ethereum-package
nck
ethereum-package | nck | |
---|---|---|
3 | 2 | |
173 | 1 | |
9.2% | - | |
9.5 | 8.3 | |
8 days ago | 2 months ago | |
Starlark | Rust | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ethereum-package
-
Why the fuck are we templating YAML? (2019)
- Portable - It runs pretty much anywhere
Our runtime takes the Starlark and creates environments in both Docker and Kubernetes; from one definition
Our CTO wrote this - https://docs.kurtosis.com/advanced-concepts/why-kurtosis-sta...
Here is a popular environment definition - https://github.com/kurtosis-tech/ethereum-package that protocol developers use to setup custom Ethereum test environments
- Show HN: Launch a private Ethereum Testnet with all clients and MEV infra
-
Spin up a private network with Reth using Kurtosis!
Hey folks, I'm Derek from Kurtosis and wanted to share an exciting update for you all: we've published a new guide in the Reth docs on how to spin up a full private network with Reth and any major CL client using Kurtosis' eth2-package.
nck
-
Why the fuck are we templating YAML? (2019)
https://github.com/nickelpack/nck
I wanted to use Nickel, but it turns out that it can't do everything you'd need it to do to completely replace NixLang. So right now I'm bikeshedding on what to use instead (and desperately trying not to invent something), in other words it's definitely being renamed. Either way there's a bash script in the `test` dir that shows the general concept.
-
Gemini: Google's most capable AI model yet
It is possible, but I suspect my solution may be novel (I got nothing so I continued banging my head against the wall until I figured it out): https://github.com/nickelpack/nck/blob/main/crates/nck-sandb.... The trick is to put everything in a tmpfs, then lazy umount when done.
Container runtimes, apparently, usually have a setuid helper that deals with this stuff. You could also have PID 1 in the namespace clean things up.
That being said, you'll likely run into more problems with root and apparmor etc. Setuid is probably unavoidable for secure sandboxes.
What are some alternatives?
reth - Modular, contributor-friendly and blazing-fast implementation of the Ethereum protocol, in Rust
CogVLM - a state-of-the-art-level open visual language model | 多模态预训练模型
cassandra-package - A Kurtosis Starlark Package that spins up a Cassandra Network
cdktf-aws-cdk - Use AWS CDK constructs in CDKTF projects
cue - The home of the CUE language! Validate and define text-based and dynamic configuration
jupyter-notebook-package - A Kurtosis package for Python data engineers, deploying a Jupyter notebook along with a configurable set of databases, and a visualization tool (Streamlit)