12-23
This commit is contained in:
parent
f851fe93bf
commit
70f6c099a9
17
.vscode/settings.json
vendored
17
.vscode/settings.json
vendored
@ -6,12 +6,27 @@
|
||||
},
|
||||
"cSpell.words": [
|
||||
"ASPNETCORE",
|
||||
"bchs",
|
||||
"blinko",
|
||||
"dashkiosk",
|
||||
"dockge",
|
||||
"docmost",
|
||||
"duckdns",
|
||||
"gitea",
|
||||
"gogs",
|
||||
"immich",
|
||||
"journalctl",
|
||||
"kestra",
|
||||
"linkwarden",
|
||||
"localtime",
|
||||
"neko",
|
||||
"odoo",
|
||||
"pgadmin",
|
||||
"phares",
|
||||
"usersecrets"
|
||||
"umbrel",
|
||||
"usersecrets",
|
||||
"vaultwarden",
|
||||
"wekan",
|
||||
"xandikos"
|
||||
]
|
||||
}
|
@ -1,18 +1,19 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/immichtoslideshow.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immichtoslideshow.phares.duckdns.org.key -out /etc/nginx/include/immichtoslideshow.phares.duckdns.org.crt -config /etc/nginx/include/immichtoslideshow.phares.duckdns.org
|
||||
# touch /etc/nginx/include/blinko.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/blinko.phares.duckdns.org.key -out /etc/nginx/include/blinko.phares.duckdns.org.crt -config /etc/nginx/include/blinko.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name immichtoslideshow.phares.duckdns.org;
|
||||
server_name blinko.phares.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5009/;
|
||||
proxy_pass http://192.168.11.2:5012/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
20
etc/nginx/include/immich-kiosk.conf
Normal file
20
etc/nginx/include/immich-kiosk.conf
Normal file
@ -0,0 +1,20 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/immich-kiosk.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich-kiosk.phares.duckdns.org.key -out /etc/nginx/include/immich-kiosk.phares.duckdns.org.crt -config /etc/nginx/include/immich-kiosk.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name immich-kiosk.phares.duckdns.org;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5010/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
add_header Access-Control-Allow-Origin *;
|
||||
}
|
||||
}
|
20
etc/nginx/include/linkwarden.conf
Normal file
20
etc/nginx/include/linkwarden.conf
Normal file
@ -0,0 +1,20 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/linkwarden.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/linkwarden.phares.duckdns.org.key -out /etc/nginx/include/linkwarden.phares.duckdns.org.crt -config /etc/nginx/include/linkwarden.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name linkwarden.phares.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5011/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
@ -8,6 +8,21 @@ server {
|
||||
listen 443 ssl http2;
|
||||
server_name mattermost.phares.duckdns.org;
|
||||
# add_header X-Early-Data $tls1_3_early_data;
|
||||
location / {
|
||||
# https://mattermost.m1k1o.net/#/getting-started/reverse-proxy
|
||||
client_max_body_size 100M;
|
||||
proxy_set_header Connection "";
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header X-Frame-Options SAMEORIGIN;
|
||||
proxy_buffers 256 16k;
|
||||
proxy_buffer_size 16k;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_http_version 1.1;
|
||||
proxy_pass https://192.168.11.2:8443/;
|
||||
}
|
||||
location ~ /api/v[0-9]+/(users/)?websocket$ {
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
@ -28,19 +43,4 @@ server {
|
||||
proxy_http_version 1.1;
|
||||
proxy_pass https://192.168.11.2:8443;
|
||||
}
|
||||
location / {
|
||||
# https://mattermost.m1k1o.net/#/getting-started/reverse-proxy
|
||||
client_max_body_size 100M;
|
||||
proxy_set_header Connection "";
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header X-Frame-Options SAMEORIGIN;
|
||||
proxy_buffers 256 16k;
|
||||
proxy_buffer_size 16k;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_http_version 1.1;
|
||||
proxy_pass https://192.168.11.2:8443;
|
||||
}
|
||||
}
|
@ -9,7 +9,7 @@ server {
|
||||
server_name neko.phares.duckdns.org;
|
||||
location / {
|
||||
# https://neko.m1k1o.net/#/getting-started/reverse-proxy
|
||||
proxy_pass http://192.168.11.2:8082;
|
||||
proxy_pass http://192.168.11.2:8082/;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
|
@ -1,51 +1,40 @@
|
||||
# include /etc/nginx/include/ansible.conf; # https://ansible.phares.duckdns.org # https://192.168.11.2/;
|
||||
# include /etc/nginx/include/assistant.conf; # https://assistant.phares.duckdns.org # http://192.168.11.2:5001/;
|
||||
# include /etc/nginx/include/casa.conf; # https://casa.phares.duckdns.org # http://10.131.57.60/;
|
||||
# include /etc/nginx/include/chat.conf; # https://chat.phares.duckdns.org # https://192.168.0.31:5001/;
|
||||
# include /etc/nginx/include/codeserver.conf; # https://codeserver.phares.duckdns.org # http://192.168.11.2:5007/;
|
||||
# include /etc/nginx/include/diskstation.conf; # https://diskstation.phares.duckdns.org # https://192.168.0.31:5001/;
|
||||
# include /etc/nginx/include/dockge.conf; # https://dockge.phares.duckdns.org # http://192.168.11.2:5001/;
|
||||
# include /etc/nginx/include/docmost.conf; # https://docmost.phares.duckdns.org # http://192.168.11.2:5006/;
|
||||
# include /etc/nginx/include/drive.conf; # https://drive.phares.duckdns.org # https://192.168.0.31:5001/;
|
||||
# include /etc/nginx/include/emby.conf; # https://emby.phares.duckdns.org # http://10.131.57.134:8096/;
|
||||
# include /etc/nginx/include/filebrowser.conf; # https://filebrowser.phares.duckdns.org # http://192.168.11.2:8080/;
|
||||
# include /etc/nginx/include/gogs.conf; # https://gogs.phares.duckdns.org # http://192.168.11.2:3000/;
|
||||
# include /etc/nginx/include/incus.conf; # https://incus.phares.duckdns.org # http://192.168.11.2:5004/;
|
||||
# include /etc/nginx/include/invoice.conf; # https://invoice.phares.duckdns.org # https://192.168.11.2/;
|
||||
# include /etc/nginx/include/kestra.conf; # https://kestra.phares.duckdns.org # http://192.168.11.2:5002/;
|
||||
# include /etc/nginx/include/lxconsole.conf; # https://lxconsole.phares.duckdns.org # http://192.168.11.2:5004/;
|
||||
# include /etc/nginx/include/nextcloud.conf; # https://nextcloud.phares.duckdns.org # http://192.168.11.2:8081/;
|
||||
# include /etc/nginx/include/owncast.conf; # https://owncast.phares.duckdns.org # http://10.131.57.141:8080/;
|
||||
# include /etc/nginx/include/photoprism.conf; # https://photoprism.phares.duckdns.org # http://192.168.11.2:2342/;
|
||||
# include /etc/nginx/include/photos.conf; # https://photos.phares.duckdns.org # https://192.168.0.31:5001/;
|
||||
# include /etc/nginx/include/pihole.conf; # https://pihole.phares.duckdns.org # http://192.168.11.2:8005/admin/;
|
||||
# include /etc/nginx/include/proxmox.conf; # https://proxmox.phares.duckdns.org # https://192.168.11.2:8006/;
|
||||
# include /etc/nginx/include/readeck.conf; # https://readeck.phares.duckdns.org # http://192.168.11.2:8000/;
|
||||
# include /etc/nginx/include/terraform.conf; # https://terraform.phares.duckdns.org # http://192.168.11.2:5001/;
|
||||
# include /etc/nginx/include/traccar.conf; # https://traccar.phares.duckdns.org # http://192.168.11.2:3000/;
|
||||
# include /etc/nginx/include/umbrel.conf; # https://umbrel.phares.duckdns.org # http://192.168.11.20/;
|
||||
# include /etc/nginx/include/vscodium.conf; # https://vscodium.phares.duckdns.org # http://10.131.57.190:3000/;
|
||||
# include /etc/nginx/include/wekan.conf; # https://wekan.phares.duckdns.org # http://192.168.11.2:5003/;
|
||||
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:3002/;
|
||||
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # https://192.168.11.2/;
|
||||
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/;
|
||||
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # https://192.168.11.2/;
|
||||
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://192.168.11.2:9090/;
|
||||
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/;
|
||||
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # https://192.168.11.2:5800/;
|
||||
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/;
|
||||
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:2283/;
|
||||
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.affirm.duckdns.org # https://192.168.31.12:5009/;
|
||||
include /etc/nginx/include/immichtoslideshow.conf; # https://immichtoslideshow.affirm.duckdns.org # https://192.168.31.12:5009/;
|
||||
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/;
|
||||
include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/;
|
||||
include /etc/nginx/include/neko.conf; # https://neko.phares.duckdns.org # http://192.168.11.2:8082/;
|
||||
include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/;
|
||||
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/;
|
||||
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # http://192.168.11.2:8083/;
|
||||
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # http://192.168.11.2:8084/;
|
||||
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # http://192.168.11.2:8080/;
|
||||
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/;
|
||||
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/;
|
||||
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/;
|
||||
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:3002/
|
||||
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # /var/www/html-affirm
|
||||
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/
|
||||
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # /var/www/html-bchs
|
||||
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/
|
||||
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/
|
||||
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/
|
||||
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # http://192.168.11.2:5800/
|
||||
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/
|
||||
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/
|
||||
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/
|
||||
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/
|
||||
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/
|
||||
include /etc/nginx/include/linkwarden.conf; # https://linkwarden.phares.duckdns.org # http://192.168.11.2:5011/
|
||||
include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/
|
||||
include /etc/nginx/include/neko.conf; # https://neko.phares.duckdns.org # http://192.168.11.2:8082/
|
||||
include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/
|
||||
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/
|
||||
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
|
||||
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
|
||||
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
|
||||
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/
|
||||
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/
|
||||
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/
|
||||
server {
|
||||
# touch /etc/nginx/include/phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/phares.duckdns.org.key -out /etc/nginx/include/phares.duckdns.org.crt -config /etc/nginx/include/phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name *.phares.duckdns.org;
|
||||
root /var/www/html-nginx;
|
||||
index index.nginx-debian.html;
|
||||
location / {
|
||||
try_files $uri $uri.html $uri/ =404;
|
||||
}
|
||||
}
|
||||
# ssh root@free.file.sync.root -i C:/Users/phares/.ssh/id_ed25519
|
@ -1,9 +1,9 @@
|
||||
[Unit]
|
||||
# Auto-generated, DO NOT EDIT
|
||||
Description=Service for snap application adguard-home.adguard-home
|
||||
Requires=snap-adguard\x2dhome-7470.mount
|
||||
Requires=snap-adguard\x2dhome-7577.mount
|
||||
Wants=network.target
|
||||
After=snap-adguard\x2dhome-7470.mount network.target snapd.apparmor.service
|
||||
After=snap-adguard\x2dhome-7577.mount network.target snapd.apparmor.service
|
||||
X-Snappy=yes
|
||||
|
||||
[Service]
|
||||
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
|
||||
ExecStart=/usr/bin/snap run adguard-home
|
||||
SyslogIdentifier=adguard-home.adguard-home
|
||||
Restart=always
|
||||
WorkingDirectory=/var/snap/adguard-home/7470
|
||||
WorkingDirectory=/var/snap/adguard-home/7577
|
||||
TimeoutStopSec=30
|
||||
Type=simple
|
||||
|
||||
|
@ -7,8 +7,8 @@ X-Snappy=yes
|
||||
|
||||
[Timer]
|
||||
Unit=snap.certbot.renew.service
|
||||
OnCalendar=*-*-* 11:49
|
||||
OnCalendar=*-*-* 16:30
|
||||
OnCalendar=*-*-* 06:46
|
||||
OnCalendar=*-*-* 14:10
|
||||
|
||||
[Install]
|
||||
WantedBy=timers.target
|
||||
|
@ -1,9 +1,9 @@
|
||||
[Unit]
|
||||
# Auto-generated, DO NOT EDIT
|
||||
Description=Service for snap application vaultwarden.vaultwarden
|
||||
Requires=snap-vaultwarden-143.mount
|
||||
Requires=snap-vaultwarden-155.mount
|
||||
Wants=network.target
|
||||
After=snap-vaultwarden-143.mount network.target snapd.apparmor.service
|
||||
After=snap-vaultwarden-155.mount network.target snapd.apparmor.service
|
||||
X-Snappy=yes
|
||||
|
||||
[Service]
|
||||
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
|
||||
ExecStart=/usr/bin/snap run vaultwarden
|
||||
SyslogIdentifier=vaultwarden.vaultwarden
|
||||
Restart=on-failure
|
||||
WorkingDirectory=/var/snap/vaultwarden/143
|
||||
WorkingDirectory=/var/snap/vaultwarden/155
|
||||
TimeoutStopSec=30
|
||||
Type=simple
|
||||
|
||||
|
32
home/podman/.config/containers/systemd/blinko-db.container
Normal file
32
home/podman/.config/containers/systemd/blinko-db.container
Normal file
@ -0,0 +1,32 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
ContainerName=blinko-db
|
||||
Environment="POSTGRES_DB=blinko"
|
||||
Environment="POSTGRES_PASSWORD=PmjIIip4vIKGr19rGOoG"
|
||||
Environment="POSTGRES_USER=postgres"
|
||||
Image=docker.io/postgres:14
|
||||
# Network=blinko.network
|
||||
# Pod=blinko.pod
|
||||
PublishPort=5438:5432
|
||||
Volume=blinko-db-data.volume:/var/lib/postgresql/data:Z
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/postgres:14
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start blinko-db
|
||||
# systemctl --user status blinko-db
|
||||
# journalctl -fu blinko-db.service
|
||||
# podman logs blinko-db
|
||||
# systemctl --user stop blinko-db
|
||||
# systemctl --user disable blinko-db
|
||||
# podman exec -ti blinko-db /bin/sh
|
||||
# podman exec -ti blinko-db /bin/bash
|
||||
# Image=docker.io/library/postgres:16
|
||||
# podman pull docker.io/library/postgres:16
|
||||
# file: 'extension.c', line: '543', routine: 'parse_extension_control_file'
|
||||
# https://github.com/blinko-app/blinko/discussions/6792
|
@ -0,0 +1 @@
|
||||
[Volume]
|
@ -0,0 +1,33 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
ContainerName=blinko-server
|
||||
Environment="DATABASE_URL=postgresql://postgres:PmjIIip4vIKGr19rGOoG@192.168.11.2:5438/blinko"
|
||||
Environment="NEXTAUTH_SECRET=tKFFshr8tMHoXRAA8jxS"
|
||||
Environment="NODE_ENV=production"
|
||||
Image=docker.io/blinkospace/blinko:latest
|
||||
# Network=blinko.network
|
||||
# Pod=blinko.pod
|
||||
PublishPort=5012:1111
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=blinko-server-data.volume:/data/data:Z
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Unit]
|
||||
Requires=blinko-db.service
|
||||
After=blinko-db.service
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/blinkospace/blinko:latest
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start blinko-server
|
||||
# systemctl --user status blinko-server --lines=9999
|
||||
# journalctl -fu blinko-server.service
|
||||
# podman logs blinko-server
|
||||
# systemctl --user stop blinko-server
|
||||
# systemctl --user disable blinko-server
|
||||
# podman exec -ti blinko-server /bin/sh
|
||||
# podman exec -ti blinko-server /bin/bash
|
@ -0,0 +1,83 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
ContainerName=immich-kiosk
|
||||
|
||||
Environment="TZ=America/Phoenix"
|
||||
# Required settings
|
||||
Environment="KIOSK_IMMICH_API_KEY=fLJoRERkcmFuSviMaAfsuINmvyXLFKu9HIICXP8I"
|
||||
Environment="KIOSK_IMMICH_URL=http://192.168.11.2:3001"
|
||||
# Clock
|
||||
Environment="KIOSK_SHOW_TIME=true"
|
||||
Environment="KIOSK_TIME_FORMAT=12"
|
||||
Environment="KIOSK_SHOW_DATE=true"
|
||||
Environment="KIOSK_DATE_FORMAT=MM/DD/YYYY"
|
||||
# Kiosk behaviour
|
||||
Environment="KIOSK_REFRESH=15"
|
||||
Environment="KIOSK_DISABLE_SCREENSAVER=false"
|
||||
# Asset sources
|
||||
Environment="KIOSK_SHOW_ARCHIVED=false"
|
||||
# Environment="KIOSK_ALBUM=ALBUM_ID,ALBUM_ID,ALBUM_ID"
|
||||
# Environment="KIOSK_PERSON=PERSON_ID,PERSON_ID,PERSON_ID"
|
||||
# UI
|
||||
Environment="KIOSK_DISABLE_UI=false"
|
||||
Environment="KIOSK_FRAMELESS=false"
|
||||
Environment="KIOSK_HIDE_CURSOR=false"
|
||||
Environment="KIOSK_FONT_SIZE=100"
|
||||
Environment="KIOSK_BACKGROUND_BLUR=true"
|
||||
Environment="KIOSK_THEME=fade"
|
||||
Environment="KIOSK_LAYOUT=single"
|
||||
# Sleep mode
|
||||
# KIOSK_SLEEP_START=22"
|
||||
# KIOSK_SLEEP_END=7"
|
||||
# Transition options
|
||||
Environment="KIOSK_TRANSITION=none"
|
||||
Environment="KIOSK_FADE_TRANSITION_DURATION=1"
|
||||
Environment="KIOSK_CROSS_FADE_TRANSITION_DURATION=1"
|
||||
# Image display settings
|
||||
Environment="KIOSK_SHOW_PROGRESS=false"
|
||||
Environment="KIOSK_IMAGE_FIT=none"
|
||||
Environment="KIOSK_IMAGE_EFFECT=zoom"
|
||||
Environment="KIOSK_IMAGE_EFFECT_AMOUNT=12"
|
||||
Environment="KIOSK_USE_ORIGINAL_IMAGE=false"
|
||||
# Image metadata
|
||||
Environment="KIOSK_SHOW_IMAGE_TIME=true"
|
||||
Environment="KIOSK_IMAGE_TIME_FORMAT=12"
|
||||
Environment="KIOSK_SHOW_IMAGE_DATE=true"
|
||||
Environment="KIOSK_IMAGE_DATE_FORMAT=MM/DD/YYYY"
|
||||
Environment="KIOSK_SHOW_IMAGE_DESCRIPTION=false"
|
||||
Environment="KIOSK_SHOW_IMAGE_EXIF=true"
|
||||
Environment="KIOSK_SHOW_IMAGE_LOCATION=true"
|
||||
# Environment="KIOSK_HIDE_COUNTRIES=HIDDEN_COUNTRY,HIDDEN_COUNTRY"
|
||||
Environment="KIOSK_SHOW_IMAGE_ID=true"
|
||||
# Kiosk settings
|
||||
Environment="KIOSK_WATCH_CONFIG=false"
|
||||
Environment="KIOSK_FETCHED_ASSETS_SIZE=1000"
|
||||
Environment="KIOSK_HTTP_TIMEOUT=20"
|
||||
Environment="KIOSK_PASSWORD="
|
||||
Environment="KIOSK_CACHE=true"
|
||||
Environment="KIOSK_PREFETCH=true"
|
||||
Environment="KIOSK_ASSET_WEIGHTING=true"
|
||||
Environment="KIOSK_PORT=3000"
|
||||
Image=docker.io/damongolding/immich-kiosk:latest
|
||||
# Network=immich-kiosk.network
|
||||
# Pod=immich-kiosk.pod
|
||||
PublishPort=5010:3000
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/damongolding/immich-kiosk:latest
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start immich-kiosk
|
||||
# systemctl --user status immich-kiosk
|
||||
# journalctl -fu immich-kiosk.service
|
||||
# podman logs immich-kiosk
|
||||
# systemctl --user stop immich-kiosk
|
||||
# systemctl --user disable immich-kiosk
|
||||
# podman exec -ti immich-kiosk /bin/sh
|
||||
# podman exec -ti immich-kiosk /bin/bash
|
@ -9,8 +9,9 @@ PublishPort=5009:5001
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
Volume=immich-server-upload.volume:/app/immich:ro
|
||||
Volume=/var/www/html-slideshow/slideshow:/app/sync:rw
|
||||
Volume=/var/www/html-slideshow/slideshow/random-results:/app/random-results:rw
|
||||
Volume=/var/www/html-slideshow/slideshow/5f0b1052-466d-44de-a554-226d7256850d:/app/sync:rw
|
||||
Volume=/mnt/free-file-sync/6-Other-Large-Z/Current-Results:/app/current-results:rw
|
||||
# Volume=/home/podman/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da:/~/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da:ro
|
||||
Volume=/home/podman/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da/secrets.json:/app/secrets.json:ro
|
||||
|
||||
|
@ -0,0 +1 @@
|
||||
[Volume]
|
@ -0,0 +1,32 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
ContainerName=linkwarden-db
|
||||
Environment="POSTGRES_DB=linkwarden"
|
||||
Environment="POSTGRES_PASSWORD=postgres"
|
||||
Environment="POSTGRES_USER=postgres"
|
||||
Image=docker.io/postgres:16-alpine
|
||||
# Network=linkwarden.network
|
||||
# Pod=linkwarden.pod
|
||||
PublishPort=5437:5432
|
||||
Volume=linkwarden-db-data.volume:/var/lib/postgresql/data:Z
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/postgres:16-alpine
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start linkwarden-db
|
||||
# systemctl --user status linkwarden-db
|
||||
# journalctl -fu linkwarden-db.service
|
||||
# podman logs linkwarden-db
|
||||
# systemctl --user stop linkwarden-db
|
||||
# systemctl --user disable linkwarden-db
|
||||
# podman exec -ti linkwarden-db /bin/sh
|
||||
# podman exec -ti linkwarden-db /bin/bash
|
||||
# Image=docker.io/library/postgres:16
|
||||
# podman pull docker.io/library/postgres:16
|
||||
# file: 'extension.c', line: '543', routine: 'parse_extension_control_file'
|
||||
# https://github.com/linkwarden-app/linkwarden/discussions/6792
|
@ -0,0 +1 @@
|
||||
[Volume]
|
@ -0,0 +1,34 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
ContainerName=linkwarden-server
|
||||
Environment="DATABASE_URL=postgresql://postgres:postgres@192.168.11.2:5437/linkwarden"
|
||||
Environment="NEXTAUTH_SECRET=BP3BnWf17S1I7tyxCbLO3"
|
||||
Environment="NEXTAUTH_URL=https://linkwarden.phares.duckdns.org/api/v1/auth"
|
||||
Environment="POSTGRES_PASSWORD=postgres"
|
||||
Image=ghcr.io/linkwarden/linkwarden:latest
|
||||
# Network=linkwarden.network
|
||||
# Pod=linkwarden.pod
|
||||
PublishPort=5011:3000
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=linkwarden-server-data.volume:/data/data:Z
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Unit]
|
||||
Requires=linkwarden-db.service
|
||||
After=linkwarden-db.service
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull ghcr.io/linkwarden/linkwarden:latest
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start linkwarden-server
|
||||
# systemctl --user status linkwarden-server --lines=9999
|
||||
# journalctl -fu linkwarden-server.service
|
||||
# podman logs linkwarden-server
|
||||
# systemctl --user stop linkwarden-server
|
||||
# systemctl --user disable linkwarden-server
|
||||
# podman exec -ti linkwarden-server /bin/sh
|
||||
# podman exec -ti linkwarden-server /bin/bash
|
@ -7,11 +7,16 @@ Environment="MM_SERVICESETTINGS_SITEURL=https://mattermost.phares.duckdns.org"
|
||||
Environment="MM_SQLSETTINGS_DATASOURCE=postgres://mmuser:mmuser_password@192.168.11.2:5436/mattermost?sslmode=disable&connect_timeout=10"
|
||||
Environment="MM_SQLSETTINGS_DRIVERNAME=postgres"
|
||||
Environment="TZ=US/Arizona"
|
||||
Image=docker.io/mattermost/mattermost-team-edition:9.11.2
|
||||
# HealthCmd="curl -f http://192.168.11.2:8443/api/v4/system/ping || exit 1"
|
||||
# HealthCmd="curl -f https://mattermost.phares.duckdns.org/api/v4/system/ping || exit 1"
|
||||
HealthCmd="ls"
|
||||
# Image=docker.io/mattermost/mattermost-team-edition:9.11.2
|
||||
Image=docker.io/mattermost/mattermost-team-edition:release-10.3
|
||||
# Network=mattermost.network
|
||||
# Pod=mattermost.pod
|
||||
# PublishPort=8065:8065
|
||||
PublishPort=8443:8443
|
||||
# PublishPort=8443:8443
|
||||
PublishPort=8443:8065
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
Volume=mattermost-server-bleve.volume:/mattermost/bleve-indexes:rw
|
||||
@ -32,10 +37,11 @@ Requires=mattermost-db.service
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/mattermost/mattermost-team-edition:release-10.3
|
||||
# podman pull docker.io/mattermost/mattermost-team-edition:9.11.2
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start mattermost-server
|
||||
# systemctl --user status mattermost-server
|
||||
# systemctl --user status mattermost-server --lines=999
|
||||
# journalctl -fu mattermost-server.service
|
||||
# podman logs mattermost-server
|
||||
# systemctl --user stop mattermost-server
|
||||
|
@ -0,0 +1,33 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
ContainerName=traccar-server
|
||||
Image=docker.io/traccar/traccar:latest
|
||||
# Network=traccar.network
|
||||
# Pod=traccar.pod
|
||||
PublishPort=5011:8082
|
||||
# PublishPort=5000-5150:5000-5150
|
||||
# PublishPort=5000-5150:5000-5150/udp
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
Volume=/opt/traccar/logs:/opt/traccar/logs:rw
|
||||
Volume=/opt/traccar/traccar.xml:/opt/traccar/conf/traccar.xml:rw
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
# [Unit]
|
||||
# Requires=traccar-db.service
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/traccar/traccar:latest
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start traccar-server
|
||||
# systemctl --user status traccar-server --lines=999
|
||||
# journalctl -fu traccar-server.service
|
||||
# podman logs traccar-server
|
||||
# systemctl --user stop traccar-server
|
||||
# systemctl --user disable traccar-server
|
||||
# podman exec -ti traccar-server /bin/sh
|
||||
# podman exec -ti traccar-server /bin/bash
|
Loading…
x
Reference in New Issue
Block a user