Sometimes our internal CI tools break and I can’t build either. I think GitHub actions syntax is actually valid in forgejo as well so I don’t really think it’s a problem.
- 0 Posts
- 4 Comments
offspec@lemmy.worldto Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish9·2 months agoRemember to take your Claritin before starting a sync play session
offspec@lemmy.worldto Selfhosted@lemmy.world•How do I use HTTPS on a private LAN without self-signed certs?English3·3 months agoWith certbot there’s probably a plugin to do it automatically, but if you just want to get something working right now you can run the following to manually run a dns challenge against your chosen domain names and get a cert for any specified. This will expire in ~3 months and you’ll need to do it again, so I’d recommend throwing it in a cron job and finding the applicable
certbot-dns-dnsprovider
plugin that will make it run without your input. Once you have it working you can extract the certs from/etc/letsencrypt/live
on most systems. Just be aware that the files there are going to be symlinks so you’ll want to copy them before tarballing them to move other machines.certbot --preferred-challenges dns --manual certonly -d *.mydomain.tld -d mydomain.tld -d *.local.mydomain.tld
I don’t want to be an asshole but after checking a couple of those out they all appear to be post-authorization vulnerabilities? Like sure if you’re just passing out credentials to your jellyfin instance someone could use the device log upload to wreck your container, but shouldn’t most people be more worried about vulnerabilities that have surface for unauthorized attackers?