shutdown /r /o /t 0
Scope=====================================================
スイッチャブル Diversity DNR ? GSLink ハードダーツ CONVERSION POINT
-----------------------------
DNR”は“Do not resuscitate”の略語で、日本語では「蘇生させないで下さい」を するには
「蘇生の努力は止めて下さい」の意味で、
(余命が限られているので)「緊急時に心肺蘇生をするな」との意思表示
フィールドスコープ Monarch5 8×56(41,232) モナーク7 10x42(42,787)
----------------------------- ##### Skylark = 第6世代のCore i
well MB02 1インチ=2.54cm dlna MC572J/A(AppleTV_2世代)
asuparu gun 1フィート=30.48cm Protein Diet Bar
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ http://www.clipconverter.cc/en/
SAMURAI EDGE Barry Burton Model Ver.II hi-capa5.1 カスタム
本体サイズ :全長:258mm、重量:1.155g、銃身長:106mm、装弾数:32+1発
---------------------------------------------------------------
https://manage.norton.com/Rewards/Download?psn=GYQ3YQQK262J&flowType=KeyEntry&service=manage
NORTON OLD 150days
http://kodi.wiki/view/development_builds
Development builds: Kodi v17.0 "Krypton"
shutdown /r /o /t 0
USEN+HMV \20/a day
# lppasswd -g sys -a root
password: 〜
------------------------------------------------------------------
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net/fullchain.pem. Your cert will
expire on 2016-07-18. To obtain a new version of the certificate in
the future, simply run Let's Encrypt again.
- If you lose your account credentials, you can recover through
e-mails sent to auenda@uenda.net.
- Your account credentials have been saved in your Let's Encrypt
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Let's
Encrypt so making regular backups of this folder is ideal.
- If you like Let's Encrypt, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
-------------------------------------------------------------------------
/usr/local/apache2/bin/apachectl -----> /usr/sbin/apachectl
# restorecon -RF /etc/systemd/system
--------------------------------------------------------------------------------
/usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"
Warning: This script will remove:
/usr/local/.git/
/usr/local/.gitignore
/usr/local/.yardopts
/usr/local/CODEOFCONDUCT.md
/usr/local/CONTRIBUTING.md
/usr/local/Cellar/
/usr/local/LICENSE.txt
/usr/local/Library/
/usr/local/README.md
/usr/local/SUPPORTERS.md
--------------------------------------
[ C言語の構造体 ]
@interface User : NSObject
@property(nonatomic, strong) NSString *name;
@property(nonatomic, strong) NSString *mail;
@property(nonatomic, strong) NSString *phone;
@property(nonatomic, strong) NSString *memo;
-(id) initWithName:(NSString*)Name mail:(NSString*)mail phone:(NSString*)phone memo:(NSString*)memo;
@end
---------------------------------------
## Admin Page SSL Rewrite Option
#
RewriteEngine on
RewriteCond %{HTTPS} off
RewriteRule ^(.*)$ https://www.hoge.co.jp/sslform/$1 [R=301,L]
------------------------------------------------------------------------
# Require host .example.com
# Require ip 127
# Require all granted
# Require all denied
==================
C:\Users\auenda>ls
0 [main] us 0 init_cheap: VirtualAlloc pointer is null, Win32 error 487
AllocationBase 0x0, BaseAddress 0x60EA0000, RegionSize 0x60000, State 0x10000
C:\MinGW\msys\1.0\bin\ls.exe: *** Couldn't reserve space for cygwin's heap, Win32 error 0
---------------------------
----------------------------------------------------------
<IBM-4>4. 単一ユーザー・モードへのドロップ
ここでシングルユーザーモードに移行します。
この辺の細かい手順記載はさすがです。分かりやすい!
まぁ、シングルユーザーモード、を「単一ユーザー・モード」と記載してあるのは気にしないことです。同じ意味です。私は「単一ユーザー・モード」って始めて聞きましたけど。
# init 1
を実行します。
GUI上で「GNOME端末」から作業をしていた人は画面がいきなり変わってびっくりしたかもしれません。
これがシングル・ユーザーモードです。
いきなり画面が真っ黒になって、文字が出てますが、作業を進めていきます。
--------------------------------------------------------------crontab -e
00 05 01,15 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d www.uenda.net --renew-by-default && /etc/init.d/httpd restart
00 00 * * * /root/mknmz.sh /var/www/html/ /usr/local/var/namazu/index/uenda/ ; /root/gcnmz.sh
--------------------------------------------------------------
http://www.mysqueezebox.com/download
Logitech Media Server v7.7.5
------------------------------------------------
wget http://ludovic.rousseau.free.fr/softwares/pcsc-perl/pcsc-perl-1.4.14.tar.bz2
wget http://ludovic.rousseau.free.fr/softwares/pcsc-tools/pcsc-tools-1.4.27.tar.gz
cd ~/pt3_tmp
tar -zxvf epgdumpUNA160127.tar.gz
cd epgdump
make && sudo make install
------------------------------------------
# yum --enablerepo=epel,nux-dextop install ffmpeg
----------------------------------------------------------
# yum --enablerepo=epel,nux-dextop install libdvdcss gstreamer{,1}-plugins-ugly gstreamer-plugins-bad-nonfree gstreamer1-plugins-bad-freeworld libde265 x265
---------------------------------------------------------------
インストール:
gstreamer-plugins-bad-nonfree.x86_64 0:0.10.23-2.el7.nux
gstreamer-plugins-ugly.x86_64 0:0.10.19-17.el7.nux
gstreamer1-plugins-bad-freeworld.x86_64 0:1.0.6-1.el7.nux
gstreamer1-plugins-ugly.x86_64 0:1.0.6-2.el7.nux
libde265.x86_64 0:0.8-1.el7.nux
libdvdcss.x86_64 0:1.2.13-1.el7.nux
x265.x86_64 0:1.9-1.el7.nux
依存性関連をインストールしました:
a52dec.x86_64 0:0.7.4-18.el7.nux faad2-libs.x86_64 1:2.7-5.el7.nux
libdca.x86_64 0:0.0.5-7.el7.nux libmad.x86_64 0:0.15.1b-16.el7.nux
libmimic.x86_64 0:1.0.4-7.el7.nux libmms.x86_64 0:0.6.4-1.el7.nux
libmpeg2.x86_64 0:0.5.1-10.el7.nux libmpg123.x86_64 0:1.15.1-1.el7.nux
librtmp.x86_64 0:2.4-2.20131205.gitdc76f0a.el7.nux libsidplay.x86_64 0:1.36.60-2.el7.nux
mjpegtools-libs.x86_64 0:2.1.0-5.el7.nux opencore-amr.x86_64 0:0.1.3-3.el7.nux
twolame-libs.x86_64 0:0.3.13-3.el7.nux vo-amrwbenc.x86_64 0:0.1.2-1.el7.nux
# yum --enablerepo=epel,nux-dextop install vlc smplayer
----------------------------------------------------------
インストール:
smplayer.x86_64 0:15.11.0-1.el7.nux vlc.x86_64 1:2.2.2-4.el7.nux
依存性関連をインストールしました:
SDL_image.x86_64 0:1.2.12-11.el7 aalib-libs.x86_64 0:1.4.0-0.22.rc5.el7
crystalhd-firmware.noarch 0:3.10.0-11.el7 enca.x86_64 0:1.18-1.el7
freeglut.x86_64 0:2.8.1-3.el7 ftgl.x86_64 0:2.1.3-0.8.rc5.el7
kde-filesystem.x86_64 0:4-47.el7 libXScrnSaver.x86_64 0:1.2.2-6.1.el7
libbs2b.x86_64 0:3.1.0-13.el7 libcaca.x86_64 0:0.99-0.17.beta17.el7
libcddb.x86_64 0:1.3.2-12.el7 libchromaprint.x86_64 0:1.0-1.el7
libcrystalhd.x86_64 0:3.10.0-11.el7 libdvbpsi.x86_64 0:0.2.2-3.el7.nux
libebml.x86_64 0:1.3.3-3.el7 libkate.x86_64 0:0.4.1-5.el7
libmatroska.x86_64 0:1.4.1-1.el7 libmfx.x86_64 0:0.0.0-3.9f4a84d.el7.nux
libmng.x86_64 0:1.0.10-14.el7 libmodplug.x86_64 1:0.8.8.5-3.el7
libnemesi.x86_64 0:0.7.0-0.5.20110215git.el7.nux libprojectM.x86_64 0:2.1.0-2.el7
libtiger.x86_64 0:0.3.4-7.el7 libupnp.x86_64 0:1.6.19-2.el7
libvncserver.x86_64 0:0.9.9-9.el7_0.1 lirc-libs.x86_64 0:0.9.1a-4.el7
live555.x86_64 0:2013.11.26-1.el7.nux lzo-minilzo.x86_64 0:2.06-8.el7
minizip.x86_64 0:1.2.7-15.el7 mplayer.x86_64 0:1.1-33.20150505svn.el7.nux
mplayer-common.x86_64 0:1.1-33.20150505svn.el7.nux netembryo.x86_64 0:0.1.1-5.el7.nux
qt.x86_64 1:4.8.5-12.el7_2 qt-settings.noarch 0:19-23.5.el7.centos
qt-x11.x86_64 1:4.8.5-12.el7_2 qtlockedfile.x86_64 0:2.4-20.20150629git5a07df5.el7
qtsingleapplication.x86_64 0:2.6.1-28.el7 qtwebkit.x86_64 0:2.3.4-6.el7
vlc-core.x86_64 1:2.2.2-4.el7.nux xcb-util-keysyms.x86_64 0:0.4.0-1.el7
zvbi.x86_64 0:0.2.35-1.el7
-----------------------------------------------------------------------------------
yum -y install http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.3-1.el7.rf.x86_64.rpm
*******************************************
index.txt
index.txt.attr="unique_subject = yes" を作成 内容も必要
/etc/pki/uenda.net.CA に newcerts directoryを作成
24.2. MySQL Connector/NET
24.2.3.3.2. クラス MySqlConnection コンストラクタ
24.2.3.4. MySqlDataAdapter の使用
public static void CreateSqlDataAdapter()
ConnectionString 内のキーワード値として有効な名前
Encrypt=true; Connector/NET 5.0.3
Chefで3分クッキング!-----------Documents411-13---------------------------------
[root@lisa ~]# rsync -avz rsync://rsync_user1@192.168.116.105::backup -e "ssh -p 49922"
40khz oscillator
/usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d mail.uenda.net -d lisa.uenda.net --renew-by-default && /bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot
[build a number of assets using grunt]
http://stackoverflow.com/questions/34796164/how-atmel-studio-7-compile-and-debug-arduino-code
How Atmel Studio 7 compile and debug Arduino code? 2014-01-14
https://github.com/sudar/Arduino-Makefile
A Makefile for Arduino Sketches
ardupilot-mega ,GPMモジュール
APMのファームウェアを搭載するハードウェアとしては、
Pixhawk, Pixracer, Erle-Brain 2, NAVIO2
ArduPilot Autopilot Suite
Nano Carbon
XK K100 Falcom 6CH Flybarless 3D6G System RC Helicopter BNF
\6,651. Banggood.com
NEO-M8N GPS & MAG(Compass)
+5V
GND
SCL---------------GPS SCL I2C Connector(Works also with thw I2C spritter)
SDA---------------GPS SDA
GPS RX/AP TX
GPS TX/AP RX
http://www.ebay.com/itm/5pcs-Dupont-Wire-Cable-Line-3p-3p-pin-Header-Connector-Compatible-w-2-54mm-pin-/280830990633?hash=item4162d4d929:g:cXoAAMXQbflSMa1n
5pcs Dupont Wire Cable Line 3p-3p pin Header Connector Compatible w 2.54mm pin $1.81+1.95=207+223
Futaba / Ripmax R7008SB S.BUS 2 Receiver = \23,625.
Futaba / Ripmax R6303SB S.BUS Receiver = (\10,887) \6,264.
Futaba FASST S.BUS 2.4 GHz Receiver R6303SB (tested by PX4 core team, very lightweight, only 7g)
FrSky TFR4 SB 3/16ch 2.4Ghz S.BUS Receiver FASST Compatible (HobbyKing)
FrSky FASST compatible S.BUS compatible TFR8 SB 8ch 2.4Ghz Receiver (HobbyKing)
Super
10J T-FHSS 2014, \29,080.
https://www.u-blox.com/ja/product/u-center-windows
u-center for windows v*.**.zipをダウンロード
(1)ArduCAM OSD Config 2.1.3.0 ファームウェアの書き込みとOSDボード設定のためのソフト
ConfigTool_minOPOSD.zipをダウンロード
(2)Character set OSD画面に表示する文字セット
Charset_1_3_0.mcmをダウンロード
(3)MinOPOSD firmware CC3DのデーターをMinimOSDで認識させるため
MinOPOSD setup-LibrePilot
レギュレーター 出力5Vで10A
3A Switching UBEC 2-6 Lipo 5-24 Nimh for RC Helicopter Aircraft
ardupilot Pixhawk
ardupilot Flight Controller
arducopter/wiki/APM25board
Tools>Dfuse USB Upgrade Tools
Devo 7E (A7105,CC2500,NRF24L01)
Project CARS Radiolink AT9
DSM2 receiver
DEVO RX802 8ch 2.4GHz
RX701 2.4GHz 7ch \3,560.
RX601 2.4GHz 6ch \2,350. DSSS
xRX703A
RX1202 12ch
RX1002 10ch DEVO10
RX710 Runner 250 DEVO7
Storm S603
https://github.com/maniacbug/RF24
APC ES550 BE550G-JP Casil CA1280 12V,8AH = 5.940L x 2.560W x 4.010H $16.60=1,912
APC RBC122J-S (RBC122J互換) , RBC-2J
documents-241
LONG WP1236W 12V9AH WP8-12 互換
Genuine RBC
http://open-txu.org/
OpenTX University
ATmega328P-AU TQFPパッケージ
ATmega328P Nano V3 Controller Board Compatible Improved version
nRF24 MultiPro
forcetronic.blogspot.com
OpenLRS
1 X ESP8266 ESP-07S Serial WIFI Wireless Module LWIP AP+STA
1 X 3DBI WiFi Antenna \224
1 X U.FL to Female SMA Cable
2x \278
2x \225
Alligator clip cable
LM723
becky siddons
CPS-3205C
74HC595 (3ステート・シフトレジスタ/ラッチ)
Soldering iron stand
$4.49 $8.99 $16.01
528 1,057 1,883
115x85x85mm
Quiescent current : 自己消費電流
The nixie tube : 数字あるいは文字・記号の情報を表示する一種の冷陰極放電管(冷陰極管)
thermocouple : 熱電対 K-type thermocouple.
-------------------------------------------------------------------------------------------
Soldering Iron chips
Models:900M-T-B, 900M-T-I, 900M-T-3C, 900M-T-2.4D, 900M-T-K,900M-T-1.2D, 900M-T-3.2D, 900M-T-2C, 900M-T-1.6D,900M-T-4C
DC 6V-90V 15A DC Motor Speed Controller Stepless Speed Regulation Pulse Width PWM
Dp50v5a Programable Power supply
LM723CN 10PCS Adjustable Voltage Regulator 2-37V 150mA IC ST DIP-14 LM723CN DIP-14 \223 NJM723D @100.
2N3055 x2 @100.
BD140 x2 @100
Diode 10A x4
4700uF to 10000uF 50V x1
TIP640 / MJ3001
7812
2SA1302
2SC3281 2SC1173
2SD600
1N4005 diode
8929P/C324C
2SD438
T Plug Male Connectors to MT60 Female
50ohms feedthrough termination
--------------------------------------------
Hello こんにちわ
I have not received any packages yet. 私は、まだ荷物を受けとっていません。
Where is my baggage? 私の荷物はどこですか?
Are you not shipping? 発送してないのですか?
Please investigate. 調査をお願いします。
Or, please refund. または、返金して下さい。
Best regards 敬具
--------------------------------------------
わかりました I see.
あと1週間だけ待ちましょう Let's wait another week, but
最後の妥協です It is the last compromise!
toslink jack AX-DLR2150 $0.90 光---電圧変換①Vout, ②GND, ③Vcc
Electricity meter
Non-Contact Voltage Tester Pen AC Electricity Power Meter Detector
-----------------------------------------
Hello こんにちわ
I received my package, Thankyou. 荷物を受け取りました
but 5Pcs nozzle heads are not Enclosed. ノズルヘッドが同胞されていないです
I am downloading photos of your items, あなたの商品の写真をダウンロードしてます
What is going on? どうなっていますか
Please investigate. 調査をお願いします。
Best regards 敬具
-------------------------------------------------------------
HY3003D 30V3A \11,182.
QJ3003X QJ3005X QJ5003X GJ600?
英: standard deviation ( SD ) 標準偏差
I would like to recieve the nozzles 私はノズルを受け取りたい
I would like to get my nozzles 私はノズルを手に入れたい
2SC1815GR
------------------------------------------------------
Let's wait for another 2 weeks,only one chance.
then,should refund.
Best regards
------------------------------------------------------------
Hello こんにちわ
I received my package, Thank you. 荷物を受け取りました
It is stored in a hard case, good, thank you very much
It is different from the ones in the photo.
please refund now.
Best regards
$111.99 (\12,880)??
Where do I cancel with the information from 何処からの情報でキャンセルするのですか
昇降圧コンバータ ; buck–boost converter
TPS63000
LTC3xxx
Speed Reducer DC12V Geared Box Motor 5RPM 3.5KG.CM 0.45A
\963
Electrical DC24V Speed Reduce Gear Motor 20RPM 15KG.CM High Torque
\623
High Current XT60 Male to Female Switch LiPo Battery Switch 6V 12A New
\301
1pc Converter Adapter For PC Laptop DP Display Port Male to DVI Female Black
\580
TITELY
soldering paste
fujii solder co.ltd.
IEC 60320-C6
http://www.stayonline.com/reference-iec320.aspx
IEC-60320 (IEC320) Reference Chart
0.25/0.3/0.5/0.75/1/2/3/4/5/6A
0.2A, 0.5A,1A,2A,3A,5A,8A,10A,15A,20A
Hello,
I think,
Unilaterally the seller canceled, so I will request a penalty.
Additional items,
Seller;sweepworld
Item number 272336940299.
Request additional amount by separate e-mail.
(the seller requested additional shipping fee.)
ebay should prohibit this seller.
You should do that for other buyers as well.
People who demand money other than the original transaction conditions.
Best regards
907A Solder Staions
handle
plugin unit 112-K
control panel 616
900M-T Series Solder Iron Tips for Electronic Soldering Iron
10pcs/lot Big D keyboard plug and socket connector 5 pin 6pin 7pin 8pin round plug big spikes DIN plug .
Back to product details
DIN-5C
DIN Connectors 5 PIN MALE PLUG
5-PIN MALE DIN CONNECTOR
mini stc t12
https://www.google.co.jp/search?q=mini+stc+t12&tbm=isch&imgil=AVGDwNhmAtFZJM%253A%253BgOyh0sAfYo6CrM%253Bhttps%25253A%25252F%25252Fwww.aliexpress.com%25252Fstore%25252Fproduct%25252FCabbage-white-T12-digital-soldering-station-DIY-kit-parts-product-controller-board-handle-iron-head%25252F1894205_32598005634.html&source=iu&pf=m&fir=AVGDwNhmAtFZJM%253A%252CgOyh0sAfYo6CrM%252C_&usg=__8YlwKM4nIK-iaRaxU-1HgCxy5pg%3D&biw=1442&bih=944&ved=0ahUKEwj8o57k9trRAhXKvLwKHYfqAAkQyjcIKQ&ei=EFyHWPzbEcr58gWH1YNI#imgrc=AVGDwNhmAtFZJM%3A
Soldering Station with Thermocouple Sensor
Hakko1321
difference between A1321 and T12
FM-208 handle or FX-9501 handle
FM2028_Handle
Model: LK907B
Specifications:
Thermal fuse resistance: Ceramic sealing nickel alloy thermal fuse resistance ≈13Ohm
Thermal fuse max. working voltage: AC/DC 24V 50W
Sensor type: K type thermocouple (Characteristic resistance ≈3Ohm)
Plug diameter: 12.5mm
Plug pin quantity: 5 female pins. If the plug of your hot air station is different from it but shares the parameters, you can connect the cable again by yourself according to the detailed instructions. Suitable for Hakko936 hot air station or other derived series of products made in China, which has similar appearance and structure with it, such as 936A 936b 937 969 93. It is also suitable for 2 in 1 products of soldering iron and hot air station on condition that they meet the above parameters.
Series 581: Male plug, internal solder lug, cable outlet 4-6
GX12-5 5 Pins 5P Screw Butt Joint Cable Aviation Connector
5 pin GX16 connection Kit 3 in 1
GX16-5 5 Pins 5P Screw Butt Joint Cable Connector Aviation Plug
GX16-5 16mm Screw Butt Joint Aviation Connector Male Female Plug 5 Pin
GX12-5 5 Pins 5P Screw Cable Connector Aviation Plug
Capacitance: 2pF - 0.1uF
Rated voltage: 50V
2P ,
3P ,
5P ,
10P ,
15P ,
22P ,
30P ,
33P ,
47P ,
68P ,
75P ,
@ 82P
@ 101(100P) ,
@120pf
@ 151(150PF) ,
@ 221(220PF) ,
331(330PF) ,
471(470PF) ,
681(680PF)
102(1NF) ,
152(1.5NF) ,
222(2.2NF) ,
332(3.3NF) ,
472(4.7NF) ,
682(6.8NF)
103(10NF) ,
@ 153(15NF) ,
@ 223(22NF) ,
@ 473(47NF) ,
@ 683(68NF) ,
@ 104(100NF)
------------------------------------------------
SSR 40A
XMT7100
thermosenser Vibration
SW-100 ; High quality ball tilt ball switch SW-100 copper vibration vibration sensor type
$2.07
what material are made of Adjustable Holder and Base? 調整可能なホルダーとベースの材質は何ですか?
E402 単4x2本 ラグ 黒 フラット
材質:ABS樹脂
単1形→D 単2形→C 単3形→AA 単4形→AAA 単5形→N
Camera STI
ASTRO TECH AT6RC and Losmandy G11
PHD Guide ; オートガイドソフトのPHD Guidingの使い方を説明します。
----------------------------- 2017-01-29 14:45 -----------------------------------------------------------------
[root@git ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default
Upgrading certbot-auto 0.9.3 to 0.10.2...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Generating key (2048 bits): /etc/letsencrypt/keys/0013_key-certbot.pem
Creating CSR: /etc/letsencrypt/csr/0013_csr-certbot.pem
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-04-29. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
---------------------------------------------------------------------------------
DM326HS
簡易パンチダウン
dremel 2.35mm
480 : 1/8(4/32)インチ:3~3.2mm
481 : 3/32インチ:2.3~2.5mm
482 : 1/16" : 1.6mm
483 : 1/32" : 0.8mm
4485
4.3mm
dremel nuts
k-type thermocouple registance
---------------------------------------------------------------------
=============== letsencrypt ================= crontab ================
Upgrading certbot-auto 0.10.2 to 0.11.1...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Generating key (2048 bits): /etc/letsencrypt/keys/0014_key-certbot.pem
Creating CSR: /etc/letsencrypt/csr/0014_csr-certbot.pem
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-05-09. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
--------------------------------------------------------------------------------------
起承転結
払うべき代償
superfluity
excess
growth
Biohazard:The final
ドメイン駆動設計
mod_security.conf.off
=======================================================
[root@git ~]# /usr/local/letsencrypt/letsencrypt-auto
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Which names would you like to activate HTTPS for?
-------------------------------------------------------------------------------
1: uenda.net
-------------------------------------------------------------------------------
Select the appropriate numbers separated by commas and/or spaces, or leave input
blank to select all options shown (Enter 'c' to cancel):
Obtaining a new certificate
Performing the following challenges:
tls-sni-01 challenge for uenda.net
Waiting for verification...
Cleaning up challenges
Generating key (2048 bits): /etc/letsencrypt/keys/0015_key-certbot.pem
Creating CSR: /etc/letsencrypt/csr/0015_csr-certbot.pem
Deploying Certificate to VirtualHost /etc/httpd/conf.d/ssl.conf
Please choose whether HTTPS access is required or optional.
-------------------------------------------------------------------------------
1: Easy - Allow both HTTP and HTTPS access to these sites
2: Secure - Make all requests redirect to secure HTTPS access
-------------------------------------------------------------------------------
Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2
Created redirect file: le-redirect-uenda.net.conf
Rollback checkpoint is empty (no changes made?)
-------------------------------------------------------------------------------
Congratulations! You have successfully enabled https://uenda.net
You should test your configuration at:
https://www.ssllabs.com/ssltest/analyze.html?d=uenda.net
-------------------------------------------------------------------------------
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0002/fullchain.pem. Your cert will
expire on 2017-05-18. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again with
the "certonly" option. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
======================================================================================
[root@git ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --agree-tos
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Cert not yet due for renewal
You have an existing certificate that has exactly the same domains or certificate name you requested and isn't close to expiry.
(ref: /etc/letsencrypt/renewal/uenda.net-0001.conf)
What would you like to do?
-------------------------------------------------------------------------------
1: Keep the existing certificate for now
2: Renew & replace the cert (limit ~5 per 7 days)
-------------------------------------------------------------------------------
Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Generating key (2048 bits): /etc/letsencrypt/keys/0017_key-certbot.pem
Creating CSR: /etc/letsencrypt/csr/0017_csr-certbot.pem
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-05-18. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Female Viagra
Arduino ADK
ペダルストラップ
Steinberg
PLANEX USB2.0 PL-US35AP \1,199
Levitra
Cialis
NP-TR9 \61,780
NP-TM9 \54,303
GREATTOOL MTB-6SP \9,181
GTTB-13SP \17,064.
AmScope MD35 USB Camera
PRN3D \49,800.
造形サイズ:W170xD170xH160mm
DC12V 96W
本体:W420xD250xH320
Cut2D Desktop
販売価格:18,800円(税込)
図脳RAPID18
¥ 43,215
jwcad-8.02b(2017-02-18)
----------------------------------------------------------
2017-03-09
Upgrading certbot-auto 0.11.1 to 0.12.0...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Generating key (2048 bits): /etc/letsencrypt/keys/0018_key-certbot.pem
Creating CSR: /etc/letsencrypt/csr/0018_csr-certbot.pem
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-06-06. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
-----------------------------------------------------------------
ascetone
flux
Flux removal brush
alcohol dispenser
acid brush
東芝 卓上ドリル DP-13A
振興製作所 DRILL-PRESS SD-13
myfordboy.blogspot.com
桐谷美玲
I understand.Thanks for your help.
by the way,Ebay is not better than "banggood".
Ebay has the following members of sellers,
Green UBEC Power 2-6S 5V3A or 12V3A Aluminum
お客さまは$7.86 USDを深圳市安亿百科技有限公司(kaifengfu2011@gmail.com)に支払いました。
A cunning cheater
QW-MS305D 5A 30V 110V DC Power Supply Lab Precision Variable Digital Adjustable
お客さまは$87.99 CADをENUMBER INC(sweepworldpp@themailhosting.com)に支払いました
Cowardly con artist
Ebay is a fool, and can not obtain full credibility.
/////////////////////////// Tektronix TAS485 /////// 1998 ///////////////////////////////////////////
Features & Benefits
100 MHz at Two Channels TAS465
100 MHz at Four Channels TAS475
200 MHz at Four Channels TAS485
Dual (Delayed) Time Base
Measurement Cursors
CRT Readout
Auto Setup
Store/Recall of Setups
Video Trigger
Trigger/Ground Reference Indicator
Combination Menu/Direct Access Controls
Applications
Training
Manufacturing Production Test
Field Repair
Bench Calibration and Repair
Product Design
***********************************************************************
Characteristics
Bandwidth - 100 MHz (TAS465, TAS475), 200 MHz (TAS485)
Input Channels - 2 (TAS465), 4 (TAS475, TAS485)
Rise Time - ≤3.5 ns (TAS465, TAS475), ≤1.8 ns (TAS485)
Time Base - Dual
Main Sweep Range - 0.5 s/div to 20 ns
Delayed Sweep Range - 5 ms/div to 20 ns
Vertical Accuracy - ±2.5%
Vertical Sensitivity - 2 mV/div to 5 V/div
Horizontal Accuracy - ±2%
X10 Horizontal Accuracy - ±3%
Sweep Speed (X10 mag.), Main - 2 ns/div (TAS465, TAS475), 1 ns/div (TAS485)
Sweep Speed (X10 mag.), Delayed - 2 ns/div (TAS465, TAS475), 1 ns/div (TAS485)
Trigger Modes - AUTO LEVEL, AUTO, NORMAL, TV LINE, TV FIELD (odd, even, or both), SGL SEQ
Trigger Delay - RUNS AFTER DELAY, TRIGGERS AFTER DELAY, TV LINE (from MAIN source)
Trigger Coupling (both Main and Delayed) - AC, DC, Noise Reject, HF Reject, LF Reject
Auto Setup - Yes
Store/Recall - 4 frontpanel setups
Cursors and Readouts - Yes
CRT - 14 kV
Warranty - Three years
Safety Certification - UL, CSA, IEC348
//////////////////////////////////////////////////////////////////////////
Tektronix P6133 150MHz
Tektronix P6134C 400MHz
Tektronix P6136 350MHz
Tektronix P6138 350MHz
-------------
Tektronix P3010 100MHz
Tektronix P6101B 15MHz
Tektronix P6109B 100MHz
-------------
Tektronix P6139A (500MHz)
===============
Probes for Tektronix TAS485
smd P6561AS 200MHZ $350.
differential P6046 100MHZ
general purpuse P6111B 200MHZ ********
P6109B 100MHZ
P6129B 100MHZ
P6101 15MHZ
current P6022 120MHZ
P6021 60MHZ
================
V:\bu\02\0650 Users\auenda\backup\common\ゆう子\
107:
1:マイドキュメント\ゆう子V3\初期データ
2:C:\Users\Public\Documents\ゆう子V3\初期データ
108:
オシロスコープ
200MHz Oscillo Probe
Fixtures 備品
Yours Sincerely,
Vengeance 復讐
Arsenal 兵器
Institute 研究所
++++++++++++++++++++++2017-04-01+++++++++++++++++++++++++++++++++++++
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Generating key (2048 bits): /etc/letsencrypt/keys/0019_key-certbot.pem
Creating CSR: /etc/letsencrypt/csr/0019_csr-certbot.pem
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-06-29. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
# yum --enablerepo=epel install libmcrypt-devel
# rpm -qa gpg-pubkey*
------------------------------------
chcon -t bin_t /usr/sbin/xrdp
chcon -t bin_t /usr/sbin/xrdp-sesman
/etc/xrdp/xrdp.ini を編集して上限を 24 に変更します。
max_bpp=32
↓
max_bpp=24
export LANG=ja_JP.UTF-8
************************************************************************
CentOS7 で US-Keyboard を使用の場合、/etc/xrdp/ にある以下の物を 削除、或は rename する
km-e0010411.ini, km-e0200411.ini, km-e0210411.ini
************************************************************************
ログイン画面でのキー配列を確認
https://xrdp.vmeta.jp/%E3%82%AD%E3%83%BC%E9%85%8D%E5%88%97%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6
CentOS 7 へリモートデスクトップ接続する (xrdp) 12月 04, 2015
http://cobitech.blogspot.jp/2015/12/centos-71-xrdp.html
$ cd /etc/xrdp
$ (cd /tmp; wget http://w.vmeta.jp/temp/km-0411.ini)
$ sudo cp /tmp/km-0411.ini .
$ sudo ln -s km-0411.ini km-e0200411.ini
$ sudo ln -s km-0411.ini km-e0010411.ini
************************************
キーボードの設定ファイルが /etc/sysconfig/keyboard から /etc/vconsole.conf に変更になりました
km-00000409.ini km-e0010411.ini
km-00000409.ini km-e0210411.ini
km-00000409.ini km-e0200411.ini
yum install MariaDB-server MariaDB-client
flash-player-ppapi
thinclient_drives
/phpmyadmin/index.php on this server.
------------------------------------------------------------------
2017-04-21
Sorry, I cannot run apxs. Possible reasons follow:
1. Perl is not installed
2. apxs was not found. Try to pass the path using --with-apxs2=/path/to/apxs
3. Apache was not built using --enable-so (the apxs usage page is displayed)
The output of /usr/local/apache2/bin/apxs follows:
./configure: line 6187: /usr/local/apache2/bin/apxs: No such file or directory
configure: error: Aborting
Zhttps://www.openssl.org/source/openssl-1.0.2k.tar.gz
./configure \
--enable-http2 \
--enable-ssl \
--with-ssl=/usr/local/openssl-1.0.2k \
--enable-so \
--enable-mods-shared=all \
--enable-mpms-shared=all
env OPENSSL_CFLAGS="-I/usr/local/openssl-1.0.2k/include" OPENSSL_LIBS="-L/usr/local/openssl-1.0.2k/lib -lssl -lcrypto" ./configure
apachectl start ########################
===== 2017-04-22 ====================================================================================
00 05 01 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net --renew-by-default && /usr/bin/systemctl restart httpd
==========================================================================================
firewall-cmd --add-port=443/tcp --permanent
firewall-cmd --reload
firewall-cmd --list-ports
22/tcp 25/tcp 465/tcp 995/tcp 993/tcp 80/tcp 443/tcp
openssl x509 -in /etc/letsencrypt/live/uenda.net-0002/fullchain.pem -noout -dates
00 00 * * * /root/mknmz.sh /var/www/html/ /usr/local/var/namazu/index/uenda/ ; /root/gcnmz.sh
00 05 01 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net --renew-by-default && /usr/bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot
00 00 * * * /root/mknmz.sh /var/www/html/ /usr/local/var/namazu/index/uenda/ ; /root/gcnmz.sh
00 05 30 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net --renew-by-default && /usr/bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot
saslpasswd2 -u uenda.net auenda
chown postfix /etc/sasldb2
---------------------------------------------
userdel -r auenda
useradd auenda
passwd auenda
---------------------------------------------
ibus-kkcは日本語入力メソッドで、vlgothic-*の方は日本語フォント。 2015-07-29
ibus-kkcのみインストールしてもフォントがなくて日本語入力できない。
# yum install ibus-kkc vlgothic-*
# yum install ld-linux.so.2
# setarch `uname -m` /usr/local/DiCE/diced | nkf -uw
systemd の使い方 for DiCE 2016-05-08
http://blue-red.ddo.jp/~ao/wiki/wiki.cgi?page=systemd+%A4%CE%BB%C8%A4%A4%CA%FD
# systemctl list-units | grep dice
dice.service
loaded active exited
DiCE daemon
************************************************
kernel-3.10.0-514.6.1.el7.x86_64
CentOSで不要カーネルの削除
https://heavy-metal-explorer.com/kernel_delete/
# yum install yum-utils
# rpm -q kernel
# uname -r
************************************************
00 05 30 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default && /bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot
00 03 * * * /opt/gitlab/bin/gitlab-rake gitlab:backup:create CRON=1
00 00 * * * /root/mknmz.sh /var/www/html/ /usr/local/var/namazu/index/uenda/ ; /root/gcnmz.sh
----------------------------------------------------------
body {background-color:#DFE; color:black; };
# nkf -w /usr/local/var/namazu/index/uenda/NMZ.head.ja>NMZ.head.ja
# nkf -e NMZ.head.ja>/usr/local/var/namazu/index/uenda/NMZ.head.ja
/undef/dice_events_check.cgi
++++++++++++++++++ ius repo ++++++++++++++++++++++++++++++++++
$ wget https://dl.iuscommunity.org/pub/ius/stable/CentOS/7/x86_64/ius-release-1.0-14.ius.centos7.noarch.rpm
# rpm -Uvh ius-release-1.0-14.ius.centos7.noarch.rpm
# yum --enablerepo=ius,epel install php56u
# yum --enablerepo=ius,epel install php56u-mbstring
# yum --enablerepo=ius,epel install php56u-pdo php56u-mysqlnd
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DiCE が正しく起動しているかの確認>
ps -aef | grep /usr/local/DiCE/diced
cat /usr/local/DiCE/log/events.log | nkf -w
setarch `uname -m` /usr/local/DiCE/diced | nkf -uw
********************** 2017-04-30 ********************
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Generating key (2048 bits): /etc/letsencrypt/keys/0021_key-certbot.pem
Creating CSR: /etc/letsencrypt/csr/0021_csr-certbot.pem
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-07-28. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
********************************************************
XX cp smb://192.168.116.196/uenda/bu/04/0140---CentOS7/pc2/etc/letsencrypt/archive/uenda.net-0001/cert10.pem smb://192.168.116.196/uenda/bu/04/0140---CentOS7/pc2/etc/letsencrypt/live/uenda.net-0001/cert.pem
cert.pem <-- cert10.pem
chain.pem <-- chain10.pem
fullchain.pem <-- fullchain10.pem
privkey.pem <-- privkey10.pem
--------------------------------------------------------------
/usr/local/bin/nkf ==> /usr/bin/nkf
yum == dnf python-3.5
H:\Git-Hub\popcorn-desktop>gulp nw:run
[17:29:37] Using gulpfile H:\Git-Hub\popcorn-desktop\gulpfile.js
[17:29:37] Task 'nw:run' is not in your gulpfile
[17:29:37] Please check the documentation for proper gulpfile formatting
https://github.com/marcelklehr/nodist.git
https://github.com/popcorn-official/popcorn-desktop-experimental.git 古い
https://github.com/PopcornTimeCommunity/desktop.git
https://github.com/popcorn-official/popcorn-desktop.git 〇
npm install --global gulp
GULP_HOME
C:\Users\auenda\AppData\Roaming\npm\node_modules\gulp
-----------------------------------------------------
******* rita.uenda.net = git.uenda.net = 192.168.116.105 *******
Perl 5.16.3
PHP 5.6.25
mysql 5.7.18
httpd 2.4.6-45
bind 9.9.4-38
python 2.7
******* lisa.uenda.net = 192.168.116.102 ******* dnf
Perl 5.16.3
PHP 7.1.4 ==> PHP 5.6.30
mysql 14.14 distrib 5.7.18
httpd 2.4.6.-45
bind 9.9.4-38
python 2.7 + 3.5
************************************************************************
995/tcp, 993/tcp, 465/tcp, 25/tcp 必須 ports
Dockerfile
==================================================================
+++++++++++++++ Apache Solr on CentOS7 ++++++++++++++++++++
[Apache-solr]
# wget http://apache.org/dist/lucene/solr/6.5.1/solr-6.5.1.tgz
# tar -xzvf solr-6.5.1.tgz
# cd solr-6.5.1/bin
# bash ./install_solr_service.sh ../../solr-6.5.1.tgz
id: solr: no such user
Creating new user: solr
Extracting ../../solr-6.5.1.tgz to /opt
Installing symlink /opt/solr -> /opt/solr-6.5.1 ...
Installing /etc/init.d/solr script ...
Installing /etc/default/solr.in.sh ...
Service solr installed.
Customize Solr startup configuration in /etc/default/solr.in.sh
Waiting up to 180 seconds to see Solr running on port 8983 [-]
Started Solr server on port 8983 (pid=13960). Happy searching!
Found 1 Solr nodes:
Solr process 23100 running on port 8983
{
"solr_home":"/var/solr/data",
"version":"6.5.1 cd1f23c63abe03ae650c75ec8ccb37762806cc75 - jimczi - 2017-04-21 12:23:42",
"startTime":"2017-05-04T05:09:10.974Z",
"uptime":"0 days, 0 hours, 0 minutes, 12 seconds",
"memory":"21.1 MB (%4.3) of 490.7 MB"}
#
# service solr start
# service solr stop
# service solr restart
# service solr status
firewall-cmd --zone=public --add-port=8983/tcp --permanent
firewall-cmd --reload
-------------------------------------------------------------
http://192.168.116.102:8983/solr
-------------------------------------------------------------
Securing Solr Admin Page を設定するとエラーとなる 2017/05/04
===================================================================
http://mirror.fibergrid.in/apache/lucene/solr/6.5.1
******* solr 6.5.1 on windows10 インストール ************
H:\Downloads\C_auenda_Downloads\solr-6.5.1\bin>solr start
find: `TCP ': No such file or directory
find: `:0 ': No such file or directory
find: `:8983 ': No such file or directory
WARNING: 32-bit Java detected. Not recommended for production.
Point your JAVA_HOME to a 64-bit JDK
Waiting up to 30 to see Solr running on port 8983
Started Solr server on port 8983. Happy searching!
H:\Downloads\C_auenda_Downloads\solr-6.5.1\bin>
*********************************************************
Standalone server example (start Solr running in the background on port 8984):
C:> solr start -p 8984 ( solr start -f -p 8984)
XXSolrCloud example (start Solr running in SolrCloud mode using localhost:2181 to connect to Zookeeper, with 1g max heap size and remote Java debug options enabled):
XXC:> solr start -c -m 1g -z localhost:2181 -a "-Xdebug Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=1044"
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Apache Solr入門
------------------------------------------
/var/solr/data に 'Core folder' を作成、所有者は 'solr' にする。
'Core folder' に /opt/solr/server/solr/configsets/basic_configs/ の 'conf' 以下全体をコピーする。
その後、'add Core' を実行する。
Aoyue Int 474A++ Desoldering Station ::\19,352 ,\19,485
ZD-915 Desoldering Station ::\10,148 ,\9,994 ,\10,705
CSI8900 Portable Deso ::\
S-993A Desoldering Gun ::\11,700.
Hakko FR300 ::\18,400.
TS-1513 80W Desoldering Station ::\15,776 - May not ship to Japan
\\192.168.116.198\AirPort Disk3 --- (192.168.116.198 (uMac Time Capsule))
WD40EFRX 21,979
WD30EFRX 11,850
WD20EFRX 9,955
*************** 2017/05/08 *****************
[root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default
Upgrading certbot-auto 0.13.0 to 0.14.0...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-08-06. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@lisa ~]#
****************************************** cd /opt/solr/bin
C:\Users\auenda>cd C:\solr-6.5.1\bin
C:\solr-6.5.1\bin>solr start -e techproducts
************************************************
Solr home directory C:\solr-6.5.1\example\techproducts\solr already exists.
Starting up Solr on port 8983 using command:
C:\solr-6.5.1\bin\solr.cmd start -p 8983 -s "C:\solr-6.5.1\example\techproducts\solr"
find: `:0 ': No such file or directory
find: `TCP ': No such file or directory
find: `:8983 ': No such file or directory
Waiting up to 30 to see Solr running on port 8983
Started Solr server on port 8983. Happy searching!
Copying configuration to new core instance directory:
C:\solr-6.5.1\example\techproducts\solr\techproducts
Creating new core 'techproducts' using command:
http://localhost:8983/solr/admin/cores?action=CREATE&name=techproducts&instanceDir=techproducts
{
"responseHeader":{
"status":0,
"QTime":3129},
"core":"techproducts"}
Indexing tech product example docs from C:\solr-6.5.1\example\exampledocs
SimplePostTool version 5.0.0
Posting files to [base] url http://localhost:8983/solr/techproducts/update using content-type application/xml...
POSTing file gb18030-example.xml to [base]
POSTing file hd.xml to [base]
POSTing file ipod_other.xml to [base]
POSTing file ipod_video.xml to [base]
POSTing file manufacturers.xml to [base]
POSTing file mem.xml to [base]
POSTing file money.xml to [base]
POSTing file monitor.xml to [base]
POSTing file monitor2.xml to [base]
POSTing file mp500.xml to [base]
POSTing file sd500.xml to [base]
POSTing file solr.xml to [base]
POSTing file utf8-example.xml to [base]
POSTing file vidcard.xml to [base]
14 files indexed.
COMMITting Solr index changes to http://localhost:8983/solr/techproducts/update...
Time spent: 0:00:00.626
Solr techproducts example launched successfully. Direct your Web browser to http://localhost:8983/solr to visit the Solr Admin UI
C:\solr-6.5.1\bin>
http://localhost:8983/solr/techproducts/browse
C:\solr-6.5.1\bin>solr stop -p 8983
↑<<=== ? No Solr found running on port 8983
------- for CentOS7 ----------------------------
OpneJDK環境構築
JDK相当のパッケージはjava-1.8.0-openjdk-devel。
これをインストールすることで、javacコマンドも利用可能になる。
# yum install java-1.8.0-openjdk java-1.8.0-openjdk-devel
##User specific environment and startup programs
export JAVA_HOME=/usr/lib/jvm/java-1.8.0-openjdk
PATH=$PATH:$JAVA_HOME/bin
------------------------------------------------------
/opt/solr/bin/solr start -p 8983 -s "/opt/solr/example/techproducts/solr" ????
Acronis True Image 2016 : Failed to execute the task script. Error #1364
ProxN45May_jp10a ローカルで働く擬似プロキシソフト
チィーミング: IEEE 802.3ad LACP(レイヤ3+4) GS108T-200JPS
GS110TP
intel X540-T2 \22,900
EXPI9402PT
I340-T2
GS716T-300AJS \21,863.E-Trend +2,233.
\19,630.yodobashi
\22,272.Amazon +2,642.
1000Base-LX/10km 長波長
1000Base-T/100m
1000Base-SX/550m
4.43 スタティックリンクアグリゲーションの設定
lan link-aggregation static link_id interface:port interface:port [interface:port ...]
no lan link-aggregation static link_id [interface:port ...]
http://www.rtpro.yamaha.co.jp/RT/manual/swx2300/cmdref_2_00_08/lan-sfp/lag/channel-group_link-id_mode.html
LACP論理インターフェースの設定
channel-group LINK-ID mode MODE
no channel-group
channel-group 11 mode active
CrystalDiskMark 5.1.2--5.2.1
CrystalDiskInfo 6.8.2--7.0.5
PTCE-Public/popcorn-desktop
https://github.com/PTCE-Public/popcorn-desktop
popcorn-official/popcorn-desktop-legacy
https://github.com/popcorn-official/popcorn-desktop-legacy
PTCE/Popcorn-desktop
https://github.com/PTCE/Popcorn-desktop
oleander/show-time
https://github.com/oleander/show-time
ReadyNAS316
シリアル:3C68490600196
ファームウェア:6.5.1
----------------------------------------------------------
https://dl.nwjs.io/
和室 = Japanese style room
寝室 = Bedroom
netgear XS708T-100AJS \114,199 (\237,600)
********************************************************************************************
--------------------------------------------------------------------------------------------
[root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default
Upgrading certbot-auto 0.14.0 to 0.14.1...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-08-15. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@lisa ~]#
--------------------------------------------------------------------------------------
The Da Vinci Code(2003)[字][S] - ダ・ヴィンチ・コード(1920x)
C_auenda_Downloads
Googleが公開したオープンソースソフトウエアのディープラーニングライブラリ「TensorFlow」
Arduino Uno R3
2_arduinos_by_bluetooth_using_bind
Raspberry Pi
class 10 の 32GB-micro SD カード
.cc
Arduino_YuN
Arduino_TIAN
Box for Arduino Yún
Linino OS
org.apache.solr.util.SolrCLI
フィニッシュネイル F35MO
Usage: java -jar start.jar [options] [properties] [configs]
java -jar start.jar --help # for more information
mklink "C:\solr-6.5.1\server\lib\ext\SolrCLI.jar" H:\Git-Hub\lucene-solr\solr\core\src\java\org\apache\solr\util\SolrCLI.java
ノアブライト蛍光管20W NBL-20 (570mm) \645.
http://www.biccamera.com/bc/disp/CSfGoodsPage_001.jsp?GOODS_NO=2193708
/S-Documents-page18/432/My Documents432.html(26) 2.8" TFT LCD Touch Screen LCD Shield Kit \2,575.
C:\Windows\System32\where.exe
# whereis lsof ===>> procexp.exe
lsof: /usr/bin/lsof /usr/share/man/man8/lsof.8.gz
g++ -o whereis whereis.c ===>> whereis.exe
--------------------------------------------
SONAR 保護 ができません
https://support.norton.com/sp/ja/jp/home/current/solutions/v100974613_EndUserProfile_ja_jp
ノートン ファミリーをインストールしている場合は、まずこれをアンインストールしてから、ノートン削除/再インストールツールを実行します。
1.ノートン削除/再インストールツールをダウンロードする。
Windows のデスクトップにファイルを保存します。一部のブラウザでは、ファイルは自動的にデフォルトの場所に保存されます。
2.ブラウザで Ctrl+J キーを押して、[ダウンロード]ウィンドウを開きます。
3.NRnR アイコンをダブルクリックします。
4.使用許諾契約の内容を読み、[同意]をクリックする。
5.[削除および再インストール]をクリックします。
サービスプロバイダから提供されたノートン製品の場合、[削除]ボタンが表示されることがあります。
6.[続行]または[削除する]をクリックします。
7.[今すぐ再起動]をクリックします。
コンピュータが再起動したら、画面上の指示に従ってノートン製品を再インストールします。
-------------------------------------------------------------------
Git Extensions
------------ ピアノ線 ---------------------------------------------
番手(#) #8 #10 #12 #14 #16 #18 #20 #22 #24 #26 #28 #30
線径(㎜) 4.0 3.2 2.6 2.0 1.6 1.2 0.9 0.7 0.55 0.45 0.35 0.3
-------------------------------------------------------------------
長さ(m) 6 11 16 21 12 15
-------------------------------------------------------------------
Dental Portable LED Head Light Lamp
baistra
Envío internacional estándar == 標準国際送料
Brackets = adobe opensource editor
C1100
http://www.bohyoh.com/
Eclipse IDE for Java Developers
eclipse-java-neon-3-win32-x86_64.zip
java.lang.
reflect. を反映する
InvocationTargetException 呼び出しターゲット例外
Bamboo Fineline 8078円 充電式で、約15時間駆動
ワコム製の「Bamboo Paper」にはもちろん対応するが、
そのほかは「SketchBook」「GoodNotes」などで利用できる。
Dropbox, Evernote, Google Docs, OneNote
https://www.epaingo.com/myentry/
Rocketbook Wave 3,480 販売終了
Wipebook Pro 6,690 $45 mini $40
CANSAY nu board (ヌーボード) A4判 \2,100
CANSAY nu board (ヌーボード) A5判 \2,000
==============2017-05-31 ==============
dnsmasq
CrystalDiskMark
--------
The following possible Homebrew files were not deleted:
/usr/local/bin/
/usr/local/CHANGELOG.md
/usr/local/etc/
/usr/local/include/
/usr/local/lib/
/usr/local/man/
/usr/local/mysql -> /usr/local/mysql-5.7.13-osx10.11-x86_64
/usr/local/mysql-5.7.13-osx10.11-x86_64/
/usr/local/mysql-connector-odbc-5.3.6-osx10.11-x86-64bit/
/usr/local/remotedesktop/
/usr/local/share/
You may wish to remove them yourself.
-------------
/usr/local/Cellar/dnsmasq/2.76
$ sudo brew services start dnsmasq
$ sudo brew services stop dnsmasq
$ cp /usr/local/opt/dnsmasq/dnsmasq.conf.example /usr/local/etc/dnsmasq.conf
/etc/hosts
Inheritance
is the implementation of another class based on a certain class
Abstract class interface
192.168.116.114 iPhone5S
192.168.116.119 iPad2
iPhone7 32GB 72,800( 78,624)+11,000.
128GB 83,800( 90,504)+11,000.
256GB 94,800(102,384)
AH-C820(DENON)17,836 イヤフォン
GridLayout
GridView
appletviewer
--------------------------------------------------------------------------------
[root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default
WARNING: unable to check for updates.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-09-03. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@lisa ~]#
---------------------------------------------------------------------------------
$ javac -verbose -encoding utf-8 jdbc_sample.java && java JdbcSample
======= 2017-06-23 ========
mmc.exe
https://github.com/popcorn-official/popcorn-desktop
===========================================================================
[root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net -d lisa.uenda.net --renew-by-default
Upgrading certbot-auto 0.14.2 to 0.15.0...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.net
http-01 challenge for git.uenda.net
http-01 challenge for www.uenda.net
http-01 challenge for lisa.uenda.net
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at
/etc/letsencrypt/live/uenda.net-0001/fullchain.pem. Your cert will
expire on 2017-09-21. To obtain a new or tweaked version of this
certificate in the future, simply run letsencrypt-auto again. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@lisa ~]#
============================================================================
for rita
./letsencrypt-auto certonly --webroot \
-w /var/www/html -d uenda.net -d git.uenda.net -d www.uenda.net \
-m auenda@uenda.net \
--agree-tos
----------------------------------------------------------------------
http://olivia.uenda.net/S-Notices-page/05/NAMAZU_WIN_PCin.html
vulnerabilities 脆弱性(せいじゃくせい)
# 以下の行を追記
-javaagent:belle.jar
Proxy Server On local network
with pfSense check out an Introduction to pfSense.
Locate the Squid package
http://squid.acmeconsulting.it/index.html
http://squid.acmeconsulting.it/Squid27.html
TOTO 瞬間式 温水洗浄便座 TCF8PF22-NW1
C:\>route add 192.168.3.0 mask 255.255.255.0 192.168.2.122
192.168.3.0 255.255.255.0 192.168.2.122 192.168.2.121 11
Windows用Kurento Media Server http://www.kurento.org
https://github.com/Kurento/kurento-media-server
----------------------************************-------------------------
Yii2とVue.jsの組み合わせ
----------------------************************-------------------------
ネットワーク上で LMS と AMT が有効
16992番または16993番
PB回線=プッシュボタン信号
DP回線=ダイヤルパルス信号 ( DP10, DP20 )
DT(ダイヤルトーン) 400Hz 正弦波
BT(ビジートーン) 400Hz 正弦波
RGT(リンギングトーン) 16Hz、65Vrms以上
RBT(ルングバックトーン) 400Hzと16Hzの変調波(85%変調)
回線インピーダンス 600Ω
アナログ回線 DC45~48V重畳 40mA MAX
Sonalert
Beocom1401 平均 3,770.
EPSON EP-901F 2008/09/19 発表
EW-M770T
RJ11 モジュラーローゼット
ブラザープリンター ビッグインクタンク
http://welcome.brother.com/th-en/products-services/multi-function-centres/DCP-T700W.html
Multi-Function Centres DCP-T700W B 6,790.-
NTT/601-P 電話 受話器 の 音量が 小さい 故障 ? 代替 部品
送話器一体の受話器
ハンドセット
積層型セラミックスピーカー
07/16 秋月電子:オーダーID E170716-002642-01
1,5000. 10,000. 5,000. キャッシュバック
EW-M770T(64,450=67,930), EW-M660FT(47,707=52,730)49,520, EP-M570T(35,291=40,100)
購入期間:2017/06/01~2017/07/31迄
応募:2017/08/21迄
EP-979A3(27,524)
A4カラー文書が約1.3円(税別)、A4モノクロ文書が約0.5円(税別)、L判写真で約6.0円(用紙代込み
ブラザー EW-M660FTE FAX 53,343
ブラザー プリビオ DCP-J968N-W/B 10,537
プリビオ ワークス MFC-J6573CDW 25,800(参考価格 43,740円 税込み) LC113-4PK, LC119/115-4PK
プリビオ ワークス MFC-J6973CDW 33,267 同上
詰替 顔料インク ブラック 互換インク
----------------------------------
brother A4 カラー レーザープリンター HL-3170CDW/22PPM 16,209
A4フラットベッドスキャナー GT-F740 amazon17,527 yodobashi17,780 販売開始日: 2012/10/11
A4フラットベッドスキャナー GT-S650 amazon11,240 yodobashi9,890 販売開始日: 2015/01/29
電話 モジュラージャック 壁面端子 RJ11 6P4C モジュラー
パナソニック(Panasonic) 埋込C付テレホンモジュラジャック 6極2心 WN4623K
WN4624WK 6極4心
Plex Media Server
Soundflower
NVIDIA SHIELD
Logitech Media Server(Squeezebox 3rd Generation) NetGear
hdb06lfpn
BRYDGE 9.7 Gold ( BRY1013 ) 16,979
高白色 コピー用紙 ブランコ B5 500枚x10冊 2,222 222.2
高品質マルチ用紙 A4 500枚x 5冊 2,743 548.6
沖電気 カラーLED複合機 MC362DNW \40,000 定価112,800
HT812 コーデック:G.711 a/u law, G.729 a/b, G.723, G.726 2 LAN-port NATルータ内蔵
HT502 コーデック:G.711 a/u law, G.729 a/b, G.723, G.726 1 イーサネットポート、1 LANポート 日本国内のナンバーディスプレイ対応
-----------------------------------------------------
brother レーザープリンター A4 カラー JUSTIO HL-3170CDW \16,202. 22PPM/2013-/2400x600 dpi/カラー18.2円/枚、モノクロ3.9円/枚/電源OFF時の消費電力を約0.03W
brother レーザープリンター A4 カラー JUSTIO HL-L8250CDN \23,961. 28PPM/2014-/2400x600 dpi/--------------/電源OFF時の消費電力を約0.02W
brother レーザープリンター A4 カラー JUSTIO HL-L8350CDW \29,106. 30PPM/2014-/2400x600 dpi/カラー:約12.6円/枚 //電源OFF時の消費電力を約0.02W/TN-391BK/C/M/Y,TN-396BK/C/M/Y,DR-391CL/BU-320CL,WT-320CL
brother レーザープリンター A4 カラー JUSTIO HL-L8360CDW \46,469. 31PPM/2017-/2400x600 dpi/カラー:約15.3円/枚
brother レーザープリンター A4 カラー 複合機 JUSTIO MFC-9340CDW \36,573. 22PPM/2013-/2400x600 dpi
brother プリンター A4カラーレーザー(LED)複合機 JUSTIO 18PPM/ADF/有線・無線LAN... \33,491.
brother レーザープリンター A4 モノクロ JUSTIO HL-L2320D \8,064.
brother レーザープリンター A4 モノクロ 複合機 JUSTIO DCP-L2520D \11,129.
brother レーザープリンター A4 モノクロ 複合機 JUSTIO DCP-L2540DW \16,873.
brother レーザープリンター A4 モノクロ JUSTIO HL-L2360DN \9,371 TN-28J
EPSON スキャナー GT-X830 (フラットベッド/A4/6400dpi) \27,655
EPSON スキャナー GT-S650 (フラットベッド/A4/4800dpi) \8,863
EPSON スキャナー GT-F740 (フラットベッド/A4/4800dpi) \16,158
ET-2TRI-iE 2回線アナログ局線増設
IP-24N-ST101A
NYC-18iE-SD(W) 中古8,800 18ボタン標準電話機 FK200-IEA
小規模オフィス向け電話システムを構築するVoIPルーター SR-60VN
wget http://asterisk.hosting.lv/...
tar xjf asterisk-g72x-1.4.tar.bz2
on Raspberry Pi 3
http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-14.6.0.tar.gz
http://downloads.asterisk.org/pub/telephony/asterisk/releases/asterisk-addons-1.6.2.4.tar.gz
http://downloads.asterisk.org/pub/telephony/asterisk/releases/asterisk-sounds-1.2.1.tar.gz
http://downloads.asterisk.org/pub/telephony/asterisk/releases/libmidcom-0.2.0.tar.gz
Nmap ("Network Mapper")
nmap -T4 -A -v
-----------------------------------------------------------------------------------
Asterisk 13.0.0が2014年10月24日(現地時間)リリースされました
メンテナンス終了は2018年10月
dnf install libuuid-devel newt-devel sqlite-devel uuid-devel json-c-devel
dnf install mysql-connector-odbc unixODBC unixODBC-devel libtool-ltdl-devel
[root@lisa asterisk-13.17.0]# /usr/src/asterisk-13.17.0/contrib/scripts/get_mp3_source.sh
リビジョン 202 をエクスポートしました。
-----------------------------------------------------------------------------------
# adduser -u 5000 asterisk -s /sbin/nologin -d /var/lib/asterisk
# chown -R asterisk:asterisk /var/lib/asterisk
# chown -R asterisk:asterisk /var/log/asterisk
# chown -R asterisk:asterisk /var/run/asterisk
# chown -R asterisk:asterisk /var/spool/asterisk
# chmod -R u=rwX,g=rX,o= /var/lib/asterisk
# chmod -R u=rwX,g=rX,o= /var/log/asterisk
# chmod -R u=rwX,g=rX,o= /var/run/asterisk
# chmod -R u=rwX,g=rX,o= /var/spool/asterisk
# semanage fcontext -a -t FILE_TYPE 'asterisk'
この FILE_TYPE は以下のいずれかになります: asterisk_log_t, asterisk_spool_t, asterisk_tmp_t, asterisk_tmpfs_t, asterisk_var_lib_t, asterisk_var_run_t, tmp_t, tmpfs_t, var_log_t, var_run_t, var_spool_t.
次に以下を実行してください:
restorecon -v 'asterisk'
semanage fcontext -a -t FILE_TYPE 'asterisk'
semanage fcontext -a -t asterisk_var_lib_t "/var/lib/asterisk/(/.*)?"
semanage fcontext -a -t asterisk_var_run_t "/var/run/asterisk/(/.*)?"
semanage fcontext -a -t asterisk_spool_t "/var/spool/asterisk/(/.*)?"
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
https://www.amazon.co.jp/dp/B00SIS1SLQ?tag=blogosakananet-22&camp=1027&creative=7407&linkCode=as4&creativeASIN=B00SIS1SLQ&adid=0YAPJFDQ7782D6N27KXP&
パナソニック デジタルコードレス電話機 親機のみ スマホ連動 Wi-Fi搭載 VE-GDW54D-W \9,356 12,379 19,428
Asterisk playback
http://www.st-asterisk.com/archives/95
Asterisk基本設定ガイド!
GSMファイルへの変換
Asteriskでサウンドファイルを使用するにはファイル形式がGSMである必要があります
/var/lib/asterisk/sounds/en/Stacey_Raconte-moi.gsm
High&Low the movie 映画
スピーシーズ4 新種覚醒 Species: The Awakening(2007)
スピーシーズ3 禁断の種 Species III (2004)
スピーシーズ2 Species II(1998)
スペ―スバンパイア Space Vampire(1985)
ディ―プブル―・ライジング (2016)
ディープ・ライジング Shark Attack 2. 製作年, 2000
mp3プレイヤー mpg123をインストール
Centos7
# yum install mpg123 audiofile esound-libs libtool-ltdl
audiofile.x86_64 1:0.2.6-11.1.el6
esound-libs.x86_64 1:0.2.41-3.1.el6
libtool-ltdl.x86_64 0:2.2.6-15.5.el6
makedir /var/lib/asterisk/mohmp3 && chmod 755 /var/lib/asterisk/mohmp3
Lenovo IdeaPad S205 (AMD E450, 2GB, OS無)
SSLメールサーバ構築メモ Certbot+Postfix+Dovecot
/S-Documents-page17/423/certbot_postfix_dovecot.html
IdeaPad S205 1038J2J AMD E350,1.6GHz,3GB
Toshiba MK3265GSX(320GB,5400rpm,12ms,9.5mm,5,979円)
Acronis Pass:NaaxeIdD
NaaxeIdD
yum --enablerepo=remi,epel install php71-php-mbstring
------------------------------------------------------------------
rack of asterisk confs
dundi.conf
queuerules.conf
queues.conf
extensions.ael
cli_aliases.conf
agents.conf
pjsip_wizard.conf
res_config_sqlite3.conf
cel.conf****
cdr.conf****
udptl.conf**
acl.conf****
---------------------------------------------------------------------
/var/lib/asterisk/
rasterisk -x "database show"
*****************
Both sites also have an IAX trunk for outbound dialing which is working perfect to an IAX/SIP provider.
Here is my trunk data.
Outgoing
Trunk Name: Site 1
Peer Details
type=friend
qualify=yes
host=Site 1 IP address
deny=all
allow-ulaw
context=from-internal
-------------------------
Call from 'USERNAME' (XXX.XX.XXX.XX:5060) to extension '01234123412' rejected because extension not found in context 'from‐trunk'
and if you do “dialplan show 01234123412@from-trunk” sure enough there is one.
OUTBOUND
[peername]
username=USERNAME
type=peer
trustrpid=yes
sendrpid=yes
secret=PASSWORD
qualify=no
outboundproxy=sip.hostname.com
nat=yes
insecure=very
host=sip.hostname.com
fromdomain=sip.hostname.com
dtmfmode=auto
disallow=all
context=from-trunk
canreinvite=no
allow=ulaw
allow=alaw
INBOUND
[username]
type=peer
host=sip.hostname.com
dtmfmode=auto
disallow=all
context=from-trunk
canreinvite=no
allow=ulaw
allow=alaw
;registration string
USERNAME:PASSWORD@peername/USERNAME
---------------------------
GXP-1105 消費電力 1.5W ; GrandStream IP 電話
RTX1100 消費電力 6.5W
RTX1210 消費電力 14.5W
CP-7965G 消費電力 12.0W
---------------------------
Introducing the Grandstream UCM6100
Grandstream UCM6202
チャイミー
松下 ドアホーン VL-SWD700KL
チャイムセット OSC-26
オキシドール 500mL
------------------------------------------------------------------------
/usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.mydns.jp -d www.uenda.mydns.jp -m auenda@uenda.mydns.jp --agree-tos
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for uenda.mydns.jp
http-01 challenge for www.uenda.mydns.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
An unexpected error occurred:
There were too many requests of a given type :: Error creating new cert :: too many certificates already issued for: mydns.jp
Please see the logfiles in /var/log/letsencrypt for more details.
----------------------------------------------------------------------------
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for uenda.mydns.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
An unexpected error occurred:
There were too many requests of a given type :: Error creating new cert :: too many certificates already issued for: mydns.jp
Please see the logfiles in /var/log/letsencrypt for more details.
IMPORTANT NOTES:
- Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
-------------------------------------------------------------------------------
/usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -m auenda@uenda.pgw.jp --agree-tos
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for ast.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
Your cert will expire on 2017-11-15. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
---------------------------------------------------------------------------------------
http://olivia.uenda.pgw.jp/S-Documents-page17/423/certbot_postfix_dovecot.html
SSLメールサーバ構築メモ Let's Encrypt+Postfix+Dovecot
http://olivia.uenda.pgw.jp/S-Documents-page15/367/ApacheHTTP_2-PHP7-MySQL5.7.html
Apache HTTP/2+PHP7+MySQL5.7 インストールメモ
http://olivia.uenda.pgw.jp/S-Documents-page10/248/centos7_inst_bind.html
CentOS 7.0 - DNS サーバ BIND 構築!
http://olivia.uenda.pgw.jp/S-Documents-page15/367/CentOS7_xrdp.html
CentOS 7 へリモートデスクトップ接続する (xrdp)
-----------------------------------------------------------
https://support.microsoft.com/ja-jp/help/942031/-http-error-500-0-internal-server-error-error-when-you-you-open-an-iis
IIS 7.0 の Web ページを開くと、"HTTP エラー 500.0 - 内部サーバー エラー" エラーが表示される
inetmgr.exe
--------------------------------------------------------------------------------
00 05 30 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d olivia.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp --renew-by-default && /bin/systemctl restart httpd && /bin/systemctl reload postfix && /bin/systemctl reload dovecot
---------------------------------------------------------------------
/////////////////////////////////////////
http://wataame.sumomo.ne.jp/archives/7071
Send failed
Channel.Connect.Failed error NetConnection.Call.BadVersion: : url:
'https://www.exsample.com/gateway.php'
yum list installed | grep maria
yum --enablerepo=remi,epel list
17-418-4
LANG=C xdg-user-dirs-gtk-update
mail_location = maildir:~/Maildir
========================================================================================================
Package アーキテクチャー バージョン リポジトリー 容量
========================================================================================================
削除中:
ipa-client-common noarch 4.4.0-14.el7.centos.7 @updates 44 k
依存性関連での削除をします:
ipa-client x86_64 4.4.0-14.el7.centos.7 @updates 359 k
python2-ipaclient noarch 4.4.0-14.el7.centos.7 @updates 7.4 M
------------------------------------------------------------------------------------
*********************************************************
Centos7 HDD format 1TB
sd1 BiosBoot 128MiB
sd2 /boot Btrfs Btrfs 1024MiB
/ LVM xfs 926.88GiB
swap LVM swap 3584MiB
----------------
残 3712.68KiB
---------------------------------------------------------
https://www.uenda.pgw.jp/S-Documents-page17/418/centos7-mariadb-install.html
CentOS 7 : MariaDB インストール、及び初期設定
http://server.etutsplus.com/how-to-use-mariadb/
MariaDB テーブル管理、バックアップ等の基本操作コマンド
------------------------------------------
logwatchのメールを送ってみる。
# /etc/cron.daily/0logwatch
# firewall-cmd --reload
Apple Network e835d7
Apple Network e835e8
Apple Network e835f9
http://www.routerlogin.net/
--------------------------------------------
2017/08/30
AU 照子の携帯解約
--------------------------------------------
You access NEWYORK server from 10.13.170.91
10.13.170.91
#print "$ENV{'SERVER_NAME'}";
print "from ";
print "$ENV{'REMOTE_ADDR'}"; #//Client IP Address
---------------------------------------------
[root@lisa ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp --renew-by-default
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
Your cert will expire on 2017-12-01. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@lisa ~]#
---------------------------------------------------------------------------------------------
IN NS ns.uenda.pgw.jp.
IN MX 10 uenda.pgw.jp.
@ IN A 210.154.137.47
ns IN A 210.154.137.47
mail IN A 210.154.137.47
www IN A 210.154.137.47
ast IN A 210.154.137.47
git IN A 210.154.137.47
olivia IN A 210.154.137.47
lisa IN A 210.154.137.47
stacey IN A 210.154.137.47
uenda.pgw.jp. IN TXT "v=spf1 ip4:210.154.137.47 ~all"
-----------------------------------------------------------------
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"EnableLinkedConnections"=dword:00000001
-----------------------------------------------------------------
mklink /D \\192.168.116.196\video6\Popcorn\World C:\Users\User\AppData\Local\Temp\Popcorn-Time
mklink /D C:\Users\auenda\AppData\Local\Temp\Popcorn-Time \\192.168.116.196\video6\Popcorn-Time
http://www.dell.com/support/home/us/en/04/product-support/product/latitude-e6230/drivers
https://www.intel.com/content/www/us/en/support/detect.html?iid=dc_iduu
[root@stacey ~]# yum update
読み込んだプラグイン:fastestmirror, langpacks
Could not retrieve mirrorlist http://mirrorlist.centos.org/?release=7&arch=x86_64&repo=os&infra=stock error was
14: curl#6 - "Could not resolve host: mirrorlist.centos.org; 不明なエラー"
One of the configured repositories failed (不明),
and yum doesn't have enough cached data to continue. At this point the only
safe thing yum can do is fail. There are a few ways to work "fix" this:
1. Contact the upstream for the repository and get them to fix the problem.
2. Reconfigure the baseurl/etc. for the repository, to point to a working
upstream. This is most often useful if you are using a newer
distribution release than is supported by the repository (and the
packages for the previous distribution release still work).
3. Run the command with the repository temporarily disabled
yum --disablerepo= ...
4. Disable the repository permanently, so yum won't use it by default. Yum
will then just ignore the repository until you permanently enable it
again or use --enablerepo for temporary usage:
yum-config-manager --disable
or
subscription-manager repos --disable=
5. Configure the failing repository to be skipped, if it is unavailable.
Note that yum will try to contact the repo. when it runs most commands,
so will have to try and fail each time (and thus. yum will be be much
slower). If it is a very temporary problem though, this is often a nice
compromise:
yum-config-manager --save --setopt=.skip_if_unavailable=true
Cannot find a valid baseurl for repo: base/7/x86_64
[root@stacey ~]#
LANG=C xdg-user-dirs-gtk-update
# 日本語キーマップを変更
$ cd /etc/xrdp
$ sudo wget http://www.mail-archive.com/xrdp-devel@lists.sourceforge.net/msg00263/km-e0010411.ini
$ sudo mv km-e0010411.ini km-0411.ini
$ sudo ln -s km-0411.ini km-e0010411.ini
$ sudo ln -s km-0411.ini km-e0200411.ini
$ sudo ln -s km-0411.ini km-e0210411.ini
Like A Prayer Release year: 1989 Genre: Pop, Contemporary Pop
Like A Virgin Release year: 1984 Genre: Pop, Contemporary Pop
Madonna
Millenium 2013
music 2000 Genre Electropopdance-pop
----------*************************------------
/usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp --renew-by-default && /bin/systemctl reload postfix && /bin/systemctl reload dovecot &
& /bin/systemctl reload httpd
-------------************************------------
------------------------- 2017/09/21 ---------------------------
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp --renew-by-default
Upgrading certbot-auto 0.18.1 to 0.18.2...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
Your cert will expire on 2017-12-20. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
*************************** crontab -e *****************************
00 05 20 * * /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default && /bin/systemctl reload postfix && /bin/systemctl reload dovecot && /bin/systemctl reload httpd
****************************************************************************
restorecon reset /usr/local/letsencrypt/letsencrypt-auto context unconfined_u:object_r:user_tmp_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/ca context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/ca/my-root-ca.crt.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/ca/my-root-ca.key.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/ca/my-root-ca.srl context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost/cert.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost/localhost.csr.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost/privkey.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
restorecon reset /usr/local/letsencrypt/letsencrypt-auto-source/tests/certs/localhost/server.pem context unconfined_u:object_r:cert_t:s0->unconfined_u:object_r:usr_t:s0
--------------------------------------------------------------------------------------------
.htaccess
RewriteEngine On
RewriteCond %{HTTPS} off
RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [R,L]
もとのURLのページ評価を引き継ぎたい場合は、301リダイレクトにする必要があります。
RewriteEngine on
RewriteCond %{HTTPS} off
RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [R=301,L]
----------------------------------------------------------------------
example.com. IN MX 10 mail.example.com.
mail.example.com. IN A 192.0.2.1
------------
firewall-cmd --add-port=25/tcp --permanent
firewall-cmd --add-port=465/tcp --permanent
firewall-cmd --add-port=993/tcp --permanent
firewall-cmd --add-port=995/tcp --permanent
firewall-cmd --add-port=80/tcp --permanent
firewall-cmd --add-port=443/tcp --permanent
firewall-cmd --reload
firewall-cmd --list-ports
22/tcp 25/tcp 465/tcp 995/tcp 993/tcp
--------------------------------------
ルックアップテーブルの作成
postmap /etc/postfix/access
設定に誤りがないかチェック(なにも表示されなければOKです)
postfix check
Postfixの起動
systemctl start postfix
systemctl enable postfix
[root@centos]# vi /usr/lib/systemd/system/diced.service <--- 入力
以下新規記述
[Unit]
Description=The DiCE Server
After=network.target remote-fs.target nss-lookup.target
[Service]
Type=notify
ExecStart=/usr/local/DiCE/diced -d -l
ExecReload=/usr/local/DiCE/diced $OPTIONS
ExecStop=/usr/local/DiCE/diced $OPTIONS
RemainAfterExit=yes
PrivateTmp=true
[Install]
WantedBy=multi-user.target
-----------------------------------------------------------------------------
[root@centos]# systemctl --system daemon-reload <--- 入力
====================================================================
# yum install mod_perl
smtp_host_lookup
netstat -at --numeric-port | grep 10023
# 認証を通過したものはリレーを許可する(permit_sasl_authenticated)
smtpd_recipient_restrictions =
permit_mynetworks,
permit_sasl_authenticated,
reject_unauth_destination,
check_policy_service inet:127.0.0.1:10023
---------------------------------------------------------------
ssh-keygen -t dsa -N ""
scp -P 22 .ssh/id_dsa.pub 192.168.116.103:/root/.ssh/authorized_keys2
scp -P 22 .ssh/id_dsa.pub 192.168.116.108:/Users/auenda/.ssh/authorized_keys2 XX
---------------------------------------------------------------
http://ufuso.jp/wp/centos-7-%e3%81%a7%e8%87%aa%e5%ae%85%e3%82%b5%e3%83%bc%e3%83%90%e3%83%bc%e3%82%92%e5%88%a5pc%e3%81%aeusb%e5%a4%96%e4%bb%98%e3%83%8f%e3%83%bc%e3%83%89%e3%83%87%e3%82%a3%e3%82%b9%e3%82%af%e3%81%ab/
CentOS 7 で自宅サーバーを別PCのUSB外付ハードディスクに毎晩自動バックアップ(rsync+ssh) 2015-02-13
yum -y install cronie-noanacron
Rsyncd は 873/tcp を使用する。
************ 2017/10/01 **********************************************
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
Your cert will expire on 2017-12-30. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
*****************************************************************************
[root@madonna ~]# yum -y install gitlab-ce
Loaded plugins: fastestmirror, langpacks
Loading mirror speeds from cached hostfile
* base: ftp.nara.wide.ad.jp
* epel: ftp.jaist.ac.jp
* extras: ftp.nara.wide.ad.jp
* updates: ftp.nara.wide.ad.jp
Resolving Dependencies
--> Running transaction check
---> Package gitlab-ce.x86_64 0:10.0.2-ce.0.el7 will be installed
--> Finished Dependency Resolution
Dependencies Resolved
=========================================================================================================
Package Arch Version Repository Size
=========================================================================================================
Installing:
gitlab-ce x86_64 10.0.2-ce.0.el7 gitlab_gitlab-ce 343 M
Transaction Summary
=========================================================================================================
Install 1 Package
Total download size: 343 M
Installed size: 1.0 G
Downloading packages:
warning: /var/cache/yum/x86_64/7/gitlab_gitlab-ce/packages/gitlab-ce-10.0.2-ce.0.el7.x86_64.rpm: Header V4 RSA/SHA1 Signature, key ID f27eab47: NOKEY
Public key for gitlab-ce-10.0.2-ce.0.el7.x86_64.rpm is not installed
gitlab-ce-10.0.2-ce.0.el7.x86_64.rpm | 343 MB 00:01:06
Retrieving key from https://packages.gitlab.com/gitlab/gitlab-ce/gpgkey
Importing GPG key 0xE15E78F4:
Userid : "GitLab B.V. (package repository signing key) "
Fingerprint: 1a4c 919d b987 d435 9396 38b9 1421 9a96 e15e 78f4
From : https://packages.gitlab.com/gitlab/gitlab-ce/gpgkey
Retrieving key from https://packages.gitlab.com/gitlab/gitlab-ce/gpgkey/gitlab-gitlab-ce-3D645A26AB9FBD22.pub.gpg
Importing GPG key 0xF27EAB47:
Userid : "GitLab, Inc. "
Fingerprint: dbef 8977 4ddb 9eb3 7d9f c3a0 3cfc f9ba f27e ab47
From : https://packages.gitlab.com/gitlab/gitlab-ce/gpgkey/gitlab-gitlab-ce-3D645A26AB9FBD22.pub.gpg
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
Installing : gitlab-ce-10.0.2-ce.0.el7.x86_64 [####################### ] 1/17 I Installing : gitlab-ce-10.0.2-ce.0.el7.x86_64 1/1
It looks like GitLab has not been configured yet; skipping the upgrade script.
*. *.
*** ***
***** *****
.****** *******
******** ********
,,,,,,,,,***********,,,,,,,,,
,,,,,,,,,,,*********,,,,,,,,,,,
.,,,,,,,,,,,*******,,,,,,,,,,,,
,,,,,,,,,*****,,,,,,,,,.
,,,,,,,****,,,,,,
.,,,***,,,,
,*,.
_______ __ __ __
/ ____(_) /_/ / ____ _/ /_
/ / __/ / __/ / / __ \`/ __ \
/ /_/ / / /_/ /___/ /_/ / /_/ /
\____/_/\__/_____/\__,_/_.___/
Thank you for installing GitLab!
GitLab was unable to detect a valid hostname for your instance.
Please configure a URL for your GitLab instance by setting `external_url`
configuration in /etc/gitlab/gitlab.rb file.
Then, you can start your GitLab instance by running the following command:
sudo gitlab-ctl reconfigure
For a comprehensive list of configuration options please see the Omnibus GitLab readme
https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/README.md
Verifying : gitlab-ce-10.0.2-ce.0.el7.x86_64 1/1
Installed:
gitlab-ce.x86_64 0:10.0.2-ce.0.el7
Complete!
***************************************************************************************
[root@madonna ~]# cp -ip /etc/gitlab/gitlab.rb /etc/gitlab/gitlab.rb.org
# gitlab-ctl reconfigure
----15分ごとに実行する場合---------------------------------------------
*/15 * * * * /usr/bin/systemctl restart lsyncd
---- 1時間ごとに実行する ---------------------------
00 0-23/1 * * *
==========================================================
https://centos.pkgs.org/7/lux/cacti-spine-1.1.19-1.el7.lux.x86_64.rpm.html
cacti-spine-1.1.19-1.el7.lux.x86_64.rpm
Download the latest lux-release rpm from
http://repo.iotti.biz/CentOS/7/noarch/
Install lux-release rpm:
# rpm -Uvh lux-release-7-1.noarch.rpm
Install cacti-spine rpm package:
# yum install cacti-spine
---------------------------------------------------------------------------
--------------- MyDNS に DDNS の通知 ---------------------------------------
①. MyDNS.jpへの通知用スクリプトを作る → mydns.sh
sudo nano /root/mydns.sh
#!/bin/sh
# mydns.JP
/usr/bin/wget -o /var/log/mydns.log 'https://mydnsID:mydnsPASS@www.mydns.jp/login.html'
②. cronの設定ファイルに追記
sudo crontab -e
00 05 * * * /usr/bin/run-parts /root/mydns.sh
③. スクリプトに実行権限を与える
sudo chmod +x /root/mydns.sh
④. 実際に使ってみる
/root/mydns.sh
-------------------------------------------------------------------------
-------------------------------------------------------------------------
[***** ~]# yum list | grep wget
[root@madonna ~]# cd /etc/logrotate.d/
[root@madonna logrotate.d]# logrotate -dv mydnslog # -dをつけてdry-runをして結果を見る
[root@madonna logrotate.d]# logrotate -fv mydnslog # ローテートする条件を満たしていなくても強制的に実行する場合は-fを付ける
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
$ vi /etc/logrotate.d/sample-service
/etc/logrotate.d/sample-service
/var/log/sample-service/sample.log { # 対象のログファイル
ifempty # ログファイルが空でもローテーションする
dateformat .%Y%m%d # dateフォーマットを任意のものに変更する
missingok # ログファイルがなくてもエラーを出さない
compress # 圧縮する
daily # 毎日ローテートする
rotate 10 # 10世代分古いログを残す
postrotate # ローテート後にsyslogを再起動
/bin/kill -HUP `cat /var/run/syslogd.pid 2> /dev/null` 2> /dev/null || true
endscript
}
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
自ドメインのDNSサーバーのTXTレコード▼に、メールサーバーのIPアドレスを登録▼するだけでよい。
メールサーバーが複数ある場合には、IPアドレスを列挙する。
example.jp. IN TXT "v=spf1 +ip4:203.0.11.1 -all"
---------------------------------------------------------------
00 00 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@www.mydns.jp/login.html'
-----------
[root@madonna ~]# cat /var/log/mydnslog/log
--2017-10-12 00:00:02-- https://mydns985090:*password*@www.mydns.jp/login.html
Resolving www.mydns.jp (www.mydns.jp)... 163.44.151.204, 168.235.77.133, 107.191.96.221, ...
Connecting to www.mydns.jp (www.mydns.jp)|163.44.151.204|:443... connected.
HTTP request sent, awaiting response... 401 Authorization Required
Reusing existing connection to www.mydns.jp:443.
HTTP request sent, awaiting response... 200 OK
Length: 612 [text/html]
Saving to: ‘login.html.1’
0K 100% 3.95M=0s
2017-10-12 00:00:04 (3.95 MB/s) - ‘login.html.1’ saved [612/612]
[root@madonna ~]#
---------------------------------------------------------------
[root@madonna ~]# ls /var/log/mydnslog/
log log-20171010
---------------------------------------------------------------
# apachectl -M | grep cgi <--- は、ロードされたモジュールの一覧を表示するコマンドです
Creative SB AVStream Monitoring Launcher". SBAVMonL.dll
Windows.oldのSystem32フォルダ下の「sbavmon.dll」をWindowsのSystem32フォルダ下へコピー
http://www.isiro.net/isrwps/2016/07/24/%E8%87%AA%E4%BD%9Cpc%E8%A8%88%E7%94%BBwindows10%E3%81%B8%E3%81%AE%E3%82%A2%E3%83%83%E3%83%97%E3%82%B0%E3%83%AC%E3%83%BC%E3%83%89/
============================================================
java mac Property name="yearIsDateType" でエラー
http://www.task-notes.com/entry/20151004/1443951543
2015/10/04
--------------------
http://cs.wellesley.edu/~cs304/jdbc/connector-j.html
JDBC / connector-j
-------------------------------------------------------
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/jjdk8u-67122a315e79.tar.gz
curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/corba/archive/jdk8u172-b03.tar.gz
curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/hotspot/archive/jdk8u172-b03.tar.gz
curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/archive/jdk8u172-b03.tar.gz
curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/jaxws/archive/jdk8u172-b03.tar.gz
curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/jaxp/archive/jdk8u172-b03.tar.gz
curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/langtools/archive/jdk8u172-b03.tar.gz
curl -OL http://hg.openjdk.java.net/jdk8u/jdk8u/nashorn/archive/jdk8u172-b03.tar.gz
curl -OL http://hg.openjdk.java.net/openjfx/8u/rt/archive/8u172-b03.tar.gz
curl -OL https://downloads.gradle.org/distributions/gradle-1.8-bin.zip
---------------------------------------------------------------------------
--------------------------------------------------
tar xvzf eclipse-jee-oxygen-3-linux-gtk-x86_64.tar.gz -C /opt
++++++++++++++++++++++
[Desktop Entry]
Version=1.0
Name=Eclipse Oxygen SR3
Name[ja]=Eclipse Oxygen SR3
Comment=Eclipse Oxygen
Comment[ja]=Eclipse Oxygen
Exec=/opt/eclipse/eclipse
Icon=/opt/eclipse/icon.xpm
Terminal=false
Type=Application
Categories=Development;
++++++++++++++++++++++
----------------------------------------------
Caused by: java.lang.UnsatisfiedLinkError: Can't load library: /usr/local/jvm/openjdk-1.8.0_172/jre/lib/amd64/libjfxmedia.so
----------------------------------------------------
Caused by: MediaException: UNKNOWN : com.sun.media.jfxmedia.MediaException: Could not create player! : com.sun.media.jfxmedia.MediaException: Could not create player!
-----------------------------------------------2018/04/12
:
00 03 11 * * certbot renew --quiet && /bin/systemctl reload postfix && /bin/systemctl reload dovecot && /bin/systemctl reload httpd
00 05 * * * /opt/gitlab/bin/gitlab-rake gitlab:backup:create CRON=1
00 00 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@www.mydns.jp/login.html'
=================================================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Upgrading certbot-auto 0.21.1 to 0.23.0...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
Your cert will expire on 2018-07-10. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
==========================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Upgrading certbot-auto 0.30.0 to 0.33.1...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem
Your cert will expire on 2019-07-18. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
Spiderストレージエンジンのインストール?
https://downloads.mariadb.org/mariadb/repositories/#mirror=yamagata-university&distro=CentOS&distro_release=centos7-amd64--centos7&version=10.3
curl -O http://ftp.yz.yamagata-u.ac.jp/pub/network/apache/tomcat/tomcat-9/v9.0.20/bin/apache-tomcat-9.0.20.tar.gz
tar xvzf apache-tomcat-9.0.20.tar.gz -C /opt
ln -s /opt/apache-tomcat-9.0.20 /opt/apache-tomcat
chown -R tomcat:tomcat /opt/apache-tomcat-9.0.20
----------------------------------------------------
[auenda@ast ~]$ java -jar xTunes-v9.5.5.4.jar
Exception in thread "main" java.lang.NoClassDefFoundError: javafx/application/Application
at java.lang.ClassLoader.defineClass1(Native Method)
at java.lang.ClassLoader.defineClass(ClassLoader.java:763)
at java.security.SecureClassLoader.defineClass(SecureClassLoader.java:142)
at java.net.URLClassLoader.defineClass(URLClassLoader.java:468)
at java.net.URLClassLoader.access$100(URLClassLoader.java:74)
at java.net.URLClassLoader$1.run(URLClassLoader.java:369)
at java.net.URLClassLoader$1.run(URLClassLoader.java:363)
at java.security.AccessController.doPrivileged(Native Method)
at java.net.URLClassLoader.findClass(URLClassLoader.java:362)
at java.lang.ClassLoader.loadClass(ClassLoader.java:424)
at java.lang.ClassLoader.loadClass(ClassLoader.java:357)
at java.lang.Class.forName0(Native Method)
at java.lang.Class.forName(Class.java:348)
at org.eclipse.jdt.internal.jarinjarloader.JarRsrcLoader.main(JarRsrcLoader.java:56)
Caused by: java.lang.ClassNotFoundException: javafx.application.Application
at java.net.URLClassLoader.findClass(URLClassLoader.java:382)
at java.lang.ClassLoader.loadClass(ClassLoader.java:424)
at java.lang.ClassLoader.loadClass(ClassLoader.java:357)
... 14 more
[auenda@ast ~]$
------------------------------------
[root@madonna ~]# semodule -i my-local.pp
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem
Your cert will expire on 2019-09-16. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
--------------------------------------------------------
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Upgrading certbot-auto 0.35.1 to 0.38.0...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem
Your cert will expire on 2019-12-15. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
=========================================================================================
Installing pdsh is really simple, please follow blow steps 4) After complete make install ... Cold front and warm front collide howie · How to convert percents into decimals ... PDSH seems to be completely missing from EPEL now, for CentOS 7.
----------------------------------------------------------------------------
00 00 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@www.mydns.jp/login.html'
----------------------------------------------------------------------------------------------------------------
========================================================================
fess install----------------------
Javaのインストール
wget https://download.java.net/java/GA/jdk11/9/GPL/openjdk-11.0.2_linux-x64_bin.tar.gz
tar xzvf openjdk-11.0.2_linux-x64_bin.tar.gz
mv jdk-11.0.2 /opt/
alternatives --install /usr/bin/java java /opt/jdk-11.0.2/bin/java 1
alternatives --install /usr/bin/jar jar /opt/jdk-11.0.2/bin/jar 1
alternatives --install /usr/bin/javac javac /opt/jdk-11.0.2/bin/javac 1
java -version
----------------------------------------------------jdk-11.0.5+10 ******
alternatives --install /usr/bin/java java /opt/jdk-11.0.5/bin/java 1
alternatives --install /usr/bin/jar jar /opt/jdk-11.0.5/bin/jar 1
alternatives --install /usr/bin/javac javac /opt/jdk-11.0.5/bin/javac 1
alternatives --config java
----------------------------------------------------
Elasticsearchのインストール
yum -y install perl-Digest-SHA
wget https://artifacts.elastic.co/downloads/elasticsearch/elasticsearch-7.3.0-x86_64.rpm
wget https://artifacts.elastic.co/downloads/elasticsearch/elasticsearch-7.3.0-x86_64.rpm.sha512
shasum -a 512 -c elasticsearch-7.3.0-x86_64.rpm.sha512
rpm --install elasticsearch-7.3.0-x86_64.rpm
------------------------------------------------------
Fessで必要なプラグインを以下でインストール 7.1.0
/usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-analysis-fess:7.3.0
/usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-analysis-extension:7.3.0
/usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-configsync:7.3.0
/usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-dataformat:7.3.0
/usr/share/elasticsearch/bin/elasticsearch-plugin install org.codelibs:elasticsearch-minhash:7.3.0
-----------------------------------------------------
設定ファイルに以下の行を追加
vi /etc/elasticsearch/elasticsearch.yml
--------------------------- 以下を追加
configsync.config_path: /var/lib/elasticsearch/config
----------------------------------------------------
起動の設定
systemctl daemon-reload
systemctl enable elasticsearch.service
systemctl start elasticsearch.service
---------------------------------------------------
Fessのインストール
wget https://github.com/codelibs/fess/releases/download/fess-13.3.0/fess-13.3.0.rpm
# rpm --install fess-13.3.0.rpm
また、起動の設定を以下で行います。
# systemctl daemon-reload
# systemctl enable fess.service
# systemctl start fess.service
1
2
3
4
5
# systemctl daemon-reload
# systemctl enable fess.service
# systemctl start fess.service
「systemctl status fess.service」などで起動の状態を確認します。
RPMでのインストールではJavaのバージョンなどでうまく起動しないことがあります。
画面での確認
Fessを起動すると8080のポートでHTTPでの接続が行えます。
外部からの接続の時には8080ポートを開けておく必要があります。
接続すると以下の画面となります。
上にある「ログイン」 から管理画面にアクセスが可能です。
初期でのパスワードは「admin / admin」になります。
管理画面にログインして様々な設定を行うことができます。
サジェストなどの登録もこちらから行えます。
関連記事
機械学習のfastTextをCentOS7環境のPython3を使って20万件の文章分類を実施してみる(mecabを利用)
機械学習のfastTextをCentOS7環境のPython3を使って20万件の文章分類を実施してみる(mecabを利用)
CentOS7にZABBIX Agentのインストール
CentOS7にZABBIXサーバのインストール
CentOS7のPython3でJUMAN++のインストールと利用
CentOS7のPython3でJUMAN++のインストールと利用
CentOS7のPython3でMeCabのmecab-ipadic-neologdのインストールと利用
CentOS7のPython3でMeCabのmecab-ipadic-neologdのインストールと利用
CentOS環境の python3.6(pyenv環境)で Scrapy を利用してみる(Scrapy その1)
技術ブログ 環境構築
CentOSFESS全文検索
ツイート
シェア
はてブ
Google+
Pocket
feedly
機械学習のfastTextをCentOS7環境のPython3を使って20万件の文章分類を実施してみる(mecabを利用)
python-twitterのライブラリを使用して、pythonでtwitterのAPIを操作
RECOMMENDこちらの記事も人気です。
Python
2018.12.18
pythonを使ってmongodbの操作
Elasticsearch
2018.10.11
さくらVPS の CentOS7 サーバに Elasticsearch …
Python
2018.12.12
Scrapyでデータ取得でクローリングで取得したURLから検索する(Sc…
サーバインフラ構築
2018.9.4
CentOS6 + Apache2 を無料のSSL「Let's Encr…
サーバインフラ構築
2018.12.15
CentOS7系でmongodb4.0のインストール
GCP
2019.3.29
Pythonでのgoogle-cloud-bigqueryライブラリを利…
Elasticsearch
2018.8.13
Elasticsearch 6 を使ったデータ検証 その3(bulkでデ…
GCP
2018.11.13
Google Cloud Platform を Cloud SDKで設定…
最近の投稿
Firefoxの「RESTClient」からPOSTの値の送信
CentOS6にZABBIX Agentのインストール
CentOS7にSwaggerのインストール
ZABBIXのアラートをSlackに飛ばす
CentOS7にZABBIX Agentのインストール
カテゴリー
Ajax
AWS
Django
Elasticsearch
GCP
Mahout
Python
RubyOnRails
Scrapy
アンチパターン
サーバインフラ構築
その他
勉強会
技術ブログ
機械学習
環境構築
開発環境構築
開発言語
------------------------------------------------------------------------------
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Upgrading certbot-auto 0.38.0 to 1.0.0...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
+Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem
Your cert will expire on 2020-03-14. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[
------------------------------------------------------------------------------
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Upgrading certbot-auto 1.0.0 to 1.3.0...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem
Your cert will expire on 2020-06-02. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
============================================================================== crontab -e
00 00 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@www.mydns.jp/login.html'
---------------------------------------------------
==============================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Upgrading certbot-auto 1.3.0 to 1.4.0...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem
Your cert will expire on 2020-08-13. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
----------------------------------------------------------------------
====================================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Upgrading certbot-auto 1.5.0 to 1.6.0...
Replacing certbot-auto...
Creating virtual environment...
Installing Python packages...
Installation succeeded.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem
Your cert will expire on 2020-10-31. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
----------------------------------------------------------------------------------------------------
====================================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --nginx -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d mail.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@m-cn.ne.jp
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator nginx, Installer nginx
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using default address 80 for authentication.
Using default address 80 for authentication.
Using default address 80 for authentication.
Using default address 80 for authentication.
Using default address 80 for authentication.
Using default address 80 for authentication.
Using default address 80 for authentication.
nginx: [error] invalid PID number "" in "/var/run/nginx.pid"
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0003/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0003/privkey.pem
Your cert will expire on 2020-12-27. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
=============================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --nginx -d uenda.pgw.jp -d www.uenda.pgw.jp -d ast.uenda.pgw.jp -d lisa.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -d julie.uenda.pgw.jp -m auenda@m-cn.ne.jp
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator nginx, Installer nginx
Cert is due for renewal, auto-renewing...
Renewing an existing certificate
Performing the following challenges:
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
Using default address 80 for authentication.
Using default address 80 for authentication.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0002/privkey.pem
Your cert will expire on 2021-01-02. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
========================================================================================================
https://mevius.5ch.net/test/read.cgi/avi/1549446744/524-n
SoftCas Part20
-----------------------------------------------------------
========================================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0004/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0004/privkey.pem
Your cert will expire on 2021-02-01. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
====================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto
Your system is not supported by certbot-auto anymore.
certbot-auto and its Certbot installation will no longer receive updates.
You will not receive any bug fixes including those fixing server compatibility
or security problems.
Please visit https://certbot.eff.org/ to check for other alternatives.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
How would you like to authenticate and install certificates?
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1: Apache Web Server plugin (apache)
2: Nginx Web Server plugin (nginx)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 1
Plugins selected: Authenticator apache, Installer apache
Which names would you like to activate HTTPS for?
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1: uenda.pgw.jp
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Select the appropriate numbers separated by commas and/or spaces, or leave input
blank to select all options shown (Enter 'c' to cancel): 1
Requesting a certificate for uenda.pgw.jp
Performing the following challenges:
http-01 challenge for uenda.pgw.jp
Waiting for verification...
Cleaning up challenges
Created an SSL vhost at /etc/httpd/conf/httpd-le-ssl.conf
Deploying Certificate to VirtualHost /etc/httpd/conf/httpd-le-ssl.conf
Enabling site /etc/httpd/conf/httpd-le-ssl.conf by adding Include to root configuration
Redirecting vhost in /etc/httpd/conf/httpd.conf to ssl vhost in /etc/httpd/conf/httpd-le-ssl.conf
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Congratulations! You have successfully enabled https://uenda.pgw.jp
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0005/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0005/privkey.pem
Your cert will expire on 2021-05-06. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again with the "certonly" option. To
non-interactively renew *all* of your certificates, run
"letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Your system is not supported by certbot-auto anymore.
certbot-auto and its Certbot installation will no longer receive updates.
You will not receive any bug fixes including those fixing server compatibility
or security problems.
Please visit https://certbot.eff.org/ to check for other alternatives.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Requesting a certificate for uenda.pgw.jp and 9 more domains
Performing the following challenges:
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for julie.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem
Your cert will expire on 2021-08-14. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
-----------------------------------------------------------------------------------------------------------
------------- Tomcat css ---------------------2021/05/19---------------------------
-----------------------------------------------------------------------------------------------------------
openssl pkcs12 -export -in cert.pem -inkey privkey.pem -certfile chain.pem -out pkcs12.pfx -passout pass:changeit
openssl pkcs12 -export -in /etc/letsencrypt/live/uenda.pgw.jp-0006/cert.pem -inkey /etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem -certfile /etc/letsencrypt/live/uenda.pgw.jp-0006/chain.pem -out pkcs12.pfx -passout pass:changeit
-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
Timeout while waiting for app reactivation
------------------------------------------------
===============================================================================================
SLF4J: Class path contains multiple SLF4J bindings.
SLF4J: Found binding in [jar:file:/C:/Users/auenda/.p2/pool/plugins/org.eclipse.m2e.maven.runtime.slf4j.simple_1.18.0.20210402-1458/jars/slf4j-simple-1.7.5.jar!/org/slf4j/impl/StaticLoggerBinder.class]
SLF4J: Found binding in [file:/C:/eclipse/jee-2021-06/eclipse/configuration/org.eclipse.osgi/6/0/.cp/org/slf4j/impl/StaticLoggerBinder.class]
SLF4J: See http://www.slf4j.org/codes.html#multiple_bindings for an explanation.
SLF4J: Actual binding is of type [org.slf4j.impl.SimpleLoggerFactory]
SLF4J: Class path contains multiple SLF4J bindings.
SLF4J: Found binding in [jar:file:/C:/Users/auenda/.p2/pool/plugins/org.eclipse.m2e.maven.runtime.slf4j.simple_1.18.0.20210402-1458/jars/slf4j-simple-1.7.5.jar!/org/slf4j/impl/StaticLoggerBinder.class]
SLF4J: Found binding in [file:/C:/eclipse/jee-2021-06/eclipse/configuration/org.eclipse.osgi/6/0/.cp/org/slf4j/impl/StaticLoggerBinder.class]
SLF4J: See http://www.slf4j.org/codes.html#multiple_bindings for an explanation.
SLF4J: Actual binding is of type [org.slf4j.impl.SimpleLoggerFactory]
[INFO] Scanning for projects...
[INFO]
[INFO] -------------------------< xTunesNginx:xtunes >-------------------------
[INFO] Building xtunes 0.0.1-SNAPSHOT
[INFO] --------------------------------[ jar ]---------------------------------
[INFO]
[INFO] --- maven-resources-plugin:2.6:resources (default-resources) @ xtunes ---
[INFO] Using 'UTF-8' encoding to copy filtered resources.
[INFO] Copying 51 resources
[INFO]
[INFO] --- maven-compiler-plugin:3.8.1:compile (default-compile) @ xtunes ---
[INFO] Changes detected - recompiling the module!
[INFO] Compiling 59 source files to C:\sdk\mServweb2\xTunesVNginxS\target\classes
[INFO]
[INFO] --- maven-resources-plugin:2.6:testResources (default-testResources) @ xtunes ---
[INFO] Using 'UTF-8' encoding to copy filtered resources.
[INFO] skip non existing resourceDirectory C:\sdk\mServweb2\xTunesVNginxS\src\test\resources
[INFO]
[INFO] --- maven-compiler-plugin:3.8.1:testCompile (default-testCompile) @ xtunes ---
[INFO] Changes detected - recompiling the module!
[INFO]
[INFO] --- maven-surefire-plugin:2.12.4:test (default-test) @ xtunes ---
[INFO]
[INFO] --- maven-jar-plugin:2.4:jar (default-jar) @ xtunes ---
[INFO] Building jar: C:\sdk\mServweb2\xTunesVNginxS\target\xtunes-0.0.1-SNAPSHOT.jar
[INFO]
[INFO] --- maven-shade-plugin:3.2.3:shade (default) @ xtunes ---
[INFO] Including org.slf4j:slf4j-api:jar:1.7.31 in the shaded jar.
[INFO] Including org.slf4j:jul-to-slf4j:jar:1.7.31 in the shaded jar.
[INFO] Including org.apache.commons:commons-lang3:jar:3.12.0 in the shaded jar.
[INFO] Including io.socket:engine.io-client:jar:2.0.0 in the shaded jar.
[INFO] Including com.squareup.okhttp3:okhttp:jar:3.12.12 in the shaded jar.
[INFO] Including com.squareup.okio:okio:jar:1.15.0 in the shaded jar.
[INFO] Including org.json:json:jar:20090211 in the shaded jar.
[INFO] Including com.fasterxml.jackson.core:jackson-annotations:jar:2.12.3 in the shaded jar.
[INFO] Including com.fasterxml.jackson.core:jackson-core:jar:2.12.3 in the shaded jar.
[INFO] Including com.fasterxml.jackson.core:jackson-databind:jar:2.12.3 in the shaded jar.
[INFO] Including com.google.code.gson:gson:jar:2.8.7 in the shaded jar.
[INFO] Including org.jboss.spec.javax.ws.rs:jboss-jaxrs-api_2.1_spec:jar:2.0.1.Final in the shaded jar.
[INFO] Including io.quarkus:quarkus-jaxp:jar:2.0.0.CR3 in the shaded jar.
[INFO] Including io.quarkus:quarkus-core:jar:2.0.0.CR3 in the shaded jar.
[INFO] Including jakarta.annotation:jakarta.annotation-api:jar:1.3.5 in the shaded jar.
[INFO] Including jakarta.enterprise:jakarta.enterprise.cdi-api:jar:2.0.2 in the shaded jar.
[INFO] Including jakarta.el:jakarta.el-api:jar:3.0.3 in the shaded jar.
[INFO] Including jakarta.interceptor:jakarta.interceptor-api:jar:1.2.5 in the shaded jar.
[INFO] Including jakarta.ejb:jakarta.ejb-api:jar:3.2.6 in the shaded jar.
[INFO] Including jakarta.transaction:jakarta.transaction-api:jar:1.3.2 in the shaded jar.
[INFO] Including jakarta.inject:jakarta.inject-api:jar:1.0 in the shaded jar.
[INFO] Including io.quarkus:quarkus-ide-launcher:jar:2.0.0.CR3 in the shaded jar.
[INFO] Including io.quarkus:quarkus-development-mode-spi:jar:2.0.0.CR3 in the shaded jar.
[INFO] Including io.smallrye.config:smallrye-config:jar:2.3.0 in the shaded jar.
[INFO] Including io.smallrye.config:smallrye-config-core:jar:2.3.0 in the shaded jar.
[INFO] Including org.eclipse.microprofile.config:microprofile-config-api:jar:2.0 in the shaded jar.
[INFO] Including io.smallrye.common:smallrye-common-annotation:jar:1.6.0 in the shaded jar.
[INFO] Including io.smallrye.common:smallrye-common-expression:jar:1.6.0 in the shaded jar.
[INFO] Including io.smallrye.common:smallrye-common-function:jar:1.6.0 in the shaded jar.
[INFO] Including io.smallrye.common:smallrye-common-constraint:jar:1.6.0 in the shaded jar.
[INFO] Including io.smallrye.common:smallrye-common-classloader:jar:1.6.0 in the shaded jar.
[INFO] Including org.ow2.asm:asm:jar:9.1 in the shaded jar.
[INFO] Including io.smallrye.config:smallrye-config-common:jar:2.3.0 in the shaded jar.
[INFO] Including org.jboss.logging:jboss-logging:jar:3.4.2.Final in the shaded jar.
[INFO] Including org.jboss.logmanager:jboss-logmanager-embedded:jar:1.0.9 in the shaded jar.
[INFO] Including org.jboss.logging:jboss-logging-annotations:jar:2.2.1.Final in the shaded jar.
[INFO] Including org.jboss.threads:jboss-threads:jar:3.4.0.Final in the shaded jar.
[INFO] Including org.jboss.slf4j:slf4j-jboss-logmanager:jar:1.1.0.Final in the shaded jar.
[INFO] Including org.graalvm.sdk:graal-sdk:jar:21.1.0 in the shaded jar.
[INFO] Including org.wildfly.common:wildfly-common:jar:1.5.4.Final-format-001 in the shaded jar.
[INFO] Including io.quarkus:quarkus-bootstrap-runner:jar:2.0.0.CR3 in the shaded jar.
[INFO] Including io.smallrye.common:smallrye-common-io:jar:1.6.0 in the shaded jar.
[INFO] Including org.eclipse.jetty:jetty-util:jar:11.0.5 in the shaded jar.
[INFO] Including com.github.albfernandez:juniversalchardet:jar:2.4.0 in the shaded jar.
[INFO] Including org.mariadb.jdbc:mariadb-java-client:jar:2.7.3 in the shaded jar.
[INFO] Including org.eclipse.ecf:org.apache.commons.codec:jar:1.9.0.v20170208-1614 in the shaded jar.
[INFO] Including org.eclipse.ecf:org.apache.commons.logging:jar:1.1.1.v201101211721 in the shaded jar.
[INFO] Including org.glassfish.tyrus.bundles:tyrus-standalone-client:jar:2.0.0 in the shaded jar.
[INFO] Including org.springframework.security:spring-security-crypto:jar:5.4.5 in the shaded jar.
[INFO] Including org.springframework.security:spring-security-core:jar:5.4.5 in the shaded jar.
[INFO] Including org.springframework:spring-aop:jar:5.2.13.RELEASE in the shaded jar.
[INFO] Including org.springframework:spring-beans:jar:5.2.13.RELEASE in the shaded jar.
[INFO] Including org.springframework:spring-context:jar:5.2.13.RELEASE in the shaded jar.
[INFO] Including org.springframework:spring-core:jar:5.2.13.RELEASE in the shaded jar.
[INFO] Including org.springframework:spring-jcl:jar:5.2.13.RELEASE in the shaded jar.
[INFO] Including org.springframework:spring-expression:jar:5.2.13.RELEASE in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacv-platform:jar:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacv:jar:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flycapture:jar:2.13.3.31-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394:jar:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect:jar:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect2:jar:0.2.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense:jar:1.12.4-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense2:jar:2.40.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:videoinput:jar:0.200-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas-platform:jar:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp-platform:jar:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:android-arm:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:android-arm64:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:android-x86:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:android-x86_64:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:ios-arm64:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:ios-x86_64:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:linux-armhf:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:linux-arm64:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:linux-ppc64le:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:linux-x86:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:linux-x86_64:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:macosx-arm64:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:macosx-x86_64:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:windows-x86:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:javacpp:jar:windows-x86_64:1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:android-arm:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:android-arm64:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:android-x86:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:android-x86_64:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:ios-arm64:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:ios-x86_64:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:linux-x86:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:linux-x86_64:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:linux-armhf:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:linux-arm64:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:linux-ppc64le:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:macosx-x86_64:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:windows-x86:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:openblas:jar:windows-x86_64:0.3.13-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv-platform:jar:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:android-arm:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:android-arm64:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:android-x86:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:android-x86_64:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:ios-arm64:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:ios-x86_64:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:linux-x86:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:linux-x86_64:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:linux-armhf:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:linux-arm64:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:linux-ppc64le:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:macosx-x86_64:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:windows-x86:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:opencv:jar:windows-x86_64:4.5.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg-platform:jar:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:android-arm:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:android-arm64:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:android-x86:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:android-x86_64:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:linux-x86:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:linux-x86_64:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:linux-armhf:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:linux-arm64:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:linux-ppc64le:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:macosx-x86_64:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:windows-x86:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:ffmpeg:jar:windows-x86_64:4.3.2-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flycapture-platform:jar:2.13.3.31-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flycapture:jar:linux-x86:2.13.3.31-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flycapture:jar:linux-x86_64:2.13.3.31-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flycapture:jar:linux-armhf:2.13.3.31-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flycapture:jar:linux-arm64:2.13.3.31-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flycapture:jar:windows-x86:2.13.3.31-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flycapture:jar:windows-x86_64:2.13.3.31-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394-platform:jar:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394:jar:linux-x86:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394:jar:linux-x86_64:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394:jar:linux-armhf:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394:jar:linux-arm64:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394:jar:linux-ppc64le:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394:jar:macosx-x86_64:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394:jar:windows-x86:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libdc1394:jar:windows-x86_64:2.2.6-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect-platform:jar:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect:jar:linux-x86:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect:jar:linux-x86_64:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect:jar:linux-armhf:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect:jar:linux-arm64:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect:jar:linux-ppc64le:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect:jar:macosx-x86_64:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect:jar:windows-x86:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect:jar:windows-x86_64:0.5.7-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect2-platform:jar:0.2.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect2:jar:linux-x86:0.2.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect2:jar:linux-x86_64:0.2.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect2:jar:macosx-x86_64:0.2.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:libfreenect2:jar:windows-x86_64:0.2.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense-platform:jar:1.12.4-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense:jar:linux-armhf:1.12.4-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense:jar:linux-arm64:1.12.4-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense:jar:linux-x86:1.12.4-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense:jar:linux-x86_64:1.12.4-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense:jar:macosx-x86_64:1.12.4-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense:jar:windows-x86:1.12.4-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense:jar:windows-x86_64:1.12.4-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense2-platform:jar:2.40.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense2:jar:linux-armhf:2.40.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense2:jar:linux-arm64:2.40.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense2:jar:linux-x86:2.40.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense2:jar:linux-x86_64:2.40.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense2:jar:macosx-x86_64:2.40.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense2:jar:windows-x86:2.40.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:librealsense2:jar:windows-x86_64:2.40.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:videoinput-platform:jar:0.200-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:videoinput:jar:windows-x86:0.200-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:videoinput:jar:windows-x86_64:0.200-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus-platform:jar:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:android-arm:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:android-arm64:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:android-x86:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:android-x86_64:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:linux-x86:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:linux-x86_64:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:linux-armhf:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:linux-arm64:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:linux-ppc64le:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:macosx-x86_64:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:windows-x86:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:artoolkitplus:jar:windows-x86_64:2.3.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark-platform:jar:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:android-arm:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:android-arm64:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:android-x86:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:android-x86_64:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:linux-x86:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:linux-x86_64:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:linux-armhf:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:linux-arm64:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:linux-ppc64le:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:macosx-x86_64:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:windows-x86:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:flandmark:jar:windows-x86_64:1.07-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica-platform:jar:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:android-arm:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:android-arm64:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:android-x86:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:android-x86_64:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:linux-x86:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:linux-x86_64:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:linux-armhf:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:linux-arm64:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:linux-ppc64le:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:macosx-x86_64:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:windows-x86:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:leptonica:jar:windows-x86_64:1.80.0-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract-platform:jar:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:android-arm:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:android-arm64:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:android-x86:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:android-x86_64:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:linux-x86:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:linux-x86_64:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:linux-armhf:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:linux-arm64:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:linux-ppc64le:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:macosx-x86_64:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:windows-x86:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.bytedeco:tesseract:jar:windows-x86_64:4.1.1-1.5.5 in the shaded jar.
[INFO] Including org.eclipse.jetty.websocket:websocket-api:jar:9.4.43.v20210629 in the shaded jar.
[INFO] Including org.kill-bill.commons:killbill-concurrent:jar:0.24.14 in the shaded jar.
[INFO] Including com.google.code.findbugs:jsr305:jar:3.0.2 in the shaded jar.
[INFO] Including com.google.guava:guava:jar:30.1-jre in the shaded jar.
[INFO] Including com.google.guava:failureaccess:jar:1.0.1 in the shaded jar.
[INFO] Including org.checkerframework:checker-qual:jar:3.5.0 in the shaded jar.
[INFO] Including com.google.errorprone:error_prone_annotations:jar:2.3.4 in the shaded jar.
[INFO] Including com.google.j2objc:j2objc-annotations:jar:1.3 in the shaded jar.
[INFO] Including com.google.inject:guice:jar:4.2.3 in the shaded jar.
[INFO] Including javax.inject:javax.inject:jar:1 in the shaded jar.
[INFO] Including aopalliance:aopalliance:jar:1.0 in the shaded jar.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] Discovered module-info.class. Shading will break its strong encapsulation.
[WARNING] artoolkitplus-2.3.1-1.5.5-android-arm.jar, ffmpeg-4.3.2-1.5.5-android-arm.jar, flandmark-1.07-1.5.5-android-arm.jar, javacpp-1.5.5-android-arm.jar, leptonica-1.80.0-1.5.5-android-arm.jar, openblas-0.3.13-1.5.5-android-arm.jar, opencv-4.5.1-1.5.5-android-arm.jar, tesseract-4.1.1-1.5.5-android-arm.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/android-arm/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/android-arm/jnijavacpp/reflect-config.json
[WARNING] openblas-0.3.13-1.5.5-android-arm.jar, openblas-0.3.13-1.5.5-android-arm64.jar, openblas-0.3.13-1.5.5-android-x86.jar, openblas-0.3.13-1.5.5-android-x86_64.jar, openblas-0.3.13-1.5.5-ios-arm64.jar, openblas-0.3.13-1.5.5-ios-x86_64.jar, openblas-0.3.13-1.5.5-linux-arm64.jar, openblas-0.3.13-1.5.5-linux-armhf.jar, openblas-0.3.13-1.5.5-linux-ppc64le.jar, openblas-0.3.13-1.5.5-linux-x86.jar, openblas-0.3.13-1.5.5-linux-x86_64.jar, openblas-0.3.13-1.5.5-macosx-x86_64.jar, openblas-0.3.13-1.5.5-windows-x86.jar, openblas-0.3.13-1.5.5-windows-x86_64.jar, openblas-0.3.13-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/openblas/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/openblas/pom.xml
[WARNING] spring-aop-5.2.13.RELEASE.jar, spring-beans-5.2.13.RELEASE.jar, spring-context-5.2.13.RELEASE.jar, spring-core-5.2.13.RELEASE.jar, spring-expression-5.2.13.RELEASE.jar, spring-jcl-5.2.13.RELEASE.jar define 2 overlapping resources:
[WARNING] - META-INF/license.txt
[WARNING] - META-INF/notice.txt
[WARNING] guice-4.2.3.jar, jackson-core-2.12.3.jar, jackson-databind-2.12.3.jar, microprofile-config-api-2.0.jar define 1 overlapping resources:
[WARNING] - META-INF/NOTICE
[WARNING] commons-lang3-3.12.0.jar, jetty-util-11.0.5.jar, org.apache.commons.codec-1.9.0.v20170208-1614.jar, websocket-api-9.4.43.v20210629.jar define 1 overlapping resources:
[WARNING] - META-INF/NOTICE.txt
[WARNING] artoolkitplus-2.3.1-1.5.5-android-x86.jar, ffmpeg-4.3.2-1.5.5-android-x86.jar, flandmark-1.07-1.5.5-android-x86.jar, javacpp-1.5.5-android-x86.jar, leptonica-1.80.0-1.5.5-android-x86.jar, openblas-0.3.13-1.5.5-android-x86.jar, opencv-4.5.1-1.5.5-android-x86.jar, tesseract-4.1.1-1.5.5-android-x86.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/android-x86/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/android-x86/jnijavacpp/reflect-config.json
[WARNING] artoolkitplus-2.3.1-1.5.5-macosx-x86_64.jar, ffmpeg-4.3.2-1.5.5-macosx-x86_64.jar, flandmark-1.07-1.5.5-macosx-x86_64.jar, javacpp-1.5.5-macosx-x86_64.jar, leptonica-1.80.0-1.5.5-macosx-x86_64.jar, libdc1394-2.2.6-1.5.5-macosx-x86_64.jar, libfreenect-0.5.7-1.5.5-macosx-x86_64.jar, libfreenect2-0.2.0-1.5.5-macosx-x86_64.jar, librealsense-1.12.4-1.5.5-macosx-x86_64.jar, librealsense2-2.40.0-1.5.5-macosx-x86_64.jar, openblas-0.3.13-1.5.5-macosx-x86_64.jar, opencv-4.5.1-1.5.5-macosx-x86_64.jar, tesseract-4.1.1-1.5.5-macosx-x86_64.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/macosx-x86_64/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/macosx-x86_64/jnijavacpp/reflect-config.json
[WARNING] checker-qual-3.5.0.jar, commons-lang3-3.12.0.jar, jakarta.ejb-api-3.2.6.jar, jboss-logging-3.4.2.Final.jar, jboss-logging-annotations-2.2.1.Final.jar, jboss-threads-3.4.0.Final.jar, org.apache.commons.codec-1.9.0.v20170208-1614.jar, tyrus-standalone-client-2.0.0.jar define 1 overlapping resources:
[WARNING] - META-INF/LICENSE.txt
[WARNING] jakarta.annotation-api-1.3.5.jar, jakarta.el-api-3.0.3.jar, jakarta.interceptor-api-1.2.5.jar, jakarta.transaction-api-1.3.2.jar, jboss-jaxrs-api_2.1_spec-2.0.1.Final.jar, tyrus-standalone-client-2.0.0.jar define 2 overlapping resources:
[WARNING] - META-INF/LICENSE.md
[WARNING] - META-INF/NOTICE.md
[WARNING] libdc1394-2.2.6-1.5.5-linux-arm64.jar, libdc1394-2.2.6-1.5.5-linux-armhf.jar, libdc1394-2.2.6-1.5.5-linux-ppc64le.jar, libdc1394-2.2.6-1.5.5-linux-x86.jar, libdc1394-2.2.6-1.5.5-linux-x86_64.jar, libdc1394-2.2.6-1.5.5-macosx-x86_64.jar, libdc1394-2.2.6-1.5.5-windows-x86.jar, libdc1394-2.2.6-1.5.5-windows-x86_64.jar, libdc1394-2.2.6-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/libdc1394/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/libdc1394/pom.xml
[WARNING] flandmark-1.07-1.5.5-android-arm.jar, flandmark-1.07-1.5.5-android-arm64.jar, flandmark-1.07-1.5.5-android-x86.jar, flandmark-1.07-1.5.5-android-x86_64.jar, flandmark-1.07-1.5.5-linux-arm64.jar, flandmark-1.07-1.5.5-linux-armhf.jar, flandmark-1.07-1.5.5-linux-ppc64le.jar, flandmark-1.07-1.5.5-linux-x86.jar, flandmark-1.07-1.5.5-linux-x86_64.jar, flandmark-1.07-1.5.5-macosx-x86_64.jar, flandmark-1.07-1.5.5-windows-x86.jar, flandmark-1.07-1.5.5-windows-x86_64.jar, flandmark-1.07-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/flandmark/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/flandmark/pom.xml
[WARNING] librealsense-1.12.4-1.5.5-linux-arm64.jar, librealsense-1.12.4-1.5.5-linux-armhf.jar, librealsense-1.12.4-1.5.5-linux-x86.jar, librealsense-1.12.4-1.5.5-linux-x86_64.jar, librealsense-1.12.4-1.5.5-macosx-x86_64.jar, librealsense-1.12.4-1.5.5-windows-x86.jar, librealsense-1.12.4-1.5.5-windows-x86_64.jar, librealsense-1.12.4-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/librealsense/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/librealsense/pom.xml
[WARNING] opencv-4.5.1-1.5.5-android-arm.jar, opencv-4.5.1-1.5.5-android-arm64.jar, opencv-4.5.1-1.5.5-android-x86.jar, opencv-4.5.1-1.5.5-android-x86_64.jar, opencv-4.5.1-1.5.5-ios-arm64.jar, opencv-4.5.1-1.5.5-ios-x86_64.jar, opencv-4.5.1-1.5.5-linux-arm64.jar, opencv-4.5.1-1.5.5-linux-armhf.jar, opencv-4.5.1-1.5.5-linux-ppc64le.jar, opencv-4.5.1-1.5.5-linux-x86.jar, opencv-4.5.1-1.5.5-linux-x86_64.jar, opencv-4.5.1-1.5.5-macosx-x86_64.jar, opencv-4.5.1-1.5.5-windows-x86.jar, opencv-4.5.1-1.5.5-windows-x86_64.jar, opencv-4.5.1-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/opencv/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/opencv/pom.xml
[WARNING] artoolkitplus-2.3.1-1.5.5-android-arm.jar, artoolkitplus-2.3.1-1.5.5-android-arm64.jar, artoolkitplus-2.3.1-1.5.5-android-x86.jar, artoolkitplus-2.3.1-1.5.5-android-x86_64.jar, artoolkitplus-2.3.1-1.5.5-linux-arm64.jar, artoolkitplus-2.3.1-1.5.5-linux-armhf.jar, artoolkitplus-2.3.1-1.5.5-linux-ppc64le.jar, artoolkitplus-2.3.1-1.5.5-linux-x86.jar, artoolkitplus-2.3.1-1.5.5-linux-x86_64.jar, artoolkitplus-2.3.1-1.5.5-macosx-x86_64.jar, artoolkitplus-2.3.1-1.5.5-windows-x86.jar, artoolkitplus-2.3.1-1.5.5-windows-x86_64.jar, artoolkitplus-2.3.1-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/artoolkitplus/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/artoolkitplus/pom.xml
[WARNING] librealsense2-2.40.0-1.5.5-linux-arm64.jar, librealsense2-2.40.0-1.5.5-linux-armhf.jar, librealsense2-2.40.0-1.5.5-linux-x86.jar, librealsense2-2.40.0-1.5.5-linux-x86_64.jar, librealsense2-2.40.0-1.5.5-macosx-x86_64.jar, librealsense2-2.40.0-1.5.5-windows-x86.jar, librealsense2-2.40.0-1.5.5-windows-x86_64.jar, librealsense2-2.40.0-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/librealsense2/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/librealsense2/pom.xml
[WARNING] artoolkitplus-2.3.1-1.5.5-linux-ppc64le.jar, ffmpeg-4.3.2-1.5.5-linux-ppc64le.jar, flandmark-1.07-1.5.5-linux-ppc64le.jar, javacpp-1.5.5-linux-ppc64le.jar, leptonica-1.80.0-1.5.5-linux-ppc64le.jar, libdc1394-2.2.6-1.5.5-linux-ppc64le.jar, libfreenect-0.5.7-1.5.5-linux-ppc64le.jar, openblas-0.3.13-1.5.5-linux-ppc64le.jar, opencv-4.5.1-1.5.5-linux-ppc64le.jar, tesseract-4.1.1-1.5.5-linux-ppc64le.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/linux-ppc64le/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/linux-ppc64le/jnijavacpp/reflect-config.json
[WARNING] javacpp-1.5.5-ios-arm64.jar, openblas-0.3.13-1.5.5-ios-arm64.jar, opencv-4.5.1-1.5.5-ios-arm64.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/ios-arm64/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/ios-arm64/jnijavacpp/reflect-config.json
[WARNING] quarkus-core-2.0.0.CR3.jar, quarkus-jaxp-2.0.0.CR3.jar define 2 overlapping resources:
[WARNING] - META-INF/quarkus-extension.properties
[WARNING] - META-INF/quarkus-extension.yaml
[WARNING] artoolkitplus-2.3.1-1.5.5-linux-x86.jar, ffmpeg-4.3.2-1.5.5-linux-x86.jar, flandmark-1.07-1.5.5-linux-x86.jar, flycapture-2.13.3.31-1.5.5-linux-x86.jar, javacpp-1.5.5-linux-x86.jar, leptonica-1.80.0-1.5.5-linux-x86.jar, libdc1394-2.2.6-1.5.5-linux-x86.jar, libfreenect-0.5.7-1.5.5-linux-x86.jar, libfreenect2-0.2.0-1.5.5-linux-x86.jar, librealsense-1.12.4-1.5.5-linux-x86.jar, librealsense2-2.40.0-1.5.5-linux-x86.jar, openblas-0.3.13-1.5.5-linux-x86.jar, opencv-4.5.1-1.5.5-linux-x86.jar, tesseract-4.1.1-1.5.5-linux-x86.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/linux-x86/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/linux-x86/jnijavacpp/reflect-config.json
[WARNING] guice-4.2.3.jar, jackson-annotations-2.12.3.jar, jackson-core-2.12.3.jar, jackson-databind-2.12.3.jar, jetty-util-11.0.5.jar, microprofile-config-api-2.0.jar, websocket-api-9.4.43.v20210629.jar define 1 overlapping resources:
[WARNING] - META-INF/LICENSE
[WARNING] org.apache.commons.codec-1.9.0.v20170208-1614.jar, org.apache.commons.logging-1.1.1.v201101211721.jar, websocket-api-9.4.43.v20210629.jar define 1 overlapping resources:
[WARNING] - about.html
[WARNING] artoolkitplus-2.3.1-1.5.5-android-arm64.jar, ffmpeg-4.3.2-1.5.5-android-arm64.jar, flandmark-1.07-1.5.5-android-arm64.jar, javacpp-1.5.5-android-arm64.jar, leptonica-1.80.0-1.5.5-android-arm64.jar, openblas-0.3.13-1.5.5-android-arm64.jar, opencv-4.5.1-1.5.5-android-arm64.jar, tesseract-4.1.1-1.5.5-android-arm64.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/android-arm64/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/android-arm64/jnijavacpp/reflect-config.json
[WARNING] videoinput-0.200-1.5.5-windows-x86.jar, videoinput-0.200-1.5.5-windows-x86_64.jar, videoinput-0.200-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/videoinput/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/videoinput/pom.xml
[WARNING] jakarta.inject-api-1.0.jar, javax.inject-1.jar define 6 overlapping classes:
[WARNING] - javax.inject.Inject
[WARNING] - javax.inject.Named
[WARNING] - javax.inject.Provider
[WARNING] - javax.inject.Qualifier
[WARNING] - javax.inject.Scope
[WARNING] - javax.inject.Singleton
[WARNING] artoolkitplus-2.3.1-1.5.5-linux-armhf.jar, ffmpeg-4.3.2-1.5.5-linux-armhf.jar, flandmark-1.07-1.5.5-linux-armhf.jar, flycapture-2.13.3.31-1.5.5-linux-armhf.jar, javacpp-1.5.5-linux-armhf.jar, leptonica-1.80.0-1.5.5-linux-armhf.jar, libdc1394-2.2.6-1.5.5-linux-armhf.jar, libfreenect-0.5.7-1.5.5-linux-armhf.jar, librealsense-1.12.4-1.5.5-linux-armhf.jar, librealsense2-2.40.0-1.5.5-linux-armhf.jar, openblas-0.3.13-1.5.5-linux-armhf.jar, opencv-4.5.1-1.5.5-linux-armhf.jar, tesseract-4.1.1-1.5.5-linux-armhf.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/linux-armhf/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/linux-armhf/jnijavacpp/reflect-config.json
[WARNING] tesseract-4.1.1-1.5.5-android-arm.jar, tesseract-4.1.1-1.5.5-android-arm64.jar, tesseract-4.1.1-1.5.5-android-x86.jar, tesseract-4.1.1-1.5.5-android-x86_64.jar, tesseract-4.1.1-1.5.5-linux-arm64.jar, tesseract-4.1.1-1.5.5-linux-armhf.jar, tesseract-4.1.1-1.5.5-linux-ppc64le.jar, tesseract-4.1.1-1.5.5-linux-x86.jar, tesseract-4.1.1-1.5.5-linux-x86_64.jar, tesseract-4.1.1-1.5.5-macosx-x86_64.jar, tesseract-4.1.1-1.5.5-windows-x86.jar, tesseract-4.1.1-1.5.5-windows-x86_64.jar, tesseract-4.1.1-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/tesseract/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/tesseract/pom.xml
[WARNING] artoolkitplus-2.3.1-1.5.5-windows-x86_64.jar, ffmpeg-4.3.2-1.5.5-windows-x86_64.jar, flandmark-1.07-1.5.5-windows-x86_64.jar, flycapture-2.13.3.31-1.5.5-windows-x86_64.jar, javacpp-1.5.5-windows-x86_64.jar, leptonica-1.80.0-1.5.5-windows-x86_64.jar, libdc1394-2.2.6-1.5.5-windows-x86_64.jar, libfreenect-0.5.7-1.5.5-windows-x86_64.jar, libfreenect2-0.2.0-1.5.5-windows-x86_64.jar, librealsense-1.12.4-1.5.5-windows-x86_64.jar, librealsense2-2.40.0-1.5.5-windows-x86_64.jar, openblas-0.3.13-1.5.5-windows-x86_64.jar, opencv-4.5.1-1.5.5-windows-x86_64.jar, tesseract-4.1.1-1.5.5-windows-x86_64.jar, videoinput-0.200-1.5.5-windows-x86_64.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/windows-x86_64/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/windows-x86_64/jnijavacpp/reflect-config.json
[WARNING] artoolkitplus-2.3.1-1.5.5-linux-x86_64.jar, ffmpeg-4.3.2-1.5.5-linux-x86_64.jar, flandmark-1.07-1.5.5-linux-x86_64.jar, flycapture-2.13.3.31-1.5.5-linux-x86_64.jar, javacpp-1.5.5-linux-x86_64.jar, leptonica-1.80.0-1.5.5-linux-x86_64.jar, libdc1394-2.2.6-1.5.5-linux-x86_64.jar, libfreenect-0.5.7-1.5.5-linux-x86_64.jar, libfreenect2-0.2.0-1.5.5-linux-x86_64.jar, librealsense-1.12.4-1.5.5-linux-x86_64.jar, librealsense2-2.40.0-1.5.5-linux-x86_64.jar, openblas-0.3.13-1.5.5-linux-x86_64.jar, opencv-4.5.1-1.5.5-linux-x86_64.jar, tesseract-4.1.1-1.5.5-linux-x86_64.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/linux-x86_64/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/linux-x86_64/jnijavacpp/reflect-config.json
[WARNING] flycapture-2.13.3.31-1.5.5-linux-arm64.jar, flycapture-2.13.3.31-1.5.5-linux-armhf.jar, flycapture-2.13.3.31-1.5.5-linux-x86.jar, flycapture-2.13.3.31-1.5.5-linux-x86_64.jar, flycapture-2.13.3.31-1.5.5-windows-x86.jar, flycapture-2.13.3.31-1.5.5-windows-x86_64.jar, flycapture-2.13.3.31-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/flycapture/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/flycapture/pom.xml
[WARNING] spring-aop-5.2.13.RELEASE.jar, spring-beans-5.2.13.RELEASE.jar, spring-context-5.2.13.RELEASE.jar define 3 overlapping resources:
[WARNING] - META-INF/spring.handlers
[WARNING] - META-INF/spring.schemas
[WARNING] - META-INF/spring.tooling
[WARNING] artoolkitplus-2.3.1-1.5.5-android-arm.jar, artoolkitplus-2.3.1-1.5.5-android-arm64.jar, artoolkitplus-2.3.1-1.5.5-android-x86.jar, artoolkitplus-2.3.1-1.5.5-android-x86_64.jar, artoolkitplus-2.3.1-1.5.5-linux-arm64.jar, artoolkitplus-2.3.1-1.5.5-linux-armhf.jar, artoolkitplus-2.3.1-1.5.5-linux-ppc64le.jar, artoolkitplus-2.3.1-1.5.5-linux-x86.jar, artoolkitplus-2.3.1-1.5.5-linux-x86_64.jar, artoolkitplus-2.3.1-1.5.5-macosx-x86_64.jar, artoolkitplus-2.3.1-1.5.5-windows-x86.jar, artoolkitplus-2.3.1-1.5.5-windows-x86_64.jar, artoolkitplus-2.3.1-1.5.5.jar, artoolkitplus-platform-2.3.1-1.5.5.jar, ffmpeg-4.3.2-1.5.5-android-arm.jar, ffmpeg-4.3.2-1.5.5-android-arm64.jar, ffmpeg-4.3.2-1.5.5-android-x86.jar, ffmpeg-4.3.2-1.5.5-android-x86_64.jar, ffmpeg-4.3.2-1.5.5-linux-arm64.jar, ffmpeg-4.3.2-1.5.5-linux-armhf.jar, ffmpeg-4.3.2-1.5.5-linux-ppc64le.jar, ffmpeg-4.3.2-1.5.5-linux-x86.jar, ffmpeg-4.3.2-1.5.5-linux-x86_64.jar, ffmpeg-4.3.2-1.5.5-macosx-x86_64.jar, ffmpeg-4.3.2-1.5.5-windows-x86.jar, ffmpeg-4.3.2-1.5.5-windows-x86_64.jar, ffmpeg-4.3.2-1.5.5.jar, ffmpeg-platform-4.3.2-1.5.5.jar, flandmark-1.07-1.5.5-android-arm.jar, flandmark-1.07-1.5.5-android-arm64.jar, flandmark-1.07-1.5.5-android-x86.jar, flandmark-1.07-1.5.5-android-x86_64.jar, flandmark-1.07-1.5.5-linux-arm64.jar, flandmark-1.07-1.5.5-linux-armhf.jar, flandmark-1.07-1.5.5-linux-ppc64le.jar, flandmark-1.07-1.5.5-linux-x86.jar, flandmark-1.07-1.5.5-linux-x86_64.jar, flandmark-1.07-1.5.5-macosx-x86_64.jar, flandmark-1.07-1.5.5-windows-x86.jar, flandmark-1.07-1.5.5-windows-x86_64.jar, flandmark-1.07-1.5.5.jar, flandmark-platform-1.07-1.5.5.jar, flycapture-2.13.3.31-1.5.5-linux-arm64.jar, flycapture-2.13.3.31-1.5.5-linux-armhf.jar, flycapture-2.13.3.31-1.5.5-linux-x86.jar, flycapture-2.13.3.31-1.5.5-linux-x86_64.jar, flycapture-2.13.3.31-1.5.5-windows-x86.jar, flycapture-2.13.3.31-1.5.5-windows-x86_64.jar, flycapture-2.13.3.31-1.5.5.jar, flycapture-platform-2.13.3.31-1.5.5.jar, javacpp-1.5.5-android-arm.jar, javacpp-1.5.5-android-arm64.jar, javacpp-1.5.5-android-x86.jar, javacpp-1.5.5-android-x86_64.jar, javacpp-1.5.5-ios-arm64.jar, javacpp-1.5.5-ios-x86_64.jar, javacpp-1.5.5-linux-arm64.jar, javacpp-1.5.5-linux-armhf.jar, javacpp-1.5.5-linux-ppc64le.jar, javacpp-1.5.5-linux-x86.jar, javacpp-1.5.5-linux-x86_64.jar, javacpp-1.5.5-macosx-arm64.jar, javacpp-1.5.5-macosx-x86_64.jar, javacpp-1.5.5-windows-x86.jar, javacpp-1.5.5-windows-x86_64.jar, javacpp-1.5.5.jar, javacpp-platform-1.5.5.jar, javacv-1.5.5.jar, javacv-platform-1.5.5.jar, leptonica-1.80.0-1.5.5-android-arm.jar, leptonica-1.80.0-1.5.5-android-arm64.jar, leptonica-1.80.0-1.5.5-android-x86.jar, leptonica-1.80.0-1.5.5-android-x86_64.jar, leptonica-1.80.0-1.5.5-linux-arm64.jar, leptonica-1.80.0-1.5.5-linux-armhf.jar, leptonica-1.80.0-1.5.5-linux-ppc64le.jar, leptonica-1.80.0-1.5.5-linux-x86.jar, leptonica-1.80.0-1.5.5-linux-x86_64.jar, leptonica-1.80.0-1.5.5-macosx-x86_64.jar, leptonica-1.80.0-1.5.5-windows-x86.jar, leptonica-1.80.0-1.5.5-windows-x86_64.jar, leptonica-1.80.0-1.5.5.jar, leptonica-platform-1.80.0-1.5.5.jar, libdc1394-2.2.6-1.5.5-linux-arm64.jar, libdc1394-2.2.6-1.5.5-linux-armhf.jar, libdc1394-2.2.6-1.5.5-linux-ppc64le.jar, libdc1394-2.2.6-1.5.5-linux-x86.jar, libdc1394-2.2.6-1.5.5-linux-x86_64.jar, libdc1394-2.2.6-1.5.5-macosx-x86_64.jar, libdc1394-2.2.6-1.5.5-windows-x86.jar, libdc1394-2.2.6-1.5.5-windows-x86_64.jar, libdc1394-2.2.6-1.5.5.jar, libdc1394-platform-2.2.6-1.5.5.jar, libfreenect-0.5.7-1.5.5-linux-arm64.jar, libfreenect-0.5.7-1.5.5-linux-armhf.jar, libfreenect-0.5.7-1.5.5-linux-ppc64le.jar, libfreenect-0.5.7-1.5.5-linux-x86.jar, libfreenect-0.5.7-1.5.5-linux-x86_64.jar, libfreenect-0.5.7-1.5.5-macosx-x86_64.jar, libfreenect-0.5.7-1.5.5-windows-x86.jar, libfreenect-0.5.7-1.5.5-windows-x86_64.jar, libfreenect-0.5.7-1.5.5.jar, libfreenect-platform-0.5.7-1.5.5.jar, libfreenect2-0.2.0-1.5.5-linux-x86.jar, libfreenect2-0.2.0-1.5.5-linux-x86_64.jar, libfreenect2-0.2.0-1.5.5-macosx-x86_64.jar, libfreenect2-0.2.0-1.5.5-windows-x86_64.jar, libfreenect2-0.2.0-1.5.5.jar, libfreenect2-platform-0.2.0-1.5.5.jar, librealsense-1.12.4-1.5.5-linux-arm64.jar, librealsense-1.12.4-1.5.5-linux-armhf.jar, librealsense-1.12.4-1.5.5-linux-x86.jar, librealsense-1.12.4-1.5.5-linux-x86_64.jar, librealsense-1.12.4-1.5.5-macosx-x86_64.jar, librealsense-1.12.4-1.5.5-windows-x86.jar, librealsense-1.12.4-1.5.5-windows-x86_64.jar, librealsense-1.12.4-1.5.5.jar, librealsense-platform-1.12.4-1.5.5.jar, librealsense2-2.40.0-1.5.5-linux-arm64.jar, librealsense2-2.40.0-1.5.5-linux-armhf.jar, librealsense2-2.40.0-1.5.5-linux-x86.jar, librealsense2-2.40.0-1.5.5-linux-x86_64.jar, librealsense2-2.40.0-1.5.5-macosx-x86_64.jar, librealsense2-2.40.0-1.5.5-windows-x86.jar, librealsense2-2.40.0-1.5.5-windows-x86_64.jar, librealsense2-2.40.0-1.5.5.jar, librealsense2-platform-2.40.0-1.5.5.jar, openblas-0.3.13-1.5.5-android-arm.jar, openblas-0.3.13-1.5.5-android-arm64.jar, openblas-0.3.13-1.5.5-android-x86.jar, openblas-0.3.13-1.5.5-android-x86_64.jar, openblas-0.3.13-1.5.5-ios-arm64.jar, openblas-0.3.13-1.5.5-ios-x86_64.jar, openblas-0.3.13-1.5.5-linux-arm64.jar, openblas-0.3.13-1.5.5-linux-armhf.jar, openblas-0.3.13-1.5.5-linux-ppc64le.jar, openblas-0.3.13-1.5.5-linux-x86.jar, openblas-0.3.13-1.5.5-linux-x86_64.jar, openblas-0.3.13-1.5.5-macosx-x86_64.jar, openblas-0.3.13-1.5.5-windows-x86.jar, openblas-0.3.13-1.5.5-windows-x86_64.jar, openblas-0.3.13-1.5.5.jar, openblas-platform-0.3.13-1.5.5.jar, opencv-4.5.1-1.5.5-android-arm.jar, opencv-4.5.1-1.5.5-android-arm64.jar, opencv-4.5.1-1.5.5-android-x86.jar, opencv-4.5.1-1.5.5-android-x86_64.jar, opencv-4.5.1-1.5.5-ios-arm64.jar, opencv-4.5.1-1.5.5-ios-x86_64.jar, opencv-4.5.1-1.5.5-linux-arm64.jar, opencv-4.5.1-1.5.5-linux-armhf.jar, opencv-4.5.1-1.5.5-linux-ppc64le.jar, opencv-4.5.1-1.5.5-linux-x86.jar, opencv-4.5.1-1.5.5-linux-x86_64.jar, opencv-4.5.1-1.5.5-macosx-x86_64.jar, opencv-4.5.1-1.5.5-windows-x86.jar, opencv-4.5.1-1.5.5-windows-x86_64.jar, opencv-4.5.1-1.5.5.jar, opencv-platform-4.5.1-1.5.5.jar, tesseract-4.1.1-1.5.5-android-arm.jar, tesseract-4.1.1-1.5.5-android-arm64.jar, tesseract-4.1.1-1.5.5-android-x86.jar, tesseract-4.1.1-1.5.5-android-x86_64.jar, tesseract-4.1.1-1.5.5-linux-arm64.jar, tesseract-4.1.1-1.5.5-linux-armhf.jar, tesseract-4.1.1-1.5.5-linux-ppc64le.jar, tesseract-4.1.1-1.5.5-linux-x86.jar, tesseract-4.1.1-1.5.5-linux-x86_64.jar, tesseract-4.1.1-1.5.5-macosx-x86_64.jar, tesseract-4.1.1-1.5.5-windows-x86.jar, tesseract-4.1.1-1.5.5-windows-x86_64.jar, tesseract-4.1.1-1.5.5.jar, tesseract-platform-4.1.1-1.5.5.jar, videoinput-0.200-1.5.5-windows-x86.jar, videoinput-0.200-1.5.5-windows-x86_64.jar, videoinput-0.200-1.5.5.jar, videoinput-platform-0.200-1.5.5.jar define 1 overlapping classes:
[WARNING] - META-INF.versions.9.module-info
[WARNING] leptonica-1.80.0-1.5.5-android-arm.jar, leptonica-1.80.0-1.5.5-android-arm64.jar, leptonica-1.80.0-1.5.5-android-x86.jar, leptonica-1.80.0-1.5.5-android-x86_64.jar, leptonica-1.80.0-1.5.5-linux-arm64.jar, leptonica-1.80.0-1.5.5-linux-armhf.jar, leptonica-1.80.0-1.5.5-linux-ppc64le.jar, leptonica-1.80.0-1.5.5-linux-x86.jar, leptonica-1.80.0-1.5.5-linux-x86_64.jar, leptonica-1.80.0-1.5.5-macosx-x86_64.jar, leptonica-1.80.0-1.5.5-windows-x86.jar, leptonica-1.80.0-1.5.5-windows-x86_64.jar, leptonica-1.80.0-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/leptonica/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/leptonica/pom.xml
[WARNING] artoolkitplus-2.3.1-1.5.5-linux-arm64.jar, ffmpeg-4.3.2-1.5.5-linux-arm64.jar, flandmark-1.07-1.5.5-linux-arm64.jar, flycapture-2.13.3.31-1.5.5-linux-arm64.jar, javacpp-1.5.5-linux-arm64.jar, leptonica-1.80.0-1.5.5-linux-arm64.jar, libdc1394-2.2.6-1.5.5-linux-arm64.jar, libfreenect-0.5.7-1.5.5-linux-arm64.jar, librealsense-1.12.4-1.5.5-linux-arm64.jar, librealsense2-2.40.0-1.5.5-linux-arm64.jar, openblas-0.3.13-1.5.5-linux-arm64.jar, opencv-4.5.1-1.5.5-linux-arm64.jar, tesseract-4.1.1-1.5.5-linux-arm64.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/linux-arm64/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/linux-arm64/jnijavacpp/reflect-config.json
[WARNING] aopalliance-1.0.jar, artoolkitplus-2.3.1-1.5.5-android-arm.jar, artoolkitplus-2.3.1-1.5.5-android-arm64.jar, artoolkitplus-2.3.1-1.5.5-android-x86.jar, artoolkitplus-2.3.1-1.5.5-android-x86_64.jar, artoolkitplus-2.3.1-1.5.5-linux-arm64.jar, artoolkitplus-2.3.1-1.5.5-linux-armhf.jar, artoolkitplus-2.3.1-1.5.5-linux-ppc64le.jar, artoolkitplus-2.3.1-1.5.5-linux-x86.jar, artoolkitplus-2.3.1-1.5.5-linux-x86_64.jar, artoolkitplus-2.3.1-1.5.5-macosx-x86_64.jar, artoolkitplus-2.3.1-1.5.5-windows-x86.jar, artoolkitplus-2.3.1-1.5.5-windows-x86_64.jar, artoolkitplus-2.3.1-1.5.5.jar, artoolkitplus-platform-2.3.1-1.5.5.jar, asm-9.1.jar, checker-qual-3.5.0.jar, commons-lang3-3.12.0.jar, engine.io-client-2.0.0.jar, error_prone_annotations-2.3.4.jar, failureaccess-1.0.1.jar, ffmpeg-4.3.2-1.5.5-android-arm.jar, ffmpeg-4.3.2-1.5.5-android-arm64.jar, ffmpeg-4.3.2-1.5.5-android-x86.jar, ffmpeg-4.3.2-1.5.5-android-x86_64.jar, ffmpeg-4.3.2-1.5.5-linux-arm64.jar, ffmpeg-4.3.2-1.5.5-linux-armhf.jar, ffmpeg-4.3.2-1.5.5-linux-ppc64le.jar, ffmpeg-4.3.2-1.5.5-linux-x86.jar, ffmpeg-4.3.2-1.5.5-linux-x86_64.jar, ffmpeg-4.3.2-1.5.5-macosx-x86_64.jar, ffmpeg-4.3.2-1.5.5-windows-x86.jar, ffmpeg-4.3.2-1.5.5-windows-x86_64.jar, ffmpeg-4.3.2-1.5.5.jar, ffmpeg-platform-4.3.2-1.5.5.jar, flandmark-1.07-1.5.5-android-arm.jar, flandmark-1.07-1.5.5-android-arm64.jar, flandmark-1.07-1.5.5-android-x86.jar, flandmark-1.07-1.5.5-android-x86_64.jar, flandmark-1.07-1.5.5-linux-arm64.jar, flandmark-1.07-1.5.5-linux-armhf.jar, flandmark-1.07-1.5.5-linux-ppc64le.jar, flandmark-1.07-1.5.5-linux-x86.jar, flandmark-1.07-1.5.5-linux-x86_64.jar, flandmark-1.07-1.5.5-macosx-x86_64.jar, flandmark-1.07-1.5.5-windows-x86.jar, flandmark-1.07-1.5.5-windows-x86_64.jar, flandmark-1.07-1.5.5.jar, flandmark-platform-1.07-1.5.5.jar, flycapture-2.13.3.31-1.5.5-linux-arm64.jar, flycapture-2.13.3.31-1.5.5-linux-armhf.jar, flycapture-2.13.3.31-1.5.5-linux-x86.jar, flycapture-2.13.3.31-1.5.5-linux-x86_64.jar, flycapture-2.13.3.31-1.5.5-windows-x86.jar, flycapture-2.13.3.31-1.5.5-windows-x86_64.jar, flycapture-2.13.3.31-1.5.5.jar, flycapture-platform-2.13.3.31-1.5.5.jar, gson-2.8.7.jar, guava-30.1-jre.jar, guice-4.2.3.jar, j2objc-annotations-1.3.jar, jackson-annotations-2.12.3.jar, jackson-core-2.12.3.jar, jackson-databind-2.12.3.jar, jakarta.annotation-api-1.3.5.jar, jakarta.ejb-api-3.2.6.jar, jakarta.el-api-3.0.3.jar, jakarta.enterprise.cdi-api-2.0.2.jar, jakarta.inject-api-1.0.jar, jakarta.interceptor-api-1.2.5.jar, jakarta.transaction-api-1.3.2.jar, javacpp-1.5.5-android-arm.jar, javacpp-1.5.5-android-arm64.jar, javacpp-1.5.5-android-x86.jar, javacpp-1.5.5-android-x86_64.jar, javacpp-1.5.5-ios-arm64.jar, javacpp-1.5.5-ios-x86_64.jar, javacpp-1.5.5-linux-arm64.jar, javacpp-1.5.5-linux-armhf.jar, javacpp-1.5.5-linux-ppc64le.jar, javacpp-1.5.5-linux-x86.jar, javacpp-1.5.5-linux-x86_64.jar, javacpp-1.5.5-macosx-arm64.jar, javacpp-1.5.5-macosx-x86_64.jar, javacpp-1.5.5-windows-x86.jar, javacpp-1.5.5-windows-x86_64.jar, javacpp-1.5.5.jar, javacpp-platform-1.5.5.jar, javacv-1.5.5.jar, javacv-platform-1.5.5.jar, jboss-jaxrs-api_2.1_spec-2.0.1.Final.jar, jboss-logging-3.4.2.Final.jar, jboss-logging-annotations-2.2.1.Final.jar, jboss-logmanager-embedded-1.0.9.jar, jboss-threads-3.4.0.Final.jar, jetty-util-11.0.5.jar, json-20090211.jar, jsr305-3.0.2.jar, jul-to-slf4j-1.7.31.jar, juniversalchardet-2.4.0.jar, killbill-concurrent-0.24.14.jar, leptonica-1.80.0-1.5.5-android-arm.jar, leptonica-1.80.0-1.5.5-android-arm64.jar, leptonica-1.80.0-1.5.5-android-x86.jar, leptonica-1.80.0-1.5.5-android-x86_64.jar, leptonica-1.80.0-1.5.5-linux-arm64.jar, leptonica-1.80.0-1.5.5-linux-armhf.jar, leptonica-1.80.0-1.5.5-linux-ppc64le.jar, leptonica-1.80.0-1.5.5-linux-x86.jar, leptonica-1.80.0-1.5.5-linux-x86_64.jar, leptonica-1.80.0-1.5.5-macosx-x86_64.jar, leptonica-1.80.0-1.5.5-windows-x86.jar, leptonica-1.80.0-1.5.5-windows-x86_64.jar, leptonica-1.80.0-1.5.5.jar, leptonica-platform-1.80.0-1.5.5.jar, libdc1394-2.2.6-1.5.5-linux-arm64.jar, libdc1394-2.2.6-1.5.5-linux-armhf.jar, libdc1394-2.2.6-1.5.5-linux-ppc64le.jar, libdc1394-2.2.6-1.5.5-linux-x86.jar, libdc1394-2.2.6-1.5.5-linux-x86_64.jar, libdc1394-2.2.6-1.5.5-macosx-x86_64.jar, libdc1394-2.2.6-1.5.5-windows-x86.jar, libdc1394-2.2.6-1.5.5-windows-x86_64.jar, libdc1394-2.2.6-1.5.5.jar, libdc1394-platform-2.2.6-1.5.5.jar, libfreenect-0.5.7-1.5.5-linux-arm64.jar, libfreenect-0.5.7-1.5.5-linux-armhf.jar, libfreenect-0.5.7-1.5.5-linux-ppc64le.jar, libfreenect-0.5.7-1.5.5-linux-x86.jar, libfreenect-0.5.7-1.5.5-linux-x86_64.jar, libfreenect-0.5.7-1.5.5-macosx-x86_64.jar, libfreenect-0.5.7-1.5.5-windows-x86.jar, libfreenect-0.5.7-1.5.5-windows-x86_64.jar, libfreenect-0.5.7-1.5.5.jar, libfreenect-platform-0.5.7-1.5.5.jar, libfreenect2-0.2.0-1.5.5-linux-x86.jar, libfreenect2-0.2.0-1.5.5-linux-x86_64.jar, libfreenect2-0.2.0-1.5.5-macosx-x86_64.jar, libfreenect2-0.2.0-1.5.5-windows-x86_64.jar, libfreenect2-0.2.0-1.5.5.jar, libfreenect2-platform-0.2.0-1.5.5.jar, librealsense-1.12.4-1.5.5-linux-arm64.jar, librealsense-1.12.4-1.5.5-linux-armhf.jar, librealsense-1.12.4-1.5.5-linux-x86.jar, librealsense-1.12.4-1.5.5-linux-x86_64.jar, librealsense-1.12.4-1.5.5-macosx-x86_64.jar, librealsense-1.12.4-1.5.5-windows-x86.jar, librealsense-1.12.4-1.5.5-windows-x86_64.jar, librealsense-1.12.4-1.5.5.jar, librealsense-platform-1.12.4-1.5.5.jar, librealsense2-2.40.0-1.5.5-linux-arm64.jar, librealsense2-2.40.0-1.5.5-linux-armhf.jar, librealsense2-2.40.0-1.5.5-linux-x86.jar, librealsense2-2.40.0-1.5.5-linux-x86_64.jar, librealsense2-2.40.0-1.5.5-macosx-x86_64.jar, librealsense2-2.40.0-1.5.5-windows-x86.jar, librealsense2-2.40.0-1.5.5-windows-x86_64.jar, librealsense2-2.40.0-1.5.5.jar, librealsense2-platform-2.40.0-1.5.5.jar, mariadb-java-client-2.7.3.jar, microprofile-config-api-2.0.jar, okhttp-3.12.12.jar, okio-1.15.0.jar, openblas-0.3.13-1.5.5-android-arm.jar, openblas-0.3.13-1.5.5-android-arm64.jar, openblas-0.3.13-1.5.5-android-x86.jar, openblas-0.3.13-1.5.5-android-x86_64.jar, openblas-0.3.13-1.5.5-ios-arm64.jar, openblas-0.3.13-1.5.5-ios-x86_64.jar, openblas-0.3.13-1.5.5-linux-arm64.jar, openblas-0.3.13-1.5.5-linux-armhf.jar, openblas-0.3.13-1.5.5-linux-ppc64le.jar, openblas-0.3.13-1.5.5-linux-x86.jar, openblas-0.3.13-1.5.5-linux-x86_64.jar, openblas-0.3.13-1.5.5-macosx-x86_64.jar, openblas-0.3.13-1.5.5-windows-x86.jar, openblas-0.3.13-1.5.5-windows-x86_64.jar, openblas-0.3.13-1.5.5.jar, openblas-platform-0.3.13-1.5.5.jar, opencv-4.5.1-1.5.5-android-arm.jar, opencv-4.5.1-1.5.5-android-arm64.jar, opencv-4.5.1-1.5.5-android-x86.jar, opencv-4.5.1-1.5.5-android-x86_64.jar, opencv-4.5.1-1.5.5-ios-arm64.jar, opencv-4.5.1-1.5.5-ios-x86_64.jar, opencv-4.5.1-1.5.5-linux-arm64.jar, opencv-4.5.1-1.5.5-linux-armhf.jar, opencv-4.5.1-1.5.5-linux-ppc64le.jar, opencv-4.5.1-1.5.5-linux-x86.jar, opencv-4.5.1-1.5.5-linux-x86_64.jar, opencv-4.5.1-1.5.5-macosx-x86_64.jar, opencv-4.5.1-1.5.5-windows-x86.jar, opencv-4.5.1-1.5.5-windows-x86_64.jar, opencv-4.5.1-1.5.5.jar, opencv-platform-4.5.1-1.5.5.jar, org.apache.commons.codec-1.9.0.v20170208-1614.jar, org.apache.commons.logging-1.1.1.v201101211721.jar, quarkus-bootstrap-runner-2.0.0.CR3.jar, quarkus-core-2.0.0.CR3.jar, quarkus-development-mode-spi-2.0.0.CR3.jar, quarkus-ide-launcher-2.0.0.CR3.jar, quarkus-jaxp-2.0.0.CR3.jar, slf4j-api-1.7.31.jar, slf4j-jboss-logmanager-1.1.0.Final.jar, smallrye-common-annotation-1.6.0.jar, smallrye-common-classloader-1.6.0.jar, smallrye-common-constraint-1.6.0.jar, smallrye-common-expression-1.6.0.jar, smallrye-common-function-1.6.0.jar, smallrye-common-io-1.6.0.jar, smallrye-config-2.3.0.jar, smallrye-config-common-2.3.0.jar, smallrye-config-core-2.3.0.jar, spring-aop-5.2.13.RELEASE.jar, spring-beans-5.2.13.RELEASE.jar, spring-context-5.2.13.RELEASE.jar, spring-core-5.2.13.RELEASE.jar, spring-expression-5.2.13.RELEASE.jar, spring-jcl-5.2.13.RELEASE.jar, spring-security-core-5.4.5.jar, spring-security-crypto-5.4.5.jar, tesseract-4.1.1-1.5.5-android-arm.jar, tesseract-4.1.1-1.5.5-android-arm64.jar, tesseract-4.1.1-1.5.5-android-x86.jar, tesseract-4.1.1-1.5.5-android-x86_64.jar, tesseract-4.1.1-1.5.5-linux-arm64.jar, tesseract-4.1.1-1.5.5-linux-armhf.jar, tesseract-4.1.1-1.5.5-linux-ppc64le.jar, tesseract-4.1.1-1.5.5-linux-x86.jar, tesseract-4.1.1-1.5.5-linux-x86_64.jar, tesseract-4.1.1-1.5.5-macosx-x86_64.jar, tesseract-4.1.1-1.5.5-windows-x86.jar, tesseract-4.1.1-1.5.5-windows-x86_64.jar, tesseract-4.1.1-1.5.5.jar, tesseract-platform-4.1.1-1.5.5.jar, tyrus-standalone-client-2.0.0.jar, videoinput-0.200-1.5.5-windows-x86.jar, videoinput-0.200-1.5.5-windows-x86_64.jar, videoinput-0.200-1.5.5.jar, videoinput-platform-0.200-1.5.5.jar, websocket-api-9.4.43.v20210629.jar, wildfly-common-1.5.4.Final-format-001.jar, xtunes-0.0.1-SNAPSHOT.jar define 1 overlapping resources:
[WARNING] - META-INF/MANIFEST.MF
[WARNING] aopalliance-1.0.jar, spring-aop-5.2.13.RELEASE.jar define 9 overlapping classes:
[WARNING] - org.aopalliance.aop.Advice
[WARNING] - org.aopalliance.aop.AspectException
[WARNING] - org.aopalliance.intercept.ConstructorInterceptor
[WARNING] - org.aopalliance.intercept.ConstructorInvocation
[WARNING] - org.aopalliance.intercept.Interceptor
[WARNING] - org.aopalliance.intercept.Invocation
[WARNING] - org.aopalliance.intercept.Joinpoint
[WARNING] - org.aopalliance.intercept.MethodInterceptor
[WARNING] - org.aopalliance.intercept.MethodInvocation
[WARNING] artoolkitplus-2.3.1-1.5.5-windows-x86.jar, ffmpeg-4.3.2-1.5.5-windows-x86.jar, flandmark-1.07-1.5.5-windows-x86.jar, flycapture-2.13.3.31-1.5.5-windows-x86.jar, javacpp-1.5.5-windows-x86.jar, leptonica-1.80.0-1.5.5-windows-x86.jar, libdc1394-2.2.6-1.5.5-windows-x86.jar, libfreenect-0.5.7-1.5.5-windows-x86.jar, librealsense-1.12.4-1.5.5-windows-x86.jar, librealsense2-2.40.0-1.5.5-windows-x86.jar, openblas-0.3.13-1.5.5-windows-x86.jar, opencv-4.5.1-1.5.5-windows-x86.jar, tesseract-4.1.1-1.5.5-windows-x86.jar, videoinput-0.200-1.5.5-windows-x86.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/windows-x86/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/windows-x86/jnijavacpp/reflect-config.json
[WARNING] javacpp-1.5.5-ios-x86_64.jar, openblas-0.3.13-1.5.5-ios-x86_64.jar, opencv-4.5.1-1.5.5-ios-x86_64.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/ios-x86_64/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/ios-x86_64/jnijavacpp/reflect-config.json
[WARNING] ffmpeg-4.3.2-1.5.5-android-arm.jar, ffmpeg-4.3.2-1.5.5-android-arm64.jar, ffmpeg-4.3.2-1.5.5-android-x86.jar, ffmpeg-4.3.2-1.5.5-android-x86_64.jar, ffmpeg-4.3.2-1.5.5-linux-arm64.jar, ffmpeg-4.3.2-1.5.5-linux-armhf.jar, ffmpeg-4.3.2-1.5.5-linux-ppc64le.jar, ffmpeg-4.3.2-1.5.5-linux-x86.jar, ffmpeg-4.3.2-1.5.5-linux-x86_64.jar, ffmpeg-4.3.2-1.5.5-macosx-x86_64.jar, ffmpeg-4.3.2-1.5.5-windows-x86.jar, ffmpeg-4.3.2-1.5.5-windows-x86_64.jar, ffmpeg-4.3.2-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/ffmpeg/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/ffmpeg/pom.xml
[WARNING] libfreenect-0.5.7-1.5.5-linux-arm64.jar, libfreenect-0.5.7-1.5.5-linux-armhf.jar, libfreenect-0.5.7-1.5.5-linux-ppc64le.jar, libfreenect-0.5.7-1.5.5-linux-x86.jar, libfreenect-0.5.7-1.5.5-linux-x86_64.jar, libfreenect-0.5.7-1.5.5-macosx-x86_64.jar, libfreenect-0.5.7-1.5.5-windows-x86.jar, libfreenect-0.5.7-1.5.5-windows-x86_64.jar, libfreenect-0.5.7-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/libfreenect/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/libfreenect/pom.xml
[WARNING] org.apache.commons.logging-1.1.1.v201101211721.jar, spring-jcl-5.2.13.RELEASE.jar define 5 overlapping classes:
[WARNING] - org.apache.commons.logging.Log
[WARNING] - org.apache.commons.logging.LogFactory
[WARNING] - org.apache.commons.logging.LogFactory$1
[WARNING] - org.apache.commons.logging.impl.NoOpLog
[WARNING] - org.apache.commons.logging.impl.SimpleLog
[WARNING] spring-security-core-5.4.5.jar, spring-security-crypto-5.4.5.jar define 47 overlapping classes:
[WARNING] - org.springframework.security.crypto.argon2.Argon2EncodingUtils
[WARNING] - org.springframework.security.crypto.argon2.Argon2EncodingUtils$Argon2Hash
[WARNING] - org.springframework.security.crypto.argon2.Argon2PasswordEncoder
[WARNING] - org.springframework.security.crypto.bcrypt.BCrypt
[WARNING] - org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder
[WARNING] - org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder$BCryptVersion
[WARNING] - org.springframework.security.crypto.codec.Base64
[WARNING] - org.springframework.security.crypto.codec.Base64$InvalidBase64CharacterException
[WARNING] - org.springframework.security.crypto.codec.Hex
[WARNING] - org.springframework.security.crypto.codec.Utf8
[WARNING] - 37 more...
[WARNING] artoolkitplus-2.3.1-1.5.5-android-x86_64.jar, ffmpeg-4.3.2-1.5.5-android-x86_64.jar, flandmark-1.07-1.5.5-android-x86_64.jar, javacpp-1.5.5-android-x86_64.jar, leptonica-1.80.0-1.5.5-android-x86_64.jar, openblas-0.3.13-1.5.5-android-x86_64.jar, opencv-4.5.1-1.5.5-android-x86_64.jar, tesseract-4.1.1-1.5.5-android-x86_64.jar define 2 overlapping resources:
[WARNING] - META-INF/native-image/android-x86_64/jnijavacpp/jni-config.json
[WARNING] - META-INF/native-image/android-x86_64/jnijavacpp/reflect-config.json
[WARNING] javacpp-1.5.5-android-arm.jar, javacpp-1.5.5-android-arm64.jar, javacpp-1.5.5-android-x86.jar, javacpp-1.5.5-android-x86_64.jar, javacpp-1.5.5-ios-arm64.jar, javacpp-1.5.5-ios-x86_64.jar, javacpp-1.5.5-linux-arm64.jar, javacpp-1.5.5-linux-armhf.jar, javacpp-1.5.5-linux-ppc64le.jar, javacpp-1.5.5-linux-x86.jar, javacpp-1.5.5-linux-x86_64.jar, javacpp-1.5.5-macosx-arm64.jar, javacpp-1.5.5-macosx-x86_64.jar, javacpp-1.5.5-windows-x86.jar, javacpp-1.5.5-windows-x86_64.jar, javacpp-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/javacpp/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/javacpp/pom.xml
[WARNING] libfreenect2-0.2.0-1.5.5-linux-x86.jar, libfreenect2-0.2.0-1.5.5-linux-x86_64.jar, libfreenect2-0.2.0-1.5.5-macosx-x86_64.jar, libfreenect2-0.2.0-1.5.5-windows-x86_64.jar, libfreenect2-0.2.0-1.5.5.jar define 2 overlapping resources:
[WARNING] - META-INF/maven/org.bytedeco/libfreenect2/pom.properties
[WARNING] - META-INF/maven/org.bytedeco/libfreenect2/pom.xml
[WARNING] maven-shade-plugin has detected that some class files are
[WARNING] present in two or more JARs. When this happens, only one
[WARNING] single version of the class is copied to the uber jar.
[WARNING] Usually this is not harmful and you can skip these warnings,
[WARNING] otherwise try to manually exclude artifacts based on
[WARNING] mvn dependency:tree -Ddetail=true and the above output.
[WARNING] See http://maven.apache.org/plugins/maven-shade-plugin/
[INFO]
[INFO] --- exec-maven-plugin:1.6.0:exec (default) @ xtunes ---
WARNING: Using incubator modules: jdk.incubator.jpackage
WARNING: Using incubator modules: jdk.incubator.jpackage
WARNING: Using incubator modules: jdk.incubator.jpackage
[INFO]
[INFO] --- maven-install-plugin:2.4:install (default-install) @ xtunes ---
[INFO] Installing C:\sdk\mServweb2\xTunesVNginxS\target\xtunes-0.0.1-SNAPSHOT.jar to C:\Users\auenda\.m2\repository\xTunesNginx\xtunes\0.0.1-SNAPSHOT\xtunes-0.0.1-SNAPSHOT.jar
[INFO] Installing C:\sdk\mServweb2\xTunesVNginxS\pom.xml to C:\Users\auenda\.m2\repository\xTunesNginx\xtunes\0.0.1-SNAPSHOT\xtunes-0.0.1-SNAPSHOT.pom
[INFO] ------------------------------------------------------------------------
[INFO] BUILD SUCCESS
[INFO] ------------------------------------------------------------------------
[INFO] Total time: 03:24 min
[INFO] Finished at: 2021-08-06T06:22:25+09:00
[INFO] ------------------------------------------------------------------------
====================================================================================
[PrimaryController][initialize]8219: -------initialize Entry -------
[PrimaryController][onStartCamera]7945: chord.wav => カメラ単独で起動してください。
[PrimaryController][onStartCamera]7960: カメラを起動させる
[ WARN:0] global C:\build\master_winpack-bindings-win64-vc14-static\opencv\modules\videoio\src\cap_msmf.cpp (434) `anonymous-namespace'::SourceReaderCB::~SourceReaderCB terminating async callback
[PrimaryController][onStartCamera]7969: FPS を設定する
=====================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Your system is not supported by certbot-auto anymore.
certbot-auto and its Certbot installation will no longer receive updates.
You will not receive any bug fixes including those fixing server compatibility
or security problems.
Please visit https://certbot.eff.org/ to check for other alternatives.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate for uenda.pgw.jp and 9 more domains
Performing the following challenges:
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for julie.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem
Your cert will expire on 2021-11-12. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
================================================================================================================================================
================================================================================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Your system is not supported by certbot-auto anymore.
certbot-auto and its Certbot installation will no longer receive updates.
You will not receive any bug fixes including those fixing server compatibility
or security problems.
Please visit https://certbot.eff.org/ to check for other alternatives.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate for uenda.pgw.jp and 9 more domains
Performing the following challenges:
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for julie.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem
Your cert will expire on 2022-02-04. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
=============================================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d diana.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Your system is not supported by certbot-auto anymore.
certbot-auto and its Certbot installation will no longer receive updates.
You will not receive any bug fixes including those fixing server compatibility
or security problems.
Please visit https://certbot.eff.org/ to check for other alternatives.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate for uenda.pgw.jp and 10 more domains
Performing the following challenges:
http-01 challenge for diana.uenda.pgw.jp
http-01 challenge for git.uenda.pgw.jp
http-01 challenge for julie.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for mail.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem
Your cert will expire on 2022-03-06. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
==================================================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d eva.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d diana.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Your system is not supported by certbot-auto anymore.
certbot-auto and its Certbot installation will no longer receive updates.
You will not receive any bug fixes including those fixing server compatibility
or security problems.
Please visit https://certbot.eff.org/ to check for other alternatives.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate for uenda.pgw.jp and 11 more domains
Performing the following challenges:
http-01 challenge for eva.uenda.pgw.jp
Using the webroot path /var/www/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem
Your cert will expire on 2022-03-20. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
=====================================================================================================================
[root@madonna ~]# /usr/local/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www/html -d uenda.pgw.jp -d www.uenda.pgw.jp -d lisa.uenda.pgw.jp -d julie.uenda.pgw.jp -d eva.uenda.pgw.jp -d mail.uenda.pgw.jp -d git.uenda.pgw.jp -d madonna.uenda.pgw.jp -d stacey.uenda.pgw.jp -d olivia.uenda.pgw.jp -d diana.uenda.pgw.jp -d xtunes.uenda.pgw.jp -m auenda@uenda.pgw.jp --renew-by-default
Your system is not supported by certbot-auto anymore.
certbot-auto and its Certbot installation will no longer receive updates.
You will not receive any bug fixes including those fixing server compatibility
or security problems.
Please visit https://certbot.eff.org/ to check for other alternatives.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate for uenda.pgw.jp and 11 more domains
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp-0006/privkey.pem
Your cert will expire on 2022-03-23. To obtain a new or tweaked
version of this certificate in the future, simply run
letsencrypt-auto again. To non-interactively renew *all* of your
certificates, run "letsencrypt-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@madonna ~]#
===================================== OK ==========================
/usr/bin/certbot certonly \
--webroot \
-w /var/www/certbot/uenda.pgw.jp \
-d uenda.pgw.jp \
--preferred-challenges http \
--agree-tos \
-m auenda@uenda.pgw.jp \
--dry-run
================================ NG ===============================
-d madonna.uenda.pgw.jp \
-d lisa.uenda.pgw.jp \
-d stacey.uenda.pgw.jp \
-d julie.uenda.pgw.jp \
-d xtunes.uenda.pgw.jp \
-d eva.uenda.pgw.jp \
-d diana.uenda.pgw.jp \
-d olivia.uenda.pgw.jp \
---------------------------- NG ---------------------------
/usr/bin/certbot certonly \
--webroot \
-w /var/www/certbot/uenda.pgw.jp \
-d uenda.pgw.jp \
-w /var/www/certbot/madonna.uenda.pgw.jp \
-d madonna.uenda.pgw.jp \
-w /var/www/certbot/lisa.uenda.pgw.jp \
-d lisa.uenda.pgw.jp \
-w /var/www/certbot/stacey.uenda.pgw.jp \
-d stacey.uenda.pgw.jp \
-w /var/www/certbot/julie.uenda.pgw.jp \
-d julie.uenda.pgw.jp \
-w /var/www/certbot/xtunes.uenda.pgw.jp \
-d xtunes.uenda.pgw.jp \
-w /var/www/certbot/eva.uenda.pgw.jp \
-d eva.uenda.pgw.jp \
-w /var/www/certbot/diana.uenda.pgw.jp \
-d diana.uenda.pgw.jp \
-w /var/www/certbot/olivia.uenda.pgw.jp \
-d olivia.uenda.pgw.jp \
----------------------------------------- NG --------------------------------------
/usr/bin/certbot certonly \
--webroot \
-w /var/www/certbot/uenda.pgw.jp \
-d uenda.pgw.jp \
-d madonna.uenda.pgw.jp \
-d lisa.uenda.pgw.jp \
-d stacey.uenda.pgw.jp \
-d julie.uenda.pgw.jp \
-d xtunes.uenda.pgw.jp \
-d eva.uenda.pgw.jp \
-d diana.uenda.pgw.jp \
-d olivia.uenda.pgw.jp \
--preferred-challenges http \
--agree-tos \
-m auenda@uenda.pgw.jp \
--dry-run
===================================================================================================================
Features disabled or unavailable on this platform:
Memory allocator: system
+------------------------------------------+
| ==== WARNING ==== |
| |
| This is NOT a recommended configuration. |
| Using the system memory allocator causes |
| reduced performance and increased memory |
| fragmentation. Installing the jemalloc |
| memory allocator (version >= 4.0.0) is |
| strongly recommended. |
+------------------------------------------+
Small-system tuning (--with-tuning)
Allow 'dnstap' packet logging (--enable-dnstap)
GeoIP2 access control (--enable-geoip)
DNS Response Policy Service interface (--enable-dnsrps)
Allow 'fixed' rrset-order (--enable-fixed-rrset)
Very verbose query trace logging (--enable-querytrace)
Single-query trace logging (--enable-singletrace)
CMocka Unit Testing Framework (--with-cmocka)
JSON statistics (--with-json-c)
LMDB database to store configuration for 'addzone' zones (--with-lmdb)
IDN support (--with-libidn2)
-------------------------------------------------------------------------------
Configured paths:
prefix: /usr/local
sysconfdir: ${prefix}/etc
localstatedir: ${prefix}/var
-------------------------------------------------------------------------------
Compiler: gcc -std=gnu99
gcc (GCC) 4.8.5 20150623 (Red Hat 4.8.5-44)
Copyright (C) 2015 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
CFLAGS: -Wall -Wextra -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -pthread
CPPFLAGS: -D_FORTIFY_SOURCE=2
LDFLAGS:
-------------------------------------------------------------------------------
For more detail, use --enable-full-report.
===============================================================================
[root@madonna ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@uenda.pgw.jp --dry-run
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Simulating a certificate request for uenda.pgw.jp
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: uenda.pgw.jp
Type: unauthorized
Detail: Invalid response from http://uenda.pgw.jp/.well-known/acme-challenge/LP2YhqjqjT5XqsaSKMmjNjDrtllZG-Y7bsdNUvweWPU [210.154.137.47]: 404
Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
Some challenges have failed.
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.
============================================ NG ==========03/10
===================================================== ok ======================================
[root@diana ~]# certbot certonly -a webroot --webroot-path=/var/www/nginx/html -d uenda.pgw.jp -d www.uenda.pgw.jp
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
Requesting a certificate for uenda.pgw.jp and www.uenda.pgw.jp
Performing the following challenges:
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
Using the webroot path /var/www/nginx/html for all unmatched domains.
Waiting for verification...
Cleaning up challenges
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
Your certificate will expire on 2022-06-13. To obtain a new or
tweaked version of this certificate in the future, simply run
certbot again. To non-interactively renew *all* of your
certificates, run "certbot renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@diana ~]#
================================================================= OK ===================
[root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@uenda.pgw.jp
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Python 3.6 support will be dropped in the next release of Certbot - please upgrade your Python version.
Requesting a certificate for uenda.pgw.jp and 6 more domains
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Key is saved at: /etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
This certificate expires on 2022-07-17.
These files will be updated when the certificate renews.
NEXT STEPS:
- The certificate will need to be renewed before it expires. Certbot can automatically renew the certificate in the background, but you may need to take steps to enable that functionality. See https://certbot.org/renewal-setup for instructions.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you like Certbot, please consider supporting our work by:
* Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
* Donating to EFF: https://eff.org/donate-le
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
[root@diana ~]# lisa, stacey, julie, eva, diana, sade
==================================================================================================================================
[root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/www.uenda.pgw.jp -d www.uenda.pgw.jp -w /var/www/certbot/madonna.uenda.pgw.jp -d madonna.uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp \
> -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp -w /var/www/certbot/olivia.uenda.pgw.jp -d olivia.uenda.pgw.jp -w /var/www/certbot/rihanna.uenda.pgw.jp -d rihanna.uenda.pgw.jp -w /var/www/certbot/ast.uenda.pgw.jp -d ast.uenda.pgw.jp -w /var/www/certbot/leslie.uenda.pgw.jp -d leslie.uenda.pgw.jp -w /var/www/certbot/dinah.uenda.pgw.jp -d dinah.uenda.pgw.jp \
> -w /var/www/certbot/jena.uenda.pgw.jp -d jena.uenda.pgw.jp -w /var/www/certbot/maria.uenda.pgw.jp -d maria.uenda.pgw.jp \
> -w /var/www/certbot/rachael.uenda.pgw.jp -d rachael.uenda.pgw.jp -w /var/www/certbot/xtunes.uenda.pgw.jp -d xtunes.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@uenda.pgw.jp
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Would you be willing, once your first certificate is successfully issued, to
share your email address with the Electronic Frontier Foundation, a founding
partner of the Let's Encrypt project and the non-profit organization that
develops Certbot? We'd like to send you email about our work encrypting the web,
EFF news, campaigns, and ways to support digital freedom.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
(Y)es/(N)o: y
Account registered.
Requesting a certificate for uenda.pgw.jp and 17 more domains
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for diana.uenda.pgw.jp
http-01 challenge for dinah.uenda.pgw.jp
http-01 challenge for eva.uenda.pgw.jp
http-01 challenge for jena.uenda.pgw.jp
http-01 challenge for julie.uenda.pgw.jp
http-01 challenge for leslie.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for maria.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for rachael.uenda.pgw.jp
http-01 challenge for rihanna.uenda.pgw.jp
http-01 challenge for sade.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/certbot/xtunes.uenda.pgw.jp for all unmatched domains.
Waiting for verification...
Challenge failed for domain ast.uenda.pgw.jp
Challenge failed for domain diana.uenda.pgw.jp
Challenge failed for domain dinah.uenda.pgw.jp
Challenge failed for domain eva.uenda.pgw.jp
Challenge failed for domain jena.uenda.pgw.jp
Challenge failed for domain julie.uenda.pgw.jp
Challenge failed for domain leslie.uenda.pgw.jp
Challenge failed for domain lisa.uenda.pgw.jp
Challenge failed for domain madonna.uenda.pgw.jp
Challenge failed for domain maria.uenda.pgw.jp
Challenge failed for domain olivia.uenda.pgw.jp
Challenge failed for domain rachael.uenda.pgw.jp
Challenge failed for domain rihanna.uenda.pgw.jp
Challenge failed for domain sade.uenda.pgw.jp
Challenge failed for domain stacey.uenda.pgw.jp
Challenge failed for domain uenda.pgw.jp
Challenge failed for domain www.uenda.pgw.jp
Challenge failed for domain xtunes.uenda.pgw.jp
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for diana.uenda.pgw.jp
http-01 challenge for dinah.uenda.pgw.jp
http-01 challenge for eva.uenda.pgw.jp
http-01 challenge for jena.uenda.pgw.jp
http-01 challenge for julie.uenda.pgw.jp
http-01 challenge for leslie.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for maria.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for rachael.uenda.pgw.jp
http-01 challenge for rihanna.uenda.pgw.jp
http-01 challenge for sade.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Cleaning up challenges
Some challenges have failed.
IMPORTANT NOTES:
- The following errors were reported by the server:
Domain: ast.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://ast.uenda.pgw.jp/.well-known/acme-challenge/0OC3QqFWhB-fJwIhX7s4zlDBgBaidsXA3gdHofAQ6jk:
404
Domain: diana.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
https://diana.uenda.pgw.jp/.well-known/acme-challenge/AbNELafyOFLOaRG1Xo5ATAo_nZG2tHjDiZK5ukwlj4w:
404
Domain: dinah.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://dinah.uenda.pgw.jp/.well-known/acme-challenge/D9c6xSLtRGalukbec5ewjrVCMbi32chcSNQZ8D2LgKY:
404
Domain: eva.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://eva.uenda.pgw.jp/.well-known/acme-challenge/_F29Z7aUJYDZ8hFFo_1sLeyT_py_iivfpMTtZVX8OK8:
404
Domain: jena.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://jena.uenda.pgw.jp/.well-known/acme-challenge/W5hxzYYAynipTASf2YWOXwhXXetPltMuyWihDtpWHY0:
404
Domain: julie.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://julie.uenda.pgw.jp/.well-known/acme-challenge/CmbkphK_372kVYXkuGip_OGmNvPqtnxUCq_xbi8PF6c:
404
Domain: leslie.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://leslie.uenda.pgw.jp/.well-known/acme-challenge/5QY0gE4w2Xo3iE8YekfuR2tpxlcm5AeRfSpXUChfrGs:
404
Domain: lisa.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://lisa.uenda.pgw.jp/.well-known/acme-challenge/FrVQXrZ_idAyrQMZ9POYYZs3A_tc0swQ5_OKNumRZuM:
404
Domain: madonna.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://madonna.uenda.pgw.jp/.well-known/acme-challenge/QbEFE_jEV68rpOi6HBLOhDOrCiZh-34gXQRpcS-b-fU:
404
Domain: maria.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://maria.uenda.pgw.jp/.well-known/acme-challenge/1nSOGuMtQtT56COi07nLtTqbVB55xB075LoGeQ_zcS0:
404
Domain: olivia.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://olivia.uenda.pgw.jp/.well-known/acme-challenge/RQsX6hKHisqG8H669PlFdV2IS4-EdN1BKiRqpsFyfYk:
404
Domain: rachael.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://rachael.uenda.pgw.jp/.well-known/acme-challenge/pvtIc83XLzvM5rLGSrrLM4hxG2ED6azCTL-SM3kTP1Y:
404
Domain: rihanna.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://rihanna.uenda.pgw.jp/.well-known/acme-challenge/OrIgJf50VQY5tBwsm_ME2orY0ze5bWO5uXGiTxSzPgs:
404
Domain: sade.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://sade.uenda.pgw.jp/.well-known/acme-challenge/Re1ZGvwazljBVimuZzwK_0c2LdDsDlgnKyDRNT7oXnc:
404
Domain: stacey.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://stacey.uenda.pgw.jp/.well-known/acme-challenge/0WW24McI4yqaqLLjd6_1f9BPTtjAN9Pmt-KQPfq5WrU:
404
Domain: uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
https://uenda.pgw.jp/.well-known/acme-challenge/-8lm_jCrsnGScS3rZGu5QDsgODLJrPV7dabzdgHL4cs:
404
Domain: www.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
https://uenda.pgw.jp/.well-known/acme-challenge/TDHvKn05VjYvGPaA-rHQCuVw3fJbPqOWTgRgdmNlrO8:
404
Domain: xtunes.uenda.pgw.jp
Type: unauthorized
Detail: 210.154.137.47: Invalid response from
http://xtunes.uenda.pgw.jp/.well-known/acme-challenge/UeVS5s4Y1H1bjtS7rRJDEKMNLoWKWgcnGGxNOD8FCws:
404
To fix these errors, please make sure that your domain name was
entered correctly and the DNS A/AAAA record(s) for that domain
contain(s) the right IP address.
[root@diana ~]#
===============================================================================================
===============================================================================================
[root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/www.uenda.pgw.jp -d www.uenda.pgw.jp -w /var/www/certbot/madonna.uenda.pgw.jp -d madonna.uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp \
> -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp -w /var/www/certbot/olivia.uenda.pgw.jp -d olivia.uenda.pgw.jp -w /var/www/certbot/rihanna.uenda.pgw.jp -d rihanna.uenda.pgw.jp -w /var/www/certbot/ast.uenda.pgw.jp -d ast.uenda.pgw.jp -w /var/www/certbot/leslie.uenda.pgw.jp -d leslie.uenda.pgw.jp -w /var/www/certbot/dinah.uenda.pgw.jp -d dinah.uenda.pgw.jp \
> -w /var/www/certbot/jena.uenda.pgw.jp -d jena.uenda.pgw.jp -w /var/www/certbot/maria.uenda.pgw.jp -d maria.uenda.pgw.jp \
> -w /var/www/certbot/rachael.uenda.pgw.jp -d rachael.uenda.pgw.jp -w /var/www/certbot/xtunes.uenda.pgw.jp -d xtunes.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@uenda.pgw.jp
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
Requesting a certificate for uenda.pgw.jp and 17 more domains
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for diana.uenda.pgw.jp
http-01 challenge for dinah.uenda.pgw.jp
http-01 challenge for eva.uenda.pgw.jp
http-01 challenge for jena.uenda.pgw.jp
http-01 challenge for julie.uenda.pgw.jp
http-01 challenge for leslie.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for maria.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for rachael.uenda.pgw.jp
http-01 challenge for rihanna.uenda.pgw.jp
http-01 challenge for sade.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for uenda.pgw.jp
http-01 challenge for www.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/certbot/xtunes.uenda.pgw.jp for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Subscribe to the EFF mailing list (email: auenda@uenda.pgw.jp).
Starting new HTTPS connection (1): supporters.eff.org
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
Your certificate will expire on 2022-09-04. To obtain a new or
tweaked version of this certificate in the future, simply run
certbot again. To non-interactively renew *all* of your
certificates, run "certbot renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@diana ~]#
============================================================================================================================================
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
00 05 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@ipv4.mydns.jp/login.html'
--------------------------------------------------------------------------------------------------------------------------------------------
$ sudo apt install auditd setools policycoreutils selinux-utils selinux-basics policycoreutils-python-utils
-------------------------------------------------------------------------------
=============================================================================================================================================
certbot: error: unrecognized arguments: /var/www/certbot/diana.uenda.pgw.jp /var/www/certbot/jena.uenda.pgw.jp /var/www/certbot/rachael.uenda.pgw.jp
[root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/www.uenda.pgw.jp -d www.uenda.pgw.jp -w /var/www/certbot/madonna.uenda.pgw.jp -d madonna.uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp -w /var/www/certbot/olivia.uenda.pgw.jp -d olivia.uenda.pgw.jp -w /var/www/certbot/rihanna.uenda.pgw.jp -d rihanna.uenda.pgw.jp -w /var/www/certbot/ast.uenda.pgw.jp -d ast.uenda.pgw.jp -w /var/www/certbot/leslie.uenda.pgw.jp -d leslie.uenda.pgw.jp -w /var/www/certbot/dinah.uenda.pgw.jp -d dinah.uenda.pgw.jp -w /var/www/certbot/jena.uenda.pgw.jp -d jena.uenda.pgw.jp -w /var/www/certbot/maria.uenda.pgw.jp -d maria.uenda.pgw.jp -w /var/www/certbot/rachael.uenda.pgw.jp -d rachael.uenda.pgw.jp -w /var/www/certbot/xtunes.uenda.pgw.jp -d xtunes.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@beach.ocn.ne.jp
=============================================================================================================================================
[root@diana ~]# /usr/bin/certbot certonly --webroot -w /var/www/certbot/uenda.pgw.jp -d uenda.pgw.jp -w /var/www/certbot/www.uenda.pgw.jp -d www.uenda.pgw.jp -w /var/www/certbot/madonna.uenda.pgw.jp -d madonna.uenda.pgw.jp -w /var/www/certbot/lisa.uenda.pgw.jp -d lisa.uenda.pgw.jp -w /var/www/certbot/stacey.uenda.pgw.jp -d stacey.uenda.pgw.jp -w /var/www/certbot/julie.uenda.pgw.jp -d julie.uenda.pgw.jp -w /var/www/certbot/eva.uenda.pgw.jp -d eva.uenda.pgw.jp -w /var/www/certbot/diana.uenda.pgw.jp -d diana.uenda.pgw.jp -w /var/www/certbot/sade.uenda.pgw.jp -d sade.uenda.pgw.jp -w /var/www/certbot/olivia.uenda.pgw.jp -d olivia.uenda.pgw.jp -w /var/www/certbot/rihanna.uenda.pgw.jp -d rihanna.uenda.pgw.jp -w /var/www/certbot/ast.uenda.pgw.jp -d ast.uenda.pgw.jp -w /var/www/certbot/leslie.uenda.pgw.jp -d leslie.uenda.pgw.jp -w /var/www/certbot/dinah.uenda.pgw.jp -d dinah.uenda.pgw.jp -w /var/www/certbot/jena.uenda.pgw.jp -d jena.uenda.pgw.jp -w /var/www/certbot/maria.uenda.pgw.jp -d maria.uenda.pgw.jp -w /var/www/certbot/rachael.uenda.pgw.jp -d rachael.uenda.pgw.jp -w /var/www/certbot/xtunes.uenda.pgw.jp -d xtunes.uenda.pgw.jp --preferred-challenges http --agree-tos -m auenda@beach.ocn.ne.jp --no-effi-email
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
Requesting a certificate for uenda.pgw.jp and 17 more domains
Performing the following challenges:
http-01 challenge for ast.uenda.pgw.jp
http-01 challenge for diana.uenda.pgw.jp
http-01 challenge for dinah.uenda.pgw.jp
http-01 challenge for eva.uenda.pgw.jp
http-01 challenge for jena.uenda.pgw.jp
http-01 challenge for julie.uenda.pgw.jp
http-01 challenge for leslie.uenda.pgw.jp
http-01 challenge for lisa.uenda.pgw.jp
http-01 challenge for madonna.uenda.pgw.jp
http-01 challenge for maria.uenda.pgw.jp
http-01 challenge for olivia.uenda.pgw.jp
http-01 challenge for rachael.uenda.pgw.jp
http-01 challenge for rihanna.uenda.pgw.jp
http-01 challenge for sade.uenda.pgw.jp
http-01 challenge for stacey.uenda.pgw.jp
http-01 challenge for xtunes.uenda.pgw.jp
Using the webroot path /var/www/certbot/xtunes.uenda.pgw.jp for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Subscribe to the EFF mailing list (email: auenda@uenda.pgw.jp).
Starting new HTTPS connection (1): supporters.eff.org
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
Your certificate will expire on 2022-12-04. To obtain a new or
tweaked version of this certificate in the future, simply run
certbot again. To non-interactively renew *all* of your
certificates, run "certbot renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
[root@diana ~]#
=========================================================================================================================
00 22 * * * /usr/bin/wget -o /var/log/mydnslog/log 'https://mydns985090:UhtzqtE6rJs@ipv4.mydns.jp/login.html'
5 7 2,17 * * /bin/certbot renew
------------------------------------------------------------------------------------
# certbot renew
Saving debug log to /var/log/letsencrypt/letsencrypt.log
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/uenda.pgw.jp/privkey.pem
Your certificate will expire on 2023-02-20.
=======================================================================================================================
[root@diana ~]# certbot renew --dry-run #試し実行 = ' --dry-run'
Saving debug log to /var/log/letsencrypt/letsencrypt.log
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Processing /etc/letsencrypt/renewal/uenda.pgw.jp.conf
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Simulating renewal of an existing certificate for uenda.pgw.jp and 17 more domains
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Congratulations, all simulated renewals succeeded:
/etc/letsencrypt/live/uenda.pgw.jp/fullchain.pem (success)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
[root@diana ~]#
=======================================================================================================================
sumiyoshi letsEncrypt
========================================================================================
[root@stacey ~]# /usr/bin/certbot certonly --standalone -d sumiyoshi.pgw.jp -d www.sumiyoshi.pgw.jp -d madonna.sumiyoshi.pgw.jp -d lisa.sumiyoshi.pgw.jp -d stacey.sumiyoshi.pgw.jp -d julie.sumiyoshi.pgw.jp -d eva.sumiyoshi.pgw.jp -d diana.sumiyoshi.pgw.jp -d sade.sumiyoshi.pgw.jp -d olivia.sumiyoshi.pgw.jp -d rihanna.sumiyoshi.pgw.jp -d ast.sumiyoshi.pgw.jp -d leslie.sumiyoshi.pgw.jp -d dinah.sumiyoshi.pgw.jp -d jena.sumiyoshi.pgw.jp -d maria.sumiyoshi.pgw.jp -d rachael.sumiyoshi.pgw.jp -d xtunes.sumiyoshi.pgw.jp
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Enter email address (used for urgent renewal and security notices)
(Enter 'c' to cancel): auenda@m-cn.ne.jp
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Please read the Terms of Service at
https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf. You must
agree in order to register with the ACME server. Do you agree?
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
(Y)es/(N)o: yes
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Would you be willing, once your first certificate is successfully issued, to
share your email address with the Electronic Frontier Foundation, a founding
partner of the Let's Encrypt project and the non-profit organization that
develops Certbot? We'd like to send you email about our work encrypting the web,
EFF news, campaigns, and ways to support digital freedom.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
(Y)es/(N)o: no
Account registered.
Requesting a certificate for sumiyoshi.pgw.jp and 17 more domains
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/sumiyoshi.pgw.jp/fullchain.pem
Key is saved at: /etc/letsencrypt/live/sumiyoshi.pgw.jp/privkey.pem
This certificate expires on 2023-04-08.
These files will be updated when the certificate renews.
NEXT STEPS:
- The certificate will need to be renewed before it expires. Certbot can automatically renew the certificate in the background, but you may need to take steps to enable that functionality. See https://certbot.org/renewal-setup for instructions.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you like Certbot, please consider supporting our work by:
* Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
* Donating to EFF: https://eff.org/donate-le
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
[root@stacey ~]#
======================================================================================
========================================================================================
Let's Encrypt certificate expiration notice for domain "ast.sumiyoshi.pgw.jp" (and 17 more)
----------------------------------------------------------------------------------------
Hello,
Your certificate (or certificates) for the names listed below will expire in 19 days (on 2023-04-08). Please make sure to renew your certificate before then, or visitors to your web site will encounter errors.
We recommend renewing certificates automatically when they have a third of their total lifetime left. For Let's Encrypt's current 90-day certificates, that means renewing 30 days before expiration. See https://letsencrypt.org/docs/integration-guide/ for details.
ast.sumiyoshi.pgw.jp
diana.sumiyoshi.pgw.jp
dinah.sumiyoshi.pgw.jp
eva.sumiyoshi.pgw.jp
jena.sumiyoshi.pgw.jp
julie.sumiyoshi.pgw.jp
leslie.sumiyoshi.pgw.jp
lisa.sumiyoshi.pgw.jp
madonna.sumiyoshi.pgw.jp
maria.sumiyoshi.pgw.jp
olivia.sumiyoshi.pgw.jp
rachael.sumiyoshi.pgw.jp
rihanna.sumiyoshi.pgw.jp
sade.sumiyoshi.pgw.jp
stacey.sumiyoshi.pgw.jp
sumiyoshi.pgw.jp
www.sumiyoshi.pgw.jp
xtunes.sumiyoshi.pgw.jp
For details about when we send these emails, please visit: https://letsencrypt.org/docs/expiration-emails/ In particular, note that this reminder email is still sent if you've obtained a slightly different certificate by adding or removing names. If you've replaced this certificate with a newer one that covers more or fewer names than the list above, you may be able to ignore this message.
For any questions or support, please visit: https://community.letsencrypt.org/ Unfortunately, we can't provide support by email.
To learn more about the latest technical and organizational updates from Let's Encrypt, sign up for our newsletter: https://mailchi.mp/letsencrypt.org/fjp6ha1gad
If you are receiving this email in error, unsubscribe at:
http://delivery.letsencrypt.org/track/unsub.php?u=30850198&id=6ca96bf3ca344f2e8b84bce182f1f491.kWOtig0rP7CbahJ9beFlrsX6d%2Fs%3D&r=https%3A%2F%2Fmandrillapp.com%2Funsub%3Fmd_email%3Da%252A%252A%252A%252A%2540m%252A%252A%252A%252A.%252A%252A%252A
Please note that this would also unsubscribe you from other Let's Encrypt service notices, including expiration reminders for any other certificates.
Regards,
The Let's Encrypt Team
==================================================