Lem453

joined 1 year ago
[–] Lem453@lemmy.ca 4 points 2 months ago (1 children)

But my Lord, there is no such force.

[–] Lem453@lemmy.ca 1 points 2 months ago (3 children)

But why? What benefit does ipv6 bring to a home network that ipv4 doesn't have?

As you said everything is already setup well with ipv4 so why change it?

[–] Lem453@lemmy.ca 2 points 2 months ago

Kde has a disable sleep button in the power/battery icon menu which I use as a work around, still annoying and yet another quality of life issue that Just Works (tm) on other platforms

[–] Lem453@lemmy.ca 5 points 2 months ago* (last edited 2 months ago) (2 children)

https://getaurora.dev/

Has been working for me. The issues I've encountered so far are all minor flatpak issues (Firefox not allowed to sleep-lock so the laptop screen shuts off watching videos etc)

[–] Lem453@lemmy.ca 4 points 2 months ago* (last edited 2 months ago)

When I was starting out I almost went down the same pathway. In the end, docker secrets are mainly useful when the same key needs to be distributed around multiple nodes.

Storing the keys locally in an env file that is only accessible to the docker user is close enough to the same thing for home use and greatly simplifies your setup.

I would suggest using a folder for each stack that contains 1 docker compose file and one env file. The env file contains passwords, the rest of the env variables are defined in the docker compose itself. Exclude the env files from your git repo (if you use this for version control) so you never check in a secret to your git repo (in practice I have one folder for compose files that is on git and my env files are stored in a different folder not in git).

I do this all via portainer, it will setup the above folder structure for you. Each stack is a compose file that portainer pulls from my self hosted gitea (on another machine). Portainer creates an env file itself when you add the env variables from the gui.

If someone gets access to your system and is able to access the env file, they already have high level access and your system is compromised regardless of if you have the secrets encrypted via swarm or not.

[–] Lem453@lemmy.ca 1 points 2 months ago

You could put in a big report for this. Seems like a small UI bug that could be a good QOL fix for others

[–] Lem453@lemmy.ca 11 points 2 months ago (3 children)

True, but the downside of cloudflare is that they are a reverse proxy and can see all your https traffic unencrypted.

[–] Lem453@lemmy.ca 57 points 2 months ago* (last edited 2 months ago) (1 children)

This is genuinely one of the most impressive open source projects out there right now. Seems like 10.9 opened the flood gates for all these amazing contributions and improvements. 81 merges in the last 30 days! Great job jellyfin team!

[–] Lem453@lemmy.ca 4 points 2 months ago (1 children)

I like finamp as my android music client for jellyfin

[–] Lem453@lemmy.ca 2 points 2 months ago

I world strongly suggest a second device like an RPI with Gitea. There what I have.

I use portainer to pull straight from git and deploy

[–] Lem453@lemmy.ca 3 points 2 months ago

Not to mention the advantage of infrastructure as code. All my docker configs are just a dozen or so text files (compose). I can recreate my server apps from a bare VM in just a few minutes then copy the data over to restore a backup, revert to a previous version or migrate to another server. Massive advantages compared to bare metal.

[–] Lem453@lemmy.ca 21 points 2 months ago (4 children)

Yes, you should use something that makes sense to you but ignoring docker is likely going to cause more aggravation than not in the long term.

view more: ‹ prev next ›