blob: ed3bd9ddeebd0a3c103ef47b426ea5c20668c406 (
plain) (
tree)
|
|
server {
# Listen to port 443 on both IPv4 and IPv6.
listen 443 ssl;
listen [::]:443 ssl;
# Domain names this server should respond to.
server_name memzero.de www.memzero.de;
# Load the certificate files.
include /etc/nginx/inc/ssl.conf;
root /www/memzero;
}
server {
# Listen to port 443 on both IPv4 and IPv6.
listen 443 ssl;
listen [::]:443 ssl;
# Domain names this server should respond to.
server_name blog.memzero.de;
# Load the certificate files.
include /etc/nginx/inc/ssl.conf;
root /www/blog;
}
server {
# Listen to port 443 on both IPv4 and IPv6.
listen 443 ssl;
listen [::]:443 ssl;
# Domain names this server should respond to.
server_name dav.memzero.de;
# Load the certificate files.
include /etc/nginx/inc/ssl.conf;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://baikal;
}
}
server {
# Listen to port 443 on both IPv4 and IPv6.
listen 443 ssl;
listen [::]:443 ssl;
# Domain names this server should respond to.
server_name git.memzero.de;
# Load the certificate files.
include /etc/nginx/inc/ssl.conf;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://cgito;
}
}
server {
# Listen to port 443 on both IPv4 and IPv6.
listen 443 ssl;
listen [::]:443 ssl;
# Domain names this server should respond to.
server_name notes.memzero.de;
# Load the certificate files.
include /etc/nginx/inc/ssl.conf;
location / {
proxy_set_header Host johannst.github.io;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass https://johannst.github.io/notes/;
}
}
server {
# Drop any request that does not match any of the other server names.
listen 443 ssl default_server;
ssl_reject_handshake on;
}
|