makeself
amazon-corretto-crypto-provider
makeself | amazon-corretto-crypto-provider | |
---|---|---|
11 | 2 | |
2,133 | 215 | |
- | 0.5% | |
6.5 | 8.0 | |
14 days ago | 1 day ago | |
Shell | Java | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
makeself
- Show HN: People forget that you can stick any data at the end of a bash script
- makeself
- Makeself – Make self-extractable archives on Unix
-
Use Fast Data Algorithms
Why not try a self-extracting archive?
see https://makeself.io
-
Fullmoon – Redbean-based Lua web framework deployed as single file
Thanks for introducing Zerobrane, really looks fantastic. Also by extension introduced me to https://makeself.io/ for making Linux installations.
-
Rust has a small standard library (and that's ok)
Yeah, I can understand that, but the same advantage doesn't easily apply to situations like Rust, where you're already quite unlikely to be building the program on your production machines. I've done the same for Python many times, actually, using pip download to retrieve dependencies and building a package that is then installed on the target machine with some makeself mess. It actually worked surprisingly well, much of the time.
-
Today I came across a 1.8GB shell script
edit: you might wanna check out makeself
amazon-corretto-crypto-provider
-
Use Fast Data Algorithms
I don't fully agree for two reasons.
First, I am not sure the data on most in-use hardware (e.g. EC2 m5/c5/i3en etc ...) supports your conclusions. xxHash is faster than crypto hashes always and BLAKE3 single threaded is faster on every Intel machine I've come across in wide deployment. I hear similar arguments around CRC-32 and to be frank it just isn't true on most computers most people run things on.
Second, many languages don't properly use the hardware instructions and if they do they often don't use them correctly. For example, Java 8 has bog slow SHA-1, AES-GCM and MD5 implementations, and switching to Amazon Coretto Crypto Provider was able to speed SHA/MD5 up by 50% and AES-GCM by ~90% on a reasonably large deployment (although the JDK wasn't using proper hardware instructions for AES-GCM until Java 9 I think it is still slower even after that).
That being said, like I disclaimed at the top of the benchmark your particular hardware and your particular language matters a lot.
[1] https://github.com/corretto/amazon-corretto-crypto-provider/...
-
What JCA Security Provider do you use for your Java applications?
If you need better performance (and are running Linux), use the Amazon Corretto Crypto Provider (disclaimer: I am one of its primary authors)
What are some alternatives?
redbean-docker - Docker image for redbean from the "scratch" container
xxHash - Extremely fast non-cryptographic hash algorithm
BLAKE3 - the official Rust and C implementations of the BLAKE3 cryptographic hash function
rmate - Remote TextMate 2 implemented as shell script
cityhash - Automatically exported from code.google.com/p/cityhash
dotfiles - rice 🍚 custom linux config files. as seen on r/unixporn #noricenolife neovim cultist. dotfiles are perpetual wip
fullmoon - Fast and minimalistic Redbean-based Lua web framework in one file.
requests - A simple, yet elegant, HTTP library.
proposal-temporal - Provides standard objects and functions for working with dates and times.
lua-style-guide - Olivine Labs Lua Style Guide