Blog for April 2014

Daily Links

Daily Links

Setting up a Springloops Git Repository in Coda 2

We've been poking around using Git as source control for a few projects and recently ran into a bit of head-scratching while trying to configure a Coda project with a Springloops Git repository. 

We regularly set up Coda 2 with our Springloops SVN repositories, and have even set up GitHub and BitBucket repos in Coda in the past as well. 

The Problem

The problem we ran into was that Springloops usernames are email addresses, and Coda only asks for your Git URL and password. This means your username needs to be included in the URL.

With a GitHub account, this isn't an issue - the URL will look something like https://github.com/yourusername/reponame.git

The Solution

After some trial and error we determined that the trick with a username which is an email address is to URL encode it before inserting it into the repo URL.

Take note that with the Springloops URL the order is hostname, colon, URL encoded email address, rest of repo URL. For example:

Username: youremail@youremail.com
Springloops Git URL: https://slsapp.com/git/yourspingloopsaccount/reponame.git

Coda URL: https://slsapp.com:youremail%40youremail.com/git/yourspingloopsaccount/reponame.git

Happy Coding!

Daily Links

Daily Links

Daily Links

Daily Links

Daily Links

Daily Links

OpenSSL Heartbleed Bug

Hello everyone,

If you are online at all you have heard about the bug in OpenSSL called Heartbleed. For the technical details you can visit OpenSSL's news release. If you are interested in an easier to understand write up, you can visit Heartbleed.com. In a nutshell, this bug in OpenSSL allows your encrypted data to be read.

Rest assured, that our security team had our servers patched within hours of this bug being made public. If we are hosting your domain, you are not at risk.

If we are not hosting your domain, you should ask your hosting provider if you are at risk. There are a bunch of versions of OpenSSL that do not have this bug, so it is possible that older infrastructure is running a version of OpenSSL that is immune.

Again, our hosting services are not at risk and have been updated via backporting. To find out more about backporting, you can check out https://access.redhat.com/site/security/updates/backporting/.

Daily Links

Daily Links