init
This commit is contained in:
commit
10f95ff535
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@ -0,0 +1 @@
|
|||||||
|
/roles/galaxy/*
|
41
README.md
Normal file
41
README.md
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
# Testing ansible
|
||||||
|
```
|
||||||
|
ansible-galaxy install -r requirements.yml -p roles/galaxy/ --force
|
||||||
|
ansible-playbook playbook.yaml # Initialize
|
||||||
|
ansible-playbook -i inventory.yml -e @secrets.enc --ask-vault-pass playbooks/caddy.yaml # Caddy
|
||||||
|
ansible-playbook -i inventory.yml -e @secrets.enc --ask-vault-pass playbooks/docker.yaml # Docker Compose
|
||||||
|
```
|
||||||
|
|
||||||
|
To add secrets: `ansible-vault edit secrets.enc`
|
||||||
|
## Per-playbook info
|
||||||
|
### /playbook.yaml
|
||||||
|
Configures basic stuff, meant for every server.
|
||||||
|
### /playbooks/docker.yaml
|
||||||
|
Configures privacy frontends, meant for US, IN and Pizza1.
|
||||||
|
### /playbooks/caddy.yaml
|
||||||
|
Configures Caddy, meant for US, IN and Pizza1.
|
||||||
|
## Adding new services
|
||||||
|
Adding new services is a bit janky, for I had to set it up with normal commands instead of the preferred community.docker collection (it doesn't support v2 which we use on most of our compose files)
|
||||||
|
|
||||||
|
Firstly, add the thing to `docker_services` array/var in `/playbooks/docker.yaml`. This list **MUST** be maintaind in alphabetical order for ease of maintanence.
|
||||||
|
|
||||||
|
Then, create the `/compose/SERVICE_NAME` directory and add the compose file to the same. You can use the `{{inventory_hostname}}` variables where required.
|
||||||
|
|
||||||
|
If the service needs a secret key, add it to the ansible-vault secrets.enc with `ansible-vault edit secrets.enc`. If you are a Project Segfault sysadmin you already have the password for it :P
|
||||||
|
|
||||||
|
Past this, Caddy needs to be configured.
|
||||||
|
|
||||||
|
The common GeoDNS configuration can be done following this format
|
||||||
|
```
|
||||||
|
SERVICE_NAME.{{inventory_hostname}}.projectsegfau.lt SERVICE_NAME.projectsegfau.lt {
|
||||||
|
reverse_proxy :PORT
|
||||||
|
import def
|
||||||
|
import torloc SERVICE_NAME # Setup tor first following the wiki
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Tor/I2P can be setup following the instructions in https://wiki.projectsegfau.lt/Internal:Setting_up_a_GeoDNS_service, with the only change that tor/i2p are now merged and they are in `/templates/01-extras.caddy`.
|
||||||
|
|
||||||
|
Past this, you can run the deployment as outlined in the beginning.
|
||||||
|
|
||||||
|
Please inform me (Arya) if any part of this documentation isn't clear, I suck at writing documentation.
|
2
all/files/arya.pub
Normal file
2
all/files/arya.pub
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICeUQKFE6j+legQS2aam8VlwaGJ1r5BfJevbMUxpAi6N aryakiran@zohomail.eu
|
||||||
|
|
2
all/files/devrand.pub
Normal file
2
all/files/devrand.pub
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIE4EqdlXF8o8Fdf0v/I8sowP7Rw3tZiY5i/CP131AX5dAAAAC3NzaDp0ZXJtaXVz Generated By Termius
|
||||||
|
|
1
all/files/midou.pub
Normal file
1
all/files/midou.pub
Normal file
@ -0,0 +1 @@
|
|||||||
|
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMZRpxFYvYt3tfllosegLv3c/IV7+AhMUSfNQio/3kVY ServerAccess
|
109
all/playbook.yaml
Normal file
109
all/playbook.yaml
Normal file
@ -0,0 +1,109 @@
|
|||||||
|
---
|
||||||
|
- name: Install shit
|
||||||
|
hosts: all
|
||||||
|
tasks:
|
||||||
|
- name: Std Repo stuff
|
||||||
|
apt:
|
||||||
|
update_cache: true
|
||||||
|
name:
|
||||||
|
- vim
|
||||||
|
- curl
|
||||||
|
- wget
|
||||||
|
- sudo
|
||||||
|
- net-tools
|
||||||
|
- nmap
|
||||||
|
- python3-pip
|
||||||
|
- python3-passlib
|
||||||
|
- vnstat
|
||||||
|
- name: Enable VNStat service
|
||||||
|
service:
|
||||||
|
name: vnstat
|
||||||
|
enabled: yes
|
||||||
|
state: started
|
||||||
|
|
||||||
|
- name: Add users
|
||||||
|
hosts: all
|
||||||
|
vars:
|
||||||
|
users:
|
||||||
|
- arya
|
||||||
|
- devrand
|
||||||
|
- midou
|
||||||
|
vars_prompt:
|
||||||
|
- name: password
|
||||||
|
prompt: What is password to be used for all accs? (initial if no password is already set)
|
||||||
|
encrypt: sha512_crypt
|
||||||
|
confirm: true
|
||||||
|
salt_size: 6
|
||||||
|
|
||||||
|
tasks:
|
||||||
|
- name: bashrc skel
|
||||||
|
template:
|
||||||
|
src: templates/bashrc.j2
|
||||||
|
dest: /etc/skel/.bashrc
|
||||||
|
- name: profile skel
|
||||||
|
template:
|
||||||
|
src: templates/profile.j2
|
||||||
|
dest: /etc/skel/.profile
|
||||||
|
- name: bash_aliases skel
|
||||||
|
template:
|
||||||
|
src: templates/bash_aliases.j2
|
||||||
|
dest: /etc/skel/.bash_aliases
|
||||||
|
- name: prompt skel
|
||||||
|
template:
|
||||||
|
src: templates/prompt.j2
|
||||||
|
dest: /etc/skel/.prompt
|
||||||
|
- name: bashrc root
|
||||||
|
template:
|
||||||
|
src: templates/bashrc.j2
|
||||||
|
dest: /root/.bashrc
|
||||||
|
- name: profile root
|
||||||
|
template:
|
||||||
|
src: templates/profile.j2
|
||||||
|
dest: /root/.profile
|
||||||
|
- name: bash_aliases root
|
||||||
|
template:
|
||||||
|
src: templates/bash_aliases.j2
|
||||||
|
dest: /root/.bash_aliases
|
||||||
|
- name: prompt root
|
||||||
|
template:
|
||||||
|
src: templates/prompt.j2
|
||||||
|
dest: /root/.prompt
|
||||||
|
- name: Add user
|
||||||
|
user:
|
||||||
|
name: "{{ item }}"
|
||||||
|
group: users
|
||||||
|
groups: users,sudo
|
||||||
|
password: "{{ password }}"
|
||||||
|
shell: /bin/bash
|
||||||
|
update_password: on_create # Add the same initial password for all users (can be overwritten by user)
|
||||||
|
with_items:
|
||||||
|
- "{{ users }}"
|
||||||
|
- name: "Add authorized keys"
|
||||||
|
authorized_key:
|
||||||
|
user: "{{ item }}"
|
||||||
|
key: "{{ lookup('file', 'files/'+ item + '.pub') }}"
|
||||||
|
with_items:
|
||||||
|
- "{{ users }}"
|
||||||
|
- name: "Allow admin users to sudo without a password"
|
||||||
|
lineinfile:
|
||||||
|
dest: "/etc/sudoers" # path: in version 2.3
|
||||||
|
state: "present"
|
||||||
|
regexp: "^%sudo"
|
||||||
|
line: "%sudo ALL=(ALL) NOPASSWD: ALL"
|
||||||
|
- name: Configure SSHD
|
||||||
|
hosts: all
|
||||||
|
tasks:
|
||||||
|
- name: sshd configuration file update
|
||||||
|
template:
|
||||||
|
src: templates/sshd_config.j2
|
||||||
|
dest: /etc/ssh/sshd_config
|
||||||
|
backup: yes
|
||||||
|
owner: 0
|
||||||
|
group: 0
|
||||||
|
mode: 0644
|
||||||
|
validate: '/usr/sbin/sshd -T -f %s'
|
||||||
|
notify:
|
||||||
|
- restart sshd
|
||||||
|
handlers:
|
||||||
|
- name: restart sshd
|
||||||
|
service: name=sshd state=restarted
|
37
all/templates/bash_aliases.j2
Normal file
37
all/templates/bash_aliases.j2
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
# General
|
||||||
|
alias clear="printf '\033c'" # faster than ncurses clear by a lot
|
||||||
|
alias c='clear'
|
||||||
|
alias bashrc="vim ~/.bashrc && source ~/.bashrc"
|
||||||
|
# LS
|
||||||
|
alias ls='ls --color=auto -FAh'
|
||||||
|
alias ll='ls -l'
|
||||||
|
alias la='ls'
|
||||||
|
alias l.='ls | egrep "^\."'
|
||||||
|
alias l=ls
|
||||||
|
# GREP
|
||||||
|
alias grep='grep --color=auto'
|
||||||
|
alias egrep='egrep --color=auto'
|
||||||
|
alias fgrep='fgrep --color=auto'
|
||||||
|
# GIT
|
||||||
|
alias ga='git add'
|
||||||
|
alias gc='git commit'
|
||||||
|
alias gp='git push'
|
||||||
|
alias lc='fc -nl $HISTCMD'
|
||||||
|
# CADDY
|
||||||
|
alias rc='caddy reload --config ~/Caddyfile'
|
||||||
|
alias ft='caddy fmt --overwrite ~/Caddyfile'
|
||||||
|
alias vt='caddy validate --config ~/Caddyfile'
|
||||||
|
# DOCKER
|
||||||
|
alias dockup='docker compose pull; docker compose down && docker compose up -d --build --remove-orphans'
|
||||||
|
# Navigation
|
||||||
|
alias ..='cd ..'
|
||||||
|
alias ...='cd ../../'
|
||||||
|
alias ....='cd ../../../'
|
||||||
|
alias .....='cd ../../../../'
|
||||||
|
# Readability
|
||||||
|
alias cp="cp -iv"
|
||||||
|
alias mv='mv -iv'
|
||||||
|
alias rm='rm -iv'
|
||||||
|
alias df='df -h'
|
||||||
|
alias free='free -m'
|
||||||
|
alias mkdir='mkdir -pv'
|
42
all/templates/bashrc.j2
Normal file
42
all/templates/bashrc.j2
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
# If not running interactively, don't do anything
|
||||||
|
case $- in
|
||||||
|
*i*) ;;
|
||||||
|
*) return;;
|
||||||
|
esac
|
||||||
|
export HISTCONTROL=ignoredups:erasedups
|
||||||
|
export HISTFILESIZE=
|
||||||
|
export HISTSIZE=
|
||||||
|
export HISTTIMEFORMAT="[%F %T] "
|
||||||
|
# Change the file location because certain bash sessions truncate .bash_history file upon close.
|
||||||
|
# http://superuser.com/questions/575479/bash-history-truncated-to-500-lines-on-each-login
|
||||||
|
export HISTFILE=~/.bash_history
|
||||||
|
# Force prompt to write history after every command.
|
||||||
|
# http://superuser.com/questions/20900/bash-history-loss
|
||||||
|
PROMPT_COMMAND="history -a; $PROMPT_COMMAND"
|
||||||
|
|
||||||
|
shopt -s autocd # change to named directory
|
||||||
|
shopt -s cdspell # autocorrects cd misspellings
|
||||||
|
shopt -s cmdhist # save multi-line commands in history as single line
|
||||||
|
shopt -s dotglob
|
||||||
|
shopt -s histappend # do not overwrite history
|
||||||
|
shopt -s expand_aliases # expand aliases
|
||||||
|
shopt -s extglob
|
||||||
|
#ignore upper and lowercase when TAB completion
|
||||||
|
bind "set completion-ignore-case on"
|
||||||
|
|
||||||
|
# colored GCC warnings and errors
|
||||||
|
export GCC_COLORS='error=01;31:warning=01;35:note=01;36:caret=01;32:locus=01:quote=01'
|
||||||
|
|
||||||
|
if [ -f ~/.bash_aliases ]; then
|
||||||
|
. ~/.bash_aliases
|
||||||
|
fi
|
||||||
|
# enable programmable completion features (you don't need to enable
|
||||||
|
# this, if it's already enabled in /etc/bash.bashrc and /etc/profile
|
||||||
|
# sources /etc/bash.bashrc).
|
||||||
|
if ! shopt -oq posix; then
|
||||||
|
if [ -f /usr/share/bash-completion/bash_completion ]; then
|
||||||
|
. /usr/share/bash-completion/bash_completion
|
||||||
|
elif [ -f /etc/bash_completion ]; then
|
||||||
|
. /etc/bash_completion
|
||||||
|
fi
|
||||||
|
fi
|
28
all/templates/profile.j2
Normal file
28
all/templates/profile.j2
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
# ~/.profile: executed by the command interpreter for login shells.
|
||||||
|
# This file is not read by bash(1), if ~/.bash_profile or ~/.bash_login
|
||||||
|
# exists.
|
||||||
|
# see /usr/share/doc/bash/examples/startup-files for examples.
|
||||||
|
# the files are located in the bash-doc package.
|
||||||
|
|
||||||
|
# the default umask is set in /etc/profile; for setting the umask
|
||||||
|
# for ssh logins, install and configure the libpam-umask package.
|
||||||
|
#umask 022
|
||||||
|
|
||||||
|
# if running bash
|
||||||
|
if [ -n "$BASH_VERSION" ]; then
|
||||||
|
# include .bashrc if it exists
|
||||||
|
if [ -f "$HOME/.bashrc" ]; then
|
||||||
|
. "$HOME/.bashrc"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# set PATH so it includes user's private bin if it exists
|
||||||
|
if [ -d "$HOME/bin" ] ; then
|
||||||
|
PATH="$HOME/bin:$PATH"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# set PATH so it includes user's private bin if it exists
|
||||||
|
if [ -d "$HOME/.local/bin" ] ; then
|
||||||
|
PATH="$HOME/.local/bin:$PATH"
|
||||||
|
fi
|
||||||
|
. "$HOME/.prompt"
|
57
all/templates/prompt.j2
Normal file
57
all/templates/prompt.j2
Normal file
@ -0,0 +1,57 @@
|
|||||||
|
__sig() {
|
||||||
|
# Giant switch case for getting the name of the signal (`kill -l`)
|
||||||
|
a=0
|
||||||
|
for i in $@; do
|
||||||
|
a=$((a+1))
|
||||||
|
case $i in
|
||||||
|
126) printf ACCES ;;
|
||||||
|
127) printf NOENT ;;
|
||||||
|
129) printf HUP ;;
|
||||||
|
130) printf INT ;;
|
||||||
|
131) printf QUIT ;;
|
||||||
|
132) printf ILL ;;
|
||||||
|
133) printf TRAP ;;
|
||||||
|
134) printf ABRT ;;
|
||||||
|
135) printf BUS ;;
|
||||||
|
136) printf FPE ;;
|
||||||
|
137) printf KILL ;;
|
||||||
|
138) printf USR1 ;;
|
||||||
|
139) printf SEGV ;;
|
||||||
|
140) printf USR2 ;;
|
||||||
|
141) printf PIPE ;;
|
||||||
|
142) printf ALRM ;;
|
||||||
|
143) printf TERM ;;
|
||||||
|
144) printf STKFLT ;;
|
||||||
|
145) printf CHLD ;;
|
||||||
|
146) printf CONT ;;
|
||||||
|
147) printf STOP ;;
|
||||||
|
148) printf TSTP ;;
|
||||||
|
149) printf TTIN ;;
|
||||||
|
150) printf TTOU ;;
|
||||||
|
151) printf URG ;;
|
||||||
|
152) printf XCPU ;;
|
||||||
|
153) printf XFSZ ;;
|
||||||
|
154) printf VTALRM ;;
|
||||||
|
155) printf PROF ;;
|
||||||
|
156) printf WINCH ;;
|
||||||
|
157) printf IO ;;
|
||||||
|
158) printf PWR ;;
|
||||||
|
159) printf SYS ;;
|
||||||
|
16[3-9]|1[7-8][0-9]|19[0-2]) printf RT$(($i-128)) ;; # Savagery
|
||||||
|
*) printf $i ;; # Print exit code if not in list
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
}
|
||||||
|
sig() {
|
||||||
|
PLC=(${PIPESTATUS[@]})
|
||||||
|
printf "$(__sig ${PLC[@]})"
|
||||||
|
}
|
||||||
|
NO_COLOUR="\[\033[0m\]"
|
||||||
|
# Bold Colours
|
||||||
|
RED="\[\033[01;31m\]"
|
||||||
|
GREEN="\[\033[01;32m\]"
|
||||||
|
YELLOW="\[\033[01;33m\]"
|
||||||
|
BLUE="\[\033[01;34m\]"
|
||||||
|
|
||||||
|
PS1="[${RED}\$(sig)${NO_COLOUR}] [\t] [${RED}\u${NO_COLOUR}@${GREEN}\h${NO_COLOUR}|${BLUE}\w${NO_COLOUR}] [${YELLOW}#\#${NO_COLOUR}] ${GREEN}\$ ${NO_COLOUR}"
|
||||||
|
|
15
all/templates/sshd_config.j2
Normal file
15
all/templates/sshd_config.j2
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{% if inventory_hostname == 'eu' %}
|
||||||
|
Port 222
|
||||||
|
{% else %}
|
||||||
|
Port 22
|
||||||
|
{% endif %}
|
||||||
|
PermitRootLogin prohibit-password
|
||||||
|
PasswordAuthentication no
|
||||||
|
PermitEmptyPasswords no
|
||||||
|
ChallengeResponseAuthentication no
|
||||||
|
UsePAM no
|
||||||
|
X11Forwarding no
|
||||||
|
PrintMotd yes
|
||||||
|
UseDNS no
|
||||||
|
AcceptEnv LANG LC_*
|
||||||
|
Subsystem sftp /usr/lib/openssh/sftp-server
|
2
ansible.cfg
Normal file
2
ansible.cfg
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
[defaults]
|
||||||
|
INVENTORY = inventory.yml
|
4
collections/requirements.yml
Normal file
4
collections/requirements.yml
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
collections:
|
||||||
|
- name: community.general
|
||||||
|
- name: community.docker
|
29
inventory.yml
Normal file
29
inventory.yml
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
all:
|
||||||
|
children:
|
||||||
|
soleil:
|
||||||
|
hosts:
|
||||||
|
core:
|
||||||
|
ansible_host: soleil.projectsegfau.lt
|
||||||
|
ansible_user: user
|
||||||
|
ansible_port: 2270
|
||||||
|
ansible_become: yes # Run everything as root
|
||||||
|
privfrontends:
|
||||||
|
hosts:
|
||||||
|
eu:
|
||||||
|
ansible_host: pizza1.projectsegfau.lt
|
||||||
|
ansible_user: arya
|
||||||
|
ansible_port: 222
|
||||||
|
ansible_become: yes # Run everything as root
|
||||||
|
caddy_extras_config: templates/1-extras.Caddyfile
|
||||||
|
us:
|
||||||
|
ansible_host: us.projectsegfau.lt
|
||||||
|
ansible_user: arya
|
||||||
|
ansible_port: 22
|
||||||
|
ansible_become: yes # Run everything as root
|
||||||
|
caddy_extras_config: templates/2-extras.Caddyfile
|
||||||
|
in:
|
||||||
|
ansible_host: in.projectsegfau.lt
|
||||||
|
ansible_user: root
|
||||||
|
ansible_port: 6922
|
||||||
|
caddy_extras_config: templates/3-extras.Caddyfile
|
||||||
|
|
9
privfrontends/compose/breezewiki/compose.yml.j2
Normal file
9
privfrontends/compose/breezewiki/compose.yml.j2
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
services:
|
||||||
|
breezewiki:
|
||||||
|
container_name: breezewiki
|
||||||
|
image: quay.io/pussthecatorg/breezewiki:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
ports:
|
||||||
|
- "10416:10416"
|
||||||
|
volumes:
|
||||||
|
- "./config.ini:/app/config.ini"
|
4
privfrontends/compose/breezewiki/extras.conf.j2
Normal file
4
privfrontends/compose/breezewiki/extras.conf.j2
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
canonical_origin = https://bw.projectsegfau.lt
|
||||||
|
debug = false
|
||||||
|
port = 10416
|
||||||
|
feature_search_suggestions = true
|
32
privfrontends/compose/gothub-dev/compose.yml.j2
Normal file
32
privfrontends/compose/gothub-dev/compose.yml.j2
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
version: "3"
|
||||||
|
services:
|
||||||
|
gothub:
|
||||||
|
image: codeberg.org/gothub/gothub:dev
|
||||||
|
restart: unless-stopped
|
||||||
|
ports:
|
||||||
|
- "1025:3000"
|
||||||
|
environment:
|
||||||
|
- DOCKER=true
|
||||||
|
- GOTHUB_SETUP_COMPLETE=true
|
||||||
|
- GOTHUB_PROXYING_ENABLED=true
|
||||||
|
- GOTHUB_IP_LOGGED=false
|
||||||
|
- GOTHUB_REQUEST_URL_LOGGED=false
|
||||||
|
- GOTHUB_USER_AGENT_LOGGED=false
|
||||||
|
- GOTHUB_DIAGNOSTIC_INFO_LOGGED=false
|
||||||
|
- GOTHUB_INSTANCE_PRIVACY_POLICY=https://projectsegfau.lt/legal/privacy-policy
|
||||||
|
{% if inventory_hostname == 'eu' %}
|
||||||
|
- GOTHUB_INSTANCE_COUNTRY=Luxembourg
|
||||||
|
- GOTHUB_INSTANCE_PROVIDER=BuyVM
|
||||||
|
{% else if inventory_hostname == 'us' %}
|
||||||
|
- GOTHUB_INSTANCE_COUNTRY=United States
|
||||||
|
- GOTHUB_INSTANCE_PROVIDER=Digital Ocean
|
||||||
|
{% else if inventory_hostname == 'in' %}
|
||||||
|
- GOTHUB_INSTANCE_COUNTRY=India
|
||||||
|
- GOTHUB_INSTANCE_PROVIDER=Bharti Airtel
|
||||||
|
{% endif %}
|
||||||
|
- GOTHUB_INSTANCE_CLOUDFLARE=false
|
||||||
|
healthcheck:
|
||||||
|
test: wget -nv --tries=1 --spider http://127.0.0.1:3000/api/v1/version || exit 1
|
||||||
|
interval: 30s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 2
|
14
privfrontends/compose/gothub/compose.yml.j2
Normal file
14
privfrontends/compose/gothub/compose.yml.j2
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
version: "3"
|
||||||
|
services:
|
||||||
|
gothub:
|
||||||
|
image: codeberg.org/gothub/gothub:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
ports:
|
||||||
|
- "1024:3000"
|
||||||
|
environment:
|
||||||
|
- DOCKER=true
|
||||||
|
healthcheck:
|
||||||
|
test: wget -nv --tries=1 --spider http://127.0.0.1:3000/api/v1/version || exit 1
|
||||||
|
interval: 30s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 2
|
16
privfrontends/compose/librarian/compose.yml.j2
Normal file
16
privfrontends/compose/librarian/compose.yml.j2
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
version: '3'
|
||||||
|
|
||||||
|
services:
|
||||||
|
librarian:
|
||||||
|
image: codeberg.org/librarian/librarian:latest
|
||||||
|
ports:
|
||||||
|
- 3550:3550
|
||||||
|
volumes:
|
||||||
|
- ./extras.conf:/app/config.yml
|
||||||
|
restart: unless-stopped
|
||||||
|
|
||||||
|
stream-proxy:
|
||||||
|
image: codeberg.org/librarian/stream-proxy-ng:latest
|
||||||
|
ports:
|
||||||
|
- 3001:3001
|
||||||
|
restart: unless-stopped
|
78
privfrontends/compose/librarian/extras.conf.j2
Normal file
78
privfrontends/compose/librarian/extras.conf.j2
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
DOMAIN: 'https://lbry.projectsegfau.lt'
|
||||||
|
PORT: '3550'
|
||||||
|
FIBER_PREFORK: false
|
||||||
|
# Optional: Set address to bind to, example: 127.0.0.1
|
||||||
|
ADDRESS: ''
|
||||||
|
# Running a custom API server is not recommended and is not suitable for a public instance
|
||||||
|
API_URL: 'https://api.na-backend.odysee.com/api/v1/proxy'
|
||||||
|
# Block access to claims in case of DMCA
|
||||||
|
BLOCKED_CLAIMS:
|
||||||
|
- claimId
|
||||||
|
# AUTH_TOKEN and HMAC_KEY is automatically generated
|
||||||
|
AUTH_TOKEN: '{{librarian_auth_token}}'
|
||||||
|
HMAC_KEY: '{{librarian_hmac_key}}'
|
||||||
|
# Create IMAGE_CACHE_DIR before enabling image caching
|
||||||
|
IMAGE_CACHE: false
|
||||||
|
IMAGE_CACHE_DIR: '/var/cache/librarian'
|
||||||
|
IMAGE_CACHE_CLEANUP_INTERVAL: 24h
|
||||||
|
# The next 2 options will proxy video data through the instance.
|
||||||
|
# This will cause increased bandwidth usage.
|
||||||
|
# ENABLE_STREAM_PROXY proxies videos and ENABLE_LIVESTREAM enables livestreams.
|
||||||
|
ENABLE_STREAM_PROXY: true
|
||||||
|
ENABLE_LIVESTREAM: true
|
||||||
|
# Set custom SponsorBlock URL (with https://github.com/mchangrh/sb-mirror or other)
|
||||||
|
SPONSORBLOCK_URL: 'https://sponsor.ajay.app'
|
||||||
|
# Advanced: Custom video streaming endpoint
|
||||||
|
VIDEO_STREAMING_URL: 'https://proxy.lbry.projectsegfau.lt/stream'
|
||||||
|
# Rewrite links to other frontends. example: https://yt.domain.tld
|
||||||
|
FRONTEND:
|
||||||
|
youtube: 'https://invidious.projectsegfau.lt'
|
||||||
|
twitter: 'https://nitter.projectsegfau.lt'
|
||||||
|
imgur: 'https://rimgo.projectsegfau.lt'
|
||||||
|
instagram: ''
|
||||||
|
tiktok: ''
|
||||||
|
reddit: 'https://libreddit.projectsegfau.lt'
|
||||||
|
# Default instance settings
|
||||||
|
DEFAULT_SETTINGS:
|
||||||
|
theme: 'dark' # system, light, dark
|
||||||
|
relatedVideos: true
|
||||||
|
nsfw: false
|
||||||
|
autoplay: false
|
||||||
|
speed: '1' # 0.25, 0.5, 0.75, 1, 1.25, 1.5, 1.75, 2, 4
|
||||||
|
quality: '0' # 0 - Auto, 144 - 144p, 360 - 360p, 720 - 720p, 1080 - 1080p
|
||||||
|
sponsorblock:
|
||||||
|
sponsor: true
|
||||||
|
selfpromo: true
|
||||||
|
interaction: true
|
||||||
|
intro: false
|
||||||
|
outro: false
|
||||||
|
preview: false
|
||||||
|
filler_tangent: false
|
||||||
|
# Instance privacy: This is required to get your instance listed. For more info,
|
||||||
|
# See: https://codeberg.org/librarian/librarian/wiki/Instance-privacy
|
||||||
|
INSTANCE_PRIVACY:
|
||||||
|
# This is the default if you are using NGINX and have not disabled data collection.
|
||||||
|
# Read https://codeberg.org/librarian/librarian/wiki/Instance-privacy
|
||||||
|
DATA_NOT_COLLECTED: true
|
||||||
|
DATA_COLLECTED_IP: true
|
||||||
|
DATA_COLLECTED_URL: true
|
||||||
|
DATA_COLLECTED_DEVICE: true
|
||||||
|
DATA_COLLECTED_DIAGNOSTIC_ONLY: false
|
||||||
|
|
||||||
|
{% if inventory_hostname == 'eu' %}
|
||||||
|
INSTANCE_COUNTRY: "Luxembourg"
|
||||||
|
INSTANCE_PROVIDER: "BuyVM"
|
||||||
|
{% else if inventory_hostname == 'us' %}
|
||||||
|
INSTANCE_COUNTRY: "United States"
|
||||||
|
INSTANCE_PROVIDER: "Digital Ocean"
|
||||||
|
{% else if inventory_hostname == 'in' %}
|
||||||
|
INSTANCE_COUNTRY: "India"
|
||||||
|
INSTANCE_PROVIDER: "Bharti Airtel"
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
# Cloudflare use is discouraged. You can set this to false if it is not proxied (gray cloud icon)
|
||||||
|
INSTANCE_CLOUDFLARE: false
|
||||||
|
# Optional: Explain your usage of data (if collected) and how it is stored.
|
||||||
|
MESSAGE: ""
|
||||||
|
# Link to your privacy policy, leave blank if you don't have one.
|
||||||
|
PRIVACY_POLICY: "https://projectsegfau.lt/legal/privacy-policy"
|
16
privfrontends/compose/libreddit/compose.yml.j2
Normal file
16
privfrontends/compose/libreddit/compose.yml.j2
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
services:
|
||||||
|
libreddit:
|
||||||
|
image: libreddit/libreddit:latest
|
||||||
|
ports:
|
||||||
|
- 127.0.0.1:6464:8080
|
||||||
|
restart: unless-stopped
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "wget", "--spider", "-q", "--tries=1", "http://localhost:8080/settings"]
|
||||||
|
interval: 5m
|
||||||
|
timeout: 3s
|
||||||
|
environment:
|
||||||
|
- FRONT_PAGE=popular
|
||||||
|
- COMMENT_SORT=new
|
||||||
|
- BLUR_NSFW=on
|
||||||
|
- USE_HLS=on
|
||||||
|
- AUTOPLAY_VIDEOS=off
|
24
privfrontends/compose/nitter/compose.yml.j2
Normal file
24
privfrontends/compose/nitter/compose.yml.j2
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
version: "3"
|
||||||
|
|
||||||
|
services:
|
||||||
|
|
||||||
|
nitter:
|
||||||
|
image: zedeus/nitter:latest
|
||||||
|
ports:
|
||||||
|
- "8387:8080"
|
||||||
|
volumes:
|
||||||
|
- ./extras.conf:/src/nitter.conf:ro
|
||||||
|
depends_on:
|
||||||
|
- nitter-redis
|
||||||
|
restart: unless-stopped
|
||||||
|
|
||||||
|
nitter-redis:
|
||||||
|
image: redis:6-alpine
|
||||||
|
container_name: nitter-redis
|
||||||
|
command: redis-server --save 60 1 --loglevel warning
|
||||||
|
volumes:
|
||||||
|
- nitter-redis:/data
|
||||||
|
restart: unless-stopped
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
nitter-redis:
|
45
privfrontends/compose/nitter/extras.conf.j2
Normal file
45
privfrontends/compose/nitter/extras.conf.j2
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
[Server]
|
||||||
|
address = "0.0.0.0"
|
||||||
|
port = 8080
|
||||||
|
https = true # disable to enable cookies when not using https
|
||||||
|
httpMaxConnections = 100
|
||||||
|
staticDir = "./public"
|
||||||
|
title = "nitter"
|
||||||
|
hostname = "nitter.projectsegfau.lt"
|
||||||
|
|
||||||
|
[Cache]
|
||||||
|
listMinutes = 240 # how long to cache list info (not the tweets, so keep it high)
|
||||||
|
rssMinutes = 10 # how long to cache rss queries
|
||||||
|
redisHost = "nitter-redis" # Change to "nitter-redis" if using docker-compose
|
||||||
|
redisPort = 6379
|
||||||
|
redisPassword = ""
|
||||||
|
redisConnections = 20 # connection pool size
|
||||||
|
redisMaxConnections = 30
|
||||||
|
# max, new connections are opened when none are available, but if the pool size
|
||||||
|
# goes above this, they're closed when released. don't worry about this unless
|
||||||
|
# you receive tons of requests per second
|
||||||
|
|
||||||
|
[Config]
|
||||||
|
hmacKey = "{{nitter_hmac_key}}" # random key for cryptographic signing of video urls
|
||||||
|
base64Media = false # use base64 encoding for proxied media urls
|
||||||
|
enableRSS = true # set this to false to disable RSS feeds
|
||||||
|
enableDebug = false # enable request logs and debug endpoints
|
||||||
|
proxy = "" # http/https url, SOCKS proxies are not supported
|
||||||
|
proxyAuth = ""
|
||||||
|
tokenCount = 10
|
||||||
|
# minimum amount of usable tokens. tokens are used to authorize API requests,
|
||||||
|
# but they expire after ~1 hour, and have a limit of 187 requests.
|
||||||
|
# the limit gets reset every 15 minutes, and the pool is filled up so there's
|
||||||
|
# always at least $tokenCount usable tokens. again, only increase this if
|
||||||
|
# you receive major bursts all the time
|
||||||
|
|
||||||
|
# Change default preferences here, see src/prefs_impl.nim for a complete list
|
||||||
|
[Preferences]
|
||||||
|
theme = "Nitter"
|
||||||
|
replaceTwitter = "nitter.projectsegfau.lt"
|
||||||
|
replaceYouTube = "invidious.projectsegfau.lt"
|
||||||
|
replaceReddit = "libreddit.projectsegfau.lt"
|
||||||
|
replaceInstagram = ""
|
||||||
|
proxyVideos = true
|
||||||
|
hlsPlayback = true
|
||||||
|
infiniteScroll = false
|
25
privfrontends/compose/rimgo/compose.yml.j2
Normal file
25
privfrontends/compose/rimgo/compose.yml.j2
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
services:
|
||||||
|
rimgo:
|
||||||
|
image: codeberg.org/video-prize-ranch/rimgo # Official image
|
||||||
|
ports:
|
||||||
|
- 9016:3000
|
||||||
|
environment:
|
||||||
|
- ADDRESS=0.0.0.0
|
||||||
|
- PORT=3000
|
||||||
|
- FIBER_PREFORK=false
|
||||||
|
- IMGUR_CLIENT_ID=546c25a59c58ad7
|
||||||
|
- PRIVACY_POLICY=https://projectsegfau.lt/legal/privacy-policy
|
||||||
|
- PRIVACY_MESSAGE=
|
||||||
|
{% if inventory_hostname == 'eu' %}
|
||||||
|
- PRIVACY_COUNTRY=Luxembourg
|
||||||
|
- PRIVACY_PROVIDER=BuyVM
|
||||||
|
{% else if inventory_hostname == 'us' %}
|
||||||
|
- PRIVACY_COUNTRY=USA
|
||||||
|
- PRIVACY_PROVIDER=Digital Ocean
|
||||||
|
{% else if inventory_hostname == 'in' %}
|
||||||
|
- PRIVACY_COUNTRY=India
|
||||||
|
- PRIVACY_PROVIDER=Bharti Airtel
|
||||||
|
{% endif %}
|
||||||
|
- PRIVACY_CLOUDFLARE=false
|
||||||
|
- PRIVACY_NOT_COLLECTED=true
|
||||||
|
restart: unless-stopped
|
16
privfrontends/compose/scribe/compose.yml.j2
Normal file
16
privfrontends/compose/scribe/compose.yml.j2
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
version: "3.8"
|
||||||
|
|
||||||
|
services:
|
||||||
|
scribe:
|
||||||
|
image: registry.gitlab.com/lomanic/scribe-binaries:latest
|
||||||
|
restart: always
|
||||||
|
container_name: "scribe"
|
||||||
|
ports:
|
||||||
|
- 8006:8006
|
||||||
|
environment:
|
||||||
|
- SCRIBE_PORT=8006
|
||||||
|
- SCRIBE_HOST=0.0.0.0
|
||||||
|
- APP_DOMAIN=scribe.projectsegfau.lt
|
||||||
|
- LUCKY_ENV=production
|
||||||
|
- PORT=8006
|
||||||
|
- SECRET_KEY_BASE={{scribe_secret_key_base}}
|
41
privfrontends/compose/teddit/compose.yml.j2
Normal file
41
privfrontends/compose/teddit/compose.yml.j2
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
version: "3.8"
|
||||||
|
|
||||||
|
services:
|
||||||
|
|
||||||
|
teddit:
|
||||||
|
restart: always
|
||||||
|
container_name: teddit
|
||||||
|
image: teddit/teddit:latest
|
||||||
|
environment:
|
||||||
|
- DOMAIN=teddit.projectsegfau.lt
|
||||||
|
- USE_HELMET=true
|
||||||
|
- USE_HELMET_HSTS=true
|
||||||
|
- TRUST_PROXY=true
|
||||||
|
- REDIS_HOST=teddit-redis
|
||||||
|
ports:
|
||||||
|
- "9061:8080"
|
||||||
|
networks:
|
||||||
|
- teddit_net
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "wget" ,"--no-verbose", "--tries=1", "--spider", "http://localhost:8080/about"]
|
||||||
|
interval: 1m
|
||||||
|
timeout: 3s
|
||||||
|
depends_on:
|
||||||
|
- teddit-redis
|
||||||
|
|
||||||
|
teddit-redis:
|
||||||
|
restart: always
|
||||||
|
container_name: teddit-redis
|
||||||
|
image: redis:6.2.5-alpine
|
||||||
|
command: redis-server
|
||||||
|
environment:
|
||||||
|
- REDIS_REPLICATION_MODE=master
|
||||||
|
networks:
|
||||||
|
- teddit_net
|
||||||
|
volumes:
|
||||||
|
- teddit-redis:/data
|
||||||
|
volumes:
|
||||||
|
teddit-redis:
|
||||||
|
|
||||||
|
networks:
|
||||||
|
teddit_net:
|
35
privfrontends/docker-tasks.yaml
Normal file
35
privfrontends/docker-tasks.yaml
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
---
|
||||||
|
- name: Copy docker-compose templates for the service
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: ../compose/{{item}}/compose.yml.j2
|
||||||
|
dest: /opt/docker/{{item}}/compose.yml
|
||||||
|
backup: yes
|
||||||
|
register: check_status
|
||||||
|
|
||||||
|
- name: check if extras file exists for the service
|
||||||
|
local_action: stat path=../compose/{{item}}/extras.conf.j2
|
||||||
|
register: file
|
||||||
|
- name: Copy extras file
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: ../compose/{{item}}/extras.conf.j2
|
||||||
|
dest: /opt/docker/{{item}}/extras.conf
|
||||||
|
backup: yes
|
||||||
|
when: file.stat.exists
|
||||||
|
|
||||||
|
- name: "Update docker service image"
|
||||||
|
command:
|
||||||
|
chdir: "/opt/docker/{{ item }}"
|
||||||
|
cmd: docker compose pull
|
||||||
|
when: check_status is changed
|
||||||
|
|
||||||
|
- name: "Stop docker service"
|
||||||
|
command:
|
||||||
|
chdir: "/opt/docker/{{ item }}"
|
||||||
|
cmd: docker compose down
|
||||||
|
when: check_status is changed
|
||||||
|
|
||||||
|
- name: "Start docker service"
|
||||||
|
command:
|
||||||
|
chdir: "/opt/docker/{{ item }}"
|
||||||
|
cmd: docker compose up -d --build --remove-orphans
|
||||||
|
when: check_status is changed
|
47
privfrontends/playbook.yaml
Normal file
47
privfrontends/playbook.yaml
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
---
|
||||||
|
- name: Setup Caddy
|
||||||
|
hosts: privfrontends
|
||||||
|
roles:
|
||||||
|
- role: caddy_ansible.caddy_ansible
|
||||||
|
caddy_systemd_capabilities_enabled: true
|
||||||
|
caddy_config: "{{ lookup('template', '../templates/Caddyfile.j2') }}"
|
||||||
|
caddy_user: "caddy"
|
||||||
|
caddy_home: "/var/lib/caddy"
|
||||||
|
# Static weekly builds of caddy with rfc2136 dns plugin
|
||||||
|
caddy_url_base: "https://cb.projectsegfau.lt/api/download"
|
||||||
|
tasks:
|
||||||
|
- name: Copy per-server caddy extras
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: "../{{ caddy_extras_config }}"
|
||||||
|
dest: /etc/caddy/extras.caddy
|
||||||
|
- name: Setup docker compose for privacy frontends
|
||||||
|
hosts: all
|
||||||
|
vars:
|
||||||
|
docker_services:
|
||||||
|
- anonymousoverflow
|
||||||
|
- beatbump
|
||||||
|
- breezewiki
|
||||||
|
- gothub
|
||||||
|
- gothub-dev
|
||||||
|
- invidious
|
||||||
|
- librarian
|
||||||
|
- libreddit
|
||||||
|
- nitter
|
||||||
|
- rimgo
|
||||||
|
- scribe
|
||||||
|
- teddit
|
||||||
|
- watchtower
|
||||||
|
non_pizza_docker_services:
|
||||||
|
- piped
|
||||||
|
- searxng-docker
|
||||||
|
tasks:
|
||||||
|
#
|
||||||
|
# community.docker does not support compose 2.0 right now.
|
||||||
|
# https://github.com/ansible-collections/community.docker/issues/216
|
||||||
|
#
|
||||||
|
- name: Update docker compose files and restart those with changes
|
||||||
|
include_tasks: docker-tasks.yaml
|
||||||
|
with_items: "{{ docker_services }}"
|
||||||
|
- name: Update docker compose files and restart those with changes (Privacy Frontends but without Pizza1)
|
||||||
|
include_tasks: docker-tasks.yaml
|
||||||
|
with_items: "{{ non_pizza_docker_services }}"
|
272
privfrontends/templates/1-extras.Caddyfile
Normal file
272
privfrontends/templates/1-extras.Caddyfile
Normal file
@ -0,0 +1,272 @@
|
|||||||
|
## OLD URL REDIRECTS
|
||||||
|
invidious.mutahar.rocks {
|
||||||
|
redir https://inv.bp.projectsegfau.lt{uri} permanent
|
||||||
|
}
|
||||||
|
ferrit.projectsegfau.lt snooddit.projectsegfau.lt libreddit.mutahar.rocks {
|
||||||
|
redir https://libreddit.projectsegfau.lt{uri} permanent
|
||||||
|
}
|
||||||
|
lbry.mutahar.rocks {
|
||||||
|
redir https://lbry.projectsegfau.lt{uri} permanent
|
||||||
|
}
|
||||||
|
nitter.mutahar.rocks {
|
||||||
|
redir https://nitter.projectsegfau.lt{uri} permanent
|
||||||
|
}
|
||||||
|
#redir inv.bp.mutahar.rocks inv.bp.projectsegfau.lt permanent
|
||||||
|
#redir libreddit.mutahar.rocks libreddit.projectsegfau.lt permanent
|
||||||
|
#redir lbry.mutahar.rocks lbry.projectsegfau.lt permanent
|
||||||
|
#redir nitter.mutahar.rocks nitter.projectsegfau.lt permanent
|
||||||
|
arya.projectsegfau.lt aryak.me {
|
||||||
|
reverse_proxy https://arya.p.projectsegfau.lt {
|
||||||
|
header_up Host arya.p.projectsegfau.lt
|
||||||
|
}
|
||||||
|
}
|
||||||
|
gothub.dev.projectsegfau.lt {
|
||||||
|
reverse_proxy localhost:1025
|
||||||
|
import def
|
||||||
|
import torloc gothub.dev
|
||||||
|
}
|
||||||
|
|
||||||
|
## PUBNIX
|
||||||
|
# Reverse proxy all user sites
|
||||||
|
*.p.projectsegfau.lt {
|
||||||
|
reverse_proxy 10.7.0.2:80
|
||||||
|
import acmedns
|
||||||
|
}
|
||||||
|
|
||||||
|
# Redirect base subdomain to the pubnix homepage
|
||||||
|
p.projectsegfau.lt {
|
||||||
|
redir https://projectsegfau.lt/pubnix
|
||||||
|
}
|
||||||
|
|
||||||
|
# Cockpit
|
||||||
|
cockpit.p.projectsegfau.lt {
|
||||||
|
reverse_proxy 10.7.0.2:9090 {
|
||||||
|
transport http {
|
||||||
|
tls_insecure_skip_verify
|
||||||
|
}
|
||||||
|
}
|
||||||
|
import def
|
||||||
|
import torloc cockpit.p
|
||||||
|
}
|
||||||
|
|
||||||
|
# PublAPI
|
||||||
|
publapi.p.projectsegfau.lt {
|
||||||
|
reverse_proxy 10.7.0.2:3000
|
||||||
|
import def
|
||||||
|
}
|
||||||
|
grafana.p.projectsegfau.lt {
|
||||||
|
reverse_proxy 10.7.0.2:6943 {
|
||||||
|
header_up X-Real-IP {remote_host}
|
||||||
|
}
|
||||||
|
import def
|
||||||
|
}
|
||||||
|
geminiproxy.projectsegfau.lt geminiproxy.p.projectsegfau.lt {
|
||||||
|
reverse_proxy 10.7.0.2:8000
|
||||||
|
import def
|
||||||
|
import torloc geminiproxy.p
|
||||||
|
}
|
||||||
|
http://pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
reverse_proxy https://projectsegfau.lt {
|
||||||
|
header_up Host "projectsegfau.lt"
|
||||||
|
}
|
||||||
|
import tor www
|
||||||
|
import i2ploc pjsfg3pdzzocax6a4oznoyf5k4etzknfatqu23i43wxejwdaffoa.b32.i2p
|
||||||
|
}
|
||||||
|
http://www.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
reverse_proxy https://projectsegfau.lt {
|
||||||
|
header_up Host "projectsegfau.lt"
|
||||||
|
}
|
||||||
|
import tor www
|
||||||
|
import i2ploc pjsfg3pdzzocax6a4oznoyf5k4etzknfatqu23i43wxejwdaffoa.b32.i2p
|
||||||
|
}
|
||||||
|
# Privacy Frontends
|
||||||
|
http://scribe.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
reverse_proxy localhost:8006
|
||||||
|
import tor scribe
|
||||||
|
import i2ploc pjsflkkkcn33ahmzmpyq6idy2knkzh4atp7zaetqfsnenpyori6a.b32.i2p
|
||||||
|
}
|
||||||
|
http://nitter.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
reverse_proxy localhost:8387
|
||||||
|
import tor nitter
|
||||||
|
import i2ploc pjsfs4ukb6prmfx3qx3a5ef2cpcupkvcrxdh72kqn2rxc2cw4nka.b32.i2p
|
||||||
|
}
|
||||||
|
http://lbry.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor lbry
|
||||||
|
import i2ploc pjsf7uucpqf2crcmfo3nvwdmjhirxxjfyuvibdfp5x3af2ghqnaa.b32.i2p
|
||||||
|
reverse_proxy localhost:3550
|
||||||
|
}
|
||||||
|
http://libreddit.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor libreddit
|
||||||
|
import i2ploc pjsfkref7g66mji45kyccqnn5hmjtjp3cfodozabpyplj2rmv5sa.b32.i2p
|
||||||
|
reverse_proxy localhost:6464
|
||||||
|
}
|
||||||
|
http://breezewiki.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor breezewiki
|
||||||
|
import i2ploc pjsfk4xvekoc7wx4pteevp3q2wy7jmzlem7rvl74nx33zkdr4vyq.b32.i2p
|
||||||
|
reverse_proxy localhost:10416
|
||||||
|
}
|
||||||
|
http://beatbump.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor beatbump
|
||||||
|
import i2ploc pjsflmvtqax7ii44qy4ladap65c3kqspbs7h7krqy7x43uovklla.b32.i2p
|
||||||
|
reverse_proxy localhost:3069
|
||||||
|
}
|
||||||
|
http://invbp.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor invbp
|
||||||
|
import i2ploc pjsfi2szfkb4guqzmfmlyq4no46fayertjrwt4h2uughccrh2lvq.b32.i2p
|
||||||
|
reverse_proxy localhost:3000
|
||||||
|
}
|
||||||
|
http://rimgo.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor rimgo
|
||||||
|
reverse_proxy localhost:9016
|
||||||
|
}
|
||||||
|
http://teddit.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor teddit
|
||||||
|
reverse_proxy localhost:9061
|
||||||
|
}
|
||||||
|
http://overflow.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor overflow
|
||||||
|
reverse_proxy localhost:8694
|
||||||
|
}
|
||||||
|
http://gothub.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor gothub
|
||||||
|
reverse_proxy localhost:1024
|
||||||
|
}
|
||||||
|
http://gothub.dev.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor gothub.dev
|
||||||
|
reverse_proxy localhost:1025
|
||||||
|
}
|
||||||
|
http://inv.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor inv
|
||||||
|
import i2ploc pjsfi2szfkb4guqzmfmlyq4no46fayertjrwt4h2uughccrh2lvq.b32.i2p
|
||||||
|
reverse_proxy https://invidious.projectsegfau.lt {
|
||||||
|
header_up Host "invidious.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
http://search.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor search
|
||||||
|
import i2ploc pjsfwklrellqoj275kzeu2tz4c3j5zktnqod56s7l5dc25ro3wgq.b32.i2p
|
||||||
|
reverse_proxy https://search.projectsegfau.lt {
|
||||||
|
header_up Host "search.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
http://git.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor git
|
||||||
|
import i2ploc pjsfdrtv2465bisenvzhfvdleznx4arlih2hlnrhpzugailnm7iq.b32.i2p
|
||||||
|
reverse_proxy https://git.projectsegfau.lt {
|
||||||
|
header_up Host "git.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
http://todo.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor todo
|
||||||
|
import i2ploc pjsfivs2sxudfy65kojxqophc6vqjqdr6woczy6hzaxvxvbj3bkq.b32.i2p
|
||||||
|
reverse_proxy https://todo.projectsegfau.lt {
|
||||||
|
header_up Host "todo.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
http://wiki.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor wiki
|
||||||
|
reverse_proxy https://wiki.projectsegfau.lt {
|
||||||
|
header_up Host "wiki.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
http://pass.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor pass
|
||||||
|
reverse_proxy https://pass.projectsegfau.lt {
|
||||||
|
header_up Host "pass.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
# Pubnix
|
||||||
|
http://geminiproxy.p.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor geminiproxy.p
|
||||||
|
reverse_proxy https://geminiproxy.p.projectsegfau.lt {
|
||||||
|
header_up Host "geminiproxy.p.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
http://cockpit.p.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion {
|
||||||
|
import tor cockpit.p
|
||||||
|
reverse_proxy https://cockpit.p.projectsegfau.lt {
|
||||||
|
header_up Host "cockpit.p.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
## I2P
|
||||||
|
## I2P
|
||||||
|
http://pjsfg3pdzzocax6a4oznoyf5k4etzknfatqu23i43wxejwdaffoa.b32.i2p:6001 {
|
||||||
|
reverse_proxy https://projectsegfau.lt {
|
||||||
|
header_up Host "projectsegfau.lt"
|
||||||
|
}
|
||||||
|
import tor www
|
||||||
|
import i2ploc pjsfg3pdzzocax6a4oznoyf5k4etzknfatqu23i43wxejwdaffoa.b32.i2p
|
||||||
|
}
|
||||||
|
http://pjsflkkkcn33ahmzmpyq6idy2knkzh4atp7zaetqfsnenpyori6a.b32.i2p:6008 {
|
||||||
|
reverse_proxy localhost:8006
|
||||||
|
import tor scribe
|
||||||
|
import i2ploc pjsflkkkcn33ahmzmpyq6idy2knkzh4atp7zaetqfsnenpyori6a.b32.i2p
|
||||||
|
}
|
||||||
|
http://pjsfs4ukb6prmfx3qx3a5ef2cpcupkvcrxdh72kqn2rxc2cw4nka.b32.i2p:6005 {
|
||||||
|
reverse_proxy localhost:8387
|
||||||
|
import tor nitter
|
||||||
|
import i2ploc pjsfs4ukb6prmfx3qx3a5ef2cpcupkvcrxdh72kqn2rxc2cw4nka.b32.i2p
|
||||||
|
}
|
||||||
|
http://pjsf7uucpqf2crcmfo3nvwdmjhirxxjfyuvibdfp5x3af2ghqnaa.b32.i2p:6003 {
|
||||||
|
import tor lbry
|
||||||
|
import i2ploc pjsf7uucpqf2crcmfo3nvwdmjhirxxjfyuvibdfp5x3af2ghqnaa.b32.i2p
|
||||||
|
reverse_proxy localhost:3550
|
||||||
|
}
|
||||||
|
http://pjsfkref7g66mji45kyccqnn5hmjtjp3cfodozabpyplj2rmv5sa.b32.i2p:6004 {
|
||||||
|
import tor libreddit
|
||||||
|
import i2ploc pjsfkref7g66mji45kyccqnn5hmjtjp3cfodozabpyplj2rmv5sa.b32.i2p
|
||||||
|
reverse_proxy localhost:6464
|
||||||
|
}
|
||||||
|
http://pjsfk4xvekoc7wx4pteevp3q2wy7jmzlem7rvl74nx33zkdr4vyq.b32.i2p:6007 { # NW
|
||||||
|
import tor breezewiki
|
||||||
|
import i2ploc pjsfk4xvekoc7wx4pteevp3q2wy7jmzlem7rvl74nx33zkdr4vyq.b32.i2p
|
||||||
|
reverse_proxy localhost:10416
|
||||||
|
}
|
||||||
|
http://pjsflmvtqax7ii44qy4ladap65c3kqspbs7h7krqy7x43uovklla.b32.i2p:6006 {
|
||||||
|
import tor beatbump
|
||||||
|
import i2ploc pjsflmvtqax7ii44qy4ladap65c3kqspbs7h7krqy7x43uovklla.b32.i2p
|
||||||
|
reverse_proxy localhost:3069
|
||||||
|
}
|
||||||
|
http://pjsfi2szfkb4guqzmfmlyq4no46fayertjrwt4h2uughccrh2lvq.b32.i2p:6016 {
|
||||||
|
import tor invbp
|
||||||
|
import i2ploc pjsfi2szfkb4guqzmfmlyq4no46fayertjrwt4h2uughccrh2lvq.b32.i2p
|
||||||
|
reverse_proxy localhost:3000
|
||||||
|
}
|
||||||
|
http://pjsf5ahv7ce67i5ic46ghum3scwatrsyac5i6aa5bynvnnlmpzfa.b32.i2p:6017 {
|
||||||
|
import tor rimgo
|
||||||
|
import i2ploc pjsf5ahv7ce67i5ic46ghum3scwatrsyac5i6aa5bynvnnlmpzfa.b32.i2p
|
||||||
|
reverse_proxy localhost:9016
|
||||||
|
}
|
||||||
|
http://pjsfa3dd7rxocfqanxenpop2uqfgpw4nevrmy424u5qwyasqdu6a.b32.i2p:6018 {
|
||||||
|
import tor teddit
|
||||||
|
import i2ploc pjsfa3dd7rxocfqanxenpop2uqfgpw4nevrmy424u5qwyasqdu6a.b32.i2p
|
||||||
|
reverse_proxy localhost:9061
|
||||||
|
}
|
||||||
|
http://pjsfhqamc7k6htnumrvn4cwqqdoggeepj7u5viyimgnxg3gar72q.b32.i2p:6002 {
|
||||||
|
import tor inv
|
||||||
|
import i2ploc pjsfi2szfkb4guqzmfmlyq4no46fayertjrwt4h2uughccrh2lvq.b32.i2p
|
||||||
|
reverse_proxy https://invidious.projectsegfau.lt {
|
||||||
|
header_up Host "invidious.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
http://pjsfwklrellqoj275kzeu2tz4c3j5zktnqod56s7l5dc25ro3wgq.b32.i2p:6012 {
|
||||||
|
import tor search
|
||||||
|
import i2ploc pjsfwklrellqoj275kzeu2tz4c3j5zktnqod56s7l5dc25ro3wgq.b32.i2p
|
||||||
|
reverse_proxy https://search.projectsegfau.lt {
|
||||||
|
header_up Host "search.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
http://pjsfdrtv2465bisenvzhfvdleznx4arlih2hlnrhpzugailnm7iq.b32.i2p:6013 {
|
||||||
|
import tor git
|
||||||
|
import i2ploc pjsfdrtv2465bisenvzhfvdleznx4arlih2hlnrhpzugailnm7iq.b32.i2p
|
||||||
|
reverse_proxy https://git.projectsegfau.lt {
|
||||||
|
header_up Host "git.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
http://pjsfivs2sxudfy65kojxqophc6vqjqdr6woczy6hzaxvxvbj3bkq.b32.i2p:6015 {
|
||||||
|
import i2ploc pjsfivs2sxudfy65kojxqophc6vqjqdr6woczy6hzaxvxvbj3bkq.b32.i2p
|
||||||
|
import tor todo
|
||||||
|
reverse_proxy https://todo.projectsegfau.lt {
|
||||||
|
header_up Host "todo.projectsegfau.lt"
|
||||||
|
}
|
||||||
|
}
|
4
privfrontends/templates/2-extras.Caddyfile
Normal file
4
privfrontends/templates/2-extras.Caddyfile
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
fb.us.projectsegfau.lt {
|
||||||
|
import def
|
||||||
|
reverse_proxy :8065
|
||||||
|
}
|
35
privfrontends/templates/3-extras.Caddyfile
Normal file
35
privfrontends/templates/3-extras.Caddyfile
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
bitpuit.in.projectsegfau.lt {
|
||||||
|
respond "Go fuck yourself devrand"
|
||||||
|
}
|
||||||
|
# PERSONAL
|
||||||
|
https://m.in.projectsegfau.lt:8448 m.in.projectsegfau.lt {
|
||||||
|
reverse_proxy http://192.168.1.47:8008
|
||||||
|
}
|
||||||
|
files.perso.in.projectsegfau.lt files.perso.in.projectsegfau.lt:6942 {
|
||||||
|
file_server {
|
||||||
|
browse
|
||||||
|
}
|
||||||
|
root * /zfspool/files
|
||||||
|
}
|
||||||
|
tnfiles.perso.in.projectsegfau.lt {
|
||||||
|
file_server {
|
||||||
|
browse
|
||||||
|
}
|
||||||
|
root * /zfspool/files/tn-sw
|
||||||
|
}
|
||||||
|
discourse.tildevarsh.in {
|
||||||
|
reverse_proxy https://192.168.1.21:443 {
|
||||||
|
transport http {
|
||||||
|
tls_insecure_skip_verify
|
||||||
|
}
|
||||||
|
header_up X-Real-IP {remote_host}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
jf.perso.in.projectsegfau.lt {
|
||||||
|
reverse_proxy 192.168.1.20:8096
|
||||||
|
import def
|
||||||
|
}
|
||||||
|
nc.perso.in.projectsegfau.lt {
|
||||||
|
reverse_proxy 192.168.1.20:80
|
||||||
|
import def
|
||||||
|
}
|
275
privfrontends/templates/Caddyfile.j2
Normal file
275
privfrontends/templates/Caddyfile.j2
Normal file
@ -0,0 +1,275 @@
|
|||||||
|
(tor) {
|
||||||
|
header {
|
||||||
|
-Strict-Transport-Security
|
||||||
|
-Referrer-Policy
|
||||||
|
-X-XSS-Protection
|
||||||
|
-Content-Security-Policy
|
||||||
|
# disable clients from sniffing the media type
|
||||||
|
X-Content-Type-Options nosniff
|
||||||
|
Permissions-Policy interest-cohort=()
|
||||||
|
# clickjacking protection
|
||||||
|
X-Frame-Options SAMEORIGIN
|
||||||
|
Onion-Location http://{args.0}.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion{path}
|
||||||
|
defer
|
||||||
|
}
|
||||||
|
}
|
||||||
|
(torloc) {
|
||||||
|
header Onion-Location http://{args.0}.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion{path}
|
||||||
|
}
|
||||||
|
(i2ploc) {
|
||||||
|
header X-I2P-Location http://{args.0}{path}
|
||||||
|
}
|
||||||
|
(acmedns) {
|
||||||
|
tls {
|
||||||
|
dns rfc2136 {
|
||||||
|
key_name "dynupd"
|
||||||
|
key_alg "hmac-sha256"
|
||||||
|
# declared in secrets.en: https://aryak.me/blog/01-knot
|
||||||
|
key "{{ rfc2136_key }}"
|
||||||
|
server "107.189.12.96:53"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
(def) {
|
||||||
|
header {
|
||||||
|
# disable FLoC tracking
|
||||||
|
Permissions-Policy interest-cohort=()
|
||||||
|
|
||||||
|
# enable HSTS
|
||||||
|
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
|
||||||
|
# disable clients from sniffing the media type
|
||||||
|
X-Content-Type-Options nosniff
|
||||||
|
|
||||||
|
# clickjacking protection
|
||||||
|
X-Frame-Options SAMEORIGIN
|
||||||
|
|
||||||
|
# keep referrer data off of HTTP connections
|
||||||
|
Referrer-Policy no-referrer-when-downgrade
|
||||||
|
|
||||||
|
X-XSS-Protection "1; mode=block"
|
||||||
|
defer
|
||||||
|
}
|
||||||
|
{% if inventory_hostname == 'in' %}
|
||||||
|
import acmedns
|
||||||
|
{% endif %}
|
||||||
|
}
|
||||||
|
{{inventory_hostname}}.projectsegfau.lt {% if inventory_hostname == 'eu' %} pizza1.projectsegfau.lt {% endif %} {
|
||||||
|
{% if inventory_hostname == 'eu' %}
|
||||||
|
redir https://wiki.projectsegfau.lt/index.php?title=Pizza1
|
||||||
|
{% elif inventory_hostname == 'us' %}
|
||||||
|
redir https://wiki.projectsegfau.lt/index.php?title=US_Node
|
||||||
|
{% elif inventory_hostname == 'in' %}
|
||||||
|
redir https://wiki.projectsegfau.lt/index.php?title=India_Node
|
||||||
|
{% else %}
|
||||||
|
{% endif %}
|
||||||
|
}
|
||||||
|
cdn.projectsegfau.lt cdn.{{inventory_hostname}}.projectsegfau.lt {
|
||||||
|
encode zstd gzip
|
||||||
|
root * /var/cdn
|
||||||
|
file_server {
|
||||||
|
browse
|
||||||
|
}
|
||||||
|
}
|
||||||
|
{% if inventory_hostname == 'eu' %}
|
||||||
|
inv.bp.projectsegfau.lt {
|
||||||
|
reverse_proxy localhost:7573
|
||||||
|
header {
|
||||||
|
# disable FLoC tracking
|
||||||
|
Permissions-Policy interest-cohort=()
|
||||||
|
|
||||||
|
# enable HSTS
|
||||||
|
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
|
||||||
|
# disable clients from sniffing the media type
|
||||||
|
X-Content-Type-Options nosniff
|
||||||
|
|
||||||
|
# keep referrer data off of HTTP connections
|
||||||
|
Referrer-Policy no-referrer-when-downgrade
|
||||||
|
|
||||||
|
X-XSS-Protection "1; mode=block"
|
||||||
|
defer
|
||||||
|
}
|
||||||
|
import torloc invbp
|
||||||
|
import i2ploc pjsfi2szfkb4guqzmfmlyq4no46fayertjrwt4h2uughccrh2lvq.b32.i2p
|
||||||
|
}
|
||||||
|
proxy.lbry.projectsegfau.lt {
|
||||||
|
reverse_proxy localhost:3001
|
||||||
|
import def
|
||||||
|
}
|
||||||
|
{% else %}
|
||||||
|
inv.{{inventory_hostname}}.projectsegfau.lt {
|
||||||
|
reverse_proxy localhost:7573
|
||||||
|
header {
|
||||||
|
# disable FLoC tracking
|
||||||
|
Permissions-Policy interest-cohort=()
|
||||||
|
|
||||||
|
# enable HSTS
|
||||||
|
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
|
||||||
|
# disable clients from sniffing the media type
|
||||||
|
X-Content-Type-Options nosniff
|
||||||
|
|
||||||
|
# keep referrer data off of HTTP connections
|
||||||
|
Referrer-Policy no-referrer-when-downgrade
|
||||||
|
|
||||||
|
X-XSS-Protection "1; mode=block"
|
||||||
|
defer
|
||||||
|
}
|
||||||
|
{% if inventory_hostname == 'in' %}
|
||||||
|
import acmedns
|
||||||
|
{% endif %}
|
||||||
|
}
|
||||||
|
piped.{{inventory_hostname}}.projectsegfau.lt pipedproxy.{{inventory_hostname}}.projectsegfau.lt pipedapi.{{inventory_hostname}}.projectsegfau.lt {
|
||||||
|
reverse_proxy :6970
|
||||||
|
header {
|
||||||
|
# disable FLoC tracking
|
||||||
|
Permissions-Policy interest-cohort=()
|
||||||
|
|
||||||
|
# enable HSTS
|
||||||
|
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
|
||||||
|
# disable clients from sniffing the media type
|
||||||
|
X-Content-Type-Options nosniff
|
||||||
|
|
||||||
|
# keep referrer data off of HTTP connections
|
||||||
|
Referrer-Policy no-referrer-when-downgrade
|
||||||
|
|
||||||
|
X-XSS-Protection "1; mode=block"
|
||||||
|
defer
|
||||||
|
}
|
||||||
|
{% if inventory_hostname == 'in' %}
|
||||||
|
import acmedns
|
||||||
|
{% endif %}
|
||||||
|
}
|
||||||
|
{% endif %}
|
||||||
|
lbry.{{inventory_hostname}}.projectsegfau.lt lbry.projectsegfau.lt {
|
||||||
|
reverse_proxy :7269
|
||||||
|
import def
|
||||||
|
import torloc lbry
|
||||||
|
import i2ploc pjsf7uucpqf2crcmfo3nvwdmjhirxxjfyuvibdfp5x3af2ghqnaa.b32.i2p
|
||||||
|
}
|
||||||
|
gothub.{{inventory_hostname}}.projectsegfau.lt gothub.projectsegfau.lt {
|
||||||
|
reverse_proxy :1024
|
||||||
|
import def
|
||||||
|
import torloc gothub
|
||||||
|
}
|
||||||
|
overflow.{{inventory_hostname}}.projectsegfau.lt overflow.projectsegfau.lt {
|
||||||
|
reverse_proxy :8694
|
||||||
|
import def
|
||||||
|
import torloc overflow
|
||||||
|
}
|
||||||
|
teddit.{{inventory_hostname}}.projectsegfau.lt teddit.projectsegfau.lt {
|
||||||
|
reverse_proxy :9061
|
||||||
|
import def
|
||||||
|
import torloc teddit
|
||||||
|
}
|
||||||
|
rimgo.{{inventory_hostname}}.projectsegfau.lt rimgo.projectsegfau.lt {
|
||||||
|
reverse_proxy :9016
|
||||||
|
import def
|
||||||
|
import torloc rimgo
|
||||||
|
}
|
||||||
|
|
||||||
|
libreddit.{{inventory_hostname}}.projectsegfau.lt libreddit.projectsegfau.lt {
|
||||||
|
reverse_proxy :6464
|
||||||
|
import def
|
||||||
|
import torloc libreddit
|
||||||
|
import i2ploc pjsfkref7g66mji45kyccqnn5hmjtjp3cfodozabpyplj2rmv5sa.b32.i2p
|
||||||
|
}
|
||||||
|
|
||||||
|
nitter.{{inventory_hostname}}.projectsegfau.lt nitter.projectsegfau.lt {
|
||||||
|
import def
|
||||||
|
header {
|
||||||
|
X-Permitted-Cross-Domain-Policies none
|
||||||
|
Permissions-Policy "Permissions-Policy: accelerometer=(), ambient-light-sensor=(), autoplay=(self), battery=(), camera=(), cross-origin-isolated=(), display-capture=(), document-domain=(), encrypted-media=(), execution-while-not-rendered=(), execution-while-out-of-viewport=(), fullscreen=(self), geolocation=(), gyroscope=(), keyboard-map=(), magnetometer=(), microphone=(), midi=(), navigation-override=(), payment=(), picture-in-picture=(self), publickey-credentials-get=(), screen-wake-lock=(), sync-xhr=(), usb=(), web-share=(), xr-spatial-tracking=()"
|
||||||
|
header Content-Security-Policy "default-src 'none'; script-src 'self' 'unsafe-inline'; script-src-attr 'none'; img-src 'self'; style-src 'self' 'unsafe-inline'; style-src-elem 'self'; font-src 'self'; object-src 'none'; media-src 'self' blob:; worker-src 'self' blob:; base-uri 'self'; form-action 'self'; frame-ancestors 'self'; connect-src 'self' https://*.twimg.com; manifest-src 'self'"
|
||||||
|
}
|
||||||
|
reverse_proxy :8387 {
|
||||||
|
transport http {
|
||||||
|
compression off
|
||||||
|
}
|
||||||
|
}
|
||||||
|
import torloc nitter
|
||||||
|
import i2ploc pjsfs4ukb6prmfx3qx3a5ef2cpcupkvcrxdh72kqn2rxc2cw4nka.b32.i2p
|
||||||
|
}
|
||||||
|
bb.{{inventory_hostname}}.projectsegfau.lt bb.projectsegfau.lt {
|
||||||
|
import def
|
||||||
|
import torloc beatbump
|
||||||
|
import i2ploc pjsflmvtqax7ii44qy4ladap65c3kqspbs7h7krqy7x43uovklla.b32.i2p
|
||||||
|
reverse_proxy :3069
|
||||||
|
}
|
||||||
|
|
||||||
|
bw.{{inventory_hostname}}.projectsegfau.lt bw.projectsegfau.lt {
|
||||||
|
import def
|
||||||
|
import torloc breezewiki
|
||||||
|
import i2ploc pjsfk4xvekoc7wx4pteevp3q2wy7jmzlem7rvl74nx33zkdr4vyq.b32.i2p
|
||||||
|
reverse_proxy :10416
|
||||||
|
}
|
||||||
|
scribe.{{inventory_hostname}}.projectsegfau.lt scribe.projectsegfau.lt {
|
||||||
|
import def
|
||||||
|
import torloc scribe
|
||||||
|
import i2ploc pjsflkkkcn33ahmzmpyq6idy2knkzh4atp7zaetqfsnenpyori6a.b32.i2p
|
||||||
|
reverse_proxy :8006
|
||||||
|
}
|
||||||
|
{% if inventory_hostname == 'eu' %}
|
||||||
|
{% else %}
|
||||||
|
search.{{inventory_hostname}}.projectsegfau.lt {
|
||||||
|
import def
|
||||||
|
reverse_proxy :8081
|
||||||
|
@api {
|
||||||
|
path /config
|
||||||
|
path /healthz
|
||||||
|
path /stats/errors
|
||||||
|
path /stats/checker
|
||||||
|
}
|
||||||
|
@static {
|
||||||
|
path /static/*
|
||||||
|
}
|
||||||
|
@notstatic {
|
||||||
|
not path /static/*
|
||||||
|
}
|
||||||
|
@imageproxy {
|
||||||
|
path /image_proxy
|
||||||
|
}
|
||||||
|
@notimageproxy {
|
||||||
|
not path /image_proxy
|
||||||
|
}
|
||||||
|
header {
|
||||||
|
# Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS
|
||||||
|
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
|
||||||
|
# Enable cross-site filter (XSS) and tell browser to block detected attacks
|
||||||
|
X-XSS-Protection "1; mode=block"
|
||||||
|
# Prevent some browsers from MIME-sniffing a response away from the declared Content-Type
|
||||||
|
X-Content-Type-Options "nosniff"
|
||||||
|
# Disable some features
|
||||||
|
Permissions-Policy "accelerometer=(),ambient-light-sensor=(),autoplay=(),camera=(),encrypted-media=(),focus-without-user-activation=(),geolocation=(),gyroscope=(),magnetometer=(),microphone=(),midi=(),payment=(),picture-in-picture=(),speaker=(),sync-xhr=(),usb=(),vr=()"
|
||||||
|
# Disable some features (legacy)
|
||||||
|
Feature-Policy "accelerometer 'none';ambient-light-sensor 'none'; autoplay 'none';camera 'none';encrypted-media 'none';focus-without-user-activation 'none'; geolocation 'none';gyroscope 'none';magnetometer 'none';microphone 'none';midi 'none';payment 'none';picture-in-picture 'none'; speaker 'none';sync-xhr 'none';usb 'none';vr 'none'"
|
||||||
|
# Referer
|
||||||
|
Referrer-Policy "no-referrer"
|
||||||
|
# X-Robots-Tag
|
||||||
|
X-Robots-Tag "noindex, noarchive, nofollow"
|
||||||
|
# Remove Server header
|
||||||
|
-Server
|
||||||
|
}
|
||||||
|
header @api {
|
||||||
|
Access-Control-Allow-Methods "GET, OPTIONS"
|
||||||
|
Access-Control-Allow-Origin "*"
|
||||||
|
}
|
||||||
|
# Cache
|
||||||
|
header @static {
|
||||||
|
# Cache
|
||||||
|
Cache-Control "public, max-age=31536000"
|
||||||
|
defer
|
||||||
|
}
|
||||||
|
header @notstatic {
|
||||||
|
# No Cache
|
||||||
|
Cache-Control "no-cache, no-store"
|
||||||
|
Pragma "no-cache"
|
||||||
|
}
|
||||||
|
# CSP (see http://content-security-policy.com/ )
|
||||||
|
header @imageproxy {
|
||||||
|
Content-Security-Policy "default-src 'none'; img-src 'self' data:"
|
||||||
|
}
|
||||||
|
header @notimageproxy {
|
||||||
|
Content-Security-Policy "upgrade-insecure-requests; default-src 'none'; script-src 'self'; style-src 'self' 'unsafe-inline'; form-action 'self' https://github.com/searxng/searxng/issues/new; font-src 'self'; frame-ancestors 'self'; base-uri 'self'; connect-src 'self' https://overpass-api.de; img-src 'self' data: https://*.tile.openstreetmap.org; frame-src https://www.youtube-nocookie.com https://player.vimeo.com https://www.dailymotion.com https://www.deezer.com https://www.mixcloud.com https://w.soundcloud.com https://embed.spotify.com"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
{% endif %}
|
||||||
|
include ./extras.caddy
|
5
requirements.yml
Normal file
5
requirements.yml
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- src: git+https://github.com/caddy-ansible/caddy-ansible.git
|
||||||
|
version: v3.2.0
|
||||||
|
|
22
secrets.enc
Normal file
22
secrets.enc
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
$ANSIBLE_VAULT;1.1;AES256
|
||||||
|
32316630323862343738306231666531626333396630366537373664396636313737356665306530
|
||||||
|
3736386466623363383038393933343964316230636237380a343933626632663633376532663332
|
||||||
|
31353534613239613632653362616465393264336134656365353238336537626239393333646235
|
||||||
|
3139656638336630610a383666383336643331323930626131383865336263643632353335613432
|
||||||
|
38343533396530303734663135326462656230333062653566663666346663313637313166663261
|
||||||
|
65636635396465666630633335613465333763363530313930643533303763366163393364613232
|
||||||
|
63353861386530363665633266653330363433653731663936613139356663623933373731336665
|
||||||
|
34346336643965373566663362643766623364633233333531313165316665363132666466666333
|
||||||
|
36666331323966353632326433326232643533636564383734626462336564663663656234643863
|
||||||
|
33386138393934623735653437613135383936373231363966656535386530343566643265373463
|
||||||
|
36333139333535383135333133646630343431323835346662313062373337393161323330353131
|
||||||
|
64313230646230653664633034373462653764373033323333386638303737383461646630643835
|
||||||
|
32303863306663326364633530613934663635316261316431633932633465646538353834663663
|
||||||
|
36313830393264313232616638303839653637366366313132656438623432643666303362343564
|
||||||
|
38343439373736376362663939353130643464623733633334386632333239663935346363633238
|
||||||
|
31633366363634613365643333616439303435616338303836323932346465343035653535663437
|
||||||
|
61616430336265323336353866306366346639366366313365353039336333613162303864646462
|
||||||
|
36323661303164363462626664366162623631643963313232623661343766343165656335663162
|
||||||
|
64393162643861373734316535376534373665393561303265643939323632646162663661333561
|
||||||
|
35306639643764623862663930663339653064626331393863386538353763383838643332356339
|
||||||
|
30336238366634313762393334653466396139383735623132366132616264386465
|
Loading…
Reference in New Issue
Block a user