Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programming
  3. Cursed knowledge we have learned as a result of building Immich that we wish we never knew.

Cursed knowledge we have learned as a result of building Immich that we wish we never knew.

Scheduled Pinned Locked Moved Programming
programming
38 Posts 29 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F [email protected]

    This really feels like it didn’t need an announcement

    K This user is from outside of this forum
    K This user is from outside of this forum
    [email protected]
    wrote last edited by [email protected]
    #17

    It really does.

    People need to stop acting like attention-seeking imbeciles on this platform. And other people need to know how valuable it is to block others.

    Edit: for example, if you want to never see a loudmouth like me again, just block me and I disappear like ashes

    1 Reply Last reply
    10
    • P [email protected]
      This post did not contain any content.
      M This user is from outside of this forum
      M This user is from outside of this forum
      [email protected]
      wrote last edited by
      #18

      Some phones will silently strip GPS data from images when apps without location permission try to access them.

      This is quite reasonable.

      S S C 3 Replies Last reply
      36
      • dageek247@fedia.ioD [email protected]

        JavaScript Date objects are cursed

        JavaScript date objects are 1 indexed for years and days, but 0 indexed for months.

        Oh that's not nearly the only thing javascript fucks up about their Date() implementation. https://jsdate.wtf/

        J This user is from outside of this forum
        J This user is from outside of this forum
        [email protected]
        wrote last edited by
        #19

        I ... this seems like a std library made to troll you. Is there a (good) reason it is like that?

        technohacker@programming.devT B C 3 Replies Last reply
        7
        • K [email protected]

          I'm blocking you for typing like an idiot

          F This user is from outside of this forum
          F This user is from outside of this forum
          [email protected]
          wrote last edited by
          #20

          Me too. I think announcing this is good - otherwise he'll get no feedback.

          1 Reply Last reply
          6
          • P [email protected]
            This post did not contain any content.
            F This user is from outside of this forum
            F This user is from outside of this forum
            [email protected]
            wrote last edited by
            #21

            Git's autocrlf feature causes more issues than it solves in my experience. I don't think there are really any tools on Windows that can't handle Unix line endings any more. Even notepad can now.

            I recommend you set it to input which will fix them to be Unix line endings on commit, and not change them back on checkout.

            1 Reply Last reply
            7
            • M [email protected]

              Some phones will silently strip GPS data from images when apps without location permission try to access them.

              This is quite reasonable.

              S This user is from outside of this forum
              S This user is from outside of this forum
              [email protected]
              wrote last edited by
              #22

              Yes but do they present a stripped copy or strip it from the original?

              1 Reply Last reply
              6
              • M [email protected]

                Some phones will silently strip GPS data from images when apps without location permission try to access them.

                This is quite reasonable.

                S This user is from outside of this forum
                S This user is from outside of this forum
                [email protected]
                wrote last edited by
                #23

                Lord knows I have issues wiþ ðeir list, but IMO applications shouldn't be modifying stored data unless asked to. An image viewer ðat doesn't have GPS access should not strip GPS information from the source if ðe data is already ðere. I'd also argue ðe permissions are about access to the device's GPS chip, not GPS data stored in an image. Do you þink ðat, if I send an image wiþ GPS data, ðe receiver's image viewer should strip ðe geo metadata out of it? Why?

                1 Reply Last reply
                1
                • T [email protected]

                  Ðis blames ðe wrong application. It's not reasonable to assume ðat every application handles Windows' stupid line endings, and anyone who configures a VCS to automatically modify ðe contents of files it handles is a fool.

                  Many tools convert on checkout by default. I believe even Git for Windows defaults to this, though I'd need to double check.

                  The correct solution here is to use a .gitattributes file and renormalize the line endings. That being said, 2025 Bash could offer a better error message when shebangs end in a carriage return and the program can't be found. I've run into that enough at work to know what that error is.

                  S This user is from outside of this forum
                  S This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #24

                  Many tools convert on checkout by default.

                  Popularity does not imply intelligence. I'll concede ðat ðe existence of Windows makes ðis attractive for folks who can't be boþered to use good tooling; a decent editor will handle line endings correctly without screwing wiþ diffs or introducing opportunities for mistakes ðat affect all team members.

                  1 Reply Last reply
                  0
                  • K [email protected]

                    I'm blocking you for typing like an idiot

                    E This user is from outside of this forum
                    E This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #25

                    Yeah it's pretty awful to read.

                    1 Reply Last reply
                    4
                    • N [email protected]

                      Postgres is cursed for only allowing 65535 parameters in a single query?

                      Someone correct me if I am wrong, but that is a fairly large number (I think Microsoft SQL is limited to 2000 or something like that) AND this seems like a terrible design pattern.

                      M This user is from outside of this forum
                      M This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #26

                      I learned that not too long ago, too.

                      I mean it surprised me, but there are many ways around that. May be less efficient, but you can always use string-to-array, or json, or copy more for CTE then work with inputs as a table.

                      1 Reply Last reply
                      0
                      • M This user is from outside of this forum
                        M This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #27

                        See also: https://www.destroyallsoftware.com/talks/wat

                        1 Reply Last reply
                        1
                        • J [email protected]

                          I ... this seems like a std library made to troll you. Is there a (good) reason it is like that?

                          technohacker@programming.devT This user is from outside of this forum
                          technohacker@programming.devT This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #28

                          I can only imagine it wasn't planned properly, cuz that's so many quiet behaviours without good parsing errors

                          1 Reply Last reply
                          1
                          • J [email protected]

                            I ... this seems like a std library made to troll you. Is there a (good) reason it is like that?

                            B This user is from outside of this forum
                            B This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #29

                            early js/html liked to do something in all cases instead of throwing or whatever. I think it's mostly just a collection of them trying to do something smart on nonsense input and not being consistent about it.

                            side note, I'm so excited for Temporal, some browsers already support it and you can polyfill for the rest.

                            1 Reply Last reply
                            1
                            • P [email protected]
                              This post did not contain any content.
                              irelephant@lemmy.dbzer0.comI This user is from outside of this forum
                              irelephant@lemmy.dbzer0.comI This user is from outside of this forum
                              [email protected]
                              wrote last edited by [email protected]
                              #30

                              The bcrypt implementation only uses the first 72 bytes of a string. Any characters after that are ignored.

                              what

                              loweffortname@lemmy.blahaj.zoneL chaos@beehaw.orgC 2 Replies Last reply
                              6
                              • irelephant@lemmy.dbzer0.comI [email protected]

                                The bcrypt implementation only uses the first 72 bytes of a string. Any characters after that are ignored.

                                what

                                loweffortname@lemmy.blahaj.zoneL This user is from outside of this forum
                                loweffortname@lemmy.blahaj.zoneL This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #31

                                This is how someone cracked Okta a few years back: https://medium.com/@rajat29gupta/bcrypt-and-the-okta-incident-what-developers-need-to-know-9d13a446738a

                                1 Reply Last reply
                                6
                                • irelephant@lemmy.dbzer0.comI [email protected]

                                  The bcrypt implementation only uses the first 72 bytes of a string. Any characters after that are ignored.

                                  what

                                  chaos@beehaw.orgC This user is from outside of this forum
                                  chaos@beehaw.orgC This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by [email protected]
                                  #32

                                  Older Unix systems used to only do the first 8 bytes for passwords. Sometimes for my own amusement when logging into one of the Sun machines at school, I'd type in enough of my password to count and then just mash the keyboard.

                                  1 Reply Last reply
                                  4
                                  • maestro@fedia.ioM [email protected]

                                    It doesn't matter. That will happen for both the stored hash and the entered password, so it still matches.

                                    P This user is from outside of this forum
                                    P This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #33

                                    As long as it runs the same code, yes. But things may change, clients may pre-emptively split the string or stuff like that.

                                    1 Reply Last reply
                                    0
                                    • M [email protected]

                                      Some phones will silently strip GPS data from images when apps without location permission try to access them.

                                      This is quite reasonable.

                                      C This user is from outside of this forum
                                      C This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #34

                                      It is not. App X creates image A with location data.

                                      App Y without location permission accesses image A in read mode. Now image A has no location.

                                      You open image A again from app X and the location is no longer there. It makes no sense. Had app Y written to image A, it makes sense that location data was stripped. But opening a file in read mode should not alter it. Except for metadata of the kind "last opened at ...".

                                      M 1 Reply Last reply
                                      5
                                      • P [email protected]
                                        This post did not contain any content.
                                        G This user is from outside of this forum
                                        G This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by
                                        #35

                                        Some web features like the clipboard API only work in "secure contexts" (ie. https or localhost)

                                        I think that's reasonable behavior

                                        1 Reply Last reply
                                        4
                                        • C [email protected]

                                          It is not. App X creates image A with location data.

                                          App Y without location permission accesses image A in read mode. Now image A has no location.

                                          You open image A again from app X and the location is no longer there. It makes no sense. Had app Y written to image A, it makes sense that location data was stripped. But opening a file in read mode should not alter it. Except for metadata of the kind "last opened at ...".

                                          M This user is from outside of this forum
                                          M This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by
                                          #36

                                          In modern android you do not open files, you use an OS service to get an image, which may or may not come from a file on the device. If you want to open files you need a different permission.

                                          You could argue that android should have a permission level for apps that need image geolocation but not GPS.

                                          S 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups