This commit is contained in:
2025-01-31 19:39:53 -07:00
parent 1c0b573f60
commit cf6e52b572
47 changed files with 798 additions and 31 deletions

View File

@ -1,9 +1,6 @@
server {
# touch /etc/nginx/include/affirm.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/affirm.duckdns.org.key -out /etc/nginx/include/affirm.phares.duckdns.org.crt -config /etc/nginx/include/affirm.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-affirm/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-affirm/affirm.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-affirm/affirm.duckdns.org.key;
ssl_certificate /home/podman/wild-affirm/fullchain.cer;
ssl_certificate_key /home/podman/wild-affirm/affirm.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.affirm.duckdns.org;

View File

@ -1,9 +1,6 @@
server {
# touch /etc/nginx/include/bchs.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/bchs.duckdns.org.key -out /etc/nginx/include/bchs.phares.duckdns.org.crt -config /etc/nginx/include/bchs.phares.duckdns.org
ssl_certificate /root/.acme.sh/wild-bchs/fullchain.cer;
# ssl_certificate /root/.acme.sh/wild-bchs/bchs.duckdns.org.cer;
ssl_certificate_key /root/.acme.sh/wild-bchs/bchs.duckdns.org.key;
ssl_certificate /home/podman/wild-bchs/fullchain.pem;
ssl_certificate_key /home/podman/wild-bchs/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.bchs.duckdns.org;

View File

@ -0,0 +1,23 @@
server {
# touch /etc/nginx/include/beszel.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/beszel.phares.duckdns.org.key -out /etc/nginx/include/beszel.phares.duckdns.org.crt -config /etc/nginx/include/beszel.phares.duckdns.org
ssl_certificate /home/podman/wild-phares/fullchain.cer;
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name beszel.phares.duckdns.org;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:5023/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
proxy_connect_timeout 600s;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
}

View File

@ -17,4 +17,89 @@ server {
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.phares3757.ddns.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.phares3757.ddns.net/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.phares3757.ddns.net;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.phares.redirectme.net;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.phares.redirectme.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.phares.redirectme.net/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.chickenkiller.com;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.jumpingcrab.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.jumpingcrab.com/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.jumpingcrab.com;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}
server {
ssl_certificate /etc/letsencrypt/live/gitea.twilightparadox.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/gitea.twilightparadox.com/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name gitea.twilightparadox.com;
client_max_body_size 5000m;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:3000/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
}
}

View File

@ -0,0 +1,12 @@
server {
ssl_certificate /home/podman/wild-jmlc/fullchain.cer;
ssl_certificate_key /home/podman/wild-jmlc/jmlc.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name *.jmlc.duckdns.org;
root /var/www/html-jmlc;
index index.html index.htm;
location / {
try_files $uri $uri.html $uri/ =404;
}
}

View File

@ -1,19 +1,20 @@
server {
# touch /etc/nginx/include/odoo.ddns.net
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/odoo.ddns.net.key -out /etc/nginx/include/odoo.ddns.net.crt -config /etc/nginx/include/odoo.ddns.net
# touch /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org.key -out /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org.crt -config /etc/nginx/include/kanbn-to-quartz.phares.duckdns.org
ssl_certificate /home/podman/wild-phares/fullchain.cer;
# ssl_certificate /home/podman/wild-phares/phares.duckdns.org.cer;
ssl_certificate_key /home/podman/wild-phares/phares.duckdns.org.key;
ssl_protocols TLSv1.2 TLSv1.3;
listen 443 ssl http2;
server_name odoo.phares.duckdns.org;
server_name kanbn-to-quartz.phares.duckdns.org;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://192.168.11.2:8069/;
proxy_pass http://192.168.11.2:5024/;
proxy_read_timeout 600s;
proxy_send_timeout 600s;
add_header Access-Control-Allow-Origin *;
}
}

View File

@ -1,12 +1,12 @@
# server {
# listen 80 default_server;
# root /var/www/certbot;
# index index.html index.htm index.nginx-debian.html;
# server_name phares.duckdns.org;
# location / {
# try_files $uri $uri/ =404;
# }
# }
server {
listen 80 default_server;
root /var/www/certbot;
index index.html index.htm index.nginx-debian.html;
server_name _;
location / {
try_files $uri $uri/ =404;
}
}
server {
listen 8083 default_server;
root /var/www/html-nginx;