This commit is contained in:
Mike Phares 2024-12-23 08:37:05 -07:00
parent f851fe93bf
commit 70f6c099a9
22 changed files with 385 additions and 83 deletions

17
.vscode/settings.json vendored
View File

@ -6,12 +6,27 @@
},
"cSpell.words": [
"ASPNETCORE",
"bchs",
"blinko",
"dashkiosk",
"dockge",
"docmost",
"duckdns",
"gitea",
"gogs",
"immich",
"journalctl",
"kestra",
"linkwarden",
"localtime",
"neko",
"odoo",
"pgadmin",
"phares",
"usersecrets"
"umbrel",
"usersecrets",
"vaultwarden",
"wekan",
"xandikos"
]
}

View File

@ -1,18 +1,19 @@
server {
# touch /etc/nginx/include/immichtoslideshow.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immichtoslideshow.phares.duckdns.org.key -out /etc/nginx/include/immichtoslideshow.phares.duckdns.org.crt -config /etc/nginx/include/immichtoslideshow.phares.duckdns.org
# touch /etc/nginx/include/blinko.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/blinko.phares.duckdns.org.key -out /etc/nginx/include/blinko.phares.duckdns.org.crt -config /etc/nginx/include/blinko.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name immichtoslideshow.phares.duckdns.org;
server_name blinko.phares.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5009/;
proxy_pass http://192.168.11.2:5012/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}

View File

@ -0,0 +1,20 @@
server {
# touch /etc/nginx/include/immich-kiosk.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich-kiosk.phares.duckdns.org.key -out /etc/nginx/include/immich-kiosk.phares.duckdns.org.crt -config /etc/nginx/include/immich-kiosk.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name immich-kiosk.phares.duckdns.org;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5010/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
add_header Access-Control-Allow-Origin *;
}
}

View File

@ -0,0 +1,20 @@
server {
# touch /etc/nginx/include/linkwarden.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/linkwarden.phares.duckdns.org.key -out /etc/nginx/include/linkwarden.phares.duckdns.org.crt -config /etc/nginx/include/linkwarden.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name linkwarden.phares.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5011/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}

View File

@ -8,6 +8,21 @@ server {
listen 443 ssl http2;
server_name mattermost.phares.duckdns.org;
# add_header X-Early-Data $tls1_3_early_data;
location / {
# https://mattermost.m1k1o.net/#/getting-started/reverse-proxy
client_max_body_size 100M;
proxy_set_header Connection "";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Frame-Options SAMEORIGIN;
proxy_buffers 256 16k;
proxy_buffer_size 16k;
proxy_read_timeout 600s;
proxy_http_version 1.1;
proxy_pass https://192.168.11.2:8443/;
}
location ~ /api/v[0-9]+/(users/)?websocket$ {
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
@ -28,19 +43,4 @@ server {
proxy_http_version 1.1;
proxy_pass https://192.168.11.2:8443;
}
location / {
# https://mattermost.m1k1o.net/#/getting-started/reverse-proxy
client_max_body_size 100M;
proxy_set_header Connection "";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Frame-Options SAMEORIGIN;
proxy_buffers 256 16k;
proxy_buffer_size 16k;
proxy_read_timeout 600s;
proxy_http_version 1.1;
proxy_pass https://192.168.11.2:8443;
}
}

View File

@ -9,7 +9,7 @@ server {
server_name neko.phares.duckdns.org;
location / {
# https://neko.m1k1o.net/#/getting-started/reverse-proxy
proxy_pass http://192.168.11.2:8082;
proxy_pass http://192.168.11.2:8082/;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";

View File

@ -1,51 +1,40 @@
# include /etc/nginx/include/ansible.conf; # https://ansible.phares.duckdns.org # https://192.168.11.2/;
# include /etc/nginx/include/assistant.conf; # https://assistant.phares.duckdns.org # http://192.168.11.2:5001/;
# include /etc/nginx/include/casa.conf; # https://casa.phares.duckdns.org # http://10.131.57.60/;
# include /etc/nginx/include/chat.conf; # https://chat.phares.duckdns.org # https://192.168.0.31:5001/;
# include /etc/nginx/include/codeserver.conf; # https://codeserver.phares.duckdns.org # http://192.168.11.2:5007/;
# include /etc/nginx/include/diskstation.conf; # https://diskstation.phares.duckdns.org # https://192.168.0.31:5001/;
# include /etc/nginx/include/dockge.conf; # https://dockge.phares.duckdns.org # http://192.168.11.2:5001/;
# include /etc/nginx/include/docmost.conf; # https://docmost.phares.duckdns.org # http://192.168.11.2:5006/;
# include /etc/nginx/include/drive.conf; # https://drive.phares.duckdns.org # https://192.168.0.31:5001/;
# include /etc/nginx/include/emby.conf; # https://emby.phares.duckdns.org # http://10.131.57.134:8096/;
# include /etc/nginx/include/filebrowser.conf; # https://filebrowser.phares.duckdns.org # http://192.168.11.2:8080/;
# include /etc/nginx/include/gogs.conf; # https://gogs.phares.duckdns.org # http://192.168.11.2:3000/;
# include /etc/nginx/include/incus.conf; # https://incus.phares.duckdns.org # http://192.168.11.2:5004/;
# include /etc/nginx/include/invoice.conf; # https://invoice.phares.duckdns.org # https://192.168.11.2/;
# include /etc/nginx/include/kestra.conf; # https://kestra.phares.duckdns.org # http://192.168.11.2:5002/;
# include /etc/nginx/include/lxconsole.conf; # https://lxconsole.phares.duckdns.org # http://192.168.11.2:5004/;
# include /etc/nginx/include/nextcloud.conf; # https://nextcloud.phares.duckdns.org # http://192.168.11.2:8081/;
# include /etc/nginx/include/owncast.conf; # https://owncast.phares.duckdns.org # http://10.131.57.141:8080/;
# include /etc/nginx/include/photoprism.conf; # https://photoprism.phares.duckdns.org # http://192.168.11.2:2342/;
# include /etc/nginx/include/photos.conf; # https://photos.phares.duckdns.org # https://192.168.0.31:5001/;
# include /etc/nginx/include/pihole.conf; # https://pihole.phares.duckdns.org # http://192.168.11.2:8005/admin/;
# include /etc/nginx/include/proxmox.conf; # https://proxmox.phares.duckdns.org # https://192.168.11.2:8006/;
# include /etc/nginx/include/readeck.conf; # https://readeck.phares.duckdns.org # http://192.168.11.2:8000/;
# include /etc/nginx/include/terraform.conf; # https://terraform.phares.duckdns.org # http://192.168.11.2:5001/;
# include /etc/nginx/include/traccar.conf; # https://traccar.phares.duckdns.org # http://192.168.11.2:3000/;
# include /etc/nginx/include/umbrel.conf; # https://umbrel.phares.duckdns.org # http://192.168.11.20/;
# include /etc/nginx/include/vscodium.conf; # https://vscodium.phares.duckdns.org # http://10.131.57.190:3000/;
# include /etc/nginx/include/wekan.conf; # https://wekan.phares.duckdns.org # http://192.168.11.2:5003/;
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:3002/;
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # https://192.168.11.2/;
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/;
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # https://192.168.11.2/;
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://192.168.11.2:9090/;
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/;
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # https://192.168.11.2:5800/;
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/;
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:2283/;
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.affirm.duckdns.org # https://192.168.31.12:5009/;
include /etc/nginx/include/immichtoslideshow.conf; # https://immichtoslideshow.affirm.duckdns.org # https://192.168.31.12:5009/;
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/;
include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/;
include /etc/nginx/include/neko.conf; # https://neko.phares.duckdns.org # http://192.168.11.2:8082/;
include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/;
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/;
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # http://192.168.11.2:8083/;
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # http://192.168.11.2:8084/;
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # http://192.168.11.2:8080/;
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/;
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/;
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/;
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:3002/
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # /var/www/html-affirm
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # /var/www/html-bchs
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # http://192.168.11.2:5800/
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/
include /etc/nginx/include/linkwarden.conf; # https://linkwarden.phares.duckdns.org # http://192.168.11.2:5011/
include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/
include /etc/nginx/include/neko.conf; # https://neko.phares.duckdns.org # http://192.168.11.2:8082/
include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/
server {
# touch /etc/nginx/include/phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/phares.duckdns.org.key -out /etc/nginx/include/phares.duckdns.org.crt -config /etc/nginx/include/phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.phares.duckdns.org;
root /var/www/html-nginx;
index index.nginx-debian.html;
location / {
try_files $uri $uri.html $uri/ =404;
}
}
# ssh root@free.file.sync.root -i C:/Users/phares/.ssh/id_ed25519

View File

@ -1,9 +1,9 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Service for snap application adguard-home.adguard-home
Requires=snap-adguard\x2dhome-7470.mount
Requires=snap-adguard\x2dhome-7577.mount
Wants=network.target
After=snap-adguard\x2dhome-7470.mount network.target snapd.apparmor.service
After=snap-adguard\x2dhome-7577.mount network.target snapd.apparmor.service
X-Snappy=yes
[Service]
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run adguard-home
SyslogIdentifier=adguard-home.adguard-home
Restart=always
WorkingDirectory=/var/snap/adguard-home/7470
WorkingDirectory=/var/snap/adguard-home/7577
TimeoutStopSec=30
Type=simple

View File

@ -7,8 +7,8 @@ X-Snappy=yes
[Timer]
Unit=snap.certbot.renew.service
OnCalendar=*-*-* 11:49
OnCalendar=*-*-* 16:30
OnCalendar=*-*-* 06:46
OnCalendar=*-*-* 14:10
[Install]
WantedBy=timers.target

View File

@ -1,9 +1,9 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Service for snap application vaultwarden.vaultwarden
Requires=snap-vaultwarden-143.mount
Requires=snap-vaultwarden-155.mount
Wants=network.target
After=snap-vaultwarden-143.mount network.target snapd.apparmor.service
After=snap-vaultwarden-155.mount network.target snapd.apparmor.service
X-Snappy=yes
[Service]
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run vaultwarden
SyslogIdentifier=vaultwarden.vaultwarden
Restart=on-failure
WorkingDirectory=/var/snap/vaultwarden/143
WorkingDirectory=/var/snap/vaultwarden/155
TimeoutStopSec=30
Type=simple

View File

@ -0,0 +1,32 @@
[Container]
AutoUpdate=registry
ContainerName=blinko-db
Environment="POSTGRES_DB=blinko"
Environment="POSTGRES_PASSWORD=PmjIIip4vIKGr19rGOoG"
Environment="POSTGRES_USER=postgres"
Image=docker.io/postgres:14
# Network=blinko.network
# Pod=blinko.pod
PublishPort=5438:5432
Volume=blinko-db-data.volume:/var/lib/postgresql/data:Z
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/postgres:14
# systemctl --user daemon-reload
# systemctl --user start blinko-db
# systemctl --user status blinko-db
# journalctl -fu blinko-db.service
# podman logs blinko-db
# systemctl --user stop blinko-db
# systemctl --user disable blinko-db
# podman exec -ti blinko-db /bin/sh
# podman exec -ti blinko-db /bin/bash
# Image=docker.io/library/postgres:16
# podman pull docker.io/library/postgres:16
# file: 'extension.c', line: '543', routine: 'parse_extension_control_file'
# https://github.com/blinko-app/blinko/discussions/6792

View File

@ -0,0 +1 @@
[Volume]

View File

@ -0,0 +1,33 @@
[Container]
AutoUpdate=registry
ContainerName=blinko-server
Environment="DATABASE_URL=postgresql://postgres:PmjIIip4vIKGr19rGOoG@192.168.11.2:5438/blinko"
Environment="NEXTAUTH_SECRET=tKFFshr8tMHoXRAA8jxS"
Environment="NODE_ENV=production"
Image=docker.io/blinkospace/blinko:latest
# Network=blinko.network
# Pod=blinko.pod
PublishPort=5012:1111
Volume=/etc/localtime:/etc/localtime:ro
Volume=blinko-server-data.volume:/data/data:Z
[Service]
Restart=no
[Unit]
Requires=blinko-db.service
After=blinko-db.service
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/blinkospace/blinko:latest
# systemctl --user daemon-reload
# systemctl --user start blinko-server
# systemctl --user status blinko-server --lines=9999
# journalctl -fu blinko-server.service
# podman logs blinko-server
# systemctl --user stop blinko-server
# systemctl --user disable blinko-server
# podman exec -ti blinko-server /bin/sh
# podman exec -ti blinko-server /bin/bash

View File

@ -0,0 +1,83 @@
[Container]
AutoUpdate=registry
ContainerName=immich-kiosk
Environment="TZ=America/Phoenix"
# Required settings
Environment="KIOSK_IMMICH_API_KEY=fLJoRERkcmFuSviMaAfsuINmvyXLFKu9HIICXP8I"
Environment="KIOSK_IMMICH_URL=http://192.168.11.2:3001"
# Clock
Environment="KIOSK_SHOW_TIME=true"
Environment="KIOSK_TIME_FORMAT=12"
Environment="KIOSK_SHOW_DATE=true"
Environment="KIOSK_DATE_FORMAT=MM/DD/YYYY"
# Kiosk behaviour
Environment="KIOSK_REFRESH=15"
Environment="KIOSK_DISABLE_SCREENSAVER=false"
# Asset sources
Environment="KIOSK_SHOW_ARCHIVED=false"
# Environment="KIOSK_ALBUM=ALBUM_ID,ALBUM_ID,ALBUM_ID"
# Environment="KIOSK_PERSON=PERSON_ID,PERSON_ID,PERSON_ID"
# UI
Environment="KIOSK_DISABLE_UI=false"
Environment="KIOSK_FRAMELESS=false"
Environment="KIOSK_HIDE_CURSOR=false"
Environment="KIOSK_FONT_SIZE=100"
Environment="KIOSK_BACKGROUND_BLUR=true"
Environment="KIOSK_THEME=fade"
Environment="KIOSK_LAYOUT=single"
# Sleep mode
# KIOSK_SLEEP_START=22"
# KIOSK_SLEEP_END=7"
# Transition options
Environment="KIOSK_TRANSITION=none"
Environment="KIOSK_FADE_TRANSITION_DURATION=1"
Environment="KIOSK_CROSS_FADE_TRANSITION_DURATION=1"
# Image display settings
Environment="KIOSK_SHOW_PROGRESS=false"
Environment="KIOSK_IMAGE_FIT=none"
Environment="KIOSK_IMAGE_EFFECT=zoom"
Environment="KIOSK_IMAGE_EFFECT_AMOUNT=12"
Environment="KIOSK_USE_ORIGINAL_IMAGE=false"
# Image metadata
Environment="KIOSK_SHOW_IMAGE_TIME=true"
Environment="KIOSK_IMAGE_TIME_FORMAT=12"
Environment="KIOSK_SHOW_IMAGE_DATE=true"
Environment="KIOSK_IMAGE_DATE_FORMAT=MM/DD/YYYY"
Environment="KIOSK_SHOW_IMAGE_DESCRIPTION=false"
Environment="KIOSK_SHOW_IMAGE_EXIF=true"
Environment="KIOSK_SHOW_IMAGE_LOCATION=true"
# Environment="KIOSK_HIDE_COUNTRIES=HIDDEN_COUNTRY,HIDDEN_COUNTRY"
Environment="KIOSK_SHOW_IMAGE_ID=true"
# Kiosk settings
Environment="KIOSK_WATCH_CONFIG=false"
Environment="KIOSK_FETCHED_ASSETS_SIZE=1000"
Environment="KIOSK_HTTP_TIMEOUT=20"
Environment="KIOSK_PASSWORD="
Environment="KIOSK_CACHE=true"
Environment="KIOSK_PREFETCH=true"
Environment="KIOSK_ASSET_WEIGHTING=true"
Environment="KIOSK_PORT=3000"
Image=docker.io/damongolding/immich-kiosk:latest
# Network=immich-kiosk.network
# Pod=immich-kiosk.pod
PublishPort=5010:3000
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/damongolding/immich-kiosk:latest
# systemctl --user daemon-reload
# systemctl --user start immich-kiosk
# systemctl --user status immich-kiosk
# journalctl -fu immich-kiosk.service
# podman logs immich-kiosk
# systemctl --user stop immich-kiosk
# systemctl --user disable immich-kiosk
# podman exec -ti immich-kiosk /bin/sh
# podman exec -ti immich-kiosk /bin/bash

View File

@ -9,8 +9,9 @@ PublishPort=5009:5001
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=immich-server-upload.volume:/app/immich:ro
Volume=/var/www/html-slideshow/slideshow:/app/sync:rw
Volume=/var/www/html-slideshow/slideshow/random-results:/app/random-results:rw
Volume=/var/www/html-slideshow/slideshow/5f0b1052-466d-44de-a554-226d7256850d:/app/sync:rw
Volume=/mnt/free-file-sync/6-Other-Large-Z/Current-Results:/app/current-results:rw
# Volume=/home/podman/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da:/~/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da:ro
Volume=/home/podman/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da/secrets.json:/app/secrets.json:ro

View File

@ -0,0 +1 @@
[Volume]

View File

@ -0,0 +1,32 @@
[Container]
AutoUpdate=registry
ContainerName=linkwarden-db
Environment="POSTGRES_DB=linkwarden"
Environment="POSTGRES_PASSWORD=postgres"
Environment="POSTGRES_USER=postgres"
Image=docker.io/postgres:16-alpine
# Network=linkwarden.network
# Pod=linkwarden.pod
PublishPort=5437:5432
Volume=linkwarden-db-data.volume:/var/lib/postgresql/data:Z
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/postgres:16-alpine
# systemctl --user daemon-reload
# systemctl --user start linkwarden-db
# systemctl --user status linkwarden-db
# journalctl -fu linkwarden-db.service
# podman logs linkwarden-db
# systemctl --user stop linkwarden-db
# systemctl --user disable linkwarden-db
# podman exec -ti linkwarden-db /bin/sh
# podman exec -ti linkwarden-db /bin/bash
# Image=docker.io/library/postgres:16
# podman pull docker.io/library/postgres:16
# file: 'extension.c', line: '543', routine: 'parse_extension_control_file'
# https://github.com/linkwarden-app/linkwarden/discussions/6792

View File

@ -0,0 +1 @@
[Volume]

View File

@ -0,0 +1,34 @@
[Container]
AutoUpdate=registry
ContainerName=linkwarden-server
Environment="DATABASE_URL=postgresql://postgres:postgres@192.168.11.2:5437/linkwarden"
Environment="NEXTAUTH_SECRET=BP3BnWf17S1I7tyxCbLO3"
Environment="NEXTAUTH_URL=https://linkwarden.phares.duckdns.org/api/v1/auth"
Environment="POSTGRES_PASSWORD=postgres"
Image=ghcr.io/linkwarden/linkwarden:latest
# Network=linkwarden.network
# Pod=linkwarden.pod
PublishPort=5011:3000
Volume=/etc/localtime:/etc/localtime:ro
Volume=linkwarden-server-data.volume:/data/data:Z
[Service]
Restart=no
[Unit]
Requires=linkwarden-db.service
After=linkwarden-db.service
[Install]
WantedBy=multi-user.target default.target
# podman pull ghcr.io/linkwarden/linkwarden:latest
# systemctl --user daemon-reload
# systemctl --user start linkwarden-server
# systemctl --user status linkwarden-server --lines=9999
# journalctl -fu linkwarden-server.service
# podman logs linkwarden-server
# systemctl --user stop linkwarden-server
# systemctl --user disable linkwarden-server
# podman exec -ti linkwarden-server /bin/sh
# podman exec -ti linkwarden-server /bin/bash

View File

@ -7,11 +7,16 @@ Environment="MM_SERVICESETTINGS_SITEURL=https://mattermost.phares.duckdns.org"
Environment="MM_SQLSETTINGS_DATASOURCE=postgres://mmuser:mmuser_password@192.168.11.2:5436/mattermost?sslmode=disable&connect_timeout=10"
Environment="MM_SQLSETTINGS_DRIVERNAME=postgres"
Environment="TZ=US/Arizona"
Image=docker.io/mattermost/mattermost-team-edition:9.11.2
# HealthCmd="curl -f http://192.168.11.2:8443/api/v4/system/ping || exit 1"
# HealthCmd="curl -f https://mattermost.phares.duckdns.org/api/v4/system/ping || exit 1"
HealthCmd="ls"
# Image=docker.io/mattermost/mattermost-team-edition:9.11.2
Image=docker.io/mattermost/mattermost-team-edition:release-10.3
# Network=mattermost.network
# Pod=mattermost.pod
# PublishPort=8065:8065
PublishPort=8443:8443
# PublishPort=8443:8443
PublishPort=8443:8065
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=mattermost-server-bleve.volume:/mattermost/bleve-indexes:rw
@ -32,10 +37,11 @@ Requires=mattermost-db.service
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/mattermost/mattermost-team-edition:release-10.3
# podman pull docker.io/mattermost/mattermost-team-edition:9.11.2
# systemctl --user daemon-reload
# systemctl --user start mattermost-server
# systemctl --user status mattermost-server
# systemctl --user status mattermost-server --lines=999
# journalctl -fu mattermost-server.service
# podman logs mattermost-server
# systemctl --user stop mattermost-server

View File

@ -0,0 +1,33 @@
[Container]
AutoUpdate=registry
ContainerName=traccar-server
Image=docker.io/traccar/traccar:latest
# Network=traccar.network
# Pod=traccar.pod
PublishPort=5011:8082
# PublishPort=5000-5150:5000-5150
# PublishPort=5000-5150:5000-5150/udp
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=/opt/traccar/logs:/opt/traccar/logs:rw
Volume=/opt/traccar/traccar.xml:/opt/traccar/conf/traccar.xml:rw
[Service]
Restart=no
# [Unit]
# Requires=traccar-db.service
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/traccar/traccar:latest
# systemctl --user daemon-reload
# systemctl --user start traccar-server
# systemctl --user status traccar-server --lines=999
# journalctl -fu traccar-server.service
# podman logs traccar-server
# systemctl --user stop traccar-server
# systemctl --user disable traccar-server
# podman exec -ti traccar-server /bin/sh
# podman exec -ti traccar-server /bin/bash