Jump to content

outsider

Members
  • Posts

    148
  • Joined

  • Last visited

Posts posted by outsider

  1. The new docs wiki is looking great!

    What framework was used to create them?

    I'm looking to create a similar wiki for my site, and would like to use the same framework.

  2. I got it working.
    It was the permissions. Need to make sure 0770 is set for permission and user:group is set to 33:33 (which translates to sshd:sshd).

     

    Though for some strange reason both the permissions and user:group seem to get reset every so often to 0777 and nobody:users (which seems to be the UnRaid defaults). 

    Anyone know why this permissions reset happens?

    • Like 1
  3. I'm getting errors after the log says that Nextcloud was successfully installed.
    Anyone figure out how to solve this?
    i've tried several times, and get the same error. I've also followed the instructions here on how to properly reset an instance, but to no avail.
     

    nc: getaddrinfo: Name does not resolve
    Waiting for database to start...
    + '[' -f /dev-dri-group-was-added ']'
    ++ find /dev -maxdepth 1 -mindepth 1 -name dri
    + '[' -n '' ']'
    + set +x
    Installing imagemagick via apk...
    Enabling Imagick...
    Configuring Redis as session handler...
    Setting php max children...
    Initializing nextcloud 25.0.3.2 ...
    Initializing finished
    New nextcloud instance
    Installing with PostgreSQL database
    starting nextcloud installation
    Nextcloud was successfully installed
    Install errors: {"reqId":"11Gx1vlZSeXu8UUsqeos","level":3,"time":"2023-02-06T17:06:05+00:00","remoteAddr":"","user":"admin","app":"PHP","method":"","url":"--","message":"exif_read_data(): File not supported at /var/www/html/lib/private/Metadata/Provider/ExifProvider.php#59","userAgent":"--","version":"25.0.3.2","exception":{"Exception":"Error","Message":"exif_read_data(): File not supported at /var/www/html/lib/private/Metadata/Provider/ExifProvider.php#59","Code":0,"Trace":[{"function":"onError","class":"OC\\Log\\ErrorHandler","type":"::","args":[2,"exif_read_data(): File not supported","/var/www/html/lib/private/Metadata/Provider/ExifProvider.php",59]},{"file":"/var/www/html/lib/private/Metadata/Provider/ExifProvider.php","line":59,"function":"exif_read_data","args":[null,"ANY_TAG",true]},{"file":"/var/www/html/lib/private/Metadata/MetadataManager.php","line":68,"function":"execute","class":"OC\\Metadata\\Provider\\ExifProvider","type":"->","args":[{"__class__":"OC\\Files\\Node\\File"}]},{"file":"/var/www/html/lib/private/Metadata/FileEventListener.php","line":101,"function":"generateMetadata","class":"OC\\Metadata\\MetadataManager","type":"->","args":[{"__class__":"OC\\Files\\Node\\File"},"*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/EventDispatcher/ServiceEventListener.php","line":87,"function":"handle","class":"OC\\Metadata\\FileEventListener","type":"->","args":[{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"}]},{"file":"/var/www/html/3rdparty/symfony/event-dispatcher/EventDispatcher.php","line":251,"function":"__invoke","class":"OC\\EventDispatcher\\ServiceEventListener","type":"->","args":[{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"},"OCP\\Files\\Events\\Node\\NodeWrittenEvent",{"__class__":"Symfony\\Component\\EventDispatcher\\EventDispatcher"}]},{"file":"/var/www/html/3rdparty/symfony/event-dispatcher/EventDispatcher.php","line":73,"function":"callListeners","class":"Symfony\\Component\\EventDispatcher\\EventDispatcher","type":"->","args":[[{"__class__":"Closure"}],"OCP\\Files\\Events\\Node\\NodeWrittenEvent",{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"}]},{"file":"/var/www/html/lib/private/EventDispatcher/EventDispatcher.php","line":88,"function":"dispatch","class":"Symfony\\Component\\EventDispatcher\\EventDispatcher","type":"->","args":[{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"},"OCP\\Files\\Events\\Node\\NodeWrittenEvent"]},{"file":"/var/www/html/lib/private/EventDispatcher/EventDispatcher.php","line":100,"function":"dispatch","class":"OC\\EventDispatcher\\EventDispatcher","type":"->","args":["OCP\\Files\\Events\\Node\\NodeWrittenEvent",{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"}]},{"file":"/var/www/html/lib/private/Files/Node/HookConnector.php","line":118,"function":"dispatchTyped","class":"OC\\EventDispatcher\\EventDispatcher","type":"->","args":[{"__class__":"OCP\\Files\\Events\\Node\\NodeWrittenEvent"}]},{"file":"/var/www/html/lib/private/legacy/OC_Hook.php","line":106,"function":"postWrite","class":"OC\\Files\\Node\\HookConnector","type":"->","args":[["/Nextcloud.png"]]},{"file":"/var/www/html/lib/private/Files/View.php","line":641,"function":"emit","class":"OC_Hook","type":"::","args":["OC_Filesystem","post_write",["/Nextcloud.png"]]},{"file":"/var/www/html/lib/private/Files/View.php","line":692,"function":"emit_file_hooks_post","class":"OC\\Files\\View","type":"->","args":[true,"/admin/files/Nextcloud.png"]},{"file":"/var/www/html/lib/private/Files/Node/File.php","line":71,"function":"file_put_contents","class":"OC\\Files\\View","type":"->","args":["/admin/files/Nextcloud.png",null]},{"file":"/var/www/html/lib/private/legacy/OC_Util.php","line":257,"function":"putContent","class":"OC\\Files\\Node\\File","type":"->","args":[null]},{"file":"/var/www/html/lib/private/legacy/OC_Util.php","line":216,"function":"copyr","class":"OC_Util","type":"::","args":["/var/www/html/core/skeleton",{"__class__":"OC\\Files\\Node\\Folder"}]},{"file":"/var/www/html/lib/private/User/Session.php","line":553,"function":"copySkeleton","class":"OC_Util","type":"::","args":["*** sensitive parameters replaced ***",{"__class__":"OC\\Files\\Node\\Folder"}]},{"file":"/var/www/html/lib/private/User/Session.php","line":403,"function":"prepareUserLogin","class":"OC\\User\\Session","type":"->","args":[true,"*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/User/Session.php","line":616,"function":"completeLogin","class":"OC\\User\\Session","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/User/Session.php","line":355,"function":"loginWithPassword","class":"OC\\User\\Session","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/Setup.php","line":433,"function":"login","class":"OC\\User\\Session","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/core/Command/Maintenance/Install.php","line":105,"function":"install","class":"OC\\Setup","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/3rdparty/symfony/console/Command/Command.php","line":255,"function":"execute","class":"OC\\Core\\Command\\Maintenance\\Install","type":"->","args":[{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/3rdparty/symfony/console/Application.php","line":1009,"function":"run","class":"Symfony\\Component\\Console\\Command\\Command","type":"->","args":[{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/3rdparty/symfony/console/Application.php","line":273,"function":"doRunCommand","class":"Symfony\\Component\\Console\\Application","type":"->","args":[{"__class__":"OC\\Core\\Command\\Maintenance\\Install"},{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/3rdparty/symfony/console/Application.php","line":149,"function":"doRun","class":"Symfony\\Component\\Console\\Application","type":"->","args":[{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/lib/private/Console/Application.php","line":213,"function":"run","class":"Symfony\\Component\\Console\\Application","type":"->","args":[{"__class__":"Symfony\\Component\\Console\\Input\\ArgvInput"},{"__class__":"Symfony\\Component\\Console\\Output\\ConsoleOutput"}]},{"file":"/var/www/html/console.php","line":100,"function":"run","class":"OC\\Console\\Application","type":"->","args":[]},{"file":"/var/www/html/occ","line":11,"args":["/var/www/html/console.php"],"function":"require_once"}],"File":"/var/www/html/lib/private/Log/ErrorHandler.php","Line":92,"CustomMessage":"--"}}
    Applying default settings...
    Your data directory is readable by other users.
    Please change the permissions to 0770 so that the directory cannot be listed by other users.
    
    An unhandled exception has been thrown:
    Exception: Environment not properly prepared. in /var/www/html/lib/private/Console/Application.php:166
    
    ace:
    #0 /var/www/html/console.php(99): OC\Console\Application->loadCommands(Object(Symfony\Component\Console\Input\ArgvInput), Object(Symfony\Component\Console\Output\ConsoleOutput))
    #1 /var/www/html/occ(11): require_once('/var/www/html/c...')
    #2 {main}Your data directory is readable by other users.
    Please change the permissions to 0770 so that the directory cannot be listed by other users.
    
    An unhandled exception has been thrown:
    Exception: Environment not properly prepared. in /var/www/html/lib/private/Console/Application.php:166
    
    ace:
    #0 /var/www/html/console.php(99): OC\Console\Application->loadCommands(Object(Symfony\Component\Console\Input\ArgvInput), Object(Symfony\Component\Console\Output\ConsoleOutput))
    #1 /var/www/html/occ(11): require_once('/var/www/html/c...')
    #2 {main}Your data directory is readable by other users.
    Please change the permissions to 0770 so that the directory cannot be listed by other users.

     

  4. Anyone here using the `Backblaze_Personal_backup` container?
    I'm supposed to see a "Drive D" in the Backblaze software (this should point to the storage array) but I don't see a "Drive D"

    I see Drive C and Z. 
    Drive C is the wine emulated drive C contents, and drive Z is the root of the docker container.

     

    Am I missing something?


    image.png.86edb1df7e21f5234a10b2f9a483baf9.png

     

    image.thumb.png.779d930499d62f1274db7e80ce9f0754.png

  5. I was looking into the Synolgy RAID systems and they have an antivirus scanner to check the data on the array at scheduled intervals.

    The virus scanner they use is ClamAV so I guess it can be used to check more then just emails.

    They also have a McAfee virus scan... I didn't know McAfee has a linux version of their scanning software.

    https://www.synology.com/en-us/dsm/app_packages/all_app

     

    If there is any demand, I'll take a shot at making a ClamAV container (or is that email only?).

    Anyone else interested in having a virus scanner (even if it only scans for windows viruses) docker running on their system?

    Let's show johnodon that there is some interest for such a tool.

  6. But likely, the OP is more concerned with a virus being downloaded say through deluge and then being executed on a Windows / Mac platform vs being executed directly on unRaid.  In that case, if you're using windows, then just mapping a share to a drive on through explorer should have your anti-virus automatically check if configured to do so.

    Exactly.

    I'm not worried about UnRAID getting a virus. It's the storage that it provides what I want to keep clean since it is accessed mainly by other windows boxes which can easily get infected.

     

    I don't need the entire unraid archive to be continually scanned. Just an incoming folder where data gets dropped of by various people.

  7. Are there any plugins or docker containers that provide the functionality of a virus scanner to that checks all new downloaded files added to a certain directory?

    I searched in the "Community Applications" plugin from withing UnRAID, but nothing came up, so I thought I'd ask.

    I'd like to set something up which virus checks every file that gets dumped in the incoming folder but the several users in the household.

     

    Is there something available that does this for UnRAID?

  8. I've noticed some weird behavior with the "CrashPlan-desktop" docker file.

    If the "CrashPlan-desktop" is running while there is a sudden loss of power to the unraid system, I can't rdp back into it when the system boots up again.

    I have to uninstall the "CrashPlan-desktop" image, and re-install it to get rdp access working again.

     

    Is there something else I can be doing to the "CrashPlan-docker" image to FIX things rather then just reload/reinstall the image file?

  9.  

    I had this exact problem and you need to edit 2 files:

     

    ui.info is the first file. Replace that IP in there with: 172.17.42.1

     

    the other file is:

     

    my.service.xml , in there you need to replace 127.x.x.x with 0.0.0.0

     

    Not sure why it works, but it did for me.

    I found the "my.service.xml" file in the conf folder of the crashplan container, but I can't find the "ui.info" file?

    Where is the "ui.info" file located?

×
×
  • Create New...