Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)T
Posts
0
Comments
132
Joined
3 yr. ago

  • Not OP but I use headscale and have it configured using Authentik for SSO. Works flawlessly once its up and running. I also use headplane for the UI. It has SSO integration as well which makes everything a breeze.

    Edit: Forgot to mention, all running in docker with traefik as the reverse proxy.

  • Its not as cut and dry as everyone here is making it out to be. This is an organization of people, rules are bent and broken CONSTANTLY.

    Each branch has a form of peer-mentoring. In some form or another you're graded on your ability to do your job and those grades get looked at for your promotion.

    It starts off as a negative counseling. Sometimes written, most times just verbal. These are the "oh man I forgot to do this duty at the end of the day" type offenses. More than likely someone is just gonna tell you to pull you're head out of your ass and fix it.

    Get enough of these and eventually you will get whats called a "non-judical punishment". These are punishments handed out by commanding officers. See "UCMJ Article 15". These are offenses under the rest of the UCMJ. Some things like adultery are still chargeable offenses. If they cant find something to charge you with "UCMJ Article 134" is a general offense. Basically "hey we didnt like what you did, its not illegal, but were gonna charge you anyway"

    Think of NJPs as a misdemeanor, smaller but still serious infraction. When you leave the military, nobody will know that you got charged with something. But these do come with punishments. You basically get "grounded" cant leave your barracks room / get put on restriction. Also loss of pay.

    Decide to commit a serous crime defined in the UCMJ? Well thats what a court-martial is. That is equivalent to a felony and will show up on any criminal background check. These often include jail time and reductions in rank.

    Its all incredibly suggestive and depends on all the parties involved.

  • Holy shit I had no idea about this. Thank you so much!

  • Looking into the history of Kodak is crazy. They used a 13 month calendar and secretly kept a nuclear reactor in the basement for years.

    People forget that Kodak was a chemical company, not just photography.

  • c/unixsocks

  • Ah, what you're looking for is called udev. It supplies the system with device events from the linux kernel.

    This gist of it is, to use this command

     
        
    udevadm monitor --environment --udev
    
      

    then unplug and plug in your monitor. You should see the events on screen. You then write a rule and place it in /etc/udev/rules.d. To run a script add something like

     
        
    ACTION=="change", SUBSYSTEM=="drm", KERNEL=="card0-HDMI-A-1", \
      RUN+="/usr/local/monitor-script.sh"
    
    
      

    See the man udev page for more info (☞゚ヮ゚)☞

  • Thats a lot of text that didnt actually respond to my comment.

    Your original statement was that ICE will snatch you up after 31 days of being awol.

    Let's clarify a couple things. You are awol the second you dont show up to formation. Article 85 is desertion, the UCMJ article that you can get charged with. Theres no arbitrary amount of days, the second you're awol you could be charged with desertion. Read the Article and tell me if you see a time.

    You also completely ignored the ICE comment. Your factually incorrect and fear mongering comments are unwelcome.

  • Originally you said

    After 31 days, you’re not awol. The military lists you as a deserter

    And I said that 31 days is nothing, to which you responded

    But that’s at the CO’s discretion, but three months is nothing lmao

    So which is it? I was responding to your original claim that after 31 days ICE will hunt you down and give you ten years. Which is a completely silly claim on its own, the US Marshals are in charge of finding federal fugitives.

  • Haha no, we had a boot go out for a pack of smokes and they picked him up 3 months later in a hotel in Palm Springs with two hookers. Fucker was back in morning formation with an NJP the next morning.

    They spend a metric fuck ton on how to train you to do your job. They are going to get their investment back.

  • Have you tried setting up qemu with virt-manager? Theres a lot of info on how to set it up for most distros and I find the GUI is very straightforward and easy to use.

  • Made me laugh in the middle of a restaurant, thanks 🤣

  • Thank you for the laugh (⁀ᗢ⁀)

  • genius

    Jump
  • Yeah you just have to deal with mast bumping, as if thats any less worrying.

  • Course, feel free to DM if you have questions.

    This is a common setup. Have a firewall block all traffic. Use docker to punch a hole through the firewall and expose only 443 to the reverse proxy. Now any container can be routed through the reverse proxy as long as the container is on the same docker network.

    If you define no network, the containers are put into a default bridge network, use docker inspect to see the container ips.

    Here is an example of how to define a custom docker network called "proxy_net" and statically set each container ip.

     
        
    networks:
      proxy_net:
        driver: bridge
        ipam:
          config:
            - subnet: 172.28.0.0/16
    
    services:
      app1:
        image: nginx:latest
        container_name: app1
        networks:
          proxy_net:
            ipv4_address: 172.28.0.10
        ports:
          - "8080:80"
    
      whoami:
        image: containous/whoami:latest
        container_name: whoami
        networks:
          proxy_net:
            ipv4_address: 172.28.0.11
    
      

    Notice how "who am I" is not exposed at all. The nginx container can now serve the whoami container with the proper config, pointing at 172.28.0.11.

  • Well if your reverse proxy is also inside of a container, you dont need to expose the port at all. As long as the containers are in the same docker network then they can communicate.

    If your reverse proxy is not inside a docker container, then yes this method would work to prevent clients from connecting to a docker container.

  • Something like this. This is a compose.yml that only allows ips from the local host 8080 to connect to the container port 80.

     
        
    services:
      webapp:
        image: nginx:latest
        container_name: local_nginx
        ports:
          - "127.0.0.1:8080:80"
    
      
  • You might be thinking of one of the main characters, Edward. Her character has a masculine name but is drawn pretty androgynous, but by all accounts she identifies as a girl. Pretty progressive for the time that it was released. There was also a scene with a posititue in drag.

    I think that scene is in the Cowboy Bebop movie. Edward goes trick or treating and knocks on the door of a prostitute in drag. The prostitute then confuses Edward for being a little boy and gets mad saying when they realize Edward is a girl.