Crates.io | caesura |
lib.rs | caesura |
version | |
source | src |
created_at | 2024-06-17 12:37:08.528013 |
updated_at | 2024-12-09 23:00:55.900526 |
description | An all-in-one command line tool to **transcode FLAC** audio files and **upload to gazelle** based indexers/trackers. |
homepage | |
repository | https://github.com/RogueOneEcho/caesura |
max_upload_size | |
id | 1274394 |
Cargo.toml error: | TOML parse error at line 32, column 1 | 32 | autolib = false | ^^^^^^^ unknown field `autolib`, expected one of `name`, `version`, `edition`, `authors`, `description`, `readme`, `license`, `repository`, `homepage`, `documentation`, `build`, `resolver`, `links`, `default-run`, `default_dash_run`, `rust-version`, `rust_dash_version`, `rust_version`, `license-file`, `license_dash_file`, `license_file`, `licenseFile`, `license_capital_file`, `forced-target`, `forced_dash_target`, `autobins`, `autotests`, `autoexamples`, `autobenches`, `publish`, `metadata`, `keywords`, `categories`, `exclude`, `include` |
size | 0 |
caesura 𝄓
A versatile command line tool for automated verifying and transcoding of all your torrents.
Most gazelle based indexers/trackers are supported
Tested on Linux, theoretically works on Windows.
Fully configurable, if there's something hard coded that you think should be configurable then open a discussion on GitHub.
Each source is verified to ensure:
The application will crunch through your torrent directory and automatically determine which are FLAC sources suitable for transcoding.
Docker is the recommended way to run the application across all platforms.
[!TIP] Configuration options and the commands they apply to are documented in COMMANDS.md
Install Docker Engine for your OS.
help
commandRun the help
command to see the available commands and options.
docker run ghcr.io/rogueoneecho/caesura --help
[!TIP] You can append
--help
to any command to see the available options.docker run ghcr.io/rogueoneecho/caesura verify --help
Create a config.yml
file with the following content:
announce_url
Your personal announce URL. Find it on upload page.api_key
Create an API key with Torrents
permission Settings > Access Settings > Create an API Key
Refer to COMMANDS.md for full documentation of options.
announce_url: https://flacsfor.me/YOUR_ANNOUNCE_KEY/announce
api_key: "YOUR_API_KEY"
You can then run the config
command to see how the full configuration including default values the application will use:
[!NOTE] Because the application is running in a Docker container, you need to mount the config file as a volume.
docker run -v ./config.yml:/config.yml ghcr.io/rogueoneecho/caesura config
[!TIP] The following fields are optional, if not set they're set based on the
announce_url
:
indexer
the id of the indexer:red
,pth
,ops
.indexer_url
the URL of the indexer:https://redacted.sh
,https://orpheus.network
.
Create a directory for the application to output files to:
mkdir ./output
Create a directory for the application to cache files to:
mkdir ./output
[!TIP] Refer to the directory structure section for documentation on the purpose and structure of these directories.
Run the verify
command with the source as an argument.
[!NOTE] Because the application is running in a Docker container, you need to mount the config file, content directory, output directory and cache directory.
[!TIP] For the source you can use a permalink, the numeric torrent id or a path to a torrent file:
Each step of this guide will use a different source to demonstrate, but feel free to use whichever suits you best.
docker run \
-v ./config.yml:/config.yml \
-v /path/to/your/content:/content \
-v ./output:/output \
-v ./cache:/cache \
ghcr.io/rogueoneecho/caesura \
verify https://redacted.ch/torrents.php?id=80518&torrentid=142659#torrent142659
If it looks good you can proceed to the next step, otherwise try another source.
Docker is great but specifying the volumes everytime is tedious and prone to error.
Using Docker Compose simplifies this by storing the configuration in a docker-compose.yml
file.
Create a docker-compose.yml
file with the following content:
services:
caesura:
container_name: caesura
image: ghcr.io/rogueoneecho/caesura
volumes:
- ./config.yml:/config.yml:ro
- /path/to/your/content:/content:ro
- ./output:/output
- ./cache:/cache
[!NOTE] The
:ro
suffix makes the volume read-only which is a good security practice.If you intend to use the
--copy-transcode-to-content-dir
option then you must remove the:ro
suffix from the content volume.If you intend to use the
--hard-link
option then thecontent
andoutput
paths must be inside the same volume and you will need to update theconfig.yml
accordingly.
Now run the verify command again but this time using Docker Compose:
docker compose run --rm caesura verify 142659
Run the spectrogram
command with the source as an argument.
docker compose run --rm caesura spectrogram 142659
Inspect the spectrograms in the output directory.
Run the transcode
command with the source as an argument.
docker compose run --rm caesura transcode "Khotin - Hello World [2014].torrent"
Inspect the transcodes in the output directory.
[!TIP] Things to check:
- Folder structure
- File names
- Tags
- Audio quality
- Image size and compression quality
[!WARNING] You are responsible for everything you upload.
Misuse of this application can result in the loss of your upload privileges.
Run the upload
command with the source as an argument.
[!TIP] Ideally you've already checked everything and nothing will go wrong but just in case there is a grace period after uploading in which you can remove the upload from your indexer.
[!TIP] If you're unsure about this then you can append
--dry-run
to the command and instead of uploading it will print the data that would be submitted.
docker compose run --rm caesura upload https://redacted.ch/torrents.php?id=80518&torrentid=142659#torrent142659
Go to your indexer and check your uploads to make sure everything has gone to plan.
[!WARNING] You are responsible for everything you upload.
Misuse of this application, especially the
batch
command, can result in the loss of your upload privileges or a ban.
Now that you have the hang of the application we can speed things up with the queue
and batch
commands.
The batch
command handles verify
, spectrogram
, transcode
and upload
in a single command.
Run the queue add
command to search through a directory of torrents and queue them for batch processing:
[!NOTE] The
batch
andqueue
commands use the cache directory to store progress helping speed up subsequent runs.Make sure the cache directory is in a mounted volume so it's not deleted between runs.
docker compose run --rm caesura queue add /path/to/your/torrents
Run the queue list
command to see what is next in the queue for the current indexer
:
docker compose run --rm caesura queue list
By default the batch
command will limit to processing just 3
transcodes and it won't create spectrograms or upload unless explicitly instructed. These safeguards are in place to prevent mistakenly uploading a bunch of sources that you haven't checked.
Run the command to batch verify and transcode the three sources in the queue:
docker compose run --rm caesura batch --transcode
[!TIP] Add the
--spectrogram
flag to generate spectrograms.
If everything goes to plan three sources should have transcoded to your output directory.
Use the queue summary
command to see the progress:
docker compose run --rm caesura queue summary
[!TIP] Refer to the analyzing the queue section to inspect the queue in greater detail.
Nothing was uploaded in the previous run of the batch
command giving you a chance to check the transcodes and spectrograms. Once you're satisfied run again but with the --upload
flag.
docker compose run --rm caesura batch --transcode --upload
Check the uploads on your indexer to make sure everything has gone to plan.
Now, we can set the batch command loose with the --no-limit
option to transcode (but not upload) every source in the directory:
docker compose run --rm caesura batch --transcode --no-limit
Once you've checked the transcodes you can start to upload them in batches. The --wait-before-upload 30s
option will add a 30 second wait interval between uploads to give you time to check everything looks good, and spread out the load on your indexer:
docker compose run --rm caesura batch --upload --limit 10 --wait-before-upload 30s
[!WARNING] In theory you can execute with both
--upload --no-limit
but that is probably a bad idea and a very fast way to lose your upload privileges.If you are going to do so then you should definitely use a long wait interval:
--upload --no-limit --wait-before-upload 2m
Check out the full documentation of configuration options in COMMANDS.md, in particular you may want to use --copy-transcode-to-content-dir
and --copy-torrent-to
to suit your preferred setup.
The application requires two writable directories.
The verify
command will download .torrent
files for each source to {CACHE}/torrents/{ID}.{INDEXER}.torrent
[!TIP] You can delete the cached
.torrent
files at any time. The application will just download them again if required.
The queue
and batch
commands will read and write the source statues to {CACHE}/queue/{FIRST_BYTE_OF_HASH}.yml
[!WARNING] In theory you can delete the
cache/queue
files as they can be re-created usingqueue add
however:
- subsequent
batch
will be slow as it will need to re-process everything from scratch making an unnecessary number of I/O and API callsqueue summary
will no longer include your uploads. Insteadverify
will just see them as all formats being transcoded already. > It's therefore recommended to leave these files alone.
[!TIP] The
cache/queue
can be checked into version control. It uses a flat file format so changes can easily be tracked, backed up, and even reverted usinggit
.
The spectrogram
command will generate spectrograms inside to
{OUTPUT}/{ARTIST} - {ALBUM} [{YEAR}] [{MEDIA} SPECTROGRAMS]/
[!TIP] Once you've reviewed the spectrograms you can freely delete each sectrograms directory (it can always be re-generated).
The transcode
command will transcode to
{OUTPUT}/{ARTIST} - {ALBUM} [{YEAR}] [{MEDIA} {FORMAT}]/
[!TIP] You can delete each transcode directory if you:
- Store the transcode elsewhere for seeding
- Don't intend to produce transcodes or cross seed to another indexer.
Then transcode
will create two .torrent
files:
{OUTPUT}/{ARTIST} - {ALBUM} [{YEAR}] [{MEDIA} {FORMAT}].{INDEXER}.torrent
{OUTPUT}/{ARTIST} - {ALBUM} [{YEAR}] [{MEDIA} {FORMAT}].torrent
[!TIP] You can delete the
.torrent
files if you:
- Have already uploaded to the indexer
- Don't intend to produce transcodes or cross seed to another indexer.
[!TIP] Configuration options and the commands they apply to are documented in COMMANDS.md
Configuration options are sourced first from the command line arguments, then from a configuration file.
By default the application loads config.yml
from the current working directory, but this can be overridden with the --config <CONFIG_PATH>
cli argument.
Most options have sensible defaults so the minimum required configuration is:
announce_url: https://flacsfor.me/YOUR_ANNOUNCE_KEY/announce
api_key: "YOUR_API_KEY"
This is based around the setup in this guide: how to set up Deluge via Proton VPN with port forwarding.
/srv/shared
is a shared between multiple containers, by mounting as a single volume hard linking is possible./srv/deluge/state
is the Deluge state directory, containing all .torrent
files loaded in Deluge./srv/shared/deluge
is the Deluge download directory, containing all the content.config.yml
source: /srv/deluge/state,
in config.yml
means the source can be ommitted from the command.announce_url: https://flacsfor.me/YOUR_ANNOUNCE_KEY/announce
api_key: YOUR_API_KEY
cache: /srv/shared/caesura/cache.json
content: /srv/shared/deluge
limit: 5
output: /srv/shared/caesura
source: /srv/deluge/state
verbosity: debug
docker-compose.yml
user: "1000:1001"
ensures files have the same ownership as the host user (use the id
command to find your user and group id)./srv/shared
has write permissions, the other directories are read-only.command: batch
runs the batch command by default./
is the working directory of the container so mounting the config to /config.yml
means it's read by default.services:
caesura:
container_name: caesura
image: ghcr.io/rogueoneecho/caesura
user: "1000:1001"
volumes:
- /srv/caesura/config.yml:/config.yml:ro
- /srv/deluge/state:/srv/deluge/state:ro
- /srv/shared:/srv/shared
The cache/queue
uses a YAML file format that can be analyzed with yq
.
Filter` to see what has been transcoded:
cat ./cache/queue/*.yml | yq 'map(select(.transcode != null))'
Or to see what has been skipped and why:
cat ./cache/queue/*.yml | yq 'map(select(.verify.verified == false))'
If you're working with a lot of files then less
can be helpful:
cat ./cache/queue/*.yml | yq --colors 'map(select(.verify.verified == false)) | less -R
If you encounter any issues:
The logging verbosity can be adjusted with the --verbosity <LOG-LEVEL>
option. The available log levels are:
warn
only showing warnings and errorsinfo
will give an overview of what's happeningdebug
provides insight into each steptrace
is detailed logging to see exactly what's happeningYou might be surprised how often just copying and pasting the command and error message into ChatGPT can provide an instant solution.
Re-read the getting started guide
If it's an idea or request for a new feature search for an existing or create a new idea discussion
If it's a bug report search for an existing or create a new issue
[!TIP] If you manage to resolve your issue it's always worth creating a new discussion anyway because it might help someone else in the future, or identify an area where the documentation could be improved.
The build process is documented in BUILD.md
Releases and a full changelog are available via GitHub Releases.
Release versions follow the Semantic Versioning 2.0.0 specification.
Commit messages follow the Conventional commit specification.
DevYukine completed the initial work and released it as red_oxide under an MIT license.
RogueOneEcho forked the project to complete a major refactor, fix some issues, add new features and improve logging and error handling. The fork is released as caesura under an AGPL license.
The main difference between the former MIT license and the present AGPL license is that if you intend to distribute a modified version of the code - even to run it on a server - you must also provide the modified source code under an AGPL license.
This is often known as copyleft. The intent is to ensure that anyone taking advantage of this open source work are also contributing back to the open source community.
The code base has now adopted object oriented patterns with SOLID principles and dependency injection.
See also the list of contributors who participated in this project.