Initial commit

This commit is contained in:
askiiart 2023-11-15 09:40:53 -06:00
commit e793abb6f6
Signed by untrusted user who does not match committer: askiiart
GPG key ID: BC3800E55FB54D67
46 changed files with 1428 additions and 0 deletions

1
.gitignore vendored Normal file
View file

@ -0,0 +1 @@
.htpasswd

29
conf.d/archives.conf Executable file
View file

@ -0,0 +1,29 @@
server {
server_name archives.askiiart.net;
location / {
auth_basic "Auth required";
auth_basic_user_file /etc/nginx/.htpasswd;
proxy_pass http://192.168.1.2:3688;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = archives.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name archives.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

55
conf.d/askiiart-net.conf Executable file
View file

@ -0,0 +1,55 @@
server {
server_name www.askiiart.net;
return 301 https://askiiart.net$request_uri;
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
server_name askiiart.net;
location / {
proxy_pass http://192.168.1.2:8079;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name askiiart.net;
listen 80;
return 404; # managed by Certbot
}server {
if ($host = www.askiiart.net) {
server {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name www.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/bazarr.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name bazarr.askiiart.net;
location / {
proxy_pass http://192.168.1.2:6767;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = bazarr.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name bazarr.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/bibliogram.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name bibliogram.askiiart.net;
location / {
proxy_pass http://192.168.1.2:10407;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = bibliogram.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name bibliogram.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/changedetection.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name changedetection.askiiart.net;
location / {
proxy_pass http://192.168.1.2:55463;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = changedetection.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name changedetection.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/composerize.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name composerize.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8081;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = composerize.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name composerize.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/drone.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name drone.askiiart.net;
location / {
proxy_pass http://192.168.1.2:9095;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = drone.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name drone.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/element.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name element.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8088;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = element.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name element.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/engl.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name engl.askiiart.net;
location / {
proxy_pass http://192.168.1.2:4050;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = engl.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name engl.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

28
conf.d/fedi.conf Executable file
View file

@ -0,0 +1,28 @@
server {
server_name fedi.askiiart.net;
location / {
proxy_pass http://192.168.1.2:4000;
}
client_max_body_size 10m;
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = fedi.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name fedi.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/feed.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name feed.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8077;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = feed.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name feed.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/filestash.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name filestash.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8334;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = filestash.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name filestash.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/gitea.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name git.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8085;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = git.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name git.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/home-assistant.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name home-assistant.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8123;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = home-assistant.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name home-assistant.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/invidious.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name invidious.askiiart.net;
location / {
proxy_pass http://192.168.1.2:3420;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = invidious.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name invidious.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/jellyfin.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name jellyfin.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8096;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = jellyfin.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name jellyfin.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/jellyseerr.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name jellyseerr.askiiart.net;
location / {
proxy_pass http://192.168.1.2:5055;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = jellyseerr.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name jellyseerr.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/libreddit.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name libreddit.askiiart.net;
location / {
proxy_pass http://192.168.1.2:7420;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = libreddit.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name libreddit.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/lidarr.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name lidarr.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8686;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = lidarr.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name lidarr.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

30
conf.d/matrix.conf Executable file
View file

@ -0,0 +1,30 @@
server {
server_name matrix.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8008;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
server_name matrix.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8008;
}
listen 8448 ssl;
ssl_certificate /etc/letsencrypt/live/askiiart.net-0001/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net-0001/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}

27
conf.d/nitter.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name nitter.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8087;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = nitter.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name nitter.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

37
conf.d/plantsfarmus.conf Normal file
View file

@ -0,0 +1,37 @@
server {
server_name ~^(?<subdomain>[\w-]+)\.plantsfarmus\.duckdns\.org$;
location / {
rewrite ^ https://$subdomain.askiiart.net$request_uri permanent;
}
}
server {
server_name plantsfarmus.duckdns.org;
location / {
return 301 https://askiiart.net$request_uri;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = plantsfarmus.duckdns.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name plantsfarmus.duckdns.org;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/prowlarr.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name prowlarr.askiiart.net;
location / {
proxy_pass http://192.168.1.2:9696;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = prowlarr.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name prowlarr.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/radarr.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name radarr.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8686;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = radarr.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name radarr.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

70
conf.d/registry.conf Executable file
View file

@ -0,0 +1,70 @@
# Taken from HTTP Toolkit's registry facade.
# GitHub: https://github.com/httptoolkit/docker-registry-facade
# Blog post: https://httptoolkit.com/blog/docker-image-registry-facade/
# This is arguably worse than the original, since it allows you to pull images from any org, but it's just redirects anyways, it doesn't really matter.
server {
server_name docker.askiiart.net;
location / {
return 301 https://registry.askiiart.net$request_uri;
}
#location / {
# add_header Content-Type "application/json";
# return 403 '{"errors": [{"message": "Only API requests for askiiart images are supported"}]}';
#}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
server_name registry.askiiart.net;
location /v2 {
return 307 https://registry.hub.docker.com$request_uri;
}
#location / {
# add_header Content-Type "application/json";
# return 403 '{"errors": [{"message": "Only API requests for images are supported"}]}';
#}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = docker.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name docker.askiiart.net;
listen 80;
return 404; # managed by Certbot
}
server {
if ($host = registry.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name registry.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/sabnzbd.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name sabnzbd.askiiart.net;
location / {
proxy_pass http://192.168.1.2:6788;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = sabnzbd.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name sabnzbd.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/scrutiny.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name scrutiny.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8001;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = scrutiny.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name scrutiny.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/sliding.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name sliding.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8881;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = sliding.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name sliding.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/sonarr.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name sonarr.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8989;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = sonarr.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name sonarr.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/syncthing.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name syncthing.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8384;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = syncthing.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name syncthing.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

29
conf.d/tdarr.conf Executable file
View file

@ -0,0 +1,29 @@
server {
server_name tdarr.askiiart.net;
location / {
auth_basic "Auth required";
auth_basic_user_file /etc/nginx/.htpasswd;
proxy_pass http://192.168.1.2:8265;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = tdarr.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name tdarr.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/textbook.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name textbook.askiiart.net;
location / {
proxy_pass http://192.168.1.2:6000;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = textbook.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name textbook.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

29
conf.d/tubesync.conf Executable file
View file

@ -0,0 +1,29 @@
server {
server_name tubesync.askiiart.net;
location / {
auth_basic "Auth required";
auth_basic_user_file /etc/nginx/.htpasswd;
proxy_pass http://192.168.1.2:4848;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = tubesync.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name tubesync.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/vaultwarden.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name vaultwarden.askiiart.net;
location / {
proxy_pass http://192.168.1.2:8888;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = vaultwarden.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name vaultwarden.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/wg-easy.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name wg.askiiart.net;
location / {
proxy_pass http://192.168.1.2:51821;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = wg.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name wg.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

27
conf.d/whoogle.conf Executable file
View file

@ -0,0 +1,27 @@
server {
server_name whoogle.askiiart.net;
location / {
proxy_pass http://192.168.1.2:5050;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = whoogle.askiiart.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name whoogle.askiiart.net;
listen 80;
return 404; # managed by Certbot
}

26
fastcgi.conf Executable file
View file

@ -0,0 +1,26 @@
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
fastcgi_param QUERY_STRING $query_string;
fastcgi_param REQUEST_METHOD $request_method;
fastcgi_param CONTENT_TYPE $content_type;
fastcgi_param CONTENT_LENGTH $content_length;
fastcgi_param SCRIPT_NAME $fastcgi_script_name;
fastcgi_param REQUEST_URI $request_uri;
fastcgi_param DOCUMENT_URI $document_uri;
fastcgi_param DOCUMENT_ROOT $document_root;
fastcgi_param SERVER_PROTOCOL $server_protocol;
fastcgi_param REQUEST_SCHEME $scheme;
fastcgi_param HTTPS $https if_not_empty;
fastcgi_param GATEWAY_INTERFACE CGI/1.1;
fastcgi_param SERVER_SOFTWARE nginx/$nginx_version;
fastcgi_param REMOTE_ADDR $remote_addr;
fastcgi_param REMOTE_PORT $remote_port;
fastcgi_param SERVER_ADDR $server_addr;
fastcgi_param SERVER_PORT $server_port;
fastcgi_param SERVER_NAME $server_name;
# PHP only, required if PHP was built with --enable-force-cgi-redirect
fastcgi_param REDIRECT_STATUS 200;

25
fastcgi_params Executable file
View file

@ -0,0 +1,25 @@
fastcgi_param QUERY_STRING $query_string;
fastcgi_param REQUEST_METHOD $request_method;
fastcgi_param CONTENT_TYPE $content_type;
fastcgi_param CONTENT_LENGTH $content_length;
fastcgi_param SCRIPT_NAME $fastcgi_script_name;
fastcgi_param REQUEST_URI $request_uri;
fastcgi_param DOCUMENT_URI $document_uri;
fastcgi_param DOCUMENT_ROOT $document_root;
fastcgi_param SERVER_PROTOCOL $server_protocol;
fastcgi_param REQUEST_SCHEME $scheme;
fastcgi_param HTTPS $https if_not_empty;
fastcgi_param GATEWAY_INTERFACE CGI/1.1;
fastcgi_param SERVER_SOFTWARE nginx/$nginx_version;
fastcgi_param REMOTE_ADDR $remote_addr;
fastcgi_param REMOTE_PORT $remote_port;
fastcgi_param SERVER_ADDR $server_addr;
fastcgi_param SERVER_PORT $server_port;
fastcgi_param SERVER_NAME $server_name;
# PHP only, required if PHP was built with --enable-force-cgi-redirect
fastcgi_param REDIRECT_STATUS 200;

17
http.d/default.conf Executable file
View file

@ -0,0 +1,17 @@
# This is a default site configuration which will simply return 404, preventing
# chance access to any other virtualhost.
server {
listen 80 default_server;
listen [::]:80 default_server;
# Everything is a 404
location / {
return 404;
}
# You may need this to prevent return 404 recursion.
location = /404.html {
internal;
}
}

99
mime.types Executable file
View file

@ -0,0 +1,99 @@
types {
text/html html htm shtml;
text/css css;
text/xml xml;
image/gif gif;
image/jpeg jpeg jpg;
application/javascript js;
application/atom+xml atom;
application/rss+xml rss;
text/mathml mml;
text/plain txt;
text/vnd.sun.j2me.app-descriptor jad;
text/vnd.wap.wml wml;
text/x-component htc;
image/avif avif;
image/png png;
image/svg+xml svg svgz;
image/tiff tif tiff;
image/vnd.wap.wbmp wbmp;
image/webp webp;
image/x-icon ico;
image/x-jng jng;
image/x-ms-bmp bmp;
font/woff woff;
font/woff2 woff2;
application/java-archive jar war ear;
application/json json;
application/mac-binhex40 hqx;
application/msword doc;
application/pdf pdf;
application/postscript ps eps ai;
application/rtf rtf;
application/vnd.apple.mpegurl m3u8;
application/vnd.google-earth.kml+xml kml;
application/vnd.google-earth.kmz kmz;
application/vnd.ms-excel xls;
application/vnd.ms-fontobject eot;
application/vnd.ms-powerpoint ppt;
application/vnd.oasis.opendocument.graphics odg;
application/vnd.oasis.opendocument.presentation odp;
application/vnd.oasis.opendocument.spreadsheet ods;
application/vnd.oasis.opendocument.text odt;
application/vnd.openxmlformats-officedocument.presentationml.presentation
pptx;
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
xlsx;
application/vnd.openxmlformats-officedocument.wordprocessingml.document
docx;
application/vnd.wap.wmlc wmlc;
application/wasm wasm;
application/x-7z-compressed 7z;
application/x-cocoa cco;
application/x-java-archive-diff jardiff;
application/x-java-jnlp-file jnlp;
application/x-makeself run;
application/x-perl pl pm;
application/x-pilot prc pdb;
application/x-rar-compressed rar;
application/x-redhat-package-manager rpm;
application/x-sea sea;
application/x-shockwave-flash swf;
application/x-stuffit sit;
application/x-tcl tcl tk;
application/x-x509-ca-cert der pem crt;
application/x-xpinstall xpi;
application/xhtml+xml xhtml;
application/xspf+xml xspf;
application/zip zip;
application/octet-stream bin exe dll;
application/octet-stream deb;
application/octet-stream dmg;
application/octet-stream iso img;
application/octet-stream msi msp msm;
audio/midi mid midi kar;
audio/mpeg mp3;
audio/ogg ogg;
audio/x-m4a m4a;
audio/x-realaudio ra;
video/3gpp 3gpp 3gp;
video/mp2t ts;
video/mp4 mp4;
video/mpeg mpeg mpg;
video/quicktime mov;
video/webm webm;
video/x-flv flv;
video/x-m4v m4v;
video/x-mng mng;
video/x-ms-asf asx asf;
video/x-ms-wmv wmv;
video/x-msvideo avi;
}

28
nginx.conf Executable file
View file

@ -0,0 +1,28 @@
user nginx;
worker_processes auto;
error_log /dev/null crit;
pid /var/run/nginx.pid;
events {
worker_connections 1024;
}
http {
include /etc/nginx/mime.types;
default_type application/octet-stream;
sendfile on;
#tcp_nopush on;
keepalive_timeout 65;
log_format status-only '$status';
access_log /dev/null status-only;
#gzip on;
include /etc/nginx/conf.d/*.conf;
}

103
nginx.conf.apk-new Executable file
View file

@ -0,0 +1,103 @@
# /etc/nginx/nginx.conf
user nginx;
# Set number of worker processes automatically based on number of CPU cores.
worker_processes auto;
# Enables the use of JIT for regular expressions to speed-up their processing.
pcre_jit on;
# Configures default error logger.
error_log /var/log/nginx/error.log warn;
# Includes files with directives to load dynamic modules.
include /etc/nginx/modules/*.conf;
# Include files with config snippets into the root context.
include /etc/nginx/conf.d/*.conf;
events {
# The maximum number of simultaneous connections that can be opened by
# a worker process.
worker_connections 1024;
}
http {
# Includes mapping of file name extensions to MIME types of responses
# and defines the default type.
include /etc/nginx/mime.types;
default_type application/octet-stream;
# Name servers used to resolve names of upstream servers into addresses.
# It's also needed when using tcpsocket and udpsocket in Lua modules.
#resolver 1.1.1.1 1.0.0.1 2606:4700:4700::1111 2606:4700:4700::1001;
# Don't tell nginx version to the clients. Default is 'on'.
server_tokens off;
# Specifies the maximum accepted body size of a client request, as
# indicated by the request header Content-Length. If the stated content
# length is greater than this size, then the client receives the HTTP
# error code 413. Set to 0 to disable. Default is '1m'.
client_max_body_size 1m;
# Sendfile copies data between one FD and other from within the kernel,
# which is more efficient than read() + write(). Default is off.
sendfile on;
# Causes nginx to attempt to send its HTTP response head in one packet,
# instead of using partial frames. Default is 'off'.
tcp_nopush on;
# Enables the specified protocols. Default is TLSv1 TLSv1.1 TLSv1.2.
# TIP: If you're not obligated to support ancient clients, remove TLSv1.1.
ssl_protocols TLSv1.1 TLSv1.2 TLSv1.3;
# Path of the file with Diffie-Hellman parameters for EDH ciphers.
# TIP: Generate with: `openssl dhparam -out /etc/ssl/nginx/dh2048.pem 2048`
#ssl_dhparam /etc/ssl/nginx/dh2048.pem;
# Specifies that our cipher suits should be preferred over client ciphers.
# Default is 'off'.
ssl_prefer_server_ciphers on;
# Enables a shared SSL cache with size that can hold around 8000 sessions.
# Default is 'none'.
ssl_session_cache shared:SSL:2m;
# Specifies a time during which a client may reuse the session parameters.
# Default is '5m'.
ssl_session_timeout 1h;
# Disable TLS session tickets (they are insecure). Default is 'on'.
ssl_session_tickets off;
# Enable gzipping of responses.
#gzip on;
# Set the Vary HTTP header as defined in the RFC 2616. Default is 'off'.
gzip_vary on;
# Helper variable for proxying websockets.
map $http_upgrade $connection_upgrade {
default upgrade;
'' close;
}
# Specifies the main log format.
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
# Sets the path, format, and configuration for a buffered log write.
access_log /var/log/nginx/access.log main;
# Includes virtual hosts configs.
include /etc/nginx/http.d/*.conf;
}

32
nginx.conf.bak Executable file
View file

@ -0,0 +1,32 @@
user nginx;
worker_processes auto;
error_log /var/log/nginx/error.log notice;
pid /var/run/nginx.pid;
events {
worker_connections 1024;
}
http {
include /etc/nginx/mime.types;
default_type application/octet-stream;
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
access_log /var/log/nginx/access.log main;
sendfile on;
#tcp_nopush on;
keepalive_timeout 65;
#gzip on;
include /etc/nginx/conf.d/*.conf;
}

17
scgi_params Executable file
View file

@ -0,0 +1,17 @@
scgi_param REQUEST_METHOD $request_method;
scgi_param REQUEST_URI $request_uri;
scgi_param QUERY_STRING $query_string;
scgi_param CONTENT_TYPE $content_type;
scgi_param DOCUMENT_URI $document_uri;
scgi_param DOCUMENT_ROOT $document_root;
scgi_param SCGI 1;
scgi_param SERVER_PROTOCOL $server_protocol;
scgi_param REQUEST_SCHEME $scheme;
scgi_param HTTPS $https if_not_empty;
scgi_param REMOTE_ADDR $remote_addr;
scgi_param REMOTE_PORT $remote_port;
scgi_param SERVER_PORT $server_port;
scgi_param SERVER_NAME $server_name;

17
uwsgi_params Executable file
View file

@ -0,0 +1,17 @@
uwsgi_param QUERY_STRING $query_string;
uwsgi_param REQUEST_METHOD $request_method;
uwsgi_param CONTENT_TYPE $content_type;
uwsgi_param CONTENT_LENGTH $content_length;
uwsgi_param REQUEST_URI $request_uri;
uwsgi_param PATH_INFO $document_uri;
uwsgi_param DOCUMENT_ROOT $document_root;
uwsgi_param SERVER_PROTOCOL $server_protocol;
uwsgi_param REQUEST_SCHEME $scheme;
uwsgi_param HTTPS $https if_not_empty;
uwsgi_param REMOTE_ADDR $remote_addr;
uwsgi_param REMOTE_PORT $remote_port;
uwsgi_param SERVER_PORT $server_port;
uwsgi_param SERVER_NAME $server_name;