csv convertion applied (todo detalize installation of sofficehelpers), updates to Glossary, minor fixes, removed cached gitignored newly added files

master
Linreigns 6 years ago
parent ce845ec1a7
commit c168acebb7

@ -30,7 +30,7 @@ From their About Us:
We encourage you to do so! We are able to supply secure and stable environments needed to build submission - and communication platforms.''
FlokiNET runs Tor exit and relay nodes.
FlokiNET runs \gls{tor} exit and relay nodes.
\begin{figure}[!htb]
\includegraphics[keepaspectratio=true,height=1.10\textheight,width=1.00\textwidth,angle=0]{www-flokinet.png}
@ -124,10 +124,10 @@ This is restricted:
\item Anything than can result in Spamhaus listing.
\item Phishing Sites / Scam Sites (ex: Ebay/Paypal,CC/Password Scam sites).
\item Mailbombers or any sort of spam sites.
\item DDoS originations.
\item \Gls{ddos} originations.
\item Spam email.
\item Netscan / Hack programs and archives.
\item Malicious Scripts (ex: originate DDoS attacks or hack attempts).
\item Malicious Scripts (ex: originate \gls{ddos} attacks or hack attempts).
\item Botnet/Doorway/Carding.
\item Childporn.
\item Fraud Websites/Forums.
@ -142,20 +142,20 @@ FlokiNET Pros:
\item Strong dedication to privacy.
\item Based in Iceland.
\item \Glspl{dedicatedserver} aren't too expensive.
\item Romanian VPS is OpenVZ and KVM.
\item Finnish VPS is KVM.
\item Romanian VPS is OpenVZ and \gls{kvm}.
\item Finnish VPS is \gls{kvm}.
\item Has private domain registration services.
\item \Gls{colocation} available.
\item ``FlokiNET is proud to be completly Tor Project logo-friendly. Feel free to host a TOR-node with us!''
\item ``DDoS mitigation cloud has 950 Gbps filtering capacity.''
\item ``FlokiNET is proud to be completly \gls{tor} Project logo-friendly. Feel free to host a \gls{tor}-node with us!''
\item ``\Gls{ddos} mitigation cloud has 950 Gbps filtering capacity.''
\item Finland and Iceland are free speech friendlier countries.
\item Has good, optional higher level SLAs that are inexpensive.
\item Has Debian 9 available for KVM.
\item Has Debian 9 available for \gls{kvm}.
\item Maximum balance is €15000.00EUR.
\item Strong dedication to Tor.
\item Strong dedication to \gls{tor}.
\item Creates apparently random username for login.
\item Debian 9 version installed was (nearly) up to date.
\item Uses KVM.
\item Uses \gls{kvm}.
\end{itemize}
\subsection{FlokiNET Cons}
@ -177,14 +177,14 @@ FlokiNET Cons:
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
is4423 tty1 - 02:24 2:16m 0.17s 0.08s -bash
\end{minted}
\item By default in the KVM, they set the nameservers to Google's
\item By default in the \gls{kvm}, they set the nameservers to Google's
\texttt{8.8.8.8} and \texttt{8.8.4.4}.
% \item In the KVM, you get a NAT'd IP address, not a real one.
% \item In the \gls{kvm}, you get a NAT'd IP address, not a real one.
\end{itemize}
\subsection{FlokiNET Unknown}
\begin{itemize}
\item IPMI on \glspl{dedicatedserver}?
\item \gls{ipmi} on \glspl{dedicatedserver}?
\item The IP in \texttt{/etc/hosts} for the hostname wasn't the same as used for SSH.
Either a mistake or \gls{firewall} forwarded for security (???). Appears to be mistake.
\end{itemize}

@ -10,7 +10,7 @@
% International Public License (CC BY-SA 4.0) by Fork Sand, Inc.
%
\section{Sharktech}
Sharktech is a provider that focuses on DDoS prevention, such
Sharktech is a provider that focuses on \gls{ddos} prevention, such
as for gaming servers. Has a data center in Denver.
Looks good. Manually provisions servers over a few days.
Good local speed and latency.
@ -29,12 +29,12 @@ Good local speed and latency.
\end{figure}
First login, kernel is:
\texttt{Linux debian 3.16.0-4-amd64 \#1 SMP Debian 3.16.36-1+deb8u1 (2016-09-03) x86\_64 GNU/Linux}
\texttt{Linux debian 3.16.0-4-amd64 \#1 SMP Debian 3.16.36-1+deb8u1 (2016-09-03) x86\_64 \gls{gnulinux}}
It isn't up-to-date. Running Debian 8.6. The \texttt{dmesg} showed the kernel had already
barfed a couple times (USB time outs and more).
IPMI http connection is in cleartext!!! Doesn't redirect to https. https has failed SSL
certificate (like every other Supermicro on the planet). IPMI requires Java junk.
\Gls{ipmi} http connection is in cleartext!!! Doesn't redirect to https. https has failed SSL
certificate (like every other Supermicro on the planet). \Gls{ipmi} requires Java junk.
Server was running for a few days before I could update it.
\begin{minted}{sh}
@ -71,17 +71,17 @@ Firmware Build Time : 2015-01-05
\end{figure}
\begin{itemize}
\item Default IPMI connection is in cleartext http.
\item SSL certificate for Supermicro IPMI is bad (like all of them).
\item Can't change password on IPMI.
\item Root password for server and IPMI is sent via email.
\item Default \gls{ipmi} connection is in cleartext http.
\item SSL certificate for Supermicro \gls{ipmi} is bad (like all of them).
\item Can't change password on \gls{ipmi}.
\item Root password for server and \gls{ipmi} is sent via email.
\item There is an attack window between their machine imaging and first login.
\item Customer should control timing of first power on.
\item System is also possibly vuln during the ISP's initial power up and commissioning period.
\item First reboot, the system hung (.png XXX).
\item Hard reset, lots of DHCP queries at boot.
\item A \texttt{debian} user was on the system, password unknown. Check \texttt{/home}!
\item They block NTP to prevent DDoS, so you have to use their time server
\item They block NTP to prevent \gls{ddos}, so you have to use their time server
\texttt{time.sharktech.net}
\end{itemize}
@ -103,6 +103,6 @@ ns36 server info
\begin{itemize}
\item Shipped with default kernel:
\texttt{Linux debian 3.16.0-4-amd64 \#1 SMP Debian 3.16.7-ckt20-1+deb8u2 (2016-01-02) x86\_64 GNU/Linux}
\texttt{Linux debian 3.16.0-4-amd64 \#1 SMP Debian 3.16.7-ckt20-1+deb8u2 (2016-01-02) x86\_64 \gls{gnulinux}}
\item Shipped with Debian 8.3 (an old version of \texttt{oldstable}).
\end{itemize}

@ -33,7 +33,7 @@
{\tiny Created with 100\% Free Software}
\end{minipage}}
\put(120,382){\begin{minipage}{357.50793pt}\centering
Debian GNU/Linux
Debian \gls{gnulinux}
\end{minipage}}
\put(120,370){\begin{minipage}{357.50793pt}\centering
{\LaTeX} Memoir

@ -77,7 +77,7 @@ of email, as an option.
though.
\item Fist login page at Njalla ask for a PGP key, if email is to be sent (!).
\item Support can be done via Jabber.
\item Tor onion (!) address: \url{http://njalladnspotetti.onion/}
\item \Gls{tor} onion (!) address: \url{http://njalladnspotetti.onion/}
\item Payment forms accepted: Bitcoin, PayPal, LiteCoin, Monero, Dash,
Bitcoin Cash.
\end{itemize}

@ -15,7 +15,7 @@
The following operating systems will be used:
\begin{itemize}
\item Debian \gls{gnulinux} --- For Utility, Ceph, and OpenNebula Servers.
\item Debian \gls{gnulinux} --- For Utility, \gls{ceph}, and Proxmox Servers.
\item OPNSense --- \Glspl{firewall}.
\end{itemize}

@ -11,7 +11,7 @@
% International Public License (CC BY-SA 4.0) by Fork Sand, Inc.
%
\section{Debian}
Debian is a free software GNU/Linux distribution.
Debian is a free software \gls{gnulinux} distribution.
\begin{figure}[!htb]
\includegraphics[keepaspectratio=true,height=1.10\textheight,width=1.00\textwidth,angle=0]{www-debian.png}
@ -22,7 +22,7 @@ Debian is a free software GNU/Linux distribution.
\subsection{Install Debian}
The Debian servers all get a Minimal + standard utilities + sshd install.
At present, it is being tested with virtual machines. When deployed, it will
be set up remotely using HTML5 IPMI.
be set up remotely using HTML5 \gls{ipmi}.
Install Debian 9 (Stretch).
@ -80,10 +80,10 @@ Debian's description:
\item Amazon Web Services (EBS-backed Amazon Machine Images for EC2, and other
types)
\item DigitalOcean (reuseable snapshots from available source images)
\item Docker
\item \Gls{docker}
\item Google Compute Engine (images based on existing images)
\item OpenStack (new reuseable images for servers in OpenStack clouds)
\item QEMU (KVM and Xen virtual machine images)
\item QEMU (\gls{kvm} and Xen virtual machine images)
\item Oracle VirtualBox (virtual machine images)
\end{itemize}

@ -42,8 +42,8 @@ of the rear is simply a bezel for fans.
\end{figure}
The onboard I/O is plentiful. There are two USB 3.0 ports along with
a VGA port for KVM carts. Above the USB ports there is a RJ-45
Ethernet port for out-0f-band management that can be directly
a VGA port for \gls{kvm} carts. Above the USB ports there is a RJ-45
Ethernet port for out-of-band management that can be directly
connected to a dedicated management network.
%-------------------
Furthermore there are
@ -74,7 +74,7 @@ the internals better.
\subsection{Remote Management}
Supermicros IPMI and KVM-over-IP enables deployment flexibility.
Supermicros \gls{ipmi} and \gls{kvm}-over-IP enables deployment flexibility.
One can do remote power up, power down, and reset of the server in
the event that it becomes unresponsive.
@ -94,23 +94,23 @@ the event that it becomes unresponsive.
Supermicro's BIOS has a feature: the BMC IP address shows
up on the post screen!
If you have a KVM cart hooked up to the system, it gives an
If you have a \gls{kvm} cart hooked up to the system, it gives an
indicator of which machine one is connected to during post.
Supermicro does include KVM-over-IP functionality with the motherboard.
Supermicro does include \gls{kvm}-over-IP functionality with the motherboard.
\begin{itemize}
\item Default IPMI connection is in cleartext http.
\item SSL certificate for Supermicro IPMI is bad (like all of them).
\item Can't change password on IPMI.
%\item Root password for server and IPMI is sent via email.
\item Default \gls{ipmi} connection is in cleartext http.
\item SSL certificate for Supermicro \gls{ipmi} is bad (like all of them).
\item Can't change password on \gls{ipmi}.
%\item Root password for server and \gls{ipmi} is sent via email.
%\item There is an attack window between their machine imaging and first login.
%\item Customer should control timing of first power on.
%\item System is also possibly vuln during the ISP's initial power up and commissioning period.
%\item First reboot, the system hung (.png XXX).
%\item Hard reset, lots of DHCP queries at boot.
%\item A \texttt{debian} user was on the system, password unknown. Check \texttt{/home}!
%\item They block NTP to prevent DDoS, so you have to use their time server
%\item They block NTP to prevent \gls{ddos}, so you have to use their time server
% \texttt{time.sharktech.net}
\end{itemize}
@ -142,7 +142,7 @@ Supermicro does include KVM-over-IP functionality with the motherboard.
\label{fig:supermicroSSCIpmiInit}
\end{figure}
Before IPMI Initialization, choose in Boot Agent GE an entry PXE
Before \gls{ipmi} Initialization, choose in Boot Agent GE an entry PXE
(Preboot eXecution Environment)
In Aptio Setup Utility set the following Boot Features:
@ -169,6 +169,9 @@ Set system Date/Time
\newpage
\subsection*{\textcolor{ao-white}{ Supermicro Setup over IPMI bios1}}
\begin{picture}(0,0)\put(-10000,0){
\gls{ipmi}
}\end{picture}
\begin{figure}[!htb]
\includegraphics[keepaspectratio=true,height=1.10\textheight,width=1.00\textwidth,angle=0]
{sf-fw/ssc-ipmi-boot1.png}

@ -25,8 +25,11 @@ What is the network doing?
Two-factor authentication using TOTP.
\section{IPtables-firewall}
\begin{picture}(0,0)\put(-10000,0){
\gls{firewall}
}\end{picture}
\subsection{Overview}
Most servers and workstations run GNU/Linux, which uses iptables.
Most servers and workstations run \gls{gnulinux}, which uses iptables.
\subsection{iptables}
iptables is part of the Netfilter project and has been included by default in

@ -25,11 +25,11 @@ Various projects replace some non-free binaries.
\section{Coreboot}
Coreboot is used on Viking.net servers.
\Gls{coreboot} is used on Viking.net servers.
\section{OpenBMC}
OpenBMC is used on Raptor Computing Systems OpenPOWER workstations.
\Gls{openbmc} is used on Raptor Computing Systems OpenPOWER workstations.
\begin{itemize}
\item Github:

@ -30,7 +30,7 @@ The \gls{cluster} will require rackmountable equipment.
\Large{\textbf{\Gls{sharkfork} 21U hardware instance}}
\begin{itemize}
\item GNU/Linux Servers
\item \gls{gnulinux} Servers
\item \Glspl{firewall}
\item Switches
\item File storages
@ -131,7 +131,7 @@ The \gls{cluster} will require rackmountable equipment.
% Unit configuration parameters
\nodeUnitParameter{ 2U Form Factor ~~- Dual Intel Xeon SP Processor }
\nodeUnitParameter{ Up to 768GB DDR4 2133MHz ECC Registered Memory }
\nodeUnitParameter{ Integrated IPMI 2.0 + KVM with dedicated LAN }
\nodeUnitParameter{ Integrated \gls{ipmi} 2.0 + \gls{kvm} with dedicated LAN }
\nodeUnitParameter{ Intel x550 Quad port 10G Ethernet }
\nodeUnitLastParameter{ 1600W Redundant High-efficiency Power Supply }
% Unit has a set of components parameters
@ -155,7 +155,7 @@ The \gls{cluster} will require rackmountable equipment.
\nodeUnitParameter{ 1U Form Factor ~~- Dual Intel Xeon SP Processors }
\nodeUnitParameter{ Intel C620 Chipset with QPI up to 9.6GT/sec }
\nodeUnitParameter{ Up to 768GB DDR4 2666MHz ECC Registered Memory }
\nodeUnitParameter{ Integrated IPMI 2.0 + KVM with dedicated LAN }
\nodeUnitParameter{ Integrated \gls{ipmi} 2.0 + \gls{kvm} with dedicated LAN }
\nodeUnitParameter{ Intel Quad-port 10GBaseT Ethernet Controller }
\nodeUnitParameter{ 4 x 3.5'' Hot-swap Drive Bays For customizable Storage }
\nodeUnitLastParameter{ 750W Redundant Power Supply }
@ -178,7 +178,7 @@ The \gls{cluster} will require rackmountable equipment.
% Unit configuration parameters
\nodeUnitParameter{ 1U Form Factor ~~- Dual Intel Xeon SP Processor }
\nodeUnitParameter{ Up to 1534GB DDR4 2400MHz ECC Registered Memory }
\nodeUnitParameter{ Integrated IPMI 2.0 + KVM with dedicated LAN }
\nodeUnitParameter{ Integrated \gls{ipmi} 2.0 + \gls{kvm} with dedicated LAN }
\nodeUnitParameter{ Intel x540 Dual-port 10Gigabit Ethernet }
\nodeUnitParameter{ 10 x 2.5'' Solid State NVMe Disks }
\nodeUnitLastParameter{ 1000W Redundant High-efficiency Power Supply }
@ -204,23 +204,32 @@ The \gls{cluster} will require rackmountable equipment.
\gls{firewall}
\gls{corosynk}
\gls{migration}
%\gls{ipmi}
\gls{ipmi}
%\gls{upstream}
}\end{picture}
\begin{figure}[!htb]
\includepdf[width=200mm,height=277mm,offset=0 -8mm]
{sharkfork-wire-alt.pdf}
%\includepdf[width=200mm,height=277mm,offset=0 -8mm]
%{sharkfork-wire-alt.pdf}
\noindent
\makebox[0pt][l]{%
\raisebox{-\totalheight+16mm}[0pt][0pt]{%
\hspace*{-8mm}
\includegraphics[keepaspectratio=true,height=1.15\textheight,width=1.15\textwidth,angle=0]
{sharkfork-wire-alt.jpg}
%\def\svgwidth{180mm}
%\input{resources/drawings/sharkfork-wire-alt.pdf.tex}
\setbox0=\vbox{\caption{Sharktech Ethernet Wiring Diagram}}
}}
\end{figure}
\newpage
\section{GNU/Linux Servers}
The servers will all run Debian GNU/Linux
The servers will all run Debian \gls{gnulinux}
\subsection{Denver Server List}
\begin{itemize}
\item \texttt{oc1.forksand.com} --- KVM host.
\item \texttt{oc1.forksand.com} --- \gls{kvm} host.
\item \texttt{rd1.forksand.com} --- Misc.
\end{itemize}
@ -335,9 +344,9 @@ The disk drives do not run free software.
Who we'll get hardware from.
\begin{itemize}
\item Pogo Linux --- Debian GNU/Linux Servers, USA.
\item Viking.net --- Coreboot Opteron servers in Germany.
\item raptorcs.com --- POWER9, custom Coreboot systems (?), USA.
\item Pogo Linux --- Debian \gls{gnulinux} Servers, USA.
\item Viking.net --- \Gls{coreboot} Opteron servers in Germany.
\item raptorcs.com --- POWER9, custom \Gls{coreboot} systems (?), USA.
\end{itemize}
\newcommand{\includescreen}[3]{

@ -16,6 +16,11 @@
Forksand started deployment on \glspl{dedicatedserver}.
\vspace{0.6cm}
First stage. Exclusively \glspl{dedicatedserver} (deprecated)
\begin{picture}(0,0)\put(-10000,0){
\gls{cluster}
\gls{sharkfork}
}\end{picture}
\vspace{0.4cm}
\centering
\includegraphics[width=115mm,trim=20mm 20mm 20mm 20mm]

@ -69,6 +69,6 @@ be able to use... For now we will be using:
\end{figure}
\section{IPMI Administration}
The servers have low level administration done via HTML5 IPMI.
OpenBMC will be used, where possible.
The servers have low level administration done via HTML5 \gls{ipmi}.
\Gls{openbmc} will be used, where possible.

@ -35,7 +35,7 @@ Documentation:
\item The Proxmox VE installer, which partitions the hard
drive(s) with ext4, ext3, xfs or ZFS and installs the
operating system.
\item Proxmox VE kernel (Linux) with LXC and KVM support
\item Proxmox VE kernel (Linux) with LXC and \gls{kvm} support
Proxmox VE Administration Guide 9/309
\item Complete toolset for administering virtual machines,
containers and all necessary resources
@ -45,7 +45,7 @@ containers and all necessary resources
\end{itemize}
The following servers will be deployed to host Proxmox and the KVMs:
The following servers will be deployed to host Proxmox and the \glspl{kvm}:
\begin{itemize}
\item \texttt{sf-001} --- Virtual Machine Node 1
@ -55,14 +55,14 @@ The following servers will be deployed to host Proxmox and the KVMs:
\end{itemize}
%\subsection{Virtual Machine Servers}
%KVM virtual machine servers. Fast CPU, with lots of RAM. Uses Ceph to store
%\Gls{kvm} virtual machine servers. Fast CPU, with lots of RAM. Uses \gls{ceph} to store
%virtual images.
%
%\subsection{Proxmox Web GUI Servers}
%A Proxmox's Web GUI for administration of the \gls{cluster}.
\subsection{Virtual Machine Nodes}
Virtual machine nodes. Fast CPU, with lots of RAM. Uses Ceph to store
Virtual machine nodes. Fast CPU, with lots of RAM. Uses \gls{ceph} to store
virtual images.
Every node includes a Proxmox's Web GUI service for administration of the \gls{cluster}.
@ -120,8 +120,8 @@ Info: This goes through https with self-signed certificate.
%\item Click \texttt{Infrastructure}.
%\item Click \texttt{Hosts}.
%\item Click The \texttt{+} plus icon.
%\item Enter the hostname of the KVM server you want to use, such as the Sunstone server itself.
% \texttt{Type: KVM}
%\item Enter the hostname of the \gls{kvm} server you want to use, such as the Sunstone server itself.
% \texttt{Type: \gls{kvm}}
% \texttt{Hostname: ns24}
%\item Click \texttt{Create}.
%\item Repeatedly hit the reload button that's the two arrows in a circle, as it goes thru
@ -143,7 +143,7 @@ How to deploy an image from the Proxmox App store:
\begin{enumerate}
\item Click \texttt{Storage}.
\item Click \texttt{Apps}
\item Click \texttt{Debian 9 - KVM}.
\item Click \texttt{Debian 9 - \gls{kvm}}.
\item Click on the icon that is a cloud with an arrow in it. This downloads it to Proxmox.
\item Select a datastore by clicking the \texttt{default} line.
\item Leave name and all that the same, and click \texttt{Download}.
@ -152,7 +152,7 @@ How to deploy an image from the Proxmox App store:
\item When \texttt{Status} is \texttt{READY}, it is good to go.
\item Click \texttt{Templates} in the left column.
\item Click \texttt{VMs}.
\item Click \texttt{Debian 9 - KVM}.
\item Click \texttt{Debian 9 - \gls{kvm}}.
\item Click \texttt{Instantiate}.
\item \texttt{VM Name} enter \texttt{deb9}.
\item \texttt{Number of instances} enter \texttt{1}.
@ -168,7 +168,7 @@ How to deploy an image from the Proxmox App store:
\texttt{ssh -N -C -L 29876:localhost:29876 ns24}
\item Click on the little monitor icon to launch VNC.
\item Look at booted up screen at \texttt{login:} prompt.
\item This means a Debian KVM booted up and the VNC is working.
\item This means a Debian \gls{kvm} booted up and the VNC is working.
There is no password for the \texttt{root} account, only \texttt{ssh} is available.
So without network setup, you can't really do anything with this image.
Booted, it just shows it works.
@ -176,9 +176,9 @@ How to deploy an image from the Proxmox App store:
I think delete this section, it would go before the \texttt{Templates} above.:
\begin{enumerate}
\item Click \texttt{Debian 9 - KVM}.
\item Click \texttt{Debian 9 - \gls{kvm}}.
\item PROBABLY NO: Click \texttt{Clone} to make a local copy.
\item PROBABLY NO: It will say \texttt{Copy of Debian 9 - KVM}, leave as-is, click \texttt{Clone}.
\item PROBABLY NO: It will say \texttt{Copy of Debian 9 - \gls{kvm}}, leave as-is, click \texttt{Clone}.
\item Click on the icon with three dots.
\item Click \texttt{Make Persistent}.
\item Click on the icon with three dots.

@ -42,6 +42,9 @@ dnsmasq DHCP for 350+ hosts.
Mailing list, discussion board, forum.
\section{\href{https://dockerproject.org/}{Docker}}
\begin{picture}(0,0)\put(-10000,0){
\gls{docker}
}\end{picture}
System containers, virtual servers.
\section{\href{http://dnsmasq.org/}{DNS}}
@ -751,11 +754,11 @@ server, https://own.alephobjects.com .
* https://docs.docker.com/engine/installation/linux/debian/
\end{minted}
We're going to use a Docker install... own.alephobjects.com is
We're going to use a \gls{docker} install... own.alephobjects.com is
currently running Debian Stretch (testing, version 9). Unfortunately,
docker.io (as it is named in Debian) is available for jessie-backports
and sid, but not for stretch... We'll use docker's apt repos to get
docker....
\gls{docker}.io (as it is named in Debian) is available for jessie-backports
and sid, but not for stretch... We'll use \gls{docker}'s apt repos to get
\gls{docker} ....
\subsection{Install Docker}
\begin{minted}{sh}
* https://docs.docker.com/engine/installation/linux/debian/
@ -772,6 +775,9 @@ Add:
\begin{minted}{sh}
deb https://apt.dockerproject.org/repo debian-stretch main
\end{minted}
\begin{picture}(0,0)\put(-10000,0){
\gls{docker}
}\end{picture}
\begin{minted}{sh}
cd /etc ; git add . ; git commit -a -m 'Add docker repo to apt'
\end{minted}
@ -783,6 +789,9 @@ cd /etc ; git add . ; git commit -a -m 'Install docker'
service docker start
\end{minted}
\subsection{Test docker}
\begin{picture}(0,0)\put(-10000,0){
\gls{docker}
}\end{picture}
\begin{minted}{sh}
docker run hello-world
\end{minted}
@ -805,6 +814,9 @@ enabled = true
mode = sharedsecret
\end{minted}
\subsection{Run Spreed Docker}
\begin{picture}(0,0)\put(-10000,0){
\gls{docker}
}\end{picture}
\begin{minted}{sh}
cd /srv/spreed
@ -822,6 +834,9 @@ apt install -y rng-tools
rngd -f -r /dev/urandom
\end{minted}
Run it thusly:
\begin{picture}(0,0)\put(-10000,0){
\gls{docker}
}\end{picture}
\begin{minted}{sh}
docker run -d --name my-spreed-webrtc -p 8080:8080 -p 8443:8443 -v \
/etc/spreed:/etc/spreed -v /var/log/spreed:/var/log/spreed -v \
@ -846,6 +861,9 @@ Add this inside the VirtualHost section:
RequestHeader set X-Forwarded-Proto 'https' env=HTTPS
\end{minted}
\subsection{Spreed Configuration}
\begin{picture}(0,0)\put(-10000,0){
\gls{docker}
}\end{picture}
\begin{minted}{sh}
Get the config in own.alephobjects.com --> admin --> Additional
Settings(?) --> Spreed.me
@ -932,7 +950,7 @@ Main SMTP outgoing mail server.
Database server.
\section{\href{http://www.qemu.org/}{QEMU}}
Computer emulator, runs virtual servers. Uses KVM.
Computer emulator, runs virtual servers. Uses \gls{kvm}.
\section{\href{http://rsync.samba.org/}{rsync}}
File server.

@ -1,246 +0,0 @@
\section{\texttt{SHA256SUM}}
\texttt{SHA256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855}
\inputminted{sh}{resources/SHA256SUM}
\section{\texttt{STATS}}
\texttt{SHA256: b5fd0d24673c05a70026ca4db2576a80f8e8b4740e4558f29c63194a4ae58829}
\inputminted{sh}{resources/STATS}
\section{\texttt{apps/ansible-debian-mail/ansible.cfg}}
\texttt{SHA256: 5c5bbe341a18319f6f24033c4f63fc5f1594469b4f2cfbb991ec596fd30e9a3b}
\inputminted{sh}{resources/apps/ansible-debian-mail/ansible.cfg}
\section{\texttt{apps/ansible-debian-mail/group\char`_vars/all.yml}}
\texttt{SHA256: b5f417e155b47834e49be9243ba776a6516c56c3ed0121d2bc4d022d5acacd87}
\inputminted{sh}{resources/apps/ansible-debian-mail/group_vars/all.yml}
\section{\texttt{apps/ansible-debian-mail/inventory.yml}}
\texttt{SHA256: cc816d03579097542ca85c188995a412d619c08c84bf3dfef73191fc5cc05b54}
\inputminted{sh}{resources/apps/ansible-debian-mail/inventory.yml}
\section{\texttt{apps/ansible-debian-mail/roles/dkim\char`_configuration/tasks/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: 95d75eba0703ebb00f12d01a821353fe1ddb7a5612a72ea2c4e658d2be5afb52}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dkim_configuration/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/dkim\char`_configuration/templates/\\ \qquad\qquad\qquad../internalhosts.j2}}
\texttt{SHA256: 4f83d988f9a305d6f7571f1742f8e284f0008182bcb21f3b8683594fd5de2340}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dkim_configuration/templates/internalhosts.j2}
\section{\texttt{apps/ansible-debian-mail/roles/dkim\char`_configuration/templates/\\ \qquad\qquad\qquad../opendkim.conf.j2}}
\texttt{SHA256: bf71aafad2295a773f5556ff870e4db70d62451a26fc952bde04336642f7afc2}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dkim_configuration/templates/opendkim.conf.j2}
\section{\texttt{apps/ansible-debian-mail/roles/dkim\char`_configuration/templates/\\ \qquad\qquad\qquad../opendkim.j2}}
\texttt{SHA256: 4069a27787b75f0af2ca555ff0f5668c2cbe6813909108a92c1583c4e82d2863}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dkim_configuration/templates/opendkim.j2}
\section{\texttt{apps/ansible-debian-mail/roles/dkim\char`_configuration/templates/\\ \qquad\qquad\qquad../opendmarc.conf.j2}}
\texttt{SHA256: 3d5208869831f657790c9642ea0ad63db2ad79d080d7d7ef24da0b802946b223}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dkim_configuration/templates/opendmarc.conf.j2}
\section{\texttt{apps/ansible-debian-mail/roles/dkim\char`_configuration/templates/\\ \qquad\qquad\qquad../opendmarc.j2}}
\texttt{SHA256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dkim_configuration/templates/opendmarc.j2}
\section{\texttt{apps/ansible-debian-mail/roles/dkim\char`_configuration/templates/\\ \qquad\qquad\qquad../trustedhosts.j2}}
\texttt{SHA256: 9252907b8d86ae437a9910148e6c72b2fce30be020a57ab3d59111fc5de5f6f7}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dkim_configuration/templates/trustedhosts.j2}
\section{\texttt{apps/ansible-debian-mail/roles/dovecot\char`_configuration/handlers/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: 218fc20617243fef6f783cd83332fa0fe9e610483bc2c2f1b1245e8eec0959ac}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dovecot_configuration/handlers/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/dovecot\char`_configuration/tasks/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: f9d7c2c906c9f092d2dd973cc2c2e9ce9b4b5b01f2ec056f3095c6fc802c2d74}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dovecot_configuration/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/dovecot\char`_configuration/templates/\\ \qquad\qquad\qquad../10-master.conf.j2}}
\texttt{SHA256: d7004417a7ac1d96e9904b05f68879a752dec6f7621bc56ed18434aabf78c40b}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dovecot_configuration/templates/10-master.conf.j2}
\section{\texttt{apps/ansible-debian-mail/roles/dovecot\char`_configuration/templates/\\ \qquad\qquad\qquad../10-ssl.conf.j2}}
\texttt{SHA256: 660790c32b47fd84326c6d53efcb13a2a6c691fa96d59c880aceadf71f8fa1f0}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/dovecot_configuration/templates/10-ssl.conf.j2}
\section{\texttt{apps/ansible-debian-mail/roles/fail2ban\char`_configuration/tasks/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: 8ebe1bb04c097e8371d63b6ac16c393ca74c094711942f2560252d482a0f17ce}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/fail2ban_configuration/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/letsencrypt\char`_configuration/tasks/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: 817e705118fd6d92e7e89a84544ba907c71aa4395b3cb925fe4421b1b99add53}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/letsencrypt_configuration/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/.travis.yml}}
\texttt{SHA256: 6920d48ae9610b5d0d61c9638d27e30b46b885777ab04127a198a380df12ae38}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/.travis.yml}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/Vagrantfile}}
\texttt{SHA256: b8c8b8560eb577eb8637a446bc28aba7df05d34618093023a2b43f7764c75fb2}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/Vagrantfile}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/defaults/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: c86227ad9775e213708a92703958d1ae8dc80b5073b665499839e4c80f0d77d5}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/defaults/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/meta/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: c77f50cf2758025bece96792badbf0f98a799738be56e3dbd94d5c416ce402b5}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/meta/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/meta/\\ \qquad\qquad\qquad../.galaxy\char`_install\char`_info}}
\texttt{SHA256: 8df2fa6c72bad1a6b52a7e84a1dd5a850b96d3ed55c4266113c1476bbc1c974d}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/meta/.galaxy_install_info}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: 5d1ebe1ec51a5a4b0ab52bbf1af63ca94af4290182755b2463aa321bfb39732f}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/\\ \qquad\qquad\qquad../persist-debian.yml}}
\texttt{SHA256: da08d16128d29e725a80590890592020a53d90cbeac3b55dbe67da63fc254e6b}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/persist-debian.yml}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/\\ \qquad\qquad\qquad../persist-redhat.yml}}
\texttt{SHA256: aaa130a6c8ad52ede70c2b12e46e27e61475e5d8b0842274b5ce0515ad645734}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/persist-redhat.yml}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/\\ \qquad\qquad\qquad../rules.yml}}
\texttt{SHA256: 6f28f53b5c77709268853ab1ba9f16ca30d64cd72dde08e9d9826b82c714e602}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/rules.yml}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/templates/\\ \qquad\qquad\qquad../generated.v4.j2}}
\texttt{SHA256: 1c8f8244b151f386933796a30c299f86d580880e16a7abba3653a1e3765a5394}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/templates/generated.v4.j2}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/templates/\\ \qquad\qquad\qquad../generated.v6.j2}}
\texttt{SHA256: b724ce42ef251f979751e080279d27c6f82e21f5c30118a731aacf3f8b494624}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/templates/generated.v6.j2}
\section{\texttt{apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tests.yml}}
\texttt{SHA256: a7c2b3cd0f70c600c3e1db74d95533be3eb864853394c62330b5532c49abb572}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tests.yml}
\section{\texttt{apps/ansible-debian-mail/roles/outputs/tasks/main.yml}}
\texttt{SHA256: 10734468f2c6744ef0fc14bb5f8d9678fb684d9647a981ab7dc93e81f6b3396b}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/outputs/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/postfix\char`_configuration/files/\\ \qquad\qquad\qquad../auth\char`_header\char`_checks.pcre}}
\texttt{SHA256: 3749fe155aa62adb30db35bedc96bdb47b1e094e8cc3b12e4915dc6137edcc43}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/postfix_configuration/files/auth_header_checks.pcre}
\section{\texttt{apps/ansible-debian-mail/roles/postfix\char`_configuration/files/\\ \qquad\qquad\qquad../master.cf}}
\texttt{SHA256: 13dd76df6148f7a898c8054f5566cbd351207a9bc5ae97ced9e4b5407af923a5}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/postfix_configuration/files/master.cf}
\section{\texttt{apps/ansible-debian-mail/roles/postfix\char`_configuration/handlers/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: a31d3860adb790e2ab6ee5763e2b59aa5b17b94f56cb7236845128f0e870e597}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/postfix_configuration/handlers/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/postfix\char`_configuration/tasks/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: cf7521b7366045753045ac11bdccc11857bc0c171a0fc1ba9c572fe7d59fd627}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/postfix_configuration/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/postfix\char`_configuration/templates/\\ \qquad\qquad\qquad../aliases.j2}}
\texttt{SHA256: 5a101165ebf12cbd1663908e21f77dc2636fee45da36f5daa79ab84c47e7dfcb}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/postfix_configuration/templates/aliases.j2}
\section{\texttt{apps/ansible-debian-mail/roles/server\char`_tasks/handlers/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: 5822b360aa9988efc37bdf5dd9626de45b2d1f279f70e032f5b56427994f440d}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/server_tasks/handlers/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/server\char`_tasks/tasks/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: 9482c99a24179cb4bcd0d8ea5bf6ac5e8391cd88b1242190693c685127bb94e8}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/server_tasks/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/spamassassin\char`_configuration/tasks/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: bc1d9877f592fe1b63385a38febee9ed7769cbb01972e73f950dcc6e5309ded0}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/spamassassin_configuration/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/roles/sqlgrey\char`_configuration/tasks/\\ \qquad\qquad\qquad../main.yml}}
\texttt{SHA256: c85d3966f275654bfde3c1c5065980debe0be5900ad5b33f3bf19e893610b635}
\inputminted{sh}{resources/apps/ansible-debian-mail/roles/sqlgrey_configuration/tasks/main.yml}
\section{\texttt{apps/ansible-debian-mail/site.yml}}
\texttt{SHA256: 00b3b9b020bfd4ebe7732bf3a96a7dc5ce37c6788907f0574a193c3f5fcd0224}
\inputminted{sh}{resources/apps/ansible-debian-mail/site.yml}
\section{\texttt{apps/ansible-gitea/ansible.cfg}}
\texttt{SHA256: 5c5bbe341a18319f6f24033c4f63fc5f1594469b4f2cfbb991ec596fd30e9a3b}
\inputminted{sh}{resources/apps/ansible-gitea/ansible.cfg}
\section{\texttt{apps/ansible-gitea/inventory.yml}}
\texttt{SHA256: cc816d03579097542ca85c188995a412d619c08c84bf3dfef73191fc5cc05b54}
\inputminted{sh}{resources/apps/ansible-gitea/inventory.yml}
\section{\texttt{apps/ansible-gitea/roles/gitea/defaults/main.yml}}
\texttt{SHA256: 19aeb0ea8e30712f9589fd7037415118a92666d12ae30aa0757be6fde6357225}
\inputminted{sh}{resources/apps/ansible-gitea/roles/gitea/defaults/main.yml}
\section{\texttt{apps/ansible-gitea/roles/gitea/handlers/main.yml}}
\texttt{SHA256: 4012e6484af750c9b21a8d9f04e68ddd291c37a8dd9657daa862124e480c2497}
\inputminted{sh}{resources/apps/ansible-gitea/roles/gitea/handlers/main.yml}
\section{\texttt{apps/ansible-gitea/roles/gitea/tasks/create\char`_user.yml}}
\texttt{SHA256: 28d0983feb2aba01934a25cad94e64e77c055e6a977bb2a0db9a8c199933b369}
\inputminted{sh}{resources/apps/ansible-gitea/roles/gitea/tasks/create_user.yml}
\section{\texttt{apps/ansible-gitea/roles/gitea/tasks/install\char`_systemd.yml}}
\texttt{SHA256: 7e6155085ebae67496b3267cdf3211fd3a7e0f178661ff21e20101947456912e}
\inputminted{sh}{resources/apps/ansible-gitea/roles/gitea/tasks/install_systemd.yml}
\section{\texttt{apps/ansible-gitea/roles/gitea/tasks/main.yml}}
\texttt{SHA256: bc5f081dfd51f5c920c8dda1873560a2602204dd9d28a881238fd66e22437c2d}
\inputminted{sh}{resources/apps/ansible-gitea/roles/gitea/tasks/main.yml}
\section{\texttt{apps/ansible-gitea/roles/gitea/templates/gitea.ini.j2}}
\texttt{SHA256: c8be571f2f2407240bc88997aedf70c9230554a65132ebab9a1ee0d4296ff9d3}
\inputminted{ini}{resources/apps/ansible-gitea/roles/gitea/templates/gitea.ini.j2}
\section{\texttt{apps/ansible-gitea/roles/gitea/templates/gitea.service.j2}}
\texttt{SHA256: 0acbfe01156c9e39ee71a4fc64310ab003f09bfcf544df00b1f3cff010ed8f38}
\inputminted{sh}{resources/apps/ansible-gitea/roles/gitea/templates/gitea.service.j2}
\section{\texttt{apps/ansible-gitea/roles/nginx/defaults/main.yml}}
\texttt{SHA256: 20c921226115e5a92309d543b66066438e6565bdbd054e7ca41d0fc6ddcfcd9a}
\inputminted{sh}{resources/apps/ansible-gitea/roles/nginx/defaults/main.yml}
\section{\texttt{apps/ansible-gitea/roles/nginx/handlers/main.yml}}
\texttt{SHA256: 5a3990dbfb331c83fbbff76368a2426ae03d34052454aa6676f52b7e4652d561}
\inputminted{sh}{resources/apps/ansible-gitea/roles/nginx/handlers/main.yml}
\section{\texttt{apps/ansible-gitea/roles/nginx/tasks/main.yml}}
\texttt{SHA256: 5232d5b0894c1e6a3da8472591ef49e9c80e927cdbec626c15c9e1a9796729a8}
\inputminted{sh}{resources/apps/ansible-gitea/roles/nginx/tasks/main.yml}
\section{\texttt{apps/ansible-gitea/roles/nginx/templates/nginx.conf.j2}}
\texttt{SHA256: 1ecb64716e6674eb30a145c79859774cc5772304828553474c05820a2151ff3b}
\inputminted{sh}{resources/apps/ansible-gitea/roles/nginx/templates/nginx.conf.j2}
\section{\texttt{apps/ansible-gitea/roles/nginx/templates/nginxssl.conf.j2}}
\texttt{SHA256: 4d7edebbe48f20aeeb49599d32fc5531db943cbf43d7e9995674c180b56f2e77}
\inputminted{sh}{resources/apps/ansible-gitea/roles/nginx/templates/nginxssl.conf.j2}
\section{\texttt{apps/ansible-gitea/site.yml}}
\texttt{SHA256: d74378b00af74eabe0cc11d0f0b1db5c902116c583216f14152d968e5a71e474}
\inputminted{sh}{resources/apps/ansible-gitea/site.yml}
\section{\texttt{apps/iptables/etc/iptables}}
\texttt{SHA256: 825577f3fd900576c119d0a6191de16bf2d55fb84e6749921710b293e5fd1889}
\inputminted{sh}{resources/apps/iptables/etc/iptables}
\section{\texttt{apps/iptables/etc/iptables.test.rules}}
\texttt{SHA256: 4b50c760daa85619a74f1c635b26807fcc7f8bedb90bd22893de8c98f3d78ff1}
\inputminted{sh}{resources/apps/iptables/etc/iptables.test.rules}
\section{\texttt{apps/oca-forksand-v1\char`_1/README.rst}}
\texttt{SHA256: acb247e6caa20a6e5cac57de3137a6bd561f810e4b92d2e32d31064e4e998720}
\inputminted{sh}{resources/apps/oca-forksand-v1_1/README.rst}
\section{\texttt{apps/oca-forksand-v1\char`_1/inventory}}
\texttt{SHA256: 0f3d8a645a0f03d28bd72f8fe137a9aec2ca3b22bcd927f414d4b49236b1c630}
\inputminted{sh}{resources/apps/oca-forksand-v1_1/inventory}
\section{\texttt{apps/oca-forksand-v1\char`_1/playbook.yml}}
\texttt{SHA256: 6e8f7eb1c3db664d243cfe1a5c2c06982979c1e3eed2d65a6a35eaa688de6e64}
\inputminted{sh}{resources/apps/oca-forksand-v1_1/playbook.yml}
\section{\texttt{apps/oca-forksand-v1\char`_1/requirements.yml}}
\texttt{SHA256: c8a9b53d477d7f2d9beb3a32451f6444525c2f515af4abc6ed3fc7bd0b0a049d}
\inputminted{sh}{resources/apps/oca-forksand-v1_1/requirements.yml}
\section{\texttt{apps/oca/etc/init.d/openerp-server}}
\texttt{SHA256: 03e673de76f6aece8473a8441b0c921368f675ea234b62fa58708427a1b69346}
\inputminted{sh}{resources/apps/oca/etc/init.d/openerp-server}
\section{\texttt{apps/oca/lib/systemd/system/odoo-server.service}}
\texttt{SHA256: a149aa2a11f17a20eda8f32e2ef5b34e403b772d53f1dcd2a62bd44b166c2122}
\inputminted{sh}{resources/apps/oca/lib/systemd/system/odoo-server.service}
\section{\texttt{apps/oca/oca11-addons}}
\texttt{SHA256: 72d2cb138dfae349f5029b27dae74d13745061233fcebb79ef3d38eb4836183a}
\inputminted{sh}{resources/apps/oca/oca11-addons}
\section{\texttt{apps/oca/oca-install.sh}}
\texttt{SHA256: 3d793228bd669725954044abb7901b38d6aa2fc397ee2d9fd65e46973a6e4365}
\inputminted{sh}{resources/apps/oca/oca-install.sh}
\section{\texttt{apps/oca/oca-manual-modules}}
\texttt{SHA256: 36b8bf27d09d3f67387f1febc34212a137341d18d25da3e47767fe8e8a56054f}
\inputminted{sh}{resources/apps/oca/oca-manual-modules}
\section{\texttt{apps/oca/odoo9-modules}}
\texttt{SHA256: 3d742d5b59b2a2d7e3c500be929d001bc3685b3a755ec8e913e82a90c87d58ec}
\inputminted{sh}{resources/apps/oca/odoo9-modules}
\section{\texttt{apps/odoo/odoo11-deb-install.sh}}
\texttt{SHA256: eec3af072498c00dd207f85d05de93ae81b4a0a6f4d31aa6b1dfb31af84eb07f}
\inputminted{sh}{resources/apps/odoo/odoo11-deb-install.sh}
\section{\texttt{apps/sharkfork-bootstrap/forksand-sf-001-bootstrap}}
\texttt{SHA256: 3b4f786de5988810eb25f43800a180127676565460c1405fd3a427a564d7ae0e}
\inputminted{sh}{resources/apps/sharkfork-bootstrap/forksand-sf-001-bootstrap}
\section{\texttt{apps/sharkfork-bootstrap/forksand-sf-002-bootstrap}}
\texttt{SHA256: 3509ed438def78ef75a44d9cff92d91c2822c8f08ae0933b2eb6c74fd366fc1b}
\inputminted{sh}{resources/apps/sharkfork-bootstrap/forksand-sf-002-bootstrap}
\section{\texttt{apps/sharkfork-bootstrap/forksand-sf-003-bootstrap}}
\texttt{SHA256: bcf25c40a6f6286747cf409b5531b8b5dab74bf9130ee9cd1509072a21e18e75}
\inputminted{sh}{resources/apps/sharkfork-bootstrap/forksand-sf-003-bootstrap}
\section{\texttt{apps/sharkfork-bootstrap/forksand-sf-004-bootstrap}}
\texttt{SHA256: e9d1882ecb7401d9424e4147594eb96ccf36707e63b11f4d47a5be50d35cc01d}
\inputminted{sh}{resources/apps/sharkfork-bootstrap/forksand-sf-004-bootstrap}
\section{\texttt{apps/sharkfork-bootstrap/forksand-sf-proxmox}}
\texttt{SHA256: 4fa25490d18e693db532a147146bb9751d960ef732fc8ed859089dd5522f05f2}
\inputminted{sh}{resources/apps/sharkfork-bootstrap/forksand-sf-proxmox}
\section{\texttt{apps/ssh/socks-chain.sh}}
\texttt{SHA256: 8e0ee0af15f20e6a5120f9bca4b073532002f8d309dc365c64734b111c03ae4e}
\inputminted{sh}{resources/apps/ssh/socks-chain.sh}
\section{\texttt{apps/ssh/socks-proxy.sh}}
\texttt{SHA256: 646c3cdef108cf891d9d5279971f3da8a708d78b9cb18da832043ba3048cfacf}
\inputminted{sh}{resources/apps/ssh/socks-proxy.sh}
\section{\texttt{apps/yadifa-master/etc/yadifa/yadifad.conf}}
\texttt{SHA256: 1802daa96fe2a7373059b86ae166f008591aad4304eb8176e1c20f56e61e7df8}
\inputminted{sh}{resources/apps/yadifa-master/etc/yadifa/yadifad.conf}
\section{\texttt{apps/yadifa-master/var/lib/yadifa/masters/solipsists.org.zone}}
\texttt{SHA256: e2c4028695f3ac6b6ed8afb963a7821589b94ed81a2d068d7480b809d402c830}
\inputminted{ca65}{resources/apps/yadifa-master/var/lib/yadifa/masters/solipsists.org.zone}
\section{\texttt{apps/yadifa-slave/etc/yadifa/yadifad.conf}}
\texttt{SHA256: 705f36a12aee30e8510e5d06f1d3dd471a82aa518e00648a83f8f9d1146b8186}
\inputminted{sh}{resources/apps/yadifa-slave/etc/yadifa/yadifad.conf}
\section{\texttt{apps/yadifa/var/lib/yadifa/masters/0.0.127.in-addr.arpa.zone}}
\texttt{SHA256: 1966009066a265b65574003bc5f338ee4c2595c010ece34e9e428c526b974fd5}
\inputminted{ca65}{resources/apps/yadifa/var/lib/yadifa/masters/0.0.127.in-addr.arpa.zone}
\section{\texttt{apps/yadifa/var/lib/yadifa/masters/localhost.zone}}
\texttt{SHA256: 93847412dc586aa627b7c8d9c7f9f08223d62bd7297bb02058b57aaa4e92e220}
\inputminted{ca65}{resources/apps/yadifa/var/lib/yadifa/masters/localhost.zone}
\section{\texttt{txt2qrpng.sh}}
\texttt{SHA256: 28dff76725cfbe3e4dcf70120f0393422507443fa5b6a62e1814bd44fb62161e}
\inputminted{sh}{resources/txt2qrpng.sh}

@ -77,6 +77,7 @@ leftmargin=1cm,rightmargin=1cm
\usepackage{longtable}
\usepackage{tabu}
\usepackage{smartdiagram}
\usepackage{svg}
\usesmartdiagramlibrary{additions}
\usepackage{comment} % /usr/share/doc/texlive-doc/latex/comment/comment.pdf
\usepackage{pdfpages} % Be able to include pdf
@ -270,7 +271,8 @@ leftmargin=1cm,rightmargin=1cm
%\typeoutstandardlayout
%%% END DEBUG %%%
\newglossaryentry{cluster}{name={Cluster},plural={Clusters},
\newglossaryentry{cluster}{
name={Cluster},plural={Clusters},
description={, computer cluster is a set of loosely or
tightly connected computers that work together so that, in
many respects, they can be viewed as a single system.}}
@ -308,9 +310,10 @@ leftmargin=1cm,rightmargin=1cm
\newglossaryentry{migration}{
name={Migration},
description={ see Corosynk description for details}}
\newglossaryentry{gnulinux}{name={GNU/Linux},
\newglossaryentry{gnulinux}{
name={GNU/Linux},
description={ is a term promoted by the Free Software Foundation
(FSF) and its founder Richard Stallman.[6] Proponents call for
(FSF) and its founder Richard Stallman. Proponents call for
the correction of the more extended term, on the grounds that it
doesn't give credit to the major contributor and the associated
free software philosophy.}}
@ -318,9 +321,89 @@ leftmargin=1cm,rightmargin=1cm
name={Firewall},plural={Firewalls},
description={ (in computing) is a network security system
that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.[1] A firewall typically
based on predetermined security rules. A firewall typically
establishes a barrier between a trusted internal network and
untrusted external network, such as the Internet.}}
\newglossaryentry{coreboot}{
name={Coreboot},
description={, formerly known as LinuxBIOS, is a software
project aimed at replacing proprietary firmware (BIOS or UEFI)
found in most computers with a lightweight firmware designed to
perform only the minimum number of tasks necessary to load and
run a modern 32-bit or 64-bit operating system.}}
\newglossaryentry{ipmi}{
name={IPMI},
description={, the Intelligent Platform Management Interface
(IPMI) is a set of computer interface specifications for an
autonomous computer subsystem that provides management and
monitoring capabilities independently of the host system's CPU,
firmware (BIOS or UEFI) and operating system. IPMI defines a set
of interfaces used by system administrators for out-of-band
management of computer systems and monitoring of their operation.
For example, IPMI provides a way to manage a computer that may
be powered off or otherwise unresponsive by using a network
connection to the hardware rather than to an operating system
or login shell.}}
\newglossaryentry{openbmc}{
name={OpenBMC},
description={ project is a Linux Foundation Collaborative
open-source project whose goal is to produce an open source
implementation of the Baseboard Management Controllers (BMC)
Firmware Stack. OpenBMC is a Linux distribution for
BMCs meant to work across heterogeneous systems that include
enterprise, High-performance computing (HPC),
Telecommunications, and cloud-scale data centers.}}
\newglossaryentry{tor}{
name={Tor},
description={ is free software for enabling anonymous
communication. The name is derived from an acronym for the
original software project name "The Onion Router". Tor
directs Internet traffic through a free, worldwide,
volunteer overlay network consisting of thousands of relays
to conceal a user's location and usage from anyone
conducting network surveillance or traffic analysis.}}
\newglossaryentry{kvm}{
name={KVM}, plural={KVMs},
description={, the Kernel-based Virtual Machine is a
virtualization infrastructure for the Linux kernel that
turns it into a hypervisor. It was merged into the Linux
kernel mainline in kernel version 2.6.20, which was
released on February 5, 2007. KVM requires a processor
with hardware virtualization extensions. KVM has also been
ported to FreeBSD and illumos in the form of loadable
kernel modules.}}
\newglossaryentry{ddos}{
name={DDoS},
description={, a distributed denial-of-service (DDoS) is a
large-scale DoS attack where the perpetrator uses more than
one unique IP address, often thousands of them. Since
the incoming traffic flooding the victim originates from
many different sources, it is impossible to stop the attack
simply by using ingress filtering. It also makes it very
difficult to distinguish legitimate user traffic from
attack traffic when spread across so many points of origin.
As an alternative or augmentation of a DDoS, attacks may
involve forging of IP sender addresses (IP address spoofing)
further complicating identifying and defeating the attack.}}
\newglossaryentry{ceph}{
name={Ceph},
description={ is a free-software storage platform,
implements object storage on a single distributed computer
cluster, and provides interfaces for object-, block- and
file-level storage. Ceph aims primarily for completely
distributed operation without a single point of failure,
scalable to the exabyte level, and freely available.}}
\newglossaryentry{docker}{
name={Docker}, plural={Dockers},
description={ is a program that performs operating-system-level
virtualization also known as containerization. It is
developed by Docker, Inc. Docker is primarily developed for
Linux, where it uses the resource isolation features of the
Linux kernel such as cgroups and kernel namespaces, and a
union-capable file system such as OverlayFS and others to
allow independent "containers" to run within a single Linux
instance, avoiding the overhead of starting and maintaining
virtual machines (VMs).}}
%%% END OF PREAMBLE %%%

@ -1,82 +0,0 @@
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 ./SHA256SUM
b5fd0d24673c05a70026ca4db2576a80f8e8b4740e4558f29c63194a4ae58829 ./STATS
5c5bbe341a18319f6f24033c4f63fc5f1594469b4f2cfbb991ec596fd30e9a3b ./apps/ansible-debian-mail/ansible.cfg
b5f417e155b47834e49be9243ba776a6516c56c3ed0121d2bc4d022d5acacd87 ./apps/ansible-debian-mail/group_vars/all.yml
cc816d03579097542ca85c188995a412d619c08c84bf3dfef73191fc5cc05b54 ./apps/ansible-debian-mail/inventory.yml
95d75eba0703ebb00f12d01a821353fe1ddb7a5612a72ea2c4e658d2be5afb52 ./apps/ansible-debian-mail/roles/dkim_configuration/tasks/main.yml
4f83d988f9a305d6f7571f1742f8e284f0008182bcb21f3b8683594fd5de2340 ./apps/ansible-debian-mail/roles/dkim_configuration/templates/internalhosts.j2
bf71aafad2295a773f5556ff870e4db70d62451a26fc952bde04336642f7afc2 ./apps/ansible-debian-mail/roles/dkim_configuration/templates/opendkim.conf.j2
4069a27787b75f0af2ca555ff0f5668c2cbe6813909108a92c1583c4e82d2863 ./apps/ansible-debian-mail/roles/dkim_configuration/templates/opendkim.j2
3d5208869831f657790c9642ea0ad63db2ad79d080d7d7ef24da0b802946b223 ./apps/ansible-debian-mail/roles/dkim_configuration/templates/opendmarc.conf.j2
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 ./apps/ansible-debian-mail/roles/dkim_configuration/templates/opendmarc.j2
9252907b8d86ae437a9910148e6c72b2fce30be020a57ab3d59111fc5de5f6f7 ./apps/ansible-debian-mail/roles/dkim_configuration/templates/trustedhosts.j2
218fc20617243fef6f783cd83332fa0fe9e610483bc2c2f1b1245e8eec0959ac ./apps/ansible-debian-mail/roles/dovecot_configuration/handlers/main.yml
f9d7c2c906c9f092d2dd973cc2c2e9ce9b4b5b01f2ec056f3095c6fc802c2d74 ./apps/ansible-debian-mail/roles/dovecot_configuration/tasks/main.yml
d7004417a7ac1d96e9904b05f68879a752dec6f7621bc56ed18434aabf78c40b ./apps/ansible-debian-mail/roles/dovecot_configuration/templates/10-master.conf.j2
660790c32b47fd84326c6d53efcb13a2a6c691fa96d59c880aceadf71f8fa1f0 ./apps/ansible-debian-mail/roles/dovecot_configuration/templates/10-ssl.conf.j2
8ebe1bb04c097e8371d63b6ac16c393ca74c094711942f2560252d482a0f17ce ./apps/ansible-debian-mail/roles/fail2ban_configuration/tasks/main.yml
817e705118fd6d92e7e89a84544ba907c71aa4395b3cb925fe4421b1b99add53 ./apps/ansible-debian-mail/roles/letsencrypt_configuration/tasks/main.yml
6920d48ae9610b5d0d61c9638d27e30b46b885777ab04127a198a380df12ae38 ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/.travis.yml
b8c8b8560eb577eb8637a446bc28aba7df05d34618093023a2b43f7764c75fb2 ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/Vagrantfile
c86227ad9775e213708a92703958d1ae8dc80b5073b665499839e4c80f0d77d5 ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/defaults/main.yml
c77f50cf2758025bece96792badbf0f98a799738be56e3dbd94d5c416ce402b5 ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/meta/main.yml
8df2fa6c72bad1a6b52a7e84a1dd5a850b96d3ed55c4266113c1476bbc1c974d ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/meta/.galaxy_install_info
5d1ebe1ec51a5a4b0ab52bbf1af63ca94af4290182755b2463aa321bfb39732f ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/main.yml
da08d16128d29e725a80590890592020a53d90cbeac3b55dbe67da63fc254e6b ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/persist-debian.yml
aaa130a6c8ad52ede70c2b12e46e27e61475e5d8b0842274b5ce0515ad645734 ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/persist-redhat.yml
6f28f53b5c77709268853ab1ba9f16ca30d64cd72dde08e9d9826b82c714e602 ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tasks/rules.yml
1c8f8244b151f386933796a30c299f86d580880e16a7abba3653a1e3765a5394 ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/templates/generated.v4.j2
b724ce42ef251f979751e080279d27c6f82e21f5c30118a731aacf3f8b494624 ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/templates/generated.v6.j2
a7c2b3cd0f70c600c3e1db74d95533be3eb864853394c62330b5532c49abb572 ./apps/ansible-debian-mail/roles/mikegleasonjr.firewall/tests.yml
10734468f2c6744ef0fc14bb5f8d9678fb684d9647a981ab7dc93e81f6b3396b ./apps/ansible-debian-mail/roles/outputs/tasks/main.yml
3749fe155aa62adb30db35bedc96bdb47b1e094e8cc3b12e4915dc6137edcc43 ./apps/ansible-debian-mail/roles/postfix_configuration/files/auth_header_checks.pcre
13dd76df6148f7a898c8054f5566cbd351207a9bc5ae97ced9e4b5407af923a5 ./apps/ansible-debian-mail/roles/postfix_configuration/files/master.cf
a31d3860adb790e2ab6ee5763e2b59aa5b17b94f56cb7236845128f0e870e597 ./apps/ansible-debian-mail/roles/postfix_configuration/handlers/main.yml
cf7521b7366045753045ac11bdccc11857bc0c171a0fc1ba9c572fe7d59fd627 ./apps/ansible-debian-mail/roles/postfix_configuration/tasks/main.yml
5a101165ebf12cbd1663908e21f77dc2636fee45da36f5daa79ab84c47e7dfcb ./apps/ansible-debian-mail/roles/postfix_configuration/templates/aliases.j2
5822b360aa9988efc37bdf5dd9626de45b2d1f279f70e032f5b56427994f440d ./apps/ansible-debian-mail/roles/server_tasks/handlers/main.yml
9482c99a24179cb4bcd0d8ea5bf6ac5e8391cd88b1242190693c685127bb94e8 ./apps/ansible-debian-mail/roles/server_tasks/tasks/main.yml
bc1d9877f592fe1b63385a38febee9ed7769cbb01972e73f950dcc6e5309ded0 ./apps/ansible-debian-mail/roles/spamassassin_configuration/tasks/main.yml
c85d3966f275654bfde3c1c5065980debe0be5900ad5b33f3bf19e893610b635 ./apps/ansible-debian-mail/roles/sqlgrey_configuration/tasks/main.yml
00b3b9b020bfd4ebe7732bf3a96a7dc5ce37c6788907f0574a193c3f5fcd0224 ./apps/ansible-debian-mail/site.yml
5c5bbe341a18319f6f24033c4f63fc5f1594469b4f2cfbb991ec596fd30e9a3b ./apps/ansible-gitea/ansible.cfg
cc816d03579097542ca85c188995a412d619c08c84bf3dfef73191fc5cc05b54 ./apps/ansible-gitea/inventory.yml
19aeb0ea8e30712f9589fd7037415118a92666d12ae30aa0757be6fde6357225 ./apps/ansible-gitea/roles/gitea/defaults/main.yml
4012e6484af750c9b21a8d9f04e68ddd291c37a8dd9657daa862124e480c2497 ./apps/ansible-gitea/roles/gitea/handlers/main.yml
28d0983feb2aba01934a25cad94e64e77c055e6a977bb2a0db9a8c199933b369 ./apps/ansible-gitea/roles/gitea/tasks/create_user.yml
7e6155085ebae67496b3267cdf3211fd3a7e0f178661ff21e20101947456912e ./apps/ansible-gitea/roles/gitea/tasks/install_systemd.yml
bc5f081dfd51f5c920c8dda1873560a2602204dd9d28a881238fd66e22437c2d ./apps/ansible-gitea/roles/gitea/tasks/main.yml
c8be571f2f2407240bc88997aedf70c9230554a65132ebab9a1ee0d4296ff9d3 ./apps/ansible-gitea/roles/gitea/templates/gitea.ini.j2
0acbfe01156c9e39ee71a4fc64310ab003f09bfcf544df00b1f3cff010ed8f38 ./apps/ansible-gitea/roles/gitea/templates/gitea.service.j2
20c921226115e5a92309d543b66066438e6565bdbd054e7ca41d0fc6ddcfcd9a ./apps/ansible-gitea/roles/nginx/defaults/main.yml
5a3990dbfb331c83fbbff76368a2426ae03d34052454aa6676f52b7e4652d561 ./apps/ansible-gitea/roles/nginx/handlers/main.yml
5232d5b0894c1e6a3da8472591ef49e9c80e927cdbec626c15c9e1a9796729a8 ./apps/ansible-gitea/roles/nginx/tasks/main.yml
1ecb64716e6674eb30a145c79859774cc5772304828553474c05820a2151ff3b ./apps/ansible-gitea/roles/nginx/templates/nginx.conf.j2
4d7edebbe48f20aeeb49599d32fc5531db943cbf43d7e9995674c180b56f2e77 ./apps/ansible-gitea/roles/nginx/templates/nginxssl.conf.j2
d74378b00af74eabe0cc11d0f0b1db5c902116c583216f14152d968e5a71e474 ./apps/ansible-gitea/site.yml
825577f3fd900576c119d0a6191de16bf2d55fb84e6749921710b293e5fd1889 ./apps/iptables/etc/iptables
4b50c760daa85619a74f1c635b26807fcc7f8bedb90bd22893de8c98f3d78ff1 ./apps/iptables/etc/iptables.test.rules
acb247e6caa20a6e5cac57de3137a6bd561f810e4b92d2e32d31064e4e998720 ./apps/oca-forksand-v1_1/README.rst
0f3d8a645a0f03d28bd72f8fe137a9aec2ca3b22bcd927f414d4b49236b1c630 ./apps/oca-forksand-v1_1/inventory
6e8f7eb1c3db664d243cfe1a5c2c06982979c1e3eed2d65a6a35eaa688de6e64 ./apps/oca-forksand-v1_1/playbook.yml
c8a9b53d477d7f2d9beb3a32451f6444525c2f515af4abc6ed3fc7bd0b0a049d ./apps/oca-forksand-v1_1/requirements.yml
03e673de76f6aece8473a8441b0c921368f675ea234b62fa58708427a1b69346 ./apps/oca/etc/init.d/openerp-server
a149aa2a11f17a20eda8f32e2ef5b34e403b772d53f1dcd2a62bd44b166c2122 ./apps/oca/lib/systemd/system/odoo-server.service
72d2cb138dfae349f5029b27dae74d13745061233fcebb79ef3d38eb4836183a ./apps/oca/oca11-addons
3d793228bd669725954044abb7901b38d6aa2fc397ee2d9fd65e46973a6e4365 ./apps/oca/oca-install.sh
36b8bf27d09d3f67387f1febc34212a137341d18d25da3e47767fe8e8a56054f ./apps/oca/oca-manual-modules
3d742d5b59b2a2d7e3c500be929d001bc3685b3a755ec8e913e82a90c87d58ec ./apps/oca/odoo9-modules
eec3af072498c00dd207f85d05de93ae81b4a0a6f4d31aa6b1dfb31af84eb07f ./apps/odoo/odoo11-deb-install.sh
3b4f786de5988810eb25f43800a180127676565460c1405fd3a427a564d7ae0e ./apps/sharkfork-bootstrap/forksand-sf-001-bootstrap
3509ed438def78ef75a44d9cff92d91c2822c8f08ae0933b2eb6c74fd366fc1b ./apps/sharkfork-bootstrap/forksand-sf-002-bootstrap
bcf25c40a6f6286747cf409b5531b8b5dab74bf9130ee9cd1509072a21e18e75 ./apps/sharkfork-bootstrap/forksand-sf-003-bootstrap
e9d1882ecb7401d9424e4147594eb96ccf36707e63b11f4d47a5be50d35cc01d ./apps/sharkfork-bootstrap/forksand-sf-004-bootstrap
4fa25490d18e693db532a147146bb9751d960ef732fc8ed859089dd5522f05f2 ./apps/sharkfork-bootstrap/forksand-sf-proxmox
8e0ee0af15f20e6a5120f9bca4b073532002f8d309dc365c64734b111c03ae4e ./apps/ssh/socks-chain.sh
646c3cdef108cf891d9d5279971f3da8a708d78b9cb18da832043ba3048cfacf ./apps/ssh/socks-proxy.sh
1802daa96fe2a7373059b86ae166f008591aad4304eb8176e1c20f56e61e7df8 ./apps/yadifa-master/etc/yadifa/yadifad.conf
e2c4028695f3ac6b6ed8afb963a7821589b94ed81a2d068d7480b809d402c830 ./apps/yadifa-master/var/lib/yadifa/masters/solipsists.org.zone
705f36a12aee30e8510e5d06f1d3dd471a82aa518e00648a83f8f9d1146b8186 ./apps/yadifa-slave/etc/yadifa/yadifad.conf
1966009066a265b65574003bc5f338ee4c2595c010ece34e9e428c526b974fd5 ./apps/yadifa/var/lib/yadifa/masters/0.0.127.in-addr.arpa.zone
93847412dc586aa627b7c8d9c7f9f08223d62bd7297bb02058b57aaa4e92e220 ./apps/yadifa/var/lib/yadifa/masters/localhost.zone
28dff76725cfbe3e4dcf70120f0393422507443fa5b6a62e1814bd44fb62161e ./txt2qrpng.sh

@ -1,2 +0,0 @@
There are 82 source code files included.
There are 79 unique files.

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.1 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 416 KiB

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 188 KiB

File diff suppressed because one or more lines are too long

@ -14,7 +14,7 @@ CODEDIR="$rootPath/source/resources"
cd "$CODEDIR" || exit
TEXOUT="$rootPath/source/Source-gen.tex"
# Build a grep exclude command that has file extensions to not include.
EXCLUDE="\./\.git \.csv$ \.eps \.git$ \.gz$ \.jpg$ \.ods$ \.ods\#$ \.png$ \.pdf$ \.swp$ \.tmp$ \.xml$ \.aux$ \.fuse_hidden.*$ \.glo$ \.gls$ \.idx$ \.ilg$ \.ind$ \.lof$ \.log$ \.lol$ _minted-.*$ \.old$ \.out$ \.swp$ \.toc$ \.zip$ \..*GPLv3.*$ LICENSE$ README.md$ \.tar$ \.tar\.bz2$ \.gitignore make-sources-list\.sh$ Thumbs\.db$ \.DS_Store$ \.git.*$"
EXCLUDE="\./\.git \.csv$ \.eps \.git$ \.gz$ \.jpg$ \.ods$ \.ods\#$ \.png$ \.pdf$ \.swp$ \.svg$ \.tmp$ \.xml$ \.aux$ \.fuse_hidden.*$ \.glo$ \.gls$ \.idx$ \.ilg$ \.ind$ \.lof$ \.log$ \.lol$ _minted-.*$ \.old$ \.out$ \.swp$ \.toc$ \.zip$ \..*GPLv3.*$ LICENSE$ README.md$ \.tar$ \.tar\.bz2$ \.gitignore make-sources-list\.sh$ Thumbs\.db$ \.DS_Store$ \.git.*$"
EXCLUDEGREP="grep -v -i "
for i in $EXCLUDE
do EXCLUDEGREP="$EXCLUDEGREP -e $i"
@ -55,6 +55,9 @@ echo "There are `cat SHA256SUM.tmp | cut -f 1 -d " " | sort -u | wc -l` unique f
rm SHA256SUM.tmp
echo "current path: $PWD"
ssconverter spreadsheets/sharkfork.ods@"SHARKFORK Order" spreadsheets/sharkfork_order.csv
# Files not rendered
#echo "\section{Not Rendered}" >> $TEXOUT
#echo "The files listed in this section were not rendered." >> $TEXOUT

@ -0,0 +1,33 @@
To Buy,Model,RAM,CPU,Storage,Disks,Rack U,10G,1G,IPMI 1G,Power,Quote $,$/RAM,$/Ghz,$/Gig,Ordered,Supplier,PO,Status,Comments
Servers,,,,,,,,,,,,,,,,,,,
sf-fw1,Iris FW1100,16,27.2,128,1,1,8,0,1,XXX,4064.38,254.02375,149.425735294118,31.75296875,4064.38,PogoLinux,,Received,2x SPF+
sf-fw2,Iris FW1100,16,27.2,128,1,1,8,0,1,XXX,4064.38,254.02375,149.425735294118,31.75296875,4064.38,PogoLinux,,Received,2x SPF+
sf-004,Iris NV2225,128,48,3700,5,2,6,0,1,XXX,13837.99,108.109296875,288.291458333333,3.7399972972973,13837.99,PogoLinux,,Received,
sf-003,Iris NV1211,64,44,5300,7,1,6,0,1,XXX,12542.37,195.97453125,285.053863636364,2.36648490566038,12542.37,PogoLinux,,Received,
sf-002,Iris 1292-R4T,128,33.6,24000,4,1,6,0,1,XXX,6364.42,49.72203125,189.417261904762,0.265184166666667,6364.42,PogoLinux,,Received,
sf-001,Iris 1292-R4T,128,33.6,24000,4,1,6,0,1,XXX,6364.42,49.72203125,189.417261904762,0.265184166666667,6364.42,PogoLinux,,Received,
,,,,,,,,,,,,,,,,,,,
Shipping,,,,,,,,,,,,,,,446,,,,
Subtotal,,480,213.6,57256,22,7,40,0,6,0,47237.96,,,,47683.96,,,,
,,,,,,,,,,,,,,,,,,,
Switches,,,,,,,,,,,,,,,,,,,
admin / ipmi,Netgear Prosafe S3300-28X,,,,,1,2,26,0,,586.98,,,,586.98,Amazon,,Received,28-Port 1 Gigabit Switch
DMZ,Netgear ProSafe XS716T,,,,,1,16,0,,,1129.89,,,70.618125,1129.89,Amazon,,Received,16-Port 10 Gigabit Switch
Filesystem 1,Netgear ProSafe XS716T,,,,,1,16,0,,,1129.89,,,70.618125,1129.89,Amazon,,Received,16-Port 10 Gigabit Switch
Filesystem 2,Netgear ProSafe XS716T,,,,,1,16,0,,,1104,,,69,1104,Amazon,,Received,16-Port 10 Gigabit Switch
Corosync 1,Netgear ProSafe XS716T,,,,,1,16,0,,,1129.89,,,70.618125,1129.89,Amazon,,Received,16-Port 10 Gigabit Switch
Corosync 2,Netgear ProSafe XS716T,,,,,1,16,0,,,1129.89,,,70.618125,1129.89,Amazon,,Received,16-Port 10 Gigabit Switch
Migration,Netgear ProSafe XS716T,,,,,1,16,0,,,1129.89,,,70.618125,1129.89,Amazon,,Ordered,16-Port 10 Gigabit Switch
,,,,,,,,,,,,,,,,,,,
Subtotal,,,,,,7,98,26,0,,7340.43,,,,7340.43,,,,
,,,,,,,,,,,,,,,,,,,
Patch cables & Panels,,,,,,,,,,,,,,,,,,,
Ethernet Cables,Various CAT 7,,,,,,,,,,400,,,,400,Amazon,,Ordered,Need patch cables of different colors & lengths
Power Cables,Various,,,,,,,,,,250,,,,250,Amazon,,Ordered,
,,,,,,,,,,,,,,,,,,,
Subtotal,,,,,,,,,,,650,,,,650,,,,
,,,,,,,,,,,,,,,,,,,
Totals,,480,213.6,57256,22,14,,,12,0,55228.39,,,,55674.39,,,,
Monthly (36 months),,,,,,,,,,,1534.12194444444,,,,,,,,
Colocation,,,,,,,,,,,850,XXX,,,,,,,
Monthly Total,,,,,,,,,,,2384.12194444444,,,,,,,,
1 To Buy Model RAM CPU Storage Disks Rack U 10G 1G IPMI 1G Power Quote $ $/RAM $/Ghz $/Gig Ordered Supplier PO Status Comments
2 Servers
3 sf-fw1 Iris FW1100 16 27.2 128 1 1 8 0 1 XXX 4064.38 254.02375 149.425735294118 31.75296875 4064.38 PogoLinux Received 2x SPF+
4 sf-fw2 Iris FW1100 16 27.2 128 1 1 8 0 1 XXX 4064.38 254.02375 149.425735294118 31.75296875 4064.38 PogoLinux Received 2x SPF+
5 sf-004 Iris NV2225 128 48 3700 5 2 6 0 1 XXX 13837.99 108.109296875 288.291458333333 3.7399972972973 13837.99 PogoLinux Received
6 sf-003 Iris NV1211 64 44 5300 7 1 6 0 1 XXX 12542.37 195.97453125 285.053863636364 2.36648490566038 12542.37 PogoLinux Received
7 sf-002 Iris 1292-R4T 128 33.6 24000 4 1 6 0 1 XXX 6364.42 49.72203125 189.417261904762 0.265184166666667 6364.42 PogoLinux Received
8 sf-001 Iris 1292-R4T 128 33.6 24000 4 1 6 0 1 XXX 6364.42 49.72203125 189.417261904762 0.265184166666667 6364.42 PogoLinux Received
9
10 Shipping 446
11 Subtotal 480 213.6 57256 22 7 40 0 6 0 47237.96 47683.96
12
13 Switches
14 admin / ipmi Netgear Prosafe S3300-28X 1 2 26 0 586.98 586.98 Amazon Received 28-Port 1 Gigabit Switch
15 DMZ Netgear ProSafe XS716T 1 16 0 1129.89 70.618125 1129.89 Amazon Received 16-Port 10 Gigabit Switch
16 Filesystem 1 Netgear ProSafe XS716T 1 16 0 1129.89 70.618125 1129.89 Amazon Received 16-Port 10 Gigabit Switch
17 Filesystem 2 Netgear ProSafe XS716T 1 16 0 1104 69 1104 Amazon Received 16-Port 10 Gigabit Switch
18 Corosync 1 Netgear ProSafe XS716T 1 16 0 1129.89 70.618125 1129.89 Amazon Received 16-Port 10 Gigabit Switch
19 Corosync 2 Netgear ProSafe XS716T 1 16 0 1129.89 70.618125 1129.89 Amazon Received 16-Port 10 Gigabit Switch
20 Migration Netgear ProSafe XS716T 1 16 0 1129.89 70.618125 1129.89 Amazon Ordered 16-Port 10 Gigabit Switch
21
22 Subtotal 7 98 26 0 7340.43 7340.43
23
24 Patch cables & Panels
25 Ethernet Cables Various CAT 7 400 400 Amazon Ordered Need patch cables of different colors & lengths
26 Power Cables Various 250 250 Amazon Ordered
27
28 Subtotal 650 650
29
30 Totals 480 213.6 57256 22 14 12 0 55228.39 55674.39
31 Monthly (36 months) 1534.12194444444
32 Colocation 850 XXX
33 Monthly Total 2384.12194444444
Loading…
Cancel
Save