console VS hubris

Compare console vs hubris and see what are their differences.

hubris

A lightweight, memory-protected, message-passing kernel for deeply embedded systems. (by oxidecomputer)
SurveyJS - Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App
With SurveyJS form UI libraries, you can build and style forms in a fully-integrated drag & drop form builder, render them in your JS app, and store form submission data in any backend, inc. PHP, ASP.NET Core, and Node.js.
surveyjs.io
featured
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
console hubris
11 33
107 2,813
10.3% 3.2%
9.7 9.6
1 day ago 8 days ago
TypeScript Rust
Mozilla Public License 2.0 Mozilla Public License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

console

Posts with mentions or reviews of console. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-23.
  • Oxide Cloud Computer. No Cables. No Assembly. Just Cloud
    3 projects | news.ycombinator.com | 23 Mar 2024
    >https://console-preview.oxide.computer/

    That's pretty cool! The design language is a nice touch for sure.

  • Storybook 8
    5 projects | news.ycombinator.com | 13 Mar 2024
    I've used Storybook during development for a while now and the use case you present is how the Storybook is pitched. I actually agree about the simplicity of discovering the components. What I disagree with, though, is that I can't see value of "develop & test your UI independently from your app" part. It forces me to decouple the state from a component and this in turn adds unnecessary complexity to the architecture.

    I'm going to use Oxide console [1] as an example because it has a really good setup of MSW + OpenAPI autogenerated mocks (which means that it doesn't need any complete backend, just a defined contract).

    Consider this fairly simple page [2]. If I'm using the Storybook pattern, I'm keeping all of the state outside of the component, which means I now have to manually memoize every single variable defined before the return to make sure that the component doesn't do any unnecessary re-renders. This includes `intervalPicker`, `commonProps`, `setFilterId`, every return of `useDateTimeRangePicker`. With MSW I have benefits not needing the API, testing in real production app, using the same exact mocks for unit tests and development.

    [1]: https://github.com/oxidecomputer/console

    [2]: https://github.com/oxidecomputer/console/blob/main/app/pages...

  • Tailwind CSS v4.0.0 Alpha
    7 projects | news.ycombinator.com | 6 Mar 2024
  • Remix Vite Is Now Stable
    5 projects | news.ycombinator.com | 21 Feb 2024
    SPA mode (what I assume you mean by BFF mode) is brand new, so almost nobody has used it. However, a close example would be the Oxide web console, which we build as an SPA because we want to serve it as static assets from a Rust backend. It's very close to your suggested stack: React + React Router + Tanstack query + zustand, though importantly we also use React Router's loaders to give the app a better-than-SPA feel on navigations. I do plan on moving it to Remix SPA mode when I get a chance, but like I said the result should be very similar so it's not that high a priority for me. If I were starting from scratch I'd probably use Remix SPA.

    Repo: https://github.com/oxidecomputer/console/

    Live demo here with in-browser MSW mock API: https://oxide-console-preview.vercel.app

  • Oxide: The Cloud Computer
    9 projects | news.ycombinator.com | 26 Oct 2023
    VPS providers are nice, but they don't provide the same cloud-level capabilities that Oxide offers. Check out the console to get an idea of what I mean (this is a demo with mock data): https://oxide-console-preview.vercel.app/
  • Mock Service Worker(msw) releases 2.0
    8 projects | news.ycombinator.com | 23 Oct 2023
    Yeah, basically. We do it with a function call where the argument to the function is that interface representing all the API endpoints. `makeHandlers` handles parsing path params, query params, and request body and passes them to each endpoint handler. So the runtime validation of request bodies is also generated — we generate a zod schema for each request body in the OpenAPI definition and use it to parse the actual request body that comes in.

    big function call https://github.com/oxidecomputer/console/blob/bd65b9da7019ad...

    automatic body parsing and argument passing: https://github.com/oxidecomputer/console/blob/bd65b9da7019ad...

    When an endpoint gets added to the spec, we can rerun the generator and get type errors in the `makeHandlers` telling us endpdoints are missing.

hubris

Posts with mentions or reviews of hubris. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-10-26.
  • Framework won't be just a laptop company anymore
    1 project | news.ycombinator.com | 24 Apr 2024
    > The CPUs in Oxide racks are AMD, so, presumably AMD-based compute rather than ARM.

    These don’t run Hubris though; based on the chips directory in the repo [0], they’re targeting a mix of NXP and ST parts, which are Arm, and the user isn’t likely to see them or care what firmware they’re running: they’re really pretty “boring”.

    [0] : https://github.com/oxidecomputer/hubris/tree/020d014880382d8...

  • Who killed the network switch? A Hubris Bug Story
    1 project | news.ycombinator.com | 26 Mar 2024
    I wouldn't put this comment here. It's not just some detail of this function; it's an invariant of the field that all writers have to respect (maybe this is the only one now but still) and all readers can take advantage of. So I'd add it to the `TaskDesc::regions` docstring. [1]

    [1] https://github.com/oxidecomputer/hubris/commit/b44e677fb39cd...

  • Oxide: The Cloud Computer
    9 projects | news.ycombinator.com | 26 Oct 2023
    With respect to Hubris, the build badge was, in turns out, pointing to a stale workflow. (That is, the build was succeeding, but the build badge was busted.) This comment has been immortalized in the fix.[0]

    With respect to Humility, I am going to resist the temptation of pointing out why one of those directories has a different nomenclature with respect to its delimiter -- and just leave it at this: if you really want to find some filthy code in Humility, you can do much, much better than that!

    [0] https://github.com/oxidecomputer/hubris/commit/651a9546b20ce...

  • Barracuda Urges Replacing – Not Patching – Its Email Security Gateways
    2 projects | news.ycombinator.com | 11 Jun 2023
    A lot of questions in there! Taking these in order:

    1. We aren't making standalone servers: the Oxide compute sled comes in the Oxide rack. So are not (and do not intend to be) a drop in replacement for extant rack mounted servers.

    2. We have taken a fundamentally different approach to firmware, with a true root of trust that can attest to the service processor -- which can turn attest to the system software. This prompts a lot of questions (e.g., who attests to the root of trust?), and there is a LOT to say about this; look for us to talk a lot more about this

    3. In stark contrast (sadly) to nearly everyone else in the server space, the firmware we are developing is entirely open source. More details on that can be found in Cliff Biffle's 2021 OSFC talk and the Hubris and Humility repos.[0][1][2]

    4. Definitely not vaporware! We are in the process of shipping to our first customers; you can follow our progress in our Oxide and Friends podcast.[3]

    [0] https://www.osfc.io/2021/talks/on-hubris-and-humility-develo...

    [1] https://github.com/oxidecomputer/hubris

    [2] https://github.com/oxidecomputer/humility

    [3] https://oxide-and-friends.transistor.fm/

  • Do you use Rust in your professional career?
    6 projects | /r/rust | 9 May 2023
  • Spotting and Avoiding Heap Fragmentation in Rust Applications
    3 projects | news.ycombinator.com | 6 Apr 2023
    everywhere, for example in https://github.com/oxidecomputer/hubris/search?q=dyn

    Is Box really allocating here? Is the "Rust By Example" text incomplete?

    Then I had to stop learning Rust for other reasons, but this doubt really hit me at the time.

  • What's the coolest thing you've done with Neovim?
    11 projects | /r/neovim | 4 Mar 2023
    I work on an embedded OS in Rust (Hubris) that has a very bespoke build system. As part of the build system, it has to set environmental variables based on (1) the target device and (2) the specific "task"; this is an OS with task-level isolation, so tasks are compiled as individual Rust crates.
  • TCG TPM2.0 implementations vulnerable to memory corruption
    1 project | news.ycombinator.com | 28 Feb 2023
    Oxide Computer told some storied about the difficulty of bring up of a new motherboard, and mentioned a lot of gotcha details and hack solutions for managing their AMD chip.

    They talked about their bring up sequence, boot chain verification on their motherboard, and designing / creating / verifying their hardware root of trust.

    I heard mention of this on a podcast recently, trying to find the reference.

    I'm pretty sure it was [S3]

    - "Tales from the Bringup Lab" https://lnns.co/FBf5oLpyHK3

    - or "More Tales from the Bringup Lab" https://lnns.co/LQur_ToJX9m

    But I found again these interesting things worth sharing on that search. https://oxide.computer/blog/hubris-and-humility, https://github.com/oxidecomputer/hubris

    Search 1 [S1], Trammell Hudson ep mentioning firmware (chromebook related iirc) https://lnns.co/pystdPm0QvG.

    Search 2 [S2], Security, Cryptography, Whatever podcast episode mentioning Oxide and roots of trust or similar. https://lnns.co/VnyTvdhBiGC

    Search links:

    [S1]: https://www.listennotes.com/search/?q=oxide+tpm

    [S2]: https://www.listennotes.com/search/?q=oxide%20and%20friends%...

    [S3]: https://www.listennotes.com/search/?q=oxide%20and%20friends%...

  • Well-documented Embedded dev board for video, ethernet, usb, file IO, etc
    1 project | /r/rust | 25 Jan 2023
  • OpenAI Used Kenyan Workers on Less Than $2 per Hour to Make ChatGPT Less Toxic
    3 projects | news.ycombinator.com | 18 Jan 2023
    When we started the company, we knew it would be a three year build -- and indeed, our first product is in the final stages of development (i.e. EMC/safety certification). We have been very transparent about our progress along the way[0][1][2][3][4][5][6][7] -- and our software is essentially all open source, so you can follow along there as well.[8][9][10]

    If you are asking "does anyone want a rack-scale computer?" the (short) answer is: yes, they do. The on-prem market has been woefully underserved -- and there are plenty of folks who are sick of Dell/HPE/VMware/Cisco, to say nothing of those who are public cloud borne and wondering if they should perhaps own some of their own compute rather than rent it all.

    [0] https://oxide-and-friends.transistor.fm/episodes/holistic-bo...

    [1] https://oxide-and-friends.transistor.fm/episodes/the-oxide-s...

    [2] https://oxide-and-friends.transistor.fm/episodes/bringup-lab...

    [3] https://oxide-and-friends.transistor.fm/episodes/more-tales-...

    [4] https://oxide-and-friends.transistor.fm/episodes/another-lpc...

    [5] https://oxide-and-friends.transistor.fm/episodes/the-pragmat...

    [6] https://oxide-and-friends.transistor.fm/episodes/tales-from-...

    [7] https://oxide-and-friends.transistor.fm/episodes/the-sidecar...

    [8] https://github.com/oxidecomputer/omicron

    [9] https://github.com/oxidecomputer/propolis

    [10] https://github.com/oxidecomputer/hubris

What are some alternatives?

When comparing console and hubris you can also consider the following projects:

orval - orval is able to generate client with appropriate type-signatures (TypeScript) from any valid OpenAPI v3 or Swagger v2 specification, either in yaml or json formats. 🍺

tock - A secure embedded operating system for microcontrollers

meetup-contacts-app-2021 - Modern, structured React application demo with pages, services. An Opinionated React App template for large projects.

esp32 - Peripheral access crate for the ESP32

cio - Rust libraries for APIs needed by our automated CIO.

meta-raspberrypi - Yocto/OE BSP layer for the Raspberry Pi boards

moonfire-nvr - Moonfire NVR, a security camera network video recorder

esp32-hal - A hardware abstraction layer for the esp32 written in Rust.

manifold-api - Manifold API Client Bindings

l4v - seL4 specification and proofs

oxide.ts - TypeScript client for the Oxide API

ferros - A Rust-based userland which also adds compile-time assurances to seL4 development.