Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)BA
Posts
1
Comments
340
Joined
1 yr. ago
  • This is great to hear, dansup has been stretched across so many projects for so long so hopefully this really supercharges pixelfed (and friends) development and helps to increase the diversity of AP servers.

  • I'm curious to see what suggestions you get. When it comes to "easy to set up", usually Plex is the answer, and the only major alternative I know of is Jellyfin, which I assume is what you're referring to when you mention reverse proxies.

    I'm even willing to build docker containers, set up wireguard tunnels to a VPS, and reverse proxy through a chain of 2 reverse proxies (haproxy on the VPS and traefik on the local machine which is how I reverse proxy Plex and Jellyfin alike) yet I still use Plex because most of my friends/family prefer the Plex UI (though with how buggy the Plex app has been for some of my iOS users, I think Jellyfin apps could close the gap soon™)

  • Yep, I'm pretty sure you can still just use spools without tags and then manually set the filament settings, but since they control the firmware and can block downgrades, they can at any time require RFID tags for it to print. And since the tags have proven to be mostly cryptographically secure, that leaves open an avenue for them to lock out third party filament. It looks like you can currently clone the tags, but in theory they could program them like printer cartridges where it will recognize when you've printed a full spools length from any specific RFID tag ID, and then block printing using that tag ID. That could make cloning the tags useless and force you to only buy bamboo filament just like HP and printer companies and their ink.

  • Sounds likely, I haven't used port forwarding with my VPN since Mullvad stopped supporting it, so when I recently shared my own torrent I paid for 1 month of a seedbox just to make sure it seeds well and the seedbox uploaded ~50GB while my local setup on a VPN without port forwarding only uploaded 1.8GB (and it hardly showed any peers as if nobody was trying to download). So it seems peers had a much easier time connecting to the seedbox.

    I have since setup port forwarding in gluetun for my local torrent client. I just wish there was more support for it because gluetun only has built in support for port forwarding for 2 providers (I guess automated requesting a forwarded port), and even then you still have to make your own script to automatically set the port in the torrent client when it's assigned / changed. It's possible that some providers do it more like Mullvad where you get assigned a port via the website that is tied to the VPN credentials, so you just have to plug the assigned port into the torrent client settings (that's how it worked with Mullvad so I could just enter the port once and forget about it) but I haven't checked other providers to see.

  • Partially yes, the tricky thing is that when using network_mode: "service:tailscale" (presumably on the caddy container since that's what needs to receive traffic from the tailscale network), you won't be able to attach the caddy container to any networks since it's using the tailscale network stack. This means that in order for caddy to reach your containers, you will need to add the tailscale container itself to the relevant networks. Any attached containers will be connected as well.

    (Not sure if I misread the first time or if you edited but the way you say it is right, add the tailscale container to the proxy network so that caddy will also be added and can reach the containers)

    Here's the super condensed version of what matters for connecting traefik/caddy to a VPN like wireguard/tailscale.

    • I left out all WG config since presumably you know how to configure tailscale
    • Left out acme / letsencrypt stuff since that would be different on caddy anyway
    • You may need to configure caddy to trust the tailscale tunnel IP of the machine on the other end that will be reverse proxying over the tunnel.
    • Traefik I guess requires you to specify the docker network to use to reach stuff, I just put anything that should be accessible into "ingress" as you can see. I'm not sure if my setup supports using a different proxy network per app but maybe caddy allows that.

    My traefik compose:

     undefined
        
    services:
      wireguard:
        container_name: wireguard
        networks:
          - ingress
    
      traefik:
        network_mode: "service:wireguard"
        depends_on:
          - wireguard
        command:
          - "--entryPoints.web.proxyProtocol.trustedIPs=10.13.13.1" # Trust remote tunnel IP, the WG container is 10.13.13.2
          - "--entrypoints.websecure.address=:443"
          - "--entryPoints.websecure.proxyProtocol.trustedIPs=10.13.13.1"
          - "--entrypoints.web.http.redirections.entrypoint.to=websecure"
          - "--entrypoints.web.http.redirections.entrypoint.scheme=https"
          - "--entrypoints.web.http.redirections.entrypoint.priority=100"
          - "--providers.docker.exposedByDefault=false"
          - "--providers.docker.network=ingress"
    
    networks:
      ingress:
        external: true
    
    
      

    And then in a service's docker-compose:

     undefined
        
    services:
      ui:
        image: myapp
        read_only: true
        restart: always
        labels:
          - "traefik.enable=true"
          - "traefik.http.routers.myapp.rule=Host(`xxxx.xxxx.xxxx`)"
          - "traefik.http.services.myapp.loadbalancer.server.port=80"
          - "traefik.http.routers.myapp.entrypoints=websecure"
          - "traefik.http.routers.myapp.tls.certresolver=mytlschallenge"
        networks:
          - ingress
    
    networks:
      ingress:
        external: true
    
    
    
      

    (edited to fix formatting on mobile)

  • I've done something similar but I'm not sure how helpful my example would be because I use wireguard instead of tailscale and traefik instead of caddy.

    The principle is the same though, iirc I have my traefik container set to network_mode: "service:wireguard" so that the traefik container uses the wireguard container's network stack. That way the traefik container also sees the wireguard interface and can receive traffic going to the wireguard IP. Then at the other end of the wireguard tunnel I can use haproxy to pass traffic to the wireguard IP through the tunnel and it automatically hits traefik.

  • A new logo is nice but I'm really hoping one of the "nice things on the horizon" includes either getting the FP5 in the US or releasing a fairphone that meets GrapheneOS' requirements for support.

  • You could do something like that using point-to-point wireless links or just cables slung between buildings to connect boxes running a self-organizing mesh network protocol like yggdrasil. But there are too many challenges for me to go into depth here ranging from getting buy in from enough people who are located in close proximity, managing user expectations of speed, making services available over such an overlay network (or managing and paying for proxies that provide access to the regular Internet), dealing with geography, etc.

    You'd basically be looking at replicating freifunk or nycmesh or doing something along those lines. NYCmesh as I can tell operates more like an ISP so I would expect it to be at least harder than what they do.

    Imo time is better invested in developing and advancing decentralized applications and protocols, such as developing stuff using bittorrent/DHT or I2P which can just take advantage of the existing internet.

  • Does anyone have a good before screenshot of the same map view / area? I want to stitch together a before shot before I share so that people not from the area can get an idea of the change and not just immediately think "oh well my small town has traffic and it looks like that so what's the big deal"

  • So realized that the season pack from deadorbit uses subs from opensubtitles which seems to be missing on screen text translations and title-cards, so I remuxed in the subs OP linked - which appears to have been edited to include title-cards and on screen text - to replace the ones in the deadorbit pack. Here's a base64-ed link to a paste with the magnet for that if anyone wants it since I already went through the work for my own collection - it's 1080p web-dl x264 8 bit AC3 5.1

     undefined
            aHR0cHM6Ly9ub3RlYmluLmRlLz84MjYzYTQyYjhhYmZkNDhiI0V3cHA2ZmZOZnQ5REpzVmg0YWNndG9NZ2lOa2dENXlLalNzVHI1RktiZkJt
    
    
      

    Edit: since torrents can be slow to start, here's a direct download link on mega, if you download that way consider grabbing the torrent from the first link and pointing your torrent client to the downloaded files. And of course feel free to repost and reshare everything:

     undefined
            aHR0cHM6Ly9tZWdhLm56L2ZvbGRlci8xSVFHMVQ3SyN4UkYyM25WZ0xVZXpTd3NpSnRBVXNB
      
  • Thanks for the reminder to grab the subs for this, sonarr downloaded the ollonborre release a while back and I couldn't find subs.

    Looks like there's now a season pack on 1337x from deadorbit with muxed eng subs, and all in DD5.1 too.

  • I believe 4K is already basically there. I have a 50" 4K (2160p) that I sit 9 feet away from and based on the Nvidia PPD calculator, that makes for 168ppd, and according to that page 150ppd is around the upper limit of human vision. Apple's "retina" displays target around 50-60ppd (varies based on assumed viewing distance), which is what most people seem to consider "average eye visual acuity". Imo 4K / 150ppd is more than enough.

  • I'm pretty sure this will be a lot of work. Even assuming you didn't rename any files and all the torrents are in a single folder, you still need to re-search for every torrent file and add them to a torrent client that should automatically find the files in the target location and check them to see that it's already downloaded. I'm not sure if all torrent clients do this so I would advise testing it first - when re-adding a torrent with existing files I usually add it paused and then force re-check to be safe.

    In theory it should be possible to make a program that does this - automatically indexes and crawls torrent sites and DHT, fetches torrent meta info, then scans your HD for matching files to seed. This feature is a proposed one for the DHT crawler "bit magnet" so I'm hopeful that one day there will be a program that can do that.

  • If the battery inverter in the Anker box doesn't pass through grid power then I think you would use an automatic transfer switch that switches between mains and battery inverter depending on which is powered. I had dreams of offsetting my homelab power with solar + battery + inverter.

  • Sure no biggie, I keep pretty meticulous records so it's easy to check. My old place in the Boston metro was 4br and used 600-1200kwh, peaking in the summer. Natural gas heat and central AC. Now we're in a 2br in a complex and get more free heat from our neighbors and it ranges from 800-1100, with central heat pump heat and AC, but since the heat isn't gas anymore the heat is included in that.

  • 196 @lemmy.blahaj.zone

    brocrule