init
This commit is contained in:
commit
d785ca8840
15
conf.d/gitea.conf
Normal file
15
conf.d/gitea.conf
Normal file
@ -0,0 +1,15 @@
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name root-kit.ru;
|
||||
|
||||
ssl_certificate /usr/local/etc/letsencrypt/live/root-kit.ru/fullchain.pem;
|
||||
ssl_certificate_key /usr/local/etc/letsencrypt/live/root-kit.ru/privkey.pem;
|
||||
|
||||
location / {
|
||||
proxy_pass http://127.0.0.1:3000;
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
}
|
||||
}
|
13
conf.d/http.conf
Normal file
13
conf.d/http.conf
Normal file
@ -0,0 +1,13 @@
|
||||
server {
|
||||
listen 80;
|
||||
server_name root-kit.ru;
|
||||
|
||||
# Prevent nginx HTTP Server Detection
|
||||
server_tokens off;
|
||||
|
||||
# Редирект с HTTP на HTTPS
|
||||
#return 301 https://$host$request_uri;
|
||||
location / {
|
||||
rewrite ^ https://$http_host$request_uri? permanent; # force redirect http to https
|
||||
}
|
||||
}
|
26
conf.d/postfixadmin.conf
Normal file
26
conf.d/postfixadmin.conf
Normal file
@ -0,0 +1,26 @@
|
||||
server {
|
||||
listen 777 ssl;
|
||||
server_name root-kit.ru;
|
||||
|
||||
ssl_certificate /usr/local/etc/letsencrypt/live/root-kit.ru/fullchain.pem;
|
||||
ssl_certificate_key /usr/local/etc/letsencrypt/live/root-kit.ru/privkey.pem;
|
||||
|
||||
root /usr/local/www/postfixadmin/public;
|
||||
|
||||
index index.php index.html index.htm;
|
||||
|
||||
location / {
|
||||
try_files $uri $uri/ /index.php?$query_string;
|
||||
}
|
||||
|
||||
location ~ \.php$ {
|
||||
include fastcgi_params;
|
||||
fastcgi_pass 127.0.0.1:9000;
|
||||
fastcgi_index index.php;
|
||||
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
|
||||
}
|
||||
|
||||
location ~ /\.ht {
|
||||
deny all;
|
||||
}
|
||||
}
|
22
conf.d/punkcraft.conf
Normal file
22
conf.d/punkcraft.conf
Normal file
@ -0,0 +1,22 @@
|
||||
server {
|
||||
listen 443 ssl;
|
||||
server_name punkcraft.ru;
|
||||
|
||||
ssl_certificate /usr/local/etc/letsencrypt/live/punkcraft.ru/fullchain.pem;
|
||||
ssl_certificate_key /usr/local/etc/letsencrypt/live/punkcraft.ru/privkey.pem;
|
||||
|
||||
# Указываем корневую директорию проекта
|
||||
root /home/xer/punkcraft/frontend/dist;
|
||||
|
||||
# Обрабатываем запросы к статическим файлам
|
||||
location /assets {
|
||||
alias /home/xer/punkcraft/frontend/dist/assets;
|
||||
expires 1y;
|
||||
access_log off;
|
||||
add_header Cache-Control "public";
|
||||
}
|
||||
|
||||
location / {
|
||||
try_files $uri $uri/ /index.html;
|
||||
}
|
||||
}
|
15
conf.d/punkcraft_backend.conf
Normal file
15
conf.d/punkcraft_backend.conf
Normal file
@ -0,0 +1,15 @@
|
||||
server {
|
||||
listen 3002 ssl;
|
||||
server_name root-kit.ru;
|
||||
|
||||
ssl_certificate /usr/local/etc/letsencrypt/live/root-kit.ru/fullchain.pem;
|
||||
ssl_certificate_key /usr/local/etc/letsencrypt/live/root-kit.ru/privkey.pem;
|
||||
|
||||
location / {
|
||||
proxy_pass http://127.0.0.1:3001;
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
}
|
||||
}
|
72
conf.d/seafile.conf
Normal file
72
conf.d/seafile.conf
Normal file
@ -0,0 +1,72 @@
|
||||
server {
|
||||
listen 666 ssl;
|
||||
server_name root-kit.ru;
|
||||
server_tokens off;
|
||||
http2 on;
|
||||
|
||||
ssl_protocols TLSv1.2;
|
||||
ssl_certificate /usr/local/etc/letsencrypt/live/root-kit.ru/fullchain.pem;
|
||||
ssl_certificate_key /usr/local/etc/letsencrypt/live/root-kit.ru/privkey.pem;
|
||||
ssl_prefer_server_ciphers on;
|
||||
ssl_session_timeout 10m;
|
||||
|
||||
|
||||
location / {
|
||||
proxy_pass http://127.0.0.1:8000;
|
||||
proxy_set_header Host $host:$server_port;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Host $server_name;
|
||||
proxy_set_header X-Forwarded-Proto https;
|
||||
proxy_http_version 1.1;
|
||||
proxy_connect_timeout 36000s;
|
||||
proxy_read_timeout 36000s;
|
||||
proxy_send_timeout 36000s;
|
||||
send_timeout 36000s;
|
||||
|
||||
# used for view/edit office file via Office Online Server
|
||||
client_max_body_size 0;
|
||||
|
||||
access_log /var/log/nginx/seahub.access.log;
|
||||
error_log /var/log/nginx/seahub.error.log;
|
||||
}
|
||||
|
||||
location /seafhttp {
|
||||
rewrite ^/seafhttp(.*)$ $1 break;
|
||||
proxy_pass http://127.0.0.1:8082;
|
||||
client_max_body_size 0;
|
||||
proxy_connect_timeout 36000s;
|
||||
proxy_read_timeout 36000s;
|
||||
proxy_send_timeout 36000s;
|
||||
send_timeout 36000s;
|
||||
proxy_request_buffering off;
|
||||
proxy_http_version 1.1;
|
||||
|
||||
}
|
||||
|
||||
location /seafmedia {
|
||||
rewrite ^/seafmedia(.*)$ /media$1 break;
|
||||
root /opt/seafile/seafile-server-latest/seahub;
|
||||
}
|
||||
|
||||
location /seafdav {
|
||||
proxy_pass http://127.0.0.1:8080;
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Host $server_name;
|
||||
proxy_set_header X-Forwarded-Proto https;
|
||||
proxy_http_version 1.1;
|
||||
proxy_connect_timeout 36000s;
|
||||
proxy_read_timeout 36000s;
|
||||
proxy_send_timeout 36000s;
|
||||
send_timeout 36000s;
|
||||
|
||||
# This option is only available for Nginx >= 1.8.0.
|
||||
client_max_body_size 0;
|
||||
proxy_request_buffering off;
|
||||
|
||||
access_log /var/log/nginx/seafdav.access.log;
|
||||
error_log /var/log/nginx/seafdav.error.log;
|
||||
}
|
||||
}
|
12
nginx.conf
Normal file
12
nginx.conf
Normal file
@ -0,0 +1,12 @@
|
||||
#user nobody;
|
||||
worker_processes 1;
|
||||
|
||||
events {
|
||||
worker_connections 1024;
|
||||
}
|
||||
|
||||
http {
|
||||
include mime.types;
|
||||
include conf.d/*.conf;
|
||||
default_type application/octet-stream;
|
||||
}
|
Loading…
Reference in New Issue
Block a user