-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PiVPN Added #357
PiVPN Added #357
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great to me
Software that uses this installation method used to be rejected under the previous maintainer (https://github.com/awesome-foss/awesome-sysadmin/pulls?q=is%3Apr+pivpn+is%3Aclosed). This guideline was never written down but I don't want to change the way the list is maintained right now (it's currently on minimal maintenance mode awesome-selfhosted/awesome-selfhosted#2482, I'm just doing some cleanup). I know I would personally never use this method (I understand it's just a matter of downloading the install script first, inspecting it, then running it, but then the documentation should mention it explicitly). This is more of an open question, what guidelines should be added to keep the list high quality? From the past list of issues I remember these ideas:
Feedback welcome. |
IMO the |
I'd say pivpn is fit to be in this list, but as jadolg has described, people might not analyze it thoroughly and just curl bash whatever they want. So it's hard to know in this case. |
I'd like to add a reminder to the discussion of list quality, namely the distinction of sysadmin vs. superuser vs. beginner. At least 1 of these is supposed to know the implications of |
In my opinion this list should stay a resource intended for professional sysadmins, or at least people striving to implement setups of professional quality.
Which is a huge no-go in professional environments (not analyzing what's being run). Hence software for which Other opinions regarding criteria for inclusion are welcome (see comments above). |
Related #429 |
I understand your point of view, and I do not disagree, however, as a professional sysadmin I am quite able to appreciate installation instructions based on a (furthermore likely well-tested) shell script. In fact, it so happened that I got notice of PiVPN thanks to this pull request. I reviewed its Concluding, while I personally don't mind |
I don't understand why not accept the PR just because they document the
If we are going to follow that logic, thinking in the very beginners users, we should delete so many programs of the list because the documentation doesn't say "remember to check the code before executing". |
The criteria from OpenSSF Best Practices are good indicators of quality in FOSS projects. You can see a list of projects and their scores at https://bestpractices.coreinfrastructure.org/en/projects. Note that the use of
So if we go by this,
Of course In light of all this, and the other comments here, I don't think We should still find clear criteria for what is considered "awesome enough" or not. Feedback still welcome. |
The review in #449 yielded good results, I asked a few questions which resulted in constructive answers from @kosli:
I think this is the kind of questions we could include in the pull request template. |
Good results as well in #457 and #453. I'll make a Pull Request to add these questions to the template (done: #459), and move this discussion to a dedicated issue (done #460). In the mean time @OckhamOdyssey @xrat since you are users of PiVPN, can you please take some time to answer these questions as best you can?
Thanks |
Thanks for tagging me, @nodiscc but I am afraid I can't add to the question of awesomeness due to lack of experience with PiVPN:
I just installed v4.1.5 once (shortly after release end of Nov 2022), using the Wireguard option. It worked well, but it's a rather small setup with only 2 clients where I never had to tweak anything since then.
Professional.
1 server serving 2 clients.
Never tried others. |
Personal: February 2021. Professional: 10 months
Both, different environments.
Personal: 5 devices. Professional: we get a peak of almost 300 users once
Command use, effortless. Setup script with great customizable options. The way it manages certificates, gets the status of clients and store the ovpn files are better if you have different sysadmins managing the server. Everything is compared with the Angristan script and manual use, I didn't use any other option.
You also have a command to upgrade the script. Never get a problem. It also automates the creation of static IP addresses, which is great for cybersecurity audits. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks everyone for your valuable input, a new issue has been opened to discuss possible improvements to "awesomeness"/inclusion criteria (#460)
I've added the missing source code link and license/language tags for PiVPN. I'll approve this and merge it in a while, in case someone wants to provide more information.
Application name / category
PiVPN
Source URL
https://github.com/pivpn/pivpn
why it is awesome
Awesome and simply management tool for OpenVPN and Wireguard. It's design for the Raspberry Pi but can be used on any system.