1 Commits

Author SHA1 Message Date
51a235740e Don't use 2024-12-23 09:10:35 -07:00
142 changed files with 1012 additions and 2833 deletions

4
.gitignore vendored
View File

@ -55,8 +55,6 @@
!opt/copy/**/*
!opt/dockge/**/*.yaml
!var/spool/cron/crontabs/**/*
!root/**/*container
!home/podman/**/*volume
!home/podman/**/*container
@ -66,4 +64,4 @@
# !usr/local/etc/gogs/conf/app.ini
# !usr/local/etc/no-ip2.conf
# !var/snap/nextcloud/current/nextcloud/config/*
# !var/www/html/.well-known/acme-challenge/*
# !var/www/html/.well-known/acme-challenge/*

9
.vscode/.http vendored
View File

@ -1,9 +0,0 @@
@host = http://192.168.11.2
# @pat = asdf
# @ids = 126018, 224543
GET {{host}}/ocs-client-run.conf
# Accept: application/json
# Authorization: Basic {{pat}}
###

12
.vscode/settings.json vendored
View File

@ -3,39 +3,27 @@
"*.container": "ini",
"*.org": "ini",
"*.net": "ini",
"podman": "ini",
"default": "ini"
},
"cSpell.words": [
"ASPNETCORE",
"autoindex",
"bchs",
"blinko",
"dashkiosk",
"dockge",
"docmost",
"dorico",
"duckdns",
"fauth",
"fullchain",
"gitea",
"gogs",
"immich",
"JMLC",
"journalctl",
"kanbn",
"kestra",
"keyout",
"linkwarden",
"localtime",
"lphares",
"neko",
"newkey",
"odoo",
"personalised",
"pgadmin",
"phares",
"Sumco",
"umbrel",
"usersecrets",
"vaultwarden",

20
.vscode/tasks.json vendored
View File

@ -1,20 +0,0 @@
{
"version": "2.0.0",
"tasks": [
{
"label": "File-Folder-Helper AOT s X Day-Helper-2025-01-01",
"type": "shell",
"command": "L:/DevOps/Mesa_FI/File-Folder-Helper/bin/Release/net9.0/win-x64/publish/File-Folder-Helper.exe",
"args": [
"s",
"X",
"D:/6-Other-Large-Z/Linux-Ubuntu-Phares/home/podman/cron-backup",
"Day-Helper-2025-01-01",
"*.tar",
"-202",
"-Delete"
],
"problemMatcher": []
}
]
}

View File

@ -1,500 +0,0 @@
podman exec -ti immich-to-slideshow-server /bin/bash
cp -R /var/www/html-slideshow/Images-c9dbce3b-Results/F\)Random/c9dbce3b/\[\]/* /var/www/html-slideshow/slideshow/random-results/
exit
ls -al /var/www/html-slideshow/slideshow/random-results
exit
podman exec -ti immich-to-slideshow-server /bin/bash
exit
systemctl --user start immich-to-slideshow-server
exit
exit
systemctl --user start immich-to-slideshow-server
podman exec -ti immich-to-slideshow-server /bin/bash
exit
systemctl --user start immich-to-slideshow-server
exit
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
systemctl --user start immich-to-slideshow-server
exit
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
systemctl --user start immich-to-slideshow-server
exit
systemctl --user start immich-to-slideshow-server
exit
systemctl --user start immich-to-slideshow-server
exit
podman exec -ti immich-to-slideshow-server /bin/bash
systemctl --user start immich-to-slideshow-server
podman exec -ti immich-to-slideshow-server /bin/bash
exit
systemctl --user start immich-to-slideshow-server
podman exec -ti immich-to-slideshow-server /bin/bash
exit
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
systemctl --user start immich-to-slideshow-server
exit
podman pull docker.io/damongolding/immich-kiosk:latest
exit
systemctl --user start immich-kiosk
exit
systemctl --user start immich-kiosk
exit
systemctl --user start immich-kiosk
exit
systemctl --user start immich-kiosk
exit
systemctl --user start immich-kiosk
exit
systemctl --user start immich-to-slideshow-server
systemctl --user status immich-to-slideshow-server
exit
systemctl --user status immich-to-slideshow-server
systemctl --user start immich-to-slideshow-server
nano ~/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da/secrets.json
exit
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
exit
systemctl --user start immich-to-slideshow-server
exit
podman pull tananaev/traccar:latest
podman pull tananaev.org/traccar:latest
podman pull traccar.org/traccar:latest
podman pull docker.io/traccar/traccar:latest
exit
systemctl --user start traccar-server
systemctl --user status traccar-server --lines=999
ls -la /opt/traccar/
ls -la /opt/traccar/logs/
exit
systemctl --user status traccar-server --lines=999
systemctl --user start traccar-server
nano /opt/traccar/traccar.xml
exit
nano /opt/traccar/traccar.xml
systemctl --user start traccar-server
systemctl --user status traccar-server --lines=999
nano /opt/traccar/traccar.xml
nano /opt/traccar/traccar.xml
systemctl --user start traccar-server
systemctl --user status traccar-server --lines=999
podman pull ghcr.io/linkwarden/linkwarden:latest
podman pull ghcr.io/linkwarden/linkwarden:latest
podman pull docker.io/postgres:16-alpine
podman pull docker.io/postgres:16-alpine
podman pull ghcr.io/linkwarden/linkwarden:latest
podman pull ghcr.io/linkwarden/linkwarden:latest
exit
systemctl --user start linkwarden-db
systemctl --user start linkwarden-server
systemctl --user status linkwarden-server --lines=9999
exit
systemctl --user start linkwarden-server
systemctl --user status linkwarden-server --lines=9999
exit
systemctl --user start linkwarden-server
systemctl --user status linkwarden-server --lines=9999
exit
podman pull docker.io/blinkospace/blinko:latest
podman pull docker.io/postgres:14
systemctl --user start blinko-server
systemctl --user status blinko-server --lines=9999
systemctl --user start blinko-db
systemctl --user status blinko-db
systemctl --user start blinko-db
systemctl --user start blinko-server
systemctl --user status blinko-server --lines=9999
exit
podman volunme ls
podman volume ls
podman volume prune
podman volume ls
podman volume rm systemd-odoo-server-data
podman volume rm systemd-odoo-db-data
podman volume rm one-review_postgres_data
podman volume prune
podman volume rm systemd-vaultwarden-server-data
podman volume prune
exit
exit
exit
podman exec -ti mattermost-server /bin/bash
podman volume ls
podman volume inspect systemd-mattermost-server-config
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
podman volume prune
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
docker system prune --volumes
podman system prune --volumes
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
exit
systemctl --user start linkwarden-server
systemctl --user status linkwarden-server --lines=9999
podman volume prune
podman volume prune
podman image prune
podman image prune
podman container prune
podman volume prune
podman container prune
exit
exit
podman exec -ti linkwarden-server /bin/bash
podman pull docker.io/mattermost/mattermost-team-edition:release-10.3
podman pull docker.io/mattermost/mattermost-team-edition:release-10.3
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
exit
systemctl --user start mattermost-server
curl -f http://localhost:8065/api/v4/system/ping || exit 1
systemctl --user start mattermost-server
podman exec -ti mattermost-server /bin/sh
exit
systemctl --user start mattermost-server
exit
systemctl --user start mattermost-server
exit
systemctl --user start mattermost-server
exit
podman volume ls
podman volume prune
podman volume inspect systemd-blinko-server-data
sudo -i root
sudo -i
podman exec -ti blinko-server /bin/bash
podman exec -ti blinko-server /bin/sh
exit
sudo -i
exit
sudo -i
exit
exit
systemctl --user start linkwarden-server
exit
podman volume list
podman volume info systemd-blinko-server-data
podman volume systemd-blinko-server-data info
podman volume systemd-blinko-server-data
podman volume --help
podman volume inspect systemd-blinko-server-data
ls /home/podman/.local/share/containers/storage/volumes/systemd-blinko-server-data/_data
mkdir -p /home/podman/backup-blinko
podman volume export blinko-server-data --output /home/podman/backup-blinko/blinko-server-data.tar
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/blinko-server-data.tar
podman volume export systemd-baikal-server-data --output /home/podman/backup-baikal/baikal-server-data.tar
mkdir -p /home/podman/backup-baikal
podman volume export systemd-baikal-server-data --output /home/podman/backup-baikal/baikal-server-data.tar
now=$(date +'%Y-%m-%d_%H-%M-%S')
podman volume export systemd-baikal-server-data --output /home/podman/backup-baikal/baikal-server-data-${now}.tar
crontab -e
exit
crontab -e
crontab -e
crontab -r
exit
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"\%Y\%m\%d-\%H\%M\%S")'.tar'
exit
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"%Y-%m-%d--%H-%M-%S")'.tar'
exit
crontab -e
exit
chrontab -e
crontab -e
crontab -e
exit
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"%Y-%m-%d--%H-%M-%S")'.tar'
whereis podman
/usr/bin/podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"%Y-%m-%d--%H-%M-%S")'.tar'
crontab -e
crontab -e
crontab -e
grep CRON /var/log/syslog
nano /var/log/syslog
cat /var/log/syslog
exit
crontab -l
crontab -r
crontab -e
cat /etc/cron.allow
cat /etc/cron.d/cron.allow
crontab -l -u podman
nano /etc/cron. d/cron
nano /etc/cron
nano /etc/cron.d/cron.allow
crontab -r
crontab -l
exit
crontab -l
crontab -e
systemctl status cron
sudo -i
systemctl status cron
crontab -e
crontab -e
systemctl status cron
systemctl status cron
systemctl status cron
crontab -l
crontab -e
systemctl status cron
systemctl status cron
service cron status
crontab -e
service cron status
crontab -l
crontab -e
/home/podman/cron-backup
mkdir /home/podman/cron-backup
crontab -e
crontab -e
crontab -e
crontab -e
tar --list \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
tar --list --file \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
tar \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
tar --list --file \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar /etc
tar -tf \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
tar --list --file /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar
tar --list --file /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar thumbs/5f0b1052-466d-44de-a554-226d7256850d/33/c5/
crontab -e
tar --list --directory /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar
tar --list --file /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar
crontab -e
exit
systemctl --user start linkwarden-server
exit
podman pull docker.io/actualbudget/actual-server:latest
systemctl --user start actual-server
exit
exit
exit
exit
exit
systemctl --user start linkwarden-server
exit
id
exit
nano ~/.bash_profile
nano ~/.bash_profile
exit
exit
systemctl --user start uptime-kuma-server
exit
systemctl --user start uptime-kuma-server
podman pull docker.io/2fauth/2fauth
exit
systemctl --user start 2fauth-server
exit
systemctl --user start 2fauth-server
exit
systemctl --user start 2fauth-server
exit
podman volumn prune
podman volume prune
podman volume prune
exit
systemctl --user start 2fauth-server
exit
systemctl --user start 2fauth-server
systemctl --user status 2fauth-server
exit
systemctl --user start 2fauth-server
exit
exit
systemctl --user start 2fauth-server
exit
podman exec -ti 2fauth-server /bin/bash
podman exec -ti 2fauth-server /bin/sh
nc -zv localhost 8000
nc -zv localhost 443
podman exec -ti 2fauth-server /bin/sh
podman exec -ti 2fauth-server /bin/sh
nc -zv localhost 8000
nc -zv localhost 5015
nc -zv localhost 5016
nc -zv localhost 5015
nc -zv localhost 5015
systemctl --user start 2fauth-server
nc -zv localhost 5015
exit
podman exec -ti 2fauth-server /bin/sh
exit
systemctl --user start 2fauth-server
podman exec -ti 2fauth-server /bin/sh
exit
systemctl --user start 2fauth-server
exit
systemctl --user start 2fauth-server
exit
podman exec -ti 2fauth-server /bin/sh
exit
systemctl --user start 2fauth-server
podman exec -ti 2fauth-server /bin/sh
podman exec -ti 2fauth-server /bin/sh
exit
podman exec -ti 2fauth-server /bin/sh
exit
podman exec -ti 2fauth-server /bin/sh
systemctl --user start 2fauth-server
podman exec -ti 2fauth-server /bin/sh
exit
systemctl --user start 2fauth-server
exit
systemctl --user start 2fauth-server
exit
podman pull docker.io/gotify/server
systemctl --user start gotify-server
exiot
exit
systemctl --user start uptime-kuma-server
nano /etc/hostname
exit
podman pull ghcr.io/goauthentik/server:2024.12.1
exit
podman pull docker.io/library/redis:7.4.1
exit
podman pull docker.io/library/redis:7.4.1
exit
podman pull docker.io/library/postgres:16.6
exit
exit
systemctl --user start authentik-db
systemctl --user status authentik-db
exit
systemctl --user start authentik-db
systemctl --user status authentik-db
systemctl --user start authentik-redis
systemctl --user status authentik-redis
systemctl --user start authentik-worker
systemctl --user status authentik-worker
exit
systemctl --user status authentik-worker
exit
systemctl --user start authentik-worker
systemctl --user status authentik-worker
nc -zv localhost 5021
redis-cli ping
redis-cli -h localhost -p 6379 PING
redis-cli -h localhost -p 5021 PING
podman exec -ti authentik-redis /bin/bash
redis-cli -h localhost -p 5021 PING
exit
exit
systemctl --user start authentik-redis
systemctl --user status authentik-redis
exit
systemctl --user start authentik-redis
systemctl --user status authentik-redis
podman exec -ti authentik-redis /bin/bash
podman exec -ti authentik-redis /bin/sh
exit
exit
systemctl --user start authentik-redis
systemctl --user start authentik-redis
podman exec -ti authentik-redis /bin/sh
podman exec -ti authentik-redis /bin/bash
exit
exit
systemctl --user start authentik-redis
exit
systemctl --user start authentik-redis
systemctl --user start authentik-redis
exit
systemctl --user start authentik-redis
exit
systemctl --user start authentik-redis
podman exec -ti authentik-redis /bin/bash
exit
systemctl --user start authentik-redis
exit
systemctl --user start authentik-redis
exit
systemctl --user start mattermost-server
exit
systemctl --user status mattermost-server --lines=999
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
podman volume prune
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
exit
systemctl --user start mattermost-server
systemctl --user status mattermost-server --lines=999
exit
crontab -e
crontab -e
exit
crontab -e
exit
podman volume import systemd-mattermost-server-logs /home/podman/cron-backup/mattermost-server-logs-2024-12-23--11-28-01.tar
podman volume import systemd-mattermost-server-plugins /home/podman/cron-backup/mattermost-server-plugins-2024-12-23--11-29-02.tar
podman volume import systemd-mattermost-server-config /home/podman/cron-backup/mattermost-server-config-2024-12-23--11-27-01.tar
podman volume import systemd-mattermost-server-client-plugins /home/podman/cron-backup/mattermost-server-client-plugins-2024-12-23--11-26-01.tar
podman volume import systemd-mattermost-server-bleve /home/podman/cron-backup/mattermost-server-bleve-2024-12-23--11-25-01.tar
podman volume import systemd-mattermost-server-data /home/podman/cron-backup/mattermost-server-data-2024-12-23--11-18-01.tar
podman volume import systemd-mattermost-db-data /home/podman/cron-backup/mattermost-db-data-2024-12-24--12-17-01.tar
exit
systemctl --user start mattermost-server
systemctl --user start mattermost-db
exit
systemctl --user start mattermost-db
systemctl --user start mattermost-db
systemctl --user start mattermost-server
exit
systemctl --user status mattermost-server --lines=999
exit
podman volume import systemd-mattermost-db-data /home/podman/cron-backup/mattermost-db-data-2024-12-24--12-17-01.tar
podman volume import systemd-mattermost-server-data /home/podman/cron-backup/mattermost-server-data-2024-12-23--11-18-01.tar
podman volume import systemd-mattermost-server-bleve /home/podman/cron-backup/mattermost-server-bleve-2024-12-23--11-25-01.tar
podman volume import systemd-mattermost-server-client-plugins /home/podman/cron-backup/mattermost-server-client-plugins-2024-12-23--11-26-01.tar
podman volume import systemd-mattermost-server-config /home/podman/cron-backup/mattermost-server-config-2024-12-23--11-27-01.tar
podman volume import systemd-mattermost-server-plugins /home/podman/cron-backup/mattermost-server-plugins-2024-12-23--11-29-02.tar
podman volume import systemd-mattermost-server-logs /home/podman/cron-backup/mattermost-server-logs-2024-12-23--11-28-01.tar
exit
podman volume import systemd-mattermost-server-data /home/podman/cron-backup/mattermost-server-data-2024-12-23--11-18-01.tar
systemctl --user start mattermost-db
systemctl --user start mattermost-server
exit
systemctl --user start mattermost-server
podman exec -ti mattermost-server /bin/bash
exit
systemctl --user start mattermost-server
exit
exit
exit
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
/usr/libexec/podman/quadlet -dryrun --user
exit
exit
exit
systemctl --user start mattermost-server
exit
systemctl --user status mattermost-server --lines=999
exit

View File

@ -6,9 +6,12 @@ snap install dashkiosk
snap install ubuntu-frame wpe-webkit-mir-kiosk
snap set wpe-webkit-mir-kiosk daemon=true
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
exit
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
snap set ubuntu-frame daemon=true
exit
reboot
cat /root/.ssh/authorized_keys
nano /root/.ssh/authorized_keys
@ -22,4 +25,4 @@ cp /root/.ssh/authorized_keys /home/bmiller/.ssh/authorized_keys
chown bmiller:bmiller -R /home/bmiller
ln -s /var/log/nginx /var/www/html/log-nginx
ls -la /var/www/html
exit
exit

View File

@ -1,13 +1,17 @@
cat /root/.ssh/authorized_keys
nano /root/.ssh/authorized_keys
exit
apt-get install podman -y
apt-cache rdepends podman-compose
apt-get install podman-compose -y
adduser podman sudo
sudo -iu podman
exit
timedatectl set-timezone America/Phoenix
date
apt-get update
apt upgrade -y
adduser pihole
adduser podman
adduser lphares
mkdir /home/lphares/.ssh
@ -22,36 +26,64 @@ adduser bmiller lphares
sudo usermod -a -G lphares bmiller
newgrp lphares
systemctl restart ssh
exit
reboot
sudo -iu podman
cd /run/user/0/
ls -la
cd ..
ls -la
cp -R 0/ 1002/
chown -R podman:podman /run/user/1002/
sudo -iu podman
rm -R /run/user/1002/
mkdir -p /run/user/1002/
sudo -iu podman
chown -R podman:podman /run/user/1002/
sudo -iu podman
exit
reboot
adduser pihole
cd /tmp
curl -sSL https://install.pi-hole.net | bash
pihole -a -p LhhI1S73VZhtP#WIG8Tk
exit
reboot
apt install unbound -y
nano /etc/unbound/unbound.conf.d/pi-hole.conf
service unbound restart
nano /etc/lighttpd/lighttpd.conf
pihole -up
service lighttpd restart
dig fail01.dnssec.works @127.0.0.1 -p 5335
dig dnssec.works @127.0.0.1 -p 5335
exit
reboot
ln -s /var/log/nginx /var/www/html/log-nginx
ls -la /var/www/html
exit
cp ~/.bash_history /etc/bash_history_2024-07-25.txt
cat /etc/bash_history_2024-07-25.txt
exit
apt install smartmontools
smartctl -i /dev/sda
exit
reboot
apt install snapd -y
apt install sudo links unzip nginx git nano ncdu -y
snap install dashkiosk
apt install sudo links unzip nginx git nano ncdu -y
snap install ubuntu-frame wpe-webkit-mir-kiosk
snap set wpe-webkit-mir-kiosk daemon=true
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
exit
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
snap set ubuntu-frame daemon=true
exit
reboot
sudo -iu podman
chmod -R podman:podman /home/podman/.config/containers/systemd/
chown -R podman:podman /home/podman/.config/containers/systemd/
rm -R .config/containers/systemd/*.ignore
@ -63,6 +95,8 @@ rm -R /home/podman/.config/containers/systemd/*.container
mkdir /home/podman/.ssh
cp /root/.ssh/authorized_keys /home/podman/.ssh/authorized_keys
chown podman:podman -R /home/podman
systemctl --user daemon-reload
sudo -iu podman
cd ~/
mkdir -p ~/.bashrc.d
echo "export XDG_RUNTIME_DIR=/run/user/$(id -u)" > ~/.bashrc.d/systemd
@ -73,6 +107,9 @@ systemctl --user daemon-reload
podman image prune
podman volume prune
podman container prune
exit
shutdown now
ip a
lsof -i -P -n | grep LISTEN
apt-cache rdepends cockpit
apt install cockpit -y
@ -80,32 +117,51 @@ passwd phares
apt-get install cockpit cockpit-podman -y
systemctl enable --now cockpit.socket
journalctl -fu unbound-resolvconf.service
ip a
service unbound restart
journalctl -fu unbound-resolvconf.service
nano /etc/sysctl.conf
sysctl -p
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
exit
reboot
ip a
nano /etc/postfix/main.cf
nano /etc/default/grub
grub2-mkconfig
grub-mkconfig
exit
reboot
ip a
nmcli
dig pi-hole.net @127.0.0.1 -p 5335
dig fail01.dnssec.works @127.0.0.1 -p 5335
dig dnssec.works @127.0.0.1 -p 5335
systemctl is-active unbound-resolvconf.service
systemctl disable --now unbound-resolvconf.service
sed -Ei 's/^unbound_conf=/#unbound_conf=/' /etc/resolvconf.conf
service unbound restart
rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf
systemctl disable --now unbound-resolvconf.service
exit
reboot\
reboot
sudo -iu podman
exit
reboot
sudo -iu podman
exit
reboot
sudo -iu podman
exit
shutdown now
lvs -a
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
smartctl -i /dev/sda
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
mkdir /mnt/usb
mount /dev/sdb2 /mnt/usb
exit
nginx -t
nginx -s reload
exit
exit

View File

@ -1,26 +1,70 @@
exit
cd ~/.bashrc.d/systemd
cd ~/.bashrc.d
ls -la
sudo -iu podman
exit
systemctl --user list-unit-files
cd /etc/containers/systemd/users
ls
ls -la
cd ..
ls -la
systemctl start --user
cd /usr/lib/systemd/system-generators/podman-system-generator
cd /usr/lib/systemd/system-generators
ls -la
ls -la
cd /usr/libexec/podman/quadlet
cd /usr/libexec/podman
ls -la
apt-get install apt install podman-quadlet
apt install podman-quadlet
ls -la
ls -la /usr/libexec/podman
systemctl -l | grep -i rootlessport
ps aux | grep rootlessport
podman-generate-systemd
ls
whereis podman-generate-systemd
clear
apt list --installed
clear
exit
clear
apt list --installed
clear
/usr/libexec/podman/quadlet -dryrun
/usr/libexec/podman/quadlet --user -dryrun
sudo -iu podman
exit
chown -R podman:podman /home/podman
/usr/libexec/podman/quadlet -dryrun --user
sudo -iu podman
find / -name "immich-server.service" 2>/dev/null
rm -R /home/podman/d
find / -name "uptime-kuma-server.service" 2>/dev/null
sudo -iu podman
sudo -iu podman
sudo -iu podman
chown -R podman:podman /home/podman/.config/containers/systemd
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
sudo -iu podman
nginx -t
nginx -s reload
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -s reload
links https://phares.duckdns.org
nano /etc/hosts
links https://phares.duckdns.org
ls /var/www/html
nano index.html
nano /var/www/html/index.html
@ -29,55 +73,180 @@ ls /var/www
mkdir /var/www/html
cp /var/www/html-slideshow/index.nginx-debian.html /var/www/html/
mv /var/www/html /var/www/html-nginx
nginx -t
nginx -s reload
links https://phares.duckdns.org
ls /var/www/html-nginx
links https://adguard.phares.duckdns.org/
nano /etc/hosts
links https://adguard.phares.duckdns.org/
nano /etc/hosts
links https://adguard.phares.duckdns.org/
nano /etc/hosts
nano /etc/hosts
links https://adguard.phares.duckdns.org/
nano /etc/hosts
links https://adguard.phares.duckdns.org/
exit
nginx -t
nginx -s reload
podman pull docker.io/m1k1o/neko:firefox
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
podman pull docker.io/mattermost/mattermost-team-edition:9.11.2
sudo -iu podman
podman list images
podman ls images
podman images ls
podman image ls
podman image prone
podman image purge
podman image --help
podman image prune
y
podman image ls
podman image rm 2
podman image rm 7
podman image ls
sudo -iu podman
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -t
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
sudo -iu podman
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
nano /etc/hosts
nano /etc/hosts
nano /etc/hosts
exit
sudo -iu podman
sudo -iu podman
cat /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
nano/home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
sudo -iu podman
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
sudo -iu podman
exit
exit
sudo -iu podman
cd /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-external/_data
ls
ls -la
cd /
sudo -iu podman
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-upload/_data/thumbs/5f0b1052-466d-44de-a554-226d7256850d/
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
sudo -iu podman
sudo -iu podman
links https://192.168.0.43:8123
links http://192.168.0.43:8123
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
cp -R /var/www/html-nginx/ /var/www/html-quartz
cd /var/www/html-quartz
ls
mv index.nginx-debian.html index.html
links http://192.168.11.2:8069/
links http://192.168.11.2:8069/index.html
cd /
nginx -t
cd /var/www/html-infineon/
ls
nginx -t
nginx -s reload
apt-get update
apt-get upgrade
reboot
links http://192.168.11.2:8069/
links http://192.168.11.2:8069/
links http://192.168.11.2/
sudo -iu podman
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions/
rm /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
rm -R /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/var
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/phares3757/
sudo -iu podman
exit
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nano /root/.acme.sh/*.phares.duckdns.org_ecc/*.phares.duckdns.org.cer
nginx -t
nginx -s reload
nginx -t
nginx -s reload
reboot
links http://127.0.0.1:8080/slideshow/index.html?nocache=2024-07-01-11-36
links http://127.0.0.1:8080/slideshow/index.html
links http://127.0.0.1:8080/slideshow
links http://192.168.11.2:8080/slideshow
nginx -t
reboot
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
exit
mv /root/.acme.sh/affirm.duckdns.org_ecc/ /root/acme.sh-master/wild-affirm
mv /root/acme.sh-master/wild-affirm /root/.acme.sh/wild-affirm
exit
nginx -t
nginx -t
nginx -s reload
exit
cd /tmp
git clone https://github.com/acmesh-official/acme.sh.git
cd /tmp/acme.sh
@ -94,77 +263,190 @@ mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.conf /root/.acme.sh/wild-jmlc/jm
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr.conf /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr.conf
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.key /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.key
nginx -t
nginx -t
nginx -s reload
nginx -t
nginx -t
nginx -s reload
nginx -s reload
links http://192.168.11.2:9090
links https://192.168.11.2:9090
nginx -s reload
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
man cockpit.conf
nano /etc/cockpit/cockpit.conf
systemctl status cockpit.socket
systemctl status cockpit
systemctl stop cockpit
systemctl stop cockpit.socket
systemctl stop cockpit
systemctl start cockpit
systemctl start cockpit.socket
nginx -s reload
rm /etc/cockpit/cockpit.conf
systemctl stop cockpit
systemctl stop cockpit.socket
systemctl stop cockpit
systemctl start cockpit.socket
systemctl start cockpit
nginx -s reload
journalctl -u cockpit
cd /etc/cockpit/
ls
cd ws-certs.d/
ls
mv 0-self-signed.cert 0-self-signed.cert.old
mv 0-self-signed.key 0-self-signed.key.old
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer 0-self-signed.cert
cp /root/.acme.sh/wild-phares/phares.duckdns.org.key 0-self-signed.key
systemctl restart cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl restart cockpit
nano /etc/cockpit/cockpit.conf
systemctl restart cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl status cockpit
systemctl restart cockpit
systemctl status cockpit
nginx -s reload
systemctl restart cockpit
systemctl status cockpit
nginx -s reload
nginx -s reload
rm -R /mnt/free-file-sync/notes/FS-ADO/
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
nignx -t
nginx -t
nginx -s reload
reboot
lsof -i -P -n | grep LISTEN
links http://192.168.11.2:5007/
links http://127.0.0.1:5007/
sudo -iu podman
sudo -iu podman
sudo -iu podman
chmod -R 0774 /root/.acme.sh/wild-phares
sudo -iu podman
ls -la /root/.acme.sh/wild-phares
chmod -R 0775 /root/.acme.sh/wild-phares
ls -la /root/.acme.sh/wild-phares
sudo -iu podman
chmod -R 0777 /root/.acme.sh/wild-phares
sudo -iu podman
chmod -R 0774 /root/.acme.sh/wild-phares
ls -la /root/.acme.sh/wild-phares
chmod -R 0774 /root/.acme.sh
ls -la /root/.acme.sh
sudo -iu podman
ln -s /root/.acme.sh/wild-phares /home/podman/wild-phares
sudo -iu podman
cp -R /root/.acme.sh/wild-phares /home/podman/wild-phares
cp -R /root/.acme.sh/wild-phares/ /home/podman
rm /home/podman/wild-phares
cp -R /root/.acme.sh/wild-phares/ /home/podman
chown podman:podman /home/podman
ls /home/podman/wild-phares/
ls -la /home/podman/wild-phares
sudo -iu podman
chown -R podman:podman /home/podman
ls -la /home/podman/wild-phares
sudo -iu podman
cd /home/podman/
ls
cd quadlet/
ls -la
cd default.target.wants/
ls -la
cd ..
cd ..
cd lib
cd libpod/
ls -la
sudo -iu podman
chown -R 1000:1000 /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
cd /
sudo -iu podman
sudo -iu podman
reboot
sudo -iu podman
exit
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
/usr/libexec/podman/quadlet -dryrun --user
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
ls -ls \mnt\free-file-sync\proxmox
ls -ls /mnt/free-file-sync/proxmox
cd /home/podman
apt-get install acl -y
ls -la
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
apt-get install acl -y
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
ls -la
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
cd /
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
ls /home/podman/.config/cni/net.d
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
cd /home/phares/
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
getfacl /home/podman > permissions.acl
ls
cat permissions.acl
rm permissions.acl
getfacl -R /home/podman > podman-permissions-bad.acl
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
cd ../podman
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
cd /
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
nano /etc/passwd
nano /etc/passwd
nano /etc/group
nano /etc/shadow
find / -uid 1000 -exec chown -h 2000 {} +
find / -gid 1000 -exec chgrp -h 2000 {} +
find / -xdev -uid 1002 -exec chown -h 1000 {} +
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
reboot
reboot
nano /etc/passwd
nano /etc/group
find / -xdev -uid 1001 -exec chown -h 1005 {} +
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
find / -xdev -uid 2000 -exec chown -h 1001 {} +
@ -175,18 +457,44 @@ find / -xdev -uid 1005 -exec chown -h 1002 {} +
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
reboot
cd /
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
ls /run/user/
ls /run/user/1001/systemd/
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
/usr/libexec/podman/quadlet -dryrun --user
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
sudo -iu podman
sudo -iu podman
sudo -iu podman
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
sudo -iu podman
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
sudo -iu podman
exit
exit

View File

@ -1,19 +1,32 @@
ls /home/podman/.config/cni/net.d
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
cd /home/phares/
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
getfacl /home/podman > permissions.acl
ls
cat permissions.acl
rm permissions.acl
getfacl -R /home/podman > podman-permissions-bad.acl
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
cd ../podman
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
cd /
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
nano /etc/passwd
nano /etc/passwd
nano /etc/group
nano /etc/shadow
find / -uid 1000 -exec chown -h 2000 {} +
find / -gid 1000 -exec chgrp -h 2000 {} +
find / -xdev -uid 1002 -exec chown -h 1000 {} +
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
reboot
reboot
nano /etc/passwd
nano /etc/group
find / -xdev -uid 1001 -exec chown -h 1005 {} +
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
find / -xdev -uid 2000 -exec chown -h 1001 {} +
@ -24,16 +37,60 @@ find / -xdev -uid 1005 -exec chown -h 1002 {} +
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
reboot
cd /
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
ls /run/user/
ls /run/user/1001/systemd/
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
/usr/libexec/podman/quadlet -dryrun --user
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
sudo -iu podman
sudo -iu podman
sudo -iu podman
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
sudo -iu podman
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
sudo -iu podman
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
sudo -iu podman
exit
cp ~/.bash_history /etc/bash_history_2024-11-10.txt
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
sudo -iu podman
sudo -iu podman
sudo -iu podman
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost
ls -la /home/podman/.local/share/containers/storage/volumes
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs
@ -44,8 +101,23 @@ chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/syst
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
@ -54,36 +126,123 @@ chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/syst
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/_data/
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
sudo -iu podman
sudo -iu podman
chown -R podman:podman /home/podman/.config/containers/systemd
sudo -iu podman
sudo -iu podman
systemctl --user start mattermost-db
systemctl --user start mattermost-db
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
sudo -iu podman
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
sudo -iu podman
sudo -iu podman
exit
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
links https://pgadmin.phares.duckdns.org/
links https://pgadmin.phares.duckdns.org/
sudo -iu podman
sudo -iu podman
lspci | grep -i nvme
lspci -vv -s 08:00.0 | grep -w LnkCap
lspci -vv -s 02:00.0 | grep -w LnkCap
sudo -iu podman
curl https://push-test.mattermost.com
sudo -iu podman
sudo -iu podman
sudo -iu podman
apt-file search setcap
setcap
sudo -iu podman
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
sudo -iu podman
nginx -s reload
nginx -s reload
sudo -iu podman
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
snap install vaultwarden
snap vaultwarden
snap vaultwarden help
lsof -i -P -n | grep LISTEN
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap stop vaultwarden
sudo -iu podman
snap stop vaultwarden
sudo -iu podman
nginx -t
nginx -s reload
sudo -iu podman
links https://192.168.11.2:5008
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
links https://192.168.11.2:5008
links http://192.168.11.2:5008
links https://192.168.11.2:5008
snap start vaultwarden
snap vaultwarden
snap vaultwarden hash
snap uninstall vaultwarden
snap remove vaultwarden
exot
exit
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
sudo -iu podman
links https://mattermost.phares.duckdns.org
snap install vaultwarden
snap stop vaultwarden
nano /var/snap/vaultwarden/current/vaultwarden.conf
rm /var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap remove vaultwarden
snap install vaultwarden
ls -la /var/snap/vaultwarden/current
ls -la /var/snap/vaultwarden/current
echo>/var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap start vaultwarden
snap info vaultwarden
snap status vaultwarden
lsof -i -P -n | grep LISTEN
snap start vaultwarden
lsof -i -P -n | grep LISTEN
links https://192.168.11.2:5009/
openssl s_client -showcerts -connect vaultwarden.phares.duckdns.org:443 -servername vaultwarden.phares.duckdns.org
exit
snap start vaultwarden
journalctl -u snapd
cat /var/snap/vaultwarden/current/
top
@ -97,52 +256,134 @@ snap watch id 37
snap watch 37
snap watch 34
snap logs vaultwardedn
snap logs vaultwarden
ls -la /home/podman/wild-phares/
nano /var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap start vaultwarden
snap logs vaultwarden
ls -la /var/snap/vaultwarden/current/
ls -la /var/snap/vaultwarden/current/ssl
cp -R /home/podman/wild-phares/* /var/snap/vaultwarden/current/ssl/
ls -la /var/snap/vaultwarden/current/ssl/
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap start vaultwarden
snap logs vaultwarden
snap logs vaultwarden
nginx -t
nginx -s reload
nano /var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap stop vaultwarden
snap start vaultwarden
sudo -iu podman
exit
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap stop vaultwarden
nano /var/snap/vaultwarden/current/vaultwarden.conf
snap start vaultwarden
nginx -t
nginx -s reload
sudo -iu podman
exit
sudo -iu podman
sudo -iu podman
exit
nano /etc/cockpit/cockpit.conf
apt-get install cockpit cockpit-podman cockpit-machines -y
apt-get install cockpit cockpit-podman cockpit-machines -y
apt-get remove cockpit-machines -y
apt-get install cockpit cockpit-podman cockpit-files -y
apt-get install cockpit cockpit-podman cockpit-file -y
apt-get search cockpit-file
apt-get search
apt-get --help
apt-get check
apt-get auto-purge
apt-get --help
apt-get purge
apt-get autoremove
apt-get autoremove
apt-get update
apt-get install cockpit cockpit-podman cockpit-files -y
apt-get upgrade
sudo -iu podman
sudo -iu podman
nginx -t
nginx -s reload
sudo -iu podman
nano /etc/docker/daemon.json
nano /etc/podman/daemon.json
sudo -iu podman
nginx -s reload
sudo -iu podman
nano /etc/resolv.conf
nano /etc/resolv.conf
nano /etc/hosts
cat /etc/hosts
sudo -iu podman
nano /etc/hosts
sudo -iu podman
sudo -iu podman
nginx -s reload
nginx -s reload
nano /etc/hosts
sudo -iu podman
sudo -iu podman
sudo -iu podman
apt install podman
sudo -iu podman
sudo -iu podman
exit
sudo -iu podman
exit
sudo -iu podman
nginx -s reload
exit
nginx -t
nginx -s reload
exit
nginx -t
nginx -s reload
sudo -iu podman
sudo -iu podman
exit
nginx -s reload
exit
nano /etc/cockpit/cockpit.conf
exit
ls -la /etc/cockpit/ws-certs.d/
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
mv /etc/cockpit/ws-certs.d/0-self-signed.cert /etc/cockpit/ws-certs.d/0-self-signed.cert.part
cp /root/.acme.sh/wild-phares/fullchain.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
exit
ls -la /etc/cockpit/ws-certs.d
chomod 774 -r /etc/cockpit/ws-certs.d
chmod 774 -R /etc/cockpit/ws-certs.d
ls -la /etc/cockpit/ws-certs.d
exit
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
ls -la /etc/cockpit/ws-certs.d
rm /etc/cockpit/ws-certs.d/0-self-signed.cert.old
chmod 774 -R /etc/cockpit/ws-certs.d
exit
ls -la /usr/libexec/podman/quadlet
ls -la /usr/libexec/podman
exit
find / -name "neko-server.service" 2>/dev/null
exit
cp /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
cp /run/user/1000/systemd/generator/default.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
cp /run/user/1000/systemd/generator/neko-server.service /mnt/free-file-sync/proxmox/
nano /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
dif /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
sudo -iu podman
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
diff
diff --help
@ -153,26 +394,63 @@ diff -y /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-
diff -r /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
diff -y -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
sudo -iu podman
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
/usr/lib/systemd/user-generators/podman-user-generator
ls /usr/lib/systemd/user-generators/podman-user-generator
exit
nginx -s reload
exit
rm -R /var/www/html-infineon/
nginx -t
nginx -s reload
nginx -t
nginx -s reload
nginx -t
nginx -s reload
exit
exit
nginx -t
nginx -s reload
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
exit
docker
exit
snap list
exit
nano /var/www/html-slideshow/slideshow/scripts/index.js
nano /var/www/html-slideshow/slideshow/index.json
snap install dotnet-sdk --classic 9.0/stable
dotnet --info
snap install dotnet-sdk --classic --channel 9.0/stable
snap install dotnet-sdk --stable 9.0/stable
snap install dotnet-sdk --stable dotnet-sdk
snap install --stable dotnet-sdk
snap install --classic --stable dotnet-sdk
exit
~/.bashrc
exit
~/.bashrc
nano /etc/hostname
nano /etc/hostname
/etc/hosts
nano /etc/hosts
/etc/hosts
nano /etc/hostname
nano /etc/hosts
~/.bashrc
sudo -i
exit
dotnet --info
snap remove --classic --stable dotnet-sdk
snap remove dotnet-sdk
dotnet --info
snap install dotnet-sdk --classic --9.0/stable
snap install dotnet-sdk --classic --channel 9.0/stable
apt-get update
snap install dotnet-sdk --classic --channel 9.0/stable
snap install dotnet-sdk --classic --latest/stable
@ -182,12 +460,26 @@ export DOTNET_ROOT=/snap/dotnet-sdk/current
~/.bash_profile
~/.bashrc
sudo -i
exit
dotnet --info
cd /tmp/
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
ls
cd one-review/
podman compose up --build
nano /etc/containers/registries.conf
ls
podman ps -a
sudo -iu podman
cd ..
rm -R one-review/
sudo -iu podman
sudo -iu podman
apt-get install podman-plugins
sudo -iu podman
sudo -iu podman
sudo -iu podman
sudo -iu podman
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
cd one-review/
git checkout origin 11-17
@ -200,7 +492,9 @@ snap install docker
snap remove docker
snap remove dotnet-sdk
cd ..
ls
rm -R one-review/
ls
exit
dotnet --info
exit
exit

View File

@ -1,212 +0,0 @@
mv /mnt/free-file-sync/iso/images-a/DisneyWorld\\\\ 2019/ /mnt/free-file-sync/iso/images-a/DisneyWorld\\ 2019/
mv /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019 /mnt/free-file-sync/iso/images-a/DisneyWorld\\ 2019/
rm -R /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019/
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006\ \\\!9
rm -R /mnt/free-file-sync/iso/images-a/Phares\\\ Slides\\\ ####
mount /mnt/free-file-sync/iso/Edited.iso /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/2024-12-18-18-13-54-579.iso /mnt/iso-compare
rm -R /mnt/free-file-sync/iso/images-a/Scanned\ Grandma\\\'s\ Quilt\ ####/
rm -R /mnt/free-file-sync/iso/images-a/Event
rm -R /mnt/free-file-sync/iso/images-a/Question/
mount /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/2024-12-18-18-10-19-693.iso /mnt/iso-compare
rm -R /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
rm -R /mnt/free-file-sync/iso/images-a/Facebook
mount /mnt/free-file-sync/iso/images-a/Rex\ Memorial\ ####/2024-12-18-18-15-40-537.iso /mnt/iso-compare
mount /mnt/free-file-sync/iso/images-a/Scanned\ Norman\ Herman/2024-12-18-18-15-43-097.iso /mnt/iso-compare
rm -R /mnt/free-file-sync/iso/images-a/Scanned*
rm -R /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/
mount /mnt/free-file-sync/iso/images-a/DisneyWorld\ 2019/2024-12-18-18-42-26-222.iso /mnt/iso-compare
umount /mnt/iso-compare
rm -R /mnt/free-file-sync/iso/images-a/Slide in N*
rm -R /mnt/free-file-sync/iso/images-a/Slide\\ in\\ N*
ls -al /mnt/free-file-sync/iso/images-a/Sli*
ls -al /mnt/free-file-sync/iso/images-a/Slide *
ls -al /mnt/free-file-sync/iso/images-a/Slide\\ *
ls -al /mnt/free-file-sync/iso/images-a
rm -R /mnt/free-file-sync/iso/images-a/'Slide in Name Order Originals \(622\) ####'
mkdir /mnt/free-file-sync/iso/videos-b
rm /mnt/free-file-sync/iso/videos-b/Home\ Videos\ 1998\ -\ 2002/2024-12-18-19-49-52-202.iso
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
lsblk
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
aptget update
apt-get upgrade
nano t
mv -R /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
mv /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
mv /mnt/free-file-sync/logan-google-drive /mnt/free-file-sync/google-drive-logan
/etc/duckdns/duck.sh >/dev/null 2>&1
"/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build
cd /
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"\%Y\%m\%d-\%H\%M\%S")'.tar'
rm /home/podman/backup-blinko/*
nano /run/podman/podman.sock
ls /run/podman/podman.sock
cat /var/log/syslog
grep "ERROR" /var/log/cron
crontab -l
systemctl log cron
ls /home/podman/backup-blinko/
systemctl status cron
snap list vaultwarden
ls -la /home/lphares/dorico
ls -la /home/lphares
ls -la /home/lphares/dorico/
ls /var/www/html-
ls /etc/netplan/
ls /etc/ModemManager/ -la
ls /etc/ModemManager -la
ls /etc/ModemManager
ls /etc/ModemManager -
ls /etc/ModemManager -l
ls /etc/ModemManager --time-style
ls /etc/ModemManager -lT
ls /etc/ModemManager --time-style=full
ls /etc/ModemManager/ --time-style=full
ls /etc/ModemManager/
ls /etc/ModemManager -l -T
ls /etc/ModemManager -l --time-style=+"%b %d %Y %H:%M:%S"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S%zz"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %HH:%M:%S %z"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %h:%M:%S %z"
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S %z"
ls /etc/ModemManager/ -la -D '%Y-%m-%dT%H:%M:%S'
ls /etc/ModemManager/ -la -D '%Y-%m-%dT %H:%M:%S'
ufw status
ufw number status
ufw numbered status
ufw active
ufw allow 53/tcp comment "01) DNS TCP"
ufw allow 53/udp comment "02) DNS UDP"
ufw allow 67/tcp comment "03) DHCP TCP"
ufw allow 67/udp comment "04) DHCP UDP"
ufw allow from 0.0.0.0/0 to any port 443/tcp comment "05) HTTPS"
ufw allow from 192.168.11.0/25 to any port 22/tcp comment "06) SSH"
ufw allow from 192.168.21.0/25 to any port 22/tcp comment "07) SSH"
ufw allow from 192.168.31.0/25 to any port 22/tcp comment "08) SSH"
ufw allow from 192.168.41.0/25 to any port 22/tcp comment "09) SSH"
ufw allow from 192.168.42.0/25 to any port 22/tcp comment "10) SSH"
ufw allow from 192.168.43.0/25 to any port 22/tcp comment "11) SSH"
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
ufw allow port 53/tcp comment "01) DNS TCP"
ufw allow from 192.168.11.0/25 port 22/tcp comment "06) SSH"
ufw allow from 192.168.21.0/25 port 22/tcp comment "07) SSH"
ufw allow from 192.168.31.0/25 port 22/tcp comment "08) SSH"
ufw allow from 192.168.41.0/25 port 22/tcp comment "09) SSH"
ufw allow from 192.168.42.0/25 port 22/tcp comment "10) SSH"
ufw allow from 192.168.43.0/25 port 22/tcp comment "11) SSH"
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
ufw allow from 192.168.11.0/25 port 22 comment "06) SSH"
ufw allow from 192.168.21.0/25 port 22 comment "07) SSH"
ufw allow from 192.168.31.0/25 port 22 comment "08) SSH"
ufw allow from 192.168.41.0/25 port 22 comment "09) SSH"
ufw allow from 192.168.42.0/25 port 22 comment "10) SSH"
ufw allow from 192.168.43.0/25 port 22 comment "11) SSH"
ufw allow to 0.0.0.0/0 port 22 comment "12) SSH"
ufw delete 12
ufw allow to 192.168.11.0/25 port 22 comment "12) SSH"
ufw allow to 192.168.21.0/25 port 22 comment "13) SSH"
ufw allow to 192.168.31.0/25 port 22 comment "14) SSH"
ufw allow to 192.168.41.0/25 port 22 comment "15) SSH"
ufw allow to 192.168.42.0/25 port 22 comment "16) SSH"
ufw allow to 192.168.43.0/25 port 22 comment "17) SSH"
cat /etc/passwd
pcap
ps -ef | grep nginx
usermod -a -G lphares www-data
chmod -R 774 /home/lphares/dorico
rm -r /home/lphares/dorico
su lphares
ufw enabled
ufw allow from 0.0.0.0/0 port 443 comment "18) HTTPS"
ufw reset
ufw allow 53/tcp comment "01) DNS TCP"
ufw allow 53/udp comment "02) DNS UDP"
ufw allow 67/tcp comment "03) DHCP TCP"
ufw allow 67/udp comment "04) DHCP UDP"
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
ufw allow to 0.0.0.0/0 port 443 comment "06) HTTPS"
ufw allow from 192.168.11.0/25 port 22 comment "07) SSH"
ufw allow from 192.168.21.0/25 port 22 comment "08) SSH"
ufw allow from 192.168.31.0/25 port 22 comment "09) SSH"
ufw allow from 192.168.41.0/25 port 22 comment "10) SSH"
ufw allow from 192.168.42.0/25 port 22 comment "11) SSH"
ufw allow from 192.168.43.0/25 port 22 comment "12) SSH"
ufw allow to 192.168.11.0/25 port 22 comment "13) SSH"
ufw allow to 192.168.21.0/25 port 22 comment "14) SSH"
ufw allow to 192.168.31.0/25 port 22 comment "15) SSH"
ufw allow to 192.168.41.0/25 port 22 comment "16) SSH"
ufw allow to 192.168.42.0/25 port 22 comment "17) SSH"
ufw allow to 192.168.43.0/25 port 22 comment "18) SSH"
ufw enable
ufw disable
top[
top
apt-get remove certbot
snap remove certbot
systemctl list-timers
grep sshd.\*Failed /var/log/auth.log | less
grep sshd.\* /var/log/auth.log
grep sshd.\*publickey /var/log/auth.log
grep sshd.\*publickey /var/log/auth.log | less
apt update
apt install fail2ban -y
systemctl status fail2ban.service
cd /etc/fail2ban
ls
head -20 jail.conf
cp jail.conf jail.local
nano jail.local
systemctl enable fail2ban
systemctl start fail2ban
systemctl status fail2ban
apt-get update
apt upgrade
snap info adguard-home
tail /var/log/auth.log -f
ufw status numbered
id
su phares
su podman
ip a
ip a l | grep inet6
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
cat /boot/firmware/cmdline.txt
nano /boot/firmware/cmdline.txt
snap restart adguard-home
nano /etc/duckdns/duck.sh
chmod 700 /etc/duckdns/duck.sh
cd /etc/duckdns
./duck.sh
ps -ef | grep cr[o]n
crontab -e
cat duck.log
xit
links http://192.168.11.2:5015/
chown podman:podman /home/podman/2fauth -R
nc -zv localhost 5015
nano /home/podman/.ssh/authorized_keys
nano /home/bmiller/.ssh/authorized_keys
nano /home/lphares/.ssh/authorized_keys
nano /root/.ssh/authorized_keys
nano /home/persa/.ssh/authorized_keys
nano /home/phares/.ssh/authorized_keys
exit\
nano /etc/hostname
nano /etc/hosts
sudo -iu podman
nginx -s reload
nginx -t
reboot
exit

View File

@ -1,189 +0,0 @@
rm -R /home/www-data/jackyzha0-quartz-phares/content/year-season
cp -R /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
cp -Rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
yes | cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
\cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
ls /var/lib/containers/storage/overlay-layers/
cat /var/lib/containers/storage/overlay-layers/layers.json
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json.json
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json
cat /var/lib/containers/storage/overlay-layers/layers.lock
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
podman reset syste
podman reset system
podman system reset
podman system prune
rm -Rf /home/podman/.local/share/containers/storage/overlay/9234e0dfb7414fea7d4610bea727177a951b39a5df9f0573882cbf9e5bc16417/
ls -la /home/podman/cron-backup/
ls -la /home/podman/cron-backup
ls -la /home/podman/cron-backup-delete/
ls -la /home/podman/cron-backup-2025-01-31/
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rmit --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
podman ls
podman ps a
podman ps -a
podman image prune
podman volume list
podman ps
podman image rm 9
podman image list
rsync -a /home/podman/jackyzha0-quartz-phares/content/year-season/ /home/www-data/jackyzha0-quartz-phares/content/year-season
cd /home/www-data/jackyzha0-quartz-phares && /snap/bin/npx quartz build
cat /var/snap/vaultwarden/current/ssl/fullchain.cer
snap info vaultwarden
snap status vaultwarden
snap help
ls /root/.acme.sh/
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/fullchain.cer
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/\*.phares.duckdns.org.key
cp /home/podman/wild-phares/fullchain.cer /var/snap/vaultwarden/current/ssl/fullchain.cer
cp /home/podman/wild-phares/phares.duckdns.org.key /var/snap/vaultwarden/current/ssl/phares.duckdns.org.key
snap start vaultwarden
snap logs vaultwarden
nano /run/resolvconf/resolv.conf
cat /etc/resolv.conf
ls -la /var/snap/vaultwarden/current/data/icon_cache/
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss/
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss
nignx -t
ls /var/snap/vaultwarden/current/data/tmp/
ls /var/snap/vaultwarden/current/data/icon_cache/
ls /var/snap/vaultwarden/current/data/icon_cache/ -ls
nano /var/snap/vaultwarden/current/vaultwarden.conf
systemctl disable systemd-resolved.service
snap start adguard-home
snap logs adguard-home
systemctl enable systemd-resolved.service
snap restart vaultwarden
ls /etc/resolv.conf
ping
ping duckdns.org
nano /etc/resolv.conf
snap info adguard-home
snap stop adguard-home
systemctl start systemd-resolved
ping www.google.com
systemctl disable systemd-resolved
systemctl stop systemd-resolved
reboot
lsof -i -P -n | grep LISTEN
nano /etc/ssh/sshd_config
cp -R /etc/ssh/sshd_config /home/podman/etc-ssh-sshd_config
cp -R /etc/ssh/sshd_config.d /home/podman/etc-ssh-sshd_config.d
chown -R podman:podman /home/podman/etc-ssh-sshd_config.d
chown -R podman:podman /home/podman/etc-ssh-sshd_config
ls -la podman:podman /home/podman/etc-ssh-sshd_config
mv /home/podman/etc-ssh-sshd_config.d /home/podman/etc-ssh-sshd_config-r
mv /home/podman/etc-ssh-sshd_config-r/sshd_config.d/ /home/podman/etc-ssh-sshd_config.d
ls /home/podman/etc-ssh-sshd_config.d
ls /home/podman/etc-ssh-sshd_config-r
rm -R /home/podman/etc-ssh-sshd_config-r
apt-install yazi -y
apt-get install yazi -y
apt install -y ffmpeg 7zip jq poppler-utils fd-find ripgrep fzf zoxide imagemagick
git clone https://github.com/sxyazi/yazi.git
apt install cargo
apt install make -y
make
gcc
apt install gcc -y
cat /tmp/yazi/Cargo.lock
cls
clear
cd yazi/
cargo build --release --locked
ls /home/podman/etc-ssh-sshd_config -ls
cp /etc/ssh/ssh_config /home/podman/etc-ssh-ssh_config
naon /home/podman/etc-ssh-ssh_config
nano /home/podman/etc-ssh-ssh_config
chown podman:podman /home/podman/etc-ssh-ssh_config
cd /tmp/
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/5608b233-a2f4-4018-aa70-570b0689b266/
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024
git fetch
rm -R original-to-deterministic-hash-code/
git clone https://51f44975c8734522b2dec36c6d9a116276c6bded@gitea.phares.duckdns.org/phares3757/original-to-deterministic-hash-code.git
cd original-to-deterministic-hash-code/
chown -R podman:podman original-to-deterministic-hash-code/
chown -R podman:podman /tmp/original-to-deterministic-hash-code/
chown -R podman:podman /tmp/original-to-deterministic-hash-code
chown -R podman:podman /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/
cat /root/.ssh/id_ed25519
cat /root/.ssh/id_ed25519.pub
cat /root/.ssh
ssh-copy-id
ssh-copy-id root
ls -la /root/.ssh
nano /var/snap/adguard-home/current/AdGuardHome.yaml
nano /etc/hostname
nano /etc/hosts
crontab -e
nano /root/.ssh/authorized_keys
cd /tmp
git clone https://github.com/acmesh-official/acme.sh.git
cd /tmp/acme.sh
./acme.sh --install -m mikepharesjr@msn.com
export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9
echo $DuckDNS_Token
./acme.sh --register-account -m mikepharesjr@msn.com
./acme.sh --set-default-ca --server letsencrypt
./acme.sh --issue --dns dns_duckdns -d '*.sumco.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
ls -la /ssl
ls -la /root/.acme.sh/\*.sumco.duckdns.org_ecc/
cp -R /root/.acme.sh/\*.sumco.duckdns.org_ecc/ /home/podman/wild-sumco
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.cer /home/podman/wild-sumco/sumco.duckdns.org.cer
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.conf /home/podman/wild-sumco/sumco.duckdns.org.conf
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr /home/podman/wild-sumco/sumco.duckdns.org.csr
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr.conf /home/podman/wild-sumco/sumco.duckdns.org.csr.conf
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.key /home/podman/wild-sumco/sumco.duckdns.org.key
chown -R podman:podman /home/podman/wild-sumco/
ls -la /home/podman/wild-sumco/
tail -f /var/log/nginx/access.log
nano /pod
cp /etc/nginx/include/actual.conf /etc/nginx/include/ha.conf
cp /etc/nginx/include/actual.conf /etc/nginx/include/nginx.conf
nano /etc/nginx/include/ha.conf
nginx
nano /etc/nginx/include/ha.conf
nano /etc/nginx/sites-available/default
nano /etc/nginx/include/nginx.conf
nano /root/.ssh/id_ed25519.pub
apt install apache2-utils
htpasswd -c /etc/nginx/.htpasswd phares
ls \var\snap\vaultwarden
ls /var/snap/vaultwarden/
ls /var/snap/vaultwarden -la
journalctl --rotate
journalctl --vacuum-time=1s
journalctl -u cockpit
nginx -t
nginx -s reload
sudo -iu podman
apt-get update
apt-get upgrade
ip -a
ip a
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
ncdu -o iso.json
exit
cd /mnt/
ncdu -f file.json
ncdu -o file.json
ls -la
mv file.json free-file-sync/proxmox/
cd /mnt/backup
cd .
cd /
cd /mnt/free-file-sync/iso/
ls
cd ..
rm -R iso/
ncdu
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
shutdown now

View File

@ -59,7 +59,7 @@ fwupd-refresh:x:989:
netdev:x:110:
phares:x:1001:
podman:x:1000:
lphares:x:1003:bmiller,persa,www-data
lphares:x:1003:bmiller,persa
bmiller:x:1004:
unbound:x:111:
cockpit-ws:x:112:

View File

@ -68,7 +68,7 @@ pcp:x:988:
persa:x:1002:
redis:x:114:
swtpm:x:115:
libvirt:x:116:phares,podman,libvirtdbus
libvirt:x:116:phares,podman
libvirt-qemu:x:64055:libvirt-qemu
libvirt-dnsmasq:x:117:
libvirtdbus:x:118:

View File

@ -59,7 +59,7 @@ fwupd-refresh:!*::
netdev:!::
phares:!::
podman:!::
lphares:!::bmiller,persa,www-data
lphares:!::bmiller,persa
bmiller:!::
unbound:!::
cockpit-ws:!::

View File

@ -68,7 +68,7 @@ pcp:!::
persa:!::
redis:!::
swtpm:!::
libvirt:!::phares,podman,libvirtdbus
libvirt:!::phares,podman
libvirt-qemu:!::libvirt-qemu
libvirt-dnsmasq:!::
libvirtdbus:!::

View File

@ -1,5 +1,5 @@
127.0.0.1 localhost
127.0.1.1 phares.duckdns.org
127.0.1.1 trigkey-green-g4
# The following lines are desirable for IPv6 capable hosts
::1 ip6-localhost ip6-loopback

View File

@ -1,21 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIDjDCCAxKgAwIBAgISBMFGragC9OgIAiG4P5naLK3mMAoGCCqGSM49BAMDMDIx
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
NjAeFw0yNTAxMTMyMDQxMTFaFw0yNTA0MTMyMDQxMTBaMCAxHjAcBgNVBAMTFWdp
dGVhLmp1bXBpbmdjcmFiLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMxa
tycX56D91JSQtdSYG/pPlyqrlka+qhfoYd4IzEjz23n3aqbdHWp4kzKgfdfo99vJ
16AAUgK4LV2eWk6ZddijggIYMIICFDAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYw
FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFN/q
GV5U2yPWTWBmlfvAp0crrMC0MB8GA1UdIwQYMBaAFJMnRpgDqVFojpjWxEJI2yO/
WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2Lm8ubGVu
Y3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcvMCAGA1Ud
EQQZMBeCFWdpdGVhLmp1bXBpbmdjcmFiLmNvbTATBgNVHSAEDDAKMAgGBmeBDAEC
ATCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB3AN6FgddQJHxrzcuvVjfF54HGTORu
1hdjn480pybJ4r03AAABlGGbth0AAAQDAEgwRgIhAKS2r6FtEv17AjuJYICWvsK7
R54pf8/pJL5UGIhy23UkAiEAn2DdIAEg5o1g8ULtoG2mUYt+YTbDBdH1coEoe/Cd
XRoAdgDPEVbu1S58r/OHW9lpLpvpGnFnSrAX7KwB0lt3zsw7CAAAAZRhm7ZHAAAE
AwBHMEUCIGuSi8pZgdi3bLYsYg+a44ZYSQM2YSDdhau+P+V2m8DaAiEA4fqy8KEg
S9vH8b9B+Gz+i5dRKchD1S4ydzOdhZTR1DMwCgYIKoZIzj0EAwMDaAAwZQIxANUl
PQW7UOTQOgd0KKqZeygvPCY7qvSr6V2ZR2Yx6e4wXt9i/bhXVjNvYMyffCjh1gIw
ETtUf366hIClR7HmTjEG3vdjinqgVKvkAZqufAPnijbKKtnsNXhACWl18UXngBG6
-----END CERTIFICATE-----

View File

@ -1,26 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,47 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,5 +0,0 @@
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIOJMe824fldC1I31j9QPXW2rqnkUK+EzwImja0V5U4dioAoGCCqGSM49
AwEHoUQDQgAEzFq3JxfnoP3UlJC11Jgb+k+XKquWRr6qF+hh3gjMSPPbefdqpt0d
aniTMqB91+j328nXoABSArgtXZ5aTpl12A==
-----END EC PRIVATE KEY-----

View File

@ -1,22 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,26 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,48 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,5 +0,0 @@
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEILSambH2O8RFkT6eZn+bwQQ2oB6AFtjkHKsC+t0eWflroAoGCCqGSM49
AwEHoUQDQgAE6qUGamhDtM8eehloxOvBzHneJqEsOnJvMBYJlkWvnRJ6ve1DDTrQ
S0L//uSkTUk3cA1V9nF8zUvcuFBb4TOlUg==
-----END EC PRIVATE KEY-----

View File

@ -1,22 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,26 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK
a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO
VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw
i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C
2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+
bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG
6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV
XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO
koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq
cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI
E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e
K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX
GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL
sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd
VQD9F6Na/+zmXCc=
-----END CERTIFICATE-----

View File

@ -1,48 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,5 +0,0 @@
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEICp+cx+weOdcPOsxTzhwkByo3hGKxTBrHBXiKjWAg6IqoAoGCCqGSM49
AwEHoUQDQgAE2TvQguQSq2Q+PP6AreBgcAeFVFAtmKkNXp/oABH+lUJhpXt3dCyA
89h7Y+2A3DIvi3x6E3rTHQWdwJB3T34kpA==
-----END EC PRIVATE KEY-----

View File

@ -1,22 +0,0 @@
-----BEGIN CERTIFICATE-----
MIIDlDCCAxqgAwIBAgISA3Ok6Ntju67loYMAKR/g+jLeMAoGCCqGSM49BAMDMDIx
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
NjAeFw0yNTAxMTMyMDQwMzFaFw0yNTA0MTMyMDQwMzBaMCQxIjAgBgNVBAMTGWdp
dGVhLnR3aWxpZ2h0cGFyYWRveC5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
AAQVdWh6MowWiRToNvHG28xfT+1oTn2xrA0FISfw24MLIaKPRIQK46EwNhZ0qoja
mMWWlT7e3ehDGyzVxToczVxno4ICHDCCAhgwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
BBTJ3cuhp8zFW76E3iky8x9/qEZVmzAfBgNVHSMEGDAWgBSTJ0aYA6lRaI6Y1sRC
SNsjv1iU0jBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNi5v
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U2LmkubGVuY3Iub3JnLzAk
BgNVHREEHTAbghlnaXRlYS50d2lsaWdodHBhcmFkb3guY29tMBMGA1UdIAQMMAow
CAYGZ4EMAQIBMIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHcA3oWB11AkfGvNy69W
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYZsYPgAABAMASDBGAiEAhkETK0ZiN8tB
3hjE6rySGk3wp4X8SqXepvnXMyY9j80CIQC65yd+ajVHVPytJW1ved+27893Vi0r
pwLYDkstSWym+wB2AMz7D2qFcQll/pWbU87psnwi6YVcDZeNtql+VMD+TA2wAAAB
lGGbGEwAAAQDAEcwRQIgHA5eiA3Sw93hrOX2I/3CPsLGGTd+Dp8JC9xooozQi+kC
IQCwwikwSLbNPHHf6A9MUiQZWcTbY1l6fGsY8z/PdYVw/TAKBggqhkjOPQQDAwNo
ADBlAjAybTS423x/olK67bsVMuv2g5moz/g2o3Ty3brMkOZZXGqeqZ1f2KoGfWuo
k+uF5wMCMQCGu8qFcofoKl+IUtyLfn9vyq/lOHA7vorqZx4he+eY/aY8VuCdDUCU
a70klI5vl7U=
-----END CERTIFICATE-----

View File

@ -1,26 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,48 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,5 +0,0 @@
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIKZQjFNsE08Z94g8u3DeGSogHW7nidfFzJY4MjF3s1UfoAoGCCqGSM49
AwEHoUQDQgAEFXVoejKMFokU6DbxxtvMX0/taE59sawNBSEn8NuDCyGij0SECuOh
MDYWdKqI2pjFlpU+3t3oQxss1cU6HM1cZw==
-----END EC PRIVATE KEY-----

View File

@ -1,14 +0,0 @@
This directory contains your keys and certificates.
`privkey.pem` : the private key for your certificate.
`fullchain.pem`: the certificate file used in most server software.
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
`cert.pem` : will break many server configurations, and should not be used
without reading further documentation (see link below).
WARNING: DO NOT MOVE OR RENAME THESE FILES!
Certbot expects these files to remain in this location in order
to function properly!
We recommend not moving these files. For more information, see the Certbot
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.

View File

@ -1,14 +0,0 @@
This directory contains your keys and certificates.
`privkey.pem` : the private key for your certificate.
`fullchain.pem`: the certificate file used in most server software.
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
`cert.pem` : will break many server configurations, and should not be used
without reading further documentation (see link below).
WARNING: DO NOT MOVE OR RENAME THESE FILES!
Certbot expects these files to remain in this location in order
to function properly!
We recommend not moving these files. For more information, see the Certbot
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.

View File

@ -1,14 +0,0 @@
This directory contains your keys and certificates.
`privkey.pem` : the private key for your certificate.
`fullchain.pem`: the certificate file used in most server software.
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
`cert.pem` : will break many server configurations, and should not be used
without reading further documentation (see link below).
WARNING: DO NOT MOVE OR RENAME THESE FILES!
Certbot expects these files to remain in this location in order
to function properly!
We recommend not moving these files. For more information, see the Certbot
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.

View File

@ -1,14 +0,0 @@
This directory contains your keys and certificates.
`privkey.pem` : the private key for your certificate.
`fullchain.pem`: the certificate file used in most server software.
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
`cert.pem` : will break many server configurations, and should not be used
without reading further documentation (see link below).
WARNING: DO NOT MOVE OR RENAME THESE FILES!
Certbot expects these files to remain in this location in order
to function properly!
We recommend not moving these files. For more information, see the Certbot
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.

View File

@ -1,15 +0,0 @@
# renew_before_expiry = 30 days
version = 3.1.0
archive_dir = /etc/letsencrypt/archive/gitea.jumpingcrab.com
cert = /etc/letsencrypt/live/gitea.jumpingcrab.com/cert.pem
privkey = /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem
chain = /etc/letsencrypt/live/gitea.jumpingcrab.com/chain.pem
fullchain = /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem
# Options used in the renewal process
[renewalparams]
account = 0dc29e2da338706a1a356c4f2ef0c15b
authenticator = nginx
installer = nginx
server = https://acme-v02.api.letsencrypt.org/directory
key_type = ecdsa

View File

@ -1,15 +0,0 @@
# renew_before_expiry = 30 days
version = 3.1.0
archive_dir = /etc/letsencrypt/archive/gitea.phares.redirectme.net
cert = /etc/letsencrypt/live/gitea.phares.redirectme.net/cert.pem
privkey = /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem
chain = /etc/letsencrypt/live/gitea.phares.redirectme.net/chain.pem
fullchain = /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem
# Options used in the renewal process
[renewalparams]
account = 0dc29e2da338706a1a356c4f2ef0c15b
authenticator = nginx
installer = nginx
server = https://acme-v02.api.letsencrypt.org/directory
key_type = ecdsa

View File

@ -1,15 +0,0 @@
# renew_before_expiry = 30 days
version = 3.1.0
archive_dir = /etc/letsencrypt/archive/gitea.phares3757.ddns.net
cert = /etc/letsencrypt/live/gitea.phares3757.ddns.net/cert.pem
privkey = /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem
chain = /etc/letsencrypt/live/gitea.phares3757.ddns.net/chain.pem
fullchain = /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem
# Options used in the renewal process
[renewalparams]
account = 0dc29e2da338706a1a356c4f2ef0c15b
authenticator = nginx
installer = nginx
server = https://acme-v02.api.letsencrypt.org/directory
key_type = ecdsa

View File

@ -1,15 +0,0 @@
# renew_before_expiry = 30 days
version = 3.1.0
archive_dir = /etc/letsencrypt/archive/gitea.twilightparadox.com
cert = /etc/letsencrypt/live/gitea.twilightparadox.com/cert.pem
privkey = /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem
chain = /etc/letsencrypt/live/gitea.twilightparadox.com/chain.pem
fullchain = /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem
# Options used in the renewal process
[renewalparams]
account = 0dc29e2da338706a1a356c4f2ef0c15b
authenticator = nginx
installer = nginx
server = https://acme-v02.api.letsencrypt.org/directory
key_type = ecdsa

View File

@ -1,12 +0,0 @@
network:
version: 2
ethernets:
enp1s0:
addresses:
- 192.168.11.2/25
routes:
- to: default
via: 192.168.11.1
wlp3s0:
addresses:
- 192.168.11.119/25

View File

@ -0,0 +1,11 @@
# This file is generated from information provided by the datasource. Changes
# to it will not persist across an instance reboot. To disable cloud-init's
# network configuration capabilities, write a file
# /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg with the following:
# network: {config: disabled}
network:
ethernets:
enp1s0:
dhcp4: true
version: 2
wifis: {}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/adguard.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/adguard.phares.duckdns.org.key -out /etc/nginx/include/adguard.phares.duckdns.org.crt -config /etc/nginx/include/adguard.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name adguard.phares.duckdns.org;
@ -10,7 +13,7 @@ server {
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass https://192.168.11.2:5014/;
proxy_pass http://192.168.11.2:3002/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}

View File

@ -1,17 +1,15 @@
server {
ssl_certificate /home/podman/wild-affirm/fullchain.cer;
ssl_certificate_key /home/podman/wild-affirm/affirm.duckdns.org.key;
# touch /etc/nginx/include/affirm.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/affirm.duckdns.org.key -out /etc/nginx/include/affirm.phares.duckdns.org.crt -config /etc/nginx/include/affirm.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-affirm/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-affirm/affirm.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-affirm/affirm.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.affirm.duckdns.org;
client_max_body_size 5000m;
root /var/www/html-affirm;
index index.html index.htm;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass https://192.168.0.31/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
try_files $uri $uri.html $uri/ =404;
}
}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/baikal.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/baikal.phares.duckdns.org.key -out /etc/nginx/include/baikal.phares.duckdns.org.crt -config /etc/nginx/include/baikal.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name baikal.phares.duckdns.org;

View File

@ -1,17 +1,15 @@
server {
ssl_certificate /home/podman/wild-bchs/fullchain.cer;
ssl_certificate_key /home/podman/wild-bchs/bchs.duckdns.org.key;
# touch /etc/nginx/include/bchs.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/bchs.duckdns.org.key -out /etc/nginx/include/bchs.phares.duckdns.org.crt -config /etc/nginx/include/bchs.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-bchs/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-bchs/bchs.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-bchs/bchs.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.bchs.duckdns.org;
client_max_body_size 5000m;
root /var/www/html-bchs;
index index.html index.htm;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass https://192.168.0.43/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
try_files $uri $uri.html $uri/ =404;
}
}

View File

@ -1,20 +0,0 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name beszel.phares.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5023/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
proxy_connect_timeout 600s;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/blinko.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/blinko.phares.duckdns.org.key -out /etc/nginx/include/blinko.phares.duckdns.org.crt -config /etc/nginx/include/blinko.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name blinko.phares.duckdns.org;

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/cockpit.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/cockpit.phares.duckdns.org.key -out /etc/nginx/include/cockpit.phares.duckdns.org.crt -config /etc/nginx/include/cockpit.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name cockpit.phares.duckdns.org;

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/dashkiosk.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/dashkiosk.phares.duckdns.org.key -out /etc/nginx/include/dashkiosk.phares.duckdns.org.crt -config /etc/nginx/include/dashkiosk.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name dashkiosk.phares.duckdns.org;

View File

@ -1,14 +0,0 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name dorico.phares.duckdns.org;
root /home/lphares/dorico;
# usermod -a -G lphares www-data
location / {
autoindex on;
disable_symlinks on;
autoindex_format json;
}
}

View File

@ -1,17 +0,0 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name dotnet-sdk-8.phares.duckdns.org;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5027/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
add_header Access-Control-Allow-Origin *;
}
}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/firefox.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/firefox.phares.duckdns.org.key -out /etc/nginx/include/firefox.phares.duckdns.org.crt -config /etc/nginx/include/firefox.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name firefox.phares.duckdns.org;
@ -9,7 +12,7 @@ server {
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass https://192.168.11.2:5800/;
proxy_pass http://192.168.11.2:5800/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}

View File

@ -1,39 +0,0 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name free-file-sync-still.phares.duckdns.org;
root /mnt/free-file-sync/still;
location / {
autoindex on;
disable_symlinks on;
autoindex_format json;
}
}
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name free-file-sync-moving.phares.duckdns.org;
root /mnt/free-file-sync/moving;
location / {
autoindex on;
disable_symlinks on;
autoindex_format json;
}
}
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name free-file-sync-a.phares.duckdns.org;
root /mnt/free-file-sync/1-Images-A;
location / {
autoindex on;
disable_symlinks on;
autoindex_format json;
}
}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/gitea.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/gitea.phares.duckdns.org.key -out /etc/nginx/include/gitea.phares.duckdns.org.crt -config /etc/nginx/include/gitea.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.phares.duckdns.org;
@ -14,89 +17,4 @@ server {
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.phares3757.ddns.net;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.phares.redirectme.net;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.chickenkiller.com;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.jumpingcrab.com;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.twilightparadox.com;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}

View File

@ -1,20 +0,0 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gotify.phares.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5016/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
proxy_connect_timeout 600s;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/immich-kiosk.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich-kiosk.phares.duckdns.org.key -out /etc/nginx/include/immich-kiosk.phares.duckdns.org.crt -config /etc/nginx/include/immich-kiosk.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name immich-kiosk.phares.duckdns.org;

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/immich-to-slideshow.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich-to-slideshow.phares.duckdns.org.key -out /etc/nginx/include/immich-to-slideshow.phares.duckdns.org.crt -config /etc/nginx/include/immich-to-slideshow.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name immich-to-slideshow.phares.duckdns.org;

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/immich.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich.phares.duckdns.org.key -out /etc/nginx/include/immich.phares.duckdns.org.crt -config /etc/nginx/include/immich.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name immich.phares.duckdns.org;

View File

@ -1,17 +0,0 @@
server {
ssl_certificate /home/podman/wild-jmlc/fullchain.cer;
ssl_certificate_key /home/podman/wild-jmlc/jmlc.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.jmlc.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass https://192.168.0.42/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}

View File

@ -1,17 +0,0 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name kanbn-to-quartz.phares.duckdns.org;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5024/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
add_header Access-Control-Allow-Origin *;
}
}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/kuma.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/kuma.phares.duckdns.org.key -out /etc/nginx/include/kuma.phares.duckdns.org.crt -config /etc/nginx/include/kuma.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name kuma.phares.duckdns.org;

View File

@ -0,0 +1,20 @@
server {
# touch /etc/nginx/include/linkwarden.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/linkwarden.phares.duckdns.org.key -out /etc/nginx/include/linkwarden.phares.duckdns.org.crt -config /etc/nginx/include/linkwarden.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name linkwarden.phares.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5011/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}

View File

@ -0,0 +1,46 @@
server {
# touch /etc/nginx/include/mattermost.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/mattermost.phares.duckdns.org.key -out /etc/nginx/include/mattermost.phares.duckdns.org.crt -config /etc/nginx/include/mattermost.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name mattermost.phares.duckdns.org;
# add_header X-Early-Data $tls1_3_early_data;
location / {
# https://mattermost.m1k1o.net/#/getting-started/reverse-proxy
client_max_body_size 100M;
proxy_set_header Connection "";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Frame-Options SAMEORIGIN;
proxy_buffers 256 16k;
proxy_buffer_size 16k;
proxy_read_timeout 600s;
proxy_http_version 1.1;
proxy_pass https://192.168.11.2:8443/;
}
location ~ /api/v[0-9]+/(users/)?websocket$ {
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
client_max_body_size 50M;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Frame-Options SAMEORIGIN;
proxy_buffers 256 16k;
proxy_buffer_size 16k;
client_body_timeout 60s;
send_timeout 300s;
lingering_timeout 5s;
proxy_connect_timeout 90s;
proxy_send_timeout 300s;
proxy_read_timeout 90s;
proxy_http_version 1.1;
proxy_pass https://192.168.11.2:8443;
}
}

View File

@ -1,19 +0,0 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name ncdu.phares.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass http://192.168.11.2:5033/;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header X-NginX-Proxy true;
proxy_http_version 1.1;
proxy_read_timeout 43200000;
}
}

View File

@ -0,0 +1,24 @@
server {
# touch /etc/nginx/include/neko.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/neko.phares.duckdns.org.key -out /etc/nginx/include/neko.phares.duckdns.org.crt -config /etc/nginx/include/neko.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name neko.phares.duckdns.org;
location / {
# https://neko.m1k1o.net/#/getting-started/reverse-proxy
proxy_pass http://192.168.11.2:8082/;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_read_timeout 86400;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $remote_addr;
proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Forwarded-Port $server_port;
proxy_set_header X-Forwarded-Protocol $scheme;
}
}

View File

@ -0,0 +1,19 @@
server {
# touch /etc/nginx/include/odoo.ddns.net
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/odoo.ddns.net.key -out /etc/nginx/include/odoo.ddns.net.crt -config /etc/nginx/include/odoo.ddns.net
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name odoo.phares.duckdns.org;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:8069/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}

View File

@ -1,17 +0,0 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name original-to-deterministic.phares.duckdns.org;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5025/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
add_header Access-Control-Allow-Origin *;
}
}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/pgadmin.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/pgadmin.phares.duckdns.org.key -out /etc/nginx/include/pgadmin.phares.duckdns.org.crt -config /etc/nginx/include/pgadmin.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name pgadmin.phares.duckdns.org;

View File

@ -1,12 +1,12 @@
server {
listen 80 default_server;
root /var/www/certbot;
index index.html index.htm index.nginx-debian.html;
server_name _;
location / {
try_files $uri $uri/ =404;
}
}
# server {
# listen 80 default_server;
# root /var/www/certbot;
# index index.html index.htm index.nginx-debian.html;
# server_name phares.duckdns.org;
# location / {
# try_files $uri $uri/ =404;
# }
# }
server {
listen 8083 default_server;
root /var/www/html-nginx;
@ -17,8 +17,11 @@ server {
}
}
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/phares.duckdns.org.key -out /etc/nginx/include/phares.duckdns.org.crt -config /etc/nginx/include/phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name phares.duckdns.org;

View File

@ -8,8 +8,11 @@ server {
}
}
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/quartz.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/quartz.phares.duckdns.org.key -out /etc/nginx/include/quartz.phares.duckdns.org.crt -config /etc/nginx/include/quartz.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name quartz.phares.duckdns.org;
@ -17,7 +20,5 @@ server {
index index.html index.htm;
location / {
try_files $uri $uri.html $uri/ =404;
auth_basic "auth_basic";
auth_basic_user_file /etc/nginx/.htpasswd;
}
}

View File

@ -9,8 +9,11 @@ server {
}
}
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/slideshow.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/slideshow.phares.duckdns.org.key -out /etc/nginx/include/slideshow.phares.duckdns.org.crt -config /etc/nginx/include/slideshow.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name slideshow.phares.duckdns.org;

View File

@ -1,17 +0,0 @@
server {
ssl_certificate /home/podman/wild-sumco/fullchain.cer;
ssl_certificate_key /home/podman/wild-sumco/sumco.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.sumco.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass https://192.168.0.41/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/vaultwarden.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/vaultwarden.phares.duckdns.org.key -out /etc/nginx/include/vaultwarden.phares.duckdns.org.crt -config /etc/nginx/include/vaultwarden.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
# server_tokens off;
@ -27,8 +30,5 @@ server {
proxy_pass https://192.168.11.2:5008/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $http_connection;
}
}

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/warden.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/warden.phares.duckdns.org.key -out /etc/nginx/include/warden.phares.duckdns.org.crt -config /etc/nginx/include/warden.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
# server_tokens off;

View File

@ -1,6 +1,9 @@
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/xandikos.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/xandikos.phares.duckdns.org.key -out /etc/nginx/include/xandikos.phares.duckdns.org.crt -config /etc/nginx/include/xandikos.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name xandikos.phares.duckdns.org;

View File

@ -1,6 +1,33 @@
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:3002/
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # /var/www/html-affirm
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # /var/www/html-bchs
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # http://192.168.11.2:5800/
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/
include /etc/nginx/include/linkwarden.conf; # https://linkwarden.phares.duckdns.org # http://192.168.11.2:5011/
include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/
include /etc/nginx/include/neko.conf; # https://neko.phares.duckdns.org # http://192.168.11.2:8082/
include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/
server {
ssl_certificate /home/podman/wild-phares/fullchain.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
# touch /etc/nginx/include/phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/phares.duckdns.org.key -out /etc/nginx/include/phares.duckdns.org.crt -config /etc/nginx/include/phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-phares/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.phares.duckdns.org;
@ -10,37 +37,4 @@ server {
try_files $uri $uri.html $uri/ =404;
}
}
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # https://192.168.0.31
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # https://192.168.0.43
include /etc/nginx/include/jmlc.conf; # https://*.jmlc.duckdns.org # https://192.168.0.42
include /etc/nginx/include/sumco.conf; # https://*.sumco.duckdns.org # https://192.168.0.41
#
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http:5014
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http:8001
include /etc/nginx/include/beszel.conf; # https://beszel.phares.duckdns.org # http:5023
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http:5012
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https:9090
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http:9400
include /etc/nginx/include/dorico.conf; # https://dorico.phares.duckdns.org # /home/lphares/dorico
include /etc/nginx/include/dotnet-sdk-8.conf; # https://dotnet-sdk-8.phares.duckdns.org # http:5027
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # https:5800
include /etc/nginx/include/free-file-sync.conf; # https://free-file-sync.phares.duckdns.org # /mnt/free-file-sync
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http:3000
include /etc/nginx/include/gotify.conf; # https://gotify.phares.duckdns.org # http:5016
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http:5010
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http:5009
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http:3001
include /etc/nginx/include/kanbn-to-quartz.conf; # https://kanbn-to-quartz.phares.duckdns.org # http:5024
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https:3004
include /etc/nginx/include/ncdu.conf; # https://ncdu.phares.duckdns.org # https:5033
include /etc/nginx/include/original-to-deterministic-hash-code.conf; # https://original-to-deterministic.phares.duckdns.org # http:5025
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https:5007
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https:5008
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https:5008
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http:8000
#
# ssh root@phares.duckdns.org -p 22 -i C:/Users/phares/.ssh/id_ed25519
# ssh root@phares.duckdns.org -p 5026 -i C:/Users/phares/.ssh/id_ed25519
# ssh root@free.file.sync.root -i C:/Users/phares/.ssh/id_ed25519

View File

@ -1,9 +1,9 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Service for snap application adguard-home.adguard-home
Requires=snap-adguard\x2dhome-7793.mount
Requires=snap-adguard\x2dhome-7577.mount
Wants=network.target
After=snap-adguard\x2dhome-7793.mount network.target snapd.apparmor.service
After=snap-adguard\x2dhome-7577.mount network.target snapd.apparmor.service
X-Snappy=yes
[Service]
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run adguard-home
SyslogIdentifier=adguard-home.adguard-home
Restart=always
WorkingDirectory=/var/snap/adguard-home/7793
WorkingDirectory=/var/snap/adguard-home/7577
TimeoutStopSec=30
Type=simple

View File

@ -0,0 +1,16 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Service for snap application certbot.renew
Requires=snap-certbot-4193.mount
Wants=network.target
After=snap-certbot-4193.mount network.target snapd.apparmor.service
X-Snappy=yes
[Service]
EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run --timer="00:00~24:00/2" certbot.renew
SyslogIdentifier=certbot.renew
Restart=no
WorkingDirectory=/var/snap/certbot/4193
TimeoutStopSec=30
Type=oneshot

View File

@ -0,0 +1,14 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Timer renew for snap application certbot.renew
Requires=snap-certbot-4193.mount
After=snap-certbot-4193.mount
X-Snappy=yes
[Timer]
Unit=snap.certbot.renew.service
OnCalendar=*-*-* 06:46
OnCalendar=*-*-* 14:10
[Install]
WantedBy=timers.target

View File

@ -1,9 +1,9 @@
[Unit]
# Auto-generated, DO NOT EDIT
Description=Service for snap application vaultwarden.vaultwarden
Requires=snap-vaultwarden-164.mount
Requires=snap-vaultwarden-155.mount
Wants=network.target
After=snap-vaultwarden-164.mount network.target snapd.apparmor.service
After=snap-vaultwarden-155.mount network.target snapd.apparmor.service
X-Snappy=yes
[Service]
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
ExecStart=/usr/bin/snap run vaultwarden
SyslogIdentifier=vaultwarden.vaultwarden
Restart=on-failure
WorkingDirectory=/var/snap/vaultwarden/164
WorkingDirectory=/var/snap/vaultwarden/155
TimeoutStopSec=30
Type=simple

View File

@ -2,102 +2,10 @@
:ufw-user-input - [0:0]
:ufw-user-output - [0:0]
:ufw-user-forward - [0:0]
:ufw-before-logging-input - [0:0]
:ufw-before-logging-output - [0:0]
:ufw-before-logging-forward - [0:0]
:ufw-user-logging-input - [0:0]
:ufw-user-logging-output - [0:0]
:ufw-user-logging-forward - [0:0]
:ufw-after-logging-input - [0:0]
:ufw-after-logging-output - [0:0]
:ufw-after-logging-forward - [0:0]
:ufw-logging-deny - [0:0]
:ufw-logging-allow - [0:0]
:ufw-user-limit - [0:0]
:ufw-user-limit-accept - [0:0]
### RULES ###
### tuple ### allow tcp 53 0.0.0.0/0 any 0.0.0.0/0 in comment=30312920444e5320544350
-A ufw-user-input -p tcp --dport 53 -j ACCEPT
### tuple ### allow udp 53 0.0.0.0/0 any 0.0.0.0/0 in comment=30322920444e5320554450
-A ufw-user-input -p udp --dport 53 -j ACCEPT
### tuple ### allow tcp 67 0.0.0.0/0 any 0.0.0.0/0 in comment=303329204448435020544350
-A ufw-user-input -p tcp --dport 67 -j ACCEPT
### tuple ### allow udp 67 0.0.0.0/0 any 0.0.0.0/0 in comment=303429204448435020554450
-A ufw-user-input -p udp --dport 67 -j ACCEPT
### tuple ### allow any any 0.0.0.0/0 443 0.0.0.0/0 in comment=303529204854545053
-A ufw-user-input -p tcp --sport 443 -j ACCEPT
-A ufw-user-input -p udp --sport 443 -j ACCEPT
### tuple ### allow any 443 0.0.0.0/0 any 0.0.0.0/0 in comment=303629204854545053
-A ufw-user-input -p tcp --dport 443 -j ACCEPT
-A ufw-user-input -p udp --dport 443 -j ACCEPT
### tuple ### allow any any 0.0.0.0/0 22 192.168.11.0/25 in comment=30372920535348
-A ufw-user-input -p tcp -s 192.168.11.0/25 --sport 22 -j ACCEPT
-A ufw-user-input -p udp -s 192.168.11.0/25 --sport 22 -j ACCEPT
### tuple ### allow any any 0.0.0.0/0 22 192.168.21.0/25 in comment=30382920535348
-A ufw-user-input -p tcp -s 192.168.21.0/25 --sport 22 -j ACCEPT
-A ufw-user-input -p udp -s 192.168.21.0/25 --sport 22 -j ACCEPT
### tuple ### allow any any 0.0.0.0/0 22 192.168.31.0/25 in comment=30392920535348
-A ufw-user-input -p tcp -s 192.168.31.0/25 --sport 22 -j ACCEPT
-A ufw-user-input -p udp -s 192.168.31.0/25 --sport 22 -j ACCEPT
### tuple ### allow any any 0.0.0.0/0 22 192.168.41.0/25 in comment=31302920535348
-A ufw-user-input -p tcp -s 192.168.41.0/25 --sport 22 -j ACCEPT
-A ufw-user-input -p udp -s 192.168.41.0/25 --sport 22 -j ACCEPT
### tuple ### allow any any 0.0.0.0/0 22 192.168.42.0/25 in comment=31312920535348
-A ufw-user-input -p tcp -s 192.168.42.0/25 --sport 22 -j ACCEPT
-A ufw-user-input -p udp -s 192.168.42.0/25 --sport 22 -j ACCEPT
### tuple ### allow any any 0.0.0.0/0 22 192.168.43.0/25 in comment=31322920535348
-A ufw-user-input -p tcp -s 192.168.43.0/25 --sport 22 -j ACCEPT
-A ufw-user-input -p udp -s 192.168.43.0/25 --sport 22 -j ACCEPT
### tuple ### allow any 22 192.168.11.0/25 any 0.0.0.0/0 in comment=31332920535348
-A ufw-user-input -p tcp -d 192.168.11.0/25 --dport 22 -j ACCEPT
-A ufw-user-input -p udp -d 192.168.11.0/25 --dport 22 -j ACCEPT
### tuple ### allow any 22 192.168.21.0/25 any 0.0.0.0/0 in comment=31342920535348
-A ufw-user-input -p tcp -d 192.168.21.0/25 --dport 22 -j ACCEPT
-A ufw-user-input -p udp -d 192.168.21.0/25 --dport 22 -j ACCEPT
### tuple ### allow any 22 192.168.31.0/25 any 0.0.0.0/0 in comment=31352920535348
-A ufw-user-input -p tcp -d 192.168.31.0/25 --dport 22 -j ACCEPT
-A ufw-user-input -p udp -d 192.168.31.0/25 --dport 22 -j ACCEPT
### tuple ### allow any 22 192.168.41.0/25 any 0.0.0.0/0 in comment=31362920535348
-A ufw-user-input -p tcp -d 192.168.41.0/25 --dport 22 -j ACCEPT
-A ufw-user-input -p udp -d 192.168.41.0/25 --dport 22 -j ACCEPT
### tuple ### allow any 22 192.168.42.0/25 any 0.0.0.0/0 in comment=31372920535348
-A ufw-user-input -p tcp -d 192.168.42.0/25 --dport 22 -j ACCEPT
-A ufw-user-input -p udp -d 192.168.42.0/25 --dport 22 -j ACCEPT
### tuple ### allow any 22 192.168.43.0/25 any 0.0.0.0/0 in comment=31382920535348
-A ufw-user-input -p tcp -d 192.168.43.0/25 --dport 22 -j ACCEPT
-A ufw-user-input -p udp -d 192.168.43.0/25 --dport 22 -j ACCEPT
### END RULES ###
### LOGGING ###
-A ufw-after-logging-input -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
-A ufw-after-logging-forward -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
-I ufw-logging-deny -m conntrack --ctstate INVALID -j RETURN -m limit --limit 3/min --limit-burst 10
-A ufw-logging-deny -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
-A ufw-logging-allow -j LOG --log-prefix "[UFW ALLOW] " -m limit --limit 3/min --limit-burst 10
### END LOGGING ###
### RATE LIMITING ###
-A ufw-user-limit -m limit --limit 3/minute -j LOG --log-prefix "[UFW LIMIT BLOCK] "
-A ufw-user-limit -j REJECT
-A ufw-user-limit-accept -j ACCEPT
### END RATE LIMITING ###
COMMIT

View File

@ -1,173 +0,0 @@
[Container]
# AutoUpdate=registry
ContainerName=2fauth-server
# You can change the name of the app
Environment="APP_NAME=2FAuth"
# You can leave this on "local". If you change it to production most console commands will ask for extra confirmation.
# Never set it to "testing".
Environment="APP_ENV=local"
# The timezone for your application, which is used to record dates and times to database. This global setting can be
# overridden by users via in-app settings for a personalised dates and times display.
# If this setting is changed while the application is already running, existing records in the database won't be updated
Environment="APP_TIMEZONE=UTC"
# Set to true if you want to see debug information in error screens.
Environment="APP_DEBUG=false"
# This should be your email address
Environment="SITE_OWNER=mikepharesjr@msn.com"
# The encryption key for our database and sessions. Keep this very secure.
# If you generate a new one all existing data must be considered LOST.
# Change it to a string of exactly 32 chars or use command `php artisan key:generate` to generate it
Environment="APP_KEY=uvL37oiI1By0J#5t5kZwYB~17CXI2J9A"
# This variable must match your installation's external address.
# Webauthn won't work otherwise.
# Environment="APP_URL=http://localhost"
# Environment="APP_URL=http://192.168.11.2"
# Environment="APP_URL=http://192.168.11.2:5015"
Environment="APP_URL=https://2fauth.phares.duckdns.org"
# If you want to serve js assets from a CDN (like https://cdn.example.com),
# uncomment the following line and set this var with the CDN url.
# Otherwise, let this line commented.
# - ASSET_URL=http://localhost
#
# Turn this to true if you want your app to react like a demo.
# The Demo mode reset the app content every hours and set a generic demo user.
Environment="IS_DEMO_APP=false"
# The log channel defines where your log entries go to.
# 'daily' is the default logging mode giving you 7 daily rotated log files in /storage/logs/.
# Also available are 'errorlog', 'syslog', 'stderr', 'papertrail', 'slack' and a 'stack' channel
# to combine multiple channels into a single one.
Environment="LOG_CHANNEL=daily"
# Log level. You can set this from least severe to most severe:
# debug, info, notice, warning, error, critical, alert, emergency
# If you set it to debug your logs will grow large, and fast. If you set it to emergency probably
# nothing will get logged, ever.
Environment="LOG_LEVEL=notice"
# Database config (can only be sqlite)
Environment="DB_DATABASE=/srv/database/database.sqlite"
# If you're looking for performance improvements, you could install memcached.
Environment="CACHE_DRIVER=file"
Environment="SESSION_DRIVER=file"
# Mail settings
# Refer your email provider documentation to configure your mail settings
# Set a value for every available setting to avoid issue
Environment="MAIL_MAILER=log"
Environment="MAIL_HOST=smtp.centurylink.net"
Environment="MAIL_PORT=587"
Environment="MAIL_USERNAME=phares@centurylink.net"
Environment="MAIL_PASSWORD=RN9iPi5Ej#gRgLgiBTkb"
Environment="MAIL_ENCRYPTION=null"
Environment="MAIL_FROM_NAME=Mik Phares"
Environment="MAIL_FROM_ADDRESS=noreply@phares.duckdns.org"
# SSL peer verification.
# Set this to false to disable the SSL certificate validation.
# WARNING
# Disabling peer verification can result in a major security flaw.
# Change it only if you know what you're doing.
Environment="MAIL_VERIFY_SSL_PEER=false"
# API settings
# The maximum number of API calls in a minute from the same IP.
# Once reached, all requests from this IP will be rejected until the minute has elapsed.
# Set to null to disable the API throttling.
Environment="THROTTLE_API=60"
# Authentication settings
# The number of times per minute a user can fail to log in before being locked out.
# Once reached, all login attempts will be rejected until the minute has elapsed.
# This setting applies to both email/password and webauthn login attempts.
Environment="LOGIN_THROTTLE=5"
# The default authentication guard
# Supported:
# 'web-guard' : The Laravel built-in auth system (default if nulled)
# 'reverse-proxy-guard' : When 2FAuth is deployed behind a reverse-proxy that handle authentication
# WARNING
# When using 'reverse-proxy-guard' 2FAuth only look for the dedicated headers and skip all other built-in
# authentication checks. That means your proxy is fully responsible of the authentication process, 2FAuth will
# trust him as long as headers are presents.
Environment="AUTHENTICATION_GUARD=web-guard"
# Authentication log retention time, in days.
# Log entries older than that are automatically deleted.
Environment="AUTHENTICATION_LOG_RETENTION=365"
# Name of the HTTP headers sent by the reverse proxy that identifies the authenticated user at proxy level.
# Check your proxy documentation to find out how these headers are named (i.e 'REMOTE_USER', 'REMOTE_EMAIL', etc...)
# (only relevant when AUTHENTICATION_GUARD is set to 'reverse-proxy-guard')
Environment="AUTH_PROXY_HEADER_FOR_USER=null"
Environment="AUTH_PROXY_HEADER_FOR_EMAIL=null"
# Custom logout URL to open when using an auth proxy.
Environment="PROXY_LOGOUT_URL=null"
# WebAuthn settings
# Relying Party name, aka the name of the application. If blank, defaults to APP_NAME. Do not set to null.
Environment="WEBAUTHN_NAME=2FAuth"
# Relying Party ID, should equal the site domain (i.e 2fauth.example.com).
# If null, the device will fill it internally (recommended)
# See https://webauthn-doc.spomky-labs.com/prerequisites/the-relying-party#how-to-determine-the-relying-party-id
Environment="WEBAUTHN_ID=null"
# Use this setting to control how user verification behave during the
# WebAuthn authentication flow.
#
# Most authenticators and smartphones will ask the user to actively verify
# themselves for log in. For example, through a touch plus pin code,
# password entry, or biometric recognition (e.g., presenting a fingerprint).
# The intent is to distinguish one user from any other.
#
# Supported:
# 'required': Will ALWAYS ask for user verification
# 'preferred' (default) : Will ask for user verification IF POSSIBLE
# 'discouraged' : Will NOT ask for user verification (for example, to minimize disruption to the user interaction flow)
Environment="WEBAUTHN_USER_VERIFICATION=preferred"
#### SSO settings (for Socialite) ####
# Uncomment and complete lines for the OAuth providers you want to enable.
# - OPENID_AUTHORIZE_URL=
# - OPENID_TOKEN_URL=
# - OPENID_USERINFO_URL=
# - OPENID_CLIENT_ID=
# - OPENID_CLIENT_SECRET=
# - GITHUB_CLIENT_ID=
# - GITHUB_CLIENT_SECRET=
# Use this setting to declare trusted proxied.
# Supported:
# '*': to trust any proxy
# A comma separated IP list: The list of proxies IP to trust
Environment="TRUSTED_PROXIES=null"
# Proxy for outgoing requests like new releases detection or logo fetching.
# You can provide a proxy URL that contains a scheme, username, and password.
# For example, "http://username:password@192.168.16.1:10".
Environment="PROXY_FOR_OUTGOING_REQUESTS=null"
# Leave the following configuration vars as is.
# Unless you like to tinker and know what you're doing.
Environment="BROADCAST_DRIVER=log"
Environment="QUEUE_DRIVER=sync"
Environment="SESSION_LIFETIME=120"
Environment="REDIS_HOST=127.0.0.1"
Environment="REDIS_PASSWORD=null"
Environment="REDIS_PORT=6379"
Environment="PUSHER_APP_ID="
Environment="PUSHER_APP_KEY="
Environment="PUSHER_APP_SECRET="
Environment="PUSHER_APP_CLUSTER=mt1"
Environment="VITE_PUSHER_APP_KEY="${PUSHER_APP_KEY}""
Environment="VITE_PUSHER_APP_CLUSTER="${PUSHER_APP_CLUSTER}""
Environment="MIX_ENV=local"
Image=docker.io/2fauth/2fauth
# Network=2fauth.network
# Pod=2fauth.pod
PublishPort=5015:44311
Volume=2fauth-server-data:/2fauth:Z
Volume=/home/podman/2fauth/nginx.conf:/etc/nginx/nginx.conf:ro
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/2fauth/2fauth
# systemctl --user daemon-reload
# systemctl --user start 2fauth-server
# systemctl --user status 2fauth-server --lines=999
# journalctl -fu 2fauth-server.service
# podman logs 2fauth-server
# systemctl --user stop 2fauth-server
# systemctl --user disable 2fauth-server
# podman exec -ti 2fauth-server /bin/sh
# podman exec -ti 2fauth-server /bin/bash

View File

@ -1,36 +0,0 @@
[Container]
AutoUpdate=registry
ContainerName=actual-server
Environment="ACTUAL_HOSTNAME=0.0.0.0"
# Environment="ACTUAL_HTTPS_CERT=/certs/server.cert"
# Environment="ACTUAL_HTTPS_KEY=/certs/server"
# Environment="ACTUAL_PORT=5006"
# Environment="ACTUAL_UPLOAD_FILE_SIZE_LIMIT_MB=20"
# Environment="ACTUAL_UPLOAD_FILE_SYNC_SIZE_LIMIT_MB=20"
# Environment="ACTUAL_UPLOAD_SYNC_ENCRYPTED_FILE_SYNC_SIZE_LIMIT_MB=50"
Image=docker.io/actualbudget/actual-server:latest
# Network=actual.network
# Pod=actual.pod
PublishPort=5013:5006
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
Volume=actual-server-data.volume:/data:rw
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/actualbudget/actual-server:latest
# systemctl --user daemon-reload
# systemctl --user start actual-server
# systemctl --user status actual-server --lines=999
# journalctl -fu actual-server.service
# podman logs actual-server
# systemctl --user stop actual-server
# systemctl --user disable actual-server
# podman exec -ti actual-server /bin/sh
# podman exec -ti actual-server /bin/bash

View File

@ -1,36 +0,0 @@
[Container]
# AutoUpdate=registry
ContainerName=authentik-db
Environment="POSTGRES_USER=authentik"
Environment="POSTGRES_PASSWORD=OCxfxtWadNuXslBbfWw9c0JXLMu+bWngv+qk9Ya65sw="
Environment="POSTGRES_DB=authentik"
Environment="TZ=America/Phoenix"
Image=docker.io/library/postgres:16.6
HealthCmd=pg_isready -U authentik
HealthInterval=30s
HealthRetries=5
HealthStartPeriod=20s
HealthTimeout=3s
# Network=authentik.network
# Pod=authentik.pod
PublishPort=5439:5432
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=authentik-db-data:/data:Z
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/library/postgres:16.6
# systemctl --user daemon-reload
# systemctl --user start authentik-db
# systemctl --user status authentik-db --lines=999
# journalctl -fu authentik-db.service
# podman logs authentik-db
# systemctl --user stop authentik-db
# systemctl --user disable authentik-db
# podman exec -ti authentik-db /bin/sh
# podman exec -ti authentik-db /bin/bash

View File

@ -1,36 +0,0 @@
[Container]
# AutoUpdate=registry
ContainerName=authentik-redis
Exec=--save 60 1 --loglevel warning
# Environment="AUTHENTIK_REDIS__HOST=192.168.11.2"
HealthCmd=/usr/local/bin/redis-cli ping || grep PONG
HealthInterval=30s
HealthRetries=5
HealthStartPeriod=20s
HealthTimeout=3s
Image=docker.io/library/redis:7.4.1
# Network=authentik.network
# Pod=authentik.pod
PublishPort=5021:6379
Volume=authentik-redis-data:/data:Z
[Service]
Restart=no
[Unit]
Requires=authentik-db.service
After=authentik-db.service
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/library/redis:7.4.1
# systemctl --user daemon-reload
# systemctl --user start authentik-redis
# systemctl --user status authentik-redis --lines=999
# journalctl -fu authentik-redis.service
# podman logs authentik-redis
# systemctl --user stop authentik-redis
# systemctl --user disable authentik-redis
# podman exec -ti authentik-redis /bin/sh
# podman exec -ti authentik-redis /bin/bash

View File

@ -1,55 +0,0 @@
[Container]
ContainerName=authentik-server
Environment="AUTHENTIK_POSTGRESQL__CONN_MAX_AGE=0"
Environment="AUTHENTIK_POSTGRESQL__HOST=192.168.11.2"
Environment="AUTHENTIK_POSTGRESQL__NAME=authentik"
Environment="AUTHENTIK_POSTGRESQL__PASSWORD=OCxfxtWadNuXslBbfWw9c0JXLMu+bWngv+qk9Ya65sw="
Environment="AUTHENTIK_POSTGRESQL__PORT=5439"
Environment="AUTHENTIK_POSTGRESQL__USER=authentik"
Environment="AUTHENTIK_REDIS__HOST=192.168.11.2"
Environment="AUTHENTIK_REDIS__PORT=5021"
# (Required) To generate a secret key run the following command:
# echo $(openssl rand -base64 32)
Environment="AUTHENTIK_SECRET_KEY=mlZ57mWthun9b8SPaS7Ptl0bBQX4OvyRanbqdQ+5e/k="
# (Optional) Enable Error Reporting
# Environment="AUTHENTIK_ERROR_REPORTING__ENABLED=${AUTHENTIK_ERROR_REPORTING:-false}"
# (Optional) Enable Email Sending
# Environment="AUTHENTIK_EMAIL__HOST=smtp.centurylink.net"
# Environment="AUTHENTIK_EMAIL__PORT=587"
# Environment="AUTHENTIK_EMAIL__USERNAME=phares@centurylink.net"
# Environment="AUTHENTIK_EMAIL__PASSWORD=RN9iPi5Ej#gRgLgiBTkb"
# Environment="AUTHENTIK_EMAIL__USE_TLS=false"
# Environment="AUTHENTIK_EMAIL__USE_SSL=false"
# Environment="AUTHENTIK_EMAIL__TIMEOUT=10"
# Environment="AUTHENTIK_EMAIL__FROM=noreply@phares.duckdns.org"
Exec=server
Image=ghcr.io/goauthentik/server:2024.12.1
PublishPort=5017:9000
PublishPort=5018:9443
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
Volume=authentik-server-media:/media:Z
Volume=authentik-server-templates:/templates:Z
[Service]
Restart=no
[Unit]
Requires=authentik-worker.service
After=authentik-worker.service
[Install]
WantedBy=multi-user.target default.target
# podman pull ghcr.io/goauthentik/server:2024.12.1
# systemctl --user daemon-reload
# systemctl --user start authentik-server
# systemctl --user status authentik-server --lines=999
# journalctl -fu authentik-server.service
# podman logs authentik-server
# systemctl --user stop authentik-server
# systemctl --user disable authentik-server
# podman exec -ti authentik-server /bin/sh
# podman exec -ti authentik-server /bin/bash

View File

@ -1,57 +0,0 @@
[Container]
ContainerName=authentik-worker
Environment="AUTHENTIK_POSTGRESQL__CONN_MAX_AGE=0"
Environment="AUTHENTIK_POSTGRESQL__HOST=192.168.11.2"
Environment="AUTHENTIK_POSTGRESQL__NAME=authentik"
Environment="AUTHENTIK_POSTGRESQL__PASSWORD=OCxfxtWadNuXslBbfWw9c0JXLMu+bWngv+qk9Ya65sw="
Environment="AUTHENTIK_POSTGRESQL__PORT=5439"
Environment="AUTHENTIK_POSTGRESQL__USER=authentik"
Environment="AUTHENTIK_REDIS__HOST=192.168.11.2"
Environment="AUTHENTIK_REDIS__PORT=5021"
# (Required) To generate a secret key run the following command:
# echo $(openssl rand -base64 32)
Environment="AUTHENTIK_SECRET_KEY=QvqdN5Pn4piWcoof1yPDa0FcaGnOL1gHAiSImJjEGZl6pypRgE2nCps8DTd4R9UHqfFuOtR9jhCelmQ2"
# (Optional) Enable Error Reporting
# Environment="AUTHENTIK_ERROR_REPORTING__ENABLED=true"
# (Optional) Enable Email Sending
# Environment="AUTHENTIK_EMAIL__HOST=smtp.centurylink.net"
# Environment="AUTHENTIK_EMAIL__PORT=587"
# Environment="AUTHENTIK_EMAIL__USERNAME=phares@centurylink.net"
# Environment="AUTHENTIK_EMAIL__PASSWORD=RN9iPi5Ej#gRgLgiBTkb"
# Environment="AUTHENTIK_EMAIL__USE_TLS=false"
# Environment="AUTHENTIK_EMAIL__USE_SSL=false"
# Environment="AUTHENTIK_EMAIL__TIMEOUT=10"
# Environment="AUTHENTIK_EMAIL__FROM=noreply@phares.duckdns.org"
Exec=worker
Image=ghcr.io/goauthentik/server:2024.12.1
PublishPort=5019:9000
PublishPort=5020:9443
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=/home/podman/wild-phares/fullchain.cer:/certs/server.cert:ro
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/certs/server.key:ro
Volume=authentik-server-media:/media:Z
Volume=authentik-server-templates:/templates:Z
[Service]
Restart=no
[Unit]
Requires=authentik-db.service
Requires=authentik-redis.service
After=authentik-db.service
After=authentik-redis.service
[Install]
WantedBy=multi-user.target default.target
# podman pull ghcr.io/goauthentik/server:2024.12.1
# systemctl --user daemon-reload
# systemctl --user start authentik-worker
# systemctl --user status authentik-worker --lines=999
# journalctl -fu authentik-worker.service
# podman logs authentik-worker
# systemctl --user stop authentik-worker
# systemctl --user disable authentik-worker
# podman exec -ti authentik-worker /bin/sh
# podman exec -ti authentik-worker /bin/bash

View File

@ -1,27 +0,0 @@
[Container]
AutoUpdate=registry
ContainerName=file-folder-helper
Exec=sleep infinity
Image=gitea.phares.duckdns.org:443/phares3757/file-folder-helper:latest
# Network=file-folder-helper.network
# Pod=file-folder-helper.pod
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=/mnt/free-file-sync/notes/user-secrets/8da397d4-13ec-4576-9722-3c79cad25563/secrets.json:/app/secrets.json:ro
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull gitea.phares.duckdns.org:443/phares3757/file-folder-helper:latest
# systemctl --user daemon-reload
# systemctl --user start file-folder-helper
# systemctl --user status file-folder-helper
# journalctl -fu file-folder-helper.service
# podman logs file-folder-helper
# systemctl --user stop file-folder-helper
# systemctl --user disable file-folder-helper
# podman exec -ti file-folder-helper /bin/sh
# podman exec -ti file-folder-helper /bin/bash

View File

@ -1,52 +0,0 @@
[Container]
AutoUpdate=registry
#
ContainerName=minecraft-server
#
# Environment="MODPACK=https://mediafilez.forgecdn.net/files/6159/192/Integrated%20MC-1.4.5.zip"
Environment="CF_API_KEY=$2a$10$4YL9prKJllKmiFp./V11B.iZ3kS1p0Rv0afJTpNctfRl2j6j/vb/a"
Environment="CF_FILE_ID=6159192"
# Environment="CF_PAGE_URL=https://www.curseforge.com/minecraft/modpacks/integrated-minecraft"
Environment="CF_SLUG=integrated-minecraft"
Environment="DIFFICULTY=normal"
Environment="EULA=TRUE"
Environment="FORCE_GAMEMODE=true"
Environment="MODE=survival"
Environment="TYPE=AUTO_CURSEFORGE"
# Environment="TYPE=FORGE"
Environment="VERSION=1.20.1"
Environment= "MEMORY=6G"
#
HealthCmd=mc-health
HealthInterval=5s
HealthRetries=20
HealthStartPeriod=1m
HealthTimeout=3s
#
Image=docker.io/itzg/minecraft-server
# Network=minecraft.network
# Pod=minecraft.pod
PodmanArgs=--attach stdin --tty
#
PublishPort=25565:25565
#
Volume=minecraft-server-data.volume:/data:rw
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull docker.io/itzg/minecraft-server
# systemctl --user daemon-reload
# systemctl --user start minecraft-server
# systemctl --user status minecraft-server --lines=9999
# journalctl -fu minecraft-server.service
# podman logs minecraft-server
# systemctl --user stop minecraft-server
# systemctl --user disable minecraft-server
# podman exec -ti minecraft-server /bin/sh
# podman exec -ti minecraft-server /bin/bash

View File

@ -1,30 +0,0 @@
[Container]
AutoUpdate=registry
ContainerName=original-to-deterministic-hash-code-server
Environment="ASPNETCORE_ENVIRONMENT=Production"
Image=gitea.phares.duckdns.org:443/phares3757/original-to-deterministic-hash-code:latest
# Network=original-to-deterministic-hash-code-server.network
# Pod=original-to-deterministic-hash-code-server.pod
PublishPort=5025:5001
Volume=/etc/localtime:/etc/localtime:ro
Volume=/etc/timezone:/etc/timezone:ro
Volume=/tmp/original-to-deterministic-hash-code:/tmp/original-to-deterministic-hash-code:rw
Volume=/mnt/free-file-sync/proxmox/iCloud Photos 2024:/app/content:rw
Volume=/home/podman/.microsoft/usersecrets/2f63ace9-efe5-4b0a-9ebe-529309f33e3f/secrets.json:/app/secrets.json:ro
[Service]
Restart=no
[Install]
WantedBy=multi-user.target default.target
# podman pull gitea.phares.duckdns.org:443/phares3757/original-to-deterministic-hash-code:latest
# systemctl --user daemon-reload
# systemctl --user start original-to-deterministic-hash-code-server
# systemctl --user status original-to-deterministic-hash-code-server
# journalctl -fu original-to-deterministic-hash-code-server.service
# podman logs original-to-deterministic-hash-code-server
# systemctl --user stop original-to-deterministic-hash-code-server
# systemctl --user disable original-to-deterministic-hash-code-server
# podman exec -ti original-to-deterministic-hash-code-server /bin/sh
# podman exec -ti original-to-deterministic-hash-code-server /bin/bash

Some files were not shown because too many files have changed in this diff Show More