![](https://doomscroll.n8e.dev/pictrs/image/70f50cc7-420f-4881-bc24-eb1af0d92cdb.webp)
![](https://programming.dev/pictrs/image/8140dda6-9512-4297-ac17-d303638c90a6.png)
Easily doable in docker using the network_mode: "service:VPN_CONTAINER"
configuration (assuming your VPN is running as a container)
Easily doable in docker using the network_mode: "service:VPN_CONTAINER"
configuration (assuming your VPN is running as a container)
I’ve not used dockge so it may be great but at least for this case portainer puts all the stack (docker-compose) files on disk. It’s very easy to grab them if the app is unavailable.
I use a single Portainer service to manage 5 servers, 3 local and 2 VPS. I didn’t have to relearn anything beyond my management tool of choice (compose, swarm, k8s etc)
Aside from everyone who’s using flutter?
Main page of dashboard
If you long press on a tile (this is kitchen)
Ah, well that is indeed unfortunate and realistically also a bit shit.
Gonna go with… whoosh
ActivityPub implementations generally don’t allow this.
This comment will, when I click ‘Reply’, be sent to your instance (dormi.zone), that instance should then run it’s filter/block checks on it and if it’s happy it will forward it onto the lemmy.ml instance for further disemination amongst the subscribers of the group.
If you were to have blocked me then my reply will appear on my instance only (which is admitedly tiny - at 1 user) and go no further. This kind of falls apart if I were to be on a bigger instance as more people would see the reply.
That said, Lemmy may not be doing that quite right as the whole Groups/Communities thing is sort of an extension of the main protocol. I hope it’s doing it the right way.
There’s a couple of caveats with it, but I think neither are worse than your proposed flow.
Immich does support folders?
https://immich.app/docs/administration/storage-template/
With this you can store your photos in whatever structure you want.
Yes.
Docker will have only exposed container ports if you told it to.
If you used -p 8080:80
(cli) or - 8080:80
(docker-compose) then docker will have dutifully NAT’d those ports through your firewall. You can either not do either of those if it’s a port you don’t want exposed or as @moonpiedumplings@programming.dev says below you can ensure it’s only mapped to localhost (or an otherwise non-public) IP.
Documentation people don’t read
Too bad people don’t read that advice
Sure, I get it, this stuff should be accessible for all. Easy to use with sane defaults and all that. But at the end of the day anyone wanting to using this stuff is exposing potential/actual vulnerabilites to the internet (via the OS, the software stack, the configuration, … ad nauseum), and the management and ultimate responsibility for that falls on their shoulders.
If they’re not doing the absolute minimum of R’ingTFM for something as complex as Docker then what else has been missed?
People expect, that, like most other services, docker binds to ports/addresses behind the firewall
Unless you tell it otherwise that’s exactly what it does. If you don’t bind ports good luck accessing your NAT’d 172.17.0.x:3001 service from the internet. Podman has the exact same functionality.
But… You literally have ports rules in there. Rules that expose ports.
You don’t get to grumble that docker is doing something when you’re telling it to do it
Dockers manipulation of nftables is pretty well defined in their documentation. If you dig deep everything is tagged and natted through to the docker internal networks.
As to the usage of the docker socket that is widely advised against unless you really know what you’re doing.
I think thats radicale
Each devices encryption keys are unique and non-transferable. Each message in a conversation is encrypted in such a way that every participating device at the time of sending can decrypt it.
New devices (like desktop clients) didn’t have their keys used for old messages and so can’t decrypt them. There is no way to reencrypt old messages with additional new keys.
It’s both annoying as shit, and also the only way to ensure a bad actor can’t just add themselves to conversations they weren’t a part of.
He only wins internet clout if you know who he is. I didn’t. He was just that guy in the meme.
Now he’s been named at least two people, who didn’t know of his existence, now know.
You’ve just Barbara Streisand’ this guy.
There’s a huge amount of it on the fediverse right now. People are working very hard at getting rid, all of them volunteers, and in their own time.
She’s a beaut that’s for sure.
So to be clear, you want traffic coming out of your VPS to have a source address that is your home IP?
No that’s not how I read it at all. He wants his VPS to act as a NAT router for email that routes traffic through a wireguard tunnel to the mail server on his home network. His mail server would act as if it was port forwarded using his home router, only it won’t be his home IP, it’ll be the VPS’s
Very first line of the GitHub readme. As a support tool it’s mostly useless, endless similar or identical questions answered differently or not at all and none of it indexed by search engines for use on the web.
It’s an awful data silo / black hole that increases volunteer load.