so it seems and I’m not sure what I changed (if I changed anything at all don’t remember)
but I seem to be getting this server misbehaving error looking at the docker logs for vaultwarden I can’t seem to see anything so I’m assuming its an issue with caddy but just in case decided to post here please correct me if it is
{"level":"error","ts":1669721245.8633182,"logger":"http.log.error","msg":"dial tcp: lookup vaultwarden on 127.0.0.53:53: server misbehaving","request":{"remote_ip":"192.168.1.124","remote_port":"32667","proto":"HTTP/2.0","method":"POST","host":"viperhome.skye.moe","uri":"/identity/connect/token","headers":{"Bitwarden-Client-Name":["browser"],"User-Agent":["Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36"],"Accept-Language":["en-US,en;q=0.9"],"Accept":["application/json"],"Bitwarden-Client-Version":["2022.10.1"],"Sec-Gpc":["1"],"Accept-Encoding":["gzip, deflate, br"],"Device-Type":["2"],"Sec-Fetch-Mode":["cors"],"Sec-Fetch-Dest":["empty"],"Sec-Fetch-Site":["none"],"Content-Length":["151"],"Content-Type":["application/x-www-form-urlencoded; charset=utf-8"],"Origin":["chrome-extension://nngceckbapebfimnlniiiahkandclblb"]},"tls":{"resumed":false,"version":772,"cipher_suite":4867,"proto":"h2","server_name":"domain.1"}},"duration":0.005867847,"status":502,"err_id":"r67eimsxx","err_trace":"reverseproxy.statusError (reverseproxy.go:1272)"} {"level":"error","ts":1669721443.0998595,"logger":"http.log.error","msg":"dial tcp: lookup vaultwarden on 127.0.0.53:53: server misbehaving","request":{"remote_ip":"192.168.1.124","remote_port":"32667","proto":"HTTP/2.0","method":"POST","host":"viperhome.skye.moe","uri":"/identity/connect/token","headers":{"Bitwarden-Client-Version":["2022.10.1"],"User-Agent":["Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36"],"Content-Type":["application/x-www-form-urlencoded; charset=utf-8"],"Sec-Fetch-Site":["none"],"Sec-Fetch-Mode":["cors"],"Accept-Encoding":["gzip, deflate, br"],"Accept-Language":["en-US,en;q=0.9"],"Device-Type":["2"],"Bitwarden-Client-Name":["browser"],"Origin":["chrome-extension://nngceckbapebfimnlniiiahkandclblb"],"Sec-Fetch-Dest":["empty"],"Content-Length":["151"],"Accept":["application/json"],"Sec-Gpc":["1"]},"tls":{"resumed":false,"version":772,"cipher_suite":4867,"proto":"h2","server_name":"domain.1"}},"duration":0.008268213,"status":502,"err_id":"d081549mi","err_trace":"reverseproxy.statusError (reverseproxy.go:1272)"}
DOMAIN.1:443 {
# Use the ACME DNS-01 challenge to get a cert for the configured domain.
tls {
dns cloudflare
}
# This setting may have compatibility issues with some browsers
# (e.g., attachment downloading on Firefox). Try disabling this
# if you encounter issues.
encode gzip
# Notifications redirected to the WebSocket server
reverse_proxy /notifications/hub vaultwarden:3012
# Proxy everything else to Rocket
reverse_proxy vaultwarden:8080
}
https://DOMAIN.2 {
@hs-options {
host DOMAIN.2
method OPTIONS
}
@hs-other {
host domain.2
}
handle @hs-options {
header {
Access-Control-Allow-Origin domain.2
Access-Control-Allow-Headers *
Access-Control-Allow-Methods "POST, GET, OPTIONS, DELETE"
}
respond 204
}
handle @hs-other {
reverse_proxy http://domain.2:8080 {
header_down Access-Control-Allow-Origin domain.2
header_down Access-Control-Allow-Methods "POST, GET, OPTIONS, DELETE"
header_down Access-Control-Allow-Headers *
}
}
}
https://DOMAIN.3 {
log
reverse_proxy * 172.25.0.100:13000
}
version: "3"
services:
gluetun:
image: qmcgaw/gluetun
container_name: gluetun
# line above must be uncommented to allow external containers to connect. See https://github.com/qdm12/gluetun/wiki/Connect-a-container-to-gluetun#external-container-to-gluetun
cap_add:
- NET_ADMIN
devices:
- /dev/net/tun:/dev/net/tun
ports:
- 8888:8888/tcp # HTTP proxy
- 8388:8388/tcp # Shadowsocks
- 8388:8388/udp # Shadowsocks
- 6881:6881
- 6881:6881/udp
- 5801:5800
- 8112:8112
- 58846:58846
- 58946:58946
volumes:
- /home/rainee/config/gluetun:/gluetun
environment:
# See https://github.com/qdm12/gluetun/wiki
- VPN_SERVICE_PROVIDER=
- VPN_TYPE=wireguard
- SHADOWSOCKS=on
- SHADOWSOCKS_LOG=on
- SHADOWSOCKS_PASSWORD=
# Wireguard:
- WIREGUARD_PRIVATE_KEY=
- WIREGUARD_ADDRESSES=
- SERVER_HOSTNAMES=
- TZ=America/
# Firewall
- FIREWALL_OUTBOUND_SUBNETS=1
sysctls:
- net.ipv6.conf.all.disable_ipv6=0
jdownloader-2:
image: jlesage/jdownloader-2
container_name: jdownloader2
network_mode: "service:gluetun"
volumes:
- "/home/rainee/config/jdownloader-2:/config:rw"
- "/mnt/skycloud/downloads:/output:rw"
fenrus:
image: revenz/fenrus
container_name: fenrus
environment:
- TZ=America/
volumes:
- /home/rainee/config/fenrus:/app/data
- /home/rainee/config/fenrus/images:/app/wwwroot/images
ports:
- 3000:3000
restart: unless-stopped
deluge:
image: lscr.io/linuxserver/deluge:latest
container_name: deluge
network_mode: "service:gluetun"
environment:
- PUID=1000
- PGID=1000
- TZ=America/Los_Angeles
- DELUGE_LOGLEVEL=error
volumes:
- /home/rainee/config/deluge:/config
- /mnt/skycloud/downloads:/downloads
- /mnt/skycloud/data/torrent:/data/torrents
metube:
image: alexta69/metube
container_name: metube
restart: unless-stopped
ports:
- "8081:8081"
volumes:
- /mnt/skycloud/downloads:/downloads
vaultwarden:
image: vaultwarden/server:latest
container_name: vaultwarden
restart: always
expose:
- "3012"
- "8080"
environment:
WEBSOCKET_ENABLED: "true"
ADMIN_TOKEN: ""
YUBICO_CLIENT_ID: ""
YUBICO_SECRET_KEY: ""
ROCKET_PORT: 8080
volumes:
- /home/rainee/config/bitwarden/bw-data:/data
shoko_server:
container_name: shokoserver
image: shokoanime/server:latest
restart: always
environment:
- "PUID=1000"
- "PGID=1000"
- "TZ=America/Los_Angeles"
ports:
- "8111:8111"
volumes:
- "/home/rainee/config/shoko-config:/home/shoko/.shoko"
- "/mnt/skycloud/data/media/anime:/mnt/anime"
- "/mnt/skycloud/downloads:/mnt/import"
deemix:
image: registry.gitlab.com/bockiii/deemix-docker
container_name: Deemix
volumes:
- /mnt/skycloud/data/media/music:/downloads
- /home/rainee/config/deemix:/config
environment:
- PUID=1000
- PGID=1000
- UMASK_SET=022
- DEEMIX_SINGLE_USER=true
ports:
- 6595:6595
caddy:
image: caddy:2
container_name: caddy
restart: always
ports:
- 80:80
- 443:443
volumes:
- ./caddy:/usr/bin/caddy # Your custom build of Caddy.
- ./Caddyfile:/etc/caddy/Caddyfile:ro
- /home/rainee/config/caddyconfig/caddy-config:/config
- /home/rainee/config/caddyconfig/caddy-data:/data
environment:
DOMAIN: "domainhere" # Your domain.
EMAIL: "emailhere" # The email address to use for ACME registration.
LOG_FILE: "/data/access.log"
network_mode: "host"
headscale:
container_name: headscale
image: headscale/headscale:latest-alpine
restart: unless-stopped
# ports:
# - 8080:8080
volumes:
- /home/rainee/config/headscale/config:/etc/headscale
- /home/rainee/config/headscale/data:/var/lib/headscale
entrypoint: headscale serve
networks:
reverseproxy-nw:
headscale-ui:
container_name: headscale-ui
image: ghcr.io/gurucomputing/headscale-ui:latest
restart: unless-stopped
networks:
reverseproxy-nw:
firezone:
image: firezone/firezone
ports:
- 51820:51820/udp
env_file:
# This should contain a list of env vars for configuring Firezone.
# See https://docs.firezone.dev/reference/env-vars for more info.
- ${FZ_INSTALL_DIR:-.}/.env
volumes:
# IMPORTANT: Persists WireGuard private key and other data. If
# /var/firezone/private_key exists when Firezone starts, it is
# used as the WireGuard private. Otherwise, one is generated.
- ${FZ_INSTALL_DIR:-.}/firezone:/var/firezone
cap_add:
# Needed for WireGuard and firewall support.
- NET_ADMIN
- SYS_MODULE
sysctls:
# Needed for masquerading and NAT.
- net.ipv6.conf.all.disable_ipv6=0
- net.ipv4.ip_forward=1
- net.ipv6.conf.all.forwarding=1
depends_on:
- postgres
networks:
firezone-network:
ipv4_address: 172.25.0.100
postgres:
image: postgres:15
volumes:
- postgres-data:/var/lib/postgresql/data
environment:
POSTGRES_DB: ${DATABASE_NAME:-firezone}
POSTGRES_USER: ${DATABASE_USER:-postgres}
POSTGRES_PASSWORD: ${DATABASE_PASSWORD:?err}
networks:
- firezone-network
# Postgres needs a named volume to prevent perms issues on non-linux platforms
volumes:
postgres-data:
networks:
reverseproxy-nw:
external: true
firezone-network:
driver: bridge
ipam:
config:
- subnet: 172.25.0.0/16