Selfhoster1728

joined 9 months ago
[–] Selfhoster1728 3 points 1 week ago (1 children)

Can't you use a wildcard SSL cert for subdomains? (*.mydomain.com)

[–] Selfhoster1728 1 points 3 weeks ago

I had a problem similar to this and did not like the containers being binded to gluetun (problematic on docker daemon restarts, gluetun container being recreated, etc)

My solution was changing the gateway of each container to be routed through the tun. So first by having them both on the same internal network, then changing the entrypoint of the container I want tunneled to include the gateway change.

For example my entrypoint would be:

... && route del default && route add default gateway $GATEWAY_IP eth0

The container may be missing packages related to route so it may be necessary to modify the Dockerfile to install extra packages.

The reason the gateway must be set at the entrypoint is because docker overrides the gateway to correspond with the networking defined during container creation. And the entrypoint is the last thing executed before the container starts for realsies.

However gluetun also needs to work as a gateway which is done by modifying it's iptables post-up rules file (at /iptables/post-rules.txt). I appended at the beginning of the file the following rules:

iptables -A FORWARD -i eth0 -o tun0 -s 172.84.0.0/24 -d 0.0.0.0/0 -j ACCEPT iptables -A FORWARD -i eth0 -o tun0 -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD -i tun0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT

What this does is accept any traffic from the net I have my gluetun and other container in, then forwards outgoing traffic to eth0 from tun0, and vice versa for incoming.

Sorry for wall of text this is not very straight forward :(

[–] Selfhoster1728 5 points 1 month ago

Forgejo my beloved 🥰🥰

[–] Selfhoster1728 2 points 3 months ago

That may be true. So far I got the "Firewalled" icon (the little flame) if my port isn't forwarded for reason x or y so idk

The qbittorrrent wiki isn't very helpful so I don't actually know what the green globe truly entails :/

[–] Selfhoster1728 5 points 5 months ago

That's just the nature of service migration; of course for people like you who are very dependent on it, it's not a no-brainer, but for anyone who wants to start hosting one of the two, yes it will be.

In your case yes Plex is more appropriate but at the same time the clock is ticking for Plex if they continue on this route...

[–] Selfhoster1728 382 points 5 months ago (276 children)

I don't know why everyone in the selfhosting community still even mentions Plex or uses it.

It's closed source, not free; Jellyfin is a no brainer yet people still go to Plex??

[–] Selfhoster1728 4 points 5 months ago

Librewolf (privacy focused firefox fork) syncing the user folders with Syncthing maybe?

[–] Selfhoster1728 12 points 6 months ago* (last edited 6 months ago) (2 children)

See this issue on their github repo: here

Basically from what I understand there's loads of unauthenticated api calls, so someone can very easily exploit that.

If they just supported mTLS in their clients it wouldn't be an issue but oh well :(

[–] Selfhoster1728 46 points 7 months ago (3 children)

Oof was looking to start selfhosting this but it has no client Linux support and has a subscription 😬😬

[–] Selfhoster1728 9 points 7 months ago

Made me learn about Archiveteam, thanks :D

[–] Selfhoster1728 2 points 7 months ago

You're right actually it's not native I don't know what I'm on about 😅 Still it's much easier to have a baked in terminal app than having to install proot on top of termux, hopefully it will have less of a performance impact than proot as well.

[–] Selfhoster1728 3 points 7 months ago* (last edited 7 months ago) (2 children)

Just installed arch with chroot on my old rooted phone a week ago.

Seeing this is great because it means there's no need for complicated workarounds or even root access! Plus the distro runs natively and not with difficulties like with chroot :D

view more: next ›