[-] Lemmling@lemm.ee 16 points 3 weeks ago

It used to work last year ๐Ÿ˜€ . The debian yt-dlp version: stable@2023.03.04 is giving a different error

ERROR: [Einthusan] 9r1H: 9r1H: Failed to parse JSON (caused by JSONDecodeError("Expecting value in '': line 1 column 1 (char 0)")); please report this issue on https://github.com/yt-dlp/yt-dlp/issues?q= , filling out the appropriate issue template. Confirm you are on the latest version using yt-dlp -U

128
submitted 3 weeks ago by Lemmling@lemm.ee to c/piracy@lemmy.dbzer0.com

I am getting the following error after upgrading yt-dlp

ERROR: [Piracy] This website is no longer supported since it has been determined to be primarily used for piracy. DO NOT open issues for it

Does anyone know any forks that still works.

[-] Lemmling@lemm.ee 4 points 1 month ago* (last edited 1 month ago)

this update broke my installation :(. I have not updated it in a while. Now I have to rollback until I fix this. Hope the backup will work. EDIT: It was the reverse proxy. Check the developer notes before updating.

[-] Lemmling@lemm.ee 2 points 5 months ago

I am behind CGNAT and I have been trying to set up a WireGuard mesh network to connect my local devices, such as a Raspberry Pi and Proxmox server, as well as my mobile devices, using a VPS as the central point. The goal is to expose locally running applications to the internet without relying on Cloudflare, as they do not allow video streaming and remote access to my local devices. I have looked at many tutorials on this topic, but they often left me confused due to the varying iptables rules and configurations. Some tutorials include specific device names like eth0 in the iptables rules, while others use variables like %i. Additionally, some examples have special rules for SSH access like this one. Apart from that, I am unsure about what additional steps I need to take when I want to run one of the peers as an internet gateway. Despite the confusion, I managed to achieve the basic mesh network setup without implementing any iptables rules for PostUp/Down. Each device in the network receives an IP address within the WireGuard subnet (10.0.0.x) and can ping one another. However, I believe that the iptables rules mentioned in the tutorials would allow accessing other subnets, such as my local LAN, through the WireGuard VPN. I am still uncertain about the exact mechanism behind how these rules work in that context and how to properly configure them for my specific use case, especially considering the CGNAT situation

[-] Lemmling@lemm.ee 3 points 5 months ago

Thanks for the nice writeup. Can you explain why you have these rules.

PostUp = iptables -t nat -A PREROUTING -p tcp -i eth0 '!' --dport 22 -j DNAT --to-destination 10.0.0.2; iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to-source SERVER-IP PostUp = iptables -t nat -A PREROUTING -p udp -i eth0 '!' --dport 55107 -j DNAT --to-destination 10.0.0.2;

What happens if you remove it ?

[-] Lemmling@lemm.ee 13 points 6 months ago

Immich having accounts+SSO is the single best feature IMO. Thanks for your thoughts on the topic.

[-] Lemmling@lemm.ee 37 points 6 months ago* (last edited 6 months ago)

Why do people repair their polish ??

[-] Lemmling@lemm.ee 18 points 11 months ago* (last edited 11 months ago)

@torvalds@social.kernel.org

[-] Lemmling@lemm.ee 5 points 11 months ago

I see the option now, Thanks ๐Ÿ˜„

[-] Lemmling@lemm.ee 3 points 11 months ago* (last edited 11 months ago)

Yeah all Indians are vegetarians and look exactly like this /s

[-] Lemmling@lemm.ee 4 points 11 months ago

Most used probably Linux and Firefox

[-] Lemmling@lemm.ee 9 points 1 year ago

Now I have to self host mastodon to join the party ๐Ÿฅณ

view more: next โ€บ

Lemmling

joined 1 year ago