01-31-a
This commit is contained in:
@ -1,9 +1,6 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/affirm.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/affirm.duckdns.org.key -out /etc/nginx/include/affirm.phares.duckdns.org.crt -config /etc/nginx/include/affirm.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-affirm/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-affirm/affirm.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-affirm/affirm.duckdns.org.key;
|
||||
ssl_certificate /home/podman/wild-affirm/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-affirm/affirm.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name *.affirm.duckdns.org;
|
||||
|
@ -1,9 +1,6 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/bchs.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/bchs.duckdns.org.key -out /etc/nginx/include/bchs.phares.duckdns.org.crt -config /etc/nginx/include/bchs.phares.duckdns.org
|
||||
ssl_certificate /root/.acme.sh/wild-bchs/fullchain.cer;
|
||||
# ssl_certificate /root/.acme.sh/wild-bchs/bchs.duckdns.org.cer;
|
||||
ssl_certificate_key /root/.acme.sh/wild-bchs/bchs.duckdns.org.key;
|
||||
ssl_certificate /home/podman/wild-bchs/fullchain.pem;
|
||||
ssl_certificate_key /home/podman/wild-bchs/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name *.bchs.duckdns.org;
|
||||
|
23
etc/nginx/include/beszel.conf
Normal file
23
etc/nginx/include/beszel.conf
Normal file
@ -0,0 +1,23 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/beszel.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/beszel.phares.duckdns.org.key -out /etc/nginx/include/beszel.phares.duckdns.org.crt -config /etc/nginx/include/beszel.phares.duckdns.org
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name beszel.phares.duckdns.org;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:5023/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
proxy_connect_timeout 600s;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
}
|
||||
}
|
@ -17,4 +17,89 @@ server {
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.phares3757.ddns.net;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.phares.redirectme.net;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.chickenkiller.com;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.jumpingcrab.com;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
||||
server {
|
||||
ssl_certificate /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name gitea.twilightparadox.com;
|
||||
client_max_body_size 5000m;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:3000/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
}
|
||||
}
|
12
etc/nginx/include/jmlc.conf
Normal file
12
etc/nginx/include/jmlc.conf
Normal file
@ -0,0 +1,12 @@
|
||||
server {
|
||||
ssl_certificate /home/podman/wild-jmlc/fullchain.cer;
|
||||
ssl_certificate_key /home/podman/wild-jmlc/jmlc.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name *.jmlc.duckdns.org;
|
||||
root /var/www/html-jmlc;
|
||||
index index.html index.htm;
|
||||
location / {
|
||||
try_files $uri $uri.html $uri/ =404;
|
||||
}
|
||||
}
|
@ -1,19 +1,20 @@
|
||||
server {
|
||||
# touch /etc/nginx/include/odoo.ddns.net
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/odoo.ddns.net.key -out /etc/nginx/include/odoo.ddns.net.crt -config /etc/nginx/include/odoo.ddns.net
|
||||
# touch /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org
|
||||
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org.key -out /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org.crt -config /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org
|
||||
ssl_certificate /home/podman/wild-phares/fullchain.cer;
|
||||
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
|
||||
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
listen 443 ssl http2;
|
||||
server_name odoo.phares.duckdns.org;
|
||||
server_name kanbn-to-quartz.phares.duckdns.org;
|
||||
location / {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://192.168.11.2:8069/;
|
||||
proxy_pass http://192.168.11.2:5024/;
|
||||
proxy_read_timeout 600s;
|
||||
proxy_send_timeout 600s;
|
||||
add_header Access-Control-Allow-Origin *;
|
||||
}
|
||||
}
|
@ -1,12 +1,12 @@
|
||||
# server {
|
||||
# listen 80 default_server;
|
||||
# root /var/www/certbot;
|
||||
# index index.html index.htm index.nginx-debian.html;
|
||||
# server_name phares.duckdns.org;
|
||||
# location / {
|
||||
# try_files $uri $uri/ =404;
|
||||
# }
|
||||
# }
|
||||
server {
|
||||
listen 80 default_server;
|
||||
root /var/www/certbot;
|
||||
index index.html index.htm index.nginx-debian.html;
|
||||
server_name _;
|
||||
location / {
|
||||
try_files $uri $uri/ =404;
|
||||
}
|
||||
}
|
||||
server {
|
||||
listen 8083 default_server;
|
||||
root /var/www/html-nginx;
|
||||
|
@ -18,6 +18,7 @@ include /etc/nginx/include/adguard.conf; # https://adguard.phares.duckdns.org #
|
||||
include /etc/nginx/include/authentik.conf; # https://authentik.phares.duckdns.org # https://192.168.11.2:5018/
|
||||
include /etc/nginx/include/affirm.conf; # https://*.affirm.duckdns.org # /var/www/html-affirm
|
||||
include /etc/nginx/include/baikal.conf; # https://baikal.phares.duckdns.org # http://192.168.11.2:8001/
|
||||
include /etc/nginx/include/beszel.conf; # https://beszel.phares.duckdns.org # http://192.168.11.2:5023/
|
||||
include /etc/nginx/include/bchs.conf; # https://*.bchs.duckdns.org # /var/www/html-bchs
|
||||
include /etc/nginx/include/blinko.conf; # https://blinko.phares.duckdns.org # http://192.168.11.2:5012/
|
||||
include /etc/nginx/include/cockpit.conf; # https://cockpit.phares.duckdns.org # https://127.0.0.1:9090/
|
||||
@ -29,10 +30,11 @@ include /etc/nginx/include/gotify.conf; # https://gotify.phares.duckdns.org # ht
|
||||
include /etc/nginx/include/immich-kiosk.conf; # https://immich-kiosk.phares.duckdns.org # http://192.168.11.2:5010/
|
||||
include /etc/nginx/include/immich-to-slideshow.conf; # https://immich-to-slideshow.phares.duckdns.org # http://192.168.11.2:5009/
|
||||
include /etc/nginx/include/immich.conf; # https://immich.phares.duckdns.org # http://192.168.11.2:3001/
|
||||
include /etc/nginx/include/jmlc.conf; # https://*.jmlc.duckdns.org # /var/www/html-jmlc
|
||||
include /etc/nginx/include/kanbn-to-quartz.conf; # https://kanbn-to-quartz.phares.duckdns.org # http://192.168.11.2:5024/
|
||||
include /etc/nginx/include/kuma.conf; # https://kuma.phares.duckdns.org # https://192.168.11.2:3004/
|
||||
include /etc/nginx/include/linkwarden.conf; # https://linkwarden.phares.duckdns.org # http://192.168.11.2:5011/
|
||||
include /etc/nginx/include/mattermost.conf; # https://mattermost.phares.duckdns.org # https://192.168.11.2:8443/
|
||||
include /etc/nginx/include/odoo.conf; # https://odoo.phares.duckdns.org # http://192.168.11.2:8069/
|
||||
include /etc/nginx/include/passed.conf; # https://passed.phares.duckdns.org # http://192.168.11.2:5022/
|
||||
include /etc/nginx/include/pgadmin.conf; # https://pgadmin.phares.duckdns.org # https://192.168.11.2:5007/
|
||||
include /etc/nginx/include/phares.conf; # https://phares.duckdns.org # /var/www/html-nginx
|
||||
|
Reference in New Issue
Block a user