linuxbrew-core
mkcert
linuxbrew-core | mkcert | |
---|---|---|
15 | 132 | |
1,167 | 45,821 | |
- | - | |
10.0 | 2.7 | |
over 2 years ago | 18 days ago | |
Ruby | Go | |
BSD 2-clause "Simplified" License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
linuxbrew-core
-
Ask HN: Solo-preneurs, how do you DevOps to save time?
I decided to take a few years off work to just build on what I'd like. Perhaps in a startup studio model, so I have a bias for having something that is easily reusable, and that uses tech someone else can pick up and run with easily. I'll probably be in the business of dev/infra tooling.
Currently going with a container image as the minimal deployable unit that gets put on top of a clean up to date OS. For me that's created with a Dockerfile using Alpine image variants. In a way I could see someone's rsync as an ok equivalent, but I'd do versioned symlinked directories so I can easily roll back if necessary if I went with this method. Something like update-alternatives or UIUC Encap/Epk: https://www.ks.uiuc.edu/Development/Computers/docs/sysadmin/.... Anyone remember that? I guess the modern version of Epkg with dependencies these days is https://docs.brew.sh/Homebrew-on-Linux. :-) Or maybe Nixpkgs: https://github.com/NixOS/nixpkgs?
Deployment-wise I've already done the Bash script writing thing to help a friend automate his deployment to EC2 instance. For myself I was going to start using boto3, but just went ahead and learned Terraform instead. So now my scripts are just simple wrappers for Docker/Terraform that build, push, or deploy that work with AWS ECS Fargate or DigitalOcean Kubernetes.
No CI/CD yet. DBs/backups I'll tackle next as I want to make sure I can install or failover to a new datacenter without much difficulty.
- Brew Disappearing After Install
-
How out-out-of-date are packages in OpenSUSE Leap?
If you need the absolute freshest development tools, also consider checking out Homebrew (easy) or Nix (more complicated). They're alternative package managers that will run happily alongside the default system stuff on most any Linux distro.
-
I want Debian, but newer. What are the best options?
I've been running testing for years, but have switched to targetting bullseye so I will be back on stable when it is released. However, I have started installing most packages from linuxbrew now. https://docs.brew.sh/Homebrew-on-Linux
-
I love the shapez.io dlc, but...
I've found using homebrew (for linux), it builds pretty easily: https://docs.brew.sh/Homebrew-on-Linux
-
Home Folder Package Manager?
homebrew on linux
-
Configuring self-signed SSL certificates for local development
The first thing you will need is to install mkcert which can be done via homebrew or homebrew for Linux.
- Does anyone use Homebrew on Linux Mint?
- An AUR like system for Ubuntu
-
Error when booting up
Yesterday I installed homebrew and I had to run some commands to export it on my path. This message used to be shown when I opened a terminal but I ignored it since I was bussy with work. Now it looks like I can't even login, any ideas?
mkcert
-
HTTPS on Localhost with Next.js
The experimental HTTPS flag relies on mkcert, designed for a single development system. If you run a Docker container, the flag won’t configure your local browser to trust its certificate.
- Mkcert: Simple zero-config tool to make locally trusted development certificates
- Mkcert: Simple tool to make locally trusted dev certificates names you'd like
-
You Can't Follow Me
The author mentions difficulties with HTTPS and trying stuff locally.
I've had some success with mkcert [1] to easily create certificates trusted by browsers, I can suggest to look into this. You are your own root CA, I think it can work without an internet connection.
[1] https://github.com/FiloSottile/mkcert/
- SSL Certificates for Home Network
-
Simplifying Localhost HTTPS Setup with mkcert and stunnel
Solution: mkcert – Your Zero-Configuration HTTPS Enabler Meet mkcert, a user-friendly, zero-configuration tool designed for creating locally-trusted development certificates. Find it on its GitHub page and follow the instructions tailored for your operating system. For Mac users employing Homebrew, simply execute the following commands in your terminal:
-
10 reasons you should quit your HTTP client
Well, Certifi does not ship with your company's certificates! So requesting internal services may come with additional painful extra steps! Also for a local development environment that uses mkcert for example!
-
Show HN: Anchor – developer-friendly private CAs for internal TLS
My project, getlocalcert.net[1] may be the one you're thinking of.
Since I'm also building in this space, I'll give my perspective. Local certificate generation is complicated. If you spend the time, you can figure it out, but it's begging for a simpler solution. You can use tools like mkcert[2] for anything that's local to your machine. However, if you're already using ACME in production, maybe you'd prefer to use ACME locally? I think that's what Anchor offers, a unified approach.
There's a couple references in the Anchor blog about solving the distribution problem by building better tooling[3]. I'm eager to learn more, that's a tough nut to crack. My theory for getlocalcert is that the distribution problem is too difficult (for me) to solve, so I layer the tool on top of Let's Encrypt certificates instead. The end result for both tools is a trusted TLS certificate issued via ACME automation.
1. https://news.ycombinator.com/item?id=36674224
2. https://github.com/FiloSottile/mkcert
3. https://blog.anchor.dev/the-acme-gap-introducing-anchor-part...
-
Running one’s own root Certificate Authority in 2023
Looks like step-ca/step-cli [1] and mkcert [2] have been mentioned. Another related tool is XCA [3] - a gui tool to manage CAs and server/client TLS certificates. It takes off some of the tedium in using openssl cli directly. It also stores the certs and keys in an encrypted database. It doesn't solve the problem of getting the root CA certificate into the system store or of hosting the revocation list. I use XCA to create and store the root CA. Intermediate CAs signed with it are passed to other issuers like vault and step-issuer.
[1] https://smallstep.com/docs/step-ca/
[2] https://github.com/FiloSottile/mkcert
[3] https://hohnstaedt.de/xca/
-
Show HN: Local development with .local domains and HTTPS
We use mkcert for this, it works wonderfully.
https://github.com/FiloSottile/mkcert
What are some alternatives?
homebrew-core - 🍻 Default formulae for the missing package manager for macOS (or Linux)
minica - minica is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be used.
pacstall - An AUR-inspired package manager for Ubuntu
nginx-docker-ssl-proxy - A docker way to access localhost:8081 from https://local.dev
dbmate - :rocket: A lightweight, framework-agnostic database migration tool.
certificates - 🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
golang-samples - Sample apps and code written for Google Cloud in the Go programming language.
gosumemory - Cross-Platform memory reader for osu!
homebrew-bundle - 📦 Bundler for non-Ruby dependencies from Homebrew, Homebrew Cask and the Mac App Store.
rustls - A modern TLS library in Rust
homebrew-portable-ruby - 🚗 Versions of Ruby that can be installed and run from anywhere on the filesystem.
uvicorn - An ASGI web server, for Python. 🦄