add onion-header to those who dont have it

This commit is contained in:
root 2022-10-15 13:50:10 -04:00
parent fc2cacb40f
commit dd91296009
8 changed files with 49 additions and 2 deletions

View File

@ -1,3 +1,4 @@
add_header Onion-Location http://rss.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion$request_uri;
# the folder p of your FreshRSS installation
root /var/www/freshrss/p/;
index index.php index.html index.htm;

16
common/hedgedoc.conf Normal file
View File

@ -0,0 +1,16 @@
add_header Onion-Location http://hd.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion$request_uri;
location / {
proxy_pass http://127.0.0.1:5007;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}
location /socket.io/ {
proxy_pass http://127.0.0.1:5007;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $connection_upgrade;
}

View File

@ -1,3 +1,4 @@
add_header Onion-Location http://lm.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion$request_uri;
# Enable compression for JS/CSS/HTML bundle, for improved client load times.
# It might be nice to compress JSON, but leaving that out to protect against potential
# compression+encryption information leak attacks like BREACH.

View File

@ -1,3 +1,4 @@
add_header Onion-Location http://ntfy.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion$request_uri;
location / {
proxy_pass http://127.0.0.1:2586;
proxy_http_version 1.1;

View File

@ -1,3 +1,4 @@
add_header Onion-Location http://pt.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion$request_uri;
location @api {
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;

View File

@ -1,3 +1,4 @@
add_header Onion-Location http://wm.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion$request_uri;
root /var/www/roundcube/;
index index.php index.html index.htm;

View File

@ -0,0 +1,26 @@
server {
listen 80;
listen [::]:80;
return 301 https://$host$request_uri;
server_name hd.vern.cc hedgedoc.vern.cc;
}
server {
listen 443 ssl;
listen [::]:443 ssl;
server_name hd.vern.cc hedgedoc.vern.cc;
include snippets/lets-encrypt.conf;
include common/hedgedoc.conf;
}
server {
listen 80;
listen [::]:80;
server_name hedgedoc.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion hd.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion;
include common/hedgedoc.conf;
}
server {
listen 11053;
listen [::]:11053;
server_name vernfy3k7royqfe7pg6wgzj53ipltd5nb4acjtjmwgpqrkxwmcla.b32.i2p;
include common/hedgedoc.conf;
}

View File

@ -41,7 +41,7 @@ server {
listen [::]:443 ssl;
server_name ntfy.vern.cc;
include snippets/lets-encrypt.conf;
include common/ntfy.conf
include common/ntfy.conf;
}
server {
listen 80;
@ -53,5 +53,5 @@ server {
listen 11052;
listen [::]:11052;
server_name vernvx3w4jkwznya72gnslmkabthu6behn7mlfunezcubsjazaxq.b32.i2p;
include common/ntfy.conf
include common/ntfy.conf;
}