Compare commits

..

No commits in common. "c94298f41eba3919052c3e97c48d6292c9aef919" and "d4120ccf0c808e28aac8907bcff4a2dfe2823b3e" have entirely different histories.

8 changed files with 0 additions and 232 deletions

View File

@ -28,13 +28,3 @@ http://192.168.2.212:3000/tigeren/
]
}
# Build with registry tag
docker build -t 192.168.2.212:3000/tigeren/nextav:latest .
docker build -t 192.168.2.212:3000/tigeren/nextav:v1.0.0 .
```bash
# Push latest
docker push 192.168.2.212:3000/tigeren/nextav:latest
# Push versioned
docker push 192.168.2.212:3000/tigeren/nextav:v1.0.0

Binary file not shown.

View File

@ -1,8 +0,0 @@
http://metatube.xorbit.link:9300/
https://metatube.xorbitlab.xyz:8443
https://metatube.xorbitlab.xyz
http://gianode3.xorbit.link:9300/
https://ntfy.xorbitlab.xyz
http://mainnode.xorbit.link:8083

View File

@ -1,52 +0,0 @@
{
"log": {
"level": "info"
},
"dns": {
"servers": [
{
"address": "tls://8.8.8.8"
}
]
},
"inbounds": [
{
"type": "tuic",
"listen": "::",
"listen_port": 8444,
"users": [
{
"uuid": "1ddd6055-bc88-4086-a24a-b97324adf140",
"password": "ckdoacnioemskiwn"
}
],
"congestion_control": "bbr",
"tls": {
"enabled": true,
"alpn": [
"h3"
],
"certificate_path": "/root/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/usnode1.xorbit.link/usnode1.xorbit.link.crt",
"key_path": "/root/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/usnode1.xorbit.link/usnode1.xorbit.link.key"
}
}
],
"outbounds": [
{
"type": "direct"
},
{
"type": "dns",
"tag": "dns-out"
}
],
"route": {
"rules": [
{
"protocol": "dns",
"outbound": "dns-out"
}
]
}
}

View File

@ -1,6 +0,0 @@
# Copy the link address for the correct .deb file from GitHub
wget https://github.com/SagerNet/sing-box/releases/download/v1.9.7/sing-box_1.9.7_linux_amd64.deb
# Install the downloaded package
sudo dpkg -i sing-box_1.9.7_linux_amd64.deb

View File

@ -1,52 +0,0 @@
{
"log": {
"level": "info"
},
"dns": {
"servers": [
{
"address": "tls://8.8.8.8"
}
]
},
"inbounds": [
{
"type": "tuic",
"listen": "::",
"listen_port": 8444,
"users": [
{
"uuid": "1ddd6055-bc88-4086-a24a-b97324adf140",
"password": "ckdoacnioemskiwn"
}
],
"congestion_control": "bbr",
"tls": {
"enabled": true,
"alpn": [
"h3"
],
"certificate_path": "/root/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/canode1.murmured.us/canode1.murmured.us.crt",
"key_path": "/root/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/canode1.murmured.us/canode1.murmured.us.key"
}
}
],
"outbounds": [
{
"type": "direct"
},
{
"type": "dns",
"tag": "dns-out"
}
],
"route": {
"rules": [
{
"protocol": "dns",
"outbound": "dns-out"
}
]
}
}

View File

@ -1,52 +0,0 @@
{
"log": {
"level": "info"
},
"dns": {
"servers": [
{
"address": "tls://8.8.8.8"
}
]
},
"inbounds": [
{
"type": "tuic",
"listen": "::",
"listen_port": 8444,
"users": [
{
"uuid": "1ddd6055-bc88-4086-a24a-b97324adf140",
"password": "ckdoacnioemskiwn"
}
],
"congestion_control": "bbr",
"tls": {
"enabled": true,
"alpn": [
"h3"
],
"certificate_path": "/root/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/jpnode1.murmured.us/jpnode1.murmured.us.crt",
"key_path": "/root/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/jpnode1.murmured.us/jpnode1.murmured.us.key"
}
}
],
"outbounds": [
{
"type": "direct"
},
{
"type": "dns",
"tag": "dns-out"
}
],
"route": {
"rules": [
{
"protocol": "dns",
"outbound": "dns-out"
}
]
}
}

View File

@ -1,52 +0,0 @@
{
"log": {
"level": "info"
},
"dns": {
"servers": [
{
"address": "tls://8.8.8.8"
}
]
},
"inbounds": [
{
"type": "tuic",
"listen": "::",
"listen_port": 8444,
"users": [
{
"uuid": "1ddd6055-bc88-4086-a24a-b97324adf140",
"password": "ckdoacnioemskiwn"
}
],
"congestion_control": "bbr",
"tls": {
"enabled": true,
"alpn": [
"h3"
],
"certificate_path": "/root/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/krnode1.murmured.us/krnode1.murmured.us.crt",
"key_path": "/root/.local/share/caddy/certificates/acme-v02.api.letsencrypt.org-directory/krnode1.murmured.us/krnode1.murmured.us.key"
}
}
],
"outbounds": [
{
"type": "direct"
},
{
"type": "dns",
"tag": "dns-out"
}
],
"route": {
"rules": [
{
"protocol": "dns",
"outbound": "dns-out"
}
]
}
}