Hacker Newsnew | past | comments | ask | show | jobs | submit | felixhummel's commentslogin

They should call it Kiroshi. ;) For real though: The cyberpunk dystopia of hackable [1] eye gear is something to think and talk about.

[1]: In both senses of the word.


Yup, I thought the same. Cyborgs!



Shapez


I wholeheartedly agree. https://en.m.wikipedia.org/wiki/Stephen_Briggs got me hooked on Terry Pratchett's Discworld series. I loved "Going Postal".


I know someone who listened Terry Pratchett's "Wachen! Wachen!" audiobook on Spotify while living in Germany for few years. It was so well narrated that he also acquired some peculiarities of local dialects used by specific characters in the book. Locals in Bavaria were quite surprised of a foreigner speaking such language.


I'd add "long-running processes should reload their configuration on SIGHUP". :)


This isn't a list of shoulds. It's a list of, generally dones. Big difference.

This one is still nowhere near universal enough to count in the original lisr sadly.


This is probably technically out of scope for this article. Long-running processes that respond to SIGHUP will usually be running detached (with no controlling TTY). Thus it is a bit of stretch to call them "terminal programs".


This behavior seems difficult to actually implement in practice, no? Your application has to be careful not to accidentally cache any configuration state, as well as any state derived from the configuration, otherwise it will go out of sync. Maybe easy for trivial apps but most apps requiring configuration files are non trivial.



I like the idea and congratulations on good docs.

Two questions:

1. Do you support client certificates for authenticating clients? 2. Do you have some performance benchmarks?


Thanks, need to make the docs less verbose in some places :-)

https://clace.io/docs/configuration/authentication/ lists the supported auth mechanisms for apps. A builtin system account is the default. The OAuth providers supported are : github google digitalocean bitbucket amazon azuread microsoftonline gitlab auth0 okta oidc. Any other provider supported by https://github.com/markbates/goth can be easily added, with a small code change.

For admin operations (creating/updating apps) using the client CLI, a unix domain socket is used. No other auth is used for UDS other than the file system level permissions. A REST API for admin operations can be optionally enabled, in which case it will use the system account https://clace.io/docs/configuration/security/#admin-api-acce....

Client cert based auth is not supported currently. Were you wanting that for app access or for admin API access?

In terms of performance, I did some testing few months back. The app access API does not hit the database (sqlite), everything is cached after the first call. So the performance will be limited by the API performance of the downstream container. The Clace server itself should not be a bottleneck. First API call to a containerized app builds the image and starts the container. That depends on how fast the image build and container startup are.


The client cert based auth would be for the app access.

Our use-case is review apps, i.e. <some-feature>.example.com should only be accessible by users with a valid client cert. Currently we use Caddy, but I'd like to give clace a shot for this. :)



mTLS support has been added for apps. Docs are at https://clace.io/docs/configuration/authentication/#client-c....

Release v0.7.5 has the change




Yes, the subtitle of the article is "AKA in media res"


Hi Felix,

I like it. Thank you for building this! Does it support MIDI as input?

Best, Felix ;)


Hey Felix, i have not implemented it yet, but it's planned for the near future!

Thanks Felix


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: