Hacker Newsnew | past | comments | ask | show | jobs | submit | kirici's commentslogin

> I wonder if github supports regex search

/it does like this/


https://github.com/sunny0826/kubecm

Tested a bunch and this is the one I stuck with, at least until I make my own. Once the entries are all right, I use the dare I say industry standard to switch between them:

https://github.com/ahmetb/kubectx


Even if they did they still won't have caught up, because Tesla has had full self driving at the end of every year for the past 8 years.


Their new hope is to have the Optimus humanoid take the driver seat and finally drive the car. Of course, we'll have to wait until this December.


I think the real plan is Optimus will transform into a car to drive you around and occasionally also fight Megatron.


Dec 2026


Clearly you fell for the premature measuring fallacy, everyone knows to optimize for web-scale first.


I'm using difftastic, it cuts down a whole lot of the noise

https://difftastic.wilfred.me.uk/


This looks good! Unfortunately it looks like it also suffers from exactly the same software supply chain problem that we need to avoid in the first place: https://github.com/Wilfred/difftastic/blob/master/Cargo.lock

Edit: also, consider how much of https://github.com/Wilfred/difftastic/commits/master/ is just noise in itself. 15k commits for a project that appears to only be about four years old.


"exactly the same software supply chain problem"

While the crates ecosystem is certainly not immune to supply chain attacks this over generalization is not justified.

There are several features that make crates.io more robust than npm. One of them is that vulnerable versions can be yanked without human intervention. Desperate comments from maintainers like this one[1] from just a few days ago would not happen with crates.io.

There are also features not provided by crates.io that make the situation better. For example you could very easily clone the repo and run

    cargo vet
to check how many of the packages had human audits. I'd done it if I was on a computer, but a quick glance at the Cargo.lock file makes me confident that you'd get a significant number.

[1] https://news.ycombinator.com/item?id=45170687


The main issue there is that the maintainer lost access to their account. Yanking malicious packages is better, but even just being able to release new patch versions would've stopped the spread, but they were not able to do so for the packages that didn't have a co-publisher. How would crates.io help in this situation?

FWIW npm used to allow unpublishing packages, but AFAIK that feature was removed in the wake of the left-pad incident [1]. Altho now with all the frequent attacks, it might be worth considering if ecosystem disruption via malicious removal of pacakge would be lesser of two evils, compared to actual malware being distributed.

1: https://en.wikipedia.org/wiki/Npm_left-pad_incident


I'd argue it's more of a culture thing, not technical thing.

In both JavaScript and Rust, it's normal/encouraged to just add a tiny dependency to the package manager. The communities even pride themselves, that they have such good package managers to allow this.

It's this "yeah, there is a crate for this tiny function I need, let's just include it" mentality that makes the ecosystem vulnerable.

People need to be responsible for whatever they include, either pay the price by checking all versions up front, or pay it by risking shipping a vulnerable program that it's much harder to retract than a JavaScript frontend.


I was using "just git" until I realized I've started writing a whole bunch of scripts of various types to recreate ("ad-hoc, informally specified and bug-ridden...") functionality that chezmoi offers out of the box and has already tested in the field.


There happens to be a distro called Vanilla that is Debian-based, atomic, integrates distrobox etc.

https://vanillaos.org/


Gotcha, wasn't familiar with that Distro.


I've had multiple flaky issues with SQLite (e.g. non-HA Grafana) on Azure Files using NFS v4.1 leading to locked DBs. Perhaps some implementations work, I'm not gonna rely on it or advise others to do so.


Yeah trying to write from several hosts will certainly fail if you don't have advisory locks working, which is not a given, so you are right of course


These were singular containers, let alone hosts.


I am currently looking into zot, what were your blockers/hiccups with it?


When we looked at modernizing our image hosting, it came down to Zot vs Harbor, and we preferred Zot as it looked easier to deploy. Just a go binary with a few environment variables connecting to our minio, what could be easier?

However, when getting the config prod-ready, we started to trip over one thing after the other. First, my colleague was struggling to get the scale-out clustering to work in our container management. Right, use the other deployment way for HA. Then we found that apparently, if you enable OIDC, all other authentication methods get deactivated, so suddenly container hosts would have to login with tokens... somehow? And better hope your OIDC provider never goes down. And then we found a bug on top that Zot possibly doesn't remove blobs from minio during GC.

At that point we reconsidered and went with Harbor.


Glad I didn't start evaluating it earlier, just a few hours down the drain.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: