From 591a1fbf5d157a656fdc17aec26fdc17f47218a3 Mon Sep 17 00:00:00 2001 From: Mike Phares Date: Sat, 9 Nov 2024 12:37:33 -0700 Subject: [PATCH] 2024-11-09 --- etc/hosts | 2 +- .../archive/phares3757.ddns.net/cert3.pem | 28 ++++++ .../archive/phares3757.ddns.net/chain3.pem | 26 ++++++ .../phares3757.ddns.net/fullchain3.pem | 54 +++++++++++ .../archive/phares3757.ddns.net/privkey3.pem | 5 ++ etc/netplan/50-cloud-init.yaml | 2 +- etc/nginx/sites-available/default | 90 +++++++++---------- .../snap.adguard-home.adguard-home.service | 6 +- etc/systemd/system/snap.certbot.renew.service | 6 +- etc/systemd/system/snap.certbot.renew.timer | 8 +- .../systemd/immich-server.container | 6 +- ...ernal.volume => mattermost-db-data.volume} | 0 .../systemd/mattermost-db.container | 33 +++++++ .../systemd/mattermost-server-bleve.volume | 1 + .../mattermost-server-client-plugins.volume | 1 + .../systemd/mattermost-server-config.volume | 1 + .../systemd/mattermost-server-data.volume | 1 + .../systemd/mattermost-server-logs.volume | 1 + .../systemd/mattermost-server-plugins.volume | 1 + .../systemd/mattermost-server.container | 52 +++++++++++ .../containers/systemd/neko-server.container | 42 +++++++++ .../systemd/uptime-kuma-server-data.volume | 1 + .../systemd/uptime-kuma-server.container | 35 ++++++++ 23 files changed, 339 insertions(+), 63 deletions(-) create mode 100644 etc/letsencrypt/archive/phares3757.ddns.net/cert3.pem create mode 100644 etc/letsencrypt/archive/phares3757.ddns.net/chain3.pem create mode 100644 etc/letsencrypt/archive/phares3757.ddns.net/fullchain3.pem create mode 100644 etc/letsencrypt/archive/phares3757.ddns.net/privkey3.pem rename home/podman/.config/containers/systemd/{immich-server-external.volume => mattermost-db-data.volume} (100%) create mode 100644 home/podman/.config/containers/systemd/mattermost-db.container create mode 100644 home/podman/.config/containers/systemd/mattermost-server-bleve.volume create mode 100644 home/podman/.config/containers/systemd/mattermost-server-client-plugins.volume create mode 100644 home/podman/.config/containers/systemd/mattermost-server-config.volume create mode 100644 home/podman/.config/containers/systemd/mattermost-server-data.volume create mode 100644 home/podman/.config/containers/systemd/mattermost-server-logs.volume create mode 100644 home/podman/.config/containers/systemd/mattermost-server-plugins.volume create mode 100644 home/podman/.config/containers/systemd/mattermost-server.container create mode 100644 home/podman/.config/containers/systemd/neko-server.container create mode 100644 home/podman/.config/containers/systemd/uptime-kuma-server-data.volume create mode 100644 home/podman/.config/containers/systemd/uptime-kuma-server.container diff --git a/etc/hosts b/etc/hosts index 486975f..4c12078 100644 --- a/etc/hosts +++ b/etc/hosts @@ -1,5 +1,5 @@ 127.0.0.1 localhost -127.0.1.1 beelink +127.0.1.1 trigkey # The following lines are desirable for IPv6 capable hosts ::1 ip6-localhost ip6-loopback diff --git a/etc/letsencrypt/archive/phares3757.ddns.net/cert3.pem b/etc/letsencrypt/archive/phares3757.ddns.net/cert3.pem new file mode 100644 index 0000000..341ac69 --- /dev/null +++ b/etc/letsencrypt/archive/phares3757.ddns.net/cert3.pem @@ -0,0 +1,28 @@ +-----BEGIN CERTIFICATE----- +MIIEvzCCBEWgAwIBAgISBI/TW6uuBCr2K8pVMOvUKwXMMAoGCCqGSM49BAMDMDIx +CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF +NTAeFw0yNDEwMjcwMDUxNDFaFw0yNTAxMjUwMDUxNDBaMB4xHDAaBgNVBAMTE3Bo +YXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATx31ZU +Cb0Um0CB5L92TDKpscWoiT3hxDeUIBbYZufML/ODIwlMIJpeBABcPUuMWLKH+t5d +lGtIZFZ8a9Y6s+QJo4IDTTCCA0kwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQG +CCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTPAmOa +X0Q1jVn8hWataTC7SyVf3DAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37SssxMZwi9LX +DTBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5vLmxlbmNy +Lm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzCCAVIGA1Ud +EQSCAUkwggFFgg9hZmZpcm0uZGRucy5uZXSCF2NoYXQucGhhcmVzLmR1Y2tkbnMu +b3Jnghhkcml2ZS5waGFyZXMuZHVja2Rucy5vcmeCGGdpdGVhLnBoYXJlcy5kdWNr +ZG5zLm9yZ4IVaGEucGhhcmVzLmR1Y2tkbnMub3JnghlpbW1pY2gucGhhcmVzLmR1 +Y2tkbnMub3JnghhtdXNpYy5waGFyZXMuZHVja2Rucy5vcmeCEnBoYXJlcy5kdWNr +ZG5zLm9yZ4ITcGhhcmVzMzc1Ny5kZG5zLm5ldIIZcGhvdG9zLnBoYXJlcy5kdWNr +ZG5zLm9yZ4IZcXVhcnR6LnBoYXJlcy5kdWNrZG5zLm9yZ4IadHJhY2Nhci5waGFy +ZXMuZHVja2Rucy5vcmeCHnZhdWx0d2FyZGVuLnBoYXJlcy5kdWNrZG5zLm9yZzAT +BgNVHSAEDDAKMAgGBmeBDAECATCCAQYGCisGAQQB1nkCBAIEgfcEgfQA8gB3AKLj +CuRF772tm3447Udnd1PXgluElNcrXhssxLlQpEfnAAABksuqp2cAAAQDAEgwRgIh +ANhuwhhf/+vV2qEy+R9tMNHLnnvfBLjiAxg2AP4DDMsjAiEA/KPYYzSJ0JFO/TNv +gZ+sK9w63SldtCQnH0lQ9NkV/sQAdwDgkrP8DB3I52g2H95huZZNClJ4GYpy1nLE +sE2lbW9UBAAAAZLLqqdzAAAEAwBIMEYCIQDjpfPfuYeD/k2JqQcPM1hAeLNbFUq6 +vWeoAYqUi9bLqwIhAPZbo0y/asr4bdqlKtRsaLwpaG0w+6NKTpFmo6Rk3XbRMAoG +CCqGSM49BAMDA2gAMGUCMQCwA9rnTaaNJ3Eqx2L7LSW+vVyK0kiaTp0poN82V5fr +GGXZNdyPrHeLAA0OiGnMQHwCMFfCxgJJ7JFllCHIHnjjRFk7pV3DJ7a9N8W6nFxg +Wik/YdTKMn5yCbKTyv6gYmLgjA== +-----END CERTIFICATE----- diff --git a/etc/letsencrypt/archive/phares3757.ddns.net/chain3.pem b/etc/letsencrypt/archive/phares3757.ddns.net/chain3.pem new file mode 100644 index 0000000..e5b24bc --- /dev/null +++ b/etc/letsencrypt/archive/phares3757.ddns.net/chain3.pem @@ -0,0 +1,26 @@ +-----BEGIN CERTIFICATE----- +MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw +WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg +RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK +a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO +VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw +gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD +ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw +i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB +AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g +BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu +Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C +2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+ +bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG +6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV +XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO +koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq +cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI +E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e +K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX +GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL +sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd +VQD9F6Na/+zmXCc= +-----END CERTIFICATE----- diff --git a/etc/letsencrypt/archive/phares3757.ddns.net/fullchain3.pem b/etc/letsencrypt/archive/phares3757.ddns.net/fullchain3.pem new file mode 100644 index 0000000..901a775 --- /dev/null +++ b/etc/letsencrypt/archive/phares3757.ddns.net/fullchain3.pem @@ -0,0 +1,54 @@ +-----BEGIN CERTIFICATE----- +MIIEvzCCBEWgAwIBAgISBI/TW6uuBCr2K8pVMOvUKwXMMAoGCCqGSM49BAMDMDIx +CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF +NTAeFw0yNDEwMjcwMDUxNDFaFw0yNTAxMjUwMDUxNDBaMB4xHDAaBgNVBAMTE3Bo +YXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATx31ZU +Cb0Um0CB5L92TDKpscWoiT3hxDeUIBbYZufML/ODIwlMIJpeBABcPUuMWLKH+t5d +lGtIZFZ8a9Y6s+QJo4IDTTCCA0kwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQG +CCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTPAmOa +X0Q1jVn8hWataTC7SyVf3DAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37SssxMZwi9LX +DTBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5vLmxlbmNy +Lm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzCCAVIGA1Ud +EQSCAUkwggFFgg9hZmZpcm0uZGRucy5uZXSCF2NoYXQucGhhcmVzLmR1Y2tkbnMu +b3Jnghhkcml2ZS5waGFyZXMuZHVja2Rucy5vcmeCGGdpdGVhLnBoYXJlcy5kdWNr +ZG5zLm9yZ4IVaGEucGhhcmVzLmR1Y2tkbnMub3JnghlpbW1pY2gucGhhcmVzLmR1 +Y2tkbnMub3JnghhtdXNpYy5waGFyZXMuZHVja2Rucy5vcmeCEnBoYXJlcy5kdWNr +ZG5zLm9yZ4ITcGhhcmVzMzc1Ny5kZG5zLm5ldIIZcGhvdG9zLnBoYXJlcy5kdWNr +ZG5zLm9yZ4IZcXVhcnR6LnBoYXJlcy5kdWNrZG5zLm9yZ4IadHJhY2Nhci5waGFy +ZXMuZHVja2Rucy5vcmeCHnZhdWx0d2FyZGVuLnBoYXJlcy5kdWNrZG5zLm9yZzAT +BgNVHSAEDDAKMAgGBmeBDAECATCCAQYGCisGAQQB1nkCBAIEgfcEgfQA8gB3AKLj +CuRF772tm3447Udnd1PXgluElNcrXhssxLlQpEfnAAABksuqp2cAAAQDAEgwRgIh +ANhuwhhf/+vV2qEy+R9tMNHLnnvfBLjiAxg2AP4DDMsjAiEA/KPYYzSJ0JFO/TNv +gZ+sK9w63SldtCQnH0lQ9NkV/sQAdwDgkrP8DB3I52g2H95huZZNClJ4GYpy1nLE +sE2lbW9UBAAAAZLLqqdzAAAEAwBIMEYCIQDjpfPfuYeD/k2JqQcPM1hAeLNbFUq6 +vWeoAYqUi9bLqwIhAPZbo0y/asr4bdqlKtRsaLwpaG0w+6NKTpFmo6Rk3XbRMAoG +CCqGSM49BAMDA2gAMGUCMQCwA9rnTaaNJ3Eqx2L7LSW+vVyK0kiaTp0poN82V5fr +GGXZNdyPrHeLAA0OiGnMQHwCMFfCxgJJ7JFllCHIHnjjRFk7pV3DJ7a9N8W6nFxg +Wik/YdTKMn5yCbKTyv6gYmLgjA== +-----END CERTIFICATE----- +-----BEGIN CERTIFICATE----- +MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw +WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg +RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK +a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO +VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw +gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD +ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw +i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB +AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g +BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu +Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C +2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+ +bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG +6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV +XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO +koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq +cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI +E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e +K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX +GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL +sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd +VQD9F6Na/+zmXCc= +-----END CERTIFICATE----- diff --git a/etc/letsencrypt/archive/phares3757.ddns.net/privkey3.pem b/etc/letsencrypt/archive/phares3757.ddns.net/privkey3.pem new file mode 100644 index 0000000..00f4e41 --- /dev/null +++ b/etc/letsencrypt/archive/phares3757.ddns.net/privkey3.pem @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgr4csftLu03keRaK4 +OR+nS9nOaog7Ak6NbSRkXg72RRKhRANCAATx31ZUCb0Um0CB5L92TDKpscWoiT3h +xDeUIBbYZufML/ODIwlMIJpeBABcPUuMWLKH+t5dlGtIZFZ8a9Y6s+QJ +-----END PRIVATE KEY----- diff --git a/etc/netplan/50-cloud-init.yaml b/etc/netplan/50-cloud-init.yaml index c65fbdb..6d2b484 100644 --- a/etc/netplan/50-cloud-init.yaml +++ b/etc/netplan/50-cloud-init.yaml @@ -5,7 +5,7 @@ # network: {config: disabled} network: ethernets: - enp2s0: + enp1s0: dhcp4: true version: 2 wifis: {} diff --git a/etc/nginx/sites-available/default b/etc/nginx/sites-available/default index 39795f5..84d9a23 100644 --- a/etc/nginx/sites-available/default +++ b/etc/nginx/sites-available/default @@ -1,54 +1,46 @@ -server { - listen 8080 default_server; - root /var/www/html; - index index.html index.htm index.nginx-debian.html; - server_name _; - location / { - try_files $uri $uri/ =404; - } -} -include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckddns.org # http://localhost:3002/; -include /etc/nginx/include/affirm.conf; # https://affirm.phares.duckddns.org # http://localhost:8069/; -# include /etc/nginx/include/ansible.conf; # https://ansible.phares.duckddns.org # https://192.168.12.15/; -# include /etc/nginx/include/assistant.conf; # https://assistant.phares.duckddns.org # http://192.168.12.17:5001/; -include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckddns.org # http://localhost:8001/; +# include /etc/nginx/include/ansible.conf; # https://ansible.phares.duckddns.org # https://192.168.11.2/; +# include /etc/nginx/include/assistant.conf; # https://assistant.phares.duckddns.org # http://192.168.11.2:5001/; # include /etc/nginx/include/casa.conf; # https://casa.phares.duckddns.org # http://10.131.57.60/; -include /etc/nginx/include/chat.conf; # https://chat.phares.duckddns.org # https://192.168.11.6:5001/; -include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckddns.org # http://localhost:9090/; -# include /etc/nginx/include/codeserver.conf; # https://codeserver.phares.duckddns.org # http://localhost:5007/; -include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckddns.org # http://localhost:9400/; -include /etc/nginx/include/diskstation.conf; # https://diskstation.phares.duckddns.org # https://192.168.11.6:5001/; -# include /etc/nginx/include/dockge.conf; # https://dockge.phares.duckddns.org # http://localhost:5001/; -# include /etc/nginx/include/docmost.conf; # https://docmost.phares.duckddns.org # http://localhost:5006/; -include /etc/nginx/include/drive.conf; # https://drive.phares.duckddns.org # https://192.168.11.6:5001/; +# include /etc/nginx/include/chat.conf; # https://chat.phares.duckddns.org # https://192.168.0.31:5001/; +# include /etc/nginx/include/codeserver.conf; # https://codeserver.phares.duckddns.org # http://192.168.11.2:5007/; +# include /etc/nginx/include/diskstation.conf; # https://diskstation.phares.duckddns.org # https://192.168.0.31:5001/; +# include /etc/nginx/include/dockge.conf; # https://dockge.phares.duckddns.org # http://192.168.11.2:5001/; +# include /etc/nginx/include/docmost.conf; # https://docmost.phares.duckddns.org # http://192.168.11.2:5006/; +# include /etc/nginx/include/drive.conf; # https://drive.phares.duckddns.org # https://192.168.0.31:5001/; # include /etc/nginx/include/emby.conf; # https://emby.phares.duckddns.org # http://10.131.57.134:8096/; -# include /etc/nginx/include/filebrowser.conf; # https://filebrowser.phares.duckddns.org # http://localhost:8080/; -include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckddns.org # http://localhost:3000/; -# include /etc/nginx/include/gogs.conf; # https://gogs.phares.duckddns.org # http://localhost:3000/; -include /etc/nginx/include/ha.conf; # https://ha.phares.duckddns.org # http://192.168.0.41:8123/; -# include /etc/nginx/include/haos.conf; # https://haos.phares.duckddns.org # http://192.168.0.41:8123/; -include /etc/nginx/include/immich.conf; # https://immich.phares.duckddns.org # http://localhost:3001/; -# include /etc/nginx/include/incus.conf; # https://incus.phares.duckddns.org # http://localhost:5004/; -# include /etc/nginx/include/invoice.conf; # https://invoice.phares.duckddns.org # https://192.168.12.14/; -# include /etc/nginx/include/kestra.conf; # https://kestra.phares.duckddns.org # http://localhost:5002/; -# include /etc/nginx/include/lxconsole.conf; # https://lxconsole.phares.duckddns.org # http://localhost:5004/; -include /etc/nginx/include/music.conf; # https://music.phares.duckddns.org # -# include /etc/nginx/include/nextcloud.conf; # https://nextcloud.phares.duckddns.org # http://localhost:8081/; +# include /etc/nginx/include/filebrowser.conf; # https://filebrowser.phares.duckddns.org # http://192.168.11.2:8080/; +# include /etc/nginx/include/gogs.conf; # https://gogs.phares.duckddns.org # http://192.168.11.2:3000/; +# include /etc/nginx/include/incus.conf; # https://incus.phares.duckddns.org # http://192.168.11.2:5004/; +# include /etc/nginx/include/invoice.conf; # https://invoice.phares.duckddns.org # https://192.168.11.2/; +# include /etc/nginx/include/kestra.conf; # https://kestra.phares.duckddns.org # http://192.168.11.2:5002/; +# include /etc/nginx/include/lxconsole.conf; # https://lxconsole.phares.duckddns.org # http://192.168.11.2:5004/; +# include /etc/nginx/include/nextcloud.conf; # https://nextcloud.phares.duckddns.org # http://192.168.11.2:8081/; # include /etc/nginx/include/owncast.conf; # https://owncast.phares.duckddns.org # http://10.131.57.141:8080/; -include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckddns.org # http://localhost:5007/; -include /etc/nginx/include/phares.conf; # https://phares.phares.duckddns.org # -# include /etc/nginx/include/photoprism.conf; # https://photoprism.phares.duckddns.org # http://192.168.12.11:2342/; -include /etc/nginx/include/photos.conf; # https://photos.phares.duckddns.org # https://192.168.11.6:5001/; -# include /etc/nginx/include/pihole.conf; # https://pihole.phares.duckddns.org # http://localhost:8005/admin/; -# include /etc/nginx/include/proxmox.conf; # https://proxmox.phares.duckddns.org # https://localhost:8006/; -include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckddns.org # http://localhost:8069/; -# include /etc/nginx/include/readeck.conf; # https://readeck.phares.duckddns.org # http://192.168.12.19:8000/; -# include /etc/nginx/include/syncthing.conf; # https://syncthing.phares.duckddns.org # https://localhost:8443/; -# include /etc/nginx/include/terraform.conf; # https://terraform.phares.duckddns.org # http://localhost:5001/; -include /etc/nginx/include/traccar.conf; # https://traccar.phares.duckddns.org # http://localhost:3000/; +# include /etc/nginx/include/photoprism.conf; # https://photoprism.phares.duckddns.org # http://192.168.11.2:2342/; +# include /etc/nginx/include/photos.conf; # https://photos.phares.duckddns.org # https://192.168.0.31:5001/; +# include /etc/nginx/include/pihole.conf; # https://pihole.phares.duckddns.org # http://192.168.11.2:8005/admin/; +# include /etc/nginx/include/proxmox.conf; # https://proxmox.phares.duckddns.org # https://192.168.11.2:8006/; +# include /etc/nginx/include/readeck.conf; # https://readeck.phares.duckddns.org # http://192.168.11.2:8000/; +# include /etc/nginx/include/terraform.conf; # https://terraform.phares.duckddns.org # http://192.168.11.2:5001/; +# include /etc/nginx/include/traccar.conf; # https://traccar.phares.duckddns.org # http://192.168.11.2:3000/; # include /etc/nginx/include/umbrel.conf; # https://umbrel.phares.duckddns.org # http://192.168.11.20/; -# include /etc/nginx/include/uptimekuma.conf; # https://uptimekuma.phares.duckddns.org # http://192.168.12.10:3001/; -include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckddns.org # http://localhost:5008/; # include /etc/nginx/include/vscodium.conf; # https://vscodium.phares.duckddns.org # http://10.131.57.190:3000/; -# include /etc/nginx/include/wekan.conf; # https://wekan.phares.duckddns.org # http://localhost:5003/; -include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckddns.org # http://localhost:8000/; \ No newline at end of file +# include /etc/nginx/include/wekan.conf; # https://wekan.phares.duckddns.org # http://192.168.11.2:5003/; +include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckddns.org # http://192.168.11.2:3002/; +include /etc/nginx/include/affirm.conf; # https://affirm.phares.duckddns.org # http://192.168.11.2:8069/; +include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckddns.org # http://192.168.11.2:8001/; +include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckddns.org # http://192.168.11.2:9090/; +include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckddns.org # http://192.168.11.2:9400/; +include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckddns.org # http://192.168.11.2:3000/; +include /etc/nginx/include/immich.conf; # https://immich.phares.duckddns.org # http://192.168.11.2:2283/; +include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckddns.org # http://192.168.11.2:8065/; +include /etc/nginx/include/music.conf; # https://music.phares.duckddns.org # http://192.168.11.2/; +include /etc/nginx/include/neko.conf; # https://neko.phares.duckddns.org # http://192.168.11.2:8082/; +include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckddns.org # http://192.168.11.2:5007/; +include /etc/nginx/include/phares.conf; # https://phares.phares.duckddns.org # http://192.168.11.2/; +include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckddns.org # http://192.168.11.2/; +include /etc/nginx/include/router.conf; # https://router.phares.duckddns.org # https://192.168.11.1/; +include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckddns.org # http://192.168.11.2:8080/; +include /etc/nginx/include/uptimekuma.conf; # https://uptimekuma.phares.duckddns.org # http://192.168.11.2:3004/; +include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckddns.org # http://192.168.11.2:5008/; +include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckddns.org # http://192.168.11.2:8000/; \ No newline at end of file diff --git a/etc/systemd/system/snap.adguard-home.adguard-home.service b/etc/systemd/system/snap.adguard-home.adguard-home.service index 405e84c..a9d82c1 100644 --- a/etc/systemd/system/snap.adguard-home.adguard-home.service +++ b/etc/systemd/system/snap.adguard-home.adguard-home.service @@ -1,9 +1,9 @@ [Unit] # Auto-generated, DO NOT EDIT Description=Service for snap application adguard-home.adguard-home -Requires=snap-adguard\x2dhome-7366.mount +Requires=snap-adguard\x2dhome-7470.mount Wants=network.target -After=snap-adguard\x2dhome-7366.mount network.target snapd.apparmor.service +After=snap-adguard\x2dhome-7470.mount network.target snapd.apparmor.service X-Snappy=yes [Service] @@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment ExecStart=/usr/bin/snap run adguard-home SyslogIdentifier=adguard-home.adguard-home Restart=always -WorkingDirectory=/var/snap/adguard-home/7366 +WorkingDirectory=/var/snap/adguard-home/7470 TimeoutStopSec=30 Type=simple diff --git a/etc/systemd/system/snap.certbot.renew.service b/etc/systemd/system/snap.certbot.renew.service index a988190..b00c025 100644 --- a/etc/systemd/system/snap.certbot.renew.service +++ b/etc/systemd/system/snap.certbot.renew.service @@ -1,9 +1,9 @@ [Unit] # Auto-generated, DO NOT EDIT Description=Service for snap application certbot.renew -Requires=snap-certbot-3834.mount +Requires=snap-certbot-4182.mount Wants=network.target -After=snap-certbot-3834.mount network.target snapd.apparmor.service +After=snap-certbot-4182.mount network.target snapd.apparmor.service X-Snappy=yes [Service] @@ -11,6 +11,6 @@ EnvironmentFile=-/etc/environment ExecStart=/usr/bin/snap run --timer="00:00~24:00/2" certbot.renew SyslogIdentifier=certbot.renew Restart=no -WorkingDirectory=/var/snap/certbot/3834 +WorkingDirectory=/var/snap/certbot/4182 TimeoutStopSec=30 Type=oneshot diff --git a/etc/systemd/system/snap.certbot.renew.timer b/etc/systemd/system/snap.certbot.renew.timer index 7edaa29..8531402 100644 --- a/etc/systemd/system/snap.certbot.renew.timer +++ b/etc/systemd/system/snap.certbot.renew.timer @@ -1,14 +1,14 @@ [Unit] # Auto-generated, DO NOT EDIT Description=Timer renew for snap application certbot.renew -Requires=snap-certbot-3834.mount -After=snap-certbot-3834.mount +Requires=snap-certbot-4182.mount +After=snap-certbot-4182.mount X-Snappy=yes [Timer] Unit=snap.certbot.renew.service -OnCalendar=*-*-* 07:46 -OnCalendar=*-*-* 19:29 +OnCalendar=*-*-* 06:44 +OnCalendar=*-*-* 22:31 [Install] WantedBy=timers.target diff --git a/home/podman/.config/containers/systemd/immich-server.container b/home/podman/.config/containers/systemd/immich-server.container index 1f889b3..cc04712 100644 --- a/home/podman/.config/containers/systemd/immich-server.container +++ b/home/podman/.config/containers/systemd/immich-server.container @@ -9,10 +9,12 @@ Environment="REDIS_HOSTNAME=192.168.11.2" Image=ghcr.io/immich-app/immich-server:release # Network=immich.network # Pod=immich.pod -PublishPort=3001:3001 +PublishPort=3001:2283 Volume=/etc/localtime:/etc/localtime:ro Volume=immich-server-upload.volume:/usr/src/app/upload:Z -Volume=immich-server-external.volume:/usr/src/app/external:Z +# Volume=immich-server-external.volume:/usr/src/app/external:Z +Volume=/mnt/free-file-sync/still:/usr/src/app/external/still:Z +Volume=/mnt/free-file-sync/moving:/usr/src/app/external/moving:Z [Service] Restart=no diff --git a/home/podman/.config/containers/systemd/immich-server-external.volume b/home/podman/.config/containers/systemd/mattermost-db-data.volume similarity index 100% rename from home/podman/.config/containers/systemd/immich-server-external.volume rename to home/podman/.config/containers/systemd/mattermost-db-data.volume diff --git a/home/podman/.config/containers/systemd/mattermost-db.container b/home/podman/.config/containers/systemd/mattermost-db.container new file mode 100644 index 0000000..11ea842 --- /dev/null +++ b/home/podman/.config/containers/systemd/mattermost-db.container @@ -0,0 +1,33 @@ +[Container] +AutoUpdate=registry +ContainerName=mattermost-db +Environment="POSTGRES_DB=mattermost" +Environment="POSTGRES_INITDB_ARGS=--data-checksums" +Environment="POSTGRES_PASSWORD=mmuser_password" +Environment="POSTGRES_USER=mmuser" +Image=docker.io/postgres:13-alpine +# Network=immich.network +# Pod=immich.pod +PublishPort=5436:5432 +Volume=mattermost-db-data.volume:/var/lib/postgresql/data + +[Service] +Restart=no + +[Install] +WantedBy=multi-user.target default.target + +# podman pull docker.io/postgres:13-alpine +# systemctl --user daemon-reload +# systemctl --user start mattermost-db +# systemctl --user status mattermost-db +# journalctl -fu mattermost-db.service +# podman logs mattermost-db +# systemctl --user stop mattermost-db +# systemctl --user disable mattermost-db +# podman exec -ti mattermost-db /bin/sh +# podman exec -ti mattermost-db /bin/bash +# Image=docker.io/library/postgres:16 +# podman pull docker.io/library/postgres:16 +# file: 'extension.c', line: '543', routine: 'parse_extension_control_file' +# https://github.com/immich-app/immich/discussions/6792 \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/mattermost-server-bleve.volume b/home/podman/.config/containers/systemd/mattermost-server-bleve.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/mattermost-server-bleve.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/mattermost-server-client-plugins.volume b/home/podman/.config/containers/systemd/mattermost-server-client-plugins.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/mattermost-server-client-plugins.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/mattermost-server-config.volume b/home/podman/.config/containers/systemd/mattermost-server-config.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/mattermost-server-config.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/mattermost-server-data.volume b/home/podman/.config/containers/systemd/mattermost-server-data.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/mattermost-server-data.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/mattermost-server-logs.volume b/home/podman/.config/containers/systemd/mattermost-server-logs.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/mattermost-server-logs.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/mattermost-server-plugins.volume b/home/podman/.config/containers/systemd/mattermost-server-plugins.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/mattermost-server-plugins.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/mattermost-server.container b/home/podman/.config/containers/systemd/mattermost-server.container new file mode 100644 index 0000000..4733ef4 --- /dev/null +++ b/home/podman/.config/containers/systemd/mattermost-server.container @@ -0,0 +1,52 @@ +[Container] +AutoUpdate=registry +ContainerName=mattermost-server +Environment="DOMAIN=mattermost.phares.duckdns.org" +Environment="MM_BLEVESETTINGS_INDEXDIR=/mattermost/bleve-indexes" +Environment="MM_SERVICESETTINGS_SITEURL=https://mattermost.phares.duckdns.org" +Environment="MM_SQLSETTINGS_DATASOURCE=postgres://mmuser:mmuser_password@192.168.11.2:5436/mattermost?sslmode=disable&connect_timeout=10" +Environment="MM_SQLSETTINGS_DRIVERNAME=postgres" +Environment="TZ=US/Arizona" +Image=docker.io/mattermost/mattermost-team-edition:9.11.2 +# Network=mattermost.network +# Pod=mattermost.pod +PublishPort=8065:8065 +PublishPort=8443:8443 +Volume=/etc/localtime:/etc/localtime:ro +Volume=/etc/timezone:/etc/timezone:ro +Volume=mattermost-server-bleve.volume:/mattermost/bleve-indexes:rw +Volume=mattermost-server-client-plugins.volume:/mattermost/client/plugins:rw +Volume=mattermost-server-config.volume:/mattermost/config:rw +Volume=mattermost-server-data.volume:/mattermost/data:rw +Volume=mattermost-server-logs.volume:/mattermost/logs:rw +Volume=mattermost-server-plugins.volume:/mattermost/plugins:rw + +[Service] +Restart=no + +[Unit] +Requires=mattermost-db.service + +[Install] +WantedBy=multi-user.target default.target + +# chown -R podman:podman /home/podman/.config/containers/systemd +# /usr/libexec/podman/quadlet -dryrun --user +# /usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output +# find / -name "mattermost-server.service" 2>/dev/null +# /home/podman/quadlet/mattermost-server.service +# /home/podman/quadlet/default.target.wants/mattermost-server.service +# /home/podman/quadlet/multi-user.target.wants/mattermost-server.service +# /run/user/1002/systemd/generator/multi-user.target.wants/mattermost-server.service +# /run/user/1002/systemd/generator/default.target.wants/mattermost-server.service +# /run/user/1002/systemd/generator/mattermost-server.service +# podman pull docker.io/mattermost/mattermost-team-edition:9.11.2 +# systemctl --user daemon-reload +# systemctl --user start mattermost-server +# systemctl --user status mattermost-server +# journalctl -fu mattermost-server.service +# podman logs mattermost-server +# systemctl --user stop mattermost-server +# systemctl --user disable mattermost-server +# podman exec -ti mattermost-server /bin/sh +# podman exec -ti mattermost-server /bin/bash diff --git a/home/podman/.config/containers/systemd/neko-server.container b/home/podman/.config/containers/systemd/neko-server.container new file mode 100644 index 0000000..fcaf3a2 --- /dev/null +++ b/home/podman/.config/containers/systemd/neko-server.container @@ -0,0 +1,42 @@ +[Container] +AutoUpdate=registry +ContainerName=neko-server +Environment="NEKO_SCREEN=1920x1080@30" +Environment="NEKO_PASSWORD=neko" +Environment="NEKO_PASSWORD_ADMIN=admin" +Environment="NEKO_EPR=52000-52100" +Environment="NEKO_NAT1TO1=192.168.11.2" +Image=docker.io/m1k1o/neko:firefox +# Network=neko.network +# Pod=neko.pod +PublishPort=8082:8080/tcp +PublishPort=52000-52100:52000-52100/udp +Volume=/etc/localtime:/etc/localtime:ro +Volume=/etc/timezone:/etc/timezone:ro + +[Service] +Restart=no + +[Install] +WantedBy=multi-user.target default.target + +# chown -R podman:podman /home/podman/.config/containers/systemd +# /usr/libexec/podman/quadlet -dryrun --user +# /usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output +# find / -name "neko-server.service" 2>/dev/null +# /home/podman/quadlet/neko-server.service +# /home/podman/quadlet/default.target.wants/neko-server.service +# /home/podman/quadlet/multi-user.target.wants/neko-server.service +# /run/user/1002/systemd/generator/multi-user.target.wants/neko-server.service +# /run/user/1002/systemd/generator/default.target.wants/neko-server.service +# /run/user/1002/systemd/generator/neko-server.service +# podman pull docker.io/m1k1o/neko:firefox +# systemctl --user daemon-reload +# systemctl --user start neko-server +# systemctl --user status neko-server +# journalctl -fu neko-server.service +# podman logs neko-server +# systemctl --user stop neko-server +# systemctl --user disable neko-server +# podman exec -ti neko-server /bin/sh +# podman exec -ti neko-server /bin/bash diff --git a/home/podman/.config/containers/systemd/uptime-kuma-server-data.volume b/home/podman/.config/containers/systemd/uptime-kuma-server-data.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/uptime-kuma-server-data.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/uptime-kuma-server.container b/home/podman/.config/containers/systemd/uptime-kuma-server.container new file mode 100644 index 0000000..8e4e0c9 --- /dev/null +++ b/home/podman/.config/containers/systemd/uptime-kuma-server.container @@ -0,0 +1,35 @@ +[Container] +AutoUpdate=registry +ContainerName=uptime-kuma-server +Image=docker.io/louislam/uptime-kuma:1 +# Network=uptime-kuma.network +# Pod=uptime-kuma.pod +PublishPort=3004:3001 +Volume=uptime-kuma-server-data.volume:/app/data:rw + +[Service] +Restart=no + +[Install] +WantedBy=multi-user.target default.target + +# chown -R podman:podman /home/podman/.config/containers/systemd +# /usr/libexec/podman/quadlet -dryrun --user +# /usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output +# find / -name "uptime-kuma-server.service" 2>/dev/null +# /home/podman/quadlet/uptime-kuma-server.service +# /home/podman/quadlet/default.target.wants/uptime-kuma-server.service +# /home/podman/quadlet/multi-user.target.wants/uptime-kuma-server.service +# /run/user/1002/systemd/generator/multi-user.target.wants/uptime-kuma-server.service +# /run/user/1002/systemd/generator/default.target.wants/uptime-kuma-server.service +# /run/user/1002/systemd/generator/uptime-kuma-server.service +# podman pull docker.io/louislam/uptime-kuma:1 +# systemctl --user daemon-reload +# systemctl --user start uptime-kuma-server +# systemctl --user status uptime-kuma-server +# journalctl -fu uptime-kuma-server.service +# podman logs uptime-kuma-server +# systemctl --user stop uptime-kuma-server +# systemctl --user disable uptime-kuma-server +# podman exec -ti uptime-kuma-server /bin/sh +# podman exec -ti uptime-kuma-server /bin/bash