[tor-commits] [community/translations] content updates

emmapeel at torproject.org emmapeel at torproject.org
Sat Oct 30 07:01:27 UTC 2021


commit 00e9358488b433ce8d2c7f71a94f3f78c8ec9340
Author: emma peel <emma.peel at riseup.net>
Date:   Sat Oct 30 08:48:48 2021 +0200

    content updates
---
 content/relay/setup/guard/centosrhel/contents.lr   | 78 ------------------
 .../setup/guard/centosrhel/updates/contents.lr     | 94 ----------------------
 content/relay/setup/guard/debianubuntu/contents.lr | 60 --------------
 .../setup/guard/debianubuntu/updates/contents.lr   | 63 ---------------
 databags/onions.ini                                |  2 +-
 5 files changed, 1 insertion(+), 296 deletions(-)

diff --git a/content/relay/setup/guard/centosrhel/contents.lr b/content/relay/setup/guard/centosrhel/contents.lr
deleted file mode 100644
index e5e7afd..0000000
--- a/content/relay/setup/guard/centosrhel/contents.lr
+++ /dev/null
@@ -1,78 +0,0 @@
-_model: page
----
-color: primary
----
-title: CentOS/RHEL
----
-body:
-
-# 1. Enable Automatic Software Updates
-
-One of the most important things to keeps your relay secure is to install security updates timely and ideally automatically so you can not forget about it. Follow the instructions to enable [automatic software updates](updates) for your operating system.
-
-# 2. Enable the EPEL repository
-
-To install `tor` package on CentOS/RHEL, you need to install the [EPEL](https://fedoraproject.org/wiki/EPEL) repository first:
-
-`yum install epel-release`
-
-# 3. Add the following to /etc/yum.repos.d/tor.repo and then install the tor package.
-
-```
-[tor]
-name=Tor for Enterprise Linux $releasever - $basearch
-baseurl=https://rpm.torproject.org/centos/$releasever/$basearch
-enabled=1
-gpgcheck=1
-gpgkey=https://rpm.torproject.org/centos/public_gpg.key
-cost=100
-```
-
-`yum install tor`
-
-When you install the first package from the EPEL repository you will be asked about verifying the EPEL GPG signing key.
-Please ensure the key matches with the one available on the [Fedora Project website](https://getfedora.org/keys/).
-
-# 4. Put the tor configuration file `/etc/tor/torrc` in place
-
-```
-#change the nickname "myNiceRelay" to a name that you like
-Nickname myNiceRelay
-ORPort 9001
-SocksPort 0
-ExitRelay 0
-# Change the email address below and be aware that it will be published
-ContactInfo tor-operator at your-emailaddress-domain
-```
-
-# 5. Enable and start your Tor relay
-
-CentOS 7 / RHEL 7:
-
-```
-systemctl enable tor
-systemctl start tor
-```
-
-CentOS 6 / RHEL 6:
-
-```
-service tor enable
-service tor start
-```
-
-# 6. Final notes
-
-If you are having trouble setting up your relay, have a look at our [help section](/relay/getting-help/).
-If your relay is now running, check out the [post-install](/relay/setup/post-install/) notes.
-
----
-html: two-columns-page.html
----
-key: 1
----
-section: Middle/Guard relay
----
-section_id: relay-operations
----
-subtitle: How to deploy a middle/Guard relay on CentOS/RHEL
diff --git a/content/relay/setup/guard/centosrhel/updates/contents.lr b/content/relay/setup/guard/centosrhel/updates/contents.lr
deleted file mode 100644
index 7f67dcc..0000000
--- a/content/relay/setup/guard/centosrhel/updates/contents.lr
+++ /dev/null
@@ -1,94 +0,0 @@
-_model: page
----
-color: primary
----
-title: RPM Distributions
----
-body:
-
-# CentOS and RHEL 8 or later versions
-
-For CentOS and RHEL 8 or later versions, the dnf-automatic package is the preferred approach:
-
-```
-dnf install dnf-automatic
-```
-
-In /etc/dnf/automatic.conf set:
-
-```
-download_updates = yes
-apply_updates = yes
-```
-
-Enable and start automatic updates via:
-
-```
-systemctl enable --now dnf-automatic.timer
-```
-
-Check status of dnf-automatic:
-```
-systemctl list-timers *dnf-*
-```
-
-# CentOS and RHEL 7 or earlier versions
-
-For CentOS and RHEL 7 or earlier versions, the yum-cron package is the preferred approach:
-
-```
-yum install yum-cron
-```
-
-In /etc/yum/yum-cron.conf set:
-
-```
-download_updates = yes
-apply_updates = yes
-```
-
-Enable and start automatic updates via:
-
-```
-systemctl start yum-cron.service
-```
-
-# openSUSE
-
-First, you need to install the automatic update package
-
-```
-zypper install  yast2-online-update-configuration
-```
-
-Then start the configuration tool (ncurses based) with:
-
-```
-yast2 online_update_configuration
-```
-
-Enable the following settings:
-
-```
-    Automatic Online Update
-    Interval: Daily
-    Skip Interactive Patches
-    Agree with Licenses
-    Use delta rpms
-```
-
-Confirm your configuration with OK.
-
-The official openSUSE documentation can be found [here](https://doc.opensuse.org/documentation/leap/startup/single-html/book.opensuse.startup/index.html#sec-onlineupdate-you-automatically).
----
-html: two-columns-page.html
----
-key: 1
----
-section: Automatic Updates
----
-section_id: automatic-updates
----
-_slug: updates
----
-_discoverable: no
diff --git a/content/relay/setup/guard/debianubuntu/contents.lr b/content/relay/setup/guard/debianubuntu/contents.lr
deleted file mode 100644
index 884e4f9..0000000
--- a/content/relay/setup/guard/debianubuntu/contents.lr
+++ /dev/null
@@ -1,60 +0,0 @@
-_model: page
----
-color: primary
----
-title: Debian/Ubuntu
----
-body:
-
-# 1. Enable Automatic Software Updates
-
-One of the most important things to keeps your relay secure is to install security updates timely and ideally automatically so you can not forget about it.
-Follow the instructions to enable [automatic software updates](updates) for your operating system.
-
-# 2. Configure Tor Package Repository
-
-Enable the Torproject package repository by following the instructions **[here](https://support.torproject.org/apt/tor-deb-repo/)**.
-
-# 3. Package Installation
-
-Install the `tor` package:
-
-`apt update && apt install tor`
-
-# 4. Configuration File
-
-Put the configuration file `/etc/tor/torrc` in place:
-
-```
-#change the nickname "myNiceRelay" to a name that you like
-Nickname myNiceRelay
-ORPort 443
-ExitRelay 0
-SocksPort 0
-ControlSocket 0
-# Change the email address below and be aware that it will be published
-ContactInfo tor-operator at your-emailaddress-domain
-```
-
-# 5. Restart the Service
-
-Restart the tor daemon so your configuration changes take effect:
-
-`systemctl restart tor at default`
-
-# 6. Final notes
-
-If you are having trouble setting up your relay, have a look at our [help section](/relay/getting-help/).
-If your relay is now running, check out the [post-install](/relay/setup/post-install/) notes.
----
-html: two-columns-page.html
----
-key: 2
----
-section: Middle/Guard relay
----
-section_id: relay-operations
----
-subtitle: How to deploy a middle/Guard relay on Debian/Ubuntu
----
-_discoverable: yes
diff --git a/content/relay/setup/guard/debianubuntu/updates/contents.lr b/content/relay/setup/guard/debianubuntu/updates/contents.lr
deleted file mode 100644
index 34bda83..0000000
--- a/content/relay/setup/guard/debianubuntu/updates/contents.lr
+++ /dev/null
@@ -1,63 +0,0 @@
-_model: page
----
-color: primary
----
-title: Debian and Ubuntu
----
-_discoverable: no
----
-body:
-
-# 1. Install the required packages
-
-```
-apt-get install unattended-upgrades apt-listchanges
-```
-
-# 2.  Edit the configuration file
-
-Put the lines below into the configuration file /etc/apt/apt.conf.d/50unattended-upgrades, everything that was originally inside the generated file can be removed before you add the lines below.
-
-```
-Unattended-Upgrade::Origins-Pattern {
-    "origin=Debian,codename=${distro_codename},label=Debian-Security";
-    "origin=TorProject";
-};
-Unattended-Upgrade::Package-Blacklist {
-};
-```
-
-#3. Automatically reboot
-
-If you want to automatically reboot add the following at the the end of the file `/etc/apt/apt.conf.d/50unattended-upgrades`:
-
-```
-Unattended-Upgrade::Automatic-Reboot "true";
-```
-
-Update the file `/etc/apt/apt.conf.d/20auto-upgrades` with the following content
-
-```
-APT::Periodic::Update-Package-Lists "1";
-APT::Periodic::AutocleanInterval "5";
-APT::Periodic::Unattended-Upgrade "1";
-APT::Periodic::Verbose "1";
-```
-
-# 4. Test
-
-You can test your unattended-upgrades setup with the following command:
-
-```
-sudo unattended-upgrade -d
-```
----
-html: two-columns-page.html
----
-key: 1
----
-section: Automatic Updates
----
-section_id: automatic-updates
----
-_slug: updates
diff --git a/databags/onions.ini b/databags/onions.ini
index 5f1470b..d00380f 100644
--- a/databags/onions.ini
+++ b/databags/onions.ini
@@ -4,7 +4,7 @@ image = /static/images/onions/png/propublica.png
 label = ProPublica
 
 [nytimes]
-link = https://www.nytimes3xbfgragh.onion
+link = https://www.nytimesn7cgmftshazwhfgzm37qxb44r64ytbb2dj3x62d2lljsciiyd.onion
 image = /static/images/onions/png/nytimes.png
 label = The New York Times
 





More information about the tor-commits mailing list