Hacker Newsnew | past | comments | ask | show | jobs | submit | more ghoshbishakh's commentslogin

So do you suggest we should avoid setting a color in our CLI app? We would take this into consideration in our next pinggy.io CLI update.


rails has nothing to do with the rendered page size though. Congrats on the perfect lighthouse score.


Doesn't Rails asset pipeline have an effect on the page size, like if Propshaft being used instead of Sprockets. From what I remember, Propshaft intentionally does not include minification or compression.


It’s all Rails 8 + Turbo + Stimulus JS with Propshaft handling the asset bundling / pipeline.

All the Tailwind building and so on is done using common JS tools, which are mostly standard out of the box Rails 8 supplied scripts!

Sprockets used to do the SASS compilation and asset bundling, but the Rails standard now is to facilitate your own preferences around compilation of CSS/JS.


Indeed it does not :-)

It was more a quick promote Rails comment as it can get dismissed as not something to build fast website in :-)


It is correct that pangolin is something like pinggy.io or cf tunnels as you mention. But those do not give such fine grained access control it seems - like a firewall checking identity and all.

But definitely it is not a vpn or mesh network it seems.


So this is something like pinggy.io - self hosted?


Yes, it can operate as a self-hosted ngrok, pinggy, Cloudflare Tunnel with Github/OpenID Connect/SAML SSO and it can also provide anonymous public access, which can be useful for public website/API hosting, among many other use cases. You can see the examples https://octelium.com/docs/octelium/latest/management/guide/s... and https://octelium.com/docs/octelium/latest/management/guide/s...


There are tools specifically built for hosting stuff without public IP such as https://pinggy.io


There are a number of paid services like that yes.


The "Why not WebSocket?" arguments in the PR ar hilarious. Also, these arguments look AI generated which tells something.


Why route all traffic through a tunnel for a production setup? On-premise solutions will use static IPs from their ISPs.

Full disclosure - I work at https://pinggy.io


So this is like a privater peer to peer version of https://pinggy.io ? Looks great.

Although pinggy has option to whitelist ip or use an api key for authenticated access.

This is somewhat similar to wireguard like setup - but just for http.


Wireguard is def comparable to iroh, so you are correct. We could have used Wireguard to build malai had malai been in Golang. iroh is wireguard for Rust (and slightly better because it is lot smaller / simpler to use as a library, with no special access, like Wireguard is almost full blown VPN, talks about IPs etc, a bit more than what iroh does, but both are awesome).

"privater Pinggy.io", yes :-)

We have not yet created access control stuff, it is in our roadmap, we are going to do not just HTTP, but TCP, ssh, folder sharing etc etc. And our access control stuff will span across all these use cases, like a unified / simplified access control so you can create interesting network stuff, without learning about complex firewall rules etc.

It is a hard problem because of the audience. Most networking tools are written for a very specific networking geek audience, we are trying to create a solution to be used by more general population.

Like who wants to share a folder? Not just networking geeks, or even just geeks, but virtually everyone using Dropbox/Google Drive. So why not create an open source peer to peer versions of these tools. Which is what we are trying to do.


A one command tunneling tool to get public URLs to localhost. No installation required. https://pinggy.io


VDX.tv?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: