A random person on lemmy. Banner art from Deemo switch version

Alt lemmy @Deemo@lemmy.world

Alt kbin: @Deemo@fedia.io

FMHY (archive): @Deemo@lemmy.fmhy.ml

  • 6 Posts
  • 32 Comments
Joined 1 year ago
cake
Cake day: July 20th, 2023

help-circle




  • I do wish there were more services like nebula one yearly fee no baked in ads or ads at all and more creators are willing to join them.

    The thing that sucks with youtube premium is you still have creators dumping 1 min long sponsors ruining the experience. Additionally often only way these creators allow you to go add free is via patreon, floatplane, etc which can get quite expensive if you follow 30-50 channels. The only other viable route is sponsorblock which works great but requires modified youtube clients/browser extensions and with youtubes new video adinjection could potentially be broken.

    The only part I do wonder with nebula is how well it works for larger creators.

    Linus Media group revenue break down

    https://youtu.be/-zt57TWkTF4?t=532




  • “origin=cloudsmith/caddy/stable”;

    Unable to parse Unattended-Upgrade::Allowed-Origins. An error occurred: not enough values to unpack (expected 2, got 1)

    
    // Automatically upgrade packages from these (origin:archive) pairs
    //
    // Note that in Ubuntu security updates may pull in new dependencies
    // from non-security sources (e.g. chromium). By allowing the release
    // pocket these get automatically pulled in.
    Unattended-Upgrade::Allowed-Origins {
            "${distro_id}:${distro_codename}";
            "${distro_id}:${distro_codename}-security";
            // Extended Security Maintenance; doesn't necessarily exist for
            // every release and this system may not have it installed, but if
            // available, the policy for updates is such that unattended-upgrades
            // should also install from here by default.
            "${distro_id}ESMApps:${distro_codename}-apps-security";
            "${distro_id}ESM:${distro_codename}-infra-security";
            "${distro_id}:${distro_codename}-updates";
    //      "${distro_id}:${distro_codename}-proposed";
    //      "${distro_id}:${distro_codename}-backports";
            "origin=cloudsmith/caddy/stable";
    };

  • Firstly thank you so much for explaing this for me.

    “origin=Zabbix,codename=${distro_codename}”; //Zabbix Agent repository

    I tried using this as a template for caddy

     500 https://dl.cloudsmith.io/public/caddy/stable/deb/debian any-version/main arm64 Packages
         release o=cloudsmith/caddy/stable,a=any-version,n=any-version,l=source=none,c=main,b=arm64
         origin dl.cloudsmith.io
    

    I assume origin is:

    o=cloudsmith/caddy/stable

    When adding this rule

    "origin=cloudsmith/caddy/stable,codename=${distro_codename}"; //Caddy repository

    I get this error

    Unable to parse Unattended-Upgrade::Allowed-Origins.
    An error occurred: not enough values to unpack (expected 2, got 1)
    Traceback (most recent call last):
    

    https://pastebin.com/raw/7gtkRw7c

    When changing the syntax to:

    "cloudsmith/caddy/stable:${distro_codename}"; // Caddy

    The error goes away.

    Any ideas?















  • remote UI connection passes through the Home Assistant Central servers, the Central servers could maintain that safety database and off switch

    I think this is how home assistant handles it. When they put out a cve they can update the insecure version list which makes nabucasa refuse remote forwarding (until you update).

    Initially I was just thinking if a open-source project is on github and uses the security disclosure feature if it would be possible to pull data from it and disable remote acess (either by auto shutting down the service or simply disabling routing on a reverse proxy).

    Having a system that does without a security disclosure list from a project maintainer would be far mor difficult like having the proxy disable one of your services if it detects a vulnerability in a dependency.