All tests passing and the binary running flawlessly ON A FREAKIN’ RASPBERRY PI ZERO!
Wanna blow up my Raspberry Pi Zero?
Here, have some random ASCII cows: https://pi0.ar.al/cows
You can also see the stats for this session here: https://pi0.ar.al/b829a930d7dc1a0e8d118eb83d1d9576
(I just want to see how it performs. Will turn it off at some point and delete this tweet when I do.) :)
Watching your requests streaming in and the little Raspberry Pi Zero handling them like a champ ;)
Nearly three thousand requests with folks from Poland to California :) I think I’ll keep it running until it reaches about 10,000 and then give the little Pi a rest and call it a day!
:wave: @gid@cybre.space
Got a question from @RadicalEdward about how the Raspberry Pi Zero is exposed to the Internet: It’s via ngrok and I’m very impressed with how that’s handling itself as well (it’s an awesome service and worth every penny – both @laura and I have Pro accounts there).
Right folks, almost 6,000 requests last I checked. Going to turn it off now.
Thank you all for playing and for your very creative 404 messages ;)
Conclusion: you can host a personal site/app/etc. with Site.js on a Raspberry Pi Zero W.
Final tally: a tiny @Raspberry_Pi Zero W, running Site.js over a WiFi connection from my desk, & exposed to the Interwebs via @ngrokapp, served over 7,000 requests (mostly dynamic Node.js) in a little experiment we just ran.
Small Technology FTW!
@aral
Couldn't find a suitable FLOSS alternative to PageKite or ngrok, which has Client & Server available. Do you know any?
@yala Haven’t had a chance to really look into it. Please let me know if you hear of anything. I’m very happy to ngrok but always good to know of things you can integrate into your own work if necessary :)
@aral@mastodon.ar.al might be off now but I couldnt connect as the
pi0.ar.al has a security policy called HTTP Strict Transport Security (HSTS), which means that Firefox can only connect to it securely. You can’t add an exception to visit this site.
Websites prove their identity via certificates. Firefox does not trust this site because it uses a certificate that is not valid for pi0.ar.al. The certificate is only valid for the following names: *.eu.ngrok.io, eu.ngrok.io
@adamprocter Hey Adam, yeah, I turned it off after the experiment. Did another little one (on Twitter this time) just now. Had about 30 folks. Ran flawlessly unwired on battery power and over LTS :)