This is a docker CentOS 7 container with systemd, perl, mojolicious and much more.
This container has been tested on Windows 10, Linux Mint, CentOS 7 (and soon in CentOS 8) host systems.
The inclusion of
systemd in this container makes it powerful and versatile. You can install pretty much any package using
To update the container, all you have to do is just include
yum -y update in the
I am currently working on different flavors of this container for different purposes. Once done, the custom ready-to-go containers will be available for purchase in the shop.
The original container has been pulled or downloaded close to 8000 times from Docker Hub in the last two years.
https://www.a1z.us/blog/2018/08/16/centos-7-docker-container-with-perl-mojolicious/ redirects here
This configuration is actual one on server/machine, hop, on my network. And it is live.
How to use custom ports on NGINX?
Add all IPs:
listen 5085 default_server http2;
listen [::]:5086 default_server http2 ssl;
listen 192.*:5086 http2 ssl;
listen [2600:1700:a*:8*:2*:b*:f*:f*]:5086 http2 ssl;
server_name hop.a1z.us www.hop.a1z.us;
server_name nginx.hop.a1z.us www.nginx.hop.a1z.us;
listen 192.*:5088 ssl http2;
listen [*]:5088 ssl http2;
listen [::]:5088 http2 ssl;
Did not work until I added all the IPs including local and ip6!
This post is on how to unlock a freepbx or asterisk session locally?
First, find/copy the session ID at the bottom of your login page to PBX server. Keep the copy in the memory for now.
You can see all hidden text by running
Ctrl A.on the login page.
Secondly, login to FreePBX/Asterisk server/machine via SSH.
Most of the times, you can login with your FreePBX machine’s host name. For example,
Or, if your machine’s IP address is 192.168.1.10, then login to
http://192.168.1.10/admin as root with default username as
root and default password as
SangomaDefaultPassword from your windows desktop or any other device that is connected to the same network/router as the PBX machine.
I assume that you did not change the default password for your PBX/Asterisk server.
Once you have logged into your PBX server as root, run the following command.
fwconsole unlock 21islds39f67jg2413h5m737o4
The unlock session Id for you will be different but will look similar to the above.
Now, go back to your PBX server tab/page, and just refresh. You should be automatically logged in without entering any credentials.
how to check fingerprint of a certificate?
Access to a server, desktop, or a docker container via SSH.
Create a file named fingerprint.sh in Linux and add the following lines to the file.
file="ssl.cert" || $1;
openssl x509 -noout -fingerprint -sha256 -inform pem -in $file;
openssl x509 -noout -fingerprint -sha1 -inform pem -in $file;
openssl x509 -noout -fingerprint -md5 -inform pem -in $file;
Make the file executable
chmod +x fingerprint.sh
Run the program/script:
You will see a result similar to the following.
-sh-4.2$ ./ssl/fingerprint.sh path/to/certificate.crt
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!