Compare commits

...

6 Commits

6 changed files with 112 additions and 15 deletions

View File

@@ -1,15 +0,0 @@
# HTTP-only NGINX config for home.aaf.systems (no SSL)
server {
listen 80;
server_name home.aaf.systems;
location / {
proxy_pass http://100.93.165.98:7575;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
}

28
sites-available/exp Normal file
View File

@@ -0,0 +1,28 @@
# Block 1: Redirects all HTTP traffic to HTTPS
server {
listen 80;
server_name exp.aaf.systems;
return 301 https://$host$request_uri;
}
# Block 2: Handles the secure HTTPS traffic
server {
listen 443 ssl http2;
server_name exp.aaf.systems;
location / {
proxy_pass http://100.93.165.98:8080;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
# SSL settings managed by Certbot
ssl_certificate /etc/letsencrypt/live/exp.aaf.systems/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/exp.aaf.systems/privkey.pem;
include /etc/letsencrypt/options-ssl-nginx.conf;
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
}

28
sites-available/koel Normal file
View File

@@ -0,0 +1,28 @@
# Block 1: Redirects all HTTP traffic to HTTPS
server {
listen 80;
server_name music.aaf.systems;
return 301 https://$host$request_uri;
}
# Block 2: Handles the secure HTTPS traffic
server {
listen 443 ssl http2;
server_name music.aaf.systems;
location / {
proxy_pass http://100.93.165.98:4075;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
# SSL settings managed by Certbot
ssl_certificate /etc/letsencrypt/live/music.aaf.systems/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/music.aaf.systems/privkey.pem;
include /etc/letsencrypt/options-ssl-nginx.conf;
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
}

28
sites-available/plane Normal file
View File

@@ -0,0 +1,28 @@
# Block 1: Redirects all HTTP traffic to HTTPS
server {
listen 80;
server_name projects.aaf.systems;
return 301 https://$host$request_uri;
}
# Block 2: Handles the secure HTTPS traffic
server {
listen 443 ssl http2;
server_name projects.aaf.systems;
location / {
proxy_pass http://100.93.165.98:3050;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
# SSL settings managed by Certbot
ssl_certificate /etc/letsencrypt/live/projects.aaf.systems/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/projects.aaf.systems/privkey.pem;
include /etc/letsencrypt/options-ssl-nginx.conf;
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
}

28
sites-available/vert Normal file
View File

@@ -0,0 +1,28 @@
# Block 1: Redirects all HTTP traffic to HTTPS
server {
listen 80;
server_name convert.aaf.systems;
return 301 https://$host$request_uri;
}
# Block 2: Handles the secure HTTPS traffic
server {
listen 443 ssl http2;
server_name convert.aaf.systems;
location / {
proxy_pass http://100.93.165.98:3090;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
# SSL settings managed by Certbot
ssl_certificate /etc/letsencrypt/live/convert.aaf.systems/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/convert.aaf.systems/privkey.pem;
include /etc/letsencrypt/options-ssl-nginx.conf;
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
}