-
8 votes
-
Trying out a Windows knock-off (ReactOS)
6 votes -
Libravatar - A free and open source alternative to Gravatar
8 votes -
Pepper & Carrot open source comic book publishing report # 3
11 votes -
Lilliputian: A Mobile Client for Tiny Tiny RSS
17 votes -
Hacking diabetes - A network of amateur programmers is transforming the illness with a DIY app
6 votes -
Mycroft won against their patent troll
22 votes -
A bunch of updates and fixes from open-source contributors
Over the last week, a number of updates have been made by people other than me contributing code to Tildes through its open-source repository. I wanted to make a post to highlight some of these...
Over the last week, a number of updates have been made by people other than me contributing code to Tildes through its open-source repository. I wanted to make a post to highlight some of these changes and let everyone know about them, since there are some great updates and fixes in here:
@deing made it possible to create links that will pre-fill the subject and message for private messages. For example: https://tildes.net/user/Deimos/new_message?subject=Test+Message&message=Please+don't+actually+send+this+to+me
@blitz saw me make an offhand comment about a rare bug when someone submits a link to an IP address, and got a development environment set up and fixed it right away.
@Bauke has been on a tear, fixing a lot of long-outstanding issues and adding features. So far:
- Added a way for users to view their two-factor authentication backup codes (previously you could only see them at the time you activated 2FA).
- Added "View Markdown" for comments and text topics. This is inside a new "More" dropdown menu, and will show you the markdown that the poster used, so that you can check how they did some formatting or copy-paste if you want to use someone else's post as a template of sorts.
- Added new settings (under "Site behavior settings" on the Settings page) to always open links to Tildes groups and users in new tabs.
- Fixed a few issues with inconsistent interface elements and styling.
There are multiple more merge requests still waiting for me to review, and I'll probably be making some other posts soon once some of those get merged in as well. Thanks, the contributions are greatly appreciated! If anyone else is interested in looking into contributing, the CONTRIBUTING file in the repo is probably the best place to start.
And as usual, I've topped everyone back up to 10 invites, accessible on the invite page.
53 votes -
Mycroft is being targeted by a patent troll
14 votes -
LPE and RCE in OpenSMTPD (CVE-2020-7247)
6 votes -
Why I won't buy an iPad – ten years later
13 votes -
FreeBSD is an amazing operating system
19 votes -
A Sad Day For Rust
27 votes -
Andrew Gallant (burntsushi, author of ripgrep) discusses his personal history and relationship with Free and Open Source Software (FOSS)
18 votes -
MNT Reform open source, modular laptop crowdfunding campaign launches in February
9 votes -
Introducing Microsoft Application Inspector
9 votes -
Anyone here running a Pleroma instance?
11 votes -
Indie game VVVVVV's source code is now public
22 votes -
Bruce Perens quits Open Source Initiative amid row over new data-sharing crypto license: 'We've gone the wrong way with licensing'
9 votes -
Google Chrome: Behind the Open Source Browser Project (2008)
6 votes -
The performance advancements of the Radeon open-source OpenGL/Vulkan drivers over 2019
8 votes -
Prime leverage: How Amazon wields power in the technology world
5 votes -
PinePhone: Everything you need to know about the $150 Linux-powered phone
25 votes -
osxfuse is no longer open source
15 votes -
[CVE-2019-14899] Inferring and hijacking VPN-tunneled TCP connections
7 votes -
Redox OS: Real hardware breakthroughs, and focusing on rustc
14 votes -
GitHub Arctic Code Vault
8 votes -
Google outlines plans for mainline Linux kernel support in Android
10 votes -
Minimal TOTP Generator in 20 lines of Python
7 votes -
LibreOffice 10/20 logo community contest
8 votes -
Announcing GitHub Security Lab: securing the world’s code, together
5 votes -
Development on the Zelda-inspired TetraForce is moving along at a fast pace!
@tetraforcegame: More online multiplayer #zelda-like action! Now with fancy lighting effects #gamedev #GodotEngine #indiedev https://t.co/pQf3mIgfyy
7 votes -
ZzArt - Abstract Art Evolution - Now Open Source on GitHub!
8 votes -
A new funding model for open source software
19 votes -
GitHub's "The State of the Octoverse" report for 2019
7 votes -
Re-Licensing Sentry
24 votes -
Firefox to hide notification popups by default starting next year
22 votes -
Surviving Software Dependencies
4 votes -
The sad saga of Purism and the Librem 5 (Part 1)
19 votes -
How I coined the term 'open source'
7 votes -
Looking for advice on a CI / regression testing platform
Hi all, I'm looking for some advice regarding how to set up a basic CI regression / testing suite. This isn't my full time job, but a side project my group at work wants to spin up to... shall we...
Hi all,
I'm looking for some advice regarding how to set up a basic CI regression / testing suite. This isn't my full time job, but a side project my group at work wants to spin up to... shall we say, give us a more real time monitoring of functionality and performance regressions coming out of the underlying software stack development (long story).
As none of us are particularly automation experts, I was looking for some advice from my fellow Tilderinos. Please forgive me if any of the below is obvious and/or silly.
A few basic requirements I had in mind:
-
Can handle different execution environments: essentially different versions of the software stack, both in docker form and (eventually) via lmod or some other module file approach (e.g., TCL), and sensible handling of a node list.
-
Related to one, supports using the products of builds as execution environments. Ideally we'd like to have a build step compile the stack and install it to a NFS from which we can load it as a module.
-
Simple to add tests. Again, this isn't our full time job -- we mostly want to add a quick bash script / makefile / source code or the like to the tests when we run into an issue and forgot about it.
-
Related. We should be able to store the entire thing as a git repo. I have seen this to some extent with Travis, but my experience with Jenkins was... sub-par (is there a history? Changelog? Any way at all of backing up the test config?).
-
Some sort of post-processing capabilities. At a glance we need to be able to see the top line performance numbers for 20-30 apps over the different build environment. Bonus points if there's a graph showing performance vs build version or the like, but honestly a CSV log file is good enough.
-
Whatever CI software we get has to be able to run this locally. Lots of these are internal only numbers / codes. FOSS prefered.
-
A webui for scheduling runs / visualizing results would be nice, but again this could be a bash script and none of us would bat an eye.
Any thoughts would be greatly appreciated. Thanks!
7 votes -
-
OpenBSD 6.6
10 votes -
In 2019, multiple open source companies have changed course and their licenses to try to protect their businesses—is it the right move?
10 votes -
The GGPO rollback networking SDK used in games like Skullgirls and Fantasy Strike is now available under the MIT license
7 votes -
Go Proposal Process: Representation
4 votes -
Rx - An extensible pixel editor inspired by Vi
9 votes -
First Librem 5 phone rolled out!
25 votes -
Reinventing home directories
23 votes -
ActivityPub: The “worse is better” approach to federated social networking
10 votes -
Fancy Zones, a tiling window manager from Microsoft
8 votes