Compare commits

..

No commits in common. "5d609b451cb9b6d18dd0054a777d96c106e76d61" and "4263768d231ad3b33ebcc0fc6ee93bb43054f9a8" have entirely different histories.

6 changed files with 67 additions and 143 deletions

View File

@ -109,7 +109,6 @@ docker compose up
- [Stash](examples/stash) - Stash is a self-hosted webapp written in Go which organizes and serves your porn. - [Stash](examples/stash) - Stash is a self-hosted webapp written in Go which organizes and serves your porn.
- [Raveberry](examples/raveberry) - A multi-user music server with a focus on participation. - [Raveberry](examples/raveberry) - A multi-user music server with a focus on participation.
- [Deemix](examples/deemix) - deemix is a barebone deezer downloader library built from the ashes of Deezloader Remix. - [Deemix](examples/deemix) - deemix is a barebone deezer downloader library built from the ashes of Deezloader Remix.
- [Forte](examples/forte) - Self-hosted, music streaming platform.
- [MeTube](examples/metube) - Web GUI for youtube-dl (using the yt-dlp fork) with playlist support. Allows you to download videos and audio only from YouTube and dozens of other sites. - [MeTube](examples/metube) - Web GUI for youtube-dl (using the yt-dlp fork) with playlist support. Allows you to download videos and audio only from YouTube and dozens of other sites.
- [Syncthing](examples/syncthing) - Syncthing is a continuous file synchronization program. It synchronizes files between two or more computers. - [Syncthing](examples/syncthing) - Syncthing is a continuous file synchronization program. It synchronizes files between two or more computers.
- [Transmission](examples/transmission) - Transmission is a fast, easy, and free BitTorrent client. - [Transmission](examples/transmission) - Transmission is a fast, easy, and free BitTorrent client.

View File

@ -1,9 +0,0 @@
# References
- https://github.com/kaangiray26/forte
# Notes
After deploying, the forte admin dashboard will be available on TCP/3000. You can log into the web dashboard using `forte` as username and `alternative` as password. Please change those default credentials. Use a reverse proxy like Traefik if you plan on exposing the forte instance, as HTTPS is required to stream flawlessly.
After creating a user account via the forte web dashboard, you can browse https://forte.buzl.uk/ and use your own server to stream music from. Specify your created user account and the automatically created password token.

View File

@ -1,56 +0,0 @@
version: '3'
services:
app:
image: kaangiray26/forte:2.8
container_name: forte
restart: on-failure
#ports:
# - "3000:3000"
depends_on:
postgres:
condition: service_healthy
environment:
mode: public
port: 3000
NODE_ENV: production # Set Node Environment
POSTGRES_HOST: postgres # Postgres Host/IP
POSTGRES_PORT: 5432 # Postgres Database Port
POSTGRES_DB: forte # Set Postgres Database Name
POSTGRES_USER: forte # Set Postgres Username
POSTGRES_PASSWORD: forte # Set Postgres Password
volumes:
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/forte/library:/library # your music library to import from
#networks:
# - proxy
#labels:
# - traefik.enable=true
# - traefik.http.routers.forte.rule=Host(`forte.example.com`)
# - traefik.http.services.forte.loadbalancer.server.port=3000
# - traefik.docker.network=proxy
# - traefik.http.middlewares.cors.headers.customResponseHeaders.Access-Control-Allow-Origin=https://forte.buzl.uk
# - traefik.http.middlewares.cors.headers.customFrameOptionsValue=forte.buzl.uk
# - traefik.http.middlewares.cors.headers.customResponseHeaders.Cross-Origin-Resource-Policy=cross-origin
# - traefik.http.routers.forte.middlewares=cors,local-ipwhitelist@file
postgres:
image: kaangiray26/postgres:2.0
container_name: forte-db
restart: always
environment:
POSTGRES_DB: forte # Set Postgres Database Name
POSTGRES_USER: forte # Set Postgres Username
POSTGRES_PASSWORD: forte # Set Postgres Password
volumes:
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/forte/db:/var/lib/postgresql/data
healthcheck:
test: [ "CMD-SHELL", "pg_isready -U forte" ]
interval: 10s
timeout: 5s
retries: 5
#networks:
# - proxy
#networks:
# proxy:
# external: true

View File

@ -7,12 +7,8 @@
HTTPS=false HTTPS=false
# Domain # Domain
HOST=localhost
# enable the following to protect mirotalk with an additional login screen HOST=localhost
HOST_PROTECTED=false
HOST_USERNAME=username
HOST_PASSWORD=password
# Signaling Server listen port # Signaling Server listen port

View File

@ -5,4 +5,4 @@
# Notes # Notes
Disable open user registration after setting up your account. This can be done via the `/admin` web panel, if enabled, or by adjusting the `config.json` file. Alternatively via environment variables. See documentation [here](https://github.com/dani-garcia/vaultwarden/wiki/Disable-registration-of-new-users). Disable open user registration after setting up your account. This can be done via the `/admin` web panel, if enabled, or by adjusting the `config.json` file.

View File

@ -10,15 +10,13 @@ services:
- 1.1.1.1 - 1.1.1.1
environment: environment:
#- ADMIN_TOKEN=MySecureAdminTokenPasswordForAdminArea #- ADMIN_TOKEN=MySecureAdminTokenPasswordForAdminArea
#- SIGNUPS_ALLOWED=false
#- SIGNUPS_VERIFY=true
#- INVITATIONS_ALLOWED=true # only admins and orga owners
#- globalSettings__mail__replyToEmail=bitwarden@example.com #- globalSettings__mail__replyToEmail=bitwarden@example.com
#- globalSettings__mail__smtp__host=smtp.gmail.com #- globalSettings__mail__smtp__host=smtp.gmail.com
#- globalSettings__mail__smtp__username=bitwarden@example.com #- globalSettings__mail__smtp__username=bitwarden@example.com
#- globalSettings__mail__smtp__password=MyStrongSmtpLoginPassword #- globalSettings__mail__smtp__password=MyStrongSmtpLoginPassword
#- globalSettings__mail__smtp__ssl=true #- globalSettings__mail__smtp__ssl=true
#- globalSettings__mail__smtp__port=587 #- globalSettings__mail__smtp__port=587
- globalSettings__disableUserRegistration=true
- LOG_FILE=/data/logs/access.log - LOG_FILE=/data/logs/access.log
- WEBSOCKET_ENABLED=true - WEBSOCKET_ENABLED=true
- ROCKET_ENV=prod - ROCKET_ENV=prod
@ -40,10 +38,6 @@ services:
# - traefik.http.routers.vaultwarden-ws.rule=Host(`bitwarden.example.com`) && Path(`/notifications/hub`) # - traefik.http.routers.vaultwarden-ws.rule=Host(`bitwarden.example.com`) && Path(`/notifications/hub`)
# - traefik.http.routers.vaultwarden-ws.service=vaultwarden-ws # - traefik.http.routers.vaultwarden-ws.service=vaultwarden-ws
# - traefik.http.services.vaultwarden-ws.loadbalancer.server.port=3012 # - traefik.http.services.vaultwarden-ws.loadbalancer.server.port=3012
# - traefik.http.routers.vaultwarden-admin.rule=Host(`bitwarden.example.com`) && Path(`/admin`)
# - traefik.http.routers.vaultwarden-admin.service=vaultwarden
# - traefik.http.services.vaultwarden-admin.loadbalancer.server.port=80
# - traefik.http.routers.vaultwarden-admin.middlewares=local-ipwhitelist@file,authelia@file
volumes: volumes:
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vaultwarden/data:/data - ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vaultwarden/data:/data
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vaultwarden/logs:/data/logs - ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vaultwarden/logs:/data/logs