Hacker Newsnew | past | comments | ask | show | jobs | submit | captn3m0's commentslogin

I was using it till the 26 upgrade on my iOS 13 Mini. Became very sluggish and unusable that I had to disable it. It clearly isn't tested well.

I used to have a separate Cloudflare account with a separate DNS Zone for my internal services. Because CF PATs were free-for-all. They've improved this since, so now you can create a token scoped to a single Zone. If you really care about, you can move a subdomain to a separate zone with a child NS record, but I haven't tried it with cloudflare. If you are using something like AWS, you can create an IAM role that can only update a single DNS record.

Moving subdomains to separate zones can make sense for a small set of subdomains and all your certificates would be for names under those subdomains. It gets unwieldy if you have to create a separate zone for each certificate because the certificates don't share a subdomain. But this can be a solution in some circumstances. Thanks.

I see that AWS permissions can be set to limit the risk of compromised credentials. That's a good idea. I see that the lego project has an example of this in their documentation: https://go-acme.github.io/lego/dns/route53/index.html#least-...


I own a Brother printer and was curious how the upload worked. Apparently, it is just screenscraping the CSRF token[0], and submitting the cert upload form[1] in the printer's admin web interface. It needs the printer's admin credentials for the upload to work.

[0]: https://github.com/gregtwallace/brother-cert/blob/main/pkg/p...

[1]: https://github.com/gregtwallace/brother-cert/blob/main/pkg/p...


That's sadly the only reliable way to do this, I actually solved it the same way last year: https://github.com/justjanne/brother-client

The author also maintains https://disable-javascript.org/, which the pop-up links to. And has the exact script + titles used.

> You may want to consider linking to this site, to educate any script-enabled users on how to disable JavaScript in some of the most commonly used browsers. The following code uses scare tactics to do so.

> When added to your website, it will change the icon and the title of your website's tab to some of the most unhinged things imaginable once the user sends your tab to the background. Upon re-activation, the script will display a popover to the user informing them about the joke and referring them to this initiative.


For context, JSONata's reference implementation is 5.5k lines of javascript.

And no, there are no dependencies in package.json either (other than devDependencies for tests).

Which cumulatively means a competent developer could probably port it in less than one day.

They almost certainly spent longer working out how to deploy and integrate the original JS and ironing out the problems, than it would have taken to port it in the first place.

That’s sad.

And then they definitely spent much longer making their optimised fast path for simple expressions. Which they probably wouldn’t have bothered with if they had just ported the whole thing.

As for trying things like embedding V8… this is getting ridiculous.

I strongly suspect no one had actually looked at the code, but had just assumed all along that it was much more complex than it actually was.

The entire thing is a tragedy.


> port it in less than one day

There's confidence and there's barking mad delusion.

Here's the reality.

I once ported 50k loc from Java to Go. Here are details: https://blog.kowalczyk.info/article/19f2fe97f06a47c3b1f118fd...

Java => Go is easier than JavaScript => Go because languages are more similar. That was a very line-by-line port.

Because I was paid by hour I took detailed notes.

I spent 601 hours to port it.

50k / 601 = 83 lines ported per hour, 665 per 8 hour day, but really 500 per 6 working hours a day. No one does sustained 8 hours of writing code daily.

I would consider that very fast and yet order of magnitude slower than your 5.5 k per day.

10x is not a mis-estimation, it's a full blown delusion.


I stand by my estimate, also having done interlanguage ports. I’m not saying any project of such size could be ported in one day, but this very much looks to be one of the more straightforward ones. Being a small project also accelerates things, as there are far fewer moving parts, concepts, &c. to keep in order.

I wouldn’t say that Java → Go is inherently easier than JavaScript → Go. There are more features in JavaScript that, if used, will make porting much harder, but they may well not be used. There’s a bit of async in this project, that’s probably the hardest bit, and maybe a little variadic calling. But comparing with your case, some challenges just aren’t there, such as inheritance and access control.

From a quick skim, I think perhaps 2000 lines will need no change beyond removing semicolons. And since this is mostly parser and AST sort of stuff, a lot of the rest is mechanical repetition and application of regular expression replacements or editor macros.

One note from your article, on fluent function chaining:

> This only works in languages that communicate errors via exceptions. When a function additionally returns an error, it’s no longer possible to chain it like that.

This is a Go limitation, not fundamental. (And Go is well known to be bad or at least verbose at error propagation.) Rust’s ? operator is an easy counterexample.


So it doubled LOC

Go is very verbose.

Golang is a bit more basic and explicit.

Disabling PRs is now possible on GitHub: https://github.blog/changelog/2026-02-13-new-repository-sett...

You can limit them to contributors as well.


Thanks. Doesn't seem to be supported by `gh` yet.

But trufflehog supports docker images already? The trufflehog readme has examples[0]

    # to scan from a remote registry
    trufflehog docker --image trufflesecurity/secrets 
    # to scan from the local docker daemon

    trufflehog docker --image docker://new_image:tag

    # to scan from an image saved as a tarball
    trufflehog docker --image file://path_to_image.tar
[0]: https://github.com/trufflesecurity/trufflehog#11-scan-a-dock...

That's true, but as you can see from your paste, Trufflehog requires the docker daemon and is generally pretty resource intensive while scanning.

layerleak has neither of those issues or requirements.

Try it and let me know what you think.


> That's true, but as you can see from your paste, Trufflehog requires the docker daemon and is generally pretty resource intensive while scanning.

Nothing in his message says it requires the docker daemon? it says it can scan an image from a docker daemon if you want.

I just tried myself and it doesn't require docker at all, you don't need anything docker related even installed on the system.

I tried them both to compare:

- trufflehog: 19 seconds

- layerleak: 26 seconds


His paste literally says...

" # to scan from the local docker daemon"

That aside, I just tested against trufflehog myself. It did take about 10-15%longer for a scan to complete but this is expected. Layerleak is scanning any additional or deleted tags found for the digest while trufflehog only scans the one. I am proud of the project, so I am showing it off. If you dont like, dont use :)

Thanks for checking it out.


Yeah, like I explained you CAN use an image from a docker daemon if you WANT to:

    trufflehog docker --image docker://new_image:tag
If you don't want to scan from a docker daemon then, you can pull from docker hub:

    trufflehog docker --image trufflesecurity/secrets 
or from a tarball:

    trufflehog docker --image file://path_to_image.tar

Not Mozilla’s but Thunderbird’s appeals were seen as mostly positive (and independent of Mozilla).

I did an Archinstall setup this weekend, and that also suggested zram.

Because it's an easy solution esp. to a rather new installer: setting up swap on disk (partition or file, if file which file system, if partition w/o encryption, ...). Zram: install one additional package and forget.

See also the "zram on Fedora" section in the article.


There is also package url (`pkg:/`), now an ECMA standard: https://ecma-international.org/publications-and-standards/st...

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: