- ๐ One-Click Device Wake-Up Dashboard
- โฐ Timed Events via Cron for Automation
- ๐ Ping Any Port You Choose
- ๐ Discover Devices with Network Scanning (nmap required)
- ๐ค Secured User Management
- ๐ i18n support for these languages
- ๐จ 29 Themes
- ๐ณ Docker images for amd64, arm64, arm/v7, arm/v6
- ๐ Self-Hostable
Dark | Light |
---|---|
๐ง Install from the AUR
yay -Sy upsnap-bin
Just download the latest binary from the release page and run it.
sudo ./upsnap serve --http=0.0.0.0:8090
sudo setcap cap_net_raw= ep ./upsnap # only once after downloading
./upsnap serve --http=0.0.0.0:8090
For more options check ./upsnap --help
or visit PocketBase documentation.
If you want to use network discovery, make sure to have nmap
installed and run UpSnap as root/admin.
You can use the docker-compose example. See the comments in the file for customization.
Create the mount point first:
mkdir data
Then add user: 1000:1000
to the docker-compose file (or whatever your $UID:$GID is).
If you want to change the port from 8090 to something else, change the following (5000 in this case):
entrypoint: /bin/sh -c "./upsnap serve --http 0.0.0.0:5000"
healthcheck:
test: curl -fs "http://localhost:5000/api/health" || exit 1
entrypoint: /bin/sh -c "apk update && apk add --no-cache <YOUR_PACKAGE> && rm -rf /var/cache/apk/* && ./upsnap serve --http 0.0.0.0:8090"
You can search for your needed package here.
Caddy example
upsnap.example.com {
reverse_proxy localhost:8090
}
UpSnap offers unique access for each user, per device. While admins have all permissions, they can assign specific rights to users such as displaying/hiding a device, accessing device editing, deleting and powering devices on/off. See the last screenshot in the ๐ธ Screenshots section.
Although UpSnap has user authorisation, it is not recommended to expose it to the open web and make it accessible by everyone!
Reason: The shutdown device command is basically a command piped to #sh (root if you run docker). If anyone gains unauthorized access and can abuse this api route in any way, the attacker has access to a (root) shell on your local network.
Recommended: If you need access from outside your network, please use a vpn. Wireguard or OpenVPN is your way to go.
UpSnap is available in the following languages so far:
- ๐บ๐ธ English (en-US)
- ๐ฉ๐ช German (de-DE)
- ๐ช๐ธ Spanish (es-ES)
- ๐ซ๐ท French (fr-FR)
- ๐ฎ๐น Italian (it-IT)
- ๐ณ๐ฑ Dutch (nl-NL)
- ๐ต๐น Portuguese (pt-PT)
- ๐จ๐ณ Chinese (zh-CN)
- ๐น๐ผ Chinese (Taiwan) (zh-TW)
If you want to contribute and help translating, check the wiki: How to add languages
Fork this branch and clone it.
- Start backend
cd backend
go mod tidy
go run main.go serve
- Start frontend
cd frontend
pnpm i
pnpm run dev
Open up http://localhost:5173/, create an admin user and add some devices.