

Pretty sure that’s illegal AF. Report them?
Pretty sure that’s illegal AF. Report them?
Is this really what we’ve become, people? Dork-shamers?
Some poor dork saved up all their money, and bought a dork-car that they knew was defective by design, starting to fall apart even before it rolled off the dork-car assembly line. Because they had a deep, sweet dork-passion for the RoboCop franchise, Bud Light, and gun shows, with enough Venn diagram overlap to let them set common sense on indefinite hold, and follow their dork dreams, little dork heart aflutter with excitement. And then the dork returns from a hearty breakfast at Applebee’s, and finds this note pinned to their dork-mobile 😓
How would you feel if that happened to you? Maybe we’re the real dorks. Shame on us.
That’s my whole basic “speech” when I have to tell someone: “I’ve got ADD; I don’t have the H”.
I think in some places they don’t use ADD anymore, but I can’t really keep up …
### GLUETUN
services:
gluetun:
image: qmcgaw/gluetun
container_name: gluetun
cap_add:
- NET_ADMIN
devices:
- /dev/net/tun:/dev/net/tun
ports:
- 8888:8888/tcp # HTTP proxy
# - 8388:8388/tcp # Shadowsocks
# - 8388:8388/udp # Shadowsocks
- 8090:8090/tcp # qbittorrent
- xxxx:xxxx/tcp
- 3423:3000/tcp # librewolf
volumes:
- /volumex/docker/gluetun:/gluetun
environment:
- PUID=xxxx #CHANGE_TO_YOUR_UID
- PGID=xxxx #CHANGE_TO_YOUR_GID
- TZ=Europe/xxxx #CHANGE_TO_YOUR_TZ
- VPN_SERVICE_PROVIDER=airvpn
- VPN_TYPE=wireguard
- WIREGUARD_PRIVATE_KEY=xxxx
- WIREGUARD_PRESHARED_KEY=xxxx
- WIREGUARD_ADDRESSES=xxx.xxx.xxx.xxx
- SERVER_REGIONS=Europe
- HTTPPROXY=off #change to on if you wish to enable
- SHADOWSOCKS=off #change to on if you wish to enable
- FIREWALL_OUTBOUND_SUBNETS=172.20.0.0/16,192.168.0.0/24 #change this in line with your subnet see note on guide.
- FIREWALL_VPN_INPUT_PORTS=xxxx #uncomment this line and change the port as per the note on the guide
- UPDATER_PERIOD=24h
network_mode: bridge-xxxx
labels:
- com.centurylinklabs.watchtower.enable=false
security_opt:
- no-new-privileges:true
restart: always
### QBITTORRENT
qbittorrent:
image: linuxserver/qbittorrent:5.0.1
container_name: qbittorrent
environment:
- PUID=xxxx #CHANGE_TO_YOUR_UID
- PGID=xxxx #CHANGE_TO_YOUR_GID
- TZ=Europe/xxxx #CHANGE_TO_YOUR_TZ
- WEBUI_PORT=8090
- UMASK=022
volumes:
- /volumex/docker/qbittorrent:/config
- /volumex/linux-isos/:/data
network_mode: service:gluetun # run on the vpn network
depends_on:
gluetun:
condition: service_healthy
security_opt:
- no-new-privileges:true
restart: always
### LIBREWOLF
librewolf:
container_name: LibreWolf
image: ghcr.io/linuxserver/librewolf:latest
security_opt:
- no-new-privileges:false
- seccomp:unconfined
#healthcheck:
# test: timeout 10s bash -c ':> /dev/tcp/127.0.0.1/3000' || exit 1
#interval: 10s
#timeout: 5s
#retries: 3
#start_period: 90s
environment:
CUSTOM_USER: xxxx
PASSWORD: xxxx
TZ: Europe/xxxx
PUID: xxxx #CHANGE_TO_YOUR_UID
PGID: xxxx #CHANGE_TO_YOUR_GID
volumes:
- /volumex/docker/librewolf:/config:rw
network_mode: service:gluetun # run on the vpn network
restart: no
depends_on:
gluetun:
condition: service_healthy
shm_size: "5gb"
Heard about WireSock, but I’m on macOS, “sadly”.
Gluetun is running in a container in the same stack as Qbit, and Qbit knows to get its network through Gluetun.
network mode > service > gluetun
or something similar (syntax is def. wrong) in the Compose.
Gluetun is connected to AirVPN through / with / using (?) WireGuard. I’m actually a bit foggy on the terminology 😅
I’m in virtually the same situation, although qbit is running in Docker through a Gluetun/Wireguard tunnel, so that part works fine.
I really wanted to do split tunnel on my Mac to access my tracker’s site (all Linux ISOs, of course) through the same tunnel, and haven’t had any success.
My workaround is running LibreWolf (modded Firefox) in the same stack, through the same tunnel. It’s not ideal, but at least it works.
Do update if you find a solution!
Literally saw one with 1300+ the other day, thought I was going insane 😳