{"id":4746,"date":"2014-11-17T21:45:27","date_gmt":"2014-11-17T12:45:27","guid":{"rendered":"http:\/\/www.vincentina.net\/?p=4746"},"modified":"2025-02-25T22:50:26","modified_gmt":"2025-02-25T13:50:26","slug":"%e3%82%82%e3%81%86%e3%81%a1%e3%82%87%e3%81%84%e3%82%b3%e3%83%bc%e3%83%89%e5%8c%96%e3%82%84%e3%82%8a%e3%81%be%e3%81%99%e3%81%8b-4%e6%9d%af%e7%9b%ae-%e3%81%9b%e3%82%81%e3%81%a6ruby%e3%82%89%e3%81%97","status":"publish","type":"post","link":"https:\/\/www.vincentina.net\/?p=4746","title":{"rendered":"\u3082\u3046\u3061\u3087\u3044\u30b3\u30fc\u30c9\u5316\u3084\u308a\u307e\u3059\u304b 4\u676f\u76ee \u305b\u3081\u3066Ruby\u3089\u3057\u304f"},"content":{"rendered":"<h1>Chef\u3067\u30bd\u30fc\u30b9\u304b\u3089Apache\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3068\u304a\u307e\u3051\u3067Iptables\u3092\u8a2d\u5b9a<\/h1>\n<p>\u3044\u3064\u306e\u9593\u306b\u3084\u30894\u676f\u76ee\uff01\u305d\u308c\u3067\u306f\u307c\u3061\u307c\u3061\u52d5\u7684\u306a\u4e8b\u3092\u3084\u3063\u3066\u307f\u3088\u3046\u3068\u601d\u3044\u307e\u3059\u3002<\/p>\n<p>\u524d\u56de\u4f5c\u3063\u305fVagrant\u306e\u30d5\u30a1\u30a4\u30eb\u3092GitHub\u306b\u3042\u3052\u307e\u3057\u305f\u3002\u30a2\u30ab\u30a6\u30f3\u30c8\u306fTwetter\u3068\u540c\u3058takekentw\u306b\u3057\u307e\u3057\u305f\u3002\u3088\u308d\u308d\u3002<\/p>\n<p><a href=\"https:\/\/github.com\/takekentw\/vagrant_001\" target=\"_blank\" rel=\"noopener\">takekentw\/vagrant_001<\/a> \u00b7 GitHub:<\/p>\n<p>\u8a2d\u5b9a\u30d5\u30a1\u30a4\u30eb\u3092\u5f04\u308b\u524d\u306b\u3001\u4e0b\u8a18\u306e\u53c2\u8003\u30b5\u30a4\u30c8\u3067\u3061\u3087\u3053\u3063\u3068\u52c9\u5f37\u3057\u307e\u3057\u305f\u3002<\/p>\n<p><a href=\"http:\/\/developer.mitakalab.com\/rails\" target=\"_blank\" rel=\"noopener\">Ruby on Rails\u3092\u306f\u3058\u3081\u3088\u3046<\/a> | Mitakalab:<\/p>\n<p>\u3055\uff5e\u3063\u3068\u3084\u3063\u3066\u307f\u3066\u3075\u3080\u3075\u3080(*\u00b4\u25bd\uff40*)\u3068\u3001\u307c\u3093\u3084\u308a\u8f2a\u90ed\u304c\u3067\u304d\u305f\u306e\u3067\u5b9f\u969b\u306b\u691c\u8a3c\u3057\u3066\u307f\u307e\u3059\u3002<\/p>\n<p>\u524d\u56de\u304b\u524d\u3005\u56de\u306b\u3082\u8a00\u3063\u3066\u3044\u305f\u3068\u601d\u3044\u307e\u3059\u304c\u3001Chef\u3067\u8a2d\u5b9a\u30d5\u30a1\u30a4\u30eb\u3092\u8a2d\u5b9a\u3059\u308b\u3082\u30461\u3064\u306e\u3084\u308a\u65b9\u3067\u3059\u3002<\/p>\n<p>\u53c2\u8003\u30b5\u30a4\u30c8<br \/>\n<a href=\"http:\/\/qiita.com\/k-motoyan\/items\/fdf6f2768471a5eda0e8\" target=\"_blank\" rel=\"noopener\">apache2.4\u306erecipe\u3092\u66f8\u3044\u3066\u307f\u305f<\/a> &#8211; Qiita:<strong class=\"itemsShowAuthorInfo_userName\"><a href=\"http:\/\/qiita.com\/k-motoyan\">k-motoyan<\/a><\/strong><\/p>\n<p>\u3072\u3068\u307e\u305a\u306f\u4e0a\u8a18\u306e\u53c2\u8003\u30b5\u30a4\u30c8\u3092\u53c2\u8003\u306b\u3057\u306a\u304c\u3089\u3001\u30bd\u30fc\u30b9\u304b\u3089Apache\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3068\u3044\u3046\u4e8b\u3060\u3051\u3092\u304a\u3053\u306a\u3046\u3088\u3046\u306b\u3057\u307e\u3057\u305f\u3002<br \/>\n\u3053\u308c\u304cRuby\u304b\u30fb\u30fb\u3002<br \/>\nIptables\u306f\u57fa\u672c\u7684\u306a\u8a2d\u5b9a\u3092\u3059\u308b\u3088\u3046\u306a\u611f\u3058\u306b\u3057\u3066\u307f\u307e\u3057\u305f\u3002<\/p>\n<p>\u3042\u3068\u3001Chef\u3092\u3059\u308b\u5834\u5408\u306fTree\u30b3\u30de\u30f3\u30c9\u306f\u5165\u308c\u3066\u304a\u3044\u305f\u65b9\u304c\u3044\u3044\u3068\u601d\u3044\u307e\u3059\u306d\u3002<\/p>\n<p>\u524d\u56de\u3068\u540c\u3058IP\u3067\u3059\u304c\u3001\u3053\u308c\u306fWin\u6a5f\u306e\u65b9\u306eVMware\u3067\u7acb\u3066\u305f\u30b5\u30fc\u30d0\u30fc\u306eIP\u3067\u3059\u3002<\/p>\n<pre>$ cat nodes\/192.168.24.64.json\r\n{\r\n\u00a0\u00a0\u00a0\u00a0 \"user\": {\r\n\u00a0\u00a0\u00a0\u00a0 \"name\": \"root\",\r\n\u00a0\u00a0\u00a0\u00a0 \"password\" : \"$1$wJVOjlmk$NdQ\/FUU6EMVT394jhuS\/I.\"\r\n\u00a0\u00a0 },\r\n\u00a0 \"run_list\": [\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \"yum\",\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \"recipe[selinux::disabled]\",\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \"recipe[apache]\"\r\n\u00a0 ],\r\n\"automatic\": {\r\n\u00a0\u00a0\u00a0 \"ipaddress\": \"192.168.24.64\"\r\n\u00a0 }\r\n}<\/pre>\n<pre>$ cat site-cookbooks\/apache\/recipes\/default.rb\r\n#\r\n# Cookbook Name:: apache\r\n# Recipe:: default\r\n#\r\n# Copyright 2014, YOUR_COMPANY_NAME\r\n#\r\n# All rights reserved - Do Not Redistribute\r\n#\r\n# \u57fa\u672c\u7684\u306a\u30d1\u30c3\u30b1\u30fc\u30b8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\r\n%w{ traceroute gcc make pcre pcre-devel openssl-devel wget tar }.each do |p|\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 package p do\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 action :install\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 end\r\nend\r\n# \u5916\u90e8cookbook\u3092\u5229\u7528\u3057\u3066selinux\u3092\u7121\u52b9\r\nselinux_state \"SELinux Disabled\" do\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 action :disabled\r\nend\r\n\r\n# source\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\r\ninstall_dir = '\/usr\/local\/src'\r\n\r\n# \u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u30bd\u30fc\u30b9\u306e\u60c5\u5831\r\n\r\nsource_info = {\r\n\u00a0 :apr =&gt; {\r\n\u00a0\u00a0\u00a0 :file_name\u00a0 =&gt; 'apr-1.5.1.tar.gz',\r\n\u00a0\u00a0\u00a0 :file_dir\u00a0\u00a0 =&gt; 'apr-1.5.1',\r\n\u00a0\u00a0\u00a0 :configure\u00a0 =&gt; '.\/configure --prefix=\/opt\/apr\/apr-1.5.1',\r\n\u00a0\u00a0\u00a0 :remote_uri =&gt; 'http:\/\/ftp.jaist.ac.jp\/pub\/apache\/apr\/apr-1.5.1.tar.gz'\r\n\u00a0 },\r\n\u00a0 :apr_util =&gt; {\r\n\u00a0\u00a0\u00a0 :file_name\u00a0 =&gt; 'apr-util-1.5.4.tar.gz',\r\n\u00a0\u00a0\u00a0 :file_dir\u00a0\u00a0 =&gt; 'apr-util-1.5.4',\r\n\u00a0\u00a0\u00a0 :configure\u00a0 =&gt; '.\/configure --prefix=\/opt\/apr-util\/apr-util-1.5.4 --with-apr=\/opt\/apr\/apr-1.5.1',\r\n\u00a0\u00a0\u00a0 :remote_uri =&gt; 'http:\/\/ftp.jaist.ac.jp\/pub\/apache\/apr\/apr-util-1.5.4.tar.gz'\r\n\u00a0 },\r\n\u00a0 :httpd =&gt; {\r\n\u00a0\u00a0\u00a0 :file_name\u00a0 =&gt; 'httpd-2.4.10.tar.gz',\r\n\u00a0\u00a0\u00a0 :file_dir\u00a0\u00a0 =&gt; 'httpd-2.4.10',\r\n\u00a0\u00a0\u00a0 :configure\u00a0 =&gt; '.\/configure --prefix=\/opt\/httpd\/httpd-2.4.10 --enable-ssl --with-apr=\/opt\/apr\/apr-1.5.1 --with-apr-util=\/opt\/apr-util\/apr-util-1.5.4',\r\n\u00a0\u00a0\u00a0 :remote_uri =&gt; 'http:\/\/ftp.jaist.ac.jp\/pub\/apache\/httpd\/httpd-2.4.10.tar.gz'\r\n\u00a0 }\r\n}\r\n\r\n# \u60c5\u5831\u3092\u5229\u7528\u3057\u3066\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\r\nsource_info.each do |key, info|\r\n\u00a0 remote_file \"\/tmp\/#{info[:file_name]}\" do\r\n\u00a0\u00a0\u00a0 source \"#{info[:remote_uri]}\"\r\n\u00a0 end\r\n\r\n\u00a0 script 'install_httpd' do\r\n\u00a0\u00a0\u00a0 not_if 'ls \/etc\/init.d\/httpd'\r\n\u00a0\u00a0\u00a0 interpreter 'bash'\r\n\u00a0\u00a0\u00a0 user\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 'root'\r\n\r\n\u00a0\u00a0\u00a0 code &lt;&lt;-EOL\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 install -d #{install_dir}\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 tar zxvf \/tmp\/#{info[:file_name]} -C #{install_dir}\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 cd #{install_dir}\/#{info[:file_dir]} &amp;&amp; #{info[:configure]} &amp;&amp; make &amp;&amp; make install\r\n\u00a0\u00a0\u00a0 EOL\r\n\u00a0 end\r\nend\r\n\r\n# IPtables\u3092\u30b3\u30fc\u30c9\u3067\u5165\u529b\r\n\r\nscript 'iptables_create' do\r\n\u00a0 interpreter 'bash'\r\n\u00a0 user\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 'root'\r\n\r\n\u00a0 code &lt;&lt;-EOL\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 #!\/bin\/sh\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -F\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -P INPUT DROP\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -P OUTPUT ACCEPT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -P FORWARD DROP\r\n\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 #BroadCast Guard\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A INPUT -d 255.255.255.255 -j DROP\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A INPUT -d 224.0.0.1 -j DROP\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A INPUT -d 192.168.0.255 -j DROP\r\n\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -N RH-Firewall-1-INPUT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A INPUT -j RH-Firewall-1-INPUT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A FORWARD -j RH-Firewall-1-INPUT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -i lo -j ACCEPT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -p 50 -j ACCEPT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -p 51 -j ACCEPT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT\r\n\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 #SMTP HTTP SNMP POP SSH Guard\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -p tcp -m state --state NEW --dport 22 -j ACCEPT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -p tcp -m state --state NEW --dport 80 -j ACCEPT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -p tcp -m state --state NEW --dport 3000 -j ACCEPT\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -m limit --limit 1\/s -j LOG --log-prefix \"[FW DROP] : \"\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iptables -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \/etc\/rc.d\/init.d\/iptables save\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \/etc\/rc.d\/init.d\/iptables start\r\n\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 echo settings complete\r\n\u00a0\u00a0 EOL\r\nend<\/pre>\n<p>Ruby\u306e\u30b9\u30af\u30ea\u30d7\u30c8\u3082\u307b\u307c\u30de\u30cd\u3060\u3057\u3001\u307e\u3060\u307e\u3060\u72ec\u308a\u7acb\u3061\u3067\u304d\u3066\u306a\u3044\u3067\u3059\u3002<br \/>\n\u4e0a\u306e\u30b9\u30af\u30ea\u30d7\u30c8\u306f\u3001\u3053\u306a\u3044\u3060Docker\u3067\u30b5\u30fc\u30d0\u30fc\u3092\u7acb\u3066\u3066\u624b\u52d5\u3067\u3084\u3063\u305f\u4e8b\u3068\u5168\u304f\u540c\u3058\u3053\u3068\u3092\u3057\u3066\u3044\u308b\u306e\u3067\u3059\u304c\u3001\u3084\u3063\u3071\u308a\u3053\u308a\u3083\u3042\u697d\u3067\u3059\u306a\u3041\u3002<br \/>\nMPM\u3092\u3044\u308d\u3044\u308d\u306a\u611f\u3058\u3067\u5165\u308c\u305f\u308a\u3067\u304d\u308b\u304f\u3089\u3044\u306f\u3084\u308a\u305f\u3044\u306a\u3041\u3068\u3002<\/p>\n<p>4\u676f\u76ee\u3067\u3059\u304c\u3001Chef\u306f\u307b\u307c1\u56de\u76ee\u306a\u306e\u3067\u3053\u306e\u3042\u305f\u308a\u3067\u4eca\u56de\u306f\u7d42\u4e86\u3002<\/p>\n<p>\u3042\u3001knife\u3067\u7e4b\u3044\u3067rsync\u3057\u305f\u6642\u306b\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u805e\u304b\u308c\u307e\u304f\u308b\u73fe\u8c61\u306f\u516c\u958b\u9375\u3092\u767b\u9332\u3059\u308c\u3070\u56de\u907f\u3067\u304d\u308b\u306e\u3067\u3001\u305d\u3053\u306f\u3055\u304f\u3063\u3068\u6e08\u307e\u305b\u307e\u3057\u3087\u3046\u3002<\/p>\n<p>&nbsp;<\/p>\n<div class='wp_social_bookmarking_light'>        <div class=\"wsbl_twitter\"><a href=\"https:\/\/twitter.com\/share\" class=\"twitter-share-button\" data-url=\"https:\/\/www.vincentina.net\/?p=4746\" data-text=\"\u3082\u3046\u3061\u3087\u3044\u30b3\u30fc\u30c9\u5316\u3084\u308a\u307e\u3059\u304b 4\u676f\u76ee \u305b\u3081\u3066Ruby\u3089\u3057\u304f\" data-via=\"TakekenTw\" data-lang=\"ja\">Tweet<\/a><\/div><\/div>\n<br class='wp_social_bookmarking_light_clear' \/>\n","protected":false},"excerpt":{"rendered":"<p>Chef\u3067\u30bd\u30fc\u30b9\u304b\u3089Apache\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3068\u304a\u307e\u3051\u3067Iptables\u3092\u8a2d\u5b9a \u3044\u3064\u306e\u9593\u306b\u3084\u30894\u676f\u76ee\uff01\u305d\u308c\u3067\u306f\u307c\u3061\u307c\u3061\u52d5\u7684\u306a\u4e8b\u3092\u3084\u3063\u3066\u307f\u3088\u3046\u3068\u601d\u3044\u307e\u3059\u3002 \u524d\u56de\u4f5c\u3063\u305fVagrant\u306e\u30d5\u30a1\u30a4\u30eb\u3092GitHub\u306b\u3042\u3052\u307e\u3057\u305f\u3002\u30a2\u30ab &hellip; <a href=\"https:\/\/www.vincentina.net\/?p=4746\" class=\"more-link\"><span class=\"screen-reader-text\">&#8220;\u3082\u3046\u3061\u3087\u3044\u30b3\u30fc\u30c9\u5316\u3084\u308a\u307e\u3059\u304b 4\u676f\u76ee \u305b\u3081\u3066Ruby\u3089\u3057\u304f&#8221; \u306e<\/span>\u7d9a\u304d\u3092\u8aad\u3080<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[106],"tags":[],"class_list":["post-4746","post","type-post","status-publish","format-standard","hentry","category-programming"],"_links":{"self":[{"href":"https:\/\/www.vincentina.net\/index.php?rest_route=\/wp\/v2\/posts\/4746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vincentina.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vincentina.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vincentina.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vincentina.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4746"}],"version-history":[{"count":2,"href":"https:\/\/www.vincentina.net\/index.php?rest_route=\/wp\/v2\/posts\/4746\/revisions"}],"predecessor-version":[{"id":8162,"href":"https:\/\/www.vincentina.net\/index.php?rest_route=\/wp\/v2\/posts\/4746\/revisions\/8162"}],"wp:attachment":[{"href":"https:\/\/www.vincentina.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vincentina.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vincentina.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}