Can AUR be used by other distros like Debian or fedora?
Can AUR be used by other distros like Debian or fedora?
I suspect most people open it via subdomain or cloudflare tunnel and it seems secure enough. Haven’t seen reports of people getting hacked left and right.
VPN Certainly is more secure and works for a few people but becomes annoying if you have users that don’t want to mess with a VPN. It also helps if you want to make a public share link to someone without an account.
This is a deep sleep issue. A google search will show that many modern processors can’t actually deep sleep (S3) and therefore the only option is to hibernate or shut it off.
To find out if you can, sleep the computer, wake it up then run:
journalctl | grep S3
There should be a line about what type of sleep is available and another line about what type of sleep your computer was just in.
If S3 is not listed as an available sleep mode you might get lucky and be able to turn it on in the bios. If you can’t then you are out of luck.
Since I use fedora atomic, I used this to turn on deep sleep:
rpm-ostree kargs --append="mem_sleep_default=deep"
On non atomic I forget exactly how but I think this is the way: https://unix.stackexchange.com/questions/720514/cannot-write-into-sys-power-mem-sleep-in-fedora-36
Lemmy needs a best comment section like reddit had
Wireguard uses public and private keys which are designed from the ground up to be used over plain text to establish the handshake so it isn’t an issue. Same idea with ssh keys and ssl keys
Split tunneling with wireguard is probably the best way for this.
There are many tutorials, here’s an example: https://ssh.sshslowdns.com/wireguard-split-tunnel-config/
This will let you have some things on wiregusard and some not
You do not need anything else. DNS requests are all sent over Wireguard with encryption
Use ddns on your router with a domain so you can then get something like wireguard.example.com and then use that as the endpoint in your wireguard.
Set the wireguard DNS as your pihole.
To make life easier set your home network IP space to something that another WiFi would never use, ie 192.168.46.xx
That way it will never conflict if you are on a public WiFi and you can access anything on your home lab when you need.
I’ve been using this setup for years on laptop, phone etc
I haven’t tried them but some people have made templates for obsidian
I did an inplace upgrade of gitea to forgejo. No issues.
I’ve been self hosting this for 2 or 3 years now.
There has been zero maintenance other than the occasional update button
I use it for my docker compose files that portainer pulls from with the click of the button to update my containers when needed.
I edit the files in VS code with the git plugin and it works without issue
Btrfs only has issues with raid 5. Works well for raid 1 and 0. No reason to change if it works for you
Never done it myself but I think this example goes over the mounting
FWIW the file system it uses ‘decomposedfs’ can be read by other applications like rclone if needed.
Also ocis is working on a ‘normal’ file system with a few tradeoffs:
Also this channel has many new videos with freecad 1.0. Especially for woodworking
Freecad in a VM with a remote viewer like guacamole?
Not sure what you mean by expects oauth.
I’ve been testing it and it works very well so far in my tests with just a normal user name and password to login.
I’ve actually been meaning to work on getting oauth connected to my authentik but haven’t gotten around to it yet
So far the server seems very solid and the clients for android and windows also seem very good.
See also the linkdroid app on f-droid so you can use the share button to add links from your phone quickly. Works really well and I use it with single sign on as well.
IOS has an app as well lol
The vast majority of selfhosters probably don’t but if you want its called a private repository
I do exactly this with traefik.
ie: Seafile.domain.com
Vaultwarden.local.domain.com
I followed this guide: https://youtu.be/liV3c9m_OX8