SharedInboxController
Request
GET Parameters
None
POST Parameters
None
Uploaded Files
None
Request Attributes
Key | Value |
---|---|
_controller | "App\Controller\ActivityPub\SharedInboxController" |
_firewall_context | "security.firewall.map.context.main" |
_route | "ap_shared_inbox" |
_route_params | [] |
_security_firewall_run | "_security_main" |
_stopwatch_token | "8642d3" |
Request Headers
Header | Value |
---|---|
accept | "*/*" |
accept-encoding | "gzip" |
content-length | "3526" |
content-type | "application/activity+json" |
date | "Sat, 31 May 2025 08:35:00 GMT" |
digest | "SHA-256=ukqtJrndb2cxw0u1A8PmURNV1xt/qx8D4R8K6gWrc1U=" |
host | "kbin.spritesserver.nl" |
signature | "keyId="https://lemmy.world/c/selfhosted#main-key",algorithm="hs2019",headers="(request-target) content-type date digest host",signature="lnBk7/E2hXS9B94k21eW55Zd7Cjzo07RifgFoxwFHdIwvUg9j4v0zNyLtdvJPU7ZsrtAtu0kGdjZI8QGlUAetxJ9Ry6Kp6BuPzJhAsXg5bZOnjcD7ROqxqwnNsTgIIkSb7v8cjvI8Q/y3B0LY2Ngfp4ykg6HUONRHk6H69vN9LjGzrcxLN0i4V3x9jtaZex1UJ+Y/X24S4k8dukG8G2LR4hrTB5JwP8+6w5pH/URv8Ob+4DwBBKSY6GTql7bCekNXQStpaJ1xllwap/llRqXH/PqIALC4P70keZNuj9MdRJlO0AHk234Zi66W9JblJhwwiCNjHgl+cjST9pF6QrzWA=="" |
traceparent | "00-67f81835a86533f861ec436d77a49c19-61f800020295d536-01" |
tracestate | "" |
user-agent | "Lemmy/0.19.11-19-g2895f45e8; +https://lemmy.world" |
x-php-ob-level | "1" |
Request Content
Pretty
{ "@context": [ "https:\/\/join-lemmy.org\/context.json", "https:\/\/www.w3.org\/ns\/activitystreams" ], "actor": "https:\/\/lemmy.world\/c\/selfhosted", "to": [ "https:\/\/www.w3.org\/ns\/activitystreams#Public" ], "object": { "id": "https:\/\/lemm.ee\/activities\/create\/e9cd4f01-8e3a-42d3-908c-355622d48558", "actor": "https:\/\/lemm.ee\/u\/tiramichu", "@context": [ "https:\/\/join-lemmy.org\/context.json", "https:\/\/www.w3.org\/ns\/activitystreams" ], "to": [ "https:\/\/www.w3.org\/ns\/activitystreams#Public" ], "object": { "type": "Note", "id": "https:\/\/lemm.ee\/comment\/20831723", "attributedTo": "https:\/\/lemm.ee\/u\/tiramichu", "to": [ "https:\/\/www.w3.org\/ns\/activitystreams#Public" ], "cc": [ "https:\/\/lemmy.world\/c\/selfhosted", "https:\/\/lemmy.world\/u\/nix98" ], "content": "<p>Wireguard doesn\u2019t necessarily need to have those limitations, but it will depend in part how your VPN profile is set up.<\/p>\n<p>If you configured your wireguard profile to always route all traffic over the VPN then yeah, you won\u2019t be able to access local networks. And maybe that\u2019s what you want, in which case fine :)<\/p>\n<p>But you can also set the profile to only route traffic that is destined for an address on the target network (I.e your home network) and the rest will route as normal.<\/p>\n<p>This second type of routing only works properly however when there are no address conflicts between the network you are on (i.e. someone else\u2019s WiFi) and your home network.<\/p>\n<p>For this reason if you want to do this it\u2019s best to avoid on your <em>own<\/em> home network the common ranges almost everyone uses as default, i.e. 192.168.0.* and 10.0.0.*<\/p>\n<p>I reconfigured my home network to 192.168.22.* for that reason and now I never hit conflicts and VPN can stay on all the time but only traversed when needed.<\/p>\n", "inReplyTo": "https:\/\/lemmy.world\/comment\/17374875", "mediaType": "text\/html", "source": { "content": "Wireguard doesn't necessarily need to have those limitations, but it will depend in part how your VPN profile is set up.\n\nIf you configured your wireguard profile to always route all traffic over the VPN then yeah, you won't be able to access local networks. And maybe that's what you want, in which case fine :)\n\nBut you can also set the profile to only route traffic that is destined for an address on the target network (I.e your home network) and the rest will route as normal.\n\nThis second type of routing only works properly however when there are no address conflicts between the network you are on (i.e. someone else's WiFi) and your home network.\n\nFor this reason if you want to do this it's best to avoid on your _own_ home network the common ranges almost everyone uses as default, i.e. 192.168.0.* and 10.0.0.*\n\nI reconfigured my home network to 192.168.22.* for that reason and now I never hit conflicts and VPN can stay on all the time but only traversed when needed.\n", "mediaType": "text\/markdown" }, "published": "2025-05-31T08:34:22.500Z", "tag": [ { "href": "https:\/\/lemmy.world\/u\/nix98", "name": "@nix98@lemmy.world", "type": "Mention" } ], "distinguished": false, "language": { "identifier": "en", "name": "English" }, "audience": "https:\/\/lemmy.world\/c\/selfhosted", "attachment": [] }, "cc": [ "https:\/\/lemmy.world\/c\/selfhosted", "https:\/\/lemmy.world\/u\/nix98" ], "tag": [ { "href": "https:\/\/lemmy.world\/u\/nix98", "name": "@nix98@lemmy.world", "type": "Mention" } ], "type": "Create", "audience": "https:\/\/lemmy.world\/c\/selfhosted" }, "cc": [ "https:\/\/lemmy.world\/c\/selfhosted\/followers" ], "type": "Announce", "id": "https:\/\/lemmy.world\/activities\/announce\/create\/b854cb0a-62f5-4ea4-9ef9-36a1fbf480bc" }
Raw
{"@context":["https://join-lemmy.org/context.json","https://www.w3.org/ns/activitystreams"],"actor":"https://lemmy.world/c/selfhosted","to":["https://www.w3.org/ns/activitystreams#Public"],"object":{"id":"https://lemm.ee/activities/create/e9cd4f01-8e3a-42d3-908c-355622d48558","actor":"https://lemm.ee/u/tiramichu","@context":["https://join-lemmy.org/context.json","https://www.w3.org/ns/activitystreams"],"to":["https://www.w3.org/ns/activitystreams#Public"],"object":{"type":"Note","id":"https://lemm.ee/comment/20831723","attributedTo":"https://lemm.ee/u/tiramichu","to":["https://www.w3.org/ns/activitystreams#Public"],"cc":["https://lemmy.world/c/selfhosted","https://lemmy.world/u/nix98"],"content":"<p>Wireguard doesn’t necessarily need to have those limitations, but it will depend in part how your VPN profile is set up.</p>\n<p>If you configured your wireguard profile to always route all traffic over the VPN then yeah, you won’t be able to access local networks. And maybe that’s what you want, in which case fine :)</p>\n<p>But you can also set the profile to only route traffic that is destined for an address on the target network (I.e your home network) and the rest will route as normal.</p>\n<p>This second type of routing only works properly however when there are no address conflicts between the network you are on (i.e. someone else’s WiFi) and your home network.</p>\n<p>For this reason if you want to do this it’s best to avoid on your <em>own</em> home network the common ranges almost everyone uses as default, i.e. 192.168.0.* and 10.0.0.*</p>\n<p>I reconfigured my home network to 192.168.22.* for that reason and now I never hit conflicts and VPN can stay on all the time but only traversed when needed.</p>\n","inReplyTo":"https://lemmy.world/comment/17374875","mediaType":"text/html","source":{"content":"Wireguard doesn't necessarily need to have those limitations, but it will depend in part how your VPN profile is set up.\n\nIf you configured your wireguard profile to always route all traffic over the VPN then yeah, you won't be able to access local networks. And maybe that's what you want, in which case fine :)\n\nBut you can also set the profile to only route traffic that is destined for an address on the target network (I.e your home network) and the rest will route as normal.\n\nThis second type of routing only works properly however when there are no address conflicts between the network you are on (i.e. someone else's WiFi) and your home network.\n\nFor this reason if you want to do this it's best to avoid on your _own_ home network the common ranges almost everyone uses as default, i.e. 192.168.0.* and 10.0.0.*\n\nI reconfigured my home network to 192.168.22.* for that reason and now I never hit conflicts and VPN can stay on all the time but only traversed when needed.\n","mediaType":"text/markdown"},"published":"2025-05-31T08:34:22.500Z","tag":[{"href":"https://lemmy.world/u/nix98","name":"@nix98@lemmy.world","type":"Mention"}],"distinguished":false,"language":{"identifier":"en","name":"English"},"audience":"https://lemmy.world/c/selfhosted","attachment":[]},"cc":["https://lemmy.world/c/selfhosted","https://lemmy.world/u/nix98"],"tag":[{"href":"https://lemmy.world/u/nix98","name":"@nix98@lemmy.world","type":"Mention"}],"type":"Create","audience":"https://lemmy.world/c/selfhosted"},"cc":["https://lemmy.world/c/selfhosted/followers"],"type":"Announce","id":"https://lemmy.world/activities/announce/create/b854cb0a-62f5-4ea4-9ef9-36a1fbf480bc"}
Response
Response Headers
Header | Value |
---|---|
cache-control | "no-cache, private" |
content-type | "application/activity+json" |
date | "Sat, 31 May 2025 08:35:00 GMT" |
x-debug-token | "e4657a" |
Cookies
Request Cookies
No request cookies
Response Cookies
No response cookies
Session 1
Session Metadata
No session metadata
Session Attributes
No session attributes
Session Usage
1
Usages
Stateless check enabled
Usage |
---|
Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage:41
[ [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-core/Authentication/Token/Storage/UsageTrackingTokenStorage.php" "line" => 41 "function" => "getMetadataBag" "class" => "Symfony\Component\HttpFoundation\Session\Session" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authenticator/RememberMeAuthenticator.php" "line" => 69 "function" => "getToken" "class" => "Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authentication/AuthenticatorManager.php" "line" => 111 "function" => "supports" "class" => "Symfony\Component\Security\Http\Authenticator\RememberMeAuthenticator" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall/AuthenticatorManagerListener.php" "line" => 34 "function" => "supports" "class" => "Symfony\Component\Security\Http\Authentication\AuthenticatorManager" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Authenticator/Debug/TraceableAuthenticatorManagerListener.php" "line" => 40 "function" => "supports" "class" => "Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Debug/WrappedLazyListener.php" "line" => 38 "function" => "supports" "class" => "Symfony\Component\Security\Http\Authenticator\Debug\TraceableAuthenticatorManagerListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall/AbstractListener.php" "line" => 25 "function" => "supports" "class" => "Symfony\Bundle\SecurityBundle\Debug\WrappedLazyListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Security/LazyFirewallContext.php" "line" => 60 "function" => "__invoke" "class" => "Symfony\Component\Security\Http\Firewall\AbstractListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-bundle/Debug/TraceableFirewallListener.php" "line" => 80 "function" => "__invoke" "class" => "Symfony\Bundle\SecurityBundle\Security\LazyFirewallContext" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/security-http/Firewall.php" "line" => 95 "function" => "callListeners" "class" => "Symfony\Bundle\SecurityBundle\Debug\TraceableFirewallListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/Debug/WrappedListener.php" "line" => 116 "function" => "onKernelRequest" "class" => "Symfony\Component\Security\Http\Firewall" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/EventDispatcher.php" "line" => 220 "function" => "__invoke" "class" => "Symfony\Component\EventDispatcher\Debug\WrappedListener" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/EventDispatcher.php" "line" => 56 "function" => "callListeners" "class" => "Symfony\Component\EventDispatcher\EventDispatcher" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/event-dispatcher/Debug/TraceableEventDispatcher.php" "line" => 139 "function" => "dispatch" "class" => "Symfony\Component\EventDispatcher\EventDispatcher" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/HttpKernel.php" "line" => 157 "function" => "dispatch" "class" => "Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/HttpKernel.php" "line" => 76 "function" => "handleRaw" "class" => "Symfony\Component\HttpKernel\HttpKernel" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/http-kernel/Kernel.php" "line" => 197 "function" => "handle" "class" => "Symfony\Component\HttpKernel\HttpKernel" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/symfony/runtime/Runner/Symfony/HttpKernelRunner.php" "line" => 35 "function" => "handle" "class" => "Symfony\Component\HttpKernel\Kernel" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/vendor/autoload_runtime.php" "line" => 29 "function" => "run" "class" => "Symfony\Component\Runtime\Runner\Symfony\HttpKernelRunner" "type" => "->" ] [ "file" => "/var/www/kbin/kbin/public/index.php" "line" => 7 "args" => [ "/var/www/kbin/kbin/vendor/autoload_runtime.php" ] "function" => "require_once" ] ] |
Flashes
Flashes
No flash messages were created.
Server Parameters
Server Parameters
Defined in .env
Key | Value |
---|---|
APP_ENV | "dev" |
APP_SECRET | "82ce1339a6c267e28d1f1dcb37a7454c" |
CORS_ALLOW_ORIGIN | "^https?://(kbin.localhost|127\.0\.0\.1)(:[0-9]+)?$" |
DATABASE_URL | "postgresql://kbin:917eaa3d703f19d123@127.0.0.1:5433/kbin?serverVersion=15&charset=utf8" |
HCAPTCHA_SECRET | "" |
HCAPTCHA_SITE_KEY | "" |
JWT_PASSPHRASE | "" |
JWT_PUBLIC_KEY | "%kernel.project_dir%/config/jwt/public.pem" |
JWT_SECRET_KEY | "%kernel.project_dir%/config/jwt/private.pem" |
KBIN_ADMIN_ONLY_OAUTH_CLIENTS | "false" |
KBIN_API_ITEMS_PER_PAGE | "25" |
KBIN_CAPTCHA_ENABLED | "false" |
KBIN_CONTACT_EMAIL | "kbin@j0h.nl" |
KBIN_DEFAULT_LANG | "en" |
KBIN_DOMAIN | "kbin.spritesserver.nl" |
KBIN_FEDERATION_ENABLED | "true" |
KBIN_FEDERATION_PAGE_ENABLED | "true" |
KBIN_HEADER_LOGO | "false" |
KBIN_JS_ENABLED | "true" |
KBIN_META_DESCRIPTION | "a private kbin install" |
KBIN_META_KEYWORDS | "kbin, content agregator, open source, fediverse" |
KBIN_META_TITLE | "Sprites kbin instance" |
KBIN_REGISTRATIONS_ENABLED | "true" |
KBIN_SENDER_EMAIL | "kbin@j0h.nl" |
KBIN_STORAGE_URL | "https://kbin.spritesserver.nl/media/" |
KBIN_TITLE | "/kbin" |
LOCK_DSN | "flock" |
MAILER_DSN | "smtp://spritesmods.com" |
MERCURE_JWT_SECRET | "231e9a1277f5585d52aa0b1e34c0f984xxxx" |
MERCURE_PUBLIC_URL | "https://kbin.spritesserver.nl/.well-known/mercure" |
MERCURE_URL | "http://localhost:3000/.well-known/mercure" |
MESSENGER_TRANSPORT_DSN | "doctrine://default" |
OAUTH_FACEBOOK_ID | "" |
OAUTH_FACEBOOK_SECRET | "" |
OAUTH_GITHUB_ID | "" |
OAUTH_GITHUB_SECRET | "" |
OAUTH_GOOGLE_ID | "" |
OAUTH_GOOGLE_SECRET | "" |
POSTGRES_DB | "kbin" |
POSTGRES_PASSWORD | "917eaa3d703f19d123" |
POSTGRES_USER | "kbin" |
POSTGRES_VERSION | "15" |
REDIS_DNS | "redis://uSJBDOQfuOMgt8kyGhpUzViTnQSEdEJTsOIsYSsg3v40v@localhost" |
REDIS_PASSWORD | "uSJBDOQfuOMgt8kyGhpUzViTnQSEdEJTsOIsYSsg3v40v" |
S3_BUCKET | "media.karab.in" |
S3_KEY | "" |
S3_REGION | "eu-central-1" |
S3_SECRET | "" |
S3_VERSION | "latest" |
Defined as regular env variables
Key | Value |
---|---|
APP_DEBUG | "1" |
CONTENT_LENGTH | "3526" |
CONTENT_TYPE | "application/activity+json" |
CONTEXT_DOCUMENT_ROOT | "/var/www/kbin/kbin/public" |
CONTEXT_PREFIX | "" |
DOCUMENT_ROOT | "/var/www/kbin/kbin/public" |
GATEWAY_INTERFACE | "CGI/1.1" |
HTTPS | "on" |
HTTP_ACCEPT | "*/*" |
HTTP_ACCEPT_ENCODING | "gzip" |
HTTP_DATE | "Sat, 31 May 2025 08:35:00 GMT" |
HTTP_DIGEST | "SHA-256=ukqtJrndb2cxw0u1A8PmURNV1xt/qx8D4R8K6gWrc1U=" |
HTTP_HOST | "kbin.spritesserver.nl" |
HTTP_SIGNATURE | "keyId="https://lemmy.world/c/selfhosted#main-key",algorithm="hs2019",headers="(request-target) content-type date digest host",signature="lnBk7/E2hXS9B94k21eW55Zd7Cjzo07RifgFoxwFHdIwvUg9j4v0zNyLtdvJPU7ZsrtAtu0kGdjZI8QGlUAetxJ9Ry6Kp6BuPzJhAsXg5bZOnjcD7ROqxqwnNsTgIIkSb7v8cjvI8Q/y3B0LY2Ngfp4ykg6HUONRHk6H69vN9LjGzrcxLN0i4V3x9jtaZex1UJ+Y/X24S4k8dukG8G2LR4hrTB5JwP8+6w5pH/URv8Ob+4DwBBKSY6GTql7bCekNXQStpaJ1xllwap/llRqXH/PqIALC4P70keZNuj9MdRJlO0AHk234Zi66W9JblJhwwiCNjHgl+cjST9pF6QrzWA=="" |
HTTP_TRACEPARENT | "00-67f81835a86533f861ec436d77a49c19-61f800020295d536-01" |
HTTP_TRACESTATE | "" |
HTTP_USER_AGENT | "Lemmy/0.19.11-19-g2895f45e8; +https://lemmy.world" |
PATH | "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" |
PHP_SELF | "/index.php" |
QUERY_STRING | "" |
REDIRECT_HTTPS | "on" |
REDIRECT_SSL_CIPHER | "TLS_AES_256_GCM_SHA384" |
REDIRECT_SSL_CIPHER_ALGKEYSIZE | "256" |
REDIRECT_SSL_CIPHER_EXPORT | "false" |
REDIRECT_SSL_CIPHER_USEKEYSIZE | "256" |
REDIRECT_SSL_CLIENT_VERIFY | "NONE" |
REDIRECT_SSL_COMPRESS_METHOD | "NULL" |
REDIRECT_SSL_PROTOCOL | "TLSv1.3" |
REDIRECT_SSL_SECURE_RENEG | "true" |
REDIRECT_SSL_SERVER_A_KEY | "rsaEncryption" |
REDIRECT_SSL_SERVER_A_SIG | "sha256WithRSAEncryption" |
REDIRECT_SSL_SERVER_I_DN | "CN=R10,O=Let's Encrypt,C=US" |
REDIRECT_SSL_SERVER_I_DN_C | "US" |
REDIRECT_SSL_SERVER_I_DN_CN | "R10" |
REDIRECT_SSL_SERVER_I_DN_O | "Let's Encrypt" |
REDIRECT_SSL_SERVER_M_SERIAL | "05BC012BFCA0DD2ABABFC84B9630E756CB3B" |
REDIRECT_SSL_SERVER_M_VERSION | "3" |
REDIRECT_SSL_SERVER_SAN_DNS_0 | "kbin.spritesserver.nl" |
REDIRECT_SSL_SERVER_S_DN | "CN=kbin.spritesserver.nl" |
REDIRECT_SSL_SERVER_S_DN_CN | "kbin.spritesserver.nl" |
REDIRECT_SSL_SERVER_V_END | "Aug 27 21:01:45 2025 GMT" |
REDIRECT_SSL_SERVER_V_START | "May 29 21:01:46 2025 GMT" |
REDIRECT_SSL_SESSION_ID | "10f9b3997a8a0e1bfdc3daa7ea938ab1f371b83e94529ca75bd3e5f63e23c929" |
REDIRECT_SSL_SESSION_RESUMED | "Initial" |
REDIRECT_SSL_TLS_SNI | "kbin.spritesserver.nl" |
REDIRECT_SSL_VERSION_INTERFACE | "mod_ssl/2.4.62" |
REDIRECT_SSL_VERSION_LIBRARY | "OpenSSL/3.0.16" |
REDIRECT_STATUS | "200" |
REDIRECT_URL | "/f/inbox" |
REMOTE_ADDR | "135.181.143.221" |
REMOTE_PORT | "40486" |
REQUEST_METHOD | "POST" |
REQUEST_SCHEME | "https" |
REQUEST_TIME | 1748680500 |
REQUEST_TIME_FLOAT | 1748680500.7409 |
REQUEST_URI | "/f/inbox" |
SCRIPT_FILENAME | "/var/www/kbin/kbin/public/index.php" |
SCRIPT_NAME | "/index.php" |
SERVER_ADDR | "5.9.62.165" |
SERVER_ADMIN | "webmaster@spritesmods.com" |
SERVER_NAME | "kbin.spritesserver.nl" |
SERVER_PORT | "443" |
SERVER_PROTOCOL | "HTTP/1.1" |
SERVER_SIGNATURE | "" |
SERVER_SOFTWARE | "Apache" |
SSL_CIPHER | "TLS_AES_256_GCM_SHA384" |
SSL_CIPHER_ALGKEYSIZE | "256" |
SSL_CIPHER_EXPORT | "false" |
SSL_CIPHER_USEKEYSIZE | "256" |
SSL_CLIENT_VERIFY | "NONE" |
SSL_COMPRESS_METHOD | "NULL" |
SSL_PROTOCOL | "TLSv1.3" |
SSL_SECURE_RENEG | "true" |
SSL_SERVER_A_KEY | "rsaEncryption" |
SSL_SERVER_A_SIG | "sha256WithRSAEncryption" |
SSL_SERVER_I_DN | "CN=R10,O=Let's Encrypt,C=US" |
SSL_SERVER_I_DN_C | "US" |
SSL_SERVER_I_DN_CN | "R10" |
SSL_SERVER_I_DN_O | "Let's Encrypt" |
SSL_SERVER_M_SERIAL | "05BC012BFCA0DD2ABABFC84B9630E756CB3B" |
SSL_SERVER_M_VERSION | "3" |
SSL_SERVER_SAN_DNS_0 | "kbin.spritesserver.nl" |
SSL_SERVER_S_DN | "CN=kbin.spritesserver.nl" |
SSL_SERVER_S_DN_CN | "kbin.spritesserver.nl" |
SSL_SERVER_V_END | "Aug 27 21:01:45 2025 GMT" |
SSL_SERVER_V_START | "May 29 21:01:46 2025 GMT" |
SSL_SESSION_ID | "10f9b3997a8a0e1bfdc3daa7ea938ab1f371b83e94529ca75bd3e5f63e23c929" |
SSL_SESSION_RESUMED | "Initial" |
SSL_TLS_SNI | "kbin.spritesserver.nl" |
SSL_VERSION_INTERFACE | "mod_ssl/2.4.62" |
SSL_VERSION_LIBRARY | "OpenSSL/3.0.16" |
SYMFONY_DOTENV_VARS | "KBIN_DOMAIN,KBIN_TITLE,KBIN_DEFAULT_LANG,KBIN_FEDERATION_ENABLED,KBIN_CONTACT_EMAIL,KBIN_SENDER_EMAIL,KBIN_JS_ENABLED,KBIN_REGISTRATIONS_ENABLED,KBIN_API_ITEMS_PER_PAGE,KBIN_STORAGE_URL,KBIN_META_TITLE,KBIN_META_DESCRIPTION,KBIN_META_KEYWORDS,KBIN_HEADER_LOGO,KBIN_CAPTCHA_ENABLED,KBIN_FEDERATION_PAGE_ENABLED,REDIS_PASSWORD,REDIS_DNS,S3_KEY,S3_SECRET,S3_BUCKET,S3_REGION,S3_VERSION,OAUTH_FACEBOOK_ID,OAUTH_FACEBOOK_SECRET,OAUTH_GOOGLE_ID,OAUTH_GOOGLE_SECRET,OAUTH_GITHUB_ID,OAUTH_GITHUB_SECRET,KBIN_ADMIN_ONLY_OAUTH_CLIENTS,APP_ENV,APP_SECRET,POSTGRES_DB,POSTGRES_USER,POSTGRES_PASSWORD,POSTGRES_VERSION,DATABASE_URL,MESSENGER_TRANSPORT_DSN,MAILER_DSN,MERCURE_URL,MERCURE_PUBLIC_URL,MERCURE_JWT_SECRET,CORS_ALLOW_ORIGIN,LOCK_DSN,JWT_SECRET_KEY,JWT_PUBLIC_KEY,JWT_PASSPHRASE,HCAPTCHA_SITE_KEY,HCAPTCHA_SECRET" |