h-card" translate="no"><a href="https://programming.dev/c/jetbrains" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jetbrains</span></a></span> , <a href="https://infosec.space/tags/plzfix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>plzfix</span></a>!</p>
Sune Stolborg Vuorela<p>After mostly lurking in <a href="https://floss.social/tags/gitlab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gitlab</span></a> administration channels of <a href="https://floss.social/tags/kde" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kde</span></a>, <a href="https://floss.social/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> and <a href="https://floss.social/tags/freedesktop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freedesktop</span></a> I really want to bring them all into a room filled with snacks 1) to thank them for their work and 2) to hope that they would start chatting a bit with each other.</p><p>And let's also invite the gitlab administrators from <a href="https://floss.social/tags/gnome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gnome</span></a> and maybe others.</p>
Rémi Rampin<p>In their release notes, <a href="https://framapiaf.org/tags/gitlab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gitlab</span></a> has started naming the specific third-party dependencies that cause their security issues... I don't know how I feel about this<br><a href="https://framapiaf.org/tags/floss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>floss</span></a> <a href="https://framapiaf.org/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/GitLab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitLab</span></a> addressed critical auth bypass flaws in CE and EE<br><a href="https://securityaffairs.com/175370/security/gitlab-addressed-critical-flaws-in-ce-and-ee.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175370/sec</span><span class="invisible">urity/gitlab-addressed-critical-flaws-in-ce-and-ee.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
jomo<p>Critical auth bypass in gitlab / ruby-saml <a href="https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released/#cve-2025-25291-and-cve-2025-25292-third-party-gem-ruby-saml" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">about.gitlab.com/releases/2025</span><span class="invisible">/03/12/patch-release-gitlab-17-9-2-released/#cve-2025-25291-and-cve-2025-25292-third-party-gem-ruby-saml</span></a></p><p><a href="https://mstdn.io/tags/gitlab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gitlab</span></a> <a href="https://mstdn.io/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>