Compare commits
18 Commits
38f373afb8
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| f42200dc42 | |||
| bfb7c80202 | |||
| c5517ebe05 | |||
| f986f39ff1 | |||
| 7655afa419 | |||
| 079899425a | |||
| cef90d34f8 | |||
| 53eec2deb4 | |||
| c98604352c | |||
| a801d596e3 | |||
| 68053c8ff0 | |||
| 83a12f0423 | |||
| ac367a148a | |||
| 74fec08104 | |||
| 238d690024 | |||
| 59023322f7 | |||
| 644ec92cc9 | |||
| 8e450a9f25 |
151
deploy.sh
151
deploy.sh
@@ -1,151 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
# ==============================================================================
|
|
||||||
# NGINX CONFIG & SSL DEPLOYMENT SCRIPT (v4)
|
|
||||||
#
|
|
||||||
# This script securely copies NGINX configuration files, tests the config,
|
|
||||||
# reloads Nginx, and then automates running Certbot to issue SSL certificates
|
|
||||||
# for all domains found in the `sites-available` directory.
|
|
||||||
#
|
|
||||||
# INSTRUCTIONS:
|
|
||||||
# 1. Ensure Certbot is installed on the remote server.
|
|
||||||
# (e.g., `sudo apt install certbot python3-certbot-nginx`)
|
|
||||||
# 2. Make the script executable: chmod +x <script_name>.sh
|
|
||||||
# 3. Run the script: ./<script_name>.sh
|
|
||||||
# ==============================================================================
|
|
||||||
|
|
||||||
# --- Configuration ---
|
|
||||||
REMOTE_USER="ubuntu" # The user you SSH in with (e.g., ubuntu, ec2-user)
|
|
||||||
REMOTE_HOST="3.9.182.122" # The IP address or domain of your server
|
|
||||||
|
|
||||||
# --- File & Path Definitions ---
|
|
||||||
KEY_FILE="~/repos/azeem-macbookair.pem"
|
|
||||||
SOURCE_NGINX_CONF="nginx.conf"
|
|
||||||
SOURCE_SITES_DIR="sites-available"
|
|
||||||
|
|
||||||
# Destination paths on the remote server
|
|
||||||
DEST_NGINX_PATH="/etc/nginx/"
|
|
||||||
DEST_SITES_PATH="/etc/nginx/sites-available/"
|
|
||||||
|
|
||||||
# Temporary directory on the remote server (relative to the user's home dir)
|
|
||||||
REMOTE_TEMP_DIR="nginx_deploy_temp"
|
|
||||||
|
|
||||||
# --- Script Logic ---
|
|
||||||
|
|
||||||
echo "🚀 Starting NGINX & SSL deployment to $REMOTE_HOST..."
|
|
||||||
echo "--------------------------------------------------------"
|
|
||||||
|
|
||||||
# Expand the tilde (~) in the key file path to an absolute path.
|
|
||||||
EVAL_KEY_FILE=$(eval echo "$KEY_FILE")
|
|
||||||
|
|
||||||
# --- Pre-flight Checks ---
|
|
||||||
if [ ! -f "$EVAL_KEY_FILE" ]; then
|
|
||||||
echo "❌ ERROR: SSH key not found at $EVAL_KEY_FILE"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
if [ ! -f "$SOURCE_NGINX_CONF" ]; then
|
|
||||||
echo "❌ ERROR: Source file '$SOURCE_NGINX_CONF' not found."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
if [ ! -d "$SOURCE_SITES_DIR" ]; then
|
|
||||||
echo "❌ ERROR: Source directory '$SOURCE_SITES_DIR' not found."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
# --- Local Operations: Find all domains ---
|
|
||||||
echo "-> Scanning local 'sites-available' for domain names..."
|
|
||||||
# This command finds all 'server_name' lines, removes the directive and semicolon,
|
|
||||||
# and consolidates all domains onto a single line.
|
|
||||||
ALL_DOMAINS=$(grep -r "server_name" "$SOURCE_SITES_DIR" | sed 's/.*server_name\s*//' | sed 's/;//' | tr '\n' ' ' | sed 's/ *$//')
|
|
||||||
|
|
||||||
if [ -z "$ALL_DOMAINS" ]; then
|
|
||||||
echo "⚠️ WARNING: No domains found in 'sites-available' config files. Skipping Certbot step later."
|
|
||||||
else
|
|
||||||
echo " ✅ Found domains: $ALL_DOMAINS"
|
|
||||||
fi
|
|
||||||
echo
|
|
||||||
|
|
||||||
# --- Remote Operations ---
|
|
||||||
|
|
||||||
# Step 1: Create the temporary directory on the remote server.
|
|
||||||
echo "-> Creating temporary directory on remote server..."
|
|
||||||
ssh -i "$EVAL_KEY_FILE" "${REMOTE_USER}@${REMOTE_HOST}" "mkdir -p $REMOTE_TEMP_DIR"
|
|
||||||
if [ $? -ne 0 ]; then
|
|
||||||
echo "❌ ERROR: Failed to create temporary directory. Aborting."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
echo " ✅ Remote temporary directory is ready."
|
|
||||||
echo
|
|
||||||
|
|
||||||
# Step 2: Transfer all files to the temporary directory.
|
|
||||||
echo "- Transferring configuration files to temporary location..."
|
|
||||||
scp -i "$EVAL_KEY_FILE" -r "$SOURCE_NGINX_CONF" "$SOURCE_SITES_DIR" "${REMOTE_USER}@${REMOTE_HOST}:${REMOTE_TEMP_DIR}/"
|
|
||||||
if [ $? -ne 0 ]; then
|
|
||||||
echo "❌ ERROR: File transfer failed. Aborting."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
echo " ✅ All files successfully transferred to temporary location."
|
|
||||||
echo
|
|
||||||
|
|
||||||
# Step 3: Move files into place, clean up, and test config.
|
|
||||||
echo "- Moving files into place with sudo and cleaning up..."
|
|
||||||
ssh -i "$EVAL_KEY_FILE" "${REMOTE_USER}@${REMOTE_HOST}" << EOF
|
|
||||||
# Move the main config file
|
|
||||||
sudo mv "$REMOTE_TEMP_DIR/nginx.conf" "${DEST_NGINX_PATH}nginx.conf"
|
|
||||||
|
|
||||||
# Move the sites-available files
|
|
||||||
sudo mv "$REMOTE_TEMP_DIR/sites-available/"* "$DEST_SITES_PATH"
|
|
||||||
|
|
||||||
# Remove the temporary directory
|
|
||||||
rm -rf "$REMOTE_TEMP_DIR"
|
|
||||||
|
|
||||||
echo " -> Verifying Nginx configuration..."
|
|
||||||
# Test the Nginx configuration for syntax errors
|
|
||||||
sudo nginx -t
|
|
||||||
EOF
|
|
||||||
|
|
||||||
if [ $? -ne 0 ]; then
|
|
||||||
echo "⚠️ WARNING: An error occurred on the remote server during the move or config test."
|
|
||||||
echo "You may need to log in manually to fix it: ssh -i $EVAL_KEY_FILE ${REMOTE_USER}@${REMOTE_HOST}"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo " ✅ Files moved and configuration test passed."
|
|
||||||
echo
|
|
||||||
|
|
||||||
# Step 4: Reload Nginx to apply new configs before running Certbot
|
|
||||||
echo "- Reloading Nginx to apply new configurations..."
|
|
||||||
ssh -i "$EVAL_KEY_FILE" "${REMOTE_USER}@${REMOTE_HOST}" "sudo systemctl reload nginx"
|
|
||||||
if [ $? -ne 0 ]; then
|
|
||||||
echo "⚠️ WARNING: Nginx reload failed. Check the server status."
|
|
||||||
else
|
|
||||||
echo " ✅ Nginx reloaded successfully."
|
|
||||||
fi
|
|
||||||
echo
|
|
||||||
|
|
||||||
# Step 5: Ask to run Certbot if domains were found
|
|
||||||
if [ -n "$ALL_DOMAINS" ]; then
|
|
||||||
read -p "Run Certbot for the discovered domains? (y/n) " -n 1 -r
|
|
||||||
echo
|
|
||||||
if [[ $REPLY =~ ^[Yy]$ ]]; then
|
|
||||||
# Format domains for the certbot command (-d domain1 -d domain2 etc.)
|
|
||||||
CERTBOT_DOMAINS=$(echo "$ALL_DOMAINS" | sed 's/ / -d /g' | sed 's/^/-d /')
|
|
||||||
|
|
||||||
echo "- Running Certbot on the server. This may require interaction..."
|
|
||||||
# Note: You may need to provide an email and agree to terms on the first run.
|
|
||||||
ssh -t -i "$EVAL_KEY_FILE" "${REMOTE_USER}@${REMOTE_HOST}" \
|
|
||||||
"sudo certbot --nginx --non-interactive --agree-tos --email your-email@example.com --redirect $CERTBOT_DOMAINS"
|
|
||||||
|
|
||||||
if [ $? -eq 0 ]; then
|
|
||||||
echo " ✅ Certbot process completed."
|
|
||||||
else
|
|
||||||
echo "⚠️ WARNING: Certbot process finished with errors."
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
else
|
|
||||||
echo "-> Skipping Certbot step as no domains were found."
|
|
||||||
fi
|
|
||||||
|
|
||||||
# --- Completion ---
|
|
||||||
echo "--------------------------------------------------------"
|
|
||||||
echo "🎉 Deployment complete!"
|
|
||||||
15
http_archive/homarr-http
Normal file
15
http_archive/homarr-http
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
# HTTP-only NGINX config for home.aaf.systems (no SSL)
|
||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
server_name home.aaf.systems;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://100.93.165.98:7575;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,18 +1,19 @@
|
|||||||
|
# Block 1: Redirects all HTTP traffic to HTTPS
|
||||||
server {
|
server {
|
||||||
listen 80;
|
listen 80;
|
||||||
server_name notes.aaf.systems;
|
server_name notes.aaf.systems;
|
||||||
# Redirect all HTTP traffic to HTTPS
|
|
||||||
|
# This redirect is managed by Certbot's --redirect flag,
|
||||||
|
# but we include it for completeness.
|
||||||
return 301 https://$host$request_uri;
|
return 301 https://$host$request_uri;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Block 2: Handles the secure HTTPS traffic
|
||||||
server {
|
server {
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
server_name notes.aaf.systems;
|
server_name notes.aaf.systems;
|
||||||
|
|
||||||
# SSL Certificates (managed by Certbot)
|
# --- This is the location block that was missing ---
|
||||||
ssl_certificate /etc/letsencrypt/live/notes.aaf.systems/fullchain.pem;
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/notes.aaf.systems/privkey.pem;
|
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
proxy_pass http://100.93.165.98:3010;
|
proxy_pass http://100.93.165.98:3010;
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
@@ -22,4 +23,11 @@ server {
|
|||||||
proxy_set_header Upgrade $http_upgrade;
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
proxy_set_header Connection "upgrade";
|
proxy_set_header Connection "upgrade";
|
||||||
}
|
}
|
||||||
|
# --- End of location block ---
|
||||||
|
|
||||||
|
# SSL settings managed by Certbot
|
||||||
|
ssl_certificate /etc/letsencrypt/live/git.aaf.systems/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/git.aaf.systems/privkey.pem; # managed by Certbot
|
||||||
|
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
|
||||||
|
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
|
||||||
}
|
}
|
||||||
28
sites-available/exp
Normal file
28
sites-available/exp
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
# Block 1: Redirects all HTTP traffic to HTTPS
|
||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
server_name exp.aaf.systems;
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Block 2: Handles the secure HTTPS traffic
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name exp.aaf.systems;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://100.93.165.98:8080;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
|
||||||
|
# SSL settings managed by Certbot
|
||||||
|
ssl_certificate /etc/letsencrypt/live/exp.aaf.systems/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/exp.aaf.systems/privkey.pem;
|
||||||
|
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||||
|
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||||
|
}
|
||||||
@@ -1,19 +1,17 @@
|
|||||||
|
# Block 1: Redirects all HTTP traffic to HTTPS
|
||||||
server {
|
server {
|
||||||
listen 80;
|
listen 80;
|
||||||
server_name git.aaf.systems;
|
server_name git.aaf.systems;
|
||||||
# Redirect all HTTP traffic to HTTPS
|
|
||||||
return 301 https://$host$request_uri;
|
return 301 https://$host$request_uri;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Block 2: Handles the secure HTTPS traffic
|
||||||
server {
|
server {
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
server_name git.aaf.systems;
|
server_name git.aaf.systems;
|
||||||
|
|
||||||
# SSL Certificates (managed by Certbot)
|
|
||||||
ssl_certificate /etc/letsencrypt/live/git.aaf.systems/fullchain.pem;
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/git.aaf.systems/privkey.pem;
|
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
|
# IMPORTANT: Replace with the correct Tailscale IP for your Gitea server
|
||||||
proxy_pass http://100.93.165.98:3000;
|
proxy_pass http://100.93.165.98:3000;
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
@@ -22,4 +20,10 @@ server {
|
|||||||
proxy_set_header Upgrade $http_upgrade;
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
proxy_set_header Connection "upgrade";
|
proxy_set_header Connection "upgrade";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# SSL settings managed by Certbot
|
||||||
|
ssl_certificate /etc/letsencrypt/live/git.aaf.systems/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/git.aaf.systems/privkey.pem;
|
||||||
|
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||||
|
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||||
}
|
}
|
||||||
28
sites-available/homarr
Normal file
28
sites-available/homarr
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
# Block 1: Redirects all HTTP traffic to HTTPS
|
||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
server_name home.aaf.systems;
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Block 2: Handles the secure HTTPS traffic
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name home.aaf.systems;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://100.93.165.98:7575;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
|
||||||
|
# SSL settings managed by Certbot
|
||||||
|
ssl_certificate /etc/letsencrypt/live/home.aaf.systems/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/home.aaf.systems/privkey.pem;
|
||||||
|
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||||
|
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||||
|
}
|
||||||
28
sites-available/koel
Normal file
28
sites-available/koel
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
# Block 1: Redirects all HTTP traffic to HTTPS
|
||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
server_name music.aaf.systems;
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Block 2: Handles the secure HTTPS traffic
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name music.aaf.systems;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://100.93.165.98:4075;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
|
||||||
|
# SSL settings managed by Certbot
|
||||||
|
ssl_certificate /etc/letsencrypt/live/music.aaf.systems/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/music.aaf.systems/privkey.pem;
|
||||||
|
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||||
|
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||||
|
}
|
||||||
28
sites-available/plane
Normal file
28
sites-available/plane
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
# Block 1: Redirects all HTTP traffic to HTTPS
|
||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
server_name projects.aaf.systems;
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Block 2: Handles the secure HTTPS traffic
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name projects.aaf.systems;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://100.93.165.98:3050;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
|
||||||
|
# SSL settings managed by Certbot
|
||||||
|
ssl_certificate /etc/letsencrypt/live/projects.aaf.systems/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/projects.aaf.systems/privkey.pem;
|
||||||
|
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||||
|
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||||
|
}
|
||||||
28
sites-available/vert
Normal file
28
sites-available/vert
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
# Block 1: Redirects all HTTP traffic to HTTPS
|
||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
server_name convert.aaf.systems;
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Block 2: Handles the secure HTTPS traffic
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
server_name convert.aaf.systems;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://100.93.165.98:3090;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
|
||||||
|
# SSL settings managed by Certbot
|
||||||
|
ssl_certificate /etc/letsencrypt/live/convert.aaf.systems/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/convert.aaf.systems/privkey.pem;
|
||||||
|
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||||
|
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user