Gitpod is participating 2021 OSC China Open Source Project Selection , please vote for it!
Gitpod is in 2021 OSC China Open Source Project Selection {{projectVoteCount} has been obtained in, please vote for it!
2021 OSC China Open Source Project Selection It is in hot progress. Come and vote for your favorite open source project!
2021 OSC China Open Source Project Selection>>> Midfield Review
Gitpod won the 2021 OSC China Open Source Project Selection "The Best Popularity Project" !
Authorization Agreement View license
development language C/C++
operating system Cross platform
Software type Open source software
Open source organizations nothing
region Unknown
deliverer Chief Test
intended for unknown
Recording time 2021-12-02

Software Introduction

Gitpod

Always ready-to-code.

 Gitpod ready-to-code  Werft.dev - Gitpod CI  Discord

Gitpod is an open-source Kubernetes application for ready-to-code developer environments that spins up fresh, automated dev environments for each task, in the cloud, in seconds. It enables you to describe your dev environment as code and start instant, remote and cloud-based developer environments directly from your browser or your Desktop IDE.

Tightly integrated with GitLab, GitHub, and Bitbucket, Gitpod automatically and continuously prebuilds dev environments for all your branches. As a result, team members can instantly start coding with fresh, ephemeral and fully-compiled dev environments - no matter if you are building a new feature, want to fix a bug or do a code review.

 browser-vscode

Features

🏗 Dev environments as code - Gitpod applies lessons learned from infrastructure-as-code. Spinning up dev environments is easily repeatable and reproducible empowering you to automate, version-control and share dev environments across your team.

Prebuilt dev environments - Gitpod continuously prebuilds all your git branches similar to a CI server. Control how Gitpod pre-configures and initializes environments before you even start a workspace through init commands in your .gitpod.yml .

🐳 Integrated Docker build - Gitpod instantly starts a container in the cloud based on your Docker image. Tools that are required for your project are easy to install and configure.

👐 GitLab, GitHub, and Bitbucket integration - Gitpod seamlessly integrates in your workflow and works with all major git hosting platforms including GitHub, GitLab and Bitbucket.

👀 Integrated code reviews - with Gitpod you can do native code reviews on any PR/MR. No need to switch context anymore and clutter your local machine with your colleagues PR/MR.

👯‍♀️ Collaboration - invite team members to your dev environment or snapshot any state of your dev environment to share it with your team asynchronously.

🛠 Professional & customizable developer experience - a Gitpod workspace gives you the same capabilities (yes, even root & docker ) as your Linux machine - pre-configured and optimized for your individual development workflow. Install any VS Code extension with one click on a user and/or team level.

Learn more 👉

Gitpod is provided as a managed Saas version with a free subscription for open-source or a free self-hosted version . An enterprise license is available here .

Getting Started

You can start using Gitpod with one or more of the following ways:

  1. Quick start using an Example Project or OSS Project
  2. Getting started with one of your existing projects
  3. Use a Prefixed URL
  4. Install Browser Extension
  5. Enable GitLab Integration

Documentation

All documentation can be found on https://www.gitpod.io/docs . For example, see Introduction and Getting Started sections. 📚

Questions

For questions and support please use the community forum or the community discord server . Join the conversation, and connect with other community members. 💬

You can also follow @gitpod for announcements and updates from our team.

Issues

The issue tracker is used for tracking bug reports and feature requests for the Gitpod open source project as well as planning current and future development efforts. 🗺️

You can upvote popular feature requests or create a new one .

Development Process

We work with quarterly roadmaps in autonomous product teams.

Related Projects

During the development of Gitpod we also developed some our own infrastructure tooling to make development easier and more efficient. To this end we've developed a number of open source projects including:

  1. Werft - A Kubernetes native CI system
  2. Leeway - A heavily caching build system
  3. Dazzle - An experimental Docker image builder
  4. OpenVSCode Server - Run the latest VS Code on a remote machine accessed through a browser

Code of Conduct

We want to create a welcoming environment for everyone who is interested in contributing to Gitpod or participating in discussions with the Gitpod community. This project has adopted the Contributor Covenant Code of Conduct , version 2.0 .

Expand to read the full text

code

comment

Click to lead the topic 📣 Post and join the discussion 🔥
No content temporarily
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Issued a question and answer
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Uglify js has ReDoS vulnerability
ReDoS
Uglify js is a JavaScript parser, compressor, compressor and beautification toolkit. The affected version of this package is vulnerable to regular expression denial of service (ReDoS) attacks through the string_template and decode_template functions.
MPS-2022-14112
2022-08-08 19:10
Async security vulnerability
Prototype contamination
Async is a practical module developed by Caolan McMahon in the UK. Used to use asynchronous JavaScript. Async 3.2.1 and earlier has a security vulnerability, which originates from the mapValues() method. An attacker can gain privileges through the mapValues() method.
CVE-2021-43138 MPS-2021-34434
2022-08-08 19:10
Merge has a denial of service vulnerability
Denial of Service
Merge is a library that allows you to combine multiple objects into one, and you can choose to create a new clone object. Similar to jQuery.extend but more flexible. Work in Node.js and browser. The affected version of this package is vulnerable to prototype contamination.
MPS-2022-13875
2022-08-08 19:10
Mocha has an incorrect regular expression vulnerability
Incorrect regular expression
Mocha is a javascript testing framework for node. js and browsers. The affected version of this package is vulnerable to regular expression denial of service (ReDoS) attacks.
MPS-2022-13886
2022-08-08 19:10
Istanbul reports has a vulnerability in using web links to untrusted targets through window.opener access
Access using web links to untrusted targets through window.opener
Due to pointing https://istanbul There is no rel attribute in the link of, so the affected version of the software package is vulnerable to reverse Tabnabbing attacks.
MPS-2022-13797
2022-08-08 19:10
Digital Bazaar Forge data forgery vulnerability
Improper verification of cryptographic signature
Digital Bazaar Forge is a native implementation of Tls in Javascript and an open source tool for writing encryption based and network intensive Web applications from Digital Bazaar Corporation of the United States. Digital Bazaar Forge before 1.3.0 has a data forgery vulnerability, which originates from the SA PKCS # 1 v1.5 signature verification code's failure to check DigitInfo correctly to obtain the correct ASN. 1 structure. An attacker can send a special signature to exploit this vulnerability to verify a signature that contains an invalid structure but a valid digest.
CVE-2022-24773 MPS-2022-3740
2022-08-08 19:10
Shell quote security vulnerability
Command injection
Shell quote is an open source software package. Used to parse and reference shell commands. There is a security vulnerability in the shell quote package. An attacker can use this vulnerability to implant arbitrary code to perform related operations.
CVE-2021-42740 MPS-2021-34136
2022-08-08 19:10
Digital Bazaar Forge Input Validation Error Vulnerability
Cross site redirection
Digital Bazaar Forge is a native implementation of Tls in Javascript and an open source tool for writing encryption based and network intensive Web applications from Digital Bazaar Corporation of the United States. There is an input validation error vulnerability in Digital Bazaar Forge, which is due to the fact that the product allows URL redirection to untrusted sites.
CVE-2022-0122 MPS-2022-0421
2022-08-08 19:10
There is a code injection vulnerability in ejs
Code injection
Ejs is a popular JavaScript template engine. The affected version of this package is vulnerable to arbitrary code injection via rendering and rendering files.
MPS-2022-13642
2022-08-08 19:10
Digital Bazaar Forge data forgery vulnerability
Improper verification of cryptographic signature
Digital Bazaar Forge is a native implementation of Tls in Javascript and an open source tool for writing encryption based and network intensive Web applications from Digital Bazaar Corporation of the United States. Digitalbazaar Forge before 1.3.0 has a data forgery vulnerability, which originates from the fact that RSA PKCS # 1 v1.5 signature verification code does not check trailing garbage bytes after decoding the 'DigitInfo' ASN. 1 structure. An attacker can delete filler bytes and use this vulnerability to add garbage data to forge signatures.
CVE-2022-24772 MPS-2022-3739
2022-08-08 19:10
Unshiftio Url parse Access Control Error Vulnerability
Url Parse is a small Url parser that works seamlessly across Node.js and browser environments. There is an access control error vulnerability in Unshiftio Url parse, which originates from the lack of effective protection mechanism for user controlled keys. An attacker can bypass authorization through this vulnerability. The following products and versions were affected: Unshiftio Url parse before 1.5.9.
CVE-2022-0691 MPS-2022-4474
2022-08-08 19:10
Need has an Authorization request header disclosure vulnerability
Information exposure
Need is a streaming HTTP client Need does not filter the redefined request header. It will also transfer the Authorization request header of the first request to the redefined service, causing the Authorization request header to leak. An attacker can use this vulnerability to passively steal the authorization data of a user.
MPS-2022-7866
2022-08-08 19:10
Minimist Input Validation Error Vulnerability
Prototype contamination
Minimist is a command line parameter resolution tool. There is an input validation error vulnerability in minimast before 1.2.2. An attacker can use the vulnerability to add or modify the properties of Object.prototype via 'constructor' and '__proto__' payload.
CVE-2020-7598 MPS-2020-3516
2022-08-08 19:10
Js yaml has a denial of service vulnerability
Denial of Service
Js yaml is a humanized data serialization language. The affected version of this package is vulnerable to a denial of service (DoS) attack.
MPS-2022-13820
2022-08-08 19:10
Digital Bazaar Forge data forgery vulnerability
Improper verification of cryptographic signature
Digital Bazaar Forge is a native implementation of Tls in Javascript and an open source tool for writing encryption based and network intensive Web applications from Digital Bazaar Corporation of the United States. RSA PKCS before Forge 1.3.0 has a data forgery vulnerability, which originates from the loose checking of the digest algorithm structure by the RSA PKCS signature verification code. Attackers can steal filled bytes through a carefully designed structure and forge signatures by using the unchecked part of the PKCS # 1 encoded message when using a low public index.
CVE-2022-24771 MPS-2022-3738
2022-08-08 19:10
Follow Redirects security vulnerability
Infringement of privacy
Follow Redirects is a Node.js module that automatically follows Http (s) redirection. Follow Redirects has a security vulnerability, which is due to the fact that follow redirects is easy to expose private personal information to unauthorized participants.
CVE-2022-0155 MPS-2022-0815
2022-08-08 19:10
Moment.js regular denial of service vulnerability
Denial of Service
Moment.js is a JavaScript date library. Used to parse, validate, manipulate, and format dates. When Moment.js processes nested rfc2822 comments, the regular expression execution time increases exponentially, resulting in unavailability of the service. An attacker can use this vulnerability to make the target service stop responding or even crash.
CVE-2022-31129 MPS-2022-11159
2022-08-08 19:10
Unspecified vulnerability exists in css what
Css what is a CSS selector parser. There is a security vulnerability in css what before 5.0.1. The vulnerability originates from the fact that the css what package does not ensure that attribute parsing has linear time complexity relative to the input size. At present, no detailed vulnerability details are provided.
CVE-2021-33587 MPS-2021-7397
2022-08-08 19:10
Nodejs resource management error vulnerability
Denial of Service
Nodejs is a JavaScript running environment based on the Chrome V8 engine. By encapsulating the Chrome 8 engine and using event driven and non blocking IO applications, it is possible for Javascript to develop high-performance background applications. There is a security vulnerability in nodejs global parent, which originates from the denial of service of regular expression.
CVE-2020-28469 MPS-2021-7827
2022-08-08 19:10
Color String security vulnerability
Unrestricted or regulated resource allocation
Color String is an open source library for parsing and generating CSS color strings. Color String 1.5.5 and earlier has a security vulnerability. The vulnerability is due to the regular expression denial of service (ReDOS) when an application checks a crafted data.
CVE-2021-29060 MPS-2021-8683
2022-08-08 19:10
No more
Loading failed, please refresh the page
Click to load more
Loading
next page
zero comment
zero Collection
 OSCHINA
Log in to view more high-quality content
 Back to top
Top