Hacker Newsnew | past | comments | ask | show | jobs | submit | pricci's commentslogin


What I thought yeah. It’s LLM generated shit all the down.


I moved from Traefik to Caddy with caddy-docker-proxy for my self-hosting setup.

All the features I need but *much* simpler.

https://github.com/lucaslorentz/caddy-docker-proxy


Looks interesting but I don't see the benefits really. Still looks like a lot of labels exactly like with traefik. Why should one switch?


Having had used traefik, caddy and now caddy proxy, I like the latter because labels are simple pointers to actual caddy features (reasonably documented).

I used to have all my docker compose files in elaborate structures but moved to portainer for simplicity. Together with caddy proxy it rocks (well, there are several things missing but I have hope)


Same here. I enjoyed Traefik for being able to use docker tags for my reverse proxy configuration. The mechanism is great, however I did not like Traefiks internal config structure. Caddy is much easier for me to understand and matches my (small scale) use cases much better. Using Caddy via Docker labels through caddy-docker-proxy is about as perfect as it gets (for me).


Search by current directory is the killer feature IMO. Was initially recluctant to use atuin, thinking that fish's history was enough, but now I'm sold.

I have sync disabled, though.


For me, having history in a structured sqlite database is the killer feature. You can build useful reports ("histogram of run times for all pytest calls from the current directory that exited zero") in a single sql query.

Sync is oversold as a feature, never used it.


You could try KDE Connect.

And use Tailscale to create a secure network


There is an Obsidian integration also


In tailscale you also can expose a server to the internet with Funnel https://tailscale.com/kb/1223/funnel


Lazydocker has a similar, although simpler, funtionality.

Edit: just checked and it allows to see the layers, but only shows the commands of each one


Someone booting something on your computer without you consent. You can add your own keys and sign the bootloaders of your OSs/LiveCDs/Thumbdrives


Although I haven't really used it, jetpack.io's Devbox [0] is an abstraction over Nix for the usage you describe.

[0] https://www.jetpack.io/devbox


I've played around with it a little bit, but not enough to make any judgements on it. Something like devbox could be the sort of thing to make nix-shell accessible enough to see wider adoption.


Yes, the original email address appears in the headers (In gmail you can click "see full email" if I remember correctly)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: