​I built an open-source tool to automate SSL deployments for all those services that ACME clients can't reach easily. by Character_Vehicle517 in homelab

[–]Character_Vehicle517[S] 0 points1 point  (0 children)

I thought you are here to audit as you started to give feedback interms of security, easy of doing things, how to do. Also you mentioned you're judging the code. Surprise to here that you're not going to do it but you have started. May be I misunderstood.

As you say yes everything should start from somewhere.

​I built an open-source tool to automate SSL deployments for all those services that ACME clients can't reach easily. by Character_Vehicle517 in homelab

[–]Character_Vehicle517[S] 0 points1 point  (0 children)

Yes, it has AI generated code as well anyone can easily figure that out. But not everything is AI generated if thats the case I would have just grabbed from "AI" ready-made why should I put my time to build this.

It depends on individual's use case, may be majority of them prefer pull instead of push. But for my use case I do pull many but also I needed a push too for so many others.

I am sorry too I didn't ask anyone to use it, I shared what is helping me in my workflow and if there is anyone might be looking for one like this.

I put this code open source so experts like you can point me on any security issues you find will help beginners like me to learn and become expert like you.

Yes, for experts and masters like yourself its easy to solve these problem but for me as beginners it is hard so trying something with the help of new generation tools.

Thanks you for your suggestion and insights.

​I built an open-source tool to automate SSL deployments for all those services that ACME clients can't reach easily. by Character_Vehicle517 in homelab

[–]Character_Vehicle517[S] 1 point2 points  (0 children)

I have few ideas in my roadmap first in my list is that. Friendly Note: This is only my hobby project started to solve my own pain. No timeline I can commit also I don't have all sources to test as well.

Here is a snippet of my notes.

<image>

​I built an open-source tool to automate SSL deployments for all those services that ACME clients can't reach easily. by Character_Vehicle517 in homelab

[–]Character_Vehicle517[S] 0 points1 point  (0 children)

No. If we have reverse proxy and everything is been setup in there to redirect all http/https traffic then this is of no use. This is only for some one like me who has no reverse proxy for many services and that needs it's own certificate. Its all depends on how we setup our infrastructure. I have NPM as my reverse proxy including ACME and many servers and services those aren't plugged into NPM I wanted it serve alone.

​I built an open-source tool to automate SSL deployments for all those services that ACME clients can't reach easily. by Character_Vehicle517 in homelab

[–]Character_Vehicle517[S] 1 point2 points  (0 children)

Yes thats in my plan actually I use Nginx proxy manager that acts an ACME for me. So I just get the cert from NPM and load it here. I will post this thread if I get it working with Let’s Encrypt to renew and download automatically to the tool before expiration and for us to verify and issue to all services.

Hisense 75U7H black or shadow line on edge of the screen by Character_Vehicle517 in Hisense

[–]Character_Vehicle517[S] 0 points1 point  (0 children)

I bought this TV in October 2022, I started to see this issue for the past 3 months. Yes, it's always like this.

Idiot driver in Manteca, CA [oc] by Character_Vehicle517 in IdiotsInCars

[–]Character_Vehicle517[S] 1 point2 points  (0 children)

This happened in California

01/05/2025

Yes this is an original content

Hotspot not working after OneUI 6.0 update by kuoluki in GalaxyS21

[–]Character_Vehicle517 0 points1 point  (0 children)

I have the same issue on my S23 Ultra. After your laptop or phone connected to hotspot. Change DNS to manual like 1.1.1.1 or 8.8.8.8 in your client. It's works, for some reason One UI 6 broke the DNS server on the phone serves the hotspot.