git clone [email protected]:YOUR-USERNAME/YOUR-FORKED-REPO.git
cd into/cloned/fork-repo
git remote add upstream git://github.com/ORIGINAL-DEV-USERNAME/REPO-YOU-FORKED-FROM.git
git fetch upstream
git clone [email protected]:YOUR-USERNAME/YOUR-FORKED-REPO.git
cd into/cloned/fork-repo
git remote add upstream git://github.com/ORIGINAL-DEV-USERNAME/REPO-YOU-FORKED-FROM.git
git fetch upstream
This is a bash script to act as a Cloudflare DDNS client, useful replacement for ddclient.
cfupdater files to /usr/local/bin-v4 to cfupdater in the following systemd service unit.-v6 to cfupdater in the following systemd service unit.-dualstack to cfupdater in the following systemd service unit.chmod +x /usr/local/bin/cfupdater/etc/systemd/system/, the cfupdate.service is shown as an example.Upgrade nodejs to v12.x.x
$ sudo npm install -g n
$ sudo n lts
Install hsd
#Country ban with UFW#
Grab your different country ip addresses and save as Linux IPTables
http://www.ip2location.com/free/visitor-blocker
##Add country## Run the following command
Install Notepad++ (check "set as default HTML editor" to replace Notepad in IE).
Run Notepad++, update its plugins, and install "NppExec" via Plugins, Plugin Manager.
Download DBGpPlugin . Place in C:\Program Files (x86)\Notepad++\plugins\DBGpPlugin
Use this link to download a modified version of the Komodo Remote Debugging Package. Place in plugin directory. (Unmodified Komodo package does not work with DBGpPlugin) Also contains DBGpPlugin
Enter these scripts for Python debugging:
Press F6 to create a NppExec Execute script, save as "Run Python":
cd "$(CURRENT_DIRECTORY)"
| # attempt 6, success | |
| # relies on Magisk auto start script | |
| # pause script to give wireguard time to autostart | |
| bullhead:/ # cat /data/adb/service.d/prep_gateway.sh | |
| #!/system/bin/sh | |
| sleep 2m | |
| su -c 'iptables -F tetherctrl_FORWARD' | |
| su -c 'sysctl -w net.ipv4.ip_forward=1' | |
| su -c 'iptables -A FORWARD -i tun0 -j ACCEPT' | |
| su -c 'iptables -t nat -A POSTROUTING -o rmnet_data0 -j MASQUERADE' |
Just thought I'd put together some detail on deploying Tailscale using Docker and Portainer. These bits-and-pieces are available elsewhere, but not together, so hopefully this will save someone a bit of time if you'd like to add Tailscale to an existing Docker install:
Here's my annotated recommended docker-compose, to use with Portainer-Stacks. Note that I'm not using a pre-made Auth Key. I started that way, but realized it was very easy to simply check the Portainer log for the tailscaled container once the stack is running. In that log you'll see the standard Auth link that you can use to authorize the container. This way you don't need to create a key in advance, or create a reusable key that introduces a security risk:
version: '3.9'
services:
tailscale:
image: tailscale/tailscale
container_name: tailscaled