mirror of
https://github.com/linuxserver/docker-swag.git
synced 2025-03-13 09:36:39 -04:00
Compare commits
944 Commits
1.8.0-ls11
...
master
Author | SHA1 | Date | |
---|---|---|---|
![]() |
5a8b8010ee | ||
![]() |
586eaa3b4c | ||
![]() |
2528e2f027 | ||
![]() |
4632ecb91a | ||
![]() |
615ccbc589 | ||
![]() |
199d0a6707 | ||
![]() |
f8171d73ce | ||
![]() |
503578a870 | ||
![]() |
b4978e40c5 | ||
![]() |
ed765dbdc1 | ||
![]() |
6fcd946c0a | ||
![]() |
c1d1a87a0c | ||
![]() |
990c95b7d9 | ||
![]() |
d83dc89c84 | ||
![]() |
7046e938e0 | ||
![]() |
27e2e83f03 | ||
![]() |
f11dbcea78 | ||
![]() |
07e9ada724 | ||
![]() |
ae72916deb | ||
![]() |
06b385d25c | ||
![]() |
8753119d54 | ||
![]() |
1f2cc4ade5 | ||
![]() |
fc0986b0be | ||
![]() |
564fbd271a | ||
![]() |
bffc4c9236 | ||
![]() |
14cab18c36 | ||
![]() |
c0adf4fd0a | ||
![]() |
2160126f96 | ||
![]() |
d81e33b63b | ||
![]() |
21b5a79e06 | ||
![]() |
02ed03a455 | ||
![]() |
515fdf45d8 | ||
![]() |
5a5d0ebaec | ||
![]() |
37deacf13a | ||
![]() |
16d5763dcc | ||
![]() |
e12d7e642c | ||
![]() |
0cddb6d6b7 | ||
![]() |
ff8cf3bfa5 | ||
![]() |
db05a6b72b | ||
![]() |
410fa0515e | ||
![]() |
e1ece8ac1c | ||
![]() |
d33df2224b | ||
![]() |
3b98b3ae65 | ||
![]() |
af6a3a2163 | ||
![]() |
7a8a360746 | ||
![]() |
f467b9539b | ||
![]() |
3aae7b50d9 | ||
![]() |
98e22cb66d | ||
![]() |
0a9c7ff821 | ||
![]() |
6dd89c8232 | ||
![]() |
d376c95088 | ||
![]() |
9a63c22e77 | ||
![]() |
29bd5fe1b7 | ||
![]() |
2e005369f1 | ||
![]() |
d9a92bd940 | ||
![]() |
892cf960a9 | ||
![]() |
aaa6ae77b5 | ||
![]() |
c489e2c07f | ||
![]() |
7f4aabeef7 | ||
![]() |
03f8285212 | ||
![]() |
589b80e492 | ||
![]() |
2dc24f90c7 | ||
![]() |
e56ade75fb | ||
![]() |
584ca6732c | ||
![]() |
4e109fb858 | ||
![]() |
4788f2b855 | ||
![]() |
397106ec30 | ||
![]() |
ab9d0b8037 | ||
![]() |
19e9b1158d | ||
![]() |
0a87bdaba8 | ||
![]() |
2f2d7033b1 | ||
![]() |
cbc7b3de09 | ||
![]() |
73806b2032 | ||
![]() |
f3c87c3935 | ||
![]() |
20a134924f | ||
![]() |
9971d2f50b | ||
![]() |
4e1f959980 | ||
![]() |
f94e685a65 | ||
![]() |
bfeeaaaa73 | ||
![]() |
4437f6f8ba | ||
![]() |
ed7c58a4c3 | ||
![]() |
ca3830de35 | ||
![]() |
e932493428 | ||
![]() |
cd77a9cd2a | ||
![]() |
7e9db0db80 | ||
![]() |
ffecc6ee8b | ||
![]() |
2b18659591 | ||
![]() |
54e3eeb6e8 | ||
![]() |
7066b4c1ea | ||
![]() |
66ea2cbad6 | ||
![]() |
139a27f1bf | ||
![]() |
d107e3cbef | ||
![]() |
08e91b3dc3 | ||
![]() |
8decebad67 | ||
![]() |
7b828b92e8 | ||
![]() |
db6fbc2731 | ||
![]() |
aaee5b4737 | ||
![]() |
30165272ef | ||
![]() |
1c052fdd0d | ||
![]() |
b569c84976 | ||
![]() |
c14b42f85d | ||
![]() |
60b6827133 | ||
![]() |
cef4d471e1 | ||
![]() |
eaafc4393b | ||
![]() |
94c72584a7 | ||
![]() |
59d1c8a724 | ||
![]() |
ed0c949267 | ||
![]() |
5027f6f7b3 | ||
![]() |
502d10303c | ||
![]() |
05bccb95ab | ||
![]() |
00afe35e21 | ||
![]() |
e1340c6c9e | ||
![]() |
96998a1002 | ||
![]() |
4fb557dcda | ||
![]() |
ea13c5a885 | ||
![]() |
ee0f1247d9 | ||
![]() |
a8cf2c5c40 | ||
![]() |
62faebf642 | ||
![]() |
81e65837ca | ||
![]() |
a08edc14d2 | ||
![]() |
edf1abd83a | ||
![]() |
0357efea87 | ||
![]() |
aa103ce997 | ||
![]() |
20bbf040e0 | ||
![]() |
e4a6e31b6f | ||
![]() |
5b096a8a66 | ||
![]() |
eb6dba6cbe | ||
![]() |
afd6c9d827 | ||
![]() |
daa84f28b4 | ||
![]() |
cd931076e4 | ||
![]() |
f5ce44887f | ||
![]() |
875a17dfc7 | ||
![]() |
210134745d | ||
![]() |
9d469c2957 | ||
![]() |
37e64ebdac | ||
![]() |
47fc525094 | ||
![]() |
625b11d21c | ||
![]() |
77accb3762 | ||
![]() |
7dcce8b346 | ||
![]() |
03286fc238 | ||
![]() |
7391dc1bcf | ||
![]() |
a7ea6a955b | ||
![]() |
e149638808 | ||
![]() |
41cb7cb104 | ||
![]() |
1499cbe7de | ||
![]() |
5a7d49ec43 | ||
![]() |
05b586d6df | ||
![]() |
d6d1432ff8 | ||
![]() |
efc2f55f48 | ||
![]() |
95c13d0082 | ||
![]() |
e05fc4b1e3 | ||
![]() |
099e0e75a4 | ||
![]() |
fc1675f3a1 | ||
![]() |
dc1bc6d5b3 | ||
![]() |
db6f61bd27 | ||
![]() |
67f864c7b9 | ||
![]() |
3f885d0415 | ||
![]() |
280c4bde4b | ||
![]() |
59e7865464 | ||
![]() |
5c58fa9383 | ||
![]() |
ae19b93cc7 | ||
![]() |
5dee340726 | ||
![]() |
3109ff8d9c | ||
![]() |
4239dc22d4 | ||
![]() |
44c6bd721b | ||
![]() |
d4a6be8fad | ||
![]() |
a66b478d1d | ||
![]() |
9efac76e25 | ||
![]() |
23c6384f2c | ||
![]() |
13ede8ea87 | ||
![]() |
a9391d07ee | ||
![]() |
a00d272297 | ||
![]() |
0207bd8f30 | ||
![]() |
3fd209d686 | ||
![]() |
87ced3fd3e | ||
![]() |
3e342b0529 | ||
![]() |
c9504bb55f | ||
![]() |
2573149089 | ||
![]() |
9b3f418afd | ||
![]() |
c63b437e1f | ||
![]() |
f14c6a7a3a | ||
![]() |
4b4c103df4 | ||
![]() |
26203c8c40 | ||
![]() |
259850fcc5 | ||
![]() |
c6474f07ea | ||
![]() |
b6a196b93a | ||
![]() |
3967276f06 | ||
![]() |
4853736c4e | ||
![]() |
a8d03c5280 | ||
![]() |
907dfc8c03 | ||
![]() |
bf21a51e10 | ||
![]() |
32f72ac0b4 | ||
![]() |
970fa75e87 | ||
![]() |
137ad9f52e | ||
![]() |
5d0ec79ac5 | ||
![]() |
3145477f72 | ||
![]() |
58b9470c52 | ||
![]() |
68f5cf8d9e | ||
![]() |
e8d452f4ce | ||
![]() |
4abd6c9890 | ||
![]() |
c335faabdc | ||
![]() |
204dd90f9d | ||
![]() |
92bfbc19cd | ||
![]() |
cb3c74a6ee | ||
![]() |
b7f40863fe | ||
![]() |
ec6fca9418 | ||
![]() |
25a2832056 | ||
![]() |
3eabd75388 | ||
![]() |
6ed17c1d52 | ||
![]() |
e568785908 | ||
![]() |
bcee5182e6 | ||
![]() |
514cf42606 | ||
![]() |
270a0d57c9 | ||
![]() |
6f51d8be26 | ||
![]() |
d915d516cd | ||
![]() |
ffb03a03f5 | ||
![]() |
9693b5884f | ||
![]() |
87ca95c8c2 | ||
![]() |
1a376a6975 | ||
![]() |
8e74593f2c | ||
![]() |
00d1bce24d | ||
![]() |
be853fcb4b | ||
![]() |
2fb6c1f51f | ||
![]() |
9339d287d2 | ||
![]() |
6b62a27bf0 | ||
![]() |
c50ca83ef9 | ||
![]() |
bd94a67024 | ||
![]() |
11e060174b | ||
![]() |
5f8a531a93 | ||
![]() |
d2f843c4d1 | ||
![]() |
ad6bb30bfc | ||
![]() |
11991aa0b3 | ||
![]() |
c76e664965 | ||
![]() |
ccbd19fe62 | ||
![]() |
2573b79bad | ||
![]() |
0e5ba91588 | ||
![]() |
4f92460b29 | ||
![]() |
ad1884e5b4 | ||
![]() |
70bea0a816 | ||
![]() |
85e44eb399 | ||
![]() |
4d3f30b67c | ||
![]() |
9da97969f8 | ||
![]() |
2cd84ad12b | ||
![]() |
757ef31216 | ||
![]() |
767aad2286 | ||
![]() |
4cb18bc106 | ||
![]() |
b1cf98d214 | ||
![]() |
48dfde26c7 | ||
![]() |
320404d358 | ||
![]() |
52ae487bea | ||
![]() |
65f62d14a6 | ||
![]() |
accd20cc7a | ||
![]() |
24b3540da5 | ||
![]() |
bc31b51afb | ||
![]() |
bf6ab14281 | ||
![]() |
7c5d1d886c | ||
![]() |
5b77a54620 | ||
![]() |
3b1478667b | ||
![]() |
0ddf8a270b | ||
![]() |
dabbaa3b14 | ||
![]() |
bdd5e047ee | ||
![]() |
78689b02e2 | ||
![]() |
6c1c4cd00a | ||
![]() |
31cef5050f | ||
![]() |
52e8f7223e | ||
![]() |
1abab5cb6d | ||
![]() |
0061faef15 | ||
![]() |
6e64bcbd7e | ||
![]() |
b9dd1b7c5a | ||
![]() |
e9bceab763 | ||
![]() |
eba3c341fa | ||
![]() |
5fc5825afd | ||
![]() |
de18e4ef24 | ||
![]() |
fbe212b67c | ||
![]() |
2ca6807b64 | ||
![]() |
e3560414dc | ||
![]() |
2f4162578f | ||
![]() |
2697b74a8c | ||
![]() |
bd685533a2 | ||
![]() |
287b952aea | ||
![]() |
576b81ab91 | ||
![]() |
8b0df1fcbb | ||
![]() |
efdfa45f37 | ||
![]() |
278b57fb47 | ||
![]() |
82e85d22c1 | ||
![]() |
8b49f2b0d4 | ||
![]() |
10d0877547 | ||
![]() |
8fdb472564 | ||
![]() |
f6d0e3089a | ||
![]() |
5ceac2e2ec | ||
![]() |
5b6498b1a9 | ||
![]() |
118a76530e | ||
![]() |
0499547b96 | ||
![]() |
9cf01a0085 | ||
![]() |
2b5a2785d6 | ||
![]() |
202db184b3 | ||
![]() |
3ed39caf43 | ||
![]() |
9353e4e8a5 | ||
![]() |
39e3159f39 | ||
![]() |
9ba44dccee | ||
![]() |
49f6fb2b6e | ||
![]() |
693c24173b | ||
![]() |
8a90cf85d8 | ||
![]() |
fd958fe6b3 | ||
![]() |
eb8f12b5de | ||
![]() |
dae223ca0f | ||
![]() |
14226ce700 | ||
![]() |
b64bb62303 | ||
![]() |
f478a200e8 | ||
![]() |
40200982d1 | ||
![]() |
3476f8b6f6 | ||
![]() |
3e9dc80ed4 | ||
![]() |
4486d528d1 | ||
![]() |
e0032ecfd4 | ||
![]() |
b1c1262a2c | ||
![]() |
3b49643c78 | ||
![]() |
23728cba0b | ||
![]() |
7e1db9c562 | ||
![]() |
919b8ac152 | ||
![]() |
0f9d247ba4 | ||
![]() |
cab0b86b65 | ||
![]() |
4d3875d37e | ||
![]() |
badea52047 | ||
![]() |
97baf76a10 | ||
![]() |
6ed02e1e00 | ||
![]() |
a6778ab7c7 | ||
![]() |
95c791acfc | ||
![]() |
42ccafc064 | ||
![]() |
6b7cdb26f1 | ||
![]() |
e19a030eff | ||
![]() |
4d4cb0ca74 | ||
![]() |
0b738d9ee0 | ||
![]() |
269e9cdd3f | ||
![]() |
17387674b8 | ||
![]() |
9554582962 | ||
![]() |
42ebe4a584 | ||
![]() |
b9f5763ee5 | ||
![]() |
2b0bf5869c | ||
![]() |
b46830f214 | ||
![]() |
66a8694772 | ||
![]() |
33568e1bd3 | ||
![]() |
0004cd1ce8 | ||
![]() |
8dbd50ac06 | ||
![]() |
cae42496e2 | ||
![]() |
2f8c5b4487 | ||
![]() |
9f75c7a713 | ||
![]() |
262c1013aa | ||
![]() |
54e4cfa047 | ||
![]() |
97ba6a7de9 | ||
![]() |
f11a753445 | ||
![]() |
ee6153c817 | ||
![]() |
93424877a9 | ||
![]() |
eaf8b3648b | ||
![]() |
b754cedda2 | ||
![]() |
0d05560652 | ||
![]() |
7f9b637353 | ||
![]() |
675d67bbd4 | ||
![]() |
402d513115 | ||
![]() |
fac669ea43 | ||
![]() |
3aab75dc8b | ||
![]() |
b2e8d8c8ab | ||
![]() |
973abbefbb | ||
![]() |
dede63fdcf | ||
![]() |
bee6793d45 | ||
![]() |
29e9daa606 | ||
![]() |
57c0d1f81e | ||
![]() |
416bef8a2e | ||
![]() |
500d5606e4 | ||
![]() |
500fd0c634 | ||
![]() |
adf38bcd2b | ||
![]() |
5255b117f9 | ||
![]() |
d7a8d6cc6a | ||
![]() |
d67459e852 | ||
![]() |
0ddb5be5f5 | ||
![]() |
60f6fafc53 | ||
![]() |
d5c530af49 | ||
![]() |
be215d62aa | ||
![]() |
db54dfaf71 | ||
![]() |
0d70436ddb | ||
![]() |
49d848b639 | ||
![]() |
2df15e7b96 | ||
![]() |
7a6c539527 | ||
![]() |
230ad93b35 | ||
![]() |
cc3e0b590e | ||
![]() |
f9a5348035 | ||
![]() |
ba685e7fd0 | ||
![]() |
97782cdbed | ||
![]() |
38bbfb2d01 | ||
![]() |
5b492be3d7 | ||
![]() |
9d695718f0 | ||
![]() |
74069d4742 | ||
![]() |
c77eca9ec3 | ||
![]() |
5b4a34c0e3 | ||
![]() |
908571dea8 | ||
![]() |
10d1bf7b96 | ||
![]() |
24f3353692 | ||
![]() |
dee14d718b | ||
![]() |
5438dbf13c | ||
![]() |
77b9dc3348 | ||
![]() |
a2e3c8b9fb | ||
![]() |
d8f252dd73 | ||
![]() |
9cdedad1c8 | ||
![]() |
d7e2455e7a | ||
![]() |
2f740e60a8 | ||
![]() |
cfb3fae7cf | ||
![]() |
9357986f27 | ||
![]() |
eb0bcf14dd | ||
![]() |
97e2720b9c | ||
![]() |
7550f946ff | ||
![]() |
80705ccf19 | ||
![]() |
7a831681c5 | ||
![]() |
43a7239fbf | ||
![]() |
73938cb4a1 | ||
![]() |
1d6a30144b | ||
![]() |
2e59ae36c1 | ||
![]() |
e72e9f6ed0 | ||
![]() |
91d449259f | ||
![]() |
dd17b24158 | ||
![]() |
17f70e4a31 | ||
![]() |
6619c4e0cd | ||
![]() |
a06bea000c | ||
![]() |
62401a38e7 | ||
![]() |
acef819cc1 | ||
![]() |
74828b1e8d | ||
![]() |
7e1758fde0 | ||
![]() |
e2731a1227 | ||
![]() |
0a919148ff | ||
![]() |
6fcd80b175 | ||
![]() |
c9359819b6 | ||
![]() |
ce32306873 | ||
![]() |
9ce4ec598d | ||
![]() |
9488a4fa1d | ||
![]() |
3105c07c72 | ||
![]() |
286e74c027 | ||
![]() |
b909214614 | ||
![]() |
70c66c5495 | ||
![]() |
430308342f | ||
![]() |
97222fbb25 | ||
![]() |
b00bf6caf2 | ||
![]() |
7dac282621 | ||
![]() |
0c1936f8ec | ||
![]() |
e5bb6e4a9d | ||
![]() |
951fafd0b9 | ||
![]() |
ebd233860e | ||
![]() |
8a1793ac6b | ||
![]() |
6ac90997ca | ||
![]() |
94d9ec6ef1 | ||
![]() |
8ca0f24782 | ||
![]() |
4899670c70 | ||
![]() |
b7fba5e404 | ||
![]() |
605b7b8ad7 | ||
![]() |
3a70f75402 | ||
![]() |
28df27df1f | ||
![]() |
dd96c54279 | ||
![]() |
1f42ec3bd5 | ||
![]() |
f5c2f5a154 | ||
![]() |
637d304123 | ||
![]() |
9bc38ff91c | ||
![]() |
07a02d4641 | ||
![]() |
635990d3ff | ||
![]() |
d85216d876 | ||
![]() |
03f58b3f2c | ||
![]() |
5fb909d7dc | ||
![]() |
fd6d8764a2 | ||
![]() |
ab7c85e4de | ||
![]() |
d60847483d | ||
![]() |
53bb2e284f | ||
![]() |
43e50ffb03 | ||
![]() |
18019fb216 | ||
![]() |
d57dffef82 | ||
![]() |
823c4e8ff6 | ||
![]() |
b7ad54dbfb | ||
![]() |
11edbd85e3 | ||
![]() |
7d12260681 | ||
![]() |
a4b9e77d08 | ||
![]() |
b5b950b1a9 | ||
![]() |
83bc8a3bd7 | ||
![]() |
b095dd7d50 | ||
![]() |
fbb28ff5f7 | ||
![]() |
0cc47e6922 | ||
![]() |
3f9c403fd6 | ||
![]() |
79f6dd4cb1 | ||
![]() |
5683a3f232 | ||
![]() |
f9f9b677d9 | ||
![]() |
d838ef6d13 | ||
![]() |
67e2691258 | ||
![]() |
1a81ab0ef2 | ||
![]() |
cc2380b2b6 | ||
![]() |
ed104eb203 | ||
![]() |
3bab8b6b77 | ||
![]() |
0b038edb4a | ||
![]() |
c7eba518d6 | ||
![]() |
9e7ef6154d | ||
![]() |
cba7e6703c | ||
![]() |
b73f17181a | ||
![]() |
01c28da51e | ||
![]() |
0d92109b68 | ||
![]() |
3ef896e611 | ||
![]() |
e057a7ce0d | ||
![]() |
db4e661126 | ||
![]() |
c137a66726 | ||
![]() |
7be5f1caec | ||
![]() |
777fa62481 | ||
![]() |
a95a0f639a | ||
![]() |
c686dfee47 | ||
![]() |
a91fe2b269 | ||
![]() |
a184bb33ca | ||
![]() |
38e1845e73 | ||
![]() |
5e47b02496 | ||
![]() |
f6438c4a66 | ||
![]() |
72cb34675c | ||
![]() |
ade05a74ae | ||
![]() |
2244ff579f | ||
![]() |
494d0a1141 | ||
![]() |
ba54174830 | ||
![]() |
db1f5f88ed | ||
![]() |
f6529ad8fb | ||
![]() |
b109deb4dd | ||
![]() |
8938e296d9 | ||
![]() |
46e5156c21 | ||
![]() |
3980ee1ecf | ||
![]() |
cf21b8c68e | ||
![]() |
1771853341 | ||
![]() |
c7d1a46026 | ||
![]() |
3539bd10f0 | ||
![]() |
86c3d8aa7b | ||
![]() |
7d02d46fc8 | ||
![]() |
ec82d97157 | ||
![]() |
ba233a6dc8 | ||
![]() |
1df8d5f636 | ||
![]() |
07fb6a8901 | ||
![]() |
672c5236e9 | ||
![]() |
82b3b747a1 | ||
![]() |
5a0bf1223c | ||
![]() |
bb40077a49 | ||
![]() |
6bbdb71917 | ||
![]() |
28bfdc32e7 | ||
![]() |
03b5b1eccf | ||
![]() |
7b9c67838f | ||
![]() |
a728e27b97 | ||
![]() |
fef9273200 | ||
![]() |
a382848494 | ||
![]() |
b642a82fb2 | ||
![]() |
c81265ea4d | ||
![]() |
779c55fed6 | ||
![]() |
77d02ad824 | ||
![]() |
4409dfae18 | ||
![]() |
ed5efcfa75 | ||
![]() |
96fc59d975 | ||
![]() |
c5b8744d3b | ||
![]() |
a625256151 | ||
![]() |
003b5d4daf | ||
![]() |
29028b67f4 | ||
![]() |
d51b7e1f3a | ||
![]() |
ae58a9757d | ||
![]() |
92092b79ea | ||
![]() |
1dcec348c0 | ||
![]() |
5e80d765da | ||
![]() |
9738646eef | ||
![]() |
820e040082 | ||
![]() |
3db8f51eb0 | ||
![]() |
588dde99ed | ||
![]() |
9f88c9343b | ||
![]() |
47cb0bffe3 | ||
![]() |
d159fde608 | ||
![]() |
263cceda4c | ||
![]() |
631fe9ecc3 | ||
![]() |
f2bc6b05bc | ||
![]() |
3f8ac5552f | ||
![]() |
a26528919c | ||
![]() |
14cc464d65 | ||
![]() |
4221059496 | ||
![]() |
d00d2dbe95 | ||
![]() |
c07939aed0 | ||
![]() |
8b1311c3f1 | ||
![]() |
fcffe2b169 | ||
![]() |
b82c474941 | ||
![]() |
56bb365cee | ||
![]() |
b692c69c4d | ||
![]() |
806ac9fa7f | ||
![]() |
53db9755b2 | ||
![]() |
3fb6e3f54d | ||
![]() |
e2d02de457 | ||
![]() |
51dc4ce7b2 | ||
![]() |
29a1c29be3 | ||
![]() |
54e817b3b4 | ||
![]() |
0de67cc224 | ||
![]() |
9a05528398 | ||
![]() |
c79b0765df | ||
![]() |
34d11c5886 | ||
![]() |
74723be0b5 | ||
![]() |
c82e0fef4d | ||
![]() |
fe294ddb85 | ||
![]() |
9e54a3b9bd | ||
![]() |
207256ad66 | ||
![]() |
5c67314530 | ||
![]() |
090934e854 | ||
![]() |
0aaa4faf2d | ||
![]() |
b346b4610c | ||
![]() |
c51ae10f47 | ||
![]() |
132666a2a0 | ||
![]() |
58c0c03187 | ||
![]() |
1f6ebcacba | ||
![]() |
cef4185e28 | ||
![]() |
6a32528288 | ||
![]() |
c6c9e02285 | ||
![]() |
f3f295a09e | ||
![]() |
96f746d5ce | ||
![]() |
8d5430dada | ||
![]() |
b2e05fe4de | ||
![]() |
768aaeaedb | ||
![]() |
ea2d9b30eb | ||
![]() |
2f4c1fed51 | ||
![]() |
c9394cd08f | ||
![]() |
6123952de7 | ||
![]() |
f23d9fbeff | ||
![]() |
e6628f05c3 | ||
![]() |
f8ee44ca8d | ||
![]() |
a5d730d298 | ||
![]() |
e22a083d7a | ||
![]() |
a2371253a7 | ||
![]() |
4864761b54 | ||
![]() |
3d70935ecf | ||
![]() |
e5b672e52b | ||
![]() |
1adf35b5df | ||
![]() |
c279c173b3 | ||
![]() |
8ed7c7ee28 | ||
![]() |
1f42c02a4a | ||
![]() |
37b5af4856 | ||
![]() |
016dc18007 | ||
![]() |
dd034ef3c1 | ||
![]() |
0069f887a7 | ||
![]() |
623e99c6ab | ||
![]() |
996d3b26df | ||
![]() |
252d57cf34 | ||
![]() |
4b486b547c | ||
![]() |
ef95db397b | ||
![]() |
0bb1f55280 | ||
![]() |
5df55cc0c0 | ||
![]() |
ceabef087f | ||
![]() |
6f9ed0721d | ||
![]() |
5319c88dfa | ||
![]() |
c875b69297 | ||
![]() |
3893db4077 | ||
![]() |
f8e4eca8d0 | ||
![]() |
ee6a7d454f | ||
![]() |
f29ae615d4 | ||
![]() |
a9fd11ff77 | ||
![]() |
60c0da359b | ||
![]() |
bec249ba73 | ||
![]() |
eb7df9d9fc | ||
![]() |
a29f2da10e | ||
![]() |
a9e53d5fc8 | ||
![]() |
f9e05fd86a | ||
![]() |
b28eed1263 | ||
![]() |
7eb8f7999e | ||
![]() |
5beb4ffb32 | ||
![]() |
9821740d65 | ||
![]() |
5501308aed | ||
![]() |
2272c3037a | ||
![]() |
cf8cfd4241 | ||
![]() |
a5389c3f40 | ||
![]() |
1fbae23bcf | ||
![]() |
de3b43cb62 | ||
![]() |
555b2837cb | ||
![]() |
7c5005f9ad | ||
![]() |
7fb7364c96 | ||
![]() |
274369c4ba | ||
![]() |
7562a1c26a | ||
![]() |
7d6b5e66c1 | ||
![]() |
6fde2f5f8f | ||
![]() |
08d0680a0c | ||
![]() |
665eace79f | ||
![]() |
51d6132d63 | ||
![]() |
251917b23f | ||
![]() |
bedff470cf | ||
![]() |
84cdf58b66 | ||
![]() |
e843b50fc8 | ||
![]() |
1ff4691000 | ||
![]() |
682689d0fc | ||
![]() |
29a92e6bf1 | ||
![]() |
119df9f88b | ||
![]() |
4929672e62 | ||
![]() |
522fed5d1b | ||
![]() |
7b2dab1fbf | ||
![]() |
2878d84050 | ||
![]() |
3b0095bdec | ||
![]() |
4989825cb0 | ||
![]() |
96e0fc7838 | ||
![]() |
6f3a967360 | ||
![]() |
671d51a345 | ||
![]() |
2a9294a1db | ||
![]() |
a001fd849b | ||
![]() |
f617df2ba7 | ||
![]() |
0952b6eb3e | ||
![]() |
cb5a367323 | ||
![]() |
85efd12ba4 | ||
![]() |
df1ba1c60a | ||
![]() |
5f526e4f89 | ||
![]() |
f9090d4a50 | ||
![]() |
48f6b00530 | ||
![]() |
146687121e | ||
![]() |
f307dbbfb7 | ||
![]() |
93ba4f18b1 | ||
![]() |
ce544dd810 | ||
![]() |
411970a947 | ||
![]() |
7ea16018d5 | ||
![]() |
8a4af00f01 | ||
![]() |
fee6fe9a17 | ||
![]() |
bf21716886 | ||
![]() |
0d5f7b24b8 | ||
![]() |
637ddc29a5 | ||
![]() |
9b169f5da2 | ||
![]() |
71cda1f685 | ||
![]() |
08c23bde51 | ||
![]() |
0109a07cfb | ||
![]() |
0ce2ae551a | ||
![]() |
00fde50825 | ||
![]() |
69649d102f | ||
![]() |
66a4c1203b | ||
![]() |
c40c2bd6e5 | ||
![]() |
11302bce96 | ||
![]() |
537c47f293 | ||
![]() |
d65b388b9f | ||
![]() |
ed3402fe51 | ||
![]() |
f63303b610 | ||
![]() |
9953568f06 | ||
![]() |
915f209ea5 | ||
![]() |
3ff891f75d | ||
![]() |
e9bea31a3f | ||
![]() |
09dff4ff5e | ||
![]() |
0ffa850cdc | ||
![]() |
aa9990b496 | ||
![]() |
8c150cf0fa | ||
![]() |
e2dc9fe654 | ||
![]() |
ce33eeebe7 | ||
![]() |
d027970b50 | ||
![]() |
a73daf773a | ||
![]() |
3f88a30d5c | ||
![]() |
b72b1b25ea | ||
![]() |
73c0dc9084 | ||
![]() |
da8f646fc8 | ||
![]() |
b309e1ce45 | ||
![]() |
10b235cc1d | ||
![]() |
9f700b50d9 | ||
![]() |
e37e972875 | ||
![]() |
e2699a7ee8 | ||
![]() |
0aa7ffb50d | ||
![]() |
f89d5883d9 | ||
![]() |
5c5751255b | ||
![]() |
1afac8b5bf | ||
![]() |
093fadb043 | ||
![]() |
4a6038f334 | ||
![]() |
71be04a03f | ||
![]() |
d19e63a447 | ||
![]() |
1ae82126d8 | ||
![]() |
44f30c7ae3 | ||
![]() |
e4a5adec12 | ||
![]() |
5a72468780 | ||
![]() |
31190157fb | ||
![]() |
d467a56034 | ||
![]() |
e55894357e | ||
![]() |
329d7e8f93 | ||
![]() |
a2e3cfb521 | ||
![]() |
899f6c96aa | ||
![]() |
bff85f23d3 | ||
![]() |
326e102f40 | ||
![]() |
89714012c6 | ||
![]() |
dc3092d518 | ||
![]() |
a82f689c38 | ||
![]() |
4894a0d688 | ||
![]() |
554f25a70e | ||
![]() |
5a2aa4cb62 | ||
![]() |
554ab25d3d | ||
![]() |
03a9f9329a | ||
![]() |
92d1400da8 | ||
![]() |
ae590fab05 | ||
![]() |
cc003df158 | ||
![]() |
0546211470 | ||
![]() |
056f27437e | ||
![]() |
7437478c3a | ||
![]() |
020ab44638 | ||
![]() |
224abb686d | ||
![]() |
413942d1fe | ||
![]() |
a8f98a205f | ||
![]() |
aa94da0665 | ||
![]() |
31d9e9af85 | ||
![]() |
012e729f49 | ||
![]() |
dbfe483f22 | ||
![]() |
27e727eede | ||
![]() |
1cc2e4d395 | ||
![]() |
12386fbfc7 | ||
![]() |
fcd004dfdc | ||
![]() |
2ea807dd02 | ||
![]() |
49bd204b51 | ||
![]() |
24c5e9f243 | ||
![]() |
c48705cbc4 | ||
![]() |
f0514ebdc1 | ||
![]() |
b1ae12189f | ||
![]() |
d77a64aab8 | ||
![]() |
e2e39b9f89 | ||
![]() |
870cd4bd93 | ||
![]() |
6aa2e01ec3 | ||
![]() |
4d1c0d286b | ||
![]() |
1cb549ede1 | ||
![]() |
706e133b60 | ||
![]() |
fffa782d67 | ||
![]() |
9d016ec049 | ||
![]() |
e116a1829e | ||
![]() |
1f54740dc0 | ||
![]() |
d675686e17 | ||
![]() |
7cb21be1d1 | ||
![]() |
50b3c86a9e | ||
![]() |
6217372efe | ||
![]() |
8ff31a71c1 | ||
![]() |
ff56929cf7 | ||
![]() |
28cdf9b8c6 | ||
![]() |
0ac5a2a4f2 | ||
![]() |
36495ea204 | ||
![]() |
a9be9a304f | ||
![]() |
867da78277 | ||
![]() |
c0f8b3a8b2 | ||
![]() |
9463ffdc73 | ||
![]() |
4a43425d74 | ||
![]() |
7f0a3bfa80 | ||
![]() |
6f8101e9b1 | ||
![]() |
1a16a7c415 | ||
![]() |
a134aa0d41 | ||
![]() |
30d407e922 | ||
![]() |
79d8ff0378 | ||
![]() |
2988ac4a5f | ||
![]() |
a158c34ab9 | ||
![]() |
ed57a1038e | ||
![]() |
a8c55b455a | ||
![]() |
f0be12bcda | ||
![]() |
adfe04cedb | ||
![]() |
d075d3e2c3 | ||
![]() |
a84c6883a6 | ||
![]() |
61a5c40902 | ||
![]() |
0a32a84d8a | ||
![]() |
e7b5816304 | ||
![]() |
b71f99cb7b | ||
![]() |
dbd8fd4bd0 | ||
![]() |
9074cf2d44 | ||
![]() |
479ee5eac1 | ||
![]() |
d7ce59b839 | ||
![]() |
69fdcc1ff3 | ||
![]() |
00484f51d8 | ||
![]() |
363ba433cc | ||
![]() |
de98308c70 | ||
![]() |
db657fa06a | ||
![]() |
6f25f82996 | ||
![]() |
ea8b193858 | ||
![]() |
d5c8106aac | ||
![]() |
cd5f29a8b0 | ||
![]() |
693da376b7 | ||
![]() |
d9f3a34a42 | ||
![]() |
8ac274550f | ||
![]() |
07e1ab096c | ||
![]() |
99a4c55dcb | ||
![]() |
9a09573590 | ||
![]() |
00511ebb7a | ||
![]() |
71747b2a6f | ||
![]() |
af548a0966 | ||
![]() |
bb53d24b40 | ||
![]() |
f0fd8e67fd | ||
![]() |
77a82f7163 | ||
![]() |
0c7bc26fc2 | ||
![]() |
6ebfdc1e87 | ||
![]() |
df74c02b4d | ||
![]() |
76f0a8c34c | ||
![]() |
87cdcfdb18 | ||
![]() |
71397b40fd | ||
![]() |
832dde3b35 | ||
![]() |
236553d119 | ||
![]() |
b91ce7bd1a | ||
![]() |
0a1b8cf801 | ||
![]() |
21e9d7298a | ||
![]() |
1f85492fd5 | ||
![]() |
3844b7f660 | ||
![]() |
7f6840373a | ||
![]() |
371b7d49ec | ||
![]() |
42e0e7452b | ||
![]() |
471b018126 | ||
![]() |
7c5bf4269c | ||
![]() |
ffd9b806f9 | ||
![]() |
1a7bdec09b | ||
![]() |
1bdf9a98e2 | ||
![]() |
7232890186 | ||
![]() |
536c903fe2 | ||
![]() |
1769aad85f | ||
![]() |
dc55d77965 | ||
![]() |
8de14f3790 | ||
![]() |
1831bbbbcf | ||
![]() |
b884e4181e | ||
![]() |
cd57dff765 | ||
![]() |
5538ef6736 | ||
![]() |
68e91b2870 | ||
![]() |
0bebcbed52 | ||
![]() |
64b676eb06 | ||
![]() |
46c804c696 | ||
![]() |
cf74fe7a39 | ||
![]() |
177ba1b378 | ||
![]() |
aded96c0a4 | ||
![]() |
8bcf64041a | ||
![]() |
04745dcf1f | ||
![]() |
0a4cac7f35 | ||
![]() |
95e7ef9db3 | ||
![]() |
515addf76e | ||
![]() |
046fb5447a | ||
![]() |
f23595d0b9 | ||
![]() |
812f2d3df5 | ||
![]() |
71734a4e49 | ||
![]() |
4d9439c899 | ||
![]() |
a910da2633 | ||
![]() |
35fa03e01c | ||
![]() |
9de23713ca | ||
![]() |
3e3dccd836 | ||
![]() |
1d08b6f2e1 | ||
![]() |
01dd12f567 | ||
![]() |
50371fea4f | ||
![]() |
3b927f6857 | ||
![]() |
a81ab8bcf1 | ||
![]() |
38fa575e1e | ||
![]() |
f105551398 | ||
![]() |
02310836df | ||
![]() |
34c2a6243e | ||
![]() |
bd2913b084 | ||
![]() |
c230a05837 | ||
![]() |
2c78490f28 | ||
![]() |
6d8b490e76 | ||
![]() |
8d5f6e56b8 | ||
![]() |
692600c1dc | ||
![]() |
27d9d961ac | ||
![]() |
58565590b0 | ||
![]() |
e2e9662983 | ||
![]() |
f626c5f0d4 | ||
![]() |
b58ee45818 | ||
![]() |
891aa6bc71 | ||
![]() |
9b39eaea1f | ||
![]() |
3ac3035efd | ||
![]() |
b3af27456a | ||
![]() |
9299466506 | ||
![]() |
57b70d654b |
20
.editorconfig
Executable file
20
.editorconfig
Executable file
@ -0,0 +1,20 @@
|
|||||||
|
# This file is globally distributed to all container image projects from
|
||||||
|
# https://github.com/linuxserver/docker-jenkins-builder/blob/master/.editorconfig
|
||||||
|
|
||||||
|
# top-most EditorConfig file
|
||||||
|
root = true
|
||||||
|
|
||||||
|
# Unix-style newlines with a newline ending every file
|
||||||
|
[*]
|
||||||
|
end_of_line = lf
|
||||||
|
insert_final_newline = true
|
||||||
|
# trim_trailing_whitespace may cause unintended issues and should not be globally set true
|
||||||
|
trim_trailing_whitespace = false
|
||||||
|
|
||||||
|
[{Dockerfile*,**.yml}]
|
||||||
|
indent_style = space
|
||||||
|
indent_size = 2
|
||||||
|
|
||||||
|
[{**.sh,root/etc/s6-overlay/s6-rc.d/**,root/etc/cont-init.d/**,root/etc/services.d/**}]
|
||||||
|
indent_style = space
|
||||||
|
indent_size = 4
|
123
.github/CONTRIBUTING.md
vendored
Normal file
123
.github/CONTRIBUTING.md
vendored
Normal file
@ -0,0 +1,123 @@
|
|||||||
|
# Contributing to swag
|
||||||
|
|
||||||
|
## Gotchas
|
||||||
|
|
||||||
|
* While contributing make sure to make all your changes before creating a Pull Request, as our pipeline builds each commit after the PR is open.
|
||||||
|
* Read, and fill the Pull Request template
|
||||||
|
* If this is a fix for a typo (in code, documentation, or the README) please file an issue and let us sort it out. We do not need a PR
|
||||||
|
* If the PR is addressing an existing issue include, closes #\<issue number>, in the body of the PR commit message
|
||||||
|
* If you want to discuss changes, you can also bring it up in [#dev-talk](https://discordapp.com/channels/354974912613449730/757585807061155840) in our [Discord server](https://linuxserver.io/discord)
|
||||||
|
|
||||||
|
## Common files
|
||||||
|
|
||||||
|
| File | Use case |
|
||||||
|
| :----: | --- |
|
||||||
|
| `Dockerfile` | Dockerfile used to build amd64 images |
|
||||||
|
| `Dockerfile.aarch64` | Dockerfile used to build 64bit ARM architectures |
|
||||||
|
| `Dockerfile.armhf` | Dockerfile used to build 32bit ARM architectures |
|
||||||
|
| `Jenkinsfile` | This file is a product of our builder and should not be edited directly. This is used to build the image |
|
||||||
|
| `jenkins-vars.yml` | This file is used to generate the `Jenkinsfile` mentioned above, it only affects the build-process |
|
||||||
|
| `package_versions.txt` | This file is generated as a part of the build-process and should not be edited directly. It lists all the installed packages and their versions |
|
||||||
|
| `README.md` | This file is a product of our builder and should not be edited directly. This displays the readme for the repository and image registries |
|
||||||
|
| `readme-vars.yml` | This file is used to generate the `README.md` |
|
||||||
|
|
||||||
|
## Readme
|
||||||
|
|
||||||
|
If you would like to change our readme, please __**do not**__ directly edit the readme, as it is auto-generated on each commit.
|
||||||
|
Instead edit the [readme-vars.yml](https://github.com/linuxserver/docker-swag/edit/master/readme-vars.yml).
|
||||||
|
|
||||||
|
These variables are used in a template for our [Jenkins Builder](https://github.com/linuxserver/docker-jenkins-builder) as part of an ansible play.
|
||||||
|
Most of these variables are also carried over to [docs.linuxserver.io](https://docs.linuxserver.io/images/docker-swag)
|
||||||
|
|
||||||
|
### Fixing typos or clarify the text in the readme
|
||||||
|
|
||||||
|
There are variables for multiple parts of the readme, the most common ones are:
|
||||||
|
|
||||||
|
| Variable | Description |
|
||||||
|
| :----: | --- |
|
||||||
|
| `project_blurb` | This is the short excerpt shown above the project logo. |
|
||||||
|
| `app_setup_block` | This is the text that shows up under "Application Setup" if enabled |
|
||||||
|
|
||||||
|
### Parameters
|
||||||
|
|
||||||
|
The compose and run examples are also generated from these variables.
|
||||||
|
|
||||||
|
We have a [reference file](https://github.com/linuxserver/docker-jenkins-builder/blob/master/vars/_container-vars-blank) in our Jenkins Builder.
|
||||||
|
|
||||||
|
These are prefixed with `param_` for required parameters, or `opt_param` for optional parameters, except for `cap_add`.
|
||||||
|
Remember to enable param, if currently disabled. This differs between parameters, and can be seen in the reference file.
|
||||||
|
|
||||||
|
Devices, environment variables, ports and volumes expects its variables in a certain way.
|
||||||
|
|
||||||
|
### Devices
|
||||||
|
|
||||||
|
```yml
|
||||||
|
param_devices:
|
||||||
|
- { device_path: "/dev/dri", device_host_path: "/dev/dri", desc: "For hardware transcoding" }
|
||||||
|
opt_param_devices:
|
||||||
|
- { device_path: "/dev/dri", device_host_path: "/dev/dri", desc: "For hardware transcoding" }
|
||||||
|
```
|
||||||
|
|
||||||
|
### Environment variables
|
||||||
|
|
||||||
|
```yml
|
||||||
|
param_env_vars:
|
||||||
|
- { env_var: "TZ", env_value: "Europe/London", desc: "Specify a timezone to use EG Europe/London." }
|
||||||
|
opt_param_env_vars:
|
||||||
|
- { env_var: "VERSION", env_value: "latest", desc: "Supported values are LATEST, PLEXPASS or a specific version number." }
|
||||||
|
```
|
||||||
|
|
||||||
|
### Ports
|
||||||
|
|
||||||
|
```yml
|
||||||
|
param_ports:
|
||||||
|
- { external_port: "80", internal_port: "80", port_desc: "Application WebUI" }
|
||||||
|
opt_param_ports:
|
||||||
|
- { external_port: "80", internal_port: "80", port_desc: "Application WebUI" }
|
||||||
|
```
|
||||||
|
|
||||||
|
### Volumes
|
||||||
|
|
||||||
|
```yml
|
||||||
|
param_volumes:
|
||||||
|
- { vol_path: "/config", vol_host_path: "</path/to/appdata/config>", desc: "Configuration files." }
|
||||||
|
opt_param_volumes:
|
||||||
|
- { vol_path: "/config", vol_host_path: "</path/to/appdata/config>", desc: "Configuration files." }
|
||||||
|
```
|
||||||
|
|
||||||
|
### Testing template changes
|
||||||
|
|
||||||
|
After you make any changes to the templates, you can use our [Jenkins Builder](https://github.com/linuxserver/docker-jenkins-builder) to have the files updated from the modified templates. Please use the command found under `Running Locally` [on this page](https://github.com/linuxserver/docker-jenkins-builder/blob/master/README.md) to generate them prior to submitting a PR.
|
||||||
|
|
||||||
|
## Dockerfiles
|
||||||
|
|
||||||
|
We use multiple Dockerfiles in our repos, this is because sometimes some CPU architectures needs different packages to work.
|
||||||
|
If you are proposing additional packages to be added, ensure that you added the packages to all the Dockerfiles in alphabetical order.
|
||||||
|
|
||||||
|
### Testing your changes
|
||||||
|
|
||||||
|
```bash
|
||||||
|
git clone https://github.com/linuxserver/docker-swag.git
|
||||||
|
cd docker-swag
|
||||||
|
docker build \
|
||||||
|
--no-cache \
|
||||||
|
--pull \
|
||||||
|
-t linuxserver/swag:latest .
|
||||||
|
```
|
||||||
|
|
||||||
|
The ARM variants can be built on x86_64 hardware and vice versa using `lscr.io/linuxserver/qemu-static`
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker run --rm --privileged lscr.io/linuxserver/qemu-static --reset
|
||||||
|
```
|
||||||
|
|
||||||
|
Once registered you can define the dockerfile to use with `-f Dockerfile.aarch64`.
|
||||||
|
|
||||||
|
## Update the changelog
|
||||||
|
|
||||||
|
If you are modifying the Dockerfiles or any of the startup scripts in [root](https://github.com/linuxserver/docker-swag/tree/master/root), add an entry to the changelog
|
||||||
|
|
||||||
|
```yml
|
||||||
|
changelogs:
|
||||||
|
- { date: "DD.MM.YY:", desc: "Added some love to templates" }
|
||||||
|
```
|
34
.github/ISSUE_TEMPLATE.md
vendored
34
.github/ISSUE_TEMPLATE.md
vendored
@ -1,34 +0,0 @@
|
|||||||
[linuxserverurl]: https://linuxserver.io
|
|
||||||
[][linuxserverurl]
|
|
||||||
|
|
||||||
If you are new to Docker or this application our issue tracker is **ONLY** used for reporting bugs or requesting features. Please use [our discord server](https://discord.gg/YWrKVTn) for general support.
|
|
||||||
|
|
||||||
<!--- Provide a general summary of the issue in the Title above -->
|
|
||||||
|
|
||||||
------------------------------
|
|
||||||
|
|
||||||
## Expected Behavior
|
|
||||||
<!--- Tell us what should happen -->
|
|
||||||
|
|
||||||
## Current Behavior
|
|
||||||
<!--- Tell us what happens instead of the expected behavior -->
|
|
||||||
|
|
||||||
## Steps to Reproduce
|
|
||||||
<!--- Provide a link to a live example, or an unambiguous set of steps to -->
|
|
||||||
<!--- reproduce this bug. Include code to reproduce, if relevant -->
|
|
||||||
1.
|
|
||||||
2.
|
|
||||||
3.
|
|
||||||
4.
|
|
||||||
|
|
||||||
## Environment
|
|
||||||
**OS:**
|
|
||||||
**CPU architecture:** x86_64/arm32/arm64
|
|
||||||
**How docker service was installed:**
|
|
||||||
<!--- Providing context helps us come up with a solution that is most useful in the real world -->
|
|
||||||
|
|
||||||
## Command used to create docker container (run/create/compose/screenshot)
|
|
||||||
<!--- Provide your docker create/run command or compose yaml snippet, or a screenshot of settings if using a gui to create the container -->
|
|
||||||
|
|
||||||
## Docker logs
|
|
||||||
<!--- Provide a full docker log, output of "docker logs swag" -->
|
|
13
.github/ISSUE_TEMPLATE/config.yml
vendored
Executable file
13
.github/ISSUE_TEMPLATE/config.yml
vendored
Executable file
@ -0,0 +1,13 @@
|
|||||||
|
blank_issues_enabled: false
|
||||||
|
contact_links:
|
||||||
|
- name: Discord chat support
|
||||||
|
url: https://linuxserver.io/discord
|
||||||
|
about: Realtime support / chat with the community and the team.
|
||||||
|
|
||||||
|
- name: Discourse discussion forum
|
||||||
|
url: https://discourse.linuxserver.io
|
||||||
|
about: Post on our community forum.
|
||||||
|
|
||||||
|
- name: Documentation
|
||||||
|
url: https://docs.linuxserver.io/images/docker-swag
|
||||||
|
about: Documentation - information about all of our containers.
|
76
.github/ISSUE_TEMPLATE/issue.bug.yml
vendored
Executable file
76
.github/ISSUE_TEMPLATE/issue.bug.yml
vendored
Executable file
@ -0,0 +1,76 @@
|
|||||||
|
# Based on the issue template
|
||||||
|
name: Bug report
|
||||||
|
description: Create a report to help us improve
|
||||||
|
title: "[BUG] <title>"
|
||||||
|
labels: [Bug]
|
||||||
|
body:
|
||||||
|
- type: checkboxes
|
||||||
|
attributes:
|
||||||
|
label: Is there an existing issue for this?
|
||||||
|
description: Please search to see if an issue already exists for the bug you encountered.
|
||||||
|
options:
|
||||||
|
- label: I have searched the existing issues
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Current Behavior
|
||||||
|
description: Tell us what happens instead of the expected behavior.
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Expected Behavior
|
||||||
|
description: Tell us what should happen.
|
||||||
|
validations:
|
||||||
|
required: false
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Steps To Reproduce
|
||||||
|
description: Steps to reproduce the behavior.
|
||||||
|
placeholder: |
|
||||||
|
1. In this environment...
|
||||||
|
2. With this config...
|
||||||
|
3. Run '...'
|
||||||
|
4. See error...
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Environment
|
||||||
|
description: |
|
||||||
|
examples:
|
||||||
|
- **OS**: Ubuntu 20.04
|
||||||
|
- **How docker service was installed**: distro's packagemanager
|
||||||
|
value: |
|
||||||
|
- OS:
|
||||||
|
- How docker service was installed:
|
||||||
|
render: markdown
|
||||||
|
validations:
|
||||||
|
required: false
|
||||||
|
- type: dropdown
|
||||||
|
attributes:
|
||||||
|
label: CPU architecture
|
||||||
|
options:
|
||||||
|
- x86-64
|
||||||
|
- arm64
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Docker creation
|
||||||
|
description: |
|
||||||
|
Command used to create docker container
|
||||||
|
Provide your docker create/run command or compose yaml snippet, or a screenshot of settings if using a gui to create the container
|
||||||
|
render: bash
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
description: |
|
||||||
|
Provide a full docker log, output of "docker logs swag"
|
||||||
|
label: Container logs
|
||||||
|
placeholder: |
|
||||||
|
Output of `docker logs swag`
|
||||||
|
render: bash
|
||||||
|
validations:
|
||||||
|
required: true
|
31
.github/ISSUE_TEMPLATE/issue.feature.yml
vendored
Executable file
31
.github/ISSUE_TEMPLATE/issue.feature.yml
vendored
Executable file
@ -0,0 +1,31 @@
|
|||||||
|
# Based on the issue template
|
||||||
|
name: Feature request
|
||||||
|
description: Suggest an idea for this project
|
||||||
|
title: "[FEAT] <title>"
|
||||||
|
labels: [enhancement]
|
||||||
|
body:
|
||||||
|
- type: checkboxes
|
||||||
|
attributes:
|
||||||
|
label: Is this a new feature request?
|
||||||
|
description: Please search to see if a feature request already exists.
|
||||||
|
options:
|
||||||
|
- label: I have searched the existing issues
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Wanted change
|
||||||
|
description: Tell us what you want to happen.
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Reason for change
|
||||||
|
description: Justify your request, why do you want it, what is the benefit.
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Proposed code change
|
||||||
|
description: Do you have a potential code change in mind?
|
||||||
|
validations:
|
||||||
|
required: false
|
10
.github/PULL_REQUEST_TEMPLATE.md
vendored
10
.github/PULL_REQUEST_TEMPLATE.md
vendored
@ -2,11 +2,11 @@
|
|||||||
|
|
||||||
[linuxserverurl]: https://linuxserver.io
|
[linuxserverurl]: https://linuxserver.io
|
||||||
[][linuxserverurl]
|
[][linuxserverurl]
|
||||||
|
|
||||||
|
|
||||||
<!--- Before submitting a pull request please check the following -->
|
<!--- Before submitting a pull request please check the following -->
|
||||||
|
|
||||||
<!--- If this is a fix for a typo in code or documentation in the README please file an issue and let us sort it out we do not need a PR -->
|
<!--- If this is a fix for a typo (in code, documentation, or the README) please file an issue and let us sort it out. We do not need a PR -->
|
||||||
<!--- Ask yourself if this modification is something the whole userbase will benefit from, if this is a specific change for corner case functionality or plugins please look at making a Docker Mod or local script https://blog.linuxserver.io/2019/09/14/customizing-our-containers/ -->
|
<!--- Ask yourself if this modification is something the whole userbase will benefit from, if this is a specific change for corner case functionality or plugins please look at making a Docker Mod or local script https://blog.linuxserver.io/2019/09/14/customizing-our-containers/ -->
|
||||||
<!--- That if the PR is addressing an existing issue include, closes #<issue number> , in the body of the PR commit message -->
|
<!--- That if the PR is addressing an existing issue include, closes #<issue number> , in the body of the PR commit message -->
|
||||||
<!--- You have included links to any files / patches etc your PR may be using in the body of the PR commit message -->
|
<!--- You have included links to any files / patches etc your PR may be using in the body of the PR commit message -->
|
||||||
@ -21,7 +21,11 @@
|
|||||||
|
|
||||||
------------------------------
|
------------------------------
|
||||||
|
|
||||||
We welcome all PR’s though this doesn’t guarantee it will be accepted.
|
- [ ] I have read the [contributing](https://github.com/linuxserver/docker-swag/blob/master/.github/CONTRIBUTING.md) guideline and understand that I have made the correct modifications
|
||||||
|
|
||||||
|
------------------------------
|
||||||
|
|
||||||
|
<!--- We welcome all PR’s though this doesn’t guarantee it will be accepted. -->
|
||||||
|
|
||||||
## Description:
|
## Description:
|
||||||
<!--- Describe your changes in detail -->
|
<!--- Describe your changes in detail -->
|
||||||
|
16
.github/workflows/call_issue_pr_tracker.yml
vendored
Executable file
16
.github/workflows/call_issue_pr_tracker.yml
vendored
Executable file
@ -0,0 +1,16 @@
|
|||||||
|
name: Issue & PR Tracker
|
||||||
|
|
||||||
|
on:
|
||||||
|
issues:
|
||||||
|
types: [opened,reopened,labeled,unlabeled,closed]
|
||||||
|
pull_request_target:
|
||||||
|
types: [opened,reopened,review_requested,review_request_removed,labeled,unlabeled,closed]
|
||||||
|
pull_request_review:
|
||||||
|
types: [submitted,edited,dismissed]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
manage-project:
|
||||||
|
permissions:
|
||||||
|
issues: write
|
||||||
|
uses: linuxserver/github-workflows/.github/workflows/issue-pr-tracker.yml@v1
|
||||||
|
secrets: inherit
|
13
.github/workflows/call_issues_cron.yml
vendored
Executable file
13
.github/workflows/call_issues_cron.yml
vendored
Executable file
@ -0,0 +1,13 @@
|
|||||||
|
name: Mark stale issues and pull requests
|
||||||
|
on:
|
||||||
|
schedule:
|
||||||
|
- cron: '35 15 * * *'
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
stale:
|
||||||
|
permissions:
|
||||||
|
issues: write
|
||||||
|
pull-requests: write
|
||||||
|
uses: linuxserver/github-workflows/.github/workflows/issues-cron.yml@v1
|
||||||
|
secrets: inherit
|
144
.github/workflows/external_trigger.yml
vendored
Normal file
144
.github/workflows/external_trigger.yml
vendored
Normal file
@ -0,0 +1,144 @@
|
|||||||
|
name: External Trigger Main
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
external-trigger-master:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4.1.1
|
||||||
|
|
||||||
|
- name: External Trigger
|
||||||
|
if: github.ref == 'refs/heads/master'
|
||||||
|
env:
|
||||||
|
SKIP_EXTERNAL_TRIGGER: ${{ vars.SKIP_EXTERNAL_TRIGGER }}
|
||||||
|
run: |
|
||||||
|
printf "# External trigger for docker-swag\n\n" >> $GITHUB_STEP_SUMMARY
|
||||||
|
if grep -q "^swag_master_" <<< "${SKIP_EXTERNAL_TRIGGER}"; then
|
||||||
|
echo "> [!NOTE]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Github organizational variable \`SKIP_EXTERNAL_TRIGGER\` contains \`swag_master_\`; will skip trigger if version matches." >> $GITHUB_STEP_SUMMARY
|
||||||
|
elif grep -q "^swag_master" <<< "${SKIP_EXTERNAL_TRIGGER}"; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Github organizational variable \`SKIP_EXTERNAL_TRIGGER\` contains \`swag_master\`; skipping trigger." >> $GITHUB_STEP_SUMMARY
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
echo "> [!NOTE]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> External trigger running off of master branch. To disable this trigger, add \`swag_master\` into the Github organizational variable \`SKIP_EXTERNAL_TRIGGER\`." >> $GITHUB_STEP_SUMMARY
|
||||||
|
printf "\n## Retrieving external version\n\n" >> $GITHUB_STEP_SUMMARY
|
||||||
|
EXT_RELEASE=$(curl -sL "https://pypi.python.org/pypi/certbot/json" |jq -r '. | .info.version')
|
||||||
|
echo "Type is \`pip_version\`" >> $GITHUB_STEP_SUMMARY
|
||||||
|
if grep -q "^swag_master_${EXT_RELEASE}" <<< "${SKIP_EXTERNAL_TRIGGER}"; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Github organizational variable \`SKIP_EXTERNAL_TRIGGER\` matches current external release; skipping trigger." >> $GITHUB_STEP_SUMMARY
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
if [ -z "${EXT_RELEASE}" ] || [ "${EXT_RELEASE}" == "null" ]; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Can't retrieve external version, exiting" >> $GITHUB_STEP_SUMMARY
|
||||||
|
FAILURE_REASON="Can't retrieve external version for swag branch master"
|
||||||
|
GHA_TRIGGER_URL="https://github.com/linuxserver/docker-swag/actions/runs/${{ github.run_id }}"
|
||||||
|
curl -X POST -H "Content-Type: application/json" --data '{"avatar_url": "https://cdn.discordapp.com/avatars/354986384542662657/df91181b3f1cf0ef1592fbe18e0962d7.png","embeds": [{"color": 16711680,
|
||||||
|
"description": "**Trigger Failed** \n**Reason:** '"${FAILURE_REASON}"' \n**Trigger URL:** '"${GHA_TRIGGER_URL}"' \n"}],
|
||||||
|
"username": "Github Actions"}' ${{ secrets.DISCORD_WEBHOOK }}
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
EXT_RELEASE=$(echo ${EXT_RELEASE} | sed 's/[~,%@+;:/]//g')
|
||||||
|
echo "External version: \`${EXT_RELEASE}\`" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "Retrieving last pushed version" >> $GITHUB_STEP_SUMMARY
|
||||||
|
image="linuxserver/swag"
|
||||||
|
tag="latest"
|
||||||
|
token=$(curl -sX GET \
|
||||||
|
"https://ghcr.io/token?scope=repository%3Alinuxserver%2Fswag%3Apull" \
|
||||||
|
| jq -r '.token')
|
||||||
|
multidigest=$(curl -s \
|
||||||
|
--header "Accept: application/vnd.docker.distribution.manifest.v2+json" \
|
||||||
|
--header "Accept: application/vnd.oci.image.index.v1+json" \
|
||||||
|
--header "Authorization: Bearer ${token}" \
|
||||||
|
"https://ghcr.io/v2/${image}/manifests/${tag}")
|
||||||
|
if jq -e '.layers // empty' <<< "${multidigest}" >/dev/null 2>&1; then
|
||||||
|
# If there's a layer element it's a single-arch manifest so just get that digest
|
||||||
|
digest=$(jq -r '.config.digest' <<< "${multidigest}")
|
||||||
|
else
|
||||||
|
# Otherwise it's multi-arch or has manifest annotations
|
||||||
|
if jq -e '.manifests[]?.annotations // empty' <<< "${multidigest}" >/dev/null 2>&1; then
|
||||||
|
# Check for manifest annotations and delete if found
|
||||||
|
multidigest=$(jq 'del(.manifests[] | select(.annotations))' <<< "${multidigest}")
|
||||||
|
fi
|
||||||
|
if [[ $(jq '.manifests | length' <<< "${multidigest}") -gt 1 ]]; then
|
||||||
|
# If there's still more than one digest, it's multi-arch
|
||||||
|
multidigest=$(jq -r ".manifests[] | select(.platform.architecture == \"amd64\").digest?" <<< "${multidigest}")
|
||||||
|
else
|
||||||
|
# Otherwise it's single arch
|
||||||
|
multidigest=$(jq -r ".manifests[].digest?" <<< "${multidigest}")
|
||||||
|
fi
|
||||||
|
if digest=$(curl -s \
|
||||||
|
--header "Accept: application/vnd.docker.distribution.manifest.v2+json" \
|
||||||
|
--header "Accept: application/vnd.oci.image.manifest.v1+json" \
|
||||||
|
--header "Authorization: Bearer ${token}" \
|
||||||
|
"https://ghcr.io/v2/${image}/manifests/${multidigest}"); then
|
||||||
|
digest=$(jq -r '.config.digest' <<< "${digest}");
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
image_info=$(curl -sL \
|
||||||
|
--header "Authorization: Bearer ${token}" \
|
||||||
|
"https://ghcr.io/v2/${image}/blobs/${digest}")
|
||||||
|
if [[ $(echo $image_info | jq -r '.container_config') == "null" ]]; then
|
||||||
|
image_info=$(echo $image_info | jq -r '.config')
|
||||||
|
else
|
||||||
|
image_info=$(echo $image_info | jq -r '.container_config')
|
||||||
|
fi
|
||||||
|
IMAGE_RELEASE=$(echo ${image_info} | jq -r '.Labels.build_version' | awk '{print $3}')
|
||||||
|
IMAGE_VERSION=$(echo ${IMAGE_RELEASE} | awk -F'-ls' '{print $1}')
|
||||||
|
if [ -z "${IMAGE_VERSION}" ]; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "Can't retrieve last pushed version, exiting" >> $GITHUB_STEP_SUMMARY
|
||||||
|
FAILURE_REASON="Can't retrieve last pushed version for swag tag latest"
|
||||||
|
curl -X POST -H "Content-Type: application/json" --data '{"avatar_url": "https://cdn.discordapp.com/avatars/354986384542662657/df91181b3f1cf0ef1592fbe18e0962d7.png","embeds": [{"color": 16711680,
|
||||||
|
"description": "**Trigger Failed** \n**Reason:** '"${FAILURE_REASON}"' \n"}],
|
||||||
|
"username": "Github Actions"}' ${{ secrets.DISCORD_WEBHOOK }}
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
echo "Last pushed version: \`${IMAGE_VERSION}\`" >> $GITHUB_STEP_SUMMARY
|
||||||
|
if [ "${EXT_RELEASE}" == "${IMAGE_VERSION}" ]; then
|
||||||
|
echo "Version \`${EXT_RELEASE}\` already pushed, exiting" >> $GITHUB_STEP_SUMMARY
|
||||||
|
exit 0
|
||||||
|
elif [ $(curl -s https://ci.linuxserver.io/job/Docker-Pipeline-Builders/job/docker-swag/job/master/lastBuild/api/json | jq -r '.building') == "true" ]; then
|
||||||
|
echo "New version \`${EXT_RELEASE}\` found; but there already seems to be an active build on Jenkins; exiting" >> $GITHUB_STEP_SUMMARY
|
||||||
|
exit 0
|
||||||
|
else
|
||||||
|
if [[ "${artifacts_found}" == "false" ]]; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> New version detected, but not all artifacts are published yet; skipping trigger" >> $GITHUB_STEP_SUMMARY
|
||||||
|
FAILURE_REASON="New version ${EXT_RELEASE} for swag tag latest is detected, however not all artifacts are uploaded to upstream release yet. Will try again later."
|
||||||
|
curl -X POST -H "Content-Type: application/json" --data '{"avatar_url": "https://cdn.discordapp.com/avatars/354986384542662657/df91181b3f1cf0ef1592fbe18e0962d7.png","embeds": [{"color": 9802903,
|
||||||
|
"description": "**Trigger Failed** \n**Reason:** '"${FAILURE_REASON}"' \n"}],
|
||||||
|
"username": "Github Actions"}' ${{ secrets.DISCORD_WEBHOOK }}
|
||||||
|
else
|
||||||
|
printf "\n## Trigger new build\n\n" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "New version \`${EXT_RELEASE}\` found; old version was \`${IMAGE_VERSION}\`. Triggering new build" >> $GITHUB_STEP_SUMMARY
|
||||||
|
if [[ "${artifacts_found}" == "true" ]]; then
|
||||||
|
echo "All artifacts seem to be uploaded." >> $GITHUB_STEP_SUMMARY
|
||||||
|
fi
|
||||||
|
response=$(curl -iX POST \
|
||||||
|
https://ci.linuxserver.io/job/Docker-Pipeline-Builders/job/docker-swag/job/master/buildWithParameters?PACKAGE_CHECK=false \
|
||||||
|
--user ${{ secrets.JENKINS_USER }}:${{ secrets.JENKINS_TOKEN }} | grep -i location | sed "s|^[L|l]ocation: \(.*\)|\1|")
|
||||||
|
echo "Jenkins [job queue url](${response%$'\r'})" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "Sleeping 10 seconds until job starts" >> $GITHUB_STEP_SUMMARY
|
||||||
|
sleep 10
|
||||||
|
buildurl=$(curl -s "${response%$'\r'}api/json" | jq -r '.executable.url')
|
||||||
|
buildurl="${buildurl%$'\r'}"
|
||||||
|
echo "Jenkins job [build url](${buildurl})" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "Attempting to change the Jenkins job description" >> $GITHUB_STEP_SUMMARY
|
||||||
|
curl -iX POST \
|
||||||
|
"${buildurl}submitDescription" \
|
||||||
|
--user ${{ secrets.JENKINS_USER }}:${{ secrets.JENKINS_TOKEN }} \
|
||||||
|
--data-urlencode "description=GHA external trigger https://github.com/${{ github.repository }}/actions/runs/${{ github.run_id }}" \
|
||||||
|
--data-urlencode "Submit=Submit"
|
||||||
|
echo "**** Notifying Discord ****"
|
||||||
|
TRIGGER_REASON="A version change was detected for swag tag latest. Old version:${IMAGE_VERSION} New version:${EXT_RELEASE}"
|
||||||
|
curl -X POST -H "Content-Type: application/json" --data '{"avatar_url": "https://cdn.discordapp.com/avatars/354986384542662657/df91181b3f1cf0ef1592fbe18e0962d7.png","embeds": [{"color": 9802903,
|
||||||
|
"description": "**Build Triggered** \n**Reason:** '"${TRIGGER_REASON}"' \n**Build URL:** '"${buildurl}display/redirect"' \n"}],
|
||||||
|
"username": "Github Actions"}' ${{ secrets.DISCORD_WEBHOOK }}
|
||||||
|
fi
|
||||||
|
fi
|
45
.github/workflows/external_trigger_scheduler.yml
vendored
Normal file
45
.github/workflows/external_trigger_scheduler.yml
vendored
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
name: External Trigger Scheduler
|
||||||
|
|
||||||
|
on:
|
||||||
|
schedule:
|
||||||
|
- cron: '2 * * * *'
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
external-trigger-scheduler:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4.1.1
|
||||||
|
with:
|
||||||
|
fetch-depth: '0'
|
||||||
|
|
||||||
|
- name: External Trigger Scheduler
|
||||||
|
run: |
|
||||||
|
printf "# External trigger scheduler for docker-swag\n\n" >> $GITHUB_STEP_SUMMARY
|
||||||
|
printf "Found the branches:\n\n%s\n" "$(git for-each-ref --format='- %(refname:lstrip=3)' refs/remotes)" >> $GITHUB_STEP_SUMMARY
|
||||||
|
for br in $(git for-each-ref --format='%(refname:lstrip=3)' refs/remotes)
|
||||||
|
do
|
||||||
|
if [[ "${br}" == "HEAD" ]]; then
|
||||||
|
printf "\nSkipping %s.\n" ${br} >> $GITHUB_STEP_SUMMARY
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
printf "\n## Evaluating \`%s\`\n\n" ${br} >> $GITHUB_STEP_SUMMARY
|
||||||
|
ls_jenkins_vars=$(curl -sX GET https://raw.githubusercontent.com/linuxserver/docker-swag/${br}/jenkins-vars.yml)
|
||||||
|
ls_branch=$(echo "${ls_jenkins_vars}" | yq -r '.ls_branch')
|
||||||
|
ls_trigger=$(echo "${ls_jenkins_vars}" | yq -r '.external_type')
|
||||||
|
if [[ "${br}" == "${ls_branch}" ]] && [[ "${ls_trigger}" != "os" ]]; then
|
||||||
|
echo "Branch appears to be live and trigger is not os; checking workflow." >> $GITHUB_STEP_SUMMARY
|
||||||
|
if curl -sfX GET https://raw.githubusercontent.com/linuxserver/docker-swag/${br}/.github/workflows/external_trigger.yml > /dev/null 2>&1; then
|
||||||
|
echo "Triggering external trigger workflow for branch." >> $GITHUB_STEP_SUMMARY
|
||||||
|
curl -iX POST \
|
||||||
|
-H "Authorization: token ${{ secrets.CR_PAT }}" \
|
||||||
|
-H "Accept: application/vnd.github.v3+json" \
|
||||||
|
-d "{\"ref\":\"refs/heads/${br}\"}" \
|
||||||
|
https://api.github.com/repos/linuxserver/docker-swag/actions/workflows/external_trigger.yml/dispatches
|
||||||
|
else
|
||||||
|
echo "Skipping branch due to no external trigger workflow present." >> $GITHUB_STEP_SUMMARY
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
echo "Skipping branch due to being detected as dev branch or having no external version." >> $GITHUB_STEP_SUMMARY
|
||||||
|
fi
|
||||||
|
done
|
4
.github/workflows/greetings.yml
vendored
4
.github/workflows/greetings.yml
vendored
@ -8,6 +8,6 @@ jobs:
|
|||||||
steps:
|
steps:
|
||||||
- uses: actions/first-interaction@v1
|
- uses: actions/first-interaction@v1
|
||||||
with:
|
with:
|
||||||
issue-message: 'Thanks for opening your first issue here! Be sure to follow the [issue template](https://github.com/linuxserver/docker-swag/.github/ISSUE_TEMPLATE.md)!'
|
issue-message: 'Thanks for opening your first issue here! Be sure to follow the relevant issue templates, or risk having this issue marked as invalid.'
|
||||||
pr-message: 'Thanks for opening this pull request! Be sure to follow the [pull request template](https://github.com/linuxserver/docker-swag/.github/PULL_REQUEST_TEMPLATE.md)!'
|
pr-message: 'Thanks for opening this pull request! Be sure to follow the [pull request template](https://github.com/linuxserver/docker-swag/blob/master/.github/PULL_REQUEST_TEMPLATE.md)!'
|
||||||
repo-token: ${{ secrets.GITHUB_TOKEN }}
|
repo-token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
100
.github/workflows/package_trigger_scheduler.yml
vendored
Normal file
100
.github/workflows/package_trigger_scheduler.yml
vendored
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
name: Package Trigger Scheduler
|
||||||
|
|
||||||
|
on:
|
||||||
|
schedule:
|
||||||
|
- cron: '1 3 * * 6'
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
package-trigger-scheduler:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4.1.1
|
||||||
|
with:
|
||||||
|
fetch-depth: '0'
|
||||||
|
|
||||||
|
- name: Package Trigger Scheduler
|
||||||
|
env:
|
||||||
|
SKIP_PACKAGE_TRIGGER: ${{ vars.SKIP_PACKAGE_TRIGGER }}
|
||||||
|
run: |
|
||||||
|
printf "# Package trigger scheduler for docker-swag\n\n" >> $GITHUB_STEP_SUMMARY
|
||||||
|
printf "Found the branches:\n\n%s\n" "$(git for-each-ref --format='- %(refname:lstrip=3)' refs/remotes)" >> $GITHUB_STEP_SUMMARY
|
||||||
|
for br in $(git for-each-ref --format='%(refname:lstrip=3)' refs/remotes)
|
||||||
|
do
|
||||||
|
if [[ "${br}" == "HEAD" ]]; then
|
||||||
|
printf "\nSkipping %s.\n" ${br} >> $GITHUB_STEP_SUMMARY
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
printf "\n## Evaluating \`%s\`\n\n" ${br} >> $GITHUB_STEP_SUMMARY
|
||||||
|
JENKINS_VARS=$(curl -sX GET https://raw.githubusercontent.com/linuxserver/docker-swag/${br}/jenkins-vars.yml)
|
||||||
|
if ! curl -sfX GET https://raw.githubusercontent.com/linuxserver/docker-swag/${br}/Jenkinsfile >/dev/null 2>&1; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> No Jenkinsfile found. Branch is either deprecated or is an early dev branch." >> $GITHUB_STEP_SUMMARY
|
||||||
|
skipped_branches="${skipped_branches}${br} "
|
||||||
|
elif [[ "${br}" == $(yq -r '.ls_branch' <<< "${JENKINS_VARS}") ]]; then
|
||||||
|
echo "Branch appears to be live; checking workflow." >> $GITHUB_STEP_SUMMARY
|
||||||
|
README_VARS=$(curl -sX GET https://raw.githubusercontent.com/linuxserver/docker-swag/${br}/readme-vars.yml)
|
||||||
|
if [[ $(yq -r '.project_deprecation_status' <<< "${README_VARS}") == "true" ]]; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Branch appears to be deprecated; skipping trigger." >> $GITHUB_STEP_SUMMARY
|
||||||
|
skipped_branches="${skipped_branches}${br} "
|
||||||
|
elif [[ $(yq -r '.skip_package_check' <<< "${JENKINS_VARS}") == "true" ]]; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Skipping branch ${br} due to \`skip_package_check\` being set in \`jenkins-vars.yml\`." >> $GITHUB_STEP_SUMMARY
|
||||||
|
skipped_branches="${skipped_branches}${br} "
|
||||||
|
elif grep -q "^swag_${br}" <<< "${SKIP_PACKAGE_TRIGGER}"; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Github organizational variable \`SKIP_PACKAGE_TRIGGER\` contains \`swag_${br}\`; skipping trigger." >> $GITHUB_STEP_SUMMARY
|
||||||
|
skipped_branches="${skipped_branches}${br} "
|
||||||
|
elif [ $(curl -s https://ci.linuxserver.io/job/Docker-Pipeline-Builders/job/docker-swag/job/${br}/lastBuild/api/json | jq -r '.building' 2>/dev/null) == "true" ]; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> There already seems to be an active build on Jenkins; skipping package trigger for ${br}" >> $GITHUB_STEP_SUMMARY
|
||||||
|
skipped_branches="${skipped_branches}${br} "
|
||||||
|
else
|
||||||
|
echo "> [!NOTE]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Triggering package trigger for branch ${br}" >> $GITHUB_STEP_SUMMARY
|
||||||
|
printf "> To disable, add \`swag_%s\` into the Github organizational variable \`SKIP_PACKAGE_TRIGGER\`.\n\n" "${br}" >> $GITHUB_STEP_SUMMARY
|
||||||
|
triggered_branches="${triggered_branches}${br} "
|
||||||
|
response=$(curl -iX POST \
|
||||||
|
https://ci.linuxserver.io/job/Docker-Pipeline-Builders/job/docker-swag/job/${br}/buildWithParameters?PACKAGE_CHECK=true \
|
||||||
|
--user ${{ secrets.JENKINS_USER }}:${{ secrets.JENKINS_TOKEN }} | grep -i location | sed "s|^[L|l]ocation: \(.*\)|\1|")
|
||||||
|
if [[ -z "${response}" ]]; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Jenkins build could not be triggered. Skipping branch."
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
echo "Jenkins [job queue url](${response%$'\r'})" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "Sleeping 10 seconds until job starts" >> $GITHUB_STEP_SUMMARY
|
||||||
|
sleep 10
|
||||||
|
buildurl=$(curl -s "${response%$'\r'}api/json" | jq -r '.executable.url')
|
||||||
|
buildurl="${buildurl%$'\r'}"
|
||||||
|
echo "Jenkins job [build url](${buildurl})" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "Attempting to change the Jenkins job description" >> $GITHUB_STEP_SUMMARY
|
||||||
|
if ! curl -ifX POST \
|
||||||
|
"${buildurl}submitDescription" \
|
||||||
|
--user ${{ secrets.JENKINS_USER }}:${{ secrets.JENKINS_TOKEN }} \
|
||||||
|
--data-urlencode "description=GHA package trigger https://github.com/${{ github.repository }}/actions/runs/${{ github.run_id }}" \
|
||||||
|
--data-urlencode "Submit=Submit"; then
|
||||||
|
echo "> [!WARNING]" >> $GITHUB_STEP_SUMMARY
|
||||||
|
echo "> Unable to change the Jenkins job description."
|
||||||
|
fi
|
||||||
|
sleep 20
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
echo "Skipping branch ${br} due to being detected as dev branch." >> $GITHUB_STEP_SUMMARY
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
if [[ -n "${triggered_branches}" ]] || [[ -n "${skipped_branches}" ]]; then
|
||||||
|
if [[ -n "${triggered_branches}" ]]; then
|
||||||
|
NOTIFY_BRANCHES="**Triggered:** ${triggered_branches} \n"
|
||||||
|
NOTIFY_BUILD_URL="**Build URL:** https://ci.linuxserver.io/blue/organizations/jenkins/Docker-Pipeline-Builders%2Fdocker-swag/activity/ \n"
|
||||||
|
echo "**** Package check build(s) triggered for branch(es): ${triggered_branches} ****"
|
||||||
|
fi
|
||||||
|
if [[ -n "${skipped_branches}" ]]; then
|
||||||
|
NOTIFY_BRANCHES="${NOTIFY_BRANCHES}**Skipped:** ${skipped_branches} \n"
|
||||||
|
fi
|
||||||
|
echo "**** Notifying Discord ****"
|
||||||
|
curl -X POST -H "Content-Type: application/json" --data '{"avatar_url": "https://cdn.discordapp.com/avatars/354986384542662657/df91181b3f1cf0ef1592fbe18e0962d7.png","embeds": [{"color": 9802903,
|
||||||
|
"description": "**Package Check Build(s) for swag** \n'"${NOTIFY_BRANCHES}"''"${NOTIFY_BUILD_URL}"'"}],
|
||||||
|
"username": "Github Actions"}' ${{ secrets.DISCORD_WEBHOOK }}
|
||||||
|
fi
|
12
.github/workflows/permissions.yml
vendored
Executable file
12
.github/workflows/permissions.yml
vendored
Executable file
@ -0,0 +1,12 @@
|
|||||||
|
name: Permission check
|
||||||
|
on:
|
||||||
|
pull_request_target:
|
||||||
|
paths:
|
||||||
|
- '**/run'
|
||||||
|
- '**/finish'
|
||||||
|
- '**/check'
|
||||||
|
- 'root/migrations/*'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
permission_check:
|
||||||
|
uses: linuxserver/github-workflows/.github/workflows/init-svc-executable-permissions.yml@v1
|
23
.github/workflows/stale.yml
vendored
23
.github/workflows/stale.yml
vendored
@ -1,23 +0,0 @@
|
|||||||
name: Mark stale issues and pull requests
|
|
||||||
|
|
||||||
on:
|
|
||||||
schedule:
|
|
||||||
- cron: "30 1 * * *"
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
stale:
|
|
||||||
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- uses: actions/stale@v1
|
|
||||||
with:
|
|
||||||
stale-issue-message: "This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions."
|
|
||||||
stale-pr-message: "This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions."
|
|
||||||
stale-issue-label: 'no-issue-activity'
|
|
||||||
stale-pr-label: 'no-pr-activity'
|
|
||||||
days-before-stale: 30
|
|
||||||
days-before-close: 365
|
|
||||||
exempt-issue-labels: 'awaiting-approval,work-in-progress'
|
|
||||||
exempt-pr-labels: 'awaiting-approval,work-in-progress'
|
|
||||||
repo-token: ${{ secrets.GITHUB_TOKEN }}
|
|
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@ -0,0 +1 @@
|
|||||||
|
.jenkins-external
|
315
Dockerfile
315
Dockerfile
@ -1,150 +1,189 @@
|
|||||||
FROM lsiobase/nginx:3.12
|
# syntax=docker/dockerfile:1
|
||||||
|
|
||||||
|
FROM ghcr.io/linuxserver/baseimage-alpine-nginx:3.21
|
||||||
|
|
||||||
# set version label
|
# set version label
|
||||||
ARG BUILD_DATE
|
ARG BUILD_DATE
|
||||||
ARG VERSION
|
ARG VERSION
|
||||||
ARG CERTBOT_VERSION
|
ARG CERTBOT_VERSION
|
||||||
LABEL build_version="Linuxserver.io version:- ${VERSION} Build-date:- ${BUILD_DATE}"
|
LABEL build_version="Linuxserver.io version:- ${VERSION} Build-date:- ${BUILD_DATE}"
|
||||||
LABEL maintainer="aptalca"
|
LABEL maintainer="nemchik"
|
||||||
|
|
||||||
# environment settings
|
# environment settings
|
||||||
ENV DHLEVEL=2048 ONLY_SUBDOMAINS=false AWS_CONFIG_FILE=/config/dns-conf/route53.ini
|
ENV DHLEVEL=2048 \
|
||||||
ENV S6_BEHAVIOUR_IF_STAGE2_FAILS=2
|
ONLY_SUBDOMAINS=false \
|
||||||
|
AWS_CONFIG_FILE=/config/dns-conf/route53.ini \
|
||||||
|
S6_BEHAVIOUR_IF_STAGE2_FAILS=2
|
||||||
|
|
||||||
RUN \
|
RUN \
|
||||||
echo "**** install build packages ****" && \
|
echo "**** install build packages ****" && \
|
||||||
apk add --no-cache --virtual=build-dependencies \
|
apk add --no-cache --virtual=build-dependencies \
|
||||||
g++ \
|
build-base \
|
||||||
gcc \
|
cargo \
|
||||||
libffi-dev \
|
libffi-dev \
|
||||||
openssl-dev \
|
libxml2-dev \
|
||||||
python3-dev && \
|
libxslt-dev \
|
||||||
echo "**** install runtime packages ****" && \
|
openssl-dev \
|
||||||
apk add --no-cache --upgrade \
|
python3-dev && \
|
||||||
curl \
|
echo "**** install runtime packages ****" && \
|
||||||
fail2ban \
|
apk add --no-cache \
|
||||||
gnupg \
|
fail2ban \
|
||||||
memcached \
|
gnupg \
|
||||||
nginx \
|
inotify-tools \
|
||||||
nginx-mod-http-echo \
|
iptables-legacy \
|
||||||
nginx-mod-http-fancyindex \
|
memcached \
|
||||||
nginx-mod-http-geoip2 \
|
nginx-mod-http-brotli \
|
||||||
nginx-mod-http-headers-more \
|
nginx-mod-http-dav-ext \
|
||||||
nginx-mod-http-image-filter \
|
nginx-mod-http-echo \
|
||||||
nginx-mod-http-lua \
|
nginx-mod-http-fancyindex \
|
||||||
nginx-mod-http-lua-upstream \
|
nginx-mod-http-geoip2 \
|
||||||
nginx-mod-http-nchan \
|
nginx-mod-http-headers-more \
|
||||||
nginx-mod-http-perl \
|
nginx-mod-http-image-filter \
|
||||||
nginx-mod-http-redis2 \
|
nginx-mod-http-perl \
|
||||||
nginx-mod-http-set-misc \
|
nginx-mod-http-redis2 \
|
||||||
nginx-mod-http-upload-progress \
|
nginx-mod-http-set-misc \
|
||||||
nginx-mod-http-xslt-filter \
|
nginx-mod-http-upload-progress \
|
||||||
nginx-mod-mail \
|
nginx-mod-http-xslt-filter \
|
||||||
nginx-mod-rtmp \
|
nginx-mod-mail \
|
||||||
nginx-mod-stream \
|
nginx-mod-rtmp \
|
||||||
nginx-mod-stream-geoip2 \
|
nginx-mod-stream \
|
||||||
nginx-vim \
|
nginx-mod-stream-geoip2 \
|
||||||
php7-bcmath \
|
nginx-vim \
|
||||||
php7-bz2 \
|
php83-bcmath \
|
||||||
php7-ctype \
|
php83-bz2 \
|
||||||
php7-curl \
|
php83-dom \
|
||||||
php7-dom \
|
php83-exif \
|
||||||
php7-exif \
|
php83-ftp \
|
||||||
php7-ftp \
|
php83-gd \
|
||||||
php7-gd \
|
php83-gmp \
|
||||||
php7-iconv \
|
php83-imap \
|
||||||
php7-imap \
|
php83-intl \
|
||||||
php7-intl \
|
php83-ldap \
|
||||||
php7-ldap \
|
php83-mysqli \
|
||||||
php7-mcrypt \
|
php83-mysqlnd \
|
||||||
php7-memcached \
|
php83-opcache \
|
||||||
php7-mysqli \
|
php83-pdo_mysql \
|
||||||
php7-mysqlnd \
|
php83-pdo_odbc \
|
||||||
php7-opcache \
|
php83-pdo_pgsql \
|
||||||
php7-pdo_mysql \
|
php83-pdo_sqlite \
|
||||||
php7-pdo_odbc \
|
php83-pear \
|
||||||
php7-pdo_pgsql \
|
php83-pecl-apcu \
|
||||||
php7-pdo_sqlite \
|
php83-pecl-mcrypt \
|
||||||
php7-pear \
|
php83-pecl-memcached \
|
||||||
php7-pecl-apcu \
|
php83-pecl-redis \
|
||||||
php7-pecl-redis \
|
php83-pgsql \
|
||||||
php7-pgsql \
|
php83-posix \
|
||||||
php7-phar \
|
php83-soap \
|
||||||
php7-posix \
|
php83-sockets \
|
||||||
php7-soap \
|
php83-sodium \
|
||||||
php7-sockets \
|
php83-sqlite3 \
|
||||||
php7-sodium \
|
php83-tokenizer \
|
||||||
php7-sqlite3 \
|
php83-xmlreader \
|
||||||
php7-tokenizer \
|
php83-xsl \
|
||||||
php7-xml \
|
whois && \
|
||||||
php7-xmlreader \
|
echo "**** install certbot plugins ****" && \
|
||||||
php7-xmlrpc \
|
if [ -z ${CERTBOT_VERSION+x} ]; then \
|
||||||
php7-xsl \
|
CERTBOT_VERSION=$(curl -sL https://pypi.python.org/pypi/certbot/json |jq -r '. | .info.version'); \
|
||||||
php7-zip \
|
fi && \
|
||||||
py3-cryptography \
|
python3 -m venv /lsiopy && \
|
||||||
py3-future \
|
pip install -U --no-cache-dir \
|
||||||
py3-pip \
|
pip \
|
||||||
whois && \
|
wheel && \
|
||||||
echo "**** install certbot plugins ****" && \
|
pip install -U --no-cache-dir --find-links https://wheel-index.linuxserver.io/alpine-3.21/ \
|
||||||
if [ -z ${CERTBOT_VERSION+x} ]; then \
|
certbot==${CERTBOT_VERSION} \
|
||||||
CERTBOT="certbot"; \
|
certbot-dns-acmedns \
|
||||||
else \
|
certbot-dns-aliyun \
|
||||||
CERTBOT="certbot==${CERTBOT_VERSION}"; \
|
certbot-dns-azure \
|
||||||
fi && \
|
certbot-dns-bunny \
|
||||||
pip3 install -U \
|
certbot-dns-cloudflare \
|
||||||
pip && \
|
certbot-dns-cpanel \
|
||||||
pip3 install -U \
|
certbot-dns-desec \
|
||||||
${CERTBOT} \
|
certbot-dns-digitalocean \
|
||||||
certbot-dns-aliyun \
|
certbot-dns-directadmin \
|
||||||
certbot-dns-cloudflare \
|
certbot-dns-dnsimple \
|
||||||
certbot-dns-cloudxns \
|
certbot-dns-dnsmadeeasy \
|
||||||
certbot-dns-cpanel \
|
certbot-dns-dnspod \
|
||||||
certbot-dns-digitalocean \
|
certbot-dns-do \
|
||||||
certbot-dns-dnsimple \
|
certbot-dns-domeneshop \
|
||||||
certbot-dns-dnsmadeeasy \
|
certbot-dns-dreamhost \
|
||||||
certbot-dns-domeneshop \
|
certbot-dns-duckdns \
|
||||||
certbot-dns-google \
|
certbot-dns-dynudns \
|
||||||
certbot-dns-inwx \
|
certbot-dns-freedns \
|
||||||
certbot-dns-linode \
|
certbot-dns-gehirn \
|
||||||
certbot-dns-luadns \
|
certbot-dns-glesys \
|
||||||
certbot-dns-nsone \
|
certbot-dns-godaddy \
|
||||||
certbot-dns-ovh \
|
certbot-dns-google \
|
||||||
certbot-dns-rfc2136 \
|
certbot-dns-he \
|
||||||
certbot-dns-route53 \
|
certbot-dns-hetzner \
|
||||||
certbot-dns-transip \
|
certbot-dns-infomaniak \
|
||||||
certbot-plugin-gandi \
|
certbot-dns-inwx \
|
||||||
cryptography \
|
certbot-dns-ionos \
|
||||||
requests && \
|
certbot-dns-linode \
|
||||||
echo "**** remove unnecessary fail2ban filters ****" && \
|
certbot-dns-loopia \
|
||||||
rm \
|
certbot-dns-luadns \
|
||||||
/etc/fail2ban/jail.d/alpine-ssh.conf && \
|
certbot-dns-namecheap \
|
||||||
echo "**** copy fail2ban default action and filter to /default ****" && \
|
certbot-dns-netcup \
|
||||||
mkdir -p /defaults/fail2ban && \
|
certbot-dns-njalla \
|
||||||
mv /etc/fail2ban/action.d /defaults/fail2ban/ && \
|
certbot-dns-nsone \
|
||||||
mv /etc/fail2ban/filter.d /defaults/fail2ban/ && \
|
certbot-dns-ovh \
|
||||||
echo "**** copy proxy confs to /default ****" && \
|
certbot-dns-porkbun \
|
||||||
mkdir -p /defaults/proxy-confs && \
|
certbot-dns-rfc2136 \
|
||||||
curl -o \
|
certbot-dns-route53 \
|
||||||
/tmp/proxy.tar.gz -L \
|
certbot-dns-sakuracloud \
|
||||||
"https://github.com/linuxserver/reverse-proxy-confs/tarball/master" && \
|
certbot-dns-standalone \
|
||||||
tar xf \
|
certbot-dns-transip \
|
||||||
/tmp/proxy.tar.gz -C \
|
certbot-dns-vultr \
|
||||||
/defaults/proxy-confs --strip-components=1 --exclude=linux*/.gitattributes --exclude=linux*/.github --exclude=linux*/.gitignore --exclude=linux*/LICENSE && \
|
certbot-plugin-gandi \
|
||||||
echo "**** configure nginx ****" && \
|
cryptography \
|
||||||
rm -f /etc/nginx/conf.d/default.conf && \
|
future \
|
||||||
curl -o \
|
requests && \
|
||||||
/defaults/dhparams.pem -L \
|
echo "**** enable OCSP stapling from base ****" && \
|
||||||
"https://lsio.ams3.digitaloceanspaces.com/dhparams.pem" && \
|
sed -i \
|
||||||
echo "**** cleanup ****" && \
|
's|#ssl_stapling on;|ssl_stapling on;|' \
|
||||||
apk del --purge \
|
/defaults/nginx/ssl.conf.sample && \
|
||||||
build-dependencies && \
|
sed -i \
|
||||||
for cleanfiles in *.pyc *.pyo; \
|
's|#ssl_stapling_verify on;|ssl_stapling_verify on;|' \
|
||||||
do \
|
/defaults/nginx/ssl.conf.sample && \
|
||||||
find /usr/lib/python3.* -iname "${cleanfiles}" -exec rm -f '{}' + \
|
sed -i \
|
||||||
; done && \
|
's|#ssl_trusted_certificate /config/keys/cert.crt;|ssl_trusted_certificate /config/keys/cert.crt;|' \
|
||||||
rm -rf \
|
/defaults/nginx/ssl.conf.sample && \
|
||||||
/tmp/* \
|
echo "**** remove stream.conf ****" && \
|
||||||
/root/.cache
|
rm -f /etc/nginx/conf.d/stream.conf && \
|
||||||
|
echo "**** correct ip6tables legacy issue ****" && \
|
||||||
|
rm \
|
||||||
|
/usr/sbin/ip6tables && \
|
||||||
|
ln -s \
|
||||||
|
/usr/sbin/ip6tables-nft /usr/sbin/ip6tables && \
|
||||||
|
echo "**** remove unnecessary fail2ban filters ****" && \
|
||||||
|
rm \
|
||||||
|
/etc/fail2ban/jail.d/alpine-ssh.conf && \
|
||||||
|
echo "**** copy fail2ban default action and filter to /defaults ****" && \
|
||||||
|
mkdir -p /defaults/fail2ban && \
|
||||||
|
mv /etc/fail2ban/action.d /defaults/fail2ban/ && \
|
||||||
|
mv /etc/fail2ban/filter.d /defaults/fail2ban/ && \
|
||||||
|
echo "**** define allowipv6 to silence warning ****" && \
|
||||||
|
sed -i 's/#allowipv6 = auto/allowipv6 = auto/g' /etc/fail2ban/fail2ban.conf && \
|
||||||
|
echo "**** copy proxy confs to /defaults ****" && \
|
||||||
|
mkdir -p \
|
||||||
|
/defaults/nginx/proxy-confs && \
|
||||||
|
curl -o \
|
||||||
|
/tmp/proxy-confs.tar.gz -L \
|
||||||
|
"https://github.com/linuxserver/reverse-proxy-confs/tarball/master" && \
|
||||||
|
tar xf \
|
||||||
|
/tmp/proxy-confs.tar.gz -C \
|
||||||
|
/defaults/nginx/proxy-confs --strip-components=1 --exclude=linux*/.editorconfig --exclude=linux*/.gitattributes --exclude=linux*/.github --exclude=linux*/.gitignore --exclude=linux*/LICENSE && \
|
||||||
|
printf "Linuxserver.io version: ${VERSION}\nBuild-date: ${BUILD_DATE}" > /build_version && \
|
||||||
|
echo "**** cleanup ****" && \
|
||||||
|
apk del --purge \
|
||||||
|
build-dependencies && \
|
||||||
|
rm -rf \
|
||||||
|
/tmp/* \
|
||||||
|
$HOME/.cache \
|
||||||
|
$HOME/.cargo
|
||||||
|
|
||||||
# add local files
|
# copy local files
|
||||||
COPY root/ /
|
COPY root/ /
|
||||||
|
|
||||||
|
# ports and volumes
|
||||||
|
EXPOSE 80 443
|
||||||
|
VOLUME /config
|
||||||
|
@ -1,150 +1,189 @@
|
|||||||
FROM lsiobase/nginx:arm64v8-3.12
|
# syntax=docker/dockerfile:1
|
||||||
|
|
||||||
|
FROM ghcr.io/linuxserver/baseimage-alpine-nginx:arm64v8-3.21
|
||||||
|
|
||||||
# set version label
|
# set version label
|
||||||
ARG BUILD_DATE
|
ARG BUILD_DATE
|
||||||
ARG VERSION
|
ARG VERSION
|
||||||
ARG CERTBOT_VERSION
|
ARG CERTBOT_VERSION
|
||||||
LABEL build_version="Linuxserver.io version:- ${VERSION} Build-date:- ${BUILD_DATE}"
|
LABEL build_version="Linuxserver.io version:- ${VERSION} Build-date:- ${BUILD_DATE}"
|
||||||
LABEL maintainer="aptalca"
|
LABEL maintainer="nemchik"
|
||||||
|
|
||||||
# environment settings
|
# environment settings
|
||||||
ENV DHLEVEL=2048 ONLY_SUBDOMAINS=false AWS_CONFIG_FILE=/config/dns-conf/route53.ini
|
ENV DHLEVEL=2048 \
|
||||||
ENV S6_BEHAVIOUR_IF_STAGE2_FAILS=2
|
ONLY_SUBDOMAINS=false \
|
||||||
|
AWS_CONFIG_FILE=/config/dns-conf/route53.ini \
|
||||||
|
S6_BEHAVIOUR_IF_STAGE2_FAILS=2
|
||||||
|
|
||||||
RUN \
|
RUN \
|
||||||
echo "**** install build packages ****" && \
|
echo "**** install build packages ****" && \
|
||||||
apk add --no-cache --virtual=build-dependencies \
|
apk add --no-cache --virtual=build-dependencies \
|
||||||
g++ \
|
build-base \
|
||||||
gcc \
|
cargo \
|
||||||
libffi-dev \
|
libffi-dev \
|
||||||
openssl-dev \
|
libxml2-dev \
|
||||||
python3-dev && \
|
libxslt-dev \
|
||||||
echo "**** install runtime packages ****" && \
|
openssl-dev \
|
||||||
apk add --no-cache --upgrade \
|
python3-dev && \
|
||||||
curl \
|
echo "**** install runtime packages ****" && \
|
||||||
fail2ban \
|
apk add --no-cache \
|
||||||
gnupg \
|
fail2ban \
|
||||||
memcached \
|
gnupg \
|
||||||
nginx \
|
inotify-tools \
|
||||||
nginx-mod-http-echo \
|
iptables-legacy \
|
||||||
nginx-mod-http-fancyindex \
|
memcached \
|
||||||
nginx-mod-http-geoip2 \
|
nginx-mod-http-brotli \
|
||||||
nginx-mod-http-headers-more \
|
nginx-mod-http-dav-ext \
|
||||||
nginx-mod-http-image-filter \
|
nginx-mod-http-echo \
|
||||||
nginx-mod-http-lua \
|
nginx-mod-http-fancyindex \
|
||||||
nginx-mod-http-lua-upstream \
|
nginx-mod-http-geoip2 \
|
||||||
nginx-mod-http-nchan \
|
nginx-mod-http-headers-more \
|
||||||
nginx-mod-http-perl \
|
nginx-mod-http-image-filter \
|
||||||
nginx-mod-http-redis2 \
|
nginx-mod-http-perl \
|
||||||
nginx-mod-http-set-misc \
|
nginx-mod-http-redis2 \
|
||||||
nginx-mod-http-upload-progress \
|
nginx-mod-http-set-misc \
|
||||||
nginx-mod-http-xslt-filter \
|
nginx-mod-http-upload-progress \
|
||||||
nginx-mod-mail \
|
nginx-mod-http-xslt-filter \
|
||||||
nginx-mod-rtmp \
|
nginx-mod-mail \
|
||||||
nginx-mod-stream \
|
nginx-mod-rtmp \
|
||||||
nginx-mod-stream-geoip2 \
|
nginx-mod-stream \
|
||||||
nginx-vim \
|
nginx-mod-stream-geoip2 \
|
||||||
php7-bcmath \
|
nginx-vim \
|
||||||
php7-bz2 \
|
php83-bcmath \
|
||||||
php7-ctype \
|
php83-bz2 \
|
||||||
php7-curl \
|
php83-dom \
|
||||||
php7-dom \
|
php83-exif \
|
||||||
php7-exif \
|
php83-ftp \
|
||||||
php7-ftp \
|
php83-gd \
|
||||||
php7-gd \
|
php83-gmp \
|
||||||
php7-iconv \
|
php83-imap \
|
||||||
php7-imap \
|
php83-intl \
|
||||||
php7-intl \
|
php83-ldap \
|
||||||
php7-ldap \
|
php83-mysqli \
|
||||||
php7-mcrypt \
|
php83-mysqlnd \
|
||||||
php7-memcached \
|
php83-opcache \
|
||||||
php7-mysqli \
|
php83-pdo_mysql \
|
||||||
php7-mysqlnd \
|
php83-pdo_odbc \
|
||||||
php7-opcache \
|
php83-pdo_pgsql \
|
||||||
php7-pdo_mysql \
|
php83-pdo_sqlite \
|
||||||
php7-pdo_odbc \
|
php83-pear \
|
||||||
php7-pdo_pgsql \
|
php83-pecl-apcu \
|
||||||
php7-pdo_sqlite \
|
php83-pecl-mcrypt \
|
||||||
php7-pear \
|
php83-pecl-memcached \
|
||||||
php7-pecl-apcu \
|
php83-pecl-redis \
|
||||||
php7-pecl-redis \
|
php83-pgsql \
|
||||||
php7-pgsql \
|
php83-posix \
|
||||||
php7-phar \
|
php83-soap \
|
||||||
php7-posix \
|
php83-sockets \
|
||||||
php7-soap \
|
php83-sodium \
|
||||||
php7-sockets \
|
php83-sqlite3 \
|
||||||
php7-sodium \
|
php83-tokenizer \
|
||||||
php7-sqlite3 \
|
php83-xmlreader \
|
||||||
php7-tokenizer \
|
php83-xsl \
|
||||||
php7-xml \
|
whois && \
|
||||||
php7-xmlreader \
|
echo "**** install certbot plugins ****" && \
|
||||||
php7-xmlrpc \
|
if [ -z ${CERTBOT_VERSION+x} ]; then \
|
||||||
php7-xsl \
|
CERTBOT_VERSION=$(curl -sL https://pypi.python.org/pypi/certbot/json |jq -r '. | .info.version'); \
|
||||||
php7-zip \
|
fi && \
|
||||||
py3-cryptography \
|
python3 -m venv /lsiopy && \
|
||||||
py3-future \
|
pip install -U --no-cache-dir \
|
||||||
py3-pip \
|
pip \
|
||||||
whois && \
|
wheel && \
|
||||||
echo "**** install certbot plugins ****" && \
|
pip install -U --no-cache-dir --find-links https://wheel-index.linuxserver.io/alpine-3.21/ \
|
||||||
if [ -z ${CERTBOT_VERSION+x} ]; then \
|
certbot==${CERTBOT_VERSION} \
|
||||||
CERTBOT="certbot"; \
|
certbot-dns-acmedns \
|
||||||
else \
|
certbot-dns-aliyun \
|
||||||
CERTBOT="certbot==${CERTBOT_VERSION}"; \
|
certbot-dns-azure \
|
||||||
fi && \
|
certbot-dns-bunny \
|
||||||
pip3 install -U \
|
certbot-dns-cloudflare \
|
||||||
pip && \
|
certbot-dns-cpanel \
|
||||||
pip3 install -U \
|
certbot-dns-desec \
|
||||||
${CERTBOT} \
|
certbot-dns-digitalocean \
|
||||||
certbot-dns-aliyun \
|
certbot-dns-directadmin \
|
||||||
certbot-dns-cloudflare \
|
certbot-dns-dnsimple \
|
||||||
certbot-dns-cloudxns \
|
certbot-dns-dnsmadeeasy \
|
||||||
certbot-dns-cpanel \
|
certbot-dns-dnspod \
|
||||||
certbot-dns-digitalocean \
|
certbot-dns-do \
|
||||||
certbot-dns-dnsimple \
|
certbot-dns-domeneshop \
|
||||||
certbot-dns-dnsmadeeasy \
|
certbot-dns-dreamhost \
|
||||||
certbot-dns-domeneshop \
|
certbot-dns-duckdns \
|
||||||
certbot-dns-google \
|
certbot-dns-dynudns \
|
||||||
certbot-dns-inwx \
|
certbot-dns-freedns \
|
||||||
certbot-dns-linode \
|
certbot-dns-gehirn \
|
||||||
certbot-dns-luadns \
|
certbot-dns-glesys \
|
||||||
certbot-dns-nsone \
|
certbot-dns-godaddy \
|
||||||
certbot-dns-ovh \
|
certbot-dns-google \
|
||||||
certbot-dns-rfc2136 \
|
certbot-dns-he \
|
||||||
certbot-dns-route53 \
|
certbot-dns-hetzner \
|
||||||
certbot-dns-transip \
|
certbot-dns-infomaniak \
|
||||||
certbot-plugin-gandi \
|
certbot-dns-inwx \
|
||||||
cryptography \
|
certbot-dns-ionos \
|
||||||
requests && \
|
certbot-dns-linode \
|
||||||
echo "**** remove unnecessary fail2ban filters ****" && \
|
certbot-dns-loopia \
|
||||||
rm \
|
certbot-dns-luadns \
|
||||||
/etc/fail2ban/jail.d/alpine-ssh.conf && \
|
certbot-dns-namecheap \
|
||||||
echo "**** copy fail2ban default action and filter to /default ****" && \
|
certbot-dns-netcup \
|
||||||
mkdir -p /defaults/fail2ban && \
|
certbot-dns-njalla \
|
||||||
mv /etc/fail2ban/action.d /defaults/fail2ban/ && \
|
certbot-dns-nsone \
|
||||||
mv /etc/fail2ban/filter.d /defaults/fail2ban/ && \
|
certbot-dns-ovh \
|
||||||
echo "**** copy proxy confs to /default ****" && \
|
certbot-dns-porkbun \
|
||||||
mkdir -p /defaults/proxy-confs && \
|
certbot-dns-rfc2136 \
|
||||||
curl -o \
|
certbot-dns-route53 \
|
||||||
/tmp/proxy.tar.gz -L \
|
certbot-dns-sakuracloud \
|
||||||
"https://github.com/linuxserver/reverse-proxy-confs/tarball/master" && \
|
certbot-dns-standalone \
|
||||||
tar xf \
|
certbot-dns-transip \
|
||||||
/tmp/proxy.tar.gz -C \
|
certbot-dns-vultr \
|
||||||
/defaults/proxy-confs --strip-components=1 --exclude=linux*/.gitattributes --exclude=linux*/.github --exclude=linux*/.gitignore --exclude=linux*/LICENSE && \
|
certbot-plugin-gandi \
|
||||||
echo "**** configure nginx ****" && \
|
cryptography \
|
||||||
rm -f /etc/nginx/conf.d/default.conf && \
|
future \
|
||||||
curl -o \
|
requests && \
|
||||||
/defaults/dhparams.pem -L \
|
echo "**** enable OCSP stapling from base ****" && \
|
||||||
"https://lsio.ams3.digitaloceanspaces.com/dhparams.pem" && \
|
sed -i \
|
||||||
echo "**** cleanup ****" && \
|
's|#ssl_stapling on;|ssl_stapling on;|' \
|
||||||
apk del --purge \
|
/defaults/nginx/ssl.conf.sample && \
|
||||||
build-dependencies && \
|
sed -i \
|
||||||
for cleanfiles in *.pyc *.pyo; \
|
's|#ssl_stapling_verify on;|ssl_stapling_verify on;|' \
|
||||||
do \
|
/defaults/nginx/ssl.conf.sample && \
|
||||||
find /usr/lib/python3.* -iname "${cleanfiles}" -exec rm -f '{}' + \
|
sed -i \
|
||||||
; done && \
|
's|#ssl_trusted_certificate /config/keys/cert.crt;|ssl_trusted_certificate /config/keys/cert.crt;|' \
|
||||||
rm -rf \
|
/defaults/nginx/ssl.conf.sample && \
|
||||||
/tmp/* \
|
echo "**** remove stream.conf ****" && \
|
||||||
/root/.cache
|
rm -f /etc/nginx/conf.d/stream.conf && \
|
||||||
|
echo "**** correct ip6tables legacy issue ****" && \
|
||||||
|
rm \
|
||||||
|
/usr/sbin/ip6tables && \
|
||||||
|
ln -s \
|
||||||
|
/usr/sbin/ip6tables-nft /usr/sbin/ip6tables && \
|
||||||
|
echo "**** remove unnecessary fail2ban filters ****" && \
|
||||||
|
rm \
|
||||||
|
/etc/fail2ban/jail.d/alpine-ssh.conf && \
|
||||||
|
echo "**** copy fail2ban default action and filter to /defaults ****" && \
|
||||||
|
mkdir -p /defaults/fail2ban && \
|
||||||
|
mv /etc/fail2ban/action.d /defaults/fail2ban/ && \
|
||||||
|
mv /etc/fail2ban/filter.d /defaults/fail2ban/ && \
|
||||||
|
echo "**** define allowipv6 to silence warning ****" && \
|
||||||
|
sed -i 's/#allowipv6 = auto/allowipv6 = auto/g' /etc/fail2ban/fail2ban.conf && \
|
||||||
|
echo "**** copy proxy confs to /defaults ****" && \
|
||||||
|
mkdir -p \
|
||||||
|
/defaults/nginx/proxy-confs && \
|
||||||
|
curl -o \
|
||||||
|
/tmp/proxy-confs.tar.gz -L \
|
||||||
|
"https://github.com/linuxserver/reverse-proxy-confs/tarball/master" && \
|
||||||
|
tar xf \
|
||||||
|
/tmp/proxy-confs.tar.gz -C \
|
||||||
|
/defaults/nginx/proxy-confs --strip-components=1 --exclude=linux*/.editorconfig --exclude=linux*/.gitattributes --exclude=linux*/.github --exclude=linux*/.gitignore --exclude=linux*/LICENSE && \
|
||||||
|
printf "Linuxserver.io version: ${VERSION}\nBuild-date: ${BUILD_DATE}" > /build_version && \
|
||||||
|
echo "**** cleanup ****" && \
|
||||||
|
apk del --purge \
|
||||||
|
build-dependencies && \
|
||||||
|
rm -rf \
|
||||||
|
/tmp/* \
|
||||||
|
$HOME/.cache \
|
||||||
|
$HOME/.cargo
|
||||||
|
|
||||||
# add local files
|
# copy local files
|
||||||
COPY root/ /
|
COPY root/ /
|
||||||
|
|
||||||
|
# ports and volumes
|
||||||
|
EXPOSE 80 443
|
||||||
|
VOLUME /config
|
||||||
|
150
Dockerfile.armhf
150
Dockerfile.armhf
@ -1,150 +0,0 @@
|
|||||||
FROM lsiobase/nginx:arm32v7-3.12
|
|
||||||
|
|
||||||
# set version label
|
|
||||||
ARG BUILD_DATE
|
|
||||||
ARG VERSION
|
|
||||||
ARG CERTBOT_VERSION
|
|
||||||
LABEL build_version="Linuxserver.io version:- ${VERSION} Build-date:- ${BUILD_DATE}"
|
|
||||||
LABEL maintainer="aptalca"
|
|
||||||
|
|
||||||
# environment settings
|
|
||||||
ENV DHLEVEL=2048 ONLY_SUBDOMAINS=false AWS_CONFIG_FILE=/config/dns-conf/route53.ini
|
|
||||||
ENV S6_BEHAVIOUR_IF_STAGE2_FAILS=2
|
|
||||||
|
|
||||||
RUN \
|
|
||||||
echo "**** install build packages ****" && \
|
|
||||||
apk add --no-cache --virtual=build-dependencies \
|
|
||||||
g++ \
|
|
||||||
gcc \
|
|
||||||
libffi-dev \
|
|
||||||
openssl-dev \
|
|
||||||
python3-dev && \
|
|
||||||
echo "**** install runtime packages ****" && \
|
|
||||||
apk add --no-cache --upgrade \
|
|
||||||
curl \
|
|
||||||
fail2ban \
|
|
||||||
gnupg \
|
|
||||||
memcached \
|
|
||||||
nginx \
|
|
||||||
nginx-mod-http-echo \
|
|
||||||
nginx-mod-http-fancyindex \
|
|
||||||
nginx-mod-http-geoip2 \
|
|
||||||
nginx-mod-http-headers-more \
|
|
||||||
nginx-mod-http-image-filter \
|
|
||||||
nginx-mod-http-lua \
|
|
||||||
nginx-mod-http-lua-upstream \
|
|
||||||
nginx-mod-http-nchan \
|
|
||||||
nginx-mod-http-perl \
|
|
||||||
nginx-mod-http-redis2 \
|
|
||||||
nginx-mod-http-set-misc \
|
|
||||||
nginx-mod-http-upload-progress \
|
|
||||||
nginx-mod-http-xslt-filter \
|
|
||||||
nginx-mod-mail \
|
|
||||||
nginx-mod-rtmp \
|
|
||||||
nginx-mod-stream \
|
|
||||||
nginx-mod-stream-geoip2 \
|
|
||||||
nginx-vim \
|
|
||||||
php7-bcmath \
|
|
||||||
php7-bz2 \
|
|
||||||
php7-ctype \
|
|
||||||
php7-curl \
|
|
||||||
php7-dom \
|
|
||||||
php7-exif \
|
|
||||||
php7-ftp \
|
|
||||||
php7-gd \
|
|
||||||
php7-iconv \
|
|
||||||
php7-imap \
|
|
||||||
php7-intl \
|
|
||||||
php7-ldap \
|
|
||||||
php7-mcrypt \
|
|
||||||
php7-memcached \
|
|
||||||
php7-mysqli \
|
|
||||||
php7-mysqlnd \
|
|
||||||
php7-opcache \
|
|
||||||
php7-pdo_mysql \
|
|
||||||
php7-pdo_odbc \
|
|
||||||
php7-pdo_pgsql \
|
|
||||||
php7-pdo_sqlite \
|
|
||||||
php7-pear \
|
|
||||||
php7-pecl-apcu \
|
|
||||||
php7-pecl-redis \
|
|
||||||
php7-pgsql \
|
|
||||||
php7-phar \
|
|
||||||
php7-posix \
|
|
||||||
php7-soap \
|
|
||||||
php7-sockets \
|
|
||||||
php7-sodium \
|
|
||||||
php7-sqlite3 \
|
|
||||||
php7-tokenizer \
|
|
||||||
php7-xml \
|
|
||||||
php7-xmlreader \
|
|
||||||
php7-xmlrpc \
|
|
||||||
php7-xsl \
|
|
||||||
php7-zip \
|
|
||||||
py3-cryptography \
|
|
||||||
py3-future \
|
|
||||||
py3-pip \
|
|
||||||
whois && \
|
|
||||||
echo "**** install certbot plugins ****" && \
|
|
||||||
if [ -z ${CERTBOT_VERSION+x} ]; then \
|
|
||||||
CERTBOT="certbot"; \
|
|
||||||
else \
|
|
||||||
CERTBOT="certbot==${CERTBOT_VERSION}"; \
|
|
||||||
fi && \
|
|
||||||
pip3 install -U \
|
|
||||||
pip && \
|
|
||||||
pip3 install -U \
|
|
||||||
${CERTBOT} \
|
|
||||||
certbot-dns-aliyun \
|
|
||||||
certbot-dns-cloudflare \
|
|
||||||
certbot-dns-cloudxns \
|
|
||||||
certbot-dns-cpanel \
|
|
||||||
certbot-dns-digitalocean \
|
|
||||||
certbot-dns-dnsimple \
|
|
||||||
certbot-dns-dnsmadeeasy \
|
|
||||||
certbot-dns-domeneshop \
|
|
||||||
certbot-dns-google \
|
|
||||||
certbot-dns-inwx \
|
|
||||||
certbot-dns-linode \
|
|
||||||
certbot-dns-luadns \
|
|
||||||
certbot-dns-nsone \
|
|
||||||
certbot-dns-ovh \
|
|
||||||
certbot-dns-rfc2136 \
|
|
||||||
certbot-dns-route53 \
|
|
||||||
certbot-dns-transip \
|
|
||||||
certbot-plugin-gandi \
|
|
||||||
cryptography \
|
|
||||||
requests && \
|
|
||||||
echo "**** remove unnecessary fail2ban filters ****" && \
|
|
||||||
rm \
|
|
||||||
/etc/fail2ban/jail.d/alpine-ssh.conf && \
|
|
||||||
echo "**** copy fail2ban default action and filter to /default ****" && \
|
|
||||||
mkdir -p /defaults/fail2ban && \
|
|
||||||
mv /etc/fail2ban/action.d /defaults/fail2ban/ && \
|
|
||||||
mv /etc/fail2ban/filter.d /defaults/fail2ban/ && \
|
|
||||||
echo "**** copy proxy confs to /default ****" && \
|
|
||||||
mkdir -p /defaults/proxy-confs && \
|
|
||||||
curl -o \
|
|
||||||
/tmp/proxy.tar.gz -L \
|
|
||||||
"https://github.com/linuxserver/reverse-proxy-confs/tarball/master" && \
|
|
||||||
tar xf \
|
|
||||||
/tmp/proxy.tar.gz -C \
|
|
||||||
/defaults/proxy-confs --strip-components=1 --exclude=linux*/.gitattributes --exclude=linux*/.github --exclude=linux*/.gitignore --exclude=linux*/LICENSE && \
|
|
||||||
echo "**** configure nginx ****" && \
|
|
||||||
rm -f /etc/nginx/conf.d/default.conf && \
|
|
||||||
curl -o \
|
|
||||||
/defaults/dhparams.pem -L \
|
|
||||||
"https://lsio.ams3.digitaloceanspaces.com/dhparams.pem" && \
|
|
||||||
echo "**** cleanup ****" && \
|
|
||||||
apk del --purge \
|
|
||||||
build-dependencies && \
|
|
||||||
for cleanfiles in *.pyc *.pyo; \
|
|
||||||
do \
|
|
||||||
find /usr/lib/python3.* -iname "${cleanfiles}" -exec rm -f '{}' + \
|
|
||||||
; done && \
|
|
||||||
rm -rf \
|
|
||||||
/tmp/* \
|
|
||||||
/root/.cache
|
|
||||||
|
|
||||||
# add local files
|
|
||||||
COPY root/ /
|
|
991
Jenkinsfile
vendored
991
Jenkinsfile
vendored
File diff suppressed because it is too large
Load Diff
563
README.md
563
README.md
@ -1,7 +1,9 @@
|
|||||||
|
<!-- DO NOT EDIT THIS FILE MANUALLY -->
|
||||||
|
<!-- Please read https://github.com/linuxserver/docker-swag/blob/master/.github/CONTRIBUTING.md -->
|
||||||
[](https://linuxserver.io)
|
[](https://linuxserver.io)
|
||||||
|
|
||||||
[](https://blog.linuxserver.io "all the things you can do with our containers including How-To guides, opinions and much more!")
|
[](https://blog.linuxserver.io "all the things you can do with our containers including How-To guides, opinions and much more!")
|
||||||
[](https://discord.gg/YWrKVTn "realtime support / chat with the community and the team.")
|
[](https://linuxserver.io/discord "realtime support / chat with the community and the team.")
|
||||||
[](https://discourse.linuxserver.io "post on our community forum.")
|
[](https://discourse.linuxserver.io "post on our community forum.")
|
||||||
[](https://fleet.linuxserver.io "an online web interface which displays all of our maintained images.")
|
[](https://fleet.linuxserver.io "an online web interface which displays all of our maintained images.")
|
||||||
[](https://github.com/linuxserver "view the source for all of our repositories.")
|
[](https://github.com/linuxserver "view the source for all of our repositories.")
|
||||||
@ -9,15 +11,16 @@
|
|||||||
|
|
||||||
The [LinuxServer.io](https://linuxserver.io) team brings you another container release featuring:
|
The [LinuxServer.io](https://linuxserver.io) team brings you another container release featuring:
|
||||||
|
|
||||||
* regular and timely application updates
|
* regular and timely application updates
|
||||||
* easy user mappings (PGID, PUID)
|
* easy user mappings (PGID, PUID)
|
||||||
* custom base image with s6 overlay
|
* custom base image with s6 overlay
|
||||||
* weekly base OS updates with common layers across the entire LinuxServer.io ecosystem to minimise space usage, down time and bandwidth
|
* weekly base OS updates with common layers across the entire LinuxServer.io ecosystem to minimise space usage, down time and bandwidth
|
||||||
* regular security updates
|
* regular security updates
|
||||||
|
|
||||||
Find us at:
|
Find us at:
|
||||||
|
|
||||||
* [Blog](https://blog.linuxserver.io) - all the things you can do with our containers including How-To guides, opinions and much more!
|
* [Blog](https://blog.linuxserver.io) - all the things you can do with our containers including How-To guides, opinions and much more!
|
||||||
* [Discord](https://discord.gg/YWrKVTn) - realtime support / chat with the community and the team.
|
* [Discord](https://linuxserver.io/discord) - realtime support / chat with the community and the team.
|
||||||
* [Discourse](https://discourse.linuxserver.io) - post on our community forum.
|
* [Discourse](https://discourse.linuxserver.io) - post on our community forum.
|
||||||
* [Fleet](https://fleet.linuxserver.io) - an online web interface which displays all of our maintained images.
|
* [Fleet](https://fleet.linuxserver.io) - an online web interface which displays all of our maintained images.
|
||||||
* [GitHub](https://github.com/linuxserver) - view the source for all of our repositories.
|
* [GitHub](https://github.com/linuxserver) - view the source for all of our repositories.
|
||||||
@ -25,123 +28,238 @@ Find us at:
|
|||||||
|
|
||||||
# [linuxserver/swag](https://github.com/linuxserver/docker-swag)
|
# [linuxserver/swag](https://github.com/linuxserver/docker-swag)
|
||||||
|
|
||||||
|
[](https://scarf.sh)
|
||||||
[](https://github.com/linuxserver/docker-swag)
|
[](https://github.com/linuxserver/docker-swag)
|
||||||
[](https://github.com/linuxserver/docker-swag/releases)
|
[](https://github.com/linuxserver/docker-swag/releases)
|
||||||
[](https://github.com/linuxserver/docker-swag/packages)
|
[](https://github.com/linuxserver/docker-swag/packages)
|
||||||
[](https://gitlab.com/Linuxserver.io/docker-swag/container_registry)
|
[](https://gitlab.com/linuxserver.io/docker-swag/container_registry)
|
||||||
[](https://microbadger.com/images/linuxserver/swag "Get your own version badge on microbadger.com")
|
[](https://quay.io/repository/linuxserver.io/swag)
|
||||||
[](https://hub.docker.com/r/linuxserver/swag)
|
[](https://hub.docker.com/r/linuxserver/swag)
|
||||||
[](https://hub.docker.com/r/linuxserver/swag)
|
[](https://hub.docker.com/r/linuxserver/swag)
|
||||||
[](https://ci.linuxserver.io/job/Docker-Pipeline-Builders/job/docker-swag/job/master/)
|
[](https://ci.linuxserver.io/job/Docker-Pipeline-Builders/job/docker-swag/job/master/)
|
||||||
[](https://lsio-ci.ams3.digitaloceanspaces.com/linuxserver/swag/latest/index.html)
|
|
||||||
|
|
||||||
SWAG - Secure Web Application Gateway (formerly known as letsencrypt, no relation to Let's Encrypt™) sets up an Nginx webserver and reverse proxy with php support and a built-in certbot client that automates free SSL server certificate generation and renewal processes. It also contains fail2ban for intrusion prevention.
|
SWAG - Secure Web Application Gateway (formerly known as letsencrypt, no relation to Let's Encrypt™) sets up an Nginx webserver and reverse proxy with php support and a built-in certbot client that automates free SSL server certificate generation and renewal processes (Let's Encrypt and ZeroSSL). It also contains fail2ban for intrusion prevention.
|
||||||
|
|
||||||
[](https://linuxserver.io)
|
[](https://linuxserver.io)
|
||||||
|
|
||||||
## Supported Architectures
|
## Supported Architectures
|
||||||
|
|
||||||
Our images support multiple architectures such as `x86-64`, `arm64` and `armhf`. We utilise the docker manifest for multi-platform awareness. More information is available from docker [here](https://github.com/docker/distribution/blob/master/docs/spec/manifest-v2-2.md#manifest-list) and our announcement [here](https://blog.linuxserver.io/2019/02/21/the-lsio-pipeline-project/).
|
We utilise the docker manifest for multi-platform awareness. More information is available from docker [here](https://distribution.github.io/distribution/spec/manifest-v2-2/#manifest-list) and our announcement [here](https://blog.linuxserver.io/2019/02/21/the-lsio-pipeline-project/).
|
||||||
|
|
||||||
Simply pulling `linuxserver/swag` should retrieve the correct image for your arch, but you can also pull specific arch images via tags.
|
Simply pulling `lscr.io/linuxserver/swag:latest` should retrieve the correct image for your arch, but you can also pull specific arch images via tags.
|
||||||
|
|
||||||
The architectures supported by this image are:
|
The architectures supported by this image are:
|
||||||
|
|
||||||
| Architecture | Tag |
|
| Architecture | Available | Tag |
|
||||||
| :----: | --- |
|
| :----: | :----: | ---- |
|
||||||
| x86-64 | amd64-latest |
|
| x86-64 | ✅ | amd64-\<version tag\> |
|
||||||
| arm64 | arm64v8-latest |
|
| arm64 | ✅ | arm64v8-\<version tag\> |
|
||||||
| armhf | arm32v7-latest |
|
| armhf | ❌ | |
|
||||||
|
|
||||||
|
## Application Setup
|
||||||
|
|
||||||
|
### Validation and initial setup
|
||||||
|
|
||||||
|
* Before running this container, make sure that the url and subdomains are properly forwarded to this container's host, and that port 443 (and/or 80) is not being used by another service on the host (NAS gui, another webserver, etc.).
|
||||||
|
* If you need a dynamic dns provider, you can use the free provider duckdns.org where the `URL` will be `yoursubdomain.duckdns.org` and the `SUBDOMAINS` can be `www,ftp,cloud` with http validation, or `wildcard` with dns validation. You can use our [duckdns image](https://hub.docker.com/r/linuxserver/duckdns/) to update your IP on duckdns.org.
|
||||||
|
* For `http` validation, port 80 on the internet side of the router should be forwarded to this container's port 80
|
||||||
|
* For `dns` validation, make sure to enter your credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`
|
||||||
|
* Cloudflare provides free accounts for managing dns and is very easy to use with this image. Make sure that it is set up for "dns only" instead of "dns + proxy"
|
||||||
|
* Google dns plugin is meant to be used with "Google Cloud DNS", a paid enterprise product, and not for "Google Domains DNS"
|
||||||
|
* DuckDNS only supports two types of DNS validated certificates (not both at the same time):
|
||||||
|
1. Certs that only cover your main subdomain (ie. `yoursubdomain.duckdns.org`, leave the `SUBDOMAINS` variable empty)
|
||||||
|
2. Certs that cover sub-subdomains of your main subdomain (ie. `*.yoursubdomain.duckdns.org`, set the `SUBDOMAINS` variable to `wildcard`)
|
||||||
|
* `--cap-add=NET_ADMIN` is required for fail2ban to modify iptables
|
||||||
|
* After setup, navigate to `https://example.com` to access the default homepage (http access through port 80 is disabled by default, you can enable it by editing the default site config at `/config/nginx/site-confs/default.conf`).
|
||||||
|
* Certs are checked nightly and if expiration is within 30 days, renewal is attempted. If your cert is about to expire in less than 30 days, check the logs under `/config/log/letsencrypt` to see why the renewals have been failing. It is recommended to input your e-mail in docker parameters so you receive expiration notices from Let's Encrypt in those circumstances.
|
||||||
|
|
||||||
|
### Certbot Plugins
|
||||||
|
|
||||||
|
SWAG includes many Certbot plugins out of the box, but not all plugins can be included.
|
||||||
|
If you need a plugin that is not included, the quickest way to have the plugin available is to use our [Universal Package Install Docker Mod](https://github.com/linuxserver/docker-mods/tree/universal-package-install).
|
||||||
|
|
||||||
|
Set the following environment variables on your container:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
DOCKER_MODS=linuxserver/mods:universal-package-install
|
||||||
|
INSTALL_PIP_PACKAGES=certbot-dns-<plugin>
|
||||||
|
```
|
||||||
|
|
||||||
|
Set the required credentials (usually found in the plugin documentation) in `/config/dns-conf/<plugin>.ini`.
|
||||||
|
It is recommended to attempt obtaining a certificate with `STAGING=true` first to make sure the plugin is working as expected.
|
||||||
|
|
||||||
|
### Security and password protection
|
||||||
|
|
||||||
|
* The container detects changes to url and subdomains, revokes existing certs and generates new ones during start.
|
||||||
|
* Per [RFC7919](https://datatracker.ietf.org/doc/html/rfc7919), the container is shipping [ffdhe4096](https://ssl-config.mozilla.org/ffdhe4096.txt) as the `dhparams.pem`.
|
||||||
|
* If you'd like to password protect your sites, you can use htpasswd. Run the following command on your host to generate the htpasswd file `docker exec -it swag htpasswd -c /config/nginx/.htpasswd <username>`
|
||||||
|
* You can add multiple user:pass to `.htpasswd`. For the first user, use the above command, for others, use the above command without the `-c` flag, as it will force deletion of the existing `.htpasswd` and creation of a new one
|
||||||
|
* You can also use ldap auth for security and access control. A sample, user configurable ldap.conf is provided, and it requires the separate image [linuxserver/ldap-auth](https://hub.docker.com/r/linuxserver/ldap-auth/) to communicate with an ldap server.
|
||||||
|
|
||||||
|
### Site config and reverse proxy
|
||||||
|
|
||||||
|
* The default site config resides at `/config/nginx/site-confs/default.conf`. Feel free to modify this file, and you can add other conf files to this directory. However, if you delete the `default` file, a new default will be created on container start.
|
||||||
|
* Preset reverse proxy config files are added for popular apps. See the `README.md` file under `/config/nginx/proxy_confs` for instructions on how to enable them. The preset confs reside in and get imported from [this repo](https://github.com/linuxserver/reverse-proxy-confs).
|
||||||
|
* If you wish to hide your site from search engine crawlers, you may find it useful to add this configuration line to your site config, within the server block, above the line where ssl.conf is included
|
||||||
|
`add_header X-Robots-Tag "noindex, nofollow, nosnippet, noarchive";`
|
||||||
|
This will *ask* Google et al not to index and list your site. Be careful with this, as you will eventually be de-listed if you leave this line in on a site you wish to be present on search engines
|
||||||
|
* If you wish to redirect http to https, you must expose port 80
|
||||||
|
|
||||||
|
### Using certs in other containers
|
||||||
|
|
||||||
|
* This container includes auto-generated pfx and private-fullchain-bundle pem certs that are needed by other apps like Emby and Znc.
|
||||||
|
* To use these certs in other containers, do either of the following:
|
||||||
|
1. *(Easier)* Mount the container's config folder in other containers (ie. `-v /path-to-swag-config:/swag-ssl`) and in the other containers, use the cert location `/swag-ssl/keys/letsencrypt/`
|
||||||
|
2. *(More secure)* Mount the SWAG folder `etc` that resides under `/config` in other containers (ie. `-v /path-to-swag-config/etc:/swag-ssl`) and in the other containers, use the cert location `/swag-ssl/letsencrypt/live/<your.domain.url>/` (This is more secure because the first method shares the entire SWAG config folder with other containers, including the www files, whereas the second method only shares the ssl certs)
|
||||||
|
* These certs include:
|
||||||
|
1. `cert.pem`, `chain.pem`, `fullchain.pem` and `privkey.pem`, which are generated by Certbot and used by nginx and various other apps
|
||||||
|
2. `privkey.pfx`, a format supported by Microsoft and commonly used by dotnet apps such as Emby Server (no password)
|
||||||
|
3. `priv-fullchain-bundle.pem`, a pem cert that bundles the private key and the fullchain, used by apps like ZNC
|
||||||
|
|
||||||
|
### Using fail2ban
|
||||||
|
|
||||||
|
* This container includes fail2ban set up with 5 jails by default:
|
||||||
|
1. nginx-http-auth
|
||||||
|
2. nginx-badbots
|
||||||
|
3. nginx-botsearch
|
||||||
|
4. nginx-deny
|
||||||
|
5. nginx-unauthorized
|
||||||
|
* To enable or disable other jails, modify the file `/config/fail2ban/jail.local`
|
||||||
|
* To modify filters and actions, instead of editing the `.conf` files, create `.local` files with the same name and edit those because .conf files get overwritten when the actions and filters are updated. `.local` files will append whatever's in the `.conf` files (ie. `nginx-http-auth.conf` --> `nginx-http-auth.local`)
|
||||||
|
* You can check which jails are active via `docker exec -it swag fail2ban-client status`
|
||||||
|
* You can check the status of a specific jail via `docker exec -it swag fail2ban-client status <jail name>`
|
||||||
|
* You can unban an IP via `docker exec -it swag fail2ban-client set <jail name> unbanip <IP>`
|
||||||
|
* A list of commands for fail2ban-client can be found [here](https://manpages.ubuntu.com/manpages/noble/man1/fail2ban-client.1.html)
|
||||||
|
|
||||||
|
### Updating configs
|
||||||
|
|
||||||
|
* This container creates a number of configs for nginx, proxy samples, etc.
|
||||||
|
* Config updates are noted in the changelog but not automatically applied to your files.
|
||||||
|
* If you have modified a file with noted changes in the changelog:
|
||||||
|
1. Keep your existing configs as is (not broken, don't fix)
|
||||||
|
2. Review our repository commits and apply the new changes yourself
|
||||||
|
3. Delete the modified config file with listed updates, restart the container, reapply your changes
|
||||||
|
* If you have NOT modified a file with noted changes in the changelog:
|
||||||
|
1. Delete the config file with listed updates, restart the container
|
||||||
|
* Proxy sample updates are not listed in the changelog. See the changes here: [https://github.com/linuxserver/reverse-proxy-confs/commits/master](https://github.com/linuxserver/reverse-proxy-confs/commits/master)
|
||||||
|
* Proxy sample files WILL be updated, however your renamed (enabled) proxy files will not.
|
||||||
|
* You can check the new sample and adjust your active config as needed.
|
||||||
|
|
||||||
|
### Migration from the old `linuxserver/letsencrypt` image
|
||||||
|
|
||||||
|
Please follow the instructions [on this blog post](https://www.linuxserver.io/blog/2020-08-21-introducing-swag#migrate).
|
||||||
|
|
||||||
|
## Read-Only Operation
|
||||||
|
|
||||||
|
This image can be run with a read-only container filesystem. For details please [read the docs](https://docs.linuxserver.io/misc/read-only/).
|
||||||
|
|
||||||
|
### Caveats
|
||||||
|
|
||||||
|
* `/tmp` must be mounted to tmpfs
|
||||||
|
* fail2ban will not be available
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Here are some example snippets to help you get started creating a container.
|
To help you get started creating a container from this image you can either use docker-compose or the docker cli.
|
||||||
|
|
||||||
### docker
|
>[!NOTE]
|
||||||
|
>Unless a parameter is flaged as 'optional', it is *mandatory* and a value must be provided.
|
||||||
|
|
||||||
```
|
### docker-compose (recommended, [click here for more info](https://docs.linuxserver.io/general/docker-compose))
|
||||||
docker create \
|
|
||||||
--name=swag \
|
|
||||||
--cap-add=NET_ADMIN \
|
|
||||||
-e PUID=1000 \
|
|
||||||
-e PGID=1000 \
|
|
||||||
-e TZ=Europe/London \
|
|
||||||
-e URL=yourdomain.url \
|
|
||||||
-e SUBDOMAINS=www, \
|
|
||||||
-e VALIDATION=http \
|
|
||||||
-e DNSPLUGIN=cloudflare `#optional` \
|
|
||||||
-e PROPAGATION= `#optional` \
|
|
||||||
-e DUCKDNSTOKEN= `#optional` \
|
|
||||||
-e EMAIL= `#optional` \
|
|
||||||
-e ONLY_SUBDOMAINS=false `#optional` \
|
|
||||||
-e EXTRA_DOMAINS= `#optional` \
|
|
||||||
-e STAGING=false `#optional` \
|
|
||||||
-p 443:443 \
|
|
||||||
-p 80:80 `#optional` \
|
|
||||||
-v /path/to/appdata/config:/config \
|
|
||||||
--restart unless-stopped \
|
|
||||||
linuxserver/swag
|
|
||||||
```
|
|
||||||
|
|
||||||
|
```yaml
|
||||||
### docker-compose
|
|
||||||
|
|
||||||
Compatible with docker-compose v2 schemas.
|
|
||||||
|
|
||||||
```
|
|
||||||
---
|
---
|
||||||
version: "2.1"
|
|
||||||
services:
|
services:
|
||||||
swag:
|
swag:
|
||||||
image: linuxserver/swag
|
image: lscr.io/linuxserver/swag:latest
|
||||||
container_name: swag
|
container_name: swag
|
||||||
cap_add:
|
cap_add:
|
||||||
- NET_ADMIN
|
- NET_ADMIN
|
||||||
environment:
|
environment:
|
||||||
- PUID=1000
|
- PUID=1000
|
||||||
- PGID=1000
|
- PGID=1000
|
||||||
- TZ=Europe/London
|
- TZ=Etc/UTC
|
||||||
- URL=yourdomain.url
|
- URL=example.com
|
||||||
- SUBDOMAINS=www,
|
|
||||||
- VALIDATION=http
|
- VALIDATION=http
|
||||||
|
- SUBDOMAINS=www, #optional
|
||||||
|
- CERTPROVIDER= #optional
|
||||||
- DNSPLUGIN=cloudflare #optional
|
- DNSPLUGIN=cloudflare #optional
|
||||||
- PROPAGATION= #optional
|
- PROPAGATION= #optional
|
||||||
- DUCKDNSTOKEN= #optional
|
|
||||||
- EMAIL= #optional
|
- EMAIL= #optional
|
||||||
- ONLY_SUBDOMAINS=false #optional
|
- ONLY_SUBDOMAINS=false #optional
|
||||||
- EXTRA_DOMAINS= #optional
|
- EXTRA_DOMAINS= #optional
|
||||||
- STAGING=false #optional
|
- STAGING=false #optional
|
||||||
|
- DISABLE_F2B= #optional
|
||||||
|
- SWAG_AUTORELOAD= #optional
|
||||||
|
- SWAG_AUTORELOAD_WATCHLIST= #optional
|
||||||
volumes:
|
volumes:
|
||||||
- /path/to/appdata/config:/config
|
- /path/to/swag/config:/config
|
||||||
ports:
|
ports:
|
||||||
- 443:443
|
- 443:443
|
||||||
- 80:80 #optional
|
- 80:80 #optional
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### docker cli ([click here for more info](https://docs.docker.com/engine/reference/commandline/cli/))
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker run -d \
|
||||||
|
--name=swag \
|
||||||
|
--cap-add=NET_ADMIN \
|
||||||
|
-e PUID=1000 \
|
||||||
|
-e PGID=1000 \
|
||||||
|
-e TZ=Etc/UTC \
|
||||||
|
-e URL=example.com \
|
||||||
|
-e VALIDATION=http \
|
||||||
|
-e SUBDOMAINS=www, `#optional` \
|
||||||
|
-e CERTPROVIDER= `#optional` \
|
||||||
|
-e DNSPLUGIN=cloudflare `#optional` \
|
||||||
|
-e PROPAGATION= `#optional` \
|
||||||
|
-e EMAIL= `#optional` \
|
||||||
|
-e ONLY_SUBDOMAINS=false `#optional` \
|
||||||
|
-e EXTRA_DOMAINS= `#optional` \
|
||||||
|
-e STAGING=false `#optional` \
|
||||||
|
-e DISABLE_F2B= `#optional` \
|
||||||
|
-e SWAG_AUTORELOAD= `#optional` \
|
||||||
|
-e SWAG_AUTORELOAD_WATCHLIST= `#optional` \
|
||||||
|
-p 443:443 \
|
||||||
|
-p 80:80 `#optional` \
|
||||||
|
-v /path/to/swag/config:/config \
|
||||||
|
--restart unless-stopped \
|
||||||
|
lscr.io/linuxserver/swag:latest
|
||||||
|
```
|
||||||
|
|
||||||
## Parameters
|
## Parameters
|
||||||
|
|
||||||
Container images are configured using parameters passed at runtime (such as those above). These parameters are separated by a colon and indicate `<external>:<internal>` respectively. For example, `-p 8080:80` would expose port `80` from inside the container to be accessible from the host's IP on port `8080` outside the container.
|
Containers are configured using parameters passed at runtime (such as those above). These parameters are separated by a colon and indicate `<external>:<internal>` respectively. For example, `-p 8080:80` would expose port `80` from inside the container to be accessible from the host's IP on port `8080` outside the container.
|
||||||
|
|
||||||
| Parameter | Function |
|
| Parameter | Function |
|
||||||
| :----: | --- |
|
| :----: | --- |
|
||||||
| `-p 443` | Https port |
|
| `-p 443:443` | HTTPS port |
|
||||||
| `-p 80` | Http port (required for http validation and http -> https redirect) |
|
| `-p 80` | HTTP port (required for HTTP validation and HTTP -> HTTPS redirect) |
|
||||||
| `-e PUID=1000` | for UserID - see below for explanation |
|
| `-e PUID=1000` | for UserID - see below for explanation |
|
||||||
| `-e PGID=1000` | for GroupID - see below for explanation |
|
| `-e PGID=1000` | for GroupID - see below for explanation |
|
||||||
| `-e TZ=Europe/London` | Specify a timezone to use EG Europe/London. |
|
| `-e TZ=Etc/UTC` | specify a timezone to use, see this [list](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones#List). |
|
||||||
| `-e URL=yourdomain.url` | Top url you have control over (`customdomain.com` if you own it, or `customsubdomain.ddnsprovider.com` if dynamic dns). |
|
| `-e URL=example.com` | Top url you have control over (e.g. `example.com` if you own it, or `customsubdomain.example.com` if dynamic dns). |
|
||||||
| `-e SUBDOMAINS=www,` | Subdomains you'd like the cert to cover (comma separated, no spaces) ie. `www,ftp,cloud`. For a wildcard cert, set this _exactly_ to `wildcard` (wildcard cert is available via `dns` and `duckdns` validation only) |
|
| `-e VALIDATION=http` | Certbot validation method to use, options are `http` or `dns` (`dns` method also requires `DNSPLUGIN` variable set). |
|
||||||
| `-e VALIDATION=http` | Certbot validation method to use, options are `http`, `dns` or `duckdns` (`dns` method also requires `DNSPLUGIN` variable set) (`duckdns` method requires `DUCKDNSTOKEN` variable set, and the `SUBDOMAINS` variable must be either empty or set to `wildcard`). |
|
| `-e SUBDOMAINS=www,` | Subdomains you'd like the cert to cover (comma separated, no spaces) ie. `www,ftp,cloud`. For a wildcard cert, set this *exactly* to `wildcard` (wildcard cert is available via `dns` validation only) |
|
||||||
| `-e DNSPLUGIN=cloudflare` | Required if `VALIDATION` is set to `dns`. Options are `aliyun`, `cloudflare`, `cloudxns`, `cpanel`, `digitalocean`, `dnsimple`, `dnsmadeeasy`, `domeneshop`, `gandi`, `google`, `inwx`, `linode`, `luadns`, `nsone`, `ovh`, `rfc2136`, `route53` and `transip`. Also need to enter the credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`. |
|
| `-e CERTPROVIDER=` | Optionally define the cert provider. Set to `zerossl` for ZeroSSL certs (requires existing [ZeroSSL account](https://app.zerossl.com/signup) and the e-mail address entered in `EMAIL` env var). Otherwise defaults to Let's Encrypt. |
|
||||||
|
| `-e DNSPLUGIN=cloudflare` | Required if `VALIDATION` is set to `dns`. Options are `acmedns`, `aliyun`, `azure`, `bunny`, `cloudflare`, `cpanel`, `desec`, `digitalocean`, `directadmin`, `dnsimple`, `dnsmadeeasy`, `dnspod`, `do`, `domeneshop`, `dreamhost`, `duckdns`, `dynu`, `freedns`, `gandi`, `gehirn`, `glesys`, `godaddy`, `google`, `he`, `hetzner`, `infomaniak`, `inwx`, `ionos`, `linode`, `loopia`, `luadns`, `namecheap`, `netcup`, `njalla`, `nsone`, `ovh`, `porkbun`, `rfc2136`, `route53`, `sakuracloud`, `standalone`, `transip`, and `vultr`. Also need to enter the credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`. |
|
||||||
| `-e PROPAGATION=` | Optionally override (in seconds) the default propagation time for the dns plugins. |
|
| `-e PROPAGATION=` | Optionally override (in seconds) the default propagation time for the dns plugins. |
|
||||||
| `-e DUCKDNSTOKEN=` | Required if `VALIDATION` is set to `duckdns`. Retrieve your token from https://www.duckdns.org |
|
| `-e EMAIL=` | Optional e-mail address used for cert expiration notifications (Required for ZeroSSL). |
|
||||||
| `-e EMAIL=` | Optional e-mail address used for cert expiration notifications. |
|
|
||||||
| `-e ONLY_SUBDOMAINS=false` | If you wish to get certs only for certain subdomains, but not the main domain (main domain may be hosted on another machine and cannot be validated), set this to `true` |
|
| `-e ONLY_SUBDOMAINS=false` | If you wish to get certs only for certain subdomains, but not the main domain (main domain may be hosted on another machine and cannot be validated), set this to `true` |
|
||||||
| `-e EXTRA_DOMAINS=` | Additional fully qualified domain names (comma separated, no spaces) ie. `extradomain.com,subdomain.anotherdomain.org,*.anotherdomain.org` |
|
| `-e EXTRA_DOMAINS=` | Additional fully qualified domain names (comma separated, no spaces) ie. `example.net,subdomain.example.net,*.example.org` |
|
||||||
| `-e STAGING=false` | Set to `true` to retrieve certs in staging mode. Rate limits will be much higher, but the resulting cert will not pass the browser's security test. Only to be used for testing purposes. |
|
| `-e STAGING=false` | Set to `true` to retrieve certs in staging mode. Rate limits will be much higher, but the resulting cert will not pass the browser's security test. Only to be used for testing purposes. |
|
||||||
| `-v /config` | All the config files including the webroot reside here. |
|
| `-e DISABLE_F2B=` | Set to `true` to disable the Fail2ban service in the container, if you're already running it elsewhere or using a different IPS. |
|
||||||
|
| `-e SWAG_AUTORELOAD=` | Set to `true` to enable automatic reloading of confs on change without stopping/restarting nginx. Your filesystem must support inotify. This functionality was previously offered [via mod](https://github.com/linuxserver/docker-mods/tree/swag-auto-reload). |
|
||||||
|
| `-e SWAG_AUTORELOAD_WATCHLIST=` | A [pipe](https://en.wikipedia.org/wiki/Vertical_bar)-separated list of additional folders for auto reload to watch in addition to `/config/nginx` |
|
||||||
|
| `-v /config` | Persistent config files |
|
||||||
|
| `--read-only=true` | Run container with a read-only filesystem. Please [read the docs](https://docs.linuxserver.io/misc/read-only/). |
|
||||||
|
| `--cap-add=NET_ADMIN` | Required for fail2Ban to be able to modify iptables rules. |
|
||||||
|
|
||||||
|
### Portainer notice
|
||||||
|
|
||||||
|
This image utilises `cap_add` or `sysctl` to work properly. This is not implemented properly in some versions of Portainer, thus this image may not work if deployed through Portainer.
|
||||||
|
|
||||||
## Environment variables from files (Docker secrets)
|
## Environment variables from files (Docker secrets)
|
||||||
|
|
||||||
@ -149,11 +267,11 @@ You can set any environment variable from a file by using a special prepend `FIL
|
|||||||
|
|
||||||
As an example:
|
As an example:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
-e FILE__PASSWORD=/run/secrets/mysecretpassword
|
-e FILE__MYVAR=/run/secrets/mysecretvariable
|
||||||
```
|
```
|
||||||
|
|
||||||
Will set the environment variable `PASSWORD` based on the contents of the `/run/secrets/mysecretpassword` file.
|
Will set the environment variable `MYVAR` based on the contents of the `/run/secrets/mysecretvariable` file.
|
||||||
|
|
||||||
## Umask for running applications
|
## Umask for running applications
|
||||||
|
|
||||||
@ -162,159 +280,236 @@ Keep in mind umask is not chmod it subtracts from permissions based on it's valu
|
|||||||
|
|
||||||
## User / Group Identifiers
|
## User / Group Identifiers
|
||||||
|
|
||||||
When using volumes (`-v` flags) permissions issues can arise between the host OS and the container, we avoid this issue by allowing you to specify the user `PUID` and group `PGID`.
|
When using volumes (`-v` flags), permissions issues can arise between the host OS and the container, we avoid this issue by allowing you to specify the user `PUID` and group `PGID`.
|
||||||
|
|
||||||
Ensure any volume directories on the host are owned by the same user you specify and any permissions issues will vanish like magic.
|
Ensure any volume directories on the host are owned by the same user you specify and any permissions issues will vanish like magic.
|
||||||
|
|
||||||
In this instance `PUID=1000` and `PGID=1000`, to find yours use `id user` as below:
|
In this instance `PUID=1000` and `PGID=1000`, to find yours use `id your_user` as below:
|
||||||
|
|
||||||
```
|
```bash
|
||||||
$ id username
|
id your_user
|
||||||
uid=1000(dockeruser) gid=1000(dockergroup) groups=1000(dockergroup)
|
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Example output:
|
||||||
|
|
||||||
|
```text
|
||||||
## Application Setup
|
uid=1000(your_user) gid=1000(your_user) groups=1000(your_user)
|
||||||
|
```
|
||||||
> ### Migrating from the old `linuxserver/letsencrypt` image
|
|
||||||
> * If using docker cli:
|
|
||||||
> * Stop and remove existing container via `docker stop letsencrypt` and `docker rm letsencrypt`
|
|
||||||
> * Create new container using the sample on this page (container name: `swag`, image name: `linuxserver/swag`)
|
|
||||||
> * If using docker compose:
|
|
||||||
> * Edit the compose yaml to change the image to `linuxserver/swag` and change the service and container names to `swag`
|
|
||||||
> * Issue `docker-compose up -d --remove-orphans`
|
|
||||||
> * If you don't want to or can't use the option `--remove-orphans`, then you can first do `docker-compose down`, then edit the compose yaml as above, and then issue `docker-compose up -d`
|
|
||||||
|
|
||||||
> Make sure to also update any references to this container by name. For instance, Nextcloud's `config.php` references this container in its `trusted_proxies` directive, which would have to be updated to `swag`.
|
|
||||||
### Validation and initial setup
|
|
||||||
* Before running this container, make sure that the url and subdomains are properly forwarded to this container's host, and that port 443 (and/or 80) is not being used by another service on the host (NAS gui, another webserver, etc.).
|
|
||||||
* For `http` validation, port 80 on the internet side of the router should be forwarded to this container's port 80
|
|
||||||
* For `dns` validation, make sure to enter your credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`
|
|
||||||
* Cloudflare provides free accounts for managing dns and is very easy to use with this image. Make sure that it is set up for "dns only" instead of "dns + proxy"
|
|
||||||
* Google dns plugin is meant to be used with "Google Cloud DNS", a paid enterprise product, and not for "Google Domains DNS"
|
|
||||||
* For `duckdns` validation, either leave the `SUBDOMAINS` variable empty or set it to `wildcard`, and set the `DUCKDNSTOKEN` variable with your duckdns token. Due to a limitation of duckdns, the resulting cert will only cover either main subdomain (ie. `yoursubdomain.duckdns.org`), or sub-subdomains (ie. `*.yoursubdomain.duckdns.org`), but will not both at the same time. You can use our [duckdns image](https://hub.docker.com/r/linuxserver/duckdns/) to update your IP on duckdns.org.
|
|
||||||
* `--cap-add=NET_ADMIN` is required for fail2ban to modify iptables
|
|
||||||
* If you need a dynamic dns provider, you can use the free provider duckdns.org where the `URL` will be `yoursubdomain.duckdns.org` and the `SUBDOMAINS` can be `www,ftp,cloud` with http validation, or `wildcard` with dns validation.
|
|
||||||
* After setup, navigate to `https://yourdomain.url` to access the default homepage (http access through port 80 is disabled by default, you can enable it by editing the default site config at `/config/nginx/site-confs/default`).
|
|
||||||
* Certs are checked nightly and if expiration is within 30 days, renewal is attempted. If your cert is about to expire in less than 30 days, check the logs under `/config/log/letsencrypt` to see why the renewals have been failing. It is recommended to input your e-mail in docker parameters so you receive expiration notices from Let's Encrypt in those circumstances.
|
|
||||||
### Security and password protection
|
|
||||||
* The container detects changes to url and subdomains, revokes existing certs and generates new ones during start.
|
|
||||||
* The container provides a pre-generated 4096-bit dhparams.pem (rotated weekly via [Jenkins job](https://ci.linuxserver.io/blue/organizations/jenkins/Xtras-Builders-Etc%2Fdhparams-uploader/activity)) for new instances, however you may generate your own by running `docker exec swag openssl dhparam -out /config/nginx/dhparams.pem 4096` WARNING: This takes a very long time
|
|
||||||
* If you'd like to password protect your sites, you can use htpasswd. Run the following command on your host to generate the htpasswd file `docker exec -it swag htpasswd -c /config/nginx/.htpasswd <username>`
|
|
||||||
* You can add multiple user:pass to `.htpasswd`. For the first user, use the above command, for others, use the above command without the `-c` flag, as it will force deletion of the existing `.htpasswd` and creation of a new one
|
|
||||||
* You can also use ldap auth for security and access control. A sample, user configurable ldap.conf is provided, and it requires the separate image [linuxserver/ldap-auth](https://hub.docker.com/r/linuxserver/ldap-auth/) to communicate with an ldap server.
|
|
||||||
### Site config and reverse proxy
|
|
||||||
* The default site config resides at `/config/nginx/site-confs/default`. Feel free to modify this file, and you can add other conf files to this directory. However, if you delete the `default` file, a new default will be created on container start.
|
|
||||||
* Preset reverse proxy config files are added for popular apps. See the `README.md` file under `/config/nginx/proxy_confs` for instructions on how to enable them. The preset confs reside in and get imported from [this repo](https://github.com/linuxserver/reverse-proxy-confs).
|
|
||||||
* If you wish to hide your site from search engine crawlers, you may find it useful to add this configuration line to your site config, within the server block, above the line where ssl.conf is included
|
|
||||||
`add_header X-Robots-Tag "noindex, nofollow, nosnippet, noarchive";`
|
|
||||||
This will *ask* Google et al not to index and list your site. Be careful with this, as you will eventually be de-listed if you leave this line in on a site you wish to be present on search engines
|
|
||||||
* If you wish to redirect http to https, you must expose port 80
|
|
||||||
### Using certs in other containers
|
|
||||||
* This container includes auto-generated pfx and private-fullchain-bundle pem certs that are needed by other apps like Emby and Znc.
|
|
||||||
* To use these certs in other containers, do either of the following:
|
|
||||||
1. *(Easier)* Mount the container's config folder in other containers (ie. `-v /path-to-le-config:/le-ssl`) and in the other containers, use the cert location `/le-ssl/keys/letsencrypt/`
|
|
||||||
2. *(More secure)* Mount the SWAG folder `etc` that resides under `/config` in other containers (ie. `-v /path-to-le-config/etc:/le-ssl`) and in the other containers, use the cert location `/le-ssl/letsencrypt/live/<your.domain.url>/` (This is more secure because the first method shares the entire SWAG config folder with other containers, including the www files, whereas the second method only shares the ssl certs)
|
|
||||||
* These certs include:
|
|
||||||
1. `cert.pem`, `chain.pem`, `fullchain.pem` and `privkey.pem`, which are generated by Let's Encrypt and used by nginx and various other apps
|
|
||||||
2. `privkey.pfx`, a format supported by Microsoft and commonly used by dotnet apps such as Emby Server (no password)
|
|
||||||
3. `priv-fullchain-bundle.pem`, a pem cert that bundles the private key and the fullchain, used by apps like ZNC
|
|
||||||
### Using fail2ban
|
|
||||||
* This container includes fail2ban set up with 3 jails by default:
|
|
||||||
1. nginx-http-auth
|
|
||||||
2. nginx-badbots
|
|
||||||
3. nginx-botsearch
|
|
||||||
* To enable or disable other jails, modify the file `/config/fail2ban/jail.local`
|
|
||||||
* To modify filters and actions, instead of editing the `.conf` files, create `.local` files with the same name and edit those because .conf files get overwritten when the actions and filters are updated. `.local` files will append whatever's in the `.conf` files (ie. `nginx-http-auth.conf` --> `nginx-http-auth.local`)
|
|
||||||
* You can check which jails are active via `docker exec -it swag fail2ban-client status`
|
|
||||||
* You can check the status of a specific jail via `docker exec -it swag fail2ban-client status <jail name>`
|
|
||||||
* You can unban an IP via `docker exec -it swag fail2ban-client set <jail name> unbanip <IP>`
|
|
||||||
* A list of commands can be found here: https://www.fail2ban.org/wiki/index.php/Commands
|
|
||||||
### Updating configs
|
|
||||||
* This container creates a number of configs for nginx, proxy samples, etc.
|
|
||||||
* Config updates are noted in the changelog but not automatically applied to your files.
|
|
||||||
* If you have modified a file with noted changes in the changelog:
|
|
||||||
1. Keep your existing configs as is (not broken, don't fix)
|
|
||||||
2. Review our repository commits and apply the new changes yourself
|
|
||||||
3. Delete the modified config file with listed updates, restart the container, reapply your changes
|
|
||||||
* If you have NOT modified a file with noted changes in the changelog:
|
|
||||||
1. Delete the config file with listed updates, restart the container, reapply your changes
|
|
||||||
* Proxy sample updates are not listed in the changelog. See the changes here: [https://github.com/linuxserver/reverse-proxy-confs/commits/master](https://github.com/linuxserver/reverse-proxy-confs/commits/master)
|
|
||||||
* Proxy sample files WILL be updated, however your renamed (enabled) proxy files will not.
|
|
||||||
* You can check the new sample and adjust your active config as needed.
|
|
||||||
|
|
||||||
|
|
||||||
## Docker Mods
|
## Docker Mods
|
||||||
[](https://mods.linuxserver.io/?mod=swag "view available mods for this container.")
|
|
||||||
|
|
||||||
We publish various [Docker Mods](https://github.com/linuxserver/docker-mods) to enable additional functionality within the containers. The list of Mods available for this image (if any) can be accessed via the dynamic badge above.
|
[](https://mods.linuxserver.io/?mod=swag "view available mods for this container.") [](https://mods.linuxserver.io/?mod=universal "view available universal mods.")
|
||||||
|
|
||||||
|
We publish various [Docker Mods](https://github.com/linuxserver/docker-mods) to enable additional functionality within the containers. The list of Mods available for this image (if any) as well as universal mods that can be applied to any one of our images can be accessed via the dynamic badges above.
|
||||||
|
|
||||||
## Support Info
|
## Support Info
|
||||||
|
|
||||||
* Shell access whilst the container is running: `docker exec -it swag /bin/bash`
|
* Shell access whilst the container is running:
|
||||||
* To monitor the logs of the container in realtime: `docker logs -f swag`
|
|
||||||
* container version number
|
```bash
|
||||||
* `docker inspect -f '{{ index .Config.Labels "build_version" }}' swag`
|
docker exec -it swag /bin/bash
|
||||||
* image version number
|
```
|
||||||
* `docker inspect -f '{{ index .Config.Labels "build_version" }}' linuxserver/swag`
|
|
||||||
|
* To monitor the logs of the container in realtime:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker logs -f swag
|
||||||
|
```
|
||||||
|
|
||||||
|
* Container version number:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker inspect -f '{{ index .Config.Labels "build_version" }}' swag
|
||||||
|
```
|
||||||
|
|
||||||
|
* Image version number:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker inspect -f '{{ index .Config.Labels "build_version" }}' lscr.io/linuxserver/swag:latest
|
||||||
|
```
|
||||||
|
|
||||||
## Updating Info
|
## Updating Info
|
||||||
|
|
||||||
Most of our images are static, versioned, and require an image update and container recreation to update the app inside. With some exceptions (ie. nextcloud, plex), we do not recommend or support updating apps inside the container. Please consult the [Application Setup](#application-setup) section above to see if it is recommended for the image.
|
Most of our images are static, versioned, and require an image update and container recreation to update the app inside. With some exceptions (noted in the relevant readme.md), we do not recommend or support updating apps inside the container. Please consult the [Application Setup](#application-setup) section above to see if it is recommended for the image.
|
||||||
|
|
||||||
Below are the instructions for updating containers:
|
Below are the instructions for updating containers:
|
||||||
|
|
||||||
### Via Docker Run/Create
|
|
||||||
* Update the image: `docker pull linuxserver/swag`
|
|
||||||
* Stop the running container: `docker stop swag`
|
|
||||||
* Delete the container: `docker rm swag`
|
|
||||||
* Recreate a new container with the same docker create parameters as instructed above (if mapped correctly to a host folder, your `/config` folder and settings will be preserved)
|
|
||||||
* Start the new container: `docker start swag`
|
|
||||||
* You can also remove the old dangling images: `docker image prune`
|
|
||||||
|
|
||||||
### Via Docker Compose
|
### Via Docker Compose
|
||||||
* Update all images: `docker-compose pull`
|
|
||||||
* or update a single image: `docker-compose pull swag`
|
|
||||||
* Let compose update all containers as necessary: `docker-compose up -d`
|
|
||||||
* or update a single container: `docker-compose up -d swag`
|
|
||||||
* You can also remove the old dangling images: `docker image prune`
|
|
||||||
|
|
||||||
### Via Watchtower auto-updater (especially useful if you don't remember the original parameters)
|
* Update images:
|
||||||
* Pull the latest image at its tag and replace it with the same env variables in one run:
|
* All images:
|
||||||
```
|
|
||||||
docker run --rm \
|
|
||||||
-v /var/run/docker.sock:/var/run/docker.sock \
|
|
||||||
containrrr/watchtower \
|
|
||||||
--run-once swag
|
|
||||||
```
|
|
||||||
|
|
||||||
**Note:** We do not endorse the use of Watchtower as a solution to automated updates of existing Docker containers. In fact we generally discourage automated updates. However, this is a useful tool for one-time manual updates of containers where you have forgotten the original parameters. In the long term, we highly recommend using Docker Compose.
|
```bash
|
||||||
|
docker-compose pull
|
||||||
|
```
|
||||||
|
|
||||||
* You can also remove the old dangling images: `docker image prune`
|
* Single image:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker-compose pull swag
|
||||||
|
```
|
||||||
|
|
||||||
|
* Update containers:
|
||||||
|
* All containers:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker-compose up -d
|
||||||
|
```
|
||||||
|
|
||||||
|
* Single container:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker-compose up -d swag
|
||||||
|
```
|
||||||
|
|
||||||
|
* You can also remove the old dangling images:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker image prune
|
||||||
|
```
|
||||||
|
|
||||||
|
### Via Docker Run
|
||||||
|
|
||||||
|
* Update the image:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker pull lscr.io/linuxserver/swag:latest
|
||||||
|
```
|
||||||
|
|
||||||
|
* Stop the running container:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker stop swag
|
||||||
|
```
|
||||||
|
|
||||||
|
* Delete the container:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker rm swag
|
||||||
|
```
|
||||||
|
|
||||||
|
* Recreate a new container with the same docker run parameters as instructed above (if mapped correctly to a host folder, your `/config` folder and settings will be preserved)
|
||||||
|
* You can also remove the old dangling images:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker image prune
|
||||||
|
```
|
||||||
|
|
||||||
|
### Image Update Notifications - Diun (Docker Image Update Notifier)
|
||||||
|
|
||||||
|
>[!TIP]
|
||||||
|
>We recommend [Diun](https://crazymax.dev/diun/) for update notifications. Other tools that automatically update containers unattended are not recommended or supported.
|
||||||
|
|
||||||
## Building locally
|
## Building locally
|
||||||
|
|
||||||
If you want to make local modifications to these images for development purposes or just to customize the logic:
|
If you want to make local modifications to these images for development purposes or just to customize the logic:
|
||||||
```
|
|
||||||
|
```bash
|
||||||
git clone https://github.com/linuxserver/docker-swag.git
|
git clone https://github.com/linuxserver/docker-swag.git
|
||||||
cd docker-swag
|
cd docker-swag
|
||||||
docker build \
|
docker build \
|
||||||
--no-cache \
|
--no-cache \
|
||||||
--pull \
|
--pull \
|
||||||
-t linuxserver/swag:latest .
|
-t lscr.io/linuxserver/swag:latest .
|
||||||
```
|
```
|
||||||
|
|
||||||
The ARM variants can be built on x86_64 hardware using `multiarch/qemu-user-static`
|
The ARM variants can be built on x86_64 hardware and vice versa using `lscr.io/linuxserver/qemu-static`
|
||||||
```
|
|
||||||
docker run --rm --privileged multiarch/qemu-user-static:register --reset
|
```bash
|
||||||
|
docker run --rm --privileged lscr.io/linuxserver/qemu-static --reset
|
||||||
```
|
```
|
||||||
|
|
||||||
Once registered you can define the dockerfile to use with `-f Dockerfile.aarch64`.
|
Once registered you can define the dockerfile to use with `-f Dockerfile.aarch64`.
|
||||||
|
|
||||||
## Versions
|
## Versions
|
||||||
|
|
||||||
|
* **19.01.25:** - Add [Auto Reload](https://github.com/linuxserver/docker-mods/tree/swag-auto-reload) functionality to SWAG.
|
||||||
|
* **17.12.24:** - Rebase to Alpine 3.21.
|
||||||
|
* **21.10.24:** - Fix naming issue with Dynu plugin. If you are using Dynu, please make sure your credentials are set in /config/dns-conf/dynu.ini and your DNSPLUGIN variable is set to dynu (not dynudns).
|
||||||
|
* **30.08.24:** - Fix zerossl cert revocation.
|
||||||
|
* **24.07.14:** - Rebase to Alpine 3.20. Remove deprecated Google Domains certbot plugin. Existing users should update their nginx confs to avoid http2 deprecation warnings.
|
||||||
|
* **01.07.24:** - Fall back to iptables-legacy if iptables doesn't work.
|
||||||
|
* **23.03.24:** - Fix perms on the generated `priv-fullchain-bundle.pem`.
|
||||||
|
* **14.03.24:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) authelia-location.conf, authelia-server.conf - Update Authelia conf samples with support for 4.38.
|
||||||
|
* **11.03.24:** - Restore support for DynuDNS using `certbot-dns-dynudns`.
|
||||||
|
* **06.03.24:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) site-confs/default.conf - Cleanup default site conf.
|
||||||
|
* **04.03.24:** - Remove `stream.conf` inside the container to allow users to include their own block in `nginx.conf`.
|
||||||
|
* **23.01.24:** - Rebase to Alpine 3.19 with php 8.3, add root periodic crontabs for logrotate.
|
||||||
|
* **01.01.24:** - Add GleSYS DNS plugin.
|
||||||
|
* **11.12.23:** - Deprecate certbot-dns-dynu to resolve dependency conflicts with other plugins.
|
||||||
|
* **30.11.23:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) site-confs/default.conf - Fix index.php being downloaded on 404.
|
||||||
|
* **23.11.23:** - Run certbot as root to allow fix http validation.
|
||||||
|
* **01.10.23:** - Fix "unrecognized arguments" issue in DirectAdmin DNS plugin.
|
||||||
|
* **28.08.23:** - Add Namecheap DNS plugin.
|
||||||
|
* **12.08.23:** - Add FreeDNS plugin. Detect certbot DNS authenticators using CLI.
|
||||||
|
* **07.08.23:** - Add Bunny DNS Configuration.
|
||||||
|
* **27.07.23:** - Added support for dreamhost validation.
|
||||||
|
* **25.05.23:** - Rebase to Alpine 3.18, deprecate armhf.
|
||||||
|
* **27.04.23:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) authelia-location.conf, authelia-server.conf, authentik-location.conf, authentik-server.conf - Simplify auth configs and fix Set-Cookie header bug.
|
||||||
|
* **13.04.23:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf, authelia-location.conf, authentik-location.conf, and site-confs/default.conf - Move ssl.conf include to default.conf. Remove Authorization headers in authelia. Sort proxy_set_header in authelia and authentik.
|
||||||
|
* **25.03.23:** - Fix renewal post hook.
|
||||||
|
* **10.03.23:** - Cleanup unused csr and keys folders. See [certbot 2.3.0 release notes](https://github.com/certbot/certbot/releases/tag/v2.3.0).
|
||||||
|
* **09.03.23:** - Add Google Domains DNS support, `google-domains`.
|
||||||
|
* **02.03.23:** - Set permissions on crontabs during init.
|
||||||
|
* **09.02.23:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) proxy.conf, authelia-location.conf and authelia-server.conf - Add Authentik configs, update Authelia configs.
|
||||||
|
* **06.02.23:** - Add porkbun support back in.
|
||||||
|
* **21.01.23:** - Unpin certbot version (allow certbot 2.x). !!BREAKING CHANGE!! We are temporarily removing the certbot porkbun plugin until a new version is released that is compatible with certbot 2.x.
|
||||||
|
* **20.01.23:** - Rebase to alpine 3.17 with php8.1.
|
||||||
|
* **16.01.23:** - Remove nchan module because it keeps causing crashes.
|
||||||
|
* **08.12.22:** - Revamp certbot init.
|
||||||
|
* **03.12.22:** - Remove defunct cloudxns plugin.
|
||||||
|
* **22.11.22:** - Pin acme to the same version as certbot.
|
||||||
|
* **22.11.22:** - Pin certbot to 1.32.0 until plugin compatibility improves.
|
||||||
|
* **05.11.22:** - Update acmedns plugin handling.
|
||||||
|
* **06.10.22:** - Switch to certbot-dns-duckdns. Update cpanel and gandi dns plugin handling. Minor adjustments to init logic.
|
||||||
|
* **05.10.22:** - Use certbot file hooks instead of command line hooks
|
||||||
|
* **04.10.22:** - Add godaddy and porkbun dns plugins.
|
||||||
|
* **03.10.22:** - Add default_server back to default site conf's https listen.
|
||||||
|
* **22.09.22:** - Added support for DO DNS validation.
|
||||||
|
* **22.09.22:** - Added certbot-dns-acmedns for DNS01 validation.
|
||||||
|
* **20.08.22:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf - Rebasing to alpine 3.15 with php8. Restructure nginx configs ([see changes announcement](https://info.linuxserver.io/issues/2022-08-20-nginx-base)).
|
||||||
|
* **10.08.22:** - Added support for Dynu DNS validation.
|
||||||
|
* **18.05.22:** - Added support for Azure DNS validation.
|
||||||
|
* **09.04.22:** - Added certbot-dns-loopia for DNS01 validation.
|
||||||
|
* **05.04.22:** - Added support for standalone DNS validation.
|
||||||
|
* **28.03.22:** - created a logfile for fail2ban nginx-unauthorized in /etc/cont-init.d/50-config
|
||||||
|
* **09.01.22:** - Added a fail2ban jail for nginx unauthorized
|
||||||
|
* **21.12.21:** - Fixed issue with iptables not working as expected
|
||||||
|
* **30.11.21:** - Move maxmind to a [new mod](https://github.com/linuxserver/docker-mods/tree/swag-maxmind)
|
||||||
|
* **22.11.21:** - Added support for Infomaniak DNS for certificate generation.
|
||||||
|
* **20.11.21:** - Added support for dnspod validation.
|
||||||
|
* **15.11.21:** - Added support for deSEC DNS for wildcard certificate generation.
|
||||||
|
* **26.10.21:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) proxy.conf - Mitigate <https://httpoxy.org/> vulnerabilities. Ref: <https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx#Defeating-the-Attack-using-NGINX-and-NGINX-Plus>
|
||||||
|
* **23.10.21:** - Fix Hurricane Electric (HE) DNS validation.
|
||||||
|
* **12.10.21:** - Fix deprecated LE root cert check to fix failures when using `STAGING=true`, and failures in revoking.
|
||||||
|
* **06.10.21:** - Added support for Hurricane Electric (HE) DNS validation. Added lxml build deps.
|
||||||
|
* **01.10.21:** - Check if the cert uses the old LE root cert, revoke and regenerate if necessary. [Here's more info](https://twitter.com/letsencrypt/status/1443621997288767491) on LE root cert expiration
|
||||||
|
* **19.09.21:** - Add an optional header to opt out of Google FLoC in `ssl.conf`.
|
||||||
|
* **17.09.21:** - Mark `SUBDOMAINS` var as optional.
|
||||||
|
* **01.08.21:** - Add support for ionos dns validation.
|
||||||
|
* **15.07.21:** - Fix libmaxminddb issue due to upstream change.
|
||||||
|
* **07.07.21:** - Rebase to alpine 3.14.
|
||||||
|
* **24.06.21:** - Update default nginx conf folder.
|
||||||
|
* **28.05.21:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) authelia-server.conf - Use `resolver.conf` and patch for `CVE-2021-32637`.
|
||||||
|
* **20.05.21:** - Modify resolver.conf generation to detect and ignore ipv6.
|
||||||
|
* **14.05.21:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf, ssl.conf, proxy.conf, and the default site-conf - Rework nginx.conf to be inline with alpine upstream and relocate lines from other files. Use linuxserver.io wheel index for pip packages. Switch to using [ffdhe4096](https://ssl-config.mozilla.org/ffdhe4096.txt) for `dhparams.pem` per [RFC7919](https://datatracker.ietf.org/doc/html/rfc7919). Added `worker_processes.conf`, which sets the number of nginx workers, and `resolver.conf`, which sets the dns resolver. Both conf files are auto-generated only on first start and can be user modified later.
|
||||||
|
* **21.04.21:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) authelia-server.conf and authelia-location.conf - Add remote name/email headers and pass http method.
|
||||||
|
* **12.04.21:** - Add php7-gmp and php7-pecl-mailparse.
|
||||||
|
* **12.04.21:** - Add support for vultr dns validation.
|
||||||
|
* **14.03.21:** - Add support for directadmin dns validation.
|
||||||
|
* **12.02.21:** - Clean up rust/cargo cache, which ballooned the image size in the last couple of builds.
|
||||||
|
* **10.02.21:** - Fix aliyun, domeneshop, inwx and transip dns confs for existing users.
|
||||||
|
* **09.02.21:** - Rebasing to alpine 3.13. Add nginx mods brotli and dav-ext. Remove nginx mods lua and lua-upstream (due to regression over the last couple of years).
|
||||||
|
* **26.01.21:** - Add support for hetzner dns validation.
|
||||||
|
* **20.01.21:** - Add check for ZeroSSL EAB retrieval.
|
||||||
|
* **08.01.21:** - Add support for getting certs from [ZeroSSL](https://zerossl.com/) via optional `CERTPROVIDER` env var. Update aliyun, domeneshop, inwx and transip dns plugins with the new plugin names. Hide `donoteditthisfile.conf` because users were editing it despite its name. Suppress harmless error when no proxy confs are enabled.
|
||||||
|
* **03.01.21:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) /config/nginx/site-confs/default.conf - Add helper pages to aid troubleshooting
|
||||||
|
* **10.12.20:** - Add support for njalla dns validation
|
||||||
|
* **09.12.20:** - Check for template/conf updates and notify in the log. Add support for gehirn and sakuracloud dns validation.
|
||||||
|
* **01.11.20:** - Add support for netcup dns validation
|
||||||
|
* **29.10.20:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) ssl.conf - Add frame-ancestors to Content-Security-Policy.
|
||||||
|
* **04.10.20:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf, proxy.conf, and ssl.conf - Minor cleanups and reordering.
|
||||||
|
* **20.09.20:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf - Added geoip2 configs. Added MAXMINDDB_LICENSE_KEY variable to readme.
|
||||||
* **08.09.20:** - Add php7-xsl.
|
* **08.09.20:** - Add php7-xsl.
|
||||||
* **01.09.20:** - Update nginx.conf and proxy.conf (and various proxy samples) to better handle websockets.
|
* **01.09.20:** - [Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf, proxy.conf, and various proxy samples - Global websockets across all configs.
|
||||||
* **03.08.20:** - Initial release.
|
* **03.08.20:** - Initial release.
|
||||||
|
@ -17,12 +17,12 @@ repo_vars:
|
|||||||
- PR_DOCKERHUB_IMAGE = 'lspipepr/swag'
|
- PR_DOCKERHUB_IMAGE = 'lspipepr/swag'
|
||||||
- DIST_IMAGE = 'alpine'
|
- DIST_IMAGE = 'alpine'
|
||||||
- MULTIARCH='true'
|
- MULTIARCH='true'
|
||||||
- CI='true'
|
- CI='false'
|
||||||
- CI_WEB='false'
|
- CI_WEB='false'
|
||||||
- CI_PORT='80'
|
- CI_PORT='80'
|
||||||
- CI_SSL='false'
|
- CI_SSL='false'
|
||||||
- CI_DELAY='30'
|
- CI_DELAY='30'
|
||||||
- CI_DOCKERENV='TEST_RUN=1'
|
- CI_DOCKERENV=''
|
||||||
- CI_AUTH=''
|
- CI_AUTH=''
|
||||||
- CI_WEBPATH=''
|
- CI_WEBPATH=''
|
||||||
sponsor_links:
|
sponsor_links:
|
||||||
|
@ -1,220 +1,367 @@
|
|||||||
alpine-baselayout-3.2.0-r7
|
NAME VERSION TYPE
|
||||||
alpine-keys-2.2-r0
|
Simple Launcher 1.1.0.14 dotnet (+5 duplicates)
|
||||||
apache2-utils-2.4.46-r0
|
acl-libs 2.3.2-r1 apk
|
||||||
apk-tools-2.10.5-r1
|
acme 3.3.0 python
|
||||||
apr-1.7.0-r0
|
alpine-baselayout 3.6.8-r1 apk
|
||||||
apr-util-1.6.1-r6
|
alpine-baselayout-data 3.6.8-r1 apk
|
||||||
argon2-libs-20190702-r1
|
alpine-keys 2.5-r0 apk
|
||||||
bash-5.0.17-r0
|
alpine-release 3.21.3-r0 apk
|
||||||
brotli-libs-1.0.7-r5
|
aom-libs 3.11.0-r0 apk
|
||||||
busybox-1.31.1-r19
|
apache2-utils 2.4.62-r0 apk
|
||||||
c-client-2007f-r11
|
apk-tools 2.14.6-r3 apk
|
||||||
ca-certificates-20191127-r4
|
apr 1.7.5-r0 apk
|
||||||
ca-certificates-bundle-20191127-r4
|
apr-util 1.6.3-r1 apk
|
||||||
coreutils-8.32-r0
|
argon2-libs 20190702-r5 apk
|
||||||
curl-7.69.1-r0
|
attrs 25.1.0 python
|
||||||
db-5.3.28-r1
|
autocommand 2.2.2 python
|
||||||
expat-2.2.9-r1
|
azure-common 1.1.28 python
|
||||||
fail2ban-0.11.1-r3
|
azure-core 1.32.0 python
|
||||||
freetype-2.10.2-r0
|
azure-identity 1.20.0 python
|
||||||
gdbm-1.13-r1
|
azure-mgmt-core 1.5.0 python
|
||||||
git-2.26.2-r0
|
azure-mgmt-dns 8.2.0 python
|
||||||
git-perl-2.26.2-r0
|
backports-tarfile 1.2.0 python
|
||||||
glib-2.64.5-r0
|
bash 5.2.37-r0 apk
|
||||||
gmp-6.2.0-r0
|
beautifulsoup4 4.13.3 python
|
||||||
gnupg-2.2.23-r0
|
boto3 1.37.10 python
|
||||||
gnutls-3.6.15-r0
|
botocore 1.37.10 python
|
||||||
icu-libs-67.1-r0
|
brotli-libs 1.1.0-r2 apk
|
||||||
ip6tables-1.8.4-r2
|
bs4 0.0.2 python
|
||||||
iptables-1.8.4-r2
|
busybox 1.37.0-r12 apk
|
||||||
libacl-2.2.53-r0
|
busybox-binsh 1.37.0-r12 apk
|
||||||
libassuan-2.5.3-r0
|
c-ares 1.34.3-r0 apk
|
||||||
libattr-2.4.48-r0
|
c-client 2007f-r15 apk
|
||||||
libblkid-2.35.2-r0
|
ca-certificates 20241121-r1 apk
|
||||||
libbsd-0.10.0-r0
|
ca-certificates-bundle 20241121-r1 apk
|
||||||
libbz2-1.0.8-r1
|
cachetools 5.5.2 python
|
||||||
libc-utils-0.7.2-r3
|
catatonit 0.2.0-r0 apk
|
||||||
libcap-2.27-r0
|
certbot 3.3.0 python
|
||||||
libcrypto1.1-1.1.1g-r0
|
certbot-dns-acmedns 0.1.0 python
|
||||||
libcurl-7.69.1-r0
|
certbot-dns-aliyun 2.0.0 python
|
||||||
libedit-20191231.3.1-r0
|
certbot-dns-azure 2.6.1 python
|
||||||
libevent-2.1.11-r1
|
certbot-dns-bunny 3.0.0 python
|
||||||
libffi-3.3-r2
|
certbot-dns-cloudflare 3.3.0 python
|
||||||
libgcc-9.3.0-r2
|
certbot-dns-cpanel 0.4.0 python
|
||||||
libgcrypt-1.8.5-r0
|
certbot-dns-desec 1.2.1 python
|
||||||
libgd-2.3.0-r1
|
certbot-dns-digitalocean 3.3.0 python
|
||||||
libgpg-error-1.37-r0
|
certbot-dns-directadmin 1.0.14 python
|
||||||
libice-1.0.10-r0
|
certbot-dns-dnsimple 3.3.0 python
|
||||||
libidn-1.35-r0
|
certbot-dns-dnsmadeeasy 3.3.0 python
|
||||||
libintl-0.20.2-r0
|
certbot-dns-dnspod 0.1.0 python
|
||||||
libjpeg-turbo-2.0.5-r0
|
certbot-dns-do 0.31.0 python
|
||||||
libksba-1.4.0-r0
|
certbot-dns-domeneshop 0.2.9 python
|
||||||
libldap-2.4.50-r0
|
certbot-dns-dreamhost 1.0 python
|
||||||
libmagic-5.38-r0
|
certbot-dns-duckdns 1.5 python
|
||||||
libmaxminddb-1.4.2-r1
|
certbot-dns-dynudns 0.0.6 python
|
||||||
libmcrypt-2.5.8-r8
|
certbot-dns-freedns 0.2.0 python
|
||||||
libmemcached-libs-1.0.18-r4
|
certbot-dns-gehirn 3.3.0 python
|
||||||
libmnl-1.0.4-r0
|
certbot-dns-glesys 2.1.0 python
|
||||||
libmount-2.35.2-r0
|
certbot-dns-godaddy 2.8.0 python
|
||||||
libnftnl-libs-1.1.6-r0
|
certbot-dns-google 3.3.0 python
|
||||||
libpng-1.6.37-r1
|
certbot-dns-he 1.0.0 python
|
||||||
libpq-12.4-r0
|
certbot-dns-hetzner 2.0.1 python
|
||||||
libproc-3.3.16-r0
|
certbot-dns-infomaniak 0.2.3 python
|
||||||
libressl3.1-libcrypto-3.1.2-r0
|
certbot-dns-inwx 3.0.2 python
|
||||||
libressl3.1-libssl-3.1.2-r0
|
certbot-dns-ionos 2024.11.9 python
|
||||||
libsasl-2.1.27-r6
|
certbot-dns-linode 3.3.0 python
|
||||||
libseccomp-2.4.3-r0
|
certbot-dns-loopia 1.0.1 python
|
||||||
libsecret-0.20.3-r0
|
certbot-dns-luadns 3.3.0 python
|
||||||
libsm-1.2.3-r0
|
certbot-dns-namecheap 1.0.0 python
|
||||||
libsodium-1.0.18-r0
|
certbot-dns-netcup 1.4.4 python
|
||||||
libssl1.1-1.1.1g-r0
|
certbot-dns-njalla 2.0.2 python
|
||||||
libstdc++-9.3.0-r2
|
certbot-dns-nsone 3.3.0 python
|
||||||
libtasn1-4.16.0-r1
|
certbot-dns-ovh 3.3.0 python
|
||||||
libtls-standalone-2.9.1-r1
|
certbot-dns-porkbun 0.9.1 python
|
||||||
libunistring-0.9.10-r0
|
certbot-dns-rfc2136 3.3.0 python
|
||||||
libuuid-2.35.2-r0
|
certbot-dns-route53 3.3.0 python
|
||||||
libwebp-1.1.0-r0
|
certbot-dns-sakuracloud 3.3.0 python
|
||||||
libx11-1.6.12-r0
|
certbot-dns-standalone 1.2.1 python
|
||||||
libxau-1.0.9-r0
|
certbot-dns-transip 0.5.2 python
|
||||||
libxcb-1.14-r1
|
certbot-dns-vultr 1.1.0 python
|
||||||
libxdmcp-1.1.3-r0
|
certbot-plugin-gandi 1.5.0 python
|
||||||
libxext-1.3.4-r0
|
certifi 2025.1.31 python
|
||||||
libxml2-2.9.10-r4
|
cffi 1.17.1 python
|
||||||
libxpm-3.5.13-r0
|
charset-normalizer 3.4.1 python
|
||||||
libxslt-1.1.34-r0
|
cloudflare 2.19.4 python
|
||||||
libxt-1.2.0-r0
|
composer 2.8.6 binary
|
||||||
libzip-1.6.1-r1
|
configargparse 1.7 python
|
||||||
linux-pam-1.3.1-r4
|
configobj 5.0.9 python
|
||||||
logrotate-3.16.0-r0
|
coreutils 9.5-r2 apk
|
||||||
luajit-5.1.20190925-r0
|
coreutils-env 9.5-r2 apk
|
||||||
memcached-1.6.6-r0
|
coreutils-fmt 9.5-r2 apk
|
||||||
musl-1.1.24-r9
|
coreutils-sha512sum 9.5-r2 apk
|
||||||
musl-utils-1.1.24-r9
|
cryptography 44.0.2 python
|
||||||
nano-4.9.3-r0
|
curl 8.12.1-r0 apk
|
||||||
ncurses-libs-6.2_p20200523-r0
|
distro 1.9.0 python
|
||||||
ncurses-terminfo-base-6.2_p20200523-r0
|
dns-lexicon 3.20.1 python
|
||||||
nettle-3.5.1-r1
|
dnslib 0.9.26 python
|
||||||
nghttp2-libs-1.41.0-r0
|
dnspython 2.7.0 python
|
||||||
nginx-1.18.0-r0
|
domeneshop 0.4.4 python
|
||||||
nginx-mod-devel-kit-1.18.0-r0
|
fail2ban 1.1.0 python
|
||||||
nginx-mod-http-echo-1.18.0-r0
|
fail2ban 1.1.0-r2 apk
|
||||||
nginx-mod-http-fancyindex-1.18.0-r0
|
fail2ban-pyc 1.1.0-r2 apk
|
||||||
nginx-mod-http-geoip2-1.18.0-r0
|
filelock 3.17.0 python
|
||||||
nginx-mod-http-headers-more-1.18.0-r0
|
findutils 4.10.0-r0 apk
|
||||||
nginx-mod-http-image-filter-1.18.0-r0
|
fontconfig 2.15.0-r1 apk
|
||||||
nginx-mod-http-lua-1.18.0-r0
|
freetype 2.13.3-r0 apk
|
||||||
nginx-mod-http-lua-upstream-1.18.0-r0
|
future 1.0.0 python
|
||||||
nginx-mod-http-nchan-1.18.0-r0
|
gdbm 1.24-r0 apk
|
||||||
nginx-mod-http-perl-1.18.0-r0
|
git 2.47.2-r0 apk
|
||||||
nginx-mod-http-redis2-1.18.0-r0
|
git-init-template 2.47.2-r0 apk
|
||||||
nginx-mod-http-set-misc-1.18.0-r0
|
git-perl 2.47.2-r0 apk
|
||||||
nginx-mod-http-upload-progress-1.18.0-r0
|
gmp 6.3.0-r2 apk
|
||||||
nginx-mod-http-xslt-filter-1.18.0-r0
|
gnupg 2.4.7-r0 apk
|
||||||
nginx-mod-mail-1.18.0-r0
|
gnupg-dirmngr 2.4.7-r0 apk
|
||||||
nginx-mod-rtmp-1.18.0-r0
|
gnupg-gpgconf 2.4.7-r0 apk
|
||||||
nginx-mod-stream-1.18.0-r0
|
gnupg-keyboxd 2.4.7-r0 apk
|
||||||
nginx-mod-stream-geoip2-1.18.0-r0
|
gnupg-utils 2.4.7-r0 apk
|
||||||
nginx-vim-1.18.0-r0
|
gnupg-wks-client 2.4.7-r0 apk
|
||||||
npth-1.6-r0
|
gnutls 3.8.8-r0 apk
|
||||||
openssl-1.1.1g-r0
|
google-api-core 2.24.2 python
|
||||||
p11-kit-0.23.20-r5
|
google-api-python-client 2.163.0 python
|
||||||
pcre-8.44-r0
|
google-auth 2.38.0 python
|
||||||
pcre2-10.35-r0
|
google-auth-httplib2 0.2.0 python
|
||||||
perl-5.30.3-r0
|
googleapis-common-protos 1.69.1 python
|
||||||
perl-error-0.17029-r0
|
gpg 2.4.7-r0 apk
|
||||||
perl-git-2.26.2-r0
|
gpg-agent 2.4.7-r0 apk
|
||||||
php7-7.3.22-r0
|
gpg-wks-server 2.4.7-r0 apk
|
||||||
php7-bcmath-7.3.22-r0
|
gpgsm 2.4.7-r0 apk
|
||||||
php7-bz2-7.3.22-r0
|
gpgv 2.4.7-r0 apk
|
||||||
php7-common-7.3.22-r0
|
httplib2 0.22.0 python
|
||||||
php7-ctype-7.3.22-r0
|
icu-data-en 74.2-r0 apk
|
||||||
php7-curl-7.3.22-r0
|
icu-libs 74.2-r0 apk
|
||||||
php7-dom-7.3.22-r0
|
idna 3.10 python
|
||||||
php7-exif-7.3.22-r0
|
importlib-metadata 8.0.0 python
|
||||||
php7-fileinfo-7.3.22-r0
|
inflect 7.3.1 python
|
||||||
php7-fpm-7.3.22-r0
|
inotify-tools 4.23.9.0-r0 apk
|
||||||
php7-ftp-7.3.22-r0
|
inotify-tools-libs 4.23.9.0-r0 apk
|
||||||
php7-gd-7.3.22-r0
|
inwx-domrobot 3.2.0 python
|
||||||
php7-iconv-7.3.22-r0
|
iptables 1.8.11-r1 apk
|
||||||
php7-imap-7.3.22-r0
|
iptables-legacy 1.8.11-r1 apk
|
||||||
php7-intl-7.3.22-r0
|
isodate 0.7.2 python
|
||||||
php7-json-7.3.22-r0
|
jaraco-collections 5.1.0 python
|
||||||
php7-ldap-7.3.22-r0
|
jaraco-context 5.3.0 python
|
||||||
php7-mbstring-7.3.22-r0
|
jaraco-functools 4.0.1 python
|
||||||
php7-mysqli-7.3.22-r0
|
jaraco-text 3.12.1 python
|
||||||
php7-mysqlnd-7.3.22-r0
|
jinja2 3.1.6 python
|
||||||
php7-opcache-7.3.22-r0
|
jmespath 1.0.1 python
|
||||||
php7-openssl-7.3.22-r0
|
josepy 1.15.0 python
|
||||||
php7-pdo-7.3.22-r0
|
jq 1.7.1-r0 apk
|
||||||
php7-pdo_mysql-7.3.22-r0
|
jsonlines 4.0.0 python
|
||||||
php7-pdo_odbc-7.3.22-r0
|
jsonpickle 4.0.2 python
|
||||||
php7-pdo_pgsql-7.3.22-r0
|
libassuan 2.5.7-r0 apk
|
||||||
php7-pdo_sqlite-7.3.22-r0
|
libattr 2.5.2-r2 apk
|
||||||
php7-pear-7.3.22-r0
|
libavif 1.0.4-r0 apk
|
||||||
php7-pecl-apcu-5.1.18-r0
|
libbsd 0.12.2-r0 apk
|
||||||
php7-pecl-igbinary-3.1.4-r0
|
libbz2 1.0.8-r6 apk
|
||||||
php7-pecl-mcrypt-1.0.3-r0
|
libcrypto3 3.3.3-r0 apk
|
||||||
php7-pecl-memcached-3.1.5-r0
|
libcurl 8.12.1-r0 apk
|
||||||
php7-pecl-redis-5.2.2-r1
|
libdav1d 1.5.0-r0 apk
|
||||||
php7-pgsql-7.3.22-r0
|
libedit 20240808.3.1-r0 apk
|
||||||
php7-phar-7.3.22-r0
|
libevent 2.1.12-r7 apk
|
||||||
php7-posix-7.3.22-r0
|
libexpat 2.6.4-r0 apk
|
||||||
php7-session-7.3.22-r0
|
libffi 3.4.7-r0 apk
|
||||||
php7-simplexml-7.3.22-r0
|
libgcc 14.2.0-r4 apk
|
||||||
php7-soap-7.3.22-r0
|
libgcrypt 1.10.3-r1 apk
|
||||||
php7-sockets-7.3.22-r0
|
libgd 2.3.3-r9 apk
|
||||||
php7-sodium-7.3.22-r0
|
libgpg-error 1.51-r0 apk
|
||||||
php7-sqlite3-7.3.22-r0
|
libice 1.1.1-r6 apk
|
||||||
php7-tokenizer-7.3.22-r0
|
libidn2 2.3.7-r0 apk
|
||||||
php7-xml-7.3.22-r0
|
libintl 0.22.5-r0 apk
|
||||||
php7-xmlreader-7.3.22-r0
|
libip4tc 1.8.11-r1 apk
|
||||||
php7-xmlrpc-7.3.22-r0
|
libip6tc 1.8.11-r1 apk
|
||||||
php7-xmlwriter-7.3.22-r0
|
libjpeg-turbo 3.0.4-r0 apk
|
||||||
php7-xsl-7.3.22-r0
|
libksba 1.6.7-r0 apk
|
||||||
php7-zip-7.3.22-r0
|
libldap 2.6.8-r0 apk
|
||||||
pinentry-1.1.0-r2
|
libmaxminddb-libs 1.9.1-r0 apk
|
||||||
popt-1.16-r7
|
libmcrypt 2.5.8-r10 apk
|
||||||
procps-3.3.16-r0
|
libmd 1.1.0-r0 apk
|
||||||
py3-appdirs-1.4.4-r1
|
libmemcached-libs 1.1.4-r1 apk
|
||||||
py3-asn1crypto-1.3.0-r0
|
libmnl 1.0.5-r2 apk
|
||||||
py3-cachecontrol-0.12.6-r0
|
libncursesw 6.5_p20241006-r3 apk
|
||||||
py3-certifi-2020.4.5.1-r0
|
libnftnl 1.2.8-r0 apk
|
||||||
py3-cffi-1.14.0-r2
|
libpanelw 6.5_p20241006-r3 apk
|
||||||
py3-chardet-3.0.4-r4
|
libpng 1.6.44-r0 apk
|
||||||
py3-colorama-0.4.3-r0
|
libpq 17.4-r0 apk
|
||||||
py3-contextlib2-0.6.0-r0
|
libproc2 4.0.4-r2 apk
|
||||||
py3-cparser-2.20-r0
|
libpsl 0.21.5-r3 apk
|
||||||
py3-cryptography-2.9.2-r0
|
libsasl 2.1.28-r8 apk
|
||||||
py3-distlib-0.3.0-r0
|
libseccomp 2.5.5-r1 apk
|
||||||
py3-distro-1.5.0-r1
|
libsharpyuv 1.4.0-r0 apk
|
||||||
py3-future-0.18.2-r1
|
libsm 1.2.4-r4 apk
|
||||||
py3-html5lib-1.0.1-r4
|
libsodium 1.0.20-r0 apk
|
||||||
py3-idna-2.9-r0
|
libssl3 3.3.3-r0 apk
|
||||||
py3-lockfile-0.12.2-r3
|
libstdc++ 14.2.0-r4 apk
|
||||||
py3-msgpack-1.0.0-r0
|
libtasn1 4.20.0-r0 apk
|
||||||
py3-ordered-set-4.0.1-r0
|
libunistring 1.2-r0 apk
|
||||||
py3-packaging-20.4-r0
|
libuuid 2.40.4-r0 apk
|
||||||
py3-parsing-2.4.7-r0
|
libwebp 1.4.0-r0 apk
|
||||||
py3-pep517-0.8.2-r0
|
libx11 1.8.10-r0 apk
|
||||||
py3-pip-20.1.1-r0
|
libxau 1.0.11-r4 apk
|
||||||
py3-progress-1.5-r0
|
libxcb 1.16.1-r0 apk
|
||||||
py3-pytoml-0.1.21-r0
|
libxdmcp 1.1.5-r1 apk
|
||||||
py3-requests-2.23.0-r0
|
libxext 1.3.6-r2 apk
|
||||||
py3-retrying-1.3.3-r0
|
libxml2 2.13.4-r5 apk
|
||||||
py3-setuptools-47.0.0-r0
|
libxpm 3.5.17-r0 apk
|
||||||
py3-six-1.15.0-r0
|
libxslt 1.1.42-r1 apk
|
||||||
py3-toml-0.10.1-r0
|
libxt 1.3.1-r0 apk
|
||||||
py3-urllib3-1.25.9-r0
|
libxtables 1.8.11-r1 apk
|
||||||
py3-webencodings-0.5.1-r3
|
libzip 1.11.2-r0 apk
|
||||||
python3-3.8.5-r0
|
linux-pam 1.6.1-r1 apk
|
||||||
readline-8.0.4-r0
|
logrotate 3.21.0-r1 apk
|
||||||
scanelf-1.2.6-r0
|
loopialib 0.2.0 python
|
||||||
shadow-4.8.1-r0
|
lxml 5.3.1 python
|
||||||
sqlite-libs-3.32.1-r0
|
lz4-libs 1.10.0-r0 apk
|
||||||
ssl_client-1.31.1-r19
|
markupsafe 3.0.2 python
|
||||||
tzdata-2020a-r0
|
memcached 1.6.32-r0 apk
|
||||||
unixodbc-2.3.7-r2
|
mock 5.2.0 python
|
||||||
whois-5.5.6-r0
|
more-itertools 10.3.0 python
|
||||||
xz-5.2.5-r0
|
mpdecimal 4.0.0-r0 apk
|
||||||
xz-libs-5.2.5-r0
|
msal 1.31.1 python
|
||||||
zlib-1.2.11-r3
|
msal-extensions 1.2.0 python
|
||||||
|
musl 1.2.5-r9 apk
|
||||||
|
musl-utils 1.2.5-r9 apk
|
||||||
|
my-test-package 1.0 python
|
||||||
|
nano 8.2-r0 apk
|
||||||
|
ncurses-terminfo-base 6.5_p20241006-r3 apk
|
||||||
|
netcat-openbsd 1.226.1.1-r0 apk
|
||||||
|
nettle 3.10-r1 apk
|
||||||
|
nghttp2-libs 1.64.0-r0 apk
|
||||||
|
nginx 1.26.2-r4 apk
|
||||||
|
nginx-mod-devel-kit 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-brotli 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-dav-ext 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-echo 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-fancyindex 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-geoip2 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-headers-more 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-image-filter 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-perl 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-redis2 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-set-misc 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-upload-progress 1.26.2-r4 apk
|
||||||
|
nginx-mod-http-xslt-filter 1.26.2-r4 apk
|
||||||
|
nginx-mod-mail 1.26.2-r4 apk
|
||||||
|
nginx-mod-rtmp 1.26.2-r4 apk
|
||||||
|
nginx-mod-stream 1.26.2-r4 apk
|
||||||
|
nginx-mod-stream-geoip2 1.26.2-r4 apk
|
||||||
|
nginx-vim 1.26.2-r4 apk
|
||||||
|
npth 1.6-r4 apk
|
||||||
|
oniguruma 6.9.9-r0 apk
|
||||||
|
openssl 3.3.3-r0 apk
|
||||||
|
p11-kit 0.25.5-r2 apk
|
||||||
|
packaging 24.2 python
|
||||||
|
parsedatetime 2.6 python
|
||||||
|
pcre 8.45-r3 apk
|
||||||
|
pcre2 10.43-r0 apk
|
||||||
|
perl 5.40.1-r0 apk
|
||||||
|
perl-error 0.17029-r2 apk
|
||||||
|
perl-git 2.47.2-r0 apk
|
||||||
|
php83 8.3.17-r0 apk
|
||||||
|
php83-bcmath 8.3.17-r0 apk
|
||||||
|
php83-bz2 8.3.17-r0 apk
|
||||||
|
php83-common 8.3.17-r0 apk
|
||||||
|
php83-ctype 8.3.17-r0 apk
|
||||||
|
php83-curl 8.3.17-r0 apk
|
||||||
|
php83-dom 8.3.17-r0 apk
|
||||||
|
php83-exif 8.3.17-r0 apk
|
||||||
|
php83-fileinfo 8.3.17-r0 apk
|
||||||
|
php83-fpm 8.3.17-r0 apk
|
||||||
|
php83-ftp 8.3.17-r0 apk
|
||||||
|
php83-gd 8.3.17-r0 apk
|
||||||
|
php83-gmp 8.3.17-r0 apk
|
||||||
|
php83-iconv 8.3.17-r0 apk
|
||||||
|
php83-imap 8.3.17-r0 apk
|
||||||
|
php83-intl 8.3.17-r0 apk
|
||||||
|
php83-ldap 8.3.17-r0 apk
|
||||||
|
php83-mbstring 8.3.17-r0 apk
|
||||||
|
php83-mysqli 8.3.17-r0 apk
|
||||||
|
php83-mysqlnd 8.3.17-r0 apk
|
||||||
|
php83-opcache 8.3.17-r0 apk
|
||||||
|
php83-openssl 8.3.17-r0 apk
|
||||||
|
php83-pdo 8.3.17-r0 apk
|
||||||
|
php83-pdo_mysql 8.3.17-r0 apk
|
||||||
|
php83-pdo_odbc 8.3.17-r0 apk
|
||||||
|
php83-pdo_pgsql 8.3.17-r0 apk
|
||||||
|
php83-pdo_sqlite 8.3.17-r0 apk
|
||||||
|
php83-pear 8.3.17-r0 apk
|
||||||
|
php83-pecl-apcu 5.1.24-r0 apk
|
||||||
|
php83-pecl-igbinary 3.2.16-r0 apk
|
||||||
|
php83-pecl-mcrypt 1.0.7-r0 apk
|
||||||
|
php83-pecl-memcached 3.3.0-r0 apk
|
||||||
|
php83-pecl-msgpack 3.0.0-r0 apk
|
||||||
|
php83-pecl-redis 6.1.0-r0 apk
|
||||||
|
php83-pgsql 8.3.17-r0 apk
|
||||||
|
php83-phar 8.3.17-r0 apk
|
||||||
|
php83-posix 8.3.17-r0 apk
|
||||||
|
php83-session 8.3.17-r0 apk
|
||||||
|
php83-simplexml 8.3.17-r0 apk
|
||||||
|
php83-soap 8.3.17-r0 apk
|
||||||
|
php83-sockets 8.3.17-r0 apk
|
||||||
|
php83-sodium 8.3.17-r0 apk
|
||||||
|
php83-sqlite3 8.3.17-r0 apk
|
||||||
|
php83-tokenizer 8.3.17-r0 apk
|
||||||
|
php83-xml 8.3.17-r0 apk
|
||||||
|
php83-xmlreader 8.3.17-r0 apk
|
||||||
|
php83-xmlwriter 8.3.17-r0 apk
|
||||||
|
php83-xsl 8.3.17-r0 apk
|
||||||
|
php83-zip 8.3.17-r0 apk
|
||||||
|
pinentry 1.3.1-r0 apk
|
||||||
|
pip 25.0.1 python
|
||||||
|
pkb-client 2.0.0 python
|
||||||
|
platformdirs 4.2.2 python
|
||||||
|
popt 1.19-r4 apk
|
||||||
|
portalocker 2.10.1 python
|
||||||
|
procps-ng 4.0.4-r2 apk
|
||||||
|
proto-plus 1.26.1 python
|
||||||
|
protobuf 5.29.3 python
|
||||||
|
pyacmedns 0.4 python
|
||||||
|
pyasn1 0.6.1 python
|
||||||
|
pyasn1-modules 0.4.1 python
|
||||||
|
pyc 3.12.9-r0 apk
|
||||||
|
pycparser 2.22 python
|
||||||
|
pyjwt 2.10.1 python
|
||||||
|
pynamecheap 0.0.3 python
|
||||||
|
pyopenssl 25.0.0 python
|
||||||
|
pyotp 2.9.0 python
|
||||||
|
pyparsing 3.2.1 python
|
||||||
|
pyrfc3339 2.0.1 python
|
||||||
|
python-dateutil 2.9.0.post0 python
|
||||||
|
python-digitalocean 1.17.0 python
|
||||||
|
python-transip 0.6.0 python
|
||||||
|
python3 3.12.9-r0 apk
|
||||||
|
python3-pyc 3.12.9-r0 apk
|
||||||
|
python3-pycache-pyc0 3.12.9-r0 apk
|
||||||
|
pytz 2025.1 python
|
||||||
|
pyyaml 6.0.2 python
|
||||||
|
readline 8.2.13-r0 apk
|
||||||
|
requests 2.32.3 python
|
||||||
|
requests-file 2.1.0 python
|
||||||
|
requests-mock 1.12.1 python
|
||||||
|
rsa 4.9 python
|
||||||
|
s3transfer 0.11.4 python
|
||||||
|
scanelf 1.3.8-r1 apk
|
||||||
|
setuptools 76.0.0 python
|
||||||
|
shadow 4.16.0-r1 apk
|
||||||
|
six 1.17.0 python
|
||||||
|
skalibs-libs 2.14.3.0-r0 apk
|
||||||
|
soupsieve 2.6 python
|
||||||
|
sqlite-libs 3.48.0-r0 apk
|
||||||
|
ssl_client 1.37.0-r12 apk
|
||||||
|
tiff 4.7.0-r0 apk
|
||||||
|
tldextract 5.1.3 python
|
||||||
|
tomli 2.0.1 python
|
||||||
|
typeguard 4.3.0 python
|
||||||
|
typing-extensions 4.12.2 python (+1 duplicate)
|
||||||
|
tzdata 2025a-r0 apk
|
||||||
|
unixodbc 2.3.12-r0 apk
|
||||||
|
uritemplate 4.1.1 python
|
||||||
|
urllib3 2.3.0 python
|
||||||
|
utmps-libs 0.1.2.3-r2 apk
|
||||||
|
wheel 0.43.0 python
|
||||||
|
wheel 0.45.1 python
|
||||||
|
whois 5.5.23-r0 apk
|
||||||
|
xz-libs 5.6.3-r0 apk
|
||||||
|
zipp 3.19.2 python
|
||||||
|
zlib 1.3.1-r2 apk
|
||||||
|
zope-interface 7.2 python
|
||||||
|
zstd-libs 1.5.6-r2 apk
|
||||||
|
298
readme-vars.yml
Executable file → Normal file
298
readme-vars.yml
Executable file → Normal file
@ -4,133 +4,128 @@
|
|||||||
project_name: swag
|
project_name: swag
|
||||||
project_url: "https://linuxserver.io"
|
project_url: "https://linuxserver.io"
|
||||||
project_logo: "https://github.com/linuxserver/docker-templates/raw/master/linuxserver.io/img/swag.gif"
|
project_logo: "https://github.com/linuxserver/docker-templates/raw/master/linuxserver.io/img/swag.gif"
|
||||||
project_blurb: "SWAG - Secure Web Application Gateway (formerly known as letsencrypt, no relation to Let's Encrypt™) sets up an Nginx webserver and reverse proxy with php support and a built-in certbot client that automates free SSL server certificate generation and renewal processes. It also contains fail2ban for intrusion prevention."
|
project_blurb: "SWAG - Secure Web Application Gateway (formerly known as letsencrypt, no relation to Let's Encrypt™) sets up an Nginx webserver and reverse proxy with php support and a built-in certbot client that automates free SSL server certificate generation and renewal processes (Let's Encrypt and ZeroSSL). It also contains fail2ban for intrusion prevention."
|
||||||
project_lsio_github_repo_url: "https://github.com/linuxserver/docker-{{ project_name }}"
|
project_lsio_github_repo_url: "https://github.com/linuxserver/docker-{{ project_name }}"
|
||||||
|
project_categories: "Reverse Proxy"
|
||||||
project_blurb_optional_extras_enabled: false
|
|
||||||
project_blurb_optional_extras: []
|
|
||||||
|
|
||||||
# supported architectures
|
# supported architectures
|
||||||
available_architectures:
|
available_architectures:
|
||||||
- { arch: "{{ arch_x86_64 }}", tag: "amd64-latest"}
|
- {arch: "{{ arch_x86_64 }}", tag: "amd64-latest"}
|
||||||
- { arch: "{{ arch_arm64 }}", tag: "arm64v8-latest"}
|
- {arch: "{{ arch_arm64 }}", tag: "arm64v8-latest"}
|
||||||
- { arch: "{{ arch_armhf }}", tag: "arm32v7-latest"}
|
|
||||||
|
|
||||||
# development version
|
|
||||||
development_versions: false
|
|
||||||
development_versions_items:
|
|
||||||
- { tag: "latest", desc: "Stable releases" }
|
|
||||||
|
|
||||||
|
|
||||||
# container parameters
|
# container parameters
|
||||||
common_param_env_vars_enabled: true #PGID, PUID, etc, you can set it to 'optional'
|
common_param_env_vars_enabled: true
|
||||||
param_container_name: "{{ project_name }}"
|
param_container_name: "{{ project_name }}"
|
||||||
param_usage_include_net: false #you can set it to 'optional'
|
|
||||||
param_net: "host"
|
|
||||||
param_net_desc: "Shares host networking with container."
|
|
||||||
param_usage_include_env: true
|
param_usage_include_env: true
|
||||||
param_env_vars:
|
param_env_vars:
|
||||||
- { env_var: "TZ", env_value: "Europe/London", desc: "Specify a timezone to use EG Europe/London." }
|
- {env_var: "URL", env_value: "example.com", desc: "Top url you have control over (e.g. `example.com` if you own it, or `customsubdomain.example.com` if dynamic dns)."}
|
||||||
- { env_var: "URL", env_value: "yourdomain.url", desc: "Top url you have control over (`customdomain.com` if you own it, or `customsubdomain.ddnsprovider.com` if dynamic dns)." }
|
- {env_var: "VALIDATION", env_value: "http", desc: "Certbot validation method to use, options are `http` or `dns` (`dns` method also requires `DNSPLUGIN` variable set).", env_options: ["http", "dns"]}
|
||||||
- { env_var: "SUBDOMAINS", env_value: "www,", desc: "Subdomains you'd like the cert to cover (comma separated, no spaces) ie. `www,ftp,cloud`. For a wildcard cert, set this _exactly_ to `wildcard` (wildcard cert is available via `dns` and `duckdns` validation only)" }
|
|
||||||
- { env_var: "VALIDATION", env_value: "http", desc: "Certbot validation method to use, options are `http`, `dns` or `duckdns` (`dns` method also requires `DNSPLUGIN` variable set) (`duckdns` method requires `DUCKDNSTOKEN` variable set, and the `SUBDOMAINS` variable must be either empty or set to `wildcard`)." }
|
|
||||||
param_usage_include_vols: true
|
param_usage_include_vols: true
|
||||||
param_volumes:
|
param_volumes:
|
||||||
- { vol_path: "/config", vol_host_path: "/path/to/appdata/config", desc: "All the config files including the webroot reside here." }
|
- {vol_path: "/config", vol_host_path: "/path/to/{{ project_name }}/config", desc: "Persistent config files"}
|
||||||
param_usage_include_ports: true
|
param_usage_include_ports: true
|
||||||
param_ports:
|
param_ports:
|
||||||
- { external_port: "443", internal_port: "443", port_desc: "Https port" }
|
- {external_port: "443", internal_port: "443", port_desc: "HTTPS port"}
|
||||||
param_device_map: false
|
|
||||||
param_devices:
|
|
||||||
- { device_path: "/dev/dri", device_host_path: "/dev/dri", desc: "For hardware transcoding" }
|
|
||||||
cap_add_param: true
|
cap_add_param: true
|
||||||
cap_add_param_vars:
|
cap_add_param_vars:
|
||||||
- { cap_add_var: "NET_ADMIN" }
|
- {cap_add_var: "NET_ADMIN", desc: "Required for fail2Ban to be able to modify iptables rules."}
|
||||||
|
|
||||||
# optional container parameters
|
# optional container parameters
|
||||||
opt_param_usage_include_env: true
|
opt_param_usage_include_env: true
|
||||||
opt_param_env_vars:
|
opt_param_env_vars:
|
||||||
- { env_var: "DNSPLUGIN", env_value: "cloudflare", desc: "Required if `VALIDATION` is set to `dns`. Options are `aliyun`, `cloudflare`, `cloudxns`, `cpanel`, `digitalocean`, `dnsimple`, `dnsmadeeasy`, `domeneshop`, `gandi`, `google`, `inwx`, `linode`, `luadns`, `nsone`, `ovh`, `rfc2136`, `route53` and `transip`. Also need to enter the credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`." }
|
- {env_var: "SUBDOMAINS", env_value: "www,", desc: "Subdomains you'd like the cert to cover (comma separated, no spaces) ie. `www,ftp,cloud`. For a wildcard cert, set this *exactly* to `wildcard` (wildcard cert is available via `dns` validation only)"}
|
||||||
- { env_var: "PROPAGATION", env_value: "", desc: "Optionally override (in seconds) the default propagation time for the dns plugins." }
|
- {env_var: "CERTPROVIDER", env_value: "", desc: "Optionally define the cert provider. Set to `zerossl` for ZeroSSL certs (requires existing [ZeroSSL account](https://app.zerossl.com/signup) and the e-mail address entered in `EMAIL` env var). Otherwise defaults to Let's Encrypt."}
|
||||||
- { env_var: "DUCKDNSTOKEN", env_value: "", desc: "Required if `VALIDATION` is set to `duckdns`. Retrieve your token from https://www.duckdns.org" }
|
- {env_var: "DNSPLUGIN", env_value: "cloudflare", desc: "Required if `VALIDATION` is set to `dns`. Options are `acmedns`, `aliyun`, `azure`, `bunny`, `cloudflare`, `cpanel`, `desec`, `digitalocean`, `directadmin`, `dnsimple`, `dnsmadeeasy`, `dnspod`, `do`, `domeneshop`, `dreamhost`, `duckdns`, `dynu`, `freedns`, `gandi`, `gehirn`, `glesys`, `godaddy`, `google`, `he`, `hetzner`, `infomaniak`, `inwx`, `ionos`, `linode`, `loopia`, `luadns`, `namecheap`, `netcup`, `njalla`, `nsone`, `ovh`, `porkbun`, `rfc2136`, `route53`, `sakuracloud`, `standalone`, `transip`, and `vultr`. Also need to enter the credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`."}
|
||||||
- { env_var: "EMAIL", env_value: "", desc: "Optional e-mail address used for cert expiration notifications." }
|
- {env_var: "PROPAGATION", env_value: "", desc: "Optionally override (in seconds) the default propagation time for the dns plugins."}
|
||||||
- { env_var: "ONLY_SUBDOMAINS", env_value: "false", desc: "If you wish to get certs only for certain subdomains, but not the main domain (main domain may be hosted on another machine and cannot be validated), set this to `true`" }
|
- {env_var: "EMAIL", env_value: "", desc: "Optional e-mail address used for cert expiration notifications (Required for ZeroSSL)."}
|
||||||
- { env_var: "EXTRA_DOMAINS", env_value: "", desc: "Additional fully qualified domain names (comma separated, no spaces) ie. `extradomain.com,subdomain.anotherdomain.org,*.anotherdomain.org`" }
|
- {env_var: "ONLY_SUBDOMAINS", env_value: "false", desc: "If you wish to get certs only for certain subdomains, but not the main domain (main domain may be hosted on another machine and cannot be validated), set this to `true`"}
|
||||||
- { env_var: "STAGING", env_value: "false", desc: "Set to `true` to retrieve certs in staging mode. Rate limits will be much higher, but the resulting cert will not pass the browser's security test. Only to be used for testing purposes." }
|
- {env_var: "EXTRA_DOMAINS", env_value: "", desc: "Additional fully qualified domain names (comma separated, no spaces) ie. `example.net,subdomain.example.net,*.example.org`"}
|
||||||
opt_param_usage_include_vols: false
|
- {env_var: "STAGING", env_value: "false", desc: "Set to `true` to retrieve certs in staging mode. Rate limits will be much higher, but the resulting cert will not pass the browser's security test. Only to be used for testing purposes."}
|
||||||
opt_param_volumes:
|
- {env_var: "DISABLE_F2B", env_value: "", desc: "Set to `true` to disable the Fail2ban service in the container, if you're already running it elsewhere or using a different IPS."}
|
||||||
- { vol_path: "/config", vol_host_path: "/path/to/appdata/config", desc: "Configuration files." }
|
- {env_var: "SWAG_AUTORELOAD", env_value: "", desc: "Set to `true` to enable automatic reloading of confs on change without stopping/restarting nginx. Your filesystem must support inotify. This functionality was previously offered [via mod](https://github.com/linuxserver/docker-mods/tree/swag-auto-reload)."}
|
||||||
|
- {env_var: "SWAG_AUTORELOAD_WATCHLIST", env_value: "", desc: "A [pipe](https://en.wikipedia.org/wiki/Vertical_bar)-separated list of additional folders for auto reload to watch in addition to `/config/nginx`"}
|
||||||
opt_param_usage_include_ports: true
|
opt_param_usage_include_ports: true
|
||||||
opt_param_ports:
|
opt_param_ports:
|
||||||
- { external_port: "80", internal_port: "80", port_desc: "Http port (required for http validation and http -> https redirect)" }
|
- {external_port: "80", internal_port: "80", port_desc: "HTTP port (required for HTTP validation and HTTP -> HTTPS redirect)"}
|
||||||
opt_param_device_map: false
|
readonly_supported: true
|
||||||
opt_param_devices:
|
readonly_message: |
|
||||||
- { device_path: "/dev/dri", device_host_path: "/dev/dri", desc: "For hardware transcoding" }
|
* `/tmp` must be mounted to tmpfs
|
||||||
opt_cap_add_param: false
|
* fail2ban will not be available
|
||||||
opt_cap_add_param_vars:
|
|
||||||
- { cap_add_var: "NET_ADMIN" }
|
|
||||||
|
|
||||||
optional_block_1: false
|
|
||||||
optional_block_1_items: ""
|
|
||||||
|
|
||||||
# application setup block
|
# application setup block
|
||||||
app_setup_block_enabled: true
|
app_setup_block_enabled: true
|
||||||
app_setup_block: |
|
app_setup_block: |
|
||||||
> ### Migrating from the old `linuxserver/letsencrypt` image
|
|
||||||
> * If using docker cli:
|
|
||||||
> * Stop and remove existing container via `docker stop letsencrypt` and `docker rm letsencrypt`
|
|
||||||
> * Create new container using the sample on this page (container name: `swag`, image name: `linuxserver/swag`)
|
|
||||||
> * If using docker compose:
|
|
||||||
> * Edit the compose yaml to change the image to `linuxserver/swag` and change the service and container names to `swag`
|
|
||||||
> * Issue `docker-compose up -d --remove-orphans`
|
|
||||||
> * If you don't want to or can't use the option `--remove-orphans`, then you can first do `docker-compose down`, then edit the compose yaml as above, and then issue `docker-compose up -d`
|
|
||||||
|
|
||||||
> Make sure to also update any references to this container by name. For instance, Nextcloud's `config.php` references this container in its `trusted_proxies` directive, which would have to be updated to `swag`.
|
|
||||||
### Validation and initial setup
|
### Validation and initial setup
|
||||||
|
|
||||||
* Before running this container, make sure that the url and subdomains are properly forwarded to this container's host, and that port 443 (and/or 80) is not being used by another service on the host (NAS gui, another webserver, etc.).
|
* Before running this container, make sure that the url and subdomains are properly forwarded to this container's host, and that port 443 (and/or 80) is not being used by another service on the host (NAS gui, another webserver, etc.).
|
||||||
|
* If you need a dynamic dns provider, you can use the free provider duckdns.org where the `URL` will be `yoursubdomain.duckdns.org` and the `SUBDOMAINS` can be `www,ftp,cloud` with http validation, or `wildcard` with dns validation. You can use our [duckdns image](https://hub.docker.com/r/linuxserver/duckdns/) to update your IP on duckdns.org.
|
||||||
* For `http` validation, port 80 on the internet side of the router should be forwarded to this container's port 80
|
* For `http` validation, port 80 on the internet side of the router should be forwarded to this container's port 80
|
||||||
* For `dns` validation, make sure to enter your credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`
|
* For `dns` validation, make sure to enter your credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`
|
||||||
* Cloudflare provides free accounts for managing dns and is very easy to use with this image. Make sure that it is set up for "dns only" instead of "dns + proxy"
|
* Cloudflare provides free accounts for managing dns and is very easy to use with this image. Make sure that it is set up for "dns only" instead of "dns + proxy"
|
||||||
* Google dns plugin is meant to be used with "Google Cloud DNS", a paid enterprise product, and not for "Google Domains DNS"
|
* Google dns plugin is meant to be used with "Google Cloud DNS", a paid enterprise product, and not for "Google Domains DNS"
|
||||||
* For `duckdns` validation, either leave the `SUBDOMAINS` variable empty or set it to `wildcard`, and set the `DUCKDNSTOKEN` variable with your duckdns token. Due to a limitation of duckdns, the resulting cert will only cover either main subdomain (ie. `yoursubdomain.duckdns.org`), or sub-subdomains (ie. `*.yoursubdomain.duckdns.org`), but will not both at the same time. You can use our [duckdns image](https://hub.docker.com/r/linuxserver/duckdns/) to update your IP on duckdns.org.
|
* DuckDNS only supports two types of DNS validated certificates (not both at the same time):
|
||||||
|
1. Certs that only cover your main subdomain (ie. `yoursubdomain.duckdns.org`, leave the `SUBDOMAINS` variable empty)
|
||||||
|
2. Certs that cover sub-subdomains of your main subdomain (ie. `*.yoursubdomain.duckdns.org`, set the `SUBDOMAINS` variable to `wildcard`)
|
||||||
* `--cap-add=NET_ADMIN` is required for fail2ban to modify iptables
|
* `--cap-add=NET_ADMIN` is required for fail2ban to modify iptables
|
||||||
* If you need a dynamic dns provider, you can use the free provider duckdns.org where the `URL` will be `yoursubdomain.duckdns.org` and the `SUBDOMAINS` can be `www,ftp,cloud` with http validation, or `wildcard` with dns validation.
|
* After setup, navigate to `https://example.com` to access the default homepage (http access through port 80 is disabled by default, you can enable it by editing the default site config at `/config/nginx/site-confs/default.conf`).
|
||||||
* After setup, navigate to `https://yourdomain.url` to access the default homepage (http access through port 80 is disabled by default, you can enable it by editing the default site config at `/config/nginx/site-confs/default`).
|
|
||||||
* Certs are checked nightly and if expiration is within 30 days, renewal is attempted. If your cert is about to expire in less than 30 days, check the logs under `/config/log/letsencrypt` to see why the renewals have been failing. It is recommended to input your e-mail in docker parameters so you receive expiration notices from Let's Encrypt in those circumstances.
|
* Certs are checked nightly and if expiration is within 30 days, renewal is attempted. If your cert is about to expire in less than 30 days, check the logs under `/config/log/letsencrypt` to see why the renewals have been failing. It is recommended to input your e-mail in docker parameters so you receive expiration notices from Let's Encrypt in those circumstances.
|
||||||
|
|
||||||
|
### Certbot Plugins
|
||||||
|
|
||||||
|
SWAG includes many Certbot plugins out of the box, but not all plugins can be included.
|
||||||
|
If you need a plugin that is not included, the quickest way to have the plugin available is to use our [Universal Package Install Docker Mod](https://github.com/linuxserver/docker-mods/tree/universal-package-install).
|
||||||
|
|
||||||
|
Set the following environment variables on your container:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
DOCKER_MODS=linuxserver/mods:universal-package-install
|
||||||
|
INSTALL_PIP_PACKAGES=certbot-dns-<plugin>
|
||||||
|
```
|
||||||
|
|
||||||
|
Set the required credentials (usually found in the plugin documentation) in `/config/dns-conf/<plugin>.ini`.
|
||||||
|
It is recommended to attempt obtaining a certificate with `STAGING=true` first to make sure the plugin is working as expected.
|
||||||
|
|
||||||
### Security and password protection
|
### Security and password protection
|
||||||
|
|
||||||
* The container detects changes to url and subdomains, revokes existing certs and generates new ones during start.
|
* The container detects changes to url and subdomains, revokes existing certs and generates new ones during start.
|
||||||
* The container provides a pre-generated 4096-bit dhparams.pem (rotated weekly via [Jenkins job](https://ci.linuxserver.io/blue/organizations/jenkins/Xtras-Builders-Etc%2Fdhparams-uploader/activity)) for new instances, however you may generate your own by running `docker exec swag openssl dhparam -out /config/nginx/dhparams.pem 4096` WARNING: This takes a very long time
|
* Per [RFC7919](https://datatracker.ietf.org/doc/html/rfc7919), the container is shipping [ffdhe4096](https://ssl-config.mozilla.org/ffdhe4096.txt) as the `dhparams.pem`.
|
||||||
* If you'd like to password protect your sites, you can use htpasswd. Run the following command on your host to generate the htpasswd file `docker exec -it swag htpasswd -c /config/nginx/.htpasswd <username>`
|
* If you'd like to password protect your sites, you can use htpasswd. Run the following command on your host to generate the htpasswd file `docker exec -it swag htpasswd -c /config/nginx/.htpasswd <username>`
|
||||||
* You can add multiple user:pass to `.htpasswd`. For the first user, use the above command, for others, use the above command without the `-c` flag, as it will force deletion of the existing `.htpasswd` and creation of a new one
|
* You can add multiple user:pass to `.htpasswd`. For the first user, use the above command, for others, use the above command without the `-c` flag, as it will force deletion of the existing `.htpasswd` and creation of a new one
|
||||||
* You can also use ldap auth for security and access control. A sample, user configurable ldap.conf is provided, and it requires the separate image [linuxserver/ldap-auth](https://hub.docker.com/r/linuxserver/ldap-auth/) to communicate with an ldap server.
|
* You can also use ldap auth for security and access control. A sample, user configurable ldap.conf is provided, and it requires the separate image [linuxserver/ldap-auth](https://hub.docker.com/r/linuxserver/ldap-auth/) to communicate with an ldap server.
|
||||||
|
|
||||||
### Site config and reverse proxy
|
### Site config and reverse proxy
|
||||||
* The default site config resides at `/config/nginx/site-confs/default`. Feel free to modify this file, and you can add other conf files to this directory. However, if you delete the `default` file, a new default will be created on container start.
|
|
||||||
|
* The default site config resides at `/config/nginx/site-confs/default.conf`. Feel free to modify this file, and you can add other conf files to this directory. However, if you delete the `default` file, a new default will be created on container start.
|
||||||
* Preset reverse proxy config files are added for popular apps. See the `README.md` file under `/config/nginx/proxy_confs` for instructions on how to enable them. The preset confs reside in and get imported from [this repo](https://github.com/linuxserver/reverse-proxy-confs).
|
* Preset reverse proxy config files are added for popular apps. See the `README.md` file under `/config/nginx/proxy_confs` for instructions on how to enable them. The preset confs reside in and get imported from [this repo](https://github.com/linuxserver/reverse-proxy-confs).
|
||||||
* If you wish to hide your site from search engine crawlers, you may find it useful to add this configuration line to your site config, within the server block, above the line where ssl.conf is included
|
* If you wish to hide your site from search engine crawlers, you may find it useful to add this configuration line to your site config, within the server block, above the line where ssl.conf is included
|
||||||
`add_header X-Robots-Tag "noindex, nofollow, nosnippet, noarchive";`
|
`add_header X-Robots-Tag "noindex, nofollow, nosnippet, noarchive";`
|
||||||
This will *ask* Google et al not to index and list your site. Be careful with this, as you will eventually be de-listed if you leave this line in on a site you wish to be present on search engines
|
This will *ask* Google et al not to index and list your site. Be careful with this, as you will eventually be de-listed if you leave this line in on a site you wish to be present on search engines
|
||||||
* If you wish to redirect http to https, you must expose port 80
|
* If you wish to redirect http to https, you must expose port 80
|
||||||
|
|
||||||
### Using certs in other containers
|
### Using certs in other containers
|
||||||
|
|
||||||
* This container includes auto-generated pfx and private-fullchain-bundle pem certs that are needed by other apps like Emby and Znc.
|
* This container includes auto-generated pfx and private-fullchain-bundle pem certs that are needed by other apps like Emby and Znc.
|
||||||
* To use these certs in other containers, do either of the following:
|
* To use these certs in other containers, do either of the following:
|
||||||
1. *(Easier)* Mount the container's config folder in other containers (ie. `-v /path-to-le-config:/le-ssl`) and in the other containers, use the cert location `/le-ssl/keys/letsencrypt/`
|
1. *(Easier)* Mount the container's config folder in other containers (ie. `-v /path-to-swag-config:/swag-ssl`) and in the other containers, use the cert location `/swag-ssl/keys/letsencrypt/`
|
||||||
2. *(More secure)* Mount the SWAG folder `etc` that resides under `/config` in other containers (ie. `-v /path-to-le-config/etc:/le-ssl`) and in the other containers, use the cert location `/le-ssl/letsencrypt/live/<your.domain.url>/` (This is more secure because the first method shares the entire SWAG config folder with other containers, including the www files, whereas the second method only shares the ssl certs)
|
2. *(More secure)* Mount the SWAG folder `etc` that resides under `/config` in other containers (ie. `-v /path-to-swag-config/etc:/swag-ssl`) and in the other containers, use the cert location `/swag-ssl/letsencrypt/live/<your.domain.url>/` (This is more secure because the first method shares the entire SWAG config folder with other containers, including the www files, whereas the second method only shares the ssl certs)
|
||||||
* These certs include:
|
* These certs include:
|
||||||
1. `cert.pem`, `chain.pem`, `fullchain.pem` and `privkey.pem`, which are generated by Let's Encrypt and used by nginx and various other apps
|
1. `cert.pem`, `chain.pem`, `fullchain.pem` and `privkey.pem`, which are generated by Certbot and used by nginx and various other apps
|
||||||
2. `privkey.pfx`, a format supported by Microsoft and commonly used by dotnet apps such as Emby Server (no password)
|
2. `privkey.pfx`, a format supported by Microsoft and commonly used by dotnet apps such as Emby Server (no password)
|
||||||
3. `priv-fullchain-bundle.pem`, a pem cert that bundles the private key and the fullchain, used by apps like ZNC
|
3. `priv-fullchain-bundle.pem`, a pem cert that bundles the private key and the fullchain, used by apps like ZNC
|
||||||
|
|
||||||
### Using fail2ban
|
### Using fail2ban
|
||||||
* This container includes fail2ban set up with 3 jails by default:
|
|
||||||
|
* This container includes fail2ban set up with 5 jails by default:
|
||||||
1. nginx-http-auth
|
1. nginx-http-auth
|
||||||
2. nginx-badbots
|
2. nginx-badbots
|
||||||
3. nginx-botsearch
|
3. nginx-botsearch
|
||||||
|
4. nginx-deny
|
||||||
|
5. nginx-unauthorized
|
||||||
* To enable or disable other jails, modify the file `/config/fail2ban/jail.local`
|
* To enable or disable other jails, modify the file `/config/fail2ban/jail.local`
|
||||||
* To modify filters and actions, instead of editing the `.conf` files, create `.local` files with the same name and edit those because .conf files get overwritten when the actions and filters are updated. `.local` files will append whatever's in the `.conf` files (ie. `nginx-http-auth.conf` --> `nginx-http-auth.local`)
|
* To modify filters and actions, instead of editing the `.conf` files, create `.local` files with the same name and edit those because .conf files get overwritten when the actions and filters are updated. `.local` files will append whatever's in the `.conf` files (ie. `nginx-http-auth.conf` --> `nginx-http-auth.local`)
|
||||||
* You can check which jails are active via `docker exec -it swag fail2ban-client status`
|
* You can check which jails are active via `docker exec -it swag fail2ban-client status`
|
||||||
* You can check the status of a specific jail via `docker exec -it swag fail2ban-client status <jail name>`
|
* You can check the status of a specific jail via `docker exec -it swag fail2ban-client status <jail name>`
|
||||||
* You can unban an IP via `docker exec -it swag fail2ban-client set <jail name> unbanip <IP>`
|
* You can unban an IP via `docker exec -it swag fail2ban-client set <jail name> unbanip <IP>`
|
||||||
* A list of commands can be found here: https://www.fail2ban.org/wiki/index.php/Commands
|
* A list of commands for fail2ban-client can be found [here](https://manpages.ubuntu.com/manpages/noble/man1/fail2ban-client.1.html)
|
||||||
|
|
||||||
### Updating configs
|
### Updating configs
|
||||||
|
|
||||||
* This container creates a number of configs for nginx, proxy samples, etc.
|
* This container creates a number of configs for nginx, proxy samples, etc.
|
||||||
* Config updates are noted in the changelog but not automatically applied to your files.
|
* Config updates are noted in the changelog but not automatically applied to your files.
|
||||||
* If you have modified a file with noted changes in the changelog:
|
* If you have modified a file with noted changes in the changelog:
|
||||||
@ -138,16 +133,165 @@ app_setup_block: |
|
|||||||
2. Review our repository commits and apply the new changes yourself
|
2. Review our repository commits and apply the new changes yourself
|
||||||
3. Delete the modified config file with listed updates, restart the container, reapply your changes
|
3. Delete the modified config file with listed updates, restart the container, reapply your changes
|
||||||
* If you have NOT modified a file with noted changes in the changelog:
|
* If you have NOT modified a file with noted changes in the changelog:
|
||||||
1. Delete the config file with listed updates, restart the container, reapply your changes
|
1. Delete the config file with listed updates, restart the container
|
||||||
* Proxy sample updates are not listed in the changelog. See the changes here: [https://github.com/linuxserver/reverse-proxy-confs/commits/master](https://github.com/linuxserver/reverse-proxy-confs/commits/master)
|
* Proxy sample updates are not listed in the changelog. See the changes here: [https://github.com/linuxserver/reverse-proxy-confs/commits/master](https://github.com/linuxserver/reverse-proxy-confs/commits/master)
|
||||||
* Proxy sample files WILL be updated, however your renamed (enabled) proxy files will not.
|
* Proxy sample files WILL be updated, however your renamed (enabled) proxy files will not.
|
||||||
* You can check the new sample and adjust your active config as needed.
|
* You can check the new sample and adjust your active config as needed.
|
||||||
|
|
||||||
app_setup_nginx_reverse_proxy_snippet: false
|
### Migration from the old `linuxserver/letsencrypt` image
|
||||||
app_setup_nginx_reverse_proxy_block: ""
|
|
||||||
|
|
||||||
|
Please follow the instructions [on this blog post](https://www.linuxserver.io/blog/2020-08-21-introducing-swag#migrate).
|
||||||
|
# init diagram
|
||||||
|
init_diagram: |
|
||||||
|
"swag:latest": {
|
||||||
|
docker-mods
|
||||||
|
base {
|
||||||
|
fix-attr +\nlegacy cont-init
|
||||||
|
}
|
||||||
|
docker-mods -> base
|
||||||
|
legacy-services
|
||||||
|
custom services
|
||||||
|
init-services -> legacy-services
|
||||||
|
init-services -> custom services
|
||||||
|
custom services -> legacy-services
|
||||||
|
legacy-services -> ci-service-check
|
||||||
|
init-migrations -> init-adduser
|
||||||
|
init-swag-config -> init-certbot-config
|
||||||
|
init-nginx-end -> init-config
|
||||||
|
init-os-end -> init-config
|
||||||
|
init-config -> init-config-end
|
||||||
|
init-crontab-config -> init-config-end
|
||||||
|
init-outdated-config -> init-config-end
|
||||||
|
init-config -> init-crontab-config
|
||||||
|
init-mods-end -> init-custom-files
|
||||||
|
base -> init-envfile
|
||||||
|
init-swag-samples -> init-fail2ban-config
|
||||||
|
init-os-end -> init-folders
|
||||||
|
init-php -> init-keygen
|
||||||
|
base -> init-migrations
|
||||||
|
init-config-end -> init-mods
|
||||||
|
init-mods-package-install -> init-mods-end
|
||||||
|
init-mods -> init-mods-package-install
|
||||||
|
init-samples -> init-nginx
|
||||||
|
init-version-checks -> init-nginx-end
|
||||||
|
init-adduser -> init-os-end
|
||||||
|
init-envfile -> init-os-end
|
||||||
|
init-renew -> init-outdated-config
|
||||||
|
init-keygen -> init-permissions
|
||||||
|
init-certbot-config -> init-permissions-config
|
||||||
|
init-nginx -> init-php
|
||||||
|
init-permissions-config -> init-renew
|
||||||
|
init-config -> init-require-url
|
||||||
|
init-folders -> init-samples
|
||||||
|
init-custom-files -> init-services
|
||||||
|
init-fail2ban-config -> init-swag-config
|
||||||
|
init-require-url -> init-swag-folders
|
||||||
|
init-swag-folders -> init-swag-samples
|
||||||
|
init-permissions -> init-version-checks
|
||||||
|
init-services -> svc-cron
|
||||||
|
svc-cron -> legacy-services
|
||||||
|
init-services -> svc-fail2ban
|
||||||
|
svc-fail2ban -> legacy-services
|
||||||
|
init-services -> svc-nginx
|
||||||
|
svc-nginx -> legacy-services
|
||||||
|
init-services -> svc-php-fpm
|
||||||
|
svc-php-fpm -> legacy-services
|
||||||
|
init-services -> svc-swag-auto-reload
|
||||||
|
svc-swag-auto-reload -> legacy-services
|
||||||
|
}
|
||||||
|
Base Images: {
|
||||||
|
"baseimage-alpine-nginx:3.21" <- "baseimage-alpine:3.21"
|
||||||
|
}
|
||||||
|
"swag:latest" <- Base Images
|
||||||
# changelog
|
# changelog
|
||||||
changelogs:
|
changelogs:
|
||||||
- { date: "08.09.20:", desc: "Add php7-xsl." }
|
- {date: "19.01.25:", desc: "Add [Auto Reload](https://github.com/linuxserver/docker-mods/tree/swag-auto-reload) functionality to SWAG."}
|
||||||
- { date: "01.09.20:", desc: "Update nginx.conf and proxy.conf (and various proxy samples) to better handle websockets." }
|
- {date: "17.12.24:", desc: "Rebase to Alpine 3.21."}
|
||||||
- { date: "03.08.20:", desc: "Initial release." }
|
- {date: "21.10.24:", desc: "Fix naming issue with Dynu plugin. If you are using Dynu, please make sure your credentials are set in /config/dns-conf/dynu.ini and your DNSPLUGIN variable is set to dynu (not dynudns)."}
|
||||||
|
- {date: "30.08.24:", desc: "Fix zerossl cert revocation."}
|
||||||
|
- {date: "24.07.14:", desc: "Rebase to Alpine 3.20. Remove deprecated Google Domains certbot plugin. Existing users should update their nginx confs to avoid http2 deprecation warnings."}
|
||||||
|
- {date: "01.07.24:", desc: "Fall back to iptables-legacy if iptables doesn't work."}
|
||||||
|
- {date: "23.03.24:", desc: "Fix perms on the generated `priv-fullchain-bundle.pem`."}
|
||||||
|
- {date: "14.03.24:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) authelia-location.conf, authelia-server.conf - Update Authelia conf samples with support for 4.38."}
|
||||||
|
- {date: "11.03.24:", desc: "Restore support for DynuDNS using `certbot-dns-dynudns`."}
|
||||||
|
- {date: "06.03.24:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) site-confs/default.conf - Cleanup default site conf."}
|
||||||
|
- {date: "04.03.24:", desc: "Remove `stream.conf` inside the container to allow users to include their own block in `nginx.conf`."}
|
||||||
|
- {date: "23.01.24:", desc: "Rebase to Alpine 3.19 with php 8.3, add root periodic crontabs for logrotate."}
|
||||||
|
- {date: "01.01.24:", desc: "Add GleSYS DNS plugin."}
|
||||||
|
- {date: "11.12.23:", desc: "Deprecate certbot-dns-dynu to resolve dependency conflicts with other plugins."}
|
||||||
|
- {date: "30.11.23:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) site-confs/default.conf - Fix index.php being downloaded on 404."}
|
||||||
|
- {date: "23.11.23:", desc: "Run certbot as root to allow fix http validation."}
|
||||||
|
- {date: "01.10.23:", desc: "Fix \"unrecognized arguments\" issue in DirectAdmin DNS plugin."}
|
||||||
|
- {date: "28.08.23:", desc: "Add Namecheap DNS plugin."}
|
||||||
|
- {date: "12.08.23:", desc: "Add FreeDNS plugin. Detect certbot DNS authenticators using CLI."}
|
||||||
|
- {date: "07.08.23:", desc: "Add Bunny DNS Configuration."}
|
||||||
|
- {date: "27.07.23:", desc: "Added support for dreamhost validation."}
|
||||||
|
- {date: "25.05.23:", desc: "Rebase to Alpine 3.18, deprecate armhf."}
|
||||||
|
- {date: "27.04.23:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) authelia-location.conf, authelia-server.conf, authentik-location.conf, authentik-server.conf - Simplify auth configs and fix Set-Cookie header bug."}
|
||||||
|
- {date: "13.04.23:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf, authelia-location.conf, authentik-location.conf, and site-confs/default.conf - Move ssl.conf include to default.conf. Remove Authorization headers in authelia. Sort proxy_set_header in authelia and authentik."}
|
||||||
|
- {date: "25.03.23:", desc: "Fix renewal post hook."}
|
||||||
|
- {date: "10.03.23:", desc: "Cleanup unused csr and keys folders. See [certbot 2.3.0 release notes](https://github.com/certbot/certbot/releases/tag/v2.3.0)."}
|
||||||
|
- {date: "09.03.23:", desc: "Add Google Domains DNS support, `google-domains`."}
|
||||||
|
- {date: "02.03.23:", desc: "Set permissions on crontabs during init."}
|
||||||
|
- {date: "09.02.23:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) proxy.conf, authelia-location.conf and authelia-server.conf - Add Authentik configs, update Authelia configs."}
|
||||||
|
- {date: "06.02.23:", desc: "Add porkbun support back in."}
|
||||||
|
- {date: "21.01.23:", desc: "Unpin certbot version (allow certbot 2.x). !!BREAKING CHANGE!! We are temporarily removing the certbot porkbun plugin until a new version is released that is compatible with certbot 2.x."}
|
||||||
|
- {date: "20.01.23:", desc: "Rebase to alpine 3.17 with php8.1."}
|
||||||
|
- {date: "16.01.23:", desc: "Remove nchan module because it keeps causing crashes."}
|
||||||
|
- {date: "08.12.22:", desc: "Revamp certbot init."}
|
||||||
|
- {date: "03.12.22:", desc: "Remove defunct cloudxns plugin."}
|
||||||
|
- {date: "22.11.22:", desc: "Pin acme to the same version as certbot."}
|
||||||
|
- {date: "22.11.22:", desc: "Pin certbot to 1.32.0 until plugin compatibility improves."}
|
||||||
|
- {date: "05.11.22:", desc: "Update acmedns plugin handling."}
|
||||||
|
- {date: "06.10.22:", desc: "Switch to certbot-dns-duckdns. Update cpanel and gandi dns plugin handling. Minor adjustments to init logic."}
|
||||||
|
- {date: "05.10.22:", desc: "Use certbot file hooks instead of command line hooks"}
|
||||||
|
- {date: "04.10.22:", desc: "Add godaddy and porkbun dns plugins."}
|
||||||
|
- {date: "03.10.22:", desc: "Add default_server back to default site conf's https listen."}
|
||||||
|
- {date: "22.09.22:", desc: "Added support for DO DNS validation."}
|
||||||
|
- {date: "22.09.22:", desc: "Added certbot-dns-acmedns for DNS01 validation."}
|
||||||
|
- {date: "20.08.22:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf - Rebasing to alpine 3.15 with php8. Restructure nginx configs ([see changes announcement](https://info.linuxserver.io/issues/2022-08-20-nginx-base))."}
|
||||||
|
- {date: "10.08.22:", desc: "Added support for Dynu DNS validation."}
|
||||||
|
- {date: "18.05.22:", desc: "Added support for Azure DNS validation."}
|
||||||
|
- {date: "09.04.22:", desc: "Added certbot-dns-loopia for DNS01 validation."}
|
||||||
|
- {date: "05.04.22:", desc: "Added support for standalone DNS validation."}
|
||||||
|
- {date: "28.03.22:", desc: "created a logfile for fail2ban nginx-unauthorized in /etc/cont-init.d/50-config"}
|
||||||
|
- {date: "09.01.22:", desc: "Added a fail2ban jail for nginx unauthorized"}
|
||||||
|
- {date: "21.12.21:", desc: "Fixed issue with iptables not working as expected"}
|
||||||
|
- {date: "30.11.21:", desc: "Move maxmind to a [new mod](https://github.com/linuxserver/docker-mods/tree/swag-maxmind)"}
|
||||||
|
- {date: "22.11.21:", desc: "Added support for Infomaniak DNS for certificate generation."}
|
||||||
|
- {date: "20.11.21:", desc: "Added support for dnspod validation."}
|
||||||
|
- {date: "15.11.21:", desc: "Added support for deSEC DNS for wildcard certificate generation."}
|
||||||
|
- {date: "26.10.21:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) proxy.conf - Mitigate <https://httpoxy.org/> vulnerabilities. Ref: <https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx#Defeating-the-Attack-using-NGINX-and-NGINX-Plus>"}
|
||||||
|
- {date: "23.10.21:", desc: "Fix Hurricane Electric (HE) DNS validation."}
|
||||||
|
- {date: "12.10.21:", desc: "Fix deprecated LE root cert check to fix failures when using `STAGING=true`, and failures in revoking."}
|
||||||
|
- {date: "06.10.21:", desc: "Added support for Hurricane Electric (HE) DNS validation. Added lxml build deps."}
|
||||||
|
- {date: "01.10.21:", desc: "Check if the cert uses the old LE root cert, revoke and regenerate if necessary. [Here's more info](https://twitter.com/letsencrypt/status/1443621997288767491) on LE root cert expiration"}
|
||||||
|
- {date: "19.09.21:", desc: "Add an optional header to opt out of Google FLoC in `ssl.conf`."}
|
||||||
|
- {date: "17.09.21:", desc: "Mark `SUBDOMAINS` var as optional."}
|
||||||
|
- {date: "01.08.21:", desc: "Add support for ionos dns validation."}
|
||||||
|
- {date: "15.07.21:", desc: "Fix libmaxminddb issue due to upstream change."}
|
||||||
|
- {date: "07.07.21:", desc: "Rebase to alpine 3.14."}
|
||||||
|
- {date: "24.06.21:", desc: "Update default nginx conf folder."}
|
||||||
|
- {date: "28.05.21:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) authelia-server.conf - Use `resolver.conf` and patch for `CVE-2021-32637`."}
|
||||||
|
- {date: "20.05.21:", desc: "Modify resolver.conf generation to detect and ignore ipv6."}
|
||||||
|
- {date: "14.05.21:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf, ssl.conf, proxy.conf, and the default site-conf - Rework nginx.conf to be inline with alpine upstream and relocate lines from other files. Use linuxserver.io wheel index for pip packages. Switch to using [ffdhe4096](https://ssl-config.mozilla.org/ffdhe4096.txt) for `dhparams.pem` per [RFC7919](https://datatracker.ietf.org/doc/html/rfc7919). Added `worker_processes.conf`, which sets the number of nginx workers, and `resolver.conf`, which sets the dns resolver. Both conf files are auto-generated only on first start and can be user modified later."}
|
||||||
|
- {date: "21.04.21:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) authelia-server.conf and authelia-location.conf - Add remote name/email headers and pass http method."}
|
||||||
|
- {date: "12.04.21:", desc: "Add php7-gmp and php7-pecl-mailparse."}
|
||||||
|
- {date: "12.04.21:", desc: "Add support for vultr dns validation."}
|
||||||
|
- {date: "14.03.21:", desc: "Add support for directadmin dns validation."}
|
||||||
|
- {date: "12.02.21:", desc: "Clean up rust/cargo cache, which ballooned the image size in the last couple of builds."}
|
||||||
|
- {date: "10.02.21:", desc: "Fix aliyun, domeneshop, inwx and transip dns confs for existing users."}
|
||||||
|
- {date: "09.02.21:", desc: "Rebasing to alpine 3.13. Add nginx mods brotli and dav-ext. Remove nginx mods lua and lua-upstream (due to regression over the last couple of years)."}
|
||||||
|
- {date: "26.01.21:", desc: "Add support for hetzner dns validation."}
|
||||||
|
- {date: "20.01.21:", desc: "Add check for ZeroSSL EAB retrieval."}
|
||||||
|
- {date: "08.01.21:", desc: "Add support for getting certs from [ZeroSSL](https://zerossl.com/) via optional `CERTPROVIDER` env var. Update aliyun, domeneshop, inwx and transip dns plugins with the new plugin names. Hide `donoteditthisfile.conf` because users were editing it despite its name. Suppress harmless error when no proxy confs are enabled."}
|
||||||
|
- {date: "03.01.21:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) /config/nginx/site-confs/default.conf - Add helper pages to aid troubleshooting"}
|
||||||
|
- {date: "10.12.20:", desc: "Add support for njalla dns validation"}
|
||||||
|
- {date: "09.12.20:", desc: "Check for template/conf updates and notify in the log. Add support for gehirn and sakuracloud dns validation."}
|
||||||
|
- {date: "01.11.20:", desc: "Add support for netcup dns validation"}
|
||||||
|
- {date: "29.10.20:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) ssl.conf - Add frame-ancestors to Content-Security-Policy."}
|
||||||
|
- {date: "04.10.20:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf, proxy.conf, and ssl.conf - Minor cleanups and reordering."}
|
||||||
|
- {date: "20.09.20:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf - Added geoip2 configs. Added MAXMINDDB_LICENSE_KEY variable to readme."}
|
||||||
|
- {date: "08.09.20:", desc: "Add php7-xsl."}
|
||||||
|
- {date: "01.09.20:", desc: "[Existing users should update:](https://github.com/linuxserver/docker-swag/blob/master/README.md#updating-configs) nginx.conf, proxy.conf, and various proxy samples - Global websockets across all configs."}
|
||||||
|
- {date: "03.08.20:", desc: "Initial release."}
|
||||||
|
@ -1,8 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
. /config/donoteditthisfile.conf
|
|
||||||
|
|
||||||
curl https://www.duckdns.org/update?domains=${CERTBOT_DOMAIN}\&token=${ORIGDUCKDNSTOKEN}\&txt=${CERTBOT_VALIDATION}
|
|
||||||
|
|
||||||
echo "sleeping 60"
|
|
||||||
sleep 60
|
|
24
root/app/le-renew.sh
Normal file → Executable file
24
root/app/le-renew.sh
Normal file → Executable file
@ -1,27 +1,9 @@
|
|||||||
#!/usr/bin/with-contenv bash
|
#!/usr/bin/with-contenv bash
|
||||||
|
# shellcheck shell=bash
|
||||||
. /config/donoteditthisfile.conf
|
|
||||||
|
|
||||||
echo "<------------------------------------------------->"
|
echo "<------------------------------------------------->"
|
||||||
echo
|
echo
|
||||||
echo "<------------------------------------------------->"
|
echo "<------------------------------------------------->"
|
||||||
echo "cronjob running on "$(date)
|
echo "cronjob running on $(date)"
|
||||||
echo "Running certbot renew"
|
echo "Running certbot renew"
|
||||||
if [ "$ORIGVALIDATION" = "dns" ] || [ "$ORIGVALIDATION" = "duckdns" ]; then
|
certbot renew --non-interactive --config-dir /config/etc/letsencrypt --logs-dir /config/log/letsencrypt --work-dir /tmp/letsencrypt --config /config/etc/letsencrypt/cli.ini
|
||||||
certbot -n renew \
|
|
||||||
--post-hook "if ps aux | grep [n]ginx: > /dev/null; then s6-svc -h /var/run/s6/services/nginx; fi; \
|
|
||||||
cd /config/keys/letsencrypt && \
|
|
||||||
openssl pkcs12 -export -out privkey.pfx -inkey privkey.pem -in cert.pem -certfile chain.pem -passout pass: && \
|
|
||||||
sleep 1 && \
|
|
||||||
cat privkey.pem fullchain.pem > priv-fullchain-bundle.pem && \
|
|
||||||
chown -R abc:abc /config/etc/letsencrypt"
|
|
||||||
else
|
|
||||||
certbot -n renew \
|
|
||||||
--pre-hook "if ps aux | grep [n]ginx: > /dev/null; then s6-svc -d /var/run/s6/services/nginx; fi" \
|
|
||||||
--post-hook "if ps aux | grep 's6-supervise nginx' | grep -v grep > /dev/null; then s6-svc -u /var/run/s6/services/nginx; fi; \
|
|
||||||
cd /config/keys/letsencrypt && \
|
|
||||||
openssl pkcs12 -export -out privkey.pfx -inkey privkey.pem -in cert.pem -certfile chain.pem -passout pass: && \
|
|
||||||
sleep 1 && \
|
|
||||||
cat privkey.pem fullchain.pem > priv-fullchain-bundle.pem && \
|
|
||||||
chown -R abc:abc /config/etc/letsencrypt"
|
|
||||||
fi
|
|
||||||
|
@ -1,11 +0,0 @@
|
|||||||
## Version 2020/05/31 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/authelia-location.conf
|
|
||||||
# Make sure that your authelia container is in the same user defined bridge network and is named authelia
|
|
||||||
# Make sure that the authelia configuration.yml has 'path: "authelia"' defined
|
|
||||||
|
|
||||||
auth_request /authelia/api/verify;
|
|
||||||
auth_request_set $target_url $scheme://$http_host$request_uri;
|
|
||||||
auth_request_set $user $upstream_http_remote_user;
|
|
||||||
auth_request_set $groups $upstream_http_remote_groups;
|
|
||||||
proxy_set_header Remote-User $user;
|
|
||||||
proxy_set_header Remote-Groups $groups;
|
|
||||||
error_page 401 =302 https://$http_host/authelia/?rd=$target_url;
|
|
@ -1,48 +0,0 @@
|
|||||||
## Version 2020/05/31 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/authelia-server.conf
|
|
||||||
# Make sure that your authelia container is in the same user defined bridge network and is named authelia
|
|
||||||
|
|
||||||
location ^~ /authelia {
|
|
||||||
include /config/nginx/proxy.conf;
|
|
||||||
resolver 127.0.0.11 valid=30s;
|
|
||||||
set $upstream_authelia authelia;
|
|
||||||
proxy_pass http://$upstream_authelia:9091;
|
|
||||||
}
|
|
||||||
|
|
||||||
location = /authelia/api/verify {
|
|
||||||
internal;
|
|
||||||
resolver 127.0.0.11 valid=30s;
|
|
||||||
set $upstream_authelia authelia;
|
|
||||||
proxy_pass_request_body off;
|
|
||||||
proxy_pass http://$upstream_authelia:9091;
|
|
||||||
proxy_set_header Content-Length "";
|
|
||||||
|
|
||||||
# Timeout if the real server is dead
|
|
||||||
proxy_next_upstream error timeout invalid_header http_500 http_502 http_503;
|
|
||||||
|
|
||||||
# [REQUIRED] Needed by Authelia to check authorizations of the resource.
|
|
||||||
# Provide either X-Original-URL and X-Forwarded-Proto or
|
|
||||||
# X-Forwarded-Proto, X-Forwarded-Host and X-Forwarded-Uri or both.
|
|
||||||
# Those headers will be used by Authelia to deduce the target url of the user.
|
|
||||||
# Basic Proxy Config
|
|
||||||
client_body_buffer_size 128k;
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Original-URL $scheme://$http_host$request_uri;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
proxy_set_header X-Forwarded-Host $http_host;
|
|
||||||
proxy_set_header X-Forwarded-Uri $request_uri;
|
|
||||||
proxy_set_header X-Forwarded-Ssl on;
|
|
||||||
proxy_redirect http:// $scheme://;
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_set_header Connection "";
|
|
||||||
proxy_cache_bypass $cookie_session;
|
|
||||||
proxy_no_cache $cookie_session;
|
|
||||||
proxy_buffers 4 32k;
|
|
||||||
|
|
||||||
# Advanced Proxy Config
|
|
||||||
send_timeout 5m;
|
|
||||||
proxy_read_timeout 240;
|
|
||||||
proxy_send_timeout 240;
|
|
||||||
proxy_connect_timeout 240;
|
|
||||||
}
|
|
@ -1,147 +0,0 @@
|
|||||||
## Version 2020/05/23 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/default
|
|
||||||
|
|
||||||
# redirect all traffic to https
|
|
||||||
server {
|
|
||||||
listen 80 default_server;
|
|
||||||
listen [::]:80 default_server;
|
|
||||||
server_name _;
|
|
||||||
return 301 https://$host$request_uri;
|
|
||||||
}
|
|
||||||
|
|
||||||
# main server block
|
|
||||||
server {
|
|
||||||
listen 443 ssl http2 default_server;
|
|
||||||
listen [::]:443 ssl http2 default_server;
|
|
||||||
|
|
||||||
root /config/www;
|
|
||||||
index index.html index.htm index.php;
|
|
||||||
|
|
||||||
server_name _;
|
|
||||||
|
|
||||||
# enable subfolder method reverse proxy confs
|
|
||||||
include /config/nginx/proxy-confs/*.subfolder.conf;
|
|
||||||
|
|
||||||
# all ssl related config moved to ssl.conf
|
|
||||||
include /config/nginx/ssl.conf;
|
|
||||||
|
|
||||||
# enable for ldap auth
|
|
||||||
#include /config/nginx/ldap.conf;
|
|
||||||
|
|
||||||
# enable for Authelia
|
|
||||||
#include /config/nginx/authelia-server.conf;
|
|
||||||
|
|
||||||
client_max_body_size 0;
|
|
||||||
|
|
||||||
location / {
|
|
||||||
try_files $uri $uri/ /index.html /index.php?$args =404;
|
|
||||||
}
|
|
||||||
|
|
||||||
location ~ \.php$ {
|
|
||||||
fastcgi_split_path_info ^(.+\.php)(/.+)$;
|
|
||||||
fastcgi_pass 127.0.0.1:9000;
|
|
||||||
fastcgi_index index.php;
|
|
||||||
include /etc/nginx/fastcgi_params;
|
|
||||||
}
|
|
||||||
|
|
||||||
# sample reverse proxy config for password protected couchpotato running at IP 192.168.1.50 port 5050 with base url "cp"
|
|
||||||
# notice this is within the same server block as the base
|
|
||||||
# don't forget to generate the .htpasswd file as described on docker hub
|
|
||||||
# location ^~ /cp {
|
|
||||||
# auth_basic "Restricted";
|
|
||||||
# auth_basic_user_file /config/nginx/.htpasswd;
|
|
||||||
# include /config/nginx/proxy.conf;
|
|
||||||
# proxy_pass http://192.168.1.50:5050/cp;
|
|
||||||
# }
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
# sample reverse proxy config without url base, but as a subdomain "cp", ip and port same as above
|
|
||||||
# notice this is a new server block, you need a new server block for each subdomain
|
|
||||||
#server {
|
|
||||||
# listen 443 ssl http2;
|
|
||||||
# listen [::]:443 ssl http2;
|
|
||||||
#
|
|
||||||
# root /config/www;
|
|
||||||
# index index.html index.htm index.php;
|
|
||||||
#
|
|
||||||
# server_name cp.*;
|
|
||||||
#
|
|
||||||
# include /config/nginx/ssl.conf;
|
|
||||||
#
|
|
||||||
# client_max_body_size 0;
|
|
||||||
#
|
|
||||||
# location / {
|
|
||||||
# auth_basic "Restricted";
|
|
||||||
# auth_basic_user_file /config/nginx/.htpasswd;
|
|
||||||
# include /config/nginx/proxy.conf;
|
|
||||||
# proxy_pass http://192.168.1.50:5050;
|
|
||||||
# }
|
|
||||||
#}
|
|
||||||
|
|
||||||
# sample reverse proxy config for "heimdall" via subdomain, with ldap authentication
|
|
||||||
# ldap-auth container has to be running and the /config/nginx/ldap.conf file should be filled with ldap info
|
|
||||||
# notice this is a new server block, you need a new server block for each subdomain
|
|
||||||
#server {
|
|
||||||
# listen 443 ssl http2;
|
|
||||||
# listen [::]:443 ssl http2;
|
|
||||||
#
|
|
||||||
# root /config/www;
|
|
||||||
# index index.html index.htm index.php;
|
|
||||||
#
|
|
||||||
# server_name heimdall.*;
|
|
||||||
#
|
|
||||||
# include /config/nginx/ssl.conf;
|
|
||||||
#
|
|
||||||
# include /config/nginx/ldap.conf;
|
|
||||||
#
|
|
||||||
# client_max_body_size 0;
|
|
||||||
#
|
|
||||||
# location / {
|
|
||||||
# # the next two lines will enable ldap auth along with the included ldap.conf in the server block
|
|
||||||
# auth_request /auth;
|
|
||||||
# error_page 401 =200 /ldaplogin;
|
|
||||||
#
|
|
||||||
# include /config/nginx/proxy.conf;
|
|
||||||
# resolver 127.0.0.11 valid=30s;
|
|
||||||
# set $upstream_app heimdall;
|
|
||||||
# set $upstream_port 443;
|
|
||||||
# set $upstream_proto https;
|
|
||||||
# proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
|
||||||
# }
|
|
||||||
#}
|
|
||||||
|
|
||||||
# sample reverse proxy config for "heimdall" via subdomain, with Authelia
|
|
||||||
# Authelia container has to be running in the same user defined bridge network, with container name "authelia", and with 'path: "authelia"' set in its configuration.yml
|
|
||||||
# notice this is a new server block, you need a new server block for each subdomain
|
|
||||||
#server {
|
|
||||||
# listen 443 ssl http2;
|
|
||||||
# listen [::]:443 ssl http2;
|
|
||||||
#
|
|
||||||
# root /config/www;
|
|
||||||
# index index.html index.htm index.php;
|
|
||||||
#
|
|
||||||
# server_name heimdall.*;
|
|
||||||
#
|
|
||||||
# include /config/nginx/ssl.conf;
|
|
||||||
#
|
|
||||||
# include /config/nginx/authelia-server.conf;
|
|
||||||
#
|
|
||||||
# client_max_body_size 0;
|
|
||||||
#
|
|
||||||
# location / {
|
|
||||||
# # the next line will enable Authelia along with the included authelia-server.conf in the server block
|
|
||||||
# include /config/nginx/authelia-location.conf;
|
|
||||||
#
|
|
||||||
# include /config/nginx/proxy.conf;
|
|
||||||
# resolver 127.0.0.11 valid=30s;
|
|
||||||
# set $upstream_app heimdall;
|
|
||||||
# set $upstream_port 443;
|
|
||||||
# set $upstream_proto https;
|
|
||||||
# proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
|
||||||
# }
|
|
||||||
#}
|
|
||||||
|
|
||||||
# enable subdomain method reverse proxy confs
|
|
||||||
include /config/nginx/proxy-confs/*.subdomain.conf;
|
|
||||||
# enable proxy cache for auth
|
|
||||||
proxy_cache_path cache/ keys_zone=auth_cache:10m;
|
|
9
root/defaults/dns-conf/acmedns-registration.json
Normal file
9
root/defaults/dns-conf/acmedns-registration.json
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
{
|
||||||
|
"yourdomain.com": {
|
||||||
|
"username":"yourusername",
|
||||||
|
"password":"yourpassword",
|
||||||
|
"fulldomain":"<guid>.acme.yourdomain.com",
|
||||||
|
"subdomain":"<guid>",
|
||||||
|
"allowfrom":[]
|
||||||
|
}
|
||||||
|
}
|
5
root/defaults/dns-conf/acmedns.ini
Normal file
5
root/defaults/dns-conf/acmedns.ini
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# See https://pypi.org/project/certbot-dns-acmedns/
|
||||||
|
# https://github.com/joohoi/acme-dns
|
||||||
|
#
|
||||||
|
dns_acmedns_api_url = http://your-acme-dns-server.example.com/
|
||||||
|
dns_acmedns_registration_file = /config/dns-conf/acmedns-registration.json
|
@ -2,5 +2,5 @@
|
|||||||
# https://ram.console.aliyun.com/
|
# https://ram.console.aliyun.com/
|
||||||
# And ensure your RAM account has AliyunDNSFullAccess permission.
|
# And ensure your RAM account has AliyunDNSFullAccess permission.
|
||||||
|
|
||||||
certbot_dns_aliyun:dns_aliyun_access_key = 12345678
|
dns_aliyun_access_key = 12345678
|
||||||
certbot_dns_aliyun:dns_aliyun_access_key_secret = 1234567890abcdef1234567890abcdef
|
dns_aliyun_access_key_secret = 1234567890abcdef1234567890abcdef
|
||||||
|
26
root/defaults/dns-conf/azure.ini
Normal file
26
root/defaults/dns-conf/azure.ini
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
# Instructions: https://certbot-dns-azure.readthedocs.io/en/latest/
|
||||||
|
# Replace with your values
|
||||||
|
# dns_azure_environment can be one of the following: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud
|
||||||
|
# Service Principal with Client Secret
|
||||||
|
dns_azure_sp_client_id = 912ce44a-0156-4669-ae22-c16a17d34ca5
|
||||||
|
dns_azure_sp_client_secret = E-xqXU83Y-jzTI6xe9fs2YC~mck3ZzUih9
|
||||||
|
dns_azure_tenant_id = ed1090f3-ab18-4b12-816c-599af8a88cf7
|
||||||
|
dns_azure_environment = "AzurePublicCloud"
|
||||||
|
dns_azure_zone1 = example.com:/subscriptions/c135abce-d87d-48df-936c-15596c6968a5/resourceGroups/dns1
|
||||||
|
|
||||||
|
|
||||||
|
# Service Prinicipal with Certificate
|
||||||
|
#dns_azure_sp_client_id = 912ce44a-0156-4669-ae22-c16a17d34ca5
|
||||||
|
#dns_azure_sp_certificate_path = /path/to/certificate.pem
|
||||||
|
#dns_azure_tenant_id = ed1090f3-ab18-4b12-816c-599af8a88cf7
|
||||||
|
#dns_azure_environment = "AzurePublicCloud"
|
||||||
|
#dns_azure_zone1 = example.com:/subscriptions/c135abce-d87d-48df-936c-15596c6968a5/resourceGroups/dns1
|
||||||
|
|
||||||
|
# Azure Managed Identity
|
||||||
|
#dns_azure_msi_client_id = 912ce44a-0156-4669-ae22-c16a17d34ca5
|
||||||
|
#dns_azure_zone1 = example.com:/subscriptions/c135abce-d87d-48df-936c-15596c6968a5/resourceGroups/dns1
|
||||||
|
|
||||||
|
# System Assigned Azure Managed Identity
|
||||||
|
#dns_azure_msi_system_assigned = true
|
||||||
|
#dns_azure_environment = "AzurePublicCloud"
|
||||||
|
#dns_azure_zone1 = example.com:/subscriptions/c135abce-d87d-48df-936c-15596c6968a5/resourceGroups/dns1
|
2
root/defaults/dns-conf/bunny.ini
Normal file
2
root/defaults/dns-conf/bunny.ini
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
# Bunny API token used by Certbot
|
||||||
|
dns_bunny_api_key = a65e8ebd-45ab-44d2-a542-40d4d009e3bf
|
@ -6,4 +6,4 @@ dns_cloudflare_email = cloudflare@example.com
|
|||||||
dns_cloudflare_api_key = 0123456789abcdef0123456789abcdef01234567
|
dns_cloudflare_api_key = 0123456789abcdef0123456789abcdef01234567
|
||||||
|
|
||||||
# With token (comment out both lines above and uncomment below):
|
# With token (comment out both lines above and uncomment below):
|
||||||
#dns_cloudflare_api_token = 0123456789abcdef0123456789abcdef01234567
|
#dns_cloudflare_api_token = 0123456789abcdef0123456789abcdef01234567
|
||||||
|
@ -1,4 +0,0 @@
|
|||||||
# Instructions: https://github.com/certbot/certbot/blob/master/certbot-dns-cloudxns/certbot_dns_cloudxns/__init__.py#L20
|
|
||||||
# Replace with your values
|
|
||||||
dns_cloudxns_api_key = 1234567890abcdef1234567890abcdef
|
|
||||||
dns_cloudxns_secret_key = 1122334455667788
|
|
@ -1,6 +1,15 @@
|
|||||||
# Instructions: https://github.com/badjware/certbot-dns-cpanel#credentials
|
# Instructions: https://github.com/badjware/certbot-dns-cpanel#credentials
|
||||||
# Replace with your values
|
# The url cPanel url
|
||||||
# include the scheme and the port number (usually 2083 for https)
|
# include the scheme and the port number (usually 2083 for https)
|
||||||
certbot_dns_cpanel:cpanel_url = https://cpanel.example.com:2083
|
cpanel_url = https://cpanel.exemple.com:2083
|
||||||
certbot_dns_cpanel:cpanel_username = username
|
|
||||||
certbot_dns_cpanel:cpanel_password = 1234567890abcdef
|
# The cPanel username
|
||||||
|
cpanel_username = user
|
||||||
|
|
||||||
|
# The cPanel password
|
||||||
|
cpanel_password = hunter2
|
||||||
|
|
||||||
|
# The cPanel API Token
|
||||||
|
cpanel_token = EUTQ793EY7MIRX4EMXXXXXXXXXXOX4JF
|
||||||
|
|
||||||
|
# You only need to configure API Token or Password. If you supply both, the API Token will be used
|
||||||
|
4
root/defaults/dns-conf/desec.ini
Normal file
4
root/defaults/dns-conf/desec.ini
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# Instructions: https://pypi.org/project/certbot-dns-desec/
|
||||||
|
# Replace with your Desec V1 API Token
|
||||||
|
dns_desec_token=YOUR_TOKEN_HERE
|
||||||
|
dns_desec_endpoint=https://desec.io/api/v1/
|
21
root/defaults/dns-conf/directadmin.ini
Normal file
21
root/defaults/dns-conf/directadmin.ini
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
# Instructions: https://github.com/cybercinch/certbot-dns-directadmin/blob/master/certbot_dns_directadmin/__init__.py
|
||||||
|
|
||||||
|
# It is recommended to create a login key in the DirectAdmin control panel to be used as value for directadmin_password.
|
||||||
|
# Instructions on how to create such key can be found at https://help.directadmin.com/item.php?id=523.
|
||||||
|
#
|
||||||
|
# Make sure to grant the following permissions:
|
||||||
|
# - CMD_API_LOGIN_TEST
|
||||||
|
# - CMD_API_DNS_CONTROL
|
||||||
|
# - CMD_API_SHOW_DOMAINS
|
||||||
|
#
|
||||||
|
# Username and password can also be used in case your DirectAdmin instance has no support for login keys.
|
||||||
|
|
||||||
|
# The DirectAdmin Server url
|
||||||
|
# include the scheme and the port number (Normally 2222)
|
||||||
|
dns_directadmin_url = https://my.directadminserver.com:2222
|
||||||
|
|
||||||
|
# The DirectAdmin username
|
||||||
|
dns_directadmin_username = username
|
||||||
|
|
||||||
|
# The DirectAdmin password
|
||||||
|
dns_directadmin_password = aSuperStrongPassword
|
5
root/defaults/dns-conf/dnspod.ini
Normal file
5
root/defaults/dns-conf/dnspod.ini
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Instructions: https://github.com/SkyLothar/certbot-dns-dnspod#create-a-credentials-file
|
||||||
|
# Obtain your own DNSPod API token at DNSPod console: https://console.dnspod.cn/account/token/token
|
||||||
|
# Replace with your own email, id and token
|
||||||
|
dns_dnspod_email = "me@example.com"
|
||||||
|
dns_dnspod_api_token = "12345,1234567890abcdef1234567890abcdef"
|
3
root/defaults/dns-conf/do.ini
Normal file
3
root/defaults/dns-conf/do.ini
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# Instructions: https://github.com/georgeto/certbot-dns-do/blob/master/certbot_dns_do/__init__.py#L32
|
||||||
|
# Replace with your values
|
||||||
|
dns_do_api_token = YOUR_DO_LETSENCRYPT_API_KEY
|
@ -1,4 +1,4 @@
|
|||||||
# Instructions: https://github.com/domeneshop/certbot-dns-domeneshop#credentials
|
# Instructions: https://github.com/domeneshop/certbot-dns-domeneshop#credentials
|
||||||
# Replace with your values
|
# Replace with your values
|
||||||
certbot_dns_domeneshop:dns_domeneshop_client_token=1234567890abcdef
|
dns_domeneshop_client_token=1234567890abcdef
|
||||||
certbot_dns_domeneshop:dns_domeneshop_client_secret=1234567890abcdefghijklmnopqrstuvxyz1234567890abcdefghijklmnopqrs
|
dns_domeneshop_client_secret=1234567890abcdefghijklmnopqrstuvxyz1234567890abcdefghijklmnopqrs
|
||||||
|
4
root/defaults/dns-conf/dreamhost.ini
Normal file
4
root/defaults/dns-conf/dreamhost.ini
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# Instructions: https://github.com/goncalo-leal/certbot-dns-dreamhost#usage
|
||||||
|
# Replace with your values
|
||||||
|
dns_dreamhost_baseurl = "https://api.dreamhost.com/"
|
||||||
|
dns_dreamhost_api_key = "<api_key>"
|
3
root/defaults/dns-conf/duckdns.ini
Normal file
3
root/defaults/dns-conf/duckdns.ini
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# Instructions: https://github.com/infinityofspace/certbot_dns_duckdns#credentials-file-or-cli-parameters
|
||||||
|
# Replace with your API token from your duckdns account.
|
||||||
|
dns_duckdns_token=<your-duckdns-token>
|
3
root/defaults/dns-conf/dynu.ini
Normal file
3
root/defaults/dns-conf/dynu.ini
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# Instructions: https://github.com/DustyRah/certbot-dns-dynudns
|
||||||
|
# Replace with your API token from your dynudns account.
|
||||||
|
dns_dynu_auth_token = AbCbASsd!@34
|
4
root/defaults/dns-conf/freedns.ini
Normal file
4
root/defaults/dns-conf/freedns.ini
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# Instructions: https://github.com/schleuss/certbot_dns_freedns#credentials
|
||||||
|
# Replace with your values
|
||||||
|
dns_freedns_username = myremoteuser
|
||||||
|
dns_freedns_password = verysecureremoteuserpassword
|
@ -1,3 +1,7 @@
|
|||||||
# Instructions: https://github.com/obynio/certbot-plugin-gandi#usage
|
# Instructions: https://github.com/obynio/certbot-plugin-gandi#usage
|
||||||
# Replace with your value
|
# Replace with your value
|
||||||
certbot_plugin_gandi:dns_api_key=APIKEY
|
# live dns v5 api key
|
||||||
|
dns_gandi_api_key=APIKEY
|
||||||
|
|
||||||
|
# optional organization id, remove it if not used
|
||||||
|
#dns_gandi_sharing_id=SHARINGID
|
||||||
|
4
root/defaults/dns-conf/gehirn.ini
Normal file
4
root/defaults/dns-conf/gehirn.ini
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# Instructions: https://certbot-dns-gehirn.readthedocs.io/en/stable/
|
||||||
|
# Replace with your values
|
||||||
|
dns_gehirn_api_token = 00000000-0000-0000-0000-000000000000
|
||||||
|
dns_gehirn_api_secret = MDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAw
|
5
root/defaults/dns-conf/glesys.ini
Normal file
5
root/defaults/dns-conf/glesys.ini
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Instructions: https://github.com/runfalk/certbot-dns-glesys#usage
|
||||||
|
|
||||||
|
# GleSYS API credentials used by Certbot
|
||||||
|
dns_glesys_user = CL00000
|
||||||
|
dns_glesys_password = apikeygoeshere
|
4
root/defaults/dns-conf/godaddy.ini
Normal file
4
root/defaults/dns-conf/godaddy.ini
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# Instructions: https://github.com/miigotu/certbot-dns-godaddy
|
||||||
|
# Replace with your values
|
||||||
|
dns_godaddy_secret = 0123456789abcdef0123456789abcdef01234567
|
||||||
|
dns_godaddy_key = abcdef0123456789abcdef01234567abcdef0123
|
@ -3,4 +3,4 @@
|
|||||||
"_comment": "Replace with your values",
|
"_comment": "Replace with your values",
|
||||||
"type": "service_account",
|
"type": "service_account",
|
||||||
"rest": "..."
|
"rest": "..."
|
||||||
}
|
}
|
||||||
|
4
root/defaults/dns-conf/he.ini
Normal file
4
root/defaults/dns-conf/he.ini
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# Instructions: https://github.com/TSaaristo/certbot-dns-he#example-usage
|
||||||
|
# Replace with your values
|
||||||
|
dns_he_user = Me
|
||||||
|
dns_he_pass = my HE password
|
3
root/defaults/dns-conf/hetzner.ini
Normal file
3
root/defaults/dns-conf/hetzner.ini
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# Instructions: https://github.com/ctrlaltcoop/certbot-dns-hetzner
|
||||||
|
# Replace with your values
|
||||||
|
dns_hetzner_api_token = nohnah4zoo9Kiejee9aGh0thoopee2sa
|
3
root/defaults/dns-conf/infomaniak.ini
Normal file
3
root/defaults/dns-conf/infomaniak.ini
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# Instructions: https://github.com/Infomaniak/certbot-dns-infomaniak#via-ini-file
|
||||||
|
# Replace with your values
|
||||||
|
dns_infomaniak_token = XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
|
@ -1,6 +1,6 @@
|
|||||||
# Instructions: https://github.com/oGGy990/certbot-dns-inwx
|
# Instructions: https://github.com/oGGy990/certbot-dns-inwx
|
||||||
# Replace with your values
|
# Replace with your values
|
||||||
certbot_dns_inwx:dns_inwx_url = https://api.domrobot.com/xmlrpc/
|
dns_inwx_url = https://api.domrobot.com/xmlrpc/
|
||||||
certbot_dns_inwx:dns_inwx_username = your_username
|
dns_inwx_username = your_username
|
||||||
certbot_dns_inwx:dns_inwx_password = your_password
|
dns_inwx_password = your_password
|
||||||
certbot_dns_inwx:dns_inwx_shared_secret = your_shared_secret optional
|
dns_inwx_shared_secret = your_shared_secret optional
|
||||||
|
5
root/defaults/dns-conf/ionos.ini
Normal file
5
root/defaults/dns-conf/ionos.ini
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Instructions: https://github.com/helgeerbe/certbot-dns-ionos
|
||||||
|
# Replace with your values
|
||||||
|
dns_ionos_prefix = myapikeyprefix
|
||||||
|
dns_ionos_secret = verysecureapikeysecret
|
||||||
|
dns_ionos_endpoint = https://api.hosting.ionos.com
|
3
root/defaults/dns-conf/loopia.ini
Normal file
3
root/defaults/dns-conf/loopia.ini
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# Replace with your values
|
||||||
|
dns_loopia_user = user@loopiaapi
|
||||||
|
dns_loopia_password = passwordgoeshere
|
4
root/defaults/dns-conf/namecheap.ini
Normal file
4
root/defaults/dns-conf/namecheap.ini
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# Instructions: https://github.com/knoxell/certbot-dns-namecheap#credentials
|
||||||
|
# Namecheap API credentials used by Certbot
|
||||||
|
dns_namecheap_username=my-username
|
||||||
|
dns_namecheap_api_key=my-api-key
|
5
root/defaults/dns-conf/netcup.ini
Normal file
5
root/defaults/dns-conf/netcup.ini
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Recommended PROPAGATION value in environment for netcup is 900
|
||||||
|
|
||||||
|
dns_netcup_customer_id = 123456
|
||||||
|
dns_netcup_api_key = 0123456789abcdef0123456789abcdef01234567
|
||||||
|
dns_netcup_api_password = abcdef0123456789abcdef01234567abcdef0123
|
2
root/defaults/dns-conf/njalla.ini
Normal file
2
root/defaults/dns-conf/njalla.ini
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
# Generate your API token here: https://njal.la/settings/api/
|
||||||
|
dns_njalla_token=0000000000000000000000000000000000000000
|
4
root/defaults/dns-conf/porkbun.ini
Normal file
4
root/defaults/dns-conf/porkbun.ini
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# Instructions: https://github.com/infinityofspace/certbot_dns_porkbun
|
||||||
|
# Replace with your values
|
||||||
|
dns_porkbun_key=<your-porkbun-api-key>
|
||||||
|
dns_porkbun_secret=<your-porkbun-api-secret>
|
@ -1,5 +1,5 @@
|
|||||||
# Instructions: https://github.com/certbot/certbot/blob/master/certbot-dns-route53/certbot_dns_route53/__init__.py#L18
|
# Instructions: https://github.com/certbot/certbot/blob/master/certbot-dns-route53/certbot_dns_route53/__init__.py#L18
|
||||||
# Replace with your values
|
# Replace with your values
|
||||||
[default]
|
[default]
|
||||||
aws_access_key_id=AKIAIOSFODNN7EXAMPLE
|
; aws_access_key_id=AKIAIOSFODNN7EXAMPLE
|
||||||
aws_secret_access_key=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
|
; aws_secret_access_key=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
|
||||||
|
4
root/defaults/dns-conf/sakuracloud.ini
Normal file
4
root/defaults/dns-conf/sakuracloud.ini
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
# Instructions: https://certbot-dns-sakuracloud.readthedocs.io/en/stable/
|
||||||
|
# Replace with your values
|
||||||
|
dns_sakuracloud_api_token = 00000000-0000-0000-0000-000000000000
|
||||||
|
dns_sakuracloud_api_secret = MDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAw
|
8
root/defaults/dns-conf/standalone.ini
Normal file
8
root/defaults/dns-conf/standalone.ini
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
# Instructions: https://github.com/siilike/certbot-dns-standalone/blob/master/README.rst
|
||||||
|
# Make sure to expose UDP port 53 from your swag container:
|
||||||
|
# - for docker cli, add argument: `-p 53:53/udp`
|
||||||
|
# - for docker-compose, add the following line under ports: `- 53:53/udp`
|
||||||
|
# This file does not need to be changed:
|
||||||
|
# - no credentials are required
|
||||||
|
# - it's not used and only for informational purpose
|
||||||
|
# - prepare the correct DNS records as described in the plugin instructions instead
|
@ -1,6 +1,30 @@
|
|||||||
# Instructions: https://readthedocs.org/projects/certbot-dns-transip/
|
# Instructions: https://readthedocs.org/projects/certbot-dns-transip/
|
||||||
# Convert the key to an RSA key (openssl rsa -in transip.key -out transip-rsa.key)
|
#
|
||||||
# Place .key-file in the same directory as this file. Location "/config/dns-conf" is from within the container
|
# This DNS plugin can be used to generate SSL wildcard certificates via TransIP DNS TXT records
|
||||||
|
#
|
||||||
|
# Login with your TransIP account and go to My Account | API:
|
||||||
|
# 1. API-settings: On
|
||||||
|
#
|
||||||
|
# 2. IP-address/ranges whitelist: Add a new authorized IP address (Swag Docker) to use the API
|
||||||
|
#
|
||||||
|
# 3. Generate a new Key Pair and copy the private key to a new transip.key file in the format:
|
||||||
|
# -----BEGIN PRIVATE KEY-----
|
||||||
|
# ...
|
||||||
|
# -----END PRIVATE KEY-----
|
||||||
|
#
|
||||||
|
# 4. Convert the key to an RSA key with command:
|
||||||
|
# openssl rsa -in transip.key -out /config/dns-conf/transip-rsa.key
|
||||||
|
#
|
||||||
|
# 5. Set permission
|
||||||
|
# chmod 600 /config/dns-conf/transip-rsa.key
|
||||||
|
#
|
||||||
|
# 6. Replace <transip_username> below with your TransIP username
|
||||||
|
#
|
||||||
|
# 7. Create wildcard certificate with Swag environment variables:
|
||||||
|
# SUBDOMAINS=wildcard
|
||||||
|
# VALIDATION=dns
|
||||||
|
# DNSPLUGIN=transip
|
||||||
|
|
||||||
|
dns_transip_username = <transip_username>
|
||||||
|
dns_transip_key_file = /config/dns-conf/transip-rsa.key
|
||||||
|
|
||||||
certbot_dns_transip:dns_transip_username = <transip_username>
|
|
||||||
certbot_dns_transip:dns_transip_key_file = /config/dns-conf/transip-rsa.key
|
|
3
root/defaults/dns-conf/vultr.ini
Normal file
3
root/defaults/dns-conf/vultr.ini
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# Instructions: https://github.com/lezgomatt/certbot-dns-vultr
|
||||||
|
# Replace with your vultr Personal Access Token (see https://www.vultr.com/docs/how-to-setup-dynamic-dns).
|
||||||
|
dns_vultr_key = YOUR_VULTR_API_KEY
|
9
root/defaults/etc/letsencrypt/renewal-hooks/deploy/10-default
Executable file
9
root/defaults/etc/letsencrypt/renewal-hooks/deploy/10-default
Executable file
@ -0,0 +1,9 @@
|
|||||||
|
#!/usr/bin/with-contenv bash
|
||||||
|
# shellcheck shell=bash
|
||||||
|
|
||||||
|
cd /config/keys/letsencrypt || exit 1
|
||||||
|
openssl pkcs12 -export -out privkey.pfx -inkey privkey.pem -in cert.pem -certfile chain.pem -passout pass:
|
||||||
|
sleep 1
|
||||||
|
cat {privkey,fullchain}.pem >priv-fullchain-bundle.pem
|
||||||
|
chmod 600 priv-fullchain-bundle.pem
|
||||||
|
chown -R abc:abc /config/etc/letsencrypt
|
15
root/defaults/etc/letsencrypt/renewal-hooks/post/10-nginx
Executable file
15
root/defaults/etc/letsencrypt/renewal-hooks/post/10-nginx
Executable file
@ -0,0 +1,15 @@
|
|||||||
|
#!/usr/bin/with-contenv bash
|
||||||
|
# shellcheck shell=bash
|
||||||
|
|
||||||
|
# shellcheck source=/dev/null
|
||||||
|
. /config/.donoteditthisfile.conf
|
||||||
|
|
||||||
|
if [[ ! "${ORIGVALIDATION}" = "dns" ]] && [[ ! "${ORIGVALIDATION}" = "duckdns" ]]; then
|
||||||
|
if pgrep -f "s6-supervise svc-nginx" >/dev/null; then
|
||||||
|
s6-svc -u /run/service/svc-nginx
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
if pgrep -f "nginx:" >/dev/null; then
|
||||||
|
s6-svc -h /run/service/svc-nginx
|
||||||
|
fi
|
||||||
|
fi
|
11
root/defaults/etc/letsencrypt/renewal-hooks/pre/10-nginx
Executable file
11
root/defaults/etc/letsencrypt/renewal-hooks/pre/10-nginx
Executable file
@ -0,0 +1,11 @@
|
|||||||
|
#!/usr/bin/with-contenv bash
|
||||||
|
# shellcheck shell=bash
|
||||||
|
|
||||||
|
# shellcheck source=/dev/null
|
||||||
|
. /config/.donoteditthisfile.conf
|
||||||
|
|
||||||
|
if [[ ! "${ORIGVALIDATION}" = "dns" ]] && [[ ! "${ORIGVALIDATION}" = "duckdns" ]]; then
|
||||||
|
if pgrep -f "nginx:" >/dev/null; then
|
||||||
|
s6-svc -d /run/service/svc-nginx
|
||||||
|
fi
|
||||||
|
fi
|
@ -12,4 +12,4 @@ datepattern = {^LN-BEG}
|
|||||||
|
|
||||||
# DEV NOTES:
|
# DEV NOTES:
|
||||||
#
|
#
|
||||||
# Author: Will L (driz@linuxserver.io)
|
# Author: notdriz
|
||||||
|
5
root/defaults/fail2ban/filter.d/nginx-unauthorized.conf
Normal file
5
root/defaults/fail2ban/filter.d/nginx-unauthorized.conf
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# A fail2ban filter for unauthorized log messages
|
||||||
|
|
||||||
|
[Definition]
|
||||||
|
|
||||||
|
failregex = ^<HOST>.*"(GET|POST|HEAD).*" (401) .*$
|
@ -1,10 +1,14 @@
|
|||||||
## Version 2020/05/10 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/jail.local
|
## Version 2022/08/20 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/fail2ban/jail.local
|
||||||
# This is the custom version of the jail.conf for fail2ban
|
# This is the custom version of the jail.conf for fail2ban
|
||||||
# Feel free to modify this and add additional filters
|
# Feel free to modify this and add additional filters
|
||||||
# Then you can drop the new filter conf files into the fail2ban-filters
|
# Then you can drop the new filter conf files into the fail2ban-filters
|
||||||
# folder and restart the container
|
# folder and restart the container
|
||||||
|
|
||||||
[DEFAULT]
|
[DEFAULT]
|
||||||
|
# Prevents banning LAN subnets
|
||||||
|
ignoreip = 10.0.0.0/8
|
||||||
|
192.168.0.0/16
|
||||||
|
172.16.0.0/12
|
||||||
|
|
||||||
# Changes the default ban action from "iptables-multiport", which causes issues on some platforms, to "iptables-allports".
|
# Changes the default ban action from "iptables-multiport", which causes issues on some platforms, to "iptables-allports".
|
||||||
banaction = iptables-allports
|
banaction = iptables-allports
|
||||||
@ -21,37 +25,35 @@ maxretry = 5
|
|||||||
|
|
||||||
|
|
||||||
[ssh]
|
[ssh]
|
||||||
|
|
||||||
enabled = false
|
enabled = false
|
||||||
|
|
||||||
|
|
||||||
[nginx-http-auth]
|
[nginx-http-auth]
|
||||||
|
|
||||||
enabled = true
|
enabled = true
|
||||||
filter = nginx-http-auth
|
filter = nginx-http-auth
|
||||||
port = http,https
|
port = http,https
|
||||||
logpath = /config/log/nginx/error.log
|
logpath = /config/log/nginx/error.log
|
||||||
|
|
||||||
|
|
||||||
[nginx-badbots]
|
[nginx-badbots]
|
||||||
|
|
||||||
enabled = true
|
enabled = true
|
||||||
port = http,https
|
port = http,https
|
||||||
filter = nginx-badbots
|
filter = nginx-badbots
|
||||||
logpath = /config/log/nginx/access.log
|
logpath = /config/log/nginx/access.log
|
||||||
maxretry = 2
|
maxretry = 2
|
||||||
|
|
||||||
|
|
||||||
[nginx-botsearch]
|
[nginx-botsearch]
|
||||||
|
|
||||||
enabled = true
|
enabled = true
|
||||||
port = http,https
|
port = http,https
|
||||||
filter = nginx-botsearch
|
filter = nginx-botsearch
|
||||||
logpath = /config/log/nginx/access.log
|
logpath = /config/log/nginx/access.log
|
||||||
|
|
||||||
[nginx-deny]
|
[nginx-deny]
|
||||||
|
|
||||||
enabled = true
|
enabled = true
|
||||||
port = http,https
|
port = http,https
|
||||||
filter = nginx-deny
|
filter = nginx-deny
|
||||||
logpath = /config/log/nginx/error.log
|
logpath = /config/log/nginx/error.log
|
||||||
|
|
||||||
|
[nginx-unauthorized]
|
||||||
|
enabled = true
|
||||||
|
port = http,https
|
||||||
|
filter = nginx-unauthorized
|
||||||
|
logpath = /config/log/nginx/access.log
|
@ -1,92 +0,0 @@
|
|||||||
## Version 2020/06/02 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/ldap.conf
|
|
||||||
## this conf is meant to be used in conjunction with our ldap-auth image: https://github.com/linuxserver/docker-ldap-auth
|
|
||||||
## see the heimdall example in the default site config for info on enabling ldap auth
|
|
||||||
## for further instructions on this conf, see https://github.com/nginxinc/nginx-ldap-auth
|
|
||||||
|
|
||||||
location /ldaplogin {
|
|
||||||
resolver 127.0.0.11 valid=30s;
|
|
||||||
set $upstream_auth_app ldap-auth;
|
|
||||||
set $upstream_auth_port 9000;
|
|
||||||
set $upstream_auth_proto http;
|
|
||||||
proxy_pass $upstream_auth_proto://$upstream_auth_app:$upstream_auth_port;
|
|
||||||
proxy_set_header X-Target $request_uri;
|
|
||||||
}
|
|
||||||
|
|
||||||
location = /auth {
|
|
||||||
resolver 127.0.0.11 valid=30s;
|
|
||||||
set $upstream_auth_app ldap-auth;
|
|
||||||
set $upstream_auth_port 8888;
|
|
||||||
set $upstream_auth_proto http;
|
|
||||||
proxy_pass $upstream_auth_proto://$upstream_auth_app:$upstream_auth_port;
|
|
||||||
|
|
||||||
proxy_pass_request_body off;
|
|
||||||
proxy_set_header Content-Length "";
|
|
||||||
|
|
||||||
#Before enabling the below caching options, make sure you have the line "proxy_cache_path cache/ keys_zone=auth_cache:10m;" at the bottom your default site config
|
|
||||||
#proxy_cache auth_cache;
|
|
||||||
#proxy_cache_valid 200 10m;
|
|
||||||
#proxy_cache_key "$http_authorization$cookie_nginxauth";
|
|
||||||
|
|
||||||
# As implemented in nginx-ldap-auth-daemon.py, the ldap-auth daemon
|
|
||||||
# communicates with a LDAP server, passing in the following
|
|
||||||
# parameters to specify which user account to authenticate. To
|
|
||||||
# eliminate the need to modify the Python code, this file contains
|
|
||||||
# 'proxy_set_header' directives that set the values of the
|
|
||||||
# parameters. Set or change them as instructed in the comments.
|
|
||||||
#
|
|
||||||
# Parameter Proxy header
|
|
||||||
# ----------- ----------------
|
|
||||||
# url X-Ldap-URL
|
|
||||||
# starttls X-Ldap-Starttls
|
|
||||||
# basedn X-Ldap-BaseDN
|
|
||||||
# binddn X-Ldap-BindDN
|
|
||||||
# bindpasswd X-Ldap-BindPass
|
|
||||||
# cookiename X-CookieName
|
|
||||||
# realm X-Ldap-Realm
|
|
||||||
# template X-Ldap-Template
|
|
||||||
|
|
||||||
# (Required) Set the URL and port for connecting to the LDAP server,
|
|
||||||
# by replacing 'example.com'.
|
|
||||||
# Do not mix ldaps-style URL and X-Ldap-Starttls as it will not work.
|
|
||||||
proxy_set_header X-Ldap-URL "ldap://example.com";
|
|
||||||
|
|
||||||
# (Optional) Establish a TLS-enabled LDAP session after binding to the
|
|
||||||
# LDAP server.
|
|
||||||
# This is the 'proper' way to establish encrypted TLS connections, see
|
|
||||||
# http://www.openldap.org/faq/data/cache/185.html
|
|
||||||
#proxy_set_header X-Ldap-Starttls "true";
|
|
||||||
|
|
||||||
# (Required) Set the Base DN, by replacing the value enclosed in
|
|
||||||
# double quotes.
|
|
||||||
proxy_set_header X-Ldap-BaseDN "cn=Users,dc=test,dc=local";
|
|
||||||
|
|
||||||
# (Required) Set the Bind DN, by replacing the value enclosed in
|
|
||||||
# double quotes.
|
|
||||||
# If AD, use "root@test.local"
|
|
||||||
proxy_set_header X-Ldap-BindDN "cn=root,dc=test,dc=local";
|
|
||||||
|
|
||||||
# (Required) Set the Bind password, by replacing 'secret'.
|
|
||||||
proxy_set_header X-Ldap-BindPass "secret";
|
|
||||||
|
|
||||||
# (Required) The following directives set the cookie name and pass
|
|
||||||
# it, respectively. They are required for cookie-based
|
|
||||||
# authentication. Comment them out if using HTTP basic
|
|
||||||
# authentication.
|
|
||||||
proxy_set_header X-CookieName "nginxauth";
|
|
||||||
proxy_set_header Cookie nginxauth=$cookie_nginxauth;
|
|
||||||
|
|
||||||
# (Required if using Microsoft Active Directory as the LDAP server)
|
|
||||||
# Set the LDAP template by uncommenting the following directive.
|
|
||||||
#proxy_set_header X-Ldap-Template "(sAMAccountName=%(username)s)";
|
|
||||||
|
|
||||||
# (Optional if using OpenLDAP as the LDAP server) Set the LDAP
|
|
||||||
# template by uncommenting the following directive and replacing
|
|
||||||
# '(cn=%(username)s)' which is the default set in
|
|
||||||
# nginx-ldap-auth-daemon.py.
|
|
||||||
#proxy_set_header X-Ldap-Template "(cn=%(username)s)";
|
|
||||||
|
|
||||||
# (Optional) Set the realm name, by uncommenting the following
|
|
||||||
# directive and replacing 'Restricted' which is the default set
|
|
||||||
# in nginx-ldap-auth-daemon.py.
|
|
||||||
#proxy_set_header X-Ldap-Realm "Restricted";
|
|
||||||
}
|
|
@ -1,113 +0,0 @@
|
|||||||
## Version 2020/09/01 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx.conf
|
|
||||||
|
|
||||||
user abc;
|
|
||||||
worker_processes 4;
|
|
||||||
pid /run/nginx.pid;
|
|
||||||
include /etc/nginx/modules/*.conf;
|
|
||||||
|
|
||||||
events {
|
|
||||||
worker_connections 768;
|
|
||||||
# multi_accept on;
|
|
||||||
}
|
|
||||||
|
|
||||||
http {
|
|
||||||
|
|
||||||
##
|
|
||||||
# Basic Settings
|
|
||||||
##
|
|
||||||
|
|
||||||
sendfile on;
|
|
||||||
tcp_nopush on;
|
|
||||||
tcp_nodelay on;
|
|
||||||
keepalive_timeout 65;
|
|
||||||
types_hash_max_size 2048;
|
|
||||||
variables_hash_max_size 2048;
|
|
||||||
large_client_header_buffers 4 16k;
|
|
||||||
|
|
||||||
# server_tokens off;
|
|
||||||
|
|
||||||
# server_names_hash_bucket_size 64;
|
|
||||||
# server_name_in_redirect off;
|
|
||||||
|
|
||||||
client_max_body_size 0;
|
|
||||||
|
|
||||||
include /etc/nginx/mime.types;
|
|
||||||
default_type application/octet-stream;
|
|
||||||
|
|
||||||
##
|
|
||||||
# Logging Settings
|
|
||||||
##
|
|
||||||
|
|
||||||
access_log /config/log/nginx/access.log;
|
|
||||||
error_log /config/log/nginx/error.log;
|
|
||||||
|
|
||||||
##
|
|
||||||
# Gzip Settings
|
|
||||||
##
|
|
||||||
|
|
||||||
gzip on;
|
|
||||||
gzip_disable "msie6";
|
|
||||||
|
|
||||||
# gzip_vary on;
|
|
||||||
# gzip_proxied any;
|
|
||||||
# gzip_comp_level 6;
|
|
||||||
# gzip_buffers 16 8k;
|
|
||||||
# gzip_http_version 1.1;
|
|
||||||
# gzip_types text/plain text/css application/json application/x-javascript text/xml application/xml application/xml+rss text/javascript;
|
|
||||||
|
|
||||||
##
|
|
||||||
# nginx-naxsi config
|
|
||||||
##
|
|
||||||
# Uncomment it if you installed nginx-naxsi
|
|
||||||
##
|
|
||||||
|
|
||||||
#include /etc/nginx/naxsi_core.rules;
|
|
||||||
|
|
||||||
##
|
|
||||||
# nginx-passenger config
|
|
||||||
##
|
|
||||||
# Uncomment it if you installed nginx-passenger
|
|
||||||
##
|
|
||||||
|
|
||||||
#passenger_root /usr;
|
|
||||||
#passenger_ruby /usr/bin/ruby;
|
|
||||||
|
|
||||||
##
|
|
||||||
# WebSocket proxying
|
|
||||||
##
|
|
||||||
map $http_upgrade $connection_upgrade {
|
|
||||||
default upgrade;
|
|
||||||
'' close;
|
|
||||||
}
|
|
||||||
|
|
||||||
##
|
|
||||||
# Virtual Host Configs
|
|
||||||
##
|
|
||||||
include /etc/nginx/conf.d/*.conf;
|
|
||||||
include /config/nginx/site-confs/*;
|
|
||||||
lua_load_resty_core off;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
#mail {
|
|
||||||
# # See sample authentication script at:
|
|
||||||
# # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript
|
|
||||||
#
|
|
||||||
# # auth_http localhost/auth.php;
|
|
||||||
# # pop3_capabilities "TOP" "USER";
|
|
||||||
# # imap_capabilities "IMAP4rev1" "UIDPLUS";
|
|
||||||
#
|
|
||||||
# server {
|
|
||||||
# listen localhost:110;
|
|
||||||
# protocol pop3;
|
|
||||||
# proxy on;
|
|
||||||
# }
|
|
||||||
#
|
|
||||||
# server {
|
|
||||||
# listen localhost:143;
|
|
||||||
# protocol imap;
|
|
||||||
# proxy on;
|
|
||||||
# }
|
|
||||||
#}
|
|
||||||
daemon off;
|
|
32
root/defaults/nginx/authelia-location.conf.sample
Normal file
32
root/defaults/nginx/authelia-location.conf.sample
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
## Version 2024/03/14 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx/authelia-location.conf.sample
|
||||||
|
# Make sure that your authelia container is in the same user defined bridge network and is named authelia
|
||||||
|
# Rename /config/nginx/proxy-confs/authelia.subdomain.conf.sample to /config/nginx/proxy-confs/authelia.subdomain.conf
|
||||||
|
# For authelia 4.37 and below, make sure that the authelia configuration.yml has 'path: "authelia"' defined
|
||||||
|
# For authelia 4.38 and above, make sure that the authelia configuration.yml has 'address: "tcp://:9091/authelia"' defined
|
||||||
|
|
||||||
|
## Send a subrequest to Authelia to verify if the user is authenticated and has permission to access the resource
|
||||||
|
## For authelia 4.37 and below, use the following line
|
||||||
|
# auth_request /authelia/api/verify;
|
||||||
|
## For authelia 4.38 and above, use the following line
|
||||||
|
auth_request /authelia/api/authz/auth-request;
|
||||||
|
|
||||||
|
## If the subreqest returns 200 pass to the backend, if the subrequest returns 401 redirect to the portal
|
||||||
|
error_page 401 = @authelia_proxy_signin;
|
||||||
|
|
||||||
|
## Translate the user information response headers from the auth subrequest into variables
|
||||||
|
auth_request_set $email $upstream_http_remote_email;
|
||||||
|
auth_request_set $groups $upstream_http_remote_groups;
|
||||||
|
auth_request_set $name $upstream_http_remote_name;
|
||||||
|
auth_request_set $user $upstream_http_remote_user;
|
||||||
|
|
||||||
|
## Inject the user information into the request made to the actual upstream
|
||||||
|
proxy_set_header Remote-Email $email;
|
||||||
|
proxy_set_header Remote-Groups $groups;
|
||||||
|
proxy_set_header Remote-Name $name;
|
||||||
|
proxy_set_header Remote-User $user;
|
||||||
|
|
||||||
|
## Translate the Set-Cookie response header from the auth subrequest into a variable
|
||||||
|
auth_request_set $set_cookie $upstream_http_set_cookie;
|
||||||
|
|
||||||
|
## Translate the Location response header from the auth subrequest into a variable
|
||||||
|
auth_request_set $signin_url $upstream_http_location;
|
72
root/defaults/nginx/authelia-server.conf.sample
Normal file
72
root/defaults/nginx/authelia-server.conf.sample
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
## Version 2024/03/16 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx/authelia-server.conf.sample
|
||||||
|
# Make sure that your authelia container is in the same user defined bridge network and is named authelia
|
||||||
|
# Rename /config/nginx/proxy-confs/authelia.subdomain.conf.sample to /config/nginx/proxy-confs/authelia.subdomain.conf
|
||||||
|
# For authelia 4.37 and below, make sure that the authelia configuration.yml has 'path: "authelia"' defined
|
||||||
|
# For authelia 4.38 and above, make sure that the authelia configuration.yml has 'address: "tcp://:9091/authelia"' defined
|
||||||
|
|
||||||
|
# location for authelia subfolder requests
|
||||||
|
location ^~ /authelia {
|
||||||
|
auth_request off; # requests to this subfolder must be accessible without authentication
|
||||||
|
|
||||||
|
include /config/nginx/proxy.conf;
|
||||||
|
include /config/nginx/resolver.conf;
|
||||||
|
set $upstream_authelia authelia;
|
||||||
|
proxy_pass http://$upstream_authelia:9091;
|
||||||
|
}
|
||||||
|
|
||||||
|
# location for authelia 4.37 and below auth requests
|
||||||
|
location = /authelia/api/verify {
|
||||||
|
internal;
|
||||||
|
|
||||||
|
include /config/nginx/proxy.conf;
|
||||||
|
include /config/nginx/resolver.conf;
|
||||||
|
set $upstream_authelia authelia;
|
||||||
|
proxy_pass http://$upstream_authelia:9091;
|
||||||
|
|
||||||
|
## Include the Set-Cookie header if present
|
||||||
|
auth_request_set $set_cookie $upstream_http_set_cookie;
|
||||||
|
add_header Set-Cookie $set_cookie;
|
||||||
|
|
||||||
|
proxy_pass_request_body off;
|
||||||
|
proxy_set_header Content-Length "";
|
||||||
|
}
|
||||||
|
|
||||||
|
# location for authelia 4.38 and above auth requests
|
||||||
|
location = /authelia/api/authz/auth-request {
|
||||||
|
internal;
|
||||||
|
|
||||||
|
include /config/nginx/proxy.conf;
|
||||||
|
include /config/nginx/resolver.conf;
|
||||||
|
set $upstream_authelia authelia;
|
||||||
|
proxy_pass http://$upstream_authelia:9091;
|
||||||
|
|
||||||
|
## Include the Set-Cookie header if present
|
||||||
|
auth_request_set $set_cookie $upstream_http_set_cookie;
|
||||||
|
add_header Set-Cookie $set_cookie;
|
||||||
|
|
||||||
|
proxy_pass_request_body off;
|
||||||
|
proxy_set_header Content-Length "";
|
||||||
|
}
|
||||||
|
|
||||||
|
# virtual location for authelia 401 redirects
|
||||||
|
location @authelia_proxy_signin {
|
||||||
|
internal;
|
||||||
|
|
||||||
|
## Include the Set-Cookie header if present
|
||||||
|
auth_request_set $set_cookie $upstream_http_set_cookie;
|
||||||
|
add_header Set-Cookie $set_cookie;
|
||||||
|
|
||||||
|
## Set the $target_url variable based on the original request
|
||||||
|
set_escape_uri $target_url $scheme://$http_host$request_uri;
|
||||||
|
|
||||||
|
## Translate the Location response header from the auth subrequest into a variable
|
||||||
|
auth_request_set $signin_url $upstream_http_location;
|
||||||
|
|
||||||
|
if ($signin_url = '') {
|
||||||
|
## Set the $signin_url variable
|
||||||
|
set $signin_url https://$http_host/authelia/?rd=$target_url;
|
||||||
|
}
|
||||||
|
|
||||||
|
## Redirect to login
|
||||||
|
return 302 $signin_url;
|
||||||
|
}
|
26
root/defaults/nginx/authentik-location.conf.sample
Normal file
26
root/defaults/nginx/authentik-location.conf.sample
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
## Version 2023/04/27 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx/authentik-location.conf.sample
|
||||||
|
# Make sure that your authentik container is in the same user defined bridge network and is named authentik-server
|
||||||
|
# Rename /config/nginx/proxy-confs/authentik.subdomain.conf.sample to /config/nginx/proxy-confs/authentik.subdomain.conf
|
||||||
|
|
||||||
|
## Send a subrequest to Authentik to verify if the user is authenticated and has permission to access the resource
|
||||||
|
auth_request /outpost.goauthentik.io/auth/nginx;
|
||||||
|
|
||||||
|
## If the subreqest returns 200 pass to the backend, if the subrequest returns 401 redirect to the portal
|
||||||
|
error_page 401 = @goauthentik_proxy_signin;
|
||||||
|
|
||||||
|
## Translate the user information response headers from the auth subrequest into variables
|
||||||
|
auth_request_set $authentik_email $upstream_http_x_authentik_email;
|
||||||
|
auth_request_set $authentik_groups $upstream_http_x_authentik_groups;
|
||||||
|
auth_request_set $authentik_name $upstream_http_x_authentik_name;
|
||||||
|
auth_request_set $authentik_uid $upstream_http_x_authentik_uid;
|
||||||
|
auth_request_set $authentik_username $upstream_http_x_authentik_username;
|
||||||
|
|
||||||
|
## Inject the user information into the request made to the actual upstream
|
||||||
|
proxy_set_header X-authentik-email $authentik_email;
|
||||||
|
proxy_set_header X-authentik-groups $authentik_groups;
|
||||||
|
proxy_set_header X-authentik-name $authentik_name;
|
||||||
|
proxy_set_header X-authentik-uid $authentik_uid;
|
||||||
|
proxy_set_header X-authentik-username $authentik_username;
|
||||||
|
|
||||||
|
## Translate the Set-Cookie response header from the auth subrequest into a variable
|
||||||
|
auth_request_set $set_cookie $upstream_http_set_cookie;
|
48
root/defaults/nginx/authentik-server.conf.sample
Normal file
48
root/defaults/nginx/authentik-server.conf.sample
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
## Version 2023/04/27 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx/authentik-server.conf.sample
|
||||||
|
# Make sure that your authentik container is in the same user defined bridge network and is named authentik-server
|
||||||
|
# Rename /config/nginx/proxy-confs/authentik.subdomain.conf.sample to /config/nginx/proxy-confs/authentik.subdomain.conf
|
||||||
|
|
||||||
|
# location for authentik subfolder requests
|
||||||
|
location ^~ /outpost.goauthentik.io {
|
||||||
|
auth_request off; # requests to this subfolder must be accessible without authentication
|
||||||
|
|
||||||
|
include /config/nginx/proxy.conf;
|
||||||
|
include /config/nginx/resolver.conf;
|
||||||
|
set $upstream_authentik authentik-server;
|
||||||
|
proxy_pass http://$upstream_authentik:9000;
|
||||||
|
}
|
||||||
|
|
||||||
|
# location for authentik auth requests
|
||||||
|
location = /outpost.goauthentik.io/auth/nginx {
|
||||||
|
internal;
|
||||||
|
|
||||||
|
include /config/nginx/proxy.conf;
|
||||||
|
include /config/nginx/resolver.conf;
|
||||||
|
set $upstream_authentik authentik-server;
|
||||||
|
proxy_pass http://$upstream_authentik:9000;
|
||||||
|
|
||||||
|
## Include the Set-Cookie header if present
|
||||||
|
auth_request_set $set_cookie $upstream_http_set_cookie;
|
||||||
|
add_header Set-Cookie $set_cookie;
|
||||||
|
|
||||||
|
proxy_pass_request_body off;
|
||||||
|
proxy_set_header Content-Length "";
|
||||||
|
}
|
||||||
|
|
||||||
|
# virtual location for authentik 401 redirects
|
||||||
|
location @goauthentik_proxy_signin {
|
||||||
|
internal;
|
||||||
|
|
||||||
|
## Include the Set-Cookie header if present
|
||||||
|
auth_request_set $set_cookie $upstream_http_set_cookie;
|
||||||
|
add_header Set-Cookie $set_cookie;
|
||||||
|
|
||||||
|
## Set the $target_url variable based on the original request
|
||||||
|
set_escape_uri $target_url $scheme://$http_host$request_uri;
|
||||||
|
|
||||||
|
## Set the $signin_url variable
|
||||||
|
set $signin_url https://$http_host/outpost.goauthentik.io/start?rd=$target_url;
|
||||||
|
|
||||||
|
## Redirect to login
|
||||||
|
return 302 $signin_url;
|
||||||
|
}
|
4
root/defaults/nginx/ldap-location.conf.sample
Normal file
4
root/defaults/nginx/ldap-location.conf.sample
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
## Version 2022/08/20 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx/ldap-location.conf.sample
|
||||||
|
|
||||||
|
auth_request /auth;
|
||||||
|
error_page 401 =200 /ldaplogin;
|
90
root/defaults/nginx/ldap-server.conf.sample
Normal file
90
root/defaults/nginx/ldap-server.conf.sample
Normal file
@ -0,0 +1,90 @@
|
|||||||
|
## Version 2022/08/20 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx/ldap-server.conf.sample
|
||||||
|
## this conf is meant to be used in conjunction with our ldap-auth image: https://github.com/linuxserver/docker-ldap-auth
|
||||||
|
## see the heimdall example in the default site config for info on enabling ldap auth
|
||||||
|
## for further instructions on this conf, see https://github.com/nginxinc/nginx-ldap-auth
|
||||||
|
|
||||||
|
location /ldaplogin {
|
||||||
|
|
||||||
|
set $upstream_auth_app ldap-auth;
|
||||||
|
set $upstream_auth_port 9000;
|
||||||
|
set $upstream_auth_proto http;
|
||||||
|
proxy_pass $upstream_auth_proto://$upstream_auth_app:$upstream_auth_port;
|
||||||
|
proxy_set_header X-Target $request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
|
location = /auth {
|
||||||
|
|
||||||
|
set $upstream_auth_app ldap-auth;
|
||||||
|
set $upstream_auth_port 8888;
|
||||||
|
set $upstream_auth_proto http;
|
||||||
|
proxy_pass $upstream_auth_proto://$upstream_auth_app:$upstream_auth_port;
|
||||||
|
|
||||||
|
proxy_pass_request_body off;
|
||||||
|
proxy_set_header Content-Length "";
|
||||||
|
|
||||||
|
#Before enabling the below caching options, make sure you have the line "proxy_cache_path cache/ keys_zone=auth_cache:10m;" at the bottom your default site config
|
||||||
|
#proxy_cache auth_cache;
|
||||||
|
#proxy_cache_valid 200 10m;
|
||||||
|
#proxy_cache_key "$http_authorization$cookie_nginxauth";
|
||||||
|
|
||||||
|
# As implemented in nginx-ldap-auth-daemon.py, the ldap-auth daemon
|
||||||
|
# communicates with a LDAP server, passing in the following
|
||||||
|
# parameters to specify which user account to authenticate. To
|
||||||
|
# eliminate the need to modify the Python code, this file contains
|
||||||
|
# 'proxy_set_header' directives that set the values of the
|
||||||
|
# parameters. Set or change them as instructed in the comments.
|
||||||
|
#
|
||||||
|
# Parameter Proxy header
|
||||||
|
# ----------- ----------------
|
||||||
|
# url X-Ldap-URL
|
||||||
|
# starttls X-Ldap-Starttls
|
||||||
|
# basedn X-Ldap-BaseDN
|
||||||
|
# binddn X-Ldap-BindDN
|
||||||
|
# bindpasswd X-Ldap-BindPass
|
||||||
|
# cookiename X-CookieName
|
||||||
|
# realm X-Ldap-Realm
|
||||||
|
# template X-Ldap-Template
|
||||||
|
# (Required) Set the URL and port for connecting to the LDAP server,
|
||||||
|
# by replacing 'example.com'.
|
||||||
|
# Do not mix ldaps-style URL and X-Ldap-Starttls as it will not work.
|
||||||
|
proxy_set_header X-Ldap-URL "ldap://example.com";
|
||||||
|
|
||||||
|
# (Optional) Establish a TLS-enabled LDAP session after binding to the
|
||||||
|
# LDAP server.
|
||||||
|
# This is the 'proper' way to establish encrypted TLS connections, see
|
||||||
|
# http://www.openldap.org/faq/data/cache/185.html
|
||||||
|
#proxy_set_header X-Ldap-Starttls "true";
|
||||||
|
|
||||||
|
# (Required) Set the Base DN, by replacing the value enclosed in
|
||||||
|
# double quotes.
|
||||||
|
proxy_set_header X-Ldap-BaseDN "cn=Users,dc=test,dc=local";
|
||||||
|
|
||||||
|
# (Required) Set the Bind DN, by replacing the value enclosed in
|
||||||
|
# double quotes.
|
||||||
|
# If AD, use "root@test.local"
|
||||||
|
proxy_set_header X-Ldap-BindDN "cn=root,dc=test,dc=local";
|
||||||
|
|
||||||
|
# (Required) Set the Bind password, by replacing 'secret'.
|
||||||
|
proxy_set_header X-Ldap-BindPass "secret";
|
||||||
|
|
||||||
|
# (Required) The following directives set the cookie name and pass
|
||||||
|
# it, respectively. They are required for cookie-based
|
||||||
|
# authentication. Comment them out if using HTTP basic
|
||||||
|
# authentication.
|
||||||
|
proxy_set_header X-CookieName "nginxauth";
|
||||||
|
proxy_set_header Cookie nginxauth=$cookie_nginxauth;
|
||||||
|
|
||||||
|
# (Required if using Microsoft Active Directory as the LDAP server)
|
||||||
|
# Set the LDAP template by uncommenting the following directive.
|
||||||
|
#proxy_set_header X-Ldap-Template "(sAMAccountName=%(username)s)";
|
||||||
|
|
||||||
|
# (Optional if using OpenLDAP as the LDAP server) Set the LDAP
|
||||||
|
# template by uncommenting the following directive and replacing
|
||||||
|
# '(cn=%(username)s)' which is the default set in
|
||||||
|
# nginx-ldap-auth-daemon.py.
|
||||||
|
#proxy_set_header X-Ldap-Template "(cn=%(username)s)";
|
||||||
|
# (Optional) Set the realm name, by uncommenting the following
|
||||||
|
# directive and replacing 'Restricted' which is the default set
|
||||||
|
# in nginx-ldap-auth-daemon.py.
|
||||||
|
#proxy_set_header X-Ldap-Realm "Restricted";
|
||||||
|
}
|
37
root/defaults/nginx/proxy.conf.sample
Normal file
37
root/defaults/nginx/proxy.conf.sample
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
## Version 2023/02/09 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx/proxy.conf.sample
|
||||||
|
|
||||||
|
# Timeout if the real server is dead
|
||||||
|
proxy_next_upstream error timeout invalid_header http_500 http_502 http_503;
|
||||||
|
|
||||||
|
# Proxy Connection Settings
|
||||||
|
proxy_buffers 32 4k;
|
||||||
|
proxy_connect_timeout 240;
|
||||||
|
proxy_headers_hash_bucket_size 128;
|
||||||
|
proxy_headers_hash_max_size 1024;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_read_timeout 240;
|
||||||
|
proxy_redirect http:// $scheme://;
|
||||||
|
proxy_send_timeout 240;
|
||||||
|
|
||||||
|
# Proxy Cache and Cookie Settings
|
||||||
|
proxy_cache_bypass $cookie_session;
|
||||||
|
#proxy_cookie_path / "/; Secure"; # enable at your own risk, may break certain apps
|
||||||
|
proxy_no_cache $cookie_session;
|
||||||
|
|
||||||
|
# Proxy Header Settings
|
||||||
|
proxy_set_header Connection $connection_upgrade;
|
||||||
|
proxy_set_header Early-Data $ssl_early_data;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header Proxy "";
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Host $host;
|
||||||
|
proxy_set_header X-Forwarded-Method $request_method;
|
||||||
|
proxy_set_header X-Forwarded-Port $server_port;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header X-Forwarded-Server $host;
|
||||||
|
proxy_set_header X-Forwarded-Ssl on;
|
||||||
|
proxy_set_header X-Forwarded-Uri $request_uri;
|
||||||
|
proxy_set_header X-Original-Method $request_method;
|
||||||
|
proxy_set_header X-Original-URL $scheme://$http_host$request_uri;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
82
root/defaults/nginx/site-confs/default.conf.sample
Normal file
82
root/defaults/nginx/site-confs/default.conf.sample
Normal file
@ -0,0 +1,82 @@
|
|||||||
|
## Version 2024/12/17 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/nginx/site-confs/default.conf.sample
|
||||||
|
|
||||||
|
# redirect all traffic to https
|
||||||
|
server {
|
||||||
|
listen 80 default_server;
|
||||||
|
listen [::]:80 default_server;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# main server block
|
||||||
|
server {
|
||||||
|
listen 443 ssl default_server;
|
||||||
|
listen [::]:443 ssl default_server;
|
||||||
|
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
include /config/nginx/ssl.conf;
|
||||||
|
|
||||||
|
root /config/www;
|
||||||
|
index index.html index.htm index.php;
|
||||||
|
|
||||||
|
# enable subfolder method reverse proxy confs
|
||||||
|
include /config/nginx/proxy-confs/*.subfolder.conf;
|
||||||
|
|
||||||
|
# enable for ldap auth (requires ldap-location.conf in the location block)
|
||||||
|
#include /config/nginx/ldap-server.conf;
|
||||||
|
|
||||||
|
# enable for Authelia (requires authelia-location.conf in the location block)
|
||||||
|
#include /config/nginx/authelia-server.conf;
|
||||||
|
|
||||||
|
# enable for Authentik (requires authentik-location.conf in the location block)
|
||||||
|
#include /config/nginx/authentik-server.conf;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
# enable for basic auth
|
||||||
|
#auth_basic "Restricted";
|
||||||
|
#auth_basic_user_file /config/nginx/.htpasswd;
|
||||||
|
|
||||||
|
# enable for ldap auth (requires ldap-server.conf in the server block)
|
||||||
|
#include /config/nginx/ldap-location.conf;
|
||||||
|
|
||||||
|
# enable for Authelia (requires authelia-server.conf in the server block)
|
||||||
|
#include /config/nginx/authelia-location.conf;
|
||||||
|
|
||||||
|
# enable for Authentik (requires authentik-server.conf in the server block)
|
||||||
|
#include /config/nginx/authentik-location.conf;
|
||||||
|
|
||||||
|
try_files $uri $uri/ /index.html /index.htm /index.php$is_args$args;
|
||||||
|
}
|
||||||
|
|
||||||
|
location ~ ^(.+\.php)(.*)$ {
|
||||||
|
# enable the next two lines for http auth
|
||||||
|
#auth_basic "Restricted";
|
||||||
|
#auth_basic_user_file /config/nginx/.htpasswd;
|
||||||
|
|
||||||
|
# enable for ldap auth (requires ldap-server.conf in the server block)
|
||||||
|
#include /config/nginx/ldap-location.conf;
|
||||||
|
|
||||||
|
# enable for Authelia (requires authelia-server.conf in the server block)
|
||||||
|
#include /config/nginx/authelia-location.conf;
|
||||||
|
|
||||||
|
# enable for Authentik (requires authentik-server.conf in the server block)
|
||||||
|
#include /config/nginx/authentik-location.conf;
|
||||||
|
|
||||||
|
fastcgi_split_path_info ^(.+\.php)(.*)$;
|
||||||
|
if (!-f $document_root$fastcgi_script_name) { return 404; }
|
||||||
|
fastcgi_pass 127.0.0.1:9000;
|
||||||
|
fastcgi_index index.php;
|
||||||
|
include /etc/nginx/fastcgi_params;
|
||||||
|
}
|
||||||
|
|
||||||
|
# deny access to .htaccess/.htpasswd files
|
||||||
|
location ~ /\.ht {
|
||||||
|
deny all;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# enable subdomain method reverse proxy confs
|
||||||
|
include /config/nginx/proxy-confs/*.subdomain.conf;
|
@ -1,33 +0,0 @@
|
|||||||
## Version 2020/09/01 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/proxy.conf
|
|
||||||
|
|
||||||
client_body_buffer_size 128k;
|
|
||||||
|
|
||||||
#Timeout if the real server is dead
|
|
||||||
proxy_next_upstream error timeout invalid_header http_500 http_502 http_503;
|
|
||||||
|
|
||||||
# Advanced Proxy Config
|
|
||||||
send_timeout 5m;
|
|
||||||
proxy_read_timeout 240;
|
|
||||||
proxy_send_timeout 240;
|
|
||||||
proxy_connect_timeout 240;
|
|
||||||
|
|
||||||
# TLS 1.3 early data
|
|
||||||
proxy_set_header Early-Data $ssl_early_data;
|
|
||||||
|
|
||||||
# Basic Proxy Config
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header X-Forwarded-Proto https;
|
|
||||||
proxy_set_header X-Forwarded-Host $host;
|
|
||||||
proxy_set_header X-Forwarded-Ssl on;
|
|
||||||
proxy_redirect http:// $scheme://;
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header Connection $connection_upgrade;
|
|
||||||
#proxy_cookie_path / "/; HTTPOnly; Secure"; # enable at your own risk, may break certain apps
|
|
||||||
proxy_cache_bypass $cookie_session;
|
|
||||||
proxy_no_cache $cookie_session;
|
|
||||||
proxy_buffers 32 4k;
|
|
||||||
proxy_headers_hash_bucket_size 128;
|
|
||||||
proxy_headers_hash_max_size 1024;
|
|
@ -1,48 +0,0 @@
|
|||||||
## Version 2020/06/17 - Changelog: https://github.com/linuxserver/docker-swag/commits/master/root/defaults/ssl.conf
|
|
||||||
|
|
||||||
### Mozilla Recommendations
|
|
||||||
# generated 2020-06-17, Mozilla Guideline v5.4, nginx 1.18.0-r0, OpenSSL 1.1.1g-r0, intermediate configuration
|
|
||||||
# https://ssl-config.mozilla.org/#server=nginx&version=1.18.0-r0&config=intermediate&openssl=1.1.1g-r0&guideline=5.4
|
|
||||||
|
|
||||||
ssl_session_timeout 1d;
|
|
||||||
ssl_session_cache shared:MozSSL:10m; # about 40000 sessions
|
|
||||||
ssl_session_tickets off;
|
|
||||||
|
|
||||||
# intermediate configuration
|
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
|
||||||
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384;
|
|
||||||
ssl_prefer_server_ciphers off;
|
|
||||||
|
|
||||||
# OCSP stapling
|
|
||||||
ssl_stapling on;
|
|
||||||
ssl_stapling_verify on;
|
|
||||||
|
|
||||||
|
|
||||||
### Linuxserver.io Defaults
|
|
||||||
|
|
||||||
# Certificates
|
|
||||||
ssl_certificate /config/keys/letsencrypt/fullchain.pem;
|
|
||||||
ssl_certificate_key /config/keys/letsencrypt/privkey.pem;
|
|
||||||
# verify chain of trust of OCSP response using Root CA and Intermediate certs
|
|
||||||
ssl_trusted_certificate /config/keys/letsencrypt/fullchain.pem;
|
|
||||||
|
|
||||||
# Diffie-Hellman Parameters
|
|
||||||
ssl_dhparam /config/nginx/dhparams.pem;
|
|
||||||
|
|
||||||
# Resolver
|
|
||||||
resolver 127.0.0.11 valid=30s; # Docker DNS Server
|
|
||||||
|
|
||||||
# Enable TLS 1.3 early data
|
|
||||||
ssl_early_data on;
|
|
||||||
|
|
||||||
# HSTS, remove # from the line below to enable HSTS
|
|
||||||
#add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload" always;
|
|
||||||
|
|
||||||
# Optional additional headers
|
|
||||||
#add_header Content-Security-Policy "upgrade-insecure-requests";
|
|
||||||
#add_header X-Frame-Options "SAMEORIGIN" always;
|
|
||||||
#add_header X-XSS-Protection "1; mode=block" always;
|
|
||||||
#add_header X-Content-Type-Options "nosniff" always;
|
|
||||||
#add_header X-UA-Compatible "IE=Edge" always;
|
|
||||||
#add_header Cache-Control "no-transform" always;
|
|
||||||
#add_header Referrer-Policy "same-origin" always;
|
|
39
root/defaults/www/index.html
Normal file
39
root/defaults/www/index.html
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Welcome to your SWAG instance</title>
|
||||||
|
<style>
|
||||||
|
body{
|
||||||
|
font-family: Helvetica, Arial, sans-serif;
|
||||||
|
}
|
||||||
|
.message{
|
||||||
|
width:440px;
|
||||||
|
padding:20px 40px;
|
||||||
|
margin:0 auto;
|
||||||
|
background-color:#f9f9f9;
|
||||||
|
border:1px solid #ddd;
|
||||||
|
color: #1e3d62;
|
||||||
|
}
|
||||||
|
center{
|
||||||
|
margin:40px 0;
|
||||||
|
}
|
||||||
|
h1{
|
||||||
|
font-size: 18px;
|
||||||
|
line-height: 26px;
|
||||||
|
}
|
||||||
|
p{
|
||||||
|
font-size: 12px;
|
||||||
|
}
|
||||||
|
a{
|
||||||
|
color: rgb(207, 48, 139);
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<div class="message">
|
||||||
|
<h1>Welcome to your <a target="_blank" href="https://github.com/linuxserver/docker-swag">SWAG</a> instance</h1>
|
||||||
|
<p>A webserver and reverse proxy solution brought to you by <a target="_blank" href="https://www.linuxserver.io/">linuxserver.io</a> with php support and a built-in Certbot client.</p>
|
||||||
|
<p>We have an article on how to use swag here: <a target="_blank" href="https://docs.linuxserver.io/general/swag">docs.linuxserver.io</a></p>
|
||||||
|
<p>For help and support, please visit: <a target="_blank" href="https://www.linuxserver.io/support">linuxserver.io/support</a></p>
|
||||||
|
</div>
|
||||||
|
</body>
|
||||||
|
</html>
|
@ -1,302 +0,0 @@
|
|||||||
#!/usr/bin/with-contenv bash
|
|
||||||
|
|
||||||
# Display variables for troubleshooting
|
|
||||||
echo -e "Variables set:\\n\
|
|
||||||
PUID=${PUID}\\n\
|
|
||||||
PGID=${PGID}\\n\
|
|
||||||
TZ=${TZ}\\n\
|
|
||||||
URL=${URL}\\n\
|
|
||||||
SUBDOMAINS=${SUBDOMAINS}\\n\
|
|
||||||
EXTRA_DOMAINS=${EXTRA_DOMAINS}\\n\
|
|
||||||
ONLY_SUBDOMAINS=${ONLY_SUBDOMAINS}\\n\
|
|
||||||
VALIDATION=${VALIDATION}\\n\
|
|
||||||
DNSPLUGIN=${DNSPLUGIN}\\n\
|
|
||||||
EMAIL=${EMAIL}\\n\
|
|
||||||
STAGING=${STAGING}\\n"
|
|
||||||
|
|
||||||
# Echo init finish for test runs
|
|
||||||
if [ -n "${TEST_RUN}" ]; then
|
|
||||||
echo '[services.d] done.'
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Sanitize variables
|
|
||||||
SANED_VARS=( DNSPLUGIN EMAIL EXTRA_DOMAINS ONLY_SUBDOMAINS STAGING SUBDOMAINS URL VALIDATION )
|
|
||||||
for i in "${SANED_VARS[@]}"
|
|
||||||
do
|
|
||||||
export echo "$i"="${!i//\"/}"
|
|
||||||
export echo "$i"="$(echo "${!i}" | tr '[:upper:]' '[:lower:]')"
|
|
||||||
done
|
|
||||||
|
|
||||||
# check to make sure that the required variables are set
|
|
||||||
[[ -z "$URL" ]] && \
|
|
||||||
echo "Please pass your URL as an environment variable in your docker run command. See docker info for more details." && \
|
|
||||||
sleep infinity
|
|
||||||
|
|
||||||
# make our folders and links
|
|
||||||
mkdir -p \
|
|
||||||
/config/{log/letsencrypt,log/fail2ban,etc/letsencrypt,fail2ban,crontabs,dns-conf,geoip2db} \
|
|
||||||
/var/run/fail2ban
|
|
||||||
rm -rf /etc/letsencrypt
|
|
||||||
ln -s /config/etc/letsencrypt /etc/letsencrypt
|
|
||||||
|
|
||||||
# copy dns default configs
|
|
||||||
cp -n /defaults/dns-conf/* /config/dns-conf/
|
|
||||||
chown -R abc:abc /config/dns-conf
|
|
||||||
|
|
||||||
# copy reverse proxy configs
|
|
||||||
cp -R /defaults/proxy-confs /config/nginx/
|
|
||||||
# remove outdated files (remove this action after 2020/10/17)
|
|
||||||
rm -f /config/nginx/proxy-confs/seafile.subdomain.config.sample /config/nginx/proxy-confs/librespeed.subdomain.com.sample
|
|
||||||
|
|
||||||
# copy/update the fail2ban config defaults to/in /config
|
|
||||||
cp -R /defaults/fail2ban/filter.d /config/fail2ban/
|
|
||||||
cp -R /defaults/fail2ban/action.d /config/fail2ban/
|
|
||||||
# if jail.local is missing in /config, copy default
|
|
||||||
[[ ! -f /config/fail2ban/jail.local ]] && \
|
|
||||||
cp /defaults/jail.local /config/fail2ban/jail.local
|
|
||||||
# Replace fail2ban config with user config
|
|
||||||
[[ -d /etc/fail2ban/filter.d ]] && \
|
|
||||||
rm -rf /etc/fail2ban/filter.d
|
|
||||||
[[ -d /etc/fail2ban/action.d ]] && \
|
|
||||||
rm -rf /etc/fail2ban/action.d
|
|
||||||
cp -R /config/fail2ban/filter.d /etc/fail2ban/
|
|
||||||
cp -R /config/fail2ban/action.d /etc/fail2ban/
|
|
||||||
cp /defaults/fail2ban/fail2ban.local /etc/fail2ban/
|
|
||||||
cp /config/fail2ban/jail.local /etc/fail2ban/jail.local
|
|
||||||
|
|
||||||
# copy crontab and proxy defaults if needed
|
|
||||||
[[ ! -f /config/crontabs/root ]] && \
|
|
||||||
cp /etc/crontabs/root /config/crontabs/
|
|
||||||
[[ ! -f /config/nginx/proxy.conf ]] && \
|
|
||||||
cp /defaults/proxy.conf /config/nginx/proxy.conf
|
|
||||||
[[ ! -f /config/nginx/ssl.conf ]] && \
|
|
||||||
cp /defaults/ssl.conf /config/nginx/ssl.conf
|
|
||||||
[[ ! -f /config/nginx/ldap.conf ]] && \
|
|
||||||
cp /defaults/ldap.conf /config/nginx/ldap.conf
|
|
||||||
[[ ! -f /config/nginx/authelia-server.conf ]] && \
|
|
||||||
cp /defaults/authelia-server.conf /config/nginx/authelia-server.conf
|
|
||||||
[[ ! -f /config/nginx/authelia-location.conf ]] && \
|
|
||||||
cp /defaults/authelia-location.conf /config/nginx/authelia-location.conf
|
|
||||||
|
|
||||||
# copy pre-generated dhparams or generate if needed
|
|
||||||
[[ ! -f /config/nginx/dhparams.pem ]] && \
|
|
||||||
cp /defaults/dhparams.pem /config/nginx/dhparams.pem
|
|
||||||
if ! grep -q 'PARAMETERS' "/config/nginx/dhparams.pem"; then
|
|
||||||
curl -o /config/nginx/dhparams.pem -L "https://lsio.ams3.digitaloceanspaces.com/dhparams.pem"
|
|
||||||
fi
|
|
||||||
if ! grep -q 'PARAMETERS' "/config/nginx/dhparams.pem"; then
|
|
||||||
echo "Generating dhparams.pem. This will take a long time. Do not stop the container until this process is completed."
|
|
||||||
openssl dhparam -out /config/nginx/dhparams.pem 4096
|
|
||||||
fi
|
|
||||||
|
|
||||||
# check to make sure DNSPLUGIN is selected if dns validation is used
|
|
||||||
[[ "$VALIDATION" = "dns" ]] && [[ ! "$DNSPLUGIN" =~ ^(aliyun|cloudflare|cloudxns|cpanel|digitalocean|dnsimple|dnsmadeeasy|domeneshop|gandi|google|inwx|linode|luadns|nsone|ovh|rfc2136|route53|transip)$ ]] && \
|
|
||||||
echo "Please set the DNSPLUGIN variable to a valid plugin name. See docker info for more details." && \
|
|
||||||
sleep infinity
|
|
||||||
|
|
||||||
# import user crontabs
|
|
||||||
rm /etc/crontabs/*
|
|
||||||
cp /config/crontabs/* /etc/crontabs/
|
|
||||||
|
|
||||||
# create original config file if it doesn't exist
|
|
||||||
if [ ! -f "/config/donoteditthisfile.conf" ]; then
|
|
||||||
echo -e "ORIGURL=\"$URL\" ORIGSUBDOMAINS=\"$SUBDOMAINS\" ORIGONLY_SUBDOMAINS=\"$ONLY_SUBDOMAINS\" ORIGEXTRA_DOMAINS=\"$EXTRA_DOMAINS\" ORIGVALIDATION=\"$VALIDATION\" ORIGDNSPLUGIN=\"$DNSPLUGIN\" ORIGPROPAGATION=\"$PROPAGATION\" ORIGSTAGING=\"$STAGING\" ORIGDUCKDNSTOKEN=\"$DUCKDNSTOKEN\"" > /config/donoteditthisfile.conf
|
|
||||||
echo "Created donoteditthisfile.conf"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# load original config settings
|
|
||||||
# shellcheck disable=SC1091
|
|
||||||
. /config/donoteditthisfile.conf
|
|
||||||
|
|
||||||
# set default validation to http
|
|
||||||
if [ -z "$VALIDATION" ]; then
|
|
||||||
VALIDATION="http"
|
|
||||||
echo "VALIDATION parameter not set; setting it to http"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# if staging is set to true, use the staging server
|
|
||||||
if [ "$STAGING" = "true" ]; then
|
|
||||||
echo "NOTICE: Staging is active"
|
|
||||||
ACMESERVER="https://acme-staging-v02.api.letsencrypt.org/directory"
|
|
||||||
else
|
|
||||||
ACMESERVER="https://acme-v02.api.letsencrypt.org/directory"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# figuring out url only vs url & subdomains vs subdomains only
|
|
||||||
if [ -n "$SUBDOMAINS" ]; then
|
|
||||||
echo "SUBDOMAINS entered, processing"
|
|
||||||
if [ "$SUBDOMAINS" = "wildcard" ]; then
|
|
||||||
if [ "$ONLY_SUBDOMAINS" = true ]; then
|
|
||||||
export URL_REAL="-d *.${URL}"
|
|
||||||
echo "Wildcard cert for only the subdomains of $URL will be requested"
|
|
||||||
else
|
|
||||||
export URL_REAL="-d *.${URL} -d ${URL}"
|
|
||||||
echo "Wildcard cert for $URL will be requested"
|
|
||||||
fi
|
|
||||||
else
|
|
||||||
echo "SUBDOMAINS entered, processing"
|
|
||||||
for job in $(echo "$SUBDOMAINS" | tr "," " "); do
|
|
||||||
export SUBDOMAINS_REAL="$SUBDOMAINS_REAL -d ${job}.${URL}"
|
|
||||||
done
|
|
||||||
if [ "$ONLY_SUBDOMAINS" = true ]; then
|
|
||||||
URL_REAL="$SUBDOMAINS_REAL"
|
|
||||||
echo "Only subdomains, no URL in cert"
|
|
||||||
else
|
|
||||||
URL_REAL="-d ${URL}${SUBDOMAINS_REAL}"
|
|
||||||
fi
|
|
||||||
echo "Sub-domains processed are: $SUBDOMAINS_REAL"
|
|
||||||
fi
|
|
||||||
else
|
|
||||||
echo "No subdomains defined"
|
|
||||||
URL_REAL="-d $URL"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# add extra domains
|
|
||||||
if [ -n "$EXTRA_DOMAINS" ]; then
|
|
||||||
echo "EXTRA_DOMAINS entered, processing"
|
|
||||||
for job in $(echo "$EXTRA_DOMAINS" | tr "," " "); do
|
|
||||||
export EXTRA_DOMAINS_REAL="$EXTRA_DOMAINS_REAL -d ${job}"
|
|
||||||
done
|
|
||||||
echo "Extra domains processed are: $EXTRA_DOMAINS_REAL"
|
|
||||||
URL_REAL="$URL_REAL $EXTRA_DOMAINS_REAL"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# figuring out whether to use e-mail and which
|
|
||||||
if [[ $EMAIL == *@* ]]; then
|
|
||||||
echo "E-mail address entered: ${EMAIL}"
|
|
||||||
EMAILPARAM="-m ${EMAIL} --no-eff-email"
|
|
||||||
else
|
|
||||||
echo "No e-mail address entered or address invalid"
|
|
||||||
EMAILPARAM="--register-unsafely-without-email"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# setting the validation method to use
|
|
||||||
if [ "$VALIDATION" = "dns" ]; then
|
|
||||||
if [ "$DNSPLUGIN" = "route53" ]; then
|
|
||||||
if [ -n "$PROPAGATION" ];then PROPAGATIONPARAM="--dns-${DNSPLUGIN}-propagation-seconds ${PROPAGATION}"; fi
|
|
||||||
PREFCHAL="--dns-${DNSPLUGIN} ${PROPAGATIONPARAM} --manual-public-ip-logging-ok"
|
|
||||||
elif [[ "$DNSPLUGIN" =~ ^(cpanel)$ ]]; then
|
|
||||||
if [ -n "$PROPAGATION" ];then PROPAGATIONPARAM="--certbot-dns-${DNSPLUGIN}:${DNSPLUGIN}-propagation-seconds ${PROPAGATION}"; fi
|
|
||||||
PREFCHAL="-a certbot-dns-${DNSPLUGIN}:${DNSPLUGIN} --certbot-dns-${DNSPLUGIN}:${DNSPLUGIN}-credentials /config/dns-conf/${DNSPLUGIN}.ini ${PROPAGATIONPARAM} --manual-public-ip-logging-ok"
|
|
||||||
elif [[ "$DNSPLUGIN" =~ ^(gandi)$ ]]; then
|
|
||||||
if [ -n "$PROPAGATION" ];then echo "Gandi dns plugin does not support setting propagation time"; fi
|
|
||||||
PREFCHAL="-a certbot-plugin-${DNSPLUGIN}:dns --certbot-plugin-${DNSPLUGIN}:dns-credentials /config/dns-conf/${DNSPLUGIN}.ini --manual-public-ip-logging-ok"
|
|
||||||
elif [[ "$DNSPLUGIN" =~ ^(google)$ ]]; then
|
|
||||||
if [ -n "$PROPAGATION" ];then PROPAGATIONPARAM="--dns-${DNSPLUGIN}-propagation-seconds ${PROPAGATION}"; fi
|
|
||||||
PREFCHAL="--dns-${DNSPLUGIN} --dns-${DNSPLUGIN}-credentials /config/dns-conf/${DNSPLUGIN}.json ${PROPAGATIONPARAM} --manual-public-ip-logging-ok"
|
|
||||||
elif [[ "$DNSPLUGIN" =~ ^(aliyun|domeneshop|inwx|transip)$ ]]; then
|
|
||||||
if [ -n "$PROPAGATION" ];then PROPAGATIONPARAM="--certbot-dns-${DNSPLUGIN}:dns-${DNSPLUGIN}-propagation-seconds ${PROPAGATION}"; fi
|
|
||||||
PREFCHAL="-a certbot-dns-${DNSPLUGIN}:dns-${DNSPLUGIN} --certbot-dns-${DNSPLUGIN}:dns-${DNSPLUGIN}-credentials /config/dns-conf/${DNSPLUGIN}.ini ${PROPAGATIONPARAM} --manual-public-ip-logging-ok"
|
|
||||||
else
|
|
||||||
if [ -n "$PROPAGATION" ];then PROPAGATIONPARAM="--dns-${DNSPLUGIN}-propagation-seconds ${PROPAGATION}"; fi
|
|
||||||
PREFCHAL="--dns-${DNSPLUGIN} --dns-${DNSPLUGIN}-credentials /config/dns-conf/${DNSPLUGIN}.ini ${PROPAGATIONPARAM} --manual-public-ip-logging-ok"
|
|
||||||
fi
|
|
||||||
echo "${VALIDATION} validation via ${DNSPLUGIN} plugin is selected"
|
|
||||||
elif [ "$VALIDATION" = "tls-sni" ]; then
|
|
||||||
PREFCHAL="--non-interactive --standalone --preferred-challenges http"
|
|
||||||
echo "*****tls-sni validation has been deprecated, attempting http validation instead"
|
|
||||||
elif [ "$VALIDATION" = "duckdns" ]; then
|
|
||||||
PREFCHAL="--non-interactive --manual --preferred-challenges dns --manual-public-ip-logging-ok --manual-auth-hook /app/duckdns-txt"
|
|
||||||
chmod +x /app/duckdns-txt
|
|
||||||
echo "duckdns validation is selected"
|
|
||||||
if [ "$SUBDOMAINS" = "wildcard" ]; then
|
|
||||||
echo "the resulting certificate will only cover the subdomains due to a limitation of duckdns, so it is advised to set the root location to use www.subdomain.duckdns.org"
|
|
||||||
export URL_REAL="-d *.${URL}"
|
|
||||||
else
|
|
||||||
echo "the resulting certificate will only cover the main domain due to a limitation of duckdns, ie. subdomain.duckdns.org"
|
|
||||||
export URL_REAL="-d ${URL}"
|
|
||||||
fi
|
|
||||||
else
|
|
||||||
PREFCHAL="--non-interactive --standalone --preferred-challenges http"
|
|
||||||
echo "http validation is selected"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# setting the symlink for key location
|
|
||||||
rm -rf /config/keys/letsencrypt
|
|
||||||
if [ "$ONLY_SUBDOMAINS" = "true" ] && [ ! "$SUBDOMAINS" = "wildcard" ] ; then
|
|
||||||
DOMAIN="$(echo "$SUBDOMAINS" | tr ',' ' ' | awk '{print $1}').${URL}"
|
|
||||||
ln -s ../etc/letsencrypt/live/"$DOMAIN" /config/keys/letsencrypt
|
|
||||||
else
|
|
||||||
ln -s ../etc/letsencrypt/live/"$URL" /config/keys/letsencrypt
|
|
||||||
fi
|
|
||||||
|
|
||||||
# checking for changes in cert variables, revoking certs if necessary
|
|
||||||
if [ ! "$URL" = "$ORIGURL" ] || [ ! "$SUBDOMAINS" = "$ORIGSUBDOMAINS" ] || [ ! "$ONLY_SUBDOMAINS" = "$ORIGONLY_SUBDOMAINS" ] || [ ! "$EXTRA_DOMAINS" = "$ORIGEXTRA_DOMAINS" ] || [ ! "$VALIDATION" = "$ORIGVALIDATION" ] || [ ! "$DNSPLUGIN" = "$ORIGDNSPLUGIN" ] || [ ! "$PROPAGATION" = "$ORIGPROPAGATION" ] || [ ! "$STAGING" = "$ORIGSTAGING" ] || [ ! "$DUCKDNSTOKEN" = "$ORIGDUCKDNSTOKEN" ]; then
|
|
||||||
echo "Different validation parameters entered than what was used before. Revoking and deleting existing certificate, and an updated one will be created"
|
|
||||||
if [ "$ORIGONLY_SUBDOMAINS" = "true" ] && [ ! "$ORIGSUBDOMAINS" = "wildcard" ]; then
|
|
||||||
ORIGDOMAIN="$(echo "$ORIGSUBDOMAINS" | tr ',' ' ' | awk '{print $1}').${ORIGURL}"
|
|
||||||
[[ -f /config/etc/letsencrypt/live/"$ORIGDOMAIN"/fullchain.pem ]] && certbot revoke --non-interactive --cert-path /config/etc/letsencrypt/live/"$ORIGDOMAIN"/fullchain.pem
|
|
||||||
else
|
|
||||||
[[ -f /config/etc/letsencrypt/live/"$ORIGURL"/fullchain.pem ]] && certbot revoke --non-interactive --cert-path /config/etc/letsencrypt/live/"$ORIGURL"/fullchain.pem
|
|
||||||
fi
|
|
||||||
rm -rf /config/etc/letsencrypt
|
|
||||||
mkdir -p /config/etc/letsencrypt
|
|
||||||
fi
|
|
||||||
|
|
||||||
# saving new variables
|
|
||||||
echo -e "ORIGURL=\"$URL\" ORIGSUBDOMAINS=\"$SUBDOMAINS\" ORIGONLY_SUBDOMAINS=\"$ONLY_SUBDOMAINS\" ORIGEXTRA_DOMAINS=\"$EXTRA_DOMAINS\" ORIGVALIDATION=\"$VALIDATION\" ORIGDNSPLUGIN=\"$DNSPLUGIN\" ORIGPROPAGATION=\"$PROPAGATION\" ORIGSTAGING=\"$STAGING\" ORIGDUCKDNSTOKEN=\"$DUCKDNSTOKEN\"" > /config/donoteditthisfile.conf
|
|
||||||
|
|
||||||
# alter extension for error message
|
|
||||||
if [ "$DNSPLUGIN" = "google" ]; then
|
|
||||||
FILENAME="$DNSPLUGIN.json"
|
|
||||||
else
|
|
||||||
FILENAME="$DNSPLUGIN.ini"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# generating certs if necessary
|
|
||||||
if [ ! -f "/config/keys/letsencrypt/fullchain.pem" ]; then
|
|
||||||
echo "Generating new certificate"
|
|
||||||
# shellcheck disable=SC2086
|
|
||||||
certbot certonly --renew-by-default --server $ACMESERVER $PREFCHAL --rsa-key-size 4096 $EMAILPARAM --agree-tos $URL_REAL
|
|
||||||
if [ -d /config/keys/letsencrypt ]; then
|
|
||||||
cd /config/keys/letsencrypt || exit
|
|
||||||
else
|
|
||||||
if [ "$VALIDATION" = "dns" ]; then
|
|
||||||
echo "ERROR: Cert does not exist! Please see the validation error above. Make sure you entered correct credentials into the /config/dns-conf/${FILENAME} file."
|
|
||||||
elif [ "$VALIDATION" = "duckdns" ]; then
|
|
||||||
echo "ERROR: Cert does not exist! Please see the validation error above. Make sure your DUCKDNSTOKEN is correct."
|
|
||||||
else
|
|
||||||
echo "ERROR: Cert does not exist! Please see the validation error above. The issue may be due to incorrect dns or port forwarding settings. Please fix your settings and recreate the container"
|
|
||||||
fi
|
|
||||||
sleep infinity
|
|
||||||
fi
|
|
||||||
openssl pkcs12 -export -out privkey.pfx -inkey privkey.pem -in cert.pem -certfile chain.pem -passout pass:
|
|
||||||
sleep 1
|
|
||||||
cat {privkey,fullchain}.pem > priv-fullchain-bundle.pem
|
|
||||||
echo "New certificate generated; starting nginx"
|
|
||||||
else
|
|
||||||
echo "Certificate exists; parameters unchanged; starting nginx"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# create GeoIP2 folder symlink
|
|
||||||
[[ -d /var/lib/libmaxminddb ]] && [[ ! -L /var/lib/libmaxminddb ]] && \
|
|
||||||
rm -rf /var/lib/libmaxminddb
|
|
||||||
[[ ! -d /var/lib/libmaxminddb ]] && \
|
|
||||||
ln -s /config/geoip2db /var/lib/libmaxminddb
|
|
||||||
# check GeoIP2 database
|
|
||||||
if [ -n "$MAXMINDDB_LICENSE_KEY" ]; then
|
|
||||||
sed -i "s|.*MAXMINDDB_LICENSE_KEY.*|MAXMINDDB_LICENSE_KEY=\"${MAXMINDDB_LICENSE_KEY}\"|g" /etc/conf.d/libmaxminddb
|
|
||||||
if [ ! -f /var/lib/libmaxminddb/GeoLite2-City.mmdb ]; then
|
|
||||||
echo "Downloading GeoIP2 City database."
|
|
||||||
/etc/periodic/weekly/libmaxminddb
|
|
||||||
fi
|
|
||||||
elif [ -f /var/lib/libmaxminddb/GeoLite2-City.mmdb ]; then
|
|
||||||
echo -e "Currently using the user provided GeoLite2-City.mmdb.\nIf you want to enable weekly auto-updates of the database, retrieve a free license key from MaxMind,\nand add a new env variable \"MAXMINDDB_LICENSE_KEY\", set to your license key."
|
|
||||||
else
|
|
||||||
echo -e "Starting 2019/12/30, GeoIP2 databases require personal license key to download. Please retrieve a free license key from MaxMind,\nand add a new env variable \"MAXMINDDB_LICENSE_KEY\", set to your license key."
|
|
||||||
fi
|
|
||||||
|
|
||||||
# logfiles needed by fail2ban
|
|
||||||
[[ ! -f /config/log/nginx/error.log ]] && \
|
|
||||||
touch /config/log/nginx/error.log
|
|
||||||
[[ ! -f /config/log/nginx/access.log ]] && \
|
|
||||||
touch /config/log/nginx/access.log
|
|
||||||
|
|
||||||
# permissions
|
|
||||||
chown -R abc:abc \
|
|
||||||
/config
|
|
||||||
chmod -R 0644 /etc/logrotate.d
|
|
||||||
chmod -R +r /config/log
|
|
||||||
chmod +x /app/le-renew.sh
|
|
||||||
chmod 700 /defaults/dns-conf
|
|
||||||
chmod 600 /defaults/dns-conf/*
|
|
@ -1,9 +1,8 @@
|
|||||||
# do daily/weekly/monthly maintenance
|
|
||||||
# min hour day month weekday command
|
# min hour day month weekday command
|
||||||
*/15 * * * * run-parts /etc/periodic/15min
|
*/15 * * * * run-parts /etc/periodic/15min
|
||||||
0 * * * * run-parts /etc/periodic/hourly
|
0 * * * * run-parts /etc/periodic/hourly
|
||||||
0 2 * * * run-parts /etc/periodic/daily
|
0 2 * * * run-parts /etc/periodic/daily
|
||||||
0 3 * * 6 run-parts /etc/periodic/weekly
|
0 3 * * 6 run-parts /etc/periodic/weekly
|
||||||
0 5 1 * * run-parts /etc/periodic/monthly
|
0 5 1 * * run-parts /etc/periodic/monthly
|
||||||
# renew letsencrypt certs
|
|
||||||
8 2 * * * /app/le-renew.sh >> /config/log/letsencrypt/letsencrypt.log 2>&1
|
8 2 * * * /app/le-renew.sh >> /config/log/letsencrypt/renewal.log 2>&1
|
||||||
|
@ -1,11 +1,11 @@
|
|||||||
/config/log/letsencrypt/*.log {
|
/config/log/letsencrypt/*.log {
|
||||||
weekly
|
weekly
|
||||||
rotate 52
|
rotate 52
|
||||||
compress
|
compress
|
||||||
delaycompress
|
delaycompress
|
||||||
nodateext
|
nodateext
|
||||||
missingok
|
missingok
|
||||||
notifempty
|
notifempty
|
||||||
sharedscripts
|
sharedscripts
|
||||||
su abc abc
|
su abc abc
|
||||||
}
|
}
|
||||||
|
367
root/etc/s6-overlay/s6-rc.d/init-certbot-config/run
Executable file
367
root/etc/s6-overlay/s6-rc.d/init-certbot-config/run
Executable file
@ -0,0 +1,367 @@
|
|||||||
|
#!/usr/bin/with-contenv bash
|
||||||
|
# shellcheck shell=bash
|
||||||
|
|
||||||
|
# Display variables for troubleshooting
|
||||||
|
echo -e "Variables set:\\n\
|
||||||
|
PUID=${PUID}\\n\
|
||||||
|
PGID=${PGID}\\n\
|
||||||
|
TZ=${TZ}\\n\
|
||||||
|
URL=${URL}\\n\
|
||||||
|
SUBDOMAINS=${SUBDOMAINS}\\n\
|
||||||
|
EXTRA_DOMAINS=${EXTRA_DOMAINS}\\n\
|
||||||
|
ONLY_SUBDOMAINS=${ONLY_SUBDOMAINS}\\n\
|
||||||
|
VALIDATION=${VALIDATION}\\n\
|
||||||
|
CERTPROVIDER=${CERTPROVIDER}\\n\
|
||||||
|
DNSPLUGIN=${DNSPLUGIN}\\n\
|
||||||
|
EMAIL=${EMAIL}\\n\
|
||||||
|
STAGING=${STAGING}\\n"
|
||||||
|
|
||||||
|
# Sanitize variables
|
||||||
|
SANED_VARS=(DNSPLUGIN EMAIL EXTRA_DOMAINS ONLY_SUBDOMAINS STAGING SUBDOMAINS URL VALIDATION CERTPROVIDER)
|
||||||
|
for i in "${SANED_VARS[@]}"; do
|
||||||
|
export echo "${i}"="${!i//\"/}"
|
||||||
|
export echo "${i}"="$(echo "${!i}" | tr '[:upper:]' '[:lower:]')"
|
||||||
|
done
|
||||||
|
|
||||||
|
# Check for and install requested DNS plugins
|
||||||
|
if grep -q "universal-package-install" <<< "${DOCKER_MODS}" && grep -q "certbot-dns" <<< "${INSTALL_PIP_PACKAGES}"; then
|
||||||
|
echo "**** Installing requested dns plugins ****"
|
||||||
|
/etc/s6-overlay/s6-rc.d/init-mod-universal-package-install-add-package/run
|
||||||
|
/etc/s6-overlay/s6-rc.d/init-mods-package-install/run
|
||||||
|
fi
|
||||||
|
|
||||||
|
# check to make sure DNSPLUGIN is selected if dns validation is used
|
||||||
|
CERTBOT_DNS_AUTHENTICATORS=$(certbot plugins --authenticators 2>/dev/null | sed -e 's/^Entry point: EntryPoint(name='\''cpanel'\''/Entry point: EntryPoint(name='\''dns-cpanel'\''/' -e '/EntryPoint(name='\''dns-/!d' -e 's/^Entry point: EntryPoint(name='\''dns-\([^ ]*\)'\'',/\1/' | sort)
|
||||||
|
if [[ "${VALIDATION}" = "dns" ]] && ! echo "${CERTBOT_DNS_AUTHENTICATORS}" | grep -q "${DNSPLUGIN}"; then
|
||||||
|
echo "Please set the DNSPLUGIN variable to one of the following:"
|
||||||
|
echo "${CERTBOT_DNS_AUTHENTICATORS}"
|
||||||
|
sleep infinity
|
||||||
|
fi
|
||||||
|
|
||||||
|
# set_ini_value logic:
|
||||||
|
# - if the name is not found in the file, append the name=value to the end of the file
|
||||||
|
# - if the name is found in the file, replace the value
|
||||||
|
# - if the name is found in the file but commented out, uncomment the line and replace the value
|
||||||
|
# call set_ini_value with parameters: $1=name $2=value $3=file
|
||||||
|
function set_ini_value() {
|
||||||
|
name=${1//\//\\/}
|
||||||
|
value=${2//\//\\/}
|
||||||
|
sed -i \
|
||||||
|
-e '/^#\?\(\s*'"${name}"'\s*=\s*\).*/{s//\1'"${value}"'/;:a;n;ba;q}' \
|
||||||
|
-e '$a'"${name}"'='"${value}" "${3}"
|
||||||
|
}
|
||||||
|
|
||||||
|
# ensure config files exist and has at least one value set (set_ini_value does not work on empty files)
|
||||||
|
touch /config/etc/letsencrypt/cli.ini
|
||||||
|
lsiown abc:abc /config/etc/letsencrypt/cli.ini
|
||||||
|
grep -qF 'agree-tos' /config/etc/letsencrypt/cli.ini || echo 'agree-tos=true' >>/config/etc/letsencrypt/cli.ini
|
||||||
|
|
||||||
|
# Check for broken dns credentials value in cli.ini and remove
|
||||||
|
sed -i '/dns--credentials/d' /config/etc/letsencrypt/cli.ini
|
||||||
|
|
||||||
|
# copy dns default configs
|
||||||
|
cp -n /defaults/dns-conf/* /config/dns-conf/ 2> >(grep -v 'cp: not replacing')
|
||||||
|
lsiown -R abc:abc /config/dns-conf
|
||||||
|
|
||||||
|
# copy default renewal hooks
|
||||||
|
cp -nR /defaults/etc/letsencrypt/renewal-hooks/* /config/etc/letsencrypt/renewal-hooks/ 2> >(grep -v 'cp: not replacing')
|
||||||
|
lsiown -R abc:abc /config/etc/letsencrypt/renewal-hooks
|
||||||
|
|
||||||
|
# replace nginx service location in renewal hooks
|
||||||
|
find /config/etc/letsencrypt/renewal-hooks/ -type f -exec sed -i 's|/run/service/nginx|/run/service/svc-nginx|g' {} \;
|
||||||
|
find /config/etc/letsencrypt/renewal-hooks/ -type f -exec sed -i 's|/var/run/s6/services/nginx|/run/service/svc-nginx|g' {} \;
|
||||||
|
find /config/etc/letsencrypt/renewal-hooks/ -type f -exec sed -i 's|s6-supervise nginx|s6-supervise svc-nginx|g' {} \;
|
||||||
|
|
||||||
|
# create original config file if it doesn't exist, move non-hidden legacy file to hidden
|
||||||
|
if [[ -f "/config/donoteditthisfile.conf" ]]; then
|
||||||
|
mv /config/donoteditthisfile.conf /config/.donoteditthisfile.conf
|
||||||
|
fi
|
||||||
|
if [[ ! -f "/config/.donoteditthisfile.conf" ]]; then
|
||||||
|
echo -e "ORIGURL=\"${URL}\" ORIGSUBDOMAINS=\"${SUBDOMAINS}\" ORIGONLY_SUBDOMAINS=\"${ONLY_SUBDOMAINS}\" ORIGEXTRA_DOMAINS=\"${EXTRA_DOMAINS}\" ORIGVALIDATION=\"${VALIDATION}\" ORIGDNSPLUGIN=\"${DNSPLUGIN}\" ORIGPROPAGATION=\"${PROPAGATION}\" ORIGSTAGING=\"${STAGING}\" ORIGCERTPROVIDER=\"${CERTPROVIDER}\" ORIGEMAIL=\"${EMAIL}\"" >/config/.donoteditthisfile.conf
|
||||||
|
echo "Created .donoteditthisfile.conf"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# load original config settings
|
||||||
|
# shellcheck source=/dev/null
|
||||||
|
. /config/.donoteditthisfile.conf
|
||||||
|
|
||||||
|
# setting ORIGDOMAIN for use in revoke sections
|
||||||
|
if [[ "${ORIGONLY_SUBDOMAINS}" = "true" ]] && [[ ! "${ORIGSUBDOMAINS}" = "wildcard" ]]; then
|
||||||
|
ORIGDOMAIN="$(echo "${ORIGSUBDOMAINS}" | tr ',' ' ' | awk '{print $1}').${ORIGURL}"
|
||||||
|
else
|
||||||
|
ORIGDOMAIN="${ORIGURL}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# update plugin names in dns conf inis
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]aliyun:||g' /config/dns-conf/aliyun.ini
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]cpanel:||g' /config/dns-conf/cpanel.ini
|
||||||
|
sed -i 's|^dns[-_]cpanel[-_]|cpanel_|g' /config/dns-conf/cpanel.ini
|
||||||
|
sed -i 's|^directadmin[-_]|dns_directadmin_|g' /config/dns-conf/directadmin.ini
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]domeneshop:||g' /config/dns-conf/domeneshop.ini
|
||||||
|
sed -i 's|^certbot[-_]plugin[-_]gandi:dns[-_]|dns_gandi_|g' /config/dns-conf/gandi.ini
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]inwx:||g' /config/dns-conf/inwx.ini
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]transip:||g' /config/dns-conf/transip.ini
|
||||||
|
|
||||||
|
# update plugin names in renewal conf
|
||||||
|
if [[ -f "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf" ]] && [[ "${ORIGVALIDATION}" = "dns" ]]; then
|
||||||
|
if [[ "${ORIGDNSPLUGIN}" =~ ^(aliyun)$ ]]; then
|
||||||
|
sed -i 's|^authenticator = certbot[-_]dns[-_]aliyun:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]aliyun:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
fi
|
||||||
|
if [[ "${ORIGDNSPLUGIN}" =~ ^(cpanel)$ ]]; then
|
||||||
|
sed -i 's|^authenticator = certbot[-_]dns[-_]cpanel:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]cpanel:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
sed -i 's|^authenticator = dns[-_]cpanel|authenticator = cpanel|g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
sed -i 's|^dns[-_]cpanel[-_]|cpanel_|g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
fi
|
||||||
|
if [[ "${ORIGDNSPLUGIN}" =~ ^(directadmin)$ ]]; then
|
||||||
|
sed -i 's|^authenticator = directadmin|authenticator = dns-directadmin|g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
sed -i 's|^directadmin[-_]|dns_directadmin_|g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
fi
|
||||||
|
if [[ "${ORIGDNSPLUGIN}" =~ ^(domeneshop)$ ]]; then
|
||||||
|
sed -i 's|^authenticator = certbot[-_]dns[-_]domeneshop:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]domeneshop:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
fi
|
||||||
|
if [[ "${ORIGDNSPLUGIN}" =~ ^(gandi)$ ]]; then
|
||||||
|
sed -i 's|^authenticator = certbot[-_]plugin[-_]gandi:dns|authenticator = dns-gandi|g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
sed -i 's|^certbot[-_]plugin[-_]gandi:dns[-_]|dns_gandi_|g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
fi
|
||||||
|
if [[ "${ORIGDNSPLUGIN}" =~ ^(inwx)$ ]]; then
|
||||||
|
sed -i 's|^authenticator = certbot[-_]dns[-_]inwx:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]inwx:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
fi
|
||||||
|
if [[ "${ORIGDNSPLUGIN}" =~ ^(transip)$ ]]; then
|
||||||
|
sed -i 's|^authenticator = certbot[-_]dns[-_]transip:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
sed -i 's|^certbot[-_]dns[-_]transip:||g' "/config/etc/letsencrypt/renewal/${ORIGDOMAIN}.conf"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# set default validation to http
|
||||||
|
if [[ -z "${VALIDATION}" ]]; then
|
||||||
|
VALIDATION="http"
|
||||||
|
echo "VALIDATION parameter not set; setting it to http"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# set duckdns validation to dns
|
||||||
|
if [[ "${VALIDATION}" = "duckdns" ]]; then
|
||||||
|
VALIDATION="dns"
|
||||||
|
DNSPLUGIN="duckdns"
|
||||||
|
if [[ -n "${DUCKDNSTOKEN}" ]] && ! grep -q "dns_duckdns_token=${DUCKDNSTOKEN}$" /config/dns-conf/duckdns.ini; then
|
||||||
|
sed -i "s|^dns_duckdns_token=.*|dns_duckdns_token=${DUCKDNSTOKEN}|g" /config/dns-conf/duckdns.ini
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
if [[ "${VALIDATION}" = "dns" ]] && [[ "${DNSPLUGIN}" = "duckdns" ]]; then
|
||||||
|
if [[ "${SUBDOMAINS}" = "wildcard" ]]; then
|
||||||
|
echo "the resulting certificate will only cover the subdomains due to a limitation of duckdns, so it is advised to set the root location to use www.subdomain.duckdns.org"
|
||||||
|
export ONLY_SUBDOMAINS=true
|
||||||
|
else
|
||||||
|
echo "the resulting certificate will only cover the main domain due to a limitation of duckdns, ie. subdomain.duckdns.org"
|
||||||
|
export SUBDOMAINS=""
|
||||||
|
fi
|
||||||
|
export EXTRA_DOMAINS=""
|
||||||
|
fi
|
||||||
|
|
||||||
|
# setting the symlink for key location
|
||||||
|
rm -rf /config/keys/letsencrypt
|
||||||
|
if [[ "${ONLY_SUBDOMAINS}" = "true" ]] && [[ ! "${SUBDOMAINS}" = "wildcard" ]]; then
|
||||||
|
DOMAIN="$(echo "${SUBDOMAINS}" | tr ',' ' ' | awk '{print $1}').${URL}"
|
||||||
|
ln -s /config/etc/letsencrypt/live/"${DOMAIN}" /config/keys/letsencrypt
|
||||||
|
else
|
||||||
|
ln -s /config/etc/letsencrypt/live/"${URL}" /config/keys/letsencrypt
|
||||||
|
fi
|
||||||
|
|
||||||
|
# cleanup unused csr and keys folders
|
||||||
|
rm -rf /config/etc/letsencrypt/csr
|
||||||
|
rm -rf /config/etc/letsencrypt/keys
|
||||||
|
|
||||||
|
# checking for changes in cert variables, revoking certs if necessary
|
||||||
|
if [[ ! "${URL}" = "${ORIGURL}" ]] ||
|
||||||
|
[[ ! "${SUBDOMAINS}" = "${ORIGSUBDOMAINS}" ]] ||
|
||||||
|
[[ ! "${ONLY_SUBDOMAINS}" = "${ORIGONLY_SUBDOMAINS}" ]] ||
|
||||||
|
[[ ! "${EXTRA_DOMAINS}" = "${ORIGEXTRA_DOMAINS}" ]] ||
|
||||||
|
[[ ! "${VALIDATION}" = "${ORIGVALIDATION}" ]] ||
|
||||||
|
[[ ! "${DNSPLUGIN}" = "${ORIGDNSPLUGIN}" ]] ||
|
||||||
|
[[ ! "${PROPAGATION}" = "${ORIGPROPAGATION}" ]] ||
|
||||||
|
[[ ! "${STAGING}" = "${ORIGSTAGING}" ]] ||
|
||||||
|
[[ ! "${CERTPROVIDER}" = "${ORIGCERTPROVIDER}" ]]; then
|
||||||
|
echo "Different validation parameters entered than what was used before. Revoking and deleting existing certificate, and an updated one will be created"
|
||||||
|
if [[ "${ORIGCERTPROVIDER}" = "zerossl" ]]; then
|
||||||
|
REV_ACMESERVER=("https://acme.zerossl.com/v2/DV90")
|
||||||
|
elif [[ "${ORIGSTAGING}" = "true" ]]; then
|
||||||
|
REV_ACMESERVER=("https://acme-staging-v02.api.letsencrypt.org/directory")
|
||||||
|
else
|
||||||
|
REV_ACMESERVER=("https://acme-v02.api.letsencrypt.org/directory")
|
||||||
|
fi
|
||||||
|
if [[ -f /config/etc/letsencrypt/live/"${ORIGDOMAIN}"/fullchain.pem ]]; then
|
||||||
|
certbot revoke --config-dir /config/etc/letsencrypt --logs-dir /config/log/letsencrypt --work-dir /tmp/letsencrypt --config /config/etc/letsencrypt/cli.ini --non-interactive --cert-path /config/etc/letsencrypt/live/"${ORIGDOMAIN}"/fullchain.pem --key-path /config/etc/letsencrypt/live/"${ORIGDOMAIN}"/privkey.pem --server "${REV_ACMESERVER[@]}" || true
|
||||||
|
else
|
||||||
|
certbot revoke --config-dir /config/etc/letsencrypt --logs-dir /config/log/letsencrypt --work-dir /tmp/letsencrypt --config /config/etc/letsencrypt/cli.ini --non-interactive --cert-name "${ORIGDOMAIN}" --server "${REV_ACMESERVER[@]}" || true
|
||||||
|
fi
|
||||||
|
rm -rf /config/etc/letsencrypt/{accounts,archive,live,renewal}
|
||||||
|
fi
|
||||||
|
|
||||||
|
# saving new variables
|
||||||
|
echo -e "ORIGURL=\"${URL}\" ORIGSUBDOMAINS=\"${SUBDOMAINS}\" ORIGONLY_SUBDOMAINS=\"${ONLY_SUBDOMAINS}\" ORIGEXTRA_DOMAINS=\"${EXTRA_DOMAINS}\" ORIGVALIDATION=\"${VALIDATION}\" ORIGDNSPLUGIN=\"${DNSPLUGIN}\" ORIGPROPAGATION=\"${PROPAGATION}\" ORIGSTAGING=\"${STAGING}\" ORIGCERTPROVIDER=\"${CERTPROVIDER}\" ORIGEMAIL=\"${EMAIL}\"" >/config/.donoteditthisfile.conf
|
||||||
|
|
||||||
|
# Check if the cert is using the old LE root cert, revoke and regen if necessary
|
||||||
|
if [[ -f "/config/keys/letsencrypt/chain.pem" ]] && { [[ "${CERTPROVIDER}" == "letsencrypt" ]] || [[ "${CERTPROVIDER}" == "" ]]; } && [[ "${STAGING}" != "true" ]] && ! openssl x509 -in /config/keys/letsencrypt/chain.pem -noout -issuer | grep -q "ISRG Root X"; then
|
||||||
|
echo "The cert seems to be using the old LE root cert, which is no longer valid. Deleting and revoking."
|
||||||
|
REV_ACMESERVER=("https://acme-v02.api.letsencrypt.org/directory")
|
||||||
|
if [[ -f /config/etc/letsencrypt/live/"${ORIGDOMAIN}"/fullchain.pem ]]; then
|
||||||
|
certbot revoke --config-dir /config/etc/letsencrypt --logs-dir /config/log/letsencrypt --work-dir /tmp/letsencrypt --config /config/etc/letsencrypt/cli.ini --non-interactive --cert-path /config/etc/letsencrypt/live/"${ORIGDOMAIN}"/fullchain.pem --server "${REV_ACMESERVER[@]}" || true
|
||||||
|
else
|
||||||
|
certbot revoke --config-dir /config/etc/letsencrypt --logs-dir /config/log/letsencrypt --work-dir /tmp/letsencrypt --config /config/etc/letsencrypt/cli.ini --non-interactive --cert-name "${ORIGDOMAIN}" --server "${REV_ACMESERVER[@]}" || true
|
||||||
|
fi
|
||||||
|
rm -rf /config/etc/letsencrypt/{accounts,archive,live,renewal}
|
||||||
|
fi
|
||||||
|
|
||||||
|
# if zerossl is selected or staging is set to true, use the relevant server
|
||||||
|
if [[ "${CERTPROVIDER}" = "zerossl" ]] && [[ "${STAGING}" = "true" ]]; then
|
||||||
|
echo "ZeroSSL does not support staging mode, ignoring STAGING variable"
|
||||||
|
fi
|
||||||
|
if [[ "${CERTPROVIDER}" = "zerossl" ]] && [[ -n "${EMAIL}" ]]; then
|
||||||
|
echo "ZeroSSL is selected as the cert provider, registering cert with ${EMAIL}"
|
||||||
|
ACMESERVER="https://acme.zerossl.com/v2/DV90"
|
||||||
|
elif [[ "${CERTPROVIDER}" = "zerossl" ]] && [[ -z "${EMAIL}" ]]; then
|
||||||
|
echo "ZeroSSL is selected as the cert provider, but the e-mail address has not been entered. Please visit https://zerossl.com, register a new account and set the account e-mail address in the EMAIL environment variable"
|
||||||
|
sleep infinity
|
||||||
|
elif [[ "${STAGING}" = "true" ]]; then
|
||||||
|
echo "NOTICE: Staging is active"
|
||||||
|
echo "Using Let's Encrypt as the cert provider"
|
||||||
|
ACMESERVER="https://acme-staging-v02.api.letsencrypt.org/directory"
|
||||||
|
else
|
||||||
|
echo "Using Let's Encrypt as the cert provider"
|
||||||
|
ACMESERVER="https://acme-v02.api.letsencrypt.org/directory"
|
||||||
|
fi
|
||||||
|
|
||||||
|
set_ini_value "server" "${ACMESERVER}" /config/etc/letsencrypt/cli.ini
|
||||||
|
|
||||||
|
# figuring out domain only vs domain & subdomains vs subdomains only
|
||||||
|
DOMAINS_ARRAY=()
|
||||||
|
if [[ -z "${SUBDOMAINS}" ]] || [[ "${ONLY_SUBDOMAINS}" != true ]]; then
|
||||||
|
DOMAINS_ARRAY+=("${URL}")
|
||||||
|
fi
|
||||||
|
if [[ -n "${SUBDOMAINS}" ]]; then
|
||||||
|
echo "SUBDOMAINS entered, processing"
|
||||||
|
SUBDOMAINS_ARRAY=()
|
||||||
|
if [[ "${SUBDOMAINS}" = "wildcard" ]]; then
|
||||||
|
SUBDOMAINS_ARRAY+=("*.${URL}")
|
||||||
|
echo "Wildcard cert for ${URL} will be requested"
|
||||||
|
else
|
||||||
|
for job in $(echo "${SUBDOMAINS}" | tr "," " "); do
|
||||||
|
SUBDOMAINS_ARRAY+=("${job}.${URL}")
|
||||||
|
done
|
||||||
|
echo "Sub-domains processed are: $(echo "${SUBDOMAINS_ARRAY[*]}" | tr " " ",")"
|
||||||
|
fi
|
||||||
|
DOMAINS_ARRAY+=("${SUBDOMAINS_ARRAY[@]}")
|
||||||
|
fi
|
||||||
|
|
||||||
|
# add extra domains
|
||||||
|
if [[ -n "${EXTRA_DOMAINS}" ]]; then
|
||||||
|
echo "EXTRA_DOMAINS entered, processing"
|
||||||
|
EXTRA_DOMAINS_ARRAY=()
|
||||||
|
for job in $(echo "${EXTRA_DOMAINS}" | tr "," " "); do
|
||||||
|
EXTRA_DOMAINS_ARRAY+=("${job}")
|
||||||
|
done
|
||||||
|
echo "Extra domains processed are: $(echo "${EXTRA_DOMAINS_ARRAY[*]}" | tr " " ",")"
|
||||||
|
DOMAINS_ARRAY+=("${EXTRA_DOMAINS_ARRAY[@]}")
|
||||||
|
fi
|
||||||
|
|
||||||
|
# setting domains in cli.ini
|
||||||
|
set_ini_value "domains" "$(echo "${DOMAINS_ARRAY[*]}" | tr " " ",")" /config/etc/letsencrypt/cli.ini
|
||||||
|
|
||||||
|
# figuring out whether to use e-mail and which
|
||||||
|
if [[ ${EMAIL} == *@* ]]; then
|
||||||
|
echo "E-mail address entered: ${EMAIL}"
|
||||||
|
set_ini_value "email" "${EMAIL}" /config/etc/letsencrypt/cli.ini
|
||||||
|
set_ini_value "no-eff-email" "true" /config/etc/letsencrypt/cli.ini
|
||||||
|
set_ini_value "register-unsafely-without-email" "false" /config/etc/letsencrypt/cli.ini
|
||||||
|
else
|
||||||
|
echo "No e-mail address entered or address invalid"
|
||||||
|
set_ini_value "register-unsafely-without-email" "true" /config/etc/letsencrypt/cli.ini
|
||||||
|
fi
|
||||||
|
|
||||||
|
# alter extension for error message
|
||||||
|
if [[ "${DNSPLUGIN}" = "google" ]]; then
|
||||||
|
DNSCREDENTIALFILE="/config/dns-conf/${DNSPLUGIN}.json"
|
||||||
|
else
|
||||||
|
DNSCREDENTIALFILE="/config/dns-conf/${DNSPLUGIN}.ini"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# setting the validation method to use
|
||||||
|
if [[ "${VALIDATION}" = "dns" ]]; then
|
||||||
|
set_ini_value "preferred-challenges" "dns" /config/etc/letsencrypt/cli.ini
|
||||||
|
set_ini_value "authenticator" "dns-${DNSPLUGIN}" /config/etc/letsencrypt/cli.ini
|
||||||
|
set_ini_value "dns-${DNSPLUGIN}-credentials" "${DNSCREDENTIALFILE}" /config/etc/letsencrypt/cli.ini
|
||||||
|
if [[ -n "${PROPAGATION}" ]]; then set_ini_value "dns-${DNSPLUGIN}-propagation-seconds" "${PROPAGATION}" /config/etc/letsencrypt/cli.ini; fi
|
||||||
|
|
||||||
|
# plugins that don't support setting credentials file
|
||||||
|
if [[ "${DNSPLUGIN}" =~ ^(route53|standalone)$ ]]; then
|
||||||
|
sed -i "/^dns-${DNSPLUGIN}-credentials\b/d" /config/etc/letsencrypt/cli.ini
|
||||||
|
fi
|
||||||
|
# plugins that don't support setting propagation
|
||||||
|
if [[ "${DNSPLUGIN}" =~ ^(azure|gandi|route53|standalone)$ ]]; then
|
||||||
|
if [[ -n "${PROPAGATION}" ]]; then echo "${DNSPLUGIN} dns plugin does not support setting propagation time"; fi
|
||||||
|
sed -i "/^dns-${DNSPLUGIN}-propagation-seconds\b/d" /config/etc/letsencrypt/cli.ini
|
||||||
|
fi
|
||||||
|
# plugins that use old parameter naming convention
|
||||||
|
if [[ "${DNSPLUGIN}" =~ ^(cpanel)$ ]]; then
|
||||||
|
sed -i "/^dns-${DNSPLUGIN}-credentials\b/d" /config/etc/letsencrypt/cli.ini
|
||||||
|
sed -i "/^dns-${DNSPLUGIN}-propagation-seconds\b/d" /config/etc/letsencrypt/cli.ini
|
||||||
|
set_ini_value "authenticator" "${DNSPLUGIN}" /config/etc/letsencrypt/cli.ini
|
||||||
|
set_ini_value "${DNSPLUGIN}-credentials" "${DNSCREDENTIALFILE}" /config/etc/letsencrypt/cli.ini
|
||||||
|
if [[ -n "${PROPAGATION}" ]]; then set_ini_value "${DNSPLUGIN}-propagation-seconds" "${PROPAGATION}" /config/etc/letsencrypt/cli.ini; fi
|
||||||
|
fi
|
||||||
|
# don't restore txt records when using DuckDNS plugin
|
||||||
|
if [[ "${DNSPLUGIN}" =~ ^(duckdns)$ ]]; then
|
||||||
|
set_ini_value "dns-${DNSPLUGIN}-no-txt-restore" "true" /config/etc/letsencrypt/cli.ini
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "${VALIDATION} validation via ${DNSPLUGIN} plugin is selected"
|
||||||
|
elif [[ "${VALIDATION}" = "tls-sni" ]]; then
|
||||||
|
set_ini_value "preferred-challenges" "http" /config/etc/letsencrypt/cli.ini
|
||||||
|
set_ini_value "authenticator" "standalone" /config/etc/letsencrypt/cli.ini
|
||||||
|
echo "*****tls-sni validation has been deprecated, attempting http validation instead"
|
||||||
|
else
|
||||||
|
set_ini_value "preferred-challenges" "http" /config/etc/letsencrypt/cli.ini
|
||||||
|
set_ini_value "authenticator" "standalone" /config/etc/letsencrypt/cli.ini
|
||||||
|
echo "http validation is selected"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# generating certs if necessary
|
||||||
|
if [[ ! -f "/config/keys/letsencrypt/fullchain.pem" ]]; then
|
||||||
|
if [[ "${CERTPROVIDER}" = "zerossl" ]] && [[ -n "${EMAIL}" ]]; then
|
||||||
|
echo "Retrieving EAB from ZeroSSL"
|
||||||
|
EAB_CREDS=$(curl -s https://api.zerossl.com/acme/eab-credentials-email --data "email=${EMAIL}")
|
||||||
|
ZEROSSL_EAB_KID=$(echo "${EAB_CREDS}" | jq .eab_kid)
|
||||||
|
ZEROSSL_EAB_HMAC_KEY=$(echo "${EAB_CREDS}" | jq .eab_hmac_key)
|
||||||
|
if [[ -z "${ZEROSSL_EAB_KID}" ]] || [[ -z "${ZEROSSL_EAB_HMAC_KEY}" ]]; then
|
||||||
|
echo "Unable to retrieve EAB credentials from ZeroSSL. Check the outgoing connections to api.zerossl.com and dns. Sleeping."
|
||||||
|
sleep infinity
|
||||||
|
fi
|
||||||
|
set_ini_value "eab-kid" "${ZEROSSL_EAB_KID}" /config/etc/letsencrypt/cli.ini
|
||||||
|
set_ini_value "eab-hmac-key" "${ZEROSSL_EAB_HMAC_KEY}" /config/etc/letsencrypt/cli.ini
|
||||||
|
fi
|
||||||
|
echo "Generating new certificate"
|
||||||
|
certbot certonly --config-dir /config/etc/letsencrypt --logs-dir /config/log/letsencrypt --work-dir /tmp/letsencrypt --config /config/etc/letsencrypt/cli.ini --non-interactive --renew-by-default
|
||||||
|
if [[ ! -d /config/keys/letsencrypt ]]; then
|
||||||
|
if [[ "${VALIDATION}" = "dns" ]]; then
|
||||||
|
echo "ERROR: Cert does not exist! Please see the validation error above. Make sure you entered correct credentials into the ${DNSCREDENTIALFILE} file."
|
||||||
|
else
|
||||||
|
echo "ERROR: Cert does not exist! Please see the validation error above. The issue may be due to incorrect dns or port forwarding settings. Please fix your settings and recreate the container"
|
||||||
|
fi
|
||||||
|
sleep infinity
|
||||||
|
fi
|
||||||
|
run-parts /config/etc/letsencrypt/renewal-hooks/deploy/
|
||||||
|
echo "New certificate generated; starting nginx"
|
||||||
|
else
|
||||||
|
echo "Certificate exists; parameters unchanged; starting nginx"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# if certbot generated key exists, remove self-signed cert and replace it with symlink to live cert
|
||||||
|
if [[ -d /config/keys/letsencrypt ]]; then
|
||||||
|
rm -rf /config/keys/cert.crt
|
||||||
|
ln -s ./letsencrypt/fullchain.pem /config/keys/cert.crt
|
||||||
|
rm -rf /config/keys/cert.key
|
||||||
|
ln -s ./letsencrypt/privkey.pem /config/keys/cert.key
|
||||||
|
fi
|
1
root/etc/s6-overlay/s6-rc.d/init-certbot-config/type
Normal file
1
root/etc/s6-overlay/s6-rc.d/init-certbot-config/type
Normal file
@ -0,0 +1 @@
|
|||||||
|
oneshot
|
1
root/etc/s6-overlay/s6-rc.d/init-certbot-config/up
Normal file
1
root/etc/s6-overlay/s6-rc.d/init-certbot-config/up
Normal file
@ -0,0 +1 @@
|
|||||||
|
/etc/s6-overlay/s6-rc.d/init-certbot-config/run
|
40
root/etc/s6-overlay/s6-rc.d/init-fail2ban-config/run
Executable file
40
root/etc/s6-overlay/s6-rc.d/init-fail2ban-config/run
Executable file
@ -0,0 +1,40 @@
|
|||||||
|
#!/usr/bin/with-contenv bash
|
||||||
|
# shellcheck shell=bash
|
||||||
|
|
||||||
|
if [[ -z ${LSIO_READ_ONLY_FS} ]] && [[ -z ${LSIO_NON_ROOT_USER} ]] && [[ "${DISABLE_F2B,,}" != "true" ]]; then
|
||||||
|
if ! iptables -L &> /dev/null; then
|
||||||
|
ln -sf /usr/sbin/xtables-legacy-multi /usr/sbin/iptables
|
||||||
|
ln -sf /usr/sbin/xtables-legacy-multi /usr/sbin/iptables-save
|
||||||
|
ln -sf /usr/sbin/xtables-legacy-multi /usr/sbin/iptables-restore
|
||||||
|
ln -sf /usr/sbin/xtables-legacy-multi /usr/sbin/ip6tables
|
||||||
|
ln -sf /usr/sbin/xtables-legacy-multi /usr/sbin/ip6tables-save
|
||||||
|
ln -sf /usr/sbin/xtables-legacy-multi /usr/sbin/ip6tables-restore
|
||||||
|
fi
|
||||||
|
|
||||||
|
# copy/update the fail2ban config defaults to/in /config
|
||||||
|
cp -R /defaults/fail2ban/filter.d /config/fail2ban/
|
||||||
|
cp -R /defaults/fail2ban/action.d /config/fail2ban/
|
||||||
|
# if jail.local is missing in /config, copy default
|
||||||
|
if [[ ! -f /config/fail2ban/jail.local ]]; then
|
||||||
|
cp /defaults/fail2ban/jail.local /config/fail2ban/jail.local
|
||||||
|
fi
|
||||||
|
# Replace fail2ban config with user config
|
||||||
|
if [[ -d /etc/fail2ban/filter.d ]]; then
|
||||||
|
rm -rf /etc/fail2ban/filter.d
|
||||||
|
fi
|
||||||
|
if [[ -d /etc/fail2ban/action.d ]]; then
|
||||||
|
rm -rf /etc/fail2ban/action.d
|
||||||
|
fi
|
||||||
|
cp -R /config/fail2ban/filter.d /etc/fail2ban/
|
||||||
|
cp -R /config/fail2ban/action.d /etc/fail2ban/
|
||||||
|
cp /defaults/fail2ban/fail2ban.local /etc/fail2ban/
|
||||||
|
cp /config/fail2ban/jail.local /etc/fail2ban/jail.local
|
||||||
|
|
||||||
|
# logfiles needed by fail2ban
|
||||||
|
if [[ ! -f /config/log/nginx/error.log ]]; then
|
||||||
|
touch /config/log/nginx/error.log
|
||||||
|
fi
|
||||||
|
if [[ ! -f /config/log/nginx/access.log ]]; then
|
||||||
|
touch /config/log/nginx/access.log
|
||||||
|
fi
|
||||||
|
fi
|
1
root/etc/s6-overlay/s6-rc.d/init-fail2ban-config/type
Normal file
1
root/etc/s6-overlay/s6-rc.d/init-fail2ban-config/type
Normal file
@ -0,0 +1 @@
|
|||||||
|
oneshot
|
1
root/etc/s6-overlay/s6-rc.d/init-fail2ban-config/up
Normal file
1
root/etc/s6-overlay/s6-rc.d/init-fail2ban-config/up
Normal file
@ -0,0 +1 @@
|
|||||||
|
/etc/s6-overlay/s6-rc.d/init-fail2ban-config/run
|
19
root/etc/s6-overlay/s6-rc.d/init-outdated-config/run
Executable file
19
root/etc/s6-overlay/s6-rc.d/init-outdated-config/run
Executable file
@ -0,0 +1,19 @@
|
|||||||
|
#!/usr/bin/with-contenv bash
|
||||||
|
# shellcheck shell=bash
|
||||||
|
|
||||||
|
if [[ -f /config/nginx/geoip2.conf ]]; then
|
||||||
|
echo "/config/nginx/geoip2.conf exists.
|
||||||
|
Please migrate to https://github.com/linuxserver/docker-mods/tree/swag-maxmind"
|
||||||
|
fi
|
||||||
|
if [[ -f /config/nginx/ldap.conf ]]; then
|
||||||
|
echo "/config/nginx/ldap.conf exists.
|
||||||
|
Please apply any customizations to /config/nginx/ldap-server.conf
|
||||||
|
Ensure your configs are updated and remove /config/nginx/ldap.conf
|
||||||
|
If you do not use this config, simply remove it."
|
||||||
|
fi
|
||||||
|
if grep -qrle ' /etc/letsencrypt' /config/nginx; then
|
||||||
|
echo " The following nginx confs are using certificates from the obsolete location
|
||||||
|
/etc/letsencrypt and should be updated to point to /config/etc/letsencrypt
|
||||||
|
"
|
||||||
|
echo -n " " && grep -rle ' /etc/letsencrypt' /config/nginx
|
||||||
|
fi
|
1
root/etc/s6-overlay/s6-rc.d/init-outdated-config/type
Normal file
1
root/etc/s6-overlay/s6-rc.d/init-outdated-config/type
Normal file
@ -0,0 +1 @@
|
|||||||
|
oneshot
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user