Compare commits

..

No commits in common. "5d609b451cb9b6d18dd0054a777d96c106e76d61" and "4263768d231ad3b33ebcc0fc6ee93bb43054f9a8" have entirely different histories.

6 changed files with 67 additions and 143 deletions

View File

@ -109,7 +109,6 @@ docker compose up
- [Stash](examples/stash) - Stash is a self-hosted webapp written in Go which organizes and serves your porn. - [Stash](examples/stash) - Stash is a self-hosted webapp written in Go which organizes and serves your porn.
- [Raveberry](examples/raveberry) - A multi-user music server with a focus on participation. - [Raveberry](examples/raveberry) - A multi-user music server with a focus on participation.
- [Deemix](examples/deemix) - deemix is a barebone deezer downloader library built from the ashes of Deezloader Remix. - [Deemix](examples/deemix) - deemix is a barebone deezer downloader library built from the ashes of Deezloader Remix.
- [Forte](examples/forte) - Self-hosted, music streaming platform.
- [MeTube](examples/metube) - Web GUI for youtube-dl (using the yt-dlp fork) with playlist support. Allows you to download videos and audio only from YouTube and dozens of other sites. - [MeTube](examples/metube) - Web GUI for youtube-dl (using the yt-dlp fork) with playlist support. Allows you to download videos and audio only from YouTube and dozens of other sites.
- [Syncthing](examples/syncthing) - Syncthing is a continuous file synchronization program. It synchronizes files between two or more computers. - [Syncthing](examples/syncthing) - Syncthing is a continuous file synchronization program. It synchronizes files between two or more computers.
- [Transmission](examples/transmission) - Transmission is a fast, easy, and free BitTorrent client. - [Transmission](examples/transmission) - Transmission is a fast, easy, and free BitTorrent client.

View File

@ -1,9 +0,0 @@
# References
- https://github.com/kaangiray26/forte
# Notes
After deploying, the forte admin dashboard will be available on TCP/3000. You can log into the web dashboard using `forte` as username and `alternative` as password. Please change those default credentials. Use a reverse proxy like Traefik if you plan on exposing the forte instance, as HTTPS is required to stream flawlessly.
After creating a user account via the forte web dashboard, you can browse https://forte.buzl.uk/ and use your own server to stream music from. Specify your created user account and the automatically created password token.

View File

@ -1,56 +0,0 @@
version: '3'
services:
app:
image: kaangiray26/forte:2.8
container_name: forte
restart: on-failure
#ports:
# - "3000:3000"
depends_on:
postgres:
condition: service_healthy
environment:
mode: public
port: 3000
NODE_ENV: production # Set Node Environment
POSTGRES_HOST: postgres # Postgres Host/IP
POSTGRES_PORT: 5432 # Postgres Database Port
POSTGRES_DB: forte # Set Postgres Database Name
POSTGRES_USER: forte # Set Postgres Username
POSTGRES_PASSWORD: forte # Set Postgres Password
volumes:
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/forte/library:/library # your music library to import from
#networks:
# - proxy
#labels:
# - traefik.enable=true
# - traefik.http.routers.forte.rule=Host(`forte.example.com`)
# - traefik.http.services.forte.loadbalancer.server.port=3000
# - traefik.docker.network=proxy
# - traefik.http.middlewares.cors.headers.customResponseHeaders.Access-Control-Allow-Origin=https://forte.buzl.uk
# - traefik.http.middlewares.cors.headers.customFrameOptionsValue=forte.buzl.uk
# - traefik.http.middlewares.cors.headers.customResponseHeaders.Cross-Origin-Resource-Policy=cross-origin
# - traefik.http.routers.forte.middlewares=cors,local-ipwhitelist@file
postgres:
image: kaangiray26/postgres:2.0
container_name: forte-db
restart: always
environment:
POSTGRES_DB: forte # Set Postgres Database Name
POSTGRES_USER: forte # Set Postgres Username
POSTGRES_PASSWORD: forte # Set Postgres Password
volumes:
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/forte/db:/var/lib/postgresql/data
healthcheck:
test: [ "CMD-SHELL", "pg_isready -U forte" ]
interval: 10s
timeout: 5s
retries: 5
#networks:
# - proxy
#networks:
# proxy:
# external: true

View File

@ -3,72 +3,68 @@
# ------- # -------
# Enable self-signed certs (app/ssl) # Enable self-signed certs (app/ssl)
HTTPS=false HTTPS=false
# Domain # Domain
HOST=localhost
HOST=localhost
# enable the following to protect mirotalk with an additional login screen
HOST_PROTECTED=false # Signaling Server listen port
HOST_USERNAME=username
HOST_PASSWORD=password PORT=3000
# Signaling Server listen port # Ngrok
# 1. Goto https://ngrok.com
PORT=3000 # 2. Get started for free
# 3. Copy YourNgrokAuthToken: https://dashboard.ngrok.com/get-started/your-authtoken
# Ngrok
# 1. Goto https://ngrok.com NGROK_ENABLED=false # or true
# 2. Get started for free NGROK_AUTH_TOKEN=YourNgrokAuthToken
# 3. Copy YourNgrokAuthToken: https://dashboard.ngrok.com/get-started/your-authtoken
# Stun
NGROK_ENABLED=false # or true # Check: https://webrtc.github.io/samples/src/content/peerconnection/trickle-ice/
NGROK_AUTH_TOKEN=YourNgrokAuthToken
STUN=stun:stun.l.google.com:19302
# Stun
# Check: https://webrtc.github.io/samples/src/content/peerconnection/trickle-ice/ # Turn
# Recommended: https://github.com/coturn/coturn
STUN=stun:stun.l.google.com:19302 # Check: https://webrtc.github.io/samples/src/content/peerconnection/trickle-ice/
# Turn TURN_ENABLED=false # or true
# Recommended: https://github.com/coturn/coturn TURN_URLS=turn:YourTurnServer
# Check: https://webrtc.github.io/samples/src/content/peerconnection/trickle-ice/ TURN_USERNAME=YourTurnUsername
TURN_PASSWORD=YourTurnPassword
TURN_ENABLED=false # or true
TURN_URLS=turn:YourTurnServer # API
TURN_USERNAME=YourTurnUsername # The response will give you a entrypoint / Room URL for your meeting.
TURN_PASSWORD=YourTurnPassword # curl -X POST "http://localhost:3000/api/v1/meeting" -H "authorization: mirotalk_default_secret" -H "Content-Type: application/json"
# API API_KEY_SECRET=8jBEI8KVKj2cadd3Fy3ayu6Fwacg8+NjCiMjmINac # pls change
# The response will give you a entrypoint / Room URL for your meeting.
# curl -X POST "http://localhost:3000/api/v1/meeting" -H "authorization: mirotalk_default_secret" -H "Content-Type: application/json" # Survey URL
# Using to redirect the client after close the call (feedbacks, website...)
API_KEY_SECRET=8jBEI8KVKj2cadd3Fy3ayu6Fwacg8+NjCiMjmINac # pls change
SURVEY_ENABLED=false # or true
# Survey URL SURVEY_URL=https://www.questionpro.com/t/AUs7VZq00L
# Using to redirect the client after close the call (feedbacks, website...)
# Sentry (optional)
SURVEY_ENABLED=false # or true # 1. Goto https://sentry.io/
SURVEY_URL=https://www.questionpro.com/t/AUs7VZq00L # 2. Create account
# 3. Goto Settings/Projects/YourProjectName/Client Keys (DSN)
# Sentry (optional)
# 1. Goto https://sentry.io/ SENTRY_ENABLED=false # or true
# 2. Create account SENTRY_DSN=YourClientKeyDSN
# 3. Goto Settings/Projects/YourProjectName/Client Keys (DSN) SENTRY_TRACES_SAMPLE_RATE=1.0
SENTRY_ENABLED=false # or true # Slack Integration (optional)
SENTRY_DSN=YourClientKeyDSN # 1. Goto https://api.slack.com/apps/
SENTRY_TRACES_SAMPLE_RATE=1.0 # 2. Create your app
# 3. On Settings - Basic Information - App Credentials chose your Signing Secret
# Slack Integration (optional) # 4. Create a Slash Commands and put as Request URL: https://your.domain.name/slack
# 1. Goto https://api.slack.com/apps/
# 2. Create your app SLACK_ENABLED=false # or true
# 3. On Settings - Basic Information - App Credentials chose your Signing Secret SLACK_SIGNING_SECRET=YourSlackSigningSecret
# 4. Create a Slash Commands and put as Request URL: https://your.domain.name/slack
# Auto deploy on Railway
SLACK_ENABLED=false # or true # https://railway.app/new/template/mirotalk?referralCode=mirotalk
SLACK_SIGNING_SECRET=YourSlackSigningSecret
# Auto deploy on Railway
# https://railway.app/new/template/mirotalk?referralCode=mirotalk

View File

@ -5,4 +5,4 @@
# Notes # Notes
Disable open user registration after setting up your account. This can be done via the `/admin` web panel, if enabled, or by adjusting the `config.json` file. Alternatively via environment variables. See documentation [here](https://github.com/dani-garcia/vaultwarden/wiki/Disable-registration-of-new-users). Disable open user registration after setting up your account. This can be done via the `/admin` web panel, if enabled, or by adjusting the `config.json` file.

View File

@ -10,15 +10,13 @@ services:
- 1.1.1.1 - 1.1.1.1
environment: environment:
#- ADMIN_TOKEN=MySecureAdminTokenPasswordForAdminArea #- ADMIN_TOKEN=MySecureAdminTokenPasswordForAdminArea
#- SIGNUPS_ALLOWED=false
#- SIGNUPS_VERIFY=true
#- INVITATIONS_ALLOWED=true # only admins and orga owners
#- globalSettings__mail__replyToEmail=bitwarden@example.com #- globalSettings__mail__replyToEmail=bitwarden@example.com
#- globalSettings__mail__smtp__host=smtp.gmail.com #- globalSettings__mail__smtp__host=smtp.gmail.com
#- globalSettings__mail__smtp__username=bitwarden@example.com #- globalSettings__mail__smtp__username=bitwarden@example.com
#- globalSettings__mail__smtp__password=MyStrongSmtpLoginPassword #- globalSettings__mail__smtp__password=MyStrongSmtpLoginPassword
#- globalSettings__mail__smtp__ssl=true #- globalSettings__mail__smtp__ssl=true
#- globalSettings__mail__smtp__port=587 #- globalSettings__mail__smtp__port=587
- globalSettings__disableUserRegistration=true
- LOG_FILE=/data/logs/access.log - LOG_FILE=/data/logs/access.log
- WEBSOCKET_ENABLED=true - WEBSOCKET_ENABLED=true
- ROCKET_ENV=prod - ROCKET_ENV=prod
@ -40,10 +38,6 @@ services:
# - traefik.http.routers.vaultwarden-ws.rule=Host(`bitwarden.example.com`) && Path(`/notifications/hub`) # - traefik.http.routers.vaultwarden-ws.rule=Host(`bitwarden.example.com`) && Path(`/notifications/hub`)
# - traefik.http.routers.vaultwarden-ws.service=vaultwarden-ws # - traefik.http.routers.vaultwarden-ws.service=vaultwarden-ws
# - traefik.http.services.vaultwarden-ws.loadbalancer.server.port=3012 # - traefik.http.services.vaultwarden-ws.loadbalancer.server.port=3012
# - traefik.http.routers.vaultwarden-admin.rule=Host(`bitwarden.example.com`) && Path(`/admin`)
# - traefik.http.routers.vaultwarden-admin.service=vaultwarden
# - traefik.http.services.vaultwarden-admin.loadbalancer.server.port=80
# - traefik.http.routers.vaultwarden-admin.middlewares=local-ipwhitelist@file,authelia@file
volumes: volumes:
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vaultwarden/data:/data - ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vaultwarden/data:/data
- ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vaultwarden/logs:/data/logs - ${DOCKER_VOLUME_STORAGE:-/mnt/docker-volumes}/vaultwarden/logs:/data/logs