Hi c/selfhosted,
I just wanted to let you know that I have added a frequently requested feature to https://awesome-selfhosted.net - the ability to filter the list by programming language or deployment platform. For example:
- https://awesome-selfhosted.net/platforms/docker.html
- https://awesome-selfhosted.net/platforms/c.html
- https://awesome-selfhosted.net/platforms/php.html
- https://awesome-selfhosted.net/platforms/ansible.html
- https://awesome-selfhosted.net/platforms/go.html
- …
You can navigate between platforms/languages by clicking the relevant link in each software’s metadata. There is no main list of platforms, but if someone creates an issue for it, it can be looked into (please provide details on where/how you expect the platforms list to show up).
A quick update on project news since the new website was released (https://lemmy.world/post/3622280): a lot of curation work has been done, some incorrect data has been fixed, a few additions and some general improvements have been made. A deb platform has been added for those who prefer to deploy software through their distribution’s package management system, and we’re working on a Manufacturing
tag for software related to 3D printing, CNC machines and other physical manufacturing tools.
awesome-selfhosted is a list of Free Software network services and web applications which can be hosted on your own server(s).
The “old”, markdown-formatted list remains available at https://github.com/awesome-selfhosted/awesome-selfhosted and will keep being updated automatically.
The project is maintained by volunteers under the CreativeCommons BY-SA 3.0 License, at https://github.com/awesome-selfhosted/awesome-selfhosted-data.
Thanks again to all contributors.
I prefer using Aegis encrypting exports and syncing those to my nas via syncthing.
But essentially it’s the same as yours.
But that tool seems to be a webpage acting as a TOTP generator.
I wouldn’t entrust such a selfhosted program to host securely solely because I may use permissions wrong and not to mention an attacker silently exporting the whole configuration.