Compare commits
1 Commits
03-02-a
...
volume-exp
Author | SHA1 | Date | |
---|---|---|---|
51a235740e |
4
.gitignore
vendored
4
.gitignore
vendored
@ -55,8 +55,6 @@
|
||||
!opt/copy/**/*
|
||||
!opt/dockge/**/*.yaml
|
||||
|
||||
!var/spool/cron/crontabs/**/*
|
||||
|
||||
!root/**/*container
|
||||
!home/podman/**/*volume
|
||||
!home/podman/**/*container
|
||||
@ -66,4 +64,4 @@
|
||||
# !usr/local/etc/gogs/conf/app.ini
|
||||
# !usr/local/etc/no-ip2.conf
|
||||
# !var/snap/nextcloud/current/nextcloud/config/*
|
||||
# !var/www/html/.well-known/acme-challenge/*
|
||||
# !var/www/html/.well-known/acme-challenge/*
|
||||
|
9
.vscode/.http
vendored
9
.vscode/.http
vendored
@ -1,9 +0,0 @@
|
||||
@host = http://192.168.11.2
|
||||
# @pat = asdf
|
||||
# @ids = 126018, 224543
|
||||
|
||||
GET {{host}}/ocs-client-run.conf
|
||||
# Accept: application/json
|
||||
# Authorization: Basic {{pat}}
|
||||
|
||||
###
|
12
.vscode/settings.json
vendored
12
.vscode/settings.json
vendored
@ -3,39 +3,27 @@
|
||||
"*.container": "ini",
|
||||
"*.org": "ini",
|
||||
"*.net": "ini",
|
||||
"podman": "ini",
|
||||
"default": "ini"
|
||||
},
|
||||
"cSpell.words": [
|
||||
"ASPNETCORE",
|
||||
"autoindex",
|
||||
"bchs",
|
||||
"blinko",
|
||||
"dashkiosk",
|
||||
"dockge",
|
||||
"docmost",
|
||||
"dorico",
|
||||
"duckdns",
|
||||
"fauth",
|
||||
"fullchain",
|
||||
"gitea",
|
||||
"gogs",
|
||||
"immich",
|
||||
"JMLC",
|
||||
"journalctl",
|
||||
"kanbn",
|
||||
"kestra",
|
||||
"keyout",
|
||||
"linkwarden",
|
||||
"localtime",
|
||||
"lphares",
|
||||
"neko",
|
||||
"newkey",
|
||||
"odoo",
|
||||
"personalised",
|
||||
"pgadmin",
|
||||
"phares",
|
||||
"Sumco",
|
||||
"umbrel",
|
||||
"usersecrets",
|
||||
"vaultwarden",
|
||||
|
20
.vscode/tasks.json
vendored
20
.vscode/tasks.json
vendored
@ -1,20 +0,0 @@
|
||||
{
|
||||
"version": "2.0.0",
|
||||
"tasks": [
|
||||
{
|
||||
"label": "File-Folder-Helper AOT s X Day-Helper-2025-01-01",
|
||||
"type": "shell",
|
||||
"command": "L:/DevOps/Mesa_FI/File-Folder-Helper/bin/Release/net9.0/win-x64/publish/File-Folder-Helper.exe",
|
||||
"args": [
|
||||
"s",
|
||||
"X",
|
||||
"D:/6-Other-Large-Z/Linux-Ubuntu-Phares/home/podman/cron-backup",
|
||||
"Day-Helper-2025-01-01",
|
||||
"*.tar",
|
||||
"-202",
|
||||
"-Delete"
|
||||
],
|
||||
"problemMatcher": []
|
||||
}
|
||||
]
|
||||
}
|
@ -1,500 +0,0 @@
|
||||
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||
cp -R /var/www/html-slideshow/Images-c9dbce3b-Results/F\)Random/c9dbce3b/\[\]/* /var/www/html-slideshow/slideshow/random-results/
|
||||
exit
|
||||
ls -al /var/www/html-slideshow/slideshow/random-results
|
||||
exit
|
||||
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||
exit
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
exit
|
||||
exit
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||
exit
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
exit
|
||||
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
exit
|
||||
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
exit
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
exit
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
exit
|
||||
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||
exit
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||
exit
|
||||
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
exit
|
||||
podman pull docker.io/damongolding/immich-kiosk:latest
|
||||
exit
|
||||
systemctl --user start immich-kiosk
|
||||
exit
|
||||
systemctl --user start immich-kiosk
|
||||
exit
|
||||
systemctl --user start immich-kiosk
|
||||
exit
|
||||
systemctl --user start immich-kiosk
|
||||
exit
|
||||
systemctl --user start immich-kiosk
|
||||
exit
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
systemctl --user status immich-to-slideshow-server
|
||||
exit
|
||||
systemctl --user status immich-to-slideshow-server
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
nano ~/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da/secrets.json
|
||||
exit
|
||||
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
|
||||
exit
|
||||
systemctl --user start immich-to-slideshow-server
|
||||
exit
|
||||
podman pull tananaev/traccar:latest
|
||||
podman pull tananaev.org/traccar:latest
|
||||
podman pull traccar.org/traccar:latest
|
||||
podman pull docker.io/traccar/traccar:latest
|
||||
exit
|
||||
systemctl --user start traccar-server
|
||||
systemctl --user status traccar-server --lines=999
|
||||
ls -la /opt/traccar/
|
||||
ls -la /opt/traccar/logs/
|
||||
exit
|
||||
systemctl --user status traccar-server --lines=999
|
||||
systemctl --user start traccar-server
|
||||
nano /opt/traccar/traccar.xml
|
||||
exit
|
||||
nano /opt/traccar/traccar.xml
|
||||
systemctl --user start traccar-server
|
||||
systemctl --user status traccar-server --lines=999
|
||||
nano /opt/traccar/traccar.xml
|
||||
nano /opt/traccar/traccar.xml
|
||||
systemctl --user start traccar-server
|
||||
systemctl --user status traccar-server --lines=999
|
||||
podman pull ghcr.io/linkwarden/linkwarden:latest
|
||||
podman pull ghcr.io/linkwarden/linkwarden:latest
|
||||
podman pull docker.io/postgres:16-alpine
|
||||
podman pull docker.io/postgres:16-alpine
|
||||
podman pull ghcr.io/linkwarden/linkwarden:latest
|
||||
podman pull ghcr.io/linkwarden/linkwarden:latest
|
||||
exit
|
||||
systemctl --user start linkwarden-db
|
||||
systemctl --user start linkwarden-server
|
||||
systemctl --user status linkwarden-server --lines=9999
|
||||
exit
|
||||
systemctl --user start linkwarden-server
|
||||
systemctl --user status linkwarden-server --lines=9999
|
||||
exit
|
||||
systemctl --user start linkwarden-server
|
||||
systemctl --user status linkwarden-server --lines=9999
|
||||
exit
|
||||
podman pull docker.io/blinkospace/blinko:latest
|
||||
podman pull docker.io/postgres:14
|
||||
systemctl --user start blinko-server
|
||||
systemctl --user status blinko-server --lines=9999
|
||||
systemctl --user start blinko-db
|
||||
systemctl --user status blinko-db
|
||||
systemctl --user start blinko-db
|
||||
systemctl --user start blinko-server
|
||||
systemctl --user status blinko-server --lines=9999
|
||||
exit
|
||||
podman volunme ls
|
||||
podman volume ls
|
||||
podman volume prune
|
||||
podman volume ls
|
||||
podman volume rm systemd-odoo-server-data
|
||||
podman volume rm systemd-odoo-db-data
|
||||
podman volume rm one-review_postgres_data
|
||||
podman volume prune
|
||||
podman volume rm systemd-vaultwarden-server-data
|
||||
podman volume prune
|
||||
exit
|
||||
exit
|
||||
exit
|
||||
podman exec -ti mattermost-server /bin/bash
|
||||
podman volume ls
|
||||
podman volume inspect systemd-mattermost-server-config
|
||||
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
podman volume prune
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
docker system prune --volumes
|
||||
podman system prune --volumes
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
systemctl --user start linkwarden-server
|
||||
systemctl --user status linkwarden-server --lines=9999
|
||||
podman volume prune
|
||||
podman volume prune
|
||||
podman image prune
|
||||
podman image prune
|
||||
podman container prune
|
||||
podman volume prune
|
||||
podman container prune
|
||||
exit
|
||||
exit
|
||||
podman exec -ti linkwarden-server /bin/bash
|
||||
podman pull docker.io/mattermost/mattermost-team-edition:release-10.3
|
||||
podman pull docker.io/mattermost/mattermost-team-edition:release-10.3
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
curl -f http://localhost:8065/api/v4/system/ping || exit 1
|
||||
systemctl --user start mattermost-server
|
||||
podman exec -ti mattermost-server /bin/sh
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
exit
|
||||
podman volume ls
|
||||
podman volume prune
|
||||
podman volume inspect systemd-blinko-server-data
|
||||
sudo -i root
|
||||
sudo -i
|
||||
podman exec -ti blinko-server /bin/bash
|
||||
podman exec -ti blinko-server /bin/sh
|
||||
exit
|
||||
sudo -i
|
||||
exit
|
||||
sudo -i
|
||||
exit
|
||||
exit
|
||||
systemctl --user start linkwarden-server
|
||||
exit
|
||||
podman volume list
|
||||
podman volume info systemd-blinko-server-data
|
||||
podman volume systemd-blinko-server-data info
|
||||
podman volume systemd-blinko-server-data
|
||||
podman volume --help
|
||||
podman volume inspect systemd-blinko-server-data
|
||||
ls /home/podman/.local/share/containers/storage/volumes/systemd-blinko-server-data/_data
|
||||
mkdir -p /home/podman/backup-blinko
|
||||
podman volume export blinko-server-data --output /home/podman/backup-blinko/blinko-server-data.tar
|
||||
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/blinko-server-data.tar
|
||||
podman volume export systemd-baikal-server-data --output /home/podman/backup-baikal/baikal-server-data.tar
|
||||
mkdir -p /home/podman/backup-baikal
|
||||
podman volume export systemd-baikal-server-data --output /home/podman/backup-baikal/baikal-server-data.tar
|
||||
now=$(date +'%Y-%m-%d_%H-%M-%S')
|
||||
podman volume export systemd-baikal-server-data --output /home/podman/backup-baikal/baikal-server-data-${now}.tar
|
||||
crontab -e
|
||||
exit
|
||||
crontab -e
|
||||
crontab -e
|
||||
crontab -r
|
||||
exit
|
||||
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"\%Y\%m\%d-\%H\%M\%S")'.tar'
|
||||
exit
|
||||
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"%Y-%m-%d--%H-%M-%S")'.tar'
|
||||
exit
|
||||
crontab -e
|
||||
exit
|
||||
chrontab -e
|
||||
crontab -e
|
||||
crontab -e
|
||||
exit
|
||||
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"%Y-%m-%d--%H-%M-%S")'.tar'
|
||||
whereis podman
|
||||
/usr/bin/podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"%Y-%m-%d--%H-%M-%S")'.tar'
|
||||
crontab -e
|
||||
crontab -e
|
||||
crontab -e
|
||||
grep CRON /var/log/syslog
|
||||
nano /var/log/syslog
|
||||
cat /var/log/syslog
|
||||
exit
|
||||
crontab -l
|
||||
crontab -r
|
||||
crontab -e
|
||||
cat /etc/cron.allow
|
||||
cat /etc/cron.d/cron.allow
|
||||
crontab -l -u podman
|
||||
nano /etc/cron. d/cron
|
||||
nano /etc/cron
|
||||
nano /etc/cron.d/cron.allow
|
||||
crontab -r
|
||||
crontab -l
|
||||
exit
|
||||
crontab -l
|
||||
crontab -e
|
||||
systemctl status cron
|
||||
sudo -i
|
||||
systemctl status cron
|
||||
crontab -e
|
||||
crontab -e
|
||||
systemctl status cron
|
||||
systemctl status cron
|
||||
systemctl status cron
|
||||
crontab -l
|
||||
crontab -e
|
||||
systemctl status cron
|
||||
systemctl status cron
|
||||
service cron status
|
||||
crontab -e
|
||||
service cron status
|
||||
crontab -l
|
||||
crontab -e
|
||||
/home/podman/cron-backup
|
||||
mkdir /home/podman/cron-backup
|
||||
crontab -e
|
||||
crontab -e
|
||||
crontab -e
|
||||
crontab -e
|
||||
tar --list \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
|
||||
tar --list --file \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
|
||||
tar \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
|
||||
tar --list --file \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar /etc
|
||||
tar -tf \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
|
||||
tar --list --file /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar
|
||||
tar --list --file /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar thumbs/5f0b1052-466d-44de-a554-226d7256850d/33/c5/
|
||||
crontab -e
|
||||
tar --list --directory /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar
|
||||
tar --list --file /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar
|
||||
crontab -e
|
||||
exit
|
||||
systemctl --user start linkwarden-server
|
||||
exit
|
||||
podman pull docker.io/actualbudget/actual-server:latest
|
||||
systemctl --user start actual-server
|
||||
exit
|
||||
exit
|
||||
exit
|
||||
exit
|
||||
exit
|
||||
systemctl --user start linkwarden-server
|
||||
exit
|
||||
id
|
||||
exit
|
||||
nano ~/.bash_profile
|
||||
nano ~/.bash_profile
|
||||
exit
|
||||
exit
|
||||
systemctl --user start uptime-kuma-server
|
||||
exit
|
||||
systemctl --user start uptime-kuma-server
|
||||
podman pull docker.io/2fauth/2fauth
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
podman volumn prune
|
||||
podman volume prune
|
||||
podman volume prune
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
systemctl --user status 2fauth-server
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
podman exec -ti 2fauth-server /bin/bash
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
nc -zv localhost 8000
|
||||
nc -zv localhost 443
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
nc -zv localhost 8000
|
||||
nc -zv localhost 5015
|
||||
nc -zv localhost 5016
|
||||
nc -zv localhost 5015
|
||||
nc -zv localhost 5015
|
||||
systemctl --user start 2fauth-server
|
||||
nc -zv localhost 5015
|
||||
exit
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
exit
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
exit
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
systemctl --user start 2fauth-server
|
||||
podman exec -ti 2fauth-server /bin/sh
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
systemctl --user start 2fauth-server
|
||||
exit
|
||||
podman pull docker.io/gotify/server
|
||||
systemctl --user start gotify-server
|
||||
exiot
|
||||
exit
|
||||
systemctl --user start uptime-kuma-server
|
||||
nano /etc/hostname
|
||||
exit
|
||||
podman pull ghcr.io/goauthentik/server:2024.12.1
|
||||
exit
|
||||
podman pull docker.io/library/redis:7.4.1
|
||||
exit
|
||||
podman pull docker.io/library/redis:7.4.1
|
||||
exit
|
||||
podman pull docker.io/library/postgres:16.6
|
||||
exit
|
||||
exit
|
||||
systemctl --user start authentik-db
|
||||
systemctl --user status authentik-db
|
||||
exit
|
||||
systemctl --user start authentik-db
|
||||
systemctl --user status authentik-db
|
||||
systemctl --user start authentik-redis
|
||||
systemctl --user status authentik-redis
|
||||
systemctl --user start authentik-worker
|
||||
systemctl --user status authentik-worker
|
||||
exit
|
||||
systemctl --user status authentik-worker
|
||||
exit
|
||||
systemctl --user start authentik-worker
|
||||
systemctl --user status authentik-worker
|
||||
nc -zv localhost 5021
|
||||
redis-cli ping
|
||||
redis-cli -h localhost -p 6379 PING
|
||||
redis-cli -h localhost -p 5021 PING
|
||||
podman exec -ti authentik-redis /bin/bash
|
||||
redis-cli -h localhost -p 5021 PING
|
||||
exit
|
||||
exit
|
||||
systemctl --user start authentik-redis
|
||||
systemctl --user status authentik-redis
|
||||
exit
|
||||
systemctl --user start authentik-redis
|
||||
systemctl --user status authentik-redis
|
||||
podman exec -ti authentik-redis /bin/bash
|
||||
podman exec -ti authentik-redis /bin/sh
|
||||
exit
|
||||
exit
|
||||
systemctl --user start authentik-redis
|
||||
systemctl --user start authentik-redis
|
||||
podman exec -ti authentik-redis /bin/sh
|
||||
podman exec -ti authentik-redis /bin/bash
|
||||
exit
|
||||
exit
|
||||
systemctl --user start authentik-redis
|
||||
exit
|
||||
systemctl --user start authentik-redis
|
||||
systemctl --user start authentik-redis
|
||||
exit
|
||||
systemctl --user start authentik-redis
|
||||
exit
|
||||
systemctl --user start authentik-redis
|
||||
podman exec -ti authentik-redis /bin/bash
|
||||
exit
|
||||
systemctl --user start authentik-redis
|
||||
exit
|
||||
systemctl --user start authentik-redis
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
exit
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
podman volume prune
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
crontab -e
|
||||
crontab -e
|
||||
exit
|
||||
crontab -e
|
||||
exit
|
||||
podman volume import systemd-mattermost-server-logs /home/podman/cron-backup/mattermost-server-logs-2024-12-23--11-28-01.tar
|
||||
podman volume import systemd-mattermost-server-plugins /home/podman/cron-backup/mattermost-server-plugins-2024-12-23--11-29-02.tar
|
||||
podman volume import systemd-mattermost-server-config /home/podman/cron-backup/mattermost-server-config-2024-12-23--11-27-01.tar
|
||||
podman volume import systemd-mattermost-server-client-plugins /home/podman/cron-backup/mattermost-server-client-plugins-2024-12-23--11-26-01.tar
|
||||
podman volume import systemd-mattermost-server-bleve /home/podman/cron-backup/mattermost-server-bleve-2024-12-23--11-25-01.tar
|
||||
podman volume import systemd-mattermost-server-data /home/podman/cron-backup/mattermost-server-data-2024-12-23--11-18-01.tar
|
||||
podman volume import systemd-mattermost-db-data /home/podman/cron-backup/mattermost-db-data-2024-12-24--12-17-01.tar
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
systemctl --user start mattermost-db
|
||||
exit
|
||||
systemctl --user start mattermost-db
|
||||
systemctl --user start mattermost-db
|
||||
systemctl --user start mattermost-server
|
||||
exit
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
||||
podman volume import systemd-mattermost-db-data /home/podman/cron-backup/mattermost-db-data-2024-12-24--12-17-01.tar
|
||||
podman volume import systemd-mattermost-server-data /home/podman/cron-backup/mattermost-server-data-2024-12-23--11-18-01.tar
|
||||
podman volume import systemd-mattermost-server-bleve /home/podman/cron-backup/mattermost-server-bleve-2024-12-23--11-25-01.tar
|
||||
podman volume import systemd-mattermost-server-client-plugins /home/podman/cron-backup/mattermost-server-client-plugins-2024-12-23--11-26-01.tar
|
||||
podman volume import systemd-mattermost-server-config /home/podman/cron-backup/mattermost-server-config-2024-12-23--11-27-01.tar
|
||||
podman volume import systemd-mattermost-server-plugins /home/podman/cron-backup/mattermost-server-plugins-2024-12-23--11-29-02.tar
|
||||
podman volume import systemd-mattermost-server-logs /home/podman/cron-backup/mattermost-server-logs-2024-12-23--11-28-01.tar
|
||||
exit
|
||||
podman volume import systemd-mattermost-server-data /home/podman/cron-backup/mattermost-server-data-2024-12-23--11-18-01.tar
|
||||
systemctl --user start mattermost-db
|
||||
systemctl --user start mattermost-server
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
podman exec -ti mattermost-server /bin/bash
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
exit
|
||||
exit
|
||||
exit
|
||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||
/usr/libexec/podman/quadlet -dryrun --user
|
||||
exit
|
||||
exit
|
||||
exit
|
||||
systemctl --user start mattermost-server
|
||||
exit
|
||||
systemctl --user status mattermost-server --lines=999
|
||||
exit
|
@ -6,9 +6,12 @@ snap install dashkiosk
|
||||
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
||||
snap set wpe-webkit-mir-kiosk daemon=true
|
||||
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
||||
exit
|
||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
||||
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
||||
snap set ubuntu-frame daemon=true
|
||||
exit
|
||||
reboot
|
||||
cat /root/.ssh/authorized_keys
|
||||
nano /root/.ssh/authorized_keys
|
||||
@ -22,4 +25,4 @@ cp /root/.ssh/authorized_keys /home/bmiller/.ssh/authorized_keys
|
||||
chown bmiller:bmiller -R /home/bmiller
|
||||
ln -s /var/log/nginx /var/www/html/log-nginx
|
||||
ls -la /var/www/html
|
||||
exit
|
||||
exit
|
@ -1,13 +1,17 @@
|
||||
cat /root/.ssh/authorized_keys
|
||||
nano /root/.ssh/authorized_keys
|
||||
exit
|
||||
apt-get install podman -y
|
||||
apt-cache rdepends podman-compose
|
||||
apt-get install podman-compose -y
|
||||
adduser podman sudo
|
||||
sudo -iu podman
|
||||
exit
|
||||
timedatectl set-timezone America/Phoenix
|
||||
date
|
||||
apt-get update
|
||||
apt upgrade -y
|
||||
adduser pihole
|
||||
adduser podman
|
||||
adduser lphares
|
||||
mkdir /home/lphares/.ssh
|
||||
@ -22,36 +26,64 @@ adduser bmiller lphares
|
||||
sudo usermod -a -G lphares bmiller
|
||||
newgrp lphares
|
||||
systemctl restart ssh
|
||||
exit
|
||||
reboot
|
||||
sudo -iu podman
|
||||
cd /run/user/0/
|
||||
ls -la
|
||||
cd ..
|
||||
ls -la
|
||||
cp -R 0/ 1002/
|
||||
chown -R podman:podman /run/user/1002/
|
||||
sudo -iu podman
|
||||
rm -R /run/user/1002/
|
||||
mkdir -p /run/user/1002/
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /run/user/1002/
|
||||
sudo -iu podman
|
||||
exit
|
||||
reboot
|
||||
adduser pihole
|
||||
cd /tmp
|
||||
curl -sSL https://install.pi-hole.net | bash
|
||||
pihole -a -p LhhI1S73VZhtP#WIG8Tk
|
||||
exit
|
||||
reboot
|
||||
apt install unbound -y
|
||||
nano /etc/unbound/unbound.conf.d/pi-hole.conf
|
||||
service unbound restart
|
||||
nano /etc/lighttpd/lighttpd.conf
|
||||
pihole -up
|
||||
service lighttpd restart
|
||||
dig fail01.dnssec.works @127.0.0.1 -p 5335
|
||||
dig dnssec.works @127.0.0.1 -p 5335
|
||||
exit
|
||||
reboot
|
||||
ln -s /var/log/nginx /var/www/html/log-nginx
|
||||
ls -la /var/www/html
|
||||
exit
|
||||
cp ~/.bash_history /etc/bash_history_2024-07-25.txt
|
||||
cat /etc/bash_history_2024-07-25.txt
|
||||
exit
|
||||
apt install smartmontools
|
||||
smartctl -i /dev/sda
|
||||
exit
|
||||
reboot
|
||||
apt install snapd -y
|
||||
apt install sudo links unzip nginx git nano ncdu -y
|
||||
snap install dashkiosk
|
||||
apt install sudo links unzip nginx git nano ncdu -y
|
||||
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
||||
snap set wpe-webkit-mir-kiosk daemon=true
|
||||
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
||||
exit
|
||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
||||
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
||||
snap set ubuntu-frame daemon=true
|
||||
exit
|
||||
reboot
|
||||
sudo -iu podman
|
||||
chmod -R podman:podman /home/podman/.config/containers/systemd/
|
||||
chown -R podman:podman /home/podman/.config/containers/systemd/
|
||||
rm -R .config/containers/systemd/*.ignore
|
||||
@ -63,6 +95,8 @@ rm -R /home/podman/.config/containers/systemd/*.container
|
||||
mkdir /home/podman/.ssh
|
||||
cp /root/.ssh/authorized_keys /home/podman/.ssh/authorized_keys
|
||||
chown podman:podman -R /home/podman
|
||||
systemctl --user daemon-reload
|
||||
sudo -iu podman
|
||||
cd ~/
|
||||
mkdir -p ~/.bashrc.d
|
||||
echo "export XDG_RUNTIME_DIR=/run/user/$(id -u)" > ~/.bashrc.d/systemd
|
||||
@ -73,6 +107,9 @@ systemctl --user daemon-reload
|
||||
podman image prune
|
||||
podman volume prune
|
||||
podman container prune
|
||||
exit
|
||||
shutdown now
|
||||
ip a
|
||||
lsof -i -P -n | grep LISTEN
|
||||
apt-cache rdepends cockpit
|
||||
apt install cockpit -y
|
||||
@ -80,32 +117,51 @@ passwd phares
|
||||
apt-get install cockpit cockpit-podman -y
|
||||
systemctl enable --now cockpit.socket
|
||||
journalctl -fu unbound-resolvconf.service
|
||||
ip a
|
||||
service unbound restart
|
||||
journalctl -fu unbound-resolvconf.service
|
||||
nano /etc/sysctl.conf
|
||||
sysctl -p
|
||||
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
||||
exit
|
||||
reboot
|
||||
ip a
|
||||
nano /etc/postfix/main.cf
|
||||
nano /etc/default/grub
|
||||
grub2-mkconfig
|
||||
grub-mkconfig
|
||||
exit
|
||||
reboot
|
||||
ip a
|
||||
nmcli
|
||||
dig pi-hole.net @127.0.0.1 -p 5335
|
||||
dig fail01.dnssec.works @127.0.0.1 -p 5335
|
||||
dig dnssec.works @127.0.0.1 -p 5335
|
||||
systemctl is-active unbound-resolvconf.service
|
||||
systemctl disable --now unbound-resolvconf.service
|
||||
sed -Ei 's/^unbound_conf=/#unbound_conf=/' /etc/resolvconf.conf
|
||||
service unbound restart
|
||||
rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf
|
||||
systemctl disable --now unbound-resolvconf.service
|
||||
exit
|
||||
reboot\
|
||||
reboot
|
||||
sudo -iu podman
|
||||
exit
|
||||
reboot
|
||||
sudo -iu podman
|
||||
exit
|
||||
reboot
|
||||
sudo -iu podman
|
||||
exit
|
||||
shutdown now
|
||||
lvs -a
|
||||
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||
smartctl -i /dev/sda
|
||||
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||
mkdir /mnt/usb
|
||||
mount /dev/sdb2 /mnt/usb
|
||||
exit
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
exit
|
||||
exit
|
@ -1,26 +1,70 @@
|
||||
exit
|
||||
cd ~/.bashrc.d/systemd
|
||||
cd ~/.bashrc.d
|
||||
ls -la
|
||||
sudo -iu podman
|
||||
exit
|
||||
systemctl --user list-unit-files
|
||||
cd /etc/containers/systemd/users
|
||||
ls
|
||||
ls -la
|
||||
cd ..
|
||||
ls -la
|
||||
systemctl start --user
|
||||
cd /usr/lib/systemd/system-generators/podman-system-generator
|
||||
cd /usr/lib/systemd/system-generators
|
||||
ls -la
|
||||
ls -la
|
||||
cd /usr/libexec/podman/quadlet
|
||||
cd /usr/libexec/podman
|
||||
ls -la
|
||||
apt-get install apt install podman-quadlet
|
||||
apt install podman-quadlet
|
||||
ls -la
|
||||
ls -la /usr/libexec/podman
|
||||
systemctl -l | grep -i rootlessport
|
||||
ps aux | grep rootlessport
|
||||
podman-generate-systemd
|
||||
ls
|
||||
whereis podman-generate-systemd
|
||||
clear
|
||||
apt list --installed
|
||||
clear
|
||||
exit
|
||||
clear
|
||||
apt list --installed
|
||||
clear
|
||||
/usr/libexec/podman/quadlet -dryrun
|
||||
/usr/libexec/podman/quadlet --user -dryrun
|
||||
sudo -iu podman
|
||||
exit
|
||||
chown -R podman:podman /home/podman
|
||||
/usr/libexec/podman/quadlet -dryrun --user
|
||||
sudo -iu podman
|
||||
find / -name "immich-server.service" 2>/dev/null
|
||||
rm -R /home/podman/d
|
||||
find / -name "uptime-kuma-server.service" 2>/dev/null
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
links https://phares.duckdns.org
|
||||
nano /etc/hosts
|
||||
links https://phares.duckdns.org
|
||||
ls /var/www/html
|
||||
nano index.html
|
||||
nano /var/www/html/index.html
|
||||
@ -29,55 +73,180 @@ ls /var/www
|
||||
mkdir /var/www/html
|
||||
cp /var/www/html-slideshow/index.nginx-debian.html /var/www/html/
|
||||
mv /var/www/html /var/www/html-nginx
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
links https://phares.duckdns.org
|
||||
ls /var/www/html-nginx
|
||||
links https://adguard.phares.duckdns.org/
|
||||
nano /etc/hosts
|
||||
links https://adguard.phares.duckdns.org/
|
||||
nano /etc/hosts
|
||||
links https://adguard.phares.duckdns.org/
|
||||
nano /etc/hosts
|
||||
nano /etc/hosts
|
||||
links https://adguard.phares.duckdns.org/
|
||||
nano /etc/hosts
|
||||
links https://adguard.phares.duckdns.org/
|
||||
exit
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
podman pull docker.io/m1k1o/neko:firefox
|
||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
podman pull docker.io/mattermost/mattermost-team-edition:9.11.2
|
||||
sudo -iu podman
|
||||
podman list images
|
||||
podman ls images
|
||||
podman images ls
|
||||
podman image ls
|
||||
podman image prone
|
||||
podman image purge
|
||||
podman image --help
|
||||
podman image prune
|
||||
y
|
||||
podman image ls
|
||||
podman image rm 2
|
||||
podman image rm 7
|
||||
podman image ls
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
sudo -iu podman
|
||||
exit
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nano /etc/hosts
|
||||
nano /etc/hosts
|
||||
nano /etc/hosts
|
||||
exit
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
cat /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||
nano/home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||
sudo -iu podman
|
||||
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||
sudo -iu podman
|
||||
exit
|
||||
exit
|
||||
sudo -iu podman
|
||||
cd /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-external/_data
|
||||
ls
|
||||
ls -la
|
||||
cd /
|
||||
sudo -iu podman
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-upload/_data/thumbs/5f0b1052-466d-44de-a554-226d7256850d/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
links https://192.168.0.43:8123
|
||||
links http://192.168.0.43:8123
|
||||
exit
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||
cp -R /var/www/html-nginx/ /var/www/html-quartz
|
||||
cd /var/www/html-quartz
|
||||
ls
|
||||
mv index.nginx-debian.html index.html
|
||||
links http://192.168.11.2:8069/
|
||||
links http://192.168.11.2:8069/index.html
|
||||
cd /
|
||||
nginx -t
|
||||
cd /var/www/html-infineon/
|
||||
ls
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
apt-get update
|
||||
apt-get upgrade
|
||||
reboot
|
||||
links http://192.168.11.2:8069/
|
||||
links http://192.168.11.2:8069/
|
||||
links http://192.168.11.2/
|
||||
sudo -iu podman
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions/
|
||||
rm /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
|
||||
rm -R /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/var
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/phares3757/
|
||||
sudo -iu podman
|
||||
exit
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nano /root/.acme.sh/*.phares.duckdns.org_ecc/*.phares.duckdns.org.cer
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
reboot
|
||||
links http://127.0.0.1:8080/slideshow/index.html?nocache=2024-07-01-11-36
|
||||
links http://127.0.0.1:8080/slideshow/index.html
|
||||
links http://127.0.0.1:8080/slideshow
|
||||
links http://192.168.11.2:8080/slideshow
|
||||
nginx -t
|
||||
reboot
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
exit
|
||||
mv /root/.acme.sh/affirm.duckdns.org_ecc/ /root/acme.sh-master/wild-affirm
|
||||
mv /root/acme.sh-master/wild-affirm /root/.acme.sh/wild-affirm
|
||||
exit
|
||||
nginx -t
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
exit
|
||||
cd /tmp
|
||||
git clone https://github.com/acmesh-official/acme.sh.git
|
||||
cd /tmp/acme.sh
|
||||
@ -94,77 +263,190 @@ mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.conf /root/.acme.sh/wild-jmlc/jm
|
||||
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr
|
||||
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr.conf /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr.conf
|
||||
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.key /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.key
|
||||
nginx -t
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -s reload
|
||||
links http://192.168.11.2:9090
|
||||
links https://192.168.11.2:9090
|
||||
nginx -s reload
|
||||
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||
man cockpit.conf
|
||||
nano /etc/cockpit/cockpit.conf
|
||||
systemctl status cockpit.socket
|
||||
systemctl status cockpit
|
||||
systemctl stop cockpit
|
||||
systemctl stop cockpit.socket
|
||||
systemctl stop cockpit
|
||||
systemctl start cockpit
|
||||
systemctl start cockpit.socket
|
||||
nginx -s reload
|
||||
rm /etc/cockpit/cockpit.conf
|
||||
systemctl stop cockpit
|
||||
systemctl stop cockpit.socket
|
||||
systemctl stop cockpit
|
||||
systemctl start cockpit.socket
|
||||
systemctl start cockpit
|
||||
nginx -s reload
|
||||
journalctl -u cockpit
|
||||
cd /etc/cockpit/
|
||||
ls
|
||||
cd ws-certs.d/
|
||||
ls
|
||||
mv 0-self-signed.cert 0-self-signed.cert.old
|
||||
mv 0-self-signed.key 0-self-signed.key.old
|
||||
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer 0-self-signed.cert
|
||||
cp /root/.acme.sh/wild-phares/phares.duckdns.org.key 0-self-signed.key
|
||||
systemctl restart cockpit
|
||||
systemctl status cockpit
|
||||
systemctl status cockpit
|
||||
systemctl status cockpit
|
||||
systemctl status cockpit
|
||||
systemctl status cockpit
|
||||
systemctl restart cockpit
|
||||
nano /etc/cockpit/cockpit.conf
|
||||
systemctl restart cockpit
|
||||
systemctl status cockpit
|
||||
systemctl status cockpit
|
||||
systemctl status cockpit
|
||||
systemctl status cockpit
|
||||
systemctl restart cockpit
|
||||
systemctl status cockpit
|
||||
nginx -s reload
|
||||
systemctl restart cockpit
|
||||
systemctl status cockpit
|
||||
nginx -s reload
|
||||
nginx -s reload
|
||||
rm -R /mnt/free-file-sync/notes/FS-ADO/
|
||||
exit
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nignx -t
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
reboot
|
||||
lsof -i -P -n | grep LISTEN
|
||||
links http://192.168.11.2:5007/
|
||||
links http://127.0.0.1:5007/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
chmod -R 0774 /root/.acme.sh/wild-phares
|
||||
sudo -iu podman
|
||||
ls -la /root/.acme.sh/wild-phares
|
||||
chmod -R 0775 /root/.acme.sh/wild-phares
|
||||
ls -la /root/.acme.sh/wild-phares
|
||||
sudo -iu podman
|
||||
chmod -R 0777 /root/.acme.sh/wild-phares
|
||||
sudo -iu podman
|
||||
chmod -R 0774 /root/.acme.sh/wild-phares
|
||||
ls -la /root/.acme.sh/wild-phares
|
||||
chmod -R 0774 /root/.acme.sh
|
||||
ls -la /root/.acme.sh
|
||||
sudo -iu podman
|
||||
ln -s /root/.acme.sh/wild-phares /home/podman/wild-phares
|
||||
sudo -iu podman
|
||||
cp -R /root/.acme.sh/wild-phares /home/podman/wild-phares
|
||||
cp -R /root/.acme.sh/wild-phares/ /home/podman
|
||||
rm /home/podman/wild-phares
|
||||
cp -R /root/.acme.sh/wild-phares/ /home/podman
|
||||
chown podman:podman /home/podman
|
||||
ls /home/podman/wild-phares/
|
||||
ls -la /home/podman/wild-phares
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman
|
||||
ls -la /home/podman/wild-phares
|
||||
sudo -iu podman
|
||||
cd /home/podman/
|
||||
ls
|
||||
cd quadlet/
|
||||
ls -la
|
||||
cd default.target.wants/
|
||||
ls -la
|
||||
cd ..
|
||||
cd ..
|
||||
cd lib
|
||||
cd libpod/
|
||||
ls -la
|
||||
sudo -iu podman
|
||||
chown -R 1000:1000 /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||
cd /
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
reboot
|
||||
sudo -iu podman
|
||||
exit
|
||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||
/usr/libexec/podman/quadlet -dryrun --user
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
ls -ls \mnt\free-file-sync\proxmox
|
||||
ls -ls /mnt/free-file-sync/proxmox
|
||||
cd /home/podman
|
||||
apt-get install acl -y
|
||||
ls -la
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||
apt-get install acl -y
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||
ls -la
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||
cd /
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||
ls /home/podman/.config/cni/net.d
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
||||
cd /home/phares/
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||
getfacl /home/podman > permissions.acl
|
||||
ls
|
||||
cat permissions.acl
|
||||
rm permissions.acl
|
||||
getfacl -R /home/podman > podman-permissions-bad.acl
|
||||
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||
cd ../podman
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||
cd /
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||
nano /etc/passwd
|
||||
nano /etc/passwd
|
||||
nano /etc/group
|
||||
nano /etc/shadow
|
||||
find / -uid 1000 -exec chown -h 2000 {} +
|
||||
find / -gid 1000 -exec chgrp -h 2000 {} +
|
||||
find / -xdev -uid 1002 -exec chown -h 1000 {} +
|
||||
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
|
||||
reboot
|
||||
reboot
|
||||
nano /etc/passwd
|
||||
nano /etc/group
|
||||
find / -xdev -uid 1001 -exec chown -h 1005 {} +
|
||||
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
|
||||
find / -xdev -uid 2000 -exec chown -h 1001 {} +
|
||||
@ -175,18 +457,44 @@ find / -xdev -uid 1005 -exec chown -h 1002 {} +
|
||||
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
|
||||
reboot
|
||||
cd /
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
ls /run/user/
|
||||
ls /run/user/1001/systemd/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
/usr/libexec/podman/quadlet -dryrun --user
|
||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
||||
sudo -iu podman
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||
sudo -iu podman
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||
sudo -iu podman
|
||||
exit
|
||||
exit
|
@ -1,19 +1,32 @@
|
||||
ls /home/podman/.config/cni/net.d
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
||||
cd /home/phares/
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||
getfacl /home/podman > permissions.acl
|
||||
ls
|
||||
cat permissions.acl
|
||||
rm permissions.acl
|
||||
getfacl -R /home/podman > podman-permissions-bad.acl
|
||||
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||
cd ../podman
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||
cd /
|
||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||
nano /etc/passwd
|
||||
nano /etc/passwd
|
||||
nano /etc/group
|
||||
nano /etc/shadow
|
||||
find / -uid 1000 -exec chown -h 2000 {} +
|
||||
find / -gid 1000 -exec chgrp -h 2000 {} +
|
||||
find / -xdev -uid 1002 -exec chown -h 1000 {} +
|
||||
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
|
||||
reboot
|
||||
reboot
|
||||
nano /etc/passwd
|
||||
nano /etc/group
|
||||
find / -xdev -uid 1001 -exec chown -h 1005 {} +
|
||||
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
|
||||
find / -xdev -uid 2000 -exec chown -h 1001 {} +
|
||||
@ -24,16 +37,60 @@ find / -xdev -uid 1005 -exec chown -h 1002 {} +
|
||||
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
|
||||
reboot
|
||||
cd /
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
ls /run/user/
|
||||
ls /run/user/1001/systemd/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
/usr/libexec/podman/quadlet -dryrun --user
|
||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
||||
sudo -iu podman
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||
sudo -iu podman
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||
sudo -iu podman
|
||||
exit
|
||||
cp ~/.bash_history /etc/bash_history_2024-11-10.txt
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes
|
||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs
|
||||
@ -44,8 +101,23 @@ chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/syst
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||
@ -54,36 +126,123 @@ chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/syst
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/_data/
|
||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
systemctl --user start mattermost-db
|
||||
systemctl --user start mattermost-db
|
||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||
sudo -iu podman
|
||||
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
exit
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
links https://pgadmin.phares.duckdns.org/
|
||||
links https://pgadmin.phares.duckdns.org/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
lspci | grep -i nvme
|
||||
lspci -vv -s 08:00.0 | grep -w LnkCap
|
||||
lspci -vv -s 02:00.0 | grep -w LnkCap
|
||||
sudo -iu podman
|
||||
curl https://push-test.mattermost.com
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
apt-file search setcap
|
||||
setcap
|
||||
sudo -iu podman
|
||||
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||
sudo -iu podman
|
||||
nginx -s reload
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
snap install vaultwarden
|
||||
snap vaultwarden
|
||||
snap vaultwarden help
|
||||
lsof -i -P -n | grep LISTEN
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
snap stop vaultwarden
|
||||
sudo -iu podman
|
||||
snap stop vaultwarden
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
links https://192.168.11.2:5008
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
links https://192.168.11.2:5008
|
||||
links http://192.168.11.2:5008
|
||||
links https://192.168.11.2:5008
|
||||
snap start vaultwarden
|
||||
snap vaultwarden
|
||||
snap vaultwarden hash
|
||||
snap uninstall vaultwarden
|
||||
snap remove vaultwarden
|
||||
exot
|
||||
exit
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
links https://mattermost.phares.duckdns.org
|
||||
snap install vaultwarden
|
||||
snap stop vaultwarden
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
rm /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
snap remove vaultwarden
|
||||
snap install vaultwarden
|
||||
ls -la /var/snap/vaultwarden/current
|
||||
ls -la /var/snap/vaultwarden/current
|
||||
echo>/var/snap/vaultwarden/current/vaultwarden.conf
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
snap start vaultwarden
|
||||
snap info vaultwarden
|
||||
snap status vaultwarden
|
||||
lsof -i -P -n | grep LISTEN
|
||||
snap start vaultwarden
|
||||
lsof -i -P -n | grep LISTEN
|
||||
links https://192.168.11.2:5009/
|
||||
openssl s_client -showcerts -connect vaultwarden.phares.duckdns.org:443 -servername vaultwarden.phares.duckdns.org
|
||||
exit
|
||||
snap start vaultwarden
|
||||
journalctl -u snapd
|
||||
cat /var/snap/vaultwarden/current/
|
||||
top
|
||||
@ -97,52 +256,134 @@ snap watch id 37
|
||||
snap watch 37
|
||||
snap watch 34
|
||||
snap logs vaultwardedn
|
||||
snap logs vaultwarden
|
||||
ls -la /home/podman/wild-phares/
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
snap start vaultwarden
|
||||
snap logs vaultwarden
|
||||
ls -la /var/snap/vaultwarden/current/
|
||||
ls -la /var/snap/vaultwarden/current/ssl
|
||||
cp -R /home/podman/wild-phares/* /var/snap/vaultwarden/current/ssl/
|
||||
ls -la /var/snap/vaultwarden/current/ssl/
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
snap start vaultwarden
|
||||
snap logs vaultwarden
|
||||
snap logs vaultwarden
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
snap stop vaultwarden
|
||||
snap start vaultwarden
|
||||
sudo -iu podman
|
||||
exit
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
snap stop vaultwarden
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
snap start vaultwarden
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
exit
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
nano /etc/cockpit/cockpit.conf
|
||||
apt-get install cockpit cockpit-podman cockpit-machines -y
|
||||
apt-get install cockpit cockpit-podman cockpit-machines -y
|
||||
apt-get remove cockpit-machines -y
|
||||
apt-get install cockpit cockpit-podman cockpit-files -y
|
||||
apt-get install cockpit cockpit-podman cockpit-file -y
|
||||
apt-get search cockpit-file
|
||||
apt-get search
|
||||
apt-get --help
|
||||
apt-get check
|
||||
apt-get auto-purge
|
||||
apt-get --help
|
||||
apt-get purge
|
||||
apt-get autoremove
|
||||
apt-get autoremove
|
||||
apt-get update
|
||||
apt-get install cockpit cockpit-podman cockpit-files -y
|
||||
apt-get upgrade
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
nano /etc/docker/daemon.json
|
||||
nano /etc/podman/daemon.json
|
||||
sudo -iu podman
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
nano /etc/resolv.conf
|
||||
nano /etc/resolv.conf
|
||||
nano /etc/hosts
|
||||
cat /etc/hosts
|
||||
sudo -iu podman
|
||||
nano /etc/hosts
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
nginx -s reload
|
||||
nginx -s reload
|
||||
nano /etc/hosts
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
apt install podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
sudo -iu podman
|
||||
exit
|
||||
sudo -iu podman
|
||||
nginx -s reload
|
||||
exit
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
exit
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
nginx -s reload
|
||||
exit
|
||||
nano /etc/cockpit/cockpit.conf
|
||||
exit
|
||||
ls -la /etc/cockpit/ws-certs.d/
|
||||
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||
mv /etc/cockpit/ws-certs.d/0-self-signed.cert /etc/cockpit/ws-certs.d/0-self-signed.cert.part
|
||||
cp /root/.acme.sh/wild-phares/fullchain.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||
exit
|
||||
ls -la /etc/cockpit/ws-certs.d
|
||||
chomod 774 -r /etc/cockpit/ws-certs.d
|
||||
chmod 774 -R /etc/cockpit/ws-certs.d
|
||||
ls -la /etc/cockpit/ws-certs.d
|
||||
exit
|
||||
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||
ls -la /etc/cockpit/ws-certs.d
|
||||
rm /etc/cockpit/ws-certs.d/0-self-signed.cert.old
|
||||
chmod 774 -R /etc/cockpit/ws-certs.d
|
||||
exit
|
||||
ls -la /usr/libexec/podman/quadlet
|
||||
ls -la /usr/libexec/podman
|
||||
exit
|
||||
find / -name "neko-server.service" 2>/dev/null
|
||||
exit
|
||||
cp /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
|
||||
cp /run/user/1000/systemd/generator/default.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
|
||||
cp /run/user/1000/systemd/generator/neko-server.service /mnt/free-file-sync/proxmox/
|
||||
nano /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||
dif /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
||||
diff /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
||||
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||
sudo -iu podman
|
||||
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||
diff
|
||||
diff --help
|
||||
@ -153,26 +394,63 @@ diff -y /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-
|
||||
diff -r /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||
diff -y -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||
sudo -iu podman
|
||||
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||
/usr/lib/systemd/user-generators/podman-user-generator
|
||||
ls /usr/lib/systemd/user-generators/podman-user-generator
|
||||
exit
|
||||
nginx -s reload
|
||||
exit
|
||||
rm -R /var/www/html-infineon/
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
exit
|
||||
exit
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
exit
|
||||
docker
|
||||
exit
|
||||
snap list
|
||||
exit
|
||||
nano /var/www/html-slideshow/slideshow/scripts/index.js
|
||||
nano /var/www/html-slideshow/slideshow/index.json
|
||||
snap install dotnet-sdk --classic 9.0/stable
|
||||
dotnet --info
|
||||
snap install dotnet-sdk --classic --channel 9.0/stable
|
||||
snap install dotnet-sdk --stable 9.0/stable
|
||||
snap install dotnet-sdk --stable dotnet-sdk
|
||||
snap install --stable dotnet-sdk
|
||||
snap install --classic --stable dotnet-sdk
|
||||
exit
|
||||
~/.bashrc
|
||||
exit
|
||||
~/.bashrc
|
||||
nano /etc/hostname
|
||||
nano /etc/hostname
|
||||
/etc/hosts
|
||||
nano /etc/hosts
|
||||
/etc/hosts
|
||||
nano /etc/hostname
|
||||
nano /etc/hosts
|
||||
~/.bashrc
|
||||
sudo -i
|
||||
exit
|
||||
dotnet --info
|
||||
snap remove --classic --stable dotnet-sdk
|
||||
snap remove dotnet-sdk
|
||||
dotnet --info
|
||||
snap install dotnet-sdk --classic --9.0/stable
|
||||
snap install dotnet-sdk --classic --channel 9.0/stable
|
||||
apt-get update
|
||||
snap install dotnet-sdk --classic --channel 9.0/stable
|
||||
snap install dotnet-sdk --classic --latest/stable
|
||||
@ -182,12 +460,26 @@ export DOTNET_ROOT=/snap/dotnet-sdk/current
|
||||
~/.bash_profile
|
||||
~/.bashrc
|
||||
sudo -i
|
||||
exit
|
||||
dotnet --info
|
||||
cd /tmp/
|
||||
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
|
||||
ls
|
||||
cd one-review/
|
||||
podman compose up --build
|
||||
nano /etc/containers/registries.conf
|
||||
ls
|
||||
podman ps -a
|
||||
sudo -iu podman
|
||||
cd ..
|
||||
rm -R one-review/
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
apt-get install podman-plugins
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
sudo -iu podman
|
||||
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
|
||||
cd one-review/
|
||||
git checkout origin 11-17
|
||||
@ -200,7 +492,9 @@ snap install docker
|
||||
snap remove docker
|
||||
snap remove dotnet-sdk
|
||||
cd ..
|
||||
ls
|
||||
rm -R one-review/
|
||||
ls
|
||||
exit
|
||||
dotnet --info
|
||||
exit
|
||||
exit
|
@ -1,212 +0,0 @@
|
||||
mv /mnt/free-file-sync/iso/images-a/DisneyWorld\\\\ 2019/ /mnt/free-file-sync/iso/images-a/DisneyWorld\\ 2019/
|
||||
mv /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019 /mnt/free-file-sync/iso/images-a/DisneyWorld\\ 2019/
|
||||
rm -R /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019/
|
||||
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006
|
||||
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006\ \\\!9
|
||||
rm -R /mnt/free-file-sync/iso/images-a/Phares\\\ Slides\\\ ####
|
||||
mount /mnt/free-file-sync/iso/Edited.iso /mnt/iso-compare
|
||||
mount /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/2024-12-18-18-13-54-579.iso /mnt/iso-compare
|
||||
rm -R /mnt/free-file-sync/iso/images-a/Scanned\ Grandma\\\'s\ Quilt\ ####/
|
||||
rm -R /mnt/free-file-sync/iso/images-a/Event
|
||||
rm -R /mnt/free-file-sync/iso/images-a/Question/
|
||||
mount /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/2024-12-18-18-10-19-693.iso /mnt/iso-compare
|
||||
rm -R /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/
|
||||
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
|
||||
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
|
||||
rm -R /mnt/free-file-sync/iso/images-a/Facebook
|
||||
mount /mnt/free-file-sync/iso/images-a/Rex\ Memorial\ ####/2024-12-18-18-15-40-537.iso /mnt/iso-compare
|
||||
mount /mnt/free-file-sync/iso/images-a/Scanned\ Norman\ Herman/2024-12-18-18-15-43-097.iso /mnt/iso-compare
|
||||
rm -R /mnt/free-file-sync/iso/images-a/Scanned*
|
||||
rm -R /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/
|
||||
mount /mnt/free-file-sync/iso/images-a/DisneyWorld\ 2019/2024-12-18-18-42-26-222.iso /mnt/iso-compare
|
||||
umount /mnt/iso-compare
|
||||
rm -R /mnt/free-file-sync/iso/images-a/Slide in N*
|
||||
rm -R /mnt/free-file-sync/iso/images-a/Slide\\ in\\ N*
|
||||
ls -al /mnt/free-file-sync/iso/images-a/Sli*
|
||||
ls -al /mnt/free-file-sync/iso/images-a/Slide *
|
||||
ls -al /mnt/free-file-sync/iso/images-a/Slide\\ *
|
||||
ls -al /mnt/free-file-sync/iso/images-a
|
||||
rm -R /mnt/free-file-sync/iso/images-a/'Slide in Name Order Originals \(622\) ####'
|
||||
mkdir /mnt/free-file-sync/iso/videos-b
|
||||
rm /mnt/free-file-sync/iso/videos-b/Home\ Videos\ 1998\ -\ 2002/2024-12-18-19-49-52-202.iso
|
||||
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||
lsblk
|
||||
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
|
||||
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
|
||||
aptget update
|
||||
apt-get upgrade
|
||||
nano t
|
||||
mv -R /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
|
||||
mv /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
|
||||
mv /mnt/free-file-sync/logan-google-drive /mnt/free-file-sync/google-drive-logan
|
||||
/etc/duckdns/duck.sh >/dev/null 2>&1
|
||||
"/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
|
||||
cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
||||
cd /
|
||||
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"\%Y\%m\%d-\%H\%M\%S")'.tar'
|
||||
rm /home/podman/backup-blinko/*
|
||||
nano /run/podman/podman.sock
|
||||
ls /run/podman/podman.sock
|
||||
cat /var/log/syslog
|
||||
grep "ERROR" /var/log/cron
|
||||
crontab -l
|
||||
systemctl log cron
|
||||
ls /home/podman/backup-blinko/
|
||||
systemctl status cron
|
||||
snap list vaultwarden
|
||||
ls -la /home/lphares/dorico
|
||||
ls -la /home/lphares
|
||||
ls -la /home/lphares/dorico/
|
||||
ls /var/www/html-
|
||||
ls /etc/netplan/
|
||||
ls /etc/ModemManager/ -la
|
||||
ls /etc/ModemManager -la
|
||||
ls /etc/ModemManager
|
||||
ls /etc/ModemManager -
|
||||
ls /etc/ModemManager -l
|
||||
ls /etc/ModemManager --time-style
|
||||
ls /etc/ModemManager -lT
|
||||
ls /etc/ModemManager --time-style=full
|
||||
ls /etc/ModemManager/ --time-style=full
|
||||
ls /etc/ModemManager/
|
||||
ls /etc/ModemManager -l -T
|
||||
ls /etc/ModemManager -l --time-style=+"%b %d %Y %H:%M:%S"
|
||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S"
|
||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S%zz"
|
||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %HH:%M:%S %z"
|
||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %h:%M:%S %z"
|
||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S %z"
|
||||
ls /etc/ModemManager/ -la -D '%Y-%m-%dT%H:%M:%S'
|
||||
ls /etc/ModemManager/ -la -D '%Y-%m-%dT %H:%M:%S'
|
||||
ufw status
|
||||
ufw number status
|
||||
ufw numbered status
|
||||
ufw active
|
||||
ufw allow 53/tcp comment "01) DNS TCP"
|
||||
ufw allow 53/udp comment "02) DNS UDP"
|
||||
ufw allow 67/tcp comment "03) DHCP TCP"
|
||||
ufw allow 67/udp comment "04) DHCP UDP"
|
||||
ufw allow from 0.0.0.0/0 to any port 443/tcp comment "05) HTTPS"
|
||||
ufw allow from 192.168.11.0/25 to any port 22/tcp comment "06) SSH"
|
||||
ufw allow from 192.168.21.0/25 to any port 22/tcp comment "07) SSH"
|
||||
ufw allow from 192.168.31.0/25 to any port 22/tcp comment "08) SSH"
|
||||
ufw allow from 192.168.41.0/25 to any port 22/tcp comment "09) SSH"
|
||||
ufw allow from 192.168.42.0/25 to any port 22/tcp comment "10) SSH"
|
||||
ufw allow from 192.168.43.0/25 to any port 22/tcp comment "11) SSH"
|
||||
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
|
||||
ufw allow port 53/tcp comment "01) DNS TCP"
|
||||
ufw allow from 192.168.11.0/25 port 22/tcp comment "06) SSH"
|
||||
ufw allow from 192.168.21.0/25 port 22/tcp comment "07) SSH"
|
||||
ufw allow from 192.168.31.0/25 port 22/tcp comment "08) SSH"
|
||||
ufw allow from 192.168.41.0/25 port 22/tcp comment "09) SSH"
|
||||
ufw allow from 192.168.42.0/25 port 22/tcp comment "10) SSH"
|
||||
ufw allow from 192.168.43.0/25 port 22/tcp comment "11) SSH"
|
||||
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
|
||||
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
|
||||
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
||||
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
|
||||
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
|
||||
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
|
||||
ufw allow from 192.168.11.0/25 port 22 comment "06) SSH"
|
||||
ufw allow from 192.168.21.0/25 port 22 comment "07) SSH"
|
||||
ufw allow from 192.168.31.0/25 port 22 comment "08) SSH"
|
||||
ufw allow from 192.168.41.0/25 port 22 comment "09) SSH"
|
||||
ufw allow from 192.168.42.0/25 port 22 comment "10) SSH"
|
||||
ufw allow from 192.168.43.0/25 port 22 comment "11) SSH"
|
||||
ufw allow to 0.0.0.0/0 port 22 comment "12) SSH"
|
||||
ufw delete 12
|
||||
ufw allow to 192.168.11.0/25 port 22 comment "12) SSH"
|
||||
ufw allow to 192.168.21.0/25 port 22 comment "13) SSH"
|
||||
ufw allow to 192.168.31.0/25 port 22 comment "14) SSH"
|
||||
ufw allow to 192.168.41.0/25 port 22 comment "15) SSH"
|
||||
ufw allow to 192.168.42.0/25 port 22 comment "16) SSH"
|
||||
ufw allow to 192.168.43.0/25 port 22 comment "17) SSH"
|
||||
cat /etc/passwd
|
||||
pcap
|
||||
ps -ef | grep nginx
|
||||
usermod -a -G lphares www-data
|
||||
chmod -R 774 /home/lphares/dorico
|
||||
rm -r /home/lphares/dorico
|
||||
su lphares
|
||||
ufw enabled
|
||||
ufw allow from 0.0.0.0/0 port 443 comment "18) HTTPS"
|
||||
ufw reset
|
||||
ufw allow 53/tcp comment "01) DNS TCP"
|
||||
ufw allow 53/udp comment "02) DNS UDP"
|
||||
ufw allow 67/tcp comment "03) DHCP TCP"
|
||||
ufw allow 67/udp comment "04) DHCP UDP"
|
||||
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
||||
ufw allow to 0.0.0.0/0 port 443 comment "06) HTTPS"
|
||||
ufw allow from 192.168.11.0/25 port 22 comment "07) SSH"
|
||||
ufw allow from 192.168.21.0/25 port 22 comment "08) SSH"
|
||||
ufw allow from 192.168.31.0/25 port 22 comment "09) SSH"
|
||||
ufw allow from 192.168.41.0/25 port 22 comment "10) SSH"
|
||||
ufw allow from 192.168.42.0/25 port 22 comment "11) SSH"
|
||||
ufw allow from 192.168.43.0/25 port 22 comment "12) SSH"
|
||||
ufw allow to 192.168.11.0/25 port 22 comment "13) SSH"
|
||||
ufw allow to 192.168.21.0/25 port 22 comment "14) SSH"
|
||||
ufw allow to 192.168.31.0/25 port 22 comment "15) SSH"
|
||||
ufw allow to 192.168.41.0/25 port 22 comment "16) SSH"
|
||||
ufw allow to 192.168.42.0/25 port 22 comment "17) SSH"
|
||||
ufw allow to 192.168.43.0/25 port 22 comment "18) SSH"
|
||||
ufw enable
|
||||
ufw disable
|
||||
top[
|
||||
top
|
||||
apt-get remove certbot
|
||||
snap remove certbot
|
||||
systemctl list-timers
|
||||
grep sshd.\*Failed /var/log/auth.log | less
|
||||
grep sshd.\* /var/log/auth.log
|
||||
grep sshd.\*publickey /var/log/auth.log
|
||||
grep sshd.\*publickey /var/log/auth.log | less
|
||||
apt update
|
||||
apt install fail2ban -y
|
||||
systemctl status fail2ban.service
|
||||
cd /etc/fail2ban
|
||||
ls
|
||||
head -20 jail.conf
|
||||
cp jail.conf jail.local
|
||||
nano jail.local
|
||||
systemctl enable fail2ban
|
||||
systemctl start fail2ban
|
||||
systemctl status fail2ban
|
||||
apt-get update
|
||||
apt upgrade
|
||||
snap info adguard-home
|
||||
tail /var/log/auth.log -f
|
||||
ufw status numbered
|
||||
id
|
||||
su phares
|
||||
su podman
|
||||
ip a
|
||||
ip a l | grep inet6
|
||||
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
||||
cat /boot/firmware/cmdline.txt
|
||||
nano /boot/firmware/cmdline.txt
|
||||
snap restart adguard-home
|
||||
nano /etc/duckdns/duck.sh
|
||||
chmod 700 /etc/duckdns/duck.sh
|
||||
cd /etc/duckdns
|
||||
./duck.sh
|
||||
ps -ef | grep cr[o]n
|
||||
crontab -e
|
||||
cat duck.log
|
||||
xit
|
||||
links http://192.168.11.2:5015/
|
||||
chown podman:podman /home/podman/2fauth -R
|
||||
nc -zv localhost 5015
|
||||
nano /home/podman/.ssh/authorized_keys
|
||||
nano /home/bmiller/.ssh/authorized_keys
|
||||
nano /home/lphares/.ssh/authorized_keys
|
||||
nano /root/.ssh/authorized_keys
|
||||
nano /home/persa/.ssh/authorized_keys
|
||||
nano /home/phares/.ssh/authorized_keys
|
||||
exit\
|
||||
nano /etc/hostname
|
||||
nano /etc/hosts
|
||||
sudo -iu podman
|
||||
nginx -s reload
|
||||
nginx -t
|
||||
reboot
|
||||
exit
|
@ -1,189 +0,0 @@
|
||||
rm -R /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||
cp -R /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||
cp -Rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||
cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||
yes | cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||
\cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||
ls /var/lib/containers/storage/overlay-layers/
|
||||
cat /var/lib/containers/storage/overlay-layers/layers.json
|
||||
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json.json
|
||||
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json
|
||||
cat /var/lib/containers/storage/overlay-layers/layers.lock
|
||||
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||
podman reset syste
|
||||
podman reset system
|
||||
podman system reset
|
||||
podman system prune
|
||||
rm -Rf /home/podman/.local/share/containers/storage/overlay/9234e0dfb7414fea7d4610bea727177a951b39a5df9f0573882cbf9e5bc16417/
|
||||
ls -la /home/podman/cron-backup/
|
||||
ls -la /home/podman/cron-backup
|
||||
ls -la /home/podman/cron-backup-delete/
|
||||
ls -la /home/podman/cron-backup-2025-01-31/
|
||||
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rmit --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||
podman ls
|
||||
podman ps a
|
||||
podman ps -a
|
||||
podman image prune
|
||||
podman volume list
|
||||
podman ps
|
||||
podman image rm 9
|
||||
podman image list
|
||||
rsync -a /home/podman/jackyzha0-quartz-phares/content/year-season/ /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||
cd /home/www-data/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
||||
cat /var/snap/vaultwarden/current/ssl/fullchain.cer
|
||||
snap info vaultwarden
|
||||
snap status vaultwarden
|
||||
snap help
|
||||
ls /root/.acme.sh/
|
||||
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/
|
||||
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/fullchain.cer
|
||||
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/\*.phares.duckdns.org.key
|
||||
cp /home/podman/wild-phares/fullchain.cer /var/snap/vaultwarden/current/ssl/fullchain.cer
|
||||
cp /home/podman/wild-phares/phares.duckdns.org.key /var/snap/vaultwarden/current/ssl/phares.duckdns.org.key
|
||||
snap start vaultwarden
|
||||
snap logs vaultwarden
|
||||
nano /run/resolvconf/resolv.conf
|
||||
cat /etc/resolv.conf
|
||||
ls -la /var/snap/vaultwarden/current/data/icon_cache/
|
||||
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss/
|
||||
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss
|
||||
nignx -t
|
||||
ls /var/snap/vaultwarden/current/data/tmp/
|
||||
ls /var/snap/vaultwarden/current/data/icon_cache/
|
||||
ls /var/snap/vaultwarden/current/data/icon_cache/ -ls
|
||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||
systemctl disable systemd-resolved.service
|
||||
snap start adguard-home
|
||||
snap logs adguard-home
|
||||
systemctl enable systemd-resolved.service
|
||||
snap restart vaultwarden
|
||||
ls /etc/resolv.conf
|
||||
ping
|
||||
ping duckdns.org
|
||||
nano /etc/resolv.conf
|
||||
snap info adguard-home
|
||||
snap stop adguard-home
|
||||
systemctl start systemd-resolved
|
||||
ping www.google.com
|
||||
systemctl disable systemd-resolved
|
||||
systemctl stop systemd-resolved
|
||||
reboot
|
||||
lsof -i -P -n | grep LISTEN
|
||||
nano /etc/ssh/sshd_config
|
||||
cp -R /etc/ssh/sshd_config /home/podman/etc-ssh-sshd_config
|
||||
cp -R /etc/ssh/sshd_config.d /home/podman/etc-ssh-sshd_config.d
|
||||
chown -R podman:podman /home/podman/etc-ssh-sshd_config.d
|
||||
chown -R podman:podman /home/podman/etc-ssh-sshd_config
|
||||
ls -la podman:podman /home/podman/etc-ssh-sshd_config
|
||||
mv /home/podman/etc-ssh-sshd_config.d /home/podman/etc-ssh-sshd_config-r
|
||||
mv /home/podman/etc-ssh-sshd_config-r/sshd_config.d/ /home/podman/etc-ssh-sshd_config.d
|
||||
ls /home/podman/etc-ssh-sshd_config.d
|
||||
ls /home/podman/etc-ssh-sshd_config-r
|
||||
rm -R /home/podman/etc-ssh-sshd_config-r
|
||||
apt-install yazi -y
|
||||
apt-get install yazi -y
|
||||
apt install -y ffmpeg 7zip jq poppler-utils fd-find ripgrep fzf zoxide imagemagick
|
||||
git clone https://github.com/sxyazi/yazi.git
|
||||
apt install cargo
|
||||
apt install make -y
|
||||
make
|
||||
gcc
|
||||
apt install gcc -y
|
||||
cat /tmp/yazi/Cargo.lock
|
||||
cls
|
||||
clear
|
||||
cd yazi/
|
||||
cargo build --release --locked
|
||||
ls /home/podman/etc-ssh-sshd_config -ls
|
||||
cp /etc/ssh/ssh_config /home/podman/etc-ssh-ssh_config
|
||||
naon /home/podman/etc-ssh-ssh_config
|
||||
nano /home/podman/etc-ssh-ssh_config
|
||||
chown podman:podman /home/podman/etc-ssh-ssh_config
|
||||
cd /tmp/
|
||||
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/5608b233-a2f4-4018-aa70-570b0689b266/
|
||||
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024
|
||||
git fetch
|
||||
rm -R original-to-deterministic-hash-code/
|
||||
git clone https://51f44975c8734522b2dec36c6d9a116276c6bded@gitea.phares.duckdns.org/phares3757/original-to-deterministic-hash-code.git
|
||||
cd original-to-deterministic-hash-code/
|
||||
chown -R podman:podman original-to-deterministic-hash-code/
|
||||
chown -R podman:podman /tmp/original-to-deterministic-hash-code/
|
||||
chown -R podman:podman /tmp/original-to-deterministic-hash-code
|
||||
chown -R podman:podman /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/
|
||||
cat /root/.ssh/id_ed25519
|
||||
cat /root/.ssh/id_ed25519.pub
|
||||
cat /root/.ssh
|
||||
ssh-copy-id
|
||||
ssh-copy-id root
|
||||
ls -la /root/.ssh
|
||||
nano /var/snap/adguard-home/current/AdGuardHome.yaml
|
||||
nano /etc/hostname
|
||||
nano /etc/hosts
|
||||
crontab -e
|
||||
nano /root/.ssh/authorized_keys
|
||||
cd /tmp
|
||||
git clone https://github.com/acmesh-official/acme.sh.git
|
||||
cd /tmp/acme.sh
|
||||
./acme.sh --install -m mikepharesjr@msn.com
|
||||
export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9
|
||||
echo $DuckDNS_Token
|
||||
./acme.sh --register-account -m mikepharesjr@msn.com
|
||||
./acme.sh --set-default-ca --server letsencrypt
|
||||
./acme.sh --issue --dns dns_duckdns -d '*.sumco.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
|
||||
ls -la /ssl
|
||||
ls -la /root/.acme.sh/\*.sumco.duckdns.org_ecc/
|
||||
cp -R /root/.acme.sh/\*.sumco.duckdns.org_ecc/ /home/podman/wild-sumco
|
||||
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.cer /home/podman/wild-sumco/sumco.duckdns.org.cer
|
||||
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.conf /home/podman/wild-sumco/sumco.duckdns.org.conf
|
||||
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr /home/podman/wild-sumco/sumco.duckdns.org.csr
|
||||
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr.conf /home/podman/wild-sumco/sumco.duckdns.org.csr.conf
|
||||
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.key /home/podman/wild-sumco/sumco.duckdns.org.key
|
||||
chown -R podman:podman /home/podman/wild-sumco/
|
||||
ls -la /home/podman/wild-sumco/
|
||||
tail -f /var/log/nginx/access.log
|
||||
nano /pod
|
||||
cp /etc/nginx/include/actual.conf /etc/nginx/include/ha.conf
|
||||
cp /etc/nginx/include/actual.conf /etc/nginx/include/nginx.conf
|
||||
nano /etc/nginx/include/ha.conf
|
||||
nginx
|
||||
nano /etc/nginx/include/ha.conf
|
||||
nano /etc/nginx/sites-available/default
|
||||
nano /etc/nginx/include/nginx.conf
|
||||
nano /root/.ssh/id_ed25519.pub
|
||||
apt install apache2-utils
|
||||
htpasswd -c /etc/nginx/.htpasswd phares
|
||||
ls \var\snap\vaultwarden
|
||||
ls /var/snap/vaultwarden/
|
||||
ls /var/snap/vaultwarden -la
|
||||
journalctl --rotate
|
||||
journalctl --vacuum-time=1s
|
||||
journalctl -u cockpit
|
||||
nginx -t
|
||||
nginx -s reload
|
||||
sudo -iu podman
|
||||
apt-get update
|
||||
apt-get upgrade
|
||||
ip -a
|
||||
ip a
|
||||
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
|
||||
ncdu -o iso.json
|
||||
exit
|
||||
cd /mnt/
|
||||
ncdu -f file.json
|
||||
ncdu -o file.json
|
||||
ls -la
|
||||
mv file.json free-file-sync/proxmox/
|
||||
cd /mnt/backup
|
||||
cd .
|
||||
cd /
|
||||
cd /mnt/free-file-sync/iso/
|
||||
ls
|
||||
cd ..
|
||||
rm -R iso/
|
||||
ncdu
|
||||
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
|
||||
shutdown now
|
@ -59,7 +59,7 @@ fwupd-refresh:x:989:
|
||||
netdev:x:110:
|
||||
phares:x:1001:
|
||||
podman:x:1000:
|
||||
lphares:x:1003:bmiller,persa,www-data
|
||||
lphares:x:1003:bmiller,persa
|
||||
bmiller:x:1004:
|
||||
unbound:x:111:
|
||||
cockpit-ws:x:112:
|
||||
|
@ -68,7 +68,7 @@ pcp:x:988:
|
||||
persa:x:1002:
|
||||
redis:x:114:
|
||||
swtpm:x:115:
|
||||
libvirt:x:116:phares,podman,libvirtdbus
|
||||
libvirt:x:116:phares,podman
|
||||
libvirt-qemu:x:64055:libvirt-qemu
|
||||
libvirt-dnsmasq:x:117:
|
||||
libvirtdbus:x:118:
|
||||
|
@ -59,7 +59,7 @@ fwupd-refresh:!*::
|
||||
netdev:!::
|
||||
phares:!::
|
||||
podman:!::
|
||||
lphares:!::bmiller,persa,www-data
|
||||
lphares:!::bmiller,persa
|
||||
bmiller:!::
|
||||
unbound:!::
|
||||
cockpit-ws:!::
|
||||
|
@ -68,7 +68,7 @@ pcp:!::
|
||||
persa:!::
|
||||
redis:!::
|
||||
swtpm:!::
|
||||
libvirt:!::phares,podman,libvirtdbus
|
||||
libvirt:!::phares,podman
|
||||
libvirt-qemu:!::libvirt-qemu
|
||||
libvirt-dnsmasq:!::
|
||||
libvirtdbus:!::
|
||||
|
@ -1,5 +1,5 @@
|
||||
127.0.0.1 localhost
|
||||
127.0.1.1 phares.duckdns.org
|
||||
127.0.1.1 trigkey-green-g4
|
||||
|
||||
# The following lines are desirable for IPv6 capable hosts
|
||||
::1 ip6-localhost ip6-loopback
|
||||
|
@ -1,21 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDjDCCAxKgAwIBAgISBMFGragC9OgIAiG4P5naLK3mMAoGCCqGSM49BAMDMDIx
|
||||
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||
NjAeFw0yNTAxMTMyMDQxMTFaFw0yNTA0MTMyMDQxMTBaMCAxHjAcBgNVBAMTFWdp
|
||||
dGVhLmp1bXBpbmdjcmFiLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMxa
|
||||
tycX56D91JSQtdSYG/pPlyqrlka+qhfoYd4IzEjz23n3aqbdHWp4kzKgfdfo99vJ
|
||||
16AAUgK4LV2eWk6ZddijggIYMIICFDAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYw
|
||||
FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFN/q
|
||||
GV5U2yPWTWBmlfvAp0crrMC0MB8GA1UdIwQYMBaAFJMnRpgDqVFojpjWxEJI2yO/
|
||||
WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2Lm8ubGVu
|
||||
Y3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcvMCAGA1Ud
|
||||
EQQZMBeCFWdpdGVhLmp1bXBpbmdjcmFiLmNvbTATBgNVHSAEDDAKMAgGBmeBDAEC
|
||||
ATCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB3AN6FgddQJHxrzcuvVjfF54HGTORu
|
||||
1hdjn480pybJ4r03AAABlGGbth0AAAQDAEgwRgIhAKS2r6FtEv17AjuJYICWvsK7
|
||||
R54pf8/pJL5UGIhy23UkAiEAn2DdIAEg5o1g8ULtoG2mUYt+YTbDBdH1coEoe/Cd
|
||||
XRoAdgDPEVbu1S58r/OHW9lpLpvpGnFnSrAX7KwB0lt3zsw7CAAAAZRhm7ZHAAAE
|
||||
AwBHMEUCIGuSi8pZgdi3bLYsYg+a44ZYSQM2YSDdhau+P+V2m8DaAiEA4fqy8KEg
|
||||
S9vH8b9B+Gz+i5dRKchD1S4ydzOdhZTR1DMwCgYIKoZIzj0EAwMDaAAwZQIxANUl
|
||||
PQW7UOTQOgd0KKqZeygvPCY7qvSr6V2ZR2Yx6e4wXt9i/bhXVjNvYMyffCjh1gIw
|
||||
ETtUf366hIClR7HmTjEG3vdjinqgVKvkAZqufAPnijbKKtnsNXhACWl18UXngBG6
|
||||
-----END CERTIFICATE-----
|
@ -1,26 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||
Ig46v9mFmBvyH04=
|
||||
-----END CERTIFICATE-----
|
@ -1,47 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDjDCCAxKgAwIBAgISBMFGragC9OgIAiG4P5naLK3mMAoGCCqGSM49BAMDMDIx
|
||||
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||
NjAeFw0yNTAxMTMyMDQxMTFaFw0yNTA0MTMyMDQxMTBaMCAxHjAcBgNVBAMTFWdp
|
||||
dGVhLmp1bXBpbmdjcmFiLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMxa
|
||||
tycX56D91JSQtdSYG/pPlyqrlka+qhfoYd4IzEjz23n3aqbdHWp4kzKgfdfo99vJ
|
||||
16AAUgK4LV2eWk6ZddijggIYMIICFDAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYw
|
||||
FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFN/q
|
||||
GV5U2yPWTWBmlfvAp0crrMC0MB8GA1UdIwQYMBaAFJMnRpgDqVFojpjWxEJI2yO/
|
||||
WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2Lm8ubGVu
|
||||
Y3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcvMCAGA1Ud
|
||||
EQQZMBeCFWdpdGVhLmp1bXBpbmdjcmFiLmNvbTATBgNVHSAEDDAKMAgGBmeBDAEC
|
||||
ATCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB3AN6FgddQJHxrzcuvVjfF54HGTORu
|
||||
1hdjn480pybJ4r03AAABlGGbth0AAAQDAEgwRgIhAKS2r6FtEv17AjuJYICWvsK7
|
||||
R54pf8/pJL5UGIhy23UkAiEAn2DdIAEg5o1g8ULtoG2mUYt+YTbDBdH1coEoe/Cd
|
||||
XRoAdgDPEVbu1S58r/OHW9lpLpvpGnFnSrAX7KwB0lt3zsw7CAAAAZRhm7ZHAAAE
|
||||
AwBHMEUCIGuSi8pZgdi3bLYsYg+a44ZYSQM2YSDdhau+P+V2m8DaAiEA4fqy8KEg
|
||||
S9vH8b9B+Gz+i5dRKchD1S4ydzOdhZTR1DMwCgYIKoZIzj0EAwMDaAAwZQIxANUl
|
||||
PQW7UOTQOgd0KKqZeygvPCY7qvSr6V2ZR2Yx6e4wXt9i/bhXVjNvYMyffCjh1gIw
|
||||
ETtUf366hIClR7HmTjEG3vdjinqgVKvkAZqufAPnijbKKtnsNXhACWl18UXngBG6
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||
Ig46v9mFmBvyH04=
|
||||
-----END CERTIFICATE-----
|
@ -1,5 +0,0 @@
|
||||
-----BEGIN EC PRIVATE KEY-----
|
||||
MHcCAQEEIOJMe824fldC1I31j9QPXW2rqnkUK+EzwImja0V5U4dioAoGCCqGSM49
|
||||
AwEHoUQDQgAEzFq3JxfnoP3UlJC11Jgb+k+XKquWRr6qF+hh3gjMSPPbefdqpt0d
|
||||
aniTMqB91+j328nXoABSArgtXZ5aTpl12A==
|
||||
-----END EC PRIVATE KEY-----
|
@ -1,22 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDmDCCAx2gAwIBAgISBNrhyPO9lURJq4y8TIOmcZinMAoGCCqGSM49BAMDMDIx
|
||||
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||
NjAeFw0yNTAxMTMxOTU4NTRaFw0yNTA0MTMxOTU4NTNaMCYxJDAiBgNVBAMTG2dp
|
||||
dGVhLnBoYXJlcy5yZWRpcmVjdG1lLm5ldDBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||
A0IABOqlBmpoQ7TPHnoZaMTrwcx53iahLDpybzAWCZZFr50Ser3tQw060EtC//7k
|
||||
pE1JN3ANVfZxfM1L3LhQW+EzpVKjggIdMIICGTAOBgNVHQ8BAf8EBAMCB4AwHQYD
|
||||
VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O
|
||||
BBYEFMdzVvO/xfepKV9aYkOlfpu3HK8vMB8GA1UdIwQYMBaAFJMnRpgDqVFojpjW
|
||||
xEJI2yO/WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2
|
||||
Lm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcv
|
||||
MCYGA1UdEQQfMB2CG2dpdGVhLnBoYXJlcy5yZWRpcmVjdG1lLm5ldDATBgNVHSAE
|
||||
DDAKMAgGBmeBDAECATCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB1AM8RVu7VLnyv
|
||||
84db2Wkum+kacWdKsBfsrAHSW3fOzDsIAAABlGF0/SEAAAQDAEYwRAIgWBCl2+1d
|
||||
/RKxIOoy3hBIj8NU6gUXRhGdvD0mtlt6BNoCIHOitA5tz2bRHIfI8XoUPBgG1w66
|
||||
kfAvq2g4/Lkr+2+MAHcA4JKz/AwdyOdoNh/eYbmWTQpSeBmKctZyxLBNpW1vVAQA
|
||||
AAGUYXT9lwAABAMASDBGAiEA+n9nrUsAEONOgh12+m16djdSnPdCOs6k7uhXvxv2
|
||||
ENECIQDKodCwTeNIN7AqMWGXP2zcxHsst4sFjM449Hdk1NdjSDAKBggqhkjOPQQD
|
||||
AwNpADBmAjEAtLOSbXY3QES7JgOMUBJYOypax4o2fH+VAeCvfZSSMYwGWKf2x3GR
|
||||
yL+gqJrn0b1MAjEA9oxyQCGzjIH67qBJGlmp4DOI3N14Ml7kkQZeJ4JmdeexQjVc
|
||||
QElF18a/Ngw3qS4D
|
||||
-----END CERTIFICATE-----
|
@ -1,26 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||
Ig46v9mFmBvyH04=
|
||||
-----END CERTIFICATE-----
|
@ -1,48 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDmDCCAx2gAwIBAgISBNrhyPO9lURJq4y8TIOmcZinMAoGCCqGSM49BAMDMDIx
|
||||
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||
NjAeFw0yNTAxMTMxOTU4NTRaFw0yNTA0MTMxOTU4NTNaMCYxJDAiBgNVBAMTG2dp
|
||||
dGVhLnBoYXJlcy5yZWRpcmVjdG1lLm5ldDBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||
A0IABOqlBmpoQ7TPHnoZaMTrwcx53iahLDpybzAWCZZFr50Ser3tQw060EtC//7k
|
||||
pE1JN3ANVfZxfM1L3LhQW+EzpVKjggIdMIICGTAOBgNVHQ8BAf8EBAMCB4AwHQYD
|
||||
VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O
|
||||
BBYEFMdzVvO/xfepKV9aYkOlfpu3HK8vMB8GA1UdIwQYMBaAFJMnRpgDqVFojpjW
|
||||
xEJI2yO/WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2
|
||||
Lm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcv
|
||||
MCYGA1UdEQQfMB2CG2dpdGVhLnBoYXJlcy5yZWRpcmVjdG1lLm5ldDATBgNVHSAE
|
||||
DDAKMAgGBmeBDAECATCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB1AM8RVu7VLnyv
|
||||
84db2Wkum+kacWdKsBfsrAHSW3fOzDsIAAABlGF0/SEAAAQDAEYwRAIgWBCl2+1d
|
||||
/RKxIOoy3hBIj8NU6gUXRhGdvD0mtlt6BNoCIHOitA5tz2bRHIfI8XoUPBgG1w66
|
||||
kfAvq2g4/Lkr+2+MAHcA4JKz/AwdyOdoNh/eYbmWTQpSeBmKctZyxLBNpW1vVAQA
|
||||
AAGUYXT9lwAABAMASDBGAiEA+n9nrUsAEONOgh12+m16djdSnPdCOs6k7uhXvxv2
|
||||
ENECIQDKodCwTeNIN7AqMWGXP2zcxHsst4sFjM449Hdk1NdjSDAKBggqhkjOPQQD
|
||||
AwNpADBmAjEAtLOSbXY3QES7JgOMUBJYOypax4o2fH+VAeCvfZSSMYwGWKf2x3GR
|
||||
yL+gqJrn0b1MAjEA9oxyQCGzjIH67qBJGlmp4DOI3N14Ml7kkQZeJ4JmdeexQjVc
|
||||
QElF18a/Ngw3qS4D
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||
Ig46v9mFmBvyH04=
|
||||
-----END CERTIFICATE-----
|
@ -1,5 +0,0 @@
|
||||
-----BEGIN EC PRIVATE KEY-----
|
||||
MHcCAQEEILSambH2O8RFkT6eZn+bwQQ2oB6AFtjkHKsC+t0eWflroAoGCCqGSM49
|
||||
AwEHoUQDQgAE6qUGamhDtM8eehloxOvBzHneJqEsOnJvMBYJlkWvnRJ6ve1DDTrQ
|
||||
S0L//uSkTUk3cA1V9nF8zUvcuFBb4TOlUg==
|
||||
-----END EC PRIVATE KEY-----
|
@ -1,22 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDkTCCAxigAwIBAgISA84Tzt2T/OnITRhOVEVQQnpqMAoGCCqGSM49BAMDMDIx
|
||||
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||
NTAeFw0yNTAxMTMxOTU3MzlaFw0yNTA0MTMxOTU3MzhaMCQxIjAgBgNVBAMTGWdp
|
||||
dGVhLnBoYXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
||||
AATZO9CC5BKrZD48/oCt4GBwB4VUUC2YqQ1en+gAEf6VQmGle3d0LIDz2Htj7YDc
|
||||
Mi+LfHoTetMdBZ3AkHdPfiSko4ICGjCCAhYwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
|
||||
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
|
||||
BBSn8ip83SQYa2IBACHAIrXq5Y3HwzAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37Sss
|
||||
xMZwi9LXDTBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5v
|
||||
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzAk
|
||||
BgNVHREEHTAbghlnaXRlYS5waGFyZXMzNzU3LmRkbnMubmV0MBMGA1UdIAQMMAow
|
||||
CAYGZ4EMAQIBMIIBAwYKKwYBBAHWeQIEAgSB9ASB8QDvAHYA3oWB11AkfGvNy69W
|
||||
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYXPZOQAABAMARzBFAiEA2UyYzjMITIYL
|
||||
335nk+mnTgVXH8GaAr5HHDVIx8FXwzUCIEfMHAQwAp/1NIGood7c5XaPD1V67qe2
|
||||
xs70tDAC62gOAHUATnWjJ1yaEMM4W2zU3z9S6x3w4I4bjWnAsfpksWKaOd8AAAGU
|
||||
YXPZOAAABAMARjBEAiBAqRtkyRrpLLqZEVQ1UyMOR+40BlDeUjhYEEIzdizH2gIg
|
||||
Lv8Rm+yvyToL81CmVRxT7pI58JsHEyt/y3LOr7MwVCQwCgYIKoZIzj0EAwMDZwAw
|
||||
ZAIweZ1tC6rNSS4tFpv/oMM7NpnpBqLlOMvyRRWP2IwOqK3KfT89kDEueu4VPbl9
|
||||
sCkZAjBFlsSvVwP3/ZSN3SA1G6OrHtoa6G2e37y+CD/mgrD/gegtn6ysqmqpVbAZ
|
||||
Rap1c5A=
|
||||
-----END CERTIFICATE-----
|
@ -1,26 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw
|
||||
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||
RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK
|
||||
a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO
|
||||
VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw
|
||||
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw
|
||||
i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C
|
||||
2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+
|
||||
bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG
|
||||
6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV
|
||||
XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO
|
||||
koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq
|
||||
cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI
|
||||
E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e
|
||||
K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX
|
||||
GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL
|
||||
sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd
|
||||
VQD9F6Na/+zmXCc=
|
||||
-----END CERTIFICATE-----
|
@ -1,48 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDkTCCAxigAwIBAgISA84Tzt2T/OnITRhOVEVQQnpqMAoGCCqGSM49BAMDMDIx
|
||||
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||
NTAeFw0yNTAxMTMxOTU3MzlaFw0yNTA0MTMxOTU3MzhaMCQxIjAgBgNVBAMTGWdp
|
||||
dGVhLnBoYXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
||||
AATZO9CC5BKrZD48/oCt4GBwB4VUUC2YqQ1en+gAEf6VQmGle3d0LIDz2Htj7YDc
|
||||
Mi+LfHoTetMdBZ3AkHdPfiSko4ICGjCCAhYwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
|
||||
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
|
||||
BBSn8ip83SQYa2IBACHAIrXq5Y3HwzAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37Sss
|
||||
xMZwi9LXDTBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5v
|
||||
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzAk
|
||||
BgNVHREEHTAbghlnaXRlYS5waGFyZXMzNzU3LmRkbnMubmV0MBMGA1UdIAQMMAow
|
||||
CAYGZ4EMAQIBMIIBAwYKKwYBBAHWeQIEAgSB9ASB8QDvAHYA3oWB11AkfGvNy69W
|
||||
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYXPZOQAABAMARzBFAiEA2UyYzjMITIYL
|
||||
335nk+mnTgVXH8GaAr5HHDVIx8FXwzUCIEfMHAQwAp/1NIGood7c5XaPD1V67qe2
|
||||
xs70tDAC62gOAHUATnWjJ1yaEMM4W2zU3z9S6x3w4I4bjWnAsfpksWKaOd8AAAGU
|
||||
YXPZOAAABAMARjBEAiBAqRtkyRrpLLqZEVQ1UyMOR+40BlDeUjhYEEIzdizH2gIg
|
||||
Lv8Rm+yvyToL81CmVRxT7pI58JsHEyt/y3LOr7MwVCQwCgYIKoZIzj0EAwMDZwAw
|
||||
ZAIweZ1tC6rNSS4tFpv/oMM7NpnpBqLlOMvyRRWP2IwOqK3KfT89kDEueu4VPbl9
|
||||
sCkZAjBFlsSvVwP3/ZSN3SA1G6OrHtoa6G2e37y+CD/mgrD/gegtn6ysqmqpVbAZ
|
||||
Rap1c5A=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw
|
||||
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||
RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK
|
||||
a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO
|
||||
VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw
|
||||
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw
|
||||
i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C
|
||||
2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+
|
||||
bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG
|
||||
6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV
|
||||
XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO
|
||||
koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq
|
||||
cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI
|
||||
E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e
|
||||
K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX
|
||||
GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL
|
||||
sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd
|
||||
VQD9F6Na/+zmXCc=
|
||||
-----END CERTIFICATE-----
|
@ -1,5 +0,0 @@
|
||||
-----BEGIN EC PRIVATE KEY-----
|
||||
MHcCAQEEICp+cx+weOdcPOsxTzhwkByo3hGKxTBrHBXiKjWAg6IqoAoGCCqGSM49
|
||||
AwEHoUQDQgAE2TvQguQSq2Q+PP6AreBgcAeFVFAtmKkNXp/oABH+lUJhpXt3dCyA
|
||||
89h7Y+2A3DIvi3x6E3rTHQWdwJB3T34kpA==
|
||||
-----END EC PRIVATE KEY-----
|
@ -1,22 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDlDCCAxqgAwIBAgISA3Ok6Ntju67loYMAKR/g+jLeMAoGCCqGSM49BAMDMDIx
|
||||
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||
NjAeFw0yNTAxMTMyMDQwMzFaFw0yNTA0MTMyMDQwMzBaMCQxIjAgBgNVBAMTGWdp
|
||||
dGVhLnR3aWxpZ2h0cGFyYWRveC5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
||||
AAQVdWh6MowWiRToNvHG28xfT+1oTn2xrA0FISfw24MLIaKPRIQK46EwNhZ0qoja
|
||||
mMWWlT7e3ehDGyzVxToczVxno4ICHDCCAhgwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
|
||||
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
|
||||
BBTJ3cuhp8zFW76E3iky8x9/qEZVmzAfBgNVHSMEGDAWgBSTJ0aYA6lRaI6Y1sRC
|
||||
SNsjv1iU0jBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNi5v
|
||||
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U2LmkubGVuY3Iub3JnLzAk
|
||||
BgNVHREEHTAbghlnaXRlYS50d2lsaWdodHBhcmFkb3guY29tMBMGA1UdIAQMMAow
|
||||
CAYGZ4EMAQIBMIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHcA3oWB11AkfGvNy69W
|
||||
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYZsYPgAABAMASDBGAiEAhkETK0ZiN8tB
|
||||
3hjE6rySGk3wp4X8SqXepvnXMyY9j80CIQC65yd+ajVHVPytJW1ved+27893Vi0r
|
||||
pwLYDkstSWym+wB2AMz7D2qFcQll/pWbU87psnwi6YVcDZeNtql+VMD+TA2wAAAB
|
||||
lGGbGEwAAAQDAEcwRQIgHA5eiA3Sw93hrOX2I/3CPsLGGTd+Dp8JC9xooozQi+kC
|
||||
IQCwwikwSLbNPHHf6A9MUiQZWcTbY1l6fGsY8z/PdYVw/TAKBggqhkjOPQQDAwNo
|
||||
ADBlAjAybTS423x/olK67bsVMuv2g5moz/g2o3Ty3brMkOZZXGqeqZ1f2KoGfWuo
|
||||
k+uF5wMCMQCGu8qFcofoKl+IUtyLfn9vyq/lOHA7vorqZx4he+eY/aY8VuCdDUCU
|
||||
a70klI5vl7U=
|
||||
-----END CERTIFICATE-----
|
@ -1,26 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||
Ig46v9mFmBvyH04=
|
||||
-----END CERTIFICATE-----
|
@ -1,48 +0,0 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDlDCCAxqgAwIBAgISA3Ok6Ntju67loYMAKR/g+jLeMAoGCCqGSM49BAMDMDIx
|
||||
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||
NjAeFw0yNTAxMTMyMDQwMzFaFw0yNTA0MTMyMDQwMzBaMCQxIjAgBgNVBAMTGWdp
|
||||
dGVhLnR3aWxpZ2h0cGFyYWRveC5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
||||
AAQVdWh6MowWiRToNvHG28xfT+1oTn2xrA0FISfw24MLIaKPRIQK46EwNhZ0qoja
|
||||
mMWWlT7e3ehDGyzVxToczVxno4ICHDCCAhgwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
|
||||
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
|
||||
BBTJ3cuhp8zFW76E3iky8x9/qEZVmzAfBgNVHSMEGDAWgBSTJ0aYA6lRaI6Y1sRC
|
||||
SNsjv1iU0jBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNi5v
|
||||
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U2LmkubGVuY3Iub3JnLzAk
|
||||
BgNVHREEHTAbghlnaXRlYS50d2lsaWdodHBhcmFkb3guY29tMBMGA1UdIAQMMAow
|
||||
CAYGZ4EMAQIBMIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHcA3oWB11AkfGvNy69W
|
||||
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYZsYPgAABAMASDBGAiEAhkETK0ZiN8tB
|
||||
3hjE6rySGk3wp4X8SqXepvnXMyY9j80CIQC65yd+ajVHVPytJW1ved+27893Vi0r
|
||||
pwLYDkstSWym+wB2AMz7D2qFcQll/pWbU87psnwi6YVcDZeNtql+VMD+TA2wAAAB
|
||||
lGGbGEwAAAQDAEcwRQIgHA5eiA3Sw93hrOX2I/3CPsLGGTd+Dp8JC9xooozQi+kC
|
||||
IQCwwikwSLbNPHHf6A9MUiQZWcTbY1l6fGsY8z/PdYVw/TAKBggqhkjOPQQDAwNo
|
||||
ADBlAjAybTS423x/olK67bsVMuv2g5moz/g2o3Ty3brMkOZZXGqeqZ1f2KoGfWuo
|
||||
k+uF5wMCMQCGu8qFcofoKl+IUtyLfn9vyq/lOHA7vorqZx4he+eY/aY8VuCdDUCU
|
||||
a70klI5vl7U=
|
||||
-----END CERTIFICATE-----
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||
Ig46v9mFmBvyH04=
|
||||
-----END CERTIFICATE-----
|
@ -1,5 +0,0 @@
|
||||
-----BEGIN EC PRIVATE KEY-----
|
||||
MHcCAQEEIKZQjFNsE08Z94g8u3DeGSogHW7nidfFzJY4MjF3s1UfoAoGCCqGSM49
|
||||
AwEHoUQDQgAEFXVoejKMFokU6DbxxtvMX0/taE59sawNBSEn8NuDCyGij0SECuOh
|
||||
MDYWdKqI2pjFlpU+3t3oQxss1cU6HM1cZw==
|
||||
-----END EC PRIVATE KEY-----
|
@ -1,14 +0,0 @@
|
||||
This directory contains your keys and certificates.
|
||||
|
||||
`privkey.pem` : the private key for your certificate.
|
||||
`fullchain.pem`: the certificate file used in most server software.
|
||||
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
|
||||
`cert.pem` : will break many server configurations, and should not be used
|
||||
without reading further documentation (see link below).
|
||||
|
||||
WARNING: DO NOT MOVE OR RENAME THESE FILES!
|
||||
Certbot expects these files to remain in this location in order
|
||||
to function properly!
|
||||
|
||||
We recommend not moving these files. For more information, see the Certbot
|
||||
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.
|
@ -1,14 +0,0 @@
|
||||
This directory contains your keys and certificates.
|
||||
|
||||
`privkey.pem` : the private key for your certificate.
|
||||
`fullchain.pem`: the certificate file used in most server software.
|
||||
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
|
||||
`cert.pem` : will break many server configurations, and should not be used
|
||||
without reading further documentation (see link below).
|
||||
|
||||
WARNING: DO NOT MOVE OR RENAME THESE FILES!
|
||||
Certbot expects these files to remain in this location in order
|
||||
to function properly!
|
||||
|
||||
We recommend not moving these files. For more information, see the Certbot
|
||||
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.
|
@ -1,14 +0,0 @@
|
||||
This directory contains your keys and certificates.
|
||||
|
||||
`privkey.pem` : the private key for your certificate.
|
||||
`fullchain.pem`: the certificate file used in most server software.
|
||||
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
|
||||
`cert.pem` : will break many server configurations, and should not be used
|
||||
without reading further documentation (see link below).
|
||||
|
||||
WARNING: DO NOT MOVE OR RENAME THESE FILES!
|
||||
Certbot expects these files to remain in this location in order
|
||||
to function properly!
|
||||
|
||||
We recommend not moving these files. For more information, see the Certbot
|
||||
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.
|
@ -1,14 +0,0 @@
|
||||
This directory contains your keys and certificates.
|
||||
|
||||
`privkey.pem` : the private key for your certificate.
|
||||
`fullchain.pem`: the certificate file used in most server software.
|
||||
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
|
||||
`cert.pem` : will break many server configurations, and should not be used
|
||||
without reading further documentation (see link below).
|
||||
|
||||
WARNING: DO NOT MOVE OR RENAME THESE FILES!
|
||||
Certbot expects these files to remain in this location in order
|
||||
to function properly!
|
||||
|
||||
We recommend not moving these files. For more information, see the Certbot
|
||||
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.
|
@ -1,15 +0,0 @@
|
||||
# renew_before_expiry = 30 days
|
||||
version = 3.1.0
|
||||
archive_dir = /etc/letsencrypt/archive/gitea.jumpingcrab.com
|
||||
cert = /etc/letsencrypt/live/gitea.jumpingcrab.com/cert.pem
|
||||
privkey = /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem
|
||||
chain = /etc/letsencrypt/live/gitea.jumpingcrab.com/chain.pem
|
||||
fullchain = /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem
|
||||
|
||||
# Options used in the renewal process
|
||||
[renewalparams]
|
||||
account = 0dc29e2da338706a1a356c4f2ef0c15b
|
||||
authenticator = nginx
|
||||
installer = nginx
|
||||
server = https://acme-v02.api.letsencrypt.org/directory
|
||||
key_type = ecdsa
|
@ -1,15 +0,0 @@
|
||||
# renew_before_expiry = 30 days
|
||||
version = 3.1.0
|
||||
archive_dir = /etc/letsencrypt/archive/gitea.phares.redirectme.net
|
||||
cert = /etc/letsencrypt/live/gitea.phares.redirectme.net/cert.pem
|
||||
privkey = /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem
|
||||
chain = /etc/letsencrypt/live/gitea.phares.redirectme.net/chain.pem
|
||||
fullchain = /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem
|
||||
|
||||
# Options used in the renewal process
|
||||
[renewalparams]
|
||||
account = 0dc29e2da338706a1a356c4f2ef0c15b
|
||||
authenticator = nginx
|
||||
installer = nginx
|
||||
server = https://acme-v02.api.letsencrypt.org/directory
|
||||
key_type = ecdsa
|
@ -1,15 +0,0 @@
|
||||
# renew_before_expiry = 30 days
|
||||
version = 3.1.0
|
||||
archive_dir = /etc/letsencrypt/archive/gitea.phares3757.ddns.net
|
||||
cert = /etc/letsencrypt/live/gitea.phares3757.ddns.net/cert.pem
|
||||
privkey = /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem
|
||||
chain = /etc/letsencrypt/live/gitea.phares3757.ddns.net/chain.pem
|
||||
fullchain = /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem
|
||||
|
||||
# Options used in the renewal process
|
||||
[renewalparams]
|
||||
account = 0dc29e2da338706a1a356c4f2ef0c15b
|
||||
authenticator = nginx
|
||||
installer = nginx
|
||||
server = https://acme-v02.api.letsencrypt.org/directory
|
||||
key_type = ecdsa
|
@ -1,15 +0,0 @@
|
||||
# renew_before_expiry = 30 days
|
||||
version = 3.1.0
|
||||
archive_dir = /etc/letsencrypt/archive/gitea.twilightparadox.com
|
||||
cert = /etc/letsencrypt/live/gitea.twilightparadox.com/cert.pem
|
||||
privkey = /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem
|
||||
chain = /etc/letsencrypt/live/gitea.twilightparadox.com/chain.pem
|
||||
fullchain = /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem
|
||||
|
||||
# Options used in the renewal process
|
||||
[renewalparams]
|
||||
account = 0dc29e2da338706a1a356c4f2ef0c15b
|
||||
authenticator = nginx
|
||||
installer = nginx
|
||||
server = https://acme-v02.api.letsencrypt.org/directory
|
||||
key_type = ecdsa
|
@ -1,12 +0,0 @@
|
||||
network:
|
||||
version: 2
|
||||
ethernets:
|
||||
enp1s0:
|
||||
addresses:
|
||||
- 192.168.11.2/25
|
||||
routes:
|
||||
- to: default
|
||||
via: 192.168.11.1
|
||||
wlp3s0:
|
||||
addresses:
|
||||
- 192.168.11.119/25
|
11
etc/netplan/50-cloud-init.yaml
Normal file
11
etc/netplan/50-cloud-init.yaml
Normal file
@ -0,0 +1,11 @@
|
||||
# This file is generated from information provided by the datasource. Changes
|
||||
# to it will not persist across an instance reboot. To disable cloud-init's
|
||||
# network configuration capabilities, write a file
|
||||
# /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg with the following:
|
||||
# network: {config: disabled}
|
||||
network:
|
||||
ethernets:
|
||||
enp1s0:
|
||||
dhcp4: true
|
||||
version: 2
|
||||
wifis: {}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/adguard.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/adguard.phares.duckdns.org.key -out /etc/nginx/include/adguard.phares.duckdns.org.crt -config /etc/nginx/include/adguard.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name adguard.phares.duckdns.org;
|
||||
@ -10,7 +13,7 @@ server {
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass https://192.168.11.2:5014/;
|
||||
proxy_pass http://192.168.11.2:3002/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
|
@ -1,17 +1,15 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-affirm/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-affirm/affirm.duckdns.org.key;
|
||||
# touch /etc/nginx/include/affirm.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/affirm.duckdns.org.key -out /etc/nginx/include/affirm.phares.duckdns.org.crt -config /etc/nginx/include/affirm.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-affirm/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-affirm/affirm.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-affirm/affirm.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name *.affirm.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
root /var/www/html-affirm;
|
||||
index index.html index.htm;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass https://192.168.0.31/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
try_files $uri $uri.html $uri/ =404;
|
||||
}
|
||||
}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/baikal.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/baikal.phares.duckdns.org.key -out /etc/nginx/include/baikal.phares.duckdns.org.crt -config /etc/nginx/include/baikal.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name baikal.phares.duckdns.org;
|
||||
|
@ -1,17 +1,15 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-bchs/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-bchs/bchs.duckdns.org.key;
|
||||
# touch /etc/nginx/include/bchs.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/bchs.duckdns.org.key -out /etc/nginx/include/bchs.phares.duckdns.org.crt -config /etc/nginx/include/bchs.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-bchs/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-bchs/bchs.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-bchs/bchs.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name *.bchs.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
root /var/www/html-bchs;
|
||||
index index.html index.htm;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass https://192.168.0.43/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
try_files $uri $uri.html $uri/ =404;
|
||||
}
|
||||
}
|
@ -1,20 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name beszel.phares.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5023/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
proxy_connect_timeout 600s;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
}
|
||||
}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/blinko.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/blinko.phares.duckdns.org.key -out /etc/nginx/include/blinko.phares.duckdns.org.crt -config /etc/nginx/include/blinko.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name blinko.phares.duckdns.org;
|
||||
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/cockpit.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/cockpit.phares.duckdns.org.key -out /etc/nginx/include/cockpit.phares.duckdns.org.crt -config /etc/nginx/include/cockpit.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name cockpit.phares.duckdns.org;
|
||||
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/dashkiosk.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/dashkiosk.phares.duckdns.org.key -out /etc/nginx/include/dashkiosk.phares.duckdns.org.crt -config /etc/nginx/include/dashkiosk.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name dashkiosk.phares.duckdns.org;
|
||||
|
@ -1,14 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name dorico.phares.duckdns.org;
|
||||
root /home/lphares/dorico;
|
||||
# usermod -a -G lphares www-data
|
||||
location / {
|
||||
autoindex on;
|
||||
disable_symlinks on;
|
||||
autoindex_format json;
|
||||
}
|
||||
}
|
@ -1,17 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name dotnet-sdk-8.phares.duckdns.org;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5027/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
add_header Access-Control-Allow-Origin *;
|
||||
}
|
||||
}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/firefox.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/firefox.phares.duckdns.org.key -out /etc/nginx/include/firefox.phares.duckdns.org.crt -config /etc/nginx/include/firefox.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name firefox.phares.duckdns.org;
|
||||
@ -9,7 +12,7 @@ server {
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass https://192.168.11.2:5800/;
|
||||
proxy_pass http://192.168.11.2:5800/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
|
@ -1,39 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name free-file-sync-still.phares.duckdns.org;
|
||||
root /mnt/free-file-sync/still;
|
||||
location / {
|
||||
autoindex on;
|
||||
disable_symlinks on;
|
||||
autoindex_format json;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name free-file-sync-moving.phares.duckdns.org;
|
||||
root /mnt/free-file-sync/moving;
|
||||
location / {
|
||||
autoindex on;
|
||||
disable_symlinks on;
|
||||
autoindex_format json;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name free-file-sync-a.phares.duckdns.org;
|
||||
root /mnt/free-file-sync/1-Images-A;
|
||||
location / {
|
||||
autoindex on;
|
||||
disable_symlinks on;
|
||||
autoindex_format json;
|
||||
}
|
||||
}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/gitea.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/gitea.phares.duckdns.org.key -out /etc/nginx/include/gitea.phares.duckdns.org.crt -config /etc/nginx/include/gitea.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.phares.duckdns.org;
|
||||
@ -14,89 +17,4 @@ server {
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.phares3757.ddns.net;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.phares.redirectme.net;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.chickenkiller.com;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.jumpingcrab.com;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.twilightparadox.com;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
@ -1,20 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gotify.phares.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5016/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
proxy_connect_timeout 600s;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
}
|
||||
}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/immich-kiosk.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich-kiosk.phares.duckdns.org.key -out /etc/nginx/include/immich-kiosk.phares.duckdns.org.crt -config /etc/nginx/include/immich-kiosk.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name immich-kiosk.phares.duckdns.org;
|
||||
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/immich-to-slideshow.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich-to-slideshow.phares.duckdns.org.key -out /etc/nginx/include/immich-to-slideshow.phares.duckdns.org.crt -config /etc/nginx/include/immich-to-slideshow.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name immich-to-slideshow.phares.duckdns.org;
|
||||
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/immich.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich.phares.duckdns.org.key -out /etc/nginx/include/immich.phares.duckdns.org.crt -config /etc/nginx/include/immich.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name immich.phares.duckdns.org;
|
||||
|
@ -1,17 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-jmlc/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-jmlc/jmlc.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name *.jmlc.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass https://192.168.0.42/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
@ -1,17 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name kanbn-to-quartz.phares.duckdns.org;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5024/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
add_header Access-Control-Allow-Origin *;
|
||||
}
|
||||
}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/kuma.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/kuma.phares.duckdns.org.key -out /etc/nginx/include/kuma.phares.duckdns.org.crt -config /etc/nginx/include/kuma.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name kuma.phares.duckdns.org;
|
||||
|
20
etc/nginx/include/linkwarden.conf
Normal file
20
etc/nginx/include/linkwarden.conf
Normal file
@ -0,0 +1,20 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/linkwarden.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/linkwarden.phares.duckdns.org.key -out /etc/nginx/include/linkwarden.phares.duckdns.org.crt -config /etc/nginx/include/linkwarden.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name linkwarden.phares.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5011/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
46
etc/nginx/include/mattermost.conf
Normal file
46
etc/nginx/include/mattermost.conf
Normal file
@ -0,0 +1,46 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/mattermost.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/mattermost.phares.duckdns.org.key -out /etc/nginx/include/mattermost.phares.duckdns.org.crt -config /etc/nginx/include/mattermost.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name mattermost.phares.duckdns.org;
|
||||
# add_header X-Early-Data $tls1_3_early_data;
|
||||
location / {
|
||||
# https://mattermost.m1k1o.net/#/getting-started/reverse-proxy
|
||||
client_max_body_size 100M;
|
||||
proxy_set_header Connection "";
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header X-Frame-Options SAMEORIGIN;
|
||||
proxy_buffers 256 16k;
|
||||
proxy_buffer_size 16k;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_http_version 1.1;
|
||||
proxy_pass https://192.168.11.2:8443/;
|
||||
}
|
||||
location ~ /api/v[0-9]+/(users/)?websocket$ {
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
client_max_body_size 50M;
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header X-Frame-Options SAMEORIGIN;
|
||||
proxy_buffers 256 16k;
|
||||
proxy_buffer_size 16k;
|
||||
client_body_timeout 60s;
|
||||
send_timeout 300s;
|
||||
lingering_timeout 5s;
|
||||
proxy_connect_timeout 90s;
|
||||
proxy_send_timeout 300s;
|
||||
proxy_read_timeout 90s;
|
||||
proxy_http_version 1.1;
|
||||
proxy_pass https://192.168.11.2:8443;
|
||||
}
|
||||
}
|
@ -1,19 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name ncdu.phares.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_pass http://192.168.11.2:5033/;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
proxy_set_header X-NginX-Proxy true;
|
||||
proxy_http_version 1.1;
|
||||
proxy_read_timeout 43200000;
|
||||
}
|
||||
}
|
24
etc/nginx/include/neko.conf
Normal file
24
etc/nginx/include/neko.conf
Normal file
@ -0,0 +1,24 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/neko.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/neko.phares.duckdns.org.key -out /etc/nginx/include/neko.phares.duckdns.org.crt -config /etc/nginx/include/neko.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name neko.phares.duckdns.org;
|
||||
location / {
|
||||
# https://neko.m1k1o.net/#/getting-started/reverse-proxy
|
||||
proxy_pass http://192.168.11.2:8082/;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
proxy_read_timeout 86400;
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
proxy_set_header X-Forwarded-Host $host;
|
||||
proxy_set_header X-Forwarded-Port $server_port;
|
||||
proxy_set_header X-Forwarded-Protocol $scheme;
|
||||
}
|
||||
}
|
19
etc/nginx/include/odoo.conf
Normal file
19
etc/nginx/include/odoo.conf
Normal file
@ -0,0 +1,19 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/odoo.ddns.net
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/odoo.ddns.net.key -out /etc/nginx/include/odoo.ddns.net.crt -config /etc/nginx/include/odoo.ddns.net
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name odoo.phares.duckdns.org;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:8069/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
@ -1,17 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name original-to-deterministic.phares.duckdns.org;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5025/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
add_header Access-Control-Allow-Origin *;
|
||||
}
|
||||
}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/pgadmin.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/pgadmin.phares.duckdns.org.key -out /etc/nginx/include/pgadmin.phares.duckdns.org.crt -config /etc/nginx/include/pgadmin.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name pgadmin.phares.duckdns.org;
|
||||
|
@ -1,12 +1,12 @@
|
||||
server {
|
||||
listen 80 default_server;
|
||||
root /var/www/certbot;
|
||||
index index.html index.htm index.nginx-debian.html;
|
||||
server_name _;
|
||||
location / {
|
||||
try_files $uri $uri/ =404;
|
||||
}
|
||||
}
|
||||
# server {
|
||||
# listen 80 default_server;
|
||||
# root /var/www/certbot;
|
||||
# index index.html index.htm index.nginx-debian.html;
|
||||
# server_name phares.duckdns.org;
|
||||
# location / {
|
||||
# try_files $uri $uri/ =404;
|
||||
# }
|
||||
# }
|
||||
server {
|
||||
listen 8083 default_server;
|
||||
root /var/www/html-nginx;
|
||||
@ -17,8 +17,11 @@ server {
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/phares.duckdns.org.key -out /etc/nginx/include/phares.duckdns.org.crt -config /etc/nginx/include/phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name phares.duckdns.org;
|
||||
|
@ -8,8 +8,11 @@ server {
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/quartz.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/quartz.phares.duckdns.org.key -out /etc/nginx/include/quartz.phares.duckdns.org.crt -config /etc/nginx/include/quartz.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name quartz.phares.duckdns.org;
|
||||
@ -17,7 +20,5 @@ server {
|
||||
index index.html index.htm;
|
||||
location / {
|
||||
try_files $uri $uri.html $uri/ =404;
|
||||
auth_basic "auth_basic";
|
||||
auth_basic_user_file /etc/nginx/.htpasswd;
|
||||
}
|
||||
}
|
@ -9,8 +9,11 @@ server {
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/slideshow.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/slideshow.phares.duckdns.org.key -out /etc/nginx/include/slideshow.phares.duckdns.org.crt -config /etc/nginx/include/slideshow.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name slideshow.phares.duckdns.org;
|
||||
|
@ -1,17 +0,0 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-sumco/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-sumco/sumco.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name *.sumco.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass https://192.168.0.41/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/vaultwarden.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/vaultwarden.phares.duckdns.org.key -out /etc/nginx/include/vaultwarden.phares.duckdns.org.crt -config /etc/nginx/include/vaultwarden.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
# server_tokens off;
|
||||
@ -27,8 +30,5 @@ server {
|
||||
proxy_pass https://192.168.11.2:5008/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection $http_connection;
|
||||
}
|
||||
}
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/warden.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/warden.phares.duckdns.org.key -out /etc/nginx/include/warden.phares.duckdns.org.crt -config /etc/nginx/include/warden.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
# server_tokens off;
|
||||
|
@ -1,6 +1,9 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/xandikos.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/xandikos.phares.duckdns.org.key -out /etc/nginx/include/xandikos.phares.duckdns.org.crt -config /etc/nginx/include/xandikos.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name xandikos.phares.duckdns.org;
|
||||
|
@ -1,6 +1,33 @@
|
||||
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:3002/
|
||||
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # /var/www/html-affirm
|
||||
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/
|
||||
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # /var/www/html-bchs
|
||||
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/
|
||||
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/
|
||||
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/
|
||||
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # http://192.168.11.2:5800/
|
||||
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/
|
||||
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/
|
||||
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/
|
||||
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/
|
||||
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/
|
||||
include /etc/nginx/include/linkwarden.conf; # https://linkwarden.phares.duckdns.org # http://192.168.11.2:5011/
|
||||
include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/
|
||||
include /etc/nginx/include/neko.conf; # https://neko.phares.duckdns.org # http://192.168.11.2:8082/
|
||||
include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/
|
||||
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/
|
||||
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
|
||||
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
|
||||
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
|
||||
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/
|
||||
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/
|
||||
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
# touch /etc/nginx/include/phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/phares.duckdns.org.key -out /etc/nginx/include/phares.duckdns.org.crt -config /etc/nginx/include/phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name *.phares.duckdns.org;
|
||||
@ -10,37 +37,4 @@ server {
|
||||
try_files $uri $uri.html $uri/ =404;
|
||||
}
|
||||
}
|
||||
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # https://192.168.0.31
|
||||
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # https://192.168.0.43
|
||||
include /etc/nginx/include/jmlc.conf; # https://*.jmlc.duckdns.org # https://192.168.0.42
|
||||
include /etc/nginx/include/sumco.conf; # https://*.sumco.duckdns.org # https://192.168.0.41
|
||||
#
|
||||
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http:5014
|
||||
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http:8001
|
||||
include /etc/nginx/include/beszel.conf; # https://beszel.phares.duckdns.org # http:5023
|
||||
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http:5012
|
||||
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https:9090
|
||||
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http:9400
|
||||
include /etc/nginx/include/dorico.conf; # https://dorico.phares.duckdns.org # /home/lphares/dorico
|
||||
include /etc/nginx/include/dotnet-sdk-8.conf; # https://dotnet-sdk-8.phares.duckdns.org # http:5027
|
||||
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # https:5800
|
||||
include /etc/nginx/include/free-file-sync.conf; # https://free-file-sync.phares.duckdns.org # /mnt/free-file-sync
|
||||
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http:3000
|
||||
include /etc/nginx/include/gotify.conf; # https://gotify.phares.duckdns.org # http:5016
|
||||
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http:5010
|
||||
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http:5009
|
||||
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http:3001
|
||||
include /etc/nginx/include/kanbn-to-quartz.conf; # https://kanbn-to-quartz.phares.duckdns.org # http:5024
|
||||
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https:3004
|
||||
include /etc/nginx/include/ncdu.conf; # https://ncdu.phares.duckdns.org # https:5033
|
||||
include /etc/nginx/include/original-to-deterministic-hash-code.conf; # https://original-to-deterministic.phares.duckdns.org # http:5025
|
||||
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https:5007
|
||||
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
|
||||
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
|
||||
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
|
||||
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https:5008
|
||||
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https:5008
|
||||
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http:8000
|
||||
#
|
||||
# ssh root@phares.duckdns.org -p 22 -i C:/Users/phares/.ssh/id_ed25519
|
||||
# ssh root@phares.duckdns.org -p 5026 -i C:/Users/phares/.ssh/id_ed25519
|
||||
# ssh root@free.file.sync.root -i C:/Users/phares/.ssh/id_ed25519
|
@ -1,9 +1,9 @@
|
||||
[Unit]
|
||||
# Auto-generated, DO NOT EDIT
|
||||
Description=Service for snap application adguard-home.adguard-home
|
||||
Requires=snap-adguard\x2dhome-7793.mount
|
||||
Requires=snap-adguard\x2dhome-7577.mount
|
||||
Wants=network.target
|
||||
After=snap-adguard\x2dhome-7793.mount network.target snapd.apparmor.service
|
||||
After=snap-adguard\x2dhome-7577.mount network.target snapd.apparmor.service
|
||||
X-Snappy=yes
|
||||
|
||||
[Service]
|
||||
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
|
||||
ExecStart=/usr/bin/snap run adguard-home
|
||||
SyslogIdentifier=adguard-home.adguard-home
|
||||
Restart=always
|
||||
WorkingDirectory=/var/snap/adguard-home/7793
|
||||
WorkingDirectory=/var/snap/adguard-home/7577
|
||||
TimeoutStopSec=30
|
||||
Type=simple
|
||||
|
||||
|
16
etc/systemd/system/snap.certbot.renew.service
Normal file
16
etc/systemd/system/snap.certbot.renew.service
Normal file
@ -0,0 +1,16 @@
|
||||
[Unit]
|
||||
# Auto-generated, DO NOT EDIT
|
||||
Description=Service for snap application certbot.renew
|
||||
Requires=snap-certbot-4193.mount
|
||||
Wants=network.target
|
||||
After=snap-certbot-4193.mount network.target snapd.apparmor.service
|
||||
X-Snappy=yes
|
||||
|
||||
[Service]
|
||||
EnvironmentFile=-/etc/environment
|
||||
ExecStart=/usr/bin/snap run --timer="00:00~24:00/2" certbot.renew
|
||||
SyslogIdentifier=certbot.renew
|
||||
Restart=no
|
||||
WorkingDirectory=/var/snap/certbot/4193
|
||||
TimeoutStopSec=30
|
||||
Type=oneshot
|
14
etc/systemd/system/snap.certbot.renew.timer
Normal file
14
etc/systemd/system/snap.certbot.renew.timer
Normal file
@ -0,0 +1,14 @@
|
||||
[Unit]
|
||||
# Auto-generated, DO NOT EDIT
|
||||
Description=Timer renew for snap application certbot.renew
|
||||
Requires=snap-certbot-4193.mount
|
||||
After=snap-certbot-4193.mount
|
||||
X-Snappy=yes
|
||||
|
||||
[Timer]
|
||||
Unit=snap.certbot.renew.service
|
||||
OnCalendar=*-*-* 06:46
|
||||
OnCalendar=*-*-* 14:10
|
||||
|
||||
[Install]
|
||||
WantedBy=timers.target
|
@ -1,9 +1,9 @@
|
||||
[Unit]
|
||||
# Auto-generated, DO NOT EDIT
|
||||
Description=Service for snap application vaultwarden.vaultwarden
|
||||
Requires=snap-vaultwarden-164.mount
|
||||
Requires=snap-vaultwarden-155.mount
|
||||
Wants=network.target
|
||||
After=snap-vaultwarden-164.mount network.target snapd.apparmor.service
|
||||
After=snap-vaultwarden-155.mount network.target snapd.apparmor.service
|
||||
X-Snappy=yes
|
||||
|
||||
[Service]
|
||||
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
|
||||
ExecStart=/usr/bin/snap run vaultwarden
|
||||
SyslogIdentifier=vaultwarden.vaultwarden
|
||||
Restart=on-failure
|
||||
WorkingDirectory=/var/snap/vaultwarden/164
|
||||
WorkingDirectory=/var/snap/vaultwarden/155
|
||||
TimeoutStopSec=30
|
||||
Type=simple
|
||||
|
||||
|
@ -2,102 +2,10 @@
|
||||
:ufw-user-input - [0:0]
|
||||
:ufw-user-output - [0:0]
|
||||
:ufw-user-forward - [0:0]
|
||||
:ufw-before-logging-input - [0:0]
|
||||
:ufw-before-logging-output - [0:0]
|
||||
:ufw-before-logging-forward - [0:0]
|
||||
:ufw-user-logging-input - [0:0]
|
||||
:ufw-user-logging-output - [0:0]
|
||||
:ufw-user-logging-forward - [0:0]
|
||||
:ufw-after-logging-input - [0:0]
|
||||
:ufw-after-logging-output - [0:0]
|
||||
:ufw-after-logging-forward - [0:0]
|
||||
:ufw-logging-deny - [0:0]
|
||||
:ufw-logging-allow - [0:0]
|
||||
:ufw-user-limit - [0:0]
|
||||
:ufw-user-limit-accept - [0:0]
|
||||
### RULES ###
|
||||
|
||||
### tuple ### allow tcp 53 0.0.0.0/0 any 0.0.0.0/0 in comment=30312920444e5320544350
|
||||
-A ufw-user-input -p tcp --dport 53 -j ACCEPT
|
||||
|
||||
### tuple ### allow udp 53 0.0.0.0/0 any 0.0.0.0/0 in comment=30322920444e5320554450
|
||||
-A ufw-user-input -p udp --dport 53 -j ACCEPT
|
||||
|
||||
### tuple ### allow tcp 67 0.0.0.0/0 any 0.0.0.0/0 in comment=303329204448435020544350
|
||||
-A ufw-user-input -p tcp --dport 67 -j ACCEPT
|
||||
|
||||
### tuple ### allow udp 67 0.0.0.0/0 any 0.0.0.0/0 in comment=303429204448435020554450
|
||||
-A ufw-user-input -p udp --dport 67 -j ACCEPT
|
||||
|
||||
### tuple ### allow any any 0.0.0.0/0 443 0.0.0.0/0 in comment=303529204854545053
|
||||
-A ufw-user-input -p tcp --sport 443 -j ACCEPT
|
||||
-A ufw-user-input -p udp --sport 443 -j ACCEPT
|
||||
|
||||
### tuple ### allow any 443 0.0.0.0/0 any 0.0.0.0/0 in comment=303629204854545053
|
||||
-A ufw-user-input -p tcp --dport 443 -j ACCEPT
|
||||
-A ufw-user-input -p udp --dport 443 -j ACCEPT
|
||||
|
||||
### tuple ### allow any any 0.0.0.0/0 22 192.168.11.0/25 in comment=30372920535348
|
||||
-A ufw-user-input -p tcp -s 192.168.11.0/25 --sport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -s 192.168.11.0/25 --sport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any any 0.0.0.0/0 22 192.168.21.0/25 in comment=30382920535348
|
||||
-A ufw-user-input -p tcp -s 192.168.21.0/25 --sport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -s 192.168.21.0/25 --sport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any any 0.0.0.0/0 22 192.168.31.0/25 in comment=30392920535348
|
||||
-A ufw-user-input -p tcp -s 192.168.31.0/25 --sport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -s 192.168.31.0/25 --sport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any any 0.0.0.0/0 22 192.168.41.0/25 in comment=31302920535348
|
||||
-A ufw-user-input -p tcp -s 192.168.41.0/25 --sport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -s 192.168.41.0/25 --sport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any any 0.0.0.0/0 22 192.168.42.0/25 in comment=31312920535348
|
||||
-A ufw-user-input -p tcp -s 192.168.42.0/25 --sport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -s 192.168.42.0/25 --sport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any any 0.0.0.0/0 22 192.168.43.0/25 in comment=31322920535348
|
||||
-A ufw-user-input -p tcp -s 192.168.43.0/25 --sport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -s 192.168.43.0/25 --sport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any 22 192.168.11.0/25 any 0.0.0.0/0 in comment=31332920535348
|
||||
-A ufw-user-input -p tcp -d 192.168.11.0/25 --dport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -d 192.168.11.0/25 --dport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any 22 192.168.21.0/25 any 0.0.0.0/0 in comment=31342920535348
|
||||
-A ufw-user-input -p tcp -d 192.168.21.0/25 --dport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -d 192.168.21.0/25 --dport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any 22 192.168.31.0/25 any 0.0.0.0/0 in comment=31352920535348
|
||||
-A ufw-user-input -p tcp -d 192.168.31.0/25 --dport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -d 192.168.31.0/25 --dport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any 22 192.168.41.0/25 any 0.0.0.0/0 in comment=31362920535348
|
||||
-A ufw-user-input -p tcp -d 192.168.41.0/25 --dport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -d 192.168.41.0/25 --dport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any 22 192.168.42.0/25 any 0.0.0.0/0 in comment=31372920535348
|
||||
-A ufw-user-input -p tcp -d 192.168.42.0/25 --dport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -d 192.168.42.0/25 --dport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow any 22 192.168.43.0/25 any 0.0.0.0/0 in comment=31382920535348
|
||||
-A ufw-user-input -p tcp -d 192.168.43.0/25 --dport 22 -j ACCEPT
|
||||
-A ufw-user-input -p udp -d 192.168.43.0/25 --dport 22 -j ACCEPT
|
||||
|
||||
### END RULES ###
|
||||
|
||||
### LOGGING ###
|
||||
-A ufw-after-logging-input -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
|
||||
-A ufw-after-logging-forward -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
|
||||
-I ufw-logging-deny -m conntrack --ctstate INVALID -j RETURN -m limit --limit 3/min --limit-burst 10
|
||||
-A ufw-logging-deny -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
|
||||
-A ufw-logging-allow -j LOG --log-prefix "[UFW ALLOW] " -m limit --limit 3/min --limit-burst 10
|
||||
### END LOGGING ###
|
||||
|
||||
### RATE LIMITING ###
|
||||
-A ufw-user-limit -m limit --limit 3/minute -j LOG --log-prefix "[UFW LIMIT BLOCK] "
|
||||
-A ufw-user-limit -j REJECT
|
||||
-A ufw-user-limit-accept -j ACCEPT
|
||||
### END RATE LIMITING ###
|
||||
COMMIT
|
||||
|
@ -1 +0,0 @@
|
||||
[Volume]
|
@ -1,173 +0,0 @@
|
||||
[Container]
|
||||
# AutoUpdate=registry
|
||||
ContainerName=2fauth-server
|
||||
# You can change the name of the app
|
||||
Environment="APP_NAME=2FAuth"
|
||||
# You can leave this on "local". If you change it to production most console commands will ask for extra confirmation.
|
||||
# Never set it to "testing".
|
||||
Environment="APP_ENV=local"
|
||||
# The timezone for your application, which is used to record dates and times to database. This global setting can be
|
||||
# overridden by users via in-app settings for a personalised dates and times display.
|
||||
# If this setting is changed while the application is already running, existing records in the database won't be updated
|
||||
Environment="APP_TIMEZONE=UTC"
|
||||
# Set to true if you want to see debug information in error screens.
|
||||
Environment="APP_DEBUG=false"
|
||||
# This should be your email address
|
||||
Environment="SITE_OWNER=mikepharesjr@msn.com"
|
||||
# The encryption key for our database and sessions. Keep this very secure.
|
||||
# If you generate a new one all existing data must be considered LOST.
|
||||
# Change it to a string of exactly 32 chars or use command `php artisan key:generate` to generate it
|
||||
Environment="APP_KEY=uvL37oiI1By0J#5t5kZwYB~17CXI2J9A"
|
||||
# This variable must match your installation's external address.
|
||||
# Webauthn won't work otherwise.
|
||||
# Environment="APP_URL=http://localhost"
|
||||
# Environment="APP_URL=http://192.168.11.2"
|
||||
# Environment="APP_URL=http://192.168.11.2:5015"
|
||||
Environment="APP_URL=https://2fauth.phares.duckdns.org"
|
||||
# If you want to serve js assets from a CDN (like https://cdn.example.com),
|
||||
# uncomment the following line and set this var with the CDN url.
|
||||
# Otherwise, let this line commented.
|
||||
# - ASSET_URL=http://localhost
|
||||
#
|
||||
# Turn this to true if you want your app to react like a demo.
|
||||
# The Demo mode reset the app content every hours and set a generic demo user.
|
||||
Environment="IS_DEMO_APP=false"
|
||||
# The log channel defines where your log entries go to.
|
||||
# 'daily' is the default logging mode giving you 7 daily rotated log files in /storage/logs/.
|
||||
# Also available are 'errorlog', 'syslog', 'stderr', 'papertrail', 'slack' and a 'stack' channel
|
||||
# to combine multiple channels into a single one.
|
||||
Environment="LOG_CHANNEL=daily"
|
||||
# Log level. You can set this from least severe to most severe:
|
||||
# debug, info, notice, warning, error, critical, alert, emergency
|
||||
# If you set it to debug your logs will grow large, and fast. If you set it to emergency probably
|
||||
# nothing will get logged, ever.
|
||||
Environment="LOG_LEVEL=notice"
|
||||
# Database config (can only be sqlite)
|
||||
Environment="DB_DATABASE=/srv/database/database.sqlite"
|
||||
# If you're looking for performance improvements, you could install memcached.
|
||||
Environment="CACHE_DRIVER=file"
|
||||
Environment="SESSION_DRIVER=file"
|
||||
# Mail settings
|
||||
# Refer your email provider documentation to configure your mail settings
|
||||
# Set a value for every available setting to avoid issue
|
||||
Environment="MAIL_MAILER=log"
|
||||
Environment="MAIL_HOST=smtp.centurylink.net"
|
||||
Environment="MAIL_PORT=587"
|
||||
Environment="MAIL_USERNAME=phares@centurylink.net"
|
||||
Environment="MAIL_PASSWORD=RN9iPi5Ej#gRgLgiBTkb"
|
||||
Environment="MAIL_ENCRYPTION=null"
|
||||
Environment="MAIL_FROM_NAME=Mik Phares"
|
||||
Environment="MAIL_FROM_ADDRESS=noreply@phares.duckdns.org"
|
||||
# SSL peer verification.
|
||||
# Set this to false to disable the SSL certificate validation.
|
||||
# WARNING
|
||||
# Disabling peer verification can result in a major security flaw.
|
||||
# Change it only if you know what you're doing.
|
||||
Environment="MAIL_VERIFY_SSL_PEER=false"
|
||||
# API settings
|
||||
# The maximum number of API calls in a minute from the same IP.
|
||||
# Once reached, all requests from this IP will be rejected until the minute has elapsed.
|
||||
# Set to null to disable the API throttling.
|
||||
Environment="THROTTLE_API=60"
|
||||
# Authentication settings
|
||||
# The number of times per minute a user can fail to log in before being locked out.
|
||||
# Once reached, all login attempts will be rejected until the minute has elapsed.
|
||||
# This setting applies to both email/password and webauthn login attempts.
|
||||
Environment="LOGIN_THROTTLE=5"
|
||||
# The default authentication guard
|
||||
# Supported:
|
||||
# 'web-guard' : The Laravel built-in auth system (default if nulled)
|
||||
# 'reverse-proxy-guard' : When 2FAuth is deployed behind a reverse-proxy that handle authentication
|
||||
# WARNING
|
||||
# When using 'reverse-proxy-guard' 2FAuth only look for the dedicated headers and skip all other built-in
|
||||
# authentication checks. That means your proxy is fully responsible of the authentication process, 2FAuth will
|
||||
# trust him as long as headers are presents.
|
||||
Environment="AUTHENTICATION_GUARD=web-guard"
|
||||
# Authentication log retention time, in days.
|
||||
# Log entries older than that are automatically deleted.
|
||||
Environment="AUTHENTICATION_LOG_RETENTION=365"
|
||||
# Name of the HTTP headers sent by the reverse proxy that identifies the authenticated user at proxy level.
|
||||
# Check your proxy documentation to find out how these headers are named (i.e 'REMOTE_USER', 'REMOTE_EMAIL', etc...)
|
||||
# (only relevant when AUTHENTICATION_GUARD is set to 'reverse-proxy-guard')
|
||||
Environment="AUTH_PROXY_HEADER_FOR_USER=null"
|
||||
Environment="AUTH_PROXY_HEADER_FOR_EMAIL=null"
|
||||
# Custom logout URL to open when using an auth proxy.
|
||||
Environment="PROXY_LOGOUT_URL=null"
|
||||
# WebAuthn settings
|
||||
# Relying Party name, aka the name of the application. If blank, defaults to APP_NAME. Do not set to null.
|
||||
Environment="WEBAUTHN_NAME=2FAuth"
|
||||
# Relying Party ID, should equal the site domain (i.e 2fauth.example.com).
|
||||
# If null, the device will fill it internally (recommended)
|
||||
# See https://webauthn-doc.spomky-labs.com/prerequisites/the-relying-party#how-to-determine-the-relying-party-id
|
||||
Environment="WEBAUTHN_ID=null"
|
||||
# Use this setting to control how user verification behave during the
|
||||
# WebAuthn authentication flow.
|
||||
#
|
||||
# Most authenticators and smartphones will ask the user to actively verify
|
||||
# themselves for log in. For example, through a touch plus pin code,
|
||||
# password entry, or biometric recognition (e.g., presenting a fingerprint).
|
||||
# The intent is to distinguish one user from any other.
|
||||
#
|
||||
# Supported:
|
||||
# 'required': Will ALWAYS ask for user verification
|
||||
# 'preferred' (default) : Will ask for user verification IF POSSIBLE
|
||||
# 'discouraged' : Will NOT ask for user verification (for example, to minimize disruption to the user interaction flow)
|
||||
Environment="WEBAUTHN_USER_VERIFICATION=preferred"
|
||||
#### SSO settings (for Socialite) ####
|
||||
# Uncomment and complete lines for the OAuth providers you want to enable.
|
||||
# - OPENID_AUTHORIZE_URL=
|
||||
# - OPENID_TOKEN_URL=
|
||||
# - OPENID_USERINFO_URL=
|
||||
# - OPENID_CLIENT_ID=
|
||||
# - OPENID_CLIENT_SECRET=
|
||||
# - GITHUB_CLIENT_ID=
|
||||
# - GITHUB_CLIENT_SECRET=
|
||||
# Use this setting to declare trusted proxied.
|
||||
# Supported:
|
||||
# '*': to trust any proxy
|
||||
# A comma separated IP list: The list of proxies IP to trust
|
||||
Environment="TRUSTED_PROXIES=null"
|
||||
# Proxy for outgoing requests like new releases detection or logo fetching.
|
||||
# You can provide a proxy URL that contains a scheme, username, and password.
|
||||
# For example, "http://username:password@192.168.16.1:10".
|
||||
Environment="PROXY_FOR_OUTGOING_REQUESTS=null"
|
||||
# Leave the following configuration vars as is.
|
||||
# Unless you like to tinker and know what you're doing.
|
||||
Environment="BROADCAST_DRIVER=log"
|
||||
Environment="QUEUE_DRIVER=sync"
|
||||
Environment="SESSION_LIFETIME=120"
|
||||
Environment="REDIS_HOST=127.0.0.1"
|
||||
Environment="REDIS_PASSWORD=null"
|
||||
Environment="REDIS_PORT=6379"
|
||||
Environment="PUSHER_APP_ID="
|
||||
Environment="PUSHER_APP_KEY="
|
||||
Environment="PUSHER_APP_SECRET="
|
||||
Environment="PUSHER_APP_CLUSTER=mt1"
|
||||
Environment="VITE_PUSHER_APP_KEY="${PUSHER_APP_KEY}""
|
||||
Environment="VITE_PUSHER_APP_CLUSTER="${PUSHER_APP_CLUSTER}""
|
||||
Environment="MIX_ENV=local"
|
||||
Image=docker.io/2fauth/2fauth
|
||||
# Network=2fauth.network
|
||||
# Pod=2fauth.pod
|
||||
PublishPort=5015:44311
|
||||
Volume=2fauth-server-data:/2fauth:Z
|
||||
Volume=/home/podman/2fauth/nginx.conf:/etc/nginx/nginx.conf:ro
|
||||
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
|
||||
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/2fauth/2fauth
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start 2fauth-server
|
||||
# systemctl --user status 2fauth-server --lines=999
|
||||
# journalctl -fu 2fauth-server.service
|
||||
# podman logs 2fauth-server
|
||||
# systemctl --user stop 2fauth-server
|
||||
# systemctl --user disable 2fauth-server
|
||||
# podman exec -ti 2fauth-server /bin/sh
|
||||
# podman exec -ti 2fauth-server /bin/bash
|
@ -1 +0,0 @@
|
||||
[Volume]
|
@ -1,36 +0,0 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
ContainerName=actual-server
|
||||
Environment="ACTUAL_HOSTNAME=0.0.0.0"
|
||||
# Environment="ACTUAL_HTTPS_CERT=/certs/server.cert"
|
||||
# Environment="ACTUAL_HTTPS_KEY=/certs/server"
|
||||
# Environment="ACTUAL_PORT=5006"
|
||||
# Environment="ACTUAL_UPLOAD_FILE_SIZE_LIMIT_MB=20"
|
||||
# Environment="ACTUAL_UPLOAD_FILE_SYNC_SIZE_LIMIT_MB=20"
|
||||
# Environment="ACTUAL_UPLOAD_SYNC_ENCRYPTED_FILE_SYNC_SIZE_LIMIT_MB=50"
|
||||
Image=docker.io/actualbudget/actual-server:latest
|
||||
# Network=actual.network
|
||||
# Pod=actual.pod
|
||||
PublishPort=5013:5006
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
|
||||
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
|
||||
Volume=actual-server-data.volume:/data:rw
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/actualbudget/actual-server:latest
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start actual-server
|
||||
# systemctl --user status actual-server --lines=999
|
||||
# journalctl -fu actual-server.service
|
||||
# podman logs actual-server
|
||||
# systemctl --user stop actual-server
|
||||
# systemctl --user disable actual-server
|
||||
# podman exec -ti actual-server /bin/sh
|
||||
# podman exec -ti actual-server /bin/bash
|
@ -1 +0,0 @@
|
||||
[Volume]
|
@ -1,36 +0,0 @@
|
||||
[Container]
|
||||
# AutoUpdate=registry
|
||||
ContainerName=authentik-db
|
||||
Environment="POSTGRES_USER=authentik"
|
||||
Environment="POSTGRES_PASSWORD=OCxfxtWadNuXslBbfWw9c0JXLMu+bWngv+qk9Ya65sw="
|
||||
Environment="POSTGRES_DB=authentik"
|
||||
Environment="TZ=America/Phoenix"
|
||||
Image=docker.io/library/postgres:16.6
|
||||
HealthCmd=pg_isready -U authentik
|
||||
HealthInterval=30s
|
||||
HealthRetries=5
|
||||
HealthStartPeriod=20s
|
||||
HealthTimeout=3s
|
||||
# Network=authentik.network
|
||||
# Pod=authentik.pod
|
||||
PublishPort=5439:5432
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
Volume=authentik-db-data:/data:Z
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/library/postgres:16.6
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start authentik-db
|
||||
# systemctl --user status authentik-db --lines=999
|
||||
# journalctl -fu authentik-db.service
|
||||
# podman logs authentik-db
|
||||
# systemctl --user stop authentik-db
|
||||
# systemctl --user disable authentik-db
|
||||
# podman exec -ti authentik-db /bin/sh
|
||||
# podman exec -ti authentik-db /bin/bash
|
@ -1 +0,0 @@
|
||||
[Volume]
|
@ -1,36 +0,0 @@
|
||||
[Container]
|
||||
# AutoUpdate=registry
|
||||
ContainerName=authentik-redis
|
||||
Exec=--save 60 1 --loglevel warning
|
||||
# Environment="AUTHENTIK_REDIS__HOST=192.168.11.2"
|
||||
HealthCmd=/usr/local/bin/redis-cli ping || grep PONG
|
||||
HealthInterval=30s
|
||||
HealthRetries=5
|
||||
HealthStartPeriod=20s
|
||||
HealthTimeout=3s
|
||||
Image=docker.io/library/redis:7.4.1
|
||||
# Network=authentik.network
|
||||
# Pod=authentik.pod
|
||||
PublishPort=5021:6379
|
||||
Volume=authentik-redis-data:/data:Z
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Unit]
|
||||
Requires=authentik-db.service
|
||||
After=authentik-db.service
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/library/redis:7.4.1
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start authentik-redis
|
||||
# systemctl --user status authentik-redis --lines=999
|
||||
# journalctl -fu authentik-redis.service
|
||||
# podman logs authentik-redis
|
||||
# systemctl --user stop authentik-redis
|
||||
# systemctl --user disable authentik-redis
|
||||
# podman exec -ti authentik-redis /bin/sh
|
||||
# podman exec -ti authentik-redis /bin/bash
|
@ -1 +0,0 @@
|
||||
[Volume]
|
@ -1 +0,0 @@
|
||||
[Volume]
|
@ -1,55 +0,0 @@
|
||||
[Container]
|
||||
ContainerName=authentik-server
|
||||
Environment="AUTHENTIK_POSTGRESQL__CONN_MAX_AGE=0"
|
||||
Environment="AUTHENTIK_POSTGRESQL__HOST=192.168.11.2"
|
||||
Environment="AUTHENTIK_POSTGRESQL__NAME=authentik"
|
||||
Environment="AUTHENTIK_POSTGRESQL__PASSWORD=OCxfxtWadNuXslBbfWw9c0JXLMu+bWngv+qk9Ya65sw="
|
||||
Environment="AUTHENTIK_POSTGRESQL__PORT=5439"
|
||||
Environment="AUTHENTIK_POSTGRESQL__USER=authentik"
|
||||
Environment="AUTHENTIK_REDIS__HOST=192.168.11.2"
|
||||
Environment="AUTHENTIK_REDIS__PORT=5021"
|
||||
# (Required) To generate a secret key run the following command:
|
||||
# echo $(openssl rand -base64 32)
|
||||
Environment="AUTHENTIK_SECRET_KEY=mlZ57mWthun9b8SPaS7Ptl0bBQX4OvyRanbqdQ+5e/k="
|
||||
# (Optional) Enable Error Reporting
|
||||
# Environment="AUTHENTIK_ERROR_REPORTING__ENABLED=${AUTHENTIK_ERROR_REPORTING:-false}"
|
||||
# (Optional) Enable Email Sending
|
||||
# Environment="AUTHENTIK_EMAIL__HOST=smtp.centurylink.net"
|
||||
# Environment="AUTHENTIK_EMAIL__PORT=587"
|
||||
# Environment="AUTHENTIK_EMAIL__USERNAME=phares@centurylink.net"
|
||||
# Environment="AUTHENTIK_EMAIL__PASSWORD=RN9iPi5Ej#gRgLgiBTkb"
|
||||
# Environment="AUTHENTIK_EMAIL__USE_TLS=false"
|
||||
# Environment="AUTHENTIK_EMAIL__USE_SSL=false"
|
||||
# Environment="AUTHENTIK_EMAIL__TIMEOUT=10"
|
||||
# Environment="AUTHENTIK_EMAIL__FROM=noreply@phares.duckdns.org"
|
||||
Exec=server
|
||||
Image=ghcr.io/goauthentik/server:2024.12.1
|
||||
PublishPort=5017:9000
|
||||
PublishPort=5018:9443
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
|
||||
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
|
||||
Volume=authentik-server-media:/media:Z
|
||||
Volume=authentik-server-templates:/templates:Z
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Unit]
|
||||
Requires=authentik-worker.service
|
||||
After=authentik-worker.service
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull ghcr.io/goauthentik/server:2024.12.1
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start authentik-server
|
||||
# systemctl --user status authentik-server --lines=999
|
||||
# journalctl -fu authentik-server.service
|
||||
# podman logs authentik-server
|
||||
# systemctl --user stop authentik-server
|
||||
# systemctl --user disable authentik-server
|
||||
# podman exec -ti authentik-server /bin/sh
|
||||
# podman exec -ti authentik-server /bin/bash
|
@ -1,57 +0,0 @@
|
||||
[Container]
|
||||
ContainerName=authentik-worker
|
||||
Environment="AUTHENTIK_POSTGRESQL__CONN_MAX_AGE=0"
|
||||
Environment="AUTHENTIK_POSTGRESQL__HOST=192.168.11.2"
|
||||
Environment="AUTHENTIK_POSTGRESQL__NAME=authentik"
|
||||
Environment="AUTHENTIK_POSTGRESQL__PASSWORD=OCxfxtWadNuXslBbfWw9c0JXLMu+bWngv+qk9Ya65sw="
|
||||
Environment="AUTHENTIK_POSTGRESQL__PORT=5439"
|
||||
Environment="AUTHENTIK_POSTGRESQL__USER=authentik"
|
||||
Environment="AUTHENTIK_REDIS__HOST=192.168.11.2"
|
||||
Environment="AUTHENTIK_REDIS__PORT=5021"
|
||||
# (Required) To generate a secret key run the following command:
|
||||
# echo $(openssl rand -base64 32)
|
||||
Environment="AUTHENTIK_SECRET_KEY=QvqdN5Pn4piWcoof1yPDa0FcaGnOL1gHAiSImJjEGZl6pypRgE2nCps8DTd4R9UHqfFuOtR9jhCelmQ2"
|
||||
# (Optional) Enable Error Reporting
|
||||
# Environment="AUTHENTIK_ERROR_REPORTING__ENABLED=true"
|
||||
# (Optional) Enable Email Sending
|
||||
# Environment="AUTHENTIK_EMAIL__HOST=smtp.centurylink.net"
|
||||
# Environment="AUTHENTIK_EMAIL__PORT=587"
|
||||
# Environment="AUTHENTIK_EMAIL__USERNAME=phares@centurylink.net"
|
||||
# Environment="AUTHENTIK_EMAIL__PASSWORD=RN9iPi5Ej#gRgLgiBTkb"
|
||||
# Environment="AUTHENTIK_EMAIL__USE_TLS=false"
|
||||
# Environment="AUTHENTIK_EMAIL__USE_SSL=false"
|
||||
# Environment="AUTHENTIK_EMAIL__TIMEOUT=10"
|
||||
# Environment="AUTHENTIK_EMAIL__FROM=noreply@phares.duckdns.org"
|
||||
Exec=worker
|
||||
Image=ghcr.io/goauthentik/server:2024.12.1
|
||||
PublishPort=5019:9000
|
||||
PublishPort=5020:9443
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
|
||||
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
|
||||
Volume=authentik-server-media:/media:Z
|
||||
Volume=authentik-server-templates:/templates:Z
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Unit]
|
||||
Requires=authentik-db.service
|
||||
Requires=authentik-redis.service
|
||||
After=authentik-db.service
|
||||
After=authentik-redis.service
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull ghcr.io/goauthentik/server:2024.12.1
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start authentik-worker
|
||||
# systemctl --user status authentik-worker --lines=999
|
||||
# journalctl -fu authentik-worker.service
|
||||
# podman logs authentik-worker
|
||||
# systemctl --user stop authentik-worker
|
||||
# systemctl --user disable authentik-worker
|
||||
# podman exec -ti authentik-worker /bin/sh
|
||||
# podman exec -ti authentik-worker /bin/bash
|
@ -1,27 +0,0 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
ContainerName=file-folder-helper
|
||||
Exec=sleep infinity
|
||||
Image=gitea.phares.duckdns.org:443/phares3757/file-folder-helper:latest
|
||||
# Network=file-folder-helper.network
|
||||
# Pod=file-folder-helper.pod
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
Volume=/mnt/free-file-sync/notes/user-secrets/8da397d4-13ec-4576-9722-3c79cad25563/secrets.json:/app/secrets.json:ro
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull gitea.phares.duckdns.org:443/phares3757/file-folder-helper:latest
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start file-folder-helper
|
||||
# systemctl --user status file-folder-helper
|
||||
# journalctl -fu file-folder-helper.service
|
||||
# podman logs file-folder-helper
|
||||
# systemctl --user stop file-folder-helper
|
||||
# systemctl --user disable file-folder-helper
|
||||
# podman exec -ti file-folder-helper /bin/sh
|
||||
# podman exec -ti file-folder-helper /bin/bash
|
@ -1 +0,0 @@
|
||||
[Volume]
|
@ -1,52 +0,0 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
#
|
||||
ContainerName=minecraft-server
|
||||
#
|
||||
# Environment="MODPACK=https://mediafilez.forgecdn.net/files/6159/192/Integrated%20MC-1.4.5.zip"
|
||||
Environment="CF_API_KEY=$2a$10$4YL9prKJllKmiFp./V11B.iZ3kS1p0Rv0afJTpNctfRl2j6j/vb/a"
|
||||
Environment="CF_FILE_ID=6159192"
|
||||
# Environment="CF_PAGE_URL=https://www.curseforge.com/minecraft/modpacks/integrated-minecraft"
|
||||
Environment="CF_SLUG=integrated-minecraft"
|
||||
Environment="DIFFICULTY=normal"
|
||||
Environment="EULA=TRUE"
|
||||
Environment="FORCE_GAMEMODE=true"
|
||||
Environment="MODE=survival"
|
||||
Environment="TYPE=AUTO_CURSEFORGE"
|
||||
# Environment="TYPE=FORGE"
|
||||
Environment="VERSION=1.20.1"
|
||||
Environment= "MEMORY=6G"
|
||||
#
|
||||
HealthCmd=mc-health
|
||||
HealthInterval=5s
|
||||
HealthRetries=20
|
||||
HealthStartPeriod=1m
|
||||
HealthTimeout=3s
|
||||
#
|
||||
Image=docker.io/itzg/minecraft-server
|
||||
# Network=minecraft.network
|
||||
# Pod=minecraft.pod
|
||||
PodmanArgs=--attach stdin --tty
|
||||
#
|
||||
PublishPort=25565:25565
|
||||
#
|
||||
Volume=minecraft-server-data.volume:/data:rw
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull docker.io/itzg/minecraft-server
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start minecraft-server
|
||||
# systemctl --user status minecraft-server --lines=9999
|
||||
# journalctl -fu minecraft-server.service
|
||||
# podman logs minecraft-server
|
||||
# systemctl --user stop minecraft-server
|
||||
# systemctl --user disable minecraft-server
|
||||
# podman exec -ti minecraft-server /bin/sh
|
||||
# podman exec -ti minecraft-server /bin/bash
|
@ -1,30 +0,0 @@
|
||||
[Container]
|
||||
AutoUpdate=registry
|
||||
ContainerName=original-to-deterministic-hash-code-server
|
||||
Environment="ASPNETCORE_ENVIRONMENT=Production"
|
||||
Image=gitea.phares.duckdns.org:443/phares3757/original-to-deterministic-hash-code:latest
|
||||
# Network=original-to-deterministic-hash-code-server.network
|
||||
# Pod=original-to-deterministic-hash-code-server.pod
|
||||
PublishPort=5025:5001
|
||||
Volume=/etc/localtime:/etc/localtime:ro
|
||||
Volume=/etc/timezone:/etc/timezone:ro
|
||||
Volume=/tmp/original-to-deterministic-hash-code:/tmp/original-to-deterministic-hash-code:rw
|
||||
Volume=/mnt/free-file-sync/proxmox/iCloud Photos 2024:/app/content:rw
|
||||
Volume=/home/podman/.microsoft/usersecrets/2f63ace9-efe5-4b0a-9ebe-529309f33e3f/secrets.json:/app/secrets.json:ro
|
||||
|
||||
[Service]
|
||||
Restart=no
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target default.target
|
||||
|
||||
# podman pull gitea.phares.duckdns.org:443/phares3757/original-to-deterministic-hash-code:latest
|
||||
# systemctl --user daemon-reload
|
||||
# systemctl --user start original-to-deterministic-hash-code-server
|
||||
# systemctl --user status original-to-deterministic-hash-code-server
|
||||
# journalctl -fu original-to-deterministic-hash-code-server.service
|
||||
# podman logs original-to-deterministic-hash-code-server
|
||||
# systemctl --user stop original-to-deterministic-hash-code-server
|
||||
# systemctl --user disable original-to-deterministic-hash-code-server
|
||||
# podman exec -ti original-to-deterministic-hash-code-server /bin/sh
|
||||
# podman exec -ti original-to-deterministic-hash-code-server /bin/bash
|
@ -1 +0,0 @@
|
||||
[Volume]
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user