saving uncommitted changes in /etc prior to apt run
parent
a970c508f6
commit
c8dd1cc731
@ -0,0 +1,51 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIJKQIBAAKCAgEAw2anOE2E+QynOuH0MF1FgQi6DJ8UC5KJoDlt1Rasq5VEguIq
|
||||
TjnFJkeyJW6qxJYzB4ssChGez7xBR4ELLRwvaWwg4431EoEyCSHKt1OVJfonm5r0
|
||||
/n+BV/c2P5ebYJWk1gbmQfn93XkzfQXgInU1TDvKRAQ9mTduWESehkwMSSgqMd5x
|
||||
mLcteq9lCRe9Bg2cHRVcNeE3cFZcwm0njt8AplWERFoyqIU4DPCMzmxPNJ8Qei/4
|
||||
IpImvCj8QJXVZsnE/1pYkTb3oqdhZcOlswA9ulnfFxnGvR4sOhcWKYWH+4xcyDkS
|
||||
lnc8s24V5N2At1dg7XlLexzOWYuYIKkOk9FG6v/+aKotWQw14HFHfEh7KTKsem5n
|
||||
JbGcUxl6kcxUGEj35cLSaxwSuXg/Ru0ixeFiYn3LeBXhq8eM/Fytosr7ZZVPlnuP
|
||||
bhcqR1oh2hCHOqEsaJ0iHwZe9EOGCoVTXaMCVGUA+3xw3yAEND6+U2kwucb7UiJr
|
||||
54QZNVxP2D26OAct3ruBqykINcn+zqhR2ZePtBvpBZYQH14NBpkOqfaW/SB2S4sX
|
||||
ZOd6BkBI+pd9ps3oxIcduPgCdQpL/uX9bhIP71nA7bp79IJAy0q4xKbQh+KqPOQG
|
||||
7pBlknSQkkNw/SRI+rl3RURH9vVPi37UpZBJRl59PbALGly2eMjUDRLgPHcCAwEA
|
||||
AQKCAgALid5KBtnZUxP0+C7RRFC8Y+WIpUQrwsV5vqprsOEVaMUY7X4ODH9F2Wn9
|
||||
p+FRpoTw5xj8pzm3jqhULpyYV1e9Y/M1PMbCBvsLawFrffYKvhDksWvSM3lR1nlP
|
||||
nAZC19NaCCJEtxx0nZmawmQP5Nf23nj9Nzrj90/+yl6KE6eOEl8bfsU6fWakHgNb
|
||||
XBl/aAJV/VLqo5gAfDkSChwR5b1GFTqwRptDNEqxCOtnrSGoO9RfQsHmWLcM2Wa7
|
||||
8Z0ear/FTHJ6cMKCyluIBNueDF+Yx4HS/WSs+kEmVQKsBQSYqBs6f5RHalcdSVzl
|
||||
nObi7Lf+jfEVHghZZVLgats/g1Yqo9yijqCuSU6Po/6SntJC51505TEag8m2+1PW
|
||||
9HUy3R/UD6lAWrvtNgEs3YG6jhTptiC9R0y+cepyJaLw1RHDL1Iqvo6uRH4WXf93
|
||||
Kh1X6AaRf6RhRIgO6uZCw0W3vFcrZvtqzyWaowMplbiZok8doVz3qwiGpTTJfLOW
|
||||
8LIwQDWyYSQ7ptcHsKD6uCAk1OOSgxNaiBgGF/NQeh4PAPfq1RkLyyIKqjwPaFQV
|
||||
wgeP/vnHCU/0dwox0TsQfKafRWI4vGeWCtF4fvALG/cde+KFcT0IgMH24lpUKfEN
|
||||
q+KcgF8IJucUH/vmtRT+h9RNOcSPXRP9x+c6fiu2WO5Whm7IsQKCAQEA84TH62xC
|
||||
uqFkgmD/v4MbewxSWhiJNlF5MAbDk3znWCOjnaNj6qsdZHB1LXRicx0a//W8eDdI
|
||||
hXEpgattjvVWgRBRRe3eZE7yXUa/oVa4Q58U9siq/0+Ph92CKFEbGcvt0R7f8u9q
|
||||
vgPfNVKcp3ED85KijdP8M8qIJlSMqIs1DPuk/KCWQFuyaI87tOIudzrkjobYXuvq
|
||||
3kW6aRh/MEUdWm4ez+P7ybJaKyyDFM/5+oFldRM6R1DsqGeGhyrybjheW8tu0iDc
|
||||
oN2ZFekYBAGr6ysVyqlVN9K1ANoNNpdB73n84anYsYuGi2+DcvZLYcN7sJJctyt/
|
||||
4qui+ELbYQi8ywKCAQEAzWqEnTNVbSyyzQR6U3YnRo04YB1qR/HlFqUAm8pnKYo5
|
||||
cn4CkD67kbtQUIKX1X/m2AiTQwnszmt2xPmT0/8pmYQP2EP4iOTu2L/Fyk93S0Nn
|
||||
FX0/DCHR0SUubi0O72uaKh8cjucTO+mJgFiStg6Qni9U9H93CjncFCyI0ZHowXFt
|
||||
BcBZ5fuX6N3SpXReMRtMzBo7RpVw9jnXRZ+Ros10iyqlYHRAN6mp8KFKQaHENQ5V
|
||||
NUyo0/lQlwTFH4JyYO6UIDQLQDwuNknKnXIK5kfTYhlMjcIrpgVnBp4R4yhKr77y
|
||||
3c6L/YAQkEMEa3dacRVk9v1YDITzr74RLLwYX9yVhQKCAQEAut9GW480leuMKdEt
|
||||
8VU3HXITMDhr81cKXKSUKPZMwgJ3aF0eK9MsNwtloIATnKrVMV7uRoKGEIEKjQt0
|
||||
g6QZwek3tSYY53j93D6Sh8j4lkvZ1pefQVVYm7aMT0wOM/megj/jM5Yun6pw+4Zt
|
||||
2MCNe7knLRdkDop5eJChcCWDjHb/4S2Kn9C+VCa2dtSrO6viAM3R9OWt0uxHZKb7
|
||||
05r2L5MZ6gbWDa3kLAV4gdwnxOjPZsxeiKO9OG5Zehim+ZYgMukmHfJB3OCwvXOm
|
||||
jkyKFWl2y5KuZqw3YnPyd9YTLya5vKKOO5EKqq3kfbAroNZWcOWgaJ/k/5ke8sy7
|
||||
dPcziQKCAQBzNM5zrBq5RFxzh5Njw9x7QTDhFx5Ig25MqPYSag45ygA2Kl4dsFFa
|
||||
hoeg391wLG+3sfeFncdmbfcKuj8iovUd2Gdaj6SQgnVCsyunL7JkT8U81CXMFBut
|
||||
BQFpYXQC64JnJVPLAeZTr8MibIq7+Kc7UKiBCAwnfBPmbKO/henYtFjE5QCGb/je
|
||||
7an6ia1aNUl5Hy0nhSD5t674qWnwuPIoKx7dXdW2Yj2ha5ROAwAcEZHQdtIpMKb2
|
||||
TAKSjYLAwo3pEcdNm3L/l5s/enqKdLYlSrMYvlHkpxsFJxo5IJvivWFQ7UquPmkL
|
||||
v8p2y1W6HpmlvKjpPJe/dQYE5Ol2uixRAoIBAQDrboGcwne7l/PmMS5FQQ/3SOV4
|
||||
C3ncQ91CypDhYzwYJ299tC0SmMdSSWg5rLjc/vvy4TWwQLPe23aDpNbi4679dOA9
|
||||
a7Lo8cV6WqtbQhfKnzH5KWx6BA5cMGbfxuqoKcnDX4hkLmshvFAH3Qu0Kj7UYY0O
|
||||
xvoqCB4zzlwOhsxIQG135qLbRvhQzE+RseTrfg7PjlsT3lH4bsdK79tsdwEU+aDG
|
||||
5+GOJ9X+hNVyRhKaj14leUWSBb33b3bEaKQFq6tJ1P56qMFigfX1bW1EEwATsZUp
|
||||
oKkU55sZ4bD6ONOzRvR0zwPGUZeeJOvV1RtPDZpFGzHaUlwRybZFWPu7tZSF
|
||||
-----END RSA PRIVATE KEY-----
|
@ -0,0 +1,12 @@
|
||||
{
|
||||
"id": 49334232,
|
||||
"key": {
|
||||
"kty": "RSA",
|
||||
"n": "w2anOE2E-QynOuH0MF1FgQi6DJ8UC5KJoDlt1Rasq5VEguIqTjnFJkeyJW6qxJYzB4ssChGez7xBR4ELLRwvaWwg4431EoEyCSHKt1OVJfonm5r0_n-BV_c2P5ebYJWk1gbmQfn93XkzfQXgInU1TDvKRAQ9mTduWESehkwMSSgqMd5xmLcteq9lCRe9Bg2cHRVcNeE3cFZcwm0njt8AplWERFoyqIU4DPCMzmxPNJ8Qei_4IpImvCj8QJXVZsnE_1pYkTb3oqdhZcOlswA9ulnfFxnGvR4sOhcWKYWH-4xcyDkSlnc8s24V5N2At1dg7XlLexzOWYuYIKkOk9FG6v_-aKotWQw14HFHfEh7KTKsem5nJbGcUxl6kcxUGEj35cLSaxwSuXg_Ru0ixeFiYn3LeBXhq8eM_Fytosr7ZZVPlnuPbhcqR1oh2hCHOqEsaJ0iHwZe9EOGCoVTXaMCVGUA-3xw3yAEND6-U2kwucb7UiJr54QZNVxP2D26OAct3ruBqykINcn-zqhR2ZePtBvpBZYQH14NBpkOqfaW_SB2S4sXZOd6BkBI-pd9ps3oxIcduPgCdQpL_uX9bhIP71nA7bp79IJAy0q4xKbQh-KqPOQG7pBlknSQkkNw_SRI-rl3RURH9vVPi37UpZBJRl59PbALGly2eMjUDRLgPHc",
|
||||
"e": "AQAB"
|
||||
},
|
||||
"contact": [],
|
||||
"initialIp": "71.176.21.34",
|
||||
"createdAt": "2019-01-11T15:03:35.397065828Z",
|
||||
"status": "valid"
|
||||
}
|
@ -0,0 +1,12 @@
|
||||
{
|
||||
"id": 49334232,
|
||||
"key": {
|
||||
"kty": "RSA",
|
||||
"n": "w2anOE2E-QynOuH0MF1FgQi6DJ8UC5KJoDlt1Rasq5VEguIqTjnFJkeyJW6qxJYzB4ssChGez7xBR4ELLRwvaWwg4431EoEyCSHKt1OVJfonm5r0_n-BV_c2P5ebYJWk1gbmQfn93XkzfQXgInU1TDvKRAQ9mTduWESehkwMSSgqMd5xmLcteq9lCRe9Bg2cHRVcNeE3cFZcwm0njt8AplWERFoyqIU4DPCMzmxPNJ8Qei_4IpImvCj8QJXVZsnE_1pYkTb3oqdhZcOlswA9ulnfFxnGvR4sOhcWKYWH-4xcyDkSlnc8s24V5N2At1dg7XlLexzOWYuYIKkOk9FG6v_-aKotWQw14HFHfEh7KTKsem5nJbGcUxl6kcxUGEj35cLSaxwSuXg_Ru0ixeFiYn3LeBXhq8eM_Fytosr7ZZVPlnuPbhcqR1oh2hCHOqEsaJ0iHwZe9EOGCoVTXaMCVGUA-3xw3yAEND6-U2kwucb7UiJr54QZNVxP2D26OAct3ruBqykINcn-zqhR2ZePtBvpBZYQH14NBpkOqfaW_SB2S4sXZOd6BkBI-pd9ps3oxIcduPgCdQpL_uX9bhIP71nA7bp79IJAy0q4xKbQh-KqPOQG7pBlknSQkkNw_SRI-rl3RURH9vVPi37UpZBJRl59PbALGly2eMjUDRLgPHc",
|
||||
"e": "AQAB"
|
||||
},
|
||||
"contact": [],
|
||||
"initialIp": "71.176.21.34",
|
||||
"createdAt": "2019-01-11T15:03:35Z",
|
||||
"status": "valid"
|
||||
}
|
@ -0,0 +1,14 @@
|
||||
{
|
||||
"id": 49334232,
|
||||
"key": {
|
||||
"kty": "RSA",
|
||||
"n": "w2anOE2E-QynOuH0MF1FgQi6DJ8UC5KJoDlt1Rasq5VEguIqTjnFJkeyJW6qxJYzB4ssChGez7xBR4ELLRwvaWwg4431EoEyCSHKt1OVJfonm5r0_n-BV_c2P5ebYJWk1gbmQfn93XkzfQXgInU1TDvKRAQ9mTduWESehkwMSSgqMd5xmLcteq9lCRe9Bg2cHRVcNeE3cFZcwm0njt8AplWERFoyqIU4DPCMzmxPNJ8Qei_4IpImvCj8QJXVZsnE_1pYkTb3oqdhZcOlswA9ulnfFxnGvR4sOhcWKYWH-4xcyDkSlnc8s24V5N2At1dg7XlLexzOWYuYIKkOk9FG6v_-aKotWQw14HFHfEh7KTKsem5nJbGcUxl6kcxUGEj35cLSaxwSuXg_Ru0ixeFiYn3LeBXhq8eM_Fytosr7ZZVPlnuPbhcqR1oh2hCHOqEsaJ0iHwZe9EOGCoVTXaMCVGUA-3xw3yAEND6-U2kwucb7UiJr54QZNVxP2D26OAct3ruBqykINcn-zqhR2ZePtBvpBZYQH14NBpkOqfaW_SB2S4sXZOd6BkBI-pd9ps3oxIcduPgCdQpL_uX9bhIP71nA7bp79IJAy0q4xKbQh-KqPOQG7pBlknSQkkNw_SRI-rl3RURH9vVPi37UpZBJRl59PbALGly2eMjUDRLgPHc",
|
||||
"e": "AQAB"
|
||||
},
|
||||
"contact": [
|
||||
"mailto:joshua.dye@gmail.com"
|
||||
],
|
||||
"initialIp": "71.176.21.34",
|
||||
"createdAt": "2019-01-11T15:03:35Z",
|
||||
"status": "valid"
|
||||
}
|
@ -0,0 +1,28 @@
|
||||
-----BEGIN CERTIFICATE REQUEST-----
|
||||
MIIEuDCCAqACAQAwMDEuMCwGA1UEAwwlNWYzYjQyZGQ3YTBhYjFjYi5uYXRhbGll
|
||||
YW5kam9zaHVhLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALiw
|
||||
EUXYJryGGjoEzrvP3gxKh51H/6n2ap4yvPVDOdnaRPztnO+D3sYRU4MghccwLVBj
|
||||
q1B+iKcQlkruhVS4pqpQsjarlgSyySxhas/3YJ2PEUEsSKcK8RR57TCIPPD4iPgX
|
||||
c6HHTthb3WaGZPjd8y8m5C8u9cBeMDIiC9NdofqrY2ijSoN452gFXRUIJwxG0HdK
|
||||
DPmO4S51zd8quqrP8DSp4G5BEFo6xO2MYsy3HUhKlGzkPbMt19MSvMKOiE7iJgM9
|
||||
UftzqR0n3RfWTNf28dbYaaBdX8i4nr7EFbxuJ2WirIzghN9oPc8xgUGDru9x1drL
|
||||
NtPAXEdMaH6FhMDVLwNoUECJF5+bpMK64U2/j87pIYCg5TVoY3rX0Z4G3UjBW1SX
|
||||
1GqbBpwGIglWSTfuJOdKiJ+z2d8UBD9zLebMr1p4HfCDQZvMVERZzI1T6/dHdWyw
|
||||
/0ItLGrYkplfJdU0UnDrDErQmFOYPxen39TAEw7dkpgOgJbaZuKrw4KXOlfPI35a
|
||||
2wINWcKeHf2DfJXf+Vc5ltyHXqfH3Kf9YuLBvIBMExf/qhU5VmUWOKRvtuMeCZ5U
|
||||
Rh6rAfiyGm89kGgnr+Zzz84Z1l4HGkcvBBzFEdlrQjxS9dZrLjAovN0kPImCZ2bI
|
||||
hz0vnlTWPCfeiod6SyAvAV0mUUrc2VeWMiARpMljAgMBAAGgQzBBBgkqhkiG9w0B
|
||||
CQ4xNDAyMDAGA1UdEQQpMCeCJTVmM2I0MmRkN2EwYWIxY2IubmF0YWxpZWFuZGpv
|
||||
c2h1YS5jb20wDQYJKoZIhvcNAQELBQADggIBAFmoiwKX/LBmRL/2oJ3lYS5mVixW
|
||||
zjVu4A00n1tX33veHkjgjFT792q8J/Ep7YHNtpgeDfAg0Xe958sRoOFQeaoSNIU2
|
||||
1D54h8wPf8LkWFIBT1CWVFqZVxIiy4+0d4muh7Ag9h4Lpp3gebyuq5CVeboWmwNc
|
||||
XXKerpyCMZ7dr5asgaJOlLB5lTJE++iMlQ73qbOH0/5rLVsoMnelMohH84d4S97T
|
||||
S5OXUjPlCJE59osDEUPoXlD3fFieQWjVM4wjwyhrHqnqKOB5bm6tK+ldGTVghq5a
|
||||
hOZsCbpyAPwna4codQ2B/X620nS/7nYZzb7V19BTLx7cZsmYI1ojYTRsK5LkYAJq
|
||||
zQ2n2t7SGVa/jgqhpyXRpP4b++INTHWpX7JwNdEozQ0IShV0I7BXtcpBgD3NDyAB
|
||||
0SHmcdBNSzo+MqD9AKs/LycXiO8JISD546EWMnmSXsLoFMrwwe0FObKz/3IgtRXW
|
||||
uwDZg1Uz+Sfd0wRRbXnQ6beeHsRVjgSlMiN6EIjE2ZWnkySyLbRMRVf1lHgypzDV
|
||||
pIcZHFPmm4u/Foacdmwglq7SV4Ejd+dKqIH6O2jw+GL4Fxoe4ySl1Y5bf+VXdpW8
|
||||
A6sXNFAWaHU2N+KYXAjTM0RYNfacvewFdK7xVte61juwpLRjV1PN+jbwun0vBzQH
|
||||
HNlvAny7ZoCR/CEQ
|
||||
-----END CERTIFICATE REQUEST-----
|
@ -0,0 +1,51 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIJKAIBAAKCAgEAuLARRdgmvIYaOgTOu8/eDEqHnUf/qfZqnjK89UM52dpE/O2c
|
||||
74PexhFTgyCFxzAtUGOrUH6IpxCWSu6FVLimqlCyNquWBLLJLGFqz/dgnY8RQSxI
|
||||
pwrxFHntMIg88PiI+BdzocdO2FvdZoZk+N3zLybkLy71wF4wMiIL012h+qtjaKNK
|
||||
g3jnaAVdFQgnDEbQd0oM+Y7hLnXN3yq6qs/wNKngbkEQWjrE7YxizLcdSEqUbOQ9
|
||||
sy3X0xK8wo6ITuImAz1R+3OpHSfdF9ZM1/bx1thpoF1fyLievsQVvG4nZaKsjOCE
|
||||
32g9zzGBQYOu73HV2ss208BcR0xofoWEwNUvA2hQQIkXn5ukwrrhTb+PzukhgKDl
|
||||
NWhjetfRngbdSMFbVJfUapsGnAYiCVZJN+4k50qIn7PZ3xQEP3Mt5syvWngd8INB
|
||||
m8xURFnMjVPr90d1bLD/Qi0satiSmV8l1TRScOsMStCYU5g/F6ff1MATDt2SmA6A
|
||||
ltpm4qvDgpc6V88jflrbAg1Zwp4d/YN8ld/5VzmW3Idep8fcp/1i4sG8gEwTF/+q
|
||||
FTlWZRY4pG+24x4JnlRGHqsB+LIabz2QaCev5nPPzhnWXgcaRy8EHMUR2WtCPFL1
|
||||
1msuMCi83SQ8iYJnZsiHPS+eVNY8J96Kh3pLIC8BXSZRStzZV5YyIBGkyWMCAwEA
|
||||
AQKCAgAg8XcDSF0Qf7Mp6jWeFqP6+Uhba75U6Nl3woEmFom5LE/l9dRqfNE971VA
|
||||
LIrwTs2ma0DhqNBjTHgigY1S4WUJOD+xtMWbrPBpdC8DTZL0R9LCF04WTcNW7bC7
|
||||
WXHVYd+8sSI1F0IfIbPKV+qm4aBBJuTI7c10NNjP+Ha3ixobhnrC7W2bKfPNADfs
|
||||
Snn8nJ0OyiyqTywnh2fjiNGnKlQkcLDRudVa4uTBoqr07SzR+kujaMsArQq0YcE9
|
||||
ywLRX1F8fnGjMqxVwQiU+erXEvtsYUnmCwHM4fGfAYcHB3cLkArLTjklSIjN7nyp
|
||||
3P1VRK7qyhjLiKJtLVnuR464fs5VtXUMovQuZcX/+ZP82XCJSVo0XttEtL1NhPuu
|
||||
N8smH93YaNm7uIZJ2XadvWT1H0sga8BUR1K4pFAwvM/DbTF36vHB5xvRWWI790vo
|
||||
eUZmdrw3pdTsecXrTgkmPimfFQX0iQ7dyQqVh1Y0P386yuUUdaI90K7C3EyoCUxx
|
||||
fu1onClpss35AtaNmm6Yn4+VHcwRq88fegljYrdMJtP+gyD2hMXiksrTMu5WZalZ
|
||||
mj9KjwQLdcv6He62TZCbvirYN9VgOKsTfdSBHT+bvPZS10+RNdI+PCUmf6Lp3bzf
|
||||
LpFFYDlaR2+SlrUw1sdFemiWytC8Rtu4IUhUECaSM6iLuT6GoQKCAQEA6wzfeJrV
|
||||
9bSsL8Q1YFmM19aThCEgs4MV3oQ4wU1iN1Aiy/xF91iM+VEIU7vb7K8AZUr9c8Ro
|
||||
KcgXkMINOGh9l5kijBPBbAxIwn+LbgWJiGWGUcQOSZ9aoWaSgkLY57XIYCPzE62O
|
||||
JLUGKXW/GCqC1viyDMH+woAqW4x9VRebWcZ4jcqKMHigCTmcEGMTJg3e8ve6DcNp
|
||||
cySjj/xumL6YMhGFVSNg2G6iXM2g88ubQCM89gtch1CPhEB1mwyqjicTUesB54Pw
|
||||
6lgr2lpgtm8bXsrtun6rY82i7WrTDv6kiKA6fgN5m84LS8+UHji/+dzUVD8Yyfj5
|
||||
9N8XMU0NRSdDawKCAQEAySYTf3Q3q4kJXpJgkFK2AOxfRVS2O9y1sAB1tSE5eHs5
|
||||
W6yYZGQ0/BNJtvD9IiwbvZZH0JiCXhASZsSq017LyWaFgSY43bplz82ajWilbsPm
|
||||
2kqc5siPtnuwgg1mDr8Mr8x3+bNl4rRuIiSogh0IAKxORRfokjI4d7XXraPoLapU
|
||||
U4gg8xg5NCNAbCGZNVEjDCI88o7RRXZNFe6i9Kog6dz41RE8/X5lpz9Rt2CZJj2/
|
||||
RlP86yGpB9vJOI3Ze/rJRt/uu8K0M7yF1dKD1BGVgUmf1SOsvdpdej4A5cxqLUTG
|
||||
Zj3+N4krRuKQTFcvGOcGF9BCwxXYRpFNtCctptGH6QKCAQAJbOa5K1xREgGlmLSb
|
||||
PHwNW6lmrv1ktWj3F04/Uh8SIMCEdYVIueBNTxaKZQoYn5vgc/Vd4w5aPo/TWjS1
|
||||
glsm7RkZjOFAt+1i/0JUExzEv213cekwwpcbycUuPAf+oqd6U3a330nH5wpsNzCG
|
||||
g43jmO1q3YyduA36xdNwyhWMsAy9gtWvw+aG+Cxt68skx4GdNJndW2yrFVkJuRGm
|
||||
Rl5MA6/ZDiYgB6+zEPvXSt7a347ePu5i7rQSlZMhuIxOTvrTWh0lb4EFpKt9ggpG
|
||||
xoXOc0y9Ib81rVVPN+1muIdYgzRVQUZrHQQO8i/6VkQ8fMJ27mDMGJPNYfTIIVLa
|
||||
5wwpAoIBAAvGCsYfC1MjBkVe1AAel0CelUT9nF0MoiXXIQylETQYIldXVuQpaWCH
|
||||
0HzAxlBFvKnwLevrwVW4IxuYz1bn6Y20ToQstI9l5aewJSe5xFUjalPEokJv4tmP
|
||||
i9lQ53RdgmSX1z3qXkBSx0+ATcyv3lQLwdkReS91eRCouCMVwPVLTvxEr4kLFe4T
|
||||
UiYCIXGZei+voVmhOmaSchiiiy8+9gY6ROZTx/oed9y+PA47vTsbyiJXsCojIj2v
|
||||
g6unwd8b4sQfP14GG34bvsmxNL4o+VND9/MFz4qdSXNqRastt9lGeUZqwoKFqN7R
|
||||
TBjr0Xnnq9eg/QdmM+6NerrcwDNPeGECggEBAIoiec8KAbXDjNrGCbyOkosOrpyB
|
||||
9YqI8NDJbcXe/sY58mWQDK7qBQmmT9dy2UAhu0Md+mHX6mf5QwHTiSC/lasw9ibC
|
||||
X/cxcZuXFMRks+y+BoGd42ytdlV8j8hzg2Nj2eGnEc5s2+OEv6p20+dOrfuz5MtU
|
||||
l1ycEkTeB/V6NXgHGmWseaoLma4k/jl043w6Sr2nndQkmwxCioCcO5XnOk8Whjsy
|
||||
E/8XsVtEOvq3/vhr7XoW/rvFWL5p1d4EnzGJghfyicEvu9Jx6fLBMGEiKo68T8jV
|
||||
BoD6AnrHISq+Wrg/XbIEpcM10qib+Klq9IGD9WSiAiSFwRAlJXfNYkSZpJ8=
|
||||
-----END RSA PRIVATE KEY-----
|
@ -0,0 +1,127 @@
|
||||
########################################################
|
||||
# This is the main config file for dehydrated #
|
||||
# #
|
||||
# This file is looked for in the following locations: #
|
||||
# $SCRIPTDIR/config (next to this script) #
|
||||
# /usr/local/etc/dehydrated/config #
|
||||
# /etc/dehydrated/config #
|
||||
# ${PWD}/config (in current working-directory) #
|
||||
# #
|
||||
# Default values of this config are in comments #
|
||||
########################################################
|
||||
|
||||
# Which user should dehydrated run as? This will be implictly enforced when running as root
|
||||
#DEHYDRATED_USER=
|
||||
|
||||
# Which group should dehydrated run as? This will be implictly enforced when running as root
|
||||
#DEHYDRATED_GROUP=
|
||||
|
||||
# Resolve names to addresses of IP version only. (curl)
|
||||
# supported values: 4, 6
|
||||
# default: <unset>
|
||||
#IP_VERSION=
|
||||
|
||||
# Path to certificate authority (default: https://acme-v02.api.letsencrypt.org/directory)
|
||||
#CA="https://acme-v02.api.letsencrypt.org/directory"
|
||||
|
||||
# Path to old certificate authority
|
||||
# Set this value to your old CA value when upgrading from ACMEv1 to ACMEv2 under a different endpoint.
|
||||
# If dehydrated detects an account-key for the old CA it will automatically reuse that key
|
||||
# instead of registering a new one.
|
||||
# default: https://acme-v01.api.letsencrypt.org/directory
|
||||
#OLDCA="https://acme-v01.api.letsencrypt.org/directory"
|
||||
|
||||
# Which challenge should be used? Currently http-01, dns-01 and tls-alpn-01 are supported
|
||||
CHALLENGETYPE="tls-alpn-01"
|
||||
|
||||
# Path to a directory containing additional config files, allowing to override
|
||||
# the defaults found in the main configuration file. Additional config files
|
||||
# in this directory needs to be named with a '.sh' ending.
|
||||
# default: <unset>
|
||||
#CONFIG_D=
|
||||
|
||||
# Directory for per-domain configuration files.
|
||||
# If not set, per-domain configurations are sourced from each certificates output directory.
|
||||
# default: <unset>
|
||||
#DOMAINS_D=
|
||||
|
||||
# Base directory for account key, generated certificates and list of domains (default: $SCRIPTDIR -- uses config directory if undefined)
|
||||
BASEDIR=/etc/dehydrated
|
||||
|
||||
# File containing the list of domains to request certificates for (default: $BASEDIR/domains.txt)
|
||||
#DOMAINS_TXT="${BASEDIR}/domains.txt"
|
||||
|
||||
# Output directory for generated certificates
|
||||
#CERTDIR="${BASEDIR}/certs"
|
||||
|
||||
# Output directory for alpn verification certificates
|
||||
#ALPNCERTDIR="${BASEDIR}/alpn-certs"
|
||||
|
||||
# Directory for account keys and registration information
|
||||
#ACCOUNTDIR="${BASEDIR}/accounts"
|
||||
|
||||
# Output directory for challenge-tokens to be served by webserver or deployed in HOOK (default: /var/www/dehydrated)
|
||||
#WELLKNOWN="/var/www/dehydrated"
|
||||
|
||||
# Default keysize for private keys (default: 4096)
|
||||
#KEYSIZE="4096"
|
||||
|
||||
# Path to openssl config file (default: <unset> - tries to figure out system default)
|
||||
#OPENSSL_CNF=
|
||||
|
||||
# Path to OpenSSL binary (default: "openssl")
|
||||
#OPENSSL="openssl"
|
||||
|
||||
# Extra options passed to the curl binary (default: <unset>)
|
||||
#CURL_OPTS=
|
||||
|
||||
# Program or function called in certain situations
|
||||
#
|
||||
# After generating the challenge-response, or after failed challenge (in this case altname is empty)
|
||||
# Given arguments: clean_challenge|deploy_challenge altname token-filename token-content
|
||||
#
|
||||
# After successfully signing certificate
|
||||
# Given arguments: deploy_cert domain path/to/privkey.pem path/to/cert.pem path/to/fullchain.pem
|
||||
#
|
||||
# BASEDIR and WELLKNOWN variables are exported and can be used in an external program
|
||||
# default: <unset>
|
||||
#HOOK=
|
||||
|
||||
# Chain clean_challenge|deploy_challenge arguments together into one hook call per certificate (default: no)
|
||||
#HOOK_CHAIN="no"
|
||||
|
||||
# Minimum days before expiration to automatically renew certificate (default: 30)
|
||||
#RENEW_DAYS="30"
|
||||
|
||||
# Regenerate private keys instead of just signing new certificates on renewal (default: yes)
|
||||
#PRIVATE_KEY_RENEW="yes"
|
||||
|
||||
# Create an extra private key for rollover (default: no)
|
||||
#PRIVATE_KEY_ROLLOVER="no"
|
||||
|
||||
# Which public key algorithm should be used? Supported: rsa, prime256v1 and secp384r1
|
||||
#KEY_ALGO=rsa
|
||||
|
||||
# E-mail to use during the registration (default: <unset>)
|
||||
CONTACT_EMAIL="joshua.dye@gmail.com"
|
||||
|
||||
# Lockfile location, to prevent concurrent access (default: $BASEDIR/lock)
|
||||
#LOCKFILE="${BASEDIR}/lock"
|
||||
|
||||
# Option to add CSR-flag indicating OCSP stapling to be mandatory (default: no)
|
||||
#OCSP_MUST_STAPLE="no"
|
||||
|
||||
# Fetch OCSP responses (default: no)
|
||||
#OCSP_FETCH="no"
|
||||
|
||||
# OCSP refresh interval (default: 5 days)
|
||||
#OCSP_DAYS=5
|
||||
|
||||
# Issuer chain cache directory (default: $BASEDIR/chains)
|
||||
#CHAINCACHE="${BASEDIR}/chains"
|
||||
|
||||
# Automatic cleanup (default: no)
|
||||
#AUTO_CLEANUP="no"
|
||||
|
||||
# ACME API version (default: auto)
|
||||
#API=auto
|
@ -0,0 +1,7 @@
|
||||
# Create certificate for 'example.org' with an alternative name of
|
||||
# 'www.example.org'. It will be stored in the directory ${CERT_DIR}/example.org
|
||||
5f3b42dd7a0ab1cb.natalieandjoshua.com
|
||||
rss.natalieandjoshua.com
|
||||
vpn.ovalwonder.com
|
||||
wifi2.natalieandjoshua.com
|
||||
wifi.natalieandjoshua.com
|
Loading…
Reference in New Issue