Generated by GPT-5-mini| Homebrew (package manager) | |
|---|---|
| Name | Homebrew |
| Title | Homebrew (package manager) |
| Author | Max Howell |
| Developer | Homebrew Core Team |
| Released | 2009 |
| Programming language | Ruby, Shell |
| Operating system | macOS, Linux |
| License | BSD-2-Clause |
Homebrew (package manager) Homebrew is a free and open source package manager originally developed to simplify software installation on macOS and later extended to Linux and other systems. It provides a command-line interface that automates retrieval, compilation, and installation of software from source or bottles, drawing contributions from individuals affiliated with organizations such as GitHub, Google, Microsoft, Apple Inc., and academic institutions. Homebrew's ecosystem integrates with tools and platforms like Ruby (programming language), Git, Python (programming language), and CI/CD services including Travis CI, CircleCI, and GitHub Actions.
Homebrew was created by Max Howell in 2009 as an alternative to package managers like MacPorts and Fink and in the context of proprietary platforms such as macOS Big Sur and earlier releases like Mac OS X Leopard and Snow Leopard. Early development involved collaboration with open source projects and individual contributors from companies such as Twitter, Dropbox, Facebook, and research groups affiliated with Stanford University and MIT. Over time, stewardship moved to a broader maintainer collective including the Homebrew core team, with governance influenced by events in the open source ecosystem such as changes at GitHub under Microsoft acquisition. Homebrew's evolution intersected with milestones like shifts in Xcode toolchains, adoption of LLVM and Clang, and the rise of containerization technologies like Docker and orchestration frameworks such as Kubernetes.
Homebrew's architecture centers on a repository of Ruby "formulae" and "casks" stored in Git hosting environments like GitHub and mirrored with continuous integration by services such as CircleCI and GitHub Actions. The system leverages language runtimes and build tools including Ruby (programming language), Bash (Unix shell), Make (software), CMake, Autoconf, and compilers like GCC and Clang. Bottles (precompiled binaries) are produced using toolchains influenced by Xcode and Homebrew CI runners hosted on platforms comparable to Travis CI and Azure Pipelines from Microsoft. The formula DSL maps package metadata to build steps, integrating with package sources like SourceForge, GitLab, Bitbucket, and release infrastructures maintained by projects such as Apache Software Foundation, Python Software Foundation, and Mozilla Foundation.
Installation typically uses shell invocations that interact with Git repositories on GitHub and system components provided by Apple Inc. and GNU Project. Common commands rely on utilities like curl and tar (software), and invoke language interpreters such as Ruby (programming language) and Python (programming language). Users often integrate Homebrew with development environments referencing tools like Xcode, Visual Studio Code, Vim, Emacs, and continuous integration platforms including GitHub Actions and CircleCI. For cross-platform workflows, administrators use container images from Docker Hub and orchestration via Kubernetes while coordinating with package ecosystems like npm, RubyGems, CPAN, and PyPI.
Homebrew manages software via formulae, casks, and bottles, coordinating with upstream projects such as Linux Kernel, OpenSSL, OpenJDK, and language ecosystems like Node.js, Ruby on Rails, Django, and Rust (programming language). Formulae are maintained in Git repositories referencing releases hosted on GitHub Releases, SourceForge, and mirrors from organizations like The Apache Software Foundation and GNU Project. Package maintenance workflows involve code review practices similar to those in projects like Linux Kernel development and CI paradigms seen in Continuous integration projects used by Google and Facebook. Distribution artifacts are signed and distributed in contexts comparable to Debian and Homebrew bottle pipelines, with interoperability considerations for package managers like apt, yum, dnf, and pacman.
Originally designed for macOS, Homebrew extended official support to Linux (via Linuxbrew) and has been adapted for platforms with diverse architectures including x86_64, ARM64, and PowerPC variants used in hardware from Intel, Apple silicon, and IBM. Compatibility considerations involve operating system features from macOS Catalina, Big Sur, and Monterey, as well as Linux distributions like Ubuntu, Debian, Fedora, CentOS, and Arch Linux. Build environments reference compiler toolchains such as GCC and Clang, and link against system libraries like glibc and OpenSSL while accounting for kernel interfaces from Linux Kernel releases and systemd init systems from projects like Red Hat.
The Homebrew project is stewarded by maintainers and contributors drawn from corporations, universities, and independent developers, with organizational patterns resembling communities around GitHub projects, Apache Software Foundation committees, and contributor models from Debian and Mozilla Foundation. Decision-making involves code review on GitHub, pull requests, issue trackers, and governance norms influenced by open source events such as FOSDEM and conferences like WWDC where integrations with Apple Inc. technologies are discussed. Sponsorship and funding have connections to entities like GitHub Sponsors, corporate backers from Google, Microsoft, and smaller foundations, and community engagement happens through forums and chat platforms associated with projects like Stack Overflow and Discourse.
Security practices for Homebrew include vulnerability tracking, automated CI audits, and signature verification workflows analogous to those used by OpenSSL auditing teams and distributions like Debian Security and Ubuntu Security. The project collaborates with security researchers and incident response communities such as CERT and follows disclosure practices similar to CVE reporting and coordination with organizations like MITRE. Supply chain considerations incorporate recommendations from initiatives like The Update Framework and build reproducibility efforts championed by groups such as Reproducible Builds and security tooling used by Google and Microsoft.
Category:Package management systems Category:Free and open-source software