Static IP
txt to bash
firefox ssh
This commit is contained in:
Mike Phares 2025-03-01 14:45:52 -07:00
parent 7016660fd1
commit 6c9fa8cfaa
19 changed files with 297 additions and 1028 deletions

9
.vscode/.http vendored Normal file
View File

@ -0,0 +1,9 @@
@host = http://192.168.11.2
# @pat = asdf
# @ids = 126018, 224543
GET {{host}}/ocs-client-run.conf
# Accept: application/json
# Authorization: Basic {{pat}}
###

View File

@ -6,12 +6,9 @@ snap install dashkiosk
snap install ubuntu-frame wpe-webkit-mir-kiosk
snap set wpe-webkit-mir-kiosk daemon=true
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
exit
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
snap set ubuntu-frame daemon=true
exit
reboot
cat /root/.ssh/authorized_keys
nano /root/.ssh/authorized_keys

View File

@ -1,17 +1,13 @@
cat /root/.ssh/authorized_keys
nano /root/.ssh/authorized_keys
exit
apt-get install podman -y
apt-cache rdepends podman-compose
apt-get install podman-compose -y
adduser podman sudo
sudo -iu podman
exit
timedatectl set-timezone America/Phoenix
date
apt-get update
apt upgrade -y
adduser pihole
adduser podman
adduser lphares
mkdir /home/lphares/.ssh
@ -26,64 +22,36 @@ adduser bmiller lphares
sudo usermod -a -G lphares bmiller
newgrp lphares
systemctl restart ssh
exit
reboot
sudo -iu podman
cd /run/user/0/
ls -la
cd ..
ls -la
cp -R 0/ 1002/
chown -R podman:podman /run/user/1002/
sudo -iu podman
rm -R /run/user/1002/
mkdir -p /run/user/1002/
sudo -iu podman
chown -R podman:podman /run/user/1002/
sudo -iu podman
exit
reboot
adduser pihole
cd /tmp
curl -sSL https://install.pi-hole.net | bash
pihole -a -p LhhI1S73VZhtP#WIG8Tk
exit
reboot
apt install unbound -y
nano /etc/unbound/unbound.conf.d/pi-hole.conf
service unbound restart
nano /etc/lighttpd/lighttpd.conf
pihole -up
service lighttpd restart
dig fail01.dnssec.works @127.0.0.1 -p 5335
dig dnssec.works @127.0.0.1 -p 5335
exit
reboot
ln -s /var/log/nginx /var/www/html/log-nginx
ls -la /var/www/html
exit
cp ~/.bash_history /etc/bash_history_2024-07-25.txt
cat /etc/bash_history_2024-07-25.txt
exit
apt install smartmontools
smartctl -i /dev/sda
exit
reboot
apt install snapd -y
apt install sudo links unzip nginx git nano ncdu -y
snap install dashkiosk
apt install sudo links unzip nginx git nano ncdu -y
snap install ubuntu-frame wpe-webkit-mir-kiosk
snap set wpe-webkit-mir-kiosk daemon=true
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
exit
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
snap set ubuntu-frame daemon=true
exit
reboot
sudo -iu podman
chmod -R podman:podman /home/podman/.config/containers/systemd/
chown -R podman:podman /home/podman/.config/containers/systemd/
rm -R .config/containers/systemd/*.ignore
@ -95,8 +63,6 @@ rm -R /home/podman/.config/containers/systemd/*.container
mkdir /home/podman/.ssh
cp /root/.ssh/authorized_keys /home/podman/.ssh/authorized_keys
chown podman:podman -R /home/podman
systemctl --user daemon-reload
sudo -iu podman
cd ~/
mkdir -p ~/.bashrc.d
echo "export XDG_RUNTIME_DIR=/run/user/$(id -u)" > ~/.bashrc.d/systemd
@ -107,9 +73,6 @@ systemctl --user daemon-reload
podman image prune
podman volume prune
podman container prune
exit
shutdown now
ip a
lsof -i -P -n | grep LISTEN
apt-cache rdepends cockpit
apt install cockpit -y
@ -117,51 +80,32 @@ passwd phares
apt-get install cockpit cockpit-podman -y
systemctl enable --now cockpit.socket
journalctl -fu unbound-resolvconf.service
ip a
service unbound restart
journalctl -fu unbound-resolvconf.service
nano /etc/sysctl.conf
sysctl -p
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
exit
reboot
ip a
nano /etc/postfix/main.cf
nano /etc/default/grub
grub2-mkconfig
grub-mkconfig
exit
reboot
ip a
nmcli
dig pi-hole.net @127.0.0.1 -p 5335
dig fail01.dnssec.works @127.0.0.1 -p 5335
dig dnssec.works @127.0.0.1 -p 5335
systemctl is-active unbound-resolvconf.service
systemctl disable --now unbound-resolvconf.service
sed -Ei 's/^unbound_conf=/#unbound_conf=/' /etc/resolvconf.conf
service unbound restart
rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf
systemctl disable --now unbound-resolvconf.service
exit
reboot\
reboot
sudo -iu podman
exit
reboot
sudo -iu podman
exit
reboot
sudo -iu podman
exit
shutdown now
lvs -a
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
smartctl -i /dev/sda
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
mkdir /mnt/usb
mount /dev/sdb2 /mnt/usb
exit
nginx -t
nginx -s reload
exit

View File

@ -1,70 +1,26 @@
exit
cd ~/.bashrc.d/systemd
cd ~/.bashrc.d
ls -la
sudo -iu podman
exit
systemctl --user list-unit-files
cd /etc/containers/systemd/users
ls
ls -la
cd ..
ls -la
systemctl start --user
cd /usr/lib/systemd/system-generators/podman-system-generator
cd /usr/lib/systemd/system-generators
ls -la
ls -la
cd /usr/libexec/podman/quadlet
cd /usr/libexec/podman
ls -la
apt-get install apt install podman-quadlet
apt install podman-quadlet
ls -la
ls -la /usr/libexec/podman
systemctl -l | grep -i rootlessport
ps aux | grep rootlessport
podman-generate-systemd
ls
whereis podman-generate-systemd
clear
apt list --installed
clear
exit
clear
apt list --installed
clear
/usr/libexec/podman/quadlet -dryrun
/usr/libexec/podman/quadlet --user -dryrun
sudo -iu podman
exit
chown -R podman:podman /home/podman
/usr/libexec/podman/quadlet -dryrun --user
sudo -iu podman
find / -name "immich-server.service" 2>/dev/null
rm -R /home/podman/d
find / -name "uptime-kuma-server.service" 2>/dev/null
sudo -iu podman
sudo -iu podman
sudo -iu podman
chown -R podman:podman /home/podman/.config/containers/systemd
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
sudo -iu podman
nginx -t
nginx -s reload
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -s reload
links https://phares.duckdns.org
nano /etc/hosts
links https://phares.duckdns.org
ls /var/www/html
nano index.html
nano /var/www/html/index.html
@ -73,180 +29,55 @@ ls /var/www
mkdir /var/www/html
cp /var/www/html-slideshow/index.nginx-debian.html /var/www/html/
mv /var/www/html /var/www/html-nginx
nginx -t
nginx -s reload
links https://phares.duckdns.org
ls /var/www/html-nginx
links https://adguard.phares.duckdns.org/
nano /etc/hosts
links https://adguard.phares.duckdns.org/
nano /etc/hosts
links https://adguard.phares.duckdns.org/
nano /etc/hosts
nano /etc/hosts
links https://adguard.phares.duckdns.org/
nano /etc/hosts
links https://adguard.phares.duckdns.org/
exit
nginx -t
nginx -s reload
podman pull docker.io/m1k1o/neko:firefox
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
podman pull docker.io/mattermost/mattermost-team-edition:9.11.2
sudo -iu podman
podman list images
podman ls images
podman images ls
podman image ls
podman image prone
podman image purge
podman image --help
podman image prune
y
podman image ls
podman image rm 2
podman image rm 7
podman image ls
sudo -iu podman
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -t
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
sudo -iu podman
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
nano /etc/hosts
nano /etc/hosts
nano /etc/hosts
exit
sudo -iu podman
sudo -iu podman
cat /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
nano/home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
sudo -iu podman
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
sudo -iu podman
exit
exit
sudo -iu podman
cd /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-external/_data
ls
ls -la
cd /
sudo -iu podman
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-upload/_data/thumbs/5f0b1052-466d-44de-a554-226d7256850d/
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
sudo -iu podman
sudo -iu podman
links https://192.168.0.43:8123
links http://192.168.0.43:8123
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
cp -R /var/www/html-nginx/ /var/www/html-quartz
cd /var/www/html-quartz
ls
mv index.nginx-debian.html index.html
links http://192.168.11.2:8069/
links http://192.168.11.2:8069/index.html
cd /
nginx -t
cd /var/www/html-infineon/
ls
nginx -t
nginx -s reload
apt-get update
apt-get upgrade
reboot
links http://192.168.11.2:8069/
links http://192.168.11.2:8069/
links http://192.168.11.2/
sudo -iu podman
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions/
rm /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
rm -R /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/var
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/phares3757/
sudo -iu podman
exit
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nano /root/.acme.sh/*.phares.duckdns.org_ecc/*.phares.duckdns.org.cer
nginx -t
nginx -s reload
nginx -t
nginx -s reload
reboot
links http://127.0.0.1:8080/slideshow/index.html?nocache=2024-07-01-11-36
links http://127.0.0.1:8080/slideshow/index.html
links http://127.0.0.1:8080/slideshow
links http://192.168.11.2:8080/slideshow
nginx -t
reboot
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
exit
mv /root/.acme.sh/affirm.duckdns.org_ecc/ /root/acme.sh-master/wild-affirm
mv /root/acme.sh-master/wild-affirm /root/.acme.sh/wild-affirm
exit
nginx -t
nginx -t
nginx -s reload
exit
cd /tmp
git clone https://github.com/acmesh-official/acme.sh.git
cd /tmp/acme.sh
@ -263,190 +94,77 @@ mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.conf /root/.acme.sh/wild-jmlc/jm
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr.conf /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr.conf
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.key /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.key
nginx -t
nginx -t
nginx -s reload
nginx -t
nginx -t
nginx -s reload
nginx -s reload
links http://192.168.11.2:9090
links https://192.168.11.2:9090
nginx -s reload
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
man cockpit.conf
nano /etc/cockpit/cockpit.conf
systemctl status cockpit.socket
systemctl status cockpit
systemctl stop cockpit
systemctl stop cockpit.socket
systemctl stop cockpit
systemctl start cockpit
systemctl start cockpit.socket
nginx -s reload
rm /etc/cockpit/cockpit.conf
systemctl stop cockpit
systemctl stop cockpit.socket
systemctl stop cockpit
systemctl start cockpit.socket
systemctl start cockpit
nginx -s reload
journalctl -u cockpit
cd /etc/cockpit/
ls
cd ws-certs.d/
ls
mv 0-self-signed.cert 0-self-signed.cert.old
mv 0-self-signed.key 0-self-signed.key.old
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer 0-self-signed.cert
cp /root/.acme.sh/wild-phares/phares.duckdns.org.key 0-self-signed.key
systemctl restart cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl restart cockpit
nano /etc/cockpit/cockpit.conf
systemctl restart cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl restart cockpit
systemctl status cockpit
nginx -s reload
systemctl restart cockpit
systemctl status cockpit
nginx -s reload
nginx -s reload
rm -R /mnt/free-file-sync/notes/FS-ADO/
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
nignx -t
nginx -t
nginx -s reload
reboot
lsof -i -P -n | grep LISTEN
links http://192.168.11.2:5007/
links http://127.0.0.1:5007/
sudo -iu podman
sudo -iu podman
sudo -iu podman
chmod -R 0774 /root/.acme.sh/wild-phares
sudo -iu podman
ls -la /root/.acme.sh/wild-phares
chmod -R 0775 /root/.acme.sh/wild-phares
ls -la /root/.acme.sh/wild-phares
sudo -iu podman
chmod -R 0777 /root/.acme.sh/wild-phares
sudo -iu podman
chmod -R 0774 /root/.acme.sh/wild-phares
ls -la /root/.acme.sh/wild-phares
chmod -R 0774 /root/.acme.sh
ls -la /root/.acme.sh
sudo -iu podman
ln -s /root/.acme.sh/wild-phares /home/podman/wild-phares
sudo -iu podman
cp -R /root/.acme.sh/wild-phares /home/podman/wild-phares
cp -R /root/.acme.sh/wild-phares/ /home/podman
rm /home/podman/wild-phares
cp -R /root/.acme.sh/wild-phares/ /home/podman
chown podman:podman /home/podman
ls /home/podman/wild-phares/
ls -la /home/podman/wild-phares
sudo -iu podman
chown -R podman:podman /home/podman
ls -la /home/podman/wild-phares
sudo -iu podman
cd /home/podman/
ls
cd quadlet/
ls -la
cd default.target.wants/
ls -la
cd ..
cd ..
cd lib
cd libpod/
ls -la
sudo -iu podman
chown -R 1000:1000 /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
cd /
sudo -iu podman
sudo -iu podman
reboot
sudo -iu podman
exit
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
/usr/libexec/podman/quadlet -dryrun --user
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
ls -ls \mnt\free-file-sync\proxmox
ls -ls /mnt/free-file-sync/proxmox
cd /home/podman
ls -la
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
apt-get install acl -y
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
ls -la
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
cd /
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
ls /home/podman/.config/cni/net.d
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
cd /home/phares/
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
getfacl /home/podman > permissions.acl
ls
cat permissions.acl
rm permissions.acl
getfacl -R /home/podman > podman-permissions-bad.acl
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
cd ../podman
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
cd /
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
nano /etc/passwd
nano /etc/passwd
nano /etc/group
nano /etc/shadow
find / -uid 1000 -exec chown -h 2000 {} +
find / -gid 1000 -exec chgrp -h 2000 {} +
find / -xdev -uid 1002 -exec chown -h 1000 {} +
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
reboot
reboot
nano /etc/passwd
nano /etc/group
find / -xdev -uid 1001 -exec chown -h 1005 {} +
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
find / -xdev -uid 2000 -exec chown -h 1001 {} +
@ -457,44 +175,18 @@ find / -xdev -uid 1005 -exec chown -h 1002 {} +
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
reboot
cd /
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
ls /run/user/
ls /run/user/1001/systemd/
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
/usr/libexec/podman/quadlet -dryrun --user
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
sudo -iu podman
sudo -iu podman
sudo -iu podman
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
sudo -iu podman
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
sudo -iu podman
exit

View File

@ -1,32 +1,19 @@
ls /home/podman/.config/cni/net.d
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
cd /home/phares/
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
getfacl /home/podman > permissions.acl
ls
cat permissions.acl
rm permissions.acl
getfacl -R /home/podman > podman-permissions-bad.acl
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
cd ../podman
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
cd /
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
nano /etc/passwd
nano /etc/passwd
nano /etc/group
nano /etc/shadow
find / -uid 1000 -exec chown -h 2000 {} +
find / -gid 1000 -exec chgrp -h 2000 {} +
find / -xdev -uid 1002 -exec chown -h 1000 {} +
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
reboot
reboot
nano /etc/passwd
nano /etc/group
find / -xdev -uid 1001 -exec chown -h 1005 {} +
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
find / -xdev -uid 2000 -exec chown -h 1001 {} +
@ -37,60 +24,16 @@ find / -xdev -uid 1005 -exec chown -h 1002 {} +
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
reboot
cd /
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
ls /run/user/
ls /run/user/1001/systemd/
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
/usr/libexec/podman/quadlet -dryrun --user
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
sudo -iu podman
sudo -iu podman
sudo -iu podman
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
sudo -iu podman
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
sudo -iu podman
exit
cp ~/.bash_history /etc/bash_history_2024-11-10.txt
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
sudo -iu podman
sudo -iu podman
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost
ls -la /home/podman/.local/share/containers/storage/volumes
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs
@ -101,23 +44,8 @@ chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/syst
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
@ -126,123 +54,36 @@ chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/syst
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
sudo -iu podman
sudo -iu podman
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
systemctl --user start mattermost-db
systemctl --user start mattermost-db
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
sudo -iu podman
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
sudo -iu podman
sudo -iu podman
exit
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
links https://pgadmin.phares.duckdns.org/
links https://pgadmin.phares.duckdns.org/
sudo -iu podman
sudo -iu podman
lspci | grep -i nvme
lspci -vv -s 08:00.0 | grep -w LnkCap
lspci -vv -s 02:00.0 | grep -w LnkCap
sudo -iu podman
curl https://push-test.mattermost.com
sudo -iu podman
sudo -iu podman
sudo -iu podman
apt-file search setcap
setcap
sudo -iu podman
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
sudo -iu podman
nginx -s reload
nginx -s reload
sudo -iu podman
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
snap install vaultwarden
snap vaultwarden
snap vaultwarden help
lsof -i -P -n | grep LISTEN
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap stop vaultwarden
sudo -iu podman
snap stop vaultwarden
sudo -iu podman
nginx -t
nginx -s reload
sudo -iu podman
links https://192.168.11.2:5008
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
links https://192.168.11.2:5008
links http://192.168.11.2:5008
links https://192.168.11.2:5008
snap start vaultwarden
snap vaultwarden
snap vaultwarden hash
snap uninstall vaultwarden
snap remove vaultwarden
exot
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
sudo -iu podman
links https://mattermost.phares.duckdns.org
snap install vaultwarden
snap stop vaultwarden
nano /var/snap/vaultwarden/current/vaultwarden.conf
rm /var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap remove vaultwarden
snap install vaultwarden
ls -la /var/snap/vaultwarden/current
ls -la /var/snap/vaultwarden/current
echo>/var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap start vaultwarden
snap info vaultwarden
snap status vaultwarden
lsof -i -P -n | grep LISTEN
snap start vaultwarden
lsof -i -P -n | grep LISTEN
links https://192.168.11.2:5009/
openssl s_client -showcerts -connect vaultwarden.phares.duckdns.org:443 -servername vaultwarden.phares.duckdns.org
exit
snap start vaultwarden
journalctl -u snapd
cat /var/snap/vaultwarden/current/
top
@ -256,134 +97,52 @@ snap watch id 37
snap watch 37
snap watch 34
snap logs vaultwardedn
snap logs vaultwarden
ls -la /home/podman/wild-phares/
nano /var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap start vaultwarden
snap logs vaultwarden
ls -la /var/snap/vaultwarden/current/
ls -la /var/snap/vaultwarden/current/ssl
cp -R /home/podman/wild-phares/* /var/snap/vaultwarden/current/ssl/
ls -la /var/snap/vaultwarden/current/ssl/
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap start vaultwarden
snap logs vaultwarden
snap logs vaultwarden
nginx -t
nginx -s reload
nano /var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap stop vaultwarden
snap start vaultwarden
sudo -iu podman
exit
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap stop vaultwarden
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap start vaultwarden
nginx -t
nginx -s reload
sudo -iu podman
exit
sudo -iu podman
sudo -iu podman
exit
nano /etc/cockpit/cockpit.conf
apt-get install cockpit cockpit-podman cockpit-machines -y
apt-get install cockpit cockpit-podman cockpit-machines -y
apt-get remove cockpit-machines -y
apt-get install cockpit cockpit-podman cockpit-files -y
apt-get install cockpit cockpit-podman cockpit-file -y
apt-get search cockpit-file
apt-get search
apt-get --help
apt-get check
apt-get auto-purge
apt-get --help
apt-get purge
apt-get autoremove
apt-get autoremove
apt-get update
apt-get install cockpit cockpit-podman cockpit-files -y
apt-get upgrade
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
sudo -iu podman
nano /etc/docker/daemon.json
nano /etc/podman/daemon.json
sudo -iu podman
nginx -s reload
sudo -iu podman
nano /etc/resolv.conf
nano /etc/resolv.conf
nano /etc/hosts
cat /etc/hosts
sudo -iu podman
nano /etc/hosts
sudo -iu podman
sudo -iu podman
nginx -s reload
nginx -s reload
nano /etc/hosts
sudo -iu podman
sudo -iu podman
sudo -iu podman
apt install podman
sudo -iu podman
sudo -iu podman
exit
sudo -iu podman
exit
sudo -iu podman
nginx -s reload
exit
nginx -t
nginx -s reload
exit
nginx -t
nginx -s reload
sudo -iu podman
sudo -iu podman
exit
nginx -s reload
exit
nano /etc/cockpit/cockpit.conf
exit
ls -la /etc/cockpit/ws-certs.d/
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
mv /etc/cockpit/ws-certs.d/0-self-signed.cert /etc/cockpit/ws-certs.d/0-self-signed.cert.part
cp /root/.acme.sh/wild-phares/fullchain.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
exit
ls -la /etc/cockpit/ws-certs.d
chomod 774 -r /etc/cockpit/ws-certs.d
chmod 774 -R /etc/cockpit/ws-certs.d
ls -la /etc/cockpit/ws-certs.d
exit
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
ls -la /etc/cockpit/ws-certs.d
rm /etc/cockpit/ws-certs.d/0-self-signed.cert.old
chmod 774 -R /etc/cockpit/ws-certs.d
exit
ls -la /usr/libexec/podman/quadlet
ls -la /usr/libexec/podman
exit
find / -name "neko-server.service" 2>/dev/null
exit
cp /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
cp /run/user/1000/systemd/generator/default.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
cp /run/user/1000/systemd/generator/neko-server.service /mnt/free-file-sync/proxmox/
nano /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
dif /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
sudo -iu podman
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
diff
diff --help
@ -394,63 +153,26 @@ diff -y /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-
diff -r /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
diff -y -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
sudo -iu podman
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
/usr/lib/systemd/user-generators/podman-user-generator
ls /usr/lib/systemd/user-generators/podman-user-generator
exit
nginx -s reload
exit
rm -R /var/www/html-infineon/
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
exit
exit
nginx -t
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
docker
exit
snap list
exit
nano /var/www/html-slideshow/slideshow/scripts/index.js
nano /var/www/html-slideshow/slideshow/index.json
snap install dotnet-sdk --classic 9.0/stable
dotnet --info
snap install dotnet-sdk --classic --channel 9.0/stable
snap install dotnet-sdk --stable 9.0/stable
snap install dotnet-sdk --stable dotnet-sdk
snap install --stable dotnet-sdk
snap install --classic --stable dotnet-sdk
exit
~/.bashrc
exit
~/.bashrc
nano /etc/hostname
nano /etc/hostname
/etc/hosts
nano /etc/hosts
/etc/hosts
nano /etc/hostname
nano /etc/hosts
~/.bashrc
sudo -i
exit
dotnet --info
snap remove --classic --stable dotnet-sdk
snap remove dotnet-sdk
dotnet --info
snap install dotnet-sdk --classic --9.0/stable
snap install dotnet-sdk --classic --channel 9.0/stable
apt-get update
snap install dotnet-sdk --classic --channel 9.0/stable
snap install dotnet-sdk --classic --latest/stable
@ -460,26 +182,12 @@ export DOTNET_ROOT=/snap/dotnet-sdk/current
~/.bash_profile
~/.bashrc
sudo -i
exit
dotnet --info
cd /tmp/
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
ls
cd one-review/
podman compose up --build
nano /etc/containers/registries.conf
ls
podman ps -a
sudo -iu podman
cd ..
rm -R one-review/
sudo -iu podman
sudo -iu podman
apt-get install podman-plugins
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
cd one-review/
git checkout origin 11-17
@ -492,9 +200,7 @@ snap install docker
snap remove docker
snap remove dotnet-sdk
cd ..
ls
rm -R one-review/
ls
exit
dotnet --info
exit

View File

@ -3,13 +3,8 @@ mv /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019 /mnt/free-file-sync/iso/
rm -R /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019/
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006\ \\\!9
exit
rm -R /mnt/free-file-sync/iso/images-a/Phares\\\ Slides\\\ ####
exit
mount /mnt/free-file-sync/iso/Edited.iso /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/2024-12-18-18-10-19-693.iso /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/2024-12-18-18-13-54-579.iso /mnt/iso-compare
rm -R /mnt/free-file-sync/iso/images-a/Scanned\ Grandma\\\'s\ Quilt\ ####/
rm -R /mnt/free-file-sync/iso/images-a/Event
@ -17,36 +12,14 @@ rm -R /mnt/free-file-sync/iso/images-a/Question/
mount /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/2024-12-18-18-10-19-693.iso /mnt/iso-compare
rm -R /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
umount /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
umount /mnt/iso-compare
umount /mnt/iso-compare
umount /mnt/iso-compare
umount /mnt/iso-compare
umount /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
umount /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
umount /mnt/iso-compare
umount /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
umount /mnt/iso-compare
umount /mnt/iso-compare
rm -R /mnt/free-file-sync/iso/images-a/Facebook
mount /mnt/free-file-sync/iso/images-a/Rex\ Memorial\ ####/2024-12-18-18-15-40-537.iso /mnt/iso-compare
umount /mnt/iso-compare
umount /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Scanned\ Norman\ Herman/2024-12-18-18-15-43-097.iso /mnt/iso-compare
umount /mnt/iso-compare
rm -R /mnt/free-file-sync/iso/images-a/Scanned*
rm -R /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/
umount /mnt/iso-compare
umount /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/DisneyWorld\ 2019/2024-12-18-18-42-26-222.iso /mnt/iso-compare
umount /mnt/iso-compare
umount /mnt/iso-compare
exit
ls -al /mnt/free-file-sync/iso/images-a
rm -R /mnt/free-file-sync/iso/images-a/Slide in N*
rm -R /mnt/free-file-sync/iso/images-a/Slide\\ in\\ N*
ls -al /mnt/free-file-sync/iso/images-a/Sli*
@ -55,129 +28,37 @@ ls -al /mnt/free-file-sync/iso/images-a/Slide\\ *
ls -al /mnt/free-file-sync/iso/images-a
rm -R /mnt/free-file-sync/iso/images-a/'Slide in Name Order Originals \(622\) ####'
mkdir /mnt/free-file-sync/iso/videos-b
exit
lsblk
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
rm /mnt/free-file-sync/iso/videos-b/Home\ Videos\ 1998\ -\ 2002/2024-12-18-19-49-52-202.iso
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
exit
nano /root/.ssh/authorized_keys
exit
nano /root/.ssh/authorized_keys
exit
nano /root/.ssh/authorized_keys
exit
nano /root/.ssh/authorized_keys
nano /root/.ssh/authorized_keys
exit
exit
exit
lsblk
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
exit
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
exit
reboot
aptget update
apt-get update
apt-get upgrade
ls
nano t
nano t
exit
sudo -iu podman
exit
mv -R /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
mv /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
mv /mnt/free-file-sync/logan-google-drive /mnt/free-file-sync/google-drive-logan
exit
nano /root/.ssh/authorized_keys
exit
sudo -iu podman
crontab -e
sudo -iu podman
/etc/duckdns/duck.sh >/dev/null 2>&1
"/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build
cd /
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"\%Y\%m\%d-\%H\%M\%S")'.tar'
sudo -iu podman
ls /home/podman/backup-blinko/
sudo -iu podman
ls /home/podman/backup-blinko/
rm /home/podman/backup-blinko/*
ls /home/podman/backup-blinko/
sudo -iu podman
exit
ls /home/podman/backup-blinko/
exit
sudo -iu podman
nano /run/podman/podman.sock
ls /run/podman/podman.sock
sudo -iu podman
cat /var/log/syslog
grep "ERROR" /var/log/cron
sudo -iu podman
crontab -e
crontab -l
crontab -e
crontab -l
systemctl status cron
crontab -e
systemctl status cron
systemctl status cron
systemctl status cron
systemctl status cron
systemctl status cron
systemctl log cron
systemctl status cron
systemctl status cron
crontab -e
systemctl status cron
ls /home/podman/backup-blinko/
ls /home/podman/backup-blinko/
systemctl status cron
crontab -e
systemctl status cron
sudo -iu podman
exit
snap list vaultwarden
reboot
nginx -t
nginx -s reload
exit
sudo -iu podman
exit
sudo -iu podman
exit
su lphares
exit
exit
exit
exit
exit
nginx -t
nginx -t
nginx -s reload
nginx -t
ls -la /home/lphares/dorico
ls -la /home/lphares
ls -la /home/lphares/dorico/
nginx -t
nginx -s reload
nginx -s reload
ls /var/www/html-
nginx -s reload
nginx -t
ls /etc/netplan/
nginx -s reload
nginx -s reload
nginx -s reload
nginx -t
nginx -t
nginx -s reload
nginx -s reload
ls /etc/ModemManager/ -la
ls /etc/ModemManager -la
ls /etc/ModemManager
@ -192,26 +73,16 @@ ls /etc/ModemManager -l -T
ls /etc/ModemManager -l --time-style=+"%b %d %Y %H:%M:%S"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S%zz"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S %z"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %HH:%M:%S %z"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %h:%M:%S %z"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S %z"
ls /etc/ModemManager/ -la -D '%Y-%m-%dT%H:%M:%S'
ls /etc/ModemManager/ -la -D '%Y-%m-%dT %H:%M:%S'
nginx -t
nginx -s reload
ufw status
ufw number status
ufw numbered status
ufw status numbered
ufw active
ufw enable
ufw status numbered
ls
ufw disable
ip a
ufw allow 53/tcp comment "01) DNS TCP"
ufw status numbered
ufw allow 53/udp comment "02) DNS UDP"
ufw allow 67/tcp comment "03) DHCP TCP"
ufw allow 67/udp comment "04) DHCP UDP"
@ -223,20 +94,7 @@ ufw allow from 192.168.41.0/25 to any port 22/tcp comment "09) SSH"
ufw allow from 192.168.42.0/25 to any port 22/tcp comment "10) SSH"
ufw allow from 192.168.43.0/25 to any port 22/tcp comment "11) SSH"
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
ufw enable
ufw status numbered
ufw disable
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
ufw reset
ufw status numbered
ufw allow port 53/tcp comment "01) DNS TCP"
ufw allow 53/tcp comment "01) DNS TCP"
ufw allow 53/udp comment "02) DNS UDP"
ufw allow 67/tcp comment "03) DHCP TCP"
ufw allow 67/udp comment "04) DHCP UDP"
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
ufw allow from 192.168.11.0/25 port 22/tcp comment "06) SSH"
ufw allow from 192.168.21.0/25 port 22/tcp comment "07) SSH"
ufw allow from 192.168.31.0/25 port 22/tcp comment "08) SSH"
@ -245,17 +103,10 @@ ufw allow from 192.168.42.0/25 port 22/tcp comment "10) SSH"
ufw allow from 192.168.43.0/25 port 22/tcp comment "11) SSH"
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
ufw reset
ufw allow 53/tcp comment "01) DNS TCP"
ufw allow 53/udp comment "02) DNS UDP"
ufw allow 67/tcp comment "03) DHCP TCP"
ufw allow 67/udp comment "04) DHCP UDP"
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
ufw allow from 192.168.11.0/25 port 22 comment "06) SSH"
ufw allow from 192.168.21.0/25 port 22 comment "07) SSH"
ufw allow from 192.168.31.0/25 port 22 comment "08) SSH"
@ -263,54 +114,29 @@ ufw allow from 192.168.41.0/25 port 22 comment "09) SSH"
ufw allow from 192.168.42.0/25 port 22 comment "10) SSH"
ufw allow from 192.168.43.0/25 port 22 comment "11) SSH"
ufw allow to 0.0.0.0/0 port 22 comment "12) SSH"
ufw enable
ufw status numbered
ufw delete 12
ufw status numbered
ufw disable
ufw allow to 192.168.11.0/25 port 22 comment "12) SSH"
ufw allow to 192.168.21.0/25 port 22 comment "13) SSH"
ufw allow to 192.168.31.0/25 port 22 comment "14) SSH"
ufw allow to 192.168.41.0/25 port 22 comment "15) SSH"
ufw allow to 192.168.42.0/25 port 22 comment "16) SSH"
ufw allow to 192.168.43.0/25 port 22 comment "17) SSH"
ufw enable
ufw status numbered
ufw status numbered
ufw disable
cat /etc/passwd
top
pcap
ps -ef | grep cr[o]n
ps -ef | grep nginx
usermod -a -G lphares www-data
exit
chmod -R 774 /home/lphares/dorico
nginx -t
nginx -s reload
nginx -s reload
rm -r /home/lphares/dorico
su lphares
exit
exit
exit
ufw status numbered
ufw enabled
ufw enable
ufw status numbered
ufw disable
ufw allow from 0.0.0.0/0 port 443 comment "18) HTTPS"
ufw enable
ufw disable
ufw reset
ufw disable
ufw allow 53/tcp comment "01) DNS TCP"
ufw allow 53/udp comment "02) DNS UDP"
ufw allow 67/tcp comment "03) DHCP TCP"
ufw allow 67/udp comment "04) DHCP UDP"
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
ufw allow to 0.0.0.0/0 port 443 comment "06) HTTPS"
ufw enable
ufw allow from 192.168.11.0/25 port 22 comment "07) SSH"
ufw allow from 192.168.21.0/25 port 22 comment "08) SSH"
ufw allow from 192.168.31.0/25 port 22 comment "09) SSH"
@ -324,28 +150,14 @@ ufw allow to 192.168.41.0/25 port 22 comment "16) SSH"
ufw allow to 192.168.42.0/25 port 22 comment "17) SSH"
ufw allow to 192.168.43.0/25 port 22 comment "18) SSH"
ufw enable
ufw status numbered
exit
ufw disable
top[
top
systemctl list-timers
systemctl list-timers
apt-get remove certbot
snap remove certbot
systemctl list-timers
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
reboot
sudo -iu podman
exit
exit
grep sshd.\*Failed /var/log/auth.log | less
grep sshd.\*Failed /var/log/auth.log | less
grep sshd.\* /var/log/auth.log
grep sshd.\*publickey /var/log/auth.log | less
grep sshd.\*publickey /var/log/auth.log
grep sshd.\*publickey /var/log/auth.log | less
apt update
@ -356,115 +168,34 @@ ls
head -20 jail.conf
cp jail.conf jail.local
nano jail.local
nano jail.local
nano jail.local
systemctl enable fail2ban
systemctl start fail2ban
systemctl status fail2ban
reboot
apt-get update
apt upgrade
sudo -iu podman
exit
snap info adguard-home
exit
tail /var/log/auth.log -f
exit
ufw status numbered
exit
ip a
exit
id
su phares
su podman
exit
exit
exit
sudo -iu podman
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
exit
ip a
ip a l | grep inet6
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
cat /boot/firmware/cmdline.txt
nano /boot/firmware/cmdline.txt
exit
snap restart adguard-home
exit
nano /etc/duckdns/duck.sh
exit
nano /etc/duckdns/duck.sh
cat duck.log
chmod 700 /etc/duckdns/duck.sh
cd /etc/duckdns
./duck.sh
cat duck.log
ps -ef | grep cr[o]n
crontab -e
cat duck.log
xit
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -s reload
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
links http://192.168.11.2:5015/
sudo -iu podman
sudo -iu podman
links http://192.168.11.2:5015/
sudo -iu podman
links http://192.168.11.2:5015/
sudo -iu podman
sudo -iu podman
links http://192.168.11.2:5015/
links http://192.168.11.2:5015/
sudo -iu podman
nginx -t
nginx -s reload
links http://192.168.11.2:5015/
sudo -iu podman
chown podman:podman /home/podman/2fauth -R
sudo -iu podman
sudo -iu podman
chown podman:podman /home/podman/2fauth -R
sudo -iu podman
nginx -t
nginx -s reload
sudo -iu podman
sudo -iu podman
nc -zv localhost 5015
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
nano /home/persa/.ssh/authorized_keys
nano /home/persa/.ssh/authorized_keys
nano /root/.ssh/authorized_keys
exit
nano /root/.ssh/authorized_keys
nano /home/lphares/.ssh/authorized_keys
nano /home/bmiller/.ssh/authorized_keys
nano /home/podman/.ssh/authorized_keys
exit
nano /home/podman/.ssh/authorized_keys
nano /home/bmiller/.ssh/authorized_keys
nano /home/lphares/.ssh/authorized_keys
@ -472,28 +203,9 @@ nano /root/.ssh/authorized_keys
nano /home/persa/.ssh/authorized_keys
nano /home/phares/.ssh/authorized_keys
exit\
exit
sudo -iu podman
nano /etc/hostname
nano /etc/hosts
exit
nginx -t
nginx -s reload
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -t
nginx -s reload
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -s reload
nginx -t
reboot

View File

@ -0,0 +1,189 @@
rm -R /home/www-data/jackyzha0-quartz-phares/content/year-season
cp -R /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
cp -Rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
yes | cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
\cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
ls /var/lib/containers/storage/overlay-layers/
cat /var/lib/containers/storage/overlay-layers/layers.json
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json.json
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json
cat /var/lib/containers/storage/overlay-layers/layers.lock
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
podman reset syste
podman reset system
podman system reset
podman system prune
rm -Rf /home/podman/.local/share/containers/storage/overlay/9234e0dfb7414fea7d4610bea727177a951b39a5df9f0573882cbf9e5bc16417/
ls -la /home/podman/cron-backup/
ls -la /home/podman/cron-backup
ls -la /home/podman/cron-backup-delete/
ls -la /home/podman/cron-backup-2025-01-31/
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rmit --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
podman ls
podman ps a
podman ps -a
podman image prune
podman volume list
podman ps
podman image rm 9
podman image list
rsync -a /home/podman/jackyzha0-quartz-phares/content/year-season/ /home/www-data/jackyzha0-quartz-phares/content/year-season
cd /home/www-data/jackyzha0-quartz-phares && /snap/bin/npx quartz build
cat /var/snap/vaultwarden/current/ssl/fullchain.cer
snap info vaultwarden
snap status vaultwarden
snap help
ls /root/.acme.sh/
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/fullchain.cer
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/\*.phares.duckdns.org.key
cp /home/podman/wild-phares/fullchain.cer /var/snap/vaultwarden/current/ssl/fullchain.cer
cp /home/podman/wild-phares/phares.duckdns.org.key /var/snap/vaultwarden/current/ssl/phares.duckdns.org.key
snap start vaultwarden
snap logs vaultwarden
nano /run/resolvconf/resolv.conf
cat /etc/resolv.conf
ls -la /var/snap/vaultwarden/current/data/icon_cache/
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss/
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss
nignx -t
ls /var/snap/vaultwarden/current/data/tmp/
ls /var/snap/vaultwarden/current/data/icon_cache/
ls /var/snap/vaultwarden/current/data/icon_cache/ -ls
nano /var/snap/vaultwarden/current/vaultwarden.conf
systemctl disable systemd-resolved.service
snap start adguard-home
snap logs adguard-home
systemctl enable systemd-resolved.service
snap restart vaultwarden
ls /etc/resolv.conf
ping
ping duckdns.org
nano /etc/resolv.conf
snap info adguard-home
snap stop adguard-home
systemctl start systemd-resolved
ping www.google.com
systemctl disable systemd-resolved
systemctl stop systemd-resolved
reboot
lsof -i -P -n | grep LISTEN
nano /etc/ssh/sshd_config
cp -R /etc/ssh/sshd_config /home/podman/etc-ssh-sshd_config
cp -R /etc/ssh/sshd_config.d /home/podman/etc-ssh-sshd_config.d
chown -R podman:podman /home/podman/etc-ssh-sshd_config.d
chown -R podman:podman /home/podman/etc-ssh-sshd_config
ls -la podman:podman /home/podman/etc-ssh-sshd_config
mv /home/podman/etc-ssh-sshd_config.d /home/podman/etc-ssh-sshd_config-r
mv /home/podman/etc-ssh-sshd_config-r/sshd_config.d/ /home/podman/etc-ssh-sshd_config.d
ls /home/podman/etc-ssh-sshd_config.d
ls /home/podman/etc-ssh-sshd_config-r
rm -R /home/podman/etc-ssh-sshd_config-r
apt-install yazi -y
apt-get install yazi -y
apt install -y ffmpeg 7zip jq poppler-utils fd-find ripgrep fzf zoxide imagemagick
git clone https://github.com/sxyazi/yazi.git
apt install cargo
apt install make -y
make
gcc
apt install gcc -y
cat /tmp/yazi/Cargo.lock
cls
clear
cd yazi/
cargo build --release --locked
ls /home/podman/etc-ssh-sshd_config -ls
cp /etc/ssh/ssh_config /home/podman/etc-ssh-ssh_config
naon /home/podman/etc-ssh-ssh_config
nano /home/podman/etc-ssh-ssh_config
chown podman:podman /home/podman/etc-ssh-ssh_config
cd /tmp/
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/5608b233-a2f4-4018-aa70-570b0689b266/
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024
git fetch
rm -R original-to-deterministic-hash-code/
git clone https://51f44975c8734522b2dec36c6d9a116276c6bded@gitea.phares.duckdns.org/phares3757/original-to-deterministic-hash-code.git
cd original-to-deterministic-hash-code/
chown -R podman:podman original-to-deterministic-hash-code/
chown -R podman:podman /tmp/original-to-deterministic-hash-code/
chown -R podman:podman /tmp/original-to-deterministic-hash-code
chown -R podman:podman /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/
cat /root/.ssh/id_ed25519
cat /root/.ssh/id_ed25519.pub
cat /root/.ssh
ssh-copy-id
ssh-copy-id root
ls -la /root/.ssh
nano /var/snap/adguard-home/current/AdGuardHome.yaml
nano /etc/hostname
nano /etc/hosts
crontab -e
nano /root/.ssh/authorized_keys
cd /tmp
git clone https://github.com/acmesh-official/acme.sh.git
cd /tmp/acme.sh
./acme.sh --install -m mikepharesjr@msn.com
export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9
echo $DuckDNS_Token
./acme.sh --register-account -m mikepharesjr@msn.com
./acme.sh --set-default-ca --server letsencrypt
./acme.sh --issue --dns dns_duckdns -d '*.sumco.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
ls -la /ssl
ls -la /root/.acme.sh/\*.sumco.duckdns.org_ecc/
cp -R /root/.acme.sh/\*.sumco.duckdns.org_ecc/ /home/podman/wild-sumco
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.cer /home/podman/wild-sumco/sumco.duckdns.org.cer
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.conf /home/podman/wild-sumco/sumco.duckdns.org.conf
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr /home/podman/wild-sumco/sumco.duckdns.org.csr
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr.conf /home/podman/wild-sumco/sumco.duckdns.org.csr.conf
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.key /home/podman/wild-sumco/sumco.duckdns.org.key
chown -R podman:podman /home/podman/wild-sumco/
ls -la /home/podman/wild-sumco/
tail -f /var/log/nginx/access.log
nano /pod
cp /etc/nginx/include/actual.conf /etc/nginx/include/ha.conf
cp /etc/nginx/include/actual.conf /etc/nginx/include/nginx.conf
nano /etc/nginx/include/ha.conf
nginx
nano /etc/nginx/include/ha.conf
nano /etc/nginx/sites-available/default
nano /etc/nginx/include/nginx.conf
nano /root/.ssh/id_ed25519.pub
apt install apache2-utils
htpasswd -c /etc/nginx/.htpasswd phares
ls \var\snap\vaultwarden
ls /var/snap/vaultwarden/
ls /var/snap/vaultwarden -la
journalctl --rotate
journalctl --vacuum-time=1s
journalctl -u cockpit
nginx -t
nginx -s reload
sudo -iu podman
apt-get update
apt-get upgrade
ip -a
ip a
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
ncdu -o iso.json
exit
cd /mnt/
ncdu -f file.json
ncdu -o file.json
ls -la
mv file.json free-file-sync/proxmox/
cd /mnt/backup
cd .
cd /
cd /mnt/free-file-sync/iso/
ls
cd ..
rm -R iso/
ncdu
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
shutdown now

View File

@ -0,0 +1,12 @@
network:
version: 2
ethernets:
enp1s0:
addresses:
- 192.168.11.2/25
routes:
- to: default
via: 192.168.11.1
wlp3s0:
addresses:
- 192.168.11.119/25

View File

@ -1,11 +0,0 @@
# This file is generated from information provided by the datasource. Changes
# to it will not persist across an instance reboot. To disable cloud-init's
# network configuration capabilities, write a file
# /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg with the following:
# network: {config: disabled}
network:
ethernets:
enp1s0:
dhcp4: true
version: 2
wifis: {}

View File

@ -9,7 +9,7 @@ server {
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5800/;
proxy_pass https://192.168.11.2:5800/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}

View File

@ -0,0 +1,39 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name free-file-sync-still.phares.duckdns.org;
root /mnt/free-file-sync/still;
location / {
autoindex on;
disable_symlinks on;
autoindex_format json;
}
}
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name free-file-sync-moving.phares.duckdns.org;
root /mnt/free-file-sync/moving;
location / {
autoindex on;
disable_symlinks on;
autoindex_format json;
}
}
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name free-file-sync-a.phares.duckdns.org;
root /mnt/free-file-sync/1-Images-A;
location / {
autoindex on;
disable_symlinks on;
autoindex_format json;
}
}

View File

@ -10,35 +10,36 @@ server {
try_files $uri $uri.html $uri/ =404;
}
}
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # https://192.168.0.31/
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # https://192.168.0.43/
include /etc/nginx/include/jmlc.conf; # https://*.jmlc.duckdns.org # https://192.168.0.42/
include /etc/nginx/include/sumco.conf; # https://*.sumco.duckdns.org # https://192.168.0.41/
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # https://192.168.0.31
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # https://192.168.0.43
include /etc/nginx/include/jmlc.conf; # https://*.jmlc.duckdns.org # https://192.168.0.42
include /etc/nginx/include/sumco.conf; # https://*.sumco.duckdns.org # https://192.168.0.41
#
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:5014/
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/
include /etc/nginx/include/beszel.conf; # https://beszel.phares.duckdns.org # http://192.168.11.2:5023/
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http:5014
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http:8001
include /etc/nginx/include/beszel.conf; # https://beszel.phares.duckdns.org # http:5023
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http:5012
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https:9090
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http:9400
include /etc/nginx/include/dorico.conf; # https://dorico.phares.duckdns.org # /home/lphares/dorico
include /etc/nginx/include/dotnet-sdk-8.conf; # https://dotnet-sdk-8.phares.duckdns.org # http://192.168.11.2:5027/
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # http://192.168.11.2:5800/
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/
include /etc/nginx/include/gotify.conf; # https://gotify.phares.duckdns.org # http://192.168.11.2:5016/
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/
include /etc/nginx/include/kanbn-to-quartz.conf; # https://kanbn-to-quartz.phares.duckdns.org # http://192.168.11.2:5024/
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/
include /etc/nginx/include/original-to-deterministic-hash-code.conf; # https://original-to-deterministic.phares.duckdns.org # http://192.168.11.2:5025/
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/
include /etc/nginx/include/dotnet-sdk-8.conf; # https://dotnet-sdk-8.phares.duckdns.org # http:5027
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # https:5800
include /etc/nginx/include/free-file-sync.conf; # https://free-file-sync.phares.duckdns.org # /mnt/free-file-sync
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http:3000
include /etc/nginx/include/gotify.conf; # https://gotify.phares.duckdns.org # http:5016
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http:5010
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http:5009
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http:3001
include /etc/nginx/include/kanbn-to-quartz.conf; # https://kanbn-to-quartz.phares.duckdns.org # http:5024
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https:3004
include /etc/nginx/include/original-to-deterministic-hash-code.conf; # https://original-to-deterministic.phares.duckdns.org # http:5025
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https:5007
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https:5008
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https:5008
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http:8000
#
# ssh root@free.file.sync.root -p 22 -i C:/Users/phares/.ssh/id_ed25519
# ssh root@free.file.sync.root -p 5026 -i C:/Users/phares/.ssh/id_ed25519
# ssh root@phares.duckdns.org -p 22 -i C:/Users/phares/.ssh/id_ed25519
# ssh root@phares.duckdns.org -p 5026 -i C:/Users/phares/.ssh/id_ed25519

View File

@ -1,9 +1,9 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Service for snap application adguard-home.adguard-home
Requires=snap-adguard\x2dhome-7701.mount
Requires=snap-adguard\x2dhome-7793.mount
Wants=network.target
After=snap-adguard\x2dhome-7701.mount network.target snapd.apparmor.service
After=snap-adguard\x2dhome-7793.mount network.target snapd.apparmor.service
X-Snappy=yes
[Service]
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run adguard-home
SyslogIdentifier=adguard-home.adguard-home
Restart=always
WorkingDirectory=/var/snap/adguard-home/7701
WorkingDirectory=/var/snap/adguard-home/7793
TimeoutStopSec=30
Type=simple

View File

@ -1,16 +0,0 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Service for snap application certbot.renew
Requires=snap-certbot-4412.mount
Wants=network.target
After=snap-certbot-4412.mount network.target snapd.apparmor.service
X-Snappy=yes
[Service]
EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run --timer="00:00~24:00/2" certbot.renew
SyslogIdentifier=certbot.renew
Restart=no
WorkingDirectory=/var/snap/certbot/4412
TimeoutStopSec=30
Type=oneshot

View File

@ -1,14 +0,0 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Timer renew for snap application certbot.renew
Requires=snap-certbot-4412.mount
After=snap-certbot-4412.mount
X-Snappy=yes
[Timer]
Unit=snap.certbot.renew.service
OnCalendar=*-*-* 09:38
OnCalendar=*-*-* 20:24
[Install]
WantedBy=timers.target

View File

@ -1,6 +1,12 @@
[Container]
AutoUpdate=registry
ContainerName=firefox
Environment="DARK_MODE=1"
Environment="SECURE_CONNECTION=1"
Environment="WEB_AUTHENTICATION=1"
Environment="VNC_PASSWORD=Remember65"
Environment="WEB_AUTHENTICATION_USERNAME=phares"
Environment="WEB_AUTHENTICATION_PASSWORD=Remember65"
Environment="FF_OPEN_URL=https://192.168.11.1"
Image=docker.io/jlesage/firefox:v24.11.1
# Network=firefox.network
@ -36,11 +42,12 @@ PodmanArgs=--add-host=vaultwarden.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=warden.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=ha.sumco.duckdns.org:192.168.0.41
PodmanArgs=--add-host=nginx.sumco.duckdns.org:192.168.0.41
PodmanArgs=--add-host=ha.bchs.duckdns.org:192.168.0.41
PodmanArgs=--add-host=nginx.bchs.duckdns.org:192.168.0.41
PodmanArgs=--add-host=ha.bchs.duckdns.org:192.168.0.43
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=firefox-data.volume:/config:rw
Volume=/home/podman/wild-phares/fullchain.cer:/config/certs/web-fullchain.pem:ro
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/config/certs/web-privkey.pem:ro
[Service]
Restart=no

View File

@ -1,5 +1,5 @@
# DO NOT EDIT THIS FILE - edit the master and reinstall.
# (/tmp/crontab.fOmbMr/crontab installed on Wed Feb 12 16:28:17 2025)
# (/tmp/crontab.hZ90WN/crontab installed on Mon Feb 17 10:11:58 2025)
# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
# DO NOT EDIT THIS FILE - edit the master and reinstall.
# (/tmp/crontab.35buNM/crontab installed on Tue Dec 3 13:24:22 2024)
@ -40,3 +40,5 @@
# 21 12 * * * podman volume export systemd-2fauth-server-data --output /home/podman/cron-backup/phares-2fauth-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
#
22 12 * * * podman volume export systemd-beszel-server-data --output /home/podman/cron-backup/phares-systemd-beszel-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
#
*/30 * * * * podman pause firefox