Refac
This commit is contained in:
1
services/gitea/BACKUP.adoc
Normal file
1
services/gitea/BACKUP.adoc
Normal file
@@ -0,0 +1 @@
|
||||
/mnt/Teka2/gitea-data
|
||||
27
services/gitea/docker-compose.yml
Normal file
27
services/gitea/docker-compose.yml
Normal file
@@ -0,0 +1,27 @@
|
||||
version: "3"
|
||||
|
||||
networks:
|
||||
gitea:
|
||||
external: false
|
||||
|
||||
services:
|
||||
server:
|
||||
image: gitea/gitea
|
||||
container_name: gitea
|
||||
environment:
|
||||
- USER_UID=1000
|
||||
- USER_GID=1000
|
||||
- GITEA__database__DB_TYPE=postgres
|
||||
- GITEA__database__HOST=192.168.0.101:5432
|
||||
- GITEA__database__NAME=gitea
|
||||
- GITEA__database__USER=gitea
|
||||
- GITEA__database__PASSWD=mhIjXjG238w8TtpuB9ny
|
||||
restart: always
|
||||
networks:
|
||||
- gitea
|
||||
volumes:
|
||||
- /mnt/Teka2/gitea-data:/data
|
||||
- /etc/timezone:/etc/timezone:ro
|
||||
- /etc/localtime:/etc/localtime:ro
|
||||
ports:
|
||||
- "3005:3005"
|
||||
27
services/gitea/gitea.nginx.conf
Normal file
27
services/gitea/gitea.nginx.conf
Normal file
@@ -0,0 +1,27 @@
|
||||
server {
|
||||
server_name gitea.skazochnik.spb.ru;
|
||||
location / {
|
||||
proxy_pass http://localhost:3005/;
|
||||
client_max_body_size 0;
|
||||
}
|
||||
|
||||
|
||||
listen 443 ssl; # managed by Certbot
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.skazochnik.spb.ru/fullchain.pem; # managed by Certbot
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.skazochnik.spb.ru/privkey.pem; # managed by Certbot
|
||||
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
|
||||
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
|
||||
|
||||
}
|
||||
|
||||
server {
|
||||
if ($host = gitea.skazochnik.spb.ru) {
|
||||
return 301 https://$host$request_uri;
|
||||
} # managed by Certbot
|
||||
|
||||
|
||||
server_name gitea.skazochnik.spb.ru;
|
||||
listen 80;
|
||||
return 404; # managed by Certbot
|
||||
}
|
||||
|
||||
3
services/nextcloud/.gitignore
vendored
Normal file
3
services/nextcloud/.gitignore
vendored
Normal file
@@ -0,0 +1,3 @@
|
||||
data/**/*
|
||||
!data/config/
|
||||
!data/config/config.php
|
||||
5
services/nextcloud/BACKUP.adoc
Normal file
5
services/nextcloud/BACKUP.adoc
Normal file
@@ -0,0 +1,5 @@
|
||||
/mnt/Teka1/nextcloud:/var/www/html
|
||||
|
||||
/mnt/Teka1/:/mnt/Teka1/
|
||||
/mnt/Teka2/:/mnt/Teka2/
|
||||
/mnt/Teka3/:/mnt/Teka3/
|
||||
46
services/nextcloud/data/config/config.php
Normal file
46
services/nextcloud/data/config/config.php
Normal file
@@ -0,0 +1,46 @@
|
||||
<?php
|
||||
$CONFIG = array (
|
||||
'htaccess.RewriteBase' => '/',
|
||||
'memcache.local' => '\\OC\\Memcache\\APCu',
|
||||
'apps_paths' =>
|
||||
array (
|
||||
0 =>
|
||||
array (
|
||||
'path' => '/var/www/html/apps',
|
||||
'url' => '/apps',
|
||||
'writable' => false,
|
||||
),
|
||||
1 =>
|
||||
array (
|
||||
'path' => '/var/www/html/custom_apps',
|
||||
'url' => '/custom_apps',
|
||||
'writable' => true,
|
||||
),
|
||||
),
|
||||
'instanceid' => 'oce5hodvslda',
|
||||
'passwordsalt' => 'dnBVV3YX6NdS8Ai7KdsCkV/ZOo1fI5',
|
||||
'secret' => 'CXei8PSbNu0OMbUfN9Kgm6eWkeFbmbnb4TXf6q5gjWFw+49Y',
|
||||
'trusted_domains' =>
|
||||
array (
|
||||
0 => 'gipat:5002',
|
||||
),
|
||||
'datadirectory' => '/var/www/html/data',
|
||||
'dbtype' => 'pgsql',
|
||||
'version' => '25.0.4.1',
|
||||
'overwritehost' => 'skazochnik.spb.ru',
|
||||
'overwriteprotocol' => 'https',
|
||||
'dbname' => 'nextcloud',
|
||||
'dbhost' => '192.168.0.101',
|
||||
'dbport' => '',
|
||||
'dbtableprefix' => 'oc_',
|
||||
'dbuser' => 'nextcloud',
|
||||
'dbpassword' => 'qw6MGQcaMkvG8sR9yVsU',
|
||||
'installed' => true,
|
||||
'app_install_overwrite' =>
|
||||
array (
|
||||
0 => 'gpxmotion',
|
||||
),
|
||||
'maintenance' => false,
|
||||
'overwrite.cli.url' => 'https://gipat:5002',
|
||||
'loglevel' => 2,
|
||||
);
|
||||
32
services/nextcloud/docker-compose.yml
Normal file
32
services/nextcloud/docker-compose.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
version: "3.9"
|
||||
services:
|
||||
app:
|
||||
image: "nextcloud"
|
||||
restart: always
|
||||
volumes:
|
||||
- /mnt/Teka1/nextcloud:/var/www/html
|
||||
- /mnt/Teka1/:/mnt/Teka1/
|
||||
- /mnt/Teka2/:/mnt/Teka2/
|
||||
- /mnt/Teka3/:/mnt/Teka3/
|
||||
ports:
|
||||
- 5002:80
|
||||
environment:
|
||||
- POSTGRES_HOST=192.168.0.101
|
||||
- POSTGRES_DB=nextcloud
|
||||
- POSTGRES_USER=nextcloud
|
||||
- POSTGRES_PASSWORD=qw6MGQcaMkvG8sR9yVsU
|
||||
|
||||
cron:
|
||||
image: "nextcloud"
|
||||
entrypoint: /cron.sh
|
||||
restart: always
|
||||
volumes:
|
||||
- /mnt/Teka1/nextcloud:/var/www/html
|
||||
- /mnt/Teka1/Videos:/mnt/Teka1/Videos
|
||||
- /mnt/Teka2/Videos:/mnt/Teka2/Videos
|
||||
- /mnt/Teka3/Videos:/mnt/Teka3/Videos
|
||||
environment:
|
||||
- POSTGRES_HOST=192.168.0.101
|
||||
- POSTGRES_DB=nextcloud
|
||||
- POSTGRES_USER=nextcloud
|
||||
- POSTGRES_PASSWORD=qw6MGQcaMkvG8sR9yVsU
|
||||
14
services/nextcloud/nextcloud.nginx.conf
Normal file
14
services/nextcloud/nextcloud.nginx.conf
Normal file
@@ -0,0 +1,14 @@
|
||||
server {
|
||||
server_name skazochnik.spb.ru;
|
||||
location / {
|
||||
proxy_pass http://gipat:5002/;
|
||||
sub_filter "http://gipat:5002/" "https://skazochnik.spb.ru/";
|
||||
client_max_body_size 0;
|
||||
}
|
||||
|
||||
listen 443 ssl default_server; # managed by Certbot
|
||||
ssl_certificate /etc/letsencrypt/live/skazochnik.spb.ru/fullchain.pem; # managed by Certbot
|
||||
ssl_certificate_key /etc/letsencrypt/live/skazochnik.spb.ru/privkey.pem; # managed by Certbot
|
||||
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
|
||||
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
|
||||
}
|
||||
2
services/pigallery/BACKUP.adoc
Normal file
2
services/pigallery/BACKUP.adoc
Normal file
@@ -0,0 +1,2 @@
|
||||
/mnt/Teka2/photos
|
||||
./db-data
|
||||
0
services/pigallery/config/config.json
Normal file
0
services/pigallery/config/config.json
Normal file
0
services/pigallery/db-data/.gitstub
Normal file
0
services/pigallery/db-data/.gitstub
Normal file
15
services/pigallery/docker-compose.yml
Normal file
15
services/pigallery/docker-compose.yml
Normal file
@@ -0,0 +1,15 @@
|
||||
version: '3'
|
||||
services:
|
||||
pigallery2:
|
||||
image: bpatrik/pigallery2:1.8.5
|
||||
container_name: pigallery2
|
||||
environment:
|
||||
- NODE_ENV=debug #production # set to 'debug' for full debug logging
|
||||
volumes:
|
||||
- "./config:/app/data/config"
|
||||
- "./db-data:/app/data/db"
|
||||
- "/mnt/Teka2/photos:/app/data/images:ro"
|
||||
- "./tmp:/app/data/tmp"
|
||||
ports:
|
||||
- 7780:80
|
||||
restart: always
|
||||
10
services/pigallery/pigallery.nginx.conf
Normal file
10
services/pigallery/pigallery.nginx.conf
Normal file
@@ -0,0 +1,10 @@
|
||||
server {
|
||||
server_name photos.skazochnik.spb.ru;
|
||||
listen 443 ssl;
|
||||
location / {
|
||||
proxy_pass http://localhost:7780/;
|
||||
}
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/photos.skazochnik.spb.ru/fullchain.pem; # managed by Certbot
|
||||
ssl_certificate_key /etc/letsencrypt/live/photos.skazochnik.spb.ru/privkey.pem; # managed by Certbot
|
||||
}
|
||||
0
services/pigallery/tmp/.gitstub
Normal file
0
services/pigallery/tmp/.gitstub
Normal file
11
services/podcast/podcast.nginx.conf
Normal file
11
services/podcast/podcast.nginx.conf
Normal file
@@ -0,0 +1,11 @@
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name podcast.skazochnik.spb.ru;
|
||||
location / {
|
||||
root /var/www/podcast;
|
||||
index index.html index.htm;
|
||||
}
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/podcast.skazochnik.spb.ru/fullchain.pem; # managed by Certbot
|
||||
ssl_certificate_key /etc/letsencrypt/live/podcast.skazochnik.spb.ru/privkey.pem; # managed by Certbot
|
||||
}
|
||||
14
services/portainer/docker-compose.yml
Normal file
14
services/portainer/docker-compose.yml
Normal file
@@ -0,0 +1,14 @@
|
||||
version: '3'
|
||||
|
||||
services:
|
||||
portainer:
|
||||
image: portainer/portainer-ce
|
||||
ports:
|
||||
- 8077:9000
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock
|
||||
- portainer_data:/data
|
||||
restart: always
|
||||
|
||||
volumes:
|
||||
portainer_data:
|
||||
10
services/portainer/portainer.nginx.conf
Normal file
10
services/portainer/portainer.nginx.conf
Normal file
@@ -0,0 +1,10 @@
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name portainer.skazochnik.spb.ru;
|
||||
location / {
|
||||
proxy_pass http://localhost:8077
|
||||
}
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/portainer.skazochnik.spb.ru/fullchain.pem; # managed by Certbot
|
||||
ssl_certificate_key /etc/letsencrypt/live/portainer.skazochnik.spb.ru/privkey.pem; # managed by Certbot
|
||||
}
|
||||
294
services/samba/smb.conf
Normal file
294
services/samba/smb.conf
Normal file
@@ -0,0 +1,294 @@
|
||||
#
|
||||
# Sample configuration file for the Samba suite for Debian GNU/Linux.
|
||||
#
|
||||
#
|
||||
# This is the main Samba configuration file. You should read the
|
||||
# smb.conf(5) manual page in order to understand the options listed
|
||||
# here. Samba has a huge number of configurable options most of which
|
||||
# are not shown in this example
|
||||
#
|
||||
# Some options that are often worth tuning have been included as
|
||||
# commented-out examples in this file.
|
||||
# - When such options are commented with ";", the proposed setting
|
||||
# differs from the default Samba behaviour
|
||||
# - When commented with "#", the proposed setting is the default
|
||||
# behaviour of Samba but the option is considered important
|
||||
# enough to be mentioned here
|
||||
#
|
||||
# NOTE: Whenever you modify this file you should run the command
|
||||
# "testparm" to check that you have not made any basic syntactic
|
||||
# errors.
|
||||
|
||||
#======================= Global Settings =======================
|
||||
|
||||
[global]
|
||||
|
||||
## Browsing/Identification ###
|
||||
|
||||
# Change this to the workgroup/NT-domain name your Samba server will part of
|
||||
workgroup = WORKGROUP
|
||||
|
||||
# server string is the equivalent of the NT Description field
|
||||
server string = %h server (Samba, Ubuntu)
|
||||
|
||||
# Windows Internet Name Serving Support Section:
|
||||
# WINS Support - Tells the NMBD component of Samba to enable its WINS Server
|
||||
# wins support = no
|
||||
|
||||
# WINS Server - Tells the NMBD components of Samba to be a WINS Client
|
||||
# Note: Samba can be either a WINS Server, or a WINS Client, but NOT both
|
||||
; wins server = w.x.y.z
|
||||
|
||||
# This will prevent nmbd to search for NetBIOS names through DNS.
|
||||
dns proxy = no
|
||||
|
||||
#### Networking ####
|
||||
|
||||
# The specific set of interfaces / networks to bind to
|
||||
# This can be either the interface name or an IP address/netmask;
|
||||
# interface names are normally preferred
|
||||
; interfaces = 127.0.0.0/8 eth0
|
||||
|
||||
# Only bind to the named interfaces and/or networks; you must use the
|
||||
# 'interfaces' option above to use this.
|
||||
# It is recommended that you enable this feature if your Samba machine is
|
||||
# not protected by a firewall or is a firewall itself. However, this
|
||||
# option cannot handle dynamic or non-broadcast interfaces correctly.
|
||||
; bind interfaces only = yes
|
||||
|
||||
|
||||
|
||||
#### Debugging/Accounting ####
|
||||
|
||||
# This tells Samba to use a separate log file for each machine
|
||||
# that connects
|
||||
log file = /var/log/samba/log.%m
|
||||
|
||||
# Cap the size of the individual log files (in KiB).
|
||||
max log size = 1000
|
||||
|
||||
# If you want Samba to only log through syslog then set the following
|
||||
# parameter to 'yes'.
|
||||
# syslog only = no
|
||||
|
||||
# We want Samba to log a minimum amount of information to syslog. Everything
|
||||
# should go to /var/log/samba/log.{smbd,nmbd} instead. If you want to log
|
||||
# through syslog you should set the following parameter to something higher.
|
||||
syslog = 0
|
||||
|
||||
# Do something sensible when Samba crashes: mail the admin a backtrace
|
||||
panic action = /usr/share/samba/panic-action %d
|
||||
|
||||
|
||||
####### Authentication #######
|
||||
|
||||
# Server role. Defines in which mode Samba will operate. Possible
|
||||
# values are "standalone server", "member server", "classic primary
|
||||
# domain controller", "classic backup domain controller", "active
|
||||
# directory domain controller".
|
||||
#
|
||||
# Most people will want "standalone sever" or "member server".
|
||||
# Running as "active directory domain controller" will require first
|
||||
# running "samba-tool domain provision" to wipe databases and create a
|
||||
# new domain.
|
||||
server role = standalone server
|
||||
|
||||
# If you are using encrypted passwords, Samba will need to know what
|
||||
# password database type you are using.
|
||||
passdb backend = tdbsam
|
||||
|
||||
obey pam restrictions = yes
|
||||
|
||||
# This boolean parameter controls whether Samba attempts to sync the Unix
|
||||
# password with the SMB password when the encrypted SMB password in the
|
||||
# passdb is changed.
|
||||
unix password sync = yes
|
||||
|
||||
# For Unix password sync to work on a Debian GNU/Linux system, the following
|
||||
# parameters must be set (thanks to Ian Kahan <<kahan@informatik.tu-muenchen.de> for
|
||||
# sending the correct chat script for the passwd program in Debian Sarge).
|
||||
passwd program = /usr/bin/passwd %u
|
||||
passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
|
||||
|
||||
# This boolean controls whether PAM will be used for password changes
|
||||
# when requested by an SMB client instead of the program listed in
|
||||
# 'passwd program'. The default is 'no'.
|
||||
pam password change = yes
|
||||
|
||||
# This option controls how unsuccessful authentication attempts are mapped
|
||||
# to anonymous connections
|
||||
map to guest = bad user
|
||||
security = user
|
||||
########## Domains ###########
|
||||
|
||||
#
|
||||
# The following settings only takes effect if 'server role = primary
|
||||
# classic domain controller', 'server role = backup domain controller'
|
||||
# or 'domain logons' is set
|
||||
#
|
||||
|
||||
# It specifies the location of the user's
|
||||
# profile directory from the client point of view) The following
|
||||
# required a [profiles] share to be setup on the samba server (see
|
||||
# below)
|
||||
; logon path = \\%N\profiles\%U
|
||||
# Another common choice is storing the profile in the user's home directory
|
||||
# (this is Samba's default)
|
||||
# logon path = \\%N\%U\profile
|
||||
|
||||
# The following setting only takes effect if 'domain logons' is set
|
||||
# It specifies the location of a user's home directory (from the client
|
||||
# point of view)
|
||||
; logon drive = H:
|
||||
# logon home = \\%N\%U
|
||||
|
||||
# The following setting only takes effect if 'domain logons' is set
|
||||
# It specifies the script to run during logon. The script must be stored
|
||||
# in the [netlogon] share
|
||||
# NOTE: Must be store in 'DOS' file format convention
|
||||
; logon script = logon.cmd
|
||||
|
||||
# This allows Unix users to be created on the domain controller via the SAMR
|
||||
# RPC pipe. The example command creates a user account with a disabled Unix
|
||||
# password; please adapt to your needs
|
||||
; add user script = /usr/sbin/adduser --quiet --disabled-password --gecos "" %u
|
||||
|
||||
# This allows machine accounts to be created on the domain controller via the
|
||||
# SAMR RPC pipe.
|
||||
# The following assumes a "machines" group exists on the system
|
||||
; add machine script = /usr/sbin/useradd -g machines -c "%u machine account" -d /var/lib/samba -s /bin/false %u
|
||||
|
||||
# This allows Unix groups to be created on the domain controller via the SAMR
|
||||
# RPC pipe.
|
||||
; add group script = /usr/sbin/addgroup --force-badname %g
|
||||
|
||||
############ Misc ############
|
||||
|
||||
# Using the following line enables you to customise your configuration
|
||||
# on a per machine basis. The %m gets replaced with the netbios name
|
||||
# of the machine that is connecting
|
||||
; include = /home/samba/etc/smb.conf.%m
|
||||
|
||||
# Some defaults for winbind (make sure you're not using the ranges
|
||||
# for something else.)
|
||||
; idmap uid = 10000-20000
|
||||
; idmap gid = 10000-20000
|
||||
; template shell = /bin/bash
|
||||
|
||||
# Setup usershare options to enable non-root users to share folders
|
||||
# with the net usershare command.
|
||||
|
||||
# Maximum number of usershare. 0 (default) means that usershare is disabled.
|
||||
; usershare max shares = 100
|
||||
|
||||
# Allow users who've been granted usershare privileges to create
|
||||
# public shares, not just authenticated ones
|
||||
usershare allow guests = yes
|
||||
|
||||
#======================= Share Definitions =======================
|
||||
|
||||
# Un-comment the following (and tweak the other settings below to suit)
|
||||
# to enable the default home directory shares. This will share each
|
||||
# user's home directory as \\server\username
|
||||
;[homes]
|
||||
; comment = Home Directories
|
||||
; browseable = no
|
||||
|
||||
# By default, the home directories are exported read-only. Change the
|
||||
# next parameter to 'no' if you want to be able to write to them.
|
||||
; read only = yes
|
||||
|
||||
# File creation mask is set to 0700 for security reasons. If you want to
|
||||
# create files with group=rw permissions, set next parameter to 0775.
|
||||
; create mask = 0700
|
||||
|
||||
# Directory creation mask is set to 0700 for security reasons. If you want to
|
||||
# create dirs. with group=rw permissions, set next parameter to 0775.
|
||||
; directory mask = 0700
|
||||
|
||||
# By default, \\server\username shares can be connected to by anyone
|
||||
# with access to the samba server.
|
||||
# Un-comment the following parameter to make sure that only "username"
|
||||
# can connect to \\server\username
|
||||
# This might need tweaking when using external authentication schemes
|
||||
; valid users = %S
|
||||
|
||||
# Un-comment the following and create the netlogon directory for Domain Logons
|
||||
# (you need to configure Samba to act as a domain controller too.)
|
||||
;[netlogon]
|
||||
; comment = Network Logon Service
|
||||
; path = /home/samba/netlogon
|
||||
; guest ok = yes
|
||||
; read only = yes
|
||||
|
||||
# Un-comment the following and create the profiles directory to store
|
||||
# users profiles (see the "logon path" option above)
|
||||
# (you need to configure Samba to act as a domain controller too.)
|
||||
# The path below should be writable by all users so that their
|
||||
# profile directory may be created the first time they log on
|
||||
;[profiles]
|
||||
; comment = Users profiles
|
||||
; path = /home/samba/profiles
|
||||
; guest ok = no
|
||||
; browseable = no
|
||||
; create mask = 0600
|
||||
; directory mask = 0700
|
||||
|
||||
[printers]
|
||||
comment = All Printers
|
||||
browseable = no
|
||||
path = /var/spool/samba
|
||||
printable = yes
|
||||
guest ok = no
|
||||
read only = yes
|
||||
create mask = 0700
|
||||
|
||||
# Windows clients look for this share name as a source of downloadable
|
||||
# printer drivers
|
||||
[print$]
|
||||
comment = Printer Drivers
|
||||
path = /var/lib/samba/printers
|
||||
browseable = yes
|
||||
read only = yes
|
||||
guest ok = no
|
||||
# Uncomment to allow remote administration of Windows print drivers.
|
||||
# You may need to replace 'lpadmin' with the name of the group your
|
||||
# admin users are members of.
|
||||
# Please note that you also need to set appropriate Unix permissions
|
||||
# to the drivers directory for these users to have write rights in it
|
||||
; write list = root, @lpadmin
|
||||
|
||||
[Teka1]
|
||||
guest ok = yes
|
||||
path = /mnt/Teka1/
|
||||
brosable = yes
|
||||
read only = no
|
||||
writable = yes
|
||||
public = yes
|
||||
inherit permissions = yes
|
||||
|
||||
[Teka2]
|
||||
guest ok = yes
|
||||
path = /mnt/Teka2/
|
||||
brosable = yes
|
||||
read only = no
|
||||
writable = yes
|
||||
public = yes
|
||||
inherit permissions = yes
|
||||
|
||||
[Teka3]
|
||||
guest ok = yes
|
||||
path = /mnt/Teka3/
|
||||
brosable = yes
|
||||
read only = no
|
||||
writable = yes
|
||||
public = yes
|
||||
inherit permissions = yes
|
||||
|
||||
[Home]
|
||||
guest ok = yes
|
||||
path = /home/maksim/
|
||||
brosable = yes
|
||||
read only = no
|
||||
writable = yes
|
||||
public = yes
|
||||
1
services/transmission/BACKUP.adoc
Normal file
1
services/transmission/BACKUP.adoc
Normal file
@@ -0,0 +1 @@
|
||||
info/torrents/**
|
||||
Reference in New Issue
Block a user