This commit is contained in:
Mike Phares 2025-01-31 19:39:53 -07:00
parent 1c0b573f60
commit cf6e52b572
47 changed files with 798 additions and 31 deletions

View File

@ -22,6 +22,7 @@
"gogs", "gogs",
"immich", "immich",
"journalctl", "journalctl",
"kanbn",
"kestra", "kestra",
"keyout", "keyout",
"linkwarden", "linkwarden",

View File

@ -0,0 +1,21 @@
-----BEGIN CERTIFICATE-----
MIIDjDCCAxKgAwIBAgISBMFGragC9OgIAiG4P5naLK3mMAoGCCqGSM49BAMDMDIx
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
NjAeFw0yNTAxMTMyMDQxMTFaFw0yNTA0MTMyMDQxMTBaMCAxHjAcBgNVBAMTFWdp
dGVhLmp1bXBpbmdjcmFiLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMxa
tycX56D91JSQtdSYG/pPlyqrlka+qhfoYd4IzEjz23n3aqbdHWp4kzKgfdfo99vJ
16AAUgK4LV2eWk6ZddijggIYMIICFDAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYw
FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFN/q
GV5U2yPWTWBmlfvAp0crrMC0MB8GA1UdIwQYMBaAFJMnRpgDqVFojpjWxEJI2yO/
WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2Lm8ubGVu
Y3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcvMCAGA1Ud
EQQZMBeCFWdpdGVhLmp1bXBpbmdjcmFiLmNvbTATBgNVHSAEDDAKMAgGBmeBDAEC
ATCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB3AN6FgddQJHxrzcuvVjfF54HGTORu
1hdjn480pybJ4r03AAABlGGbth0AAAQDAEgwRgIhAKS2r6FtEv17AjuJYICWvsK7
R54pf8/pJL5UGIhy23UkAiEAn2DdIAEg5o1g8ULtoG2mUYt+YTbDBdH1coEoe/Cd
XRoAdgDPEVbu1S58r/OHW9lpLpvpGnFnSrAX7KwB0lt3zsw7CAAAAZRhm7ZHAAAE
AwBHMEUCIGuSi8pZgdi3bLYsYg+a44ZYSQM2YSDdhau+P+V2m8DaAiEA4fqy8KEg
S9vH8b9B+Gz+i5dRKchD1S4ydzOdhZTR1DMwCgYIKoZIzj0EAwMDaAAwZQIxANUl
PQW7UOTQOgd0KKqZeygvPCY7qvSr6V2ZR2Yx6e4wXt9i/bhXVjNvYMyffCjh1gIw
ETtUf366hIClR7HmTjEG3vdjinqgVKvkAZqufAPnijbKKtnsNXhACWl18UXngBG6
-----END CERTIFICATE-----

View File

@ -0,0 +1,26 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,47 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,5 @@
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIOJMe824fldC1I31j9QPXW2rqnkUK+EzwImja0V5U4dioAoGCCqGSM49
AwEHoUQDQgAEzFq3JxfnoP3UlJC11Jgb+k+XKquWRr6qF+hh3gjMSPPbefdqpt0d
aniTMqB91+j328nXoABSArgtXZ5aTpl12A==
-----END EC PRIVATE KEY-----

View File

@ -0,0 +1,22 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,26 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,48 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,5 @@
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEILSambH2O8RFkT6eZn+bwQQ2oB6AFtjkHKsC+t0eWflroAoGCCqGSM49
AwEHoUQDQgAE6qUGamhDtM8eehloxOvBzHneJqEsOnJvMBYJlkWvnRJ6ve1DDTrQ
S0L//uSkTUk3cA1V9nF8zUvcuFBb4TOlUg==
-----END EC PRIVATE KEY-----

View File

@ -0,0 +1,22 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,26 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,48 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,5 @@
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEICp+cx+weOdcPOsxTzhwkByo3hGKxTBrHBXiKjWAg6IqoAoGCCqGSM49
AwEHoUQDQgAE2TvQguQSq2Q+PP6AreBgcAeFVFAtmKkNXp/oABH+lUJhpXt3dCyA
89h7Y+2A3DIvi3x6E3rTHQWdwJB3T34kpA==
-----END EC PRIVATE KEY-----

View File

@ -0,0 +1,22 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,26 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,48 @@
-----BEGIN CERTIFICATE-----
MIIDlDCCAxqgAwIBAgISA3Ok6Ntju67loYMAKR/g+jLeMAoGCCqGSM49BAMDMDIx
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
NjAeFw0yNTAxMTMyMDQwMzFaFw0yNTA0MTMyMDQwMzBaMCQxIjAgBgNVBAMTGWdp
dGVhLnR3aWxpZ2h0cGFyYWRveC5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
AAQVdWh6MowWiRToNvHG28xfT+1oTn2xrA0FISfw24MLIaKPRIQK46EwNhZ0qoja
mMWWlT7e3ehDGyzVxToczVxno4ICHDCCAhgwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
BBTJ3cuhp8zFW76E3iky8x9/qEZVmzAfBgNVHSMEGDAWgBSTJ0aYA6lRaI6Y1sRC
SNsjv1iU0jBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNi5v
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U2LmkubGVuY3Iub3JnLzAk
BgNVHREEHTAbghlnaXRlYS50d2lsaWdodHBhcmFkb3guY29tMBMGA1UdIAQMMAow
CAYGZ4EMAQIBMIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHcA3oWB11AkfGvNy69W
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYZsYPgAABAMASDBGAiEAhkETK0ZiN8tB
3hjE6rySGk3wp4X8SqXepvnXMyY9j80CIQC65yd+ajVHVPytJW1ved+27893Vi0r
pwLYDkstSWym+wB2AMz7D2qFcQll/pWbU87psnwi6YVcDZeNtql+VMD+TA2wAAAB
lGGbGEwAAAQDAEcwRQIgHA5eiA3Sw93hrOX2I/3CPsLGGTd+Dp8JC9xooozQi+kC
IQCwwikwSLbNPHHf6A9MUiQZWcTbY1l6fGsY8z/PdYVw/TAKBggqhkjOPQQDAwNo
ADBlAjAybTS423x/olK67bsVMuv2g5moz/g2o3Ty3brMkOZZXGqeqZ1f2KoGfWuo
k+uF5wMCMQCGu8qFcofoKl+IUtyLfn9vyq/lOHA7vorqZx4he+eY/aY8VuCdDUCU
a70klI5vl7U=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,5 @@
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIKZQjFNsE08Z94g8u3DeGSogHW7nidfFzJY4MjF3s1UfoAoGCCqGSM49
AwEHoUQDQgAEFXVoejKMFokU6DbxxtvMX0/taE59sawNBSEn8NuDCyGij0SECuOh
MDYWdKqI2pjFlpU+3t3oQxss1cU6HM1cZw==
-----END EC PRIVATE KEY-----

View File

@ -0,0 +1,14 @@
This directory contains your keys and certificates.
`privkey.pem` : the private key for your certificate.
`fullchain.pem`: the certificate file used in most server software.
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
`cert.pem` : will break many server configurations, and should not be used
without reading further documentation (see link below).
WARNING: DO NOT MOVE OR RENAME THESE FILES!
Certbot expects these files to remain in this location in order
to function properly!
We recommend not moving these files. For more information, see the Certbot
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.

View File

@ -0,0 +1,14 @@
This directory contains your keys and certificates.
`privkey.pem` : the private key for your certificate.
`fullchain.pem`: the certificate file used in most server software.
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
`cert.pem` : will break many server configurations, and should not be used
without reading further documentation (see link below).
WARNING: DO NOT MOVE OR RENAME THESE FILES!
Certbot expects these files to remain in this location in order
to function properly!
We recommend not moving these files. For more information, see the Certbot
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.

View File

@ -0,0 +1,14 @@
This directory contains your keys and certificates.
`privkey.pem` : the private key for your certificate.
`fullchain.pem`: the certificate file used in most server software.
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
`cert.pem` : will break many server configurations, and should not be used
without reading further documentation (see link below).
WARNING: DO NOT MOVE OR RENAME THESE FILES!
Certbot expects these files to remain in this location in order
to function properly!
We recommend not moving these files. For more information, see the Certbot
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.

View File

@ -0,0 +1,14 @@
This directory contains your keys and certificates.
`privkey.pem` : the private key for your certificate.
`fullchain.pem`: the certificate file used in most server software.
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
`cert.pem` : will break many server configurations, and should not be used
without reading further documentation (see link below).
WARNING: DO NOT MOVE OR RENAME THESE FILES!
Certbot expects these files to remain in this location in order
to function properly!
We recommend not moving these files. For more information, see the Certbot
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.

View File

@ -0,0 +1,15 @@
# renew_before_expiry = 30 days
version = 3.1.0
archive_dir = /etc/letsencrypt/archive/gitea.jumpingcrab.com
cert = /etc/letsencrypt/live/gitea.jumpingcrab.com/cert.pem
privkey = /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem
chain = /etc/letsencrypt/live/gitea.jumpingcrab.com/chain.pem
fullchain = /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem
# Options used in the renewal process
[renewalparams]
account = 0dc29e2da338706a1a356c4f2ef0c15b
authenticator = nginx
installer = nginx
server = https://acme-v02.api.letsencrypt.org/directory
key_type = ecdsa

View File

@ -0,0 +1,15 @@
# renew_before_expiry = 30 days
version = 3.1.0
archive_dir = /etc/letsencrypt/archive/gitea.phares.redirectme.net
cert = /etc/letsencrypt/live/gitea.phares.redirectme.net/cert.pem
privkey = /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem
chain = /etc/letsencrypt/live/gitea.phares.redirectme.net/chain.pem
fullchain = /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem
# Options used in the renewal process
[renewalparams]
account = 0dc29e2da338706a1a356c4f2ef0c15b
authenticator = nginx
installer = nginx
server = https://acme-v02.api.letsencrypt.org/directory
key_type = ecdsa

View File

@ -0,0 +1,15 @@
# renew_before_expiry = 30 days
version = 3.1.0
archive_dir = /etc/letsencrypt/archive/gitea.phares3757.ddns.net
cert = /etc/letsencrypt/live/gitea.phares3757.ddns.net/cert.pem
privkey = /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem
chain = /etc/letsencrypt/live/gitea.phares3757.ddns.net/chain.pem
fullchain = /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem
# Options used in the renewal process
[renewalparams]
account = 0dc29e2da338706a1a356c4f2ef0c15b
authenticator = nginx
installer = nginx
server = https://acme-v02.api.letsencrypt.org/directory
key_type = ecdsa

View File

@ -0,0 +1,15 @@
# renew_before_expiry = 30 days
version = 3.1.0
archive_dir = /etc/letsencrypt/archive/gitea.twilightparadox.com
cert = /etc/letsencrypt/live/gitea.twilightparadox.com/cert.pem
privkey = /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem
chain = /etc/letsencrypt/live/gitea.twilightparadox.com/chain.pem
fullchain = /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem
# Options used in the renewal process
[renewalparams]
account = 0dc29e2da338706a1a356c4f2ef0c15b
authenticator = nginx
installer = nginx
server = https://acme-v02.api.letsencrypt.org/directory
key_type = ecdsa

View File

@ -1,9 +1,6 @@
server { server {
# touch /etc/nginx/include/affirm.duckdns.org ssl_certificate /home/podman/wild-affirm/fullchain.cer;
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/affirm.duckdns.org.key -out /etc/nginx/include/affirm.phares.duckdns.org.crt -config /etc/nginx/include/affirm.phares.duckdns.org ssl_certificate_key /home/podman/wild-affirm/affirm.duckdns.org.key;
ssl_certificate /root/.acme.sh/wild-affirm/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-affirm/affirm.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-affirm/affirm.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3; ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2; listen 443 ssl http2;
server_name *.affirm.duckdns.org; server_name *.affirm.duckdns.org;

View File

@ -1,9 +1,6 @@
server { server {
# touch /etc/nginx/include/bchs.duckdns.org ssl_certificate /home/podman/wild-bchs/fullchain.pem;
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/bchs.duckdns.org.key -out /etc/nginx/include/bchs.phares.duckdns.org.crt -config /etc/nginx/include/bchs.phares.duckdns.org ssl_certificate_key /home/podman/wild-bchs/privkey.pem;
ssl_certificate /root/.acme.sh/wild-bchs/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-bchs/bchs.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-bchs/bchs.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3; ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2; listen 443 ssl http2;
server_name *.bchs.duckdns.org; server_name *.bchs.duckdns.org;

View File

@ -0,0 +1,23 @@
server {
# touch /etc/nginx/include/beszel.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/beszel.phares.duckdns.org.key -out /etc/nginx/include/beszel.phares.duckdns.org.crt -config /etc/nginx/include/beszel.phares.duckdns.org
ssl_certificate /home/podman/wild-phares/fullchain.cer;
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name beszel.phares.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5023/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
proxy_connect_timeout 600s;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
}

View File

@ -17,4 +17,89 @@ server {
proxy_read_timeout 600s; proxy_read_timeout 600s;
proxy_send_timeout 600s; proxy_send_timeout 600s;
} }
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.phares3757.ddns.net;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.phares.redirectme.net;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.chickenkiller.com;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.jumpingcrab.com;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.twilightparadox.com;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
} }

View File

@ -0,0 +1,12 @@
server {
ssl_certificate /home/podman/wild-jmlc/fullchain.cer;
ssl_certificate_key /home/podman/wild-jmlc/jmlc.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.jmlc.duckdns.org;
root /var/www/html-jmlc;
index index.html index.htm;
location / {
try_files $uri $uri.html $uri/ =404;
}
}

View File

@ -1,19 +1,20 @@
server { server {
# touch /etc/nginx/include/odoo.ddns.net # touch /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/odoo.ddns.net.key -out /etc/nginx/include/odoo.ddns.net.crt -config /etc/nginx/include/odoo.ddns.net # openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org.key -out /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org.crt -config /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org
ssl_certificate /home/podman/wild-phares/fullchain.cer; ssl_certificate /home/podman/wild-phares/fullchain.cer;
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer; # ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key; ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3; ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2; listen 443 ssl http2;
server_name odoo.phares.duckdns.org; server_name kanbn-to-quartz.phares.duckdns.org;
location / { location / {
proxy_set_header Host $host; proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:8069/; proxy_pass http://192.168.11.2:5024/;
proxy_read_timeout 600s; proxy_read_timeout 600s;
proxy_send_timeout 600s; proxy_send_timeout 600s;
add_header Access-Control-Allow-Origin *;
} }
} }

View File

@ -1,12 +1,12 @@
# server { server {
# listen 80 default_server; listen 80 default_server;
# root /var/www/certbot; root /var/www/certbot;
# index index.html index.htm index.nginx-debian.html; index index.html index.htm index.nginx-debian.html;
# server_name phares.duckdns.org; server_name _;
# location / { location / {
# try_files $uri $uri/ =404; try_files $uri $uri/ =404;
# } }
# } }
server { server {
listen 8083 default_server; listen 8083 default_server;
root /var/www/html-nginx; root /var/www/html-nginx;

View File

@ -18,6 +18,7 @@ include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org #
include /etc/nginx/include/authentik.conf; # https://authentik.phares.duckdns.org # https://192.168.11.2:5018/ include /etc/nginx/include/authentik.conf; # https://authentik.phares.duckdns.org # https://192.168.11.2:5018/
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # /var/www/html-affirm include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # /var/www/html-affirm
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/ include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/
include /etc/nginx/include/beszel.conf; # https://beszel.phares.duckdns.org # http://192.168.11.2:5023/
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # /var/www/html-bchs include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # /var/www/html-bchs
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/ include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/ include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/
@ -29,10 +30,11 @@ include /etc/nginx/include/gotify.conf; # https://gotify.phares.duckdns.org # ht
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/ include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/ include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/ include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/
include /etc/nginx/include/jmlc.conf; # https://*.jmlc.duckdns.org # /var/www/html-jmlc
include /etc/nginx/include/kanbn-to-quartz.conf; # https://kanbn-to-quartz.phares.duckdns.org # http://192.168.11.2:5024/
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/ include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/
include /etc/nginx/include/linkwarden.conf; # https://linkwarden.phares.duckdns.org # http://192.168.11.2:5011/ include /etc/nginx/include/linkwarden.conf; # https://linkwarden.phares.duckdns.org # http://192.168.11.2:5011/
include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/ include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/
include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/
include /etc/nginx/include/passed.conf; # https://passed.phares.duckdns.org # http://192.168.11.2:5022/ include /etc/nginx/include/passed.conf; # https://passed.phares.duckdns.org # http://192.168.11.2:5022/
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/ include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx

View File

@ -1,9 +1,9 @@
[Unit] [Unit]
# Auto-generated, DO NOT EDIT # Auto-generated, DO NOT EDIT
Description=Service for snap application adguard-home.adguard-home Description=Service for snap application adguard-home.adguard-home
Requires=snap-adguard\x2dhome-7577.mount Requires=snap-adguard\x2dhome-7701.mount
Wants=network.target Wants=network.target
After=snap-adguard\x2dhome-7577.mount network.target snapd.apparmor.service After=snap-adguard\x2dhome-7701.mount network.target snapd.apparmor.service
X-Snappy=yes X-Snappy=yes
[Service] [Service]
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run adguard-home ExecStart=/usr/bin/snap run adguard-home
SyslogIdentifier=adguard-home.adguard-home SyslogIdentifier=adguard-home.adguard-home
Restart=always Restart=always
WorkingDirectory=/var/snap/adguard-home/7577 WorkingDirectory=/var/snap/adguard-home/7701
TimeoutStopSec=30 TimeoutStopSec=30
Type=simple Type=simple

View File

@ -0,0 +1,16 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Service for snap application certbot.renew
Requires=snap-certbot-4325.mount
Wants=network.target
After=snap-certbot-4325.mount network.target snapd.apparmor.service
X-Snappy=yes
[Service]
EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run --timer="00:00~24:00/2" certbot.renew
SyslogIdentifier=certbot.renew
Restart=no
WorkingDirectory=/var/snap/certbot/4325
TimeoutStopSec=30
Type=oneshot

View File

@ -0,0 +1,14 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Timer renew for snap application certbot.renew
Requires=snap-certbot-4325.mount
After=snap-certbot-4325.mount
X-Snappy=yes
[Timer]
Unit=snap.certbot.renew.service
OnCalendar=*-*-* 05:07
OnCalendar=*-*-* 17:35
[Install]
WantedBy=timers.target

View File

@ -1,9 +1,9 @@
[Unit] [Unit]
# Auto-generated, DO NOT EDIT # Auto-generated, DO NOT EDIT
Description=Service for snap application vaultwarden.vaultwarden Description=Service for snap application vaultwarden.vaultwarden
Requires=snap-vaultwarden-155.mount Requires=snap-vaultwarden-158.mount
Wants=network.target Wants=network.target
After=snap-vaultwarden-155.mount network.target snapd.apparmor.service After=snap-vaultwarden-158.mount network.target snapd.apparmor.service
X-Snappy=yes X-Snappy=yes
[Service] [Service]
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run vaultwarden ExecStart=/usr/bin/snap run vaultwarden
SyslogIdentifier=vaultwarden.vaultwarden SyslogIdentifier=vaultwarden.vaultwarden
Restart=on-failure Restart=on-failure
WorkingDirectory=/var/snap/vaultwarden/155 WorkingDirectory=/var/snap/vaultwarden/158
TimeoutStopSec=30 TimeoutStopSec=30
Type=simple Type=simple

View File

@ -0,0 +1 @@
[Volume]

View File

@ -0,0 +1,35 @@
[Container]
ContainerName=beszel-agent
# Environment="user=1000"
Environment="KEY=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKdY/QcDcSoXxY3PpcNDAV4XcP89qgtaI00Oxt5zoCuB"
Environment="PORT=45876"
Image=docker.io/henrygd/beszel-agent:latest
PublishPort=45876:45876
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
# Volume=/var/run/docker.sock:/var/run/docker.sock:ro
Volume=/run/user/1000/podman/podman.sock:/var/run/docker.sock:ro
# Volume=/mnt/disk/.beszel:/extra-filesystems/sda1:ro
[Service]
Restart=no
[Unit]
Requires=beszel-server.service
After=beszel-server.service
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/henrygd/beszel-agent:latest
# systemctl --user daemon-reload
# systemctl --user start beszel-agent
# systemctl --user status beszel-agent --lines=999
# journalctl -fu beszel-agent.service
# podman logs beszel-agent
# systemctl --user stop beszel-agent
# systemctl --user disable beszel-agent
# podman exec -ti beszel-agent /bin/sh
# podman exec -ti beszel-agent /bin/bash

View File

@ -0,0 +1,30 @@
[Container]
ContainerName=beszel-server
Environment="beszel_POSTGRESQL__PORT=5439"
Image=docker.io/henrygd/beszel:latest
PodmanArgs=--add-host=gotify.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=kuma.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=mattermost.phares.duckdns.org:192.168.11.2
PublishPort=5023:8090
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
Volume=beszel-server-data:/beszel_data:Z
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/henrygd/beszel:latest
# systemctl --user daemon-reload
# systemctl --user start beszel-server
# systemctl --user status beszel-server --lines=999
# journalctl -fu beszel-server.service
# podman logs beszel-server
# systemctl --user stop beszel-server
# systemctl --user disable beszel-server
# podman exec -ti beszel-server /bin/sh
# podman exec -ti beszel-server /bin/bash

View File

@ -0,0 +1,32 @@
[Container]
AutoUpdate=registry
ContainerName=kanbn-to-quartz-server
Environment="ASPNETCORE_ENVIRONMENT=Production"
Image=gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
# Network=kanbn-to-quartz-server.network
# Pod=kanbn-to-quartz-server.pod
PublishPort=5024:5001
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=/mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw
# Volume=/home/www-data/jackyzha0-quartz-phares/content:/app/content:rw
Volume=/home/podman/jackyzha0-quartz-phares/content:/app/content:rw
# Volume=/home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde:/~/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde:ro
Volume=/home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
# systemctl --user daemon-reload
# systemctl --user start kanbn-to-quartz-server
# systemctl --user status kanbn-to-quartz-server
# journalctl -fu kanbn-to-quartz-server.service
# podman logs kanbn-to-quartz-server
# systemctl --user stop kanbn-to-quartz-server
# systemctl --user disable kanbn-to-quartz-server
# podman exec -ti kanbn-to-quartz-server /bin/sh
# podman exec -ti kanbn-to-quartz-server /bin/bash

View File

@ -9,6 +9,8 @@ Image=docker.io/louislam/uptime-kuma:1
# Pod=uptime-kuma.pod # Pod=uptime-kuma.pod
PodmanArgs=--add-host=cockpit.phares.duckdns.org:192.168.11.2 PodmanArgs=--add-host=cockpit.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=gotify.phares.duckdns.org:192.168.11.2 PodmanArgs=--add-host=gotify.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=immich-to-slideshow.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=kanbn-to-quartz.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=kuma.phares.duckdns.org:192.168.11.2 PodmanArgs=--add-host=kuma.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=mattermost.phares.duckdns.org:192.168.11.2 PodmanArgs=--add-host=mattermost.phares.duckdns.org:192.168.11.2
PodmanArgs=--add-host=pgadmin.phares.duckdns.org:192.168.11.2 PodmanArgs=--add-host=pgadmin.phares.duckdns.org:192.168.11.2

View File

@ -1,10 +1,11 @@
# DO NOT EDIT THIS FILE - edit the master and reinstall. # DO NOT EDIT THIS FILE - edit the master and reinstall.
# (/tmp/crontab.CuxS5w/crontab installed on Sun Jan 5 11:20:46 2025) # (/tmp/crontab.7sJX44/crontab installed on Thu Jan 30 19:33:09 2025)
# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $) # (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
# Edit this file to introduce tasks to be run by cron. # Edit this file to introduce tasks to be run by cron.
# #
*/5 * * * * /etc/duckdns/duck.sh >/dev/null 2>&1 */5 * * * * /etc/duckdns/duck.sh >/dev/null 2>&1
24 5 * * * "/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null 24 5 * * * "/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
25 05 * * * cp -R /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
# 25 13 * * * cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build # 25 13 * * * cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build
25 13 * * * cd /home/www-data/jackyzha0-quartz-phares && /snap/bin/npx quartz build 25 13 * * * cd /home/www-data/jackyzha0-quartz-phares && /snap/bin/npx quartz build
01 14 * * * rsync --remove-source-files -av -e ssh /home/podman/cron-backup/ root@192.168.0.31:/home/podman/cron-backup-delete/ 01 14 * * * rsync --remove-source-files -av -e ssh /home/podman/cron-backup/ root@192.168.0.31:/home/podman/cron-backup-delete/