Add memos service
This commit is contained in:
@@ -8,4 +8,5 @@ docker compose run --rm certbot certonly --webroot --webroot-path /var/www/certb
|
|||||||
-d servarr.loadingm.xyz \
|
-d servarr.loadingm.xyz \
|
||||||
-d karakeep.loadingm.xyz \
|
-d karakeep.loadingm.xyz \
|
||||||
-d ollama.loadingm.xyz \
|
-d ollama.loadingm.xyz \
|
||||||
|
-d memos.loadingm.xyz \
|
||||||
-d gpodder.loadingm.xyz
|
-d gpodder.loadingm.xyz
|
||||||
|
|||||||
@@ -32,6 +32,8 @@ networks:
|
|||||||
external: false
|
external: false
|
||||||
gpodder:
|
gpodder:
|
||||||
external: false
|
external: false
|
||||||
|
memos:
|
||||||
|
external: false
|
||||||
services:
|
services:
|
||||||
web:
|
web:
|
||||||
image: "nginx"
|
image: "nginx"
|
||||||
@@ -53,6 +55,7 @@ services:
|
|||||||
- auth
|
- auth
|
||||||
- gitea
|
- gitea
|
||||||
- gpodder
|
- gpodder
|
||||||
|
- memos
|
||||||
depends_on:
|
depends_on:
|
||||||
- jellyfin
|
- jellyfin
|
||||||
- ollama-webui
|
- ollama-webui
|
||||||
@@ -61,6 +64,7 @@ services:
|
|||||||
- qbittorrent
|
- qbittorrent
|
||||||
- gitea
|
- gitea
|
||||||
- gpodder
|
- gpodder
|
||||||
|
- memos
|
||||||
logging: &logging
|
logging: &logging
|
||||||
options:
|
options:
|
||||||
max-size: "50m"
|
max-size: "50m"
|
||||||
@@ -167,6 +171,17 @@ services:
|
|||||||
- /data/tftp:/srv/tftp:ro
|
- /data/tftp:/srv/tftp:ro
|
||||||
- /etc/localtime:/etc/localtime:ro
|
- /etc/localtime:/etc/localtime:ro
|
||||||
logging: *logging
|
logging: *logging
|
||||||
|
memos:
|
||||||
|
image: neosmemo/memos:stable
|
||||||
|
networks:
|
||||||
|
- memos
|
||||||
|
volumes:
|
||||||
|
- /data/memos:/var/opt/memos
|
||||||
|
environment:
|
||||||
|
- MEMOS_MODE=prod
|
||||||
|
- MEMOS_PORT=5230
|
||||||
|
restart: unless-stopped
|
||||||
|
logging: *logging
|
||||||
|
|
||||||
# calibre:
|
# calibre:
|
||||||
# image: "linuxserver/calibre-web"
|
# image: "linuxserver/calibre-web"
|
||||||
|
|||||||
62
nginx/sites-enabled/memos
Normal file
62
nginx/sites-enabled/memos
Normal file
@@ -0,0 +1,62 @@
|
|||||||
|
server {
|
||||||
|
listen 80;
|
||||||
|
listen [::]:80;
|
||||||
|
server_name memos.loadingm.xyz;
|
||||||
|
|
||||||
|
location /.well-known/acme-challenge/ {
|
||||||
|
root /var/www/certbot;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Uncomment to redirect HTTP to HTTPS
|
||||||
|
location / {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
# Nginx versions 1.25+
|
||||||
|
listen 443 ssl;
|
||||||
|
listen [::]:443 ssl;
|
||||||
|
http2 on;
|
||||||
|
|
||||||
|
server_name memos.loadingm.xyz;
|
||||||
|
|
||||||
|
## The default `client_max_body_size` is 1M, this might not be enough for some posters, etc.
|
||||||
|
client_max_body_size 200G;
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/loadingm.xyz/fullchain.pem;
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/loadingm.xyz/privkey.pem;
|
||||||
|
# include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||||
|
# ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||||
|
ssl_trusted_certificate /etc/letsencrypt/live/loadingm.xyz/chain.pem;
|
||||||
|
|
||||||
|
# Security / XSS Mitigation Headers
|
||||||
|
add_header X-Content-Type-Options "nosniff";
|
||||||
|
|
||||||
|
# Permissions policy. May cause issues with some clients
|
||||||
|
add_header Permissions-Policy "accelerometer=(), ambient-light-sensor=(), battery=(), bluetooth=(), camera=(), clipboard-read=(), display-capture=(), document-domain=(), encrypted-media=(), gamepad=(), geolocation=(), gyroscope=(), hid=(), idle-detection=(), interest-cohort=(), keyboard-map=(), local-fonts=(), magnetometer=(), microphone=(), payment=(), publickey-credentials-get=(), serial=(), sync-xhr=(), usb=(), xr-spatial-tracking=()" always;
|
||||||
|
|
||||||
|
# Content Security Policy
|
||||||
|
# See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
|
||||||
|
# Enforces https content and restricts JS/CSS to origin
|
||||||
|
# External Javascript (such as cast_sender.js for Chromecast) must be whitelisted.
|
||||||
|
add_header Content-Security-Policy "default-src https: data: blob: ; img-src 'self' https://* ; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://www.gstatic.com https://www.youtube.com blob:; worker-src 'self' blob:; connect-src 'self'; object-src 'none'; frame-ancestors 'self'; font-src 'self'";
|
||||||
|
|
||||||
|
location /.well-known/acme-challenge/ {
|
||||||
|
root /var/www/certbot;
|
||||||
|
}
|
||||||
|
|
||||||
|
location / {
|
||||||
|
# Proxy main karakeep traffic
|
||||||
|
proxy_pass http://memos:5230;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header X-Forwarded-Protocol $scheme;
|
||||||
|
proxy_set_header X-Forwarded-Host $http_host;
|
||||||
|
|
||||||
|
# Disable buffering when the nginx proxy gets very resource heavy upon streaming
|
||||||
|
proxy_buffering off;
|
||||||
|
}
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user