shutdown /r /o /t 0 Scope===================================================== スイッチャブル Diversity DNR ? GSLink ハードダーツ CONVERSION POINT ----------------------------- DNR”は“Do not resuscitate”の略語で、日本語では「蘇生させないで下さい」を するには 「蘇生の努力は止めて下さい」の意味で、 (余命が限られているので)「緊急時に心肺蘇生をするな」との意思表示 フィールドスコープ Monarch5 8×56(41,232) モナーク7 10x42(42,787) ----------------------------- ##### Skylark = 第6世代のCore i well MB02 1インチ=2.54cm dlna MC572J/A(AppleTV_2世代) asuparu gun 1フィート=30.48cm Protein Diet Bar ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ http://www.clipconverter.cc/en/ SAMURAI EDGE Barry Burton Model Ver.II hi-capa5.1 カスタム 本体サイズ :全長:258mm、重量:1.155g、銃身長:106mm、装弾数:32+1発 --------------------------------------------------------------- https://manage.norton.com/Rewards/Download?psn=GYQ3YQQK262J&flowType=KeyEntry&service=manage NORTON OLD 150days http://kodi.wiki/view/development_builds Development builds: Kodi v17.0 "Krypton" shutdown /r /o /t 0 USEN+HMV \20/a day # lppasswd -g sys -a root password: 〜 ------------------------------------------------------------------ IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net/fullchain.pem. Your cert will expire on 2016-07-18. To obtain a new version of the certificate in the future, simply run Let's Encrypt again. - If you lose your account credentials, you can recover through e-mails sent to auenda@uenda.net. - Your account credentials have been saved in your Let's Encrypt configuration directory at /etc/letsencrypt. You should make a secure backup of this folder now. This configuration directory will also contain certificates and private keys obtained by Let's Encrypt so making regular backups of this folder is ideal. - If you like Let's Encrypt, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le ------------------------------------------------------------------------- /usr/local/apache2/bin/apachectl -----> /usr/sbin/apachectl # restorecon -RF /etc/systemd/system -------------------------------------------------------------------------------- /usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" Warning: This script will remove: /usr/local/.git/ /usr/local/.gitignore /usr/local/.yardopts /usr/local/CODEOFCONDUCT.md /usr/local/CONTRIBUTING.md /usr/local/Cellar/ /usr/local/LICENSE.txt /usr/local/Library/ /usr/local/README.md /usr/local/SUPPORTERS.md -------------------------------------- [ C言語の構造体 ] @interface User : NSObject @property(nonatomic, strong) NSString *name; @property(nonatomic, strong) NSString *mail; @property(nonatomic, strong) NSString *phone; @property(nonatomic, strong) NSString *memo; -(id) initWithName:(NSString*)Name mail:(NSString*)mail phone:(NSString*)phone memo:(NSString*)memo; @end --------------------------------------- ## Admin Page SSL Rewrite Option # RewriteEngine on RewriteCond %{HTTPS} off RewriteRule ^(.*)$ https://www.hoge.co.jp/sslform/$1 [R=301,L] ------------------------------------------------------------------------ # Require host .example.com # Require ip 127 # Require all granted # Require all denied ================== C:\Users\auenda>ls 0 [main] us 0 init_cheap: VirtualAlloc pointer is null, Win32 error 487 AllocationBase 0x0, BaseAddress 0x60EA0000, RegionSize 0x60000, State 0x10000 C:\MinGW\msys\1.0\bin\ls.exe: *** Couldn't reserve space for cygwin's heap, Win32 error 0 --------------------------- ---------------------------------------------------------- <IBM-4>4. 単一ユーザー・モードへのドロップ  ここでシングルユーザーモードに移行します。  この辺の細かい手順記載はさすがです。分かりやすい!  まぁ、シングルユーザーモード、を「単一ユーザー・モード」と記載してあるのは気にしないことです。同じ意味です。私は「単一ユーザー・モード」って始めて聞きましたけど。  # init 1  を実行します。  GUI上で「GNOME端末」から作業をしていた人は画面がいきなり変わってびっくりしたかもしれません。  これがシングル・ユーザーモードです。  いきなり画面が真っ黒になって、文字が出てますが、作業を進めていきます。 --------------------------------------------------------------crontab -e 00 05 01,15 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d www.uenda.net --renew-by-default && /etc/init.d/httpd restart 00 00 * * * /root/mknmz.sh /var/www/html/ /usr/local/var/namazu/index/uenda/ ; /root/gcnmz.sh -------------------------------------------------------------- http://www.mysqueezebox.com/download Logitech Media Server v7.7.5 ------------------------------------------------ wget http://ludovic.rousseau.free.fr/softwares/pcsc-perl/pcsc-perl-1.4.14.tar.bz2 wget http://ludovic.rousseau.free.fr/softwares/pcsc-tools/pcsc-tools-1.4.27.tar.gz cd ~/pt3_tmp tar -zxvf epgdumpUNA160127.tar.gz cd epgdump make && sudo make install ------------------------------------------ # yum --enablerepo=epel,nux-dextop install ffmpeg ---------------------------------------------------------- # yum --enablerepo=epel,nux-dextop install libdvdcss gstreamer{,1}-plugins-ugly gstreamer-plugins-bad-nonfree gstreamer1-plugins-bad-freeworld libde265 x265 --------------------------------------------------------------- インストール: gstreamer-plugins-bad-nonfree.x86_64 0:0.10.23-2.el7.nux gstreamer-plugins-ugly.x86_64 0:0.10.19-17.el7.nux gstreamer1-plugins-bad-freeworld.x86_64 0:1.0.6-1.el7.nux gstreamer1-plugins-ugly.x86_64 0:1.0.6-2.el7.nux libde265.x86_64 0:0.8-1.el7.nux libdvdcss.x86_64 0:1.2.13-1.el7.nux x265.x86_64 0:1.9-1.el7.nux 依存性関連をインストールしました: a52dec.x86_64 0:0.7.4-18.el7.nux faad2-libs.x86_64 1:2.7-5.el7.nux libdca.x86_64 0:0.0.5-7.el7.nux libmad.x86_64 0:0.15.1b-16.el7.nux libmimic.x86_64 0:1.0.4-7.el7.nux libmms.x86_64 0:0.6.4-1.el7.nux libmpeg2.x86_64 0:0.5.1-10.el7.nux libmpg123.x86_64 0:1.15.1-1.el7.nux librtmp.x86_64 0:2.4-2.20131205.gitdc76f0a.el7.nux libsidplay.x86_64 0:1.36.60-2.el7.nux mjpegtools-libs.x86_64 0:2.1.0-5.el7.nux opencore-amr.x86_64 0:0.1.3-3.el7.nux twolame-libs.x86_64 0:0.3.13-3.el7.nux vo-amrwbenc.x86_64 0:0.1.2-1.el7.nux # yum --enablerepo=epel,nux-dextop install vlc smplayer ---------------------------------------------------------- インストール: smplayer.x86_64 0:15.11.0-1.el7.nux vlc.x86_64 1:2.2.2-4.el7.nux 依存性関連をインストールしました: SDL_image.x86_64 0:1.2.12-11.el7 aalib-libs.x86_64 0:1.4.0-0.22.rc5.el7 crystalhd-firmware.noarch 0:3.10.0-11.el7 enca.x86_64 0:1.18-1.el7 freeglut.x86_64 0:2.8.1-3.el7 ftgl.x86_64 0:2.1.3-0.8.rc5.el7 kde-filesystem.x86_64 0:4-47.el7 libXScrnSaver.x86_64 0:1.2.2-6.1.el7 libbs2b.x86_64 0:3.1.0-13.el7 libcaca.x86_64 0:0.99-0.17.beta17.el7 libcddb.x86_64 0:1.3.2-12.el7 libchromaprint.x86_64 0:1.0-1.el7 libcrystalhd.x86_64 0:3.10.0-11.el7 libdvbpsi.x86_64 0:0.2.2-3.el7.nux libebml.x86_64 0:1.3.3-3.el7 libkate.x86_64 0:0.4.1-5.el7 libmatroska.x86_64 0:1.4.1-1.el7 libmfx.x86_64 0:0.0.0-3.9f4a84d.el7.nux libmng.x86_64 0:1.0.10-14.el7 libmodplug.x86_64 1:0.8.8.5-3.el7 libnemesi.x86_64 0:0.7.0-0.5.20110215git.el7.nux libprojectM.x86_64 0:2.1.0-2.el7 libtiger.x86_64 0:0.3.4-7.el7 libupnp.x86_64 0:1.6.19-2.el7 libvncserver.x86_64 0:0.9.9-9.el7_0.1 lirc-libs.x86_64 0:0.9.1a-4.el7 live555.x86_64 0:2013.11.26-1.el7.nux lzo-minilzo.x86_64 0:2.06-8.el7 minizip.x86_64 0:1.2.7-15.el7 mplayer.x86_64 0:1.1-33.20150505svn.el7.nux mplayer-common.x86_64 0:1.1-33.20150505svn.el7.nux netembryo.x86_64 0:0.1.1-5.el7.nux qt.x86_64 1:4.8.5-12.el7_2 qt-settings.noarch 0:19-23.5.el7.centos qt-x11.x86_64 1:4.8.5-12.el7_2 qtlockedfile.x86_64 0:2.4-20.20150629git5a07df5.el7 qtsingleapplication.x86_64 0:2.6.1-28.el7 qtwebkit.x86_64 0:2.3.4-6.el7 vlc-core.x86_64 1:2.2.2-4.el7.nux xcb-util-keysyms.x86_64 0:0.4.0-1.el7 zvbi.x86_64 0:0.2.35-1.el7 ----------------------------------------------------------------------------------- yum -y install http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.3-1.el7.rf.x86_64.rpm ******************************************* index.txt index.txt.attr="unique_subject = yes" を作成 内容も必要 /etc/pki/uenda.net.CA に newcerts directoryを作成 24.2. MySQL Connector/NET 24.2.3.3.2. クラス MySqlConnection コンストラクタ 24.2.3.4. MySqlDataAdapter の使用 public static void CreateSqlDataAdapter() ConnectionString 内のキーワード値として有効な名前 Encrypt=true; Connector/NET 5.0.3 Chefで3分クッキング!-----------Documents411-13--------------------------------- [root@lisa ~]# rsync -avz rsync://rsync_user1@192.168.116.105::backup -e "ssh -p 49922" 40khz oscillator /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d mail.uenda.net -d lisa.uenda.net --renew-by-default && /bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot [build a number of assets using grunt] http://stackoverflow.com/questions/34796164/how-atmel-studio-7-compile-and-debug-arduino-code How Atmel Studio 7 compile and debug Arduino code? 2014-01-14 https://github.com/sudar/Arduino-Makefile A Makefile for Arduino Sketches ardupilot-mega ,GPMモジュール APMのファームウェアを搭載するハードウェアとしては、 Pixhawk, Pixracer, Erle-Brain 2, NAVIO2 ArduPilot Autopilot Suite Nano Carbon XK K100 Falcom 6CH Flybarless 3D6G System RC Helicopter BNF \6,651. Banggood.com NEO-M8N GPS & MAG(Compass) +5V GND SCL---------------GPS SCL I2C Connector(Works also with thw I2C spritter) SDA---------------GPS SDA GPS RX/AP TX GPS TX/AP RX http://www.ebay.com/itm/5pcs-Dupont-Wire-Cable-Line-3p-3p-pin-Header-Connector-Compatible-w-2-54mm-pin-/280830990633?hash=item4162d4d929:g:cXoAAMXQbflSMa1n 5pcs Dupont Wire Cable Line 3p-3p pin Header Connector Compatible w 2.54mm pin $1.81+1.95=207+223 Futaba / Ripmax R7008SB S.BUS 2 Receiver = \23,625. Futaba / Ripmax R6303SB S.BUS Receiver = (\10,887) \6,264. Futaba FASST S.BUS 2.4 GHz Receiver R6303SB (tested by PX4 core team, very lightweight, only 7g) FrSky TFR4 SB 3/16ch 2.4Ghz S.BUS Receiver FASST Compatible (HobbyKing) FrSky FASST compatible S.BUS compatible TFR8 SB 8ch 2.4Ghz Receiver (HobbyKing) Super 10J T-FHSS 2014, \29,080. https://www.u-blox.com/ja/product/u-center-windows u-center for windows v*.**.zipをダウンロード (1)ArduCAM OSD Config 2.1.3.0 ファームウェアの書き込みとOSDボード設定のためのソフト ConfigTool_minOPOSD.zipをダウンロード (2)Character set   OSD画面に表示する文字セット Charset_1_3_0.mcmをダウンロード (3)MinOPOSD firmware  CC3DのデーターをMinimOSDで認識させるため MinOPOSD setup-LibrePilot レギュレーター 出力5Vで10A 3A Switching UBEC 2-6 Lipo 5-24 Nimh for RC Helicopter Aircraft ardupilot Pixhawk ardupilot Flight Controller arducopter/wiki/APM25board Tools>Dfuse USB Upgrade Tools Devo 7E (A7105,CC2500,NRF24L01) Project CARS Radiolink AT9 DSM2 receiver DEVO RX802 8ch 2.4GHz RX701 2.4GHz 7ch \3,560. RX601 2.4GHz 6ch \2,350. DSSS xRX703A RX1202 12ch RX1002 10ch DEVO10 RX710 Runner 250 DEVO7 Storm S603 https://github.com/maniacbug/RF24 APC ES550 BE550G-JP Casil CA1280 12V,8AH = 5.940L x 2.560W x 4.010H $16.60=1,912 APC RBC122J-S (RBC122J互換) , RBC-2J documents-241 LONG WP1236W 12V9AH WP8-12 互換 Genuine RBC http://open-txu.org/ OpenTX University ATmega328P-AU TQFPパッケージ ATmega328P Nano V3 Controller Board Compatible Improved version nRF24 MultiPro forcetronic.blogspot.com OpenLRS 1 X ESP8266 ESP-07S Serial WIFI Wireless Module LWIP AP+STA 1 X 3DBI WiFi Antenna \224 1 X U.FL to Female SMA Cable 2x \278 2x \225 Alligator clip cable LM723 becky siddons CPS-3205C 74HC595 (3ステート・シフトレジスタ/ラッチ) Soldering iron stand $4.49 $8.99 $16.01 528 1,057 1,883 115x85x85mm Quiescent current : 自己消費電流 The nixie tube : 数字あるいは文字・記号の情報を表示する一種の冷陰極放電管(冷陰極管) thermocouple : 熱電対 K-type thermocouple. ------------------------------------------------------------------------------------------- Soldering Iron chips Models:900M-T-B, 900M-T-I, 900M-T-3C, 900M-T-2.4D, 900M-T-K,900M-T-1.2D, 900M-T-3.2D, 900M-T-2C, 900M-T-1.6D,900M-T-4C DC 6V-90V 15A DC Motor Speed Controller Stepless Speed Regulation Pulse Width PWM Dp50v5a Programable Power supply LM723CN 10PCS Adjustable Voltage Regulator 2-37V 150mA IC ST DIP-14 LM723CN DIP-14 \223 NJM723D @100. 2N3055 x2 @100. BD140 x2 @100 Diode 10A x4 4700uF to 10000uF 50V x1 TIP640 / MJ3001 7812 2SA1302 2SC3281 2SC1173 2SD600 1N4005 diode 8929P/C324C 2SD438 T Plug Male Connectors to MT60 Female 50ohms feedthrough termination -------------------------------------------- Hello こんにちわ I have not received any packages yet. 私は、まだ荷物を受けとっていません。 Where is my baggage? 私の荷物はどこですか? Are you not shipping? 発送してないのですか? Please investigate. 調査をお願いします。 Or, please refund. または、返金して下さい。 Best regards 敬具 -------------------------------------------- わかりました I see. あと1週間だけ待ちましょう Let's wait another week, but 最後の妥協です It is the last compromise! toslink jack AX-DLR2150 $0.90 光---電圧変換①Vout, ②GND, ③Vcc Electricity meter Non-Contact Voltage Tester Pen AC Electricity Power Meter Detector ----------------------------------------- Hello こんにちわ I received my package, Thankyou. 荷物を受け取りました but 5Pcs nozzle heads are not Enclosed. ノズルヘッドが同胞されていないです I am downloading photos of your items, あなたの商品の写真をダウンロードしてます What is going on? どうなっていますか Please investigate. 調査をお願いします。 Best regards 敬具 ------------------------------------------------------------- HY3003D 30V3A \11,182. QJ3003X QJ3005X QJ5003X GJ600? 英: standard deviation ( SD ) 標準偏差 I would like to recieve the nozzles 私はノズルを受け取りたい I would like to get my nozzles 私はノズルを手に入れたい 2SC1815GR ------------------------------------------------------ Let's wait for another 2 weeks,only one chance. then,should refund. Best regards ------------------------------------------------------------ Hello こんにちわ I received my package, Thank you. 荷物を受け取りました It is stored in a hard case, good, thank you very much It is different from the ones in the photo. please refund now. Best regards $111.99 (\12,880)?? Where do I cancel with the information from 何処からの情報でキャンセルするのですか 昇降圧コンバータ ; buck–boost converter TPS63000 LTC3xxx Speed Reducer DC12V Geared Box Motor 5RPM 3.5KG.CM 0.45A \963 Electrical DC24V Speed Reduce Gear Motor 20RPM 15KG.CM High Torque \623 High Current XT60 Male to Female Switch LiPo Battery Switch 6V 12A New \301 1pc Converter Adapter For PC Laptop DP Display Port Male to DVI Female Black \580 TITELY soldering paste fujii solder co.ltd. IEC 60320-C6 http://www.stayonline.com/reference-iec320.aspx IEC-60320 (IEC320) Reference Chart 0.25/0.3/0.5/0.75/1/2/3/4/5/6A 0.2A, 0.5A,1A,2A,3A,5A,8A,10A,15A,20A Hello, I think, Unilaterally the seller canceled, so I will request a penalty. Additional items, Seller;sweepworld Item number 272336940299. Request additional amount by separate e-mail. (the seller requested additional shipping fee.) ebay should prohibit this seller. You should do that for other buyers as well. People who demand money other than the original transaction conditions. Best regards 907A Solder Staions handle plugin unit 112-K control panel 616 900M-T Series Solder Iron Tips for Electronic Soldering Iron 10pcs/lot Big D keyboard plug and socket connector 5 pin 6pin 7pin 8pin round plug big spikes DIN plug . Back to product details DIN-5C DIN Connectors 5 PIN MALE PLUG 5-PIN MALE DIN CONNECTOR mini stc t12 https://www.google.co.jp/search?q=mini+stc+t12&tbm=isch&imgil=AVGDwNhmAtFZJM%253A%253BgOyh0sAfYo6CrM%253Bhttps%25253A%25252F%25252Fwww.aliexpress.com%25252Fstore%25252Fproduct%25252FCabbage-white-T12-digital-soldering-station-DIY-kit-parts-product-controller-board-handle-iron-head%25252F1894205_32598005634.html&source=iu&pf=m&fir=AVGDwNhmAtFZJM%253A%252CgOyh0sAfYo6CrM%252C_&usg=__8YlwKM4nIK-iaRaxU-1HgCxy5pg%3D&biw=1442&bih=944&ved=0ahUKEwj8o57k9trRAhXKvLwKHYfqAAkQyjcIKQ&ei=EFyHWPzbEcr58gWH1YNI#imgrc=AVGDwNhmAtFZJM%3A Soldering Station with Thermocouple Sensor Hakko1321 difference between A1321 and T12 FM-208 handle or FX-9501 handle FM2028_Handle Model: LK907B Specifications: Thermal fuse resistance: Ceramic sealing nickel alloy thermal fuse resistance ≈13Ohm Thermal fuse max. working voltage: AC/DC 24V 50W Sensor type: K type thermocouple (Characteristic resistance ≈3Ohm) Plug diameter: 12.5mm Plug pin quantity: 5 female pins. If the plug of your hot air station is different from it but shares the parameters, you can connect the cable again by yourself according to the detailed instructions. Suitable for Hakko936 hot air station or other derived series of products made in China, which has similar appearance and structure with it, such as 936A 936b 937 969 93. It is also suitable for 2 in 1 products of soldering iron and hot air station on condition that they meet the above parameters. Series 581: Male plug, internal solder lug, cable outlet 4-6 GX12-5 5 Pins 5P Screw Butt Joint Cable Aviation Connector 5 pin GX16 connection Kit 3 in 1 GX16-5 5 Pins 5P Screw Butt Joint Cable Connector Aviation Plug GX16-5 16mm Screw Butt Joint Aviation Connector Male Female Plug 5 Pin GX12-5 5 Pins 5P Screw Cable Connector Aviation Plug Capacitance: 2pF - 0.1uF Rated voltage: 50V 2P , 3P , 5P , 10P , 15P , 22P , 30P , 33P , 47P , 68P , 75P , @ 82P @ 101(100P) , @120pf @ 151(150PF) , @ 221(220PF) , 331(330PF) , 471(470PF) , 681(680PF) 102(1NF) , 152(1.5NF) , 222(2.2NF) , 332(3.3NF) , 472(4.7NF) , 682(6.8NF) 103(10NF) , @ 153(15NF) , @ 223(22NF) , @ 473(47NF) , @ 683(68NF) , @ 104(100NF) ------------------------------------------------ SSR 40A XMT7100 thermosenser Vibration SW-100 ; High quality ball tilt ball switch SW-100 copper vibration vibration sensor type $2.07 what material are made of Adjustable Holder and Base? 調整可能なホルダーとベースの材質は何ですか? E402 単4x2本 ラグ 黒 フラット 材質:ABS樹脂 単1形→D 単2形→C 単3形→AA 単4形→AAA 単5形→N Camera STI ASTRO TECH AT6RC and Losmandy G11 PHD Guide ; オートガイドソフトのPHD Guidingの使い方を説明します。 ----------------------------- 2017-01-29 14:45 ----------------------------------------------------------------- [root@git ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default Upgrading certbot-auto 0.9.3 to 0.10.2... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges Generating key (2048 bits): /etc/letsencrypt/keys/0013_key-certbot.pem Creating CSR: /etc/letsencrypt/csr/0013_csr-certbot.pem IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-04-29. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le --------------------------------------------------------------------------------- DM326HS 簡易パンチダウン dremel 2.35mm 480 : 1/8(4/32)インチ:3~3.2mm 481 : 3/32インチ:2.3~2.5mm 482 : 1/16" : 1.6mm 483 : 1/32" : 0.8mm 4485 4.3mm dremel nuts k-type thermocouple registance --------------------------------------------------------------------- =============== letsencrypt ================= crontab ================ Upgrading certbot-auto 0.10.2 to 0.11.1... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges Generating key (2048 bits): /etc/letsencrypt/keys/0014_key-certbot.pem Creating CSR: /etc/letsencrypt/csr/0014_csr-certbot.pem IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-05-09. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le -------------------------------------------------------------------------------------- 起承転結 払うべき代償 superfluity excess growth Biohazard:The final ドメイン駆動設計 mod_security.conf.off ======================================================= [root@git ~]# /usr/local/letsencrypt/letsencrypt-auto Saving debug log to /var/log/letsencrypt/letsencrypt.log Which names would you like to activate HTTPS for? ------------------------------------------------------------------------------- 1: uenda.net ------------------------------------------------------------------------------- Select the appropriate numbers separated by commas and/or spaces, or leave input blank to select all options shown (Enter 'c' to cancel): Obtaining a new certificate Performing the following challenges: tls-sni-01 challenge for uenda.net Waiting for verification... Cleaning up challenges Generating key (2048 bits): /etc/letsencrypt/keys/0015_key-certbot.pem Creating CSR: /etc/letsencrypt/csr/0015_csr-certbot.pem Deploying Certificate to VirtualHost /etc/httpd/conf.d/ssl.conf Please choose whether HTTPS access is required or optional. ------------------------------------------------------------------------------- 1: Easy - Allow both HTTP and HTTPS access to these sites 2: Secure - Make all requests redirect to secure HTTPS access ------------------------------------------------------------------------------- Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2 Created redirect file: le-redirect-uenda.net.conf Rollback checkpoint is empty (no changes made?) ------------------------------------------------------------------------------- Congratulations! You have successfully enabled https://uenda.net You should test your configuration at: https://www.ssllabs.com/ssltest/analyze.html?d=uenda.net ------------------------------------------------------------------------------- IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0002/fullchain.pem. Your cert will expire on 2017-05-18. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again with the "certonly" option. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le ====================================================================================== [root@git ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --agree-tos Saving debug log to /var/log/letsencrypt/letsencrypt.log Cert not yet due for renewal You have an existing certificate that has exactly the same domains or certificate name you requested and isn't close to expiry. (ref: /etc/letsencrypt/renewal/uenda.net-0001.conf) What would you like to do? ------------------------------------------------------------------------------- 1: Keep the existing certificate for now 2: Renew & replace the cert (limit ~5 per 7 days) ------------------------------------------------------------------------------- Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2 Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges Generating key (2048 bits): /etc/letsencrypt/keys/0017_key-certbot.pem Creating CSR: /etc/letsencrypt/csr/0017_csr-certbot.pem IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-05-18. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Female Viagra Arduino ADK ペダルストラップ Steinberg PLANEX USB2.0 PL-US35AP \1,199 Levitra Cialis NP-TR9 \61,780 NP-TM9 \54,303 GREATTOOL MTB-6SP \9,181 GTTB-13SP \17,064. AmScope MD35 USB Camera PRN3D \49,800. 造形サイズ:W170xD170xH160mm DC12V 96W 本体:W420xD250xH320 Cut2D Desktop 販売価格:18,800円(税込) 図脳RAPID18 ¥ 43,215 jwcad-8.02b(2017-02-18) ---------------------------------------------------------- 2017-03-09 Upgrading certbot-auto 0.11.1 to 0.12.0... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges Generating key (2048 bits): /etc/letsencrypt/keys/0018_key-certbot.pem Creating CSR: /etc/letsencrypt/csr/0018_csr-certbot.pem IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-06-06. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: ----------------------------------------------------------------- ascetone flux Flux removal brush alcohol dispenser acid brush 東芝 卓上ドリル DP-13A 振興製作所 DRILL-PRESS SD-13 myfordboy.blogspot.com 桐谷美玲 I understand.Thanks for your help. by the way,Ebay is not better than "banggood". Ebay has the following members of sellers, Green UBEC Power 2-6S 5V3A or 12V3A Aluminum お客さまは$7.86 USDを深圳市安亿百科技有限公司(kaifengfu2011@gmail.com)に支払いました。 A cunning cheater QW-MS305D 5A 30V 110V DC Power Supply Lab Precision Variable Digital Adjustable お客さまは$87.99 CADをENUMBER INC(sweepworldpp@themailhosting.com)に支払いました Cowardly con artist Ebay is a fool, and can not obtain full credibility. /////////////////////////// Tektronix TAS485 /////// 1998 /////////////////////////////////////////// Features & Benefits 100 MHz at Two Channels TAS465 100 MHz at Four Channels TAS475 200 MHz at Four Channels TAS485 Dual (Delayed) Time Base Measurement Cursors CRT Readout Auto Setup Store/Recall of Setups Video Trigger Trigger/Ground Reference Indicator Combination Menu/Direct Access Controls Applications Training Manufacturing Production Test Field Repair Bench Calibration and Repair Product Design *********************************************************************** Characteristics Bandwidth - 100 MHz (TAS465, TAS475), 200 MHz (TAS485) Input Channels - 2 (TAS465), 4 (TAS475, TAS485) Rise Time - ≤3.5 ns (TAS465, TAS475), ≤1.8 ns (TAS485) Time Base - Dual Main Sweep Range - 0.5 s/div to 20 ns Delayed Sweep Range - 5 ms/div to 20 ns Vertical Accuracy - ±2.5% Vertical Sensitivity - 2 mV/div to 5 V/div Horizontal Accuracy - ±2% X10 Horizontal Accuracy - ±3% Sweep Speed (X10 mag.), Main - 2 ns/div (TAS465, TAS475), 1 ns/div (TAS485) Sweep Speed (X10 mag.), Delayed - 2 ns/div (TAS465, TAS475), 1 ns/div (TAS485) Trigger Modes - AUTO LEVEL, AUTO, NORMAL, TV LINE, TV FIELD (odd, even, or both), SGL SEQ Trigger Delay - RUNS AFTER DELAY, TRIGGERS AFTER DELAY, TV LINE (from MAIN source) Trigger Coupling (both Main and Delayed) - AC, DC, Noise Reject, HF Reject, LF Reject Auto Setup - Yes Store/Recall - 4 front­panel setups Cursors and Readouts - Yes CRT - 14 kV Warranty - Three years Safety Certification - UL, CSA, IEC348 ////////////////////////////////////////////////////////////////////////// Tektronix P6133 150MHz Tektronix P6134C 400MHz Tektronix P6136 350MHz Tektronix P6138 350MHz ------------- Tektronix P3010 100MHz Tektronix P6101B 15MHz Tektronix P6109B 100MHz ------------- Tektronix P6139A (500MHz) =============== Probes for Tektronix TAS485 smd P6561AS 200MHZ $350. differential P6046 100MHZ general purpuse P6111B 200MHZ ******** P6109B 100MHZ P6129B 100MHZ P6101 15MHZ current P6022 120MHZ P6021 60MHZ ================ V:\bu\02\0650 Users\auenda\backup\common\ゆう子\ 107: 1:マイドキュメント\ゆう子V3\初期データ 2:C:\Users\Public\Documents\ゆう子V3\初期データ 108: オシロスコープ 200MHz Oscillo Probe Fixtures 備品 Yours Sincerely, Vengeance 復讐 Arsenal 兵器 Institute 研究所 ++++++++++++++++++++++2017-04-01+++++++++++++++++++++++++++++++++++++ Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges Generating key (2048 bits): /etc/letsencrypt/keys/0019_key-certbot.pem Creating CSR: /etc/letsencrypt/csr/0019_csr-certbot.pem IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-06-29. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # yum --enablerepo=epel install libmcrypt-devel # rpm -qa gpg-pubkey* ------------------------------------ chcon -t bin_t /usr/sbin/xrdp chcon -t bin_t /usr/sbin/xrdp-sesman /etc/xrdp/xrdp.ini を編集して上限を 24 に変更します。 max_bpp=32 ↓ max_bpp=24 export LANG=ja_JP.UTF-8 ************************************************************************ CentOS7 で US-Keyboard を使用の場合、/etc/xrdp/ にある以下の物を 削除、或は rename する  km-e0010411.ini, km-e0200411.ini, km-e0210411.ini ************************************************************************ ログイン画面でのキー配列を確認 https://xrdp.vmeta.jp/%E3%82%AD%E3%83%BC%E9%85%8D%E5%88%97%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6 CentOS 7 へリモートデスクトップ接続する (xrdp) 12月 04, 2015 http://cobitech.blogspot.jp/2015/12/centos-71-xrdp.html $ cd /etc/xrdp $ (cd /tmp; wget http://w.vmeta.jp/temp/km-0411.ini) $ sudo cp /tmp/km-0411.ini . $ sudo ln -s km-0411.ini km-e0200411.ini $ sudo ln -s km-0411.ini km-e0010411.ini ************************************ キーボードの設定ファイルが /etc/sysconfig/keyboard から /etc/vconsole.conf に変更になりました km-00000409.ini km-e0010411.ini km-00000409.ini km-e0210411.ini km-00000409.ini km-e0200411.ini yum install MariaDB-server MariaDB-client flash-player-ppapi thinclient_drives /phpmyadmin/index.php on this server. ------------------------------------------------------------------ 2017-04-21 Sorry, I cannot run apxs. Possible reasons follow: 1. Perl is not installed 2. apxs was not found. Try to pass the path using --with-apxs2=/path/to/apxs 3. Apache was not built using --enable-so (the apxs usage page is displayed) The output of /usr/local/apache2/bin/apxs follows: ./configure: line 6187: /usr/local/apache2/bin/apxs: No such file or directory configure: error: Aborting Zhttps://www.openssl.org/source/openssl-1.0.2k.tar.gz ./configure \ --enable-http2 \ --enable-ssl \ --with-ssl=/usr/local/openssl-1.0.2k \ --enable-so \ --enable-mods-shared=all \ --enable-mpms-shared=all env OPENSSL_CFLAGS="-I/usr/local/openssl-1.0.2k/include" OPENSSL_LIBS="-L/usr/local/openssl-1.0.2k/lib -lssl -lcrypto" ./configure apachectl start ######################## ===== 2017-04-22 ==================================================================================== 00 05 01 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net --renew-by-default && /usr/bin/systemctl restart httpd ========================================================================================== firewall-cmd --add-port=443/tcp --permanent firewall-cmd --reload firewall-cmd --list-ports 22/tcp 25/tcp 465/tcp 995/tcp 993/tcp 80/tcp 443/tcp openssl x509 -in /etc/letsencrypt/live/uenda.net-0002/fullchain.pem -noout -dates 00 00 * * * /root/mknmz.sh /var/www/html/ /usr/local/var/namazu/index/uenda/ ; /root/gcnmz.sh 00 05 01 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net --renew-by-default && /usr/bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot 00 00 * * * /root/mknmz.sh /var/www/html/ /usr/local/var/namazu/index/uenda/ ; /root/gcnmz.sh 00 05 30 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net --renew-by-default && /usr/bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot saslpasswd2 -u uenda.net auenda chown postfix /etc/sasldb2 --------------------------------------------- userdel -r auenda useradd auenda passwd auenda --------------------------------------------- ibus-kkcは日本語入力メソッドで、vlgothic-*の方は日本語フォント。 2015-07-29 ibus-kkcのみインストールしてもフォントがなくて日本語入力できない。 # yum install ibus-kkc vlgothic-* # yum install ld-linux.so.2 # setarch `uname -m` /usr/local/DiCE/diced | nkf -uw systemd の使い方 for DiCE 2016-05-08 http://blue-red.ddo.jp/~ao/wiki/wiki.cgi?page=systemd+%A4%CE%BB%C8%A4%A4%CA%FD # systemctl list-units | grep dice dice.service loaded active exited DiCE daemon ************************************************ kernel-3.10.0-514.6.1.el7.x86_64 CentOSで不要カーネルの削除 https://heavy-metal-explorer.com/kernel_delete/ # yum install yum-utils # rpm -q kernel # uname -r ************************************************ 00 05 30 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default && /bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot 00 03 * * * /opt/gitlab/bin/gitlab-rake gitlab:backup:create CRON=1 00 00 * * * /root/mknmz.sh /var/www/html/ /usr/local/var/namazu/index/uenda/ ; /root/gcnmz.sh ---------------------------------------------------------- body {background-color:#DFE; color:black; }; # nkf -w /usr/local/var/namazu/index/uenda/NMZ.head.ja>NMZ.head.ja # nkf -e NMZ.head.ja>/usr/local/var/namazu/index/uenda/NMZ.head.ja /undef/dice_events_check.cgi ++++++++++++++++++ ius repo ++++++++++++++++++++++++++++++++++ $ wget https://dl.iuscommunity.org/pub/ius/stable/CentOS/7/x86_64/ius-release-1.0-14.ius.centos7.noarch.rpm # rpm -Uvh ius-release-1.0-14.ius.centos7.noarch.rpm # yum --enablerepo=ius,epel install php56u # yum --enablerepo=ius,epel install php56u-mbstring # yum --enablerepo=ius,epel install php56u-pdo php56u-mysqlnd +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DiCE が正しく起動しているかの確認> ps -aef | grep /usr/local/DiCE/diced cat /usr/local/DiCE/log/events.log | nkf -w setarch `uname -m` /usr/local/DiCE/diced | nkf -uw ********************** 2017-04-30 ******************** Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges Generating key (2048 bits): /etc/letsencrypt/keys/0021_key-certbot.pem Creating CSR: /etc/letsencrypt/csr/0021_csr-certbot.pem IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-07-28. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le ******************************************************** XX cp smb://192.168.116.196/uenda/bu/04/0140---CentOS7/pc2/etc/letsencrypt/archive/uenda.net-0001/cert10.pem smb://192.168.116.196/uenda/bu/04/0140---CentOS7/pc2/etc/letsencrypt/live/uenda.net-0001/cert.pem cert.pem <-- cert10.pem chain.pem <-- chain10.pem fullchain.pem <-- fullchain10.pem privkey.pem <-- privkey10.pem -------------------------------------------------------------- /usr/local/bin/nkf ==> /usr/bin/nkf yum == dnf python-3.5 H:\Git-Hub\popcorn-desktop>gulp nw:run [17:29:37] Using gulpfile H:\Git-Hub\popcorn-desktop\gulpfile.js [17:29:37] Task 'nw:run' is not in your gulpfile [17:29:37] Please check the documentation for proper gulpfile formatting https://github.com/marcelklehr/nodist.git https://github.com/popcorn-official/popcorn-desktop-experimental.git 古い https://github.com/PopcornTimeCommunity/desktop.git https://github.com/popcorn-official/popcorn-desktop.git 〇 npm install --global gulp GULP_HOME C:\Users\auenda\AppData\Roaming\npm\node_modules\gulp ----------------------------------------------------- ******* rita.uenda.net = git.uenda.net = 192.168.116.105 ******* Perl 5.16.3 PHP 5.6.25 mysql 5.7.18 httpd 2.4.6-45 bind 9.9.4-38 python 2.7 ******* lisa.uenda.net = 192.168.116.102 ******* dnf Perl 5.16.3 PHP 7.1.4 ==> PHP 5.6.30 mysql 14.14 distrib 5.7.18 httpd 2.4.6.-45 bind 9.9.4-38 python 2.7 + 3.5 ************************************************************************ 995/tcp, 993/tcp, 465/tcp, 25/tcp 必須 ports Dockerfile ================================================================== +++++++++++++++ Apache Solr on CentOS7 ++++++++++++++++++++ [Apache-solr] # wget http://apache.org/dist/lucene/solr/6.5.1/solr-6.5.1.tgz # tar -xzvf solr-6.5.1.tgz # cd solr-6.5.1/bin # bash ./install_solr_service.sh ../../solr-6.5.1.tgz id: solr: no such user Creating new user: solr Extracting ../../solr-6.5.1.tgz to /opt Installing symlink /opt/solr -> /opt/solr-6.5.1 ... Installing /etc/init.d/solr script ... Installing /etc/default/solr.in.sh ... Service solr installed. Customize Solr startup configuration in /etc/default/solr.in.sh Waiting up to 180 seconds to see Solr running on port 8983 [-] Started Solr server on port 8983 (pid=13960). Happy searching! Found 1 Solr nodes: Solr process 23100 running on port 8983 { "solr_home":"/var/solr/data", "version":"6.5.1 cd1f23c63abe03ae650c75ec8ccb37762806cc75 - jimczi - 2017-04-21 12:23:42", "startTime":"2017-05-04T05:09:10.974Z", "uptime":"0 days, 0 hours, 0 minutes, 12 seconds", "memory":"21.1 MB (%4.3) of 490.7 MB"} # # service solr start # service solr stop # service solr restart # service solr status firewall-cmd --zone=public --add-port=8983/tcp --permanent firewall-cmd --reload ------------------------------------------------------------- http://192.168.116.102:8983/solr ------------------------------------------------------------- Securing Solr Admin Page を設定するとエラーとなる 2017/05/04 =================================================================== http://mirror.fibergrid.in/apache/lucene/solr/6.5.1 ******* solr 6.5.1 on windows10 インストール ************ H:\Downloads\C_auenda_Downloads\solr-6.5.1\bin>solr start find: `TCP ': No such file or directory find: `:0 ': No such file or directory find: `:8983 ': No such file or directory WARNING: 32-bit Java detected. Not recommended for production. Point your JAVA_HOME to a 64-bit JDK Waiting up to 30 to see Solr running on port 8983 Started Solr server on port 8983. Happy searching! H:\Downloads\C_auenda_Downloads\solr-6.5.1\bin> ********************************************************* Standalone server example (start Solr running in the background on port 8984): C:> solr start -p 8984 ( solr start -f -p 8984) XXSolrCloud example (start Solr running in SolrCloud mode using localhost:2181 to connect to Zookeeper, with 1g max heap size and remote Java debug options enabled): XXC:> solr start -c -m 1g -z localhost:2181 -a "-Xdebug Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=1044" ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Apache Solr入門 ------------------------------------------ /var/solr/data に 'Core folder' を作成、所有者は 'solr' にする。 'Core folder' に /opt/solr/server/solr/configsets/basic_configs/ の 'conf' 以下全体をコピーする。 その後、'add Core' を実行する。 Aoyue Int 474A++ Desoldering Station ::\19,352 ,\19,485 ZD-915 Desoldering Station ::\10,148 ,\9,994 ,\10,705 CSI8900 Portable Deso ::\ S-993A Desoldering Gun ::\11,700. Hakko FR300 ::\18,400. TS-1513 80W Desoldering Station ::\15,776 - May not ship to Japan \\192.168.116.198\AirPort Disk3 --- (192.168.116.198 (uMac Time Capsule)) WD40EFRX 21,979 WD30EFRX 11,850 WD20EFRX 9,955 *************** 2017/05/08 ***************** [root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default Upgrading certbot-auto 0.13.0 to 0.14.0... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-08-06. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@lisa ~]# ****************************************** cd /opt/solr/bin C:\Users\auenda>cd C:\solr-6.5.1\bin C:\solr-6.5.1\bin>solr start -e techproducts ************************************************ Solr home directory C:\solr-6.5.1\example\techproducts\solr already exists. Starting up Solr on port 8983 using command: C:\solr-6.5.1\bin\solr.cmd start -p 8983 -s "C:\solr-6.5.1\example\techproducts\solr" find: `:0 ': No such file or directory find: `TCP ': No such file or directory find: `:8983 ': No such file or directory Waiting up to 30 to see Solr running on port 8983 Started Solr server on port 8983. Happy searching! Copying configuration to new core instance directory: C:\solr-6.5.1\example\techproducts\solr\techproducts Creating new core 'techproducts' using command: http://localhost:8983/solr/admin/cores?action=CREATE&name=techproducts&instanceDir=techproducts { "responseHeader":{ "status":0, "QTime":3129}, "core":"techproducts"} Indexing tech product example docs from C:\solr-6.5.1\example\exampledocs SimplePostTool version 5.0.0 Posting files to [base] url http://localhost:8983/solr/techproducts/update using content-type application/xml... POSTing file gb18030-example.xml to [base] POSTing file hd.xml to [base] POSTing file ipod_other.xml to [base] POSTing file ipod_video.xml to [base] POSTing file manufacturers.xml to [base] POSTing file mem.xml to [base] POSTing file money.xml to [base] POSTing file monitor.xml to [base] POSTing file monitor2.xml to [base] POSTing file mp500.xml to [base] POSTing file sd500.xml to [base] POSTing file solr.xml to [base] POSTing file utf8-example.xml to [base] POSTing file vidcard.xml to [base] 14 files indexed. COMMITting Solr index changes to http://localhost:8983/solr/techproducts/update... Time spent: 0:00:00.626 Solr techproducts example launched successfully. Direct your Web browser to http://localhost:8983/solr to visit the Solr Admin UI C:\solr-6.5.1\bin> http://localhost:8983/solr/techproducts/browse C:\solr-6.5.1\bin>solr stop -p 8983 ↑<<=== ? No Solr found running on port 8983 ------- for CentOS7 ---------------------------- OpneJDK環境構築 JDK相当のパッケージはjava-1.8.0-openjdk-devel。 これをインストールすることで、javacコマンドも利用可能になる。 # yum install java-1.8.0-openjdk java-1.8.0-openjdk-devel ##User specific environment and startup programs export JAVA_HOME=/usr/lib/jvm/java-1.8.0-openjdk PATH=$PATH:$JAVA_HOME/bin ------------------------------------------------------ /opt/solr/bin/solr start -p 8983 -s "/opt/solr/example/techproducts/solr" ???? Acronis True Image 2016 : Failed to execute the task script. Error #1364 ProxN45May_jp10a ローカルで働く擬似プロキシソフト チィーミング: IEEE 802.3ad LACP(レイヤ3+4) GS108T-200JPS GS110TP intel X540-T2 \22,900 EXPI9402PT I340-T2 GS716T-300AJS \21,863.E-Trend +2,233. \19,630.yodobashi \22,272.Amazon +2,642. 1000Base-LX/10km 長波長 1000Base-T/100m 1000Base-SX/550m 4.43 スタティックリンクアグリゲーションの設定 lan link-aggregation static link_id interface:port interface:port [interface:port ...] no lan link-aggregation static link_id [interface:port ...] http://www.rtpro.yamaha.co.jp/RT/manual/swx2300/cmdref_2_00_08/lan-sfp/lag/channel-group_link-id_mode.html LACP論理インターフェースの設定 channel-group LINK-ID mode MODE no channel-group channel-group 11 mode active CrystalDiskMark 5.1.2--5.2.1 CrystalDiskInfo 6.8.2--7.0.5 PTCE-Public/popcorn-desktop https://github.com/PTCE-Public/popcorn-desktop popcorn-official/popcorn-desktop-legacy https://github.com/popcorn-official/popcorn-desktop-legacy PTCE/Popcorn-desktop https://github.com/PTCE/Popcorn-desktop oleander/show-time https://github.com/oleander/show-time ReadyNAS316 シリアル:3C68490600196 ファームウェア:6.5.1 ---------------------------------------------------------- https://dl.nwjs.io/ 和室 = Japanese style room 寝室 = Bedroom netgear XS708T-100AJS \114,199 (\237,600) ******************************************************************************************** -------------------------------------------------------------------------------------------- [root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default Upgrading certbot-auto 0.14.0 to 0.14.1... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-08-15. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@lisa ~]# -------------------------------------------------------------------------------------- The Da Vinci Code(2003)[字][S] - ダ・ヴィンチ・コード(1920x) C_auenda_Downloads Googleが公開したオープンソースソフトウエアのディープラーニングライブラリ「TensorFlow」 Arduino Uno R3 2_arduinos_by_bluetooth_using_bind Raspberry Pi class 10 の 32GB-micro SD カード .cc Arduino_YuN Arduino_TIAN Box for Arduino Yún Linino OS org.apache.solr.util.SolrCLI フィニッシュネイル F35MO Usage: java -jar start.jar [options] [properties] [configs] java -jar start.jar --help # for more information mklink "C:\solr-6.5.1\server\lib\ext\SolrCLI.jar" H:\Git-Hub\lucene-solr\solr\core\src\java\org\apache\solr\util\SolrCLI.java ノアブライト蛍光管20W NBL-20 (570mm) \645. http://www.biccamera.com/bc/disp/CSfGoodsPage_001.jsp?GOODS_NO=2193708 /S-Documents-page18/432/My Documents432.html(26) 2.8" TFT LCD Touch Screen LCD Shield Kit \2,575. C:\Windows\System32\where.exe # whereis lsof ===>> procexp.exe lsof: /usr/bin/lsof /usr/share/man/man8/lsof.8.gz g++ -o whereis whereis.c ===>> whereis.exe -------------------------------------------- SONAR 保護 ができません https://support.norton.com/sp/ja/jp/home/current/solutions/v100974613_EndUserProfile_ja_jp ノートン ファミリーをインストールしている場合は、まずこれをアンインストールしてから、ノートン削除/再インストールツールを実行します。 1.ノートン削除/再インストールツールをダウンロードする。 Windows のデスクトップにファイルを保存します。一部のブラウザでは、ファイルは自動的にデフォルトの場所に保存されます。 2.ブラウザで Ctrl+J キーを押して、[ダウンロード]ウィンドウを開きます。 3.NRnR アイコンをダブルクリックします。 4.使用許諾契約の内容を読み、[同意]をクリックする。 5.[削除および再インストール]をクリックします。 サービスプロバイダから提供されたノートン製品の場合、[削除]ボタンが表示されることがあります。 6.[続行]または[削除する]をクリックします。 7.[今すぐ再起動]をクリックします。 コンピュータが再起動したら、画面上の指示に従ってノートン製品を再インストールします。 ------------------------------------------------------------------- Git Extensions ------------ ピアノ線 --------------------------------------------- 番手(#) #8 #10 #12 #14 #16 #18 #20 #22 #24 #26 #28 #30 線径(㎜) 4.0 3.2 2.6 2.0 1.6 1.2 0.9 0.7 0.55 0.45 0.35 0.3 ------------------------------------------------------------------- 長さ(m) 6 11 16 21 12 15 ------------------------------------------------------------------- Dental Portable LED Head Light Lamp baistra Envío internacional estándar == 標準国際送料 Brackets = adobe opensource editor C1100 http://www.bohyoh.com/ Eclipse IDE for Java Developers eclipse-java-neon-3-win32-x86_64.zip java.lang. reflect. を反映する InvocationTargetException 呼び出しターゲット例外 Bamboo Fineline 8078円 充電式で、約15時間駆動 ワコム製の「Bamboo Paper」にはもちろん対応するが、 そのほかは「SketchBook」「GoodNotes」などで利用できる。 Dropbox, Evernote, Google Docs, OneNote https://www.epaingo.com/myentry/ Rocketbook Wave 3,480 販売終了 Wipebook Pro 6,690 $45 mini $40 CANSAY nu board (ヌーボード) A4判 \2,100 CANSAY nu board (ヌーボード) A5判 \2,000 ==============2017-05-31 ============== dnsmasq CrystalDiskMark -------- The following possible Homebrew files were not deleted: /usr/local/bin/ /usr/local/CHANGELOG.md /usr/local/etc/ /usr/local/include/ /usr/local/lib/ /usr/local/man/ /usr/local/mysql -> /usr/local/mysql-5.7.13-osx10.11-x86_64 /usr/local/mysql-5.7.13-osx10.11-x86_64/ /usr/local/mysql-connector-odbc-5.3.6-osx10.11-x86-64bit/ /usr/local/remotedesktop/ /usr/local/share/ You may wish to remove them yourself. ------------- /usr/local/Cellar/dnsmasq/2.76 $ sudo brew services start dnsmasq $ sudo brew services stop dnsmasq $ cp /usr/local/opt/dnsmasq/dnsmasq.conf.example /usr/local/etc/dnsmasq.conf /etc/hosts Inheritance is the implementation of another class based on a certain class Abstract class interface 192.168.116.114 iPhone5S 192.168.116.119 iPad2 iPhone7 32GB 72,800( 78,624)+11,000. 128GB 83,800( 90,504)+11,000. 256GB 94,800(102,384) AH-C820(DENON)17,836 イヤフォン GridLayout GridView appletviewer -------------------------------------------------------------------------------- [root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default WARNING: unable to check for updates. Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-09-03. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@lisa ~]# --------------------------------------------------------------------------------- $ javac -verbose -encoding utf-8 jdbc_sample.java && java JdbcSample ======= 2017-06-23 ======== mmc.exe https://github.com/popcorn-official/popcorn-desktop =========================================================================== [root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default Upgrading certbot-auto 0.14.2 to 0.15.0... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.net http-01 challenge for git.uenda.net http-01 challenge for www.uenda.net http-01 challenge for lisa.uenda.net Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at /etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will expire on 2017-09-21. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@lisa ~]# ============================================================================ for rita ./letsencrypt-auto certonly --webroot \ -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net \ -m auenda@uenda.net \ --agree-tos ---------------------------------------------------------------------- http://olivia.uenda.net/S-Notices-page/05/NAMAZU_WIN_PCin.html vulnerabilities 脆弱性(せいじゃくせい) # 以下の行を追記 -javaagent:belle.jar Proxy Server On local network with pfSense check out an Introduction to pfSense. Locate the Squid package http://squid.acmeconsulting.it/index.html http://squid.acmeconsulting.it/Squid27.html TOTO 瞬間式 温水洗浄便座 TCF8PF22-NW1 C:\>route add 192.168.3.0 mask 255.255.255.0 192.168.2.122 192.168.3.0 255.255.255.0 192.168.2.122 192.168.2.121 11 Windows用Kurento Media Server http://www.kurento.org https://github.com/Kurento/kurento-media-server ----------------------************************------------------------- Yii2とVue.jsの組み合わせ ----------------------************************------------------------- ネットワーク上で LMS と AMT が有効 16992番または16993番 PB回線=プッシュボタン信号 DP回線=ダイヤルパルス信号 ( DP10, DP20 ) DT(ダイヤルトーン) 400Hz 正弦波 BT(ビジートーン) 400Hz 正弦波 RGT(リンギングトーン) 16Hz、65Vrms以上 RBT(ルングバックトーン) 400Hzと16Hzの変調波(85%変調) 回線インピーダンス 600Ω アナログ回線 DC45~48V重畳 40mA MAX Sonalert Beocom1401 平均 3,770. EPSON EP-901F 2008/09/19 発表 EW-M770T RJ11 モジュラーローゼット ブラザープリンター ビッグインクタンク http://welcome.brother.com/th-en/products-services/multi-function-centres/DCP-T700W.html Multi-Function Centres DCP-T700W B 6,790.- NTT/601-P 電話 受話器 の 音量が 小さい 故障 ? 代替 部品 送話器一体の受話器 ハンドセット 積層型セラミックスピーカー 07/16 秋月電子:オーダーID E170716-002642-01 1,5000. 10,000. 5,000. キャッシュバック EW-M770T(64,450=67,930), EW-M660FT(47,707=52,730)49,520, EP-M570T(35,291=40,100) 購入期間:2017/06/01~2017/07/31迄 応募:2017/08/21迄 EP-979A3(27,524) A4カラー文書が約1.3円(税別)、A4モノクロ文書が約0.5円(税別)、L判写真で約6.0円(用紙代込み ブラザー EW-M660FTE FAX 53,343 ブラザー プリビオ DCP-J968N-W/B 10,537 プリビオ ワークス MFC-J6573CDW 25,800(参考価格 43,740円 税込み) LC113-4PK, LC119/115-4PK プリビオ ワークス MFC-J6973CDW 33,267 同上 詰替 顔料インク ブラック 互換インク ---------------------------------- brother A4 カラー レーザープリンター HL-3170CDW/22PPM 16,209 A4フラットベッドスキャナー GT-F740 amazon17,527 yodobashi17,780 販売開始日: 2012/10/11 A4フラットベッドスキャナー GT-S650 amazon11,240 yodobashi9,890 販売開始日: 2015/01/29 電話 モジュラージャック 壁面端子 RJ11 6P4C モジュラー パナソニック(Panasonic) 埋込C付テレホンモジュラジャック 6極2心 WN4623K WN4624WK 6極4心 Plex Media Server Soundflower NVIDIA SHIELD Logitech Media Server(Squeezebox 3rd Generation) NetGear hdb06lfpn BRYDGE 9.7 Gold ( BRY1013 ) 16,979 高白色 コピー用紙 ブランコ B5 500枚x10冊 2,222 222.2 高品質マルチ用紙 A4 500枚x 5冊 2,743 548.6 沖電気 カラーLED複合機 MC362DNW \40,000 定価112,800 HT812 コーデック:G.711 a/u law, G.729 a/b, G.723, G.726 2 LAN-port NATルータ内蔵 HT502 コーデック:G.711 a/u law, G.729 a/b, G.723, G.726 1 イーサネットポート、1 LANポート 日本国内のナンバーディスプレイ対応 ----------------------------------------------------- brother レーザープリンター A4 カラー JUSTIO HL-3170CDW \16,202. 22PPM/2013-/2400x600 dpi/カラー18.2円/枚、モノクロ3.9円/枚/電源OFF時の消費電力を約0.03W brother レーザープリンター A4 カラー JUSTIO HL-L8250CDN \23,961. 28PPM/2014-/2400x600 dpi/--------------/電源OFF時の消費電力を約0.02W brother レーザープリンター A4 カラー JUSTIO HL-L8350CDW \29,106. 30PPM/2014-/2400x600 dpi/カラー:約12.6円/枚 //電源OFF時の消費電力を約0.02W/TN-391BK/C/M/Y,TN-396BK/C/M/Y,DR-391CL/BU-320CL,WT-320CL brother レーザープリンター A4 カラー JUSTIO HL-L8360CDW \46,469. 31PPM/2017-/2400x600 dpi/カラー:約15.3円/枚 brother レーザープリンター A4 カラー 複合機 JUSTIO MFC-9340CDW \36,573. 22PPM/2013-/2400x600 dpi brother プリンター A4カラーレーザー(LED)複合機 JUSTIO 18PPM/ADF/有線・無線LAN... \33,491. brother レーザープリンター A4 モノクロ JUSTIO HL-L2320D \8,064. brother レーザープリンター A4 モノクロ 複合機 JUSTIO DCP-L2520D \11,129. brother レーザープリンター A4 モノクロ 複合機 JUSTIO DCP-L2540DW \16,873. brother レーザープリンター A4 モノクロ JUSTIO HL-L2360DN \9,371 TN-28J EPSON スキャナー GT-X830 (フラットベッド/A4/6400dpi) \27,655 EPSON スキャナー GT-S650 (フラットベッド/A4/4800dpi) \8,863 EPSON スキャナー GT-F740 (フラットベッド/A4/4800dpi) \16,158 ET-2TRI-iE 2回線アナログ局線増設 IP-24N-ST101A NYC-18iE-SD(W) 中古8,800 18ボタン標準電話機 FK200-IEA 小規模オフィス向け電話システムを構築するVoIPルーター SR-60VN wget http://asterisk.hosting.lv/... tar xjf asterisk-g72x-1.4.tar.bz2 on Raspberry Pi 3 http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-14.6.0.tar.gz http://downloads.asterisk.org/pub/telephony/asterisk/releases/asterisk-addons-1.6.2.4.tar.gz http://downloads.asterisk.org/pub/telephony/asterisk/releases/asterisk-sounds-1.2.1.tar.gz http://downloads.asterisk.org/pub/telephony/asterisk/releases/libmidcom-0.2.0.tar.gz Nmap ("Network Mapper") nmap -T4 -A -v ----------------------------------------------------------------------------------- Asterisk 13.0.0が2014年10月24日(現地時間)リリースされました メンテナンス終了は2018年10月 dnf install libuuid-devel newt-devel sqlite-devel uuid-devel json-c-devel dnf install mysql-connector-odbc unixODBC unixODBC-devel libtool-ltdl-devel [root@lisa asterisk-13.17.0]# /usr/src/asterisk-13.17.0/contrib/scripts/get_mp3_source.sh リビジョン 202 をエクスポートしました。 ----------------------------------------------------------------------------------- # adduser -u 5000 asterisk -s /sbin/nologin -d /var/lib/asterisk # chown -R asterisk:asterisk /var/lib/asterisk # chown -R asterisk:asterisk /var/log/asterisk # chown -R asterisk:asterisk /var/run/asterisk # chown -R asterisk:asterisk /var/spool/asterisk # chmod -R u=rwX,g=rX,o= /var/lib/asterisk # chmod -R u=rwX,g=rX,o= /var/log/asterisk # chmod -R u=rwX,g=rX,o= /var/run/asterisk # chmod -R u=rwX,g=rX,o= /var/spool/asterisk # semanage fcontext -a -t FILE_TYPE 'asterisk' この FILE_TYPE は以下のいずれかになります: asterisk_log_t, asterisk_spool_t, asterisk_tmp_t, asterisk_tmpfs_t, asterisk_var_lib_t, asterisk_var_run_t, tmp_t, tmpfs_t, var_log_t, var_run_t, var_spool_t. 次に以下を実行してください: restorecon -v 'asterisk' semanage fcontext -a -t FILE_TYPE 'asterisk' semanage fcontext -a -t asterisk_var_lib_t "/var/lib/asterisk/(/.*)?" semanage fcontext -a -t asterisk_var_run_t "/var/run/asterisk/(/.*)?" semanage fcontext -a -t asterisk_spool_t "/var/spool/asterisk/(/.*)?" +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ https://www.amazon.co.jp/dp/B00SIS1SLQ?tag=blogosakananet-22&camp=1027&creative=7407&linkCode=as4&creativeASIN=B00SIS1SLQ&adid=0YAPJFDQ7782D6N27KXP& パナソニック デジタルコードレス電話機 親機のみ スマホ連動 Wi-Fi搭載 VE-GDW54D-W \9,356 12,379 19,428 Asterisk playback http://www.st-asterisk.com/archives/95 Asterisk基本設定ガイド! GSMファイルへの変換 Asteriskでサウンドファイルを使用するにはファイル形式がGSMである必要があります /var/lib/asterisk/sounds/en/Stacey_Raconte-moi.gsm High&Low the movie 映画 スピーシーズ4 新種覚醒 Species: The Awakening(2007) スピーシーズ3 禁断の種 Species III (2004) スピーシーズ2 Species II(1998) スペ―スバンパイア Space Vampire(1985) ディ―プブル―・ライジング (2016) ディープ・ライジング Shark Attack 2. 製作年, 2000 mp3プレイヤー mpg123をインストール Centos7 # yum install mpg123 audiofile esound-libs libtool-ltdl   audiofile.x86_64 1:0.2.6-11.1.el6   esound-libs.x86_64 1:0.2.41-3.1.el6   libtool-ltdl.x86_64 0:2.2.6-15.5.el6 makedir /var/lib/asterisk/mohmp3 && chmod 755 /var/lib/asterisk/mohmp3 Lenovo IdeaPad S205 (AMD E450, 2GB, OS無) SSLメールサーバ構築メモ Certbot+Postfix+Dovecot  /S-Documents-page17/423/certbot_postfix_dovecot.html IdeaPad S205 1038J2J AMD E350,1.6GHz,3GB Toshiba MK3265GSX(320GB,5400rpm,12ms,9.5mm,5,979円) Acronis Pass:NaaxeIdD NaaxeIdD yum --enablerepo=remi,epel install php71-php-mbstring ------------------------------------------------------------------ rack of asterisk confs dundi.conf queuerules.conf queues.conf extensions.ael cli_aliases.conf agents.conf pjsip_wizard.conf res_config_sqlite3.conf cel.conf**** cdr.conf**** udptl.conf** acl.conf**** --------------------------------------------------------------------- /var/lib/asterisk/ rasterisk -x "database show" ***************** Both sites also have an IAX trunk for outbound dialing which is working perfect to an IAX/SIP provider. Here is my trunk data. Outgoing Trunk Name: Site 1 Peer Details type=friend qualify=yes host=Site 1 IP address deny=all allow-ulaw context=from-internal ------------------------- Call from 'USERNAME' (XXX.XX.XXX.XX:5060) to extension '01234123412' rejected because extension not found in context 'from‐trunk' and if you do “dialplan show 01234123412@from-trunk” sure enough there is one. OUTBOUND [peername] username=USERNAME type=peer trustrpid=yes sendrpid=yes secret=PASSWORD qualify=no outboundproxy=sip.hostname.com nat=yes insecure=very host=sip.hostname.com fromdomain=sip.hostname.com dtmfmode=auto disallow=all context=from-trunk canreinvite=no allow=ulaw allow=alaw INBOUND [username] type=peer host=sip.hostname.com dtmfmode=auto disallow=all context=from-trunk canreinvite=no allow=ulaw allow=alaw ;registration string USERNAME:PASSWORD@peername/USERNAME --------------------------- GXP-1105 消費電力 1.5W ; GrandStream IP 電話 RTX1100 消費電力 6.5W RTX1210 消費電力 14.5W CP-7965G 消費電力 12.0W --------------------------- Introducing the Grandstream UCM6100 Grandstream UCM6202 チャイミー 松下 ドアホーン VL-SWD700KL チャイムセット OSC-26 オキシドール 500mL ------------------------------------------------------------------------ /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.mydns.jp -d www.uenda.mydns.jp -m auenda@uenda.mydns.jp --agree-tos Obtaining a new certificate Performing the following challenges: http-01 challenge for uenda.mydns.jp http-01 challenge for www.uenda.mydns.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges An unexpected error occurred: There were too many requests of a given type :: Error creating new cert :: too many certificates already issued for: mydns.jp Please see the logfiles in /var/log/letsencrypt for more details. ---------------------------------------------------------------------------- Obtaining a new certificate Performing the following challenges: http-01 challenge for uenda.mydns.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges An unexpected error occurred: There were too many requests of a given type :: Error creating new cert :: too many certificates already issued for: mydns.jp Please see the logfiles in /var/log/letsencrypt for more details. IMPORTANT NOTES: - Your account credentials have been saved in your Certbot configuration directory at /etc/letsencrypt. You should make a secure backup of this folder now. This configuration directory will also contain certificates and private keys obtained by Certbot so making regular backups of this folder is ideal. ------------------------------------------------------------------------------- /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -m auenda@uenda.pgw.jp --agree-tos Saving debug log to /var/log/letsencrypt/letsencrypt.log Obtaining a new certificate Performing the following challenges: http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for ast.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem Your cert will expire on 2017-11-15. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le --------------------------------------------------------------------------------------- http://olivia.uenda.pgw.jp/S-Documents-page17/423/certbot_postfix_dovecot.html SSLメールサーバ構築メモ Let's Encrypt+Postfix+Dovecot http://olivia.uenda.pgw.jp/S-Documents-page15/367/ApacheHTTP_2-PHP7-MySQL5.7.html Apache HTTP/2+PHP7+MySQL5.7 インストールメモ http://olivia.uenda.pgw.jp/S-Documents-page10/248/centos7_inst_bind.html CentOS 7.0 - DNS サーバ BIND 構築! http://olivia.uenda.pgw.jp/S-Documents-page15/367/CentOS7_xrdp.html CentOS 7 へリモートデスクトップ接続する (xrdp) ----------------------------------------------------------- https://support.microsoft.com/ja-jp/help/942031/-http-error-500-0-internal-server-error-error-when-you-you-open-an-iis IIS 7.0 の Web ページを開くと、"HTTP エラー 500.0 - 内部サーバー エラー" エラーが表示される inetmgr.exe -------------------------------------------------------------------------------- 00 05 30 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d olivia.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp --renew-by-default && /bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot --------------------------------------------------------------------- ///////////////////////////////////////// http://wataame.sumomo.ne.jp/archives/7071 Send failed Channel.Connect.Failed error NetConnection.Call.BadVersion: : url: 'https://www.exsample.com/gateway.php' yum list installed | grep maria yum --enablerepo=remi,epel list 17-418-4 LANG=C xdg-user-dirs-gtk-update mail_location = maildir:~/Maildir ======================================================================================================== Package アーキテクチャー バージョン リポジトリー 容量 ======================================================================================================== 削除中: ipa-client-common noarch 4.4.0-14.el7.centos.7 @updates 44 k 依存性関連での削除をします: ipa-client x86_64 4.4.0-14.el7.centos.7 @updates 359 k python2-ipaclient noarch 4.4.0-14.el7.centos.7 @updates 7.4 M ------------------------------------------------------------------------------------ ********************************************************* Centos7 HDD format 1TB sd1 BiosBoot 128MiB sd2 /boot Btrfs Btrfs 1024MiB / LVM xfs 926.88GiB swap LVM swap 3584MiB ---------------- 残 3712.68KiB --------------------------------------------------------- https://www.uenda.pgw.jp/S-Documents-page17/418/centos7-mariadb-install.html CentOS 7 : MariaDB インストール、及び初期設定 http://server.etutsplus.com/how-to-use-mariadb/ MariaDB テーブル管理、バックアップ等の基本操作コマンド ------------------------------------------ logwatchのメールを送ってみる。 # /etc/cron.daily/0logwatch # firewall-cmd --reload Apple Network e835d7 Apple Network e835e8 Apple Network e835f9 http://www.routerlogin.net/ -------------------------------------------- 2017/08/30 AU 照子の携帯解約 -------------------------------------------- You access NEWYORK server from 10.13.170.91 10.13.170.91 #print "$ENV{'SERVER_NAME'}"; print "from "; print "$ENV{'REMOTE_ADDR'}"; #//Client IP Address --------------------------------------------- [root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp --renew-by-default Saving debug log to /var/log/letsencrypt/letsencrypt.log Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for ast.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem Your cert will expire on 2017-12-01. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@lisa ~]# --------------------------------------------------------------------------------------------- IN NS ns.uenda.pgw.jp. IN MX 10 uenda.pgw.jp. @ IN A 210.154.137.47 ns IN A 210.154.137.47 mail IN A 210.154.137.47 www IN A 210.154.137.47 ast IN A 210.154.137.47 git IN A 210.154.137.47 olivia IN A 210.154.137.47 lisa IN A 210.154.137.47 stacey IN A 210.154.137.47 uenda.pgw.jp. IN TXT "v=spf1 ip4:210.154.137.47 ~all" ----------------------------------------------------------------- [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "EnableLinkedConnections"=dword:00000001 ----------------------------------------------------------------- mklink /D \\192.168.116.196\video6\Popcorn\World C:\Users\User\AppData\Local\Temp\Popcorn-Time mklink /D C:\Users\auenda\AppData\Local\Temp\Popcorn-Time \\192.168.116.196\video6\Popcorn-Time http://www.dell.com/support/home/us/en/04/product-support/product/latitude-e6230/drivers https://www.intel.com/content/www/us/en/support/detect.html?iid=dc_iduu [root@stacey ~]# yum update 読み込んだプラグイン:fastestmirror, langpacks Could not retrieve mirrorlist http://mirrorlist.centos.org/?release=7&arch=x86_64&repo=os&infra=stock error was 14: curl#6 - "Could not resolve host: mirrorlist.centos.org; 不明なエラー" One of the configured repositories failed (不明), and yum doesn't have enough cached data to continue. At this point the only safe thing yum can do is fail. There are a few ways to work "fix" this: 1. Contact the upstream for the repository and get them to fix the problem. 2. Reconfigure the baseurl/etc. for the repository, to point to a working upstream. This is most often useful if you are using a newer distribution release than is supported by the repository (and the packages for the previous distribution release still work). 3. Run the command with the repository temporarily disabled yum --disablerepo= ... 4. Disable the repository permanently, so yum won't use it by default. Yum will then just ignore the repository until you permanently enable it again or use --enablerepo for temporary usage: yum-config-manager --disable or subscription-manager repos --disable= 5. Configure the failing repository to be skipped, if it is unavailable. Note that yum will try to contact the repo. when it runs most commands, so will have to try and fail each time (and thus. yum will be be much slower). If it is a very temporary problem though, this is often a nice compromise: yum-config-manager --save --setopt=.skip_if_unavailable=true Cannot find a valid baseurl for repo: base/7/x86_64 [root@stacey ~]# LANG=C xdg-user-dirs-gtk-update # 日本語キーマップを変更 $ cd /etc/xrdp $ sudo wget http://www.mail-archive.com/xrdp-devel@lists.sourceforge.net/msg00263/km-e0010411.ini $ sudo mv km-e0010411.ini km-0411.ini $ sudo ln -s km-0411.ini km-e0010411.ini $ sudo ln -s km-0411.ini km-e0200411.ini $ sudo ln -s km-0411.ini km-e0210411.ini Like A Prayer Release year: 1989 Genre: Pop, Contemporary Pop Like A Virgin Release year: 1984 Genre: Pop, Contemporary Pop Madonna Millenium 2013 music 2000 Genre Electropopdance-pop ----------*************************------------ /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp --renew-by-default && /bin/systemctl reload postfix && /bin/systemctl reload dovecot & & /bin/systemctl reload httpd -------------************************------------ ------------------------- 2017/09/21 --------------------------- [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp --renew-by-default Upgrading certbot-auto 0.18.1 to 0.18.2... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for ast.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem Your cert will expire on 2017-12-20. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# *************************** crontab -e ***************************** 00 05 20 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default && /bin/systemctl reload postfix && /bin/systemctl reload dovecot && /bin/systemctl reload httpd **************************************************************************** restorecon reset /usr/local/letsencrypt/letsencrypt-auto context unconfined_u:object_r:user_tmp_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/ca context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/ca/my-root-ca.crt.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/ca/my-root-ca.key.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/ca/my-root-ca.srl context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost/cert.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost/localhost.csr.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost/privkey.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost/server.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0 -------------------------------------------------------------------------------------------- .htaccess RewriteEngine On RewriteCond %{HTTPS} off RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [R,L] もとのURLのページ評価を引き継ぎたい場合は、301リダイレクトにする必要があります。 RewriteEngine on RewriteCond %{HTTPS} off RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [R=301,L] ---------------------------------------------------------------------- example.com.      IN MX 10 mail.example.com. mail.example.com. IN A 192.0.2.1 ------------ firewall-cmd --add-port=25/tcp --permanent firewall-cmd --add-port=465/tcp --permanent firewall-cmd --add-port=993/tcp --permanent firewall-cmd --add-port=995/tcp --permanent firewall-cmd --add-port=80/tcp --permanent firewall-cmd --add-port=443/tcp --permanent firewall-cmd --reload firewall-cmd --list-ports 22/tcp 25/tcp 465/tcp 995/tcp 993/tcp -------------------------------------- ルックアップテーブルの作成 postmap /etc/postfix/access 設定に誤りがないかチェック(なにも表示されなければOKです) postfix check Postfixの起動 systemctl start postfix systemctl enable postfix [root@centos]# vi /usr/lib/systemd/system/diced.service   <--- 入力  以下新規記述 [Unit] Description=The DiCE Server After=network.target remote-fs.target nss-lookup.target [Service] Type=notify ExecStart=/usr/local/DiCE/diced -d -l ExecReload=/usr/local/DiCE/diced $OPTIONS ExecStop=/usr/local/DiCE/diced $OPTIONS RemainAfterExit=yes PrivateTmp=true [Install] WantedBy=multi-user.target ----------------------------------------------------------------------------- [root@centos]# systemctl --system daemon-reload   <--- 入力 ==================================================================== # yum install mod_perl smtp_host_lookup netstat -at --numeric-port | grep 10023 # 認証を通過したものはリレーを許可する(permit_sasl_authenticated) smtpd_recipient_restrictions = permit_mynetworks, permit_sasl_authenticated, reject_unauth_destination, check_policy_service inet:127.0.0.1:10023 --------------------------------------------------------------- ssh-keygen -t dsa -N "" scp -P 22 .ssh/id_dsa.pub 192.168.116.103:/root/.ssh/authorized_keys2 scp -P 22 .ssh/id_dsa.pub 192.168.116.108:/Users/auenda/.ssh/authorized_keys2 XX --------------------------------------------------------------- http://ufuso.jp/wp/centos-7-%e3%81%a7%e8%87%aa%e5%ae%85%e3%82%b5%e3%83%bc%e3%83%90%e3%83%bc%e3%82%92%e5%88%a5pc%e3%81%aeusb%e5%a4%96%e4%bb%98%e3%83%8f%e3%83%bc%e3%83%89%e3%83%87%e3%82%a3%e3%82%b9%e3%82%af%e3%81%ab/ CentOS 7 で自宅サーバーを別PCのUSB外付ハードディスクに毎晩自動バックアップ(rsync+ssh) 2015-02-13 yum -y install cronie-noanacron Rsyncd は 873/tcp を使用する。 ************ 2017/10/01 ********************************************** [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for ast.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem Your cert will expire on 2017-12-30. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ***************************************************************************** [root@madonna ~]# yum -y install gitlab-ce Loaded plugins: fastestmirror, langpacks Loading mirror speeds from cached hostfile * base: ftp.nara.wide.ad.jp * epel: ftp.jaist.ac.jp * extras: ftp.nara.wide.ad.jp * updates: ftp.nara.wide.ad.jp Resolving Dependencies --> Running transaction check ---> Package gitlab-ce.x86_64 0:10.0.2-ce.0.el7 will be installed --> Finished Dependency Resolution Dependencies Resolved ========================================================================================================= Package Arch Version Repository Size ========================================================================================================= Installing: gitlab-ce x86_64 10.0.2-ce.0.el7 gitlab_gitlab-ce 343 M Transaction Summary ========================================================================================================= Install 1 Package Total download size: 343 M Installed size: 1.0 G Downloading packages: warning: /var/cache/yum/x86_64/7/gitlab_gitlab-ce/packages/gitlab-ce-10.0.2-ce.0.el7.x86_64.rpm: Header V4 RSA/SHA1 Signature, key ID f27eab47: NOKEY Public key for gitlab-ce-10.0.2-ce.0.el7.x86_64.rpm is not installed gitlab-ce-10.0.2-ce.0.el7.x86_64.rpm | 343 MB 00:01:06 Retrieving key from https://packages.gitlab.com/gitlab/gitlab-ce/gpgkey Importing GPG key 0xE15E78F4: Userid : "GitLab B.V. (package repository signing key) " Fingerprint: 1a4c 919d b987 d435 9396 38b9 1421 9a96 e15e 78f4 From : https://packages.gitlab.com/gitlab/gitlab-ce/gpgkey Retrieving key from https://packages.gitlab.com/gitlab/gitlab-ce/gpgkey/gitlab-gitlab-ce-3D645A26AB9FBD22.pub.gpg Importing GPG key 0xF27EAB47: Userid : "GitLab, Inc. " Fingerprint: dbef 8977 4ddb 9eb3 7d9f c3a0 3cfc f9ba f27e ab47 From : https://packages.gitlab.com/gitlab/gitlab-ce/gpgkey/gitlab-gitlab-ce-3D645A26AB9FBD22.pub.gpg Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : gitlab-ce-10.0.2-ce.0.el7.x86_64 [####################### ] 1/17 I Installing : gitlab-ce-10.0.2-ce.0.el7.x86_64 1/1 It looks like GitLab has not been configured yet; skipping the upgrade script. *. *. *** *** ***** ***** .****** ******* ******** ******** ,,,,,,,,,***********,,,,,,,,, ,,,,,,,,,,,*********,,,,,,,,,,, .,,,,,,,,,,,*******,,,,,,,,,,,, ,,,,,,,,,*****,,,,,,,,,. ,,,,,,,****,,,,,, .,,,***,,,, ,*,. _______ __ __ __ / ____(_) /_/ / ____ _/ /_ / / __/ / __/ / / __ \`/ __ \ / /_/ / / /_/ /___/ /_/ / /_/ / \____/_/\__/_____/\__,_/_.___/ Thank you for installing GitLab! GitLab was unable to detect a valid hostname for your instance. Please configure a URL for your GitLab instance by setting `external_url` configuration in /etc/gitlab/gitlab.rb file. Then, you can start your GitLab instance by running the following command: sudo gitlab-ctl reconfigure For a comprehensive list of configuration options please see the Omnibus GitLab readme https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/README.md Verifying : gitlab-ce-10.0.2-ce.0.el7.x86_64 1/1 Installed: gitlab-ce.x86_64 0:10.0.2-ce.0.el7 Complete! *************************************************************************************** [root@madonna ~]# cp -ip /etc/gitlab/gitlab.rb /etc/gitlab/gitlab.rb.org # gitlab-ctl reconfigure ----15分ごとに実行する場合--------------------------------------------- */15 * * * * /usr/bin/systemctl restart lsyncd ---- 1時間ごとに実行する --------------------------- 00 0-23/1 * * * ========================================================== https://centos.pkgs.org/7/lux/cacti-spine-1.1.19-1.el7.lux.x86_64.rpm.html cacti-spine-1.1.19-1.el7.lux.x86_64.rpm Download the latest lux-release rpm from http://repo.iotti.biz/CentOS/7/noarch/ Install lux-release rpm: # rpm -Uvh lux-release-7-1.noarch.rpm Install cacti-spine rpm package: # yum install cacti-spine --------------------------------------------------------------------------- --------------- MyDNS に DDNS の通知 --------------------------------------- ①. MyDNS.jpへの通知用スクリプトを作る → mydns.sh sudo nano /root/mydns.sh #!/bin/sh # mydns.JP /usr/bin/wget -o /var/log/mydns.log 'https://mydnsID:mydnsPASS@www.mydns.jp/login.html' ②. cronの設定ファイルに追記 sudo crontab -e 00 05 * * * /usr/bin/run-parts /root/mydns.sh ③. スクリプトに実行権限を与える sudo chmod +x /root/mydns.sh ④. 実際に使ってみる /root/mydns.sh ------------------------------------------------------------------------- ------------------------------------------------------------------------- [***** ~]# yum list | grep wget [root@madonna ~]# cd /etc/logrotate.d/ [root@madonna logrotate.d]# logrotate -dv mydnslog # -dをつけてdry-runをして結果を見る [root@madonna logrotate.d]# logrotate -fv mydnslog # ローテートする条件を満たしていなくても強制的に実行する場合は-fを付ける ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ $ vi /etc/logrotate.d/sample-service /etc/logrotate.d/sample-service /var/log/sample-service/sample.log { # 対象のログファイル ifempty # ログファイルが空でもローテーションする dateformat .%Y%m%d # dateフォーマットを任意のものに変更する missingok # ログファイルがなくてもエラーを出さない compress # 圧縮する daily # 毎日ローテートする rotate 10 # 10世代分古いログを残す postrotate # ローテート後にsyslogを再起動 /bin/kill -HUP `cat /var/run/syslogd.pid 2> /dev/null` 2> /dev/null || true endscript } ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 自ドメインのDNSサーバーのTXTレコード▼に、メールサーバーのIPアドレスを登録▼するだけでよい。 メールサーバーが複数ある場合には、IPアドレスを列挙する。 example.jp. IN TXT "v=spf1 +ip4:203.0.11.1 -all" --------------------------------------------------------------- 00 00 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@www.mydns.jp/login.html' ----------- [root@madonna ~]# cat /var/log/mydnslog/log --2017-10-12 00:00:02-- https://mydns985090:*password*@www.mydns.jp/login.html Resolving www.mydns.jp (www.mydns.jp)... 163.44.151.204, 168.235.77.133, 107.191.96.221, ... Connecting to www.mydns.jp (www.mydns.jp)|163.44.151.204|:443... connected. HTTP request sent, awaiting response... 401 Authorization Required Reusing existing connection to www.mydns.jp:443. HTTP request sent, awaiting response... 200 OK Length: 612 [text/html] Saving to: ‘login.html.1’ 0K 100% 3.95M=0s 2017-10-12 00:00:04 (3.95 MB/s) - ‘login.html.1’ saved [612/612] [root@madonna ~]# --------------------------------------------------------------- [root@madonna ~]# ls /var/log/mydnslog/ log log-20171010 --------------------------------------------------------------- # apachectl -M | grep cgi <--- は、ロードされたモジュールの一覧を表示するコマンドです Creative SB AVStream Monitoring Launcher". SBAVMonL.dll Windows.oldのSystem32フォルダ下の「sbavmon.dll」をWindowsのSystem32フォルダ下へコピー http://www.isiro.net/isrwps/2016/07/24/%E8%87%AA%E4%BD%9Cpc%E8%A8%88%E7%94%BBwindows10%E3%81%B8%E3%81%AE%E3%82%A2%E3%83%83%E3%83%97%E3%82%B0%E3%83%AC%E3%83%BC%E3%83%89/ ============================================================ java mac Property name="yearIsDateType" でエラー http://www.task-notes.com/entry/20151004/1443951543 2015/10/04 -------------------- http://cs.wellesley.edu/~cs304/jdbc/connector-j.html JDBC / connector-j ------------------------------------------------------- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/jjdk8u-67122a315e79.tar.gz curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/corba/archive/jdk8u172-b03.tar.gz curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/hotspot/archive/jdk8u172-b03.tar.gz curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/archive/jdk8u172-b03.tar.gz curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/jaxws/archive/jdk8u172-b03.tar.gz curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/jaxp/archive/jdk8u172-b03.tar.gz curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/langtools/archive/jdk8u172-b03.tar.gz curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/nashorn/archive/jdk8u172-b03.tar.gz curl -OL http://hg.openjdk.java.net/openjfx/8u/rt/archive/8u172-b03.tar.gz curl -OL https://downloads.gradle.org/distributions/gradle-1.8-bin.zip --------------------------------------------------------------------------- -------------------------------------------------- tar xvzf eclipse-jee-oxygen-3-linux-gtk-x86_64.tar.gz -C /opt ++++++++++++++++++++++ [Desktop Entry] Version=1.0 Name=Eclipse Oxygen SR3 Name[ja]=Eclipse Oxygen SR3 Comment=Eclipse Oxygen Comment[ja]=Eclipse Oxygen Exec=/opt/eclipse/eclipse Icon=/opt/eclipse/icon.xpm Terminal=false Type=Application Categories=Development; ++++++++++++++++++++++ ---------------------------------------------- Caused by: java.lang.UnsatisfiedLinkError: Can't load library: /usr/local/jvm/openjdk-1.8.0_172/jre/lib/amd64/libjfxmedia.so ---------------------------------------------------- Caused by: MediaException: UNKNOWN : com.sun.media.jfxmedia.MediaException: Could not create player! : com.sun.media.jfxmedia.MediaException: Could not create player! -----------------------------------------------2018/04/12 : 00 03 11 * * certbot renew --quiet && /bin/systemctl reload postfix && /bin/systemctl reload dovecot && /bin/systemctl reload httpd 00 05 * * * /opt/gitlab/bin/gitlab-rake gitlab:backup:create CRON=1 00 00 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@www.mydns.jp/login.html' ================================================================================================================= [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Upgrading certbot-auto 0.21.1 to 0.23.0... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate Performing the following challenges: http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for ast.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem Your cert will expire on 2018-07-10. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le ========================================================================================== [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Upgrading certbot-auto 0.30.0 to 0.33.1... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Obtaining a new certificate Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem Your cert will expire on 2019-07-18. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# Spiderストレージエンジンのインストール? https://downloads.mariadb.org/mariadb/repositories/#mirror=yamagata-university&distro=CentOS&distro_release=centos7-amd64--centos7&version=10.3 curl -O http://ftp.yz.yamagata-u.ac.jp/pub/network/apache/tomcat/tomcat-9/v9.0.20/bin/apache-tomcat-9.0.20.tar.gz tar xvzf apache-tomcat-9.0.20.tar.gz -C /opt ln -s /opt/apache-tomcat-9.0.20 /opt/apache-tomcat chown -R tomcat:tomcat /opt/apache-tomcat-9.0.20 ---------------------------------------------------- [auenda@ast ~]$ java -jar xTunes-v9.5.5.4.jar Exception in thread "main" java.lang.NoClassDefFoundError: javafx/application/Application at java.lang.ClassLoader.defineClass1(Native Method) at java.lang.ClassLoader.defineClass(ClassLoader.java:763) at java.security.SecureClassLoader.defineClass(SecureClassLoader.java:142) at java.net.URLClassLoader.defineClass(URLClassLoader.java:468) at java.net.URLClassLoader.access$100(URLClassLoader.java:74) at java.net.URLClassLoader$1.run(URLClassLoader.java:369) at java.net.URLClassLoader$1.run(URLClassLoader.java:363) at java.security.AccessController.doPrivileged(Native Method) at java.net.URLClassLoader.findClass(URLClassLoader.java:362) at java.lang.ClassLoader.loadClass(ClassLoader.java:424) at java.lang.ClassLoader.loadClass(ClassLoader.java:357) at java.lang.Class.forName0(Native Method) at java.lang.Class.forName(Class.java:348) at org.eclipse.jdt.internal.jarinjarloader.JarRsrcLoader.main(JarRsrcLoader.java:56) Caused by: java.lang.ClassNotFoundException: javafx.application.Application at java.net.URLClassLoader.findClass(URLClassLoader.java:382) at java.lang.ClassLoader.loadClass(ClassLoader.java:424) at java.lang.ClassLoader.loadClass(ClassLoader.java:357) ... 14 more [auenda@ast ~]$ ------------------------------------ [root@madonna ~]# semodule -i my-local.pp [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem Your cert will expire on 2019-09-16. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# -------------------------------------------------------- [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Upgrading certbot-auto 0.35.1 to 0.38.0... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem Your cert will expire on 2019-12-15. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le ========================================================================================= Installing pdsh is really simple, please follow blow steps 4) After complete make install ... Cold front and warm front collide howie · How to convert percents into decimals ... PDSH seems to be completely missing from EPEL now, for CentOS 7. ---------------------------------------------------------------------------- 00 00 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@www.mydns.jp/login.html' ---------------------------------------------------------------------------------------------------------------- ======================================================================== fess install---------------------- Javaのインストール wget https://download.java.net/java/GA/jdk11/9/GPL/openjdk-11.0.2_linux-x64_bin.tar.gz tar xzvf openjdk-11.0.2_linux-x64_bin.tar.gz mv jdk-11.0.2 /opt/ alternatives --install /usr/bin/java java /opt/jdk-11.0.2/bin/java 1 alternatives --install /usr/bin/jar jar /opt/jdk-11.0.2/bin/jar 1 alternatives --install /usr/bin/javac javac /opt/jdk-11.0.2/bin/javac 1 java -version ----------------------------------------------------jdk-11.0.5+10 ****** alternatives --install /usr/bin/java java /opt/jdk-11.0.5/bin/java 1 alternatives --install /usr/bin/jar jar /opt/jdk-11.0.5/bin/jar 1 alternatives --install /usr/bin/javac javac /opt/jdk-11.0.5/bin/javac 1 alternatives --config java ---------------------------------------------------- Elasticsearchのインストール yum -y install perl-Digest-SHA wget https://artifacts.elastic.co/downloads/elasticsearch/elasticsearch-7.3.0-x86_64.rpm wget https://artifacts.elastic.co/downloads/elasticsearch/elasticsearch-7.3.0-x86_64.rpm.sha512 shasum -a 512 -c elasticsearch-7.3.0-x86_64.rpm.sha512 rpm --install elasticsearch-7.3.0-x86_64.rpm ------------------------------------------------------ Fessで必要なプラグインを以下でインストール 7.1.0 /usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-analysis-fess:7.3.0 /usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-analysis-extension:7.3.0 /usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-configsync:7.3.0 /usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-dataformat:7.3.0 /usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-minhash:7.3.0 ----------------------------------------------------- 設定ファイルに以下の行を追加 vi /etc/elasticsearch/elasticsearch.yml --------------------------- 以下を追加 configsync.config_path: /var/lib/elasticsearch/config ---------------------------------------------------- 起動の設定 systemctl daemon-reload systemctl enable elasticsearch.service systemctl start elasticsearch.service --------------------------------------------------- Fessのインストール wget https://github.com/codelibs/fess/releases/download/fess-13.3.0/fess-13.3.0.rpm # rpm --install fess-13.3.0.rpm また、起動の設定を以下で行います。 # systemctl daemon-reload # systemctl enable fess.service # systemctl start fess.service 1 2 3 4 5 # systemctl daemon-reload # systemctl enable fess.service # systemctl start fess.service 「systemctl status fess.service」などで起動の状態を確認します。 RPMでのインストールではJavaのバージョンなどでうまく起動しないことがあります。 画面での確認 Fessを起動すると8080のポートでHTTPでの接続が行えます。 外部からの接続の時には8080ポートを開けておく必要があります。 接続すると以下の画面となります。 上にある「ログイン」 から管理画面にアクセスが可能です。 初期でのパスワードは「admin / admin」になります。 管理画面にログインして様々な設定を行うことができます。 サジェストなどの登録もこちらから行えます。 関連記事 機械学習のfastTextをCentOS7環境のPython3を使って20万件の文章分類を実施してみる(mecabを利用) 機械学習のfastTextをCentOS7環境のPython3を使って20万件の文章分類を実施してみる(mecabを利用) CentOS7にZABBIX Agentのインストール CentOS7にZABBIXサーバのインストール CentOS7のPython3でJUMAN++のインストールと利用 CentOS7のPython3でJUMAN++のインストールと利用 CentOS7のPython3でMeCabのmecab-ipadic-neologdのインストールと利用 CentOS7のPython3でMeCabのmecab-ipadic-neologdのインストールと利用 CentOS環境の python3.6(pyenv環境)で Scrapy を利用してみる(Scrapy その1) 技術ブログ 環境構築 CentOSFESS全文検索 ツイート シェア はてブ Google+ Pocket feedly 機械学習のfastTextをCentOS7環境のPython3を使って20万件の文章分類を実施してみる(mecabを利用) python-twitterのライブラリを使用して、pythonでtwitterのAPIを操作 RECOMMENDこちらの記事も人気です。 Python 2018.12.18 pythonを使ってmongodbの操作 Elasticsearch 2018.10.11 さくらVPS の CentOS7 サーバに Elasticsearch … Python 2018.12.12 Scrapyでデータ取得でクローリングで取得したURLから検索する(Sc… サーバインフラ構築 2018.9.4 CentOS6 + Apache2 を無料のSSL「Let's Encr… サーバインフラ構築 2018.12.15 CentOS7系でmongodb4.0のインストール GCP 2019.3.29 Pythonでのgoogle-cloud-bigqueryライブラリを利… Elasticsearch 2018.8.13 Elasticsearch 6 を使ったデータ検証 その3(bulkでデ… GCP 2018.11.13 Google Cloud Platform を Cloud SDKで設定… 最近の投稿 Firefoxの「RESTClient」からPOSTの値の送信 CentOS6にZABBIX Agentのインストール CentOS7にSwaggerのインストール ZABBIXのアラートをSlackに飛ばす CentOS7にZABBIX Agentのインストール カテゴリー Ajax AWS Django Elasticsearch GCP Mahout Python RubyOnRails Scrapy アンチパターン サーバインフラ構築 その他 勉強会 技術ブログ 機械学習 環境構築 開発環境構築 開発言語 ------------------------------------------------------------------------------ [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Upgrading certbot-auto 0.38.0 to 1.0.0... Replacing certbot-auto... Creating virtual environment... Installing Python packages... +Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem Your cert will expire on 2020-03-14. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [ ------------------------------------------------------------------------------ [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Upgrading certbot-auto 1.0.0 to 1.3.0... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem Your cert will expire on 2020-06-02. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le ============================================================================== crontab -e 00 00 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@www.mydns.jp/login.html' --------------------------------------------------- ============================================================================== [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Upgrading certbot-auto 1.3.0 to 1.4.0... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem Your cert will expire on 2020-08-13. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le ---------------------------------------------------------------------- ==================================================================================================== [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Upgrading certbot-auto 1.5.0 to 1.6.0... Replacing certbot-auto... Creating virtual environment... Installing Python packages... Installation succeeded. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem Your cert will expire on 2020-10-31. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ---------------------------------------------------------------------------------------------------- ==================================================================================================== [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --nginx -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d mail.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@m-cn.ne.jp Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator nginx, Installer nginx Obtaining a new certificate Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using default address 80 for authentication. Using default address 80 for authentication. Using default address 80 for authentication. Using default address 80 for authentication. Using default address 80 for authentication. Using default address 80 for authentication. Using default address 80 for authentication. nginx: [error] invalid PID number "" in "/var/run/nginx.pid" Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0003/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0003/privkey.pem Your cert will expire on 2020-12-27. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ============================================================================================= [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --nginx -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -d julie.uenda.pgw.jp -m auenda@m-cn.ne.jp Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator nginx, Installer nginx Cert is due for renewal, auto-renewing... Renewing an existing certificate Performing the following challenges: http-01 challenge for git.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp Using default address 80 for authentication. Using default address 80 for authentication. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem Your cert will expire on 2021-01-02. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ======================================================================================================== https://mevius.5ch.net/test/read.cgi/avi/1549446744/524-n SoftCas Part20 ----------------------------------------------------------- ======================================================================================================== [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Obtaining a new certificate Performing the following challenges: http-01 challenge for git.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0004/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0004/privkey.pem Your cert will expire on 2021-02-01. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ==================================================================================== [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto Your system is not supported by certbot-auto anymore. certbot-auto and its Certbot installation will no longer receive updates. You will not receive any bug fixes including those fixing server compatibility or security problems. Please visit https://certbot.eff.org/ to check for other alternatives. Saving debug log to /var/log/letsencrypt/letsencrypt.log How would you like to authenticate and install certificates? - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1: Apache Web Server plugin (apache) 2: Nginx Web Server plugin (nginx) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 1 Plugins selected: Authenticator apache, Installer apache Which names would you like to activate HTTPS for? - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1: uenda.pgw.jp - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Select the appropriate numbers separated by commas and/or spaces, or leave input blank to select all options shown (Enter 'c' to cancel): 1 Requesting a certificate for uenda.pgw.jp Performing the following challenges: http-01 challenge for uenda.pgw.jp Waiting for verification... Cleaning up challenges Created an SSL vhost at /etc/httpd/conf/httpd-le-ssl.conf Deploying Certificate to VirtualHost /etc/httpd/conf/httpd-le-ssl.conf Enabling site /etc/httpd/conf/httpd-le-ssl.conf by adding Include to root configuration Redirecting vhost in /etc/httpd/conf/httpd.conf to ssl vhost in /etc/httpd/conf/httpd-le-ssl.conf - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Congratulations! You have successfully enabled https://uenda.pgw.jp - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0005/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0005/privkey.pem Your cert will expire on 2021-05-06. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again with the "certonly" option. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Your system is not supported by certbot-auto anymore. certbot-auto and its Certbot installation will no longer receive updates. You will not receive any bug fixes including those fixing server compatibility or security problems. Please visit https://certbot.eff.org/ to check for other alternatives. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Requesting a certificate for uenda.pgw.jp and 9 more domains Performing the following challenges: http-01 challenge for git.uenda.pgw.jp http-01 challenge for julie.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem Your cert will expire on 2021-08-14. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ----------------------------------------------------------------------------------------------------------- ------------- Tomcat css ---------------------2021/05/19--------------------------- ----------------------------------------------------------------------------------------------------------- openssl pkcs12 -export -in cert.pem -inkey privkey.pem -certfile chain.pem -out pkcs12.pfx -passout pass:changeit openssl pkcs12 -export -in /etc/letsencrypt/live/uenda.pgw.jp-0006/cert.pem -inkey /etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem -certfile /etc/letsencrypt/live/uenda.pgw.jp-0006/chain.pem -out pkcs12.pfx -passout pass:changeit ----------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------- Timeout while waiting for app reactivation ------------------------------------------------ =============================================================================================== SLF4J: Class path contains multiple SLF4J bindings. SLF4J: Found binding in [jar:file:/C:/Users/auenda/.p2/pool/plugins/org.eclipse.m2e.maven.runtime.slf4j.simple_1.18.0.20210402-1458/jars/slf4j-simple-1.7.5.jar!/org/slf4j/impl/StaticLoggerBinder.class] SLF4J: Found binding in [file:/C:/eclipse/jee-2021-06/eclipse/configuration/org.eclipse.osgi/6/0/.cp/org/slf4j/impl/StaticLoggerBinder.class] SLF4J: See http://www.slf4j.org/codes.html#multiple_bindings for an explanation. SLF4J: Actual binding is of type [org.slf4j.impl.SimpleLoggerFactory] SLF4J: Class path contains multiple SLF4J bindings. SLF4J: Found binding in [jar:file:/C:/Users/auenda/.p2/pool/plugins/org.eclipse.m2e.maven.runtime.slf4j.simple_1.18.0.20210402-1458/jars/slf4j-simple-1.7.5.jar!/org/slf4j/impl/StaticLoggerBinder.class] SLF4J: Found binding in [file:/C:/eclipse/jee-2021-06/eclipse/configuration/org.eclipse.osgi/6/0/.cp/org/slf4j/impl/StaticLoggerBinder.class] SLF4J: See http://www.slf4j.org/codes.html#multiple_bindings for an explanation. SLF4J: Actual binding is of type [org.slf4j.impl.SimpleLoggerFactory] [INFO] Scanning for projects... [INFO] [INFO] -------------------------< xTunesNginx:xtunes >------------------------- [INFO] Building xtunes 0.0.1-SNAPSHOT [INFO] --------------------------------[ jar ]--------------------------------- [INFO] [INFO] --- maven-resources-plugin:2.6:resources (default-resources) @ xtunes --- [INFO] Using 'UTF-8' encoding to copy filtered resources. [INFO] Copying 51 resources [INFO] [INFO] --- maven-compiler-plugin:3.8.1:compile (default-compile) @ xtunes --- [INFO] Changes detected - recompiling the module! [INFO] Compiling 59 source files to C:\sdk\mServweb2\xTunesVNginxS\target\classes [INFO] [INFO] --- maven-resources-plugin:2.6:testResources (default-testResources) @ xtunes --- [INFO] Using 'UTF-8' encoding to copy filtered resources. [INFO] skip non existing resourceDirectory C:\sdk\mServweb2\xTunesVNginxS\src\test\resources [INFO] [INFO] --- maven-compiler-plugin:3.8.1:testCompile (default-testCompile) @ xtunes --- [INFO] Changes detected - recompiling the module! [INFO] [INFO] --- maven-surefire-plugin:2.12.4:test (default-test) @ xtunes --- [INFO] [INFO] --- maven-jar-plugin:2.4:jar (default-jar) @ xtunes --- [INFO] Building jar: C:\sdk\mServweb2\xTunesVNginxS\target\xtunes-0.0.1-SNAPSHOT.jar [INFO] [INFO] --- maven-shade-plugin:3.2.3:shade (default) @ xtunes --- [INFO] Including org.slf4j:slf4j-api:jar:1.7.31 in the shaded jar. [INFO] Including org.slf4j:jul-to-slf4j:jar:1.7.31 in the shaded jar. [INFO] Including org.apache.commons:commons-lang3:jar:3.12.0 in the shaded jar. [INFO] Including io.socket:engine.io-client:jar:2.0.0 in the shaded jar. [INFO] Including com.squareup.okhttp3:okhttp:jar:3.12.12 in the shaded jar. [INFO] Including com.squareup.okio:okio:jar:1.15.0 in the shaded jar. [INFO] Including org.json:json:jar:20090211 in the shaded jar. [INFO] Including com.fasterxml.jackson.core:jackson-annotations:jar:2.12.3 in the shaded jar. [INFO] Including com.fasterxml.jackson.core:jackson-core:jar:2.12.3 in the shaded jar. [INFO] Including com.fasterxml.jackson.core:jackson-databind:jar:2.12.3 in the shaded jar. [INFO] Including com.google.code.gson:gson:jar:2.8.7 in the shaded jar. [INFO] Including org.jboss.spec.javax.ws.rs:jboss-jaxrs-api_2.1_spec:jar:2.0.1.Final in the shaded jar. [INFO] Including io.quarkus:quarkus-jaxp:jar:2.0.0.CR3 in the shaded jar. [INFO] Including io.quarkus:quarkus-core:jar:2.0.0.CR3 in the shaded jar. [INFO] Including jakarta.annotation:jakarta.annotation-api:jar:1.3.5 in the shaded jar. [INFO] Including jakarta.enterprise:jakarta.enterprise.cdi-api:jar:2.0.2 in the shaded jar. [INFO] Including jakarta.el:jakarta.el-api:jar:3.0.3 in the shaded jar. [INFO] Including jakarta.interceptor:jakarta.interceptor-api:jar:1.2.5 in the shaded jar. [INFO] Including jakarta.ejb:jakarta.ejb-api:jar:3.2.6 in the shaded jar. [INFO] Including jakarta.transaction:jakarta.transaction-api:jar:1.3.2 in the shaded jar. [INFO] Including jakarta.inject:jakarta.inject-api:jar:1.0 in the shaded jar. [INFO] Including io.quarkus:quarkus-ide-launcher:jar:2.0.0.CR3 in the shaded jar. [INFO] Including io.quarkus:quarkus-development-mode-spi:jar:2.0.0.CR3 in the shaded jar. [INFO] Including io.smallrye.config:smallrye-config:jar:2.3.0 in the shaded jar. [INFO] Including io.smallrye.config:smallrye-config-core:jar:2.3.0 in the shaded jar. [INFO] Including org.eclipse.microprofile.config:microprofile-config-api:jar:2.0 in the shaded jar. [INFO] Including io.smallrye.common:smallrye-common-annotation:jar:1.6.0 in the shaded jar. [INFO] Including io.smallrye.common:smallrye-common-expression:jar:1.6.0 in the shaded jar. [INFO] Including io.smallrye.common:smallrye-common-function:jar:1.6.0 in the shaded jar. [INFO] Including io.smallrye.common:smallrye-common-constraint:jar:1.6.0 in the shaded jar. [INFO] Including io.smallrye.common:smallrye-common-classloader:jar:1.6.0 in the shaded jar. [INFO] Including org.ow2.asm:asm:jar:9.1 in the shaded jar. [INFO] Including io.smallrye.config:smallrye-config-common:jar:2.3.0 in the shaded jar. [INFO] Including org.jboss.logging:jboss-logging:jar:3.4.2.Final in the shaded jar. [INFO] Including org.jboss.logmanager:jboss-logmanager-embedded:jar:1.0.9 in the shaded jar. [INFO] Including org.jboss.logging:jboss-logging-annotations:jar:2.2.1.Final in the shaded jar. [INFO] Including org.jboss.threads:jboss-threads:jar:3.4.0.Final in the shaded jar. [INFO] Including org.jboss.slf4j:slf4j-jboss-logmanager:jar:1.1.0.Final in the shaded jar. [INFO] Including org.graalvm.sdk:graal-sdk:jar:21.1.0 in the shaded jar. [INFO] Including org.wildfly.common:wildfly-common:jar:1.5.4.Final-format-001 in the shaded jar. [INFO] Including io.quarkus:quarkus-bootstrap-runner:jar:2.0.0.CR3 in the shaded jar. [INFO] Including io.smallrye.common:smallrye-common-io:jar:1.6.0 in the shaded jar. [INFO] Including org.eclipse.jetty:jetty-util:jar:11.0.5 in the shaded jar. [INFO] Including com.github.albfernandez:juniversalchardet:jar:2.4.0 in the shaded jar. [INFO] Including org.mariadb.jdbc:mariadb-java-client:jar:2.7.3 in the shaded jar. [INFO] Including org.eclipse.ecf:org.apache.commons.codec:jar:1.9.0.v20170208-1614 in the shaded jar. [INFO] Including org.eclipse.ecf:org.apache.commons.logging:jar:1.1.1.v201101211721 in the shaded jar. [INFO] Including org.glassfish.tyrus.bundles:tyrus-standalone-client:jar:2.0.0 in the shaded jar. [INFO] Including org.springframework.security:spring-security-crypto:jar:5.4.5 in the shaded jar. [INFO] Including org.springframework.security:spring-security-core:jar:5.4.5 in the shaded jar. [INFO] Including org.springframework:spring-aop:jar:5.2.13.RELEASE in the shaded jar. [INFO] Including org.springframework:spring-beans:jar:5.2.13.RELEASE in the shaded jar. [INFO] Including org.springframework:spring-context:jar:5.2.13.RELEASE in the shaded jar. [INFO] Including org.springframework:spring-core:jar:5.2.13.RELEASE in the shaded jar. [INFO] Including org.springframework:spring-jcl:jar:5.2.13.RELEASE in the shaded jar. [INFO] Including org.springframework:spring-expression:jar:5.2.13.RELEASE in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacv-platform:jar:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacv:jar:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flycapture:jar:2.13.3.31-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394:jar:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect:jar:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect2:jar:0.2.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense:jar:1.12.4-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense2:jar:2.40.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:videoinput:jar:0.200-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas-platform:jar:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp-platform:jar:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:android-arm:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:android-arm64:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:android-x86:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:android-x86_64:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:ios-arm64:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:ios-x86_64:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:linux-armhf:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:linux-arm64:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:linux-ppc64le:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:linux-x86:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:linux-x86_64:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:macosx-arm64:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:macosx-x86_64:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:windows-x86:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:javacpp:jar:windows-x86_64:1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:android-arm:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:android-arm64:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:android-x86:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:android-x86_64:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:ios-arm64:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:ios-x86_64:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:linux-x86:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:linux-x86_64:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:linux-armhf:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:linux-arm64:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:linux-ppc64le:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:macosx-x86_64:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:windows-x86:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:openblas:jar:windows-x86_64:0.3.13-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv-platform:jar:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:android-arm:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:android-arm64:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:android-x86:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:android-x86_64:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:ios-arm64:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:ios-x86_64:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:linux-x86:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:linux-x86_64:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:linux-armhf:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:linux-arm64:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:linux-ppc64le:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:macosx-x86_64:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:windows-x86:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:opencv:jar:windows-x86_64:4.5.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg-platform:jar:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:android-arm:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:android-arm64:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:android-x86:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:android-x86_64:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:linux-x86:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:linux-x86_64:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:linux-armhf:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:linux-arm64:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:linux-ppc64le:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:macosx-x86_64:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:windows-x86:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:ffmpeg:jar:windows-x86_64:4.3.2-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flycapture-platform:jar:2.13.3.31-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flycapture:jar:linux-x86:2.13.3.31-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flycapture:jar:linux-x86_64:2.13.3.31-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flycapture:jar:linux-armhf:2.13.3.31-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flycapture:jar:linux-arm64:2.13.3.31-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flycapture:jar:windows-x86:2.13.3.31-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flycapture:jar:windows-x86_64:2.13.3.31-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394-platform:jar:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394:jar:linux-x86:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394:jar:linux-x86_64:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394:jar:linux-armhf:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394:jar:linux-arm64:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394:jar:linux-ppc64le:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394:jar:macosx-x86_64:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394:jar:windows-x86:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libdc1394:jar:windows-x86_64:2.2.6-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect-platform:jar:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect:jar:linux-x86:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect:jar:linux-x86_64:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect:jar:linux-armhf:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect:jar:linux-arm64:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect:jar:linux-ppc64le:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect:jar:macosx-x86_64:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect:jar:windows-x86:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect:jar:windows-x86_64:0.5.7-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect2-platform:jar:0.2.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect2:jar:linux-x86:0.2.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect2:jar:linux-x86_64:0.2.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect2:jar:macosx-x86_64:0.2.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:libfreenect2:jar:windows-x86_64:0.2.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense-platform:jar:1.12.4-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense:jar:linux-armhf:1.12.4-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense:jar:linux-arm64:1.12.4-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense:jar:linux-x86:1.12.4-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense:jar:linux-x86_64:1.12.4-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense:jar:macosx-x86_64:1.12.4-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense:jar:windows-x86:1.12.4-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense:jar:windows-x86_64:1.12.4-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense2-platform:jar:2.40.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense2:jar:linux-armhf:2.40.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense2:jar:linux-arm64:2.40.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense2:jar:linux-x86:2.40.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense2:jar:linux-x86_64:2.40.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense2:jar:macosx-x86_64:2.40.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense2:jar:windows-x86:2.40.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:librealsense2:jar:windows-x86_64:2.40.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:videoinput-platform:jar:0.200-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:videoinput:jar:windows-x86:0.200-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:videoinput:jar:windows-x86_64:0.200-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus-platform:jar:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:android-arm:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:android-arm64:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:android-x86:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:android-x86_64:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:linux-x86:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:linux-x86_64:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:linux-armhf:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:linux-arm64:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:linux-ppc64le:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:macosx-x86_64:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:windows-x86:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:artoolkitplus:jar:windows-x86_64:2.3.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark-platform:jar:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:android-arm:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:android-arm64:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:android-x86:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:android-x86_64:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:linux-x86:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:linux-x86_64:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:linux-armhf:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:linux-arm64:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:linux-ppc64le:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:macosx-x86_64:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:windows-x86:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:flandmark:jar:windows-x86_64:1.07-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica-platform:jar:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:android-arm:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:android-arm64:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:android-x86:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:android-x86_64:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:linux-x86:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:linux-x86_64:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:linux-armhf:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:linux-arm64:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:linux-ppc64le:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:macosx-x86_64:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:windows-x86:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:leptonica:jar:windows-x86_64:1.80.0-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract-platform:jar:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:android-arm:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:android-arm64:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:android-x86:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:android-x86_64:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:linux-x86:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:linux-x86_64:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:linux-armhf:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:linux-arm64:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:linux-ppc64le:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:macosx-x86_64:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:windows-x86:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.bytedeco:tesseract:jar:windows-x86_64:4.1.1-1.5.5 in the shaded jar. [INFO] Including org.eclipse.jetty.websocket:websocket-api:jar:9.4.43.v20210629 in the shaded jar. [INFO] Including org.kill-bill.commons:killbill-concurrent:jar:0.24.14 in the shaded jar. [INFO] Including com.google.code.findbugs:jsr305:jar:3.0.2 in the shaded jar. [INFO] Including com.google.guava:guava:jar:30.1-jre in the shaded jar. [INFO] Including com.google.guava:failureaccess:jar:1.0.1 in the shaded jar. [INFO] Including org.checkerframework:checker-qual:jar:3.5.0 in the shaded jar. [INFO] Including com.google.errorprone:error_prone_annotations:jar:2.3.4 in the shaded jar. [INFO] Including com.google.j2objc:j2objc-annotations:jar:1.3 in the shaded jar. [INFO] Including com.google.inject:guice:jar:4.2.3 in the shaded jar. [INFO] Including javax.inject:javax.inject:jar:1 in the shaded jar. [INFO] Including aopalliance:aopalliance:jar:1.0 in the shaded jar. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] Discovered module-info.class. Shading will break its strong encapsulation. [WARNING] artoolkitplus-2.3.1-1.5.5-android-arm.jar, ffmpeg-4.3.2-1.5.5-android-arm.jar, flandmark-1.07-1.5.5-android-arm.jar, javacpp-1.5.5-android-arm.jar, leptonica-1.80.0-1.5.5-android-arm.jar, openblas-0.3.13-1.5.5-android-arm.jar, opencv-4.5.1-1.5.5-android-arm.jar, tesseract-4.1.1-1.5.5-android-arm.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/android-arm/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/android-arm/jnijavacpp/reflect-config.json [WARNING] openblas-0.3.13-1.5.5-android-arm.jar, openblas-0.3.13-1.5.5-android-arm64.jar, openblas-0.3.13-1.5.5-android-x86.jar, openblas-0.3.13-1.5.5-android-x86_64.jar, openblas-0.3.13-1.5.5-ios-arm64.jar, openblas-0.3.13-1.5.5-ios-x86_64.jar, openblas-0.3.13-1.5.5-linux-arm64.jar, openblas-0.3.13-1.5.5-linux-armhf.jar, openblas-0.3.13-1.5.5-linux-ppc64le.jar, openblas-0.3.13-1.5.5-linux-x86.jar, openblas-0.3.13-1.5.5-linux-x86_64.jar, openblas-0.3.13-1.5.5-macosx-x86_64.jar, openblas-0.3.13-1.5.5-windows-x86.jar, openblas-0.3.13-1.5.5-windows-x86_64.jar, openblas-0.3.13-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/openblas/pom.properties [WARNING] - META-INF/maven/org.bytedeco/openblas/pom.xml [WARNING] spring-aop-5.2.13.RELEASE.jar, spring-beans-5.2.13.RELEASE.jar, spring-context-5.2.13.RELEASE.jar, spring-core-5.2.13.RELEASE.jar, spring-expression-5.2.13.RELEASE.jar, spring-jcl-5.2.13.RELEASE.jar define 2 overlapping resources: [WARNING] - META-INF/license.txt [WARNING] - META-INF/notice.txt [WARNING] guice-4.2.3.jar, jackson-core-2.12.3.jar, jackson-databind-2.12.3.jar, microprofile-config-api-2.0.jar define 1 overlapping resources: [WARNING] - META-INF/NOTICE [WARNING] commons-lang3-3.12.0.jar, jetty-util-11.0.5.jar, org.apache.commons.codec-1.9.0.v20170208-1614.jar, websocket-api-9.4.43.v20210629.jar define 1 overlapping resources: [WARNING] - META-INF/NOTICE.txt [WARNING] artoolkitplus-2.3.1-1.5.5-android-x86.jar, ffmpeg-4.3.2-1.5.5-android-x86.jar, flandmark-1.07-1.5.5-android-x86.jar, javacpp-1.5.5-android-x86.jar, leptonica-1.80.0-1.5.5-android-x86.jar, openblas-0.3.13-1.5.5-android-x86.jar, opencv-4.5.1-1.5.5-android-x86.jar, tesseract-4.1.1-1.5.5-android-x86.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/android-x86/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/android-x86/jnijavacpp/reflect-config.json [WARNING] artoolkitplus-2.3.1-1.5.5-macosx-x86_64.jar, ffmpeg-4.3.2-1.5.5-macosx-x86_64.jar, flandmark-1.07-1.5.5-macosx-x86_64.jar, javacpp-1.5.5-macosx-x86_64.jar, leptonica-1.80.0-1.5.5-macosx-x86_64.jar, libdc1394-2.2.6-1.5.5-macosx-x86_64.jar, libfreenect-0.5.7-1.5.5-macosx-x86_64.jar, libfreenect2-0.2.0-1.5.5-macosx-x86_64.jar, librealsense-1.12.4-1.5.5-macosx-x86_64.jar, librealsense2-2.40.0-1.5.5-macosx-x86_64.jar, openblas-0.3.13-1.5.5-macosx-x86_64.jar, opencv-4.5.1-1.5.5-macosx-x86_64.jar, tesseract-4.1.1-1.5.5-macosx-x86_64.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/macosx-x86_64/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/macosx-x86_64/jnijavacpp/reflect-config.json [WARNING] checker-qual-3.5.0.jar, commons-lang3-3.12.0.jar, jakarta.ejb-api-3.2.6.jar, jboss-logging-3.4.2.Final.jar, jboss-logging-annotations-2.2.1.Final.jar, jboss-threads-3.4.0.Final.jar, org.apache.commons.codec-1.9.0.v20170208-1614.jar, tyrus-standalone-client-2.0.0.jar define 1 overlapping resources: [WARNING] - META-INF/LICENSE.txt [WARNING] jakarta.annotation-api-1.3.5.jar, jakarta.el-api-3.0.3.jar, jakarta.interceptor-api-1.2.5.jar, jakarta.transaction-api-1.3.2.jar, jboss-jaxrs-api_2.1_spec-2.0.1.Final.jar, tyrus-standalone-client-2.0.0.jar define 2 overlapping resources: [WARNING] - META-INF/LICENSE.md [WARNING] - META-INF/NOTICE.md [WARNING] libdc1394-2.2.6-1.5.5-linux-arm64.jar, libdc1394-2.2.6-1.5.5-linux-armhf.jar, libdc1394-2.2.6-1.5.5-linux-ppc64le.jar, libdc1394-2.2.6-1.5.5-linux-x86.jar, libdc1394-2.2.6-1.5.5-linux-x86_64.jar, libdc1394-2.2.6-1.5.5-macosx-x86_64.jar, libdc1394-2.2.6-1.5.5-windows-x86.jar, libdc1394-2.2.6-1.5.5-windows-x86_64.jar, libdc1394-2.2.6-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/libdc1394/pom.properties [WARNING] - META-INF/maven/org.bytedeco/libdc1394/pom.xml [WARNING] flandmark-1.07-1.5.5-android-arm.jar, flandmark-1.07-1.5.5-android-arm64.jar, flandmark-1.07-1.5.5-android-x86.jar, flandmark-1.07-1.5.5-android-x86_64.jar, flandmark-1.07-1.5.5-linux-arm64.jar, flandmark-1.07-1.5.5-linux-armhf.jar, flandmark-1.07-1.5.5-linux-ppc64le.jar, flandmark-1.07-1.5.5-linux-x86.jar, flandmark-1.07-1.5.5-linux-x86_64.jar, flandmark-1.07-1.5.5-macosx-x86_64.jar, flandmark-1.07-1.5.5-windows-x86.jar, flandmark-1.07-1.5.5-windows-x86_64.jar, flandmark-1.07-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/flandmark/pom.properties [WARNING] - META-INF/maven/org.bytedeco/flandmark/pom.xml [WARNING] librealsense-1.12.4-1.5.5-linux-arm64.jar, librealsense-1.12.4-1.5.5-linux-armhf.jar, librealsense-1.12.4-1.5.5-linux-x86.jar, librealsense-1.12.4-1.5.5-linux-x86_64.jar, librealsense-1.12.4-1.5.5-macosx-x86_64.jar, librealsense-1.12.4-1.5.5-windows-x86.jar, librealsense-1.12.4-1.5.5-windows-x86_64.jar, librealsense-1.12.4-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/librealsense/pom.properties [WARNING] - META-INF/maven/org.bytedeco/librealsense/pom.xml [WARNING] opencv-4.5.1-1.5.5-android-arm.jar, opencv-4.5.1-1.5.5-android-arm64.jar, opencv-4.5.1-1.5.5-android-x86.jar, opencv-4.5.1-1.5.5-android-x86_64.jar, opencv-4.5.1-1.5.5-ios-arm64.jar, opencv-4.5.1-1.5.5-ios-x86_64.jar, opencv-4.5.1-1.5.5-linux-arm64.jar, opencv-4.5.1-1.5.5-linux-armhf.jar, opencv-4.5.1-1.5.5-linux-ppc64le.jar, opencv-4.5.1-1.5.5-linux-x86.jar, opencv-4.5.1-1.5.5-linux-x86_64.jar, opencv-4.5.1-1.5.5-macosx-x86_64.jar, opencv-4.5.1-1.5.5-windows-x86.jar, opencv-4.5.1-1.5.5-windows-x86_64.jar, opencv-4.5.1-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/opencv/pom.properties [WARNING] - META-INF/maven/org.bytedeco/opencv/pom.xml [WARNING] artoolkitplus-2.3.1-1.5.5-android-arm.jar, artoolkitplus-2.3.1-1.5.5-android-arm64.jar, artoolkitplus-2.3.1-1.5.5-android-x86.jar, artoolkitplus-2.3.1-1.5.5-android-x86_64.jar, artoolkitplus-2.3.1-1.5.5-linux-arm64.jar, artoolkitplus-2.3.1-1.5.5-linux-armhf.jar, artoolkitplus-2.3.1-1.5.5-linux-ppc64le.jar, artoolkitplus-2.3.1-1.5.5-linux-x86.jar, artoolkitplus-2.3.1-1.5.5-linux-x86_64.jar, artoolkitplus-2.3.1-1.5.5-macosx-x86_64.jar, artoolkitplus-2.3.1-1.5.5-windows-x86.jar, artoolkitplus-2.3.1-1.5.5-windows-x86_64.jar, artoolkitplus-2.3.1-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/artoolkitplus/pom.properties [WARNING] - META-INF/maven/org.bytedeco/artoolkitplus/pom.xml [WARNING] librealsense2-2.40.0-1.5.5-linux-arm64.jar, librealsense2-2.40.0-1.5.5-linux-armhf.jar, librealsense2-2.40.0-1.5.5-linux-x86.jar, librealsense2-2.40.0-1.5.5-linux-x86_64.jar, librealsense2-2.40.0-1.5.5-macosx-x86_64.jar, librealsense2-2.40.0-1.5.5-windows-x86.jar, librealsense2-2.40.0-1.5.5-windows-x86_64.jar, librealsense2-2.40.0-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/librealsense2/pom.properties [WARNING] - META-INF/maven/org.bytedeco/librealsense2/pom.xml [WARNING] artoolkitplus-2.3.1-1.5.5-linux-ppc64le.jar, ffmpeg-4.3.2-1.5.5-linux-ppc64le.jar, flandmark-1.07-1.5.5-linux-ppc64le.jar, javacpp-1.5.5-linux-ppc64le.jar, leptonica-1.80.0-1.5.5-linux-ppc64le.jar, libdc1394-2.2.6-1.5.5-linux-ppc64le.jar, libfreenect-0.5.7-1.5.5-linux-ppc64le.jar, openblas-0.3.13-1.5.5-linux-ppc64le.jar, opencv-4.5.1-1.5.5-linux-ppc64le.jar, tesseract-4.1.1-1.5.5-linux-ppc64le.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/linux-ppc64le/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/linux-ppc64le/jnijavacpp/reflect-config.json [WARNING] javacpp-1.5.5-ios-arm64.jar, openblas-0.3.13-1.5.5-ios-arm64.jar, opencv-4.5.1-1.5.5-ios-arm64.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/ios-arm64/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/ios-arm64/jnijavacpp/reflect-config.json [WARNING] quarkus-core-2.0.0.CR3.jar, quarkus-jaxp-2.0.0.CR3.jar define 2 overlapping resources: [WARNING] - META-INF/quarkus-extension.properties [WARNING] - META-INF/quarkus-extension.yaml [WARNING] artoolkitplus-2.3.1-1.5.5-linux-x86.jar, ffmpeg-4.3.2-1.5.5-linux-x86.jar, flandmark-1.07-1.5.5-linux-x86.jar, flycapture-2.13.3.31-1.5.5-linux-x86.jar, javacpp-1.5.5-linux-x86.jar, leptonica-1.80.0-1.5.5-linux-x86.jar, libdc1394-2.2.6-1.5.5-linux-x86.jar, libfreenect-0.5.7-1.5.5-linux-x86.jar, libfreenect2-0.2.0-1.5.5-linux-x86.jar, librealsense-1.12.4-1.5.5-linux-x86.jar, librealsense2-2.40.0-1.5.5-linux-x86.jar, openblas-0.3.13-1.5.5-linux-x86.jar, opencv-4.5.1-1.5.5-linux-x86.jar, tesseract-4.1.1-1.5.5-linux-x86.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/linux-x86/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/linux-x86/jnijavacpp/reflect-config.json [WARNING] guice-4.2.3.jar, jackson-annotations-2.12.3.jar, jackson-core-2.12.3.jar, jackson-databind-2.12.3.jar, jetty-util-11.0.5.jar, microprofile-config-api-2.0.jar, websocket-api-9.4.43.v20210629.jar define 1 overlapping resources: [WARNING] - META-INF/LICENSE [WARNING] org.apache.commons.codec-1.9.0.v20170208-1614.jar, org.apache.commons.logging-1.1.1.v201101211721.jar, websocket-api-9.4.43.v20210629.jar define 1 overlapping resources: [WARNING] - about.html [WARNING] artoolkitplus-2.3.1-1.5.5-android-arm64.jar, ffmpeg-4.3.2-1.5.5-android-arm64.jar, flandmark-1.07-1.5.5-android-arm64.jar, javacpp-1.5.5-android-arm64.jar, leptonica-1.80.0-1.5.5-android-arm64.jar, openblas-0.3.13-1.5.5-android-arm64.jar, opencv-4.5.1-1.5.5-android-arm64.jar, tesseract-4.1.1-1.5.5-android-arm64.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/android-arm64/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/android-arm64/jnijavacpp/reflect-config.json [WARNING] videoinput-0.200-1.5.5-windows-x86.jar, videoinput-0.200-1.5.5-windows-x86_64.jar, videoinput-0.200-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/videoinput/pom.properties [WARNING] - META-INF/maven/org.bytedeco/videoinput/pom.xml [WARNING] jakarta.inject-api-1.0.jar, javax.inject-1.jar define 6 overlapping classes: [WARNING] - javax.inject.Inject [WARNING] - javax.inject.Named [WARNING] - javax.inject.Provider [WARNING] - javax.inject.Qualifier [WARNING] - javax.inject.Scope [WARNING] - javax.inject.Singleton [WARNING] artoolkitplus-2.3.1-1.5.5-linux-armhf.jar, ffmpeg-4.3.2-1.5.5-linux-armhf.jar, flandmark-1.07-1.5.5-linux-armhf.jar, flycapture-2.13.3.31-1.5.5-linux-armhf.jar, javacpp-1.5.5-linux-armhf.jar, leptonica-1.80.0-1.5.5-linux-armhf.jar, libdc1394-2.2.6-1.5.5-linux-armhf.jar, libfreenect-0.5.7-1.5.5-linux-armhf.jar, librealsense-1.12.4-1.5.5-linux-armhf.jar, librealsense2-2.40.0-1.5.5-linux-armhf.jar, openblas-0.3.13-1.5.5-linux-armhf.jar, opencv-4.5.1-1.5.5-linux-armhf.jar, tesseract-4.1.1-1.5.5-linux-armhf.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/linux-armhf/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/linux-armhf/jnijavacpp/reflect-config.json [WARNING] tesseract-4.1.1-1.5.5-android-arm.jar, tesseract-4.1.1-1.5.5-android-arm64.jar, tesseract-4.1.1-1.5.5-android-x86.jar, tesseract-4.1.1-1.5.5-android-x86_64.jar, tesseract-4.1.1-1.5.5-linux-arm64.jar, tesseract-4.1.1-1.5.5-linux-armhf.jar, tesseract-4.1.1-1.5.5-linux-ppc64le.jar, tesseract-4.1.1-1.5.5-linux-x86.jar, tesseract-4.1.1-1.5.5-linux-x86_64.jar, tesseract-4.1.1-1.5.5-macosx-x86_64.jar, tesseract-4.1.1-1.5.5-windows-x86.jar, tesseract-4.1.1-1.5.5-windows-x86_64.jar, tesseract-4.1.1-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/tesseract/pom.properties [WARNING] - META-INF/maven/org.bytedeco/tesseract/pom.xml [WARNING] artoolkitplus-2.3.1-1.5.5-windows-x86_64.jar, ffmpeg-4.3.2-1.5.5-windows-x86_64.jar, flandmark-1.07-1.5.5-windows-x86_64.jar, flycapture-2.13.3.31-1.5.5-windows-x86_64.jar, javacpp-1.5.5-windows-x86_64.jar, leptonica-1.80.0-1.5.5-windows-x86_64.jar, libdc1394-2.2.6-1.5.5-windows-x86_64.jar, libfreenect-0.5.7-1.5.5-windows-x86_64.jar, libfreenect2-0.2.0-1.5.5-windows-x86_64.jar, librealsense-1.12.4-1.5.5-windows-x86_64.jar, librealsense2-2.40.0-1.5.5-windows-x86_64.jar, openblas-0.3.13-1.5.5-windows-x86_64.jar, opencv-4.5.1-1.5.5-windows-x86_64.jar, tesseract-4.1.1-1.5.5-windows-x86_64.jar, videoinput-0.200-1.5.5-windows-x86_64.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/windows-x86_64/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/windows-x86_64/jnijavacpp/reflect-config.json [WARNING] artoolkitplus-2.3.1-1.5.5-linux-x86_64.jar, ffmpeg-4.3.2-1.5.5-linux-x86_64.jar, flandmark-1.07-1.5.5-linux-x86_64.jar, flycapture-2.13.3.31-1.5.5-linux-x86_64.jar, javacpp-1.5.5-linux-x86_64.jar, leptonica-1.80.0-1.5.5-linux-x86_64.jar, libdc1394-2.2.6-1.5.5-linux-x86_64.jar, libfreenect-0.5.7-1.5.5-linux-x86_64.jar, libfreenect2-0.2.0-1.5.5-linux-x86_64.jar, librealsense-1.12.4-1.5.5-linux-x86_64.jar, librealsense2-2.40.0-1.5.5-linux-x86_64.jar, openblas-0.3.13-1.5.5-linux-x86_64.jar, opencv-4.5.1-1.5.5-linux-x86_64.jar, tesseract-4.1.1-1.5.5-linux-x86_64.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/linux-x86_64/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/linux-x86_64/jnijavacpp/reflect-config.json [WARNING] flycapture-2.13.3.31-1.5.5-linux-arm64.jar, flycapture-2.13.3.31-1.5.5-linux-armhf.jar, flycapture-2.13.3.31-1.5.5-linux-x86.jar, flycapture-2.13.3.31-1.5.5-linux-x86_64.jar, flycapture-2.13.3.31-1.5.5-windows-x86.jar, flycapture-2.13.3.31-1.5.5-windows-x86_64.jar, flycapture-2.13.3.31-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/flycapture/pom.properties [WARNING] - META-INF/maven/org.bytedeco/flycapture/pom.xml [WARNING] spring-aop-5.2.13.RELEASE.jar, spring-beans-5.2.13.RELEASE.jar, spring-context-5.2.13.RELEASE.jar define 3 overlapping resources: [WARNING] - META-INF/spring.handlers [WARNING] - META-INF/spring.schemas [WARNING] - META-INF/spring.tooling [WARNING] artoolkitplus-2.3.1-1.5.5-android-arm.jar, artoolkitplus-2.3.1-1.5.5-android-arm64.jar, artoolkitplus-2.3.1-1.5.5-android-x86.jar, artoolkitplus-2.3.1-1.5.5-android-x86_64.jar, artoolkitplus-2.3.1-1.5.5-linux-arm64.jar, artoolkitplus-2.3.1-1.5.5-linux-armhf.jar, artoolkitplus-2.3.1-1.5.5-linux-ppc64le.jar, artoolkitplus-2.3.1-1.5.5-linux-x86.jar, artoolkitplus-2.3.1-1.5.5-linux-x86_64.jar, artoolkitplus-2.3.1-1.5.5-macosx-x86_64.jar, artoolkitplus-2.3.1-1.5.5-windows-x86.jar, artoolkitplus-2.3.1-1.5.5-windows-x86_64.jar, artoolkitplus-2.3.1-1.5.5.jar, artoolkitplus-platform-2.3.1-1.5.5.jar, ffmpeg-4.3.2-1.5.5-android-arm.jar, ffmpeg-4.3.2-1.5.5-android-arm64.jar, ffmpeg-4.3.2-1.5.5-android-x86.jar, ffmpeg-4.3.2-1.5.5-android-x86_64.jar, ffmpeg-4.3.2-1.5.5-linux-arm64.jar, ffmpeg-4.3.2-1.5.5-linux-armhf.jar, ffmpeg-4.3.2-1.5.5-linux-ppc64le.jar, ffmpeg-4.3.2-1.5.5-linux-x86.jar, ffmpeg-4.3.2-1.5.5-linux-x86_64.jar, ffmpeg-4.3.2-1.5.5-macosx-x86_64.jar, ffmpeg-4.3.2-1.5.5-windows-x86.jar, ffmpeg-4.3.2-1.5.5-windows-x86_64.jar, ffmpeg-4.3.2-1.5.5.jar, ffmpeg-platform-4.3.2-1.5.5.jar, flandmark-1.07-1.5.5-android-arm.jar, flandmark-1.07-1.5.5-android-arm64.jar, flandmark-1.07-1.5.5-android-x86.jar, flandmark-1.07-1.5.5-android-x86_64.jar, flandmark-1.07-1.5.5-linux-arm64.jar, flandmark-1.07-1.5.5-linux-armhf.jar, flandmark-1.07-1.5.5-linux-ppc64le.jar, flandmark-1.07-1.5.5-linux-x86.jar, flandmark-1.07-1.5.5-linux-x86_64.jar, flandmark-1.07-1.5.5-macosx-x86_64.jar, flandmark-1.07-1.5.5-windows-x86.jar, flandmark-1.07-1.5.5-windows-x86_64.jar, flandmark-1.07-1.5.5.jar, flandmark-platform-1.07-1.5.5.jar, flycapture-2.13.3.31-1.5.5-linux-arm64.jar, flycapture-2.13.3.31-1.5.5-linux-armhf.jar, flycapture-2.13.3.31-1.5.5-linux-x86.jar, flycapture-2.13.3.31-1.5.5-linux-x86_64.jar, flycapture-2.13.3.31-1.5.5-windows-x86.jar, flycapture-2.13.3.31-1.5.5-windows-x86_64.jar, flycapture-2.13.3.31-1.5.5.jar, flycapture-platform-2.13.3.31-1.5.5.jar, javacpp-1.5.5-android-arm.jar, javacpp-1.5.5-android-arm64.jar, javacpp-1.5.5-android-x86.jar, javacpp-1.5.5-android-x86_64.jar, javacpp-1.5.5-ios-arm64.jar, javacpp-1.5.5-ios-x86_64.jar, javacpp-1.5.5-linux-arm64.jar, javacpp-1.5.5-linux-armhf.jar, javacpp-1.5.5-linux-ppc64le.jar, javacpp-1.5.5-linux-x86.jar, javacpp-1.5.5-linux-x86_64.jar, javacpp-1.5.5-macosx-arm64.jar, javacpp-1.5.5-macosx-x86_64.jar, javacpp-1.5.5-windows-x86.jar, javacpp-1.5.5-windows-x86_64.jar, javacpp-1.5.5.jar, javacpp-platform-1.5.5.jar, javacv-1.5.5.jar, javacv-platform-1.5.5.jar, leptonica-1.80.0-1.5.5-android-arm.jar, leptonica-1.80.0-1.5.5-android-arm64.jar, leptonica-1.80.0-1.5.5-android-x86.jar, leptonica-1.80.0-1.5.5-android-x86_64.jar, leptonica-1.80.0-1.5.5-linux-arm64.jar, leptonica-1.80.0-1.5.5-linux-armhf.jar, leptonica-1.80.0-1.5.5-linux-ppc64le.jar, leptonica-1.80.0-1.5.5-linux-x86.jar, leptonica-1.80.0-1.5.5-linux-x86_64.jar, leptonica-1.80.0-1.5.5-macosx-x86_64.jar, leptonica-1.80.0-1.5.5-windows-x86.jar, leptonica-1.80.0-1.5.5-windows-x86_64.jar, leptonica-1.80.0-1.5.5.jar, leptonica-platform-1.80.0-1.5.5.jar, libdc1394-2.2.6-1.5.5-linux-arm64.jar, libdc1394-2.2.6-1.5.5-linux-armhf.jar, libdc1394-2.2.6-1.5.5-linux-ppc64le.jar, libdc1394-2.2.6-1.5.5-linux-x86.jar, libdc1394-2.2.6-1.5.5-linux-x86_64.jar, libdc1394-2.2.6-1.5.5-macosx-x86_64.jar, libdc1394-2.2.6-1.5.5-windows-x86.jar, libdc1394-2.2.6-1.5.5-windows-x86_64.jar, libdc1394-2.2.6-1.5.5.jar, libdc1394-platform-2.2.6-1.5.5.jar, libfreenect-0.5.7-1.5.5-linux-arm64.jar, libfreenect-0.5.7-1.5.5-linux-armhf.jar, libfreenect-0.5.7-1.5.5-linux-ppc64le.jar, libfreenect-0.5.7-1.5.5-linux-x86.jar, libfreenect-0.5.7-1.5.5-linux-x86_64.jar, libfreenect-0.5.7-1.5.5-macosx-x86_64.jar, libfreenect-0.5.7-1.5.5-windows-x86.jar, libfreenect-0.5.7-1.5.5-windows-x86_64.jar, libfreenect-0.5.7-1.5.5.jar, libfreenect-platform-0.5.7-1.5.5.jar, libfreenect2-0.2.0-1.5.5-linux-x86.jar, libfreenect2-0.2.0-1.5.5-linux-x86_64.jar, libfreenect2-0.2.0-1.5.5-macosx-x86_64.jar, libfreenect2-0.2.0-1.5.5-windows-x86_64.jar, libfreenect2-0.2.0-1.5.5.jar, libfreenect2-platform-0.2.0-1.5.5.jar, librealsense-1.12.4-1.5.5-linux-arm64.jar, librealsense-1.12.4-1.5.5-linux-armhf.jar, librealsense-1.12.4-1.5.5-linux-x86.jar, librealsense-1.12.4-1.5.5-linux-x86_64.jar, librealsense-1.12.4-1.5.5-macosx-x86_64.jar, librealsense-1.12.4-1.5.5-windows-x86.jar, librealsense-1.12.4-1.5.5-windows-x86_64.jar, librealsense-1.12.4-1.5.5.jar, librealsense-platform-1.12.4-1.5.5.jar, librealsense2-2.40.0-1.5.5-linux-arm64.jar, librealsense2-2.40.0-1.5.5-linux-armhf.jar, librealsense2-2.40.0-1.5.5-linux-x86.jar, librealsense2-2.40.0-1.5.5-linux-x86_64.jar, librealsense2-2.40.0-1.5.5-macosx-x86_64.jar, librealsense2-2.40.0-1.5.5-windows-x86.jar, librealsense2-2.40.0-1.5.5-windows-x86_64.jar, librealsense2-2.40.0-1.5.5.jar, librealsense2-platform-2.40.0-1.5.5.jar, openblas-0.3.13-1.5.5-android-arm.jar, openblas-0.3.13-1.5.5-android-arm64.jar, openblas-0.3.13-1.5.5-android-x86.jar, openblas-0.3.13-1.5.5-android-x86_64.jar, openblas-0.3.13-1.5.5-ios-arm64.jar, openblas-0.3.13-1.5.5-ios-x86_64.jar, openblas-0.3.13-1.5.5-linux-arm64.jar, openblas-0.3.13-1.5.5-linux-armhf.jar, openblas-0.3.13-1.5.5-linux-ppc64le.jar, openblas-0.3.13-1.5.5-linux-x86.jar, openblas-0.3.13-1.5.5-linux-x86_64.jar, openblas-0.3.13-1.5.5-macosx-x86_64.jar, openblas-0.3.13-1.5.5-windows-x86.jar, openblas-0.3.13-1.5.5-windows-x86_64.jar, openblas-0.3.13-1.5.5.jar, openblas-platform-0.3.13-1.5.5.jar, opencv-4.5.1-1.5.5-android-arm.jar, opencv-4.5.1-1.5.5-android-arm64.jar, opencv-4.5.1-1.5.5-android-x86.jar, opencv-4.5.1-1.5.5-android-x86_64.jar, opencv-4.5.1-1.5.5-ios-arm64.jar, opencv-4.5.1-1.5.5-ios-x86_64.jar, opencv-4.5.1-1.5.5-linux-arm64.jar, opencv-4.5.1-1.5.5-linux-armhf.jar, opencv-4.5.1-1.5.5-linux-ppc64le.jar, opencv-4.5.1-1.5.5-linux-x86.jar, opencv-4.5.1-1.5.5-linux-x86_64.jar, opencv-4.5.1-1.5.5-macosx-x86_64.jar, opencv-4.5.1-1.5.5-windows-x86.jar, opencv-4.5.1-1.5.5-windows-x86_64.jar, opencv-4.5.1-1.5.5.jar, opencv-platform-4.5.1-1.5.5.jar, tesseract-4.1.1-1.5.5-android-arm.jar, tesseract-4.1.1-1.5.5-android-arm64.jar, tesseract-4.1.1-1.5.5-android-x86.jar, tesseract-4.1.1-1.5.5-android-x86_64.jar, tesseract-4.1.1-1.5.5-linux-arm64.jar, tesseract-4.1.1-1.5.5-linux-armhf.jar, tesseract-4.1.1-1.5.5-linux-ppc64le.jar, tesseract-4.1.1-1.5.5-linux-x86.jar, tesseract-4.1.1-1.5.5-linux-x86_64.jar, tesseract-4.1.1-1.5.5-macosx-x86_64.jar, tesseract-4.1.1-1.5.5-windows-x86.jar, tesseract-4.1.1-1.5.5-windows-x86_64.jar, tesseract-4.1.1-1.5.5.jar, tesseract-platform-4.1.1-1.5.5.jar, videoinput-0.200-1.5.5-windows-x86.jar, videoinput-0.200-1.5.5-windows-x86_64.jar, videoinput-0.200-1.5.5.jar, videoinput-platform-0.200-1.5.5.jar define 1 overlapping classes: [WARNING] - META-INF.versions.9.module-info [WARNING] leptonica-1.80.0-1.5.5-android-arm.jar, leptonica-1.80.0-1.5.5-android-arm64.jar, leptonica-1.80.0-1.5.5-android-x86.jar, leptonica-1.80.0-1.5.5-android-x86_64.jar, leptonica-1.80.0-1.5.5-linux-arm64.jar, leptonica-1.80.0-1.5.5-linux-armhf.jar, leptonica-1.80.0-1.5.5-linux-ppc64le.jar, leptonica-1.80.0-1.5.5-linux-x86.jar, leptonica-1.80.0-1.5.5-linux-x86_64.jar, leptonica-1.80.0-1.5.5-macosx-x86_64.jar, leptonica-1.80.0-1.5.5-windows-x86.jar, leptonica-1.80.0-1.5.5-windows-x86_64.jar, leptonica-1.80.0-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/leptonica/pom.properties [WARNING] - META-INF/maven/org.bytedeco/leptonica/pom.xml [WARNING] artoolkitplus-2.3.1-1.5.5-linux-arm64.jar, ffmpeg-4.3.2-1.5.5-linux-arm64.jar, flandmark-1.07-1.5.5-linux-arm64.jar, flycapture-2.13.3.31-1.5.5-linux-arm64.jar, javacpp-1.5.5-linux-arm64.jar, leptonica-1.80.0-1.5.5-linux-arm64.jar, libdc1394-2.2.6-1.5.5-linux-arm64.jar, libfreenect-0.5.7-1.5.5-linux-arm64.jar, librealsense-1.12.4-1.5.5-linux-arm64.jar, librealsense2-2.40.0-1.5.5-linux-arm64.jar, openblas-0.3.13-1.5.5-linux-arm64.jar, opencv-4.5.1-1.5.5-linux-arm64.jar, tesseract-4.1.1-1.5.5-linux-arm64.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/linux-arm64/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/linux-arm64/jnijavacpp/reflect-config.json [WARNING] aopalliance-1.0.jar, artoolkitplus-2.3.1-1.5.5-android-arm.jar, artoolkitplus-2.3.1-1.5.5-android-arm64.jar, artoolkitplus-2.3.1-1.5.5-android-x86.jar, artoolkitplus-2.3.1-1.5.5-android-x86_64.jar, artoolkitplus-2.3.1-1.5.5-linux-arm64.jar, artoolkitplus-2.3.1-1.5.5-linux-armhf.jar, artoolkitplus-2.3.1-1.5.5-linux-ppc64le.jar, artoolkitplus-2.3.1-1.5.5-linux-x86.jar, artoolkitplus-2.3.1-1.5.5-linux-x86_64.jar, artoolkitplus-2.3.1-1.5.5-macosx-x86_64.jar, artoolkitplus-2.3.1-1.5.5-windows-x86.jar, artoolkitplus-2.3.1-1.5.5-windows-x86_64.jar, artoolkitplus-2.3.1-1.5.5.jar, artoolkitplus-platform-2.3.1-1.5.5.jar, asm-9.1.jar, checker-qual-3.5.0.jar, commons-lang3-3.12.0.jar, engine.io-client-2.0.0.jar, error_prone_annotations-2.3.4.jar, failureaccess-1.0.1.jar, ffmpeg-4.3.2-1.5.5-android-arm.jar, ffmpeg-4.3.2-1.5.5-android-arm64.jar, ffmpeg-4.3.2-1.5.5-android-x86.jar, ffmpeg-4.3.2-1.5.5-android-x86_64.jar, ffmpeg-4.3.2-1.5.5-linux-arm64.jar, ffmpeg-4.3.2-1.5.5-linux-armhf.jar, ffmpeg-4.3.2-1.5.5-linux-ppc64le.jar, ffmpeg-4.3.2-1.5.5-linux-x86.jar, ffmpeg-4.3.2-1.5.5-linux-x86_64.jar, ffmpeg-4.3.2-1.5.5-macosx-x86_64.jar, ffmpeg-4.3.2-1.5.5-windows-x86.jar, ffmpeg-4.3.2-1.5.5-windows-x86_64.jar, ffmpeg-4.3.2-1.5.5.jar, ffmpeg-platform-4.3.2-1.5.5.jar, flandmark-1.07-1.5.5-android-arm.jar, flandmark-1.07-1.5.5-android-arm64.jar, flandmark-1.07-1.5.5-android-x86.jar, flandmark-1.07-1.5.5-android-x86_64.jar, flandmark-1.07-1.5.5-linux-arm64.jar, flandmark-1.07-1.5.5-linux-armhf.jar, flandmark-1.07-1.5.5-linux-ppc64le.jar, flandmark-1.07-1.5.5-linux-x86.jar, flandmark-1.07-1.5.5-linux-x86_64.jar, flandmark-1.07-1.5.5-macosx-x86_64.jar, flandmark-1.07-1.5.5-windows-x86.jar, flandmark-1.07-1.5.5-windows-x86_64.jar, flandmark-1.07-1.5.5.jar, flandmark-platform-1.07-1.5.5.jar, flycapture-2.13.3.31-1.5.5-linux-arm64.jar, flycapture-2.13.3.31-1.5.5-linux-armhf.jar, flycapture-2.13.3.31-1.5.5-linux-x86.jar, flycapture-2.13.3.31-1.5.5-linux-x86_64.jar, flycapture-2.13.3.31-1.5.5-windows-x86.jar, flycapture-2.13.3.31-1.5.5-windows-x86_64.jar, flycapture-2.13.3.31-1.5.5.jar, flycapture-platform-2.13.3.31-1.5.5.jar, gson-2.8.7.jar, guava-30.1-jre.jar, guice-4.2.3.jar, j2objc-annotations-1.3.jar, jackson-annotations-2.12.3.jar, jackson-core-2.12.3.jar, jackson-databind-2.12.3.jar, jakarta.annotation-api-1.3.5.jar, jakarta.ejb-api-3.2.6.jar, jakarta.el-api-3.0.3.jar, jakarta.enterprise.cdi-api-2.0.2.jar, jakarta.inject-api-1.0.jar, jakarta.interceptor-api-1.2.5.jar, jakarta.transaction-api-1.3.2.jar, javacpp-1.5.5-android-arm.jar, javacpp-1.5.5-android-arm64.jar, javacpp-1.5.5-android-x86.jar, javacpp-1.5.5-android-x86_64.jar, javacpp-1.5.5-ios-arm64.jar, javacpp-1.5.5-ios-x86_64.jar, javacpp-1.5.5-linux-arm64.jar, javacpp-1.5.5-linux-armhf.jar, javacpp-1.5.5-linux-ppc64le.jar, javacpp-1.5.5-linux-x86.jar, javacpp-1.5.5-linux-x86_64.jar, javacpp-1.5.5-macosx-arm64.jar, javacpp-1.5.5-macosx-x86_64.jar, javacpp-1.5.5-windows-x86.jar, javacpp-1.5.5-windows-x86_64.jar, javacpp-1.5.5.jar, javacpp-platform-1.5.5.jar, javacv-1.5.5.jar, javacv-platform-1.5.5.jar, jboss-jaxrs-api_2.1_spec-2.0.1.Final.jar, jboss-logging-3.4.2.Final.jar, jboss-logging-annotations-2.2.1.Final.jar, jboss-logmanager-embedded-1.0.9.jar, jboss-threads-3.4.0.Final.jar, jetty-util-11.0.5.jar, json-20090211.jar, jsr305-3.0.2.jar, jul-to-slf4j-1.7.31.jar, juniversalchardet-2.4.0.jar, killbill-concurrent-0.24.14.jar, leptonica-1.80.0-1.5.5-android-arm.jar, leptonica-1.80.0-1.5.5-android-arm64.jar, leptonica-1.80.0-1.5.5-android-x86.jar, leptonica-1.80.0-1.5.5-android-x86_64.jar, leptonica-1.80.0-1.5.5-linux-arm64.jar, leptonica-1.80.0-1.5.5-linux-armhf.jar, leptonica-1.80.0-1.5.5-linux-ppc64le.jar, leptonica-1.80.0-1.5.5-linux-x86.jar, leptonica-1.80.0-1.5.5-linux-x86_64.jar, leptonica-1.80.0-1.5.5-macosx-x86_64.jar, leptonica-1.80.0-1.5.5-windows-x86.jar, leptonica-1.80.0-1.5.5-windows-x86_64.jar, leptonica-1.80.0-1.5.5.jar, leptonica-platform-1.80.0-1.5.5.jar, libdc1394-2.2.6-1.5.5-linux-arm64.jar, libdc1394-2.2.6-1.5.5-linux-armhf.jar, libdc1394-2.2.6-1.5.5-linux-ppc64le.jar, libdc1394-2.2.6-1.5.5-linux-x86.jar, libdc1394-2.2.6-1.5.5-linux-x86_64.jar, libdc1394-2.2.6-1.5.5-macosx-x86_64.jar, libdc1394-2.2.6-1.5.5-windows-x86.jar, libdc1394-2.2.6-1.5.5-windows-x86_64.jar, libdc1394-2.2.6-1.5.5.jar, libdc1394-platform-2.2.6-1.5.5.jar, libfreenect-0.5.7-1.5.5-linux-arm64.jar, libfreenect-0.5.7-1.5.5-linux-armhf.jar, libfreenect-0.5.7-1.5.5-linux-ppc64le.jar, libfreenect-0.5.7-1.5.5-linux-x86.jar, libfreenect-0.5.7-1.5.5-linux-x86_64.jar, libfreenect-0.5.7-1.5.5-macosx-x86_64.jar, libfreenect-0.5.7-1.5.5-windows-x86.jar, libfreenect-0.5.7-1.5.5-windows-x86_64.jar, libfreenect-0.5.7-1.5.5.jar, libfreenect-platform-0.5.7-1.5.5.jar, libfreenect2-0.2.0-1.5.5-linux-x86.jar, libfreenect2-0.2.0-1.5.5-linux-x86_64.jar, libfreenect2-0.2.0-1.5.5-macosx-x86_64.jar, libfreenect2-0.2.0-1.5.5-windows-x86_64.jar, libfreenect2-0.2.0-1.5.5.jar, libfreenect2-platform-0.2.0-1.5.5.jar, librealsense-1.12.4-1.5.5-linux-arm64.jar, librealsense-1.12.4-1.5.5-linux-armhf.jar, librealsense-1.12.4-1.5.5-linux-x86.jar, librealsense-1.12.4-1.5.5-linux-x86_64.jar, librealsense-1.12.4-1.5.5-macosx-x86_64.jar, librealsense-1.12.4-1.5.5-windows-x86.jar, librealsense-1.12.4-1.5.5-windows-x86_64.jar, librealsense-1.12.4-1.5.5.jar, librealsense-platform-1.12.4-1.5.5.jar, librealsense2-2.40.0-1.5.5-linux-arm64.jar, librealsense2-2.40.0-1.5.5-linux-armhf.jar, librealsense2-2.40.0-1.5.5-linux-x86.jar, librealsense2-2.40.0-1.5.5-linux-x86_64.jar, librealsense2-2.40.0-1.5.5-macosx-x86_64.jar, librealsense2-2.40.0-1.5.5-windows-x86.jar, librealsense2-2.40.0-1.5.5-windows-x86_64.jar, librealsense2-2.40.0-1.5.5.jar, librealsense2-platform-2.40.0-1.5.5.jar, mariadb-java-client-2.7.3.jar, microprofile-config-api-2.0.jar, okhttp-3.12.12.jar, okio-1.15.0.jar, openblas-0.3.13-1.5.5-android-arm.jar, openblas-0.3.13-1.5.5-android-arm64.jar, openblas-0.3.13-1.5.5-android-x86.jar, openblas-0.3.13-1.5.5-android-x86_64.jar, openblas-0.3.13-1.5.5-ios-arm64.jar, openblas-0.3.13-1.5.5-ios-x86_64.jar, openblas-0.3.13-1.5.5-linux-arm64.jar, openblas-0.3.13-1.5.5-linux-armhf.jar, openblas-0.3.13-1.5.5-linux-ppc64le.jar, openblas-0.3.13-1.5.5-linux-x86.jar, openblas-0.3.13-1.5.5-linux-x86_64.jar, openblas-0.3.13-1.5.5-macosx-x86_64.jar, openblas-0.3.13-1.5.5-windows-x86.jar, openblas-0.3.13-1.5.5-windows-x86_64.jar, openblas-0.3.13-1.5.5.jar, openblas-platform-0.3.13-1.5.5.jar, opencv-4.5.1-1.5.5-android-arm.jar, opencv-4.5.1-1.5.5-android-arm64.jar, opencv-4.5.1-1.5.5-android-x86.jar, opencv-4.5.1-1.5.5-android-x86_64.jar, opencv-4.5.1-1.5.5-ios-arm64.jar, opencv-4.5.1-1.5.5-ios-x86_64.jar, opencv-4.5.1-1.5.5-linux-arm64.jar, opencv-4.5.1-1.5.5-linux-armhf.jar, opencv-4.5.1-1.5.5-linux-ppc64le.jar, opencv-4.5.1-1.5.5-linux-x86.jar, opencv-4.5.1-1.5.5-linux-x86_64.jar, opencv-4.5.1-1.5.5-macosx-x86_64.jar, opencv-4.5.1-1.5.5-windows-x86.jar, opencv-4.5.1-1.5.5-windows-x86_64.jar, opencv-4.5.1-1.5.5.jar, opencv-platform-4.5.1-1.5.5.jar, org.apache.commons.codec-1.9.0.v20170208-1614.jar, org.apache.commons.logging-1.1.1.v201101211721.jar, quarkus-bootstrap-runner-2.0.0.CR3.jar, quarkus-core-2.0.0.CR3.jar, quarkus-development-mode-spi-2.0.0.CR3.jar, quarkus-ide-launcher-2.0.0.CR3.jar, quarkus-jaxp-2.0.0.CR3.jar, slf4j-api-1.7.31.jar, slf4j-jboss-logmanager-1.1.0.Final.jar, smallrye-common-annotation-1.6.0.jar, smallrye-common-classloader-1.6.0.jar, smallrye-common-constraint-1.6.0.jar, smallrye-common-expression-1.6.0.jar, smallrye-common-function-1.6.0.jar, smallrye-common-io-1.6.0.jar, smallrye-config-2.3.0.jar, smallrye-config-common-2.3.0.jar, smallrye-config-core-2.3.0.jar, spring-aop-5.2.13.RELEASE.jar, spring-beans-5.2.13.RELEASE.jar, spring-context-5.2.13.RELEASE.jar, spring-core-5.2.13.RELEASE.jar, spring-expression-5.2.13.RELEASE.jar, spring-jcl-5.2.13.RELEASE.jar, spring-security-core-5.4.5.jar, spring-security-crypto-5.4.5.jar, tesseract-4.1.1-1.5.5-android-arm.jar, tesseract-4.1.1-1.5.5-android-arm64.jar, tesseract-4.1.1-1.5.5-android-x86.jar, tesseract-4.1.1-1.5.5-android-x86_64.jar, tesseract-4.1.1-1.5.5-linux-arm64.jar, tesseract-4.1.1-1.5.5-linux-armhf.jar, tesseract-4.1.1-1.5.5-linux-ppc64le.jar, tesseract-4.1.1-1.5.5-linux-x86.jar, tesseract-4.1.1-1.5.5-linux-x86_64.jar, tesseract-4.1.1-1.5.5-macosx-x86_64.jar, tesseract-4.1.1-1.5.5-windows-x86.jar, tesseract-4.1.1-1.5.5-windows-x86_64.jar, tesseract-4.1.1-1.5.5.jar, tesseract-platform-4.1.1-1.5.5.jar, tyrus-standalone-client-2.0.0.jar, videoinput-0.200-1.5.5-windows-x86.jar, videoinput-0.200-1.5.5-windows-x86_64.jar, videoinput-0.200-1.5.5.jar, videoinput-platform-0.200-1.5.5.jar, websocket-api-9.4.43.v20210629.jar, wildfly-common-1.5.4.Final-format-001.jar, xtunes-0.0.1-SNAPSHOT.jar define 1 overlapping resources: [WARNING] - META-INF/MANIFEST.MF [WARNING] aopalliance-1.0.jar, spring-aop-5.2.13.RELEASE.jar define 9 overlapping classes: [WARNING] - org.aopalliance.aop.Advice [WARNING] - org.aopalliance.aop.AspectException [WARNING] - org.aopalliance.intercept.ConstructorInterceptor [WARNING] - org.aopalliance.intercept.ConstructorInvocation [WARNING] - org.aopalliance.intercept.Interceptor [WARNING] - org.aopalliance.intercept.Invocation [WARNING] - org.aopalliance.intercept.Joinpoint [WARNING] - org.aopalliance.intercept.MethodInterceptor [WARNING] - org.aopalliance.intercept.MethodInvocation [WARNING] artoolkitplus-2.3.1-1.5.5-windows-x86.jar, ffmpeg-4.3.2-1.5.5-windows-x86.jar, flandmark-1.07-1.5.5-windows-x86.jar, flycapture-2.13.3.31-1.5.5-windows-x86.jar, javacpp-1.5.5-windows-x86.jar, leptonica-1.80.0-1.5.5-windows-x86.jar, libdc1394-2.2.6-1.5.5-windows-x86.jar, libfreenect-0.5.7-1.5.5-windows-x86.jar, librealsense-1.12.4-1.5.5-windows-x86.jar, librealsense2-2.40.0-1.5.5-windows-x86.jar, openblas-0.3.13-1.5.5-windows-x86.jar, opencv-4.5.1-1.5.5-windows-x86.jar, tesseract-4.1.1-1.5.5-windows-x86.jar, videoinput-0.200-1.5.5-windows-x86.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/windows-x86/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/windows-x86/jnijavacpp/reflect-config.json [WARNING] javacpp-1.5.5-ios-x86_64.jar, openblas-0.3.13-1.5.5-ios-x86_64.jar, opencv-4.5.1-1.5.5-ios-x86_64.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/ios-x86_64/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/ios-x86_64/jnijavacpp/reflect-config.json [WARNING] ffmpeg-4.3.2-1.5.5-android-arm.jar, ffmpeg-4.3.2-1.5.5-android-arm64.jar, ffmpeg-4.3.2-1.5.5-android-x86.jar, ffmpeg-4.3.2-1.5.5-android-x86_64.jar, ffmpeg-4.3.2-1.5.5-linux-arm64.jar, ffmpeg-4.3.2-1.5.5-linux-armhf.jar, ffmpeg-4.3.2-1.5.5-linux-ppc64le.jar, ffmpeg-4.3.2-1.5.5-linux-x86.jar, ffmpeg-4.3.2-1.5.5-linux-x86_64.jar, ffmpeg-4.3.2-1.5.5-macosx-x86_64.jar, ffmpeg-4.3.2-1.5.5-windows-x86.jar, ffmpeg-4.3.2-1.5.5-windows-x86_64.jar, ffmpeg-4.3.2-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/ffmpeg/pom.properties [WARNING] - META-INF/maven/org.bytedeco/ffmpeg/pom.xml [WARNING] libfreenect-0.5.7-1.5.5-linux-arm64.jar, libfreenect-0.5.7-1.5.5-linux-armhf.jar, libfreenect-0.5.7-1.5.5-linux-ppc64le.jar, libfreenect-0.5.7-1.5.5-linux-x86.jar, libfreenect-0.5.7-1.5.5-linux-x86_64.jar, libfreenect-0.5.7-1.5.5-macosx-x86_64.jar, libfreenect-0.5.7-1.5.5-windows-x86.jar, libfreenect-0.5.7-1.5.5-windows-x86_64.jar, libfreenect-0.5.7-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/libfreenect/pom.properties [WARNING] - META-INF/maven/org.bytedeco/libfreenect/pom.xml [WARNING] org.apache.commons.logging-1.1.1.v201101211721.jar, spring-jcl-5.2.13.RELEASE.jar define 5 overlapping classes: [WARNING] - org.apache.commons.logging.Log [WARNING] - org.apache.commons.logging.LogFactory [WARNING] - org.apache.commons.logging.LogFactory$1 [WARNING] - org.apache.commons.logging.impl.NoOpLog [WARNING] - org.apache.commons.logging.impl.SimpleLog [WARNING] spring-security-core-5.4.5.jar, spring-security-crypto-5.4.5.jar define 47 overlapping classes: [WARNING] - org.springframework.security.crypto.argon2.Argon2EncodingUtils [WARNING] - org.springframework.security.crypto.argon2.Argon2EncodingUtils$Argon2Hash [WARNING] - org.springframework.security.crypto.argon2.Argon2PasswordEncoder [WARNING] - org.springframework.security.crypto.bcrypt.BCrypt [WARNING] - org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder [WARNING] - org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder$BCryptVersion [WARNING] - org.springframework.security.crypto.codec.Base64 [WARNING] - org.springframework.security.crypto.codec.Base64$InvalidBase64CharacterException [WARNING] - org.springframework.security.crypto.codec.Hex [WARNING] - org.springframework.security.crypto.codec.Utf8 [WARNING] - 37 more... [WARNING] artoolkitplus-2.3.1-1.5.5-android-x86_64.jar, ffmpeg-4.3.2-1.5.5-android-x86_64.jar, flandmark-1.07-1.5.5-android-x86_64.jar, javacpp-1.5.5-android-x86_64.jar, leptonica-1.80.0-1.5.5-android-x86_64.jar, openblas-0.3.13-1.5.5-android-x86_64.jar, opencv-4.5.1-1.5.5-android-x86_64.jar, tesseract-4.1.1-1.5.5-android-x86_64.jar define 2 overlapping resources: [WARNING] - META-INF/native-image/android-x86_64/jnijavacpp/jni-config.json [WARNING] - META-INF/native-image/android-x86_64/jnijavacpp/reflect-config.json [WARNING] javacpp-1.5.5-android-arm.jar, javacpp-1.5.5-android-arm64.jar, javacpp-1.5.5-android-x86.jar, javacpp-1.5.5-android-x86_64.jar, javacpp-1.5.5-ios-arm64.jar, javacpp-1.5.5-ios-x86_64.jar, javacpp-1.5.5-linux-arm64.jar, javacpp-1.5.5-linux-armhf.jar, javacpp-1.5.5-linux-ppc64le.jar, javacpp-1.5.5-linux-x86.jar, javacpp-1.5.5-linux-x86_64.jar, javacpp-1.5.5-macosx-arm64.jar, javacpp-1.5.5-macosx-x86_64.jar, javacpp-1.5.5-windows-x86.jar, javacpp-1.5.5-windows-x86_64.jar, javacpp-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/javacpp/pom.properties [WARNING] - META-INF/maven/org.bytedeco/javacpp/pom.xml [WARNING] libfreenect2-0.2.0-1.5.5-linux-x86.jar, libfreenect2-0.2.0-1.5.5-linux-x86_64.jar, libfreenect2-0.2.0-1.5.5-macosx-x86_64.jar, libfreenect2-0.2.0-1.5.5-windows-x86_64.jar, libfreenect2-0.2.0-1.5.5.jar define 2 overlapping resources: [WARNING] - META-INF/maven/org.bytedeco/libfreenect2/pom.properties [WARNING] - META-INF/maven/org.bytedeco/libfreenect2/pom.xml [WARNING] maven-shade-plugin has detected that some class files are [WARNING] present in two or more JARs. When this happens, only one [WARNING] single version of the class is copied to the uber jar. [WARNING] Usually this is not harmful and you can skip these warnings, [WARNING] otherwise try to manually exclude artifacts based on [WARNING] mvn dependency:tree -Ddetail=true and the above output. [WARNING] See http://maven.apache.org/plugins/maven-shade-plugin/ [INFO] [INFO] --- exec-maven-plugin:1.6.0:exec (default) @ xtunes --- WARNING: Using incubator modules: jdk.incubator.jpackage WARNING: Using incubator modules: jdk.incubator.jpackage WARNING: Using incubator modules: jdk.incubator.jpackage [INFO] [INFO] --- maven-install-plugin:2.4:install (default-install) @ xtunes --- [INFO] Installing C:\sdk\mServweb2\xTunesVNginxS\target\xtunes-0.0.1-SNAPSHOT.jar to C:\Users\auenda\.m2\repository\xTunesNginx\xtunes\0.0.1-SNAPSHOT\xtunes-0.0.1-SNAPSHOT.jar [INFO] Installing C:\sdk\mServweb2\xTunesVNginxS\pom.xml to C:\Users\auenda\.m2\repository\xTunesNginx\xtunes\0.0.1-SNAPSHOT\xtunes-0.0.1-SNAPSHOT.pom [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ [INFO] Total time: 03:24 min [INFO] Finished at: 2021-08-06T06:22:25+09:00 [INFO] ------------------------------------------------------------------------ ==================================================================================== [PrimaryController][initialize]8219: -------initialize Entry ------- [PrimaryController][onStartCamera]7945: chord.wav => カメラ単独で起動してください。 [PrimaryController][onStartCamera]7960: カメラを起動させる [ WARN:0] global C:\build\master_winpack-bindings-win64-vc14-static\opencv\modules\videoio\src\cap_msmf.cpp (434) `anonymous-namespace'::SourceReaderCB::~SourceReaderCB terminating async callback [PrimaryController][onStartCamera]7969: FPS を設定する ===================================================================================== [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Your system is not supported by certbot-auto anymore. certbot-auto and its Certbot installation will no longer receive updates. You will not receive any bug fixes including those fixing server compatibility or security problems. Please visit https://certbot.eff.org/ to check for other alternatives. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate for uenda.pgw.jp and 9 more domains Performing the following challenges: http-01 challenge for git.uenda.pgw.jp http-01 challenge for julie.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem Your cert will expire on 2021-11-12. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ================================================================================================================================================ ================================================================================================================================================ [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Your system is not supported by certbot-auto anymore. certbot-auto and its Certbot installation will no longer receive updates. You will not receive any bug fixes including those fixing server compatibility or security problems. Please visit https://certbot.eff.org/ to check for other alternatives. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate for uenda.pgw.jp and 9 more domains Performing the following challenges: http-01 challenge for git.uenda.pgw.jp http-01 challenge for julie.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem Your cert will expire on 2022-02-04. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ============================================================================================================= [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d diana.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Your system is not supported by certbot-auto anymore. certbot-auto and its Certbot installation will no longer receive updates. You will not receive any bug fixes including those fixing server compatibility or security problems. Please visit https://certbot.eff.org/ to check for other alternatives. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate for uenda.pgw.jp and 10 more domains Performing the following challenges: http-01 challenge for diana.uenda.pgw.jp http-01 challenge for git.uenda.pgw.jp http-01 challenge for julie.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for mail.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem Your cert will expire on 2022-03-06. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ================================================================================================================== [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d eva.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d diana.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Your system is not supported by certbot-auto anymore. certbot-auto and its Certbot installation will no longer receive updates. You will not receive any bug fixes including those fixing server compatibility or security problems. Please visit https://certbot.eff.org/ to check for other alternatives. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate for uenda.pgw.jp and 11 more domains Performing the following challenges: http-01 challenge for eva.uenda.pgw.jp Using the webroot path /var/www/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem Your cert will expire on 2022-03-20. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ===================================================================================================================== [root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d eva.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d diana.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default Your system is not supported by certbot-auto anymore. certbot-auto and its Certbot installation will no longer receive updates. You will not receive any bug fixes including those fixing server compatibility or security problems. Please visit https://certbot.eff.org/ to check for other alternatives. Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Renewing an existing certificate for uenda.pgw.jp and 11 more domains IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem Your cert will expire on 2022-03-23. To obtain a new or tweaked version of this certificate in the future, simply run letsencrypt-auto again. To non-interactively renew *all* of your certificates, run "letsencrypt-auto renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@madonna ~]# ===================================== OK ========================== /usr/bin/certbot certonly \ --webroot \ -w /var/www/certbot/uenda.pgw.jp \ -d uenda.pgw.jp \ --preferred-challenges http \ --agree-tos \ -m auenda@uenda.pgw.jp \ --dry-run ================================ NG =============================== -d madonna.uenda.pgw.jp \ -d lisa.uenda.pgw.jp \ -d stacey.uenda.pgw.jp \ -d julie.uenda.pgw.jp \ -d xtunes.uenda.pgw.jp \ -d eva.uenda.pgw.jp \ -d diana.uenda.pgw.jp \ -d olivia.uenda.pgw.jp \ ---------------------------- NG --------------------------- /usr/bin/certbot certonly \ --webroot \ -w /var/www/certbot/uenda.pgw.jp \ -d uenda.pgw.jp \ -w /var/www/certbot/madonna.uenda.pgw.jp \ -d madonna.uenda.pgw.jp \ -w /var/www/certbot/lisa.uenda.pgw.jp \ -d lisa.uenda.pgw.jp \ -w /var/www/certbot/stacey.uenda.pgw.jp \ -d stacey.uenda.pgw.jp \ -w /var/www/certbot/julie.uenda.pgw.jp \ -d julie.uenda.pgw.jp \ -w /var/www/certbot/xtunes.uenda.pgw.jp \ -d xtunes.uenda.pgw.jp \ -w /var/www/certbot/eva.uenda.pgw.jp \ -d eva.uenda.pgw.jp \ -w /var/www/certbot/diana.uenda.pgw.jp \ -d diana.uenda.pgw.jp \ -w /var/www/certbot/olivia.uenda.pgw.jp \ -d olivia.uenda.pgw.jp \ ----------------------------------------- NG -------------------------------------- /usr/bin/certbot certonly \ --webroot \ -w /var/www/certbot/uenda.pgw.jp \ -d uenda.pgw.jp \ -d madonna.uenda.pgw.jp \ -d lisa.uenda.pgw.jp \ -d stacey.uenda.pgw.jp \ -d julie.uenda.pgw.jp \ -d xtunes.uenda.pgw.jp \ -d eva.uenda.pgw.jp \ -d diana.uenda.pgw.jp \ -d olivia.uenda.pgw.jp \ --preferred-challenges http \ --agree-tos \ -m auenda@uenda.pgw.jp \ --dry-run =================================================================================================================== Features disabled or unavailable on this platform: Memory allocator: system +------------------------------------------+ | ==== WARNING ==== | | | | This is NOT a recommended configuration. | | Using the system memory allocator causes | | reduced performance and increased memory | | fragmentation. Installing the jemalloc | | memory allocator (version >= 4.0.0) is | | strongly recommended. | +------------------------------------------+ Small-system tuning (--with-tuning) Allow 'dnstap' packet logging (--enable-dnstap) GeoIP2 access control (--enable-geoip) DNS Response Policy Service interface (--enable-dnsrps) Allow 'fixed' rrset-order (--enable-fixed-rrset) Very verbose query trace logging (--enable-querytrace) Single-query trace logging (--enable-singletrace) CMocka Unit Testing Framework (--with-cmocka) JSON statistics (--with-json-c) LMDB database to store configuration for 'addzone' zones (--with-lmdb) IDN support (--with-libidn2) ------------------------------------------------------------------------------- Configured paths: prefix: /usr/local sysconfdir: ${prefix}/etc localstatedir: ${prefix}/var ------------------------------------------------------------------------------- Compiler: gcc -std=gnu99 gcc (GCC) 4.8.5 20150623 (Red Hat 4.8.5-44) Copyright (C) 2015 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. CFLAGS: -Wall -Wextra -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -pthread CPPFLAGS: -D_FORTIFY_SOURCE=2 LDFLAGS: ------------------------------------------------------------------------------- For more detail, use --enable-full-report. =============================================================================== [root@madonna ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@uenda.pgw.jp --dry-run Saving debug log to /var/log/letsencrypt/letsencrypt.log Simulating a certificate request for uenda.pgw.jp Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: uenda.pgw.jp Type: unauthorized Detail: Invalid response from http://uenda.pgw.jp/.well-known/acme-challenge/LP2YhqjqjT5XqsaSKMmjNjDrtllZG-Y7bsdNUvweWPU [210.154.137.47]: 404 Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. Some challenges have failed. Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details. ============================================ NG ==========03/10 ===================================================== ok ====================================== [root@diana ~]# certbot certonly -a webroot --webroot-path=/var/www/nginx/html -d uenda.pgw.jp -d www.uenda.pgw.jp Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org Requesting a certificate for uenda.pgw.jp and www.uenda.pgw.jp Performing the following challenges: http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp Using the webroot path /var/www/nginx/html for all unmatched domains. Waiting for verification... Cleaning up challenges IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem Your certificate will expire on 2022-06-13. To obtain a new or tweaked version of this certificate in the future, simply run certbot again. To non-interactively renew *all* of your certificates, run "certbot renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@diana ~]# ================================================================= OK =================== [root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@uenda.pgw.jp Saving debug log to /var/log/letsencrypt/letsencrypt.log Python 3.6 support will be dropped in the next release of Certbot - please upgrade your Python version. Requesting a certificate for uenda.pgw.jp and 6 more domains Successfully received certificate. Certificate is saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Key is saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem This certificate expires on 2022-07-17. These files will be updated when the certificate renews. NEXT STEPS: - The certificate will need to be renewed before it expires. Certbot can automatically renew the certificate in the background, but you may need to take steps to enable that functionality. See https://certbot.org/renewal-setup for instructions. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - If you like Certbot, please consider supporting our work by: * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate * Donating to EFF: https://eff.org/donate-le - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - [root@diana ~]# lisa, stacey, julie, eva, diana, sade ================================================================================================================================== [root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/www.uenda.pgw.jp -d www.uenda.pgw.jp -w /var/www/certbot/madonna.uenda.pgw.jp -d madonna.uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp \ > -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp -w /var/www/certbot/olivia.uenda.pgw.jp -d olivia.uenda.pgw.jp -w /var/www/certbot/rihanna.uenda.pgw.jp -d rihanna.uenda.pgw.jp -w /var/www/certbot/ast.uenda.pgw.jp -d ast.uenda.pgw.jp -w /var/www/certbot/leslie.uenda.pgw.jp -d leslie.uenda.pgw.jp -w /var/www/certbot/dinah.uenda.pgw.jp -d dinah.uenda.pgw.jp \ > -w /var/www/certbot/jena.uenda.pgw.jp -d jena.uenda.pgw.jp -w /var/www/certbot/maria.uenda.pgw.jp -d maria.uenda.pgw.jp \ > -w /var/www/certbot/rachael.uenda.pgw.jp -d rachael.uenda.pgw.jp -w /var/www/certbot/xtunes.uenda.pgw.jp -d xtunes.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@uenda.pgw.jp Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Would you be willing, once your first certificate is successfully issued, to share your email address with the Electronic Frontier Foundation, a founding partner of the Let's Encrypt project and the non-profit organization that develops Certbot? We'd like to send you email about our work encrypting the web, EFF news, campaigns, and ways to support digital freedom. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - (Y)es/(N)o: y Account registered. Requesting a certificate for uenda.pgw.jp and 17 more domains Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for diana.uenda.pgw.jp http-01 challenge for dinah.uenda.pgw.jp http-01 challenge for eva.uenda.pgw.jp http-01 challenge for jena.uenda.pgw.jp http-01 challenge for julie.uenda.pgw.jp http-01 challenge for leslie.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for maria.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for rachael.uenda.pgw.jp http-01 challenge for rihanna.uenda.pgw.jp http-01 challenge for sade.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/certbot/xtunes.uenda.pgw.jp for all unmatched domains. Waiting for verification... Challenge failed for domain ast.uenda.pgw.jp Challenge failed for domain diana.uenda.pgw.jp Challenge failed for domain dinah.uenda.pgw.jp Challenge failed for domain eva.uenda.pgw.jp Challenge failed for domain jena.uenda.pgw.jp Challenge failed for domain julie.uenda.pgw.jp Challenge failed for domain leslie.uenda.pgw.jp Challenge failed for domain lisa.uenda.pgw.jp Challenge failed for domain madonna.uenda.pgw.jp Challenge failed for domain maria.uenda.pgw.jp Challenge failed for domain olivia.uenda.pgw.jp Challenge failed for domain rachael.uenda.pgw.jp Challenge failed for domain rihanna.uenda.pgw.jp Challenge failed for domain sade.uenda.pgw.jp Challenge failed for domain stacey.uenda.pgw.jp Challenge failed for domain uenda.pgw.jp Challenge failed for domain www.uenda.pgw.jp Challenge failed for domain xtunes.uenda.pgw.jp http-01 challenge for ast.uenda.pgw.jp http-01 challenge for diana.uenda.pgw.jp http-01 challenge for dinah.uenda.pgw.jp http-01 challenge for eva.uenda.pgw.jp http-01 challenge for jena.uenda.pgw.jp http-01 challenge for julie.uenda.pgw.jp http-01 challenge for leslie.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for maria.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for rachael.uenda.pgw.jp http-01 challenge for rihanna.uenda.pgw.jp http-01 challenge for sade.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Cleaning up challenges Some challenges have failed. IMPORTANT NOTES: - The following errors were reported by the server: Domain: ast.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://ast.uenda.pgw.jp/.well-known/acme-challenge/0OC3QqFWhB-fJwIhX7s4zlDBgBaidsXA3gdHofAQ6jk: 404 Domain: diana.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from https://diana.uenda.pgw.jp/.well-known/acme-challenge/AbNELafyOFLOaRG1Xo5ATAo_nZG2tHjDiZK5ukwlj4w: 404 Domain: dinah.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://dinah.uenda.pgw.jp/.well-known/acme-challenge/D9c6xSLtRGalukbec5ewjrVCMbi32chcSNQZ8D2LgKY: 404 Domain: eva.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://eva.uenda.pgw.jp/.well-known/acme-challenge/_F29Z7aUJYDZ8hFFo_1sLeyT_py_iivfpMTtZVX8OK8: 404 Domain: jena.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://jena.uenda.pgw.jp/.well-known/acme-challenge/W5hxzYYAynipTASf2YWOXwhXXetPltMuyWihDtpWHY0: 404 Domain: julie.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://julie.uenda.pgw.jp/.well-known/acme-challenge/CmbkphK_372kVYXkuGip_OGmNvPqtnxUCq_xbi8PF6c: 404 Domain: leslie.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://leslie.uenda.pgw.jp/.well-known/acme-challenge/5QY0gE4w2Xo3iE8YekfuR2tpxlcm5AeRfSpXUChfrGs: 404 Domain: lisa.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://lisa.uenda.pgw.jp/.well-known/acme-challenge/FrVQXrZ_idAyrQMZ9POYYZs3A_tc0swQ5_OKNumRZuM: 404 Domain: madonna.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://madonna.uenda.pgw.jp/.well-known/acme-challenge/QbEFE_jEV68rpOi6HBLOhDOrCiZh-34gXQRpcS-b-fU: 404 Domain: maria.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://maria.uenda.pgw.jp/.well-known/acme-challenge/1nSOGuMtQtT56COi07nLtTqbVB55xB075LoGeQ_zcS0: 404 Domain: olivia.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://olivia.uenda.pgw.jp/.well-known/acme-challenge/RQsX6hKHisqG8H669PlFdV2IS4-EdN1BKiRqpsFyfYk: 404 Domain: rachael.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://rachael.uenda.pgw.jp/.well-known/acme-challenge/pvtIc83XLzvM5rLGSrrLM4hxG2ED6azCTL-SM3kTP1Y: 404 Domain: rihanna.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://rihanna.uenda.pgw.jp/.well-known/acme-challenge/OrIgJf50VQY5tBwsm_ME2orY0ze5bWO5uXGiTxSzPgs: 404 Domain: sade.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://sade.uenda.pgw.jp/.well-known/acme-challenge/Re1ZGvwazljBVimuZzwK_0c2LdDsDlgnKyDRNT7oXnc: 404 Domain: stacey.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://stacey.uenda.pgw.jp/.well-known/acme-challenge/0WW24McI4yqaqLLjd6_1f9BPTtjAN9Pmt-KQPfq5WrU: 404 Domain: uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from https://uenda.pgw.jp/.well-known/acme-challenge/-8lm_jCrsnGScS3rZGu5QDsgODLJrPV7dabzdgHL4cs: 404 Domain: www.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from https://uenda.pgw.jp/.well-known/acme-challenge/TDHvKn05VjYvGPaA-rHQCuVw3fJbPqOWTgRgdmNlrO8: 404 Domain: xtunes.uenda.pgw.jp Type: unauthorized Detail: 210.154.137.47: Invalid response from http://xtunes.uenda.pgw.jp/.well-known/acme-challenge/UeVS5s4Y1H1bjtS7rRJDEKMNLoWKWgcnGGxNOD8FCws: 404 To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address. [root@diana ~]# =============================================================================================== =============================================================================================== [root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/www.uenda.pgw.jp -d www.uenda.pgw.jp -w /var/www/certbot/madonna.uenda.pgw.jp -d madonna.uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp \ > -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp -w /var/www/certbot/olivia.uenda.pgw.jp -d olivia.uenda.pgw.jp -w /var/www/certbot/rihanna.uenda.pgw.jp -d rihanna.uenda.pgw.jp -w /var/www/certbot/ast.uenda.pgw.jp -d ast.uenda.pgw.jp -w /var/www/certbot/leslie.uenda.pgw.jp -d leslie.uenda.pgw.jp -w /var/www/certbot/dinah.uenda.pgw.jp -d dinah.uenda.pgw.jp \ > -w /var/www/certbot/jena.uenda.pgw.jp -d jena.uenda.pgw.jp -w /var/www/certbot/maria.uenda.pgw.jp -d maria.uenda.pgw.jp \ > -w /var/www/certbot/rachael.uenda.pgw.jp -d rachael.uenda.pgw.jp -w /var/www/certbot/xtunes.uenda.pgw.jp -d xtunes.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@uenda.pgw.jp Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org Requesting a certificate for uenda.pgw.jp and 17 more domains Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for diana.uenda.pgw.jp http-01 challenge for dinah.uenda.pgw.jp http-01 challenge for eva.uenda.pgw.jp http-01 challenge for jena.uenda.pgw.jp http-01 challenge for julie.uenda.pgw.jp http-01 challenge for leslie.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for maria.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for rachael.uenda.pgw.jp http-01 challenge for rihanna.uenda.pgw.jp http-01 challenge for sade.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for uenda.pgw.jp http-01 challenge for www.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/certbot/xtunes.uenda.pgw.jp for all unmatched domains. Waiting for verification... Cleaning up challenges Subscribe to the EFF mailing list (email: auenda@uenda.pgw.jp). Starting new HTTPS connection (1): supporters.eff.org IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem Your certificate will expire on 2022-09-04. To obtain a new or tweaked version of this certificate in the future, simply run certbot again. To non-interactively renew *all* of your certificates, run "certbot renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@diana ~]# ============================================================================================================================================ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 00 05 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@ipv4.mydns.jp/login.html' -------------------------------------------------------------------------------------------------------------------------------------------- $ sudo apt install auditd setools policycoreutils selinux-utils selinux-basics policycoreutils-python-utils ------------------------------------------------------------------------------- ============================================================================================================================================= certbot: error: unrecognized arguments: /var/www/certbot/diana.uenda.pgw.jp /var/www/certbot/jena.uenda.pgw.jp /var/www/certbot/rachael.uenda.pgw.jp [root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/www.uenda.pgw.jp -d www.uenda.pgw.jp -w /var/www/certbot/madonna.uenda.pgw.jp -d madonna.uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp -w /var/www/certbot/olivia.uenda.pgw.jp -d olivia.uenda.pgw.jp -w /var/www/certbot/rihanna.uenda.pgw.jp -d rihanna.uenda.pgw.jp -w /var/www/certbot/ast.uenda.pgw.jp -d ast.uenda.pgw.jp -w /var/www/certbot/leslie.uenda.pgw.jp -d leslie.uenda.pgw.jp -w /var/www/certbot/dinah.uenda.pgw.jp -d dinah.uenda.pgw.jp -w /var/www/certbot/jena.uenda.pgw.jp -d jena.uenda.pgw.jp -w /var/www/certbot/maria.uenda.pgw.jp -d maria.uenda.pgw.jp -w /var/www/certbot/rachael.uenda.pgw.jp -d rachael.uenda.pgw.jp -w /var/www/certbot/xtunes.uenda.pgw.jp -d xtunes.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@beach.ocn.ne.jp ============================================================================================================================================= [root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/www.uenda.pgw.jp -d www.uenda.pgw.jp -w /var/www/certbot/madonna.uenda.pgw.jp -d madonna.uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp -w /var/www/certbot/olivia.uenda.pgw.jp -d olivia.uenda.pgw.jp -w /var/www/certbot/rihanna.uenda.pgw.jp -d rihanna.uenda.pgw.jp -w /var/www/certbot/ast.uenda.pgw.jp -d ast.uenda.pgw.jp -w /var/www/certbot/leslie.uenda.pgw.jp -d leslie.uenda.pgw.jp -w /var/www/certbot/dinah.uenda.pgw.jp -d dinah.uenda.pgw.jp -w /var/www/certbot/jena.uenda.pgw.jp -d jena.uenda.pgw.jp -w /var/www/certbot/maria.uenda.pgw.jp -d maria.uenda.pgw.jp -w /var/www/certbot/rachael.uenda.pgw.jp -d rachael.uenda.pgw.jp -w /var/www/certbot/xtunes.uenda.pgw.jp -d xtunes.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@beach.ocn.ne.jp --no-effi-email Saving debug log to /var/log/letsencrypt/letsencrypt.log Plugins selected: Authenticator webroot, Installer None Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org Requesting a certificate for uenda.pgw.jp and 17 more domains Performing the following challenges: http-01 challenge for ast.uenda.pgw.jp http-01 challenge for diana.uenda.pgw.jp http-01 challenge for dinah.uenda.pgw.jp http-01 challenge for eva.uenda.pgw.jp http-01 challenge for jena.uenda.pgw.jp http-01 challenge for julie.uenda.pgw.jp http-01 challenge for leslie.uenda.pgw.jp http-01 challenge for lisa.uenda.pgw.jp http-01 challenge for madonna.uenda.pgw.jp http-01 challenge for maria.uenda.pgw.jp http-01 challenge for olivia.uenda.pgw.jp http-01 challenge for rachael.uenda.pgw.jp http-01 challenge for rihanna.uenda.pgw.jp http-01 challenge for sade.uenda.pgw.jp http-01 challenge for stacey.uenda.pgw.jp http-01 challenge for xtunes.uenda.pgw.jp Using the webroot path /var/www/certbot/xtunes.uenda.pgw.jp for all unmatched domains. Waiting for verification... Cleaning up challenges Subscribe to the EFF mailing list (email: auenda@uenda.pgw.jp). Starting new HTTPS connection (1): supporters.eff.org IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem Your certificate will expire on 2022-12-04. To obtain a new or tweaked version of this certificate in the future, simply run certbot again. To non-interactively renew *all* of your certificates, run "certbot renew" - If you like Certbot, please consider supporting our work by: Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate Donating to EFF: https://eff.org/donate-le [root@diana ~]# ========================================================================================================================= 00 22 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@ipv4.mydns.jp/login.html' 5 7 2,17 * * /bin/certbot renew ------------------------------------------------------------------------------------ # certbot renew Saving debug log to /var/log/letsencrypt/letsencrypt.log IMPORTANT NOTES: - Congratulations! Your certificate and chain have been saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem Your key file has been saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem Your certificate will expire on 2023-02-20. ======================================================================================================================= [root@diana ~]# certbot renew --dry-run #試し実行 = ' --dry-run' Saving debug log to /var/log/letsencrypt/letsencrypt.log - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Processing /etc/letsencrypt/renewal/uenda.pgw.jp.conf - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Simulating renewal of an existing certificate for uenda.pgw.jp and 17 more domains - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Congratulations, all simulated renewals succeeded: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem (success) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - [root@diana ~]# ======================================================================================================================= sumiyoshi letsEncrypt ======================================================================================== [root@stacey ~]# /usr/bin/certbot certonly --standalone -d sumiyoshi.pgw.jp -d www.sumiyoshi.pgw.jp -d madonna.sumiyoshi.pgw.jp -d lisa.sumiyoshi.pgw.jp -d stacey.sumiyoshi.pgw.jp -d julie.sumiyoshi.pgw.jp -d eva.sumiyoshi.pgw.jp -d diana.sumiyoshi.pgw.jp -d sade.sumiyoshi.pgw.jp -d olivia.sumiyoshi.pgw.jp -d rihanna.sumiyoshi.pgw.jp -d ast.sumiyoshi.pgw.jp -d leslie.sumiyoshi.pgw.jp -d dinah.sumiyoshi.pgw.jp -d jena.sumiyoshi.pgw.jp -d maria.sumiyoshi.pgw.jp -d rachael.sumiyoshi.pgw.jp -d xtunes.sumiyoshi.pgw.jp Saving debug log to /var/log/letsencrypt/letsencrypt.log Enter email address (used for urgent renewal and security notices) (Enter 'c' to cancel): auenda@m-cn.ne.jp - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Please read the Terms of Service at https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf. You must agree in order to register with the ACME server. Do you agree? - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - (Y)es/(N)o: yes - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Would you be willing, once your first certificate is successfully issued, to share your email address with the Electronic Frontier Foundation, a founding partner of the Let's Encrypt project and the non-profit organization that develops Certbot? We'd like to send you email about our work encrypting the web, EFF news, campaigns, and ways to support digital freedom. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - (Y)es/(N)o: no Account registered. Requesting a certificate for sumiyoshi.pgw.jp and 17 more domains Successfully received certificate. Certificate is saved at: /etc/letsencrypt/live/sumiyoshi.pgw.jp/fullchain.pem Key is saved at: /etc/letsencrypt/live/sumiyoshi.pgw.jp/privkey.pem This certificate expires on 2023-04-08. These files will be updated when the certificate renews. NEXT STEPS: - The certificate will need to be renewed before it expires. Certbot can automatically renew the certificate in the background, but you may need to take steps to enable that functionality. See https://certbot.org/renewal-setup for instructions. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - If you like Certbot, please consider supporting our work by: * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate * Donating to EFF: https://eff.org/donate-le - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - [root@stacey ~]# ====================================================================================== ======================================================================================== Let's Encrypt certificate expiration notice for domain "ast.sumiyoshi.pgw.jp" (and 17 more) ---------------------------------------------------------------------------------------- Hello, Your certificate (or certificates) for the names listed below will expire in 19 days (on 2023-04-08). Please make sure to renew your certificate before then, or visitors to your web site will encounter errors. We recommend renewing certificates automatically when they have a third of their total lifetime left. For Let's Encrypt's current 90-day certificates, that means renewing 30 days before expiration. See https://letsencrypt.org/docs/integration-guide/ for details. ast.sumiyoshi.pgw.jp diana.sumiyoshi.pgw.jp dinah.sumiyoshi.pgw.jp eva.sumiyoshi.pgw.jp jena.sumiyoshi.pgw.jp julie.sumiyoshi.pgw.jp leslie.sumiyoshi.pgw.jp lisa.sumiyoshi.pgw.jp madonna.sumiyoshi.pgw.jp maria.sumiyoshi.pgw.jp olivia.sumiyoshi.pgw.jp rachael.sumiyoshi.pgw.jp rihanna.sumiyoshi.pgw.jp sade.sumiyoshi.pgw.jp stacey.sumiyoshi.pgw.jp sumiyoshi.pgw.jp www.sumiyoshi.pgw.jp xtunes.sumiyoshi.pgw.jp For details about when we send these emails, please visit: https://letsencrypt.org/docs/expiration-emails/ In particular, note that this reminder email is still sent if you've obtained a slightly different certificate by adding or removing names. If you've replaced this certificate with a newer one that covers more or fewer names than the list above, you may be able to ignore this message. For any questions or support, please visit: https://community.letsencrypt.org/ Unfortunately, we can't provide support by email. To learn more about the latest technical and organizational updates from Let's Encrypt, sign up for our newsletter: https://mailchi.mp/letsencrypt.org/fjp6ha1gad If you are receiving this email in error, unsubscribe at: http://delivery.letsencrypt.org/track/unsub.php?u=30850198&id=6ca96bf3ca344f2e8b84bce182f1f491.kWOtig0rP7CbahJ9beFlrsX6d%2Fs%3D&r=https%3A%2F%2Fmandrillapp.com%2Funsub%3Fmd_email%3Da%252A%252A%252A%252A%2540m%252A%252A%252A%252A.%252A%252A%252A Please note that this would also unsubscribe you from other Let's Encrypt service notices, including expiration reminders for any other certificates. Regards, The Let's Encrypt Team ==================================================