Yeah, writing your own squeeblerizer sucks, but there's no better option. GNU Scrimble can be used off-the-shelf as a passthrough, so the only real tasks are implementing Squeeb's algorithm and a sprongler; then, your entire pipeline is merely something like:
$ gscrimble --passthrough --args -- ./your_squeeb | ./your_sprongler
Edit: Whoops! Forgot to mention, GNU Scrimble also has Snorble support out-of-the-box, and Scrimble clients have content auto-negotiation, so your_squeeb
can just take JSON on stdin. GNU Scrimble is really nice for this sort of thing, just...big.
And if you want to sprongle directly into a database or etc. then you can write your_sprongler
to taste. Full disclosure: I have a fairly fast implementation of Squeeb's algorithm in rpypkgs. However, I'd really recommend writing your own; it's like twenty lines of code you can copy from Wikipedia and it'll give you a good basis for extending it with your own desired changes later.
You can read snorblite's code if you need to figure out a specific sprongling technique, but it's way easier to just go look up the original SprongCode from SprongReg. Use a search engine to get around the university's paywall. This gets you the SprongCode UUID and you don't have to read code written by a batshit fascist.
I might prototype a workflow with this tool, but I don't really have any problems that it would solve. Connectivity to my machines is established with overlay networks and isn't a problem; I'd rather read a Prometheus dashboard than connect to individual machines, and I'd rather sit back and know that everything is working within acceptable parameters and metrics than repeatedly probe parts of the system.
Some of the features feel like they can never be made secure; in particular, it's not clear how XPipe changes the threat model for attacks which start by compromising a single development environment, other than being a large obvious target. File transfer is another good example; every connection protocol either already has file transfer or it doesn't, and for two Internet-connected machines I can always fall back to Magic Wormhole. Similarly, while it's important to know how to get into a Kubernetes
Pod
, it's usually a security problem to have one-click SSH access to hundreds of them.I'm telling you this mostly because of the open-core note. I genuinely cannot imagine recommending XPipe for purchase in any scenario, and I don't know how much that will change after prototyping a workflow. Shops that have needed tools for managing thousands of machines/sysadmin usually are willing to do the in-house development to build in-house tools. Over the past decade, GIFEE ("Google's infrastructure, for everybody else") has resulted in first Prometheus and now (I guess) OpenTelemetry making it possible to have good observability on tiny, small, and medium systems with a single observatory. It also shouldn't surprise you that I'm not going to recommend XPipe outside of a work context or encourage folks to contribute to it; there's no point in building a community around a closed project.