Lemmling

joined 1 year ago
[โ€“] [email protected] 16 points 2 months ago (1 children)

It used to work last year ๐Ÿ˜€ . The debian yt-dlp version: [email protected] is giving a different error

ERROR: [Einthusan] 9r1H: 9r1H: Failed to parse JSON (caused by JSONDecodeError("Expecting value in '': line 1 column 1 (char 0)")); please report this issue on https://github.com/yt-dlp/yt-dlp/issues?q= , filling out the appropriate issue template. Confirm you are on the latest version using yt-dlp -U

 

I am getting the following error after upgrading yt-dlp

ERROR: [Piracy] This website is no longer supported since it has been determined to be primarily used for piracy. DO NOT open issues for it

Does anyone know any forks that still works.

[โ€“] [email protected] 4 points 2 months ago* (last edited 2 months ago) (1 children)

this update broke my installation :(. I have not updated it in a while. Now I have to rollback until I fix this. Hope the backup will work. EDIT: It was the reverse proxy. Check the developer notes before updating.

[โ€“] [email protected] 2 points 7 months ago (1 children)

I am behind CGNAT and I have been trying to set up a WireGuard mesh network to connect my local devices, such as a Raspberry Pi and Proxmox server, as well as my mobile devices, using a VPS as the central point. The goal is to expose locally running applications to the internet without relying on Cloudflare, as they do not allow video streaming and remote access to my local devices. I have looked at many tutorials on this topic, but they often left me confused due to the varying iptables rules and configurations. Some tutorials include specific device names like eth0 in the iptables rules, while others use variables like %i. Additionally, some examples have special rules for SSH access like this one. Apart from that, I am unsure about what additional steps I need to take when I want to run one of the peers as an internet gateway. Despite the confusion, I managed to achieve the basic mesh network setup without implementing any iptables rules for PostUp/Down. Each device in the network receives an IP address within the WireGuard subnet (10.0.0.x) and can ping one another. However, I believe that the iptables rules mentioned in the tutorials would allow accessing other subnets, such as my local LAN, through the WireGuard VPN. I am still uncertain about the exact mechanism behind how these rules work in that context and how to properly configure them for my specific use case, especially considering the CGNAT situation

[โ€“] [email protected] 3 points 7 months ago (3 children)

Thanks for the nice writeup. Can you explain why you have these rules.

PostUp = iptables -t nat -A PREROUTING -p tcp -i eth0 '!' --dport 22 -j DNAT --to-destination 10.0.0.2; iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to-source SERVER-IP PostUp = iptables -t nat -A PREROUTING -p udp -i eth0 '!' --dport 55107 -j DNAT --to-destination 10.0.0.2;

What happens if you remove it ?

[โ€“] [email protected] 14 points 8 months ago (2 children)

Immich having accounts+SSO is the single best feature IMO. Thanks for your thoughts on the topic.

[โ€“] [email protected] 1 points 8 months ago

I faced the same problem when trying to run two SSDs connected via USB in btrfs raid0. I used a cheap 30W power brick from amazon. You can see dmsg warnings about this. Look for low voltage/current. Problems were resolved after using the official Raspberry 5 power brick.

[โ€“] [email protected] 0 points 1 year ago* (last edited 1 year ago) (1 children)
[โ€“] [email protected] 1 points 1 year ago

LOL ๐Ÿคฃ

[โ€“] [email protected] 2 points 1 year ago* (last edited 1 year ago) (3 children)

Yeah all Indians are vegetarians and look exactly like this /s