Compare commits
5 Commits
e890931a44
...
03-02-a
Author | SHA1 | Date | |
---|---|---|---|
9d0a142419 | |||
6c9fa8cfaa | |||
7016660fd1 | |||
c822f12182 | |||
7008fd0f67 |
9
.vscode/.http
vendored
Normal file
9
.vscode/.http
vendored
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
@host = http://192.168.11.2
|
||||||
|
# @pat = asdf
|
||||||
|
# @ids = 126018, 224543
|
||||||
|
|
||||||
|
GET {{host}}/ocs-client-run.conf
|
||||||
|
# Accept: application/json
|
||||||
|
# Authorization: Basic {{pat}}
|
||||||
|
|
||||||
|
###
|
2
.vscode/settings.json
vendored
2
.vscode/settings.json
vendored
@ -21,6 +21,7 @@
|
|||||||
"gitea",
|
"gitea",
|
||||||
"gogs",
|
"gogs",
|
||||||
"immich",
|
"immich",
|
||||||
|
"JMLC",
|
||||||
"journalctl",
|
"journalctl",
|
||||||
"kanbn",
|
"kanbn",
|
||||||
"kestra",
|
"kestra",
|
||||||
@ -34,6 +35,7 @@
|
|||||||
"personalised",
|
"personalised",
|
||||||
"pgadmin",
|
"pgadmin",
|
||||||
"phares",
|
"phares",
|
||||||
|
"Sumco",
|
||||||
"umbrel",
|
"umbrel",
|
||||||
"usersecrets",
|
"usersecrets",
|
||||||
"vaultwarden",
|
"vaultwarden",
|
||||||
|
@ -6,12 +6,9 @@ snap install dashkiosk
|
|||||||
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
||||||
snap set wpe-webkit-mir-kiosk daemon=true
|
snap set wpe-webkit-mir-kiosk daemon=true
|
||||||
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
||||||
exit
|
|
||||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
|
||||||
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
||||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
||||||
snap set ubuntu-frame daemon=true
|
snap set ubuntu-frame daemon=true
|
||||||
exit
|
|
||||||
reboot
|
reboot
|
||||||
cat /root/.ssh/authorized_keys
|
cat /root/.ssh/authorized_keys
|
||||||
nano /root/.ssh/authorized_keys
|
nano /root/.ssh/authorized_keys
|
@ -1,17 +1,13 @@
|
|||||||
cat /root/.ssh/authorized_keys
|
cat /root/.ssh/authorized_keys
|
||||||
nano /root/.ssh/authorized_keys
|
nano /root/.ssh/authorized_keys
|
||||||
exit
|
|
||||||
apt-get install podman -y
|
apt-get install podman -y
|
||||||
apt-cache rdepends podman-compose
|
apt-cache rdepends podman-compose
|
||||||
apt-get install podman-compose -y
|
apt-get install podman-compose -y
|
||||||
adduser podman sudo
|
adduser podman sudo
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
timedatectl set-timezone America/Phoenix
|
timedatectl set-timezone America/Phoenix
|
||||||
date
|
date
|
||||||
apt-get update
|
apt-get update
|
||||||
apt upgrade -y
|
apt upgrade -y
|
||||||
adduser pihole
|
|
||||||
adduser podman
|
adduser podman
|
||||||
adduser lphares
|
adduser lphares
|
||||||
mkdir /home/lphares/.ssh
|
mkdir /home/lphares/.ssh
|
||||||
@ -26,64 +22,36 @@ adduser bmiller lphares
|
|||||||
sudo usermod -a -G lphares bmiller
|
sudo usermod -a -G lphares bmiller
|
||||||
newgrp lphares
|
newgrp lphares
|
||||||
systemctl restart ssh
|
systemctl restart ssh
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
cd /run/user/0/
|
cd /run/user/0/
|
||||||
ls -la
|
|
||||||
cd ..
|
cd ..
|
||||||
ls -la
|
ls -la
|
||||||
cp -R 0/ 1002/
|
cp -R 0/ 1002/
|
||||||
chown -R podman:podman /run/user/1002/
|
|
||||||
sudo -iu podman
|
|
||||||
rm -R /run/user/1002/
|
rm -R /run/user/1002/
|
||||||
mkdir -p /run/user/1002/
|
mkdir -p /run/user/1002/
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /run/user/1002/
|
chown -R podman:podman /run/user/1002/
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
adduser pihole
|
adduser pihole
|
||||||
cd /tmp
|
cd /tmp
|
||||||
curl -sSL https://install.pi-hole.net | bash
|
curl -sSL https://install.pi-hole.net | bash
|
||||||
pihole -a -p LhhI1S73VZhtP#WIG8Tk
|
pihole -a -p LhhI1S73VZhtP#WIG8Tk
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
apt install unbound -y
|
apt install unbound -y
|
||||||
nano /etc/unbound/unbound.conf.d/pi-hole.conf
|
nano /etc/unbound/unbound.conf.d/pi-hole.conf
|
||||||
service unbound restart
|
|
||||||
nano /etc/lighttpd/lighttpd.conf
|
nano /etc/lighttpd/lighttpd.conf
|
||||||
pihole -up
|
pihole -up
|
||||||
service lighttpd restart
|
service lighttpd restart
|
||||||
dig fail01.dnssec.works @127.0.0.1 -p 5335
|
|
||||||
dig dnssec.works @127.0.0.1 -p 5335
|
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
ln -s /var/log/nginx /var/www/html/log-nginx
|
ln -s /var/log/nginx /var/www/html/log-nginx
|
||||||
ls -la /var/www/html
|
ls -la /var/www/html
|
||||||
exit
|
|
||||||
cp ~/.bash_history /etc/bash_history_2024-07-25.txt
|
cp ~/.bash_history /etc/bash_history_2024-07-25.txt
|
||||||
cat /etc/bash_history_2024-07-25.txt
|
cat /etc/bash_history_2024-07-25.txt
|
||||||
exit
|
|
||||||
apt install smartmontools
|
apt install smartmontools
|
||||||
smartctl -i /dev/sda
|
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
apt install snapd -y
|
apt install snapd -y
|
||||||
apt install sudo links unzip nginx git nano ncdu -y
|
|
||||||
snap install dashkiosk
|
snap install dashkiosk
|
||||||
apt install sudo links unzip nginx git nano ncdu -y
|
apt install sudo links unzip nginx git nano ncdu -y
|
||||||
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
snap install ubuntu-frame wpe-webkit-mir-kiosk
|
||||||
snap set wpe-webkit-mir-kiosk daemon=true
|
snap set wpe-webkit-mir-kiosk daemon=true
|
||||||
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
snap set wpe-webkit-mir-kiosk url=http://localhost:9400/receiver
|
||||||
exit
|
|
||||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
|
||||||
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
/snap/wpe-webkit-mir-kiosk/current/bin/setup.sh
|
||||||
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
wpe-webkit-mir-kiosk.cog http://localhost:9400/receiver
|
||||||
snap set ubuntu-frame daemon=true
|
snap set ubuntu-frame daemon=true
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
chmod -R podman:podman /home/podman/.config/containers/systemd/
|
chmod -R podman:podman /home/podman/.config/containers/systemd/
|
||||||
chown -R podman:podman /home/podman/.config/containers/systemd/
|
chown -R podman:podman /home/podman/.config/containers/systemd/
|
||||||
rm -R .config/containers/systemd/*.ignore
|
rm -R .config/containers/systemd/*.ignore
|
||||||
@ -95,8 +63,6 @@ rm -R /home/podman/.config/containers/systemd/*.container
|
|||||||
mkdir /home/podman/.ssh
|
mkdir /home/podman/.ssh
|
||||||
cp /root/.ssh/authorized_keys /home/podman/.ssh/authorized_keys
|
cp /root/.ssh/authorized_keys /home/podman/.ssh/authorized_keys
|
||||||
chown podman:podman -R /home/podman
|
chown podman:podman -R /home/podman
|
||||||
systemctl --user daemon-reload
|
|
||||||
sudo -iu podman
|
|
||||||
cd ~/
|
cd ~/
|
||||||
mkdir -p ~/.bashrc.d
|
mkdir -p ~/.bashrc.d
|
||||||
echo "export XDG_RUNTIME_DIR=/run/user/$(id -u)" > ~/.bashrc.d/systemd
|
echo "export XDG_RUNTIME_DIR=/run/user/$(id -u)" > ~/.bashrc.d/systemd
|
||||||
@ -107,9 +73,6 @@ systemctl --user daemon-reload
|
|||||||
podman image prune
|
podman image prune
|
||||||
podman volume prune
|
podman volume prune
|
||||||
podman container prune
|
podman container prune
|
||||||
exit
|
|
||||||
shutdown now
|
|
||||||
ip a
|
|
||||||
lsof -i -P -n | grep LISTEN
|
lsof -i -P -n | grep LISTEN
|
||||||
apt-cache rdepends cockpit
|
apt-cache rdepends cockpit
|
||||||
apt install cockpit -y
|
apt install cockpit -y
|
||||||
@ -117,51 +80,32 @@ passwd phares
|
|||||||
apt-get install cockpit cockpit-podman -y
|
apt-get install cockpit cockpit-podman -y
|
||||||
systemctl enable --now cockpit.socket
|
systemctl enable --now cockpit.socket
|
||||||
journalctl -fu unbound-resolvconf.service
|
journalctl -fu unbound-resolvconf.service
|
||||||
ip a
|
|
||||||
service unbound restart
|
|
||||||
journalctl -fu unbound-resolvconf.service
|
|
||||||
nano /etc/sysctl.conf
|
nano /etc/sysctl.conf
|
||||||
sysctl -p
|
sysctl -p
|
||||||
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
ip a
|
|
||||||
nano /etc/postfix/main.cf
|
nano /etc/postfix/main.cf
|
||||||
nano /etc/default/grub
|
nano /etc/default/grub
|
||||||
grub2-mkconfig
|
grub2-mkconfig
|
||||||
grub-mkconfig
|
grub-mkconfig
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
ip a
|
ip a
|
||||||
nmcli
|
nmcli
|
||||||
dig pi-hole.net @127.0.0.1 -p 5335
|
dig pi-hole.net @127.0.0.1 -p 5335
|
||||||
dig fail01.dnssec.works @127.0.0.1 -p 5335
|
dig fail01.dnssec.works @127.0.0.1 -p 5335
|
||||||
dig dnssec.works @127.0.0.1 -p 5335
|
dig dnssec.works @127.0.0.1 -p 5335
|
||||||
systemctl is-active unbound-resolvconf.service
|
systemctl is-active unbound-resolvconf.service
|
||||||
systemctl disable --now unbound-resolvconf.service
|
|
||||||
sed -Ei 's/^unbound_conf=/#unbound_conf=/' /etc/resolvconf.conf
|
sed -Ei 's/^unbound_conf=/#unbound_conf=/' /etc/resolvconf.conf
|
||||||
service unbound restart
|
service unbound restart
|
||||||
rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf
|
rm /etc/unbound/unbound.conf.d/resolvconf_resolvers.conf
|
||||||
systemctl disable --now unbound-resolvconf.service
|
systemctl disable --now unbound-resolvconf.service
|
||||||
exit
|
|
||||||
reboot\
|
reboot\
|
||||||
reboot
|
reboot
|
||||||
sudo -iu podman
|
sudo -iu podman
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
shutdown now
|
shutdown now
|
||||||
lvs -a
|
lvs -a
|
||||||
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
|
||||||
smartctl -i /dev/sda
|
smartctl -i /dev/sda
|
||||||
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||||
mkdir /mnt/usb
|
mkdir /mnt/usb
|
||||||
mount /dev/sdb2 /mnt/usb
|
mount /dev/sdb2 /mnt/usb
|
||||||
exit
|
|
||||||
nginx -t
|
nginx -t
|
||||||
nginx -s reload
|
nginx -s reload
|
||||||
exit
|
exit
|
@ -1,70 +1,26 @@
|
|||||||
exit
|
|
||||||
cd ~/.bashrc.d/systemd
|
cd ~/.bashrc.d/systemd
|
||||||
cd ~/.bashrc.d
|
cd ~/.bashrc.d
|
||||||
ls -la
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
systemctl --user list-unit-files
|
systemctl --user list-unit-files
|
||||||
cd /etc/containers/systemd/users
|
cd /etc/containers/systemd/users
|
||||||
ls
|
|
||||||
ls -la
|
|
||||||
cd ..
|
|
||||||
ls -la
|
|
||||||
systemctl start --user
|
systemctl start --user
|
||||||
cd /usr/lib/systemd/system-generators/podman-system-generator
|
cd /usr/lib/systemd/system-generators/podman-system-generator
|
||||||
cd /usr/lib/systemd/system-generators
|
cd /usr/lib/systemd/system-generators
|
||||||
ls -la
|
|
||||||
ls -la
|
|
||||||
cd /usr/libexec/podman/quadlet
|
cd /usr/libexec/podman/quadlet
|
||||||
cd /usr/libexec/podman
|
cd /usr/libexec/podman
|
||||||
ls -la
|
|
||||||
apt-get install apt install podman-quadlet
|
apt-get install apt install podman-quadlet
|
||||||
apt install podman-quadlet
|
apt install podman-quadlet
|
||||||
ls -la
|
|
||||||
ls -la /usr/libexec/podman
|
ls -la /usr/libexec/podman
|
||||||
systemctl -l | grep -i rootlessport
|
systemctl -l | grep -i rootlessport
|
||||||
ps aux | grep rootlessport
|
ps aux | grep rootlessport
|
||||||
podman-generate-systemd
|
podman-generate-systemd
|
||||||
ls
|
|
||||||
whereis podman-generate-systemd
|
whereis podman-generate-systemd
|
||||||
clear
|
|
||||||
apt list --installed
|
|
||||||
clear
|
|
||||||
exit
|
|
||||||
clear
|
|
||||||
apt list --installed
|
apt list --installed
|
||||||
clear
|
clear
|
||||||
/usr/libexec/podman/quadlet -dryrun
|
/usr/libexec/podman/quadlet -dryrun
|
||||||
/usr/libexec/podman/quadlet --user -dryrun
|
/usr/libexec/podman/quadlet --user -dryrun
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
chown -R podman:podman /home/podman
|
|
||||||
/usr/libexec/podman/quadlet -dryrun --user
|
|
||||||
sudo -iu podman
|
|
||||||
find / -name "immich-server.service" 2>/dev/null
|
find / -name "immich-server.service" 2>/dev/null
|
||||||
rm -R /home/podman/d
|
rm -R /home/podman/d
|
||||||
find / -name "uptime-kuma-server.service" 2>/dev/null
|
find / -name "uptime-kuma-server.service" 2>/dev/null
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
|
||||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
links https://phares.duckdns.org
|
|
||||||
nano /etc/hosts
|
|
||||||
links https://phares.duckdns.org
|
|
||||||
ls /var/www/html
|
ls /var/www/html
|
||||||
nano index.html
|
nano index.html
|
||||||
nano /var/www/html/index.html
|
nano /var/www/html/index.html
|
||||||
@ -73,180 +29,55 @@ ls /var/www
|
|||||||
mkdir /var/www/html
|
mkdir /var/www/html
|
||||||
cp /var/www/html-slideshow/index.nginx-debian.html /var/www/html/
|
cp /var/www/html-slideshow/index.nginx-debian.html /var/www/html/
|
||||||
mv /var/www/html /var/www/html-nginx
|
mv /var/www/html /var/www/html-nginx
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
links https://phares.duckdns.org
|
links https://phares.duckdns.org
|
||||||
ls /var/www/html-nginx
|
ls /var/www/html-nginx
|
||||||
links https://adguard.phares.duckdns.org/
|
links https://adguard.phares.duckdns.org/
|
||||||
nano /etc/hosts
|
|
||||||
links https://adguard.phares.duckdns.org/
|
|
||||||
nano /etc/hosts
|
|
||||||
links https://adguard.phares.duckdns.org/
|
|
||||||
nano /etc/hosts
|
|
||||||
nano /etc/hosts
|
|
||||||
links https://adguard.phares.duckdns.org/
|
|
||||||
nano /etc/hosts
|
|
||||||
links https://adguard.phares.duckdns.org/
|
|
||||||
exit
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
podman pull docker.io/m1k1o/neko:firefox
|
podman pull docker.io/m1k1o/neko:firefox
|
||||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
|
||||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
podman pull docker.io/mattermost/mattermost-team-edition:9.11.2
|
podman pull docker.io/mattermost/mattermost-team-edition:9.11.2
|
||||||
sudo -iu podman
|
|
||||||
podman list images
|
podman list images
|
||||||
podman ls images
|
podman ls images
|
||||||
podman images ls
|
podman images ls
|
||||||
podman image ls
|
|
||||||
podman image prone
|
podman image prone
|
||||||
podman image purge
|
podman image purge
|
||||||
podman image --help
|
podman image --help
|
||||||
podman image prune
|
podman image prune
|
||||||
y
|
y
|
||||||
podman image ls
|
|
||||||
podman image rm 2
|
podman image rm 2
|
||||||
podman image rm 7
|
podman image rm 7
|
||||||
podman image ls
|
podman image ls
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nano /etc/hosts
|
nano /etc/hosts
|
||||||
nano /etc/hosts
|
|
||||||
nano /etc/hosts
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
cat /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
cat /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||||
nano/home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
nano/home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||||
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||||
sudo -iu podman
|
|
||||||
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
cd /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-external/_data
|
cd /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-external/_data
|
||||||
ls
|
|
||||||
ls -la
|
|
||||||
cd /
|
|
||||||
sudo -iu podman
|
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-upload/_data/thumbs/5f0b1052-466d-44de-a554-226d7256850d/
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-immich-server-upload/_data/thumbs/5f0b1052-466d-44de-a554-226d7256850d/
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
links https://192.168.0.43:8123
|
links https://192.168.0.43:8123
|
||||||
links http://192.168.0.43:8123
|
links http://192.168.0.43:8123
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
|
||||||
cp -R /var/www/html-nginx/ /var/www/html-quartz
|
cp -R /var/www/html-nginx/ /var/www/html-quartz
|
||||||
cd /var/www/html-quartz
|
cd /var/www/html-quartz
|
||||||
ls
|
|
||||||
mv index.nginx-debian.html index.html
|
mv index.nginx-debian.html index.html
|
||||||
links http://192.168.11.2:8069/
|
|
||||||
links http://192.168.11.2:8069/index.html
|
links http://192.168.11.2:8069/index.html
|
||||||
cd /
|
|
||||||
nginx -t
|
|
||||||
cd /var/www/html-infineon/
|
cd /var/www/html-infineon/
|
||||||
ls
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
apt-get update
|
apt-get update
|
||||||
apt-get upgrade
|
apt-get upgrade
|
||||||
reboot
|
|
||||||
links http://192.168.11.2:8069/
|
|
||||||
links http://192.168.11.2:8069/
|
links http://192.168.11.2:8069/
|
||||||
links http://192.168.11.2/
|
links http://192.168.11.2/
|
||||||
sudo -iu podman
|
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions/
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions/
|
||||||
rm /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
|
rm /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
|
||||||
rm -R /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
|
rm -R /home/podman/.local/share/containers/storage/volumes/systemd-odoo-server-data/_data/sessions
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
|
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/var
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/var
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/phares3757/
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data/git/repositories/phares3757/
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nano /root/.acme.sh/*.phares.duckdns.org_ecc/*.phares.duckdns.org.cer
|
nano /root/.acme.sh/*.phares.duckdns.org_ecc/*.phares.duckdns.org.cer
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
reboot
|
|
||||||
links http://127.0.0.1:8080/slideshow/index.html?nocache=2024-07-01-11-36
|
links http://127.0.0.1:8080/slideshow/index.html?nocache=2024-07-01-11-36
|
||||||
links http://127.0.0.1:8080/slideshow/index.html
|
links http://127.0.0.1:8080/slideshow/index.html
|
||||||
links http://127.0.0.1:8080/slideshow
|
links http://127.0.0.1:8080/slideshow
|
||||||
links http://192.168.11.2:8080/slideshow
|
links http://192.168.11.2:8080/slideshow
|
||||||
nginx -t
|
|
||||||
reboot
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
exit
|
|
||||||
mv /root/.acme.sh/affirm.duckdns.org_ecc/ /root/acme.sh-master/wild-affirm
|
mv /root/.acme.sh/affirm.duckdns.org_ecc/ /root/acme.sh-master/wild-affirm
|
||||||
mv /root/acme.sh-master/wild-affirm /root/.acme.sh/wild-affirm
|
mv /root/acme.sh-master/wild-affirm /root/.acme.sh/wild-affirm
|
||||||
exit
|
|
||||||
nginx -t
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
exit
|
|
||||||
cd /tmp
|
cd /tmp
|
||||||
git clone https://github.com/acmesh-official/acme.sh.git
|
git clone https://github.com/acmesh-official/acme.sh.git
|
||||||
cd /tmp/acme.sh
|
cd /tmp/acme.sh
|
||||||
@ -263,190 +94,77 @@ mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.conf /root/.acme.sh/wild-jmlc/jm
|
|||||||
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr
|
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr
|
||||||
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr.conf /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr.conf
|
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.csr.conf /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.csr.conf
|
||||||
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.key /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.key
|
mv /root/.acme.sh/wild-jmlc/\*.jmlc.duckdns.org.key /root/.acme.sh/wild-jmlc/jmlc.duckdns.org.key
|
||||||
nginx -t
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
links http://192.168.11.2:9090
|
links http://192.168.11.2:9090
|
||||||
links https://192.168.11.2:9090
|
links https://192.168.11.2:9090
|
||||||
nginx -s reload
|
|
||||||
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
|
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||||
man cockpit.conf
|
man cockpit.conf
|
||||||
nano /etc/cockpit/cockpit.conf
|
|
||||||
systemctl status cockpit.socket
|
systemctl status cockpit.socket
|
||||||
systemctl status cockpit
|
|
||||||
systemctl stop cockpit
|
|
||||||
systemctl stop cockpit.socket
|
|
||||||
systemctl stop cockpit
|
|
||||||
systemctl start cockpit
|
|
||||||
systemctl start cockpit.socket
|
|
||||||
nginx -s reload
|
|
||||||
rm /etc/cockpit/cockpit.conf
|
rm /etc/cockpit/cockpit.conf
|
||||||
systemctl stop cockpit
|
|
||||||
systemctl stop cockpit.socket
|
systemctl stop cockpit.socket
|
||||||
systemctl stop cockpit
|
systemctl stop cockpit
|
||||||
systemctl start cockpit.socket
|
systemctl start cockpit.socket
|
||||||
systemctl start cockpit
|
systemctl start cockpit
|
||||||
nginx -s reload
|
|
||||||
journalctl -u cockpit
|
journalctl -u cockpit
|
||||||
cd /etc/cockpit/
|
cd /etc/cockpit/
|
||||||
ls
|
|
||||||
cd ws-certs.d/
|
cd ws-certs.d/
|
||||||
ls
|
|
||||||
mv 0-self-signed.cert 0-self-signed.cert.old
|
mv 0-self-signed.cert 0-self-signed.cert.old
|
||||||
mv 0-self-signed.key 0-self-signed.key.old
|
mv 0-self-signed.key 0-self-signed.key.old
|
||||||
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer 0-self-signed.cert
|
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer 0-self-signed.cert
|
||||||
cp /root/.acme.sh/wild-phares/phares.duckdns.org.key 0-self-signed.key
|
cp /root/.acme.sh/wild-phares/phares.duckdns.org.key 0-self-signed.key
|
||||||
systemctl restart cockpit
|
|
||||||
systemctl status cockpit
|
|
||||||
systemctl status cockpit
|
|
||||||
systemctl status cockpit
|
|
||||||
systemctl status cockpit
|
|
||||||
systemctl status cockpit
|
|
||||||
systemctl restart cockpit
|
|
||||||
nano /etc/cockpit/cockpit.conf
|
nano /etc/cockpit/cockpit.conf
|
||||||
systemctl restart cockpit
|
systemctl restart cockpit
|
||||||
systemctl status cockpit
|
systemctl status cockpit
|
||||||
systemctl status cockpit
|
|
||||||
systemctl status cockpit
|
|
||||||
systemctl status cockpit
|
|
||||||
systemctl restart cockpit
|
|
||||||
systemctl status cockpit
|
|
||||||
nginx -s reload
|
|
||||||
systemctl restart cockpit
|
|
||||||
systemctl status cockpit
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
rm -R /mnt/free-file-sync/notes/FS-ADO/
|
rm -R /mnt/free-file-sync/notes/FS-ADO/
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nignx -t
|
nignx -t
|
||||||
nginx -t
|
nginx -t
|
||||||
nginx -s reload
|
nginx -s reload
|
||||||
reboot
|
|
||||||
lsof -i -P -n | grep LISTEN
|
lsof -i -P -n | grep LISTEN
|
||||||
links http://192.168.11.2:5007/
|
links http://192.168.11.2:5007/
|
||||||
links http://127.0.0.1:5007/
|
links http://127.0.0.1:5007/
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
chmod -R 0774 /root/.acme.sh/wild-phares
|
|
||||||
sudo -iu podman
|
|
||||||
ls -la /root/.acme.sh/wild-phares
|
|
||||||
chmod -R 0775 /root/.acme.sh/wild-phares
|
chmod -R 0775 /root/.acme.sh/wild-phares
|
||||||
ls -la /root/.acme.sh/wild-phares
|
|
||||||
sudo -iu podman
|
|
||||||
chmod -R 0777 /root/.acme.sh/wild-phares
|
chmod -R 0777 /root/.acme.sh/wild-phares
|
||||||
sudo -iu podman
|
|
||||||
chmod -R 0774 /root/.acme.sh/wild-phares
|
chmod -R 0774 /root/.acme.sh/wild-phares
|
||||||
ls -la /root/.acme.sh/wild-phares
|
ls -la /root/.acme.sh/wild-phares
|
||||||
chmod -R 0774 /root/.acme.sh
|
chmod -R 0774 /root/.acme.sh
|
||||||
ls -la /root/.acme.sh
|
ls -la /root/.acme.sh
|
||||||
sudo -iu podman
|
|
||||||
ln -s /root/.acme.sh/wild-phares /home/podman/wild-phares
|
ln -s /root/.acme.sh/wild-phares /home/podman/wild-phares
|
||||||
sudo -iu podman
|
|
||||||
cp -R /root/.acme.sh/wild-phares /home/podman/wild-phares
|
cp -R /root/.acme.sh/wild-phares /home/podman/wild-phares
|
||||||
cp -R /root/.acme.sh/wild-phares/ /home/podman
|
|
||||||
rm /home/podman/wild-phares
|
rm /home/podman/wild-phares
|
||||||
cp -R /root/.acme.sh/wild-phares/ /home/podman
|
cp -R /root/.acme.sh/wild-phares/ /home/podman
|
||||||
chown podman:podman /home/podman
|
chown podman:podman /home/podman
|
||||||
ls /home/podman/wild-phares/
|
ls /home/podman/wild-phares/
|
||||||
ls -la /home/podman/wild-phares
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman
|
chown -R podman:podman /home/podman
|
||||||
ls -la /home/podman/wild-phares
|
ls -la /home/podman/wild-phares
|
||||||
sudo -iu podman
|
|
||||||
cd /home/podman/
|
cd /home/podman/
|
||||||
ls
|
|
||||||
cd quadlet/
|
cd quadlet/
|
||||||
ls -la
|
|
||||||
cd default.target.wants/
|
cd default.target.wants/
|
||||||
ls -la
|
|
||||||
cd ..
|
|
||||||
cd ..
|
cd ..
|
||||||
cd lib
|
cd lib
|
||||||
cd libpod/
|
cd libpod/
|
||||||
ls -la
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R 1000:1000 /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
chown -R 1000:1000 /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-gitea-server-data/_data
|
||||||
cd /
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
|
||||||
/usr/libexec/podman/quadlet -dryrun --user
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
ls -ls \mnt\free-file-sync\proxmox
|
ls -ls \mnt\free-file-sync\proxmox
|
||||||
ls -ls /mnt/free-file-sync/proxmox
|
ls -ls /mnt/free-file-sync/proxmox
|
||||||
cd /home/podman
|
cd /home/podman
|
||||||
ls -la
|
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
|
||||||
apt-get install acl -y
|
apt-get install acl -y
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
|
||||||
ls -la
|
ls -la
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
|
||||||
cd /
|
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
|
||||||
ls /home/podman/.config/cni/net.d
|
ls /home/podman/.config/cni/net.d
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
|
||||||
cd /home/phares/
|
cd /home/phares/
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
|
||||||
getfacl /home/podman > permissions.acl
|
getfacl /home/podman > permissions.acl
|
||||||
ls
|
ls
|
||||||
cat permissions.acl
|
cat permissions.acl
|
||||||
rm permissions.acl
|
rm permissions.acl
|
||||||
getfacl -R /home/podman > podman-permissions-bad.acl
|
getfacl -R /home/podman > podman-permissions-bad.acl
|
||||||
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
|
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
|
||||||
cd ../podman
|
cd ../podman
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||||
cd /
|
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
|
||||||
nano /etc/passwd
|
|
||||||
nano /etc/passwd
|
|
||||||
nano /etc/group
|
|
||||||
nano /etc/shadow
|
nano /etc/shadow
|
||||||
find / -uid 1000 -exec chown -h 2000 {} +
|
find / -uid 1000 -exec chown -h 2000 {} +
|
||||||
find / -gid 1000 -exec chgrp -h 2000 {} +
|
find / -gid 1000 -exec chgrp -h 2000 {} +
|
||||||
find / -xdev -uid 1002 -exec chown -h 1000 {} +
|
find / -xdev -uid 1002 -exec chown -h 1000 {} +
|
||||||
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
|
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
|
||||||
reboot
|
|
||||||
reboot
|
|
||||||
nano /etc/passwd
|
|
||||||
nano /etc/group
|
|
||||||
find / -xdev -uid 1001 -exec chown -h 1005 {} +
|
find / -xdev -uid 1001 -exec chown -h 1005 {} +
|
||||||
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
|
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
|
||||||
find / -xdev -uid 2000 -exec chown -h 1001 {} +
|
find / -xdev -uid 2000 -exec chown -h 1001 {} +
|
||||||
@ -457,44 +175,18 @@ find / -xdev -uid 1005 -exec chown -h 1002 {} +
|
|||||||
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
|
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
|
||||||
reboot
|
reboot
|
||||||
cd /
|
cd /
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
ls /run/user/
|
ls /run/user/
|
||||||
ls /run/user/1001/systemd/
|
ls /run/user/1001/systemd/
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
/usr/libexec/podman/quadlet -dryrun --user
|
/usr/libexec/podman/quadlet -dryrun --user
|
||||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
||||||
sudo -iu podman
|
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||||
sudo -iu podman
|
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||||
sudo -iu podman
|
sudo -iu podman
|
||||||
exit
|
exit
|
@ -1,32 +1,19 @@
|
|||||||
ls /home/podman/.config/cni/net.d
|
ls /home/podman/.config/cni/net.d
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
|
||||||
cd /home/phares/
|
cd /home/phares/
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
setfacl --restore=/mnt/free-file-sync/proxmox/one.acl
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions.acl
|
|
||||||
getfacl /home/podman > permissions.acl
|
getfacl /home/podman > permissions.acl
|
||||||
ls
|
|
||||||
cat permissions.acl
|
cat permissions.acl
|
||||||
rm permissions.acl
|
rm permissions.acl
|
||||||
getfacl -R /home/podman > podman-permissions-bad.acl
|
getfacl -R /home/podman > podman-permissions-bad.acl
|
||||||
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
|
mv podman-permissions-bad.acl /mnt/free-file-sync/proxmox/
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
|
||||||
cd ../podman
|
cd ../podman
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
||||||
cd /
|
|
||||||
setfacl --restore=/mnt/free-file-sync/proxmox/podman-permissions-after.acl
|
|
||||||
nano /etc/passwd
|
|
||||||
nano /etc/passwd
|
|
||||||
nano /etc/group
|
|
||||||
nano /etc/shadow
|
nano /etc/shadow
|
||||||
find / -uid 1000 -exec chown -h 2000 {} +
|
find / -uid 1000 -exec chown -h 2000 {} +
|
||||||
find / -gid 1000 -exec chgrp -h 2000 {} +
|
find / -gid 1000 -exec chgrp -h 2000 {} +
|
||||||
find / -xdev -uid 1002 -exec chown -h 1000 {} +
|
find / -xdev -uid 1002 -exec chown -h 1000 {} +
|
||||||
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
|
find / -xdev -gid 1002 -exec chgrp -h 1000 {} +
|
||||||
reboot
|
|
||||||
reboot
|
|
||||||
nano /etc/passwd
|
|
||||||
nano /etc/group
|
|
||||||
find / -xdev -uid 1001 -exec chown -h 1005 {} +
|
find / -xdev -uid 1001 -exec chown -h 1005 {} +
|
||||||
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
|
find / -xdev -gid 1001 -exec chgrp -h 1005 {} +
|
||||||
find / -xdev -uid 2000 -exec chown -h 1001 {} +
|
find / -xdev -uid 2000 -exec chown -h 1001 {} +
|
||||||
@ -37,60 +24,16 @@ find / -xdev -uid 1005 -exec chown -h 1002 {} +
|
|||||||
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
|
find / -xdev -gid 1005 -exec chgrp -h 1002 {} +
|
||||||
reboot
|
reboot
|
||||||
cd /
|
cd /
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
ls /run/user/
|
ls /run/user/
|
||||||
ls /run/user/1001/systemd/
|
ls /run/user/1001/systemd/
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
/usr/libexec/podman/quadlet -dryrun --user
|
/usr/libexec/podman/quadlet -dryrun --user
|
||||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
||||||
sudo -iu podman
|
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||||
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
chown -R 233071:233071 /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
cp ~/.bash_history /etc/bash_history_2024-11-10.txt
|
cp ~/.bash_history /etc/bash_history_2024-11-10.txt
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes
|
ls -la /home/podman/.local/share/containers/storage/volumes
|
||||||
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs
|
ls -la /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs
|
||||||
@ -101,23 +44,8 @@ chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/syst
|
|||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/_data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-logs/_data/
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-client-plugins/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-logs/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-db-data/_data/
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-bleve/_data/
|
||||||
@ -126,123 +54,36 @@ chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/syst
|
|||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-data/_data/
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/_data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-logs/_data/
|
||||||
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
chown -R podman:podman /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-plugins/_data/
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
chown -R podman:podman /home/podman/.config/containers/systemd
|
chown -R podman:podman /home/podman/.config/containers/systemd
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
systemctl --user start mattermost-db
|
|
||||||
systemctl --user start mattermost-db
|
systemctl --user start mattermost-db
|
||||||
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
/usr/libexec/podman/quadlet --user /home/podman/libexec-podman-quadlet-output
|
||||||
sudo -iu podman
|
|
||||||
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
cp /home/podman/config.json /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
links https://pgadmin.phares.duckdns.org/
|
links https://pgadmin.phares.duckdns.org/
|
||||||
links https://pgadmin.phares.duckdns.org/
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
lspci | grep -i nvme
|
lspci | grep -i nvme
|
||||||
lspci -vv -s 08:00.0 | grep -w LnkCap
|
lspci -vv -s 08:00.0 | grep -w LnkCap
|
||||||
lspci -vv -s 02:00.0 | grep -w LnkCap
|
lspci -vv -s 02:00.0 | grep -w LnkCap
|
||||||
sudo -iu podman
|
|
||||||
curl https://push-test.mattermost.com
|
curl https://push-test.mattermost.com
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
apt-file search setcap
|
apt-file search setcap
|
||||||
setcap
|
setcap
|
||||||
sudo -iu podman
|
|
||||||
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
nano /home/podman/.local/share/containers/storage/volumes/systemd-mattermost-server-config/_data/config.json
|
||||||
sudo -iu podman
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
snap install vaultwarden
|
|
||||||
snap vaultwarden
|
|
||||||
snap vaultwarden help
|
snap vaultwarden help
|
||||||
lsof -i -P -n | grep LISTEN
|
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
snap stop vaultwarden
|
|
||||||
sudo -iu podman
|
|
||||||
snap stop vaultwarden
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
links https://192.168.11.2:5008
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
links https://192.168.11.2:5008
|
|
||||||
links http://192.168.11.2:5008
|
links http://192.168.11.2:5008
|
||||||
links https://192.168.11.2:5008
|
links https://192.168.11.2:5008
|
||||||
snap start vaultwarden
|
|
||||||
snap vaultwarden
|
snap vaultwarden
|
||||||
snap vaultwarden hash
|
snap vaultwarden hash
|
||||||
snap uninstall vaultwarden
|
snap uninstall vaultwarden
|
||||||
snap remove vaultwarden
|
|
||||||
exot
|
exot
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
links https://mattermost.phares.duckdns.org
|
links https://mattermost.phares.duckdns.org
|
||||||
snap install vaultwarden
|
|
||||||
snap stop vaultwarden
|
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
rm /var/snap/vaultwarden/current/vaultwarden.conf
|
rm /var/snap/vaultwarden/current/vaultwarden.conf
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
snap remove vaultwarden
|
snap remove vaultwarden
|
||||||
snap install vaultwarden
|
snap install vaultwarden
|
||||||
ls -la /var/snap/vaultwarden/current
|
ls -la /var/snap/vaultwarden/current
|
||||||
ls -la /var/snap/vaultwarden/current
|
|
||||||
echo>/var/snap/vaultwarden/current/vaultwarden.conf
|
echo>/var/snap/vaultwarden/current/vaultwarden.conf
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
snap start vaultwarden
|
|
||||||
snap info vaultwarden
|
snap info vaultwarden
|
||||||
snap status vaultwarden
|
snap status vaultwarden
|
||||||
lsof -i -P -n | grep LISTEN
|
lsof -i -P -n | grep LISTEN
|
||||||
snap start vaultwarden
|
|
||||||
lsof -i -P -n | grep LISTEN
|
|
||||||
links https://192.168.11.2:5009/
|
links https://192.168.11.2:5009/
|
||||||
openssl s_client -showcerts -connect vaultwarden.phares.duckdns.org:443 -servername vaultwarden.phares.duckdns.org
|
openssl s_client -showcerts -connect vaultwarden.phares.duckdns.org:443 -servername vaultwarden.phares.duckdns.org
|
||||||
exit
|
|
||||||
snap start vaultwarden
|
|
||||||
journalctl -u snapd
|
journalctl -u snapd
|
||||||
cat /var/snap/vaultwarden/current/
|
cat /var/snap/vaultwarden/current/
|
||||||
top
|
top
|
||||||
@ -256,134 +97,52 @@ snap watch id 37
|
|||||||
snap watch 37
|
snap watch 37
|
||||||
snap watch 34
|
snap watch 34
|
||||||
snap logs vaultwardedn
|
snap logs vaultwardedn
|
||||||
snap logs vaultwarden
|
|
||||||
ls -la /home/podman/wild-phares/
|
ls -la /home/podman/wild-phares/
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
snap start vaultwarden
|
|
||||||
snap logs vaultwarden
|
|
||||||
ls -la /var/snap/vaultwarden/current/
|
ls -la /var/snap/vaultwarden/current/
|
||||||
ls -la /var/snap/vaultwarden/current/ssl
|
ls -la /var/snap/vaultwarden/current/ssl
|
||||||
cp -R /home/podman/wild-phares/* /var/snap/vaultwarden/current/ssl/
|
cp -R /home/podman/wild-phares/* /var/snap/vaultwarden/current/ssl/
|
||||||
ls -la /var/snap/vaultwarden/current/ssl/
|
ls -la /var/snap/vaultwarden/current/ssl/
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
snap start vaultwarden
|
|
||||||
snap logs vaultwarden
|
snap logs vaultwarden
|
||||||
snap logs vaultwarden
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
snap stop vaultwarden
|
|
||||||
snap start vaultwarden
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
|
||||||
snap stop vaultwarden
|
snap stop vaultwarden
|
||||||
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||||
snap start vaultwarden
|
snap start vaultwarden
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
nano /etc/cockpit/cockpit.conf
|
|
||||||
apt-get install cockpit cockpit-podman cockpit-machines -y
|
|
||||||
apt-get install cockpit cockpit-podman cockpit-machines -y
|
apt-get install cockpit cockpit-podman cockpit-machines -y
|
||||||
apt-get remove cockpit-machines -y
|
apt-get remove cockpit-machines -y
|
||||||
apt-get install cockpit cockpit-podman cockpit-files -y
|
|
||||||
apt-get install cockpit cockpit-podman cockpit-file -y
|
apt-get install cockpit cockpit-podman cockpit-file -y
|
||||||
apt-get search cockpit-file
|
apt-get search cockpit-file
|
||||||
apt-get search
|
apt-get search
|
||||||
apt-get --help
|
|
||||||
apt-get check
|
apt-get check
|
||||||
apt-get auto-purge
|
apt-get auto-purge
|
||||||
apt-get --help
|
apt-get --help
|
||||||
apt-get purge
|
apt-get purge
|
||||||
apt-get autoremove
|
apt-get autoremove
|
||||||
apt-get autoremove
|
|
||||||
apt-get update
|
|
||||||
apt-get install cockpit cockpit-podman cockpit-files -y
|
apt-get install cockpit cockpit-podman cockpit-files -y
|
||||||
apt-get upgrade
|
apt-get upgrade
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
nano /etc/docker/daemon.json
|
nano /etc/docker/daemon.json
|
||||||
nano /etc/podman/daemon.json
|
nano /etc/podman/daemon.json
|
||||||
sudo -iu podman
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
nano /etc/resolv.conf
|
nano /etc/resolv.conf
|
||||||
nano /etc/resolv.conf
|
|
||||||
nano /etc/hosts
|
|
||||||
cat /etc/hosts
|
cat /etc/hosts
|
||||||
sudo -iu podman
|
|
||||||
nano /etc/hosts
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
nano /etc/hosts
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
apt install podman
|
apt install podman
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -s reload
|
|
||||||
exit
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
exit
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
nginx -s reload
|
|
||||||
exit
|
|
||||||
nano /etc/cockpit/cockpit.conf
|
nano /etc/cockpit/cockpit.conf
|
||||||
exit
|
|
||||||
ls -la /etc/cockpit/ws-certs.d/
|
ls -la /etc/cockpit/ws-certs.d/
|
||||||
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
|
nano /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||||
mv /etc/cockpit/ws-certs.d/0-self-signed.cert /etc/cockpit/ws-certs.d/0-self-signed.cert.part
|
mv /etc/cockpit/ws-certs.d/0-self-signed.cert /etc/cockpit/ws-certs.d/0-self-signed.cert.part
|
||||||
cp /root/.acme.sh/wild-phares/fullchain.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
|
cp /root/.acme.sh/wild-phares/fullchain.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||||
exit
|
|
||||||
ls -la /etc/cockpit/ws-certs.d
|
|
||||||
chomod 774 -r /etc/cockpit/ws-certs.d
|
chomod 774 -r /etc/cockpit/ws-certs.d
|
||||||
chmod 774 -R /etc/cockpit/ws-certs.d
|
|
||||||
ls -la /etc/cockpit/ws-certs.d
|
|
||||||
exit
|
|
||||||
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
|
cp /root/.acme.sh/wild-phares/phares.duckdns.org.cer /etc/cockpit/ws-certs.d/0-self-signed.cert
|
||||||
ls -la /etc/cockpit/ws-certs.d
|
ls -la /etc/cockpit/ws-certs.d
|
||||||
rm /etc/cockpit/ws-certs.d/0-self-signed.cert.old
|
rm /etc/cockpit/ws-certs.d/0-self-signed.cert.old
|
||||||
chmod 774 -R /etc/cockpit/ws-certs.d
|
chmod 774 -R /etc/cockpit/ws-certs.d
|
||||||
exit
|
|
||||||
ls -la /usr/libexec/podman/quadlet
|
ls -la /usr/libexec/podman/quadlet
|
||||||
ls -la /usr/libexec/podman
|
ls -la /usr/libexec/podman
|
||||||
exit
|
|
||||||
find / -name "neko-server.service" 2>/dev/null
|
find / -name "neko-server.service" 2>/dev/null
|
||||||
exit
|
|
||||||
cp /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
|
cp /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
|
||||||
cp /run/user/1000/systemd/generator/default.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
|
cp /run/user/1000/systemd/generator/default.target.wants/neko-server.service /mnt/free-file-sync/proxmox/
|
||||||
cp /run/user/1000/systemd/generator/neko-server.service /mnt/free-file-sync/proxmox/
|
cp /run/user/1000/systemd/generator/neko-server.service /mnt/free-file-sync/proxmox/
|
||||||
nano /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
nano /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||||
dif /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
dif /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
||||||
diff /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
diff /home/podman/libexec-podman-quadlet-output/default.target.wants/neko-server.service /run/user/1000/systemd/generator/default.target.wants/neko-server.service
|
||||||
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
|
||||||
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||||
sudo -iu podman
|
|
||||||
diff /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
|
||||||
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
|
||||||
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
diff /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||||
diff
|
diff
|
||||||
diff --help
|
diff --help
|
||||||
@ -394,63 +153,26 @@ diff -y /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-
|
|||||||
diff -r /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
diff -r /home/podman/libexec-podman-quadlet-output/multi-user.target.wants/neko-server.service /run/user/1000/systemd/generator/multi-user.target.wants/neko-server.service
|
||||||
diff -y -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
diff -y -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||||
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
||||||
sudo -iu podman
|
|
||||||
diff -r /home/podman/libexec-podman-quadlet-output/neko-server.service /run/user/1000/systemd/generator/neko-server.service
|
|
||||||
/usr/lib/systemd/user-generators/podman-user-generator
|
/usr/lib/systemd/user-generators/podman-user-generator
|
||||||
ls /usr/lib/systemd/user-generators/podman-user-generator
|
ls /usr/lib/systemd/user-generators/podman-user-generator
|
||||||
exit
|
|
||||||
nginx -s reload
|
|
||||||
exit
|
|
||||||
rm -R /var/www/html-infineon/
|
rm -R /var/www/html-infineon/
|
||||||
nginx -t
|
nginx -t
|
||||||
nginx -s reload
|
nginx -s reload
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
docker
|
docker
|
||||||
exit
|
|
||||||
snap list
|
snap list
|
||||||
exit
|
|
||||||
nano /var/www/html-slideshow/slideshow/scripts/index.js
|
nano /var/www/html-slideshow/slideshow/scripts/index.js
|
||||||
nano /var/www/html-slideshow/slideshow/index.json
|
nano /var/www/html-slideshow/slideshow/index.json
|
||||||
snap install dotnet-sdk --classic 9.0/stable
|
snap install dotnet-sdk --classic 9.0/stable
|
||||||
dotnet --info
|
|
||||||
snap install dotnet-sdk --classic --channel 9.0/stable
|
|
||||||
snap install dotnet-sdk --stable 9.0/stable
|
snap install dotnet-sdk --stable 9.0/stable
|
||||||
snap install dotnet-sdk --stable dotnet-sdk
|
snap install dotnet-sdk --stable dotnet-sdk
|
||||||
snap install --stable dotnet-sdk
|
snap install --stable dotnet-sdk
|
||||||
snap install --classic --stable dotnet-sdk
|
snap install --classic --stable dotnet-sdk
|
||||||
exit
|
|
||||||
~/.bashrc
|
|
||||||
exit
|
|
||||||
~/.bashrc
|
|
||||||
nano /etc/hostname
|
|
||||||
nano /etc/hostname
|
|
||||||
/etc/hosts
|
|
||||||
nano /etc/hosts
|
|
||||||
/etc/hosts
|
/etc/hosts
|
||||||
nano /etc/hostname
|
nano /etc/hostname
|
||||||
nano /etc/hosts
|
nano /etc/hosts
|
||||||
~/.bashrc
|
|
||||||
sudo -i
|
|
||||||
exit
|
|
||||||
dotnet --info
|
|
||||||
snap remove --classic --stable dotnet-sdk
|
snap remove --classic --stable dotnet-sdk
|
||||||
snap remove dotnet-sdk
|
snap remove dotnet-sdk
|
||||||
dotnet --info
|
|
||||||
snap install dotnet-sdk --classic --9.0/stable
|
snap install dotnet-sdk --classic --9.0/stable
|
||||||
snap install dotnet-sdk --classic --channel 9.0/stable
|
|
||||||
apt-get update
|
apt-get update
|
||||||
snap install dotnet-sdk --classic --channel 9.0/stable
|
snap install dotnet-sdk --classic --channel 9.0/stable
|
||||||
snap install dotnet-sdk --classic --latest/stable
|
snap install dotnet-sdk --classic --latest/stable
|
||||||
@ -460,26 +182,12 @@ export DOTNET_ROOT=/snap/dotnet-sdk/current
|
|||||||
~/.bash_profile
|
~/.bash_profile
|
||||||
~/.bashrc
|
~/.bashrc
|
||||||
sudo -i
|
sudo -i
|
||||||
exit
|
|
||||||
dotnet --info
|
|
||||||
cd /tmp/
|
cd /tmp/
|
||||||
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
|
|
||||||
ls
|
|
||||||
cd one-review/
|
|
||||||
podman compose up --build
|
podman compose up --build
|
||||||
nano /etc/containers/registries.conf
|
nano /etc/containers/registries.conf
|
||||||
ls
|
|
||||||
podman ps -a
|
podman ps -a
|
||||||
sudo -iu podman
|
|
||||||
cd ..
|
|
||||||
rm -R one-review/
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
apt-get install podman-plugins
|
apt-get install podman-plugins
|
||||||
sudo -iu podman
|
sudo -iu podman
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
|
git clone https://33aada599f8e245782e68931fe2629a959af5d26@gitea.phares.duckdns.org/phares3757/one-review.git
|
||||||
cd one-review/
|
cd one-review/
|
||||||
git checkout origin 11-17
|
git checkout origin 11-17
|
||||||
@ -492,9 +200,7 @@ snap install docker
|
|||||||
snap remove docker
|
snap remove docker
|
||||||
snap remove dotnet-sdk
|
snap remove dotnet-sdk
|
||||||
cd ..
|
cd ..
|
||||||
ls
|
|
||||||
rm -R one-review/
|
rm -R one-review/
|
||||||
ls
|
ls
|
||||||
exit
|
|
||||||
dotnet --info
|
dotnet --info
|
||||||
exit
|
exit
|
@ -3,13 +3,8 @@ mv /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019 /mnt/free-file-sync/iso/
|
|||||||
rm -R /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019/
|
rm -R /mnt/free-file-sync/iso/images-a/DisneyWorld\\\ 2019/
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006
|
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006\ \\\!9
|
rm -R /mnt/free-file-sync/iso/images-a/All\\\ Pictures\\\ from\\\ Wedding\\\ Originals\\\ 2006\ \\\!9
|
||||||
exit
|
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/Phares\\\ Slides\\\ ####
|
rm -R /mnt/free-file-sync/iso/images-a/Phares\\\ Slides\\\ ####
|
||||||
exit
|
|
||||||
mount /mnt/free-file-sync/iso/Edited.iso /mnt/iso-compare
|
mount /mnt/free-file-sync/iso/Edited.iso /mnt/iso-compare
|
||||||
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
|
|
||||||
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
|
|
||||||
mount /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/2024-12-18-18-10-19-693.iso /mnt/iso-compare
|
|
||||||
mount /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/2024-12-18-18-13-54-579.iso /mnt/iso-compare
|
mount /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/2024-12-18-18-13-54-579.iso /mnt/iso-compare
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/Scanned\ Grandma\\\'s\ Quilt\ ####/
|
rm -R /mnt/free-file-sync/iso/images-a/Scanned\ Grandma\\\'s\ Quilt\ ####/
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/Event
|
rm -R /mnt/free-file-sync/iso/images-a/Event
|
||||||
@ -17,36 +12,14 @@ rm -R /mnt/free-file-sync/iso/images-a/Question/
|
|||||||
mount /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/2024-12-18-18-10-19-693.iso /mnt/iso-compare
|
mount /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/2024-12-18-18-10-19-693.iso /mnt/iso-compare
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/
|
rm -R /mnt/free-file-sync/iso/images-a/All\ Pictures\ from\ Wedding\ Originals\ 2006/
|
||||||
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
|
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
|
||||||
umount /mnt/iso-compare
|
|
||||||
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
mount /mnt/free-file-sync/iso/images-a/Edited/2024-12-18-17-56-37-119.iso /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
|
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
|
||||||
umount /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
mount /mnt/free-file-sync/iso/images-a/Facebook/2024-12-18-17-32-32-487.iso /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/Facebook
|
rm -R /mnt/free-file-sync/iso/images-a/Facebook
|
||||||
mount /mnt/free-file-sync/iso/images-a/Rex\ Memorial\ ####/2024-12-18-18-15-40-537.iso /mnt/iso-compare
|
mount /mnt/free-file-sync/iso/images-a/Rex\ Memorial\ ####/2024-12-18-18-15-40-537.iso /mnt/iso-compare
|
||||||
umount /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
mount /mnt/free-file-sync/iso/images-a/Scanned\ Norman\ Herman/2024-12-18-18-15-43-097.iso /mnt/iso-compare
|
mount /mnt/free-file-sync/iso/images-a/Scanned\ Norman\ Herman/2024-12-18-18-15-43-097.iso /mnt/iso-compare
|
||||||
umount /mnt/iso-compare
|
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/Scanned*
|
rm -R /mnt/free-file-sync/iso/images-a/Scanned*
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/
|
rm -R /mnt/free-file-sync/iso/images-a/Phares\ Slides\ ####/
|
||||||
umount /mnt/iso-compare
|
|
||||||
umount /mnt/iso-compare
|
|
||||||
mount /mnt/free-file-sync/iso/images-a/DisneyWorld\ 2019/2024-12-18-18-42-26-222.iso /mnt/iso-compare
|
mount /mnt/free-file-sync/iso/images-a/DisneyWorld\ 2019/2024-12-18-18-42-26-222.iso /mnt/iso-compare
|
||||||
umount /mnt/iso-compare
|
umount /mnt/iso-compare
|
||||||
umount /mnt/iso-compare
|
|
||||||
exit
|
|
||||||
ls -al /mnt/free-file-sync/iso/images-a
|
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/Slide in N*
|
rm -R /mnt/free-file-sync/iso/images-a/Slide in N*
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/Slide\\ in\\ N*
|
rm -R /mnt/free-file-sync/iso/images-a/Slide\\ in\\ N*
|
||||||
ls -al /mnt/free-file-sync/iso/images-a/Sli*
|
ls -al /mnt/free-file-sync/iso/images-a/Sli*
|
||||||
@ -55,129 +28,37 @@ ls -al /mnt/free-file-sync/iso/images-a/Slide\\ *
|
|||||||
ls -al /mnt/free-file-sync/iso/images-a
|
ls -al /mnt/free-file-sync/iso/images-a
|
||||||
rm -R /mnt/free-file-sync/iso/images-a/'Slide in Name Order Originals \(622\) ####'
|
rm -R /mnt/free-file-sync/iso/images-a/'Slide in Name Order Originals \(622\) ####'
|
||||||
mkdir /mnt/free-file-sync/iso/videos-b
|
mkdir /mnt/free-file-sync/iso/videos-b
|
||||||
exit
|
|
||||||
lsblk
|
|
||||||
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
|
||||||
rm /mnt/free-file-sync/iso/videos-b/Home\ Videos\ 1998\ -\ 2002/2024-12-18-19-49-52-202.iso
|
rm /mnt/free-file-sync/iso/videos-b/Home\ Videos\ 1998\ -\ 2002/2024-12-18-19-49-52-202.iso
|
||||||
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||||
exit
|
|
||||||
nano /root/.ssh/authorized_keys
|
|
||||||
exit
|
|
||||||
nano /root/.ssh/authorized_keys
|
|
||||||
exit
|
|
||||||
nano /root/.ssh/authorized_keys
|
|
||||||
exit
|
|
||||||
nano /root/.ssh/authorized_keys
|
|
||||||
nano /root/.ssh/authorized_keys
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
lsblk
|
lsblk
|
||||||
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
|
|
||||||
exit
|
|
||||||
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
|
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
|
||||||
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
|
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
|
||||||
exit
|
|
||||||
reboot
|
|
||||||
aptget update
|
aptget update
|
||||||
apt-get update
|
|
||||||
apt-get upgrade
|
apt-get upgrade
|
||||||
ls
|
|
||||||
nano t
|
nano t
|
||||||
nano t
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
mv -R /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
|
mv -R /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
|
||||||
mv /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
|
mv /home/lphares/gdrive/ /mnt/free-file-sync/logan-google-drive
|
||||||
mv /mnt/free-file-sync/logan-google-drive /mnt/free-file-sync/google-drive-logan
|
mv /mnt/free-file-sync/logan-google-drive /mnt/free-file-sync/google-drive-logan
|
||||||
exit
|
|
||||||
nano /root/.ssh/authorized_keys
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
crontab -e
|
|
||||||
sudo -iu podman
|
|
||||||
/etc/duckdns/duck.sh >/dev/null 2>&1
|
/etc/duckdns/duck.sh >/dev/null 2>&1
|
||||||
"/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
|
"/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
|
||||||
cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
||||||
cd /
|
cd /
|
||||||
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"\%Y\%m\%d-\%H\%M\%S")'.tar'
|
podman volume export systemd-blinko-server-data --output /home/podman/backup-blinko/'blinko-server-data-'$(date +"\%Y\%m\%d-\%H\%M\%S")'.tar'
|
||||||
sudo -iu podman
|
|
||||||
ls /home/podman/backup-blinko/
|
|
||||||
sudo -iu podman
|
|
||||||
ls /home/podman/backup-blinko/
|
|
||||||
rm /home/podman/backup-blinko/*
|
rm /home/podman/backup-blinko/*
|
||||||
ls /home/podman/backup-blinko/
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
ls /home/podman/backup-blinko/
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
nano /run/podman/podman.sock
|
nano /run/podman/podman.sock
|
||||||
ls /run/podman/podman.sock
|
ls /run/podman/podman.sock
|
||||||
sudo -iu podman
|
|
||||||
cat /var/log/syslog
|
cat /var/log/syslog
|
||||||
grep "ERROR" /var/log/cron
|
grep "ERROR" /var/log/cron
|
||||||
sudo -iu podman
|
|
||||||
crontab -e
|
|
||||||
crontab -l
|
crontab -l
|
||||||
crontab -e
|
|
||||||
crontab -l
|
|
||||||
systemctl status cron
|
|
||||||
crontab -e
|
|
||||||
systemctl status cron
|
|
||||||
systemctl status cron
|
|
||||||
systemctl status cron
|
|
||||||
systemctl status cron
|
|
||||||
systemctl status cron
|
|
||||||
systemctl log cron
|
systemctl log cron
|
||||||
systemctl status cron
|
|
||||||
systemctl status cron
|
|
||||||
crontab -e
|
|
||||||
systemctl status cron
|
|
||||||
ls /home/podman/backup-blinko/
|
|
||||||
ls /home/podman/backup-blinko/
|
ls /home/podman/backup-blinko/
|
||||||
systemctl status cron
|
systemctl status cron
|
||||||
crontab -e
|
|
||||||
systemctl status cron
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
snap list vaultwarden
|
snap list vaultwarden
|
||||||
reboot
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
su lphares
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
nginx -t
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
ls -la /home/lphares/dorico
|
ls -la /home/lphares/dorico
|
||||||
ls -la /home/lphares
|
ls -la /home/lphares
|
||||||
ls -la /home/lphares/dorico/
|
ls -la /home/lphares/dorico/
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
ls /var/www/html-
|
ls /var/www/html-
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
ls /etc/netplan/
|
ls /etc/netplan/
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
ls /etc/ModemManager/ -la
|
ls /etc/ModemManager/ -la
|
||||||
ls /etc/ModemManager -la
|
ls /etc/ModemManager -la
|
||||||
ls /etc/ModemManager
|
ls /etc/ModemManager
|
||||||
@ -192,26 +73,16 @@ ls /etc/ModemManager -l -T
|
|||||||
ls /etc/ModemManager -l --time-style=+"%b %d %Y %H:%M:%S"
|
ls /etc/ModemManager -l --time-style=+"%b %d %Y %H:%M:%S"
|
||||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S"
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S"
|
||||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S%zz"
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S%zz"
|
||||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S %z"
|
|
||||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %HH:%M:%S %z"
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %HH:%M:%S %z"
|
||||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %h:%M:%S %z"
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %h:%M:%S %z"
|
||||||
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S %z"
|
ls /etc/ModemManager/ -l --time-style=+"%b %d %Y %H:%M:%S %z"
|
||||||
ls /etc/ModemManager/ -la -D '%Y-%m-%dT%H:%M:%S'
|
ls /etc/ModemManager/ -la -D '%Y-%m-%dT%H:%M:%S'
|
||||||
ls /etc/ModemManager/ -la -D '%Y-%m-%dT %H:%M:%S'
|
ls /etc/ModemManager/ -la -D '%Y-%m-%dT %H:%M:%S'
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
ufw status
|
ufw status
|
||||||
ufw number status
|
ufw number status
|
||||||
ufw numbered status
|
ufw numbered status
|
||||||
ufw status numbered
|
|
||||||
ufw active
|
ufw active
|
||||||
ufw enable
|
|
||||||
ufw status numbered
|
|
||||||
ls
|
|
||||||
ufw disable
|
|
||||||
ip a
|
|
||||||
ufw allow 53/tcp comment "01) DNS TCP"
|
ufw allow 53/tcp comment "01) DNS TCP"
|
||||||
ufw status numbered
|
|
||||||
ufw allow 53/udp comment "02) DNS UDP"
|
ufw allow 53/udp comment "02) DNS UDP"
|
||||||
ufw allow 67/tcp comment "03) DHCP TCP"
|
ufw allow 67/tcp comment "03) DHCP TCP"
|
||||||
ufw allow 67/udp comment "04) DHCP UDP"
|
ufw allow 67/udp comment "04) DHCP UDP"
|
||||||
@ -223,20 +94,7 @@ ufw allow from 192.168.41.0/25 to any port 22/tcp comment "09) SSH"
|
|||||||
ufw allow from 192.168.42.0/25 to any port 22/tcp comment "10) SSH"
|
ufw allow from 192.168.42.0/25 to any port 22/tcp comment "10) SSH"
|
||||||
ufw allow from 192.168.43.0/25 to any port 22/tcp comment "11) SSH"
|
ufw allow from 192.168.43.0/25 to any port 22/tcp comment "11) SSH"
|
||||||
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
|
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
|
||||||
ufw enable
|
|
||||||
ufw status numbered
|
|
||||||
ufw disable
|
|
||||||
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
|
|
||||||
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
|
|
||||||
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
|
||||||
ufw reset
|
|
||||||
ufw status numbered
|
|
||||||
ufw allow port 53/tcp comment "01) DNS TCP"
|
ufw allow port 53/tcp comment "01) DNS TCP"
|
||||||
ufw allow 53/tcp comment "01) DNS TCP"
|
|
||||||
ufw allow 53/udp comment "02) DNS UDP"
|
|
||||||
ufw allow 67/tcp comment "03) DHCP TCP"
|
|
||||||
ufw allow 67/udp comment "04) DHCP UDP"
|
|
||||||
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
|
|
||||||
ufw allow from 192.168.11.0/25 port 22/tcp comment "06) SSH"
|
ufw allow from 192.168.11.0/25 port 22/tcp comment "06) SSH"
|
||||||
ufw allow from 192.168.21.0/25 port 22/tcp comment "07) SSH"
|
ufw allow from 192.168.21.0/25 port 22/tcp comment "07) SSH"
|
||||||
ufw allow from 192.168.31.0/25 port 22/tcp comment "08) SSH"
|
ufw allow from 192.168.31.0/25 port 22/tcp comment "08) SSH"
|
||||||
@ -245,17 +103,10 @@ ufw allow from 192.168.42.0/25 port 22/tcp comment "10) SSH"
|
|||||||
ufw allow from 192.168.43.0/25 port 22/tcp comment "11) SSH"
|
ufw allow from 192.168.43.0/25 port 22/tcp comment "11) SSH"
|
||||||
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
|
ufw allow to 0.0.0.0/0 port 22/tcp comment "12) SSH"
|
||||||
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
|
ufw allow from 0.0.0.0/0 port 443/tcp comment "05) HTTPS"
|
||||||
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
|
|
||||||
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
||||||
ufw reset
|
|
||||||
ufw allow 53/tcp comment "01) DNS TCP"
|
|
||||||
ufw allow 53/udp comment "02) DNS UDP"
|
|
||||||
ufw allow 67/tcp comment "03) DHCP TCP"
|
|
||||||
ufw allow 67/udp comment "04) DHCP UDP"
|
|
||||||
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
|
ufw allow from 0.0.0.0/0 443/tcp comment "05) HTTPS"
|
||||||
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
|
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
|
||||||
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
|
ufw allow from 0.0.0.0/0 443 comment "05) HTTPS"
|
||||||
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
|
||||||
ufw allow from 192.168.11.0/25 port 22 comment "06) SSH"
|
ufw allow from 192.168.11.0/25 port 22 comment "06) SSH"
|
||||||
ufw allow from 192.168.21.0/25 port 22 comment "07) SSH"
|
ufw allow from 192.168.21.0/25 port 22 comment "07) SSH"
|
||||||
ufw allow from 192.168.31.0/25 port 22 comment "08) SSH"
|
ufw allow from 192.168.31.0/25 port 22 comment "08) SSH"
|
||||||
@ -263,54 +114,29 @@ ufw allow from 192.168.41.0/25 port 22 comment "09) SSH"
|
|||||||
ufw allow from 192.168.42.0/25 port 22 comment "10) SSH"
|
ufw allow from 192.168.42.0/25 port 22 comment "10) SSH"
|
||||||
ufw allow from 192.168.43.0/25 port 22 comment "11) SSH"
|
ufw allow from 192.168.43.0/25 port 22 comment "11) SSH"
|
||||||
ufw allow to 0.0.0.0/0 port 22 comment "12) SSH"
|
ufw allow to 0.0.0.0/0 port 22 comment "12) SSH"
|
||||||
ufw enable
|
|
||||||
ufw status numbered
|
|
||||||
ufw delete 12
|
ufw delete 12
|
||||||
ufw status numbered
|
|
||||||
ufw disable
|
|
||||||
ufw allow to 192.168.11.0/25 port 22 comment "12) SSH"
|
ufw allow to 192.168.11.0/25 port 22 comment "12) SSH"
|
||||||
ufw allow to 192.168.21.0/25 port 22 comment "13) SSH"
|
ufw allow to 192.168.21.0/25 port 22 comment "13) SSH"
|
||||||
ufw allow to 192.168.31.0/25 port 22 comment "14) SSH"
|
ufw allow to 192.168.31.0/25 port 22 comment "14) SSH"
|
||||||
ufw allow to 192.168.41.0/25 port 22 comment "15) SSH"
|
ufw allow to 192.168.41.0/25 port 22 comment "15) SSH"
|
||||||
ufw allow to 192.168.42.0/25 port 22 comment "16) SSH"
|
ufw allow to 192.168.42.0/25 port 22 comment "16) SSH"
|
||||||
ufw allow to 192.168.43.0/25 port 22 comment "17) SSH"
|
ufw allow to 192.168.43.0/25 port 22 comment "17) SSH"
|
||||||
ufw enable
|
|
||||||
ufw status numbered
|
|
||||||
ufw status numbered
|
|
||||||
ufw disable
|
|
||||||
cat /etc/passwd
|
cat /etc/passwd
|
||||||
top
|
|
||||||
pcap
|
pcap
|
||||||
ps -ef | grep cr[o]n
|
|
||||||
ps -ef | grep nginx
|
ps -ef | grep nginx
|
||||||
usermod -a -G lphares www-data
|
usermod -a -G lphares www-data
|
||||||
exit
|
|
||||||
chmod -R 774 /home/lphares/dorico
|
chmod -R 774 /home/lphares/dorico
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
rm -r /home/lphares/dorico
|
rm -r /home/lphares/dorico
|
||||||
su lphares
|
su lphares
|
||||||
exit
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
ufw status numbered
|
|
||||||
ufw enabled
|
ufw enabled
|
||||||
ufw enable
|
|
||||||
ufw status numbered
|
|
||||||
ufw disable
|
|
||||||
ufw allow from 0.0.0.0/0 port 443 comment "18) HTTPS"
|
ufw allow from 0.0.0.0/0 port 443 comment "18) HTTPS"
|
||||||
ufw enable
|
|
||||||
ufw disable
|
|
||||||
ufw reset
|
ufw reset
|
||||||
ufw disable
|
|
||||||
ufw allow 53/tcp comment "01) DNS TCP"
|
ufw allow 53/tcp comment "01) DNS TCP"
|
||||||
ufw allow 53/udp comment "02) DNS UDP"
|
ufw allow 53/udp comment "02) DNS UDP"
|
||||||
ufw allow 67/tcp comment "03) DHCP TCP"
|
ufw allow 67/tcp comment "03) DHCP TCP"
|
||||||
ufw allow 67/udp comment "04) DHCP UDP"
|
ufw allow 67/udp comment "04) DHCP UDP"
|
||||||
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
ufw allow from 0.0.0.0/0 port 443 comment "05) HTTPS"
|
||||||
ufw allow to 0.0.0.0/0 port 443 comment "06) HTTPS"
|
ufw allow to 0.0.0.0/0 port 443 comment "06) HTTPS"
|
||||||
ufw enable
|
|
||||||
ufw allow from 192.168.11.0/25 port 22 comment "07) SSH"
|
ufw allow from 192.168.11.0/25 port 22 comment "07) SSH"
|
||||||
ufw allow from 192.168.21.0/25 port 22 comment "08) SSH"
|
ufw allow from 192.168.21.0/25 port 22 comment "08) SSH"
|
||||||
ufw allow from 192.168.31.0/25 port 22 comment "09) SSH"
|
ufw allow from 192.168.31.0/25 port 22 comment "09) SSH"
|
||||||
@ -324,28 +150,14 @@ ufw allow to 192.168.41.0/25 port 22 comment "16) SSH"
|
|||||||
ufw allow to 192.168.42.0/25 port 22 comment "17) SSH"
|
ufw allow to 192.168.42.0/25 port 22 comment "17) SSH"
|
||||||
ufw allow to 192.168.43.0/25 port 22 comment "18) SSH"
|
ufw allow to 192.168.43.0/25 port 22 comment "18) SSH"
|
||||||
ufw enable
|
ufw enable
|
||||||
ufw status numbered
|
|
||||||
exit
|
|
||||||
ufw disable
|
ufw disable
|
||||||
top[
|
top[
|
||||||
top
|
top
|
||||||
systemctl list-timers
|
|
||||||
systemctl list-timers
|
|
||||||
apt-get remove certbot
|
apt-get remove certbot
|
||||||
snap remove certbot
|
snap remove certbot
|
||||||
systemctl list-timers
|
systemctl list-timers
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
reboot
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
grep sshd.\*Failed /var/log/auth.log | less
|
|
||||||
grep sshd.\*Failed /var/log/auth.log | less
|
grep sshd.\*Failed /var/log/auth.log | less
|
||||||
grep sshd.\* /var/log/auth.log
|
grep sshd.\* /var/log/auth.log
|
||||||
grep sshd.\*publickey /var/log/auth.log | less
|
|
||||||
grep sshd.\*publickey /var/log/auth.log
|
grep sshd.\*publickey /var/log/auth.log
|
||||||
grep sshd.\*publickey /var/log/auth.log | less
|
grep sshd.\*publickey /var/log/auth.log | less
|
||||||
apt update
|
apt update
|
||||||
@ -356,115 +168,34 @@ ls
|
|||||||
head -20 jail.conf
|
head -20 jail.conf
|
||||||
cp jail.conf jail.local
|
cp jail.conf jail.local
|
||||||
nano jail.local
|
nano jail.local
|
||||||
nano jail.local
|
|
||||||
nano jail.local
|
|
||||||
systemctl enable fail2ban
|
systemctl enable fail2ban
|
||||||
systemctl start fail2ban
|
systemctl start fail2ban
|
||||||
systemctl status fail2ban
|
systemctl status fail2ban
|
||||||
reboot
|
|
||||||
apt-get update
|
apt-get update
|
||||||
apt upgrade
|
apt upgrade
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
snap info adguard-home
|
snap info adguard-home
|
||||||
exit
|
|
||||||
tail /var/log/auth.log -f
|
tail /var/log/auth.log -f
|
||||||
exit
|
|
||||||
ufw status numbered
|
ufw status numbered
|
||||||
exit
|
|
||||||
ip a
|
|
||||||
exit
|
|
||||||
id
|
id
|
||||||
su phares
|
su phares
|
||||||
su podman
|
su podman
|
||||||
exit
|
|
||||||
exit
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
exit
|
|
||||||
ip a
|
ip a
|
||||||
ip a l | grep inet6
|
ip a l | grep inet6
|
||||||
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
||||||
cat /proc/sys/net/ipv6/conf/all/disable_ipv6
|
|
||||||
cat /boot/firmware/cmdline.txt
|
cat /boot/firmware/cmdline.txt
|
||||||
nano /boot/firmware/cmdline.txt
|
nano /boot/firmware/cmdline.txt
|
||||||
exit
|
|
||||||
snap restart adguard-home
|
snap restart adguard-home
|
||||||
exit
|
|
||||||
nano /etc/duckdns/duck.sh
|
nano /etc/duckdns/duck.sh
|
||||||
exit
|
|
||||||
nano /etc/duckdns/duck.sh
|
|
||||||
cat duck.log
|
|
||||||
chmod 700 /etc/duckdns/duck.sh
|
chmod 700 /etc/duckdns/duck.sh
|
||||||
cd /etc/duckdns
|
cd /etc/duckdns
|
||||||
./duck.sh
|
./duck.sh
|
||||||
cat duck.log
|
|
||||||
ps -ef | grep cr[o]n
|
ps -ef | grep cr[o]n
|
||||||
crontab -e
|
crontab -e
|
||||||
cat duck.log
|
cat duck.log
|
||||||
xit
|
xit
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
links http://192.168.11.2:5015/
|
links http://192.168.11.2:5015/
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
links http://192.168.11.2:5015/
|
|
||||||
sudo -iu podman
|
|
||||||
links http://192.168.11.2:5015/
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
links http://192.168.11.2:5015/
|
|
||||||
links http://192.168.11.2:5015/
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
links http://192.168.11.2:5015/
|
|
||||||
sudo -iu podman
|
|
||||||
chown podman:podman /home/podman/2fauth -R
|
chown podman:podman /home/podman/2fauth -R
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
chown podman:podman /home/podman/2fauth -R
|
|
||||||
sudo -iu podman
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
nc -zv localhost 5015
|
nc -zv localhost 5015
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
sudo -iu podman
|
|
||||||
exit
|
|
||||||
nano /home/persa/.ssh/authorized_keys
|
|
||||||
nano /home/persa/.ssh/authorized_keys
|
|
||||||
nano /root/.ssh/authorized_keys
|
|
||||||
exit
|
|
||||||
nano /root/.ssh/authorized_keys
|
|
||||||
nano /home/lphares/.ssh/authorized_keys
|
|
||||||
nano /home/bmiller/.ssh/authorized_keys
|
|
||||||
nano /home/podman/.ssh/authorized_keys
|
|
||||||
exit
|
|
||||||
nano /home/podman/.ssh/authorized_keys
|
nano /home/podman/.ssh/authorized_keys
|
||||||
nano /home/bmiller/.ssh/authorized_keys
|
nano /home/bmiller/.ssh/authorized_keys
|
||||||
nano /home/lphares/.ssh/authorized_keys
|
nano /home/lphares/.ssh/authorized_keys
|
||||||
@ -472,28 +203,9 @@ nano /root/.ssh/authorized_keys
|
|||||||
nano /home/persa/.ssh/authorized_keys
|
nano /home/persa/.ssh/authorized_keys
|
||||||
nano /home/phares/.ssh/authorized_keys
|
nano /home/phares/.ssh/authorized_keys
|
||||||
exit\
|
exit\
|
||||||
exit
|
|
||||||
sudo -iu podman
|
|
||||||
nano /etc/hostname
|
nano /etc/hostname
|
||||||
nano /etc/hosts
|
nano /etc/hosts
|
||||||
exit
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
sudo -iu podman
|
sudo -iu podman
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -t
|
|
||||||
nginx -s reload
|
|
||||||
nginx -s reload
|
nginx -s reload
|
||||||
nginx -t
|
nginx -t
|
||||||
reboot
|
reboot
|
189
etc/bash_history_2025-02-21.bash
Normal file
189
etc/bash_history_2025-02-21.bash
Normal file
@ -0,0 +1,189 @@
|
|||||||
|
rm -R /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
cp -R /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
cp -Rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
yes | cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
\cp -R -rf /home/podman/jackyzha0-quartz-phares/content/year-season /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
ls /var/lib/containers/storage/overlay-layers/
|
||||||
|
cat /var/lib/containers/storage/overlay-layers/layers.json
|
||||||
|
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json.json
|
||||||
|
cat /var/lib/containers/storage/overlay-layers/volatile-layers.json
|
||||||
|
cat /var/lib/containers/storage/overlay-layers/layers.lock
|
||||||
|
lsblk -I 8 -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||||
|
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%
|
||||||
|
podman reset syste
|
||||||
|
podman reset system
|
||||||
|
podman system reset
|
||||||
|
podman system prune
|
||||||
|
rm -Rf /home/podman/.local/share/containers/storage/overlay/9234e0dfb7414fea7d4610bea727177a951b39a5df9f0573882cbf9e5bc16417/
|
||||||
|
ls -la /home/podman/cron-backup/
|
||||||
|
ls -la /home/podman/cron-backup
|
||||||
|
ls -la /home/podman/cron-backup-delete/
|
||||||
|
ls -la /home/podman/cron-backup-2025-01-31/
|
||||||
|
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||||
|
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rmit --cgroups=split --sdnotify=conmon -d -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||||
|
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --it --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||||
|
/usr/bin/podman run --name=kanbn-to-quartz-server --replace --rm --cgroups=split --sdnotify=conmon -v /etc/localtime:/etc/localtime:ro -v /etc/timezone:/etc/timezone:ro -v /mnt/free-file-sync/kanban/Year-Season/:/app/year-season:rw -v /home/podman/jackyzha0-quartz-phares/content:/app/content:rw -v /home/podman/.microsoft/usersecrets/fb4df5f7-8d94-4524-987e-0b725a85edde/secrets.json:/app/secrets.json:ro --label io.containers.autoupdate=registry --publish 5024:5001 --env ASPNETCORE_ENVIRONMENT=Production gitea.phares.duckdns.org:443/phares3757/kanbn-to-quartz:latest
|
||||||
|
podman ls
|
||||||
|
podman ps a
|
||||||
|
podman ps -a
|
||||||
|
podman image prune
|
||||||
|
podman volume list
|
||||||
|
podman ps
|
||||||
|
podman image rm 9
|
||||||
|
podman image list
|
||||||
|
rsync -a /home/podman/jackyzha0-quartz-phares/content/year-season/ /home/www-data/jackyzha0-quartz-phares/content/year-season
|
||||||
|
cd /home/www-data/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
||||||
|
cat /var/snap/vaultwarden/current/ssl/fullchain.cer
|
||||||
|
snap info vaultwarden
|
||||||
|
snap status vaultwarden
|
||||||
|
snap help
|
||||||
|
ls /root/.acme.sh/
|
||||||
|
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/
|
||||||
|
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/fullchain.cer
|
||||||
|
ls /root/.acme.sh/\*.phares.duckdns.org_ecc/\*.phares.duckdns.org.key
|
||||||
|
cp /home/podman/wild-phares/fullchain.cer /var/snap/vaultwarden/current/ssl/fullchain.cer
|
||||||
|
cp /home/podman/wild-phares/phares.duckdns.org.key /var/snap/vaultwarden/current/ssl/phares.duckdns.org.key
|
||||||
|
snap start vaultwarden
|
||||||
|
snap logs vaultwarden
|
||||||
|
nano /run/resolvconf/resolv.conf
|
||||||
|
cat /etc/resolv.conf
|
||||||
|
ls -la /var/snap/vaultwarden/current/data/icon_cache/
|
||||||
|
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss/
|
||||||
|
ls -la /var/snap/vaultwarden/current/data/icon_cache/zapier.com.png.miss
|
||||||
|
nignx -t
|
||||||
|
ls /var/snap/vaultwarden/current/data/tmp/
|
||||||
|
ls /var/snap/vaultwarden/current/data/icon_cache/
|
||||||
|
ls /var/snap/vaultwarden/current/data/icon_cache/ -ls
|
||||||
|
nano /var/snap/vaultwarden/current/vaultwarden.conf
|
||||||
|
systemctl disable systemd-resolved.service
|
||||||
|
snap start adguard-home
|
||||||
|
snap logs adguard-home
|
||||||
|
systemctl enable systemd-resolved.service
|
||||||
|
snap restart vaultwarden
|
||||||
|
ls /etc/resolv.conf
|
||||||
|
ping
|
||||||
|
ping duckdns.org
|
||||||
|
nano /etc/resolv.conf
|
||||||
|
snap info adguard-home
|
||||||
|
snap stop adguard-home
|
||||||
|
systemctl start systemd-resolved
|
||||||
|
ping www.google.com
|
||||||
|
systemctl disable systemd-resolved
|
||||||
|
systemctl stop systemd-resolved
|
||||||
|
reboot
|
||||||
|
lsof -i -P -n | grep LISTEN
|
||||||
|
nano /etc/ssh/sshd_config
|
||||||
|
cp -R /etc/ssh/sshd_config /home/podman/etc-ssh-sshd_config
|
||||||
|
cp -R /etc/ssh/sshd_config.d /home/podman/etc-ssh-sshd_config.d
|
||||||
|
chown -R podman:podman /home/podman/etc-ssh-sshd_config.d
|
||||||
|
chown -R podman:podman /home/podman/etc-ssh-sshd_config
|
||||||
|
ls -la podman:podman /home/podman/etc-ssh-sshd_config
|
||||||
|
mv /home/podman/etc-ssh-sshd_config.d /home/podman/etc-ssh-sshd_config-r
|
||||||
|
mv /home/podman/etc-ssh-sshd_config-r/sshd_config.d/ /home/podman/etc-ssh-sshd_config.d
|
||||||
|
ls /home/podman/etc-ssh-sshd_config.d
|
||||||
|
ls /home/podman/etc-ssh-sshd_config-r
|
||||||
|
rm -R /home/podman/etc-ssh-sshd_config-r
|
||||||
|
apt-install yazi -y
|
||||||
|
apt-get install yazi -y
|
||||||
|
apt install -y ffmpeg 7zip jq poppler-utils fd-find ripgrep fzf zoxide imagemagick
|
||||||
|
git clone https://github.com/sxyazi/yazi.git
|
||||||
|
apt install cargo
|
||||||
|
apt install make -y
|
||||||
|
make
|
||||||
|
gcc
|
||||||
|
apt install gcc -y
|
||||||
|
cat /tmp/yazi/Cargo.lock
|
||||||
|
cls
|
||||||
|
clear
|
||||||
|
cd yazi/
|
||||||
|
cargo build --release --locked
|
||||||
|
ls /home/podman/etc-ssh-sshd_config -ls
|
||||||
|
cp /etc/ssh/ssh_config /home/podman/etc-ssh-ssh_config
|
||||||
|
naon /home/podman/etc-ssh-ssh_config
|
||||||
|
nano /home/podman/etc-ssh-ssh_config
|
||||||
|
chown podman:podman /home/podman/etc-ssh-ssh_config
|
||||||
|
cd /tmp/
|
||||||
|
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/5608b233-a2f4-4018-aa70-570b0689b266/
|
||||||
|
ls /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024
|
||||||
|
git fetch
|
||||||
|
rm -R original-to-deterministic-hash-code/
|
||||||
|
git clone https://51f44975c8734522b2dec36c6d9a116276c6bded@gitea.phares.duckdns.org/phares3757/original-to-deterministic-hash-code.git
|
||||||
|
cd original-to-deterministic-hash-code/
|
||||||
|
chown -R podman:podman original-to-deterministic-hash-code/
|
||||||
|
chown -R podman:podman /tmp/original-to-deterministic-hash-code/
|
||||||
|
chown -R podman:podman /tmp/original-to-deterministic-hash-code
|
||||||
|
chown -R podman:podman /mnt/free-file-sync/proxmox/iCloud\ Photos\ 2024/
|
||||||
|
cat /root/.ssh/id_ed25519
|
||||||
|
cat /root/.ssh/id_ed25519.pub
|
||||||
|
cat /root/.ssh
|
||||||
|
ssh-copy-id
|
||||||
|
ssh-copy-id root
|
||||||
|
ls -la /root/.ssh
|
||||||
|
nano /var/snap/adguard-home/current/AdGuardHome.yaml
|
||||||
|
nano /etc/hostname
|
||||||
|
nano /etc/hosts
|
||||||
|
crontab -e
|
||||||
|
nano /root/.ssh/authorized_keys
|
||||||
|
cd /tmp
|
||||||
|
git clone https://github.com/acmesh-official/acme.sh.git
|
||||||
|
cd /tmp/acme.sh
|
||||||
|
./acme.sh --install -m mikepharesjr@msn.com
|
||||||
|
export DuckDNS_Token=1d3fc707-7052-4459-a624-fb01250f00b9
|
||||||
|
echo $DuckDNS_Token
|
||||||
|
./acme.sh --register-account -m mikepharesjr@msn.com
|
||||||
|
./acme.sh --set-default-ca --server letsencrypt
|
||||||
|
./acme.sh --issue --dns dns_duckdns -d '*.sumco.duckdns.org' --debug --home /root/.acme.sh --dnssleep 120 --days 90 --ecc --server https://acme-v02.api.letsencrypt.org/directory
|
||||||
|
ls -la /ssl
|
||||||
|
ls -la /root/.acme.sh/\*.sumco.duckdns.org_ecc/
|
||||||
|
cp -R /root/.acme.sh/\*.sumco.duckdns.org_ecc/ /home/podman/wild-sumco
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.cer /home/podman/wild-sumco/sumco.duckdns.org.cer
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.conf /home/podman/wild-sumco/sumco.duckdns.org.conf
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr /home/podman/wild-sumco/sumco.duckdns.org.csr
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.csr.conf /home/podman/wild-sumco/sumco.duckdns.org.csr.conf
|
||||||
|
mv /home/podman/wild-sumco/\*.sumco.duckdns.org.key /home/podman/wild-sumco/sumco.duckdns.org.key
|
||||||
|
chown -R podman:podman /home/podman/wild-sumco/
|
||||||
|
ls -la /home/podman/wild-sumco/
|
||||||
|
tail -f /var/log/nginx/access.log
|
||||||
|
nano /pod
|
||||||
|
cp /etc/nginx/include/actual.conf /etc/nginx/include/ha.conf
|
||||||
|
cp /etc/nginx/include/actual.conf /etc/nginx/include/nginx.conf
|
||||||
|
nano /etc/nginx/include/ha.conf
|
||||||
|
nginx
|
||||||
|
nano /etc/nginx/include/ha.conf
|
||||||
|
nano /etc/nginx/sites-available/default
|
||||||
|
nano /etc/nginx/include/nginx.conf
|
||||||
|
nano /root/.ssh/id_ed25519.pub
|
||||||
|
apt install apache2-utils
|
||||||
|
htpasswd -c /etc/nginx/.htpasswd phares
|
||||||
|
ls \var\snap\vaultwarden
|
||||||
|
ls /var/snap/vaultwarden/
|
||||||
|
ls /var/snap/vaultwarden -la
|
||||||
|
journalctl --rotate
|
||||||
|
journalctl --vacuum-time=1s
|
||||||
|
journalctl -u cockpit
|
||||||
|
nginx -t
|
||||||
|
nginx -s reload
|
||||||
|
sudo -iu podman
|
||||||
|
apt-get update
|
||||||
|
apt-get upgrade
|
||||||
|
ip -a
|
||||||
|
ip a
|
||||||
|
lsblk -b -o NAME,SIZE,TYPE,VENDOR,MODEL,SERIAL,MOUNTPOINT
|
||||||
|
ncdu -o iso.json
|
||||||
|
exit
|
||||||
|
cd /mnt/
|
||||||
|
ncdu -f file.json
|
||||||
|
ncdu -o file.json
|
||||||
|
ls -la
|
||||||
|
mv file.json free-file-sync/proxmox/
|
||||||
|
cd /mnt/backup
|
||||||
|
cd .
|
||||||
|
cd /
|
||||||
|
cd /mnt/free-file-sync/iso/
|
||||||
|
ls
|
||||||
|
cd ..
|
||||||
|
rm -R iso/
|
||||||
|
ncdu
|
||||||
|
lsblk -o NAME,SIZE,TYPE,FSUSED,FSUSE%,MOUNTPOINT
|
||||||
|
shutdown now
|
12
etc/netplan/01-systemd-networkd.yaml
Normal file
12
etc/netplan/01-systemd-networkd.yaml
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
network:
|
||||||
|
version: 2
|
||||||
|
ethernets:
|
||||||
|
enp1s0:
|
||||||
|
addresses:
|
||||||
|
- 192.168.11.2/25
|
||||||
|
routes:
|
||||||
|
- to: default
|
||||||
|
via: 192.168.11.1
|
||||||
|
wlp3s0:
|
||||||
|
addresses:
|
||||||
|
- 192.168.11.119/25
|
@ -1,11 +0,0 @@
|
|||||||
# This file is generated from information provided by the datasource. Changes
|
|
||||||
# to it will not persist across an instance reboot. To disable cloud-init's
|
|
||||||
# network configuration capabilities, write a file
|
|
||||||
# /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg with the following:
|
|
||||||
# network: {config: disabled}
|
|
||||||
network:
|
|
||||||
ethernets:
|
|
||||||
enp1s0:
|
|
||||||
dhcp4: true
|
|
||||||
version: 2
|
|
||||||
wifis: {}
|
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/adguard.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/adguard.phares.duckdns.org.key -out /etc/nginx/include/adguard.phares.duckdns.org.crt -config /etc/nginx/include/adguard.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -4,9 +4,14 @@ server {
|
|||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
server_name *.affirm.duckdns.org;
|
server_name *.affirm.duckdns.org;
|
||||||
root /var/www/html-affirm;
|
client_max_body_size 5000m;
|
||||||
index index.html index.htm;
|
|
||||||
location / {
|
location / {
|
||||||
try_files $uri $uri.html $uri/ =404;
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.0.31/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,23 +0,0 @@
|
|||||||
server {
|
|
||||||
# touch /etc/nginx/include/authentik.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/authentik.phares.duckdns.org.key -out /etc/nginx/include/authentik.phares.duckdns.org.crt -config /etc/nginx/include/authentik.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
|
||||||
listen 443 ssl http2;
|
|
||||||
server_name authentik.phares.duckdns.org;
|
|
||||||
client_max_body_size 5000m;
|
|
||||||
location / {
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
proxy_pass https://192.168.11.2:5018/;
|
|
||||||
proxy_read_timeout 600s;
|
|
||||||
proxy_send_timeout 600s;
|
|
||||||
proxy_connect_timeout 600s;
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header Connection "upgrade";
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/baikal.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/baikal.phares.duckdns.org.key -out /etc/nginx/include/baikal.phares.duckdns.org.crt -config /etc/nginx/include/baikal.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,12 +1,17 @@
|
|||||||
server {
|
server {
|
||||||
ssl_certificate /home/podman/wild-bchs/fullchain.pem;
|
ssl_certificate /home/podman/wild-bchs/fullchain.cer;
|
||||||
ssl_certificate_key /home/podman/wild-bchs/privkey.pem;
|
ssl_certificate_key /home/podman/wild-bchs/bchs.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
server_name *.bchs.duckdns.org;
|
server_name *.bchs.duckdns.org;
|
||||||
root /var/www/html-bchs;
|
client_max_body_size 5000m;
|
||||||
index index.html index.htm;
|
|
||||||
location / {
|
location / {
|
||||||
try_files $uri $uri.html $uri/ =404;
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.0.43/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/beszel.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/beszel.phares.duckdns.org.key -out /etc/nginx/include/beszel.phares.duckdns.org.crt -config /etc/nginx/include/beszel.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/blinko.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/blinko.phares.duckdns.org.key -out /etc/nginx/include/blinko.phares.duckdns.org.crt -config /etc/nginx/include/blinko.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/cockpit.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/cockpit.phares.duckdns.org.key -out /etc/nginx/include/cockpit.phares.duckdns.org.crt -config /etc/nginx/include/cockpit.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/dashkiosk.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/dashkiosk.phares.duckdns.org.key -out /etc/nginx/include/dashkiosk.phares.duckdns.org.crt -config /etc/nginx/include/dashkiosk.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/dorico.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/dorico.phares.duckdns.org.key -out /etc/nginx/include/dorico.phares.duckdns.org.crt -config /etc/nginx/include/dorico.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,20 +1,17 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/actual.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/actual.phares.duckdns.org.key -out /etc/nginx/include/actual.phares.duckdns.org.crt -config /etc/nginx/include/actual.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
server_name actual.phares.duckdns.org;
|
server_name dotnet-sdk-8.phares.duckdns.org;
|
||||||
client_max_body_size 5000m;
|
|
||||||
location / {
|
location / {
|
||||||
proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
proxy_pass http://192.168.11.2:5013/;
|
proxy_pass http://192.168.11.2:5027/;
|
||||||
proxy_read_timeout 600s;
|
proxy_read_timeout 600s;
|
||||||
proxy_send_timeout 600s;
|
proxy_send_timeout 600s;
|
||||||
|
add_header Access-Control-Allow-Origin *;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/firefox.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/firefox.phares.duckdns.org.key -out /etc/nginx/include/firefox.phares.duckdns.org.crt -config /etc/nginx/include/firefox.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
@ -12,7 +9,7 @@ server {
|
|||||||
proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
proxy_pass http://192.168.11.2:5800/;
|
proxy_pass https://192.168.11.2:5800/;
|
||||||
proxy_read_timeout 600s;
|
proxy_read_timeout 600s;
|
||||||
proxy_send_timeout 600s;
|
proxy_send_timeout 600s;
|
||||||
}
|
}
|
||||||
|
39
etc/nginx/include/free-file-sync.conf
Normal file
39
etc/nginx/include/free-file-sync.conf
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name free-file-sync-still.phares.duckdns.org;
|
||||||
|
root /mnt/free-file-sync/still;
|
||||||
|
location / {
|
||||||
|
autoindex on;
|
||||||
|
disable_symlinks on;
|
||||||
|
autoindex_format json;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name free-file-sync-moving.phares.duckdns.org;
|
||||||
|
root /mnt/free-file-sync/moving;
|
||||||
|
location / {
|
||||||
|
autoindex on;
|
||||||
|
disable_symlinks on;
|
||||||
|
autoindex_format json;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name free-file-sync-a.phares.duckdns.org;
|
||||||
|
root /mnt/free-file-sync/1-Images-A;
|
||||||
|
location / {
|
||||||
|
autoindex on;
|
||||||
|
disable_symlinks on;
|
||||||
|
autoindex_format json;
|
||||||
|
}
|
||||||
|
}
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/gitea.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/gitea.phares.duckdns.org.key -out /etc/nginx/include/gitea.phares.duckdns.org.crt -config /etc/nginx/include/gitea.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/gotify.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/gotify.phares.duckdns.org.key -out /etc/nginx/include/gotify.phares.duckdns.org.crt -config /etc/nginx/include/gotify.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/immich-kiosk.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich-kiosk.phares.duckdns.org.key -out /etc/nginx/include/immich-kiosk.phares.duckdns.org.crt -config /etc/nginx/include/immich-kiosk.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/immich-to-slideshow.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich-to-slideshow.phares.duckdns.org.key -out /etc/nginx/include/immich-to-slideshow.phares.duckdns.org.crt -config /etc/nginx/include/immich-to-slideshow.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/immich.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/immich.phares.duckdns.org.key -out /etc/nginx/include/immich.phares.duckdns.org.crt -config /etc/nginx/include/immich.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -4,9 +4,14 @@ server {
|
|||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
server_name *.jmlc.duckdns.org;
|
server_name *.jmlc.duckdns.org;
|
||||||
root /var/www/html-jmlc;
|
client_max_body_size 5000m;
|
||||||
index index.html index.htm;
|
|
||||||
location / {
|
location / {
|
||||||
try_files $uri $uri.html $uri/ =404;
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.0.42/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org.key -out /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org.crt -config /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/kuma.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/kuma.phares.duckdns.org.key -out /etc/nginx/include/kuma.phares.duckdns.org.crt -config /etc/nginx/include/kuma.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,20 +0,0 @@
|
|||||||
server {
|
|
||||||
# touch /etc/nginx/include/linkwarden.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/linkwarden.phares.duckdns.org.key -out /etc/nginx/include/linkwarden.phares.duckdns.org.crt -config /etc/nginx/include/linkwarden.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
|
||||||
listen 443 ssl http2;
|
|
||||||
server_name linkwarden.phares.duckdns.org;
|
|
||||||
client_max_body_size 5000m;
|
|
||||||
location / {
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
proxy_pass http://192.168.11.2:5011/;
|
|
||||||
proxy_read_timeout 600s;
|
|
||||||
proxy_send_timeout 600s;
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,46 +0,0 @@
|
|||||||
server {
|
|
||||||
# touch /etc/nginx/include/mattermost.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/mattermost.phares.duckdns.org.key -out /etc/nginx/include/mattermost.phares.duckdns.org.crt -config /etc/nginx/include/mattermost.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
|
||||||
listen 443 ssl http2;
|
|
||||||
server_name mattermost.phares.duckdns.org;
|
|
||||||
# add_header X-Early-Data $tls1_3_early_data;
|
|
||||||
location / {
|
|
||||||
# https://mattermost.m1k1o.net/#/getting-started/reverse-proxy
|
|
||||||
client_max_body_size 100M;
|
|
||||||
proxy_set_header Connection "";
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
proxy_set_header X-Frame-Options SAMEORIGIN;
|
|
||||||
proxy_buffers 256 16k;
|
|
||||||
proxy_buffer_size 16k;
|
|
||||||
proxy_read_timeout 600s;
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_pass https://192.168.11.2:8443/;
|
|
||||||
}
|
|
||||||
location ~ /api/v[0-9]+/(users/)?websocket$ {
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header Connection "upgrade";
|
|
||||||
client_max_body_size 50M;
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
proxy_set_header X-Frame-Options SAMEORIGIN;
|
|
||||||
proxy_buffers 256 16k;
|
|
||||||
proxy_buffer_size 16k;
|
|
||||||
client_body_timeout 60s;
|
|
||||||
send_timeout 300s;
|
|
||||||
lingering_timeout 5s;
|
|
||||||
proxy_connect_timeout 90s;
|
|
||||||
proxy_send_timeout 300s;
|
|
||||||
proxy_read_timeout 90s;
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_pass https://192.168.11.2:8443;
|
|
||||||
}
|
|
||||||
}
|
|
19
etc/nginx/include/ncdu.conf
Normal file
19
etc/nginx/include/ncdu.conf
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name ncdu.phares.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_pass http://192.168.11.2:5033/;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
proxy_set_header X-NginX-Proxy true;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_read_timeout 43200000;
|
||||||
|
}
|
||||||
|
}
|
@ -1,20 +1,17 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/2fauth.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/2fauth.phares.duckdns.org.key -out /etc/nginx/include/2fauth.phares.duckdns.org.crt -config /etc/nginx/include/2fauth.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
server_name 2fauth.phares.duckdns.org;
|
server_name original-to-deterministic.phares.duckdns.org;
|
||||||
client_max_body_size 5000m;
|
|
||||||
location / {
|
location / {
|
||||||
proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
proxy_pass https://192.168.11.2:5015/;
|
proxy_pass http://192.168.11.2:5025/;
|
||||||
proxy_read_timeout 600s;
|
proxy_read_timeout 600s;
|
||||||
proxy_send_timeout 600s;
|
proxy_send_timeout 600s;
|
||||||
|
add_header Access-Control-Allow-Origin *;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,23 +0,0 @@
|
|||||||
server {
|
|
||||||
# touch /etc/nginx/include/passed.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/passed.phares.duckdns.org.key -out /etc/nginx/include/passed.phares.duckdns.org.crt -config /etc/nginx/include/passed.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
|
||||||
listen 443 ssl http2;
|
|
||||||
server_name passed.phares.duckdns.org;
|
|
||||||
client_max_body_size 5000m;
|
|
||||||
location / {
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
proxy_pass http://192.168.11.2:5022/;
|
|
||||||
proxy_read_timeout 600s;
|
|
||||||
proxy_send_timeout 600s;
|
|
||||||
proxy_connect_timeout 600s;
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header Connection "upgrade";
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/pgadmin.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/pgadmin.phares.duckdns.org.key -out /etc/nginx/include/pgadmin.phares.duckdns.org.crt -config /etc/nginx/include/pgadmin.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -17,10 +17,7 @@ server {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/phares.duckdns.org.key -out /etc/nginx/include/phares.duckdns.org.crt -config /etc/nginx/include/phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -8,10 +8,7 @@ server {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/quartz.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/quartz.phares.duckdns.org.key -out /etc/nginx/include/quartz.phares.duckdns.org.crt -config /etc/nginx/include/quartz.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
@ -20,5 +17,7 @@ server {
|
|||||||
index index.html index.htm;
|
index index.html index.htm;
|
||||||
location / {
|
location / {
|
||||||
try_files $uri $uri.html $uri/ =404;
|
try_files $uri $uri.html $uri/ =404;
|
||||||
|
auth_basic "auth_basic";
|
||||||
|
auth_basic_user_file /etc/nginx/.htpasswd;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -9,10 +9,7 @@ server {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/slideshow.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/slideshow.phares.duckdns.org.key -out /etc/nginx/include/slideshow.phares.duckdns.org.crt -config /etc/nginx/include/slideshow.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
17
etc/nginx/include/sumco.conf
Normal file
17
etc/nginx/include/sumco.conf
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
server {
|
||||||
|
ssl_certificate /home/podman/wild-sumco/fullchain.cer;
|
||||||
|
ssl_certificate_key /home/podman/wild-sumco/sumco.duckdns.org.key;
|
||||||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name *.sumco.duckdns.org;
|
||||||
|
client_max_body_size 5000m;
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass https://192.168.0.41/;
|
||||||
|
proxy_read_timeout 600s;
|
||||||
|
proxy_send_timeout 600s;
|
||||||
|
}
|
||||||
|
}
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/vaultwarden.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/vaultwarden.phares.duckdns.org.key -out /etc/nginx/include/vaultwarden.phares.duckdns.org.crt -config /etc/nginx/include/vaultwarden.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
@ -30,5 +27,8 @@ server {
|
|||||||
proxy_pass https://192.168.11.2:5008/;
|
proxy_pass https://192.168.11.2:5008/;
|
||||||
proxy_read_timeout 600s;
|
proxy_read_timeout 600s;
|
||||||
proxy_send_timeout 600s;
|
proxy_send_timeout 600s;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection $http_connection;
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/warden.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/warden.phares.duckdns.org.key -out /etc/nginx/include/warden.phares.duckdns.org.crt -config /etc/nginx/include/warden.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/xandikos.phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/xandikos.phares.duckdns.org.key -out /etc/nginx/include/xandikos.phares.duckdns.org.crt -config /etc/nginx/include/xandikos.phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
server {
|
server {
|
||||||
# touch /etc/nginx/include/phares.duckdns.org
|
|
||||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/phares.duckdns.org.key -out /etc/nginx/include/phares.duckdns.org.crt -config /etc/nginx/include/phares.duckdns.org
|
|
||||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
|
||||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
@ -13,34 +10,37 @@ server {
|
|||||||
try_files $uri $uri.html $uri/ =404;
|
try_files $uri $uri.html $uri/ =404;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
include /etc/nginx/include/2fauth.conf; # https://2fauth.phares.duckdns.org # https://192.168.11.2:5015/
|
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # https://192.168.0.31
|
||||||
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http://192.168.11.2:5014/
|
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # https://192.168.0.43
|
||||||
include /etc/nginx/include/authentik.conf; # https://authentik.phares.duckdns.org # https://192.168.11.2:5018/
|
include /etc/nginx/include/jmlc.conf; # https://*.jmlc.duckdns.org # https://192.168.0.42
|
||||||
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # /var/www/html-affirm
|
include /etc/nginx/include/sumco.conf; # https://*.sumco.duckdns.org # https://192.168.0.41
|
||||||
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/
|
#
|
||||||
include /etc/nginx/include/beszel.conf; # https://beszel.phares.duckdns.org # http://192.168.11.2:5023/
|
include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org # http:5014
|
||||||
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # /var/www/html-bchs
|
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http:8001
|
||||||
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/
|
include /etc/nginx/include/beszel.conf; # https://beszel.phares.duckdns.org # http:5023
|
||||||
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/
|
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http:5012
|
||||||
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http://192.168.11.2:9400/
|
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https:9090
|
||||||
|
include /etc/nginx/include/dashkiosk.conf; # https://dashkiosk.phares.duckdns.org # http:9400
|
||||||
include /etc/nginx/include/dorico.conf; # https://dorico.phares.duckdns.org # /home/lphares/dorico
|
include /etc/nginx/include/dorico.conf; # https://dorico.phares.duckdns.org # /home/lphares/dorico
|
||||||
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # http://192.168.11.2:5800/
|
include /etc/nginx/include/dotnet-sdk-8.conf; # https://dotnet-sdk-8.phares.duckdns.org # http:5027
|
||||||
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http://192.168.11.2:3000/
|
include /etc/nginx/include/firefox.conf; # https://firefox.phares.duckdns.org # https:5800
|
||||||
include /etc/nginx/include/gotify.conf; # https://gotify.phares.duckdns.org # http://192.168.11.2:5016/
|
include /etc/nginx/include/free-file-sync.conf; # https://free-file-sync.phares.duckdns.org # /mnt/free-file-sync
|
||||||
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/
|
include /etc/nginx/include/gitea.conf; # https://gitea.phares.duckdns.org # http:3000
|
||||||
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/
|
include /etc/nginx/include/gotify.conf; # https://gotify.phares.duckdns.org # http:5016
|
||||||
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/
|
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http:5010
|
||||||
include /etc/nginx/include/jmlc.conf; # https://*.jmlc.duckdns.org # /var/www/html-jmlc
|
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http:5009
|
||||||
include /etc/nginx/include/kanbn-to-quartz.conf; # https://kanbn-to-quartz.phares.duckdns.org # http://192.168.11.2:5024/
|
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http:3001
|
||||||
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/
|
include /etc/nginx/include/kanbn-to-quartz.conf; # https://kanbn-to-quartz.phares.duckdns.org # http:5024
|
||||||
include /etc/nginx/include/linkwarden.conf; # https://linkwarden.phares.duckdns.org # http://192.168.11.2:5011/
|
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https:3004
|
||||||
include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/
|
include /etc/nginx/include/ncdu.conf; # https://ncdu.phares.duckdns.org # https:5033
|
||||||
include /etc/nginx/include/passed.conf; # https://passed.phares.duckdns.org # http://192.168.11.2:5022/
|
include /etc/nginx/include/original-to-deterministic-hash-code.conf; # https://original-to-deterministic.phares.duckdns.org # http:5025
|
||||||
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/
|
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https:5007
|
||||||
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
|
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
|
||||||
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
|
include /etc/nginx/include/quartz.conf; # https://quartz.phares.duckdns.org # /var/www/html-quartz
|
||||||
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
|
include /etc/nginx/include/slideshow.conf; # https://slideshow.phares.duckdns.org # /var/www/html-slideshow
|
||||||
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https://192.168.11.2:5008/
|
include /etc/nginx/include/vaultwarden.conf; # https://vaultwarden.phares.duckdns.org # https:5008
|
||||||
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https://192.168.11.2:5008/
|
include /etc/nginx/include/warden.conf; # https://warden.phares.duckdns.org # https:5008
|
||||||
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http://192.168.11.2:8000/
|
include /etc/nginx/include/xandikos.conf; # https://xandikos.phares.duckdns.org # http:8000
|
||||||
# ssh root@free.file.sync.root -i C:/Users/phares/.ssh/id_ed25519
|
#
|
||||||
|
# ssh root@phares.duckdns.org -p 22 -i C:/Users/phares/.ssh/id_ed25519
|
||||||
|
# ssh root@phares.duckdns.org -p 5026 -i C:/Users/phares/.ssh/id_ed25519
|
@ -1,9 +1,9 @@
|
|||||||
[Unit]
|
[Unit]
|
||||||
# Auto-generated, DO NOT EDIT
|
# Auto-generated, DO NOT EDIT
|
||||||
Description=Service for snap application adguard-home.adguard-home
|
Description=Service for snap application adguard-home.adguard-home
|
||||||
Requires=snap-adguard\x2dhome-7701.mount
|
Requires=snap-adguard\x2dhome-7793.mount
|
||||||
Wants=network.target
|
Wants=network.target
|
||||||
After=snap-adguard\x2dhome-7701.mount network.target snapd.apparmor.service
|
After=snap-adguard\x2dhome-7793.mount network.target snapd.apparmor.service
|
||||||
X-Snappy=yes
|
X-Snappy=yes
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
|
|||||||
ExecStart=/usr/bin/snap run adguard-home
|
ExecStart=/usr/bin/snap run adguard-home
|
||||||
SyslogIdentifier=adguard-home.adguard-home
|
SyslogIdentifier=adguard-home.adguard-home
|
||||||
Restart=always
|
Restart=always
|
||||||
WorkingDirectory=/var/snap/adguard-home/7701
|
WorkingDirectory=/var/snap/adguard-home/7793
|
||||||
TimeoutStopSec=30
|
TimeoutStopSec=30
|
||||||
Type=simple
|
Type=simple
|
||||||
|
|
||||||
|
@ -1,16 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
# Auto-generated, DO NOT EDIT
|
|
||||||
Description=Service for snap application certbot.renew
|
|
||||||
Requires=snap-certbot-4325.mount
|
|
||||||
Wants=network.target
|
|
||||||
After=snap-certbot-4325.mount network.target snapd.apparmor.service
|
|
||||||
X-Snappy=yes
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
EnvironmentFile=-/etc/environment
|
|
||||||
ExecStart=/usr/bin/snap run --timer="00:00~24:00/2" certbot.renew
|
|
||||||
SyslogIdentifier=certbot.renew
|
|
||||||
Restart=no
|
|
||||||
WorkingDirectory=/var/snap/certbot/4325
|
|
||||||
TimeoutStopSec=30
|
|
||||||
Type=oneshot
|
|
@ -1,14 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
# Auto-generated, DO NOT EDIT
|
|
||||||
Description=Timer renew for snap application certbot.renew
|
|
||||||
Requires=snap-certbot-4325.mount
|
|
||||||
After=snap-certbot-4325.mount
|
|
||||||
X-Snappy=yes
|
|
||||||
|
|
||||||
[Timer]
|
|
||||||
Unit=snap.certbot.renew.service
|
|
||||||
OnCalendar=*-*-* 11:01
|
|
||||||
OnCalendar=*-*-* 12:54
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=timers.target
|
|
@ -1,9 +1,9 @@
|
|||||||
[Unit]
|
[Unit]
|
||||||
# Auto-generated, DO NOT EDIT
|
# Auto-generated, DO NOT EDIT
|
||||||
Description=Service for snap application vaultwarden.vaultwarden
|
Description=Service for snap application vaultwarden.vaultwarden
|
||||||
Requires=snap-vaultwarden-158.mount
|
Requires=snap-vaultwarden-164.mount
|
||||||
Wants=network.target
|
Wants=network.target
|
||||||
After=snap-vaultwarden-158.mount network.target snapd.apparmor.service
|
After=snap-vaultwarden-164.mount network.target snapd.apparmor.service
|
||||||
X-Snappy=yes
|
X-Snappy=yes
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
@ -11,7 +11,7 @@ EnvironmentFile=-/etc/environment
|
|||||||
ExecStart=/usr/bin/snap run vaultwarden
|
ExecStart=/usr/bin/snap run vaultwarden
|
||||||
SyslogIdentifier=vaultwarden.vaultwarden
|
SyslogIdentifier=vaultwarden.vaultwarden
|
||||||
Restart=on-failure
|
Restart=on-failure
|
||||||
WorkingDirectory=/var/snap/vaultwarden/158
|
WorkingDirectory=/var/snap/vaultwarden/164
|
||||||
TimeoutStopSec=30
|
TimeoutStopSec=30
|
||||||
Type=simple
|
Type=simple
|
||||||
|
|
||||||
|
@ -54,7 +54,7 @@ Environment="MAIL_MAILER=log"
|
|||||||
Environment="MAIL_HOST=smtp.centurylink.net"
|
Environment="MAIL_HOST=smtp.centurylink.net"
|
||||||
Environment="MAIL_PORT=587"
|
Environment="MAIL_PORT=587"
|
||||||
Environment="MAIL_USERNAME=phares@centurylink.net"
|
Environment="MAIL_USERNAME=phares@centurylink.net"
|
||||||
Environment="MAIL_PASSWORD=Q7rOkv6#YdLCx4SBvMIAw"
|
Environment="MAIL_PASSWORD=RN9iPi5Ej#gRgLgiBTkb"
|
||||||
Environment="MAIL_ENCRYPTION=null"
|
Environment="MAIL_ENCRYPTION=null"
|
||||||
Environment="MAIL_FROM_NAME=Mik Phares"
|
Environment="MAIL_FROM_NAME=Mik Phares"
|
||||||
Environment="MAIL_FROM_ADDRESS=noreply@phares.duckdns.org"
|
Environment="MAIL_FROM_ADDRESS=noreply@phares.duckdns.org"
|
||||||
|
@ -17,7 +17,7 @@ Environment="AUTHENTIK_SECRET_KEY=mlZ57mWthun9b8SPaS7Ptl0bBQX4OvyRanbqdQ+5e/k="
|
|||||||
# Environment="AUTHENTIK_EMAIL__HOST=smtp.centurylink.net"
|
# Environment="AUTHENTIK_EMAIL__HOST=smtp.centurylink.net"
|
||||||
# Environment="AUTHENTIK_EMAIL__PORT=587"
|
# Environment="AUTHENTIK_EMAIL__PORT=587"
|
||||||
# Environment="AUTHENTIK_EMAIL__USERNAME=phares@centurylink.net"
|
# Environment="AUTHENTIK_EMAIL__USERNAME=phares@centurylink.net"
|
||||||
# Environment="AUTHENTIK_EMAIL__PASSWORD=Q7rOkv6#YdLCx4SBvMIAw"
|
# Environment="AUTHENTIK_EMAIL__PASSWORD=RN9iPi5Ej#gRgLgiBTkb"
|
||||||
# Environment="AUTHENTIK_EMAIL__USE_TLS=false"
|
# Environment="AUTHENTIK_EMAIL__USE_TLS=false"
|
||||||
# Environment="AUTHENTIK_EMAIL__USE_SSL=false"
|
# Environment="AUTHENTIK_EMAIL__USE_SSL=false"
|
||||||
# Environment="AUTHENTIK_EMAIL__TIMEOUT=10"
|
# Environment="AUTHENTIK_EMAIL__TIMEOUT=10"
|
||||||
|
@ -17,7 +17,7 @@ Environment="AUTHENTIK_SECRET_KEY=QvqdN5Pn4piWcoof1yPDa0FcaGnOL1gHAiSImJjEGZl6py
|
|||||||
# Environment="AUTHENTIK_EMAIL__HOST=smtp.centurylink.net"
|
# Environment="AUTHENTIK_EMAIL__HOST=smtp.centurylink.net"
|
||||||
# Environment="AUTHENTIK_EMAIL__PORT=587"
|
# Environment="AUTHENTIK_EMAIL__PORT=587"
|
||||||
# Environment="AUTHENTIK_EMAIL__USERNAME=phares@centurylink.net"
|
# Environment="AUTHENTIK_EMAIL__USERNAME=phares@centurylink.net"
|
||||||
# Environment="AUTHENTIK_EMAIL__PASSWORD=Q7rOkv6#YdLCx4SBvMIAw"
|
# Environment="AUTHENTIK_EMAIL__PASSWORD=RN9iPi5Ej#gRgLgiBTkb"
|
||||||
# Environment="AUTHENTIK_EMAIL__USE_TLS=false"
|
# Environment="AUTHENTIK_EMAIL__USE_TLS=false"
|
||||||
# Environment="AUTHENTIK_EMAIL__USE_SSL=false"
|
# Environment="AUTHENTIK_EMAIL__USE_SSL=false"
|
||||||
# Environment="AUTHENTIK_EMAIL__TIMEOUT=10"
|
# Environment="AUTHENTIK_EMAIL__TIMEOUT=10"
|
||||||
|
@ -0,0 +1,27 @@
|
|||||||
|
[Container]
|
||||||
|
AutoUpdate=registry
|
||||||
|
ContainerName=file-folder-helper
|
||||||
|
Exec=sleep infinity
|
||||||
|
Image=gitea.phares.duckdns.org:443/phares3757/file-folder-helper:latest
|
||||||
|
# Network=file-folder-helper.network
|
||||||
|
# Pod=file-folder-helper.pod
|
||||||
|
Volume=/etc/localtime:/etc/localtime:ro
|
||||||
|
Volume=/etc/timezone:/etc/timezone:ro
|
||||||
|
Volume=/mnt/free-file-sync/notes/user-secrets/8da397d4-13ec-4576-9722-3c79cad25563/secrets.json:/app/secrets.json:ro
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Restart=no
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target default.target
|
||||||
|
|
||||||
|
# podman pull gitea.phares.duckdns.org:443/phares3757/file-folder-helper:latest
|
||||||
|
# systemctl --user daemon-reload
|
||||||
|
# systemctl --user start file-folder-helper
|
||||||
|
# systemctl --user status file-folder-helper
|
||||||
|
# journalctl -fu file-folder-helper.service
|
||||||
|
# podman logs file-folder-helper
|
||||||
|
# systemctl --user stop file-folder-helper
|
||||||
|
# systemctl --user disable file-folder-helper
|
||||||
|
# podman exec -ti file-folder-helper /bin/sh
|
||||||
|
# podman exec -ti file-folder-helper /bin/bash
|
@ -0,0 +1,52 @@
|
|||||||
|
[Container]
|
||||||
|
AutoUpdate=registry
|
||||||
|
#
|
||||||
|
ContainerName=minecraft-server
|
||||||
|
#
|
||||||
|
# Environment="MODPACK=https://mediafilez.forgecdn.net/files/6159/192/Integrated%20MC-1.4.5.zip"
|
||||||
|
Environment="CF_API_KEY=$2a$10$4YL9prKJllKmiFp./V11B.iZ3kS1p0Rv0afJTpNctfRl2j6j/vb/a"
|
||||||
|
Environment="CF_FILE_ID=6159192"
|
||||||
|
# Environment="CF_PAGE_URL=https://www.curseforge.com/minecraft/modpacks/integrated-minecraft"
|
||||||
|
Environment="CF_SLUG=integrated-minecraft"
|
||||||
|
Environment="DIFFICULTY=normal"
|
||||||
|
Environment="EULA=TRUE"
|
||||||
|
Environment="FORCE_GAMEMODE=true"
|
||||||
|
Environment="MODE=survival"
|
||||||
|
Environment="TYPE=AUTO_CURSEFORGE"
|
||||||
|
# Environment="TYPE=FORGE"
|
||||||
|
Environment="VERSION=1.20.1"
|
||||||
|
Environment= "MEMORY=6G"
|
||||||
|
#
|
||||||
|
HealthCmd=mc-health
|
||||||
|
HealthInterval=5s
|
||||||
|
HealthRetries=20
|
||||||
|
HealthStartPeriod=1m
|
||||||
|
HealthTimeout=3s
|
||||||
|
#
|
||||||
|
Image=docker.io/itzg/minecraft-server
|
||||||
|
# Network=minecraft.network
|
||||||
|
# Pod=minecraft.pod
|
||||||
|
PodmanArgs=--attach stdin --tty
|
||||||
|
#
|
||||||
|
PublishPort=25565:25565
|
||||||
|
#
|
||||||
|
Volume=minecraft-server-data.volume:/data:rw
|
||||||
|
Volume=/etc/localtime:/etc/localtime:ro
|
||||||
|
Volume=/etc/timezone:/etc/timezone:ro
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Restart=no
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target default.target
|
||||||
|
|
||||||
|
# podman pull docker.io/itzg/minecraft-server
|
||||||
|
# systemctl --user daemon-reload
|
||||||
|
# systemctl --user start minecraft-server
|
||||||
|
# systemctl --user status minecraft-server --lines=9999
|
||||||
|
# journalctl -fu minecraft-server.service
|
||||||
|
# podman logs minecraft-server
|
||||||
|
# systemctl --user stop minecraft-server
|
||||||
|
# systemctl --user disable minecraft-server
|
||||||
|
# podman exec -ti minecraft-server /bin/sh
|
||||||
|
# podman exec -ti minecraft-server /bin/bash
|
@ -0,0 +1,30 @@
|
|||||||
|
[Container]
|
||||||
|
AutoUpdate=registry
|
||||||
|
ContainerName=original-to-deterministic-hash-code-server
|
||||||
|
Environment="ASPNETCORE_ENVIRONMENT=Production"
|
||||||
|
Image=gitea.phares.duckdns.org:443/phares3757/original-to-deterministic-hash-code:latest
|
||||||
|
# Network=original-to-deterministic-hash-code-server.network
|
||||||
|
# Pod=original-to-deterministic-hash-code-server.pod
|
||||||
|
PublishPort=5025:5001
|
||||||
|
Volume=/etc/localtime:/etc/localtime:ro
|
||||||
|
Volume=/etc/timezone:/etc/timezone:ro
|
||||||
|
Volume=/tmp/original-to-deterministic-hash-code:/tmp/original-to-deterministic-hash-code:rw
|
||||||
|
Volume=/mnt/free-file-sync/proxmox/iCloud Photos 2024:/app/content:rw
|
||||||
|
Volume=/home/podman/.microsoft/usersecrets/2f63ace9-efe5-4b0a-9ebe-529309f33e3f/secrets.json:/app/secrets.json:ro
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Restart=no
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target default.target
|
||||||
|
|
||||||
|
# podman pull gitea.phares.duckdns.org:443/phares3757/original-to-deterministic-hash-code:latest
|
||||||
|
# systemctl --user daemon-reload
|
||||||
|
# systemctl --user start original-to-deterministic-hash-code-server
|
||||||
|
# systemctl --user status original-to-deterministic-hash-code-server
|
||||||
|
# journalctl -fu original-to-deterministic-hash-code-server.service
|
||||||
|
# podman logs original-to-deterministic-hash-code-server
|
||||||
|
# systemctl --user stop original-to-deterministic-hash-code-server
|
||||||
|
# systemctl --user disable original-to-deterministic-hash-code-server
|
||||||
|
# podman exec -ti original-to-deterministic-hash-code-server /bin/sh
|
||||||
|
# podman exec -ti original-to-deterministic-hash-code-server /bin/bash
|
@ -1,7 +1,7 @@
|
|||||||
[Container]
|
[Container]
|
||||||
ContainerName=beszel-agent
|
ContainerName=beszel-agent
|
||||||
# Environment="user=1000"
|
# Environment="user=1000"
|
||||||
Environment="KEY=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKdY/QcDcSoXxY3PpcNDAV4XcP89qgtaI00Oxt5zoCuB"
|
Environment="KEY=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPnMy4E7xmJ5XSr7H/mNWC1o5JmTn1wkwRR6S12b/Ggr"
|
||||||
Environment="PORT=45876"
|
Environment="PORT=45876"
|
||||||
Image=docker.io/henrygd/beszel-agent:latest
|
Image=docker.io/henrygd/beszel-agent:latest
|
||||||
PublishPort=45876:45876
|
PublishPort=45876:45876
|
||||||
|
@ -0,0 +1 @@
|
|||||||
|
[Volume]
|
@ -4,7 +4,7 @@ Environment="beszel_POSTGRESQL__PORT=5439"
|
|||||||
Image=docker.io/henrygd/beszel:latest
|
Image=docker.io/henrygd/beszel:latest
|
||||||
PodmanArgs=--add-host=gotify.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=gotify.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=kuma.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=kuma.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=mattermost.phares.duckdns.org:192.168.11.2
|
# PodmanArgs=--add-host=mattermost.phares.duckdns.org:192.168.11.2
|
||||||
PublishPort=5023:8090
|
PublishPort=5023:8090
|
||||||
Volume=/etc/localtime:/etc/localtime:ro
|
Volume=/etc/localtime:/etc/localtime:ro
|
||||||
Volume=/etc/timezone:/etc/timezone:ro
|
Volume=/etc/timezone:/etc/timezone:ro
|
||||||
|
@ -0,0 +1 @@
|
|||||||
|
[Volume]
|
@ -0,0 +1 @@
|
|||||||
|
[Volume]
|
@ -0,0 +1 @@
|
|||||||
|
[Volume]
|
@ -0,0 +1 @@
|
|||||||
|
[Volume]
|
@ -0,0 +1,48 @@
|
|||||||
|
[Container]
|
||||||
|
AutoUpdate=registry
|
||||||
|
ContainerName=dotnet-sdk-8
|
||||||
|
Environment="ASPNETCORE_ENVIRONMENT=Production"
|
||||||
|
# Exec=dotnet --info
|
||||||
|
Exec=sleep infinity
|
||||||
|
Image=mcr.microsoft.com/dotnet/sdk:8.0
|
||||||
|
# Network=dotnet-sdk-8.network
|
||||||
|
# Pod=dotnet-sdk-8.pod
|
||||||
|
PodmanArgs=--add-host=gitea.phares.duckdns.org:192.168.11.2
|
||||||
|
PublishPort=5027:5001
|
||||||
|
PublishPort=5026:22
|
||||||
|
Volume=/etc/timezone:/etc/timezone:ro
|
||||||
|
Volume=/etc/localtime:/etc/localtime:ro
|
||||||
|
Volume=dotnet-sdk-8-ssh.volume:/etc/ssh:Z
|
||||||
|
Volume=dotnet-sdk-8-git.volume:/root/git:Z
|
||||||
|
Volume=dotnet-sdk-8-dotnet.volume:/root/.dotnet:Z
|
||||||
|
Volume=dotnet-sdk-8-vscode.volume:/root/.vscode-server:Z
|
||||||
|
Volume=/home/podman/etc-ssh-ssh_config:/etc/ssh-copy/ssh_config:ro
|
||||||
|
Volume=/home/podman/.ssh/authorized_keys:/root/.ssh/authorized_keys:ro
|
||||||
|
Volume=/home/podman/etc-ssh-sshd_config.d/50-cloud-init.conf:/etc/ssh-copy/sshd_config.d/50-cloud-init.conf:ro
|
||||||
|
Volume=/mnt/free-file-sync/notes/user-secrets/8da397d4-13ec-4576-9722-3c79cad25563/secrets.json:/app/secrets.json:ro
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Restart=no
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target default.target
|
||||||
|
|
||||||
|
# podman pull mcr.microsoft.com/dotnet/sdk:8.0
|
||||||
|
# systemctl --user daemon-reload
|
||||||
|
# systemctl --user start dotnet-sdk-8
|
||||||
|
# systemctl --user status dotnet-sdk-8 --lines=999
|
||||||
|
# journalctl -fu dotnet-sdk-8.service
|
||||||
|
# podman logs dotnet-sdk-8
|
||||||
|
# systemctl --user stop dotnet-sdk-8
|
||||||
|
# systemctl --user disable dotnet-sdk-8
|
||||||
|
# podman exec -ti dotnet-sdk-8 /bin/sh
|
||||||
|
# podman exec -ti dotnet-sdk-8 /bin/bash
|
||||||
|
#
|
||||||
|
# apt update && apt install -y openssh-server nano git clang zlib1g-dev
|
||||||
|
# N
|
||||||
|
# cp /etc/ssh-copy/ssh_config /etc/ssh/ssh_config
|
||||||
|
# cp /etc/ssh-copy/sshd_config.d/50-cloud-init.conf /etc/ssh/sshd_config.d/50-cloud-init.conf
|
||||||
|
# service ssh start
|
||||||
|
# ssh root@free.file.sync.root -p 5026 -i C:/Users/phares/.ssh/id_ed25519
|
||||||
|
# cd /root/git/ && git clone https://51f44975c8734522b2dec36c6d9a116276c6bded@gitea.phares.duckdns.org/phares3757/file-folder-helper.git
|
||||||
|
# cp /app/secrets.json /root/.microsoft/usersecrets/2f63ace9-efe5-4b0a-9ebe-529309f33e3f/secrets.json
|
@ -1,14 +1,53 @@
|
|||||||
[Container]
|
[Container]
|
||||||
AutoUpdate=registry
|
AutoUpdate=registry
|
||||||
ContainerName=firefox
|
ContainerName=firefox
|
||||||
|
Environment="DARK_MODE=1"
|
||||||
|
Environment="SECURE_CONNECTION=1"
|
||||||
|
Environment="WEB_AUTHENTICATION=1"
|
||||||
|
Environment="VNC_PASSWORD=Remember65"
|
||||||
|
Environment="WEB_AUTHENTICATION_USERNAME=phares"
|
||||||
|
Environment="WEB_AUTHENTICATION_PASSWORD=Remember65"
|
||||||
Environment="FF_OPEN_URL=https://192.168.11.1"
|
Environment="FF_OPEN_URL=https://192.168.11.1"
|
||||||
Image=docker.io/jlesage/firefox:v24.11.1
|
Image=docker.io/jlesage/firefox:v24.11.1
|
||||||
# Network=firefox.network
|
# Network=firefox.network
|
||||||
# Pod=firefox.pod
|
# Pod=firefox.pod
|
||||||
PublishPort=5800:5800
|
PublishPort=5800:5800
|
||||||
|
PodmanArgs=--add-host=adguard.affirm.duckdns.org:192.168.0.31
|
||||||
|
PodmanArgs=--add-host=adguard.bchs.duckdns.org:192.168.0.43
|
||||||
|
PodmanArgs=--add-host=adguard.jmlc.duckdns.org:192.168.0.42
|
||||||
|
PodmanArgs=--add-host=adguard.phares.duckdns.org:192.168.11.2
|
||||||
|
PodmanArgs=--add-host=adguard.sumco.duckdns.org:192.168.0.41
|
||||||
|
PodmanArgs=--add-host=cockpit.affirm.duckdns.org:192.168.0.31
|
||||||
|
PodmanArgs=--add-host=cockpit.bchs.duckdns.org:192.168.0.43
|
||||||
|
PodmanArgs=--add-host=cockpit.jmlc.duckdns.org:192.168.0.42
|
||||||
|
PodmanArgs=--add-host=cockpit.sumco.duckdns.org:192.168.0.41
|
||||||
|
PodmanArgs=--add-host=firefox.affirm.duckdns.org:192.168.0.31
|
||||||
|
PodmanArgs=--add-host=firefox.bchs.duckdns.org:192.168.0.43
|
||||||
|
PodmanArgs=--add-host=firefox.jmlc.duckdns.org:192.168.0.42
|
||||||
|
PodmanArgs=--add-host=firefox.sumco.duckdns.org:192.168.0.41
|
||||||
|
PodmanArgs=--add-host=gotify.phares.duckdns.org:192.168.11.2
|
||||||
|
PodmanArgs=--add-host=immich.affirm.duckdns.org:192.168.0.31
|
||||||
|
PodmanArgs=--add-host=immich.bchs.duckdns.org:192.168.0.43
|
||||||
|
PodmanArgs=--add-host=immich.jmlc.duckdns.org:192.168.0.42
|
||||||
|
PodmanArgs=--add-host=immich.phares.duckdns.org:192.168.11.2
|
||||||
|
PodmanArgs=--add-host=immich.sumco.duckdns.org:192.168.0.41
|
||||||
|
PodmanArgs=--add-host=kanbn-to-quartz.phares.duckdns.org:192.168.11.2
|
||||||
|
PodmanArgs=--add-host=kuma.affirm.duckdns.org:192.168.0.31
|
||||||
|
PodmanArgs=--add-host=kuma.bchs.duckdns.org:192.168.0.43
|
||||||
|
PodmanArgs=--add-host=kuma.jmlc.duckdns.org:192.168.0.42
|
||||||
|
PodmanArgs=--add-host=kuma.phares.duckdns.org:192.168.11.2
|
||||||
|
PodmanArgs=--add-host=kuma.phares.duckdns.org:192.168.11.2
|
||||||
|
PodmanArgs=--add-host=kuma.sumco.duckdns.org:192.168.0.41
|
||||||
|
PodmanArgs=--add-host=vaultwarden.phares.duckdns.org:192.168.11.2
|
||||||
|
PodmanArgs=--add-host=warden.phares.duckdns.org:192.168.11.2
|
||||||
|
PodmanArgs=--add-host=ha.sumco.duckdns.org:192.168.0.41
|
||||||
|
PodmanArgs=--add-host=nginx.sumco.duckdns.org:192.168.0.41
|
||||||
|
PodmanArgs=--add-host=ha.bchs.duckdns.org:192.168.0.43
|
||||||
Volume=/etc/localtime:/etc/localtime:ro
|
Volume=/etc/localtime:/etc/localtime:ro
|
||||||
Volume=/etc/timezone:/etc/timezone:ro
|
Volume=/etc/timezone:/etc/timezone:ro
|
||||||
Volume=firefox-data.volume:/config:rw
|
Volume=firefox-data.volume:/config:rw
|
||||||
|
Volume=/home/podman/wild-phares/fullchain.cer:/config/certs/web-fullchain.pem:ro
|
||||||
|
Volume=/home/podman/wild-phares/phares.duckdns.org.key:/config/certs/web-privkey.pem:ro
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=no
|
Restart=no
|
||||||
|
@ -3,7 +3,7 @@ AutoUpdate=registry
|
|||||||
ContainerName=immich-kiosk
|
ContainerName=immich-kiosk
|
||||||
Environment="TZ=America/Phoenix"
|
Environment="TZ=America/Phoenix"
|
||||||
# Required settings
|
# Required settings
|
||||||
Environment="KIOSK_IMMICH_API_KEY=fLJoRERkcmFuSviMaAfsuINmvyXLFKu9HIICXP8I"
|
Environment="KIOSK_IMMICH_API_KEY=zexyL8Xb6pqPN171aJbwOGCbXoxkXrGTllN85o520I"
|
||||||
Environment="KIOSK_IMMICH_URL=http://192.168.11.2:3001"
|
Environment="KIOSK_IMMICH_URL=http://192.168.11.2:3001"
|
||||||
# Clock
|
# Clock
|
||||||
Environment="KIOSK_SHOW_TIME=true"
|
Environment="KIOSK_SHOW_TIME=true"
|
||||||
|
@ -5,6 +5,7 @@ Environment="DB_DATABASE_NAME=immich"
|
|||||||
Environment="DB_HOSTNAME=192.168.11.2"
|
Environment="DB_HOSTNAME=192.168.11.2"
|
||||||
Environment="DB_PASSWORD=postgres"
|
Environment="DB_PASSWORD=postgres"
|
||||||
Environment="DB_USERNAME=postgres"
|
Environment="DB_USERNAME=postgres"
|
||||||
|
Environment="IMMICH_CONFIG_FILE=/usr/src/app/config/immich-config.json"
|
||||||
Environment="REDIS_HOSTNAME=192.168.11.2"
|
Environment="REDIS_HOSTNAME=192.168.11.2"
|
||||||
Image=ghcr.io/immich-app/immich-server:release
|
Image=ghcr.io/immich-app/immich-server:release
|
||||||
# Network=immich.network
|
# Network=immich.network
|
||||||
@ -14,7 +15,8 @@ Volume=/etc/localtime:/etc/localtime:ro
|
|||||||
Volume=immich-server-upload.volume:/usr/src/app/upload:Z
|
Volume=immich-server-upload.volume:/usr/src/app/upload:Z
|
||||||
# Volume=immich-server-external.volume:/usr/src/app/external:Z
|
# Volume=immich-server-external.volume:/usr/src/app/external:Z
|
||||||
Volume=/mnt/free-file-sync/still:/usr/src/app/external/still:Z
|
Volume=/mnt/free-file-sync/still:/usr/src/app/external/still:Z
|
||||||
Volume=/mnt/free-file-sync/moving:/usr/src/app/external/moving:Z
|
# Volume=/mnt/free-file-sync/moving:/usr/src/app/external/moving:Z
|
||||||
|
Volume=/home/podman/immich/immich-config.json:/usr/src/app/config/immich-config.json:ro
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=no
|
Restart=no
|
||||||
|
26
home/podman/.config/containers/systemd/ncdu-server.container
Normal file
26
home/podman/.config/containers/systemd/ncdu-server.container
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
[Container]
|
||||||
|
ContainerName=ncdu-server
|
||||||
|
Environment="NCDU_WEB_VIEWER_SCAN_FROM=dump"
|
||||||
|
Environment="NCDU_WEB_VIEWER_READONLY=yes"
|
||||||
|
Image=docker.io/abesesr/ncdu-web-viewer:latest
|
||||||
|
PublishPort=5033:3000
|
||||||
|
Volume=/etc/localtime:/etc/localtime:ro
|
||||||
|
Volume=/etc/timezone:/etc/timezone:ro
|
||||||
|
Volume=/home/podman/ncdu.json:/ncdu-dump.json:ro
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Restart=no
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target default.target
|
||||||
|
|
||||||
|
# podman pull docker.io/abesesr/ncdu-web-viewer:latest
|
||||||
|
# systemctl --user daemon-reload
|
||||||
|
# systemctl --user start ncdu-server
|
||||||
|
# systemctl --user status ncdu-server --lines=999
|
||||||
|
# journalctl -fu ncdu-server.service
|
||||||
|
# podman logs ncdu-server
|
||||||
|
# systemctl --user stop ncdu-server
|
||||||
|
# systemctl --user disable ncdu-server
|
||||||
|
# podman exec -ti ncdu-server /bin/sh
|
||||||
|
# podman exec -ti ncdu-server /bin/bash
|
@ -7,12 +7,13 @@ Environment="UPTIME_KUMA_SSL_KEY=/certs/server.key"
|
|||||||
Image=docker.io/louislam/uptime-kuma:1
|
Image=docker.io/louislam/uptime-kuma:1
|
||||||
# Network=uptime-kuma.network
|
# Network=uptime-kuma.network
|
||||||
# Pod=uptime-kuma.pod
|
# Pod=uptime-kuma.pod
|
||||||
|
PodmanArgs=--add-host=adguard.bchs.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=cockpit.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=cockpit.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=gotify.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=gotify.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=immich-to-slideshow.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=immich-to-slideshow.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=kanbn-to-quartz.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=kanbn-to-quartz.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=kuma.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=kuma.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=mattermost.phares.duckdns.org:192.168.11.2
|
# PodmanArgs=--add-host=mattermost.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=pgadmin.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=pgadmin.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=vaultwarden.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=vaultwarden.phares.duckdns.org:192.168.11.2
|
||||||
PodmanArgs=--add-host=warden.phares.duckdns.org:192.168.11.2
|
PodmanArgs=--add-host=warden.phares.duckdns.org:192.168.11.2
|
||||||
|
@ -1,40 +1,44 @@
|
|||||||
# DO NOT EDIT THIS FILE - edit the master and reinstall.
|
# DO NOT EDIT THIS FILE - edit the master and reinstall.
|
||||||
# (/tmp/crontab.Ozl2NI/crontab installed on Fri Jan 3 22:08:52 2025)
|
# (/tmp/crontab.0LhYAc/crontab installed on Sat Mar 1 21:49:18 2025)
|
||||||
# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
|
# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
|
||||||
# DO NOT EDIT THIS FILE - edit the master and reinstall.
|
# DO NOT EDIT THIS FILE - edit the master and reinstall.
|
||||||
# (/tmp/crontab.35buNM/crontab installed on Tue Dec 3 13:24:22 2024)
|
# (/tmp/crontab.35buNM/crontab installed on Tue Dec 3 13:24:22 2024)
|
||||||
# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
|
# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
|
||||||
# Edit this file to introduce tasks to be run by cron.
|
# Edit this file to introduce tasks to be run by cron.
|
||||||
#
|
#
|
||||||
14 11 * * * podman volume export systemd-baikal-server-data --output /home/podman/cron-backup/baikal-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
14 11 * * * podman volume export systemd-baikal-server-data --output /home/podman/cron-backup/phares-baikal-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
15 11 * * * podman volume export systemd-blinko-server-data --output /home/podman/cron-backup/blinko-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
15 11 * * * podman volume export systemd-blinko-server-data --output /home/podman/cron-backup/phares-blinko-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
16 11 * * * podman volume export systemd-gitea-server-data --output /home/podman/cron-backup/gitea-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
16 11 * * * podman volume export systemd-gitea-server-data --output /home/podman/cron-backup/phares-gitea-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
17 11 * * * podman volume export systemd-linkwarden-server-data --output /home/podman/cron-backup/linkwarden-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 17 11 * * * podman volume export systemd-linkwarden-server-data --output /home/podman/cron-backup/phares-linkwarden-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
18 11 * * * podman volume export systemd-mattermost-server-data --output /home/podman/cron-backup/mattermost-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 18 11 * * * podman volume export systemd-mattermost-server-data --output /home/podman/cron-backup/phares-mattermost-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
19 11 * * * podman volume export systemd-odoo-server-data --output /home/podman/cron-backup/odoo-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 19 11 * * * podman volume export systemd-odoo-server-data --output /home/podman/cron-backup/phares-odoo-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
20 11 * * * podman volume export systemd-uptime-kuma-server-data --output /home/podman/cron-backup/uptime-kuma-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
20 11 * * * podman volume export systemd-uptime-kuma-server-data --output /home/podman/cron-backup/phares-uptime-kuma-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
21 11 * * * podman volume export systemd-xandikos-server-data --output /home/podman/cron-backup/xandikos-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
21 11 * * * podman volume export systemd-xandikos-server-data --output /home/podman/cron-backup/phares-xandikos-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
#
|
#
|
||||||
22 11 * * * podman volume export systemd-baikal-server-config --output /home/podman/cron-backup/baikal-server-config-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
22 11 * * * podman volume export systemd-baikal-server-config --output /home/podman/cron-backup/phares-baikal-server-config-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
23 11 * * * podman volume export systemd-gitea-server-config --output /home/podman/cron-backup/gitea-server-config-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
23 11 * * * podman volume export systemd-gitea-server-config --output /home/podman/cron-backup/phares-gitea-server-config-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
24 11 23 * * podman volume export systemd-immich-server-upload --output /home/podman/cron-backup/immich-server-upload-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
## 24 11 23 * * podman volume export systemd-immich-server-upload --output /home/podman/cron-backup/phares-immich-server-upload-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
25 11 * * * podman volume export systemd-mattermost-server-bleve --output /home/podman/cron-backup/mattermost-server-bleve-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 25 11 * * * podman volume export systemd-mattermost-server-bleve --output /home/podman/cron-backup/phares-mattermost-server-bleve-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
26 11 * * * podman volume export systemd-mattermost-server-client-plugins --output /home/podman/cron-backup/mattermost-server-client-plugins-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 26 11 * * * podman volume export systemd-mattermost-server-client-plugins --output /home/podman/cron-backup/phares-mattermost-server-client-plugins-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
27 11 * * * podman volume export systemd-mattermost-server-config --output /home/podman/cron-backup/mattermost-server-config-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 27 11 * * * podman volume export systemd-mattermost-server-config --output /home/podman/cron-backup/phares-mattermost-server-config-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
28 11 * * * podman volume export systemd-mattermost-server-logs --output /home/podman/cron-backup/mattermost-server-logs-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 28 11 * * * podman volume export systemd-mattermost-server-logs --output /home/podman/cron-backup/phares-mattermost-server-logs-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
29 11 * * * podman volume export systemd-mattermost-server-plugins --output /home/podman/cron-backup/mattermost-server-plugins-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 29 11 * * * podman volume export systemd-mattermost-server-plugins --output /home/podman/cron-backup/phares-mattermost-server-plugins-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
#
|
#
|
||||||
30 11 * * * podman volume export systemd-pgadmin-data --output /home/podman/cron-backup/pgadmin-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
30 11 * * * podman volume export systemd-pgadmin-data --output /home/podman/cron-backup/phares-pgadmin-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
31 11 * * * podman volume export systemd-firefox-data --output /home/podman/cron-backup/firefox-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
31 11 * * * podman volume export systemd-firefox-data --output /home/podman/cron-backup/phares-firefox-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
32 11 * * * podman volume export systemd-immich-learning-cache --output /home/podman/cron-backup/immich-learning-cache-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
## 32 11 * * * podman volume export systemd-immich-learning-cache --output /home/podman/cron-backup/phares-immich-learning-cache-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
#
|
#
|
||||||
13 12 * * * podman volume export systemd-blinko-db-data --output /home/podman/cron-backup/blinko-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
13 12 * * * podman volume export systemd-blinko-db-data --output /home/podman/cron-backup/phares-blinko-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
14 12 * * * podman volume export systemd-gitea-db-data --output /home/podman/cron-backup/gitea-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
14 12 * * * podman volume export systemd-gitea-db-data --output /home/podman/cron-backup/phares-gitea-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
15 12 * * * podman volume export systemd-immich-db-data --output /home/podman/cron-backup/immich-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
## 15 12 * * * podman volume export systemd-immich-db-data --output /home/podman/cron-backup/phares-immich-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
16 12 * * * podman volume export systemd-linkwarden-db-data --output /home/podman/cron-backup/linkwarden-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 16 12 * * * podman volume export systemd-linkwarden-db-data --output /home/podman/cron-backup/phares-linkwarden-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
17 12 * * * podman volume export systemd-mattermost-db-data --output /home/podman/cron-backup/mattermost-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 17 12 * * * podman volume export systemd-mattermost-db-data --output /home/podman/cron-backup/phares-mattermost-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
18 12 * * * podman volume export systemd-odoo-db-data --output /home/podman/cron-backup/odoo-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 18 12 * * * podman volume export systemd-odoo-db-data --output /home/podman/cron-backup/phares-odoo-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
19 12 * * * podman volume export systemd-vaultwarden-db-data --output /home/podman/cron-backup/vaultwarden-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
19 12 * * * podman volume export systemd-vaultwarden-db-data --output /home/podman/cron-backup/phares-vaultwarden-db-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
#
|
#
|
||||||
20 12 * * * podman volume export systemd-gotify-server-data --output /home/podman/cron-backup/gotify-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
20 12 * * * podman volume export systemd-gotify-server-data --output /home/podman/cron-backup/phares-gotify-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
21 12 * * * podman volume export systemd-2fauth-server-data --output /home/podman/cron-backup/2fauth-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
# 21 12 * * * podman volume export systemd-2fauth-server-data --output /home/podman/cron-backup/phares-2fauth-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
|
#
|
||||||
|
22 12 * * * podman volume export systemd-beszel-server-data --output /home/podman/cron-backup/phares-systemd-beszel-server-data-$(date +"\%Y-\%m-\%d--\%H-\%M-\%S").tar
|
||||||
|
#
|
||||||
|
*/30 * * * * podman pause firefox
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
# DO NOT EDIT THIS FILE - edit the master and reinstall.
|
# DO NOT EDIT THIS FILE - edit the master and reinstall.
|
||||||
# (/tmp/crontab.S7Dhlv/crontab installed on Fri Jan 31 19:34:43 2025)
|
# (/tmp/crontab.oGGBpo/crontab installed on Sun Mar 2 22:04:25 2025)
|
||||||
# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
|
# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $)
|
||||||
# Edit this file to introduce tasks to be run by cron.
|
# Edit this file to introduce tasks to be run by cron.
|
||||||
#
|
#
|
||||||
@ -9,3 +9,5 @@
|
|||||||
# 25 13 * * * cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
# 25 13 * * * cd /root/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
||||||
25 13 * * * cd /home/www-data/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
25 13 * * * cd /home/www-data/jackyzha0-quartz-phares && /snap/bin/npx quartz build
|
||||||
01 14 * * * rsync --remove-source-files -av -e ssh /home/podman/cron-backup/ root@192.168.0.31:/home/podman/cron-backup-delete/
|
01 14 * * * rsync --remove-source-files -av -e ssh /home/podman/cron-backup/ root@192.168.0.31:/home/podman/cron-backup-delete/
|
||||||
|
05 22 * * * cd / && ncdu -o /home/podman/ncdu.json && chown podman:podman /home/podman/ncdu.json
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user