commit 91d31f0ceefae4b7e9f9d6e8c19af298d9c1c5d9 Author: Chris Date: Sun May 10 13:08:11 2026 +0000 Initiales Setup: Traefik und Gitea diff --git a/gitea/data/git/.ssh/authorized_keys b/gitea/data/git/.ssh/authorized_keys new file mode 100644 index 0000000..e69de29 diff --git a/gitea/data/git/.ssh/environment b/gitea/data/git/.ssh/environment new file mode 100644 index 0000000..f86169b --- /dev/null +++ b/gitea/data/git/.ssh/environment @@ -0,0 +1 @@ +GITEA_CUSTOM=/data/gitea diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/HEAD b/gitea/data/git/repositories/chris/vps-infrastructure.git/HEAD new file mode 100644 index 0000000..b870d82 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/HEAD @@ -0,0 +1 @@ +ref: refs/heads/main diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/config b/gitea/data/git/repositories/chris/vps-infrastructure.git/config new file mode 100644 index 0000000..07d359d --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/config @@ -0,0 +1,4 @@ +[core] + repositoryformatversion = 0 + filemode = true + bare = true diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/description b/gitea/data/git/repositories/chris/vps-infrastructure.git/description new file mode 100644 index 0000000..498b267 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/description @@ -0,0 +1 @@ +Unnamed repository; edit this file 'description' to name the repository. diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/git-daemon-export-ok b/gitea/data/git/repositories/chris/vps-infrastructure.git/git-daemon-export-ok new file mode 100644 index 0000000..e69de29 diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/applypatch-msg.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/applypatch-msg.sample new file mode 100755 index 0000000..a5d7b84 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/applypatch-msg.sample @@ -0,0 +1,15 @@ +#!/bin/sh +# +# An example hook script to check the commit log message taken by +# applypatch from an e-mail message. +# +# The hook should exit with non-zero status after issuing an +# appropriate message if it wants to stop the commit. The hook is +# allowed to edit the commit message file. +# +# To enable this hook, rename this file to "applypatch-msg". + +. git-sh-setup +commitmsg="$(git rev-parse --git-path hooks/commit-msg)" +test -x "$commitmsg" && exec "$commitmsg" ${1+"$@"} +: diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/commit-msg.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/commit-msg.sample new file mode 100755 index 0000000..b58d118 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/commit-msg.sample @@ -0,0 +1,24 @@ +#!/bin/sh +# +# An example hook script to check the commit log message. +# Called by "git commit" with one argument, the name of the file +# that has the commit message. The hook should exit with non-zero +# status after issuing an appropriate message if it wants to stop the +# commit. The hook is allowed to edit the commit message file. +# +# To enable this hook, rename this file to "commit-msg". + +# Uncomment the below to add a Signed-off-by line to the message. +# Doing this in a hook is a bad idea in general, but the prepare-commit-msg +# hook is more suited to it. +# +# SOB=$(git var GIT_AUTHOR_IDENT | sed -n 's/^\(.*>\).*$/Signed-off-by: \1/p') +# grep -qs "^$SOB" "$1" || echo "$SOB" >> "$1" + +# This example catches duplicate Signed-off-by lines. + +test "" = "$(grep '^Signed-off-by: ' "$1" | + sort | uniq -c | sed -e '/^[ ]*1[ ]/d')" || { + echo >&2 Duplicate Signed-off-by lines. + exit 1 +} diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/post-receive b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/post-receive new file mode 100755 index 0000000..80ae570 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/post-receive @@ -0,0 +1,16 @@ +#!/usr/bin/env bash +# AUTO GENERATED BY GITEA, DO NOT MODIFY +data=$(cat) +exitcodes="" +hookname=$(basename $0) +GIT_DIR=${GIT_DIR:-$(dirname $0)/..} + +for hook in ${GIT_DIR}/hooks/${hookname}.d/*; do + test -x "${hook}" && test -f "${hook}" || continue + echo "${data}" | "${hook}" + exitcodes="${exitcodes} $?" +done + +for i in ${exitcodes}; do + [ ${i} -eq 0 ] || exit ${i} +done diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/post-receive.d/gitea b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/post-receive.d/gitea new file mode 100755 index 0000000..2a84d52 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/post-receive.d/gitea @@ -0,0 +1,3 @@ +#!/usr/bin/env bash +# AUTO GENERATED BY GITEA, DO NOT MODIFY +/usr/local/bin/gitea hook --config=/data/gitea/conf/app.ini post-receive diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/post-update.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/post-update.sample new file mode 100755 index 0000000..ec17ec1 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/post-update.sample @@ -0,0 +1,8 @@ +#!/bin/sh +# +# An example hook script to prepare a packed repository for use over +# dumb transports. +# +# To enable this hook, rename this file to "post-update". + +exec git update-server-info diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-applypatch.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-applypatch.sample new file mode 100755 index 0000000..4142082 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-applypatch.sample @@ -0,0 +1,14 @@ +#!/bin/sh +# +# An example hook script to verify what is about to be committed +# by applypatch from an e-mail message. +# +# The hook should exit with non-zero status after issuing an +# appropriate message if it wants to stop the commit. +# +# To enable this hook, rename this file to "pre-applypatch". + +. git-sh-setup +precommit="$(git rev-parse --git-path hooks/pre-commit)" +test -x "$precommit" && exec "$precommit" ${1+"$@"} +: diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-commit.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-commit.sample new file mode 100755 index 0000000..29ed5ee --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-commit.sample @@ -0,0 +1,49 @@ +#!/bin/sh +# +# An example hook script to verify what is about to be committed. +# Called by "git commit" with no arguments. The hook should +# exit with non-zero status after issuing an appropriate message if +# it wants to stop the commit. +# +# To enable this hook, rename this file to "pre-commit". + +if git rev-parse --verify HEAD >/dev/null 2>&1 +then + against=HEAD +else + # Initial commit: diff against an empty tree object + against=$(git hash-object -t tree /dev/null) +fi + +# If you want to allow non-ASCII filenames set this variable to true. +allownonascii=$(git config --type=bool hooks.allownonascii) + +# Redirect output to stderr. +exec 1>&2 + +# Cross platform projects tend to avoid non-ASCII filenames; prevent +# them from being added to the repository. We exploit the fact that the +# printable range starts at the space character and ends with tilde. +if [ "$allownonascii" != "true" ] && + # Note that the use of brackets around a tr range is ok here, (it's + # even required, for portability to Solaris 10's /usr/bin/tr), since + # the square bracket bytes happen to fall in the designated range. + test $(git diff-index --cached --name-only --diff-filter=A -z $against | + LC_ALL=C tr -d '[ -~]\0' | wc -c) != 0 +then + cat <<\EOF +Error: Attempt to add a non-ASCII file name. + +This can cause problems if you want to work with people on other platforms. + +To be portable it is advisable to rename the file. + +If you know what you are doing you can disable this check using: + + git config hooks.allownonascii true +EOF + exit 1 +fi + +# If there are whitespace errors, print the offending file names and fail. +exec git diff-index --check --cached $against -- diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-merge-commit.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-merge-commit.sample new file mode 100755 index 0000000..399eab1 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-merge-commit.sample @@ -0,0 +1,13 @@ +#!/bin/sh +# +# An example hook script to verify what is about to be committed. +# Called by "git merge" with no arguments. The hook should +# exit with non-zero status after issuing an appropriate message to +# stderr if it wants to stop the merge commit. +# +# To enable this hook, rename this file to "pre-merge-commit". + +. git-sh-setup +test -x "$GIT_DIR/hooks/pre-commit" && + exec "$GIT_DIR/hooks/pre-commit" +: diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-push.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-push.sample new file mode 100755 index 0000000..4ce688d --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-push.sample @@ -0,0 +1,53 @@ +#!/bin/sh + +# An example hook script to verify what is about to be pushed. Called by "git +# push" after it has checked the remote status, but before anything has been +# pushed. If this script exits with a non-zero status nothing will be pushed. +# +# This hook is called with the following parameters: +# +# $1 -- Name of the remote to which the push is being done +# $2 -- URL to which the push is being done +# +# If pushing without using a named remote those arguments will be equal. +# +# Information about the commits which are being pushed is supplied as lines to +# the standard input in the form: +# +# +# +# This sample shows how to prevent push of commits where the log message starts +# with "WIP" (work in progress). + +remote="$1" +url="$2" + +zero=$(git hash-object --stdin &2 "Found WIP commit in $local_ref, not pushing" + exit 1 + fi + fi +done + +exit 0 diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-rebase.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-rebase.sample new file mode 100755 index 0000000..6cbef5c --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-rebase.sample @@ -0,0 +1,169 @@ +#!/bin/sh +# +# Copyright (c) 2006, 2008 Junio C Hamano +# +# The "pre-rebase" hook is run just before "git rebase" starts doing +# its job, and can prevent the command from running by exiting with +# non-zero status. +# +# The hook is called with the following parameters: +# +# $1 -- the upstream the series was forked from. +# $2 -- the branch being rebased (or empty when rebasing the current branch). +# +# This sample shows how to prevent topic branches that are already +# merged to 'next' branch from getting rebased, because allowing it +# would result in rebasing already published history. + +publish=next +basebranch="$1" +if test "$#" = 2 +then + topic="refs/heads/$2" +else + topic=`git symbolic-ref HEAD` || + exit 0 ;# we do not interrupt rebasing detached HEAD +fi + +case "$topic" in +refs/heads/??/*) + ;; +*) + exit 0 ;# we do not interrupt others. + ;; +esac + +# Now we are dealing with a topic branch being rebased +# on top of master. Is it OK to rebase it? + +# Does the topic really exist? +git show-ref -q "$topic" || { + echo >&2 "No such branch $topic" + exit 1 +} + +# Is topic fully merged to master? +not_in_master=`git rev-list --pretty=oneline ^master "$topic"` +if test -z "$not_in_master" +then + echo >&2 "$topic is fully merged to master; better remove it." + exit 1 ;# we could allow it, but there is no point. +fi + +# Is topic ever merged to next? If so you should not be rebasing it. +only_next_1=`git rev-list ^master "^$topic" ${publish} | sort` +only_next_2=`git rev-list ^master ${publish} | sort` +if test "$only_next_1" = "$only_next_2" +then + not_in_topic=`git rev-list "^$topic" master` + if test -z "$not_in_topic" + then + echo >&2 "$topic is already up to date with master" + exit 1 ;# we could allow it, but there is no point. + else + exit 0 + fi +else + not_in_next=`git rev-list --pretty=oneline ^${publish} "$topic"` + /usr/bin/perl -e ' + my $topic = $ARGV[0]; + my $msg = "* $topic has commits already merged to public branch:\n"; + my (%not_in_next) = map { + /^([0-9a-f]+) /; + ($1 => 1); + } split(/\n/, $ARGV[1]); + for my $elem (map { + /^([0-9a-f]+) (.*)$/; + [$1 => $2]; + } split(/\n/, $ARGV[2])) { + if (!exists $not_in_next{$elem->[0]}) { + if ($msg) { + print STDERR $msg; + undef $msg; + } + print STDERR " $elem->[1]\n"; + } + } + ' "$topic" "$not_in_next" "$not_in_master" + exit 1 +fi + +<<\DOC_END + +This sample hook safeguards topic branches that have been +published from being rewound. + +The workflow assumed here is: + + * Once a topic branch forks from "master", "master" is never + merged into it again (either directly or indirectly). + + * Once a topic branch is fully cooked and merged into "master", + it is deleted. If you need to build on top of it to correct + earlier mistakes, a new topic branch is created by forking at + the tip of the "master". This is not strictly necessary, but + it makes it easier to keep your history simple. + + * Whenever you need to test or publish your changes to topic + branches, merge them into "next" branch. + +The script, being an example, hardcodes the publish branch name +to be "next", but it is trivial to make it configurable via +$GIT_DIR/config mechanism. + +With this workflow, you would want to know: + +(1) ... if a topic branch has ever been merged to "next". Young + topic branches can have stupid mistakes you would rather + clean up before publishing, and things that have not been + merged into other branches can be easily rebased without + affecting other people. But once it is published, you would + not want to rewind it. + +(2) ... if a topic branch has been fully merged to "master". + Then you can delete it. More importantly, you should not + build on top of it -- other people may already want to + change things related to the topic as patches against your + "master", so if you need further changes, it is better to + fork the topic (perhaps with the same name) afresh from the + tip of "master". + +Let's look at this example: + + o---o---o---o---o---o---o---o---o---o "next" + / / / / + / a---a---b A / / + / / / / + / / c---c---c---c B / + / / / \ / + / / / b---b C \ / + / / / / \ / + ---o---o---o---o---o---o---o---o---o---o---o "master" + + +A, B and C are topic branches. + + * A has one fix since it was merged up to "next". + + * B has finished. It has been fully merged up to "master" and "next", + and is ready to be deleted. + + * C has not merged to "next" at all. + +We would want to allow C to be rebased, refuse A, and encourage +B to be deleted. + +To compute (1): + + git rev-list ^master ^topic next + git rev-list ^master next + + if these match, topic has not merged in next at all. + +To compute (2): + + git rev-list master..topic + + if this is empty, it is fully merged to "master". + +DOC_END diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-receive b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-receive new file mode 100755 index 0000000..80ae570 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-receive @@ -0,0 +1,16 @@ +#!/usr/bin/env bash +# AUTO GENERATED BY GITEA, DO NOT MODIFY +data=$(cat) +exitcodes="" +hookname=$(basename $0) +GIT_DIR=${GIT_DIR:-$(dirname $0)/..} + +for hook in ${GIT_DIR}/hooks/${hookname}.d/*; do + test -x "${hook}" && test -f "${hook}" || continue + echo "${data}" | "${hook}" + exitcodes="${exitcodes} $?" +done + +for i in ${exitcodes}; do + [ ${i} -eq 0 ] || exit ${i} +done diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-receive.d/gitea b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-receive.d/gitea new file mode 100755 index 0000000..00db788 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-receive.d/gitea @@ -0,0 +1,3 @@ +#!/usr/bin/env bash +# AUTO GENERATED BY GITEA, DO NOT MODIFY +/usr/local/bin/gitea hook --config=/data/gitea/conf/app.ini pre-receive diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-receive.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-receive.sample new file mode 100755 index 0000000..a1fd29e --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/pre-receive.sample @@ -0,0 +1,24 @@ +#!/bin/sh +# +# An example hook script to make use of push options. +# The example simply echoes all push options that start with 'echoback=' +# and rejects all pushes when the "reject" push option is used. +# +# To enable this hook, rename this file to "pre-receive". + +if test -n "$GIT_PUSH_OPTION_COUNT" +then + i=0 + while test "$i" -lt "$GIT_PUSH_OPTION_COUNT" + do + eval "value=\$GIT_PUSH_OPTION_$i" + case "$value" in + echoback=*) + echo "echo from the pre-receive-hook: ${value#*=}" >&2 + ;; + reject) + exit 1 + esac + i=$((i + 1)) + done +fi diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/prepare-commit-msg.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/prepare-commit-msg.sample new file mode 100755 index 0000000..10fa14c --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/prepare-commit-msg.sample @@ -0,0 +1,42 @@ +#!/bin/sh +# +# An example hook script to prepare the commit log message. +# Called by "git commit" with the name of the file that has the +# commit message, followed by the description of the commit +# message's source. The hook's purpose is to edit the commit +# message file. If the hook fails with a non-zero status, +# the commit is aborted. +# +# To enable this hook, rename this file to "prepare-commit-msg". + +# This hook includes three examples. The first one removes the +# "# Please enter the commit message..." help message. +# +# The second includes the output of "git diff --name-status -r" +# into the message, just before the "git status" output. It is +# commented because it doesn't cope with --amend or with squashed +# commits. +# +# The third example adds a Signed-off-by line to the message, that can +# still be edited. This is rarely a good idea. + +COMMIT_MSG_FILE=$1 +COMMIT_SOURCE=$2 +SHA1=$3 + +/usr/bin/perl -i.bak -ne 'print unless(m/^. Please enter the commit message/..m/^#$/)' "$COMMIT_MSG_FILE" + +# case "$COMMIT_SOURCE,$SHA1" in +# ,|template,) +# /usr/bin/perl -i.bak -pe ' +# print "\n" . `git diff --cached --name-status -r` +# if /^#/ && $first++ == 0' "$COMMIT_MSG_FILE" ;; +# *) ;; +# esac + +# SOB=$(git var GIT_COMMITTER_IDENT | sed -n 's/^\(.*>\).*$/Signed-off-by: \1/p') +# git interpret-trailers --in-place --trailer "$SOB" "$COMMIT_MSG_FILE" +# if test -z "$COMMIT_SOURCE" +# then +# /usr/bin/perl -i.bak -pe 'print "\n" if !$first_line++' "$COMMIT_MSG_FILE" +# fi diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/proc-receive b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/proc-receive new file mode 100755 index 0000000..1974627 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/proc-receive @@ -0,0 +1,3 @@ +#!/usr/bin/env bash +# AUTO GENERATED BY GITEA, DO NOT MODIFY +/usr/local/bin/gitea hook --config=/data/gitea/conf/app.ini proc-receive diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/proc-receive.d/gitea b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/proc-receive.d/gitea new file mode 100755 index 0000000..e69de29 diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/push-to-checkout.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/push-to-checkout.sample new file mode 100755 index 0000000..af5a0c0 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/push-to-checkout.sample @@ -0,0 +1,78 @@ +#!/bin/sh + +# An example hook script to update a checked-out tree on a git push. +# +# This hook is invoked by git-receive-pack(1) when it reacts to git +# push and updates reference(s) in its repository, and when the push +# tries to update the branch that is currently checked out and the +# receive.denyCurrentBranch configuration variable is set to +# updateInstead. +# +# By default, such a push is refused if the working tree and the index +# of the remote repository has any difference from the currently +# checked out commit; when both the working tree and the index match +# the current commit, they are updated to match the newly pushed tip +# of the branch. This hook is to be used to override the default +# behaviour; however the code below reimplements the default behaviour +# as a starting point for convenient modification. +# +# The hook receives the commit with which the tip of the current +# branch is going to be updated: +commit=$1 + +# It can exit with a non-zero status to refuse the push (when it does +# so, it must not modify the index or the working tree). +die () { + echo >&2 "$*" + exit 1 +} + +# Or it can make any necessary changes to the working tree and to the +# index to bring them to the desired state when the tip of the current +# branch is updated to the new commit, and exit with a zero status. +# +# For example, the hook can simply run git read-tree -u -m HEAD "$1" +# in order to emulate git fetch that is run in the reverse direction +# with git push, as the two-tree form of git read-tree -u -m is +# essentially the same as git switch or git checkout that switches +# branches while keeping the local changes in the working tree that do +# not interfere with the difference between the branches. + +# The below is a more-or-less exact translation to shell of the C code +# for the default behaviour for git's push-to-checkout hook defined in +# the push_to_deploy() function in builtin/receive-pack.c. +# +# Note that the hook will be executed from the repository directory, +# not from the working tree, so if you want to perform operations on +# the working tree, you will have to adapt your code accordingly, e.g. +# by adding "cd .." or using relative paths. + +if ! git update-index -q --ignore-submodules --refresh +then + die "Up-to-date check failed" +fi + +if ! git diff-files --quiet --ignore-submodules -- +then + die "Working directory has unstaged changes" +fi + +# This is a rough translation of: +# +# head_has_history() ? "HEAD" : EMPTY_TREE_SHA1_HEX +if git cat-file -e HEAD 2>/dev/null +then + head=HEAD +else + head=$(git hash-object -t tree --stdin &2 + exit 1 +} + +unset GIT_DIR GIT_WORK_TREE +cd "$worktree" && + +if grep -q "^diff --git " "$1" +then + validate_patch "$1" +else + validate_cover_letter "$1" +fi && + +if test "$GIT_SENDEMAIL_FILE_COUNTER" = "$GIT_SENDEMAIL_FILE_TOTAL" +then + git config --unset-all sendemail.validateWorktree && + trap 'git worktree remove -ff "$worktree"' EXIT && + validate_series +fi diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/update b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/update new file mode 100755 index 0000000..b3570b0 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/update @@ -0,0 +1,15 @@ +#!/usr/bin/env bash +# AUTO GENERATED BY GITEA, DO NOT MODIFY +exitcodes="" +hookname=$(basename $0) +GIT_DIR=${GIT_DIR:-$(dirname $0/..)} + +for hook in ${GIT_DIR}/hooks/${hookname}.d/*; do + test -x "${hook}" && test -f "${hook}" || continue + "${hook}" $1 $2 $3 + exitcodes="${exitcodes} $?" +done + +for i in ${exitcodes}; do + [ ${i} -eq 0 ] || exit ${i} +done diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/update.d/gitea b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/update.d/gitea new file mode 100755 index 0000000..3f58296 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/update.d/gitea @@ -0,0 +1,3 @@ +#!/usr/bin/env bash +# AUTO GENERATED BY GITEA, DO NOT MODIFY +/usr/local/bin/gitea hook --config=/data/gitea/conf/app.ini update $1 $2 $3 diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/update.sample b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/update.sample new file mode 100755 index 0000000..c4d426b --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/hooks/update.sample @@ -0,0 +1,128 @@ +#!/bin/sh +# +# An example hook script to block unannotated tags from entering. +# Called by "git receive-pack" with arguments: refname sha1-old sha1-new +# +# To enable this hook, rename this file to "update". +# +# Config +# ------ +# hooks.allowunannotated +# This boolean sets whether unannotated tags will be allowed into the +# repository. By default they won't be. +# hooks.allowdeletetag +# This boolean sets whether deleting tags will be allowed in the +# repository. By default they won't be. +# hooks.allowmodifytag +# This boolean sets whether a tag may be modified after creation. By default +# it won't be. +# hooks.allowdeletebranch +# This boolean sets whether deleting branches will be allowed in the +# repository. By default they won't be. +# hooks.denycreatebranch +# This boolean sets whether remotely creating branches will be denied +# in the repository. By default this is allowed. +# + +# --- Command line +refname="$1" +oldrev="$2" +newrev="$3" + +# --- Safety check +if [ -z "$GIT_DIR" ]; then + echo "Don't run this script from the command line." >&2 + echo " (if you want, you could supply GIT_DIR then run" >&2 + echo " $0 )" >&2 + exit 1 +fi + +if [ -z "$refname" -o -z "$oldrev" -o -z "$newrev" ]; then + echo "usage: $0 " >&2 + exit 1 +fi + +# --- Config +allowunannotated=$(git config --type=bool hooks.allowunannotated) +allowdeletebranch=$(git config --type=bool hooks.allowdeletebranch) +denycreatebranch=$(git config --type=bool hooks.denycreatebranch) +allowdeletetag=$(git config --type=bool hooks.allowdeletetag) +allowmodifytag=$(git config --type=bool hooks.allowmodifytag) + +# check for no description +projectdesc=$(sed -e '1q' "$GIT_DIR/description") +case "$projectdesc" in +"Unnamed repository"* | "") + echo "*** Project description file hasn't been set" >&2 + exit 1 + ;; +esac + +# --- Check types +# if $newrev is 0000...0000, it's a commit to delete a ref. +zero=$(git hash-object --stdin &2 + echo "*** Use 'git tag [ -a | -s ]' for tags you want to propagate." >&2 + exit 1 + fi + ;; + refs/tags/*,delete) + # delete tag + if [ "$allowdeletetag" != "true" ]; then + echo "*** Deleting a tag is not allowed in this repository" >&2 + exit 1 + fi + ;; + refs/tags/*,tag) + # annotated tag + if [ "$allowmodifytag" != "true" ] && git rev-parse $refname > /dev/null 2>&1 + then + echo "*** Tag '$refname' already exists." >&2 + echo "*** Modifying a tag is not allowed in this repository." >&2 + exit 1 + fi + ;; + refs/heads/*,commit) + # branch + if [ "$oldrev" = "$zero" -a "$denycreatebranch" = "true" ]; then + echo "*** Creating a branch is not allowed in this repository" >&2 + exit 1 + fi + ;; + refs/heads/*,delete) + # delete branch + if [ "$allowdeletebranch" != "true" ]; then + echo "*** Deleting a branch is not allowed in this repository" >&2 + exit 1 + fi + ;; + refs/remotes/*,commit) + # tracking branch + ;; + refs/remotes/*,delete) + # delete tracking branch + if [ "$allowdeletebranch" != "true" ]; then + echo "*** Deleting a tracking branch is not allowed in this repository" >&2 + exit 1 + fi + ;; + *) + # Anything else (is there anything else?) + echo "*** Update hook: unknown type of update to ref $refname of type $newrev_type" >&2 + exit 1 + ;; +esac + +# --- Finished +exit 0 diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/info/exclude b/gitea/data/git/repositories/chris/vps-infrastructure.git/info/exclude new file mode 100644 index 0000000..a5196d1 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/info/exclude @@ -0,0 +1,6 @@ +# git ls-files --others --exclude-from=.git/info/exclude +# Lines that start with '#' are comments. +# For a project mostly in C, the following would be a good set of +# exclude patterns (uncomment them if you want to use them): +# *.[oa] +# *~ diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/info/refs b/gitea/data/git/repositories/chris/vps-infrastructure.git/info/refs new file mode 100644 index 0000000..e69de29 diff --git a/gitea/data/git/repositories/chris/vps-infrastructure.git/objects/info/packs b/gitea/data/git/repositories/chris/vps-infrastructure.git/objects/info/packs new file mode 100644 index 0000000..8b13789 --- /dev/null +++ b/gitea/data/git/repositories/chris/vps-infrastructure.git/objects/info/packs @@ -0,0 +1 @@ + diff --git a/gitea/data/gitea/avatars/8bdebf0f629f35ed39bf5e5e49933758 b/gitea/data/gitea/avatars/8bdebf0f629f35ed39bf5e5e49933758 new file mode 100644 index 0000000..d172c55 Binary files /dev/null and b/gitea/data/gitea/avatars/8bdebf0f629f35ed39bf5e5e49933758 differ diff --git a/gitea/data/gitea/conf/app.ini b/gitea/data/gitea/conf/app.ini new file mode 100644 index 0000000..04e148c --- /dev/null +++ b/gitea/data/gitea/conf/app.ini @@ -0,0 +1,97 @@ +APP_NAME = utgard +RUN_MODE = prod +RUN_USER = git +WORK_PATH = /data/gitea + +[repository] +ROOT = /data/git/repositories + +[repository.local] +LOCAL_COPY_PATH = /data/gitea/tmp/local-repo + +[repository.upload] +TEMP_PATH = /data/gitea/uploads + +[server] +APP_DATA_PATH = /data/gitea +DOMAIN = git.heinloth.online +SSH_DOMAIN = git.heinloth.online +HTTP_PORT = 3000 +ROOT_URL = https://git.heinloth.online/ +DISABLE_SSH = false +SSH_PORT = 22 +SSH_LISTEN_PORT = 22 +LFS_START_SERVER = true +LFS_JWT_SECRET = SGI2yi9L1ohSD13ZZI1OGxCEUK1uLCElU40RYl6rw6c + +[database] +PATH = /data/gitea/gitea.db +DB_TYPE = sqlite3 +HOST = localhost:3306 +NAME = gitea +USER = root +PASSWD = +LOG_SQL = false +SCHEMA = +SSL_MODE = disable + +[indexer] +ISSUE_INDEXER_PATH = /data/gitea/indexers/issues.bleve + +[session] +PROVIDER_CONFIG = /data/gitea/sessions +PROVIDER = file + +[picture] +AVATAR_UPLOAD_PATH = /data/gitea/avatars +REPOSITORY_AVATAR_UPLOAD_PATH = /data/gitea/repo-avatars + +[attachment] +PATH = /data/gitea/attachments + +[log] +MODE = console +LEVEL = info +ROOT_PATH = /data/gitea/log + +[security] +INSTALL_LOCK = true +SECRET_KEY = +REVERSE_PROXY_LIMIT = 1 +REVERSE_PROXY_TRUSTED_PROXIES = * +INTERNAL_TOKEN = eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYmYiOjE3Nzg0MTgxMjZ9.MdGxXUBfv0kGcXYOMSZGfVhOTCLGcgYr50KnAWliqXQ +PASSWORD_HASH_ALGO = pbkdf2 + +[service] +DISABLE_REGISTRATION = false +REQUIRE_SIGNIN_VIEW = false +REGISTER_EMAIL_CONFIRM = false +ENABLE_NOTIFY_MAIL = false +ALLOW_ONLY_EXTERNAL_REGISTRATION = false +ENABLE_CAPTCHA = false +DEFAULT_KEEP_EMAIL_PRIVATE = false +DEFAULT_ALLOW_CREATE_ORGANIZATION = true +DEFAULT_ENABLE_TIMETRACKING = true +NO_REPLY_ADDRESS = noreply.localhost + +[lfs] +PATH = /data/git/lfs + +[mailer] +ENABLED = false + +[openid] +ENABLE_OPENID_SIGNIN = true +ENABLE_OPENID_SIGNUP = false + +[cron.update_checker] +ENABLED = false + +[repository.pull-request] +DEFAULT_MERGE_STYLE = merge + +[repository.signing] +DEFAULT_TRUST_MODEL = committer + +[oauth2] +JWT_SECRET = qczf9XSo1p7fsyU6fg5IusOzb1-q3e_0xX9Ldjdp95o diff --git a/gitea/data/gitea/gitea.db b/gitea/data/gitea/gitea.db new file mode 100644 index 0000000..0dbf456 Binary files /dev/null and b/gitea/data/gitea/gitea.db differ diff --git a/gitea/data/gitea/home/.gitconfig b/gitea/data/gitea/home/.gitconfig new file mode 100644 index 0000000..ec57bef --- /dev/null +++ b/gitea/data/gitea/home/.gitconfig @@ -0,0 +1,22 @@ +[diff] + algorithm = histogram +[core] + logallrefupdates = true + quotePath = false + commitGraph = true +[gc] + reflogexpire = 90 + writeCommitGraph = true +[user] + name = Gitea + email = gitea@fake.local +[receive] + advertisePushOptions = true + procReceiveRefs = refs/for +[fetch] + writeCommitGraph = true +[safe] + directory = * +[uploadpack] + allowfilter = true + allowAnySHA1InWant = true diff --git a/gitea/data/gitea/indexers/issues.bleve/index_meta.json b/gitea/data/gitea/indexers/issues.bleve/index_meta.json new file mode 100644 index 0000000..5dc3405 --- /dev/null +++ b/gitea/data/gitea/indexers/issues.bleve/index_meta.json @@ -0,0 +1 @@ +{"storage":"boltdb","index_type":"scorch"} \ No newline at end of file diff --git a/gitea/data/gitea/indexers/issues.bleve/rupture_meta.json b/gitea/data/gitea/indexers/issues.bleve/rupture_meta.json new file mode 100644 index 0000000..978d526 --- /dev/null +++ b/gitea/data/gitea/indexers/issues.bleve/rupture_meta.json @@ -0,0 +1 @@ +{"version":5} \ No newline at end of file diff --git a/gitea/data/gitea/indexers/issues.bleve/store/root.bolt b/gitea/data/gitea/indexers/issues.bleve/store/root.bolt new file mode 100644 index 0000000..15a2386 Binary files /dev/null and b/gitea/data/gitea/indexers/issues.bleve/store/root.bolt differ diff --git a/gitea/data/gitea/jwt/private.pem b/gitea/data/gitea/jwt/private.pem new file mode 100644 index 0000000..f7ae6ac --- /dev/null +++ b/gitea/data/gitea/jwt/private.pem @@ -0,0 +1,52 @@ +-----BEGIN PRIVATE KEY----- +MIIJQQIBADANBgkqhkiG9w0BAQEFAASCCSswggknAgEAAoICAQCfbID1Frhp6uqh +CLlmKF1C+UrW2TVO/Njb0QukuvT2hpTic4FycgsTei1XTsVIdF66xhPWv4nECloG +E4KY88NUZsPCAZSsaYnrbaFFI3DO2Xk1YUg1Ad/KHXcOzSYjlT+r3HnIYOpLAEV7 +IcQwah/Qz8ja93xnoLdRog/ogy4vZUU5oRVpFj5fFoG0AbTPmUM4dPAnsFdNoc99 +i82OOsAURALlzfmzSzLHqcaL24QrYghw/wtYZPGg35SLlNnsd2N87UY7+UfjEr3h +1nWVMPhORa2hqeWv2b7XIVCB89Wmuz9nBItKMXWipqQimKtra8PrQKHRb97Z1Ohy +dcY0WkwecxGXPBczXlRNhMEYyJcphkwfORGULn3Xt4a7vThjO8Xjr4WRX1rKGZ2t +mZCim4IVCxImindHcLau38zgweirBwCGIrsO8ACEGDVlE0TAvOe/V+EV7td15mip +xefK19a8yyW0TN1uLYLF74jOZe11kBtZ87dCtrknWDe/reVCpUoMTLxN9Mo/hv9R +IKjAh2NeBK3xeNI58k6lsdgupsl0R3jZLLbtVuOnuh4uySrSylw27+85qarOmIDJ +iNIPplH6NzLlAxus+6wzG7r+WTow/WK6NVeqa9AFGbWTEl4sE8kWLTr6hIf8ZeXI +lKWA6iGut447Zo1f5PBQ+A6dBY9j/wIDAQABAoICABRJVtmZNAtKWOP3+7ubrE5u +8Y6IYke0VhYWslAaeDx8oKp2P0UkbPNkCyv+eo0/PaSvuuuLQQkgthbq2aYD8tml +IAjqcZRE88dxEmH9Ygf4VXus7ubL38HU4QcRpOZHQixo6FhOuNGlbbH++HuerYDB +SBJRBtQa9+jb4gFY3AIs9VOhg1t1eKdZ8lRJGUyHeK3Q95RdVKaszf3wUc5k/Hc3 +tlSu0rT1fzc4C+tVGir5FRDn63YqljK98KWYYei8wnytps/P501mX6JCy4CaFCbF +qBQXzgIEB8xRUXDP6eKHFkjSI7VjuM/jO6SpX7rSIkKn3U+M2ENI2/FgukGEMgZE +er16Iv3dbk78G+V6uCSMxV7mMQscmE95GzfKN0xlPIouZeXpFrSNwDbqO0X76NnL +wIFn1DNGgndEmyQ7lek9fyHnrY0Bxt5kzEpDpX5o6fAoDXjfn370o5Xl2WW34IKN +Hf8Qvn2PCI4LSU3nnUYPCZxOqPlfUmdG8Cr6+7VbKOtp0svjVC0dLp3bW8NtCwMc +JjeQEf+0vhD+vIgN7HMu5hUT4JQe/PRoA3UYdh3HI5gRBMVJ8Pi1b9cCoYr7Dpl8 +rPHc3MYB62V/4MLRq1OGBv39AjjssYdxLYLQ3gf0P/u5k9IDMm/N4x5iN0HamKg9 +ebqrNah3YfrN14EGh5OZAoIBAQDN3xCILi8i1qqJnmcELe5pYBN6A43i1FMvSEuB +b5DZ1KfapqnpOTOn2ROzV76iiCwn9ONqvYgnIIrEhfh+tOg3VuEHUgvgMErSWbAS +v9KpJk/vlD77BvjdSU8ZT6+QoH73dB4jYo7DRja4es5iQo/k4PeZPc514R5dG67Z +p/pTvDWEJNtj9vQdTsMH/zvKDNZSQWtzqGPO26yQlA6ZoybdNU7O0PDW87gKpSPg +srxyeu+V1DwQec3ATHho02v5nWh8/rXf5etQUB97EffuwXLGz3WydQNy5IXVDxaa +g7PeKADD0mw7k2BwOQ04leIvNmM6Rnka+l6nn+1ZbheoLVZ5AoIBAQDGPiV8/mWq +/kqjAdxm9vuSfr4z+4UpxlciK2jGr9yK1UVhWro+qFwXGGZQbdYy/8gtEfX0vwIz +eh8KDv9DXdowo6l4ztwgp5czkoXWbORs+1/IZOC97ejLV8o+16HsYw/Oy8f2A6aI +PVrtVv4JbuTcdhhdWfE+WVQ5jLJSpR75Lvd/2RJjJVW3VNST/B29pZoAwNuYaplp +bjkf3lrSnBmWXiAEbSWCYBeP65Ih0gnPmnQqoxfKwnFCxLvgLGPl4GdTcmAqweDW +J5Y4gwAcGNa6ve+1wnfaxs9KJYbwj1AQbRFfibDVkOOY4RPpN9jApNGl1RW3irn9 +Z2gHuZ68LFA3AoIBAHiLUnzKviLiGz01mRBjbKQa84yQJDZbKNIYvM1vbBuAX0Cy +Me8z5UE05Eow6Jj2rxQ+WiMYE28FqPtljplyiD5PCrhknDuLS2Rby7NOyqTsoAWi +gjYuYO4BjOU/OYev0mhGf5cskHda15OxpML4QpU7/P6nqApx5HuUSA9+Qh9hptxX +UHb6FPpMMfquwm2OkrfbQnWYdcib7DFD4ECpvYntOtXylfLnBi6Ff7qELb/CqCLN +ANaM26Lro92NXj3so0/9PLV7RQvjvmsrnEca0oAC3eG+jmRp1stoaE3VLC66saf3 +wBQqOV+8qDcn3CbU68kllqfrTh1MkYe55PQ+h9ECggEAY7EK7yGLhQLeC7061fis +KE5eXgvFOm3IkaFczlXPxW1ct4mFkU7fCKo3gYjKp9jjFG8szchkVfi6tTc3fOws +djtHVT5Jio5cxg2QCnW2JWwADelU7449fEyIozOS9SoX3/mwc/IABBE+sY4GsD25 +D3i/5en+HEmVxl8Pqenpeov44K0LxxoWUdxyDn1Bg4ZMvMY/aBVrUo6gYXtTFwhz +AaAR38f3jem+z5w6X5GdZ24Xrv1XUJqZlGcUx7XrAsXnkBo7bCUVaPx9WavfGUIQ +cdZkPnYuCbHiujnG8yBOtgPzMaUvbSawncfKWITCFpaL6yYOBr/XqiwfL4tT3PM3 +3wKCAQAcxlRcIk+bn9dUdf4NrcxmrHyeMHkd6PYta/5mZVLoN6nLlqwS5uEN41aG +iemAxhQfgXmiPlxG1/MNdh+VtekeOnl0DXClw6nei9W3HtRPP4j/CjUYF+SuBXkU +Cbl0Wc32ZaWbvk4NV1m0vtVyNvxstnAxqBZw1mMq4dqt0afsUQwdC4npKfjvo6CH +3vP8R6l335KeYF47sGomUZHSSyRU06oKRHJpwPRaV0gy2fi9hkxft3HAlDhA0Pnc +ZfHMArkYokO+bKVkRi4AbNYgfJW4aKE7jdROIogoT76uGaPPfpmwj/IOwsxE8NBq +OV2Bk0cAbxM7NwJVQcdZFYiLsr9V +-----END PRIVATE KEY----- diff --git a/gitea/data/gitea/queues/common/000001.log b/gitea/data/gitea/queues/common/000001.log new file mode 100644 index 0000000..9caef11 Binary files /dev/null and b/gitea/data/gitea/queues/common/000001.log differ diff --git a/gitea/data/gitea/queues/common/CURRENT b/gitea/data/gitea/queues/common/CURRENT new file mode 100644 index 0000000..feda7d6 --- /dev/null +++ b/gitea/data/gitea/queues/common/CURRENT @@ -0,0 +1 @@ +MANIFEST-000000 diff --git a/gitea/data/gitea/queues/common/LOCK b/gitea/data/gitea/queues/common/LOCK new file mode 100644 index 0000000..e69de29 diff --git a/gitea/data/gitea/queues/common/LOG b/gitea/data/gitea/queues/common/LOG new file mode 100644 index 0000000..98889f9 --- /dev/null +++ b/gitea/data/gitea/queues/common/LOG @@ -0,0 +1,6 @@ +=============== May 10, 2026 (UTC) =============== +13:02:10.111455 log@legend F·NumFile S·FileSize N·Entry C·BadEntry B·BadBlock Ke·KeyError D·DroppedEntry L·Level Q·SeqNum T·TimeElapsed +13:02:10.112854 db@open opening +13:02:10.113100 version@stat F·[] S·0B[] Sc·[] +13:02:10.113564 db@janitor F·2 G·0 +13:02:10.113597 db@open done T·727.658µs diff --git a/gitea/data/gitea/queues/common/MANIFEST-000000 b/gitea/data/gitea/queues/common/MANIFEST-000000 new file mode 100644 index 0000000..9d54f67 Binary files /dev/null and b/gitea/data/gitea/queues/common/MANIFEST-000000 differ diff --git a/gitea/data/gitea/sessions/4/7/47bfba1613f81be2 b/gitea/data/gitea/sessions/4/7/47bfba1613f81be2 new file mode 100644 index 0000000..8ab05fe Binary files /dev/null and b/gitea/data/gitea/sessions/4/7/47bfba1613f81be2 differ diff --git a/gitea/docker-compose.yml b/gitea/docker-compose.yml new file mode 100644 index 0000000..64b0253 --- /dev/null +++ b/gitea/docker-compose.yml @@ -0,0 +1,22 @@ +services: + gitea: + image: gitea/gitea:latest + container_name: gitea + restart: unless-stopped + environment: + - USER_UID=1000 # Die Standard-ID für deinen Benutzer 'chris' + - USER_GID=1000 + volumes: + - ./data:/data # Hier speichert Gitea alle Datenbanken und Repositories ab + networks: + - webproxy + labels: + - "traefik.enable=true" # Wir sagen Traefik: "Bitte beachte diesen Container" + - "traefik.http.routers.gitea.rule=Host(`git.heinloth.online`)" # Die Domain + - "traefik.http.routers.gitea.entrypoints=websecure" # Nur über HTTPS erreichbar + - "traefik.http.routers.gitea.tls.certresolver=letsencrypt" # Traefik holt das Zertifikat + - "traefik.http.services.gitea.loadbalancer.server.port=3000" # Der interne Gitea-Port + +networks: + webproxy: + external: true diff --git a/traefik/docker-compose.yml b/traefik/docker-compose.yml new file mode 100644 index 0000000..118d6e8 --- /dev/null +++ b/traefik/docker-compose.yml @@ -0,0 +1,31 @@ +services: + traefik: + image: "traefik:v3.7" # Die neueste Version, die Docker 26+ besser versteht + container_name: "traefik" + restart: unless-stopped + environment: + - DOCKER_API_VERSION=1.41 # Der korrekte Weg, dem Docker-Client die Version zu diktieren + ports: + - "80:80" + - "443:443" + command: + - "--api.insecure=false" + - "--providers.docker=true" + - "--providers.docker.exposedbydefault=false" + - "--providers.docker.network=webproxy" + - "--entrypoints.web.address=:80" + - "--entrypoints.web.http.redirections.entryPoint.to=websecure" + - "--entrypoints.web.http.redirections.entryPoint.scheme=https" + - "--entrypoints.websecure.address=:443" + - "--certificatesresolvers.letsencrypt.acme.tlschallenge=true" + - "--certificatesresolvers.letsencrypt.acme.email=deine.email@domain.de" # <-- Hier wieder deine E-Mail eintragen! + - "--certificatesresolvers.letsencrypt.acme.storage=/letsencrypt/acme.json" + volumes: + - "/var/run/docker.sock:/var/run/docker.sock:ro" + - "./letsencrypt:/letsencrypt" + networks: + - webproxy + +networks: + webproxy: + external: true diff --git a/traefik/letsencrypt/acme.json b/traefik/letsencrypt/acme.json new file mode 100644 index 0000000..29f9753 --- /dev/null +++ b/traefik/letsencrypt/acme.json @@ -0,0 +1,25 @@ +{ + "letsencrypt": { + "Account": { + "Email": "deine.email@domain.de", + "Registration": { + "body": { + "status": "valid" + }, + "uri": "https://acme-v02.api.letsencrypt.org/acme/acct/3321556306" + }, + "PrivateKey": "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", + "KeyType": "4096" + }, + "Certificates": [ + { + "domain": { + "main": "git.heinloth.online" + }, + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUYvekNDQk9lZ0F3SUJBZ0lTQm93RGpHZEs2RHhrZFByVlN2TnU1Vkh6TUEwR0NTcUdTSWIzRFFFQkN3VUEKTURNeEN6QUpCZ05WQkFZVEFsVlRNUll3RkFZRFZRUUtFdzFNWlhRbmN5QkZibU55ZVhCME1Rd3dDZ1lEVlFRRApFd05TTVRNd0hoY05Nall3TlRFd01URTFPREV6V2hjTk1qWXdPREE0TVRFMU9ERXlXakFlTVJ3d0dnWURWUVFECkV4Tm5hWFF1YUdWcGJteHZkR2d1YjI1c2FXNWxNSUlDSWpBTkJna3Foa2lHOXcwQkFRRUZBQU9DQWc4QU1JSUMKQ2dLQ0FnRUE3T1k0aVZucVoxNFdPWEdFRERWay9QSmxzZnQyc3FkTTJpbkZzeUpLNFo5OUJtZ3Y4UUVIWlBodgp4bWNtbEMvcnk3a21majU5OGRIK2IvSTMvYzJPbnBtaVZXRUFFd01sWTZkVTVZdXp0WmEzMG5ZTitZTkVkV21jCkJaMGNlSFBQN2FwQWs0MEJtcFFYWCtrMVJDZ0hBcXRlT0RxNDZsR05oT0k5aG1tTDVtK1JrcGNRRWdlb2kzR0sKR1pmSFR2bnhKdjNySDh4ZVlwTXU2TjRFaGhTbkFiNmdLVzdYS2NiaTVqREREWllkR0hudFpKT3JDOXlNTUlmcwpoMmpDaW95ZkJoM1hZR09ITEZVWnJPWXhoVnZBcldpV2JPSTFWWk05M2U4eFNOZDA1eStqUjN0WnV1NHJEOHNvCkUwN3VvSCtFby9DWmNWRStwYnNPWU9JL1dSdEJhSmpGMlBRL2ttTVJHdm9mVitYOXl2NkM2NlMza1JtcHNBVjkKdnUwcUFWa2cvWExWVVBkUVVDdERzWFIxbWdTR2Y3MEd6ZHZkOTErOWpKU29uZ1ZpRWNSamI1U2tDWEVIUHFHVApPMlJpMTRHcHVZbkVzYlA2VElaanhndEhyMEEwZDdLc0t4N3hIc3BqdWc2OGhEMm9odGpTSERFeG5zUjVxYjJ6ClhPUEQ5WmhyUkxhSzJDUzhXbjArSUxhVENaTXFtL2tUODFGNFhtazN6QXpIRUZSd2d2Z0MrVnlwZ3ZrcFUxWSsKOWpRS3lDWFc0bDJSakFjUDlnVVJDN1B0eUp4ZTZzbmM4TzZaTlhsNUNKWGxZMW45aTMyNTJBTFBmS1BqanhlYgpFdUpVYW1WbHNFcHNVTVVQcmc2UWFwdHJPSHcrdVFrWitlV1poc1ZUbTFyUEJFQ2ZqdlVDQXdFQUFhT0NBaUF3CmdnSWNNQTRHQTFVZER3RUIvd1FFQXdJRm9EQVRCZ05WSFNVRUREQUtCZ2dyQmdFRkJRY0RBVEFNQmdOVkhSTUIKQWY4RUFqQUFNQjBHQTFVZERnUVdCQlR1MytObWFhSEdPczhGTFBYazJ6WlJHb2YvK0RBZkJnTlZIU01FR0RBVwpnQlRucTU4UExET2dVOU5lVDNqSXNvUU9POWFTTXpBekJnZ3JCZ0VGQlFjQkFRUW5NQ1V3SXdZSUt3WUJCUVVICk1BS0dGMmgwZEhBNkx5OXlNVE11YVM1c1pXNWpjaTV2Y21jdk1CNEdBMVVkRVFRWE1CV0NFMmRwZEM1b1pXbHUKYkc5MGFDNXZibXhwYm1Vd0V3WURWUjBnQkF3d0NqQUlCZ1puZ1F3QkFnRXdMd1lEVlIwZkJDZ3dKakFrb0NLZwpJSVllYUhSMGNEb3ZMM0l4TXk1akxteGxibU55TG05eVp5OHhNVFl1WTNKc01JSUJDZ1lLS3dZQkJBSFdlUUlFCkFnU0Ird1NCK0FEMkFIVUFsRTVEaC9yc3dlK0I4eGtrSnFnWVpRSEgwMTg0QWdFL2NtZDlWVGN1R2RnQUFBR2UKRWZZZzBBQUFCQU1BUmpCRUFpQXQ4L2hBNmNXMGt6RGgrbnVRTElqdTVEcGhrbUw5M0hjRXUyeXhSbm5uU1FJZwpDNVV3Sk4ycSt4Mlo2dFRoVWZuYW1naGRNTG52eWR5aCtIM2ZNZTg2aU5zQWZRQnMvbEFaUTZoZXFSYThVdEV6CjVOekpIdkZCSEgwbGhDRFJjNENlR0Jqck9nQUFBWjRSOWlOM0FBZ0FBQVVBQ3RmYXB3UURBRVl3UkFJZ04yb2gKcXJpWmtZeFpDYlQ1eDFBdk01dkI3dllhTytEKyt2bXZpOFcySExZQ0lDQ1FHRjlXSzEvMVZkV1NmWmxWcWNiNAp1ZEc0bXl6M0hHMnJwVkJZRVdJcU1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQ0dlYzMxbkp6cTFuUTVxYW45ClMvMU8wRTlpT05YYUUyamd4WjR4WTVBRUVqbElPb3lLUnBQVHVKTXFqZUxkQ0t4OXZKVWE5b0pIU1NIR0xCY3QKWjVwU3FMMjFEWlJscno2ajNJOE1KbWJ1R3JVUzZGcmExenVCYTUrV0lMWjdwenloV2UwaDZDSTdCRjI4d1dQbApVSG1NQklUVWNqQll2RXJXQm41TFRpUUFvQ0wzVnZqN095WkUxVUVOWllaWWZGK2lVT1FQNCt6NUVkdnB4T1A3CklCQkNtTnBVeEhRcUV2ZGRnaVphck1wMHk5YUpRL3ExS2NZVDllVEJ5NTJBK0xtVGh1OTgrNDVVR2FpK09lYlUKbmhscHBTRVNEK2RpVCtWV01nZWNVVDdXV0JhcDhIMW1YeDM1NHNMc2NLTXdhMVNoNGl4RVc1RlJldGk0ZENqNQprYlplCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KCi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlGQlRDQ0F1MmdBd0lCQWdJUVdnRHlFdGpVdElEemtrRlg2aW1EQlRBTkJna3Foa2lHOXcwQkFRc0ZBREJQCk1Rc3dDUVlEVlFRR0V3SlZVekVwTUNjR0ExVUVDaE1nU1c1MFpYSnVaWFFnVTJWamRYSnBkSGtnVW1WelpXRnkKWTJnZ1IzSnZkWEF4RlRBVEJnTlZCQU1UREVsVFVrY2dVbTl2ZENCWU1UQWVGdzB5TkRBek1UTXdNREF3TURCYQpGdzB5TnpBek1USXlNelU1TlRsYU1ETXhDekFKQmdOVkJBWVRBbFZUTVJZd0ZBWURWUVFLRXcxTVpYUW5jeUJGCmJtTnllWEIwTVF3d0NnWURWUVFERXdOU01UTXdnZ0VpTUEwR0NTcUdTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUsKQW9JQkFRQ2xaM0NOMEZhQlpCVVhZYzI1QnRTdEdaQ01KbEEzbUJaamtsVGIyY3lFQlpQczArd0lHNkJnVVVOSQpmU3ZIU0phZXRDM2FuY2duTzFlaG42dncxZzdVRGpES2I1dXgwZGFrblRJK1dFNDFiMFZZYUhFWC9EN1lYWUtnCkw3SlJiTEFhWGJoWnpqVmx5SXVocnhBMy8rT2NYY0pKRnpUL2pDdUxqZkM4Y1N5VERCMEZ4THJIemFySlhuelIKeVFIM25BUDIvQXBkOU5wNzV0dDJRbkRyOUUwaTJnQjNiOWJKWHhmOTJuVXVwVmNNOXVwY3R1QnpwV2pQb1hUaQpkWUorRUovQjlhTHJBZWs0c1FwRXpOUENpZlZKTllJS05MTWM2WWpDUjA2Q0RnbzI4RWRQaXZFcEJIWGF6ZUdhClhQOWVuWmlWdXBwRDBFcWlGd1VCQkREVE1yT1BBZ01CQUFHamdmZ3dnZlV3RGdZRFZSMFBBUUgvQkFRREFnR0cKTUIwR0ExVWRKUVFXTUJRR0NDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVNCZ05WSFJNQkFmOEVDREFHQVFILwpBZ0VBTUIwR0ExVWREZ1FXQkJUbnE1OFBMRE9nVTlOZVQzaklzb1FPTzlhU016QWZCZ05WSFNNRUdEQVdnQlI1CnRGbm1lN2JsNUFGemdBaUl5QnBZOXVtYmJqQXlCZ2dyQmdFRkJRY0JBUVFtTUNRd0lnWUlLd1lCQlFVSE1BS0cKRm1oMGRIQTZMeTk0TVM1cExteGxibU55TG05eVp5OHdFd1lEVlIwZ0JBd3dDakFJQmdabmdRd0JBZ0V3SndZRApWUjBmQkNBd0hqQWNvQnFnR0lZV2FIUjBjRG92TDNneExtTXViR1Z1WTNJdWIzSm5MekFOQmdrcWhraUc5dzBCCkFRc0ZBQU9DQWdFQVVUZFlVcUVpbXpXN1Rick95cExxQ2ZMN1ZPd1lmL1E3OU9INWNITENaZWdnZlFoRGNvbmwKazdLZ2g4YjB2aSsvWHVXdTdDTjhuL1VQZWcxdm8zRyt0YVhpcnJ5dHRoUWluQUhHd2MvVWRiT3lnSmE5enVCYwpWeXFvSDNDWFRYREluVCs4YStjM2FFVk1KMlN0K3BTbjRlZCtXa0RwOGlqc2lqdkV5RndFNDdodWxXMEx0empnCjlmT1Y1UG1yZy96eFdiUnVMK2swREJESEVKZW5uQ3NBZW43YzM1UG14N2pwbUovSHRnUmhjbnoweWpTQnZ5SXcKNkwxUUl1cGtDdjJTQk9EVC94REQzZ2ZRUXlLdjZyb1Y0RzJFaGZFeUFzV3Btb2p4akNVQ0dpeWc5N0Z2RHRtLwpOSzJMU2M5bHliS3hCNzNJMitQMkczQ2FXcHZ2cEFpSENWdTMwalc4R0N4S2RmaHNYdG5JeTJpbXNrUXFWWjJtCjBQbXhvYmIyOFR1Y3I3eEJLN0N0d3ZQcmI3OW9zN3UyWFAzTzVmOWIvSDY2R055UnJnbFJYbHJZakkxb0dZTC8KZjRJMW4vU2d1c2RhNld2QTZDMTkwa3hqVTE1WTEybUhVNCtCeHlSOWN4MmhoR1M5ZkFqTVpLSnNzMjhxeHZ6NgpBeHU0Q2FEbVJOWnBLL3BRclhGMTd5WENYa21FV2d2U09FWnk2WjlwY2JMSVZFR2NrVi9pVmVxMEFPbzJwa2c5CnA0UVJJeTB0SzJkaVJFTkxTRjJLeXNGd2JZNkIyNkJGZUZzM3Yxc1lWUmhGVzluTGtPclFWcG9yQ1MwS3labWYKd1ZEODlxU1RsbmN0TGNabklhdmpLc0tVdTFuQTFpVTB5WU1kWWVwS1I3bFdibndoZHgzZXdvaz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "key": "LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlKS0FJQkFBS0NBZ0VBN09ZNGlWbnFaMTRXT1hHRUREVmsvUEpsc2Z0MnNxZE0yaW5Gc3lKSzRaOTlCbWd2CjhRRUhaUGh2eG1jbWxDL3J5N2ttZmo1OThkSCtiL0kzL2MyT25wbWlWV0VBRXdNbFk2ZFU1WXV6dFphMzBuWU4KK1lORWRXbWNCWjBjZUhQUDdhcEFrNDBCbXBRWFgrazFSQ2dIQXF0ZU9EcTQ2bEdOaE9JOWhtbUw1bStSa3BjUQpFZ2VvaTNHS0daZkhUdm54SnYzckg4eGVZcE11Nk40RWhoU25BYjZnS1c3WEtjYmk1akRERFpZZEdIbnRaSk9yCkM5eU1NSWZzaDJqQ2lveWZCaDNYWUdPSExGVVpyT1l4aFZ2QXJXaVdiT0kxVlpNOTNlOHhTTmQwNXkralIzdFoKdXU0ckQ4c29FMDd1b0grRW8vQ1pjVkUrcGJzT1lPSS9XUnRCYUpqRjJQUS9rbU1SR3ZvZlYrWDl5djZDNjZTMwprUm1wc0FWOXZ1MHFBVmtnL1hMVlVQZFFVQ3REc1hSMW1nU0dmNzBHemR2ZDkxKzlqSlNvbmdWaUVjUmpiNVNrCkNYRUhQcUdUTzJSaTE0R3B1WW5Fc2JQNlRJWmp4Z3RIcjBBMGQ3S3NLeDd4SHNwanVnNjhoRDJvaHRqU0hERXgKbnNSNXFiMnpYT1BEOVpoclJMYUsyQ1M4V24wK0lMYVRDWk1xbS9rVDgxRjRYbWszekF6SEVGUndndmdDK1Z5cApndmtwVTFZKzlqUUt5Q1hXNGwyUmpBY1A5Z1VSQzdQdHlKeGU2c25jOE82Wk5YbDVDSlhsWTFuOWkzMjUyQUxQCmZLUGpqeGViRXVKVWFtVmxzRXBzVU1VUHJnNlFhcHRyT0h3K3VRa1orZVdaaHNWVG0xclBCRUNmanZVQ0F3RUEKQVFLQ0FnQVNCVGczUUlMN2JuV0gxSm44R01Ld0dCdEN4UE5rUnlRcU0wUEI2dUdoMUpFODM4ZUgwSEY0ellvcApJRGNYemlaa1pwYm1Rd2d2RVMrRzRmaSs0bmhQR2JZMnd1eHZ4YzArRGFCQVh0WmlnWTdGb0d2VE4xaEppeWxPClp3TmZxVVdmbVZRVXRVVHlOb0lwcmxKNk53WkRmbmdxRkZOMUpaTjdrSDhvSHBiQkJtc2ZLTVVVN2dhMDVzUGYKeXdNaS81SEh5c2hzTUk1Y2RzQTZnQXI5alF3Z0xwazkxWnZoNW1wam9zRnZvdVBmTlFVcElhK0E5VHVueEdzcQphTDVscmlrNW5LTUJ4c2hsUjZydWswc2dqeGh5eUhJcTRiRTNhMzRwQi9VcWlwTXVzOW02aWdoTEZ5dG81ZVlNClEvU1VlbWJEVnIzQldESUpCdGZpNkVyejB3WXdVbmpLZFIycUdJN1JNWDQveEtEN3ZxSnRqNU1JeUlRUTlDenQKYVgyMzlpYTVMS1I2MC93WER3L2dXN3ZPdGpMVm5qWGJPNG5PYUZzakpFc25YSUduWTd6TFBUbSt1cSs3SHlWSQpEWnlyanNRUnZ1UXJaQVNrOVNYQkNYa3NhMitnaVVreEpvUWVrbWJqZjM5M3RsQmViUXhBcmczaG90MFovdm1lCmVoazV2SkFkcHFNY2JJdzdZMFpKVEVjY1pPekRYTi80SWlXZkZIUFlEOTNldHlYZ0l0SUtuMlFnaVVxNnMxV1kKUHY1amVpNlpyU1JlM25NRC80SlFFNS9xS24rWm9jaEhRMWtyRUtvUWZlWWpoYnkxUGRVZUIwWWg3REs2VTE1ZAp6SjJqbnRMTmV2RGdpR3piWVBOaXdZWWhkakpZVDRiZUV2RUVmSFRtWDNvaXpFWDY4UUtDQVFFQTg0Y1MyQi9yCjExU2RDMDl5YTQ2bUtSYmFwaHovSmZKamtkYzdqZ1F4WmhKZTZ6Y0VyM1pRdUdjZkRBRXJvNW9CRjhMY3hkVmoKVk1NbTVLSzR5YlRxUENKQzd5RUlNR1NqZXRoUWpPM0NPT0wwdk8xZjlDaXlsOFpSTVJBMTFlNkpURExZNzk0Nwp6d1BDemlnTTVDYU9VV01HQkMvTUYwUHVMaGNTcTdsUmFxeU8za2ZUTndlZ0lSU2dTQ3VFNTVuOW1CNC83V25ZCkJuMmpuTzY0SGZuMThOWHVYWVlGSU01c3ZyL2tpai9pMkxrSjRyR1MvdVpDUHdLOFBWcUhPL1VkcGFxdHBqWUkKbzBqeXA1NmFQSmkwcG51V2sra242aWpOQWg1aElZMXh5TjFqa1RuaSt4dlVQWndrZmdtQ0xrQ0M1UVVZUFdyUApQdDdXNTZmbXc5QllNUUtDQVFFQStRZytBZTJaQU5rTEZRaU1valN2ekM3T2p2WDFHS2lHR0I5ZFNUQXdEM2g5ClFzbGUyK0JjK2tRV2R5OGw0Z0dZeExHZVhUNUJsdmtKV1N3b1BSTXVyUGxzdTNDTDNkTDU1cS9kMTZOeDM5SUEKVk5aSEgydXJlclF5R0wwNWh6dW1TQlo1QWZ4MFVZR1VuS1JmMTRVa2JRNUhBaFpEajIwNW8wV3dKejArYkhwMwpUN1JwdkhiMzRQWUJXSXZRbmdBQ3pXV2xoUjB2M2hDRWY5R2psVDJNaXYrNmFySEFjOEc0T3lBa1FzTUFmUHdxCmxCeWJBUFExbytxNExBMURzUi9JeUZWSVBwaDdnTDdCL0Yya0hBOU5OREpXRzVZbCtvcExRR3QrN2NieU9GbUEKdmlqa1JGUXJyaXozMk02K3NsZi95cjhiUWVsTEhGZ1lxT1JFWU11MkJRS0NBUUVBOGtobVZTT2REZ1Nlb2N3TworRGRaMVBOcDRXNWo0cXIrcVBCTHpnVVo2SVZLYmhXMDBhU1N0b1BSL2EyRWJ5WWZCRGJZVXZMeitqYVdFVTViCkxrS1I3L1hlUmU3RktQQlhQVGJOSFFqRy9MVy82OTcyWWdIRGZRRFBjbExBWFBFUEpBSktsb3F4VWtwWm02VjQKL2R2bUo4NnZBNmRTRTZ0LzRkY091azZMVStnTjA5UDlyWGdtdGdMQlhFdi8xRFArZTBOTk1yVGxPYi94OFlZSApJN3UyRmoraEFPYi9YeDVBVHA2M2oxdjBJczRscWFZbHF2Z0czSTJxSGhoZEJ5ZmNzUi9YMTg5V1ZLMlV6WE1iCjNFSEpLUUU0VkR2WmZEdlBpdFlTcU1FQ2ZXYlZVbjBXOStFK0RYVzFVTGZCRHFjY0V5STRkWkk0VWtKOTZNZkEKN1B2eFlRS0NBUUJ0SmNPbnJLK0d3NW9yMmRkcHNKWHNkQWRzZVRpM1dnV0x4Uk5wNUlqci91OUh1bUt0RkNVcwpPM050UVdqbEtiWC9YNm45VERBTEw1TjlWZkU4ODQ5ZG1PU2pNcXpheUlGbkxtV1pBYllEVjFOMTI0VElyTFEzCno0cTFkUm9sdjJzZDVWdWNGejRVQ3l0TGpHL0ZVa0dvMnIwY21RMTdhMi83czZ1RlJ6NTQ1U1F0OXZEdy9XT2YKWWJNdFQvcGJoYjIwc0h4ZlgyOS9jTlhoLzh3bXVSZEVSTms3c2pTYmg2aHJvYWJDN0J6bXFzOHVvMnI4ZkF5VwpqMld4U1E4R0x0d2RrZU5jTEJEVldNWkZDZlhIcHAwNzUyUCtLMHp5Qm5MOUJTQllydjJ5M09la2NOKzdZdmpTCkdqdDI5d1oxdkVRTVpMNVpvUnFlamE0aE9Bc1FNYmpSQW9JQkFIZ2J5R3VCdmZLbGlDa205ckVHOFhJb1M1Y3oKY1ZaR09nZkpNUEljNExUelN1VktKcThIbmJQdFJpNVNIcUc1T3Z0V1ZzL21YTmgzeDZTTHdEMWRpbEpxVnlZaQpwMTIzMXdCVzBveTBFWXZtV3l3U2xIbmxXNEdrRndtNzBoYTRjZjJPOXB1dHF0bUtkb3F4RFQzcS9NZS9QVFFKClNlc2NIN1JXeTVVSWNUQXZ0Nnk4Ri85dHc0QWRXVlZTT2xGUDFleE1mdGVjdm5IUDFOWDZFZU94WG5TYzlFN08Kd1NHeHJ1eVl3dndXaVZvamdFZWNHM1VlUGxpYmlBS29MR3Q3bDVwN0t4MXdXbmlpd0hRNUFtQUl4R1lkUWZVbwpUUEdXcG1SQnBPNUYxdWNLUDVZMEQ3Z3VFZTdHTUdzSC9IQzduZU5HTjJ2VHdPOFRRb3orZVhDTDl3cz0KLS0tLS1FTkQgUlNBIFBSSVZBVEUgS0VZLS0tLS0K", + "Store": "default" + } + ] + } +} \ No newline at end of file