Files
firefrost-operations-manual/deployments/whitelist-manager/nginx.conf
Claude dd2b57bce6 feat: Whitelist Manager v1.0 - Complete deployment package
- Flask web application for managing Minecraft whitelists
- Manages all 11 game servers (TX1 + NC1)
- TailwindCSS Fire & Frost themed UI
- Single player and bulk operations
- HTTP Basic Auth with password hashing
- Nginx reverse proxy + SSL configuration
- systemd service for auto-start
- Complete deployment automation

Components:
- app.py: Main Flask application with Pterodactyl API integration
- templates/index.html: Responsive web dashboard
- requirements.txt: Python dependencies
- .env: Configuration with API keys and credentials
- deploy.sh: Automated deployment script
- DEPLOYMENT.md: Step-by-step manual deployment guide
- nginx.conf: Reverse proxy configuration
- whitelist-manager.service: systemd service

Target: Ghost VPS (64.50.188.14)
Domain: whitelist.firefrostgaming.com
Login: mkrause612 / Butter2018!!

Transforms 15-minute manual task into 30-second web operation.
Zero-error whitelist management with full visibility.

Ready for deployment - FFG-STD-001 compliant
2026-02-17 03:36:48 +00:00

35 lines
1023 B
Nginx Configuration File

server {
listen 80;
server_name whitelist.firefrostgaming.com;
# Redirect all HTTP to HTTPS
return 301 https://$server_name$request_uri;
}
server {
listen 443 ssl http2;
server_name whitelist.firefrostgaming.com;
# SSL certificates (will be generated by Certbot)
ssl_certificate /etc/letsencrypt/live/whitelist.firefrostgaming.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/whitelist.firefrostgaming.com/privkey.pem;
# SSL configuration
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers HIGH:!aNULL:!MD5;
ssl_prefer_server_ciphers on;
# Proxy to Flask application
location / {
proxy_pass http://127.0.0.1:5001;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}
# Logging
access_log /var/log/nginx/whitelist.access.log;
error_log /var/log/nginx/whitelist.error.log;
}