Compare commits
14 Commits
Author | SHA1 | Date | |
---|---|---|---|
9d0a142419 | |||
6c9fa8cfaa | |||
7016660fd1 | |||
c822f12182 | |||
7008fd0f67 | |||
e890931a44 | |||
cf6e52b572 | |||
1c0b573f60 | |||
70f6c099a9 | |||
f851fe93bf | |||
6a5a49af76 | |||
591a1fbf5d | |||
56c3e1f963 | |||
01853e0ba2 |
7
.gitignore
vendored
7
.gitignore
vendored
@ -5,6 +5,8 @@
|
|||||||
|
|
||||||
!*/
|
!*/
|
||||||
|
|
||||||
|
!.vscode/*
|
||||||
|
|
||||||
!etc/*.md
|
!etc/*.md
|
||||||
!etc/bash_history*
|
!etc/bash_history*
|
||||||
!etc/group*
|
!etc/group*
|
||||||
@ -21,6 +23,7 @@
|
|||||||
!etc/lighttpd/lighttpd.conf
|
!etc/lighttpd/lighttpd.conf
|
||||||
!etc/network/interfaces
|
!etc/network/interfaces
|
||||||
!etc/passwd
|
!etc/passwd
|
||||||
|
!etc/pihole/custom.list
|
||||||
!etc/pihole/dhcp.leases
|
!etc/pihole/dhcp.leases
|
||||||
!etc/pihole/index.nginx-debian.html
|
!etc/pihole/index.nginx-debian.html
|
||||||
!etc/pihole/setupVars.conf
|
!etc/pihole/setupVars.conf
|
||||||
@ -40,6 +43,7 @@
|
|||||||
!etc/dnsmasq.d/*
|
!etc/dnsmasq.d/*
|
||||||
!etc/fstab/*
|
!etc/fstab/*
|
||||||
!etc/netplan/*
|
!etc/netplan/*
|
||||||
|
!etc/nginx/include/*
|
||||||
!etc/nginx/sites-available/*
|
!etc/nginx/sites-available/*
|
||||||
!etc/mysql/mariadb.conf.d/*
|
!etc/mysql/mariadb.conf.d/*
|
||||||
!etc/php/*
|
!etc/php/*
|
||||||
@ -49,6 +53,9 @@
|
|||||||
!etc/letsencrypt/**/*
|
!etc/letsencrypt/**/*
|
||||||
|
|
||||||
!opt/copy/**/*
|
!opt/copy/**/*
|
||||||
|
!opt/dockge/**/*.yaml
|
||||||
|
|
||||||
|
!var/spool/cron/crontabs/**/*
|
||||||
|
|
||||||
!root/**/*container
|
!root/**/*container
|
||||||
!home/podman/**/*volume
|
!home/podman/**/*volume
|
||||||
|
9
.vscode/.http
vendored
Normal file
9
.vscode/.http
vendored
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
@host = http://192.168.11.2
|
||||||
|
# @pat = asdf
|
||||||
|
# @ids = 126018, 224543
|
||||||
|
|
||||||
|
GET {{host}}/ocs-client-run.conf
|
||||||
|
# Accept: application/json
|
||||||
|
# Authorization: Basic {{pat}}
|
||||||
|
|
||||||
|
###
|
5
.vscode/mklink.md
vendored
Normal file
5
.vscode/mklink.md
vendored
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# mklink
|
||||||
|
|
||||||
|
```bash Sat Jul 27 2024 07:50:14 GMT-0700 (Mountain Standard Time)
|
||||||
|
mklink "L:\Git\Linux-Ubuntu-Server\.vscode\rebuild-ubuntu-beelink.md" "D:\5-Other-Small\Kanban\Phares\tasks\rebuild-ubuntu-beelink.md"
|
||||||
|
```
|
1
.vscode/rebuild-ubuntu-beelink.md
vendored
Symbolic link
1
.vscode/rebuild-ubuntu-beelink.md
vendored
Symbolic link
@ -0,0 +1 @@
|
|||||||
|
D:/5-Other-Small/Kanban/Phares/tasks/rebuild-ubuntu-beelink.md
|
45
.vscode/settings.json
vendored
Normal file
45
.vscode/settings.json
vendored
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
{
|
||||||
|
"files.associations": {
|
||||||
|
"*.container": "ini",
|
||||||
|
"*.org": "ini",
|
||||||
|
"*.net": "ini",
|
||||||
|
"podman": "ini",
|
||||||
|
"default": "ini"
|
||||||
|
},
|
||||||
|
"cSpell.words": [
|
||||||
|
"ASPNETCORE",
|
||||||
|
"autoindex",
|
||||||
|
"bchs",
|
||||||
|
"blinko",
|
||||||
|
"dashkiosk",
|
||||||
|
"dockge",
|
||||||
|
"docmost",
|
||||||
|
"dorico",
|
||||||
|
"duckdns",
|
||||||
|
"fauth",
|
||||||
|
"fullchain",
|
||||||
|
"gitea",
|
||||||
|
"gogs",
|
||||||
|
"immich",
|
||||||
|
"JMLC",
|
||||||
|
"journalctl",
|
||||||
|
"kanbn",
|
||||||
|
"kestra",
|
||||||
|
"keyout",
|
||||||
|
"linkwarden",
|
||||||
|
"localtime",
|
||||||
|
"lphares",
|
||||||
|
"neko",
|
||||||
|
"newkey",
|
||||||
|
"odoo",
|
||||||
|
"personalised",
|
||||||
|
"pgadmin",
|
||||||
|
"phares",
|
||||||
|
"Sumco",
|
||||||
|
"umbrel",
|
||||||
|
"usersecrets",
|
||||||
|
"vaultwarden",
|
||||||
|
"wekan",
|
||||||
|
"xandikos"
|
||||||
|
]
|
||||||
|
}
|
20
.vscode/tasks.json
vendored
Normal file
20
.vscode/tasks.json
vendored
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"version": "2.0.0",
|
||||||
|
"tasks": [
|
||||||
|
{
|
||||||
|
"label": "File-Folder-Helper AOT s X Day-Helper-2025-01-01",
|
||||||
|
"type": "shell",
|
||||||
|
"command": "L:/DevOps/Mesa_FI/File-Folder-Helper/bin/Release/net9.0/win-x64/publish/File-Folder-Helper.exe",
|
||||||
|
"args": [
|
||||||
|
"s",
|
||||||
|
"X",
|
||||||
|
"D:/6-Other-Large-Z/Linux-Ubuntu-Phares/home/podman/cron-backup",
|
||||||
|
"Day-Helper-2025-01-01",
|
||||||
|
"*.tar",
|
||||||
|
"-202",
|
||||||
|
"-Delete"
|
||||||
|
],
|
||||||
|
"problemMatcher": []
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
12
etc/.pihole/.gitignore
vendored
12
etc/.pihole/.gitignore
vendored
@ -1,12 +0,0 @@
|
|||||||
.DS_Store
|
|
||||||
*.pyc
|
|
||||||
*.swp
|
|
||||||
__pycache__
|
|
||||||
.cache
|
|
||||||
.pytest_cache
|
|
||||||
.tox
|
|
||||||
.eggs
|
|
||||||
*.egg-info
|
|
||||||
.idea/
|
|
||||||
*.iml
|
|
||||||
.vscode/
|
|
@ -1,82 +0,0 @@
|
|||||||
# Pi-hole: A black hole for Internet advertisements
|
|
||||||
# (c) 2017 Pi-hole, LLC (https://pi-hole.net)
|
|
||||||
# Network-wide ad blocking via your own hardware.
|
|
||||||
#
|
|
||||||
# Lighttpd config for Pi-hole
|
|
||||||
#
|
|
||||||
# This file is copyright under the latest version of the EUPL.
|
|
||||||
# Please see LICENSE file for your rights under this license.
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# FILE AUTOMATICALLY OVERWRITTEN BY PI-HOLE INSTALL/UPDATE PROCEDURE. #
|
|
||||||
# ANY CHANGES MADE TO THIS FILE AFTER INSTALL WILL BE LOST ON THE NEXT UPDATE #
|
|
||||||
###############################################################################
|
|
||||||
|
|
||||||
server.errorlog := "/var/log/lighttpd/error-pihole.log"
|
|
||||||
|
|
||||||
$HTTP["url"] =~ "^/admin/" {
|
|
||||||
server.document-root = "/var/www/html"
|
|
||||||
server.stream-response-body = 1
|
|
||||||
accesslog.filename = "/var/log/lighttpd/access-pihole.log"
|
|
||||||
accesslog.format = "%{%s}t|%h|%V|%r|%s|%b"
|
|
||||||
|
|
||||||
fastcgi.server = (
|
|
||||||
".php" => (
|
|
||||||
"localhost" => (
|
|
||||||
"socket" => "/run/lighttpd/pihole-php-fastcgi.socket",
|
|
||||||
"bin-path" => "/usr/bin/php-cgi",
|
|
||||||
"min-procs" => 1,
|
|
||||||
"max-procs" => 1,
|
|
||||||
"bin-environment" => (
|
|
||||||
"PHP_FCGI_CHILDREN" => "4",
|
|
||||||
"PHP_FCGI_MAX_REQUESTS" => "10000",
|
|
||||||
),
|
|
||||||
"bin-copy-environment" => (
|
|
||||||
"PATH", "SHELL", "USER"
|
|
||||||
),
|
|
||||||
"broken-scriptfilename" => "enable",
|
|
||||||
)
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
# X-Pi-hole is a response header for debugging using curl -I
|
|
||||||
# X-Frame-Options prevents clickjacking attacks and helps ensure your content is not embedded into other sites via < frame >, < iframe > or < object >.
|
|
||||||
# X-XSS-Protection sets the configuration for the cross-site scripting filters built into most browsers. This is important because it tells the browser to block the response if a malicious script has been inserted from a user input. (deprecated; disabled)
|
|
||||||
# X-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. This is important because the browser will only load external resources if their content-type matches what is expected, and not malicious hidden code.
|
|
||||||
# Content-Security-Policy tells the browser where resources are allowed to be loaded and if it’s allowed to parse/run inline styles or Javascript. This is important because it prevents content injection attacks, such as Cross Site Scripting (XSS).
|
|
||||||
# X-Permitted-Cross-Domain-Policies is an XML document that grants a web client, such as Adobe Flash Player or Adobe Acrobat (though not necessarily limited to these), permission to handle data across domains.
|
|
||||||
# Referrer-Policy allows control/restriction of the amount of information present in the referral header for links away from your page—the URL path or even if the header is sent at all.
|
|
||||||
setenv.add-response-header = (
|
|
||||||
"X-Pi-hole" => "The Pi-hole Web interface is working!",
|
|
||||||
"X-Frame-Options" => "DENY",
|
|
||||||
"X-XSS-Protection" => "0",
|
|
||||||
"X-Content-Type-Options" => "nosniff",
|
|
||||||
"Content-Security-Policy" => "default-src 'self' 'unsafe-inline';",
|
|
||||||
"X-Permitted-Cross-Domain-Policies" => "none",
|
|
||||||
"Referrer-Policy" => "same-origin"
|
|
||||||
)
|
|
||||||
|
|
||||||
# Block . files from being served, such as .git, .github, .gitignore
|
|
||||||
$HTTP["url"] =~ "^/admin/\." {
|
|
||||||
url.access-deny = ("")
|
|
||||||
}
|
|
||||||
|
|
||||||
# allow teleporter and API qr code iframe on settings page
|
|
||||||
$HTTP["url"] =~ "/(teleporter|api_token)\.php$" {
|
|
||||||
$HTTP["referer"] =~ "/admin/settings\.php" {
|
|
||||||
setenv.set-response-header = ( "X-Frame-Options" => "SAMEORIGIN" )
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else $HTTP["url"] == "/admin" {
|
|
||||||
url.redirect = ("" => "/admin/")
|
|
||||||
}
|
|
||||||
|
|
||||||
$HTTP["host"] == "pi.hole" {
|
|
||||||
$HTTP["url"] == "/" {
|
|
||||||
url.redirect = ("" => "/admin/")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# (keep this on one line for basic-install.sh filtering during install)
|
|
||||||
server.modules += ( "mod_access", "mod_accesslog", "mod_redirect", "mod_fastcgi", "mod_setenv" )
|
|
500
etc/bash_history_2024-01-03_podman.bash
Normal file
500
etc/bash_history_2024-01-03_podman.bash
Normal file
@ -0,0 +1,500 @@
|
|||||||
|
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||||
|
cp -R /var/www/html-slideshow/Images-c9dbce3b-Results/F\)Random/c9dbce3b/\[\]/* /var/www/html-slideshow/slideshow/random-results/
|
||||||
|
exit
|
||||||
|
ls -al /var/www/html-slideshow/slideshow/random-results
|
||||||
|
exit
|
||||||
|
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
exit
|
||||||
|
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
exit
|
||||||
|
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
exit
|
||||||
|
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
podman exec -ti immich-to-slideshow-server /bin/bash
|
||||||
|
exit
|
||||||
|
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
exit
|
||||||
|
podman pull docker.io/damongolding/immich-kiosk:latest
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-kiosk
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-kiosk
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-kiosk
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-kiosk
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-kiosk
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
systemctl --user status immich-to-slideshow-server
|
||||||
|
exit
|
||||||
|
systemctl --user status immich-to-slideshow-server
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
nano ~/.microsoft/usersecrets/cc24ad7a-1d95-4c47-a3ea-0d8475ab06da/secrets.json
|
||||||
|
exit
|
||||||
|
podman pull gitea.phares.duckdns.org:443/phares3757/immich-to-slideshow:latest
|
||||||
|
exit
|
||||||
|
systemctl --user start immich-to-slideshow-server
|
||||||
|
exit
|
||||||
|
podman pull tananaev/traccar:latest
|
||||||
|
podman pull tananaev.org/traccar:latest
|
||||||
|
podman pull traccar.org/traccar:latest
|
||||||
|
podman pull docker.io/traccar/traccar:latest
|
||||||
|
exit
|
||||||
|
systemctl --user start traccar-server
|
||||||
|
systemctl --user status traccar-server --lines=999
|
||||||
|
ls -la /opt/traccar/
|
||||||
|
ls -la /opt/traccar/logs/
|
||||||
|
exit
|
||||||
|
systemctl --user status traccar-server --lines=999
|
||||||
|
systemctl --user start traccar-server
|
||||||
|
nano /opt/traccar/traccar.xml
|
||||||
|
exit
|
||||||
|
nano /opt/traccar/traccar.xml
|
||||||
|
systemctl --user start traccar-server
|
||||||
|
systemctl --user status traccar-server --lines=999
|
||||||
|
nano /opt/traccar/traccar.xml
|
||||||
|
nano /opt/traccar/traccar.xml
|
||||||
|
systemctl --user start traccar-server
|
||||||
|
systemctl --user status traccar-server --lines=999
|
||||||
|
podman pull ghcr.io/linkwarden/linkwarden:latest
|
||||||
|
podman pull ghcr.io/linkwarden/linkwarden:latest
|
||||||
|
podman pull docker.io/postgres:16-alpine
|
||||||
|
podman pull docker.io/postgres:16-alpine
|
||||||
|
podman pull ghcr.io/linkwarden/linkwarden:latest
|
||||||
|
podman pull ghcr.io/linkwarden/linkwarden:latest
|
||||||
|
exit
|
||||||
|
systemctl --user start linkwarden-db
|
||||||
|
systemctl --user start linkwarden-server
|
||||||
|
systemctl --user status linkwarden-server --lines=9999
|
||||||
|
exit
|
||||||
|
systemctl --user start linkwarden-server
|
||||||
|
systemctl --user status linkwarden-server --lines=9999
|
||||||
|
exit
|
||||||
|
systemctl --user start linkwarden-server
|
||||||
|
systemctl --user status linkwarden-server --lines=9999
|
||||||
|
exit
|
||||||
|
podman pull docker.io/blinkospace/blinko:latest
|
||||||
|
podman pull docker.io/postgres:14
|
||||||
|
systemctl --user start blinko-server
|
||||||
|
systemctl --user status blinko-server --lines=9999
|
||||||
|
systemctl --user start blinko-db
|
||||||
|
systemctl --user status blinko-db
|
||||||
|
systemctl --user start blinko-db
|
||||||
|
systemctl --user start blinko-server
|
||||||
|
systemctl --user status blinko-server --lines=9999
|
||||||
|
exit
|
||||||
|
podman volunme ls
|
||||||
|
podman volume ls
|
||||||
|
podman volume prune
|
||||||
|
podman volume ls
|
||||||
|
podman volume rm systemd-odoo-server-data
|
||||||
|
podman volume rm systemd-odoo-db-data
|
||||||
|
podman volume rm one-review_postgres_data
|
||||||
|
podman volume prune
|
||||||
|
podman volume rm systemd-vaultwarden-server-data
|
||||||
|
podman volume prune
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
podman exec -ti mattermost-server /bin/bash
|
||||||
|
podman volume ls
|
||||||
|
podman volume inspect systemd-mattermost-server-config
|
||||||
|
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
podman volume prune
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
docker system prune --volumes
|
||||||
|
podman system prune --volumes
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
systemctl --user start linkwarden-server
|
||||||
|
systemctl --user status linkwarden-server --lines=9999
|
||||||
|
podman volume prune
|
||||||
|
podman volume prune
|
||||||
|
podman image prune
|
||||||
|
podman image prune
|
||||||
|
podman container prune
|
||||||
|
podman volume prune
|
||||||
|
podman container prune
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
podman exec -ti linkwarden-server /bin/bash
|
||||||
|
podman pull docker.io/mattermost/mattermost-team-edition:release-10.3
|
||||||
|
podman pull docker.io/mattermost/mattermost-team-edition:release-10.3
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
curl -f http://localhost:8065/api/v4/system/ping || exit 1
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
podman exec -ti mattermost-server /bin/sh
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
exit
|
||||||
|
podman volume ls
|
||||||
|
podman volume prune
|
||||||
|
podman volume inspect systemd-blinko-server-data
|
||||||
|
sudo -i root
|
||||||
|
sudo -i
|
||||||
|
podman exec -ti blinko-server /bin/bash
|
||||||
|
podman exec -ti blinko-server /bin/sh
|
||||||
|
exit
|
||||||
|
sudo -i
|
||||||
|
exit
|
||||||
|
sudo -i
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start linkwarden-server
|
||||||
|
exit
|
||||||
|
podman volume list
|
||||||
|
podman volume info systemd-blinko-server-data
|
||||||
|
podman volume systemd-blinko-server-data info
|
||||||
|
podman volume systemd-blinko-server-data
|
||||||
|
podman volume --help
|
||||||
|
podman volume inspect systemd-blinko-server-data
|
||||||
|
ls /home/podman/.local/share/containers/storage/volumes/systemd-blinko-server-data/_data
|
||||||
|
mkdir -p /home/podman/backup-blinko
|
||||||
|
podman volume export blinko-server-data --output /home/podman/backup-blinko/blinko-server-data.tar
|
||||||
|
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/blinko-server-data.tar
|
||||||
|
podman volume export systemd-baikal-server-data --output /home/podman/backup-baikal/baikal-server-data.tar
|
||||||
|
mkdir -p /home/podman/backup-baikal
|
||||||
|
podman volume export systemd-baikal-server-data --output /home/podman/backup-baikal/baikal-server-data.tar
|
||||||
|
now=$(date +'%Y-%m-%d_%H-%M-%S')
|
||||||
|
podman volume export systemd-baikal-server-data --output /home/podman/backup-baikal/baikal-server-data-${now}.tar
|
||||||
|
crontab -e
|
||||||
|
exit
|
||||||
|
crontab -e
|
||||||
|
crontab -e
|
||||||
|
crontab -r
|
||||||
|
exit
|
||||||
|
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"\%Y\%m\%d-\%H\%M\%S")'.tar'
|
||||||
|
exit
|
||||||
|
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"%Y-%m-%d--%H-%M-%S")'.tar'
|
||||||
|
exit
|
||||||
|
crontab -e
|
||||||
|
exit
|
||||||
|
chrontab -e
|
||||||
|
crontab -e
|
||||||
|
crontab -e
|
||||||
|
exit
|
||||||
|
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"%Y-%m-%d--%H-%M-%S")'.tar'
|
||||||
|
whereis podman
|
||||||
|
/usr/bin/podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"%Y-%m-%d--%H-%M-%S")'.tar'
|
||||||
|
crontab -e
|
||||||
|
crontab -e
|
||||||
|
crontab -e
|
||||||
|
grep CRON /var/log/syslog
|
||||||
|
nano /var/log/syslog
|
||||||
|
cat /var/log/syslog
|
||||||
|
exit
|
||||||
|
crontab -l
|
||||||
|
crontab -r
|
||||||
|
crontab -e
|
||||||
|
cat /etc/cron.allow
|
||||||
|
cat /etc/cron.d/cron.allow
|
||||||
|
crontab -l -u podman
|
||||||
|
nano /etc/cron. d/cron
|
||||||
|
nano /etc/cron
|
||||||
|
nano /etc/cron.d/cron.allow
|
||||||
|
crontab -r
|
||||||
|
crontab -l
|
||||||
|
exit
|
||||||
|
crontab -l
|
||||||
|
crontab -e
|
||||||
|
systemctl status cron
|
||||||
|
sudo -i
|
||||||
|
systemctl status cron
|
||||||
|
crontab -e
|
||||||
|
crontab -e
|
||||||
|
systemctl status cron
|
||||||
|
systemctl status cron
|
||||||
|
systemctl status cron
|
||||||
|
crontab -l
|
||||||
|
crontab -e
|
||||||
|
systemctl status cron
|
||||||
|
systemctl status cron
|
||||||
|
service cron status
|
||||||
|
crontab -e
|
||||||
|
service cron status
|
||||||
|
crontab -l
|
||||||
|
crontab -e
|
||||||
|
/home/podman/cron-backup
|
||||||
|
mkdir /home/podman/cron-backup
|
||||||
|
crontab -e
|
||||||
|
crontab -e
|
||||||
|
crontab -e
|
||||||
|
crontab -e
|
||||||
|
tar --list \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
|
||||||
|
tar --list --file \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
|
||||||
|
tar \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
|
||||||
|
tar --list --file \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar /etc
|
||||||
|
tar -tf \home\podman\cron-backup\immich-server-upload-2024-12-23--11-24-01.tar
|
||||||
|
tar --list --file /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar
|
||||||
|
tar --list --file /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar thumbs/5f0b1052-466d-44de-a554-226d7256850d/33/c5/
|
||||||
|
crontab -e
|
||||||
|
tar --list --directory /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar
|
||||||
|
tar --list --file /home/podman/cron-backup/immich-server-upload-2024-12-23--11-24-01.tar
|
||||||
|
crontab -e
|
||||||
|
exit
|
||||||
|
systemctl --user start linkwarden-server
|
||||||
|
exit
|
||||||
|
podman pull docker.io/actualbudget/actual-server:latest
|
||||||
|
systemctl --user start actual-server
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start linkwarden-server
|
||||||
|
exit
|
||||||
|
id
|
||||||
|
exit
|
||||||
|
nano ~/.bash_profile
|
||||||
|
nano ~/.bash_profile
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start uptime-kuma-server
|
||||||
|
exit
|
||||||
|
systemctl --user start uptime-kuma-server
|
||||||
|
podman pull docker.io/2fauth/2fauth
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
podman volumn prune
|
||||||
|
podman volume prune
|
||||||
|
podman volume prune
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
systemctl --user status 2fauth-server
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
podman exec -ti 2fauth-server /bin/bash
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
nc -zv localhost 8000
|
||||||
|
nc -zv localhost 443
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
nc -zv localhost 8000
|
||||||
|
nc -zv localhost 5015
|
||||||
|
nc -zv localhost 5016
|
||||||
|
nc -zv localhost 5015
|
||||||
|
nc -zv localhost 5015
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
nc -zv localhost 5015
|
||||||
|
exit
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
exit
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
exit
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
podman exec -ti 2fauth-server /bin/sh
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
systemctl --user start 2fauth-server
|
||||||
|
exit
|
||||||
|
podman pull docker.io/gotify/server
|
||||||
|
systemctl --user start gotify-server
|
||||||
|
exiot
|
||||||
|
exit
|
||||||
|
systemctl --user start uptime-kuma-server
|
||||||
|
nano /etc/hostname
|
||||||
|
exit
|
||||||
|
podman pull ghcr.io/goauthentik/server:2024.12.1
|
||||||
|
exit
|
||||||
|
podman pull docker.io/library/redis:7.4.1
|
||||||
|
exit
|
||||||
|
podman pull docker.io/library/redis:7.4.1
|
||||||
|
exit
|
||||||
|
podman pull docker.io/library/postgres:16.6
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-db
|
||||||
|
systemctl --user status authentik-db
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-db
|
||||||
|
systemctl --user status authentik-db
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
systemctl --user status authentik-redis
|
||||||
|
systemctl --user start authentik-worker
|
||||||
|
systemctl --user status authentik-worker
|
||||||
|
exit
|
||||||
|
systemctl --user status authentik-worker
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-worker
|
||||||
|
systemctl --user status authentik-worker
|
||||||
|
nc -zv localhost 5021
|
||||||
|
redis-cli ping
|
||||||
|
redis-cli -h localhost -p 6379 PING
|
||||||
|
redis-cli -h localhost -p 5021 PING
|
||||||
|
podman exec -ti authentik-redis /bin/bash
|
||||||
|
redis-cli -h localhost -p 5021 PING
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
systemctl --user status authentik-redis
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
systemctl --user status authentik-redis
|
||||||
|
podman exec -ti authentik-redis /bin/bash
|
||||||
|
podman exec -ti authentik-redis /bin/sh
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
podman exec -ti authentik-redis /bin/sh
|
||||||
|
podman exec -ti authentik-redis /bin/bash
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
podman exec -ti authentik-redis /bin/bash
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
exit
|
||||||
|
systemctl --user start authentik-redis
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
exit
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
podman volume prune
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
crontab -e
|
||||||
|
crontab -e
|
||||||
|
exit
|
||||||
|
crontab -e
|
||||||
|
exit
|
||||||
|
podman volume import systemd-mattermost-server-logs /home/podman/cron-backup/mattermost-server-logs-2024-12-23--11-28-01.tar
|
||||||
|
podman volume import systemd-mattermost-server-plugins /home/podman/cron-backup/mattermost-server-plugins-2024-12-23--11-29-02.tar
|
||||||
|
podman volume import systemd-mattermost-server-config /home/podman/cron-backup/mattermost-server-config-2024-12-23--11-27-01.tar
|
||||||
|
podman volume import systemd-mattermost-server-client-plugins /home/podman/cron-backup/mattermost-server-client-plugins-2024-12-23--11-26-01.tar
|
||||||
|
podman volume import systemd-mattermost-server-bleve /home/podman/cron-backup/mattermost-server-bleve-2024-12-23--11-25-01.tar
|
||||||
|
podman volume import systemd-mattermost-server-data /home/podman/cron-backup/mattermost-server-data-2024-12-23--11-18-01.tar
|
||||||
|
podman volume import systemd-mattermost-db-data /home/podman/cron-backup/mattermost-db-data-2024-12-24--12-17-01.tar
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
systemctl --user start mattermost-db
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-db
|
||||||
|
systemctl --user start mattermost-db
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
exit
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
||||||
|
podman volume import systemd-mattermost-db-data /home/podman/cron-backup/mattermost-db-data-2024-12-24--12-17-01.tar
|
||||||
|
podman volume import systemd-mattermost-server-data /home/podman/cron-backup/mattermost-server-data-2024-12-23--11-18-01.tar
|
||||||
|
podman volume import systemd-mattermost-server-bleve /home/podman/cron-backup/mattermost-server-bleve-2024-12-23--11-25-01.tar
|
||||||
|
podman volume import systemd-mattermost-server-client-plugins /home/podman/cron-backup/mattermost-server-client-plugins-2024-12-23--11-26-01.tar
|
||||||
|
podman volume import systemd-mattermost-server-config /home/podman/cron-backup/mattermost-server-config-2024-12-23--11-27-01.tar
|
||||||
|
podman volume import systemd-mattermost-server-plugins /home/podman/cron-backup/mattermost-server-plugins-2024-12-23--11-29-02.tar
|
||||||
|
podman volume import systemd-mattermost-server-logs /home/podman/cron-backup/mattermost-server-logs-2024-12-23--11-28-01.tar
|
||||||
|
exit
|
||||||
|
podman volume import systemd-mattermost-server-data /home/podman/cron-backup/mattermost-server-data-2024-12-23--11-18-01.tar
|
||||||
|
systemctl --user start mattermost-db
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
podman exec -ti mattermost-server /bin/bash
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||||
|
/usr/libexec/podman/quadlet -dryrun --user
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
exit
|
||||||
|
systemctl --user start mattermost-server
|
||||||
|
exit
|
||||||
|
systemctl --user status mattermost-server --lines=999
|
||||||
|
exit
|
@ -6,12 +6,9 @@ snap install dashkiosk
|
|||||||
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
||||||
snap set wpe-webkit-mir-kiosk daemon=true
|
snap set wpe-webkit-mir-kiosk daemon=true
|
||||||
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
||||||
exit
|
|
||||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
|
||||||
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
||||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
||||||
snap set ubuntu-frame daemon=true
|
snap set ubuntu-frame daemon=true
|
||||||
exit
|
|
||||||
reboot
|
reboot
|
||||||
cat /root/.ssh/authorized_keys
|
cat /root/.ssh/authorized_keys
|
||||||
nano /root/.ssh/authorized_keys
|
nano /root/.ssh/authorized_keys
|
@ -1,17 +1,13 @@
|
|||||||
cat /root/.ssh/authorized_keys
|
cat /root/.ssh/authorized_keys
|
||||||
nano /root/.ssh/authorized_keys
|
nano /root/.ssh/authorized_keys
|
||||||
exit
|
|
||||||
apt-get install podman -y
|
apt-get install podman -y
|
||||||
apt-cache rdepends podman-compose
|
apt-cache rdepends podman-compose
|
||||||
apt-get install podman-compose -y
|
apt-get install podman-compose -y
|
||||||
adduser podman sudo
|
adduser podman sudo
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
timedatectl set-timezone America/Phoenix
|
timedatectl set-timezone America/Phoenix
|
||||||
date
|
date
|
||||||
apt-get update
|
apt-get update
|
||||||
apt upgrade -y
|
apt upgrade -y
|
||||||
adduser pihole
|
|
||||||
adduser podman
|
adduser podman
|
||||||
adduser lphares
|
adduser lphares
|
||||||
mkdir /home/lphares/.ssh
|
mkdir /home/lphares/.ssh
|
||||||
@ -26,64 +22,36 @@ adduser bmiller lphares
|
|||||||
sudo usermod -a -G lphares bmiller
|
sudo usermod -a -G lphares bmiller
|
||||||
newgrp lphares
|
newgrp lphares
|
||||||
systemctl restart ssh
|
systemctl restart ssh
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
cd /run/user/0/
|
cd /run/user/0/
|
||||||
ls -la
|
|
||||||
cd ..
|
cd ..
|
||||||
ls -la
|
ls -la
|
||||||
cp -R 0/ 1002/
|
cp -R 0/ 1002/
|
||||||
chown -R podman:podman /run/user/1002/
|
|
||||||
sudo -iu podman
|
|
||||||
rm -R /run/user/1002/
|
rm -R /run/user/1002/
|
||||||
mkdir -p /run/user/1002/
|
mkdir -p /run/user/1002/
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /run/user/1002/
|
chown -R podman:podman /run/user/1002/
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
adduser pihole
|
adduser pihole
|
||||||
cd /tmp
|
cd /tmp
|
||||||
curl -sSL https://install.pi-hole.net | bash
|
curl -sSL https://install.pi-hole.net | bash
|
||||||
pihole -a -p LhhI1S73VZhtP#WIG8Tk
|
pihole -a -p LhhI1S73VZhtP#WIG8Tk
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
apt install unbound -y
|
apt install unbound -y
|
||||||
nano /etc/unbound/unbound.conf.d/pi-hole.conf
|
nano /etc/unbound/unbound.conf.d/pi-hole.conf
|
||||||
service unbound restart
|
|
||||||
nano /etc/lighttpd/lighttpd.conf
|
nano /etc/lighttpd/lighttpd.conf
|
||||||
pihole -up
|
pihole -up
|
||||||
service lighttpd restart
|
service lighttpd restart
|
||||||
dig fail01.dnssec.works @127.0.0.1 -p 5335
|
|
||||||
dig dnssec.works @127.0.0.1 -p 5335
|
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
ln -s /var/log/nginx /var/www/html/log-nginx
|
ln -s /var/log/nginx /var/www/html/log-nginx
|
||||||
ls -la /var/www/html
|
ls -la /var/www/html
|
||||||
exit
|
|
||||||
cp ~/.bash_history /etc/bash_history_2024-07-25.txt
|
cp ~/.bash_history /etc/bash_history_2024-07-25.txt
|
||||||
cat /etc/bash_history_2024-07-25.txt
|
cat /etc/bash_history_2024-07-25.txt
|
||||||
exit
|
|
||||||
apt install smartmontools
|
apt install smartmontools
|
||||||
smartctl -i /dev/sda
|
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
apt install snapd -y
|
apt install snapd -y
|
||||||
apt install sudo links unzip nginx git nano ncdu -y
|
|
||||||
snap install dashkiosk
|
snap install dashkiosk
|
||||||
apt install sudo links unzip nginx git nano ncdu -y
|
apt install sudo links unzip nginx git nano ncdu -y
|
||||||
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
||||||
snap set wpe-webkit-mir-kiosk daemon=true
|
snap set wpe-webkit-mir-kiosk daemon=true
|
||||||
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
||||||
exit
|
|
||||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
|
||||||
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
||||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
||||||
snap set ubuntu-frame daemon=true
|
snap set ubuntu-frame daemon=true
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
chmod -R podman:podman /home/podman/.config/containers/systemd/
|
chmod -R podman:podman /home/podman/.config/containers/systemd/
|
||||||
chown -R podman:podman /home/podman/.config/containers/systemd/
|
chown -R podman:podman /home/podman/.config/containers/systemd/
|
||||||
rm -R .config/containers/systemd/*.ignore
|
rm -R .config/containers/systemd/*.ignore
|
||||||
@ -95,8 +63,6 @@ rm -R /home/podman/.config/containers/systemd/*.container
|
|||||||
mkdir /home/podman/.ssh
|
mkdir /home/podman/.ssh
|
||||||
cp /root/.ssh/authorized_keys /home/podman/.ssh/authorized_keys
|
cp /root/.ssh/authorized_keys /home/podman/.ssh/authorized_keys
|
||||||
chown podman:podman -R /home/podman
|
chown podman:podman -R /home/podman
|
||||||
systemctl --user daemon-reload
|
|
||||||
sudo -iu podman
|
|
||||||
cd ~/
|
cd ~/
|
||||||
mkdir -p ~/.bashrc.d
|
mkdir -p ~/.bashrc.d
|
||||||
echo "export XDG_RUNTIME_DIR=/run/user/$(id -u)" > ~/.bashrc.d/systemd
|
echo "export XDG_RUNTIME_DIR=/run/user/$(id -u)" > ~/.bashrc.d/systemd
|
||||||
@ -107,9 +73,6 @@ systemctl --user daemon-reload
|
|||||||
podman image prune
|
podman image prune
|
||||||
podman volume prune
|
podman volume prune
|
||||||
podman container prune
|
podman container prune
|
||||||
exit
|
|
||||||
shutdown now
|
|
||||||
ip a
|
|
||||||
lsof -i -P -n | grep LISTEN
|
lsof -i -P -n | grep LISTEN
|
||||||
apt-cache rdepends cockpit
|
apt-cache rdepends cockpit
|
||||||
apt install cockpit -y
|
apt install cockpit -y
|
||||||
@ -117,51 +80,32 @@ passwd phares
|
|||||||
apt-get install cockpit cockpit-podman -y
|
apt-get install cockpit cockpit-podman -y
|
||||||
systemctl enable --now cockpit.socket
|
systemctl enable --now cockpit.socket
|
||||||
journalctl -fu unbound-resolvconf.service
|
journalctl -fu unbound-resolvconf.service
|
||||||
ip a
|
|
||||||
service unbound restart
|
|
||||||
journalctl -fu unbound-resolvconf.service
|
|
||||||
nano /etc/sysctl.conf
|
nano /etc/sysctl.conf
|
||||||
sysctl -p
|
sysctl -p
|
||||||
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
ip a
|
|
||||||
nano /etc/postfix/main.cf
|
nano /etc/postfix/main.cf
|
||||||
nano /etc/default/grub
|
nano /etc/default/grub
|
||||||
grub2-mkconfig
|
grub2-mkconfig
|
||||||
grub-mkconfig
|
grub-mkconfig
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
ip a
|
ip a
|
||||||
nmcli
|
nmcli
|
||||||
dig pi-hole.net @127.0.0.1 -p 5335
|
dig pi-hole.net @127.0.0.1 -p 5335
|
||||||
dig fail01.dnssec.works @127.0.0.1 -p 5335
|
dig fail01.dnssec.works @127.0.0.1 -p 5335
|
||||||
dig dnssec.works @127.0.0.1 -p 5335
|
dig dnssec.works @127.0.0.1 -p 5335
|
||||||
systemctl is-active unbound-resolvconf.service
|
systemctl is-active unbound-resolvconf.service
|
||||||
systemctl disable --now unbound-resolvconf.service
|
|
||||||
sed -Ei 's/^unbound_conf=/#unbound_conf=/' /etc/resolvconf.conf
|
sed -Ei 's/^unbound_conf=/#unbound_conf=/' /etc/resolvconf.conf
|
||||||
service unbound restart
|
service unbound restart
|
||||||
rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf
|
rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf
|
||||||
systemctl disable --now unbound-resolvconf.service
|
systemctl disable --now unbound-resolvconf.service
|
||||||
exit
|
|
||||||
reboot\
|
reboot\
|
||||||
reboot
|
reboot
|
||||||
sudo -iu podman
|
sudo -iu podman
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
shutdown now
|
shutdown now
|
||||||
lvs -a
|
lvs -a
|
||||||
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
|
||||||
smartctl -i /dev/sda
|
smartctl -i /dev/sda
|
||||||
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||||
mkdir /mnt/usb
|
mkdir /mnt/usb
|
||||||
mount /dev/sdb2 /mnt/usb
|
mount /dev/sdb2 /mnt/usb
|
||||||
exit
|
|
||||||
nginx -t
|
nginx -t
|
||||||
nginx -s reload
|
nginx -s reload
|
||||||
exit
|
exit
|
192
etc/bash_history_2024-11-10.bash
Normal file
192
etc/bash_history_2024-11-10.bash
Normal file
@ -0,0 +1,192 @@
|
|||||||
|
cd ~/.bashrc.d/systemd
|
||||||
|
cd ~/.bashrc.d
|
||||||
|
systemctl --user list-unit-files
|
||||||
|
cd /etc/containers/systemd/users
|
||||||
|
systemctl start --user
|
||||||
|
cd /usr/lib/systemd/system-generators/podman-system-generator
|
||||||
|
cd /usr/lib/systemd/system-generators
|
||||||
|
cd /usr/libexec/podman/quadlet
|
||||||
|
cd /usr/libexec/podman
|
||||||
|
apt-get install apt install podman-quadlet
|
||||||
|
apt install podman-quadlet
|
||||||
|
ls -la /usr/libexec/podman
|
||||||
|
systemctl -l | grep -i rootlessport
|
||||||
|
ps aux | grep rootlessport
|
||||||
|
podman-generate-systemd
|
||||||
|
whereis podman-generate-systemd
|
||||||
|
apt list --installed
|
||||||
|
clear
|
||||||
|
/usr/libexec/podman/quadlet -dryrun
|
||||||
|
/usr/libexec/podman/quadlet --user -dryrun
|
||||||
|
find / -name "immich-server.service" 2>/dev/null
|
||||||
|
rm -R /home/podman/d
|
||||||
|
find / -name "uptime-kuma-server.service" 2>/dev/null
|
||||||
|
ls /var/www/html
|
||||||
|
nano index.html
|
||||||
|
nano /var/www/html/index.html
|
||||||
|
mv /var/www/html /var/www/html-slideshow
|
||||||
|
ls /var/www
|
||||||
|
mkdir /var/www/html
|
||||||
|
cp /var/www/html-slideshow/index.nginx-debian.html /var/www/html/
|
||||||
|
mv /var/www/html /var/www/html-nginx
|
||||||
|
links https://phares.duckdns.org
|
||||||
|
ls /var/www/html-nginx
|
||||||
|
links https://adguard.phares.duckdns.org/
|
||||||
|
podman pull docker.io/m1k1o/neko:firefox
|
||||||
|
podman pull docker.io/mattermost/mattermost-team-edition:9.11.2
|
||||||
|
podman list images
|
||||||
|
podman ls images
|
||||||
|
podman images ls
|
||||||
|
podman image prone
|
||||||
|
podman image purge
|
||||||
|
podman image --help
|
||||||
|
podman image prune
|
||||||
|
y
|
||||||
|
podman image rm 2
|
||||||
|
podman image rm 7
|
||||||
|
podman image ls
|
||||||
|
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||||
|
nano /etc/hosts
|
||||||
|
cat /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||||
|
nano/home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||||
|
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||||
|
cd /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-external/_data
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-upload/_data/thumbs/5f0b1052-466d-44de-a554-226d7256850d/
|
||||||
|
links https://192.168.0.43:8123
|
||||||
|
links http://192.168.0.43:8123
|
||||||
|
cp -R /var/www/html-nginx/ /var/www/html-quartz
|
||||||
|
cd /var/www/html-quartz
|
||||||
|
mv index.nginx-debian.html index.html
|
||||||
|
links http://192.168.11.2:8069/index.html
|
||||||
|
cd /var/www/html-infineon/
|
||||||
|
apt-get update
|
||||||
|
apt-get upgrade
|
||||||
|
links http://192.168.11.2:8069/
|
||||||
|
links http://192.168.11.2/
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions/
|
||||||
|
rm /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
|
||||||
|
rm -R /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/var
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/phares3757/
|
||||||
|
nano /root/.acme.sh/*.phares.duckdns.org_ecc/*.phares.duckdns.org.cer
|
||||||
|
links http://127.0.0.1:8080/slideshow/index.html?nocache=2024-07-01-11-36
|
||||||
|
links http://127.0.0.1:8080/slideshow/index.html
|
||||||
|
links http://127.0.0.1:8080/slideshow
|
||||||
|
links http://192.168.11.2:8080/slideshow
|
||||||
|
mv /root/.acme.sh/affirm.duckdns.org_ecc/ /root/acme.sh-master/wild-affirm
|
||||||
|
mv /root/acme.sh-master/wild-affirm /root/.acme.sh/wild-affirm
|
||||||
|
cd /tmp
|
||||||
|
git clone https://github.com/acmesh-official/acme.sh.git
|
||||||
|
cd /tmp/acme.sh
|
||||||
|
./acme.sh --install -m mikepharesjr@msn.com
|
||||||
|
export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9
|
||||||
|
echo $DuckDNS_Token
|
||||||
|
./acme.sh --register-account -m mikepharesjr@msn.com
|
||||||
|
./acme.sh --set-default-ca --server letsencrypt
|
||||||
|
./acme.sh --issue --dns dns_duckdns -d '*.kmjmlc.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
./acme.sh --issue --dns dns_duckdns -d '*.jmlc.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
cp -R /root/.acme.sh/\*.jmlc.duckdns.org_ecc/ /root/.acme.sh/wild-jmlc
|
||||||
|
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.cer /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.cer
|
||||||
|
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.conf /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.conf
|
||||||
|
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr
|
||||||
|
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr.conf /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr.conf
|
||||||
|
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.key /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.key
|
||||||
|
links http://192.168.11.2:9090
|
||||||
|
links https://192.168.11.2:9090
|
||||||
|
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||||
|
man cockpit.conf
|
||||||
|
systemctl status cockpit.socket
|
||||||
|
rm /etc/cockpit/cockpit.conf
|
||||||
|
systemctl stop cockpit.socket
|
||||||
|
systemctl stop cockpit
|
||||||
|
systemctl start cockpit.socket
|
||||||
|
systemctl start cockpit
|
||||||
|
journalctl -u cockpit
|
||||||
|
cd /etc/cockpit/
|
||||||
|
cd ws-certs.d/
|
||||||
|
mv 0-self-signed.cert 0-self-signed.cert.old
|
||||||
|
mv 0-self-signed.key 0-self-signed.key.old
|
||||||
|
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer 0-self-signed.cert
|
||||||
|
cp /root/.acme.sh/wild-phares/phares.duckdns.org.key 0-self-signed.key
|
||||||
|
nano /etc/cockpit/cockpit.conf
|
||||||
|
systemctl restart cockpit
|
||||||
|
systemctl status cockpit
|
||||||
|
rm -R /mnt/free-file-sync/notes/FS-ADO/
|
||||||
|
nignx -t
|
||||||
|
nginx -t
|
||||||
|
nginx -s reload
|
||||||
|
lsof -i -P -n | grep LISTEN
|
||||||
|
links http://192.168.11.2:5007/
|
||||||
|
links http://127.0.0.1:5007/
|
||||||
|
chmod -R 0775 /root/.acme.sh/wild-phares
|
||||||
|
chmod -R 0777 /root/.acme.sh/wild-phares
|
||||||
|
chmod -R 0774 /root/.acme.sh/wild-phares
|
||||||
|
ls -la /root/.acme.sh/wild-phares
|
||||||
|
chmod -R 0774 /root/.acme.sh
|
||||||
|
ls -la /root/.acme.sh
|
||||||
|
ln -s /root/.acme.sh/wild-phares /home/podman/wild-phares
|
||||||
|
cp -R /root/.acme.sh/wild-phares /home/podman/wild-phares
|
||||||
|
rm /home/podman/wild-phares
|
||||||
|
cp -R /root/.acme.sh/wild-phares/ /home/podman
|
||||||
|
chown podman:podman /home/podman
|
||||||
|
ls /home/podman/wild-phares/
|
||||||
|
chown -R podman:podman /home/podman
|
||||||
|
ls -la /home/podman/wild-phares
|
||||||
|
cd /home/podman/
|
||||||
|
cd quadlet/
|
||||||
|
cd default.target.wants/
|
||||||
|
cd ..
|
||||||
|
cd lib
|
||||||
|
cd libpod/
|
||||||
|
chown -R 1000:1000 /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||||
|
ls -ls \mnt\free-file-sync\proxmox
|
||||||
|
ls -ls /mnt/free-file-sync/proxmox
|
||||||
|
cd /home/podman
|
||||||
|
apt-get install acl -y
|
||||||
|
ls -la
|
||||||
|
ls /home/podman/.config/cni/net.d
|
||||||
|
cd /home/phares/
|
||||||
|
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
||||||
|
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||||
|
getfacl /home/podman > permissions.acl
|
||||||
|
ls
|
||||||
|
cat permissions.acl
|
||||||
|
rm permissions.acl
|
||||||
|
getfacl -R /home/podman > podman-permissions-bad.acl
|
||||||
|
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
|
||||||
|
cd ../podman
|
||||||
|
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||||
|
nano /etc/shadow
|
||||||
|
find / -uid 1000 -exec chown -h 2000 {} +
|
||||||
|
find / -gid 1000 -exec chgrp -h 2000 {} +
|
||||||
|
find / -xdev -uid 1002 -exec chown -h 1000 {} +
|
||||||
|
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
|
||||||
|
find / -xdev -uid 1001 -exec chown -h 1005 {} +
|
||||||
|
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
|
||||||
|
find / -xdev -uid 2000 -exec chown -h 1001 {} +
|
||||||
|
find / -xdev -gid 2000 -exec chgrp -h 1001 {} +
|
||||||
|
nano /etc/passwd
|
||||||
|
nano /etc/group
|
||||||
|
find / -xdev -uid 1005 -exec chown -h 1002 {} +
|
||||||
|
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
|
||||||
|
reboot
|
||||||
|
cd /
|
||||||
|
ls /run/user/
|
||||||
|
ls /run/user/1001/systemd/
|
||||||
|
/usr/libexec/podman/quadlet -dryrun --user
|
||||||
|
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||||
|
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||||
|
sudo -iu podman
|
||||||
|
exit
|
206
etc/bash_history_2024-11-23.bash
Normal file
206
etc/bash_history_2024-11-23.bash
Normal file
@ -0,0 +1,206 @@
|
|||||||
|
ls /home/podman/.config/cni/net.d
|
||||||
|
cd /home/phares/
|
||||||
|
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
||||||
|
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||||
|
getfacl /home/podman > permissions.acl
|
||||||
|
cat permissions.acl
|
||||||
|
rm permissions.acl
|
||||||
|
getfacl -R /home/podman > podman-permissions-bad.acl
|
||||||
|
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
|
||||||
|
cd ../podman
|
||||||
|
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||||
|
nano /etc/shadow
|
||||||
|
find / -uid 1000 -exec chown -h 2000 {} +
|
||||||
|
find / -gid 1000 -exec chgrp -h 2000 {} +
|
||||||
|
find / -xdev -uid 1002 -exec chown -h 1000 {} +
|
||||||
|
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
|
||||||
|
find / -xdev -uid 1001 -exec chown -h 1005 {} +
|
||||||
|
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
|
||||||
|
find / -xdev -uid 2000 -exec chown -h 1001 {} +
|
||||||
|
find / -xdev -gid 2000 -exec chgrp -h 1001 {} +
|
||||||
|
nano /etc/passwd
|
||||||
|
nano /etc/group
|
||||||
|
find / -xdev -uid 1005 -exec chown -h 1002 {} +
|
||||||
|
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
|
||||||
|
reboot
|
||||||
|
cd /
|
||||||
|
ls /run/user/
|
||||||
|
ls /run/user/1001/systemd/
|
||||||
|
/usr/libexec/podman/quadlet -dryrun --user
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||||
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||||
|
cp ~/.bash_history /etc/bash_history_2024-11-10.txt
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes
|
||||||
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/_data/
|
||||||
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||||
|
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||||
|
systemctl --user start mattermost-db
|
||||||
|
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||||
|
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
||||||
|
links https://pgadmin.phares.duckdns.org/
|
||||||
|
lspci | grep -i nvme
|
||||||
|
lspci -vv -s 08:00.0 | grep -w LnkCap
|
||||||
|
lspci -vv -s 02:00.0 | grep -w LnkCap
|
||||||
|
curl https://push-test.mattermost.com
|
||||||
|
apt-file search setcap
|
||||||
|
setcap
|
||||||
|
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||||
|
snap vaultwarden help
|
||||||
|
links http://192.168.11.2:5008
|
||||||
|
links https://192.168.11.2:5008
|
||||||
|
snap vaultwarden
|
||||||
|
snap vaultwarden hash
|
||||||
|
snap uninstall vaultwarden
|
||||||
|
exot
|
||||||
|
links https://mattermost.phares.duckdns.org
|
||||||
|
rm /var/snap/vaultwarden/current/vaultwarden.conf
|
||||||
|
snap remove vaultwarden
|
||||||
|
snap install vaultwarden
|
||||||
|
ls -la /var/snap/vaultwarden/current
|
||||||
|
echo>/var/snap/vaultwarden/current/vaultwarden.conf
|
||||||
|
snap info vaultwarden
|
||||||
|
snap status vaultwarden
|
||||||
|
lsof -i -P -n | grep LISTEN
|
||||||
|
links https://192.168.11.2:5009/
|
||||||
|
openssl s_client -showcerts -connect vaultwarden.phares.duckdns.org:443 -servername vaultwarden.phares.duckdns.org
|
||||||
|
journalctl -u snapd
|
||||||
|
cat /var/snap/vaultwarden/current/
|
||||||
|
top
|
||||||
|
snap info adguard
|
||||||
|
snap info addguard
|
||||||
|
snap info addguardhome
|
||||||
|
snap info
|
||||||
|
snap info
|
||||||
|
snap changes
|
||||||
|
snap watch id 37
|
||||||
|
snap watch 37
|
||||||
|
snap watch 34
|
||||||
|
snap logs vaultwardedn
|
||||||
|
ls -la /home/podman/wild-phares/
|
||||||
|
ls -la /var/snap/vaultwarden/current/
|
||||||
|
ls -la /var/snap/vaultwarden/current/ssl
|
||||||
|
cp -R /home/podman/wild-phares/* /var/snap/vaultwarden/current/ssl/
|
||||||
|
ls -la /var/snap/vaultwarden/current/ssl/
|
||||||
|
snap logs vaultwarden
|
||||||
|
snap stop vaultwarden
|
||||||
|
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||||
|
snap start vaultwarden
|
||||||
|
apt-get install cockpit cockpit-podman cockpit-machines -y
|
||||||
|
apt-get remove cockpit-machines -y
|
||||||
|
apt-get install cockpit cockpit-podman cockpit-file -y
|
||||||
|
apt-get search cockpit-file
|
||||||
|
apt-get search
|
||||||
|
apt-get check
|
||||||
|
apt-get auto-purge
|
||||||
|
apt-get --help
|
||||||
|
apt-get purge
|
||||||
|
apt-get autoremove
|
||||||
|
apt-get install cockpit cockpit-podman cockpit-files -y
|
||||||
|
apt-get upgrade
|
||||||
|
nano /etc/docker/daemon.json
|
||||||
|
nano /etc/podman/daemon.json
|
||||||
|
nano /etc/resolv.conf
|
||||||
|
cat /etc/hosts
|
||||||
|
apt install podman
|
||||||
|
nano /etc/cockpit/cockpit.conf
|
||||||
|
ls -la /etc/cockpit/ws-certs.d/
|
||||||
|
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||||
|
mv /etc/cockpit/ws-certs.d/0-self-signed.cert /etc/cockpit/ws-certs.d/0-self-signed.cert.part
|
||||||
|
cp /root/.acme.sh/wild-phares/fullchain.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||||
|
chomod 774 -r /etc/cockpit/ws-certs.d
|
||||||
|
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||||
|
ls -la /etc/cockpit/ws-certs.d
|
||||||
|
rm /etc/cockpit/ws-certs.d/0-self-signed.cert.old
|
||||||
|
chmod 774 -R /etc/cockpit/ws-certs.d
|
||||||
|
ls -la /usr/libexec/podman/quadlet
|
||||||
|
ls -la /usr/libexec/podman
|
||||||
|
find / -name "neko-server.service" 2>/dev/null
|
||||||
|
cp /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
|
||||||
|
cp /run/user/1000/systemd/generator/default.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
|
||||||
|
cp /run/user/1000/systemd/generator/neko-server.service /mnt/free-file-sync/proxmox/
|
||||||
|
nano /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||||
|
dif /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
||||||
|
diff /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
||||||
|
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||||
|
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||||
|
diff
|
||||||
|
diff --help
|
||||||
|
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service -y
|
||||||
|
diff -y /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
||||||
|
diff -r /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
||||||
|
diff -y /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||||
|
diff -r /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||||
|
diff -y -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||||
|
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||||
|
/usr/lib/systemd/user-generators/podman-user-generator
|
||||||
|
ls /usr/lib/systemd/user-generators/podman-user-generator
|
||||||
|
rm -R /var/www/html-infineon/
|
||||||
|
nginx -t
|
||||||
|
nginx -s reload
|
||||||
|
docker
|
||||||
|
snap list
|
||||||
|
nano /var/www/html-slideshow/slideshow/scripts/index.js
|
||||||
|
nano /var/www/html-slideshow/slideshow/index.json
|
||||||
|
snap install dotnet-sdk --classic 9.0/stable
|
||||||
|
snap install dotnet-sdk --stable 9.0/stable
|
||||||
|
snap install dotnet-sdk --stable dotnet-sdk
|
||||||
|
snap install --stable dotnet-sdk
|
||||||
|
snap install --classic --stable dotnet-sdk
|
||||||
|
/etc/hosts
|
||||||
|
nano /etc/hostname
|
||||||
|
nano /etc/hosts
|
||||||
|
snap remove --classic --stable dotnet-sdk
|
||||||
|
snap remove dotnet-sdk
|
||||||
|
snap install dotnet-sdk --classic --9.0/stable
|
||||||
|
apt-get update
|
||||||
|
snap install dotnet-sdk --classic --channel 9.0/stable
|
||||||
|
snap install dotnet-sdk --classic --latest/stable
|
||||||
|
snap install dotnet-sdk --classic --channel latest/stable
|
||||||
|
export DOTNET_ROOT=/snap/dotnet-sdk/current
|
||||||
|
~/.bash_profile, ~/.bashrc
|
||||||
|
~/.bash_profile
|
||||||
|
~/.bashrc
|
||||||
|
sudo -i
|
||||||
|
cd /tmp/
|
||||||
|
podman compose up --build
|
||||||
|
nano /etc/containers/registries.conf
|
||||||
|
podman ps -a
|
||||||
|
apt-get install podman-plugins
|
||||||
|
sudo -iu podman
|
||||||
|
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
|
||||||
|
cd one-review/
|
||||||
|
git checkout origin 11-17
|
||||||
|
git checkout origin/11-17
|
||||||
|
git pull
|
||||||
|
git pull origin 11-17
|
||||||
|
git log -1
|
||||||
|
docker compose up --build
|
||||||
|
snap install docker
|
||||||
|
snap remove docker
|
||||||
|
snap remove dotnet-sdk
|
||||||
|
cd ..
|
||||||
|
rm -R one-review/
|
||||||
|
ls
|
||||||
|
dotnet --info
|
||||||
|
exit
|
212
etc/bash_history_2025-01-03.bash
Normal file
212
etc/bash_history_2025-01-03.bash
Normal file
@ -0,0 +1,212 @@
|
|||||||
|
mv /mnt/free-file-sync/iso/images-a/DisneyWorld\\\\ 2019/ /mnt/free-file-sync/iso/images-a/DisneyWorld\\ 2019/
|
||||||
|
mv /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019 /mnt/free-file-sync/iso/images-a/DisneyWorld\\ 2019/
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019/
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006\ \\\!9
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/Phares\\\ Slides\\\ ####
|
||||||
|
mount /mnt/free-file-sync/iso/Edited.iso /mnt/iso-compare
|
||||||
|
mount /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/2024-12-18-18-13-54-579.iso /mnt/iso-compare
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/Scanned\ Grandma\\\'s\ Quilt\ ####/
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/Event
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/Question/
|
||||||
|
mount /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/2024-12-18-18-10-19-693.iso /mnt/iso-compare
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/
|
||||||
|
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
|
||||||
|
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/Facebook
|
||||||
|
mount /mnt/free-file-sync/iso/images-a/Rex\ Memorial\ ####/2024-12-18-18-15-40-537.iso /mnt/iso-compare
|
||||||
|
mount /mnt/free-file-sync/iso/images-a/Scanned\ Norman\ Herman/2024-12-18-18-15-43-097.iso /mnt/iso-compare
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/Scanned*
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/
|
||||||
|
mount /mnt/free-file-sync/iso/images-a/DisneyWorld\ 2019/2024-12-18-18-42-26-222.iso /mnt/iso-compare
|
||||||
|
umount /mnt/iso-compare
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/Slide in N*
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/Slide\\ in\\ N*
|
||||||
|
ls -al /mnt/free-file-sync/iso/images-a/Sli*
|
||||||
|
ls -al /mnt/free-file-sync/iso/images-a/Slide *
|
||||||
|
ls -al /mnt/free-file-sync/iso/images-a/Slide\\ *
|
||||||
|
ls -al /mnt/free-file-sync/iso/images-a
|
||||||
|
rm -R /mnt/free-file-sync/iso/images-a/'Slide in Name Order Originals \(622\) ####'
|
||||||
|
mkdir /mnt/free-file-sync/iso/videos-b
|
||||||
|
rm /mnt/free-file-sync/iso/videos-b/Home\ Videos\ 1998\ -\ 2002/2024-12-18-19-49-52-202.iso
|
||||||
|
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||||
|
lsblk
|
||||||
|
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
|
||||||
|
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
|
||||||
|
aptget update
|
||||||
|
apt-get upgrade
|
||||||
|
nano t
|
||||||
|
mv -R /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
|
||||||
|
mv /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
|
||||||
|
mv /mnt/free-file-sync/logan-google-drive /mnt/free-file-sync/google-drive-logan
|
||||||
|
/etc/duckdns/duck.sh >/dev/null 2>&1
|
||||||
|
"/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
|
||||||
|
cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
||||||
|
cd /
|
||||||
|
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"\%Y\%m\%d-\%H\%M\%S")'.tar'
|
||||||
|
rm /home/podman/backup-blinko/*
|
||||||
|
nano /run/podman/podman.sock
|
||||||
|
ls /run/podman/podman.sock
|
||||||
|
cat /var/log/syslog
|
||||||
|
grep "ERROR" /var/log/cron
|
||||||
|
crontab -l
|
||||||
|
systemctl log cron
|
||||||
|
ls /home/podman/backup-blinko/
|
||||||
|
systemctl status cron
|
||||||
|
snap list vaultwarden
|
||||||
|
ls -la /home/lphares/dorico
|
||||||
|
ls -la /home/lphares
|
||||||
|
ls -la /home/lphares/dorico/
|
||||||
|
ls /var/www/html-
|
||||||
|
ls /etc/netplan/
|
||||||
|
ls /etc/ModemManager/ -la
|
||||||
|
ls /etc/ModemManager -la
|
||||||
|
ls /etc/ModemManager
|
||||||
|
ls /etc/ModemManager -
|
||||||
|
ls /etc/ModemManager -l
|
||||||
|
ls /etc/ModemManager --time-style
|
||||||
|
ls /etc/ModemManager -lT
|
||||||
|
ls /etc/ModemManager --time-style=full
|
||||||
|
ls /etc/ModemManager/ --time-style=full
|
||||||
|
ls /etc/ModemManager/
|
||||||
|
ls /etc/ModemManager -l -T
|
||||||
|
ls /etc/ModemManager -l --time-style=+"%b %d %Y %H:%M:%S"
|
||||||
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S"
|
||||||
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S%zz"
|
||||||
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %HH:%M:%S %z"
|
||||||
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %h:%M:%S %z"
|
||||||
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S %z"
|
||||||
|
ls /etc/ModemManager/ -la -D '%Y-%m-%dT%H:%M:%S'
|
||||||
|
ls /etc/ModemManager/ -la -D '%Y-%m-%dT %H:%M:%S'
|
||||||
|
ufw status
|
||||||
|
ufw number status
|
||||||
|
ufw numbered status
|
||||||
|
ufw active
|
||||||
|
ufw allow 53/tcp comment "01) DNS TCP"
|
||||||
|
ufw allow 53/udp comment "02) DNS UDP"
|
||||||
|
ufw allow 67/tcp comment "03) DHCP TCP"
|
||||||
|
ufw allow 67/udp comment "04) DHCP UDP"
|
||||||
|
ufw allow from 0.0.0.0/0 to any port 443/tcp comment "05) HTTPS"
|
||||||
|
ufw allow from 192.168.11.0/25 to any port 22/tcp comment "06) SSH"
|
||||||
|
ufw allow from 192.168.21.0/25 to any port 22/tcp comment "07) SSH"
|
||||||
|
ufw allow from 192.168.31.0/25 to any port 22/tcp comment "08) SSH"
|
||||||
|
ufw allow from 192.168.41.0/25 to any port 22/tcp comment "09) SSH"
|
||||||
|
ufw allow from 192.168.42.0/25 to any port 22/tcp comment "10) SSH"
|
||||||
|
ufw allow from 192.168.43.0/25 to any port 22/tcp comment "11) SSH"
|
||||||
|
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
|
||||||
|
ufw allow port 53/tcp comment "01) DNS TCP"
|
||||||
|
ufw allow from 192.168.11.0/25 port 22/tcp comment "06) SSH"
|
||||||
|
ufw allow from 192.168.21.0/25 port 22/tcp comment "07) SSH"
|
||||||
|
ufw allow from 192.168.31.0/25 port 22/tcp comment "08) SSH"
|
||||||
|
ufw allow from 192.168.41.0/25 port 22/tcp comment "09) SSH"
|
||||||
|
ufw allow from 192.168.42.0/25 port 22/tcp comment "10) SSH"
|
||||||
|
ufw allow from 192.168.43.0/25 port 22/tcp comment "11) SSH"
|
||||||
|
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
|
||||||
|
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
|
||||||
|
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
||||||
|
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
|
||||||
|
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
|
||||||
|
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
|
||||||
|
ufw allow from 192.168.11.0/25 port 22 comment "06) SSH"
|
||||||
|
ufw allow from 192.168.21.0/25 port 22 comment "07) SSH"
|
||||||
|
ufw allow from 192.168.31.0/25 port 22 comment "08) SSH"
|
||||||
|
ufw allow from 192.168.41.0/25 port 22 comment "09) SSH"
|
||||||
|
ufw allow from 192.168.42.0/25 port 22 comment "10) SSH"
|
||||||
|
ufw allow from 192.168.43.0/25 port 22 comment "11) SSH"
|
||||||
|
ufw allow to 0.0.0.0/0 port 22 comment "12) SSH"
|
||||||
|
ufw delete 12
|
||||||
|
ufw allow to 192.168.11.0/25 port 22 comment "12) SSH"
|
||||||
|
ufw allow to 192.168.21.0/25 port 22 comment "13) SSH"
|
||||||
|
ufw allow to 192.168.31.0/25 port 22 comment "14) SSH"
|
||||||
|
ufw allow to 192.168.41.0/25 port 22 comment "15) SSH"
|
||||||
|
ufw allow to 192.168.42.0/25 port 22 comment "16) SSH"
|
||||||
|
ufw allow to 192.168.43.0/25 port 22 comment "17) SSH"
|
||||||
|
cat /etc/passwd
|
||||||
|
pcap
|
||||||
|
ps -ef | grep nginx
|
||||||
|
usermod -a -G lphares www-data
|
||||||
|
chmod -R 774 /home/lphares/dorico
|
||||||
|
rm -r /home/lphares/dorico
|
||||||
|
su lphares
|
||||||
|
ufw enabled
|
||||||
|
ufw allow from 0.0.0.0/0 port 443 comment "18) HTTPS"
|
||||||
|
ufw reset
|
||||||
|
ufw allow 53/tcp comment "01) DNS TCP"
|
||||||
|
ufw allow 53/udp comment "02) DNS UDP"
|
||||||
|
ufw allow 67/tcp comment "03) DHCP TCP"
|
||||||
|
ufw allow 67/udp comment "04) DHCP UDP"
|
||||||
|
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
||||||
|
ufw allow to 0.0.0.0/0 port 443 comment "06) HTTPS"
|
||||||
|
ufw allow from 192.168.11.0/25 port 22 comment "07) SSH"
|
||||||
|
ufw allow from 192.168.21.0/25 port 22 comment "08) SSH"
|
||||||
|
ufw allow from 192.168.31.0/25 port 22 comment "09) SSH"
|
||||||
|
ufw allow from 192.168.41.0/25 port 22 comment "10) SSH"
|
||||||
|
ufw allow from 192.168.42.0/25 port 22 comment "11) SSH"
|
||||||
|
ufw allow from 192.168.43.0/25 port 22 comment "12) SSH"
|
||||||
|
ufw allow to 192.168.11.0/25 port 22 comment "13) SSH"
|
||||||
|
ufw allow to 192.168.21.0/25 port 22 comment "14) SSH"
|
||||||
|
ufw allow to 192.168.31.0/25 port 22 comment "15) SSH"
|
||||||
|
ufw allow to 192.168.41.0/25 port 22 comment "16) SSH"
|
||||||
|
ufw allow to 192.168.42.0/25 port 22 comment "17) SSH"
|
||||||
|
ufw allow to 192.168.43.0/25 port 22 comment "18) SSH"
|
||||||
|
ufw enable
|
||||||
|
ufw disable
|
||||||
|
top[
|
||||||
|
top
|
||||||
|
apt-get remove certbot
|
||||||
|
snap remove certbot
|
||||||
|
systemctl list-timers
|
||||||
|
grep sshd.\*Failed /var/log/auth.log | less
|
||||||
|
grep sshd.\* /var/log/auth.log
|
||||||
|
grep sshd.\*publickey /var/log/auth.log
|
||||||
|
grep sshd.\*publickey /var/log/auth.log | less
|
||||||
|
apt update
|
||||||
|
apt install fail2ban -y
|
||||||
|
systemctl status fail2ban.service
|
||||||
|
cd /etc/fail2ban
|
||||||
|
ls
|
||||||
|
head -20 jail.conf
|
||||||
|
cp jail.conf jail.local
|
||||||
|
nano jail.local
|
||||||
|
systemctl enable fail2ban
|
||||||
|
systemctl start fail2ban
|
||||||
|
systemctl status fail2ban
|
||||||
|
apt-get update
|
||||||
|
apt upgrade
|
||||||
|
snap info adguard-home
|
||||||
|
tail /var/log/auth.log -f
|
||||||
|
ufw status numbered
|
||||||
|
id
|
||||||
|
su phares
|
||||||
|
su podman
|
||||||
|
ip a
|
||||||
|
ip a l | grep inet6
|
||||||
|
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
||||||
|
cat /boot/firmware/cmdline.txt
|
||||||
|
nano /boot/firmware/cmdline.txt
|
||||||
|
snap restart adguard-home
|
||||||
|
nano /etc/duckdns/duck.sh
|
||||||
|
chmod 700 /etc/duckdns/duck.sh
|
||||||
|
cd /etc/duckdns
|
||||||
|
./duck.sh
|
||||||
|
ps -ef | grep cr[o]n
|
||||||
|
crontab -e
|
||||||
|
cat duck.log
|
||||||
|
xit
|
||||||
|
links http://192.168.11.2:5015/
|
||||||
|
chown podman:podman /home/podman/2fauth -R
|
||||||
|
nc -zv localhost 5015
|
||||||
|
nano /home/podman/.ssh/authorized_keys
|
||||||
|
nano /home/bmiller/.ssh/authorized_keys
|
||||||
|
nano /home/lphares/.ssh/authorized_keys
|
||||||
|
nano /root/.ssh/authorized_keys
|
||||||
|
nano /home/persa/.ssh/authorized_keys
|
||||||
|
nano /home/phares/.ssh/authorized_keys
|
||||||
|
exit\
|
||||||
|
nano /etc/hostname
|
||||||
|
nano /etc/hosts
|
||||||
|
sudo -iu podman
|
||||||
|
nginx -s reload
|
||||||
|
nginx -t
|
||||||
|
reboot
|
||||||
|
exit
|
189
etc/bash_history_2025-02-21.bash
Normal file
189
etc/bash_history_2025-02-21.bash
Normal file
@ -0,0 +1,189 @@
|
|||||||
|
rm -R /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
cp -R /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
cp -Rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
yes | cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
\cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
ls /var/lib/containers/storage/overlay-layers/
|
||||||
|
cat /var/lib/containers/storage/overlay-layers/layers.json
|
||||||
|
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json.json
|
||||||
|
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json
|
||||||
|
cat /var/lib/containers/storage/overlay-layers/layers.lock
|
||||||
|
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||||
|
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||||
|
podman reset syste
|
||||||
|
podman reset system
|
||||||
|
podman system reset
|
||||||
|
podman system prune
|
||||||
|
rm -Rf /home/podman/.local/share/containers/storage/overlay/9234e0dfb7414fea7d4610bea727177a951b39a5df9f0573882cbf9e5bc16417/
|
||||||
|
ls -la /home/podman/cron-backup/
|
||||||
|
ls -la /home/podman/cron-backup
|
||||||
|
ls -la /home/podman/cron-backup-delete/
|
||||||
|
ls -la /home/podman/cron-backup-2025-01-31/
|
||||||
|
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||||
|
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rmit --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||||
|
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||||
|
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||||
|
podman ls
|
||||||
|
podman ps a
|
||||||
|
podman ps -a
|
||||||
|
podman image prune
|
||||||
|
podman volume list
|
||||||
|
podman ps
|
||||||
|
podman image rm 9
|
||||||
|
podman image list
|
||||||
|
rsync -a /home/podman/jackyzha0-quartz-phares/content/year-season/ /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
cd /home/www-data/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
||||||
|
cat /var/snap/vaultwarden/current/ssl/fullchain.cer
|
||||||
|
snap info vaultwarden
|
||||||
|
snap status vaultwarden
|
||||||
|
snap help
|
||||||
|
ls /root/.acme.sh/
|
||||||
|
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/
|
||||||
|
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/fullchain.cer
|
||||||
|
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/\*.phares.duckdns.org.key
|
||||||
|
cp /home/podman/wild-phares/fullchain.cer /var/snap/vaultwarden/current/ssl/fullchain.cer
|
||||||
|
cp /home/podman/wild-phares/phares.duckdns.org.key /var/snap/vaultwarden/current/ssl/phares.duckdns.org.key
|
||||||
|
snap start vaultwarden
|
||||||
|
snap logs vaultwarden
|
||||||
|
nano /run/resolvconf/resolv.conf
|
||||||
|
cat /etc/resolv.conf
|
||||||
|
ls -la /var/snap/vaultwarden/current/data/icon_cache/
|
||||||
|
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss/
|
||||||
|
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss
|
||||||
|
nignx -t
|
||||||
|
ls /var/snap/vaultwarden/current/data/tmp/
|
||||||
|
ls /var/snap/vaultwarden/current/data/icon_cache/
|
||||||
|
ls /var/snap/vaultwarden/current/data/icon_cache/ -ls
|
||||||
|
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||||
|
systemctl disable systemd-resolved.service
|
||||||
|
snap start adguard-home
|
||||||
|
snap logs adguard-home
|
||||||
|
systemctl enable systemd-resolved.service
|
||||||
|
snap restart vaultwarden
|
||||||
|
ls /etc/resolv.conf
|
||||||
|
ping
|
||||||
|
ping duckdns.org
|
||||||
|
nano /etc/resolv.conf
|
||||||
|
snap info adguard-home
|
||||||
|
snap stop adguard-home
|
||||||
|
systemctl start systemd-resolved
|
||||||
|
ping www.google.com
|
||||||
|
systemctl disable systemd-resolved
|
||||||
|
systemctl stop systemd-resolved
|
||||||
|
reboot
|
||||||
|
lsof -i -P -n | grep LISTEN
|
||||||
|
nano /etc/ssh/sshd_config
|
||||||
|
cp -R /etc/ssh/sshd_config /home/podman/etc-ssh-sshd_config
|
||||||
|
cp -R /etc/ssh/sshd_config.d /home/podman/etc-ssh-sshd_config.d
|
||||||
|
chown -R podman:podman /home/podman/etc-ssh-sshd_config.d
|
||||||
|
chown -R podman:podman /home/podman/etc-ssh-sshd_config
|
||||||
|
ls -la podman:podman /home/podman/etc-ssh-sshd_config
|
||||||
|
mv /home/podman/etc-ssh-sshd_config.d /home/podman/etc-ssh-sshd_config-r
|
||||||
|
mv /home/podman/etc-ssh-sshd_config-r/sshd_config.d/ /home/podman/etc-ssh-sshd_config.d
|
||||||
|
ls /home/podman/etc-ssh-sshd_config.d
|
||||||
|
ls /home/podman/etc-ssh-sshd_config-r
|
||||||
|
rm -R /home/podman/etc-ssh-sshd_config-r
|
||||||
|
apt-install yazi -y
|
||||||
|
apt-get install yazi -y
|
||||||
|
apt install -y ffmpeg 7zip jq poppler-utils fd-find ripgrep fzf zoxide imagemagick
|
||||||
|
git clone https://github.com/sxyazi/yazi.git
|
||||||
|
apt install cargo
|
||||||
|
apt install make -y
|
||||||
|
make
|
||||||
|
gcc
|
||||||
|
apt install gcc -y
|
||||||
|
cat /tmp/yazi/Cargo.lock
|
||||||
|
cls
|
||||||
|
clear
|
||||||
|
cd yazi/
|
||||||
|
cargo build --release --locked
|
||||||
|
ls /home/podman/etc-ssh-sshd_config -ls
|
||||||
|
cp /etc/ssh/ssh_config /home/podman/etc-ssh-ssh_config
|
||||||
|
naon /home/podman/etc-ssh-ssh_config
|
||||||
|
nano /home/podman/etc-ssh-ssh_config
|
||||||
|
chown podman:podman /home/podman/etc-ssh-ssh_config
|
||||||
|
cd /tmp/
|
||||||
|
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/5608b233-a2f4-4018-aa70-570b0689b266/
|
||||||
|
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024
|
||||||
|
git fetch
|
||||||
|
rm -R original-to-deterministic-hash-code/
|
||||||
|
git clone https://51f44975c8734522b2dec36c6d9a116276c6bded@gitea.phares.duckdns.org/phares3757/original-to-deterministic-hash-code.git
|
||||||
|
cd original-to-deterministic-hash-code/
|
||||||
|
chown -R podman:podman original-to-deterministic-hash-code/
|
||||||
|
chown -R podman:podman /tmp/original-to-deterministic-hash-code/
|
||||||
|
chown -R podman:podman /tmp/original-to-deterministic-hash-code
|
||||||
|
chown -R podman:podman /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/
|
||||||
|
cat /root/.ssh/id_ed25519
|
||||||
|
cat /root/.ssh/id_ed25519.pub
|
||||||
|
cat /root/.ssh
|
||||||
|
ssh-copy-id
|
||||||
|
ssh-copy-id root
|
||||||
|
ls -la /root/.ssh
|
||||||
|
nano /var/snap/adguard-home/current/AdGuardHome.yaml
|
||||||
|
nano /etc/hostname
|
||||||
|
nano /etc/hosts
|
||||||
|
crontab -e
|
||||||
|
nano /root/.ssh/authorized_keys
|
||||||
|
cd /tmp
|
||||||
|
git clone https://github.com/acmesh-official/acme.sh.git
|
||||||
|
cd /tmp/acme.sh
|
||||||
|
./acme.sh --install -m mikepharesjr@msn.com
|
||||||
|
export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9
|
||||||
|
echo $DuckDNS_Token
|
||||||
|
./acme.sh --register-account -m mikepharesjr@msn.com
|
||||||
|
./acme.sh --set-default-ca --server letsencrypt
|
||||||
|
./acme.sh --issue --dns dns_duckdns -d '*.sumco.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
ls -la /ssl
|
||||||
|
ls -la /root/.acme.sh/\*.sumco.duckdns.org_ecc/
|
||||||
|
cp -R /root/.acme.sh/\*.sumco.duckdns.org_ecc/ /home/podman/wild-sumco
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.cer /home/podman/wild-sumco/sumco.duckdns.org.cer
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.conf /home/podman/wild-sumco/sumco.duckdns.org.conf
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr /home/podman/wild-sumco/sumco.duckdns.org.csr
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr.conf /home/podman/wild-sumco/sumco.duckdns.org.csr.conf
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.key /home/podman/wild-sumco/sumco.duckdns.org.key
|
||||||
|
chown -R podman:podman /home/podman/wild-sumco/
|
||||||
|
ls -la /home/podman/wild-sumco/
|
||||||
|
tail -f /var/log/nginx/access.log
|
||||||
|
nano /pod
|
||||||
|
cp /etc/nginx/include/actual.conf /etc/nginx/include/ha.conf
|
||||||
|
cp /etc/nginx/include/actual.conf /etc/nginx/include/nginx.conf
|
||||||
|
nano /etc/nginx/include/ha.conf
|
||||||
|
nginx
|
||||||
|
nano /etc/nginx/include/ha.conf
|
||||||
|
nano /etc/nginx/sites-available/default
|
||||||
|
nano /etc/nginx/include/nginx.conf
|
||||||
|
nano /root/.ssh/id_ed25519.pub
|
||||||
|
apt install apache2-utils
|
||||||
|
htpasswd -c /etc/nginx/.htpasswd phares
|
||||||
|
ls \var\snap\vaultwarden
|
||||||
|
ls /var/snap/vaultwarden/
|
||||||
|
ls /var/snap/vaultwarden -la
|
||||||
|
journalctl --rotate
|
||||||
|
journalctl --vacuum-time=1s
|
||||||
|
journalctl -u cockpit
|
||||||
|
nginx -t
|
||||||
|
nginx -s reload
|
||||||
|
sudo -iu podman
|
||||||
|
apt-get update
|
||||||
|
apt-get upgrade
|
||||||
|
ip -a
|
||||||
|
ip a
|
||||||
|
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
|
||||||
|
ncdu -o iso.json
|
||||||
|
exit
|
||||||
|
cd /mnt/
|
||||||
|
ncdu -f file.json
|
||||||
|
ncdu -o file.json
|
||||||
|
ls -la
|
||||||
|
mv file.json free-file-sync/proxmox/
|
||||||
|
cd /mnt/backup
|
||||||
|
cd .
|
||||||
|
cd /
|
||||||
|
cd /mnt/free-file-sync/iso/
|
||||||
|
ls
|
||||||
|
cd ..
|
||||||
|
rm -R iso/
|
||||||
|
ncdu
|
||||||
|
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
|
||||||
|
shutdown now
|
@ -2,8 +2,6 @@
|
|||||||
|
|
||||||
## Ubuntu and Docker End of July 2024
|
## Ubuntu and Docker End of July 2024
|
||||||
|
|
||||||
### Dashkiosk
|
|
||||||
|
|
||||||
### authorized_keys
|
### authorized_keys
|
||||||
|
|
||||||
```bash Thu Jul 25 2024 16:02:13 GMT-0700 (Mountain Standard Time)
|
```bash Thu Jul 25 2024 16:02:13 GMT-0700 (Mountain Standard Time)
|
||||||
@ -364,6 +362,20 @@ reboot
|
|||||||
nano /etc/default/grub
|
nano /etc/default/grub
|
||||||
```
|
```
|
||||||
|
|
||||||
|
```conf Fri Jul 26 2024 10:45:47 GMT-0700 (Mountain Standard Time)
|
||||||
|
# https://opensource.com/article/22/8/disable-ipv6
|
||||||
|
# GRUB_CMDLINE_LINUX_DEFAULT=""
|
||||||
|
GRUB_CMDLINE_LINUX_DEFAULT="ipv6.disable=1 quiet splash"
|
||||||
|
# GRUB_CMDLINE_LINUX=""
|
||||||
|
GRUB_CMDLINE_LINUX="ipv6.disable=1"
|
||||||
|
```
|
||||||
|
|
||||||
|
```bash Fri Jul 26 2024 10:45:51 GMT-0700 (Mountain Standard Time)
|
||||||
|
grub-mkconfig
|
||||||
|
exit
|
||||||
|
reboot
|
||||||
|
```
|
||||||
|
|
||||||
### Fix Unbond (Move up next time!!!)
|
### Fix Unbond (Move up next time!!!)
|
||||||
|
|
||||||
```conf Fri Jul 26 2024 10:45:41 GMT-0700 (Mountain Standard Time)
|
```conf Fri Jul 26 2024 10:45:41 GMT-0700 (Mountain Standard Time)
|
||||||
@ -379,20 +391,6 @@ systemctl disable --now unbound-resolvconf.service
|
|||||||
service unbound restart
|
service unbound restart
|
||||||
```
|
```
|
||||||
|
|
||||||
```conf Fri Jul 26 2024 10:45:47 GMT-0700 (Mountain Standard Time)
|
|
||||||
# https://opensource.com/article/22/8/disable-ipv6
|
|
||||||
# GRUB_CMDLINE_LINUX_DEFAULT=""
|
|
||||||
GRUB_CMDLINE_LINUX_DEFAULT="ipv6.disable=1 quiet splash"
|
|
||||||
# GRUB_CMDLINE_LINUX=""
|
|
||||||
GRUB_CMDLINE_LINUX="ipv6.disable=1"
|
|
||||||
```
|
|
||||||
|
|
||||||
```bash Fri Jul 26 2024 10:45:51 GMT-0700 (Mountain Standard Time)
|
|
||||||
grub-mkconfig
|
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
```
|
|
||||||
|
|
||||||
### Cockpit (Move up next time!!!)
|
### Cockpit (Move up next time!!!)
|
||||||
|
|
||||||
- [cockpit](https://cockpit-project.org/)
|
- [cockpit](https://cockpit-project.org/)
|
||||||
|
@ -1,39 +0,0 @@
|
|||||||
# Pi-hole: A black hole for Internet advertisements
|
|
||||||
# (c) 2017 Pi-hole, LLC (https://pi-hole.net)
|
|
||||||
# Network-wide ad blocking via your own hardware.
|
|
||||||
#
|
|
||||||
# Dnsmasq config for Pi-hole's FTLDNS
|
|
||||||
#
|
|
||||||
# This file is copyright under the latest version of the EUPL.
|
|
||||||
# Please see LICENSE file for your rights under this license.
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# FILE AUTOMATICALLY POPULATED BY PI-HOLE INSTALL/UPDATE PROCEDURE. #
|
|
||||||
# ANY CHANGES MADE TO THIS FILE AFTER INSTALL WILL BE LOST ON THE NEXT UPDATE #
|
|
||||||
# #
|
|
||||||
# IF YOU WISH TO CHANGE THE UPSTREAM SERVERS, CHANGE THEM IN: #
|
|
||||||
# /etc/pihole/setupVars.conf #
|
|
||||||
# #
|
|
||||||
# ANY OTHER CHANGES SHOULD BE MADE IN A SEPARATE CONFIG FILE #
|
|
||||||
# WITHIN /etc/dnsmasq.d/yourname.conf #
|
|
||||||
###############################################################################
|
|
||||||
|
|
||||||
addn-hosts=/etc/pihole/local.list
|
|
||||||
addn-hosts=/etc/pihole/custom.list
|
|
||||||
|
|
||||||
|
|
||||||
localise-queries
|
|
||||||
|
|
||||||
|
|
||||||
no-resolv
|
|
||||||
|
|
||||||
log-queries
|
|
||||||
log-facility=/var/log/pihole/pihole.log
|
|
||||||
|
|
||||||
log-async
|
|
||||||
cache-size=10000
|
|
||||||
server=127.0.0.1#5335
|
|
||||||
domain-needed
|
|
||||||
expand-hosts
|
|
||||||
bogus-priv
|
|
||||||
local-service
|
|
@ -1,42 +0,0 @@
|
|||||||
# Pi-hole: A black hole for Internet advertisements
|
|
||||||
# (c) 2021 Pi-hole, LLC (https://pi-hole.net)
|
|
||||||
# Network-wide ad blocking via your own hardware.
|
|
||||||
#
|
|
||||||
# RFC 6761 config file for Pi-hole
|
|
||||||
#
|
|
||||||
# This file is copyright under the latest version of the EUPL.
|
|
||||||
# Please see LICENSE file for your rights under this license.
|
|
||||||
|
|
||||||
###############################################################################
|
|
||||||
# FILE AUTOMATICALLY POPULATED BY PI-HOLE INSTALL/UPDATE PROCEDURE. #
|
|
||||||
# ANY CHANGES MADE TO THIS FILE AFTER INSTALL WILL BE LOST ON THE NEXT UPDATE #
|
|
||||||
# #
|
|
||||||
# CHANGES SHOULD BE MADE IN A SEPARATE CONFIG FILE #
|
|
||||||
# WITHIN /etc/dnsmasq.d/yourname.conf #
|
|
||||||
###############################################################################
|
|
||||||
|
|
||||||
# RFC 6761: Caching DNS servers SHOULD recognize
|
|
||||||
# test, localhost, invalid
|
|
||||||
# names as special and SHOULD NOT attempt to look up NS records for them, or
|
|
||||||
# otherwise query authoritative DNS servers in an attempt to resolve these
|
|
||||||
# names.
|
|
||||||
server=/test/
|
|
||||||
server=/localhost/
|
|
||||||
server=/invalid/
|
|
||||||
|
|
||||||
# The same RFC requests something similar for
|
|
||||||
# 10.in-addr.arpa. 21.172.in-addr.arpa. 27.172.in-addr.arpa.
|
|
||||||
# 16.172.in-addr.arpa. 22.172.in-addr.arpa. 28.172.in-addr.arpa.
|
|
||||||
# 17.172.in-addr.arpa. 23.172.in-addr.arpa. 29.172.in-addr.arpa.
|
|
||||||
# 18.172.in-addr.arpa. 24.172.in-addr.arpa. 30.172.in-addr.arpa.
|
|
||||||
# 19.172.in-addr.arpa. 25.172.in-addr.arpa. 31.172.in-addr.arpa.
|
|
||||||
# 20.172.in-addr.arpa. 26.172.in-addr.arpa. 168.192.in-addr.arpa.
|
|
||||||
# Pi-hole implements this via the dnsmasq option "bogus-priv" (see
|
|
||||||
# 01-pihole.conf) because this also covers IPv6.
|
|
||||||
|
|
||||||
# OpenWRT furthermore blocks bind, local, onion domains
|
|
||||||
# see https://git.openwrt.org/?p=openwrt/openwrt.git;a=blob_plain;f=package/network/services/dnsmasq/files/rfc6761.conf;hb=HEAD
|
|
||||||
# and https://www.iana.org/assignments/special-use-domain-names/special-use-domain-names.xhtml
|
|
||||||
# We do not include the ".local" rule ourselves, see https://github.com/pi-hole/pi-hole/pull/4282#discussion_r689112972
|
|
||||||
server=/bind/
|
|
||||||
server=/onion/
|
|
17
etc/group
17
etc/group
@ -34,7 +34,7 @@ sasl:x:45:
|
|||||||
plugdev:x:46:phares
|
plugdev:x:46:phares
|
||||||
staff:x:50:
|
staff:x:50:
|
||||||
games:x:60:
|
games:x:60:
|
||||||
users:x:100:pihole,podman,lphares,bmiller
|
users:x:100:podman,lphares,bmiller,persa
|
||||||
nogroup:x:65534:
|
nogroup:x:65534:
|
||||||
systemd-journal:x:999:
|
systemd-journal:x:999:
|
||||||
systemd-network:x:998:
|
systemd-network:x:998:
|
||||||
@ -57,11 +57,18 @@ tss:x:108:
|
|||||||
landscape:x:109:
|
landscape:x:109:
|
||||||
fwupd-refresh:x:989:
|
fwupd-refresh:x:989:
|
||||||
netdev:x:110:
|
netdev:x:110:
|
||||||
phares:x:1000:
|
phares:x:1001:
|
||||||
pihole:x:1001:www-data
|
podman:x:1000:
|
||||||
podman:x:1002:
|
lphares:x:1003:bmiller,persa,www-data
|
||||||
lphares:x:1003:bmiller
|
|
||||||
bmiller:x:1004:
|
bmiller:x:1004:
|
||||||
unbound:x:111:
|
unbound:x:111:
|
||||||
cockpit-ws:x:112:
|
cockpit-ws:x:112:
|
||||||
cockpit-wsinstance:x:113:
|
cockpit-wsinstance:x:113:
|
||||||
|
pcp:x:988:
|
||||||
|
persa:x:1002:
|
||||||
|
redis:x:114:
|
||||||
|
swtpm:x:115:
|
||||||
|
libvirt:x:116:phares,podman,libvirtdbus
|
||||||
|
libvirt-qemu:x:64055:libvirt-qemu
|
||||||
|
libvirt-dnsmasq:x:117:
|
||||||
|
libvirtdbus:x:118:
|
||||||
|
18
etc/group-
18
etc/group-
@ -34,7 +34,7 @@ sasl:x:45:
|
|||||||
plugdev:x:46:phares
|
plugdev:x:46:phares
|
||||||
staff:x:50:
|
staff:x:50:
|
||||||
games:x:60:
|
games:x:60:
|
||||||
users:x:100:pihole,podman,lphares,bmiller
|
users:x:100:podman,lphares,bmiller,persa
|
||||||
nogroup:x:65534:
|
nogroup:x:65534:
|
||||||
systemd-journal:x:999:
|
systemd-journal:x:999:
|
||||||
systemd-network:x:998:
|
systemd-network:x:998:
|
||||||
@ -57,10 +57,18 @@ tss:x:108:
|
|||||||
landscape:x:109:
|
landscape:x:109:
|
||||||
fwupd-refresh:x:989:
|
fwupd-refresh:x:989:
|
||||||
netdev:x:110:
|
netdev:x:110:
|
||||||
phares:x:1000:
|
phares:x:1001:
|
||||||
pihole:x:1001:www-data
|
podman:x:1000:
|
||||||
podman:x:1002:
|
lphares:x:1003:bmiller,persa
|
||||||
lphares:x:1003:bmiller
|
|
||||||
bmiller:x:1004:
|
bmiller:x:1004:
|
||||||
unbound:x:111:
|
unbound:x:111:
|
||||||
cockpit-ws:x:112:
|
cockpit-ws:x:112:
|
||||||
|
cockpit-wsinstance:x:113:
|
||||||
|
pcp:x:988:
|
||||||
|
persa:x:1002:
|
||||||
|
redis:x:114:
|
||||||
|
swtpm:x:115:
|
||||||
|
libvirt:x:116:phares,podman,libvirtdbus
|
||||||
|
libvirt-qemu:x:64055:libvirt-qemu
|
||||||
|
libvirt-dnsmasq:x:117:
|
||||||
|
libvirtdbus:x:118:
|
||||||
|
13
etc/gshadow
13
etc/gshadow
@ -34,7 +34,7 @@ sasl:*::
|
|||||||
plugdev:*::phares
|
plugdev:*::phares
|
||||||
staff:*::
|
staff:*::
|
||||||
games:*::
|
games:*::
|
||||||
users:*::pihole,podman,lphares,bmiller
|
users:*::podman,lphares,bmiller,persa
|
||||||
nogroup:*::
|
nogroup:*::
|
||||||
systemd-journal:!*::
|
systemd-journal:!*::
|
||||||
systemd-network:!*::
|
systemd-network:!*::
|
||||||
@ -58,10 +58,17 @@ landscape:!::
|
|||||||
fwupd-refresh:!*::
|
fwupd-refresh:!*::
|
||||||
netdev:!::
|
netdev:!::
|
||||||
phares:!::
|
phares:!::
|
||||||
pihole:!::www-data
|
|
||||||
podman:!::
|
podman:!::
|
||||||
lphares:!::bmiller
|
lphares:!::bmiller,persa,www-data
|
||||||
bmiller:!::
|
bmiller:!::
|
||||||
unbound:!::
|
unbound:!::
|
||||||
cockpit-ws:!::
|
cockpit-ws:!::
|
||||||
cockpit-wsinstance:!::
|
cockpit-wsinstance:!::
|
||||||
|
pcp:!::
|
||||||
|
persa:!::
|
||||||
|
redis:!::
|
||||||
|
swtpm:!::
|
||||||
|
libvirt:!::phares,podman,libvirtdbus
|
||||||
|
libvirt-qemu:!::libvirt-qemu
|
||||||
|
libvirt-dnsmasq:!::
|
||||||
|
libvirtdbus:!::
|
||||||
|
14
etc/gshadow-
14
etc/gshadow-
@ -34,7 +34,7 @@ sasl:*::
|
|||||||
plugdev:*::phares
|
plugdev:*::phares
|
||||||
staff:*::
|
staff:*::
|
||||||
games:*::
|
games:*::
|
||||||
users:*::pihole,podman,lphares,bmiller
|
users:*::podman,lphares,bmiller,persa
|
||||||
nogroup:*::
|
nogroup:*::
|
||||||
systemd-journal:!*::
|
systemd-journal:!*::
|
||||||
systemd-network:!*::
|
systemd-network:!*::
|
||||||
@ -58,9 +58,17 @@ landscape:!::
|
|||||||
fwupd-refresh:!*::
|
fwupd-refresh:!*::
|
||||||
netdev:!::
|
netdev:!::
|
||||||
phares:!::
|
phares:!::
|
||||||
pihole:!::www-data
|
|
||||||
podman:!::
|
podman:!::
|
||||||
lphares:!::bmiller
|
lphares:!::bmiller,persa
|
||||||
bmiller:!::
|
bmiller:!::
|
||||||
unbound:!::
|
unbound:!::
|
||||||
cockpit-ws:!::
|
cockpit-ws:!::
|
||||||
|
cockpit-wsinstance:!::
|
||||||
|
pcp:!::
|
||||||
|
persa:!::
|
||||||
|
redis:!::
|
||||||
|
swtpm:!::
|
||||||
|
libvirt:!::phares,podman,libvirtdbus
|
||||||
|
libvirt-qemu:!::libvirt-qemu
|
||||||
|
libvirt-dnsmasq:!::
|
||||||
|
libvirtdbus:!::
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
127.0.0.1 localhost
|
127.0.0.1 localhost
|
||||||
127.0.1.1 beelink
|
127.0.1.1 phares.duckdns.org
|
||||||
|
|
||||||
# The following lines are desirable for IPv6 capable hosts
|
# The following lines are desirable for IPv6 capable hosts
|
||||||
::1 ip6-localhost ip6-loopback
|
::1 ip6-localhost ip6-loopback
|
||||||
|
21
etc/letsencrypt/archive/gitea.jumpingcrab.com/cert1.pem
Normal file
21
etc/letsencrypt/archive/gitea.jumpingcrab.com/cert1.pem
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDjDCCAxKgAwIBAgISBMFGragC9OgIAiG4P5naLK3mMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NjAeFw0yNTAxMTMyMDQxMTFaFw0yNTA0MTMyMDQxMTBaMCAxHjAcBgNVBAMTFWdp
|
||||||
|
dGVhLmp1bXBpbmdjcmFiLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMxa
|
||||||
|
tycX56D91JSQtdSYG/pPlyqrlka+qhfoYd4IzEjz23n3aqbdHWp4kzKgfdfo99vJ
|
||||||
|
16AAUgK4LV2eWk6ZddijggIYMIICFDAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYw
|
||||||
|
FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFN/q
|
||||||
|
GV5U2yPWTWBmlfvAp0crrMC0MB8GA1UdIwQYMBaAFJMnRpgDqVFojpjWxEJI2yO/
|
||||||
|
WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2Lm8ubGVu
|
||||||
|
Y3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcvMCAGA1Ud
|
||||||
|
EQQZMBeCFWdpdGVhLmp1bXBpbmdjcmFiLmNvbTATBgNVHSAEDDAKMAgGBmeBDAEC
|
||||||
|
ATCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB3AN6FgddQJHxrzcuvVjfF54HGTORu
|
||||||
|
1hdjn480pybJ4r03AAABlGGbth0AAAQDAEgwRgIhAKS2r6FtEv17AjuJYICWvsK7
|
||||||
|
R54pf8/pJL5UGIhy23UkAiEAn2DdIAEg5o1g8ULtoG2mUYt+YTbDBdH1coEoe/Cd
|
||||||
|
XRoAdgDPEVbu1S58r/OHW9lpLpvpGnFnSrAX7KwB0lt3zsw7CAAAAZRhm7ZHAAAE
|
||||||
|
AwBHMEUCIGuSi8pZgdi3bLYsYg+a44ZYSQM2YSDdhau+P+V2m8DaAiEA4fqy8KEg
|
||||||
|
S9vH8b9B+Gz+i5dRKchD1S4ydzOdhZTR1DMwCgYIKoZIzj0EAwMDaAAwZQIxANUl
|
||||||
|
PQW7UOTQOgd0KKqZeygvPCY7qvSr6V2ZR2Yx6e4wXt9i/bhXVjNvYMyffCjh1gIw
|
||||||
|
ETtUf366hIClR7HmTjEG3vdjinqgVKvkAZqufAPnijbKKtnsNXhACWl18UXngBG6
|
||||||
|
-----END CERTIFICATE-----
|
26
etc/letsencrypt/archive/gitea.jumpingcrab.com/chain1.pem
Normal file
26
etc/letsencrypt/archive/gitea.jumpingcrab.com/chain1.pem
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||||
|
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||||
|
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||||
|
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||||
|
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||||
|
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||||
|
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||||
|
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||||
|
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||||
|
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||||
|
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||||
|
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||||
|
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||||
|
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||||
|
Ig46v9mFmBvyH04=
|
||||||
|
-----END CERTIFICATE-----
|
47
etc/letsencrypt/archive/gitea.jumpingcrab.com/fullchain1.pem
Normal file
47
etc/letsencrypt/archive/gitea.jumpingcrab.com/fullchain1.pem
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDjDCCAxKgAwIBAgISBMFGragC9OgIAiG4P5naLK3mMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NjAeFw0yNTAxMTMyMDQxMTFaFw0yNTA0MTMyMDQxMTBaMCAxHjAcBgNVBAMTFWdp
|
||||||
|
dGVhLmp1bXBpbmdjcmFiLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMxa
|
||||||
|
tycX56D91JSQtdSYG/pPlyqrlka+qhfoYd4IzEjz23n3aqbdHWp4kzKgfdfo99vJ
|
||||||
|
16AAUgK4LV2eWk6ZddijggIYMIICFDAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYw
|
||||||
|
FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFN/q
|
||||||
|
GV5U2yPWTWBmlfvAp0crrMC0MB8GA1UdIwQYMBaAFJMnRpgDqVFojpjWxEJI2yO/
|
||||||
|
WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2Lm8ubGVu
|
||||||
|
Y3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcvMCAGA1Ud
|
||||||
|
EQQZMBeCFWdpdGVhLmp1bXBpbmdjcmFiLmNvbTATBgNVHSAEDDAKMAgGBmeBDAEC
|
||||||
|
ATCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB3AN6FgddQJHxrzcuvVjfF54HGTORu
|
||||||
|
1hdjn480pybJ4r03AAABlGGbth0AAAQDAEgwRgIhAKS2r6FtEv17AjuJYICWvsK7
|
||||||
|
R54pf8/pJL5UGIhy23UkAiEAn2DdIAEg5o1g8ULtoG2mUYt+YTbDBdH1coEoe/Cd
|
||||||
|
XRoAdgDPEVbu1S58r/OHW9lpLpvpGnFnSrAX7KwB0lt3zsw7CAAAAZRhm7ZHAAAE
|
||||||
|
AwBHMEUCIGuSi8pZgdi3bLYsYg+a44ZYSQM2YSDdhau+P+V2m8DaAiEA4fqy8KEg
|
||||||
|
S9vH8b9B+Gz+i5dRKchD1S4ydzOdhZTR1DMwCgYIKoZIzj0EAwMDaAAwZQIxANUl
|
||||||
|
PQW7UOTQOgd0KKqZeygvPCY7qvSr6V2ZR2Yx6e4wXt9i/bhXVjNvYMyffCjh1gIw
|
||||||
|
ETtUf366hIClR7HmTjEG3vdjinqgVKvkAZqufAPnijbKKtnsNXhACWl18UXngBG6
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||||
|
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||||
|
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||||
|
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||||
|
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||||
|
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||||
|
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||||
|
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||||
|
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||||
|
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||||
|
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||||
|
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||||
|
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||||
|
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||||
|
Ig46v9mFmBvyH04=
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,5 @@
|
|||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEIOJMe824fldC1I31j9QPXW2rqnkUK+EzwImja0V5U4dioAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAEzFq3JxfnoP3UlJC11Jgb+k+XKquWRr6qF+hh3gjMSPPbefdqpt0d
|
||||||
|
aniTMqB91+j328nXoABSArgtXZ5aTpl12A==
|
||||||
|
-----END EC PRIVATE KEY-----
|
@ -0,0 +1,22 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDmDCCAx2gAwIBAgISBNrhyPO9lURJq4y8TIOmcZinMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NjAeFw0yNTAxMTMxOTU4NTRaFw0yNTA0MTMxOTU4NTNaMCYxJDAiBgNVBAMTG2dp
|
||||||
|
dGVhLnBoYXJlcy5yZWRpcmVjdG1lLm5ldDBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||||
|
A0IABOqlBmpoQ7TPHnoZaMTrwcx53iahLDpybzAWCZZFr50Ser3tQw060EtC//7k
|
||||||
|
pE1JN3ANVfZxfM1L3LhQW+EzpVKjggIdMIICGTAOBgNVHQ8BAf8EBAMCB4AwHQYD
|
||||||
|
VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O
|
||||||
|
BBYEFMdzVvO/xfepKV9aYkOlfpu3HK8vMB8GA1UdIwQYMBaAFJMnRpgDqVFojpjW
|
||||||
|
xEJI2yO/WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2
|
||||||
|
Lm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcv
|
||||||
|
MCYGA1UdEQQfMB2CG2dpdGVhLnBoYXJlcy5yZWRpcmVjdG1lLm5ldDATBgNVHSAE
|
||||||
|
DDAKMAgGBmeBDAECATCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB1AM8RVu7VLnyv
|
||||||
|
84db2Wkum+kacWdKsBfsrAHSW3fOzDsIAAABlGF0/SEAAAQDAEYwRAIgWBCl2+1d
|
||||||
|
/RKxIOoy3hBIj8NU6gUXRhGdvD0mtlt6BNoCIHOitA5tz2bRHIfI8XoUPBgG1w66
|
||||||
|
kfAvq2g4/Lkr+2+MAHcA4JKz/AwdyOdoNh/eYbmWTQpSeBmKctZyxLBNpW1vVAQA
|
||||||
|
AAGUYXT9lwAABAMASDBGAiEA+n9nrUsAEONOgh12+m16djdSnPdCOs6k7uhXvxv2
|
||||||
|
ENECIQDKodCwTeNIN7AqMWGXP2zcxHsst4sFjM449Hdk1NdjSDAKBggqhkjOPQQD
|
||||||
|
AwNpADBmAjEAtLOSbXY3QES7JgOMUBJYOypax4o2fH+VAeCvfZSSMYwGWKf2x3GR
|
||||||
|
yL+gqJrn0b1MAjEA9oxyQCGzjIH67qBJGlmp4DOI3N14Ml7kkQZeJ4JmdeexQjVc
|
||||||
|
QElF18a/Ngw3qS4D
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,26 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||||
|
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||||
|
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||||
|
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||||
|
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||||
|
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||||
|
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||||
|
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||||
|
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||||
|
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||||
|
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||||
|
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||||
|
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||||
|
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||||
|
Ig46v9mFmBvyH04=
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,48 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDmDCCAx2gAwIBAgISBNrhyPO9lURJq4y8TIOmcZinMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NjAeFw0yNTAxMTMxOTU4NTRaFw0yNTA0MTMxOTU4NTNaMCYxJDAiBgNVBAMTG2dp
|
||||||
|
dGVhLnBoYXJlcy5yZWRpcmVjdG1lLm5ldDBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||||
|
A0IABOqlBmpoQ7TPHnoZaMTrwcx53iahLDpybzAWCZZFr50Ser3tQw060EtC//7k
|
||||||
|
pE1JN3ANVfZxfM1L3LhQW+EzpVKjggIdMIICGTAOBgNVHQ8BAf8EBAMCB4AwHQYD
|
||||||
|
VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O
|
||||||
|
BBYEFMdzVvO/xfepKV9aYkOlfpu3HK8vMB8GA1UdIwQYMBaAFJMnRpgDqVFojpjW
|
||||||
|
xEJI2yO/WJTSMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL2U2
|
||||||
|
Lm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vZTYuaS5sZW5jci5vcmcv
|
||||||
|
MCYGA1UdEQQfMB2CG2dpdGVhLnBoYXJlcy5yZWRpcmVjdG1lLm5ldDATBgNVHSAE
|
||||||
|
DDAKMAgGBmeBDAECATCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB1AM8RVu7VLnyv
|
||||||
|
84db2Wkum+kacWdKsBfsrAHSW3fOzDsIAAABlGF0/SEAAAQDAEYwRAIgWBCl2+1d
|
||||||
|
/RKxIOoy3hBIj8NU6gUXRhGdvD0mtlt6BNoCIHOitA5tz2bRHIfI8XoUPBgG1w66
|
||||||
|
kfAvq2g4/Lkr+2+MAHcA4JKz/AwdyOdoNh/eYbmWTQpSeBmKctZyxLBNpW1vVAQA
|
||||||
|
AAGUYXT9lwAABAMASDBGAiEA+n9nrUsAEONOgh12+m16djdSnPdCOs6k7uhXvxv2
|
||||||
|
ENECIQDKodCwTeNIN7AqMWGXP2zcxHsst4sFjM449Hdk1NdjSDAKBggqhkjOPQQD
|
||||||
|
AwNpADBmAjEAtLOSbXY3QES7JgOMUBJYOypax4o2fH+VAeCvfZSSMYwGWKf2x3GR
|
||||||
|
yL+gqJrn0b1MAjEA9oxyQCGzjIH67qBJGlmp4DOI3N14Ml7kkQZeJ4JmdeexQjVc
|
||||||
|
QElF18a/Ngw3qS4D
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||||
|
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||||
|
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||||
|
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||||
|
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||||
|
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||||
|
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||||
|
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||||
|
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||||
|
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||||
|
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||||
|
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||||
|
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||||
|
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||||
|
Ig46v9mFmBvyH04=
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,5 @@
|
|||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEILSambH2O8RFkT6eZn+bwQQ2oB6AFtjkHKsC+t0eWflroAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAE6qUGamhDtM8eehloxOvBzHneJqEsOnJvMBYJlkWvnRJ6ve1DDTrQ
|
||||||
|
S0L//uSkTUk3cA1V9nF8zUvcuFBb4TOlUg==
|
||||||
|
-----END EC PRIVATE KEY-----
|
22
etc/letsencrypt/archive/gitea.phares3757.ddns.net/cert1.pem
Normal file
22
etc/letsencrypt/archive/gitea.phares3757.ddns.net/cert1.pem
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDkTCCAxigAwIBAgISA84Tzt2T/OnITRhOVEVQQnpqMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NTAeFw0yNTAxMTMxOTU3MzlaFw0yNTA0MTMxOTU3MzhaMCQxIjAgBgNVBAMTGWdp
|
||||||
|
dGVhLnBoYXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
||||||
|
AATZO9CC5BKrZD48/oCt4GBwB4VUUC2YqQ1en+gAEf6VQmGle3d0LIDz2Htj7YDc
|
||||||
|
Mi+LfHoTetMdBZ3AkHdPfiSko4ICGjCCAhYwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
|
||||||
|
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
|
||||||
|
BBSn8ip83SQYa2IBACHAIrXq5Y3HwzAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37Sss
|
||||||
|
xMZwi9LXDTBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5v
|
||||||
|
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzAk
|
||||||
|
BgNVHREEHTAbghlnaXRlYS5waGFyZXMzNzU3LmRkbnMubmV0MBMGA1UdIAQMMAow
|
||||||
|
CAYGZ4EMAQIBMIIBAwYKKwYBBAHWeQIEAgSB9ASB8QDvAHYA3oWB11AkfGvNy69W
|
||||||
|
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYXPZOQAABAMARzBFAiEA2UyYzjMITIYL
|
||||||
|
335nk+mnTgVXH8GaAr5HHDVIx8FXwzUCIEfMHAQwAp/1NIGood7c5XaPD1V67qe2
|
||||||
|
xs70tDAC62gOAHUATnWjJ1yaEMM4W2zU3z9S6x3w4I4bjWnAsfpksWKaOd8AAAGU
|
||||||
|
YXPZOAAABAMARjBEAiBAqRtkyRrpLLqZEVQ1UyMOR+40BlDeUjhYEEIzdizH2gIg
|
||||||
|
Lv8Rm+yvyToL81CmVRxT7pI58JsHEyt/y3LOr7MwVCQwCgYIKoZIzj0EAwMDZwAw
|
||||||
|
ZAIweZ1tC6rNSS4tFpv/oMM7NpnpBqLlOMvyRRWP2IwOqK3KfT89kDEueu4VPbl9
|
||||||
|
sCkZAjBFlsSvVwP3/ZSN3SA1G6OrHtoa6G2e37y+CD/mgrD/gegtn6ysqmqpVbAZ
|
||||||
|
Rap1c5A=
|
||||||
|
-----END CERTIFICATE-----
|
26
etc/letsencrypt/archive/gitea.phares3757.ddns.net/chain1.pem
Normal file
26
etc/letsencrypt/archive/gitea.phares3757.ddns.net/chain1.pem
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK
|
||||||
|
a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO
|
||||||
|
VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw
|
||||||
|
i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C
|
||||||
|
2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+
|
||||||
|
bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG
|
||||||
|
6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV
|
||||||
|
XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO
|
||||||
|
koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq
|
||||||
|
cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI
|
||||||
|
E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e
|
||||||
|
K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX
|
||||||
|
GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL
|
||||||
|
sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd
|
||||||
|
VQD9F6Na/+zmXCc=
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,48 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDkTCCAxigAwIBAgISA84Tzt2T/OnITRhOVEVQQnpqMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NTAeFw0yNTAxMTMxOTU3MzlaFw0yNTA0MTMxOTU3MzhaMCQxIjAgBgNVBAMTGWdp
|
||||||
|
dGVhLnBoYXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
||||||
|
AATZO9CC5BKrZD48/oCt4GBwB4VUUC2YqQ1en+gAEf6VQmGle3d0LIDz2Htj7YDc
|
||||||
|
Mi+LfHoTetMdBZ3AkHdPfiSko4ICGjCCAhYwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
|
||||||
|
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
|
||||||
|
BBSn8ip83SQYa2IBACHAIrXq5Y3HwzAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37Sss
|
||||||
|
xMZwi9LXDTBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5v
|
||||||
|
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzAk
|
||||||
|
BgNVHREEHTAbghlnaXRlYS5waGFyZXMzNzU3LmRkbnMubmV0MBMGA1UdIAQMMAow
|
||||||
|
CAYGZ4EMAQIBMIIBAwYKKwYBBAHWeQIEAgSB9ASB8QDvAHYA3oWB11AkfGvNy69W
|
||||||
|
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYXPZOQAABAMARzBFAiEA2UyYzjMITIYL
|
||||||
|
335nk+mnTgVXH8GaAr5HHDVIx8FXwzUCIEfMHAQwAp/1NIGood7c5XaPD1V67qe2
|
||||||
|
xs70tDAC62gOAHUATnWjJ1yaEMM4W2zU3z9S6x3w4I4bjWnAsfpksWKaOd8AAAGU
|
||||||
|
YXPZOAAABAMARjBEAiBAqRtkyRrpLLqZEVQ1UyMOR+40BlDeUjhYEEIzdizH2gIg
|
||||||
|
Lv8Rm+yvyToL81CmVRxT7pI58JsHEyt/y3LOr7MwVCQwCgYIKoZIzj0EAwMDZwAw
|
||||||
|
ZAIweZ1tC6rNSS4tFpv/oMM7NpnpBqLlOMvyRRWP2IwOqK3KfT89kDEueu4VPbl9
|
||||||
|
sCkZAjBFlsSvVwP3/ZSN3SA1G6OrHtoa6G2e37y+CD/mgrD/gegtn6ysqmqpVbAZ
|
||||||
|
Rap1c5A=
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK
|
||||||
|
a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO
|
||||||
|
VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw
|
||||||
|
i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C
|
||||||
|
2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+
|
||||||
|
bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG
|
||||||
|
6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV
|
||||||
|
XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO
|
||||||
|
koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq
|
||||||
|
cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI
|
||||||
|
E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e
|
||||||
|
K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX
|
||||||
|
GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL
|
||||||
|
sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd
|
||||||
|
VQD9F6Na/+zmXCc=
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,5 @@
|
|||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEICp+cx+weOdcPOsxTzhwkByo3hGKxTBrHBXiKjWAg6IqoAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAE2TvQguQSq2Q+PP6AreBgcAeFVFAtmKkNXp/oABH+lUJhpXt3dCyA
|
||||||
|
89h7Y+2A3DIvi3x6E3rTHQWdwJB3T34kpA==
|
||||||
|
-----END EC PRIVATE KEY-----
|
22
etc/letsencrypt/archive/gitea.twilightparadox.com/cert1.pem
Normal file
22
etc/letsencrypt/archive/gitea.twilightparadox.com/cert1.pem
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDlDCCAxqgAwIBAgISA3Ok6Ntju67loYMAKR/g+jLeMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NjAeFw0yNTAxMTMyMDQwMzFaFw0yNTA0MTMyMDQwMzBaMCQxIjAgBgNVBAMTGWdp
|
||||||
|
dGVhLnR3aWxpZ2h0cGFyYWRveC5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
||||||
|
AAQVdWh6MowWiRToNvHG28xfT+1oTn2xrA0FISfw24MLIaKPRIQK46EwNhZ0qoja
|
||||||
|
mMWWlT7e3ehDGyzVxToczVxno4ICHDCCAhgwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
|
||||||
|
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
|
||||||
|
BBTJ3cuhp8zFW76E3iky8x9/qEZVmzAfBgNVHSMEGDAWgBSTJ0aYA6lRaI6Y1sRC
|
||||||
|
SNsjv1iU0jBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNi5v
|
||||||
|
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U2LmkubGVuY3Iub3JnLzAk
|
||||||
|
BgNVHREEHTAbghlnaXRlYS50d2lsaWdodHBhcmFkb3guY29tMBMGA1UdIAQMMAow
|
||||||
|
CAYGZ4EMAQIBMIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHcA3oWB11AkfGvNy69W
|
||||||
|
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYZsYPgAABAMASDBGAiEAhkETK0ZiN8tB
|
||||||
|
3hjE6rySGk3wp4X8SqXepvnXMyY9j80CIQC65yd+ajVHVPytJW1ved+27893Vi0r
|
||||||
|
pwLYDkstSWym+wB2AMz7D2qFcQll/pWbU87psnwi6YVcDZeNtql+VMD+TA2wAAAB
|
||||||
|
lGGbGEwAAAQDAEcwRQIgHA5eiA3Sw93hrOX2I/3CPsLGGTd+Dp8JC9xooozQi+kC
|
||||||
|
IQCwwikwSLbNPHHf6A9MUiQZWcTbY1l6fGsY8z/PdYVw/TAKBggqhkjOPQQDAwNo
|
||||||
|
ADBlAjAybTS423x/olK67bsVMuv2g5moz/g2o3Ty3brMkOZZXGqeqZ1f2KoGfWuo
|
||||||
|
k+uF5wMCMQCGu8qFcofoKl+IUtyLfn9vyq/lOHA7vorqZx4he+eY/aY8VuCdDUCU
|
||||||
|
a70klI5vl7U=
|
||||||
|
-----END CERTIFICATE-----
|
26
etc/letsencrypt/archive/gitea.twilightparadox.com/chain1.pem
Normal file
26
etc/letsencrypt/archive/gitea.twilightparadox.com/chain1.pem
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||||
|
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||||
|
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||||
|
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||||
|
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||||
|
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||||
|
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||||
|
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||||
|
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||||
|
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||||
|
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||||
|
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||||
|
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||||
|
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||||
|
Ig46v9mFmBvyH04=
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,48 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDlDCCAxqgAwIBAgISA3Ok6Ntju67loYMAKR/g+jLeMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NjAeFw0yNTAxMTMyMDQwMzFaFw0yNTA0MTMyMDQwMzBaMCQxIjAgBgNVBAMTGWdp
|
||||||
|
dGVhLnR3aWxpZ2h0cGFyYWRveC5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
||||||
|
AAQVdWh6MowWiRToNvHG28xfT+1oTn2xrA0FISfw24MLIaKPRIQK46EwNhZ0qoja
|
||||||
|
mMWWlT7e3ehDGyzVxToczVxno4ICHDCCAhgwDgYDVR0PAQH/BAQDAgeAMB0GA1Ud
|
||||||
|
JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW
|
||||||
|
BBTJ3cuhp8zFW76E3iky8x9/qEZVmzAfBgNVHSMEGDAWgBSTJ0aYA6lRaI6Y1sRC
|
||||||
|
SNsjv1iU0jBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNi5v
|
||||||
|
LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U2LmkubGVuY3Iub3JnLzAk
|
||||||
|
BgNVHREEHTAbghlnaXRlYS50d2lsaWdodHBhcmFkb3guY29tMBMGA1UdIAQMMAow
|
||||||
|
CAYGZ4EMAQIBMIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHcA3oWB11AkfGvNy69W
|
||||||
|
N8XngcZM5G7WF2OfjzSnJsnivTcAAAGUYZsYPgAABAMASDBGAiEAhkETK0ZiN8tB
|
||||||
|
3hjE6rySGk3wp4X8SqXepvnXMyY9j80CIQC65yd+ajVHVPytJW1ved+27893Vi0r
|
||||||
|
pwLYDkstSWym+wB2AMz7D2qFcQll/pWbU87psnwi6YVcDZeNtql+VMD+TA2wAAAB
|
||||||
|
lGGbGEwAAAQDAEcwRQIgHA5eiA3Sw93hrOX2I/3CPsLGGTd+Dp8JC9xooozQi+kC
|
||||||
|
IQCwwikwSLbNPHHf6A9MUiQZWcTbY1l6fGsY8z/PdYVw/TAKBggqhkjOPQQDAwNo
|
||||||
|
ADBlAjAybTS423x/olK67bsVMuv2g5moz/g2o3Ty3brMkOZZXGqeqZ1f2KoGfWuo
|
||||||
|
k+uF5wMCMQCGu8qFcofoKl+IUtyLfn9vyq/lOHA7vorqZx4he+eY/aY8VuCdDUCU
|
||||||
|
a70klI5vl7U=
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||||
|
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||||
|
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||||
|
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||||
|
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||||
|
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||||
|
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||||
|
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||||
|
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||||
|
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||||
|
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||||
|
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||||
|
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||||
|
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||||
|
Ig46v9mFmBvyH04=
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,5 @@
|
|||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEIKZQjFNsE08Z94g8u3DeGSogHW7nidfFzJY4MjF3s1UfoAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAEFXVoejKMFokU6DbxxtvMX0/taE59sawNBSEn8NuDCyGij0SECuOh
|
||||||
|
MDYWdKqI2pjFlpU+3t3oQxss1cU6HM1cZw==
|
||||||
|
-----END EC PRIVATE KEY-----
|
28
etc/letsencrypt/archive/phares3757.ddns.net/cert2.pem
Normal file
28
etc/letsencrypt/archive/phares3757.ddns.net/cert2.pem
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEvTCCBEOgAwIBAgISA8Rpfo5CToGTmLm5xS3DeDfoMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NjAeFw0yNDA4MDUyMTM3MDRaFw0yNDExMDMyMTM3MDNaMB4xHDAaBgNVBAMTE3Bo
|
||||||
|
YXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQPJlBf
|
||||||
|
3XfrNcWGKQcOH9xS1X9UcBSiyFIva+mn524DDCYpB2aSLpEY1JdqGnbnDn0kBGgY
|
||||||
|
ZG5AoTspEWQvkn34o4IDSzCCA0cwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQG
|
||||||
|
CCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSbfnI9
|
||||||
|
DTkeKYqQTpJvsEmrG209UTAfBgNVHSMEGDAWgBSTJ0aYA6lRaI6Y1sRCSNsjv1iU
|
||||||
|
0jBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNi5vLmxlbmNy
|
||||||
|
Lm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U2LmkubGVuY3Iub3JnLzCCAVIGA1Ud
|
||||||
|
EQSCAUkwggFFgg9hZmZpcm0uZGRucy5uZXSCF2NoYXQucGhhcmVzLmR1Y2tkbnMu
|
||||||
|
b3Jnghhkcml2ZS5waGFyZXMuZHVja2Rucy5vcmeCGGdpdGVhLnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4IVaGEucGhhcmVzLmR1Y2tkbnMub3JnghlpbW1pY2gucGhhcmVzLmR1
|
||||||
|
Y2tkbnMub3JnghhtdXNpYy5waGFyZXMuZHVja2Rucy5vcmeCEnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4ITcGhhcmVzMzc1Ny5kZG5zLm5ldIIZcGhvdG9zLnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4IZcXVhcnR6LnBoYXJlcy5kdWNrZG5zLm9yZ4IadHJhY2Nhci5waGFy
|
||||||
|
ZXMuZHVja2Rucy5vcmeCHnZhdWx0d2FyZGVuLnBoYXJlcy5kdWNrZG5zLm9yZzAT
|
||||||
|
BgNVHSAEDDAKMAgGBmeBDAECATCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB2AD8X
|
||||||
|
S0/XIkdYlB1lHIS+DRLtkDd/H4Vq68G/KIXs+GRuAAABkSSvAAsAAAQDAEcwRQIg
|
||||||
|
JDDuoD1dGwEJXVMv6ejxDSA5egmmYy4+j5+CqWyAch4CIQD6azMSASbZZ/+63NoR
|
||||||
|
igd/G/woCeUvJJkNFfsqmeCFNQB2AO7N0GTV2xrOxVy3nbTNE6Iyh0Z8vOzew1FI
|
||||||
|
WUZxH7WbAAABkSSvAAYAAAQDAEcwRQIhALl/GZSFMEMfiR0OvlHMxQQFl6+q8vuS
|
||||||
|
bFo/u9BCK0OZAiB02RbuxpKCvSXLAwKIzYnmsy+t3ip0mKKrRyx42Kz82DAKBggq
|
||||||
|
hkjOPQQDAwNoADBlAjEAvBDbAOHHkTzjxYKmNrJ1NDBv+rjjszQbLvrqPKij8YO5
|
||||||
|
rdvW1ty2j0oQbKLiX8T2AjBgZhfrlHHRXOTYYwao5Sf1b3dNfFcv0be+aQjMTHWF
|
||||||
|
A3WZcUHjqZsHHqeaZiWgzlw=
|
||||||
|
-----END CERTIFICATE-----
|
28
etc/letsencrypt/archive/phares3757.ddns.net/cert3.pem
Normal file
28
etc/letsencrypt/archive/phares3757.ddns.net/cert3.pem
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEvzCCBEWgAwIBAgISBI/TW6uuBCr2K8pVMOvUKwXMMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NTAeFw0yNDEwMjcwMDUxNDFaFw0yNTAxMjUwMDUxNDBaMB4xHDAaBgNVBAMTE3Bo
|
||||||
|
YXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATx31ZU
|
||||||
|
Cb0Um0CB5L92TDKpscWoiT3hxDeUIBbYZufML/ODIwlMIJpeBABcPUuMWLKH+t5d
|
||||||
|
lGtIZFZ8a9Y6s+QJo4IDTTCCA0kwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQG
|
||||||
|
CCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTPAmOa
|
||||||
|
X0Q1jVn8hWataTC7SyVf3DAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37SssxMZwi9LX
|
||||||
|
DTBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5vLmxlbmNy
|
||||||
|
Lm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzCCAVIGA1Ud
|
||||||
|
EQSCAUkwggFFgg9hZmZpcm0uZGRucy5uZXSCF2NoYXQucGhhcmVzLmR1Y2tkbnMu
|
||||||
|
b3Jnghhkcml2ZS5waGFyZXMuZHVja2Rucy5vcmeCGGdpdGVhLnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4IVaGEucGhhcmVzLmR1Y2tkbnMub3JnghlpbW1pY2gucGhhcmVzLmR1
|
||||||
|
Y2tkbnMub3JnghhtdXNpYy5waGFyZXMuZHVja2Rucy5vcmeCEnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4ITcGhhcmVzMzc1Ny5kZG5zLm5ldIIZcGhvdG9zLnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4IZcXVhcnR6LnBoYXJlcy5kdWNrZG5zLm9yZ4IadHJhY2Nhci5waGFy
|
||||||
|
ZXMuZHVja2Rucy5vcmeCHnZhdWx0d2FyZGVuLnBoYXJlcy5kdWNrZG5zLm9yZzAT
|
||||||
|
BgNVHSAEDDAKMAgGBmeBDAECATCCAQYGCisGAQQB1nkCBAIEgfcEgfQA8gB3AKLj
|
||||||
|
CuRF772tm3447Udnd1PXgluElNcrXhssxLlQpEfnAAABksuqp2cAAAQDAEgwRgIh
|
||||||
|
ANhuwhhf/+vV2qEy+R9tMNHLnnvfBLjiAxg2AP4DDMsjAiEA/KPYYzSJ0JFO/TNv
|
||||||
|
gZ+sK9w63SldtCQnH0lQ9NkV/sQAdwDgkrP8DB3I52g2H95huZZNClJ4GYpy1nLE
|
||||||
|
sE2lbW9UBAAAAZLLqqdzAAAEAwBIMEYCIQDjpfPfuYeD/k2JqQcPM1hAeLNbFUq6
|
||||||
|
vWeoAYqUi9bLqwIhAPZbo0y/asr4bdqlKtRsaLwpaG0w+6NKTpFmo6Rk3XbRMAoG
|
||||||
|
CCqGSM49BAMDA2gAMGUCMQCwA9rnTaaNJ3Eqx2L7LSW+vVyK0kiaTp0poN82V5fr
|
||||||
|
GGXZNdyPrHeLAA0OiGnMQHwCMFfCxgJJ7JFllCHIHnjjRFk7pV3DJ7a9N8W6nFxg
|
||||||
|
Wik/YdTKMn5yCbKTyv6gYmLgjA==
|
||||||
|
-----END CERTIFICATE-----
|
26
etc/letsencrypt/archive/phares3757.ddns.net/chain2.pem
Normal file
26
etc/letsencrypt/archive/phares3757.ddns.net/chain2.pem
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||||
|
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||||
|
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||||
|
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||||
|
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||||
|
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||||
|
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||||
|
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||||
|
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||||
|
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||||
|
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||||
|
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||||
|
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||||
|
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||||
|
Ig46v9mFmBvyH04=
|
||||||
|
-----END CERTIFICATE-----
|
26
etc/letsencrypt/archive/phares3757.ddns.net/chain3.pem
Normal file
26
etc/letsencrypt/archive/phares3757.ddns.net/chain3.pem
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK
|
||||||
|
a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO
|
||||||
|
VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw
|
||||||
|
i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C
|
||||||
|
2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+
|
||||||
|
bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG
|
||||||
|
6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV
|
||||||
|
XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO
|
||||||
|
koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq
|
||||||
|
cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI
|
||||||
|
E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e
|
||||||
|
K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX
|
||||||
|
GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL
|
||||||
|
sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd
|
||||||
|
VQD9F6Na/+zmXCc=
|
||||||
|
-----END CERTIFICATE-----
|
54
etc/letsencrypt/archive/phares3757.ddns.net/fullchain2.pem
Normal file
54
etc/letsencrypt/archive/phares3757.ddns.net/fullchain2.pem
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEvTCCBEOgAwIBAgISA8Rpfo5CToGTmLm5xS3DeDfoMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NjAeFw0yNDA4MDUyMTM3MDRaFw0yNDExMDMyMTM3MDNaMB4xHDAaBgNVBAMTE3Bo
|
||||||
|
YXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQPJlBf
|
||||||
|
3XfrNcWGKQcOH9xS1X9UcBSiyFIva+mn524DDCYpB2aSLpEY1JdqGnbnDn0kBGgY
|
||||||
|
ZG5AoTspEWQvkn34o4IDSzCCA0cwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQG
|
||||||
|
CCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSbfnI9
|
||||||
|
DTkeKYqQTpJvsEmrG209UTAfBgNVHSMEGDAWgBSTJ0aYA6lRaI6Y1sRCSNsjv1iU
|
||||||
|
0jBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNi5vLmxlbmNy
|
||||||
|
Lm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U2LmkubGVuY3Iub3JnLzCCAVIGA1Ud
|
||||||
|
EQSCAUkwggFFgg9hZmZpcm0uZGRucy5uZXSCF2NoYXQucGhhcmVzLmR1Y2tkbnMu
|
||||||
|
b3Jnghhkcml2ZS5waGFyZXMuZHVja2Rucy5vcmeCGGdpdGVhLnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4IVaGEucGhhcmVzLmR1Y2tkbnMub3JnghlpbW1pY2gucGhhcmVzLmR1
|
||||||
|
Y2tkbnMub3JnghhtdXNpYy5waGFyZXMuZHVja2Rucy5vcmeCEnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4ITcGhhcmVzMzc1Ny5kZG5zLm5ldIIZcGhvdG9zLnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4IZcXVhcnR6LnBoYXJlcy5kdWNrZG5zLm9yZ4IadHJhY2Nhci5waGFy
|
||||||
|
ZXMuZHVja2Rucy5vcmeCHnZhdWx0d2FyZGVuLnBoYXJlcy5kdWNrZG5zLm9yZzAT
|
||||||
|
BgNVHSAEDDAKMAgGBmeBDAECATCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB2AD8X
|
||||||
|
S0/XIkdYlB1lHIS+DRLtkDd/H4Vq68G/KIXs+GRuAAABkSSvAAsAAAQDAEcwRQIg
|
||||||
|
JDDuoD1dGwEJXVMv6ejxDSA5egmmYy4+j5+CqWyAch4CIQD6azMSASbZZ/+63NoR
|
||||||
|
igd/G/woCeUvJJkNFfsqmeCFNQB2AO7N0GTV2xrOxVy3nbTNE6Iyh0Z8vOzew1FI
|
||||||
|
WUZxH7WbAAABkSSvAAYAAAQDAEcwRQIhALl/GZSFMEMfiR0OvlHMxQQFl6+q8vuS
|
||||||
|
bFo/u9BCK0OZAiB02RbuxpKCvSXLAwKIzYnmsy+t3ip0mKKrRyx42Kz82DAKBggq
|
||||||
|
hkjOPQQDAwNoADBlAjEAvBDbAOHHkTzjxYKmNrJ1NDBv+rjjszQbLvrqPKij8YO5
|
||||||
|
rdvW1ty2j0oQbKLiX8T2AjBgZhfrlHHRXOTYYwao5Sf1b3dNfFcv0be+aQjMTHWF
|
||||||
|
A3WZcUHjqZsHHqeaZiWgzlw=
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G
|
||||||
|
h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV
|
||||||
|
6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj
|
||||||
|
v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc
|
||||||
|
MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL
|
||||||
|
pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp
|
||||||
|
eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH
|
||||||
|
pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7
|
||||||
|
s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu
|
||||||
|
h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv
|
||||||
|
YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8
|
||||||
|
ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0
|
||||||
|
LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+
|
||||||
|
EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY
|
||||||
|
Ig46v9mFmBvyH04=
|
||||||
|
-----END CERTIFICATE-----
|
54
etc/letsencrypt/archive/phares3757.ddns.net/fullchain3.pem
Normal file
54
etc/letsencrypt/archive/phares3757.ddns.net/fullchain3.pem
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEvzCCBEWgAwIBAgISBI/TW6uuBCr2K8pVMOvUKwXMMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NTAeFw0yNDEwMjcwMDUxNDFaFw0yNTAxMjUwMDUxNDBaMB4xHDAaBgNVBAMTE3Bo
|
||||||
|
YXJlczM3NTcuZGRucy5uZXQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATx31ZU
|
||||||
|
Cb0Um0CB5L92TDKpscWoiT3hxDeUIBbYZufML/ODIwlMIJpeBABcPUuMWLKH+t5d
|
||||||
|
lGtIZFZ8a9Y6s+QJo4IDTTCCA0kwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQG
|
||||||
|
CCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTPAmOa
|
||||||
|
X0Q1jVn8hWataTC7SyVf3DAfBgNVHSMEGDAWgBSfK1/PPCFPnQS37SssxMZwi9LX
|
||||||
|
DTBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNS5vLmxlbmNy
|
||||||
|
Lm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U1LmkubGVuY3Iub3JnLzCCAVIGA1Ud
|
||||||
|
EQSCAUkwggFFgg9hZmZpcm0uZGRucy5uZXSCF2NoYXQucGhhcmVzLmR1Y2tkbnMu
|
||||||
|
b3Jnghhkcml2ZS5waGFyZXMuZHVja2Rucy5vcmeCGGdpdGVhLnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4IVaGEucGhhcmVzLmR1Y2tkbnMub3JnghlpbW1pY2gucGhhcmVzLmR1
|
||||||
|
Y2tkbnMub3JnghhtdXNpYy5waGFyZXMuZHVja2Rucy5vcmeCEnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4ITcGhhcmVzMzc1Ny5kZG5zLm5ldIIZcGhvdG9zLnBoYXJlcy5kdWNr
|
||||||
|
ZG5zLm9yZ4IZcXVhcnR6LnBoYXJlcy5kdWNrZG5zLm9yZ4IadHJhY2Nhci5waGFy
|
||||||
|
ZXMuZHVja2Rucy5vcmeCHnZhdWx0d2FyZGVuLnBoYXJlcy5kdWNrZG5zLm9yZzAT
|
||||||
|
BgNVHSAEDDAKMAgGBmeBDAECATCCAQYGCisGAQQB1nkCBAIEgfcEgfQA8gB3AKLj
|
||||||
|
CuRF772tm3447Udnd1PXgluElNcrXhssxLlQpEfnAAABksuqp2cAAAQDAEgwRgIh
|
||||||
|
ANhuwhhf/+vV2qEy+R9tMNHLnnvfBLjiAxg2AP4DDMsjAiEA/KPYYzSJ0JFO/TNv
|
||||||
|
gZ+sK9w63SldtCQnH0lQ9NkV/sQAdwDgkrP8DB3I52g2H95huZZNClJ4GYpy1nLE
|
||||||
|
sE2lbW9UBAAAAZLLqqdzAAAEAwBIMEYCIQDjpfPfuYeD/k2JqQcPM1hAeLNbFUq6
|
||||||
|
vWeoAYqUi9bLqwIhAPZbo0y/asr4bdqlKtRsaLwpaG0w+6NKTpFmo6Rk3XbRMAoG
|
||||||
|
CCqGSM49BAMDA2gAMGUCMQCwA9rnTaaNJ3Eqx2L7LSW+vVyK0kiaTp0poN82V5fr
|
||||||
|
GGXZNdyPrHeLAA0OiGnMQHwCMFfCxgJJ7JFllCHIHnjjRFk7pV3DJ7a9N8W6nFxg
|
||||||
|
Wik/YdTKMn5yCbKTyv6gYmLgjA==
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK
|
||||||
|
a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO
|
||||||
|
VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw
|
||||||
|
i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C
|
||||||
|
2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+
|
||||||
|
bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG
|
||||||
|
6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV
|
||||||
|
XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO
|
||||||
|
koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq
|
||||||
|
cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI
|
||||||
|
E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e
|
||||||
|
K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX
|
||||||
|
GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL
|
||||||
|
sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd
|
||||||
|
VQD9F6Na/+zmXCc=
|
||||||
|
-----END CERTIFICATE-----
|
5
etc/letsencrypt/archive/phares3757.ddns.net/privkey2.pem
Normal file
5
etc/letsencrypt/archive/phares3757.ddns.net/privkey2.pem
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgMkDpXWGeiqjE5WNj
|
||||||
|
mBuqwMXseOQuX9tv3SvZvQ761VOhRANCAAQPJlBf3XfrNcWGKQcOH9xS1X9UcBSi
|
||||||
|
yFIva+mn524DDCYpB2aSLpEY1JdqGnbnDn0kBGgYZG5AoTspEWQvkn34
|
||||||
|
-----END PRIVATE KEY-----
|
5
etc/letsencrypt/archive/phares3757.ddns.net/privkey3.pem
Normal file
5
etc/letsencrypt/archive/phares3757.ddns.net/privkey3.pem
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgr4csftLu03keRaK4
|
||||||
|
OR+nS9nOaog7Ak6NbSRkXg72RRKhRANCAATx31ZUCb0Um0CB5L92TDKpscWoiT3h
|
||||||
|
xDeUIBbYZufML/ODIwlMIJpeBABcPUuMWLKH+t5dlGtIZFZ8a9Y6s+QJ
|
||||||
|
-----END PRIVATE KEY-----
|
50
etc/letsencrypt/ha/fullchain.pem
Normal file
50
etc/letsencrypt/ha/fullchain.pem
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIID6zCCA3GgAwIBAgISA4snn7ZkkZV8ytXbnWtDcJgdMAoGCCqGSM49BAMDMDIx
|
||||||
|
CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF
|
||||||
|
NTAeFw0yNDEwMDYwNzU5MzRaFw0yNTAxMDQwNzU5MzNaMB0xGzAZBgNVBAMTEmFm
|
||||||
|
ZmlybS5kdWNrZG5zLm9yZzB2MBAGByqGSM49AgEGBSuBBAAiA2IABEzQCCWLkZD8
|
||||||
|
R1rHsE1iNmoobwtfihmN78eB9zVu+FdWRkOyClBXm+sZQl4rNf7NfDiV6bZ4dz13
|
||||||
|
fs/45z52PTWk6n2zP4c2Dgh/MESaxv9UaLvq4OjX4Bqd/OH1WuigHaOCAl0wggJZ
|
||||||
|
MA4GA1UdDwEB/wQEAwIHgDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw
|
||||||
|
DAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUL+qPS4dEIsg41TGo25We68CvRIAwHwYD
|
||||||
|
VR0jBBgwFoAUnytfzzwhT50Et+0rLMTGcIvS1w0wVQYIKwYBBQUHAQEESTBHMCEG
|
||||||
|
CCsGAQUFBzABhhVodHRwOi8vZTUuby5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0
|
||||||
|
dHA6Ly9lNS5pLmxlbmNyLm9yZy8wZQYDVR0RBF4wXIISYWZmaXJtLmR1Y2tkbnMu
|
||||||
|
b3JnghVoYS1waGFyZXMuZHVja2Rucy5vcmeCEnBoYXJlcy5kdWNrZG5zLm9yZ4Ib
|
||||||
|
c3lub2xvZ3ktcGhhcmVzLmR1Y2tkbnMub3JnMBMGA1UdIAQMMAowCAYGZ4EMAQIB
|
||||||
|
MIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHYAzxFW7tUufK/zh1vZaS6b6RpxZ0qw
|
||||||
|
F+ysAdJbd87MOwgAAAGSYQzXTgAABAMARzBFAiEArfAVmkU+kJaHWipGCCPT7eVw
|
||||||
|
auk98aCxSEvIOD0Y+RsCIAnhbHMNuDAenJ8ZyRhtGmSCwMPRbLRnwcWbO7TFqxqf
|
||||||
|
AHcAouMK5EXvva2bfjjtR2d3U9eCW4SU1yteGyzEuVCkR+cAAAGSYQze4QAABAMA
|
||||||
|
SDBGAiEA+Vocdjpsc7/jUu9L5KjXO+Jnrp98MOnM0FEJN0hJU+wCIQD/HOM6C6H8
|
||||||
|
ZxTaopyvNyWVylw5ooPuSpuJ1Xf8brNjATAKBggqhkjOPQQDAwNoADBlAjEA8aBN
|
||||||
|
tJqelSOy/mnypFRI6qrvGegu7tKgghqUw0XWy56u8zMVmtksglEJtcMkf3ZlAjBh
|
||||||
|
15d+rRL3k+xXAaOE1YesxGhIUqJO1JiMHeQ6mgOE6vOMJYKhmUjrZ3P70XoEC7E=
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEVzCCAj+gAwIBAgIRAIOPbGPOsTmMYgZigxXJ/d4wDQYJKoZIhvcNAQELBQAw
|
||||||
|
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
|
||||||
|
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw
|
||||||
|
WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
|
||||||
|
RW5jcnlwdDELMAkGA1UEAxMCRTUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNCzqK
|
||||||
|
a2GOtu/cX1jnxkJFVKtj9mZhSAouWXW0gQI3ULc/FnncmOyhKJdyIBwsz9V8UiBO
|
||||||
|
VHhbhBRrwJCuhezAUUE8Wod/Bk3U/mDR+mwt4X2VEIiiCFQPmRpM5uoKrNijgfgw
|
||||||
|
gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD
|
||||||
|
ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSfK1/PPCFPnQS37SssxMZw
|
||||||
|
i9LXDTAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB
|
||||||
|
AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g
|
||||||
|
BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu
|
||||||
|
Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAH3KdNEVCQdqk0LKyuNImTKdRJY1C
|
||||||
|
2uw2SJajuhqkyGPY8C+zzsufZ+mgnhnq1A2KVQOSykOEnUbx1cy637rBAihx97r+
|
||||||
|
bcwbZM6sTDIaEriR/PLk6LKs9Be0uoVxgOKDcpG9svD33J+G9Lcfv1K9luDmSTgG
|
||||||
|
6XNFIN5vfI5gs/lMPyojEMdIzK9blcl2/1vKxO8WGCcjvsQ1nJ/Pwt8LQZBfOFyV
|
||||||
|
XP8ubAp/au3dc4EKWG9MO5zcx1qT9+NXRGdVWxGvmBFRAajciMfXME1ZuGmk3/GO
|
||||||
|
koAM7ZkjZmleyokP1LGzmfJcUd9s7eeu1/9/eg5XlXd/55GtYjAM+C4DG5i7eaNq
|
||||||
|
cm2F+yxYIPt6cbbtYVNJCGfHWqHEQ4FYStUyFnv8sjyqU8ypgZaNJ9aVcWSICLOI
|
||||||
|
E1/Qv/7oKsnZCWJ926wU6RqG1OYPGOi1zuABhLw61cuPVDT28nQS/e6z95cJXq0e
|
||||||
|
K1BcaJ6fJZsmbjRgD5p3mvEf5vdQM7MCEvU0tHbsx2I5mHHJoABHb8KVBgWp/lcX
|
||||||
|
GWiWaeOyB7RP+OfDtvi2OsapxXiV7vNVs7fMlrRjY1joKaqmmycnBvAq14AEbtyL
|
||||||
|
sVfOS66B8apkeFX2NY4XPEYV4ZSCe8VHPrdrERk2wILG3T/EGmSIkCYVUMSnjmJd
|
||||||
|
VQD9F6Na/+zmXCc=
|
||||||
|
-----END CERTIFICATE-----
|
6
etc/letsencrypt/ha/privkey.pem
Normal file
6
etc/letsencrypt/ha/privkey.pem
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MIGkAgEBBDAK5i0BgRa7SIcpCykadElWV5mBrW+xOWg1Sse0Zx8TEx8fuMiz6js3
|
||||||
|
CcVzHS0YjiegBwYFK4EEACKhZANiAARM0Agli5GQ/Edax7BNYjZqKG8LX4oZje/H
|
||||||
|
gfc1bvhXVkZDsgpQV5vrGUJeKzX+zXw4lem2eHc9d37P+Oc+dj01pOp9sz+HNg4I
|
||||||
|
fzBEmsb/VGi76uDo1+Aanfzh9VrooB0=
|
||||||
|
-----END EC PRIVATE KEY-----
|
14
etc/letsencrypt/live/gitea.jumpingcrab.com/README
Normal file
14
etc/letsencrypt/live/gitea.jumpingcrab.com/README
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
This directory contains your keys and certificates.
|
||||||
|
|
||||||
|
`privkey.pem` : the private key for your certificate.
|
||||||
|
`fullchain.pem`: the certificate file used in most server software.
|
||||||
|
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
|
||||||
|
`cert.pem` : will break many server configurations, and should not be used
|
||||||
|
without reading further documentation (see link below).
|
||||||
|
|
||||||
|
WARNING: DO NOT MOVE OR RENAME THESE FILES!
|
||||||
|
Certbot expects these files to remain in this location in order
|
||||||
|
to function properly!
|
||||||
|
|
||||||
|
We recommend not moving these files. For more information, see the Certbot
|
||||||
|
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.
|
14
etc/letsencrypt/live/gitea.phares.redirectme.net/README
Normal file
14
etc/letsencrypt/live/gitea.phares.redirectme.net/README
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
This directory contains your keys and certificates.
|
||||||
|
|
||||||
|
`privkey.pem` : the private key for your certificate.
|
||||||
|
`fullchain.pem`: the certificate file used in most server software.
|
||||||
|
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
|
||||||
|
`cert.pem` : will break many server configurations, and should not be used
|
||||||
|
without reading further documentation (see link below).
|
||||||
|
|
||||||
|
WARNING: DO NOT MOVE OR RENAME THESE FILES!
|
||||||
|
Certbot expects these files to remain in this location in order
|
||||||
|
to function properly!
|
||||||
|
|
||||||
|
We recommend not moving these files. For more information, see the Certbot
|
||||||
|
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.
|
14
etc/letsencrypt/live/gitea.phares3757.ddns.net/README
Normal file
14
etc/letsencrypt/live/gitea.phares3757.ddns.net/README
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
This directory contains your keys and certificates.
|
||||||
|
|
||||||
|
`privkey.pem` : the private key for your certificate.
|
||||||
|
`fullchain.pem`: the certificate file used in most server software.
|
||||||
|
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
|
||||||
|
`cert.pem` : will break many server configurations, and should not be used
|
||||||
|
without reading further documentation (see link below).
|
||||||
|
|
||||||
|
WARNING: DO NOT MOVE OR RENAME THESE FILES!
|
||||||
|
Certbot expects these files to remain in this location in order
|
||||||
|
to function properly!
|
||||||
|
|
||||||
|
We recommend not moving these files. For more information, see the Certbot
|
||||||
|
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.
|
14
etc/letsencrypt/live/gitea.twilightparadox.com/README
Normal file
14
etc/letsencrypt/live/gitea.twilightparadox.com/README
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
This directory contains your keys and certificates.
|
||||||
|
|
||||||
|
`privkey.pem` : the private key for your certificate.
|
||||||
|
`fullchain.pem`: the certificate file used in most server software.
|
||||||
|
`chain.pem` : used for OCSP stapling in Nginx >=1.3.7.
|
||||||
|
`cert.pem` : will break many server configurations, and should not be used
|
||||||
|
without reading further documentation (see link below).
|
||||||
|
|
||||||
|
WARNING: DO NOT MOVE OR RENAME THESE FILES!
|
||||||
|
Certbot expects these files to remain in this location in order
|
||||||
|
to function properly!
|
||||||
|
|
||||||
|
We recommend not moving these files. For more information, see the Certbot
|
||||||
|
User Guide at https://certbot.eff.org/docs/using.html#where-are-my-certificates.
|
15
etc/letsencrypt/renewal/gitea.jumpingcrab.com.conf
Normal file
15
etc/letsencrypt/renewal/gitea.jumpingcrab.com.conf
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
# renew_before_expiry = 30 days
|
||||||
|
version = 3.1.0
|
||||||
|
archive_dir = /etc/letsencrypt/archive/gitea.jumpingcrab.com
|
||||||
|
cert = /etc/letsencrypt/live/gitea.jumpingcrab.com/cert.pem
|
||||||
|
privkey = /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem
|
||||||
|
chain = /etc/letsencrypt/live/gitea.jumpingcrab.com/chain.pem
|
||||||
|
fullchain = /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem
|
||||||
|
|
||||||
|
# Options used in the renewal process
|
||||||
|
[renewalparams]
|
||||||
|
account = 0dc29e2da338706a1a356c4f2ef0c15b
|
||||||
|
authenticator = nginx
|
||||||
|
installer = nginx
|
||||||
|
server = https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
key_type = ecdsa
|
15
etc/letsencrypt/renewal/gitea.phares.redirectme.net.conf
Normal file
15
etc/letsencrypt/renewal/gitea.phares.redirectme.net.conf
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
# renew_before_expiry = 30 days
|
||||||
|
version = 3.1.0
|
||||||
|
archive_dir = /etc/letsencrypt/archive/gitea.phares.redirectme.net
|
||||||
|
cert = /etc/letsencrypt/live/gitea.phares.redirectme.net/cert.pem
|
||||||
|
privkey = /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem
|
||||||
|
chain = /etc/letsencrypt/live/gitea.phares.redirectme.net/chain.pem
|
||||||
|
fullchain = /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem
|
||||||
|
|
||||||
|
# Options used in the renewal process
|
||||||
|
[renewalparams]
|
||||||
|
account = 0dc29e2da338706a1a356c4f2ef0c15b
|
||||||
|
authenticator = nginx
|
||||||
|
installer = nginx
|
||||||
|
server = https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
key_type = ecdsa
|
15
etc/letsencrypt/renewal/gitea.phares3757.ddns.net.conf
Normal file
15
etc/letsencrypt/renewal/gitea.phares3757.ddns.net.conf
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
# renew_before_expiry = 30 days
|
||||||
|
version = 3.1.0
|
||||||
|
archive_dir = /etc/letsencrypt/archive/gitea.phares3757.ddns.net
|
||||||
|
cert = /etc/letsencrypt/live/gitea.phares3757.ddns.net/cert.pem
|
||||||
|
privkey = /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem
|
||||||
|
chain = /etc/letsencrypt/live/gitea.phares3757.ddns.net/chain.pem
|
||||||
|
fullchain = /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem
|
||||||
|
|
||||||
|
# Options used in the renewal process
|
||||||
|
[renewalparams]
|
||||||
|
account = 0dc29e2da338706a1a356c4f2ef0c15b
|
||||||
|
authenticator = nginx
|
||||||
|
installer = nginx
|
||||||
|
server = https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
key_type = ecdsa
|
15
etc/letsencrypt/renewal/gitea.twilightparadox.com.conf
Normal file
15
etc/letsencrypt/renewal/gitea.twilightparadox.com.conf
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
# renew_before_expiry = 30 days
|
||||||
|
version = 3.1.0
|
||||||
|
archive_dir = /etc/letsencrypt/archive/gitea.twilightparadox.com
|
||||||
|
cert = /etc/letsencrypt/live/gitea.twilightparadox.com/cert.pem
|
||||||
|
privkey = /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem
|
||||||
|
chain = /etc/letsencrypt/live/gitea.twilightparadox.com/chain.pem
|
||||||
|
fullchain = /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem
|
||||||
|
|
||||||
|
# Options used in the renewal process
|
||||||
|
[renewalparams]
|
||||||
|
account = 0dc29e2da338706a1a356c4f2ef0c15b
|
||||||
|
authenticator = nginx
|
||||||
|
installer = nginx
|
||||||
|
server = https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
key_type = ecdsa
|
@ -1,61 +0,0 @@
|
|||||||
### Documentation
|
|
||||||
# https://wiki.lighttpd.net/
|
|
||||||
#
|
|
||||||
### Configuration Syntax
|
|
||||||
# https://wiki.lighttpd.net/Docs_Configuration
|
|
||||||
#
|
|
||||||
### Configuration Options
|
|
||||||
# https://wiki.lighttpd.net/Docs_ConfigurationOptions
|
|
||||||
#
|
|
||||||
|
|
||||||
### Debian lighttpd base configuration
|
|
||||||
|
|
||||||
server.modules = (
|
|
||||||
"mod_indexfile",
|
|
||||||
"mod_access",
|
|
||||||
"mod_alias",
|
|
||||||
"mod_redirect",
|
|
||||||
)
|
|
||||||
|
|
||||||
server.document-root = "/var/www/html"
|
|
||||||
server.upload-dirs = ( "/var/cache/lighttpd/uploads" )
|
|
||||||
server.errorlog = "/var/log/lighttpd/error.log"
|
|
||||||
server.pid-file = "/run/lighttpd.pid"
|
|
||||||
server.username = "www-data"
|
|
||||||
server.groupname = "www-data"
|
|
||||||
server.port = 8005
|
|
||||||
|
|
||||||
# strict parsing and normalization of URL for consistency and security
|
|
||||||
# https://wiki.lighttpd.net/Server_http-parseoptsDetails
|
|
||||||
# (might need to explicitly set "url-path-2f-decode" = "disable"
|
|
||||||
# if a specific application is encoding URLs inside url-path)
|
|
||||||
server.http-parseopts = (
|
|
||||||
"header-strict" => "enable",# default
|
|
||||||
"host-strict" => "enable",# default
|
|
||||||
"host-normalize" => "enable",# default
|
|
||||||
"url-normalize-unreserved"=> "enable",# recommended highly
|
|
||||||
"url-normalize-required" => "enable",# recommended
|
|
||||||
"url-ctrls-reject" => "enable",# recommended
|
|
||||||
"url-path-2f-decode" => "enable",# recommended highly (unless breaks app)
|
|
||||||
#"url-path-2f-reject" => "enable",
|
|
||||||
"url-path-dotseg-remove" => "enable",# recommended highly (unless breaks app)
|
|
||||||
#"url-path-dotseg-reject" => "enable",
|
|
||||||
#"url-query-20-plus" => "enable",# consistency in query string
|
|
||||||
"url-invalid-utf8-reject" => "enable",# recommended highly (unless breaks app)
|
|
||||||
)
|
|
||||||
|
|
||||||
index-file.names = ( "index.php", "index.html" )
|
|
||||||
url.access-deny = ( "~", ".inc" )
|
|
||||||
static-file.exclude-extensions = ( ".php", ".pl", ".fcgi" )
|
|
||||||
|
|
||||||
include_shell "/usr/share/lighttpd/create-mime.conf.pl"
|
|
||||||
include "/etc/lighttpd/conf-enabled/*.conf"
|
|
||||||
|
|
||||||
# default listening port for IPv6 is same as default IPv4 port
|
|
||||||
include_shell "/usr/share/lighttpd/use-ipv6.pl " + server.port
|
|
||||||
|
|
||||||
### Customizations
|
|
||||||
# customizations should generally be placed in separate files such as
|
|
||||||
# /etc/lighttpd/conf-available/00_vars.conf # override variables for *.conf
|
|
||||||
# /etc/lighttpd/conf-available/99_custom.conf # override *.conf settings
|
|
||||||
# and then enabled using lighty-enable-mod (1)
|
|
12
etc/netplan/01-systemd-networkd.yaml
Normal file
12
etc/netplan/01-systemd-networkd.yaml
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
network:
|
||||||
|
version: 2
|
||||||
|
ethernets:
|
||||||
|
enp1s0:
|
||||||
|
addresses:
|
||||||
|
- 192.168.11.2/25
|
||||||
|
routes:
|
||||||
|
- to: default
|
||||||
|
via: 192.168.11.1
|
||||||
|
wlp3s0:
|
||||||
|
addresses:
|
||||||
|
- 192.168.11.119/25
|
@ -1,11 +0,0 @@
|
|||||||
# This file is generated from information provided by the datasource. Changes
|
|
||||||
# to it will not persist across an instance reboot. To disable cloud-init's
|
|
||||||
# network configuration capabilities, write a file
|
|
||||||
# /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg with the following:
|
|
||||||
# network: {config: disabled}
|
|
||||||
network:
|
|
||||||
ethernets:
|
|
||||||
enp2s0:
|
|
||||||
dhcp4: true
|
|
||||||
version: 2
|
|
||||||
wifis: {}
|
|
17
etc/nginx/include/adguard.conf
Normal file
17
etc/nginx/include/adguard.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name adguard.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.11.2:5014/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/affirm.conf
Normal file
17
etc/nginx/include/affirm.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-affirm/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-affirm/affirm.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name *.affirm.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.0.31/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/baikal.conf
Normal file
17
etc/nginx/include/baikal.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name baikal.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:8001/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/bchs.conf
Normal file
17
etc/nginx/include/bchs.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-bchs/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-bchs/bchs.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name *.bchs.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.0.43/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
20
etc/nginx/include/beszel.conf
Normal file
20
etc/nginx/include/beszel.conf
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name beszel.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:5023/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
proxy_connect_timeout 600s;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/blinko.conf
Normal file
17
etc/nginx/include/blinko.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name blinko.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:5012/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
21
etc/nginx/include/cockpit.conf
Normal file
21
etc/nginx/include/cockpit.conf
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name cockpit.phares.duckdns.org;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://127.0.0.1:9090/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_buffering off;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
gzip off;
|
||||||
|
}
|
||||||
|
}
|
16
etc/nginx/include/dashkiosk.conf
Normal file
16
etc/nginx/include/dashkiosk.conf
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name dashkiosk.phares.duckdns.org;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:9400/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
14
etc/nginx/include/dorico.conf
Normal file
14
etc/nginx/include/dorico.conf
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name dorico.phares.duckdns.org;
|
||||||
|
root /home/lphares/dorico;
|
||||||
|
# usermod -a -G lphares www-data
|
||||||
|
location / {
|
||||||
|
autoindex on;
|
||||||
|
disable_symlinks on;
|
||||||
|
autoindex_format json;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/dotnet-sdk-8.conf
Normal file
17
etc/nginx/include/dotnet-sdk-8.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name dotnet-sdk-8.phares.duckdns.org;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:5027/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
add_header Access-Control-Allow-Origin *;
|
||||||
|
}
|
||||||
|
}
|
16
etc/nginx/include/firefox.conf
Normal file
16
etc/nginx/include/firefox.conf
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name firefox.phares.duckdns.org;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.11.2:5800/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
39
etc/nginx/include/free-file-sync.conf
Normal file
39
etc/nginx/include/free-file-sync.conf
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name free-file-sync-still.phares.duckdns.org;
|
||||||
|
root /mnt/free-file-sync/still;
|
||||||
|
location / {
|
||||||
|
autoindex on;
|
||||||
|
disable_symlinks on;
|
||||||
|
autoindex_format json;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name free-file-sync-moving.phares.duckdns.org;
|
||||||
|
root /mnt/free-file-sync/moving;
|
||||||
|
location / {
|
||||||
|
autoindex on;
|
||||||
|
disable_symlinks on;
|
||||||
|
autoindex_format json;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name free-file-sync-a.phares.duckdns.org;
|
||||||
|
root /mnt/free-file-sync/1-Images-A;
|
||||||
|
location / {
|
||||||
|
autoindex on;
|
||||||
|
disable_symlinks on;
|
||||||
|
autoindex_format json;
|
||||||
|
}
|
||||||
|
}
|
102
etc/nginx/include/gitea.conf
Normal file
102
etc/nginx/include/gitea.conf
Normal file
@ -0,0 +1,102 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name gitea.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:3000/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name gitea.phares3757.ddns.net;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:3000/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name gitea.phares.redirectme.net;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:3000/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name gitea.chickenkiller.com;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:3000/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name gitea.jumpingcrab.com;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:3000/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name gitea.twilightparadox.com;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:3000/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
20
etc/nginx/include/gotify.conf
Normal file
20
etc/nginx/include/gotify.conf
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name gotify.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:5016/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
proxy_connect_timeout 600s;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/immich-kiosk.conf
Normal file
17
etc/nginx/include/immich-kiosk.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name immich-kiosk.phares.duckdns.org;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:5010/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
add_header Access-Control-Allow-Origin *;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/immich-to-slideshow.conf
Normal file
17
etc/nginx/include/immich-to-slideshow.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name immich-to-slideshow.phares.duckdns.org;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:5009/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
add_header Access-Control-Allow-Origin *;
|
||||||
|
}
|
||||||
|
}
|
22
etc/nginx/include/immich.conf
Normal file
22
etc/nginx/include/immich.conf
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name immich.phares.duckdns.org;
|
||||||
|
client_max_body_size 50000M;
|
||||||
|
proxy_set_header Host $http_host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
proxy_redirect off;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
send_timeout 600s;
|
||||||
|
location / {
|
||||||
|
proxy_pass http://192.168.11.2:3001/;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/jmlc.conf
Normal file
17
etc/nginx/include/jmlc.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-jmlc/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-jmlc/jmlc.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name *.jmlc.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.0.42/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/kanbn-to-quartz.conf
Normal file
17
etc/nginx/include/kanbn-to-quartz.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name kanbn-to-quartz.phares.duckdns.org;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:5024/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
add_header Access-Control-Allow-Origin *;
|
||||||
|
}
|
||||||
|
}
|
19
etc/nginx/include/kuma.conf
Normal file
19
etc/nginx/include/kuma.conf
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name kuma.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.11.2:3004/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
# proxy_set_header Upgrade $http_upgrade;
|
||||||
|
# proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
}
|
19
etc/nginx/include/ncdu.conf
Normal file
19
etc/nginx/include/ncdu.conf
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name ncdu.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_pass http://192.168.11.2:5033/;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
proxy_set_header X-NginX-Proxy true;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_read_timeout 43200000;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/original-to-deterministic-hash-code.conf
Normal file
17
etc/nginx/include/original-to-deterministic-hash-code.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name original-to-deterministic.phares.duckdns.org;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:5025/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
add_header Access-Control-Allow-Origin *;
|
||||||
|
}
|
||||||
|
}
|
16
etc/nginx/include/pgadmin.conf
Normal file
16
etc/nginx/include/pgadmin.conf
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name pgadmin.phares.duckdns.org;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.11.2:5007/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
30
etc/nginx/include/phares.conf
Normal file
30
etc/nginx/include/phares.conf
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
server {
|
||||||
|
listen 80 default_server;
|
||||||
|
root /var/www/certbot;
|
||||||
|
index index.html index.htm index.nginx-debian.html;
|
||||||
|
server_name _;
|
||||||
|
location / {
|
||||||
|
try_files $uri $uri/ =404;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
listen 8083 default_server;
|
||||||
|
root /var/www/html-nginx;
|
||||||
|
index index.html index.htm;
|
||||||
|
server_name _;
|
||||||
|
location / {
|
||||||
|
try_files $uri $uri/ =404;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name phares.duckdns.org;
|
||||||
|
root /var/www/html-nginx;
|
||||||
|
index index.nginx-debian.html;
|
||||||
|
location / {
|
||||||
|
try_files $uri $uri.html $uri/ =404;
|
||||||
|
}
|
||||||
|
}
|
23
etc/nginx/include/quartz.conf
Normal file
23
etc/nginx/include/quartz.conf
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
server {
|
||||||
|
listen 8084 default_server;
|
||||||
|
root /var/www/html-quartz;
|
||||||
|
index index.html index.htm;
|
||||||
|
server_name _;
|
||||||
|
location / {
|
||||||
|
try_files $uri $uri/ =404;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name quartz.phares.duckdns.org;
|
||||||
|
root /var/www/html-quartz;
|
||||||
|
index index.html index.htm;
|
||||||
|
location / {
|
||||||
|
try_files $uri $uri.html $uri/ =404;
|
||||||
|
auth_basic "auth_basic";
|
||||||
|
auth_basic_user_file /etc/nginx/.htpasswd;
|
||||||
|
}
|
||||||
|
}
|
22
etc/nginx/include/slideshow.conf
Normal file
22
etc/nginx/include/slideshow.conf
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
server {
|
||||||
|
listen 8080 default_server;
|
||||||
|
root /var/www/html-slideshow;
|
||||||
|
index index.html index.htm;
|
||||||
|
server_name _;
|
||||||
|
location / {
|
||||||
|
try_files $uri $uri/ =404;
|
||||||
|
add_header Access-Control-Allow-Origin *;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name slideshow.phares.duckdns.org;
|
||||||
|
root /var/www/html-slideshow;
|
||||||
|
index index.html index.htm;
|
||||||
|
location / {
|
||||||
|
try_files $uri $uri/ =404;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/sumco.conf
Normal file
17
etc/nginx/include/sumco.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-sumco/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-sumco/sumco.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name *.sumco.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.0.41/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
34
etc/nginx/include/vaultwarden.conf
Normal file
34
etc/nginx/include/vaultwarden.conf
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
# server_tokens off;
|
||||||
|
# ssl_ciphers ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-CCM:DHE-RSA-AES256-CCM8:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-CCM:DHE-RSA-AES128-CCM8:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256;
|
||||||
|
# ssl_prefer_server_ciphers on;
|
||||||
|
# ssl_session_tickets off;
|
||||||
|
# ssl_session_timeout 1d;
|
||||||
|
# ssl_session_cache shared:SSL:10m;
|
||||||
|
# ssl_buffer_size 8k;
|
||||||
|
# # ssl_stapling on;
|
||||||
|
# ssl_stapling off;
|
||||||
|
# ssl_stapling_verify on;
|
||||||
|
# add_header X-Content-Type-Options nosniff;
|
||||||
|
# add_header Content-Security-Policy "object-src 'none'; base-uri 'none'; require-trusted-types-for 'script'; frame-ancestors 'self';";
|
||||||
|
# add_header Strict-Transport-Security "max-age=15552001; includeSubdomains; preload";
|
||||||
|
server_name vaultwarden.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
# proxy_pass http://10.147.229.6:8000/;
|
||||||
|
proxy_pass https://192.168.11.2:5008/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection $http_connection;
|
||||||
|
}
|
||||||
|
}
|
31
etc/nginx/include/warden.conf
Normal file
31
etc/nginx/include/warden.conf
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
# server_tokens off;
|
||||||
|
# ssl_ciphers ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-CCM:DHE-RSA-AES256-CCM8:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-CCM:DHE-RSA-AES128-CCM8:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256;
|
||||||
|
# ssl_prefer_server_ciphers on;
|
||||||
|
# ssl_session_tickets off;
|
||||||
|
# ssl_session_timeout 1d;
|
||||||
|
# ssl_session_cache shared:SSL:10m;
|
||||||
|
# ssl_buffer_size 8k;
|
||||||
|
# # ssl_stapling on;
|
||||||
|
# ssl_stapling off;
|
||||||
|
# ssl_stapling_verify on;
|
||||||
|
# add_header X-Content-Type-Options nosniff;
|
||||||
|
# add_header Content-Security-Policy "object-src 'none'; base-uri 'none'; require-trusted-types-for 'script'; frame-ancestors 'self';";
|
||||||
|
# add_header Strict-Transport-Security "max-age=15552001; includeSubdomains; preload";
|
||||||
|
server_name warden.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
# proxy_pass http://10.147.229.6:8000/;
|
||||||
|
proxy_pass https://192.168.11.2:5008/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
17
etc/nginx/include/xandikos.conf
Normal file
17
etc/nginx/include/xandikos.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name xandikos.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://192.168.11.2:8000/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
@ -1,42 +1,46 @@
|
|||||||
server {
|
server {
|
||||||
listen 8080 default_server;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
root /var/www/html;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
index index.html index.htm index.nginx-debian.html;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
server_name _;
|
listen 443 ssl http2;
|
||||||
location / {
|
server_name *.phares.duckdns.org;
|
||||||
try_files $uri $uri/ =404;
|
root /var/www/html-nginx;
|
||||||
}
|
index index.nginx-debian.html;
|
||||||
|
location / {
|
||||||
|
try_files $uri $uri.html $uri/ =404;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
include /etc/nginx/include/affirm.conf;
|
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # https://192.168.0.31
|
||||||
# include /etc/nginx/include/ansible.conf;
|
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # https://192.168.0.43
|
||||||
# include /etc/nginx/include/assistant.conf;
|
include /etc/nginx/include/jmlc.conf; # https://*.jmlc.duckdns.org # https://192.168.0.42
|
||||||
# include /etc/nginx/include/casa.conf;
|
include /etc/nginx/include/sumco.conf; # https://*.sumco.duckdns.org # https://192.168.0.41
|
||||||
include /etc/nginx/include/codeserver.conf;
|
#
|
||||||
include /etc/nginx/include/dashkiosk.conf;
|
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http:5014
|
||||||
# include /etc/nginx/include/dockge.conf;
|
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http:8001
|
||||||
# include /etc/nginx/include/docmost.conf;
|
include /etc/nginx/include/beszel.conf; # https://beszel.phares.duckdns.org # http:5023
|
||||||
# include /etc/nginx/include/emby.conf;
|
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http:5012
|
||||||
# include /etc/nginx/include/filebrowser.conf;
|
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https:9090
|
||||||
# include /etc/nginx/include/gogs.conf;
|
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http:9400
|
||||||
include /etc/nginx/include/gitea.conf;
|
include /etc/nginx/include/dorico.conf; # https://dorico.phares.duckdns.org # /home/lphares/dorico
|
||||||
include /etc/nginx/include/immich.conf;
|
include /etc/nginx/include/dotnet-sdk-8.conf; # https://dotnet-sdk-8.phares.duckdns.org # http:5027
|
||||||
include /etc/nginx/include/incus.conf;
|
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # https:5800
|
||||||
# include /etc/nginx/include/invoice.conf;
|
include /etc/nginx/include/free-file-sync.conf; # https://free-file-sync.phares.duckdns.org # /mnt/free-file-sync
|
||||||
include /etc/nginx/include/lxconsole.conf;
|
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http:3000
|
||||||
include /etc/nginx/include/kestra.conf;
|
include /etc/nginx/include/gotify.conf; # https://gotify.phares.duckdns.org # http:5016
|
||||||
include /etc/nginx/include/music.conf;
|
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http:5010
|
||||||
# include /etc/nginx/include/nextcloud.conf;
|
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http:5009
|
||||||
# include /etc/nginx/include/owncast.conf;
|
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http:3001
|
||||||
include /etc/nginx/include/phares.conf;
|
include /etc/nginx/include/kanbn-to-quartz.conf; # https://kanbn-to-quartz.phares.duckdns.org # http:5024
|
||||||
include /etc/nginx/include/pgadmin.conf;
|
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https:3004
|
||||||
# include /etc/nginx/include/photoprism.conf;
|
include /etc/nginx/include/ncdu.conf; # https://ncdu.phares.duckdns.org # https:5033
|
||||||
# include /etc/nginx/include/pihole.conf;
|
include /etc/nginx/include/original-to-deterministic-hash-code.conf; # https://original-to-deterministic.phares.duckdns.org # http:5025
|
||||||
# include /etc/nginx/include/proxmox.conf;
|
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https:5007
|
||||||
include /etc/nginx/include/quartz.conf;
|
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
|
||||||
# include /etc/nginx/include/readeck.conf;
|
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
|
||||||
# include /etc/nginx/include/syncthing.conf;
|
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
|
||||||
# include /etc/nginx/include/terraform.conf;
|
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https:5008
|
||||||
# include /etc/nginx/include/uptimekuma.conf;
|
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https:5008
|
||||||
include /etc/nginx/include/vaultwarden.conf;
|
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http:8000
|
||||||
# include /etc/nginx/include/vscodium.conf;
|
#
|
||||||
# include /etc/nginx/include/wekan.conf;
|
# ssh root@phares.duckdns.org -p 22 -i C:/Users/phares/.ssh/id_ed25519
|
||||||
|
# ssh root@phares.duckdns.org -p 5026 -i C:/Users/phares/.ssh/id_ed25519
|
12
etc/passwd
12
etc/passwd
@ -31,12 +31,18 @@ landscape:x:107:109::/var/lib/landscape:/usr/sbin/nologin
|
|||||||
fwupd-refresh:x:989:989:Firmware update daemon:/var/lib/fwupd:/usr/sbin/nologin
|
fwupd-refresh:x:989:989:Firmware update daemon:/var/lib/fwupd:/usr/sbin/nologin
|
||||||
usbmux:x:108:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
|
usbmux:x:108:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
|
||||||
sshd:x:109:65534::/run/sshd:/usr/sbin/nologin
|
sshd:x:109:65534::/run/sshd:/usr/sbin/nologin
|
||||||
phares:x:1000:1000:Mike Phares:/home/phares:/bin/bash
|
phares:x:1001:1001:Mike Phares:/home/phares:/bin/bash
|
||||||
pihole:x:1001:1001:Pi-hole,,,:/home/pihole:/bin/bash
|
podman:x:1000:1000:Podman,,,:/home/podman:/bin/bash
|
||||||
podman:x:1002:1002:Podman,,,:/home/podman:/bin/bash
|
|
||||||
lphares:x:1003:1003:Logan Phares,,,:/home/lphares:/bin/bash
|
lphares:x:1003:1003:Logan Phares,,,:/home/lphares:/bin/bash
|
||||||
bmiller:x:1004:1004:Bill Miller,,,:/home/bmiller:/bin/bash
|
bmiller:x:1004:1004:Bill Miller,,,:/home/bmiller:/bin/bash
|
||||||
unbound:x:110:111::/var/lib/unbound:/usr/sbin/nologin
|
unbound:x:110:111::/var/lib/unbound:/usr/sbin/nologin
|
||||||
dnsmasq:x:999:65534:dnsmasq:/var/lib/misc:/usr/sbin/nologin
|
dnsmasq:x:999:65534:dnsmasq:/var/lib/misc:/usr/sbin/nologin
|
||||||
cockpit-ws:x:111:112::/nonexistent:/usr/sbin/nologin
|
cockpit-ws:x:111:112::/nonexistent:/usr/sbin/nologin
|
||||||
cockpit-wsinstance:x:112:113::/nonexistent:/usr/sbin/nologin
|
cockpit-wsinstance:x:112:113::/nonexistent:/usr/sbin/nologin
|
||||||
|
pcp:x:996:988:Performance Co-Pilot:/var/lib/pcp:/usr/sbin/nologin
|
||||||
|
persa:x:1002:1002:Persaya Cortez,,,:/home/persa:/bin/bash
|
||||||
|
redis:x:113:114::/var/lib/redis:/usr/sbin/nologin
|
||||||
|
swtpm:x:114:115:virtual TPM software stack,,,:/var/lib/swtpm:/bin/false
|
||||||
|
libvirt-qemu:x:64055:994:Libvirt Qemu,,,:/var/lib/libvirt:/usr/sbin/nologin
|
||||||
|
libvirt-dnsmasq:x:115:117:Libvirt Dnsmasq,,,:/var/lib/libvirt/dnsmasq:/usr/sbin/nologin
|
||||||
|
libvirtdbus:x:116:118:libvirt-dbus user,,,:/nonexistent:/usr/sbin/nologin
|
||||||
|
13
etc/passwd-
13
etc/passwd-
@ -31,11 +31,18 @@ landscape:x:107:109::/var/lib/landscape:/usr/sbin/nologin
|
|||||||
fwupd-refresh:x:989:989:Firmware update daemon:/var/lib/fwupd:/usr/sbin/nologin
|
fwupd-refresh:x:989:989:Firmware update daemon:/var/lib/fwupd:/usr/sbin/nologin
|
||||||
usbmux:x:108:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
|
usbmux:x:108:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
|
||||||
sshd:x:109:65534::/run/sshd:/usr/sbin/nologin
|
sshd:x:109:65534::/run/sshd:/usr/sbin/nologin
|
||||||
phares:x:1000:1000:Mike Phares:/home/phares:/bin/bash
|
phares:x:1001:1001:Mike Phares:/home/phares:/bin/bash
|
||||||
pihole:x:1001:1001:Pi-hole,,,:/home/pihole:/bin/bash
|
podman:x:1000:1000:Podman,,,:/home/podman:/bin/bash
|
||||||
podman:x:1002:1002:Podman,,,:/home/podman:/bin/bash
|
|
||||||
lphares:x:1003:1003:Logan Phares,,,:/home/lphares:/bin/bash
|
lphares:x:1003:1003:Logan Phares,,,:/home/lphares:/bin/bash
|
||||||
bmiller:x:1004:1004:Bill Miller,,,:/home/bmiller:/bin/bash
|
bmiller:x:1004:1004:Bill Miller,,,:/home/bmiller:/bin/bash
|
||||||
unbound:x:110:111::/var/lib/unbound:/usr/sbin/nologin
|
unbound:x:110:111::/var/lib/unbound:/usr/sbin/nologin
|
||||||
dnsmasq:x:999:65534:dnsmasq:/var/lib/misc:/usr/sbin/nologin
|
dnsmasq:x:999:65534:dnsmasq:/var/lib/misc:/usr/sbin/nologin
|
||||||
cockpit-ws:x:111:112::/nonexistent:/usr/sbin/nologin
|
cockpit-ws:x:111:112::/nonexistent:/usr/sbin/nologin
|
||||||
|
cockpit-wsinstance:x:112:113::/nonexistent:/usr/sbin/nologin
|
||||||
|
pcp:x:996:988:Performance Co-Pilot:/var/lib/pcp:/usr/sbin/nologin
|
||||||
|
persa:x:1002:1002:Persaya Cortez,,,:/home/persa:/bin/bash
|
||||||
|
redis:x:113:114::/var/lib/redis:/usr/sbin/nologin
|
||||||
|
swtpm:x:114:115:virtual TPM software stack,,,:/var/lib/swtpm:/bin/false
|
||||||
|
libvirt-qemu:x:64055:994:Libvirt Qemu,,,:/var/lib/libvirt:/usr/sbin/nologin
|
||||||
|
libvirt-dnsmasq:x:115:117:Libvirt Dnsmasq,,,:/var/lib/libvirt/dnsmasq:/usr/sbin/nologin
|
||||||
|
libvirtdbus:x:116:118::/nonexistent:/usr/sbin/nologin
|
||||||
|
@ -1,14 +0,0 @@
|
|||||||
PIHOLE_INTERFACE=enp2s0
|
|
||||||
QUERY_LOGGING=true
|
|
||||||
INSTALL_WEB_SERVER=true
|
|
||||||
INSTALL_WEB_INTERFACE=true
|
|
||||||
LIGHTTPD_ENABLED=true
|
|
||||||
CACHE_SIZE=10000
|
|
||||||
DNS_FQDN_REQUIRED=true
|
|
||||||
DNS_BOGUS_PRIV=true
|
|
||||||
DNSMASQ_LISTENING=local
|
|
||||||
WEBPASSWORD=4f2f4f253d64a90315c0ace8a61b6b6e828f8d8d996b0a0b0e153230617bedd3
|
|
||||||
BLOCKING_ENABLED=true
|
|
||||||
PIHOLE_DNS_1=127.0.0.1#5335
|
|
||||||
DNSSEC=false
|
|
||||||
REV_SERVER=false
|
|
@ -32,7 +32,6 @@ fwupd-refresh:!*:19836::::::
|
|||||||
usbmux:!:19929::::::
|
usbmux:!:19929::::::
|
||||||
sshd:!:19929::::::
|
sshd:!:19929::::::
|
||||||
phares:$y$j9T$mk3Fb5hENQkN//RvJPyB6.$xdsox1L6gnbZibmeEsveAMNjZ22J7sIEz.W957Osj1A:19930:0:99999:7:::
|
phares:$y$j9T$mk3Fb5hENQkN//RvJPyB6.$xdsox1L6gnbZibmeEsveAMNjZ22J7sIEz.W957Osj1A:19930:0:99999:7:::
|
||||||
pihole:$y$j9T$k223Uf777oEQZtuag6kXO1$vfa4e7EdalU7A9ECEoPJ7QHnN9Bkylct7kNIHZYXGP8:19929:0:99999:7:::
|
|
||||||
podman:$y$j9T$kuuH4dAlA8LAbBASzBA6y/$9xVT4/nstOeIVTVoil/WSUKMIyePo8dKBXDByMm.qG5:19929:0:99999:7:::
|
podman:$y$j9T$kuuH4dAlA8LAbBASzBA6y/$9xVT4/nstOeIVTVoil/WSUKMIyePo8dKBXDByMm.qG5:19929:0:99999:7:::
|
||||||
lphares:$y$j9T$m33.tZHwrEl7X.ovXN.a7/$z2We2A72fQMDkSQIYetbXuNNTk8YHNEvQeisSwtmo6C:19929:0:99999:7:::
|
lphares:$y$j9T$m33.tZHwrEl7X.ovXN.a7/$z2We2A72fQMDkSQIYetbXuNNTk8YHNEvQeisSwtmo6C:19929:0:99999:7:::
|
||||||
bmiller:$y$j9T$sYFlvEEV1yntCl3CeN8M70$CpuMQrO3K9NFF122NsJWvM5nxnQK8EXvmD3C41.JZm8:19929:0:99999:7:::
|
bmiller:$y$j9T$sYFlvEEV1yntCl3CeN8M70$CpuMQrO3K9NFF122NsJWvM5nxnQK8EXvmD3C41.JZm8:19929:0:99999:7:::
|
||||||
@ -40,3 +39,10 @@ unbound:!:19929::::::
|
|||||||
dnsmasq:!:19930::::::
|
dnsmasq:!:19930::::::
|
||||||
cockpit-ws:!:19930::::::
|
cockpit-ws:!:19930::::::
|
||||||
cockpit-wsinstance:!:19930::::::
|
cockpit-wsinstance:!:19930::::::
|
||||||
|
pcp:!:19938::::::
|
||||||
|
persa:$y$j9T$9AiaUMaouaQcqO9TOrKZe.$XSerhwFhjwluy/xONVpJVUmeQfXk/qasTO6FCFmw9E1:19978:0:99999:7:::
|
||||||
|
redis:!:20001::::::
|
||||||
|
swtpm:!:20038::::::
|
||||||
|
libvirt-qemu:!:20038::::::
|
||||||
|
libvirt-dnsmasq:!:20038::::::
|
||||||
|
libvirtdbus:!:20038::::::
|
||||||
|
10
etc/shadow-
10
etc/shadow-
@ -31,11 +31,17 @@ landscape:!:19836::::::
|
|||||||
fwupd-refresh:!*:19836::::::
|
fwupd-refresh:!*:19836::::::
|
||||||
usbmux:!:19929::::::
|
usbmux:!:19929::::::
|
||||||
sshd:!:19929::::::
|
sshd:!:19929::::::
|
||||||
phares:$6$X.bTmW8z9/2WwB08$pivFW7YtPuGBou4Ut7eB1Y1ELwOVumy5tJYMf/RTQgkdUWzkKs9jndwfuVzTRlknbyGzA4A1lPImVtVHOCyBs/:19929:0:99999:7:::
|
phares:$y$j9T$mk3Fb5hENQkN//RvJPyB6.$xdsox1L6gnbZibmeEsveAMNjZ22J7sIEz.W957Osj1A:19930:0:99999:7:::
|
||||||
pihole:$y$j9T$k223Uf777oEQZtuag6kXO1$vfa4e7EdalU7A9ECEoPJ7QHnN9Bkylct7kNIHZYXGP8:19929:0:99999:7:::
|
|
||||||
podman:$y$j9T$kuuH4dAlA8LAbBASzBA6y/$9xVT4/nstOeIVTVoil/WSUKMIyePo8dKBXDByMm.qG5:19929:0:99999:7:::
|
podman:$y$j9T$kuuH4dAlA8LAbBASzBA6y/$9xVT4/nstOeIVTVoil/WSUKMIyePo8dKBXDByMm.qG5:19929:0:99999:7:::
|
||||||
lphares:$y$j9T$m33.tZHwrEl7X.ovXN.a7/$z2We2A72fQMDkSQIYetbXuNNTk8YHNEvQeisSwtmo6C:19929:0:99999:7:::
|
lphares:$y$j9T$m33.tZHwrEl7X.ovXN.a7/$z2We2A72fQMDkSQIYetbXuNNTk8YHNEvQeisSwtmo6C:19929:0:99999:7:::
|
||||||
bmiller:$y$j9T$sYFlvEEV1yntCl3CeN8M70$CpuMQrO3K9NFF122NsJWvM5nxnQK8EXvmD3C41.JZm8:19929:0:99999:7:::
|
bmiller:$y$j9T$sYFlvEEV1yntCl3CeN8M70$CpuMQrO3K9NFF122NsJWvM5nxnQK8EXvmD3C41.JZm8:19929:0:99999:7:::
|
||||||
unbound:!:19929::::::
|
unbound:!:19929::::::
|
||||||
dnsmasq:!:19930::::::
|
dnsmasq:!:19930::::::
|
||||||
cockpit-ws:!:19930::::::
|
cockpit-ws:!:19930::::::
|
||||||
|
cockpit-wsinstance:!:19930::::::
|
||||||
|
pcp:!:19938::::::
|
||||||
|
persa:$y$j9T$9AiaUMaouaQcqO9TOrKZe.$XSerhwFhjwluy/xONVpJVUmeQfXk/qasTO6FCFmw9E1:19978:0:99999:7:::
|
||||||
|
redis:!:20001::::::
|
||||||
|
swtpm:!:20038::::::
|
||||||
|
libvirt-qemu:!:20038::::::
|
||||||
|
libvirt-dnsmasq:!:20038::::::
|
||||||
|
@ -30,7 +30,7 @@
|
|||||||
#LLMNR=no
|
#LLMNR=no
|
||||||
#Cache=no-negative
|
#Cache=no-negative
|
||||||
#CacheFromLocalhost=no
|
#CacheFromLocalhost=no
|
||||||
DNSStubListener=no
|
#DNSStubListener=yes
|
||||||
#DNSStubListenerExtra=
|
#DNSStubListenerExtra=
|
||||||
#ReadEtcHosts=yes
|
#ReadEtcHosts=yes
|
||||||
#ResolveUnicastSingleLabel=no
|
#ResolveUnicastSingleLabel=no
|
||||||
|
19
etc/systemd/system/snap.adguard-home.adguard-home.service
Normal file
19
etc/systemd/system/snap.adguard-home.adguard-home.service
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
[Unit]
|
||||||
|
# Auto-generated, DO NOT EDIT
|
||||||
|
Description=Service for snap application adguard-home.adguard-home
|
||||||
|
Requires=snap-adguard\x2dhome-7793.mount
|
||||||
|
Wants=network.target
|
||||||
|
After=snap-adguard\x2dhome-7793.mount network.target snapd.apparmor.service
|
||||||
|
X-Snappy=yes
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
EnvironmentFile=-/etc/environment
|
||||||
|
ExecStart=/usr/bin/snap run adguard-home
|
||||||
|
SyslogIdentifier=adguard-home.adguard-home
|
||||||
|
Restart=always
|
||||||
|
WorkingDirectory=/var/snap/adguard-home/7793
|
||||||
|
TimeoutStopSec=30
|
||||||
|
Type=simple
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user