Stable.
This commit is contained in:
commit
b43880fafa
|
|
@ -0,0 +1,25 @@
|
|||
*
|
||||
|
||||
!.gitignore
|
||||
!ddns.sh
|
||||
|
||||
!nginx-proxy/
|
||||
!nginx-proxy/docker-compose.yml
|
||||
!nginx-proxy/conf.d
|
||||
!nginx-proxy/conf.d/*
|
||||
|
||||
!mqtt-broker/
|
||||
!mqtt-broker/mosquitto/
|
||||
!mqtt-broker/mosquitto/config
|
||||
!mqtt-broker/mosquitto/config/mosquitto.conf
|
||||
!mqtt-broker/mosquitto/config/password.txt
|
||||
!mqtt-broker/docker-compose.yml
|
||||
|
||||
!homeassistant/
|
||||
!homeassistant/docker-compose.yml
|
||||
|
||||
!zwavejs/
|
||||
!zwavejs/docker-compose.yml
|
||||
|
||||
!beszel/
|
||||
!beszel/docker-compose.yml
|
||||
|
|
@ -0,0 +1,25 @@
|
|||
services:
|
||||
beszel:
|
||||
image: henrygd/beszel
|
||||
container_name: beszel
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- 8090:8090
|
||||
volumes:
|
||||
- ./beszel_data:/beszel_data
|
||||
|
||||
beszel-agent:
|
||||
image: henrygd/beszel-agent
|
||||
container_name: beszel-agent
|
||||
restart: unless-stopped
|
||||
network_mode: host
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||
- ./beszel_agent_data:/var/lib/beszel-agent
|
||||
# monitor other disks / partitions by mounting a folder in /extra-filesystems
|
||||
# - /mnt/disk/.beszel:/extra-filesystems/sda1:ro
|
||||
environment:
|
||||
LISTEN: 45876
|
||||
KEY: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE+dzh2ruWrqxVsXXWKYM7FcajNV7+3cz/6V+Hkfzwvr'
|
||||
TOKEN: 3ca1b-5cc7a7a4e-39f3e-f1dbbd32a
|
||||
HUB_URL: http://192.168.1.98:8090
|
||||
|
|
@ -0,0 +1,98 @@
|
|||
#!/bin/bash
|
||||
|
||||
# ============================================================================
|
||||
# DYNAMIC DNS UPDATER FOR NAMECHEAP (MULTI-DOMAIN)
|
||||
# ============================================================================
|
||||
# Configuration - Edit these values
|
||||
# ============================================================================
|
||||
|
||||
# Define your domains/hosts as an array of space-separated strings
|
||||
# Format: "HOSTNAME:DOMAIN:PASSWORD"
|
||||
# Use '@' for root domain, 'sub' for subdomain (e.g., 'home', 'video')
|
||||
DOMAINS=(
|
||||
"home:seanowiecki.com:d7b38fc4de474e81a79a309824aa8e2a"
|
||||
"video:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"frigate:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"survey:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"memos:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"openwebui:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"immich:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"matrix:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"minecraft:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"chat:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"bentopdf:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"home:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"nextcloud:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"obico:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"obsidian:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"qr:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"cachet:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"grafana:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"valheim:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"satisfactory:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"vpn:atomic6.net:2a687057401f4401b4248d1d31b2ba81"
|
||||
"salt:nase.dev:1fa7b1a67d404b339e38107db98c87f0"
|
||||
"gitea:nase.dev:1fa7b1a67d404b339e38107db98c87f0"
|
||||
)
|
||||
|
||||
# IP checking service (choose one that works reliably for you)
|
||||
IP_SERVICE="https://api.ipify.org" # Alternatives: "https://ifconfig.io/ip", "https://icanhazip.com"
|
||||
|
||||
# ============================================================================
|
||||
# Script Core - Do not edit below unless you know what you're doing
|
||||
# ============================================================================
|
||||
|
||||
# Get current public IP
|
||||
echo "[$(date)] Checking public IP..."
|
||||
CURRENT_IP=$(curl -s "$IP_SERVICE")
|
||||
|
||||
if [ -z "$CURRENT_IP" ]; then
|
||||
echo "[$(date)] ERROR: Could not fetch public IP. Check network or IP service."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
echo "[$(date)] Current public IP: $CURRENT_IP"
|
||||
|
||||
# Process each domain entry
|
||||
for ENTRY in "${DOMAINS[@]}"; do
|
||||
# Split the entry into components
|
||||
IFS=":" read -r HOSTNAME DOMAIN PASSWORD <<< "$ENTRY"
|
||||
|
||||
# Create a unique identifier for this host/domain combination
|
||||
RECORD_ID="${HOSTNAME}.${DOMAIN}"
|
||||
|
||||
# File to store last IP for this specific record
|
||||
IP_FILE="/tmp/last_ip_${RECORD_ID//[^a-zA-Z0-9]/_}.txt"
|
||||
|
||||
# Read last recorded IP if file exists
|
||||
if [ -f "$IP_FILE" ]; then
|
||||
LAST_IP=$(cat "$IP_FILE")
|
||||
else
|
||||
LAST_IP=""
|
||||
fi
|
||||
|
||||
# Update only if IP has changed
|
||||
if [ "$CURRENT_IP" != "$LAST_IP" ]; then
|
||||
echo "[$(date)] IP changed for $RECORD_ID ($LAST_IP → $CURRENT_IP). Updating..."
|
||||
|
||||
# Call Namecheap's API
|
||||
RESPONSE=$(curl -s "https://dynamicdns.park-your-domain.com/update?host=$HOSTNAME&domain=$DOMAIN&password=$PASSWORD&ip=$CURRENT_IP")
|
||||
|
||||
# Check response for success
|
||||
if echo "$RESPONSE" | grep -q "<ErrCount>0</ErrCount>"; then
|
||||
echo "[$(date)] ✓ Successfully updated $RECORD_ID"
|
||||
echo "$CURRENT_IP" > "$IP_FILE"
|
||||
else
|
||||
# Extract error message from response
|
||||
ERROR=$(echo "$RESPONSE" | grep -o "<Err1>.*</Err1>" | sed 's/<Err1>\(.*\)<\/Err1>/\1/')
|
||||
echo "[$(date)] ✗ Failed to update $RECORD_ID: $ERROR"
|
||||
fi
|
||||
|
||||
# Optional: Log full response for debugging
|
||||
# echo "API Response: $RESPONSE"
|
||||
else
|
||||
echo "[$(date)] IP unchanged for $RECORD_ID ($CURRENT_IP). Skipping."
|
||||
fi
|
||||
done
|
||||
|
||||
echo "[$(date)] DDNS update cycle completed."
|
||||
|
|
@ -0,0 +1,21 @@
|
|||
services:
|
||||
mosquitto:
|
||||
image: eclipse-mosquitto:latest
|
||||
container_name: mosquitto
|
||||
labels:
|
||||
- "beszel.monitor=true"
|
||||
- "beszel.service=mosquitto"
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- "1883:1883" # Main MQTT port for all devices
|
||||
- "9001:9001" # WebSocket port (optional)
|
||||
volumes:
|
||||
- ./mosquitto/config:/mosquitto/config
|
||||
- ./mosquitto/data:/mosquitto/data
|
||||
- ./mosquitto/log:/mosquitto/log
|
||||
networks:
|
||||
- mqtt-network
|
||||
|
||||
networks:
|
||||
mqtt-network:
|
||||
driver: bridge
|
||||
|
|
@ -0,0 +1,8 @@
|
|||
persistence true
|
||||
persistence_location /mosquitto/data/
|
||||
log_dest file /mosquitto/log/mosquitto.log
|
||||
listener 1883 0.0.0.0 # Listen on all network interfaces
|
||||
|
||||
# Authentication - Start with this to test, then add passwords
|
||||
allow_anonymous true
|
||||
password_file /mosquitto/config/password.txt
|
||||
|
|
@ -0,0 +1 @@
|
|||
nase:$7$101$6qku4pTCy9Z/iAYo$NNZNmy3ZSRj9FVZG6rkfMJu8Lk4eD3HUaR8oYtdNwm8NCF99VE6PR9PXoviw9DDsfh1DtHpUt34QdxjW7ZvPTQ==
|
||||
|
|
@ -0,0 +1,15 @@
|
|||
server {
|
||||
listen 80;
|
||||
listen [::]:80;
|
||||
server_name _; # Catch-all
|
||||
|
||||
location /.well-known/acme-challenge/ {
|
||||
root /var/www/html;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect ALL HTTP traffic to HTTPS (using the original host)
|
||||
location / {
|
||||
return 301 https://$host$request_uri;
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,27 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name bentopdf.atomic6.net;
|
||||
|
||||
# Let's Encrypt challenge path
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect all other traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name bentopdf.atomic6.net;
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/bentopdf.atomic6.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/bentopdf.atomic6.net/privkey.pem;
|
||||
location / {
|
||||
proxy_pass http://192.168.1.208:3000;
|
||||
proxy_set_header Host $host;
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,27 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name frigate.atomic6.net;
|
||||
|
||||
# Let's Encrypt challenge path
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect ALL other HTTP traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
# HTTPS server block (can remain as is)
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name frigate.atomic6.net;
|
||||
ssl_certificate /etc/letsencrypt/live/frigate.atomic6.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/frigate.atomic6.net/privkey.pem;
|
||||
location / {
|
||||
proxy_pass http://192.168.1.131:8971;
|
||||
proxy_set_header Host $host;
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,27 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name gitea.nase.dev;
|
||||
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect all other traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name gitea.nase.dev;
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.nase.dev/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.nase.dev/privkey.pem;
|
||||
|
||||
location / {
|
||||
proxy_pass http://192.168.1.208:3005;
|
||||
proxy_set_header Host $host;
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,84 @@
|
|||
# HTTP Server Block - REQUIRED for Let's Encrypt and redirects
|
||||
server {
|
||||
listen 80;
|
||||
# listen [::]:80;
|
||||
server_name home.seanowiecki.com;
|
||||
|
||||
# Location for Let's Encrypt HTTP-01 challenge renewal
|
||||
# This path must match the webroot path used by the certbot command
|
||||
location /.well-known/acme-challenge/ {
|
||||
root /var/www/html;
|
||||
# Ensure this directory exists in your nginx container
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect ALL other HTTP traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
# HTTPS Server Block - Your existing config, corrected
|
||||
server {
|
||||
listen 443 ssl;
|
||||
http2 on;
|
||||
server_name home.seanowiecki.com;
|
||||
|
||||
# SSL Configuration
|
||||
ssl_certificate /etc/letsencrypt/live/home.seanowiecki.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/home.seanowiecki.com/privkey.pem;
|
||||
|
||||
# SSL Settings (your existing settings are good)
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384;
|
||||
ssl_prefer_server_ciphers off;
|
||||
ssl_session_cache shared:SSL:10m;
|
||||
ssl_session_timeout 1d;
|
||||
|
||||
# Proxy configuration for Home Assistant
|
||||
location / {
|
||||
proxy_pass http://192.168.1.98:8123; # Use your Docker service name or IP
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
|
||||
# Essential WebSocket support headers[citation:2]
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
|
||||
# DISABLE buffering for the initial response
|
||||
proxy_buffering off;
|
||||
|
||||
# CRITICAL: Increase timeouts for the initial data load[citation:3]
|
||||
proxy_read_timeout 86400s; # Keep connections alive for a long time
|
||||
proxy_send_timeout 86400s;
|
||||
proxy_connect_timeout 30s;
|
||||
|
||||
# Optimize buffers for data transfer
|
||||
# proxy_buffering off;
|
||||
# proxy_buffer_size 128k;
|
||||
# proxy_buffers 4 256k;
|
||||
# proxy_busy_buffers_size 256k;
|
||||
|
||||
# Ensure nginx doesn't buffer WebSocket frames
|
||||
proxy_http_version 1.1;
|
||||
}
|
||||
|
||||
location /api/websocket {
|
||||
proxy_pass http://192.168.1.98:8123;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_read_timeout 86400s; # Keep WS connection alive
|
||||
}
|
||||
|
||||
# Security headers
|
||||
add_header X-Frame-Options SAMEORIGIN;
|
||||
add_header X-Content-Type-Options nosniff;
|
||||
add_header X-XSS-Protection "1; mode=block";
|
||||
}
|
||||
|
|
@ -0,0 +1,28 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name immich.atomic6.net;
|
||||
|
||||
# Let's Encrypt challenge path
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect all other traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name immich.atomic6.net;
|
||||
ssl_certificate /etc/letsencrypt/live/immich.atomic6.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/immich.atomic6.net/privkey.pem;
|
||||
client_max_body_size 0;
|
||||
|
||||
location / {
|
||||
proxy_pass http://192.168.1.208:2283;
|
||||
proxy_set_header Host $host;
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,74 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name video.atomic6.net;
|
||||
|
||||
# Let's Encrypt challenge path
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect all other traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
http2 on;
|
||||
server_name video.atomic6.net;
|
||||
|
||||
# SSL Configuration
|
||||
ssl_certificate /etc/letsencrypt/live/home.seanowiecki.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/home.seanowiecki.com/privkey.pem;
|
||||
|
||||
# SSL Settings
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384;
|
||||
ssl_prefer_server_ciphers off;
|
||||
|
||||
# Media server proxy configuration
|
||||
location / {
|
||||
proxy_pass http://192.168.1.131:8096;
|
||||
|
||||
# Essential headers
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header X-Forwarded-Host $host;
|
||||
proxy_set_header X-Forwarded-Port 443;
|
||||
|
||||
# Disable SSL verification for backend
|
||||
proxy_ssl_verify off;
|
||||
proxy_ssl_server_name on;
|
||||
|
||||
# WebSocket support
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
|
||||
# Timeouts for media streaming
|
||||
proxy_connect_timeout 30s;
|
||||
proxy_send_timeout 30s;
|
||||
proxy_read_timeout 30s;
|
||||
proxy_buffering off;
|
||||
|
||||
# Allow large file uploads/downloads
|
||||
client_max_body_size 0;
|
||||
}
|
||||
|
||||
# Explicit WebSocket endpoint
|
||||
location /ws {
|
||||
proxy_pass http://192.168.1.131:8096/ws;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
proxy_set_header Host $host;
|
||||
proxy_read_timeout 86400s;
|
||||
}
|
||||
|
||||
# Security headers
|
||||
add_header X-Frame-Options SAMEORIGIN;
|
||||
add_header Referrer-Policy same-origin;
|
||||
}
|
||||
|
|
@ -0,0 +1,26 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name memos.atomic6.net;
|
||||
|
||||
# Let's Encrypt challenge path
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect all other traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name memos.atomic6.net;
|
||||
ssl_certificate /etc/letsencrypt/live/memos.atomic6.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/memos.atomic6.net/privkey.pem;
|
||||
location / {
|
||||
proxy_pass http://192.168.1.208:5230;
|
||||
proxy_set_header Host $host;
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,26 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name nextcloud.atomic6.net;
|
||||
|
||||
# Let's Encrypt challenge path
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect all other traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name nextcloud.atomic6.net;
|
||||
ssl_certificate /etc/letsencrypt/live/nextcloud.atomic6.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/nextcloud.atomic6.net/privkey.pem;
|
||||
location / {
|
||||
proxy_pass http://192.168.1.131:8081;
|
||||
proxy_set_header Host $host;
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,29 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name openwebui.atomic6.net;
|
||||
|
||||
# Let's Encrypt challenge path
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect all other traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name openwebui.atomic6.net;
|
||||
ssl_certificate /etc/letsencrypt/live/openwebui.atomic6.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/openwebui.atomic6.net/privkey.pem;
|
||||
location / {
|
||||
proxy_pass http://192.168.1.131:3000;
|
||||
proxy_set_header Host $host;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,29 @@
|
|||
server {
|
||||
listen 443 ssl http2;
|
||||
listen [::]:443 ssl http2;
|
||||
server_name qr.atomic6.net;
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/qr.atomic6.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/qr.atomic6.net/privkey.pem;
|
||||
|
||||
location / {
|
||||
proxy_pass http://192.168.1.208:3002;
|
||||
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
|
||||
# Standard headers for potential API/upgrade support
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Connection "";
|
||||
}
|
||||
}
|
||||
|
||||
# HTTP redirect (optional but recommended)
|
||||
server {
|
||||
listen 80;
|
||||
listen [::]:80;
|
||||
server_name qr.atomic6.net;
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
|
|
@ -0,0 +1,28 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name salt.nase.dev;
|
||||
|
||||
# Let's Encrypt challenge path
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect all other traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name salt.nase.dev;
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/salt.nase.dev/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/salt.nase.dev/privkey.pem;
|
||||
|
||||
location / {
|
||||
proxy_pass http://192.168.1.6:3005;
|
||||
proxy_set_header Host $host;
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,59 @@
|
|||
server {
|
||||
listen 80;
|
||||
server_name survey.atomic6.net;
|
||||
|
||||
# Let's Encrypt challenge path
|
||||
location /.well-known/acme-challenge/ {
|
||||
alias /var/www/html/.well-known/acme-challenge/;
|
||||
try_files $uri =404;
|
||||
}
|
||||
|
||||
# Redirect all other traffic to HTTPS
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
http2 on;
|
||||
server_name survey.atomic6.net;
|
||||
add_header X-Debug-Server "survey-config";
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/survey.atomic6.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/survey.atomic6.net/privkey.pem;
|
||||
|
||||
# LimeSurvey proxy
|
||||
location / {
|
||||
proxy_pass http://192.168.1.208:8080;
|
||||
|
||||
# CRITICAL HEADERS for LimeSurvey
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header Accept-Encoding "";
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header X-Forwarded-Host $host;
|
||||
proxy_set_header X-Forwarded-Port 443;
|
||||
|
||||
# LimeSurvey specific headers
|
||||
proxy_set_header X-Url-Scheme $scheme;
|
||||
proxy_set_header X-Forwarded-Ssl on;
|
||||
|
||||
# Timeouts
|
||||
proxy_connect_timeout 300s;
|
||||
proxy_send_timeout 300s;
|
||||
proxy_read_timeout 300s;
|
||||
}
|
||||
|
||||
# Cache static files
|
||||
location ~* \.(js|css|png|jpg|jpeg|gif|ico|svg)$ {
|
||||
proxy_pass http://192.168.1.208:8080;
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header Accept-Encoding "";
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
expires 1y;
|
||||
add_header Cache-Control "public, immutable";
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,21 @@
|
|||
services:
|
||||
nginx-proxy:
|
||||
image: nginx:alpine
|
||||
container_name: nginx-proxy
|
||||
labels:
|
||||
- "beszel.monitor=true"
|
||||
- "beszel.service=nginx"
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- "80:80"
|
||||
- "443:443"
|
||||
volumes:
|
||||
- /var/www/html/.well-known/acme-challenge:/var/www/html/.well-known/acme-challenge:ro
|
||||
- /home/nase/nginx-proxy/conf.d:/etc/nginx/conf.d:ro
|
||||
- /etc/letsencrypt:/etc/letsencrypt:ro # Mount Let's Encrypt certificates
|
||||
networks:
|
||||
- proxy-network
|
||||
|
||||
networks:
|
||||
proxy-network:
|
||||
driver: bridge
|
||||
|
|
@ -0,0 +1,24 @@
|
|||
services:
|
||||
zwave-js-ui:
|
||||
container_name: zwave-js-ui
|
||||
image: zwavejs/zwave-js-ui:latest
|
||||
restart: unless-stopped
|
||||
tty: true
|
||||
stop_signal: SIGINT
|
||||
environment:
|
||||
- SESSION_SECRET=pacifier-cash-achiness5-reprise
|
||||
- TZ=America/Chicago
|
||||
# devices:
|
||||
# 🔧 CRITICAL: Replace with your Z-Wave stick's path
|
||||
# - '/dev/serial/by-id/usb-<YOUR_SPECIFIC_STICK_REFERENCE>:/dev/zwave'
|
||||
volumes:
|
||||
# 💾 Persists Z-Wave network data and configuration
|
||||
- ./zwavejs-store:/usr/src/app/store
|
||||
ports:
|
||||
- "8091:8091" # Web interface
|
||||
- "3000:3000" # Z-Wave JS WebSocket server (for HA)
|
||||
networks:
|
||||
- homeautomation_net
|
||||
networks:
|
||||
homeautomation_net:
|
||||
external: true
|
||||
Loading…
Reference in New Issue