From cac8dbb95b07f028e550707c2076d79d4758464b Mon Sep 17 00:00:00 2001 From: root Date: Sat, 19 Nov 2022 15:17:31 +0000 Subject: [PATCH] add biblioreads,dumb,hckrnws,srht --- common/biblioreads.conf | 10 ++++++++++ common/dumb.conf | 10 ++++++++++ common/hckrnws.conf | 10 ++++++++++ common/srht.conf | 7 +++++++ conf.d/biblioreads.conf | 32 ++++++++++++++++++++++++++++++++ conf.d/dumb.conf | 32 ++++++++++++++++++++++++++++++++ conf.d/hckrnws.conf | 32 ++++++++++++++++++++++++++++++++ conf.d/srht.conf | 22 ++++++++++++++++++++++ 8 files changed, 155 insertions(+) create mode 100644 common/biblioreads.conf create mode 100644 common/dumb.conf create mode 100644 common/hckrnws.conf create mode 100644 common/srht.conf create mode 100644 conf.d/biblioreads.conf create mode 100644 conf.d/dumb.conf create mode 100644 conf.d/hckrnws.conf create mode 100644 conf.d/srht.conf diff --git a/common/biblioreads.conf b/common/biblioreads.conf new file mode 100644 index 0000000..380e447 --- /dev/null +++ b/common/biblioreads.conf @@ -0,0 +1,10 @@ +add_header Onion-Location http://bl.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion$request_uri; +add_header X-I2P-Location http://vernapl3lpo3huqdx3pjzxqgdgavxjlmdskbvejh2gfqgmjuyvxq.b32.i2p$request_uri; + +location / { + proxy_pass http://10.0.3.57:3000/; + proxy_redirect off; + proxy_set_header Host $host; +# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; +} diff --git a/common/dumb.conf b/common/dumb.conf new file mode 100644 index 0000000..e7b41c3 --- /dev/null +++ b/common/dumb.conf @@ -0,0 +1,10 @@ +add_header Onion-Location http://dm.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion$request_uri; +add_header X-I2P-Location http://vernxpcpqi2y4uhu7to4rnjmyjjgzh3x3qxyzpmkhykefchkmleq.b32.i2p$request_uri; + +location / { + proxy_pass http://crescent.vern.cc:5555/; + proxy_redirect off; + proxy_set_header Host $host; +# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; +} diff --git a/common/hckrnws.conf b/common/hckrnws.conf new file mode 100644 index 0000000..a6ac4c5 --- /dev/null +++ b/common/hckrnws.conf @@ -0,0 +1,10 @@ +add_header Onion-Location http://hn.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion$request_uri; +add_header X-I2P-Location http://vern6p7g27bt6q5d73cxvhgu2gnn6f5sw3nmvqvremqdlvo3aydq.b32.i2p$request_uri; + +location / { + proxy_pass http://10.0.3.57:3002/; + proxy_redirect off; + proxy_set_header Host $host; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; +} diff --git a/common/srht.conf b/common/srht.conf new file mode 100644 index 0000000..7771f83 --- /dev/null +++ b/common/srht.conf @@ -0,0 +1,7 @@ +location / { + proxy_pass http://10.0.3.135:80/; + proxy_redirect off; + proxy_set_header Host $host; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; +} diff --git a/conf.d/biblioreads.conf b/conf.d/biblioreads.conf new file mode 100644 index 0000000..42a5c71 --- /dev/null +++ b/conf.d/biblioreads.conf @@ -0,0 +1,32 @@ +server { + listen 80; + listen [::]:80; + + server_name bl.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion biblioreads.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion goodreads.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion; + + include common/biblioreads.conf; +} + +server { + listen 11081; + listen [::]:11081; + + server_name vernapl3lpo3huqdx3pjzxqgdgavxjlmdskbvejh2gfqgmjuyvxq.b32.i2p; + + include common/biblioreads.conf; +} + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + server_name bl.vern.cc biblioreads.vern.cc goodreads.vern.cc; + include snippets/lets-encrypt.conf; + include common/biblioreads.conf; +} + +server { + listen 80; + listen [::]:80; + return 301 https://$host$request_uri; + server_name bl.vern.cc biblioreads.vern.cc goodreads.vern.cc; +} diff --git a/conf.d/dumb.conf b/conf.d/dumb.conf new file mode 100644 index 0000000..a84ef23 --- /dev/null +++ b/conf.d/dumb.conf @@ -0,0 +1,32 @@ +server { + listen 80; + listen [::]:80; + + server_name dm.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion dumb.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion genius.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion; + + include common/dumb.conf; +} + +server { + listen 11080; + listen [::]:11080; + + server_name vernxpcpqi2y4uhu7to4rnjmyjjgzh3x3qxyzpmkhykefchkmleq.b32.i2p; + + include common/dumb.conf; +} + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + server_name dm.vern.cc dumb.vern.cc genius.vern.cc; + include snippets/lets-encrypt.conf; + include common/dumb.conf; +} + +server { + listen 80; + listen [::]:80; + return 301 https://$host$request_uri; + server_name dm.vern.cc dumb.vern.cc genius.vern.cc; +} diff --git a/conf.d/hckrnws.conf b/conf.d/hckrnws.conf new file mode 100644 index 0000000..7fc4d7b --- /dev/null +++ b/conf.d/hckrnws.conf @@ -0,0 +1,32 @@ +server { + listen 80; + listen [::]:80; + + server_name hn.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion hckrnws.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion hackernews.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion; + + include common/hckrnws.conf; +} + +server { + listen 11082; + listen [::]:11082; + + server_name vern6p7g27bt6q5d73cxvhgu2gnn6f5sw3nmvqvremqdlvo3aydq.b32.i2p; + + include common/hckrnws.conf; +} + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + server_name hn.vern.cc hckrnws.vern.cc hackernews.vern.cc; + include snippets/lets-encrypt.conf; + include common/hckrnws.conf; +} + +server { + listen 80; + listen [::]:80; + return 301 https://$host$request_uri; + server_name hn.vern.cc hckrnws.vern.cc hackernews.vern.cc; +} diff --git a/conf.d/srht.conf b/conf.d/srht.conf new file mode 100644 index 0000000..28ed0d8 --- /dev/null +++ b/conf.d/srht.conf @@ -0,0 +1,22 @@ +server { + listen 80; + listen [::]:80; + + server_name *.sr.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion sr.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion; + + include common/srht.conf; +} + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + server_name *.sr.vern.cc sr.vern.cc; + include snippets/lets-encrypt.conf; + include common/srht.conf; +} +server { + listen 80; + listen [::]:80; + server_name *.sr.vern.cc sr.vern.cc; + return 301 https://$host$request_uri; +}