diff --git a/applicationFeed-lastUpdated.json b/applicationFeed-lastUpdated.json index ea77b33f0..bc26fac10 100755 --- a/applicationFeed-lastUpdated.json +++ b/applicationFeed-lastUpdated.json @@ -1,3 +1,3 @@ { - "last_updated_timestamp": 1726776401 + "last_updated_timestamp": 1726783600 } \ No newline at end of file diff --git a/applicationFeed-raw.json b/applicationFeed-raw.json index 311b2cfbb..58796bd0b 100644 --- a/applicationFeed-raw.json +++ b/applicationFeed-raw.json @@ -310430,7 +310430,7 @@ "Productivity", "Tools-Utilities" ], - "LastUpdateScan": 1724184414, + "LastUpdateScan": 1726783600, "FirstSeen": 1721585182 }, { diff --git a/applicationFeed.json b/applicationFeed.json index 4ccd2c4c7..a3ec06b94 100755 --- a/applicationFeed.json +++ b/applicationFeed.json @@ -1,7 +1,7 @@ { "apps": 2369, - "last_updated_timestamp": 1726776401, - "last_updated": "2024-09-19 16:06", + "last_updated_timestamp": 1726783600, + "last_updated": "2024-09-19 18:06", "categories": [ { "Cat": "AI:", @@ -310596,7 +310596,7 @@ "Productivity", "Tools-Utilities" ], - "LastUpdateScan": 1724184414, + "LastUpdateScan": 1726783600, "FirstSeen": 1721585182 }, { diff --git a/log.txt b/log.txt index dbda131a4..db9338044 100755 --- a/log.txt +++ b/log.txt @@ -4330,6 +4330,8 @@ Processing /tmp/appFeed/templates/bendysRepository/sonarrtorss/sonarrtorss.xml.. Updating stats on containers +ggerganov/llama +ghcr.io/ggerganov/llama.cpp:server Downloads: Stars: Base: unknown Privileged: 105 diff --git a/old-applicationFeed-raw.json b/old-applicationFeed-raw.json index 673a77da1..311b2cfbb 100644 --- a/old-applicationFeed-raw.json +++ b/old-applicationFeed-raw.json @@ -117857,7 +117857,7 @@ "Privileged": "false", "Support": "https://forums.unraid.net/topic/83786-support-ich777-application-dockers/", "Project": "https://github.com/tpill90/steam-lancache-prefill", - "Overview": "This container will download and install BattleNetPrefill and/or EpicPrefill and/or SteamPrefill and run the prefill on a cron schedule.\r\n\r\n**Network:** It is recommended to run this container in the same network mode as the LANCache-DNS if used, by default it is set to br0 please change that if you have your LANCache server configured to work network wide on your LAN to the correct network type for your configuration.\r\n\r\n**DNS:** I would strongly recommend that you set the DNS manually to the LANCache-DNS if you haven't it configured to be network wide on your LAN, to do that turn on the advanced view (toggle switch in the top right corner) and at the extra parameters append: --dns=yourLANcacheSERVER (of course replace 'yourLANcacheSERVER' with the address of your LANCache-DNS).\r\n\r\nUpdate Notice: The container will check by default on each start/restart on new updates for BattleNetPrefill and/or EpicPrefill and/or SteamPrefill, this can be disabled if really wanted.\r\n\r\n**BattleNet|Epic|Steam Prefill Notice:** Steam Prefill needs to be configured to work properly, please enter the following commands and/or follow the prompts afterwards, you can close the window when you are finished:\r\n1. Open up a container console\r\n2. Type in 'cd ${DATA_DIR}/(BattleNet|Epic|Steam)Prefill' and press ENTER\r\n3. Type in './(BattleNet|Epic|Steam)Prefill select-apps' and press ENTER\r\n4. Type in './(BattleNet|Epic|Steam)Prefill select-apps' and press ENTER\r\n5. Enter your credentials and/or follow the steps displayed\r\n6. Select the apps you want to prefill and press ENTER\r\n7. Done\r\n\r\n_Notice:_ In the above example you have to choose between BattleNet, Epic or Steam so that it says BattleNetPrefill, EpicPrefill or SteamPrefill instead of (BattleNet|Epic|Steam)Prefill. (these stepps are also displayed in the container log when BatteNet/Epic/Steam isn't/aren't configured yet)\r\n\r\nIf you ever want to change the apps you've selected then follow these steps again.", + "Overview": "This container will download and install BattleNetPrefill and/or EpicPrefill and/or SteamPrefill and run the prefill on a cron schedule.\r\n\r\n**Network:** It is recommended to run this container in the same network mode as the LANCache-DNS if used, by default it is set to br0 please change that if you have your LANCache server configured to work network wide on your LAN to the correct network type for your configuration.\r\n\r\n**DNS:** I would strongly recommend that you set the DNS manually to the LANCache-DNS if you haven't it configured to be network wide on your LAN, to do that turn on the advanced view (toggle switch in the top right corner) and at the extra parameters append: --dns=yourLANcacheSERVER (of course replace 'yourLANcacheSERVER' with the address of your LANCache-DNS).\r\n\r\nUpdate Notice: The container will check by default on each start/restart on new updates for BattleNetPrefill and/or EpicPrefill and/or SteamPrefill, this can be disabled if really wanted.\r\n\r\n**BattleNet|Epic|Steam Prefill Notice:** Steam Prefill needs to be configured to work properly, please enter the following commands and/or follow the prompts afterwards, you can close the window when you are finished:\r\n1. Open up a container console\r\n2. Type in 'su ${USER}' and press ENTER\r\n3. Type in 'cd ${DATA_DIR}/(BattleNet|Epic|Steam)Prefill' and press ENTER\r\n4. Type in './(BattleNet|Epic|Steam)Prefill select-apps' and press ENTER\r\n5. Type in './(BattleNet|Epic|Steam)Prefill select-apps' and press ENTER\r\n6. Enter your credentials and/or follow the steps displayed\r\n7. Select the apps you want to prefill and press ENTER\r\n8. Done\r\n\r\n_Notice:_ In the above example you have to choose between BattleNet, Epic or Steam so that it says BattleNetPrefill, EpicPrefill or SteamPrefill instead of (BattleNet|Epic|Steam)Prefill. (these stepps are also displayed in the container log when BatteNet/Epic/Steam isn't/aren't configured yet)\r\n\r\nIf you ever want to change the apps you've selected then follow these steps again.", "Icon": "https://raw.githubusercontent.com/ich777/docker-templates/master/ich777/images/prefill.png", "ExtraParams": "--restart=unless-stopped", "DonateText": "If you like my work please ", @@ -248543,7 +248543,7 @@ "Support": "https://forums.unraid.net/topic/111725-support-diamondprecisioncomputing-all-images-and-files", "Project": "https://github.com/qdm12/gluetun", "License": "https://img.shields.io/github/license/qdm12/gluetun", - "Overview": "# Gluetun VPN client\n\nLightweight swiss-knife-like VPN client to multiple VPN service providers\n\n## Quick links\n\n- [Setup](#setup)\n- [Features](#features)\n- Problem?\n - [Check the Wiki](https://github.com/qdm12/gluetun/wiki)\n - [Start a discussion](https://github.com/qdm12/gluetun/discussions)\n - [Fix the Unraid template](https://github.com/qdm12/gluetun/discussions/550)\n- Suggestion?\n - [Create an issue](https://github.com/qdm12/gluetun/issues)\n - [Join the Slack channel](https://join.slack.com/t/qdm12/shared_invite/enQtOTE0NjcxNTM1ODc5LTYyZmVlOTM3MGI4ZWU0YmJkMjUxNmQ4ODQ2OTAwYzMxMTlhY2Q1MWQyOWUyNjc2ODliNjFjMDUxNWNmNzk5MDk)\n- Happy?\n - Sponsor me on [github.com/sponsors/qdm12](https://github.com/sponsors/qdm12)\n - Donate to [paypal.me/qmcgaw](https://www.paypal.me/qmcgaw)\n - Drop me [an email](mailto:quentin.mcgaw@gmail.com)\n- **Want to add a VPN provider?** check [Development](https://github.com/qdm12/gluetun/wiki/Development) and [Add a provider](https://github.com/qdm12/gluetun/wiki/Add-a-provider)\n- Video:\n\n [![Video Gif](https://i.imgur.com/CetWunc.gif)](https://youtu.be/0F6I03LQcI4)\n\n- [Substack Console interview](https://console.substack.com/p/console-72)\n\n## Features\n\n- Based on Alpine 3.18 for a small Docker image of 35.6MB\n- Supports: **AirVPN**, **Cyberghost**, **ExpressVPN**, **FastestVPN**, **HideMyAss**, **IPVanish**, **IVPN**, **Mullvad**, **NordVPN**, **Perfect Privacy**, **Privado**, **Private Internet Access**, **PrivateVPN**, **ProtonVPN**, **PureVPN**, **SlickVPN**, **Surfshark**, **TorGuard**, **VPNSecure.me**, **VPNUnlimited**, **Vyprvpn**, **WeVPN**, **Windscribe** servers\n- Supports OpenVPN for all providers listed\n- Supports Wireguard both kernelspace and userspace\n - For **Mullvad**, **Ivpn**, **Surfshark** and **Windscribe**\n - For **ProtonVPN**, **PureVPN**, **Torguard**, **VPN Unlimited** and **WeVPN** using [the custom provider](https://github.com/qdm12/gluetun/wiki/Custom-provider)\n - For custom Wireguard configurations using [the custom provider](https://github.com/qdm12/gluetun/wiki/Custom-provider)\n - More in progress, see [#134](https://github.com/qdm12/gluetun/issues/134)\n- DNS over TLS baked in with service provider(s) of your choice\n- DNS fine blocking of malicious/ads/surveillance hostnames and IP addresses, with live update every 24 hours\n- Choose the vpn network protocol, `udp` or `tcp`\n- Built in firewall kill switch to allow traffic only with needed the VPN servers and LAN devices\n- Built in Shadowsocks proxy (protocol based on SOCKS5 with an encryption layer, tunnels TCP+UDP)\n- Built in HTTP proxy (tunnels HTTP and HTTPS through TCP)\n- [Connect other containers to it](https://github.com/qdm12/gluetun/wiki/Connect-a-container-to-gluetun)\n- [Connect LAN devices to it](https://github.com/qdm12/gluetun/wiki/Connect-a-LAN-device-to-gluetun)\n- Compatible with amd64, i686 (32 bit), **ARM** 64 bit, ARM 32 bit v6 and v7, and even ppc64le \ud83c\udf86\n- [Custom VPN server side port forwarding for Private Internet Access](https://github.com/qdm12/gluetun/wiki/Private-internet-access#vpn-server-port-forwarding)\n- Possibility of split horizon DNS by selecting multiple DNS over TLS providers\n- Unbound subprogram drops root privileges once launched\n- Can work as a Kubernetes sidecar container, thanks @rorph\n\n## Setup\n\n\ud83c\udf89 There are now instructions specific to each VPN provider with examples to help you get started as quickly as possible!\n\nGo to the [Wiki](https://github.com/qdm12/gluetun/wiki)!\n\nHere's a docker-compose.yml for the laziest:\n\n```yml\nversion: \"3\"\nservices:\n gluetun:\n image: qmcgaw/gluetun\n # container_name: gluetun\n # line above must be uncommented to allow external containers to connect. See https://github.com/qdm12/gluetun/wiki/Connect-a-container-to-gluetun#external-container-to-gluetun\n cap_add:\n - NET_ADMIN\n devices:\n - /dev/net/tun:/dev/net/tun\n ports:\n - 8888:8888/tcp # HTTP proxy\n - 8388:8388/tcp # Shadowsocks\n - 8388:8388/udp # Shadowsocks\n volumes:\n - /yourpath:/gluetun\n environment:\n # See https://github.com/qdm12/gluetun/wiki\n - VPN_SERVICE_PROVIDER=ivpn\n - VPN_TYPE=openvpn\n # OpenVPN:\n - OPENVPN_USER=\n - OPENVPN_PASSWORD=\n # Wireguard:\n # - WIREGUARD_PRIVATE_KEY=wOEI9rqqbDwnN8/Bpp22sVz48T71vJ4fYmFWujulwUU=\n # - WIREGUARD_ADDRESSES=10.64.222.21/32\n # Timezone for accurate log times\n - TZ=\n # Server list updater. See https://github.com/qdm12/gluetun/wiki/Updating-Servers#periodic-update\n - UPDATER_PERIOD=\n - UPDATER_VPN_SERVICE_PROVIDERS=\n```\n\n\ud83c\udd95 Image also available as `ghcr.io/qdm12/gluetun`\n\n## License\n\n[![MIT](https://img.shields.io/github/license/qdm12/gluetun)](https://github.com/qdm12/gluetun/master/LICENSE)", + "Overview": "# Gluetun VPN client\n\nLightweight swiss-knife-like VPN client to multiple VPN service providers\n\n## Quick links\n\n- [Setup](#setup)\n- [Features](#features)\n- Problem?\n - [Check the Wiki](https://github.com/qdm12/gluetun-wiki)\n - [Start a discussion](https://github.com/qdm12/gluetun/discussions)\n - [Fix the Unraid template](https://github.com/qdm12/gluetun/discussions/550)\n- Suggestion?\n - [Create an issue](https://github.com/qdm12/gluetun/issues)\n - [Join the Slack channel](https://join.slack.com/t/qdm12/shared_invite/enQtOTE0NjcxNTM1ODc5LTYyZmVlOTM3MGI4ZWU0YmJkMjUxNmQ4ODQ2OTAwYzMxMTlhY2Q1MWQyOWUyNjc2ODliNjFjMDUxNWNmNzk5MDk)\n- Happy?\n - Sponsor me on [github.com/sponsors/qdm12](https://github.com/sponsors/qdm12)\n - Donate to [paypal.me/qmcgaw](https://www.paypal.me/qmcgaw)\n - Drop me [an email](mailto:quentin.mcgaw@gmail.com)\n- **Want to add a VPN provider?** check [Development](https://github.com/qdm12/gluetun-wiki/blob/main/contributing/development.md) and [Add a provider](https://github.com/qdm12/gluetun-wiki/blob/main/contributing/add-a-provider.md)\n- Video:\n\n [![Video Gif](https://i.imgur.com/CetWunc.gif)](https://youtu.be/0F6I03LQcI4)\n\n- [Substack Console interview](https://console.substack.com/p/console-72)\n\n## Features\n\n- Based on Alpine 3.18 for a small Docker image of 35.6MB\n- Supports: **AirVPN**, **Cyberghost**, **ExpressVPN**, **FastestVPN**, **HideMyAss**, **IPVanish**, **IVPN**, **Mullvad**, **NordVPN**, **Perfect Privacy**, **Privado**, **Private Internet Access**, **PrivateVPN**, **ProtonVPN**, **PureVPN**, **SlickVPN**, **Surfshark**, **TorGuard**, **VPNSecure.me**, **VPNUnlimited**, **Vyprvpn**, **WeVPN**, **Windscribe** servers\n- Supports OpenVPN for all providers listed\n- Supports Wireguard both kernelspace and userspace\n - For **Mullvad**, **Ivpn**, **Surfshark** and **Windscribe**\n - For **ProtonVPN**, **PureVPN**, **Torguard**, **VPN Unlimited** and **WeVPN** using [the custom provider](https://github.com/qdm12/gluetun-wiki/blob/main/setup/providers/custom.md)\n - For custom Wireguard configurations using [the custom provider](https://github.com/qdm12/gluetun-wiki/blob/main/setup/providers/custom.md)\n - More in progress, see [#134](https://github.com/qdm12/gluetun/issues/134)\n- DNS over TLS baked in with service provider(s) of your choice\n- DNS fine blocking of malicious/ads/surveillance hostnames and IP addresses, with live update every 24 hours\n- Choose the vpn network protocol, `udp` or `tcp`\n- Built in firewall kill switch to allow traffic only with needed the VPN servers and LAN devices\n- Built in Shadowsocks proxy (protocol based on SOCKS5 with an encryption layer, tunnels TCP+UDP)\n- Built in HTTP proxy (tunnels HTTP and HTTPS through TCP)\n- [Connect other containers to it](https://github.com/qdm12/gluetun-wiki/blob/main/setup/connect-a-container-to-gluetun.md)\n- [Connect LAN devices to it](https://github.com/qdm12/gluetun-wiki/blob/main/setup/connect-a-lan-device-to-gluetun.md)\n- Compatible with amd64, i686 (32 bit), **ARM** 64 bit, ARM 32 bit v6 and v7, and even ppc64le \ud83c\udf86\n- [Custom VPN server side port forwarding for Private Internet Access](https://github.com/qdm12/gluetun-wiki/blob/main/setup/providers/private-internet-access.md#vpn-server-port-forwarding)\n- Possibility of split horizon DNS by selecting multiple DNS over TLS providers\n- Unbound subprogram drops root privileges once launched\n- Can work as a Kubernetes sidecar container, thanks @rorph\n\n## Setup\n\n\ud83c\udf89 There are now instructions specific to each VPN provider with examples to help you get started as quickly as possible!\n\nGo to the [Wiki](https://github.com/qdm12/gluetun-wiki)!\n\nHere's a docker-compose.yml for the laziest:\n\n```yml\nversion: \"3\"\nservices:\n gluetun:\n image: qmcgaw/gluetun\n # container_name: gluetun\n # line above must be uncommented to allow external containers to connect. See https://github.com/qdm12/gluetun-wiki/blob/main/setup/connect-a-container-to-gluetun.md#external-container-to-gluetun\n cap_add:\n - NET_ADMIN\n devices:\n - /dev/net/tun:/dev/net/tun\n ports:\n - 8888:8888/tcp # HTTP proxy\n - 8388:8388/tcp # Shadowsocks\n - 8388:8388/udp # Shadowsocks\n volumes:\n - /yourpath:/gluetun\n environment:\n # See https://github.com/qdm12/gluetun-wiki\n - VPN_SERVICE_PROVIDER=ivpn\n - VPN_TYPE=openvpn\n # OpenVPN:\n - OPENVPN_USER=\n - OPENVPN_PASSWORD=\n # Wireguard:\n # - WIREGUARD_PRIVATE_KEY=wOEI9rqqbDwnN8/Bpp22sVz48T71vJ4fYmFWujulwUU=\n # - WIREGUARD_ADDRESSES=10.64.222.21/32\n # Timezone for accurate log times\n - TZ=\n # Server list updater. See https://github.com/qdm12/gluetun-wiki/blob/main/setup/options/updater.md\n - UPDATER_PERIOD=\n - UPDATER_VPN_SERVICE_PROVIDERS=\n```\n\n\ud83c\udd95 Image also available as `ghcr.io/qdm12/gluetun`\n\n## License\n\n[![MIT](https://img.shields.io/github/license/qdm12/gluetun)](https://github.com/qdm12/gluetun/master/LICENSE)", "WebUI": "http://[IP]:[PORT:8000]", "TemplateURL": "https://raw.githubusercontent.com/DiamondPrecisionComputing/unraid-templates/master/templates/GluetunVPN.xml", "Icon": "https://raw.githubusercontent.com/qdm12/gluetun/master/doc/logo_256.png", @@ -249045,7 +249045,7 @@ "@attributes": { "Name": "HEALTH_TARGET_ADDRESS", "Target": "HEALTH_TARGET_ADDRESS", - "Default": "github.com:443", + "Default": "cloudflare.com:443", "Mode": "", "Description": "OPTIONAL: Address used to check tunnel health", "Type": "Variable", @@ -249053,7 +249053,7 @@ "Required": "false", "Mask": "false" }, - "value": "github.com:443" + "value": "cloudflare.com:443" }, { "@attributes": { @@ -249125,48 +249125,6 @@ }, "value": "127.0.0.1/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,169.254.0.0/16,::1/128,fc00::/7,fe80::/10,::ffff:7f00:1/104,::ffff:a00:0/104,::ffff:a9fe:0/112,::ffff:ac10:0/108,::ffff:c0a8:0/112" }, - { - "@attributes": { - "Name": "DOT_VERBOSITY", - "Target": "DOT_VERBOSITY", - "Default": "0|1|2|3|4|5", - "Mode": "", - "Description": "OPTIONAL: Unbound verbosity level", - "Type": "Variable", - "Display": "always", - "Required": "false", - "Mask": "false" - }, - "value": "1" - }, - { - "@attributes": { - "Name": "DOT_VERBOSITY_DETAILS", - "Target": "DOT_VERBOSITY_DETAILS", - "Default": "0|1|2|3|4", - "Mode": "", - "Description": "OPTIONAL: Unbound details verbosity level", - "Type": "Variable", - "Display": "always", - "Required": "false", - "Mask": "false" - }, - "value": "0" - }, - { - "@attributes": { - "Name": "DOT_VALIDATION_LOGLEVEL", - "Target": "DOT_VALIDATION_LOGLEVEL", - "Default": "0|1|2", - "Mode": "", - "Description": "OPTIONAL: Unbound validation log level", - "Type": "Variable", - "Display": "always", - "Required": "false", - "Mask": "false" - }, - "value": "0" - }, { "@attributes": { "Name": "DOT_CACHING", diff --git a/repoInfo.json b/repoInfo.json index 8f204b026..b0e215e6b 100755 --- a/repoInfo.json +++ b/repoInfo.json @@ -92124,7 +92124,7 @@ "Base": null, "Downloads": null, "Stars": null, - "Time": 1724184414, + "Time": 1726783600, "trending": null, "trends": null, "downloadtrend": null,