diff --git a/.vscode/settings.json b/.vscode/settings.json index b100527..398e1b2 100644 --- a/.vscode/settings.json +++ b/.vscode/settings.json @@ -6,12 +6,27 @@ }, "cSpell.words": [ "ASPNETCORE", + "bchs", + "blinko", + "dashkiosk", + "dockge", + "docmost", "duckdns", "gitea", + "gogs", "immich", "journalctl", + "kestra", + "linkwarden", "localtime", + "neko", + "odoo", + "pgadmin", "phares", - "usersecrets" + "umbrel", + "usersecrets", + "vaultwarden", + "wekan", + "xandikos" ] } \ No newline at end of file diff --git a/etc/nginx/include/immichtoslideshow.conf b/etc/nginx/include/blinko.conf similarity index 64% rename from etc/nginx/include/immichtoslideshow.conf rename to etc/nginx/include/blinko.conf index beaa815..db9edbb 100644 --- a/etc/nginx/include/immichtoslideshow.conf +++ b/etc/nginx/include/blinko.conf @@ -1,18 +1,19 @@ server { - # touch /etc/nginx/include/immichtoslideshow.phares.duckdns.org - # openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immichtoslideshow.phares.duckdns.org.key -out /etc/nginx/include/immichtoslideshow.phares.duckdns.org.crt -config /etc/nginx/include/immichtoslideshow.phares.duckdns.org + # touch /etc/nginx/include/blinko.phares.duckdns.org + # openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/blinko.phares.duckdns.org.key -out /etc/nginx/include/blinko.phares.duckdns.org.crt -config /etc/nginx/include/blinko.phares.duckdns.org ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer; # ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer; ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key; ssl_protocols TLSv1.2 TLSv1.3; listen 443 ssl http2; - server_name immichtoslideshow.phares.duckdns.org; + server_name blinko.phares.duckdns.org; + client_max_body_size 5000m; location / { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-Proto $scheme; - proxy_pass http://192.168.11.2:5009/; + proxy_pass http://192.168.11.2:5012/; proxy_read_timeout 600s; proxy_send_timeout 600s; } diff --git a/etc/nginx/include/immich-kiosk.conf b/etc/nginx/include/immich-kiosk.conf new file mode 100644 index 0000000..3691238 --- /dev/null +++ b/etc/nginx/include/immich-kiosk.conf @@ -0,0 +1,20 @@ +server { + # touch /etc/nginx/include/immich-kiosk.phares.duckdns.org + # openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich-kiosk.phares.duckdns.org.key -out /etc/nginx/include/immich-kiosk.phares.duckdns.org.crt -config /etc/nginx/include/immich-kiosk.phares.duckdns.org + ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer; + # ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer; + ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key; + ssl_protocols TLSv1.2 TLSv1.3; + listen 443 ssl http2; + server_name immich-kiosk.phares.duckdns.org; + location / { + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_pass http://192.168.11.2:5010/; + proxy_read_timeout 600s; + proxy_send_timeout 600s; + add_header Access-Control-Allow-Origin *; + } +} \ No newline at end of file diff --git a/etc/nginx/include/linkwarden.conf b/etc/nginx/include/linkwarden.conf new file mode 100644 index 0000000..f6c1183 --- /dev/null +++ b/etc/nginx/include/linkwarden.conf @@ -0,0 +1,20 @@ +server { + # touch /etc/nginx/include/linkwarden.phares.duckdns.org + # openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/linkwarden.phares.duckdns.org.key -out /etc/nginx/include/linkwarden.phares.duckdns.org.crt -config /etc/nginx/include/linkwarden.phares.duckdns.org + ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer; + # ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer; + ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key; + ssl_protocols TLSv1.2 TLSv1.3; + listen 443 ssl http2; + server_name linkwarden.phares.duckdns.org; + client_max_body_size 5000m; + location / { + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_pass http://192.168.11.2:5011/; + proxy_read_timeout 600s; + proxy_send_timeout 600s; + } +} \ No newline at end of file diff --git a/etc/nginx/include/mattermost.conf b/etc/nginx/include/mattermost.conf index df32873..3a85e20 100644 --- a/etc/nginx/include/mattermost.conf +++ b/etc/nginx/include/mattermost.conf @@ -8,6 +8,21 @@ server { listen 443 ssl http2; server_name mattermost.phares.duckdns.org; # add_header X-Early-Data $tls1_3_early_data; + location / { + # https://mattermost.m1k1o.net/#/getting-started/reverse-proxy + client_max_body_size 100M; + proxy_set_header Connection ""; + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header X-Frame-Options SAMEORIGIN; + proxy_buffers 256 16k; + proxy_buffer_size 16k; + proxy_read_timeout 600s; + proxy_http_version 1.1; + proxy_pass https://192.168.11.2:8443/; + } location ~ /api/v[0-9]+/(users/)?websocket$ { proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; @@ -28,19 +43,4 @@ server { proxy_http_version 1.1; proxy_pass https://192.168.11.2:8443; } - location / { - # https://mattermost.m1k1o.net/#/getting-started/reverse-proxy - client_max_body_size 100M; - proxy_set_header Connection ""; - proxy_set_header Host $host; - proxy_set_header X-Real-IP $remote_addr; - proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; - proxy_set_header X-Forwarded-Proto $scheme; - proxy_set_header X-Frame-Options SAMEORIGIN; - proxy_buffers 256 16k; - proxy_buffer_size 16k; - proxy_read_timeout 600s; - proxy_http_version 1.1; - proxy_pass https://192.168.11.2:8443; - } } \ No newline at end of file diff --git a/etc/nginx/include/neko.conf b/etc/nginx/include/neko.conf index 60ec1af..0b07a58 100644 --- a/etc/nginx/include/neko.conf +++ b/etc/nginx/include/neko.conf @@ -9,7 +9,7 @@ server { server_name neko.phares.duckdns.org; location / { # https://neko.m1k1o.net/#/getting-started/reverse-proxy - proxy_pass http://192.168.11.2:8082; + proxy_pass http://192.168.11.2:8082/; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; diff --git a/etc/nginx/sites-available/default b/etc/nginx/sites-available/default index bf5fd43..e797dd1 100644 --- a/etc/nginx/sites-available/default +++ b/etc/nginx/sites-available/default @@ -1,51 +1,40 @@ -# include /etc/nginx/include/ansible.conf; # https://ansible.phares.duckdns.org # https://192.168.11.2/; -# include /etc/nginx/include/assistant.conf; # https://assistant.phares.duckdns.org # http://192.168.11.2:5001/; -# include /etc/nginx/include/casa.conf; # https://casa.phares.duckdns.org # http://10.131.57.60/; -# include /etc/nginx/include/chat.conf; # https://chat.phares.duckdns.org # https://192.168.0.31:5001/; -# include /etc/nginx/include/codeserver.conf; # https://codeserver.phares.duckdns.org # http://192.168.11.2:5007/; -# include /etc/nginx/include/diskstation.conf; # https://diskstation.phares.duckdns.org # https://192.168.0.31:5001/; -# include /etc/nginx/include/dockge.conf; # https://dockge.phares.duckdns.org # http://192.168.11.2:5001/; -# include /etc/nginx/include/docmost.conf; # https://docmost.phares.duckdns.org # http://192.168.11.2:5006/; -# include /etc/nginx/include/drive.conf; # https://drive.phares.duckdns.org # https://192.168.0.31:5001/; -# include /etc/nginx/include/emby.conf; # https://emby.phares.duckdns.org # http://10.131.57.134:8096/; -# include /etc/nginx/include/filebrowser.conf; # https://filebrowser.phares.duckdns.org # http://192.168.11.2:8080/; -# include /etc/nginx/include/gogs.conf; # https://gogs.phares.duckdns.org # http://192.168.11.2:3000/; -# include /etc/nginx/include/incus.conf; # https://incus.phares.duckdns.org # http://192.168.11.2:5004/; -# include /etc/nginx/include/invoice.conf; # https://invoice.phares.duckdns.org # https://192.168.11.2/; -# include /etc/nginx/include/kestra.conf; # https://kestra.phares.duckdns.org # http://192.168.11.2:5002/; -# include /etc/nginx/include/lxconsole.conf; # https://lxconsole.phares.duckdns.org # http://192.168.11.2:5004/; -# include /etc/nginx/include/nextcloud.conf; # https://nextcloud.phares.duckdns.org # http://192.168.11.2:8081/; -# include /etc/nginx/include/owncast.conf; # https://owncast.phares.duckdns.org # http://10.131.57.141:8080/; -# include /etc/nginx/include/photoprism.conf; # https://photoprism.phares.duckdns.org # http://192.168.11.2:2342/; -# include /etc/nginx/include/photos.conf; # https://photos.phares.duckdns.org # https://192.168.0.31:5001/; -# include /etc/nginx/include/pihole.conf; # https://pihole.phares.duckdns.org # http://192.168.11.2:8005/admin/; -# include /etc/nginx/include/proxmox.conf; # https://proxmox.phares.duckdns.org # https://192.168.11.2:8006/; -# include /etc/nginx/include/readeck.conf; # https://readeck.phares.duckdns.org # http://192.168.11.2:8000/; -# include /etc/nginx/include/terraform.conf; # https://terraform.phares.duckdns.org # http://192.168.11.2:5001/; -# include /etc/nginx/include/traccar.conf; # https://traccar.phares.duckdns.org # http://192.168.11.2:3000/; -# include /etc/nginx/include/umbrel.conf; # https://umbrel.phares.duckdns.org # http://192.168.11.20/; -# include /etc/nginx/include/vscodium.conf; # https://vscodium.phares.duckdns.org # http://10.131.57.190:3000/; -# include /etc/nginx/include/wekan.conf; # https://wekan.phares.duckdns.org # http://192.168.11.2:5003/; -include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:3002/; -include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # https://192.168.11.2/; -include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/; -include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # https://192.168.11.2/; -include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://192.168.11.2:9090/; -include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/; -include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # https://192.168.11.2:5800/; -include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/; -include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:2283/; -include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.affirm.duckdns.org # https://192.168.31.12:5009/; -include /etc/nginx/include/immichtoslideshow.conf; # https://immichtoslideshow.affirm.duckdns.org # https://192.168.31.12:5009/; -include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/; -include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/; -include /etc/nginx/include/neko.conf; # https://neko.phares.duckdns.org # http://192.168.11.2:8082/; -include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/; -include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/; -include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # http://192.168.11.2:8083/; -include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # http://192.168.11.2:8084/; -include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # http://192.168.11.2:8080/; -include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/; -include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/; -include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/; +include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:3002/ +include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # /var/www/html-affirm +include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/ +include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # /var/www/html-bchs +include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/ +include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/ +include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/ +include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # http://192.168.11.2:5800/ +include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/ +include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/ +include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/ +include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/ +include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/ +include /etc/nginx/include/linkwarden.conf; # https://linkwarden.phares.duckdns.org # http://192.168.11.2:5011/ +include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/ +include /etc/nginx/include/neko.conf; # https://neko.phares.duckdns.org # http://192.168.11.2:8082/ +include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/ +include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/ +include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx +include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz +include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow +include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/ +include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/ +include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/ +server { + # touch /etc/nginx/include/phares.duckdns.org + # openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/phares.duckdns.org.key -out /etc/nginx/include/phares.duckdns.org.crt -config /etc/nginx/include/phares.duckdns.org + ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer; + # ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer; + ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key; + ssl_protocols TLSv1.2 TLSv1.3; + listen 443 ssl http2; + server_name *.phares.duckdns.org; + root /var/www/html-nginx; + index index.nginx-debian.html; + location / { + try_files $uri $uri.html $uri/ =404; + } +} # ssh root@free.file.sync.root -i C:/Users/phares/.ssh/id_ed25519 \ No newline at end of file diff --git a/etc/systemd/system/snap.adguard-home.adguard-home.service b/etc/systemd/system/snap.adguard-home.adguard-home.service index a9d82c1..a9c2447 100644 --- a/etc/systemd/system/snap.adguard-home.adguard-home.service +++ b/etc/systemd/system/snap.adguard-home.adguard-home.service @@ -1,9 +1,9 @@ [Unit] # Auto-generated, DO NOT EDIT Description=Service for snap application adguard-home.adguard-home -Requires=snap-adguard\x2dhome-7470.mount +Requires=snap-adguard\x2dhome-7577.mount Wants=network.target -After=snap-adguard\x2dhome-7470.mount network.target snapd.apparmor.service +After=snap-adguard\x2dhome-7577.mount network.target snapd.apparmor.service X-Snappy=yes [Service] @@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment ExecStart=/usr/bin/snap run adguard-home SyslogIdentifier=adguard-home.adguard-home Restart=always -WorkingDirectory=/var/snap/adguard-home/7470 +WorkingDirectory=/var/snap/adguard-home/7577 TimeoutStopSec=30 Type=simple diff --git a/etc/systemd/system/snap.certbot.renew.timer b/etc/systemd/system/snap.certbot.renew.timer index fb457d8..3496f8d 100644 --- a/etc/systemd/system/snap.certbot.renew.timer +++ b/etc/systemd/system/snap.certbot.renew.timer @@ -7,8 +7,8 @@ X-Snappy=yes [Timer] Unit=snap.certbot.renew.service -OnCalendar=*-*-* 11:49 -OnCalendar=*-*-* 16:30 +OnCalendar=*-*-* 06:46 +OnCalendar=*-*-* 14:10 [Install] WantedBy=timers.target diff --git a/etc/systemd/system/snap.vaultwarden.vaultwarden.service b/etc/systemd/system/snap.vaultwarden.vaultwarden.service index 9aaac05..6a141db 100644 --- a/etc/systemd/system/snap.vaultwarden.vaultwarden.service +++ b/etc/systemd/system/snap.vaultwarden.vaultwarden.service @@ -1,9 +1,9 @@ [Unit] # Auto-generated, DO NOT EDIT Description=Service for snap application vaultwarden.vaultwarden -Requires=snap-vaultwarden-143.mount +Requires=snap-vaultwarden-155.mount Wants=network.target -After=snap-vaultwarden-143.mount network.target snapd.apparmor.service +After=snap-vaultwarden-155.mount network.target snapd.apparmor.service X-Snappy=yes [Service] @@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment ExecStart=/usr/bin/snap run vaultwarden SyslogIdentifier=vaultwarden.vaultwarden Restart=on-failure -WorkingDirectory=/var/snap/vaultwarden/143 +WorkingDirectory=/var/snap/vaultwarden/155 TimeoutStopSec=30 Type=simple diff --git a/home/podman/.config/containers/systemd/vaultwarden-server-data.volume b/home/podman/.config/containers/systemd/blinko-db-data.volume similarity index 100% rename from home/podman/.config/containers/systemd/vaultwarden-server-data.volume rename to home/podman/.config/containers/systemd/blinko-db-data.volume diff --git a/home/podman/.config/containers/systemd/blinko-db.container b/home/podman/.config/containers/systemd/blinko-db.container new file mode 100644 index 0000000..74f1e27 --- /dev/null +++ b/home/podman/.config/containers/systemd/blinko-db.container @@ -0,0 +1,32 @@ +[Container] +AutoUpdate=registry +ContainerName=blinko-db +Environment="POSTGRES_DB=blinko" +Environment="POSTGRES_PASSWORD=PmjIIip4vIKGr19rGOoG" +Environment="POSTGRES_USER=postgres" +Image=docker.io/postgres:14 +# Network=blinko.network +# Pod=blinko.pod +PublishPort=5438:5432 +Volume=blinko-db-data.volume:/var/lib/postgresql/data:Z + +[Service] +Restart=no + +[Install] +WantedBy=multi-user.target default.target + +# podman pull docker.io/postgres:14 +# systemctl --user daemon-reload +# systemctl --user start blinko-db +# systemctl --user status blinko-db +# journalctl -fu blinko-db.service +# podman logs blinko-db +# systemctl --user stop blinko-db +# systemctl --user disable blinko-db +# podman exec -ti blinko-db /bin/sh +# podman exec -ti blinko-db /bin/bash +# Image=docker.io/library/postgres:16 +# podman pull docker.io/library/postgres:16 +# file: 'extension.c', line: '543', routine: 'parse_extension_control_file' +# https://github.com/blinko-app/blinko/discussions/6792 \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/blinko-server-data.volume b/home/podman/.config/containers/systemd/blinko-server-data.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/blinko-server-data.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/blinko-server.container b/home/podman/.config/containers/systemd/blinko-server.container new file mode 100644 index 0000000..0a99ddd --- /dev/null +++ b/home/podman/.config/containers/systemd/blinko-server.container @@ -0,0 +1,33 @@ +[Container] +AutoUpdate=registry +ContainerName=blinko-server +Environment="DATABASE_URL=postgresql://postgres:PmjIIip4vIKGr19rGOoG@192.168.11.2:5438/blinko" +Environment="NEXTAUTH_SECRET=tKFFshr8tMHoXRAA8jxS" +Environment="NODE_ENV=production" +Image=docker.io/blinkospace/blinko:latest +# Network=blinko.network +# Pod=blinko.pod +PublishPort=5012:1111 +Volume=/etc/localtime:/etc/localtime:ro +Volume=blinko-server-data.volume:/data/data:Z + +[Service] +Restart=no + +[Unit] +Requires=blinko-db.service +After=blinko-db.service + +[Install] +WantedBy=multi-user.target default.target + +# podman pull docker.io/blinkospace/blinko:latest +# systemctl --user daemon-reload +# systemctl --user start blinko-server +# systemctl --user status blinko-server --lines=9999 +# journalctl -fu blinko-server.service +# podman logs blinko-server +# systemctl --user stop blinko-server +# systemctl --user disable blinko-server +# podman exec -ti blinko-server /bin/sh +# podman exec -ti blinko-server /bin/bash diff --git a/home/podman/.config/containers/systemd/immich-kiosk.container b/home/podman/.config/containers/systemd/immich-kiosk.container new file mode 100644 index 0000000..c01954e --- /dev/null +++ b/home/podman/.config/containers/systemd/immich-kiosk.container @@ -0,0 +1,83 @@ +[Container] +AutoUpdate=registry +ContainerName=immich-kiosk + +Environment="TZ=America/Phoenix" +# Required settings +Environment="KIOSK_IMMICH_API_KEY=fLJoRERkcmFuSviMaAfsuINmvyXLFKu9HIICXP8I" +Environment="KIOSK_IMMICH_URL=http://192.168.11.2:3001" +# Clock +Environment="KIOSK_SHOW_TIME=true" +Environment="KIOSK_TIME_FORMAT=12" +Environment="KIOSK_SHOW_DATE=true" +Environment="KIOSK_DATE_FORMAT=MM/DD/YYYY" +# Kiosk behaviour +Environment="KIOSK_REFRESH=15" +Environment="KIOSK_DISABLE_SCREENSAVER=false" +# Asset sources +Environment="KIOSK_SHOW_ARCHIVED=false" +# Environment="KIOSK_ALBUM=ALBUM_ID,ALBUM_ID,ALBUM_ID" +# Environment="KIOSK_PERSON=PERSON_ID,PERSON_ID,PERSON_ID" +# UI +Environment="KIOSK_DISABLE_UI=false" +Environment="KIOSK_FRAMELESS=false" +Environment="KIOSK_HIDE_CURSOR=false" +Environment="KIOSK_FONT_SIZE=100" +Environment="KIOSK_BACKGROUND_BLUR=true" +Environment="KIOSK_THEME=fade" +Environment="KIOSK_LAYOUT=single" +# Sleep mode +# KIOSK_SLEEP_START=22" +# KIOSK_SLEEP_END=7" +# Transition options +Environment="KIOSK_TRANSITION=none" +Environment="KIOSK_FADE_TRANSITION_DURATION=1" +Environment="KIOSK_CROSS_FADE_TRANSITION_DURATION=1" +# Image display settings +Environment="KIOSK_SHOW_PROGRESS=false" +Environment="KIOSK_IMAGE_FIT=none" +Environment="KIOSK_IMAGE_EFFECT=zoom" +Environment="KIOSK_IMAGE_EFFECT_AMOUNT=12" +Environment="KIOSK_USE_ORIGINAL_IMAGE=false" +# Image metadata +Environment="KIOSK_SHOW_IMAGE_TIME=true" +Environment="KIOSK_IMAGE_TIME_FORMAT=12" +Environment="KIOSK_SHOW_IMAGE_DATE=true" +Environment="KIOSK_IMAGE_DATE_FORMAT=MM/DD/YYYY" +Environment="KIOSK_SHOW_IMAGE_DESCRIPTION=false" +Environment="KIOSK_SHOW_IMAGE_EXIF=true" +Environment="KIOSK_SHOW_IMAGE_LOCATION=true" +# Environment="KIOSK_HIDE_COUNTRIES=HIDDEN_COUNTRY,HIDDEN_COUNTRY" +Environment="KIOSK_SHOW_IMAGE_ID=true" +# Kiosk settings +Environment="KIOSK_WATCH_CONFIG=false" +Environment="KIOSK_FETCHED_ASSETS_SIZE=1000" +Environment="KIOSK_HTTP_TIMEOUT=20" +Environment="KIOSK_PASSWORD=" +Environment="KIOSK_CACHE=true" +Environment="KIOSK_PREFETCH=true" +Environment="KIOSK_ASSET_WEIGHTING=true" +Environment="KIOSK_PORT=3000" +Image=docker.io/damongolding/immich-kiosk:latest +# Network=immich-kiosk.network +# Pod=immich-kiosk.pod +PublishPort=5010:3000 +Volume=/etc/localtime:/etc/localtime:ro +Volume=/etc/timezone:/etc/timezone:ro + +[Service] +Restart=no + +[Install] +WantedBy=multi-user.target default.target + +# podman pull docker.io/damongolding/immich-kiosk:latest +# systemctl --user daemon-reload +# systemctl --user start immich-kiosk +# systemctl --user status immich-kiosk +# journalctl -fu immich-kiosk.service +# podman logs immich-kiosk +# systemctl --user stop immich-kiosk +# systemctl --user disable immich-kiosk +# podman exec -ti immich-kiosk /bin/sh +# podman exec -ti immich-kiosk /bin/bash diff --git a/home/podman/.config/containers/systemd/immich-to-slideshow-server.container b/home/podman/.config/containers/systemd/immich-to-slideshow-server.container index d867c7a..1b236dd 100644 --- a/home/podman/.config/containers/systemd/immich-to-slideshow-server.container +++ b/home/podman/.config/containers/systemd/immich-to-slideshow-server.container @@ -9,8 +9,9 @@ PublishPort=5009:5001 Volume=/etc/localtime:/etc/localtime:ro Volume=/etc/timezone:/etc/timezone:ro Volume=immich-server-upload.volume:/app/immich:ro +Volume=/var/www/html-slideshow/slideshow:/app/sync:rw Volume=/var/www/html-slideshow/slideshow/random-results:/app/random-results:rw -Volume=/var/www/html-slideshow/slideshow/5f0b1052-466d-44de-a554-226d7256850d:/app/sync:rw +Volume=/mnt/free-file-sync/6-Other-Large-Z/Current-Results:/app/current-results:rw # Volume=/home/podman/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da:/~/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da:ro Volume=/home/podman/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da/secrets.json:/app/secrets.json:ro diff --git a/home/podman/.config/containers/systemd/linkwarden-db-data.volume b/home/podman/.config/containers/systemd/linkwarden-db-data.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/linkwarden-db-data.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/linkwarden-db.container b/home/podman/.config/containers/systemd/linkwarden-db.container new file mode 100644 index 0000000..4a1f84b --- /dev/null +++ b/home/podman/.config/containers/systemd/linkwarden-db.container @@ -0,0 +1,32 @@ +[Container] +AutoUpdate=registry +ContainerName=linkwarden-db +Environment="POSTGRES_DB=linkwarden" +Environment="POSTGRES_PASSWORD=postgres" +Environment="POSTGRES_USER=postgres" +Image=docker.io/postgres:16-alpine +# Network=linkwarden.network +# Pod=linkwarden.pod +PublishPort=5437:5432 +Volume=linkwarden-db-data.volume:/var/lib/postgresql/data:Z + +[Service] +Restart=no + +[Install] +WantedBy=multi-user.target default.target + +# podman pull docker.io/postgres:16-alpine +# systemctl --user daemon-reload +# systemctl --user start linkwarden-db +# systemctl --user status linkwarden-db +# journalctl -fu linkwarden-db.service +# podman logs linkwarden-db +# systemctl --user stop linkwarden-db +# systemctl --user disable linkwarden-db +# podman exec -ti linkwarden-db /bin/sh +# podman exec -ti linkwarden-db /bin/bash +# Image=docker.io/library/postgres:16 +# podman pull docker.io/library/postgres:16 +# file: 'extension.c', line: '543', routine: 'parse_extension_control_file' +# https://github.com/linkwarden-app/linkwarden/discussions/6792 \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/linkwarden-server-data.volume b/home/podman/.config/containers/systemd/linkwarden-server-data.volume new file mode 100644 index 0000000..a153d05 --- /dev/null +++ b/home/podman/.config/containers/systemd/linkwarden-server-data.volume @@ -0,0 +1 @@ +[Volume] \ No newline at end of file diff --git a/home/podman/.config/containers/systemd/linkwarden-server.container b/home/podman/.config/containers/systemd/linkwarden-server.container new file mode 100644 index 0000000..09d3b2e --- /dev/null +++ b/home/podman/.config/containers/systemd/linkwarden-server.container @@ -0,0 +1,34 @@ +[Container] +AutoUpdate=registry +ContainerName=linkwarden-server +Environment="DATABASE_URL=postgresql://postgres:postgres@192.168.11.2:5437/linkwarden" +Environment="NEXTAUTH_SECRET=BP3BnWf17S1I7tyxCbLO3" +Environment="NEXTAUTH_URL=https://linkwarden.phares.duckdns.org/api/v1/auth" +Environment="POSTGRES_PASSWORD=postgres" +Image=ghcr.io/linkwarden/linkwarden:latest +# Network=linkwarden.network +# Pod=linkwarden.pod +PublishPort=5011:3000 +Volume=/etc/localtime:/etc/localtime:ro +Volume=linkwarden-server-data.volume:/data/data:Z + +[Service] +Restart=no + +[Unit] +Requires=linkwarden-db.service +After=linkwarden-db.service + +[Install] +WantedBy=multi-user.target default.target + +# podman pull ghcr.io/linkwarden/linkwarden:latest +# systemctl --user daemon-reload +# systemctl --user start linkwarden-server +# systemctl --user status linkwarden-server --lines=9999 +# journalctl -fu linkwarden-server.service +# podman logs linkwarden-server +# systemctl --user stop linkwarden-server +# systemctl --user disable linkwarden-server +# podman exec -ti linkwarden-server /bin/sh +# podman exec -ti linkwarden-server /bin/bash diff --git a/home/podman/.config/containers/systemd/mattermost-server.container b/home/podman/.config/containers/systemd/mattermost-server.container index 49827db..0feccc3 100644 --- a/home/podman/.config/containers/systemd/mattermost-server.container +++ b/home/podman/.config/containers/systemd/mattermost-server.container @@ -7,11 +7,16 @@ Environment="MM_SERVICESETTINGS_SITEURL=https://mattermost.phares.duckdns.org" Environment="MM_SQLSETTINGS_DATASOURCE=postgres://mmuser:mmuser_password@192.168.11.2:5436/mattermost?sslmode=disable&connect_timeout=10" Environment="MM_SQLSETTINGS_DRIVERNAME=postgres" Environment="TZ=US/Arizona" -Image=docker.io/mattermost/mattermost-team-edition:9.11.2 +# HealthCmd="curl -f http://192.168.11.2:8443/api/v4/system/ping || exit 1" +# HealthCmd="curl -f https://mattermost.phares.duckdns.org/api/v4/system/ping || exit 1" +HealthCmd="ls" +# Image=docker.io/mattermost/mattermost-team-edition:9.11.2 +Image=docker.io/mattermost/mattermost-team-edition:release-10.3 # Network=mattermost.network # Pod=mattermost.pod # PublishPort=8065:8065 -PublishPort=8443:8443 +# PublishPort=8443:8443 +PublishPort=8443:8065 Volume=/etc/localtime:/etc/localtime:ro Volume=/etc/timezone:/etc/timezone:ro Volume=mattermost-server-bleve.volume:/mattermost/bleve-indexes:rw @@ -32,10 +37,11 @@ Requires=mattermost-db.service [Install] WantedBy=multi-user.target default.target +# podman pull docker.io/mattermost/mattermost-team-edition:release-10.3 # podman pull docker.io/mattermost/mattermost-team-edition:9.11.2 # systemctl --user daemon-reload # systemctl --user start mattermost-server -# systemctl --user status mattermost-server +# systemctl --user status mattermost-server --lines=999 # journalctl -fu mattermost-server.service # podman logs mattermost-server # systemctl --user stop mattermost-server diff --git a/home/podman/.config/containers/systemd/traccar-server.container b/home/podman/.config/containers/systemd/traccar-server.container new file mode 100644 index 0000000..b77a495 --- /dev/null +++ b/home/podman/.config/containers/systemd/traccar-server.container @@ -0,0 +1,33 @@ +[Container] +AutoUpdate=registry +ContainerName=traccar-server +Image=docker.io/traccar/traccar:latest +# Network=traccar.network +# Pod=traccar.pod +PublishPort=5011:8082 +# PublishPort=5000-5150:5000-5150 +# PublishPort=5000-5150:5000-5150/udp +Volume=/etc/localtime:/etc/localtime:ro +Volume=/etc/timezone:/etc/timezone:ro +Volume=/opt/traccar/logs:/opt/traccar/logs:rw +Volume=/opt/traccar/traccar.xml:/opt/traccar/conf/traccar.xml:rw + +[Service] +Restart=no + +# [Unit] +# Requires=traccar-db.service + +[Install] +WantedBy=multi-user.target default.target + +# podman pull docker.io/traccar/traccar:latest +# systemctl --user daemon-reload +# systemctl --user start traccar-server +# systemctl --user status traccar-server --lines=999 +# journalctl -fu traccar-server.service +# podman logs traccar-server +# systemctl --user stop traccar-server +# systemctl --user disable traccar-server +# podman exec -ti traccar-server /bin/sh +# podman exec -ti traccar-server /bin/bash