Croquette

joined 2 years ago
[–] Croquette@sh.itjust.works 1 points 3 days ago

What a fucking leap. CLI does not equal complexity.

If you can write and read, you can use a CLI. Can you read and write? Great, you can learn CLI cmds.

People don't want to use CLIs because unless you've been using computers before windows 95, chances are that all your life you've been using a GUI, and humans in general don't like changes.

Going from Windows to any Linux distro is a big enough leap, and adding a new way to interact with your tool on top of that is too much at once for the vast majority of people.

With that said, a lot of Windows issues require you to use the CLI and mess with regedit to fix them. How is that any different than asking people to run a diagnostic command to troubleshoot their PC?

You can use a Linux distro through a GUI pretty much 99.9% of the time, just like Windows. The only difference is that on Linux, the CLI is much more powerful than the GUI, so the majority of users will use the CLI to troubleshoot.

[–] Croquette@sh.itjust.works 1 points 3 days ago

Yeah, but regedit is a GUI. So it's all cool and dandy.

[–] Croquette@sh.itjust.works 19 points 4 days ago (2 children)

I'd say that the nazi salute on live tv sealed the deal.

If it looks like a Nazi and squeak like a Nazi, it's a fucking Nazi.

[–] Croquette@sh.itjust.works 33 points 4 days ago (11 children)

Who are you targeting with that message? Because what's going on with the current US admin is straight out of the nazi playbook.

It feels like you are trying to get validation for your position.

[–] Croquette@sh.itjust.works 6 points 5 days ago

Don't sneeze right next to it with that kind of precision.

[–] Croquette@sh.itjust.works 2 points 5 days ago

Greenland is a strategic position, especially with glaciers melting off.

Russia wants his puppet to take it over for them.

[–] Croquette@sh.itjust.works 5 points 6 days ago

It is a deliberate choice by corpos to dumb everything down so that they can lock people in their ecosystem.

If you don't know how things work, it's a lot harded to switch to a new ecosystem.

[–] Croquette@sh.itjust.works 12 points 6 days ago

We were equally dumb when younger, it is just that we look at them now with the experience we accumulated.

And we can flip the table and ask why no one is taking the time to train these young people. Stop being an old grumpy person and help the next generation.

[–] Croquette@sh.itjust.works 2 points 1 week ago

I use it to generate a little function in a programming language I don't know so that I can kickstart what I need to look for.

[–] Croquette@sh.itjust.works 22 points 1 week ago (2 children)

Were you drinking before posting this reply?

[–] Croquette@sh.itjust.works 5 points 1 week ago

The wait and see strategy doesn't work and it won't work now.

[–] Croquette@sh.itjust.works 2 points 1 week ago

That was a milquetoast message of hope at best, to the same level of thoughts and prayers.

Endorsing people actually on the ground trying to resist the Nazification of the US would already be a big step up instead of a Obama giving a medal to Obama level meme of self congratulatory pat on the back.

 

Solved : I was still on my local network instead of my LTE network, so I was accessing the global ip through the local network, and thus the access page.

Hello,

I am running OPNSense as my router for my ISP and my local network.

When I access my global ip, it lands me on the login page of my OPNSense router. Is that normal?

The only Firewall WAN Rule I added is the rule to enable my Wireguard instance (and I disabled it to test if that was the issue)

I was messing with the NAT Outbound for the Road Warrior setup as explained in the OPNSense Road Warrior tutorial, but that rule is also disabled.

I enabled OutboundDNS to override a local domain.

And I have a dynamic DNS to access my VPN with a FQDN instead of the ip directly.

But otherwise, I have the vanilla configuration. I disabled all of these rules I've created to make sure that they weren't the issue, and I can still access my OPNSense from the WAN interface.

So is that a normal default behaviour? If so, how can I disable the access to the OPNSense portal from the WAN and keep it from within one of my LAN/VLAN?

___

 

*** For anyone stumbling on this post, and is as newbie as I am right now, forward auth doesn't work with FireflyIII.

I thought that forward auth was the same as a proxy, but in this case, it is the proxy that provides the x-authentik tags.

So for Firefly, set up Authentik as a proxy provider and not a forward auth.

I haven't figured out the rest yet, but at least, x-authentik-email is in my header now.

Good luck ***

Hello,

I am trying to setup Authentik to do a forward auth for Firefly3, using caddy. I am trying to learn External authentication so my knowledge is limited.

My setup is as follows.

By looking at the Firefly doc Firefly doc, I need to set AUTHENTICATION_GUARD=remote_user_guard AUTHENTICATION_GUARD_HEADER=HTTP_X_AUTHENTIK_EMAIL in my .env file. I used the base .env file provided by Firefly and modified only these two lines

Then, in my Authentik, I made a forward auth for a single application for firefly. This part seem to work because the redirection is made. The external host is my Firefly ip address.

Then from the example provided in the Authentik provider, I created my caddy file on the Firefly container to redirect port 80 to my custom port 9080.

:80 {
        # directive execution order is only as stated if enclosed with route.
        route {
                # always forward outpost path to actual outpost
                reverse_proxy /outpost.goauthentik.io/* http://10.0.1.7:9080/

                # forward authentication to outpost
                forward_auth http://10.0.1.7:9080/ {
                        uri /outpost.goauthentik.io/auth/caddy

                        # capitalization of the headers is important, otherwise they will be empty
                        copy_headers X-Authentik-Username X-Authentik-Groups X-Authentik-Email X-Authentik-Name X-Authentik-Uid X-Authentik-Jwt X-Authentik-Me>

                        # optional, in this config trust all private ranges, should probably be set to the outposts IP
                        trusted_proxies private_ranges
                }

        }
}

EDIT : The IP address of Firefly is 10.0.1.8

When I try to go on my Firefly app, the Authentik redirection is made and it tries to connect to the Firefly webpage,but I either get unable to connect when I try the https, or Looks like there’s a problem with this site when I try to connect with http.

I see that the connection is refused in both case.

I made sure that my email on my account on firefly matches the email from the Authentik user.

I tried googling my problem to no avail and the Firefly documentation is pretty scarce.

Any help would be welcome.

 

Hello,

I am trying to setup Authelia using apalrd tutorial.

In the configuration file, I need to setup a SMTP server to send email from.

I am currently using proton mail and they don't have smtp support out of the box, you have to go through their bridge.

I've tried to find tutorial on how to use Proton Bridge CLI to be able to use it as my SMTP locally, but the information seems scarce on that front. (keep in mind that I am no expert).

So my question is as follows : what are my option to have a functional SMTP configuration on my Authelia server?

Thank you

view more: next ›