You are not logged in.
There is also aufs-dkms, aufs-dev and aufs-tools.
But as @Head_in_a_Stick mentioned, the kernel has overlayfs which provides "union mount".
You might also be interested in the overlay-boot package (in devuan experimental) which provides scripting that uses overlayfs together with netns and unshare to set up and run wafer-thin containers.
If the git directory on your system has pathname /home/user/mygitworkspace you would remove that git directory with the terminal command sequence:
$ cd /home/user
$ rm -rf mygitworkspaceTechnically, "rm" is the program to run, "-rf" asks for the command variation to delete stuff recursively and force deletion to apply also for read-only files/directories, and "mygitworkspace" identifies the top-level pathname of files and directories to remove.
You should run
# nft -cf /etc/nftables.confrepeatedly, and each time look at and correct only the first error, until that command no longer gives any output.
Thereafter you apply the corrected rule set with
# nft -cf /etc/nftables.confHint: you current nftables.conf has 3 syntax errors.
@steve_v, that kind of opinionated aggression is totally uncalled for. You may consider this a warning.
May I suggest that you don't want to compile any netfilter components?
What is your objective?
edit: why do you think that anything is missing from nftables?
Again, the desktop iso is installer (not refracta) + a package pool, and the pool1 iso is only a package pool.
The desktop package pool contains some complete desktop package collections and then topped up with 2500 "most wanted" popcon packages, whereas the pool1 package pool merely is the 5000 most wanted packages.
In both cases the choice collection is filtered against currently available packages (at building time), expanded to include the first-options Depends and Recommends, and also including first-option choices for any so called "pure virtual" packages.
Exciting stuff ![]()
sysvinit of course only does whatever /etc/inittab says it should do and one can have great fun as well editing that.
And you would find a rather extreme doing-nothing init in the overlay-boot package, where its startup relies on scripting that spawns desired services before entering its "init" (actually called "reaper") which merely reaps zombies.
devuan_chimaera_4.0.0_i386_desktop.iso is an installer iso for an i386 architecture installation, plus a package pool that includes all packages including dependencies for a number of desktop installations.
devuan_chimaera_4.1_0_amd64_pool1.iso is a package pool only iso that doesn't contain the installer software. It contains the 5000 "most popular" packages for amd64 architecture installations according to popcon.debian.org at the date of the creation of the iso, plus their "depends" and "recommends".
Yes, fair enough. Thanks.
And my request of respectful and purposeful dialogue does indeed apply to everyone.
@deepforest, why do you waste your time here?
By the looks of it, your devuan experience still leaves you so tremendously emotionally stressed that you end up with nonsense posts seemingly without purpose. Surely you have better things to do?
But maybe your purpose is really to ball-plank ideas on how to overcome whatever technical barrier you are currently at?
Indeed, there may well be people with knowledge and experience on that at this forum!
And to tap into that you simply just tune your manners more towards showing purpose and respect.
Looking forward to your satisfying merge request for tasksel ...
Currently I have duplicity at the top of my list of timeline backup methods as it's both fast and compact, and it's trivially easy to set up a cron job script that makes an incremental delta as often as I like.
I know of the front-end duply but only by name. (It's so rare that I need to peep into the backup)
Well, a composite raid1 device would indeed typically be named /dev/md0, but it doesn't necessarily need to be mounted. However it does need to be "assembled" at the first-stage boot (initrd) before this pivots into a raided root filesystem.
And yes, side mounting raided partitions separately is a sure way for interesting experiences.
But I'm not a raid supporter so it's better I'll be quiet and let a friendly raid1 supporter give some guidance.
Or you may need something like
ip protocol icmp accept
ip6 nexthdr ipv6-icmp accept
ip protocol igmp acceptin the output filtering as well for ping responses.
That doesn't look ok. Not that I really know nft syntax but by the looks of it ports 80 and 443 are now blocked, and it no longer responds to ping either. Do you need all that...
I think you'll need
tcp dport {22, 80, 443} acceptin the input filtering..
and do you really need to filter output at all? though it looks like it wold work...
Well I prefer the iptables rule syntax myself but if you prefer nftables then that's of course fine with me. Afaik, it's just a matter of syntax; either way it uses the kernel's network filtering rules, so I wouldn't be surprised if you can view the rules with iptables syntax or nftables syntax regardless of how you make the rules.
Whichever way, you need the input/output holes for 443 traffic similar to the current 80 or 22 traffic.
Obviously you have a firewall setup with ufw. That's fine. Just make holes for 80 and 443.
That's good; nginx does listen on port 443.
What do you get from
# iptables-saveEDIT: I reduced to the generic prompt "#"
However nmap still says https is closed.
Please stop nginx and start it again.
use the following on the Dell-Devuan server:
# netstat -anp | grep -w LISTENto verify that it listens to port 443.
Your last wget test some posts ago looked all fine. I wold not suggest that you start from the top.
I meant the host that runs nginx; would be "the Dell-Devuan server" in your house ![]()
My port probing says that port 80 is open and port 443 is closed; other ports called filtered.
Since you also don't get service on port 443 it means that either nginx does not listen at all, or there is some firewall block in between.
Just for completeness, you should generate the dhparam.pem file:
# openssl dhparam -out /etc/ssl/certs/dhparam.pem 2048and add an ssl_dhparam directive as new line 25 in realupnow.com.conf:
ssh_dhparam /etc/ssl/certs/dhparam.pem ;And restart nginx.
After that nginx you could try on that host
# wget -H -O/dev/null http://realupnow.com/
in order to verify that nginx services port 443 (ssl).
EDIT: added semi-colon to the config line.
Yes all configuration looks fine, although some ssl settings can probably be tuned. But it should connect and allow access. One thing missing is the ssl_dhparam setting which according to doc is required when/if DH ciphers are used. But I would have thought nginx would issue an error message when started/restarted if that would stop it from opening the ssl listener. Try with stopping nginx, then starting it, and check the error log.
Does that host have any local firewall?
Is there a recent /var/log/php7.4-fpm.log and how does that look, if so?
Ok. hmm 203.220.142.95 would be me, yes.
The error.log I just posted is the most recent
Did you confirm that? I accessed your server more recent than that and before I made my post.