Actually, Bun + Vite does work. We're doing this. Soapbox on Bun + Vite. Fuck it ship it!
Today's mission: merge Soapbox building with Vite, finally. This will make the build 2x faster and the devserver 6x faster.
Thanks everyone who tried the Ditto demo and reported bugs. They are actually bugs in Soapbox rather than in Ditto for the most part, with my half-assed Nostr implementation. But before I hack on Soapbox again I want to make the developer experience more tolerable. I also tried keeping Webpack and switching to Bun with no other changes. This made the build 10s slower. However it made installing packages like 100x faster (not an exaggeration).
The ultimate gamer move will be to use Bun + Vite down the line, but currently Bun does not support Vite's hot reloading and Vite does not use Bun's streamlined bundler yet. However, it is planned. Making pancakes this morning and got this hood classic stuck in my head. https://youtu.be/tlpcXYkJa9I?si=B_2ZfQLIxLpMb1jn
STOP YOU CANT DO THIS TO ME, IM VEEEEEEEEEGAANNNNNN
RT: https://poa.st/objects/6fd3b5ad-b379-4966-b0d9-12607df239e2 IT'S FAKE NEWS ,FAKE NEWS
RT: https://poa.st/objects/6ffb699e-a574-4143-85f8-924b6ec38a0d There are also some very stupid things I'm doing, such as hammering too many relays unnecessarily and not resolving events correctly.
Most of the problems with Ditto right now are actually in Soapbox, though. A lot of it not "just working" is that I didn't start adding real client support until yesterday. Fellas, I am vegan for life. If I ever stop being vegan it means something is horribly wrong. If I accidentally eat a milk product I will induce vomiting.
Looks like Chrome has a remote code execution vulnerability. Aka viewing a particular image in the browser can give an attacker access to your whole computer. Upgrade now.
https://www.timesnownews.com/technology-science/update-now-critical-google-chrome-flaw-exploited-article-103597437 yes friend these bugs are common, but thankfully not exploitable alone anymore. a modern browser exploit chain requires at at least 3 vulnerabilities combined: - Code execution (Browser) It appears this jewish israeli exploit chain was for iphone, so used ios-specific other components. their exploit chain would not work for other platforms thankfully The fragile and childish users of Mastodon will finally be able to enter the soft embrace of a real world stuffed elephant to remind them of the cozy feeling they get inside whenever they #fediblock doing the dishes for the eighth day in a row.
RT: https://mastodon.social/users/Gargron/statuses/111043162103567515 |