

I agree except crowedsec. The apps I use were frequently phoning home, causing all my devices to get banned by crowedsec. Setting up rules around it was just too painful so I got rid of it.
Gonna look into if I can set up fail2ban with it instead


I agree except crowedsec. The apps I use were frequently phoning home, causing all my devices to get banned by crowedsec. Setting up rules around it was just too painful so I got rid of it.
Gonna look into if I can set up fail2ban with it instead


Oh get over yourself


Short form is cool because it’s like constrained writing.
Tiktok was pretty great while it was just silly videos.\ But it’s not short form anymore so it’s full of political essays and propaganda.
I kinda hope that loops is more like vine than tiktok or vertical YouTube. But it’ll probably be up to the instance to govern video length.


Is it for downloading illegal content? i can’t tell
I assume some of it is related to torrenting, but I can’t tell which ones and how much. They can’t all be for torrenting, right???


Store a lot of things you never access
Hope that helps 😌


Ikr like… Give me a docker compose file and tell me what env vars need to be set to what. Why is it so complicated?


I hate how so many of the arr apps don’t describe what they do in a way that people who don’t already know can understand.
Even the tutorials and guides are frustratingly vague.


None of those really “feel like” the things they’re replacing. I don’t really even think that should be the goal. They occupy the same space, though, and the infographic would look stupid if it showed all the options in some category, so they just picked a popular proprietary/centralized one, and a popular federated alternative in the same category. In this case discord is a popular chat app, and the most popular federa chat app afaict is matrix.


Is now a paid feature?
Was playback over 2x (through the official app) ever supported for free?


On CloudFlare, user224.com renews annually at less than $11
That’s where I got my domain (I was using them at the time, but it doesn’t matter), for that price, and that includes whois privacy.


I can’t answer many of the questions here, but I can help a little with two:
If you’re worried about noise, don’t get ironwolf drives. I just did and they’re noisy af. I brought some sound absorbing foam to put around the place where I keep my NAS, because they’re so much louder than I expected.
Don’t open up a port in your network.
Use something like tailscale to connect your devices to your home network, or rent an VPS to run a secure tunnel using pangolin (you’ll need to look into bandwidth limits).


Sorry I misread when you said “library” for some reason I thought you meant “external library”
The problem that I’m trying to solve and I think OP is also trying to solve, is that they want the files to be on their NAS because it is high capacity, redundant, and backed up, but many users have access to the NAS, so they cannot rely on immich alone to provide access permissions, they need access permissions on the files themselves.
I solved this by having a separate share for every user, and then mounting that user’s share on their library (storage label).
It sounds like OP wants a single share, so having correct file ownership is important to restrict file access to the correct users who are viewing the filesystem outside of immich.
Not sure what you mean by your last paragraph, how do you assign a share to individual files (assume you mean directories) outside of immich’s need for storage?


Library access won’t allow upload, this will.
My knowledge here isn’t super deep, but it seems like you can do mapping per-share-per-ip, which means you can say “all file access coming from the immich host to this share will act as this user” which I think is fine if that share belongs to that user, and you don’t have anything else coming from that host to that share which you want to act as a different user. Which are very big caveats.


I got excited and didn’t properly read your post before I wrote out a huge reply. I thought your problem was the per-user mapping to different locations on your NAS or to different shares, but its specifically file ownership.
whoops.
Leaving this here anyways, in case someone finds it helpful.
I kinda address file ownership at the end, but I don’t think its really what you were looking for because it depends on every user having their own share.
In docker, you’ll need to set up an external NFS volume for every user. I use portainer to manage my docker stacks, and its pretty easy to set up NFS volumes. I’m not sure how to do it with raw docker, but I dont think its complicated.
in your docker compose files, include something like this
services:
immich-server:
# ...
volumes:
- ${UPLOAD_LOCATION}:/data
- /etc/localtime:/etc/localtime:ro
- type: volume
source: user1-share
target: /data/library/user1-intended-storage-label
volume:
subpath: path/to/photos/in/user1/share
- type: volume
source: user2-share
target: /data/library/user2-intended-storage-label
volume:
subpath: path/to/photos/in/user2/share
# and so on for every user
# ...
volumes:
model-cache:
user1-share:
external: true
user2-share:
external: true
# and so on for every user
There are 3 things about this setup:
${UPLOAD_LOCATION}. For me this is fine, I dont want to pollute my NAS with a bunch of transient data, but if you want that info then for every user, in addition to the target: /data/library/user1 target you’ll also need a target: /data/thumbs/user1, target: /data/encoded-video/user1, etc.target, when you mount this volume it will mask that data. This is why it is important that no users exist with that storage label prior to this change, else that data will get hidden.You may also want to add similar volumes for external libraries (I gave every user an external “archive” library for their old photos) like this:
- type: volume
source: user1-share
target: /unique/path/to/this/users/archive
volume:
subpath: path/to/photo/archive/on/share
and then you’ll need to go and add that target as an external library in the admin setup.
and once immich allows sharing external libraries (or turning external libraries into sharable albums) I’ll also include a volume for a shared archive.
redeploy, change your user storage labels to match the targets, and run the migration job (or create the users with matching storage labels).
I honestly don’t think its important, as long as your user has full access to the files, its fine. But if you insist then you have a separate share for every user and set up the NFS server for that share to squash all to that share’s user. Its a little less secure, but you’ll only be allowing requests from that single IP, and there will only be a request from a single user from that server anyways.
Synology unfortunately doesn’t support this, they only allow squashing to admin or guest (or disable squashing).


I had to read it a few times, I initially made the same mistake as you. It’s all there but I’m not used to carefully reading all the text on a silly post lol
It’s illegal to hire people or refuse to hire people based on political beliefs or affiliation, so you’re not gonna have companies that only employ Trump supporters or employ no Trump supporters. Politics is considered a protected group wrt employment law in the USA and many countries.
But how would it actually work?
It’s not like it’s difficult to gauge employee sentiment about ICE. If your employees are strongly against it, then you simply don’t enter the competition for ICE contracts, or you choose to not renew the contracts when they expire.


They only have to make an example of a few to discourage the rest.
The only real safety is with the instances hosted and run in locations difficult for American companies to pursue legal action


Yeah, but at the same time it’s kinda good for people to be able to see the kind of shit they’re posting for themselves.
It is propaganda, but it’s not good propaganda, and that’s what the community fact checking thing is meant to counter, imo.
Even if that was true, which it isn’t, a company should reflect the beliefs of its employees and community.
If you’re getting a VPS I’d generally recommend getting pangolin. It’s basically like cloudflared tunnels, but self hosted (on the vps). It works the same, you use it to map your subdomains to IPs on the other end of the secure tunnel.
It has things like user access controls for each of the subdomains, the ability connect it to an identity provider, rules governing which paths need authentication and which don’t, etc.
It can optionally come preconfigured with crowedsec, but I had problems with it falsely classifying my normal traffic as an attack and banning my IPs.
Just be aware that even if your service has a login page, you first need to log into pangolin to be granted access to the service, and although that’s fine on the web (especially if you’re using an sso), some native apps don’t like the extra login. Homeassistant handles it better now, but I haven’t gotten jellyfin native android app working yet.