[ proxy ] - clash config update

This commit is contained in:
zeaslity
2024-10-22 17:19:31 +08:00
parent 0db5616a0c
commit a1ce13fa13
5 changed files with 39 additions and 5 deletions

View File

@@ -352,7 +352,7 @@ install_docker() {
if [[ $linux_release_version == "centos" ]]; then if [[ $linux_release_version == "centos" ]]; then
## 安装docker的依赖 ## 安装docker的依赖
log "正在安装安装docker的依赖" log "正在安装安装docker的依赖"
install_demand_softwares yum-utils device-mapper-persistent-data lvm2 || return $? install_demand_softwares yum-utils device-mapper-persistent-data lvm2
colorEchoGreen "----------docker的依赖安装完成----------" colorEchoGreen "----------docker的依赖安装完成----------"
SplitGreen SplitGreen
@@ -990,7 +990,7 @@ get_octopus_agent_latest_version(){
FunctionStart "查询 Octopus Agent 最新的版本!" FunctionStart "查询 Octopus Agent 最新的版本!"
octopus_latest_version=$(curl -s -timeout=5 "${agent_version_url}") octopus_latest_version=$(curl -s -timeout=5 "${agent_version_url}")
if [[ $octopus_latest_version -eq "123" ]]; then if [ "$octopus_latest_version" == "123" ]; then
echo "find_octopus_latest_version error ! " echo "find_octopus_latest_version error ! "
return 233 return 233
else else

View File

@@ -11,7 +11,7 @@ SayHello -Name "Test PowerShell"
function SetMinioAlias function SetMinioAlias
{ {
mc.exe alias set local http://10.250.0.100:9000 cmii B#923fC7mk # mc.exe alias set local http://10.250.0.100:9000 cmii B#923fC7mk
mc.exe alias set tc-sh http://42.192.52.227:9000 cmii B#923fC7mk mc.exe alias set tc-sh http://42.192.52.227:9000 cmii B#923fC7mk
mc.exe alias set seoul-1 https://cnk8d6fazu16.compat.objectstorage.ap-seoul-1.oraclecloud.com aed62d24d85e2da809ce02bf272420ba4ed74820 rQdEcn69K049+JkA1IGoQmC1k8zma8zfWvZvVS0h144= mc.exe alias set seoul-1 https://cnk8d6fazu16.compat.objectstorage.ap-seoul-1.oraclecloud.com aed62d24d85e2da809ce02bf272420ba4ed74820 rQdEcn69K049+JkA1IGoQmC1k8zma8zfWvZvVS0h144=
} }
@@ -32,7 +32,7 @@ foreach ($file in $files)
{ {
Write-Output $currentDirectory\$file Write-Output $currentDirectory\$file
Write-Host "" Write-Host ""
mc.exe cp $currentDirectory\$file local/octopus/ # mc.exe cp $currentDirectory\$file local/octopus/
mc.exe cp $currentDirectory\$file tc-sh/octopus/ mc.exe cp $currentDirectory\$file tc-sh/octopus/
mc.exe cp $currentDirectory\$file seoul-1/seoul/ mc.exe cp $currentDirectory\$file seoul-1/seoul/
Write-Host "" Write-Host ""

View File

@@ -21,6 +21,7 @@ dns:
# 如果“fallback-filter.geoip”为false则如果与“fallbback-filter.ipcidr”不匹配则始终使用“nameserver”名称服务器的结果。 # 如果“fallback-filter.geoip”为false则如果与“fallbback-filter.ipcidr”不匹配则始终使用“nameserver”名称服务器的结果。
#这是针对DNS污染攻击的对策。 #这是针对DNS污染攻击的对策。
nameserver: # 解析国内的网址 nameserver: # 解析国内的网址
- 119.29.29.29
- 223.5.5.5 - 223.5.5.5
- 114.114.114.114 - 114.114.114.114
- 1.1.1.1 - 1.1.1.1
@@ -53,7 +54,6 @@ dns:
proxies: proxies:
- {"type":"vmess","name":"us-central-free","ws-opts":{"path":"/vmess"},"server":"northflank.107421.xyz","port":443,"uuid":"de04add9-5c68-8bab-950c-08cd5320df18","alterId":0,"cipher":"auto","network":"ws","tls":true} - {"type":"vmess","name":"us-central-free","ws-opts":{"path":"/vmess"},"server":"northflank.107421.xyz","port":443,"uuid":"de04add9-5c68-8bab-950c-08cd5320df18","alterId":0,"cipher":"auto","network":"ws","tls":true}
- {"type":"trojan","name":"LosAngels-BanH-Trojan","server":"89.208.251.209","port":29999,"password":"v2ryStr@ngPa.ss","udp":true,"skip-cert-verify":false,"sni":"xx.l4.cc.nn.107421.xyz","network":"tcp","ws-opts":{"headers":{"host":"xx.l4.cc.nn.107421.xyzh2,http/1.1"}}} - {"type":"trojan","name":"LosAngels-BanH-Trojan","server":"89.208.251.209","port":29999,"password":"v2ryStr@ngPa.ss","udp":true,"skip-cert-verify":false,"sni":"xx.l4.cc.nn.107421.xyz","network":"tcp","ws-opts":{"headers":{"host":"xx.l4.cc.nn.107421.xyzh2,http/1.1"}}}
- {"type":"trojan","name":"Seoul-Trojan","server":"140.238.14.103","port":443,"password":"V2ryStr0ngP0ss","udp":true,"skip-cert-verify":false,"sni":"xx.s4.cc.hh.107421.xyz","network":"tcp","ws-opts":{"headers":{"host":"xx.s4.cc.hh.107421.xyzh2,http/1.1"}}} - {"type":"trojan","name":"Seoul-Trojan","server":"140.238.14.103","port":443,"password":"V2ryStr0ngP0ss","udp":true,"skip-cert-verify":false,"sni":"xx.s4.cc.hh.107421.xyz","network":"tcp","ws-opts":{"headers":{"host":"xx.s4.cc.hh.107421.xyzh2,http/1.1"}}}
- {"type":"trojan","name":"Osaka-Trojan","server":"140.238.14.103","port":19997,"password":"V2ryStr0ngP0ss","udp":true,"skip-cert-verify":false,"sni":"xx.s4.cc.hh.107421.xyz","network":"tcp","ws-opts":{"headers":{"host":"xx.s4.cc.hh.107421.xyzh2,http/1.1"}}} - {"type":"trojan","name":"Osaka-Trojan","server":"140.238.14.103","port":19997,"password":"V2ryStr0ngP0ss","udp":true,"skip-cert-verify":false,"sni":"xx.s4.cc.hh.107421.xyz","network":"tcp","ws-opts":{"headers":{"host":"xx.s4.cc.hh.107421.xyzh2,http/1.1"}}}

View File

@@ -0,0 +1,20 @@
#!/bin/bash
namespace=uavcloud-demo
app_name_list=(uav-gateway cmii-uav-notice cmii-uas-gateway cmii-uas-lifecycle uav-platform-uas)
echo ""
echo "current namespace is $namespace"
echo ""
for app in ${app_name_list[@]};do
echo "current app is $app"
pod_name=$(kubectl -n ${namespace} get pods | grep ${app} | awk '{print$1}' | head -n1)
echo "pod name of app is => $pod_name"
kubectl -n ${namespace} describe pod ${pod_name} | grep "Image ID:" | awk '{print $3}'
echo ""
done

View File

@@ -0,0 +1,14 @@
#!/bin/bash
/snap - 存放已安装的 Snap 包。
/var/lib/snapd - Snap Daemon 的数据存储,包括配置和状态信息。
/etc/snapd - Snap Daemon 的配置文件。
/usr/lib/snapd - Snap Daemon 的二进制文件和库。
/home/<user>/snap - 用户级别的 Snap 应用数据。
folder_list=(/snap /var/lib/snapd /etc/snapd /usr/lib/snapd /home/wdd /etc/nginx /lib/systemd/system/ /data /usr/local/bin /usr/bin /usr/sbin /var/lib/docker /usr/local/)
for folder in ${folder_list[@]};do
echo "current folder is ${folder}"
rsync -avz root@10.250.0.100:${folder} ${folder}
done