GSoC Final Report
GSoC This was an excellent learning experience for me. By the end of these 3 months, I can surely call myself a better developer than what I was 3 months back. I had been trying to contribute to an open-source project since long, and finally GSoC gave me the opportunity in the best possible way. At times I committed mistakes but my mentors were always helpful and supportive. I learnt things in the journey and that is what GSoC is all about.
CI/CD with Jenkins
CI/CD pipeline with Jenkins Jenkins is a CI/CD automation tools used to build continuous integration pipelines.
The first task for my gsoc project was to implement a CI/CD pipeline with Jenkins for CloudCV/Origami, I have been working on it for the last couple of days and I have managed to get the background work done. This blog post is sort of a guide for how to set up a CI/CD pipeline using Jenkins and what are the gotchas in it.
GSoC-18 with CloudCV
Google Summer of Code 2018 - CloudCV The mail on 23 April 2018 read “Congratulations, your proposal with CloudCV has been accepted” and all the hard work since the last two months was quite worth it!
What exactly is GSoC? Google Summer of Code is a global program sponsored by Google Inc focused on introducing students to open source software development for the open source organizations. Students work on a 3-month development project with an open source organization under some mentors.
Getting to know Docker
Docker This post is more of an introduction to Docker thing, it is just a high level overview of what docker actually is and how the environment runs. Docker is a great tool which reduces complexity and provides flexibility in shipping an application.
It is an open-source project that provides the deployment of software applications inside containers by providing an additional layer of abstraction and automation of OS-LEVEL Virtualization.
The industry uses VM’s to run software applications which runs them inside a guest operating system, which runs on virtual hardware.
wget Arbitrary file upload vulnerability
wget Arbitrary File upload and Remote code execution wget wget is a GNU’s command line tool used for retrieving files using HTTP, HTTPS, and FTP and other Internet Protocols.
This vulnerability is present in wget versions before 1.18. Prior to version 1.18 if wget is supplied with a malicious url it can be tricked into saving arbitrary remote files supplied by the attacker. This when exploited can also lead to root privilege escalation and other vulnerability.