ttrss_url_path: http://{{inventory_hostname}}/tt-rss/ system_upgrade: true gitea_http_domain: "{{inventory_hostname}}" gitea_root_url: http://{{inventory_hostname}}:3000 certbot_create_if_missing: false nextcloud_trusted_domains: - localhost - "{{inventory_hostname}}" nextcloud_config_options: # additional options to set in config.php - option: overwrite.cli.url value: "'http://{{inventory_hostname}}'" - option: maintenance value: "false" - option: loglevel value: "'2'" - option: installed value: "true" - option: config_is_read_only value: "false" nginx_error_log: "/var/log/nginx/error.log debug" nginx_vhosts: - listen: "80" server_name: "_" filename: "default.conf" state: "present" template: "{{ nginx_vhost_template }}" extra_parameters: | add_header X-Content-Type-Options nosniff; add_header X-XSS-Protection "1; mode=block"; add_header X-Robots-Tag none; add_header X-Download-Options noopen; add_header X-Permitted-Cross-Domain-Policies none; add_header Referrer-Policy no-referrer; fastcgi_hide_header X-Powered-By; root /usr/share/nginx/html; location = /robots.txt { allow all; log_not_found off; access_log off; } location =/ { rewrite ^ /welcome; } location / { rewrite ^/.well-known/carddav /radicale/$remote_user/carddav/ redirect; rewrite ^/.well-known/caldav /radicale/$remote_user/caldav/ redirect; index index.php index.html index.htm ; default_type text/html; } location /radicale/ { # The trailing / is important! proxy_pass http://localhost:5232/; # The / is important! proxy_set_header X-Script-Name /radicale; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_pass_header Authorization; } location ~ \.php$ { # try_files $uri =404; fastcgi_split_path_info ^(.+\.php)(/.+)$; fastcgi_pass unix:/run/php-fpm/php-fpm.sock; fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; fastcgi_read_timeout 800; fastcgi_index index.php; include fastcgi_params; } location = /.well-known/carddav { return 301 $scheme://$host:$server_port/nextcloud/remote.php/dav; } location = /.well-known/caldav { return 301 $scheme://$host:$server_port/nextcloud/remote.php/dav; } location /.well-known/acme-challenge { } location ^~ /nextcloud { root /usr/share/webapps/; # set max upload size client_max_body_size 512M; fastcgi_buffers 64 4K; # Enable gzip but do not remove ETag headers gzip on; gzip_vary on; gzip_comp_level 4; gzip_min_length 256; gzip_proxied expired no-cache no-store private no_last_modified no_etag auth; gzip_types application/atom+xml application/javascript application/json application/ld+json application/manifest+json application/rss+xml application/vnd.geo+json application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/bmp image/svg+xml image/x-icon text/cache-manifest text/css text/plain text/vcard text/vnd.rim.location.xloc text/vtt text/x-component text/x-cross-domain-policy; location /nextcloud { rewrite ^ /nextcloud/index.php; } location ~ ^\/nextcloud\/(?:build|tests|config|lib|3rdparty|templates|data)\/ { deny all; } location ~ ^\/nextcloud\/(?:\.|autotest|occ|issue|indie|db_|console) { deny all; } location ~ ^\/nextcloud\/(?:index|remote|public|cron|core\/ajax\/update|status|ocs\/v[12]|updater\/.+|oc[ms]-provider\/.+)\.php(?:$|\/) { fastcgi_split_path_info ^(.+?\.php)(\/.*|)$; set $path_info $fastcgi_path_info; try_files $fastcgi_script_name =404; include fastcgi_params; fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; fastcgi_param PATH_INFO $path_info; #fastcgi_param HTTPS on; # Avoid sending the security headers twice fastcgi_param modHeadersAvailable true; # Enable pretty urls fastcgi_param front_controller_active true; fastcgi_pass php-handler; fastcgi_intercept_errors on; fastcgi_request_buffering off; } location ~ ^\/nextcloud\/(?:updater|oc[ms]-provider)(?:$|\/) { try_files $uri/ =404; index index.php; } location ~ ^\/nextcloud\/.+[^\/]\.(?:css|js|woff2?|svg|gif|map)$ { try_files $uri /nextcloud/index.php$request_uri; add_header Cache-Control "public, max-age=15778463"; add_header X-Content-Type-Options nosniff; add_header X-XSS-Protection "1; mode=block"; add_header X-Robots-Tag none; add_header X-Download-Options noopen; add_header X-Permitted-Cross-Domain-Policies none; add_header Referrer-Policy no-referrer; access_log off; } location ~ ^\/nextcloud\/.+[^\/]\.(?:png|html|ttf|ico|jpg|jpeg|bcmap)$ { try_files $uri /nextcloud/index.php$request_uri; # Optional: Don't log access to other assets access_log off; } } - listen: 80 server_name: "arch.{{domain.name}}" filename: "archMirror.conf" template: "{{ nginx_vhost_template }}" root: "{{arch_mirror_location}}" access_log: /var/log/nginx/archmirror.access.log error_log: /var/log/nginx/archmirror.error.log extra_parameters: | autoindex on; # Requests for package db, signature files and files db should redirect upstream without caching location ~ \.(db|sig|files)$ { proxy_pass http://archMirrorUp$request_uri; } # Requests for actual packages should be served directly from cache if available. # If not available, retrieve and save the package from an upstream mirror. location ~ \.tar\.(xz|zst)$ { try_files $uri @pkg_mirror; } # Retrieve package from upstream mirrors and cache for future requests location @pkg_mirror { proxy_store on; proxy_redirect off; proxy_store_access user:rw group:rw all:r; proxy_next_upstream error timeout http_404; proxy_pass http://archMirrorUp$request_uri; } - listen: "127.0.0.1:7001" server_name: "_" filename: "archMirrorUpstream1.conf" template: "{{ nginx_vhost_template }}" extra_parameters: | location / { proxy_pass http://archlinux.mailtunnel.eu$request_uri; } - listen: "127.0.0.1:7002" server_name: "_" filename: "archMirrorUpstream2.conf" template: "{{ nginx_vhost_template }}" extra_parameters: | location / { proxy_pass http://mirror.cyberbits.eu/archlinux$request_uri; } - listen: "127.0.0.1:7003" server_name: "_" filename: "archMirrorUpstream3.conf" template: "{{ nginx_vhost_template }}" extra_parameters: | location / { proxy_pass http://mirrors.niyawe.de/archlinux$request_uri; }