Simply expose this container on port 80, and point a bunch of domains to this server's IP address, and you get a fully operational LAN cache. Hooray!
For a list of DNS addresses to override on your DNS server, refer to uklans/cache-domains, or the individual nginx configuration files in this repo.
To build and run, do:
./buildcontainer.sh
./start.sh
start.sh
will make a /data/ directory to store logs and cache data in.
Warning: some services (eg, when downloading the Origin client) require HTTPS access to the hosts that we are hijacking. To avoid connectivity issues, you will need to run an SNI proxy to enable pass through of HTTPS traffic.
You can build and run the sniproxy container in the sniproxy
directory to achieve this.
cd sniproxy
docker build -t sniproxy .
docker run --name sniproxy -p 443:443 sniproxy
Example:
- consider you have a mega-partition mounted to /mnt/storage
- create a symlink for /data
$ sudo ln -s /mnt/storage/lancache/ /data
$ df -h /data
Filesystem Size Used Avail Use% Mounted on
/dev/sda2 1.7T 69M 1.6T 1% /mnt/storage
- curl sudo bash is terrible, but you're trusting my code anyway :)
$ curl -sSL https://get.docker.com | sudo bash
$ git clone https://github.com/OpenSourceLAN/origin-docker.git
$ cd origin-docker
$ vi nginx.conf
Edit nginx.conf:
- Find the proxy_cache_path line and udpate the max_size parameter to the maximum amount of disk space you would like your cache to use
# ./buildcontainer.sh
Notes:
- using
--restart=always
, will auto-start after reboot - security, running your Docker services as root or non root
see https://docs.docker.com/engine/security/security/#docker-daemon-attack-surface
# ./start.sh
# docker run --name sniproxy -p 443:443 sniproxy
# cd dnsmasq && ./start.sh
In addition to OpenSourceLAN members, this project contains contributions from @ChainedHope