Snippet for generating go-flags parameters in VS Code.
Tag: Golang
I have been working with Synology Disk Station products for SOHO for a long time now. It’s a costly NAS but worth it because of: the combination of high-quality software (DSM) and hardware, and it is friendly for newcomers and professionals alike.
By default, Synology offers access to the NAS UI via HTTPS or HTTP protocol.
While HTTP is the simplest option, HTTPS (if done properly) is much more secure. However, the self-signed certificate, provided by Synology is not good neither in terms of security or user experience (ie: RED alerts in browsers and etc).
In general, in DSM 7 you may issue a certificate by two methods:
- request a free certificate from Let’s Encrypt
- import already existing certificate
The first option is available only in case you exposed your Synology to the public internet which might not be the best idea in terms of security.
In this article, I would like to share an approach on how to secure a connection to the Synology by issuing a valid (!) certificate without exposing NAS to the outer world.
Automatic dashboard generation for Ingress objects.
Features:
- No JS
- Supports OIDC (Keycloak, Google, Okta, …) and Basic authorization
- Automatic discovery of Ingress objects, configurable by annotations
- Supports static configuration (in addition to Ingress objects)
- Multiarch docker images: for amd64 and for arm64
Hassle-free minimal CI/CD for git repos for docker-based projects.
Features:
- zero configuration for repos by default
- optional automatic TLS by Let’s Encrypt
- optional automatic domain registration by supported providers
A simplified version of trusted-cgi designed for async processing extreme amount of requests.
- DevOps friendly - plain YAML configuration per subject
- Low memory footprint
- Can handle any size of request (limited by disk only)
Lightweight self-hosted lambda/applications/cgi/serverless-functions engine.
- No specific requirements: just one binary. Working “as-is”
- Rich API
- Scheduler: run actions in cron-tab like style
Automatic, secure, distributed, with transitive connections (that is, forwarding messages when there is no direct access between subscribers), without a single point of failure, peer-to-peer, time-tested, low resource consumption, and a full-mesh VPN network with the ability to “punch” NAT – is it possible?
Tinc-boot - is a all-in-one tool with zero dependency (except tinc of course), that aims to achieve:
- one-line node initialization
- automatic keys distribution
- simplified procedure to add new node to existent net
Fluent and easy wrapper over streadway-amqp API. Adds such features like:
- Reconnecting. Will restore all defined infrastructure
- Optional auto-requeue (with delay)
- Signing and verifiying messages by public/private pair