commit e793abb6f6b9b7e4ef6595f9f6dcf2b7e137403a Author: askiiart Date: Wed Nov 15 09:40:53 2023 -0600 Initial commit diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..d76258f --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +.htpasswd \ No newline at end of file diff --git a/conf.d/archives.conf b/conf.d/archives.conf new file mode 100755 index 0000000..7f64cdb --- /dev/null +++ b/conf.d/archives.conf @@ -0,0 +1,29 @@ +server { + server_name archives.askiiart.net; + location / { + auth_basic "Auth required"; + auth_basic_user_file /etc/nginx/.htpasswd; + proxy_pass http://192.168.1.2:3688; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = archives.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name archives.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/askiiart-net.conf b/conf.d/askiiart-net.conf new file mode 100755 index 0000000..2d942ca --- /dev/null +++ b/conf.d/askiiart-net.conf @@ -0,0 +1,55 @@ +server { + server_name www.askiiart.net; + return 301 https://askiiart.net$request_uri; + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} + +server { + server_name askiiart.net; + location / { + proxy_pass http://192.168.1.2:8079; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} + + +server { + if ($host = askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name askiiart.net; + listen 80; + return 404; # managed by Certbot + + + }server { + if ($host = www.askiiart.net) { + server { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name www.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/bazarr.conf b/conf.d/bazarr.conf new file mode 100755 index 0000000..044d205 --- /dev/null +++ b/conf.d/bazarr.conf @@ -0,0 +1,27 @@ +server { + server_name bazarr.askiiart.net; + location / { + proxy_pass http://192.168.1.2:6767; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = bazarr.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name bazarr.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/bibliogram.conf b/conf.d/bibliogram.conf new file mode 100755 index 0000000..2b51cdb --- /dev/null +++ b/conf.d/bibliogram.conf @@ -0,0 +1,27 @@ +server { + server_name bibliogram.askiiart.net; + location / { + proxy_pass http://192.168.1.2:10407; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = bibliogram.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name bibliogram.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/changedetection.conf b/conf.d/changedetection.conf new file mode 100755 index 0000000..c22c219 --- /dev/null +++ b/conf.d/changedetection.conf @@ -0,0 +1,27 @@ +server { + server_name changedetection.askiiart.net; + location / { + proxy_pass http://192.168.1.2:55463; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = changedetection.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name changedetection.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/composerize.conf b/conf.d/composerize.conf new file mode 100755 index 0000000..d536ef7 --- /dev/null +++ b/conf.d/composerize.conf @@ -0,0 +1,27 @@ +server { + server_name composerize.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8081; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = composerize.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name composerize.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/drone.conf b/conf.d/drone.conf new file mode 100755 index 0000000..14bc325 --- /dev/null +++ b/conf.d/drone.conf @@ -0,0 +1,27 @@ +server { + server_name drone.askiiart.net; + location / { + proxy_pass http://192.168.1.2:9095; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = drone.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name drone.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/element.conf b/conf.d/element.conf new file mode 100755 index 0000000..be6fae9 --- /dev/null +++ b/conf.d/element.conf @@ -0,0 +1,27 @@ +server { + server_name element.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8088; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = element.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name element.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/engl.conf b/conf.d/engl.conf new file mode 100755 index 0000000..f5e4efd --- /dev/null +++ b/conf.d/engl.conf @@ -0,0 +1,27 @@ +server { + server_name engl.askiiart.net; + location / { + proxy_pass http://192.168.1.2:4050; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = engl.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name engl.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/fedi.conf b/conf.d/fedi.conf new file mode 100755 index 0000000..ae796b7 --- /dev/null +++ b/conf.d/fedi.conf @@ -0,0 +1,28 @@ +server { + server_name fedi.askiiart.net; + location / { + proxy_pass http://192.168.1.2:4000; + } + client_max_body_size 10m; + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = fedi.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name fedi.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/feed.conf b/conf.d/feed.conf new file mode 100755 index 0000000..6678c96 --- /dev/null +++ b/conf.d/feed.conf @@ -0,0 +1,27 @@ +server { + server_name feed.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8077; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = feed.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name feed.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/filestash.conf b/conf.d/filestash.conf new file mode 100755 index 0000000..f425313 --- /dev/null +++ b/conf.d/filestash.conf @@ -0,0 +1,27 @@ +server { + server_name filestash.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8334; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = filestash.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name filestash.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/gitea.conf b/conf.d/gitea.conf new file mode 100755 index 0000000..075f935 --- /dev/null +++ b/conf.d/gitea.conf @@ -0,0 +1,27 @@ +server { + server_name git.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8085; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = git.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name git.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/home-assistant.conf b/conf.d/home-assistant.conf new file mode 100755 index 0000000..4bdefa3 --- /dev/null +++ b/conf.d/home-assistant.conf @@ -0,0 +1,27 @@ +server { + server_name home-assistant.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8123; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = home-assistant.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name home-assistant.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/invidious.conf b/conf.d/invidious.conf new file mode 100755 index 0000000..0de111a --- /dev/null +++ b/conf.d/invidious.conf @@ -0,0 +1,27 @@ +server { + server_name invidious.askiiart.net; + location / { + proxy_pass http://192.168.1.2:3420; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = invidious.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name invidious.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/jellyfin.conf b/conf.d/jellyfin.conf new file mode 100755 index 0000000..becfff7 --- /dev/null +++ b/conf.d/jellyfin.conf @@ -0,0 +1,27 @@ +server { + server_name jellyfin.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8096; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = jellyfin.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name jellyfin.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/jellyseerr.conf b/conf.d/jellyseerr.conf new file mode 100755 index 0000000..141a4de --- /dev/null +++ b/conf.d/jellyseerr.conf @@ -0,0 +1,27 @@ +server { + server_name jellyseerr.askiiart.net; + location / { + proxy_pass http://192.168.1.2:5055; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = jellyseerr.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name jellyseerr.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/libreddit.conf b/conf.d/libreddit.conf new file mode 100755 index 0000000..9e09550 --- /dev/null +++ b/conf.d/libreddit.conf @@ -0,0 +1,27 @@ +server { + server_name libreddit.askiiart.net; + location / { + proxy_pass http://192.168.1.2:7420; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = libreddit.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name libreddit.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/lidarr.conf b/conf.d/lidarr.conf new file mode 100755 index 0000000..30feaa2 --- /dev/null +++ b/conf.d/lidarr.conf @@ -0,0 +1,27 @@ +server { + server_name lidarr.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8686; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = lidarr.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name lidarr.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/matrix.conf b/conf.d/matrix.conf new file mode 100755 index 0000000..38cf15e --- /dev/null +++ b/conf.d/matrix.conf @@ -0,0 +1,30 @@ +server { + server_name matrix.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8008; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} + +server { + server_name matrix.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8008; + } + + + listen 8448 ssl; + ssl_certificate /etc/letsencrypt/live/askiiart.net-0001/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net-0001/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + +} diff --git a/conf.d/nitter.conf b/conf.d/nitter.conf new file mode 100755 index 0000000..c00c6b3 --- /dev/null +++ b/conf.d/nitter.conf @@ -0,0 +1,27 @@ +server { + server_name nitter.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8087; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = nitter.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name nitter.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/plantsfarmus.conf b/conf.d/plantsfarmus.conf new file mode 100644 index 0000000..6527a64 --- /dev/null +++ b/conf.d/plantsfarmus.conf @@ -0,0 +1,37 @@ +server { + server_name ~^(?[\w-]+)\.plantsfarmus\.duckdns\.org$; + + location / { + rewrite ^ https://$subdomain.askiiart.net$request_uri permanent; + } +} + +server { + server_name plantsfarmus.duckdns.org; + + location / { + return 301 https://askiiart.net$request_uri; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + +} + + +server { + if ($host = plantsfarmus.duckdns.org) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name plantsfarmus.duckdns.org; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/prowlarr.conf b/conf.d/prowlarr.conf new file mode 100755 index 0000000..b155ed3 --- /dev/null +++ b/conf.d/prowlarr.conf @@ -0,0 +1,27 @@ +server { + server_name prowlarr.askiiart.net; + location / { + proxy_pass http://192.168.1.2:9696; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = prowlarr.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name prowlarr.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/radarr.conf b/conf.d/radarr.conf new file mode 100755 index 0000000..d30da13 --- /dev/null +++ b/conf.d/radarr.conf @@ -0,0 +1,27 @@ +server { + server_name radarr.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8686; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = radarr.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name radarr.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/registry.conf b/conf.d/registry.conf new file mode 100755 index 0000000..56d0c2f --- /dev/null +++ b/conf.d/registry.conf @@ -0,0 +1,70 @@ +# Taken from HTTP Toolkit's registry facade. +# GitHub: https://github.com/httptoolkit/docker-registry-facade +# Blog post: https://httptoolkit.com/blog/docker-image-registry-facade/ +# This is arguably worse than the original, since it allows you to pull images from any org, but it's just redirects anyways, it doesn't really matter. + +server { + server_name docker.askiiart.net; + location / { + return 301 https://registry.askiiart.net$request_uri; + } + + #location / { + # add_header Content-Type "application/json"; + # return 403 '{"errors": [{"message": "Only API requests for askiiart images are supported"}]}'; + #} + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} + +server { + server_name registry.askiiart.net; + location /v2 { + return 307 https://registry.hub.docker.com$request_uri; + } + + #location / { + # add_header Content-Type "application/json"; + # return 403 '{"errors": [{"message": "Only API requests for images are supported"}]}'; + #} + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} + +server { + if ($host = docker.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name docker.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } + + server { + if ($host = registry.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name registry.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } diff --git a/conf.d/sabnzbd.conf b/conf.d/sabnzbd.conf new file mode 100755 index 0000000..2319e32 --- /dev/null +++ b/conf.d/sabnzbd.conf @@ -0,0 +1,27 @@ +server { + server_name sabnzbd.askiiart.net; + location / { + proxy_pass http://192.168.1.2:6788; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = sabnzbd.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name sabnzbd.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/scrutiny.conf b/conf.d/scrutiny.conf new file mode 100755 index 0000000..53b37bf --- /dev/null +++ b/conf.d/scrutiny.conf @@ -0,0 +1,27 @@ +server { + server_name scrutiny.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8001; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = scrutiny.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name scrutiny.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/sliding.conf b/conf.d/sliding.conf new file mode 100755 index 0000000..77e90fa --- /dev/null +++ b/conf.d/sliding.conf @@ -0,0 +1,27 @@ +server { + server_name sliding.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8881; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = sliding.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name sliding.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/sonarr.conf b/conf.d/sonarr.conf new file mode 100755 index 0000000..afc9ad9 --- /dev/null +++ b/conf.d/sonarr.conf @@ -0,0 +1,27 @@ +server { + server_name sonarr.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8989; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = sonarr.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name sonarr.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/syncthing.conf b/conf.d/syncthing.conf new file mode 100755 index 0000000..409ac52 --- /dev/null +++ b/conf.d/syncthing.conf @@ -0,0 +1,27 @@ +server { + server_name syncthing.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8384; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = syncthing.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name syncthing.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/tdarr.conf b/conf.d/tdarr.conf new file mode 100755 index 0000000..6f196a1 --- /dev/null +++ b/conf.d/tdarr.conf @@ -0,0 +1,29 @@ +server { + server_name tdarr.askiiart.net; + location / { + auth_basic "Auth required"; + auth_basic_user_file /etc/nginx/.htpasswd; + proxy_pass http://192.168.1.2:8265; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = tdarr.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name tdarr.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/textbook.conf b/conf.d/textbook.conf new file mode 100755 index 0000000..3aa367f --- /dev/null +++ b/conf.d/textbook.conf @@ -0,0 +1,27 @@ +server { + server_name textbook.askiiart.net; + location / { + proxy_pass http://192.168.1.2:6000; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = textbook.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name textbook.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/tubesync.conf b/conf.d/tubesync.conf new file mode 100755 index 0000000..a49b22e --- /dev/null +++ b/conf.d/tubesync.conf @@ -0,0 +1,29 @@ +server { + server_name tubesync.askiiart.net; + location / { + auth_basic "Auth required"; + auth_basic_user_file /etc/nginx/.htpasswd; + proxy_pass http://192.168.1.2:4848; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = tubesync.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name tubesync.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/vaultwarden.conf b/conf.d/vaultwarden.conf new file mode 100755 index 0000000..20a49df --- /dev/null +++ b/conf.d/vaultwarden.conf @@ -0,0 +1,27 @@ +server { + server_name vaultwarden.askiiart.net; + location / { + proxy_pass http://192.168.1.2:8888; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = vaultwarden.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name vaultwarden.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/wg-easy.conf b/conf.d/wg-easy.conf new file mode 100755 index 0000000..f419474 --- /dev/null +++ b/conf.d/wg-easy.conf @@ -0,0 +1,27 @@ +server { + server_name wg.askiiart.net; + location / { + proxy_pass http://192.168.1.2:51821; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = wg.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name wg.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/conf.d/whoogle.conf b/conf.d/whoogle.conf new file mode 100755 index 0000000..96dbade --- /dev/null +++ b/conf.d/whoogle.conf @@ -0,0 +1,27 @@ +server { + server_name whoogle.askiiart.net; + location / { + proxy_pass http://192.168.1.2:5050; + } + + + listen 443 ssl; # managed by Certbot + ssl_certificate /etc/letsencrypt/live/askiiart.net/fullchain.pem; # managed by Certbot + ssl_certificate_key /etc/letsencrypt/live/askiiart.net/privkey.pem; # managed by Certbot + include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot + ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot + + +} +server { + if ($host = whoogle.askiiart.net) { + return 301 https://$host$request_uri; + } # managed by Certbot + + + server_name whoogle.askiiart.net; + listen 80; + return 404; # managed by Certbot + + + } \ No newline at end of file diff --git a/fastcgi.conf b/fastcgi.conf new file mode 100755 index 0000000..091738c --- /dev/null +++ b/fastcgi.conf @@ -0,0 +1,26 @@ + +fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; +fastcgi_param QUERY_STRING $query_string; +fastcgi_param REQUEST_METHOD $request_method; +fastcgi_param CONTENT_TYPE $content_type; +fastcgi_param CONTENT_LENGTH $content_length; + +fastcgi_param SCRIPT_NAME $fastcgi_script_name; +fastcgi_param REQUEST_URI $request_uri; +fastcgi_param DOCUMENT_URI $document_uri; +fastcgi_param DOCUMENT_ROOT $document_root; +fastcgi_param SERVER_PROTOCOL $server_protocol; +fastcgi_param REQUEST_SCHEME $scheme; +fastcgi_param HTTPS $https if_not_empty; + +fastcgi_param GATEWAY_INTERFACE CGI/1.1; +fastcgi_param SERVER_SOFTWARE nginx/$nginx_version; + +fastcgi_param REMOTE_ADDR $remote_addr; +fastcgi_param REMOTE_PORT $remote_port; +fastcgi_param SERVER_ADDR $server_addr; +fastcgi_param SERVER_PORT $server_port; +fastcgi_param SERVER_NAME $server_name; + +# PHP only, required if PHP was built with --enable-force-cgi-redirect +fastcgi_param REDIRECT_STATUS 200; diff --git a/fastcgi_params b/fastcgi_params new file mode 100755 index 0000000..28decb9 --- /dev/null +++ b/fastcgi_params @@ -0,0 +1,25 @@ + +fastcgi_param QUERY_STRING $query_string; +fastcgi_param REQUEST_METHOD $request_method; +fastcgi_param CONTENT_TYPE $content_type; +fastcgi_param CONTENT_LENGTH $content_length; + +fastcgi_param SCRIPT_NAME $fastcgi_script_name; +fastcgi_param REQUEST_URI $request_uri; +fastcgi_param DOCUMENT_URI $document_uri; +fastcgi_param DOCUMENT_ROOT $document_root; +fastcgi_param SERVER_PROTOCOL $server_protocol; +fastcgi_param REQUEST_SCHEME $scheme; +fastcgi_param HTTPS $https if_not_empty; + +fastcgi_param GATEWAY_INTERFACE CGI/1.1; +fastcgi_param SERVER_SOFTWARE nginx/$nginx_version; + +fastcgi_param REMOTE_ADDR $remote_addr; +fastcgi_param REMOTE_PORT $remote_port; +fastcgi_param SERVER_ADDR $server_addr; +fastcgi_param SERVER_PORT $server_port; +fastcgi_param SERVER_NAME $server_name; + +# PHP only, required if PHP was built with --enable-force-cgi-redirect +fastcgi_param REDIRECT_STATUS 200; diff --git a/http.d/default.conf b/http.d/default.conf new file mode 100755 index 0000000..4704a69 --- /dev/null +++ b/http.d/default.conf @@ -0,0 +1,17 @@ +# This is a default site configuration which will simply return 404, preventing +# chance access to any other virtualhost. + +server { + listen 80 default_server; + listen [::]:80 default_server; + + # Everything is a 404 + location / { + return 404; + } + + # You may need this to prevent return 404 recursion. + location = /404.html { + internal; + } +} diff --git a/mime.types b/mime.types new file mode 100755 index 0000000..1c00d70 --- /dev/null +++ b/mime.types @@ -0,0 +1,99 @@ + +types { + text/html html htm shtml; + text/css css; + text/xml xml; + image/gif gif; + image/jpeg jpeg jpg; + application/javascript js; + application/atom+xml atom; + application/rss+xml rss; + + text/mathml mml; + text/plain txt; + text/vnd.sun.j2me.app-descriptor jad; + text/vnd.wap.wml wml; + text/x-component htc; + + image/avif avif; + image/png png; + image/svg+xml svg svgz; + image/tiff tif tiff; + image/vnd.wap.wbmp wbmp; + image/webp webp; + image/x-icon ico; + image/x-jng jng; + image/x-ms-bmp bmp; + + font/woff woff; + font/woff2 woff2; + + application/java-archive jar war ear; + application/json json; + application/mac-binhex40 hqx; + application/msword doc; + application/pdf pdf; + application/postscript ps eps ai; + application/rtf rtf; + application/vnd.apple.mpegurl m3u8; + application/vnd.google-earth.kml+xml kml; + application/vnd.google-earth.kmz kmz; + application/vnd.ms-excel xls; + application/vnd.ms-fontobject eot; + application/vnd.ms-powerpoint ppt; + application/vnd.oasis.opendocument.graphics odg; + application/vnd.oasis.opendocument.presentation odp; + application/vnd.oasis.opendocument.spreadsheet ods; + application/vnd.oasis.opendocument.text odt; + application/vnd.openxmlformats-officedocument.presentationml.presentation + pptx; + application/vnd.openxmlformats-officedocument.spreadsheetml.sheet + xlsx; + application/vnd.openxmlformats-officedocument.wordprocessingml.document + docx; + application/vnd.wap.wmlc wmlc; + application/wasm wasm; + application/x-7z-compressed 7z; + application/x-cocoa cco; + application/x-java-archive-diff jardiff; + application/x-java-jnlp-file jnlp; + application/x-makeself run; + application/x-perl pl pm; + application/x-pilot prc pdb; + application/x-rar-compressed rar; + application/x-redhat-package-manager rpm; + application/x-sea sea; + application/x-shockwave-flash swf; + application/x-stuffit sit; + application/x-tcl tcl tk; + application/x-x509-ca-cert der pem crt; + application/x-xpinstall xpi; + application/xhtml+xml xhtml; + application/xspf+xml xspf; + application/zip zip; + + application/octet-stream bin exe dll; + application/octet-stream deb; + application/octet-stream dmg; + application/octet-stream iso img; + application/octet-stream msi msp msm; + + audio/midi mid midi kar; + audio/mpeg mp3; + audio/ogg ogg; + audio/x-m4a m4a; + audio/x-realaudio ra; + + video/3gpp 3gpp 3gp; + video/mp2t ts; + video/mp4 mp4; + video/mpeg mpeg mpg; + video/quicktime mov; + video/webm webm; + video/x-flv flv; + video/x-m4v m4v; + video/x-mng mng; + video/x-ms-asf asx asf; + video/x-ms-wmv wmv; + video/x-msvideo avi; +} diff --git a/nginx.conf b/nginx.conf new file mode 100755 index 0000000..bb93038 --- /dev/null +++ b/nginx.conf @@ -0,0 +1,28 @@ + +user nginx; +worker_processes auto; + +error_log /dev/null crit; + +pid /var/run/nginx.pid; + +events { + worker_connections 1024; +} + +http { + include /etc/nginx/mime.types; + default_type application/octet-stream; + + + sendfile on; + #tcp_nopush on; + + keepalive_timeout 65; + + log_format status-only '$status'; + access_log /dev/null status-only; + + #gzip on; + include /etc/nginx/conf.d/*.conf; +} diff --git a/nginx.conf.apk-new b/nginx.conf.apk-new new file mode 100755 index 0000000..919bd59 --- /dev/null +++ b/nginx.conf.apk-new @@ -0,0 +1,103 @@ +# /etc/nginx/nginx.conf + +user nginx; + +# Set number of worker processes automatically based on number of CPU cores. +worker_processes auto; + +# Enables the use of JIT for regular expressions to speed-up their processing. +pcre_jit on; + +# Configures default error logger. +error_log /var/log/nginx/error.log warn; + +# Includes files with directives to load dynamic modules. +include /etc/nginx/modules/*.conf; + +# Include files with config snippets into the root context. +include /etc/nginx/conf.d/*.conf; + +events { + # The maximum number of simultaneous connections that can be opened by + # a worker process. + worker_connections 1024; +} + +http { + # Includes mapping of file name extensions to MIME types of responses + # and defines the default type. + include /etc/nginx/mime.types; + default_type application/octet-stream; + + # Name servers used to resolve names of upstream servers into addresses. + # It's also needed when using tcpsocket and udpsocket in Lua modules. + #resolver 1.1.1.1 1.0.0.1 2606:4700:4700::1111 2606:4700:4700::1001; + + # Don't tell nginx version to the clients. Default is 'on'. + server_tokens off; + + # Specifies the maximum accepted body size of a client request, as + # indicated by the request header Content-Length. If the stated content + # length is greater than this size, then the client receives the HTTP + # error code 413. Set to 0 to disable. Default is '1m'. + client_max_body_size 1m; + + # Sendfile copies data between one FD and other from within the kernel, + # which is more efficient than read() + write(). Default is off. + sendfile on; + + # Causes nginx to attempt to send its HTTP response head in one packet, + # instead of using partial frames. Default is 'off'. + tcp_nopush on; + + + # Enables the specified protocols. Default is TLSv1 TLSv1.1 TLSv1.2. + # TIP: If you're not obligated to support ancient clients, remove TLSv1.1. + ssl_protocols TLSv1.1 TLSv1.2 TLSv1.3; + + # Path of the file with Diffie-Hellman parameters for EDH ciphers. + # TIP: Generate with: `openssl dhparam -out /etc/ssl/nginx/dh2048.pem 2048` + #ssl_dhparam /etc/ssl/nginx/dh2048.pem; + + # Specifies that our cipher suits should be preferred over client ciphers. + # Default is 'off'. + ssl_prefer_server_ciphers on; + + # Enables a shared SSL cache with size that can hold around 8000 sessions. + # Default is 'none'. + ssl_session_cache shared:SSL:2m; + + # Specifies a time during which a client may reuse the session parameters. + # Default is '5m'. + ssl_session_timeout 1h; + + # Disable TLS session tickets (they are insecure). Default is 'on'. + ssl_session_tickets off; + + + # Enable gzipping of responses. + #gzip on; + + # Set the Vary HTTP header as defined in the RFC 2616. Default is 'off'. + gzip_vary on; + + + # Helper variable for proxying websockets. + map $http_upgrade $connection_upgrade { + default upgrade; + '' close; + } + + + # Specifies the main log format. + log_format main '$remote_addr - $remote_user [$time_local] "$request" ' + '$status $body_bytes_sent "$http_referer" ' + '"$http_user_agent" "$http_x_forwarded_for"'; + + # Sets the path, format, and configuration for a buffered log write. + access_log /var/log/nginx/access.log main; + + + # Includes virtual hosts configs. + include /etc/nginx/http.d/*.conf; +} diff --git a/nginx.conf.bak b/nginx.conf.bak new file mode 100755 index 0000000..5e076aa --- /dev/null +++ b/nginx.conf.bak @@ -0,0 +1,32 @@ + +user nginx; +worker_processes auto; + +error_log /var/log/nginx/error.log notice; +pid /var/run/nginx.pid; + + +events { + worker_connections 1024; +} + + +http { + include /etc/nginx/mime.types; + default_type application/octet-stream; + + log_format main '$remote_addr - $remote_user [$time_local] "$request" ' + '$status $body_bytes_sent "$http_referer" ' + '"$http_user_agent" "$http_x_forwarded_for"'; + + access_log /var/log/nginx/access.log main; + + sendfile on; + #tcp_nopush on; + + keepalive_timeout 65; + + #gzip on; + + include /etc/nginx/conf.d/*.conf; +} diff --git a/scgi_params b/scgi_params new file mode 100755 index 0000000..6d4ce4f --- /dev/null +++ b/scgi_params @@ -0,0 +1,17 @@ + +scgi_param REQUEST_METHOD $request_method; +scgi_param REQUEST_URI $request_uri; +scgi_param QUERY_STRING $query_string; +scgi_param CONTENT_TYPE $content_type; + +scgi_param DOCUMENT_URI $document_uri; +scgi_param DOCUMENT_ROOT $document_root; +scgi_param SCGI 1; +scgi_param SERVER_PROTOCOL $server_protocol; +scgi_param REQUEST_SCHEME $scheme; +scgi_param HTTPS $https if_not_empty; + +scgi_param REMOTE_ADDR $remote_addr; +scgi_param REMOTE_PORT $remote_port; +scgi_param SERVER_PORT $server_port; +scgi_param SERVER_NAME $server_name; diff --git a/uwsgi_params b/uwsgi_params new file mode 100755 index 0000000..09c732c --- /dev/null +++ b/uwsgi_params @@ -0,0 +1,17 @@ + +uwsgi_param QUERY_STRING $query_string; +uwsgi_param REQUEST_METHOD $request_method; +uwsgi_param CONTENT_TYPE $content_type; +uwsgi_param CONTENT_LENGTH $content_length; + +uwsgi_param REQUEST_URI $request_uri; +uwsgi_param PATH_INFO $document_uri; +uwsgi_param DOCUMENT_ROOT $document_root; +uwsgi_param SERVER_PROTOCOL $server_protocol; +uwsgi_param REQUEST_SCHEME $scheme; +uwsgi_param HTTPS $https if_not_empty; + +uwsgi_param REMOTE_ADDR $remote_addr; +uwsgi_param REMOTE_PORT $remote_port; +uwsgi_param SERVER_PORT $server_port; +uwsgi_param SERVER_NAME $server_name;