diff options
Diffstat (limited to 'adze_extras/nginx-sites')
20 files changed, 684 insertions, 0 deletions
diff --git a/adze_extras/nginx-sites/afterklein.robocracy.org b/adze_extras/nginx-sites/afterklein.robocracy.org new file mode 100644 index 0000000..1a849da --- /dev/null +++ b/adze_extras/nginx-sites/afterklein.robocracy.org @@ -0,0 +1,21 @@ +upstream afterklein-gitit { +    server 127.0.0.1:5005; +} + +server { +        listen 80; +        listen [::]:80; +        server_name  afterklein.robocracy.org; + +        access_log  /var/log/nginx/access.log; + +        location / { +                root   /srv/http/default/www/; +        proxy_set_header  X-Real-IP  $remote_addr; +        proxy_set_header  X-Forwarded-For $proxy_add_x_forwarded_for; +        proxy_set_header Host $http_host; +        proxy_redirect off; +        proxy_pass http://afterklein-gitit; +        } +} + diff --git a/adze_extras/nginx-sites/bnewbold.net b/adze_extras/nginx-sites/bnewbold.net new file mode 100644 index 0000000..946f761 --- /dev/null +++ b/adze_extras/nginx-sites/bnewbold.net @@ -0,0 +1,42 @@ + +server { +    listen 80; +    listen [::]:80; +    listen 443 ssl spdy; +    listen [::]:443 ssl spdy; +    server_name  bnewbold.net www.bnewbold.net next.bnewbold.net; + + +    ssl_certificate /etc/letsencrypt/live/bnewbold.net/fullchain.pem; +    ssl_certificate_key /etc/letsencrypt/live/bnewbold.net/privkey.pem; + +    #add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'"; +    add_header X-Frame-Options "SAMEORIGIN"; +    add_header X-Content-Type-Options "nosniff"; +    add_header X-Xss-Protection "1"; +    # Enable STS with one year period (breaks http; optional) +    #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; + +    access_log  /var/log/nginx/bnewnet.access.log; +    error_log  /var/log/nginx/bnewnet.error.log; + +   +    location / { +        root   /srv/http/bnewbold.net/www/; +        index index.html index.htm; +    } + +    # Temporary mirror of old photos stuff +    location /photos/ { +        root   /srv/http/bnewbold.net/adelie_backup/bnewbold.net/; +        index index.html index.htm; +    } + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +	autoindex off; +    } + +} + diff --git a/adze_extras/nginx-sites/bommom.com b/adze_extras/nginx-sites/bommom.com new file mode 100644 index 0000000..16a77a3 --- /dev/null +++ b/adze_extras/nginx-sites/bommom.com @@ -0,0 +1,23 @@ + +upstream bommom-bommom { +    server 127.0.0.1:5015; +}    +     +server { +    listen 80;   +    listen [::]:80; +    server_name  bommom.com www.bommom.com bommom.memeschemes.com; +         +    access_log  /var/log/nginx/access.log; +    error_log  /var/log/nginx/error.log; + +    location / { +        root   /srv/http/default/www/; +        proxy_set_header  X-Real-IP  $remote_addr; +        proxy_set_header  X-Forwarded-For $proxy_add_x_forwarded_for; +        proxy_set_header Host $http_host; +        proxy_redirect off; +        proxy_pass http://bommom-bommom; +    } +} + diff --git a/adze_extras/nginx-sites/cannytrophic.com b/adze_extras/nginx-sites/cannytrophic.com new file mode 100644 index 0000000..c6af0e2 --- /dev/null +++ b/adze_extras/nginx-sites/cannytrophic.com @@ -0,0 +1,25 @@ +server { +    listen 80; +    listen [::]:80; +    server_name  cannytrophic.com www.cannytrophic.com cannytrophic.org www.cannytrophic.org cannytrophic.net www.cannytrophic.net; + +    access_log  /var/log/nginx/access.log; + +    location / { +        root   /srv/http/cannytrophic.com/www/; +        index index.html index.htm; +    } +} + +server { +    listen 80; +    listen [::]:80; +    server_name  expo.cannytrophic.com expo.cannytrophic.org expo.cannytrophic.net; + +    access_log  /var/log/nginx/access.log; + +    location / { +        proxy_pass http://ctdexpo.blogspot.com; +    } +} + diff --git a/adze_extras/nginx-sites/cgit b/adze_extras/nginx-sites/cgit new file mode 100644 index 0000000..f72f81e --- /dev/null +++ b/adze_extras/nginx-sites/cgit @@ -0,0 +1,45 @@ +# Ansible managed: /home/bnewbold/code/infra/roles/git/templates/etc_nginx_sites-available_cgit.j2 modified on 2016-04-27 00:50:02 by bnewbold on eschaton + +server { + +    listen 80; +    listen [::]:80; +     listen 443 ssl spdy; +     listen [::]:443 ssl spdy; +    server_name git.bnewbold.net; + +     ssl_certificate /etc/letsencrypt/live/bnewbold.net/fullchain.pem; +     ssl_certificate_key /etc/letsencrypt/live/bnewbold.net/privkey.pem; +      +     add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'"; +     add_header X-Frame-Options "SAMEORIGIN";       # 'always' if nginx > 1.7.5 +     add_header X-Content-Type-Options "nosniff";   # 'always' if nginx > 1.7.5 +     add_header X-Xss-Protection "1"; +     # Enable STS with one year period (breaks http; optional) +     #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; + +    root /srv/http/cgit; + +    location / { +        try_files $uri @cgit; +    } + +    location @cgit { +        index cgit.cgi; +        fastcgi_param SCRIPT_FILENAME /usr/lib/cgit/cgit.cgi; +        fastcgi_pass unix:/var/run/fcgiwrap.socket; +        fastcgi_param HTTP_HOST $server_name; +        fastcgi_param PATH_INFO $uri; +        fastcgi_param QUERY_INFO $uri; +        include "fastcgi_params"; + +    } + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +        autoindex off; +    } + +} +  diff --git a/adze_extras/nginx-sites/circles.rooter.is b/adze_extras/nginx-sites/circles.rooter.is new file mode 100644 index 0000000..131a672 --- /dev/null +++ b/adze_extras/nginx-sites/circles.rooter.is @@ -0,0 +1,22 @@ +upstream circles { +    server localhost:8855; +    #server 10.4.0.6; +} + +server { +    listen 80; +    listen [::]:80; +    server_name circles.rooter.is; + +    access_log /dev/null; +    error_log /dev/null; + +    location / { +        proxy_set_header  X-Real-IP  $remote_addr; +        proxy_set_header  X-Forwarded-For $proxy_add_x_forwarded_for; +        proxy_set_header Host $http_host; +        proxy_redirect off; +        proxy_pass http://circles; +    } +} + diff --git a/adze_extras/nginx-sites/codetropes.com b/adze_extras/nginx-sites/codetropes.com new file mode 100644 index 0000000..dff321d --- /dev/null +++ b/adze_extras/nginx-sites/codetropes.com @@ -0,0 +1,14 @@ + +server { +    listen 80; +    listen [::]:80; +    server_name  codetropes.com www.codetropes.com; +    +    access_log  /var/log/nginx/access.log; +    +    location / { +        root   /srv/http/codetropes.com/www/; +        index index.html index.htm; +    } +} + diff --git a/adze_extras/nginx-sites/dav.robocracy.org b/adze_extras/nginx-sites/dav.robocracy.org new file mode 100644 index 0000000..f7421c9 --- /dev/null +++ b/adze_extras/nginx-sites/dav.robocracy.org @@ -0,0 +1,31 @@ + +server { + +    listen 80; +    listen [::]:80; +     listen 443 ssl spdy; +     listen [::]:443 ssl spdy; +    server_name dav.robocracy.org; + +     ssl_certificate /etc/letsencrypt/live/robocracy.org/fullchain.pem; +     ssl_certificate_key /etc/letsencrypt/live/robocracy.org/privkey.pem; +      +     add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'"; +     add_header X-Frame-Options "SAMEORIGIN";       # 'always' if nginx > 1.7.5 +     add_header X-Content-Type-Options "nosniff";   # 'always' if nginx > 1.7.5 +     add_header X-Xss-Protection "1"; +     # Enable STS with one year period (breaks http; optional) +     #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +        autoindex off; +    } + +    location / { +        proxy_pass http://localhost:5232; +    } + +} +  diff --git a/adze_extras/nginx-sites/default b/adze_extras/nginx-sites/default new file mode 100644 index 0000000..c08cff9 --- /dev/null +++ b/adze_extras/nginx-sites/default @@ -0,0 +1,28 @@ +# Default server configuration +server { +	listen 80 default_server; +	listen [::]:80 default_server; +	server_name _; + +	# SSL configuration +	# +	listen 443 ssl default_server; +	listen [::]:443 ssl default_server; +	# +	# Self signed certs generated by the ssl-cert package +	# Don't use them in a production server! +	# +	include snippets/snakeoil.conf; + +	root /srv/http/default/www; + +	# Add index.php to the list if you are using PHP +	index index.html index.htm index.nginx-debian.html; + +	location / { +		# First attempt to serve request as file, then +		# as directory, then fall back to displaying a 404. +		try_files $uri $uri/ =404; +	} + +} diff --git a/adze_extras/nginx-sites/equator.memeschemes.com b/adze_extras/nginx-sites/equator.memeschemes.com new file mode 100644 index 0000000..807eeb0 --- /dev/null +++ b/adze_extras/nginx-sites/equator.memeschemes.com @@ -0,0 +1,34 @@ + +server { +    listen 80; +    listen [::]:80; +    server_name  equator.memeschemes.com; + +    access_log  /var/log/nginx/access.log; +    +#    location / { +#        root   /srv/http/equator.memeschemes.com/www; +#        index index.html index.htm; +#    } +    +    location /robots.txt { +        root /srv/http/equator.memeschemes.com/www/; +    } +    location /static { +        root /srv/http/equator.memeschemes.com/www/; +    } +    location / { +        fastcgi_pass   unix:/srv/http/equator.memeschemes.com/django.sock; +        fastcgi_param PATH_INFO $fastcgi_script_name; +        fastcgi_param REQUEST_METHOD $request_method; +        fastcgi_param QUERY_STRING $query_string; +        fastcgi_param SERVER_NAME $server_name; +        fastcgi_param SERVER_PORT $server_port; +        fastcgi_param SERVER_PROTOCOL $server_protocol; +        fastcgi_param CONTENT_TYPE $content_type; +        fastcgi_param CONTENT_LENGTH $content_length; +        fastcgi_pass_header Authorization; +        fastcgi_intercept_errors off; +    } +} + diff --git a/adze_extras/nginx-sites/everyset.net b/adze_extras/nginx-sites/everyset.net new file mode 100644 index 0000000..de1293e --- /dev/null +++ b/adze_extras/nginx-sites/everyset.net @@ -0,0 +1,14 @@ +server { +    listen 80; +    listen [::]:80; +    server_name  everyset.net www.everyset.net; + +    access_log  /var/log/nginx/access.log; +    error_log  /var/log/nginx/error.log; + +    location / { +        root   /srv/http/everyset.net/www; +        index index.html index.htm; +    } +} + diff --git a/adze_extras/nginx-sites/feeds.bnewbold.net b/adze_extras/nginx-sites/feeds.bnewbold.net new file mode 100644 index 0000000..7d06c22 --- /dev/null +++ b/adze_extras/nginx-sites/feeds.bnewbold.net @@ -0,0 +1,40 @@ +upstream bnewbold-miniflux { +    server 127.0.0.1:8322; +} + +server { +    listen 80; +    listen [::]:80; +     listen 443 ssl spdy; +     listen [::]:443 ssl spdy; +    server_name  feeds.bnewbold.net; + +     ssl_certificate /etc/letsencrypt/live/bnewbold.net/fullchain.pem; +     ssl_certificate_key /etc/letsencrypt/live/bnewbold.net/privkey.pem; + +     #add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'"; +     add_header X-Frame-Options "SAMEORIGIN";       # 'always' if nginx > 1.7.5 +     add_header X-Content-Type-Options "nosniff";   # 'always' if nginx > 1.7.5 +     add_header X-Xss-Protection "1"; +     # Enable STS with one year period (breaks http; optional) +     #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; + +    access_log  /var/log/nginx/access.log; + +    location / { +        root   /srv/http/default/www/; +        proxy_set_header  X-Real-IP  $remote_addr; +        proxy_set_header  X-Forwarded-For $proxy_add_x_forwarded_for; +        proxy_set_header Host $http_host; +        proxy_redirect off; +        proxy_pass http://bnewbold-miniflux; +    } + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +        autoindex off; +    } + +} + diff --git a/adze_extras/nginx-sites/feeds.bnewbold.net_unused_temboz b/adze_extras/nginx-sites/feeds.bnewbold.net_unused_temboz new file mode 100644 index 0000000..fe016b0 --- /dev/null +++ b/adze_extras/nginx-sites/feeds.bnewbold.net_unused_temboz @@ -0,0 +1,73 @@ + +server { +    listen 80; +    listen [::]:80; +    server_name  feeds.bnewbold.net; + +    access_log  /var/log/nginx/feeds.access.log; +    error_log  /var/log/nginx/feeds.error.log; + +    location = /temboz_css { +        proxy_pass   http://127.0.0.1:9999/temboz_css; +        proxy_redirect default; +    }   +    location = /temboz.css { +        proxy_pass   http://127.0.0.1:9999/temboz.css; +        proxy_redirect default; +    }   +    location = /view { +        proxy_pass   http://127.0.0.1:9999/view?show=mylos; +        proxy_redirect default; +    }   +    location = / { +        proxy_pass   http://127.0.0.1:9999/view?show=mylos; +        proxy_redirect default; +    } + +    location ~* \.gif { +        root /srv/http/feeds.bnewbold.net/temboz; +    } + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +	autoindex off; +    } + +} + +server { +    listen 443 ssl spdy; +    listen [::]:443 ssl spdy; +    server_name  feeds.bnewbold.net; + +    ssl_certificate /etc/letsencrypt/live/bnewbold.net/fullchain.pem; +    ssl_certificate_key /etc/letsencrypt/live/bnewbold.net/privkey.pem; + +    #add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'"; +    add_header X-Frame-Options "SAMEORIGIN"; +    add_header X-Content-Type-Options "nosniff"; +    add_header X-Xss-Protection "1"; +    # Enable STS with one year period (breaks http; optional) +    #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; + +    access_log  /var/log/nginx/feeds.access.log; +    error_log  /var/log/nginx/feeds.error.log; + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +	autoindex off; +    } + +    location / { +        proxy_pass   http://127.0.0.1:9999; +        proxy_redirect default; +        auth_basic            "Restricted"; +        auth_basic_user_file  /srv/http/feeds.bnewbold.net/htpasswd; +    } +    +    location ~* \.gif { +        root /srv/http/feeds.bnewbold.net/temboz; +    } +} diff --git a/adze_extras/nginx-sites/know.bnewbold.net b/adze_extras/nginx-sites/know.bnewbold.net new file mode 100644 index 0000000..9ff0771 --- /dev/null +++ b/adze_extras/nginx-sites/know.bnewbold.net @@ -0,0 +1,40 @@ +upstream bnewbold-gitit { +    server 127.0.0.1:5006; +} + +server { +    listen 80; +    listen [::]:80; +     listen 443 ssl spdy; +     listen [::]:443 ssl spdy; +    server_name  know.bnewbold.net; + +     ssl_certificate /etc/letsencrypt/live/bnewbold.net/fullchain.pem; +     ssl_certificate_key /etc/letsencrypt/live/bnewbold.net/privkey.pem; + +     add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'"; +     add_header X-Frame-Options "SAMEORIGIN";       # 'always' if nginx > 1.7.5 +     add_header X-Content-Type-Options "nosniff";   # 'always' if nginx > 1.7.5 +     add_header X-Xss-Protection "1"; +     # Enable STS with one year period (breaks http; optional) +     #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; + +    access_log  /var/log/nginx/access.log; + +    location / { +        root   /srv/http/default/www/; +        proxy_set_header  X-Real-IP  $remote_addr; +        proxy_set_header  X-Forwarded-For $proxy_add_x_forwarded_for; +        proxy_set_header Host $http_host; +        proxy_redirect off; +        proxy_pass http://bnewbold-gitit; +    } + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +        autoindex off; +    } + +} + diff --git a/adze_extras/nginx-sites/mediagoblin b/adze_extras/nginx-sites/mediagoblin new file mode 100644 index 0000000..0139ed8 --- /dev/null +++ b/adze_extras/nginx-sites/mediagoblin @@ -0,0 +1,78 @@ +# Ansible managed: /home/bnewbold/code/infra/roles/mediagoblin/templates/etc_nginx_sites-available_mediagoblin.j2 modified on 2016-05-04 16:23:25 by bnewbold on eschaton + +server { + +    listen 80; +    listen [::]:80; +    listen 443 ssl spdy; +    listen [::]:443 ssl spdy; +    server_name goblin.bnewbold.net; + + +     ssl_certificate /etc/letsencrypt/live/bnewbold.net/fullchain.pem; +     ssl_certificate_key /etc/letsencrypt/live/bnewbold.net/privkey.pem; +         +     #add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'"; +     add_header X-Frame-Options "SAMEORIGIN";       # 'always' if nginx > 1.7.5 +     add_header X-Content-Type-Options "nosniff";   # 'always' if nginx > 1.7.5 +     add_header X-Xss-Protection "1"; +     # Enable STS with one year period (breaks http; optional) +     #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; + + +    # Change this to update the upload size limit for your users +    client_max_body_size 1024m; + +    # prevent attacks (someone uploading a .txt file that the browser +    # interprets as an HTML file, etc.) +    add_header X-Content-Type-Options nosniff; + +    access_log /var/log/nginx/mediagoblin.access.log; +    error_log /var/log/nginx/mediagoblin.error.log; + +    # MediaGoblin's stock static files: CSS, JS, etc. +    location /mgoblin_static/ { +        alias /srv/http/goblin.bnewbold.net/src/mediagoblin/static/; +    } + +    # Instance specific media: +    location /mgoblin_media/ { +        alias /srv/http/goblin.bnewbold.net/data/media/public/; +    } + +    # Theme static files (usually symlinked in) +    location /theme_static/ { +        alias /srv/http/goblin.bnewbold.net/src/user_dev/theme_static/; +    } + +    # Plugin static files (usually symlinked in) +    location /plugin_static/ { +        alias /srv/http/goblin.bnewbold.net/src/user_dev/plugin_static/; +    } + +#    # Mounting MediaGoblin itself via FastCGI. +#    location / { +#        fastcgi_pass 127.0.0.1:26543; +#        include /etc/nginx/fastcgi_params; +# +#        # our understanding vs nginx's handling of script_name vs +#        # path_info don't match :) +#        fastcgi_param PATH_INFO $fastcgi_script_name; +#        fastcgi_param SCRIPT_NAME ""; +#    } + +    # Until FastCGI works, just do a proxy pass +    location / { +        proxy_set_header Host $host; +        proxy_set_header X-Real-IP $remote_addr; +        proxy_set_header X-Forwarded-Proto $scheme; +        proxy_pass http://127.0.0.1:26543; +    } + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +        autoindex off; +    } + +} diff --git a/adze_extras/nginx-sites/memeschemes.com b/adze_extras/nginx-sites/memeschemes.com new file mode 100644 index 0000000..61e9121 --- /dev/null +++ b/adze_extras/nginx-sites/memeschemes.com @@ -0,0 +1,14 @@ + +server { +    listen 80; +    listen [::]:80; +    server_name  memeschemes.com www.memeschemes.com; +     +    access_log  /var/log/nginx/access.log; + +    location / { +        root   /srv/http/memeschemes.com/www/; +        index index.html index.htm; +    } +} + diff --git a/adze_extras/nginx-sites/parts.bommom.com b/adze_extras/nginx-sites/parts.bommom.com new file mode 100644 index 0000000..09f7bd1 --- /dev/null +++ b/adze_extras/nginx-sites/parts.bommom.com @@ -0,0 +1,13 @@ +server { +    listen 80; +    listen [::]:80; +    server_name  parts.bommom.com parts.memeschemes.com; + +    error_log  /var/log/nginx/error.log; +    access_log  /var/log/nginx/access.log; + +    location / { +        root   /srv/http/parts.bommom.com/www; +    } +}   + diff --git a/adze_extras/nginx-sites/robocracy.org b/adze_extras/nginx-sites/robocracy.org new file mode 100644 index 0000000..e5a1b99 --- /dev/null +++ b/adze_extras/nginx-sites/robocracy.org @@ -0,0 +1,35 @@ + +server { +    listen 80; +    listen [::]:80; +    listen 443 ssl spdy; +    listen [::]:443 ssl spdy; +    server_name  robocracy.org www.robocracy.org adze.robocracy.org; + +    ssl_certificate /etc/letsencrypt/live/robocracy.org/fullchain.pem; +    ssl_certificate_key /etc/letsencrypt/live/robocracy.org/privkey.pem; + +    add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'"; +    add_header X-Frame-Options "SAMEORIGIN"; +    add_header X-Content-Type-Options "nosniff"; +    add_header X-Xss-Protection "1"; +    # Enable STS with one year period (breaks http; optional) +    #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; + +    access_log  /var/log/nginx/robocracy.access.log; +    error_log  /var/log/nginx/robocracy.error.log; + +   +    location / { +        #root   /srv/http/default/www/; +        root   /srv/http/robocracy.org/www/; +        index index.html index.htm; +    } + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +	autoindex off; +    } + +} diff --git a/adze_extras/nginx-sites/rooter.is b/adze_extras/nginx-sites/rooter.is new file mode 100644 index 0000000..609ed27 --- /dev/null +++ b/adze_extras/nginx-sites/rooter.is @@ -0,0 +1,52 @@ +upstream rooter-gitit { +    server 127.0.0.1:5007; +} + +server { +    listen 80; +    listen [::]:80; +    server_name  www.rooter.is rooter.is; + +    access_log  /var/log/nginx/rooter.access.log; +    error_log  /var/log/nginx/rooter.error.log; + +    location / { +        root   /srv/http/rooter/www; +        index index.html index.htm; +    } + +} + +server { +    listen 80; +    listen [::]:80; +    server_name  mailman.rooter.is; + +    access_log  /var/log/nginx/rooter.access.log; +    error_log  /var/log/nginx/rooter.error.log; + +    location / { +        root   /srv/http/mailman.rooter.is/www; +        index index.html index.htm; +    } + +} + +server { +    listen 80; +    listen [::]:80; +    server_name  secretwiki.rooter.is wiki.rooter.is; + +    access_log  /var/log/nginx/rooter.access.log; +    error_log  /var/log/nginx/rooter.error.log; + +    location /{ +        root   /srv/http/rooter/www/; +        proxy_set_header  X-Real-IP  $remote_addr; +        proxy_set_header  X-Forwarded-For $proxy_add_x_forwarded_for; +        proxy_set_header Host $http_host; +        proxy_redirect off; +        proxy_pass http://rooter-gitit; +    } +} + diff --git a/adze_extras/nginx-sites/static.bnewbold.net b/adze_extras/nginx-sites/static.bnewbold.net new file mode 100644 index 0000000..9f7a2c6 --- /dev/null +++ b/adze_extras/nginx-sites/static.bnewbold.net @@ -0,0 +1,40 @@ +server { +    listen 80; +    listen [::]:80; +    listen 443 ssl spdy; +    listen [::]:443 ssl spdy; +    server_name  static.bnewbold.net; + +     ssl_certificate /etc/letsencrypt/live/bnewbold.net/fullchain.pem; +     ssl_certificate_key /etc/letsencrypt/live/bnewbold.net/privkey.pem; +         +     add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'"; +     add_header X-Frame-Options "SAMEORIGIN";       # 'always' if nginx > 1.7.5 +     add_header X-Content-Type-Options "nosniff";   # 'always' if nginx > 1.7.5 +     add_header X-Xss-Protection "1"; +     # Enable STS with one year period (breaks http; optional) +     #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; + +    access_log  /var/log/nginx/access.log; + +    location / { +        root /srv/http/static.bnewbold.net/www/; +        autoindex on; +        autoindex_exact_size off; +    }   +    location /private { +        deny all; +    }   +    location /mask { +        root /srv/http/static.bnewbold.net/www/; +        autoindex off; +    }   + +    # Let's Encrypt SSL Certs +    location /.well-known/acme-challenge/ { +        root /var/www/letsencrypt; +        autoindex off; +    } + +} +  | 
