mirror of
https://github.com/KevinMidboe/nginx.git
synced 2025-10-29 17:50:26 +00:00
All updated & new site configs
This commit is contained in:
@@ -5,9 +5,8 @@ server {
|
|||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
server_name api.kevinmidboe.com;
|
server_name api.kevinmidboe.com;
|
||||||
|
ssl_certificate /etc/letsencrypt/live/api.kevinmidboe.com-0001/fullchain.pem; # managed by Certbot
|
||||||
ssl_certificate /etc/letsencrypt/live/api.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
ssl_certificate_key /etc/letsencrypt/live/api.kevinmidboe.com-0001/privkey.pem; # managed by Certbot
|
||||||
ssl_certificate_key /etc/letsencrypt/live/api.kevinmidboe.com/privkey.pem; # managed by Certbot
|
|
||||||
|
|
||||||
location /files {
|
location /files {
|
||||||
alias /var/Www/public_files;
|
alias /var/Www/public_files;
|
||||||
@@ -34,4 +33,6 @@ server {
|
|||||||
proxy_set_header Host $host;
|
proxy_set_header Host $host;
|
||||||
proxy_cache_bypass $http_upgrade;
|
proxy_cache_bypass $http_upgrade;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
58
sites-available/brewpi.conf
Normal file
58
sites-available/brewpi.conf
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name brew.schleppe.cloud;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
gzip_static on;
|
||||||
|
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'brewpi.schleppe.cloud beer.schleppe.cloud';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://brewpi.schleppe:5000;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/brew.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/brew.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name beer.schleppe.cloud;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
gzip_static on;
|
||||||
|
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'brewpi.schleppe.cloud beer.schleppe.cloud';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://brewpi.schleppe:5000;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/beer.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/beer.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
28
sites-available/castdeck.conf
Normal file
28
sites-available/castdeck.conf
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name castdeck.schleppe.cloud;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
gzip_static on;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://castdeck.schleppe:80;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/castdeck.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/castdeck.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
@@ -5,7 +5,8 @@ server {
|
|||||||
location / {
|
location / {
|
||||||
proxy_pass http://localhost:31458;
|
proxy_pass http://localhost:31458;
|
||||||
}
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/chatbot.kevinmidboe.com-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/chatbot.kevinmidboe.com-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/chatbot.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/chatbot.kevinmidboe.com/privkey.pem; # managed by Certbot
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,176 +0,0 @@
|
|||||||
#
|
|
||||||
# You should look at the following URL's in order to grasp a solid understanding
|
|
||||||
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
|
||||||
# https://www.nginx.com/resources/wiki/start/
|
|
||||||
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
|
|
||||||
# https://wiki.debian.org/Nginx/DirectoryStructure
|
|
||||||
#
|
|
||||||
# In most cases, administrators will remove this file from sites-enabled/ and
|
|
||||||
# leave it as reference inside of sites-available where it will continue to be
|
|
||||||
# updated by the nginx packaging team.
|
|
||||||
#
|
|
||||||
# This file will automatically load configuration files provided by other
|
|
||||||
# applications, such as Drupal or Wordpress. These applications will be made
|
|
||||||
# available underneath a path with that package name, such as /drupal8.
|
|
||||||
#
|
|
||||||
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
|
|
||||||
##
|
|
||||||
|
|
||||||
# Default server configuration
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# Default should define all the routes to upgrade to https and global rules!
|
|
||||||
|
|
||||||
server {
|
|
||||||
listen 80 default_server;
|
|
||||||
listen [::]:80 default_server;
|
|
||||||
server_name *.leifsopplevelser.no ruterna.no textbars.app *.kevinmidboe.com kevinmidboe.com;
|
|
||||||
return 302 https://$host$request_uri;
|
|
||||||
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
server {
|
|
||||||
listen 443;
|
|
||||||
server_name sonarr.kevinmidboe.com;
|
|
||||||
|
|
||||||
location / {
|
|
||||||
proxy_pass http://10.0.0.102:8989;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/sonarr.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/sonarr.kevinmidboe.com/privkey.pem; # managed by Certbot
|
|
||||||
}
|
|
||||||
|
|
||||||
server {
|
|
||||||
listen 443;
|
|
||||||
server_name tau.kevinmidboe.com;
|
|
||||||
|
|
||||||
location / {
|
|
||||||
proxy_pass http://10.0.0.44:8181;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/tau.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/tau.kevinmidboe.com/privkey.pem; # managed by Certbot
|
|
||||||
}
|
|
||||||
|
|
||||||
server {
|
|
||||||
listen 443;
|
|
||||||
server_name xoa.kevinmidboe.com;
|
|
||||||
|
|
||||||
location / {
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
|
||||||
|
|
||||||
# Proxy configuration
|
|
||||||
proxy_pass http://10.0.0.43/;
|
|
||||||
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_set_header Connection "upgrade";
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
|
|
||||||
proxy_redirect default;
|
|
||||||
|
|
||||||
# Issue https://github.com/vatesfr/xen-orchestra/issues/1471
|
|
||||||
proxy_read_timeout 1800; # Error will be only every 30m
|
|
||||||
|
|
||||||
# For the VM import feature, this size must be larger than the file we want to upload.
|
|
||||||
# Without a proper value, nginx will have error "client intended to send too large body"
|
|
||||||
client_max_body_size 4G;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/xoa.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/xoa.kevinmidboe.com/privkey.pem; # managed by Certbot
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
server {
|
|
||||||
listen 443;
|
|
||||||
|
|
||||||
server_name dev.kevinmidboe.com;
|
|
||||||
|
|
||||||
location / {
|
|
||||||
proxy_pass http://localhost:11001;
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header Connection 'upgrade';
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_cache_bypass $http_upgrade;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
server {
|
|
||||||
listen 443;
|
|
||||||
listen [::]:443;
|
|
||||||
|
|
||||||
server_name kevinmidboe.com;
|
|
||||||
root /usr/share/nginx/html/;
|
|
||||||
|
|
||||||
|
|
||||||
location /jobb {
|
|
||||||
index index.html;
|
|
||||||
}
|
|
||||||
|
|
||||||
location /km {
|
|
||||||
index index.html plex.html;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
location /seasoned {
|
|
||||||
index index.html verified.html;
|
|
||||||
}
|
|
||||||
|
|
||||||
location /seasonedUI {
|
|
||||||
index index.html;
|
|
||||||
}
|
|
||||||
|
|
||||||
location /vibrate {
|
|
||||||
index index.html;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
location /assets {
|
|
||||||
alias /www/data/assets;
|
|
||||||
autoindex on;
|
|
||||||
}
|
|
||||||
|
|
||||||
location /clipboard {
|
|
||||||
index index.html;
|
|
||||||
}
|
|
||||||
|
|
||||||
location /shows {
|
|
||||||
if ($request_method = OPTIONS ) {
|
|
||||||
add_header Access-Control-Allow-Origin "https://kevinmidboe.com";
|
|
||||||
add_header Access-Control-Allow-Methods "GET, OPTIONS, POST";
|
|
||||||
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
|
||||||
return 200;
|
|
||||||
}
|
|
||||||
proxy_pass http://10.0.0.115:9301;
|
|
||||||
}
|
|
||||||
|
|
||||||
location / {
|
|
||||||
proxy_pass http://localhost:5000;
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header Connection 'upgrade';
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_cache_bypass $http_upgrade;
|
|
||||||
}
|
|
||||||
|
|
||||||
error_page 502 /502.html;
|
|
||||||
location = /502.html {
|
|
||||||
root /home/kevin;
|
|
||||||
}
|
|
||||||
ssl_certificate /etc/letsencrypt/live/kevinmidboe.com/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/kevinmidboe.com/privkey.pem; # managed by Certbot
|
|
||||||
}
|
|
||||||
|
|
||||||
411
sites-available/default.conf
Normal file
411
sites-available/default.conf
Normal file
@@ -0,0 +1,411 @@
|
|||||||
|
#
|
||||||
|
# You should look at the following URL's in order to grasp a solid understanding
|
||||||
|
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
||||||
|
# https://www.nginx.com/resources/wiki/start/
|
||||||
|
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
|
||||||
|
# https://wiki.debian.org/Nginx/DirectoryStructure
|
||||||
|
#
|
||||||
|
# In most cases, administrators will remove this file from sites-enabled/ and
|
||||||
|
# leave it as reference inside of sites-available where it will continue to be
|
||||||
|
# updated by the nginx packaging team.
|
||||||
|
#
|
||||||
|
# This file will automatically load configuration files provided by other
|
||||||
|
# applications, such as Drupal or Wordpress. These applications will be made
|
||||||
|
# available underneath a path with that package name, such as /drupal8.
|
||||||
|
#
|
||||||
|
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
|
||||||
|
##
|
||||||
|
|
||||||
|
# Default server configuration
|
||||||
|
|
||||||
|
# Default should define all the routes to upgrade to https and global rules!
|
||||||
|
|
||||||
|
server {
|
||||||
|
if ($host = es.schleppe.cloud) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
if ($host = elastic.schleppe.cloud) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
if ($host = elastic.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = blog.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = vinlottis.no) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = seasoned.show) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = ruterna.no) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = request.movie) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = planetposen.no) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = upload.leifsopplevelser.no) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = api.leifsopplevelser.no) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = knowit.vin) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = xoa.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = tau.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = sonarr.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = planet.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = kibana.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = dev.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = chatbot.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = api.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = hitler.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = proxy.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
if ($host = prox.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
if ($host = memestream.schleppe.cloud) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
if ($host = drone.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
listen 80 default_server;
|
||||||
|
listen [::]:80 default_server;
|
||||||
|
server_name planetposen.no *.leifsopplevelser.no ruterna.no *.kevinmidboe.com kevinmidboe.com knowit.vin vinlottis.no seasoned.show request.movie;
|
||||||
|
return 302 https://$host$request_uri;
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
server_name sonarr.kevinmidboe.com;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://10.0.0.51:8989;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/sonarr.kevinmidboe.com-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/sonarr.kevinmidboe.com-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
server_name tau.kevinmidboe.com;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://10.0.0.51:8181;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/tau.kevinmidboe.com-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/tau.kevinmidboe.com-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
server_name xoa.kevinmidboe.com;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
auth_basic "User authentication";
|
||||||
|
auth_basic_user_file /etc/apache2/.htpasswd;
|
||||||
|
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
|
||||||
|
# Proxy configuration
|
||||||
|
proxy_pass http://10.0.0.43/;
|
||||||
|
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
|
||||||
|
proxy_redirect default;
|
||||||
|
|
||||||
|
# Issue https://github.com/vatesfr/xen-orchestra/issues/1471
|
||||||
|
proxy_read_timeout 1800; # Error will be only every 30m
|
||||||
|
|
||||||
|
# For the VM import feature, this size must be larger than the file we want to upload.
|
||||||
|
# Without a proper value, nginx will have error "client intended to send too large body"
|
||||||
|
client_max_body_size 4G;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/vinlottis.no-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/vinlottis.no-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
|
||||||
|
server_name dev.kevinmidboe.com;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://localhost:11001;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/dev.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/dev.kevinmidboe.com/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 http2;
|
||||||
|
listen [::]:443 http2;
|
||||||
|
|
||||||
|
server_name blog.kevinmidboe.com;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, PUT, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_pass http://10.0.0.59:80;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/blog.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/blog.kevinmidboe.com/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 http2;
|
||||||
|
listen [::]:443 http2;
|
||||||
|
|
||||||
|
server_name bookit.schleppe.cloud;
|
||||||
|
root /usr/share/nginx/html/Bookit-Frontend/build;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/bookit.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/bookit.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name kevinmidboe.com;
|
||||||
|
root /usr/share/nginx/html/;
|
||||||
|
|
||||||
|
|
||||||
|
location /jobb {
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /km {
|
||||||
|
index index.html plex.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
location /seasoned {
|
||||||
|
index index.html verified.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /seasonedUI {
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /vibrate {
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
location /assets {
|
||||||
|
alias /www/data/assets;
|
||||||
|
autoindex on;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /clipboard {
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /cubewave {
|
||||||
|
alias /home/kevin/cubewave;
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /bookit {
|
||||||
|
alias /home/kevin/Bookit-Frontend/build;
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /klp {
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /kurs {
|
||||||
|
alias /usr/share/nginx/html/kurs;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /camera {
|
||||||
|
alias /usr/share/nginx/html/camera/dist/;
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /shows {
|
||||||
|
if ($request_method = OPTIONS ) {
|
||||||
|
add_header Access-Control-Allow-Origin "https://kevinmidboe.com";
|
||||||
|
add_header Access-Control-Allow-Methods "GET, OPTIONS, POST";
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
return 200;
|
||||||
|
}
|
||||||
|
|
||||||
|
proxy_pass http://10.0.0.115:9301;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
location /api {
|
||||||
|
# if ($request_method = OPTIONS) {
|
||||||
|
# return 204;
|
||||||
|
# }
|
||||||
|
|
||||||
|
|
||||||
|
# proxy_http_version 1.1;
|
||||||
|
# proxy_set_header Upgrade $http_upgrade;
|
||||||
|
# proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
# proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
|
||||||
|
proxy_set_header X-Forwarded-Proto https;
|
||||||
|
# proxy_set_header X-Forwarded-for 'request.movie';
|
||||||
|
proxy_set_header X-Forwarded-for $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
# proxy_set_header X-Forwarded-for 'request.movie';
|
||||||
|
# add_header X-Forwarded-for 'request.movie';
|
||||||
|
|
||||||
|
# proxy_set_header Connection 'upgrade';
|
||||||
|
# proxy_set_header Host $host;
|
||||||
|
# proxy_pass_header Set-Cookie;
|
||||||
|
# proxy_cache_bypass $http_upgrade;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Origin' 'http://request.movie';
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS, PUT';
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Headers' 'Content-Type, Authorization, Set-Cookie';
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Credentials' 'true';
|
||||||
|
|
||||||
|
# proxy_set_header Origin 'https://request.movie';
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
|
||||||
|
proxy_pass http://seasoned.schleppe:31459;
|
||||||
|
|
||||||
|
# add_header 'Access-Control-Allow-Origin' 'https://request.movie' always;
|
||||||
|
# add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS, PUT' always;
|
||||||
|
# add_header 'Access-Control-Allow-Credentials' 'true' always;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://10.0.0.54:5000;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
}
|
||||||
|
|
||||||
|
error_page 502 /502.html;
|
||||||
|
location = /502.html {
|
||||||
|
root /home/kevin;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/kevinmidboe.com-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/kevinmidboe.com-0001/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
91
sites-available/default.dpkg-dist
Normal file
91
sites-available/default.dpkg-dist
Normal file
@@ -0,0 +1,91 @@
|
|||||||
|
##
|
||||||
|
# You should look at the following URL's in order to grasp a solid understanding
|
||||||
|
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
||||||
|
# https://www.nginx.com/resources/wiki/start/
|
||||||
|
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
|
||||||
|
# https://wiki.debian.org/Nginx/DirectoryStructure
|
||||||
|
#
|
||||||
|
# In most cases, administrators will remove this file from sites-enabled/ and
|
||||||
|
# leave it as reference inside of sites-available where it will continue to be
|
||||||
|
# updated by the nginx packaging team.
|
||||||
|
#
|
||||||
|
# This file will automatically load configuration files provided by other
|
||||||
|
# applications, such as Drupal or Wordpress. These applications will be made
|
||||||
|
# available underneath a path with that package name, such as /drupal8.
|
||||||
|
#
|
||||||
|
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
|
||||||
|
##
|
||||||
|
|
||||||
|
# Default server configuration
|
||||||
|
#
|
||||||
|
server {
|
||||||
|
listen 80 default_server;
|
||||||
|
listen [::]:80 default_server;
|
||||||
|
|
||||||
|
# SSL configuration
|
||||||
|
#
|
||||||
|
# listen 443 ssl default_server;
|
||||||
|
# listen [::]:443 ssl default_server;
|
||||||
|
#
|
||||||
|
# Note: You should disable gzip for SSL traffic.
|
||||||
|
# See: https://bugs.debian.org/773332
|
||||||
|
#
|
||||||
|
# Read up on ssl_ciphers to ensure a secure configuration.
|
||||||
|
# See: https://bugs.debian.org/765782
|
||||||
|
#
|
||||||
|
# Self signed certs generated by the ssl-cert package
|
||||||
|
# Don't use them in a production server!
|
||||||
|
#
|
||||||
|
# include snippets/snakeoil.conf;
|
||||||
|
|
||||||
|
root /var/www/html;
|
||||||
|
|
||||||
|
# Add index.php to the list if you are using PHP
|
||||||
|
index index.html index.htm index.nginx-debian.html;
|
||||||
|
|
||||||
|
server_name _;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
# First attempt to serve request as file, then
|
||||||
|
# as directory, then fall back to displaying a 404.
|
||||||
|
try_files $uri $uri/ =404;
|
||||||
|
}
|
||||||
|
|
||||||
|
# pass PHP scripts to FastCGI server
|
||||||
|
#
|
||||||
|
#location ~ \.php$ {
|
||||||
|
# include snippets/fastcgi-php.conf;
|
||||||
|
#
|
||||||
|
# # With php-fpm (or other unix sockets):
|
||||||
|
# fastcgi_pass unix:/run/php/php7.4-fpm.sock;
|
||||||
|
# # With php-cgi (or other tcp sockets):
|
||||||
|
# fastcgi_pass 127.0.0.1:9000;
|
||||||
|
#}
|
||||||
|
|
||||||
|
# deny access to .htaccess files, if Apache's document root
|
||||||
|
# concurs with nginx's one
|
||||||
|
#
|
||||||
|
#location ~ /\.ht {
|
||||||
|
# deny all;
|
||||||
|
#}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
# Virtual Host configuration for example.com
|
||||||
|
#
|
||||||
|
# You can move that to a different file under sites-available/ and symlink that
|
||||||
|
# to sites-enabled/ to enable it.
|
||||||
|
#
|
||||||
|
#server {
|
||||||
|
# listen 80;
|
||||||
|
# listen [::]:80;
|
||||||
|
#
|
||||||
|
# server_name example.com;
|
||||||
|
#
|
||||||
|
# root /var/www/example.com;
|
||||||
|
# index index.html;
|
||||||
|
#
|
||||||
|
# location / {
|
||||||
|
# try_files $uri $uri/ =404;
|
||||||
|
# }
|
||||||
|
#}
|
||||||
24
sites-available/drone.conf
Normal file
24
sites-available/drone.conf
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
|
||||||
|
server {
|
||||||
|
# auth_basic "Drone admin access";
|
||||||
|
# auth_basic_user_file /etc/nginx/.htpasswd;
|
||||||
|
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name drone.schleppe.cloud;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://10.0.0.62:80;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/drone.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/drone.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
}
|
||||||
170
sites-available/elastic.conf
Normal file
170
sites-available/elastic.conf
Normal file
@@ -0,0 +1,170 @@
|
|||||||
|
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name kibana.schleppe.cloud;
|
||||||
|
|
||||||
|
location /ui {
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'kibana.schleppe.cloud';
|
||||||
|
proxy_pass http://10.0.0.55:5601/ui;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /app/visualize {
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'brew.schleppe.cloud';
|
||||||
|
proxy_pass http://10.0.0.55:5601/app/visualize;
|
||||||
|
}
|
||||||
|
|
||||||
|
location / {
|
||||||
|
auth_basic "Administrator's Area";
|
||||||
|
auth_basic_user_file /etc/nginx/.htpasswd;
|
||||||
|
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'kibana.schleppe.cloud';
|
||||||
|
proxy_pass http://10.0.0.55:5601;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/kibana.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/kibana.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name elastic.schleppe.cloud;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
|
||||||
|
if ($request_method = 'OPTIONS') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type, Content-Length';
|
||||||
|
add_header 'Content-Type' 'application/json; charset=utf-8';
|
||||||
|
add_header 'Content-Length' 0;
|
||||||
|
return 204;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($request_method = 'GET') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
||||||
|
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range';
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($request_method = 'POST') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
||||||
|
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range';
|
||||||
|
}
|
||||||
|
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://elastic.schleppe:9200;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/elastic.schleppe.cloud-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/elastic.schleppe.cloud-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name es.schleppe.cloud;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
|
||||||
|
if ($request_method = 'OPTIONS') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type, Content-Length';
|
||||||
|
add_header 'Content-Type' 'application/json; charset=utf-8';
|
||||||
|
add_header 'Content-Length' 0;
|
||||||
|
return 204;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($request_method = 'GET') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
||||||
|
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range';
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($request_method = 'POST') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
||||||
|
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range';
|
||||||
|
}
|
||||||
|
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://elastic.schleppe:9200;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/elastic.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/elastic.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name elastic.kevinmidboe.com;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
|
||||||
|
if ($request_method = 'OPTIONS') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type, Content-Length';
|
||||||
|
add_header 'Content-Type' 'application/json; charset=utf-8';
|
||||||
|
add_header 'Content-Length' 0;
|
||||||
|
return 204;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($request_method = 'GET') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
||||||
|
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range';
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($request_method = 'POST') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
||||||
|
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range';
|
||||||
|
}
|
||||||
|
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://elastic.schleppe:9200;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/elastic.kevinmidboe.com-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/elastic.kevinmidboe.com-0001/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
@@ -1,63 +0,0 @@
|
|||||||
|
|
||||||
|
|
||||||
server {
|
|
||||||
listen 443 ssl http2;
|
|
||||||
listen [::]:443 ssl http2;
|
|
||||||
|
|
||||||
server_name kibana.kevinmidboe.com;
|
|
||||||
|
|
||||||
location / {
|
|
||||||
|
|
||||||
proxy_pass http://10.0.0.115:5601;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/kibana.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/kibana.kevinmidboe.com/privkey.pem; # managed by Certbot
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
server {
|
|
||||||
listen 443 ssl http2;
|
|
||||||
listen [::]:443 ssl http2;
|
|
||||||
|
|
||||||
server_name elastic.kevinmidboe.com;
|
|
||||||
|
|
||||||
location / {
|
|
||||||
add_header 'Access-Control-Allow-Origin' 'https://kevinmidboe.com';
|
|
||||||
proxy_http_version 1.1;
|
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
|
||||||
proxy_set_header Connection 'upgrade';
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_cache_bypass $http_upgrade;
|
|
||||||
|
|
||||||
if ($request_method = 'OPTIONS') {
|
|
||||||
add_header 'Access-Control-Allow-Origin' 'https://kevinmidboe.com';
|
|
||||||
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
|
||||||
add_header 'Access-Control-Allow-Headers' 'Content-Type, Content-Length';
|
|
||||||
add_header 'Content-Type' 'application/json; charset=utf-8';
|
|
||||||
add_header 'Content-Length' 0;
|
|
||||||
return 204;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($request_method = 'GET') {
|
|
||||||
add_header 'Access-Control-Allow-Origin' 'https://kevinmidboe.com';
|
|
||||||
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
|
||||||
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
|
||||||
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range';
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($request_method = 'POST') {
|
|
||||||
add_header 'Access-Control-Allow-Origin' 'https://kevinmidboe.com';
|
|
||||||
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
|
||||||
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
|
||||||
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range';
|
|
||||||
}
|
|
||||||
|
|
||||||
proxy_pass http://10.0.0.115:9301;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/elastic.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/elastic.kevinmidboe.com/privkey.pem; # managed by Certbot
|
|
||||||
}
|
|
||||||
39
sites-available/fjordmap.conf
Normal file
39
sites-available/fjordmap.conf
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name fjordmap.schleppe.cloud;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
gzip_static on;
|
||||||
|
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'fjordmap.schleppe.cloud';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_set_header HTTPS YES;
|
||||||
|
fastcgi_param HTTPS on;
|
||||||
|
fastcgi_param HTTP_HTTPS on;
|
||||||
|
fastcgi_param REQUEST_SCHEME https;
|
||||||
|
fastcgi_param SERVER_PORT 443;
|
||||||
|
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://fjordmap.schleppe$request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/fjordmap.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/fjordmap.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
43
sites-available/grafana.conf
Normal file
43
sites-available/grafana.conf
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
#
|
||||||
|
# You should look at the following URL's in order to grasp a solid understanding
|
||||||
|
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
||||||
|
# https://www.nginx.com/resources/wiki/start/
|
||||||
|
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
|
||||||
|
# https://wiki.debian.org/Nginx/DirectoryStructure
|
||||||
|
#
|
||||||
|
# In most cases, administrators will remove this file from sites-enabled/ and
|
||||||
|
# leave it as reference inside of sites-available where it will continue to be
|
||||||
|
# updated by the nginx packaging team.
|
||||||
|
#
|
||||||
|
# This file will automatically load configuration files provided by other
|
||||||
|
# applications, such as Drupal or Wordpress. These applications will be made
|
||||||
|
# available underneath a path with that package name, such as /drupal8.
|
||||||
|
#
|
||||||
|
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
|
||||||
|
##
|
||||||
|
|
||||||
|
# Default server configuration
|
||||||
|
|
||||||
|
# Default should define all the routes to upgrade to https and global rules!
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name grafana.schleppe.cloud;
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
|
||||||
|
proxy_set_header X-Forwarded-Host grafana.schleppe.cloud;
|
||||||
|
proxy_set_header X-Forwarded-Proto https;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
|
||||||
|
proxy_pass http://grafana.schleppe:3000;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/grafana.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/grafana.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
29
sites-available/hitler.conf
Normal file
29
sites-available/hitler.conf
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name hitler.kevinmidboe.com;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/json;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'hitler.kevinmidboe.com';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_pass http://10.0.0.66:8080;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/hitler.kevinmidboe.com-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/hitler.kevinmidboe.com-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
27
sites-available/hiveMonitor.conf
Normal file
27
sites-available/hiveMonitor.conf
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name rosendal.buzz;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/json;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'rosendal.buzz';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_pass http://localhost:30040;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/vinlottis.no-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/vinlottis.no-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
@@ -1,47 +1,50 @@
|
|||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
server_name api.leifsopplevelser.no;
|
server_name api.leifsopplevelser.no;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://localhost:30021;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/vinlottis.no-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/vinlottis.no-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
location / {
|
|
||||||
proxy_pass http://localhost:30021;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/api.leifsopplevelser.no/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/api.leifsopplevelser.no/privkey.pem; # managed by Certbot
|
|
||||||
}
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
server_name upload.leifsopplevelser.no;
|
server_name upload.leifsopplevelser.no;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://localhost:30022;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/vinlottis.no-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/vinlottis.no-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
location / {
|
|
||||||
proxy_pass http://localhost:30022;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/upload.leifsopplevelser.no/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/upload.leifsopplevelser.no/privkey.pem; # managed by Certbot
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
server_name leifsopplevelser.no;
|
server_name leifsopplevelser.no;
|
||||||
|
|
||||||
location /assets {
|
location /assets {
|
||||||
root /home/kevin/leifs-image-processor;
|
root /home/kevin/leifs-image-processor;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://localhost:30020;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/vinlottis.no-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/vinlottis.no-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
location / {
|
|
||||||
proxy_pass http://localhost:30020;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/leifsopplevelser.no/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/leifsopplevelser.no/privkey.pem; # managed by Certbot
|
|
||||||
}
|
}
|
||||||
|
|||||||
140
sites-available/lottis.conf
Normal file
140
sites-available/lottis.conf
Normal file
@@ -0,0 +1,140 @@
|
|||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name lottis.vin;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'lottis.vin';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type, vinlottis-admin';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://vinlottis.schleppe:30030;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/lottis.vin-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/lottis.vin-0001/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name beta.lottis.vin;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'beta.lottis.vin';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type, vinlottis-admin';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://vinlottis-beta.schleppe:30030;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/beta.lottis.vin/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/beta.lottis.vin/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name kxo.lottis.vin;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'lottis.vin';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type, vinlottis-admin';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://vinlottis.schleppe:30030;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/kxo.lottis.vin/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/kxo.lottis.vin/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name aller.lottis.vin;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'lottis.vin';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type, vinlottis-admin';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://allerlottis.schleppe:30030;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/aller.lottis.vin/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/aller.lottis.vin/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name aller.vin;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
gzip_static on;
|
||||||
|
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'aller.vin';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://allerlottis.schleppe:30030;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/aller.vin/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/aller.vin/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
}
|
||||||
43
sites-available/maps.conf
Normal file
43
sites-available/maps.conf
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
#
|
||||||
|
# You should look at the following URL's in order to grasp a solid understanding
|
||||||
|
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
||||||
|
# https://www.nginx.com/resources/wiki/start/
|
||||||
|
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
|
||||||
|
# https://wiki.debian.org/Nginx/DirectoryStructure
|
||||||
|
#
|
||||||
|
# In most cases, administrators will remove this file from sites-enabled/ and
|
||||||
|
# leave it as reference inside of sites-available where it will continue to be
|
||||||
|
# updated by the nginx packaging team.
|
||||||
|
#
|
||||||
|
# This file will automatically load configuration files provided by other
|
||||||
|
# applications, such as Drupal or Wordpress. These applications will be made
|
||||||
|
# available underneath a path with that package name, such as /drupal8.
|
||||||
|
#
|
||||||
|
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
|
||||||
|
##
|
||||||
|
|
||||||
|
# Default server configuration
|
||||||
|
|
||||||
|
# Default should define all the routes to upgrade to https and global rules!
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name maps.schleppe.cloud;
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
|
||||||
|
proxy_set_header X-Forwarded-Host maps.schleppe.cloud;
|
||||||
|
proxy_set_header X-Forwarded-Proto https;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
|
||||||
|
proxy_pass http://mosaic.schleppe:3650;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/maps.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/maps.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
30
sites-available/mc.conf
Normal file
30
sites-available/mc.conf
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
|
||||||
|
server {
|
||||||
|
server_name mc.kevinmidboe.com;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://10.0.0.65:25565;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
listen 443 ssl; # managed by Certbot
|
||||||
|
ssl_certificate /etc/letsencrypt/live/mc.kevinmidboe.com-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/mc.kevinmidboe.com-0001/privkey.pem; # managed by Certbot
|
||||||
|
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
|
||||||
|
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
if ($host = mc.kevinmidboe.com) {
|
||||||
|
return 301 https://$host$request_uri;
|
||||||
|
} # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
server_name mc.kevinmidboe.com;
|
||||||
|
listen 80;
|
||||||
|
return 404; # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
23
sites-available/memestream.conf
Normal file
23
sites-available/memestream.conf
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 http2;
|
||||||
|
listen [::]:443 http2;
|
||||||
|
|
||||||
|
server_name memestream.schleppe.cloud;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, PUT, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_pass http://memestream.schleppe:80;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/memestream.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/memestream.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
29
sites-available/mondrian.conf
Normal file
29
sites-available/mondrian.conf
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name mondrian.schleppe.cloud;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
gzip_static on;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
|
||||||
|
proxy_pass http://mondrian.schleppe:3000;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/mondrian.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/mondrian.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
@@ -1,28 +1,39 @@
|
|||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 http2;
|
listen 443 http2;
|
||||||
listen [::]:443 http2;
|
listen [::]:443 http2;
|
||||||
|
|
||||||
server_name planetposen.no;
|
server_name planetposen.no;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
root /opt/planetposen-original/;
|
||||||
|
autoindex on;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/planetposen.no-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/planetposen.no-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
location / {
|
|
||||||
root /opt/planetposen/;
|
|
||||||
}
|
|
||||||
ssl_certificate /etc/letsencrypt/live/planetposen.no/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/planetposen.no/privkey.pem; # managed by Certbot
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 http2;
|
listen 443 http2;
|
||||||
listen [::]:443 http2;
|
listen [::]:443 http2;
|
||||||
|
|
||||||
server_name planet.kevinmidboe.com;
|
server_name planet.schleppe.cloud;
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
root /opt/planetposen/;
|
proxy_http_version 1.1;
|
||||||
}
|
add_header 'Access-Control-Allow-Origin' 'planet.schleppe.cloud';
|
||||||
ssl_certificate /etc/letsencrypt/live/planet.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
ssl_certificate_key /etc/letsencrypt/live/planet.kevinmidboe.com/privkey.pem; # managed by Certbot
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://planetposen.schleppe:30010;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/planet.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/planet.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
}
|
}
|
||||||
|
|||||||
25
sites-available/plex.conf
Normal file
25
sites-available/plex.conf
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
server_name sonarr.schleppe.cloud;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://blex.schleppe:8989;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/sonarr.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/sonarr.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
server_name tau.schleppe.cloud;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://blex.schleppe:8181;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/tau.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/tau.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
26
sites-available/proxmox.conf
Normal file
26
sites-available/proxmox.conf
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name prox.kevinmidboe.com;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
add_header X-Frame-Options SAMEORIGIN;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
|
||||||
|
auth_basic "User authentication";
|
||||||
|
auth_basic_user_file /etc/nginx/.htpasswd;
|
||||||
|
proxy_pass https://10.0.0.80:8006;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/prox.kevinmidboe.com-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/prox.kevinmidboe.com-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
23
sites-available/proxy.conf
Normal file
23
sites-available/proxy.conf
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name proxy.kevinmidboe.com;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_pass http://localhost:30030;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/proxy.kevinmidboe.com/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/proxy.kevinmidboe.com/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
174
sites-available/request.conf
Normal file
174
sites-available/request.conf
Normal file
@@ -0,0 +1,174 @@
|
|||||||
|
#
|
||||||
|
# You should look at the following URL's in order to grasp a solid understanding
|
||||||
|
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
||||||
|
# https://www.nginx.com/resources/wiki/start/
|
||||||
|
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
|
||||||
|
# https://wiki.debian.org/Nginx/DirectoryStructure
|
||||||
|
#
|
||||||
|
# In most cases, administrators will remove this file from sites-enabled/ and
|
||||||
|
# leave it as reference inside of sites-available where it will continue to be
|
||||||
|
# updated by the nginx packaging team.
|
||||||
|
#
|
||||||
|
# This file will automatically load configuration files provided by other
|
||||||
|
# applications, such as Drupal or Wordpress. These applications will be made
|
||||||
|
# available underneath a path with that package name, such as /drupal8.
|
||||||
|
#
|
||||||
|
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
|
||||||
|
##
|
||||||
|
|
||||||
|
# Default server configuration
|
||||||
|
|
||||||
|
# Default should define all the routes to upgrade to https and global rules!
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name request.movie;
|
||||||
|
|
||||||
|
location /api {
|
||||||
|
# if ($request_method = OPTIONS) {
|
||||||
|
# return 204;
|
||||||
|
# }
|
||||||
|
|
||||||
|
|
||||||
|
# proxy_http_version 1.1;
|
||||||
|
# proxy_set_header Upgrade $http_upgrade;
|
||||||
|
# proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
|
||||||
|
proxy_set_header X-Forwarded-Proto https;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
# add_header X-Forwarded-for 'request.movie';
|
||||||
|
|
||||||
|
# proxy_set_header Connection 'upgrade';
|
||||||
|
# proxy_set_header Host $host;
|
||||||
|
# proxy_pass_header Set-Cookie;
|
||||||
|
# proxy_cache_bypass $http_upgrade;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Origin' 'http://request.movie';
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS, PUT';
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Headers' 'Content-Type, Authorization, Set-Cookie';
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Credentials' 'true';
|
||||||
|
|
||||||
|
# proxy_set_header Origin 'https://request.movie';
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
|
||||||
|
proxy_pass http://seasoned.schleppe:31459;
|
||||||
|
|
||||||
|
# add_header 'Access-Control-Allow-Origin' 'https://request.movie' always;
|
||||||
|
# add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS, PUT' always;
|
||||||
|
# add_header 'Access-Control-Allow-Credentials' 'true' always;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
location / {
|
||||||
|
# proxy_http_version 1.1;
|
||||||
|
# proxy_set_header Upgrade $http_upgrade;
|
||||||
|
# proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
# proxy_set_header X-Forwarded-Proto https;
|
||||||
|
# proxy_set_header X-Forwarded-for $remote_addr;
|
||||||
|
|
||||||
|
# proxy_set_header X-Forwarded-For $remote_addr;
|
||||||
|
# proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
# proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
# proxy_set_header Host $http_host;
|
||||||
|
|
||||||
|
# proxy_set_header Connection 'upgrade';
|
||||||
|
# proxy_set_header Host $host;
|
||||||
|
# proxy_pass_header Set-Cookie;
|
||||||
|
# proxy_cache_bypass $http_upgrade;
|
||||||
|
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
# add_header 'Access-Control-Allow-Origin' 'request.movie';
|
||||||
|
# add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
# add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
|
||||||
|
proxy_pass http://seasoned.schleppe:5000;
|
||||||
|
}
|
||||||
|
|
||||||
|
error_page 502 /502.html;
|
||||||
|
location = /502.html {
|
||||||
|
root /home/kevin;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/request.movie-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/request.movie-0001/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name api.request.movie;
|
||||||
|
|
||||||
|
location /api {
|
||||||
|
# if ($request_method = OPTIONS) {
|
||||||
|
# return 204;
|
||||||
|
# }
|
||||||
|
|
||||||
|
|
||||||
|
# proxy_http_version 1.1;
|
||||||
|
# proxy_set_header Upgrade $http_upgrade;
|
||||||
|
# proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
# proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
|
||||||
|
proxy_set_header X-Forwarded-Proto https;
|
||||||
|
# proxy_set_header X-Forwarded-for 'request.movie';
|
||||||
|
proxy_set_header X-Forwarded-for $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
# proxy_set_header X-Forwarded-for 'request.movie';
|
||||||
|
# add_header X-Forwarded-for 'request.movie';
|
||||||
|
|
||||||
|
# proxy_set_header Connection 'upgrade';
|
||||||
|
# proxy_set_header Host $host;
|
||||||
|
# proxy_pass_header Set-Cookie;
|
||||||
|
# proxy_cache_bypass $http_upgrade;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Origin' 'http://request.movie';
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS, PUT';
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Headers' 'Content-Type, Authorization, Set-Cookie';
|
||||||
|
# proxy_set_header 'Access-Control-Allow-Credentials' 'true';
|
||||||
|
|
||||||
|
# proxy_set_header Origin 'https://request.movie';
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
|
||||||
|
proxy_pass http://seasoned.schleppe:31459;
|
||||||
|
|
||||||
|
# add_header 'Access-Control-Allow-Origin' 'https://request.movie' always;
|
||||||
|
# add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS, PUT' always;
|
||||||
|
# add_header 'Access-Control-Allow-Credentials' 'true' always;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/api.request.movie/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/api.request.movie/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name warden.request.movie;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://seasoned.schleppe:31458;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/warden.request.movie/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/warden.request.movie/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
112
sites-available/rerequest.conf
Normal file
112
sites-available/rerequest.conf
Normal file
@@ -0,0 +1,112 @@
|
|||||||
|
#
|
||||||
|
# You should look at the following URL's in order to grasp a solid understanding
|
||||||
|
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
||||||
|
# https://www.nginx.com/resources/wiki/start/
|
||||||
|
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
|
||||||
|
# https://wiki.debian.org/Nginx/DirectoryStructure
|
||||||
|
#
|
||||||
|
# In most cases, administrators will remove this file from sites-enabled/ and
|
||||||
|
# leave it as reference inside of sites-available where it will continue to be
|
||||||
|
# updated by the nginx packaging team.
|
||||||
|
#
|
||||||
|
# This file will automatically load configuration files provided by other
|
||||||
|
# applications, such as Drupal or Wordpress. These applications will be made
|
||||||
|
# available underneath a path with that package name, such as /drupal8.
|
||||||
|
#
|
||||||
|
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
|
||||||
|
##
|
||||||
|
|
||||||
|
# Default server configuration
|
||||||
|
|
||||||
|
# Default should define all the routes to upgrade to https and global rules!
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name request.movie;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
# proxy_http_version 1.1;
|
||||||
|
# proxy_set_header Upgrade $http_upgrade;
|
||||||
|
# proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
# proxy_set_header X-Forwarded-Proto https;
|
||||||
|
# proxy_set_header X-Forwarded-for $remote_addr;
|
||||||
|
|
||||||
|
# proxy_set_header X-Forwarded-For $remote_addr;
|
||||||
|
# proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
# proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
# proxy_set_header Host $http_host;
|
||||||
|
|
||||||
|
# proxy_set_header Connection 'upgrade';
|
||||||
|
# proxy_set_header Host $host;
|
||||||
|
# proxy_pass_header Set-Cookie;
|
||||||
|
# proxy_cache_bypass $http_upgrade;
|
||||||
|
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
# add_header 'Access-Control-Allow-Origin' 'request.movie';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
# add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
|
||||||
|
proxy_pass http://seasoned.schleppe:5000;
|
||||||
|
}
|
||||||
|
|
||||||
|
error_page 502 /502.html;
|
||||||
|
location = /502.html {
|
||||||
|
root /home/kevin;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/request.movie-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/request.movie-0001/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name api.request.movie;
|
||||||
|
|
||||||
|
location /api {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_pass_header Set-Cookie;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
# add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_pass http://seasoned.schleppe:31459;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/api.request.movie/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/api.request.movie/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name warden.request.movie;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://seasoned.schleppe:31458;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/warden.request.movie/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/warden.request.movie/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
@@ -1,4 +1,27 @@
|
|||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name geobus.ruterna.no;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'lottis.vin';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_pass http://localhost:31775;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/vinlottis.no-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/vinlottis.no-0001/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl http2;
|
||||||
@@ -16,7 +39,9 @@ server {
|
|||||||
|
|
||||||
proxy_pass http://localhost:30011/;
|
proxy_pass http://localhost:30011/;
|
||||||
}
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/ruterna.no-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/ruterna.no-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/ruterna.no/fullchain.pem; # managed by Certbot
|
|
||||||
ssl_certificate_key /etc/letsencrypt/live/ruterna.no/privkey.pem; # managed by Certbot
|
|
||||||
}
|
}
|
||||||
|
|||||||
81
sites-available/schleppecloud.config
Normal file
81
sites-available/schleppecloud.config
Normal file
@@ -0,0 +1,81 @@
|
|||||||
|
#
|
||||||
|
# You should look at the following URL's in order to grasp a solid understanding
|
||||||
|
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
||||||
|
# https://www.nginx.com/resources/wiki/start/
|
||||||
|
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
|
||||||
|
# https://wiki.debian.org/Nginx/DirectoryStructure
|
||||||
|
#
|
||||||
|
# In most cases, administrators will remove this file from sites-enabled/ and
|
||||||
|
# leave it as reference inside of sites-available where it will continue to be
|
||||||
|
# updated by the nginx packaging team.
|
||||||
|
#
|
||||||
|
# This file will automatically load configuration files provided by other
|
||||||
|
# applications, such as Drupal or Wordpress. These applications will be made
|
||||||
|
# available underneath a path with that package name, such as /drupal8.
|
||||||
|
#
|
||||||
|
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
|
||||||
|
##
|
||||||
|
|
||||||
|
# Default server configuration
|
||||||
|
|
||||||
|
# Default should define all the routes to upgrade to https and global rules!
|
||||||
|
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name schleppe.cloud;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
root /usr/share/nginx/schleppecloud/;
|
||||||
|
autoindex off;
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 http2;
|
||||||
|
listen [::]:443 http2;
|
||||||
|
|
||||||
|
server_name blockchain.schleppe.cloud;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
root /home/kevin/blockchain;
|
||||||
|
autoindex off;
|
||||||
|
index index.html;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/blockchain.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/blockchain.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 http2;
|
||||||
|
listen [::]:443 http2;
|
||||||
|
|
||||||
|
server_name wagovipps.schleppe.cloud;
|
||||||
|
|
||||||
|
# gzip on;
|
||||||
|
# gzip_min_length 1000;
|
||||||
|
# gzip_types text/plain application/json;
|
||||||
|
|
||||||
|
# TODO restrict to allow vipps servers
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, PUT, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_pass http://10.0.0.58:80;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/wagovipps.schleppe.cloud/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/wagovipps.schleppe.cloud/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
87
sites-available/seasoned.conf
Normal file
87
sites-available/seasoned.conf
Normal file
@@ -0,0 +1,87 @@
|
|||||||
|
#
|
||||||
|
# You should look at the following URL's in order to grasp a solid understanding
|
||||||
|
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
||||||
|
# https://www.nginx.com/resources/wiki/start/
|
||||||
|
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
|
||||||
|
# https://wiki.debian.org/Nginx/DirectoryStructure
|
||||||
|
#
|
||||||
|
# In most cases, administrators will remove this file from sites-enabled/ and
|
||||||
|
# leave it as reference inside of sites-available where it will continue to be
|
||||||
|
# updated by the nginx packaging team.
|
||||||
|
#
|
||||||
|
# This file will automatically load configuration files provided by other
|
||||||
|
# applications, such as Drupal or Wordpress. These applications will be made
|
||||||
|
# available underneath a path with that package name, such as /drupal8.
|
||||||
|
#
|
||||||
|
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
|
||||||
|
##
|
||||||
|
|
||||||
|
# Default server configuration
|
||||||
|
|
||||||
|
# Default should define all the routes to upgrade to https and global rules!
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name seasoned.show;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_pass http://10.0.0.54:5000;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
}
|
||||||
|
|
||||||
|
error_page 502 /502.html;
|
||||||
|
location = /502.html {
|
||||||
|
root /home/kevin;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/seasoned.show-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/seasoned.show-0001/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name api.seasoned.show;
|
||||||
|
|
||||||
|
location /api {
|
||||||
|
proxy_pass http://10.0.0.54:31459;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
}
|
||||||
|
ssl_certificate /etc/letsencrypt/live/api.seasoned.show-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/api.seasoned.show-0001/privkey.pem; # managed by Certbot
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443;
|
||||||
|
listen [::]:443;
|
||||||
|
|
||||||
|
server_name warden.seasoned.show;
|
||||||
|
|
||||||
|
location /api {
|
||||||
|
proxy_pass http://seasoned.schleppe:31458;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header Connection 'upgrade';
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_cache_bypass $http_upgrade;
|
||||||
|
}
|
||||||
|
}
|
||||||
26
sites-available/valg.conf
Normal file
26
sites-available/valg.conf
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name valg.schleppe.cloud;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
gzip_static on;
|
||||||
|
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'knowit.vin';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://valg.schleppe:30030;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
57
sites-available/vinlottis.conf
Normal file
57
sites-available/vinlottis.conf
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name knowit.vin;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
gzip_static on;
|
||||||
|
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'knowit.vin';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://vinlottis.schleppe:30030;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/knowit.vin-0001/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/knowit.vin-0001/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen 443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
server_name vinlottis.no;
|
||||||
|
|
||||||
|
gzip on;
|
||||||
|
gzip_types application/javascript;
|
||||||
|
gzip_min_length 1000;
|
||||||
|
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
add_header 'Access-Control-Allow-Origin' 'vinlottis.no';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'Content-Type';
|
||||||
|
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "Upgrade";
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
resolver 10.0.0.72;
|
||||||
|
proxy_pass http://vinlottis.schleppe:30030;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
ssl_certificate /etc/letsencrypt/live/vinlottis.no-0003/fullchain.pem; # managed by Certbot
|
||||||
|
ssl_certificate_key /etc/letsencrypt/live/vinlottis.no-0003/privkey.pem; # managed by Certbot
|
||||||
|
}
|
||||||
@@ -1 +1 @@
|
|||||||
../sites-available/api.kevinmidboe.conf
|
/etc/nginx/sites-available/api.kevinmidboe.conf
|
||||||
1
sites-enabled/brewpi.conf
Symbolic link
1
sites-enabled/brewpi.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/brewpi.conf
|
||||||
1
sites-enabled/castdeck.conf
Symbolic link
1
sites-enabled/castdeck.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/castdeck.conf
|
||||||
@@ -1 +1 @@
|
|||||||
../sites-available/chatbot.kevinmidboe.conf
|
/etc/nginx/sites-available/chatbot.kevinmidboe.conf
|
||||||
@@ -1 +0,0 @@
|
|||||||
../sites-available/default
|
|
||||||
1
sites-enabled/default.conf
Symbolic link
1
sites-enabled/default.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/default.conf
|
||||||
1
sites-enabled/drone.conf
Symbolic link
1
sites-enabled/drone.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/drone.conf
|
||||||
1
sites-enabled/elastic.conf
Symbolic link
1
sites-enabled/elastic.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/elastic.conf
|
||||||
@@ -1 +0,0 @@
|
|||||||
../sites-available/elastic.kevinmidboe.conf
|
|
||||||
1
sites-enabled/fjordmap.conf
Symbolic link
1
sites-enabled/fjordmap.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/fjordmap.conf
|
||||||
1
sites-enabled/grafana.conf
Symbolic link
1
sites-enabled/grafana.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/grafana.conf
|
||||||
1
sites-enabled/hitler.conf
Symbolic link
1
sites-enabled/hitler.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/hitler.conf
|
||||||
1
sites-enabled/hiveMonitor.conf
Symbolic link
1
sites-enabled/hiveMonitor.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/hiveMonitor.conf
|
||||||
@@ -1 +1 @@
|
|||||||
../sites-available/leifsopplevelser.conf
|
/etc/nginx/sites-available/leifsopplevelser.conf
|
||||||
1
sites-enabled/lottis.conf
Symbolic link
1
sites-enabled/lottis.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/lottis.conf
|
||||||
1
sites-enabled/maps.conf
Symbolic link
1
sites-enabled/maps.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/maps.conf
|
||||||
1
sites-enabled/mc.conf
Symbolic link
1
sites-enabled/mc.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/mc.conf
|
||||||
1
sites-enabled/memetream.conf
Symbolic link
1
sites-enabled/memetream.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/memestream.conf
|
||||||
1
sites-enabled/mondrian.conf
Symbolic link
1
sites-enabled/mondrian.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/mondrian.conf
|
||||||
1
sites-enabled/plex.conf
Symbolic link
1
sites-enabled/plex.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/plex.conf
|
||||||
1
sites-enabled/proxmox.conf
Symbolic link
1
sites-enabled/proxmox.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/proxmox.conf
|
||||||
1
sites-enabled/request.conf
Symbolic link
1
sites-enabled/request.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/request.conf
|
||||||
@@ -1 +1 @@
|
|||||||
../sites-available/ruterna.conf
|
/etc/nginx/sites-available/ruterna.conf
|
||||||
1
sites-enabled/schleppecloud.config
Symbolic link
1
sites-enabled/schleppecloud.config
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/schleppecloud.config
|
||||||
@@ -1 +0,0 @@
|
|||||||
../sites-available/textbars.app.conf
|
|
||||||
1
sites-enabled/vinlottis.conf
Symbolic link
1
sites-enabled/vinlottis.conf
Symbolic link
@@ -0,0 +1 @@
|
|||||||
|
/etc/nginx/sites-available/vinlottis.conf
|
||||||
Reference in New Issue
Block a user