Plateau de charcuterie
+Plateau de canapés prestige
+Brochette Yakitori
+Assortiment de Mini Quiche
+Assainissement de mini lunch
+Verrine Cocktail
+Assortiment de mignardise
+Vins (1bte/4pax)
+diff --git a/piwigo/README.md b/piwigo/README.md new file mode 100644 index 0000000..e69de29 diff --git a/piwigo/history.txt b/piwigo/history.txt new file mode 100644 index 0000000..60f9769 --- /dev/null +++ b/piwigo/history.txt @@ -0,0 +1,43 @@ + 1 20:41 pwd + 2 20:41 ls + 3 20:41 pkg update + 4 20:42 pkg install nginx nano python + 5 20:43 sysrc ngnix_enable=yes + 6 20:43 pkg install py38-certbot + 7 20:44 pkg install py38-certbot openssl + 8 20:44 pkg install py39-certbot openssl + 9 20:45 ifconfig + 10 20:46 service nginx onestart + 11 20:50 service nginx onestop + 12 20:52 certbot certonly --standalone -d '*.lefloch.eu' + 13 20:55 apt install python3-pip + 14 20:56 pkg install python3-pip + 15 20:56 pip + 16 21:43 python -m pip -V + 17 21:43 python -m ensurepip + 18 21:43 python -m pip -V + 19 21:44 cerbot + 20 21:44 pkg install py39-certbot-dns-ovh + 21 21:44 certbot certonly --standalone -d '*.lefloch.eu' + 22 21:49 nano /root/.ovhapi + 23 21:50 chmod + 24 21:50 chmod +600 /root/.ovhapi + 25 21:51 chmod 600 /root/.ovhapi + 26 21:51 certbot certonly --dns-ovh --dns-ovh-credentials ~/.ovhapi -d lefloch.eu -d *.lefloch.eu + 27 21:52 certbot + 28 21:52 certbot certonly --dns-ovh --dns-ovh-credentials ~/.ovhapi -d lefloch.eu -d *.lefloch.eu + 29 21:52 certbot certonly --standalone -d '*.lefloch.eu' + 30 21:52 certbot certonly --dns-ovh --dns-ovh-credentials ~/.ovhapi -d lefloch.eu -d *.lefloch.eu + 31 21:53 certbot certonly --dns-ovh --dns-ovh-credentials ~/.ovhapi -d *.lefloch.eu + 32 21:54 certbot certonly --dns-ovh --dns-ovh-credentials ~/.ovhapi -d *.lefloch.eu + 33 21:54 service nginx onestart + 34 21:54 certbot certonly --dns-ovh --dns-ovh-credentials ~/.ovhapi -d lefloch.eu -d *.lefloch.eu + 35 21:55 certbot certonly --standalone -d 'toto.lefloch.eu' + 36 21:55 certbot certonly --standalone -d 'lefloch.eu' + 37 21:58 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 38 22:03 cat /root/.ovhapi + 39 22:17 cat /root/.ovhapi + 40 9:09 pkg remove nginx + 41 9:10 pkg remove python + 42 9:10 pkg remove nano certbot + 43 22:26 history diff --git a/restic/.restic_pass b/restic/.restic_pass new file mode 100644 index 0000000..8653b52 --- /dev/null +++ b/restic/.restic_pass @@ -0,0 +1 @@ +MOT DE PASSE SUPER SECRET à mettre dans /root/.restic_pass \ No newline at end of file diff --git a/restic/README.md b/restic/README.md new file mode 100644 index 0000000..e59e0bf --- /dev/null +++ b/restic/README.md @@ -0,0 +1,27 @@ +# Backup Restic + + +## IP + +peu importe + +## Config + +Le process est complexe : + +1. Créer la VM et monter le dossier /mnt/Poule/Nicephore/Photos vers /mnt/Poule/iocage/jails/Restic/root/mnt +2. VPN sur la box de maman avec WireGuard +3. ssh sur la raspi 192.168.1.168 sans mot de passe (il faut ajouter sa clé) +4. backup sur le repo restic /media/anto/Maxtor/restic-backup + + +Le plus complexe est le vpn. Il faut "allown_tun" dans les paramètres de la jail TrueNAS (custom properties) + +## cron + +``` +vim /root/backup_restic.sh +crontab-e +``` + + diff --git a/restic/backup_restic.sh b/restic/backup_restic.sh new file mode 100644 index 0000000..74ccf9e --- /dev/null +++ b/restic/backup_restic.sh @@ -0,0 +1,46 @@ +#!/bin/sh + +PATH=/usr/local/bin:/usr/bin:/bin + +# --- CONFIGURATION --- +REPO="sftp:anto@192.168.1.168:/media/anto/Maxtor/restic-backup" +BACKUP_PATH="/mnt" +PASSWORD_FILE="/root/.restic_pass" +DISCORD_WEBHOOK="https://discord.com/api/webhooks/1483223739494830233/3b9BOJh27jAGB9tKhslInnSpBngIg_4cedC1s5s5D1bvL-u_Rw3EMm3U6CEkkFY2fNo5" + +export RESTIC_PASSWORD_FILE=$PASSWORD_FILE + +# --- Fonction notification Discord --- +send_discord() { + MESSAGE=$(printf "%s" "$1" | tr '\n' ' ' | sed 's/"/\\"/g' | cut -c1-1800) + + /usr/local/bin/curl -s -o /tmp/discord_status.txt -w "%{http_code}" \ + -H "Content-Type: application/json" \ + -d "{\"content\":\"$MESSAGE\"}" \ + "$DISCORD_WEBHOOK" +} + + +HOST=$(hostname) +DATE=$(date) + +send_discord "**Backup restic démarrée** sur **$HOST** à $DATE" +echo "Discord HTTP status: $(cat /tmp/discord_status.txt)" +LOG=$(mktemp) + +# --- BACKUP --- +restic -r $REPO backup $BACKUP_PATH 2>&1 | tee $LOG +STATUS=$? + +# --- RETENTION --- +restic -r $REPO forget --keep-daily 7 --keep-weekly 4 --keep-monthly 12 >> $LOG 2>&1 +restic -r $REPO prune >> $LOG 2>&1 + +# --- STATS --- +SUMMARY=$(grep -E "Files:|Added to the repository|processed|snapshot" $LOG) +SUMMARY=$(echo "$SUMMARY" | tr '\n' ' ' | cut -c1-1500) + +send_discord "✅ **Backup réussie sur $HOST** + +📦 Résumé: +$SUMMARY" diff --git a/restic/crontab -e b/restic/crontab -e new file mode 100644 index 0000000..e69053f --- /dev/null +++ b/restic/crontab -e @@ -0,0 +1 @@ +0 0 * * * /root/backup_restic.sh diff --git a/restic/freeboxMaman.conf b/restic/freeboxMaman.conf new file mode 100644 index 0000000..1f7e32e --- /dev/null +++ b/restic/freeboxMaman.conf @@ -0,0 +1,10 @@ +[Interface] +Address = 192.168.27.65/32 +DNS = 212.27.38.253 +MTU = 1360 +PrivateKey = iMQ827w+LG6ueBcxT4MT+lNLSsmrL9kz5Ttx7Z0vlFI= + +[Peer] +AllowedIPs = 0.0.0.0/0, 192.168.27.64/27, 192.168.1.0/24 +Endpoint = 78.198.144.160:46755 +PublicKey = Elsw3uieQgd9ayb/dDSW/t+H/DLcv5Cwrl8aOS/0xyw= diff --git a/restic/history.txt b/restic/history.txt new file mode 100644 index 0000000..31e99d2 --- /dev/null +++ b/restic/history.txt @@ -0,0 +1,222 @@ + 1 23:32 ls + 2 23:32 ping + 3 23:32 ip a + 4 23:32 cd /mnt/ + 5 23:32 ls + 6 23:34 ping 192.168.0.112 + 7 23:34 ssh anto@192.168.0.112 + 8 23:35 ssh-keygen + 9 23:35 cat .ssh/id_rsa.pub + 10 23:35 ssh anto@192.168.0.112 + 11 23:39 ssh anto@192.168.0.112 + 12 23:39 ssh anto@192.168.0.112 + 13 23:40 cat .ssh/id_rsa.pub + 14 23:41 ls + 15 23:41 cd + 16 23:42 cat .ssh/id_rsa.pub + 17 23:42 ssh anto@192.168.0.112 + 18 23:43 ssh anto@192.168.0.112 + 19 23:43 ssh anto@192.168.0.112 + 20 23:44 ssh anto@192.168.0.112 + 21 23:45 ssh anto@192.168.0.112 + 22 23:45 pkg install restic + 23 23:46 restic + 24 23:47 restic -r sftp:anto@192.168.0.112:/srv/restic-repo init + 25 23:47 ssh anto@192.168.0.112 + 26 23:48 restic -r sftp:anto@192.168.0.112:/srv/restic-repo init + 27 23:48 ssh anto@192.168.0.112 + 28 23:48 restic -r sftp:anto@192.168.0.112:/home/anto/restic-repo init + 29 23:49 cd /mnt/ + 30 23:49 ms + 31 23:49 ls + 32 23:50 restic -r sftp:anto@192.168.0.112:/home/anto/restic-repo --verbose backup /mnt/1997/ + 33 23:51 restic -r sftp:anto@192.168.0.112:/home/anto/restic-repo --verbose backup /mnt/1997/ + 34 23:52 restic -r sftp:anto@192.168.0.112:/home/anto/restic-repo --verbose backup /mnt/1997/ --skip-if-unchanged + 35 18:34 vim /usr/local/bin/restic-backup-photos.sh + 36 18:34 vim + 37 18:34 pkg install vim + 38 18:34 vim /usr/local/bin/restic-backup-photos.sh + 39 18:35 vim /usr/local/bin/restic-backup-photos.sh + 40 18:36 vim /usr/local/bin/restic-backup-photos.sh + 41 18:37 chmod 700 /usr/local/bin/restic-backup-photos.sh + 42 18:37 . /usr/local/bin/restic-backup-photos.sh + 43 18:37 ./usr/local/bin/restic-backup-photos.sh + 44 18:37 /usr/local/bin/restic-backup-photos.sh + 45 19:14 l + 46 19:14 cd /mnt/ + 47 19:14 ls + 48 19:15 ls + 49 19:15 ls + 50 19:15 restic + 51 19:20 sudo apt update + 52 19:20 apt update + 53 19:21 pkg install wireguard-tools + 54 19:22 kldload if_wg + 55 19:22 if_wg_load="YES" + 56 19:23 vim /usr/local/etc/wireguard/freeboxMaman.conf + 57 19:28 vim /usr/local/etc/wireguard/freeboxMaman.conf + 58 19:30 wg-quick up freeboxMaman + 59 19:30 sudo wg-quick up freeboxMaman + 60 19:31 pkg install sudo + 61 19:31 sudo wg-quick up freeboxMaman + 62 19:32 sudo wg-quick up freeboxMaman + 63 19:32 ls + 64 19:33 vim /usr/local/etc/wireguard/freeboxMaman.conf + 65 19:33 sudo wg-quick up freeboxMaman + 66 19:34 kldload if_wg + 67 19:34 kldload if_wg + 68 19:34 kldload if_wg + 69 19:34 kldload if_wg + 70 19:34 sudo kldload if_wg + 71 19:34 pkg install wireguard-go + 72 19:35 wg-quick up freeboxMaman + 73 19:35 kldload if_tun + 74 19:36 pkg install wireguard + 75 19:36 pkg_add wireguard-tools + 76 19:36 pkg install wireguard-tools + 77 19:37 wg-quick up freeboxMaman + 78 19:38 kldload if_tun + 79 19:38 ls /dev/tun* + 80 19:38 ll /dev/tun* + 81 19:38 ls + 82 19:46 kldload if_tun + 83 19:46 wg-quick up freeboxMaman + 84 19:46 ip a + 85 19:46 ifconfig + 86 19:48 ls + 87 19:48 cd /mnt/ + 88 19:48 ls + 89 19:48 cd 1997/ + 90 19:48 ls + 91 19:49 ssh anto@192.168.1.168 + 92 19:58 ssh-keygen -t ed25519 -C "restic VM" + 93 19:58 cd /root/.ssh + 94 19:58 cat id_rsa.pub + 95 19:58 cat id_ed25519 + 96 19:59 rm id_ed25519* + 97 19:59 ls + 98 20:01 ssh anto@192.168.1.168 + 99 20:02 ssh anto@192.168.1.168 + 100 20:02 ssh anto@192.168.1.168 + 101 20:02 ssh anto@192.168.1.168 + 102 20:02 ping 192.168.1.168 + 103 20:02 ssh anto@192.168.1.168 + 104 20:04 ssh -o "IdentitiesOnly=yes" -i /root/.ssh/id_rsa.pub anto@192.168.1.168 + 105 20:05 cat /root/.ssh/id_rsa.pub + 106 20:06 ssh anto@192.168.1.168 + 107 20:06 ssh -o "IdentitiesOnly=yes" -i /root/.ssh/id_rsa.pub anto@192.168.1.168 + 108 8:08 ls + 109 8:08 ip a + 110 8:08 ifconfig + 111 8:08 ping 192.168.27.169 + 112 8:08 ssh anto@192.168.1.168 + 113 8:08 ping 192.168.1.168 + 114 8:31 ping 192.168.1.168 + 115 8:31 ip a + 116 8:31 ifconfig + 117 8:32 ping 192.168.27.168 + 118 8:32 ping 192.168.1.168 + 119 8:34 ssh anto@192.168.1.168 + 120 8:34 ls + 121 8:34 cd + 122 8:34 cat .ssh/id_rsa.pub + 123 8:34 ssh-keygen -t ed25519 -C "restic VM" + 124 8:34 cat .ssh/id_ed25519.pub + 125 8:35 ssh anto@192.168.1.168 + 126 8:36 ssh anto@192.168.1.168 + 127 19:36 ls + 128 19:36 ifconfig* + 129 19:36 ifconfig + 130 19:38 which wg-quick + 131 19:38 vim /etc/rc + 132 19:40 ifconfig + 133 19:41 ssh anto@192.168.1.168 + 134 20:11 ls + 135 20:11 cd /mnt/ + 136 20:11 ls + 137 20:11 ssh anto@192.168.1.168 + 138 20:24 ssh anto@192.168.1.168 + 139 20:31 ssh anto@192.168.1.168 + 140 20:33 restic -r sftp:anto@192.168.1.168:/home/anto/restic-backup init + 141 20:35 restic -r sftp:anto@192.168.1.168:/home/anto/restic-backup backup /mnt + 142 21:47 ssh anto@192.168.1.168 + 143 21:48 restic -r sftp:anto@192.168.1.168:/home/anto/restic-backup backup /mnt + 144 21:50 ssh anto@192.168.1.168 + 145 21:56 restic -r sftp:anto@192.168.1.168:/media/anto/Maxtor/restic-backup init + 146 21:56 restic -r sftp:anto@192.168.1.168:/media/anto/Maxtor/restic-backup backup /mnt + 147 9:30 restic -r sftp:anto@192.168.1.168:/media/anto/Maxtor/restic-backup backup /mnt + 148 9:30 ls + 149 9:30 ping192.168.1.168 + 150 9:30 ping 192.168.1.168 + 151 9:30 ping192.168.1.168 + 152 9:31 ls /mnt/ + 153 9:31 ls + 154 9:31 ssh anto@192.168.1.168 + 155 9:33 ssh anto@192.168.1.168 + 156 9:34 history + 157 9:34 ssh anto@192.168.1.168 + 158 20:01 ls + 159 20:01 history + 160 20:02 ssh anto@192.168.1.168 + 161 20:05 ssh anto@192.168.1.168 + 162 20:09 ssh anto@192.168.1.168 + 163 20:20 ls /mnt/ + 164 20:20 restic -r sftp:anto@192.168.1.168:/media/anto/Maxtor/restic-backup backup /mnt + 165 20:21 restic -r sftp:anto@192.168.1.168:/media/anto/Maxtor/restic-backup backup /mnt + 166 22:58 vim backup_restic.sh + 167 23:02 ls + 168 23:03 chmod +x backup_restic.sh + 169 23:03 pwd + 170 23:03 cp backup_restic.sh /root/ + 171 23:03 cd /root/ + 172 23:03 ls + 173 23:04 vim /root/.restic_pass + 174 23:04 chmod 600 /root/.restic_pass + 175 23:05 ll + 176 23:05 export RESTIC_PASSWORD_FILE=/root/.restic_pass + 177 23:05 vim backup_restic.sh + 178 23:06 ./backup_restic.sh + 179 23:06 pkg update + 180 23:07 pkg install curl + 181 23:07 vim backup_restic.sh + 182 23:08 which restic + 183 23:08 curl -H "Content-Type: application/json" -d '{"content":"test backup"}' https://discord.com/api/webhooks/1483223739494830233/3b9BOJh27jAGB9tKhslInnSpBngIg_4cedC1s5s5D1bvL-u_Rw3EMm3U6CEkkFY2fNo5 + 184 23:09 vim backup_restic.sh + 185 23:09 ./backup_restic.sh + 186 23:11 cd root/ + 187 23:11 ls + 188 23:11 export RESTIC_PASSWORD_FILE=/root/.restic_pass + 189 23:11 crontab -e + 190 23:12 crontab -e + 191 23:13 crontab -e + 192 7:30 REPO="sftp:anto@192.168.1.168:/media/anto/Maxtor/restic-backup" + 193 7:30 REPO="sftp:anto@192.168.1.168:/media/anto/Maxtor/restic-backup" + 194 7:31 echo $REPO + 195 7:31 echo $SHELL + 196 7:31 ps -p $$ + 197 7:31 vim backup_restic.sh + 198 7:32 cat backup_restic.sh + 199 7:33 zsh + 200 7:34 sh + 201 7:34 ./backup_restic.sh + 202 7:35 vim backup_restic.sh + 203 7:36 echo + 204 7:36 echo $PASSWORD_FILE + 205 7:37 sh + 206 9:25 ls + 207 9:25 cd root/ + 208 9:25 ls + 209 9:25 cat backup_restic.sh + 210 9:26 ./backup_restic.sh + 211 9:27 vim backup_restic.sh + 212 9:28 vim backup_restic.sh + 213 9:30 ./backup_restic.sh + 214 9:31 cat backup_restic.sh + 215 9:32 vim backup_restic.sh + 216 9:32 ./backup_restic.sh + 217 9:36 vim backup_restic.sh + 218 9:38 ./backup_restic.sh + 219 9:38 vim backup_restic.sh + 220 9:39 cat backup_restic.sh + 221 9:39 vim backup_restic.sh + 222 21:59 history diff --git a/reverseProxy NGINX/README.md b/reverseProxy NGINX/README.md new file mode 100644 index 0000000..682b5e6 --- /dev/null +++ b/reverseProxy NGINX/README.md @@ -0,0 +1,26 @@ +# Reverse proxy NGINX + +## IP + +192.168.0.14 + +Accepte 80 et 443 + +## Config + +Il tourne sur une VM dédiée. La conf est sur nginx.conf dans /usr/local/etc/nginx/service + +Un script principal appelle les autres et sinon va vers traefik. + + +Commande la plus importante : +``` +certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' +``` + + + + +## TO DO + +Un cron pour le certbot diff --git a/reverseProxy NGINX/history.txt b/reverseProxy NGINX/history.txt new file mode 100644 index 0000000..85746ba --- /dev/null +++ b/reverseProxy NGINX/history.txt @@ -0,0 +1,364 @@ + + 1 22:03 nano /root/.ovhapi + 2 22:03 pkg update + 3 22:04 pkg install python ngnix nano + 4 22:04 pkg install nginx nano python + 5 22:06 syssrc nginx_enable=yes + 6 22:06 sysrc nginx_enable=yes + 7 22:07 pkg install py39-cerbot py39-cerbot-dns-ovh openssl + 8 22:07 pkg install py39-certbot py39-certbot-dns-ovh openssl + 9 22:08 ifconfig + 10 22:10 service ngnix onestart + 11 22:10 service ngnix onestart + 12 22:10 service ngnix onerestart + 13 22:10 ngnix + 14 22:10 certbot + 15 22:11 pkg install nginx nano python + 16 22:11 pkg update + 17 22:12 pkg install py39-certbot py39-certbot-dns-ovh openssl + 18 22:13 ifconfig + 19 22:14 service ngnix onestart + 20 22:14 sysrc nginx_enable=yes + 21 22:16 service nginx start + 22 22:16 service nginx stop + 23 22:17 nano /root/.ovhapi + 24 22:17 chmod 600 /root/.ovhapi + 25 22:18 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 26 22:21 service nginx start + 27 22:21 service nginx stop + 28 22:22 cd /usr/local/etc/nginx/ + 29 22:22 nano nginx.conf + 30 22:26 nano nginx.conf + 31 22:30 service nginx start + 32 22:32 service nginx stop + 33 22:33 nano nginx.conf + 34 22:35 service nginx start + 35 22:35 nano nginx.conf + 36 22:35 service nginx start + 37 22:36 nano nginx.conf + 38 22:36 service nginx start + 39 22:36 nano nginx.conf + 40 22:37 service nginx start + 41 22:37 nano nginx.conf + 42 22:38 service nginx start + 43 22:38 nano nginx.conf + 44 22:39 service nginx start + 45 22:39 nano nginx.conf + 46 22:40 service nginx staop + 47 22:40 service nginx stop + 48 22:40 service nginx start + 49 9:19 nano /usr/local/etc/nginx/ + 50 9:20 cd /usr/local/etc/nginx/ + 51 9:20 ls + 52 9:20 nano nginx.conf + 53 9:24 service ngnix restart + 54 9:24 service ngnix onerestart + 55 9:24 service nginx stop + 56 9:24 service nginx start + 57 9:24 nano nginx.conf + 58 9:29 service nginx stop + 59 9:29 service nginx start + 60 9:31 nano nginx.conf + 61 19:00 cd /usr/local/etc/nginx/ + 62 19:00 ls + 63 19:00 nano nginx.conf + 64 19:02 service nginx start + 65 19:02 service nginx onestart + 66 19:03 nano nginx.conf + 67 19:06 service nginx start + 68 21:39 nano usr/local/www/nginx + 69 21:40 nano usr/local/etc/nginx/nginx.conf + 70 21:47 cd usr/local/etc/nginx/nginx.conf + 71 21:48 cd usr/local/etc/nginx/ + 72 21:48 cp nginx.conf nginx.conf.save + 73 21:48 service nginix status + 74 21:49 service nginx status + 75 21:49 service nginx start + 76 21:50 sudo service nginx start + 77 21:50 service nginx start + 78 21:50 service nginx start + 79 21:50 nano /usr/local/etc/nginx/nginx.conf + 80 21:52 service nginx start + 81 21:52 cd /usr/local/etc/nginx/ + 82 21:53 cp nginx.conf nginx.conf.save + 83 21:54 service nginx enable + 84 21:57 nano nginx.conf + 85 21:58 service nginx restart + 86 21:58 nano nginx.conf + 87 22:12 service nginx restart + 88 22:12 nano nginx.conf + 89 22:13 service nginx restart + 90 22:49 cd /usr/local/etc/nginx/ + 91 22:49 nano nginx.conf + 92 22:51 cp nginx.conf nginx.conf.save2 + 93 22:53 nano nginx.conf + 94 22:54 service nginx restart + 95 22:54 nano nginx.conf + 96 22:55 service nginx restart + 97 22:55 service nginx restart + 98 22:56 nano nginx.conf + 99 22:56 service nginx restart + 100 22:57 nano nginx.conf + 101 22:58 service nginx restart + 102 23:16 nano usr/local/etc/nginx/nginx.conf + 103 20:23 history + 104 20:23 nano /usr/local/etc/nginx/nginx.conf + 105 20:33 service nginx status + 106 20:33 service nginx restart + 107 20:52 nano /usr/local/etc/nginx/nginx.conf + 108 21:00 service nginx restart + 109 21:00 nano /usr/local/etc/nginx/nginx.conf + 110 21:01 service nginx restart + 111 22:51 history + 112 22:51 nano /usr/local/etc/nginx/nginx.conf + 113 22:53 service nginx restart + 114 22:53 nano /usr/local/etc/nginx/nginx.conf + 115 22:54 service nginx restart + 116 23:02 nano /usr/local/etc/nginx/nginx.conf + 117 23:03 service nginx restart + 118 23:03 nano /usr/local/etc/nginx/nginx.conf + 119 23:04 service nginx restart + 120 23:04 nano /usr/local/etc/nginx/nginx.conf + 121 23:12 nano /usr/local/etc/nginx/nginx.conf + 122 23:12 service nginx restart + 123 23:14 cd /usr/local/etc/nginx/nginx.conf + 124 23:14 cd /usr/local/etc/nginx/ + 125 23:14 cp nginx.conf nginx.conf.save3 + 126 23:14 nano nginx.conf + 127 23:15 service nginx restart + 128 10:32 nano /usr/local/etc/nginx/nginx.conf + 129 10:33 nano /usr/local/etc/nginx/nginx.conf + 130 10:33 service nginx restart + 131 10:34 nano /usr/local/etc/nginx/nginx.conf + 132 10:35 service nginx restart + 133 10:36 nano /usr/local/etc/nginx/nginx.conf + 134 10:38 service nginx restart + 135 10:38 nano /usr/local/etc/nginx/nginx.conf + 136 10:38 service nginx restart + 137 10:59 nano /usr/local/etc/nginx/nginx.conf + 138 11:00 service nginx restart + 139 11:00 nano /usr/local/etc/nginx/nginx.conf + 140 11:01 service nginx restart + 141 11:01 nano /usr/local/etc/nginx/nginx.conf + 142 11:01 service nginx restart + 143 21:48 nano /usr/local/etc/nginx/nginx.conf + 144 21:49 service nginx restart + 145 0:28 nano /usr/local/etc/nginx/nginx.conf + 146 0:29 nano /usr/local/etc/nginx/nginx.conf~ + 147 0:29 cd /usr/local/etc/nginx/ + 148 0:30 cp nginx.conf nginx.conf.save4 + 149 0:30 mkdir services + 150 0:30 nano nginx.conf + 151 0:31 nano nginx.conf + 152 0:34 cd services/ + 153 0:34 nano plex.conf + 154 0:35 nano photos.conf + 155 0:35 nano pad.conf + 156 0:35 nano cloud.conf + 157 0:35 service nginx restart + 158 0:36 nano nms.conf + 159 0:36 service nginx restart + 160 0:39 nano nms.conf + 161 0:40 service nginx restart + 162 0:40 nano nms.conf + 163 0:40 service nginx restart + 164 0:41 nano nms.conf + 165 0:45 service nginx restart + 166 22:13 history + 167 22:13 nano /usr/local/etc/nginx/services/nms.conf + 168 22:20 ip a + 169 22:59 l + 170 22:59 cd /usr/local/etc/nginx/services/ + 171 22:59 cp pad.conf bitwarden.conf + 172 23:00 nano bitwarden.conf + 173 23:01 service nginx restart + 174 11:59 ls + 175 11:59 cd /usr/local/etc/nginx/services/ + 176 11:59 nano bitwarden.conf + 177 12:00 service nginx restart + 178 12:37 nano bitwarden.conf + 179 12:38 service nginx restart + 180 12:45 nano bitwarden.conf + 181 12:45 service nginx restart + 182 19:28 cd /usr/local/etc/nginx/services/ + 183 19:28 nano bitwarden.conf + 184 19:29 service nginx restart + 185 21:37 nano bitwarden.conf + 186 21:38 service nginx restart + 187 21:38 nano bitwarden.conf + 188 21:38 service nginx restart + 189 7:56 ls + 190 7:56 hiqtory + 191 7:57 history + 192 7:58 history | grep certbot + 193 7:59 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 194 21:32 service nginx restart + 195 21:59 cd /usr/local/etc/nginx/services/ + 196 21:59 ls + 197 21:59 nano plex.conf + 198 22:00 cp plex.conf localization.conf + 199 22:00 nano localization.conf + 200 22:00 service nginx restart + 201 22:01 nano localization.conf + 202 22:03 service nginx restart + 203 22:03 nano localization.conf + 204 22:03 service nginx restart + 205 22:48 nano localization.conf + 206 22:49 service nginx restart + 207 22:51 nano localization.conf + 208 22:51 service nginx restart + 209 21:45 cd /usr/local/etc/nginx/services/ + 210 21:45 nano localization.conf + 211 21:45 service nginx restart + 212 21:46 nano localization.conf + 213 21:46 service nginx restart + 214 21:46 nano localization.conf + 215 21:46 nano localization.conf + 216 21:48 service nginx restart + 217 22:25 nano localization.conf + 218 22:26 service nginx restart + 219 22:26 nano localization.conf + 220 22:52 cd /usr/local/etc/nginx/services/ + 221 22:52 nano localization.conf + 222 22:52 y + 223 22:52 cp photos.conf localization.conf + 224 22:52 nano localization.conf + 225 22:53 service nginx restart + 226 22:53 nano localization.conf + 227 22:53 service nginx restart + 228 22:35 ls + 229 22:37 lls + 230 22:43 pkg + 231 22:43 pkg install unzip + 232 22:44 cd /www/rmess + 233 22:44 ls + 234 22:45 ip + 235 22:45 ip + 236 22:47 cd /usr/local/etc/nginx/services/ + 237 22:47 ls + 238 22:52 fpt + 239 22:52 sftp + 240 22:52 sftp root@YoGiTqFCMH8miuwCJql9 + 241 22:53 sftp root@192.168.0.13 + 242 22:54 ls + 243 22:57 mkdir /www/rmess + 244 22:57 mkdir /www/ + 245 22:57 mkdir /www/rmess + 246 22:57 cp rmess.zip /www/rmess/ + 247 22:57 mr rmess.zip + 248 22:57 rm rmess.zip + 249 22:57 cd /www/rmess + 250 22:58 unzip + 251 22:58 unzip rmess.zip + 252 22:58 ls + 253 22:58 cd /usr/local/etc/nginx/services/ + 254 22:58 ls + 255 22:59 cp plex.conf rmess.conf + 256 22:59 nano rmess.conf + 257 23:00 service nginx restart + 258 23:38 cd /usr/local/etc/nginx/services/ + 259 23:38 ls + 260 23:39 cd .. + 261 23:39 ls + 262 23:39 nano nginx.conf + 263 16:37 cd /usr/local/etc/nginx/services/ + 264 16:37 ls + 265 16:37 cp photos.conf adefault.conf + 266 16:37 nano adefault.conf + 267 16:38 service nginx restart + 268 16:38 nano bitwarden.conf + 269 16:39 ls + 270 16:39 cd .. + 271 16:39 ls + 272 16:40 nano nginx.conf + 273 16:40 cd s + 274 16:40 cd services/ + 275 16:40 ls + 276 16:41 nano bitwarden.conf + 277 16:42 ls + 278 16:42 nano adefault.conf + 279 16:43 service nginx restart + 280 16:53 nano adefault.conf + 281 17:39 cd /usr/local/etc/nginx/services/ + 282 17:39 nano adefault.conf + 283 17:39 cp adefault.conf nginxtest.conf + 284 17:39 nano nginxtest.conf + 285 17:40 service nginx restart + 286 7:28 history + 287 7:29 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 288 7:49 service nginx restart + 289 7:30 cd /usr/local/etc/nginx/services/ + 290 7:30 ls + 291 7:30 nano bitwarden.conf + 292 19:58 cd /usr/local/etc/nginx/services/ + 293 19:58 ls + 294 19:58 rm bitwarden.conf + 295 19:59 service nginx restart + 296 22:30 history + 297 22:32 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 298 22:35 service nginx restart + 299 22:35 crontab -e + 300 22:36 crontab -e + 301 21:36 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 302 21:39 service nginx restart + 303 22:43 cd /usr/local/etc/nginx/services/ + 304 22:43 ls + 305 22:44 nano photos.conf + 306 22:44 service nginx restart + 307 13:53 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 308 13:58 service nginx restart + 309 16:25 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 310 16:27 service nginx restart + 311 21:38 service nginx restart + 312 15:50 service nginx restart + 313 15:50 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 314 15:52 service nginx restart + 315 9:40 sudi + 316 9:40 sudo + 317 9:40 cd /etc/network + 318 9:41 cd /etc/networks + 319 9:41 history + 320 9:41 cd /usr/local/etc/nginx/services/ + 321 9:41 ls + 322 9:42 nano plex.conf + 323 9:42 nano enshrouded.conf + 324 9:43 ls + 325 9:43 cd .. + 326 9:43 ls + 327 9:43 nano nginx.conf + 328 9:43 ls + 329 9:44 cd services/ + 330 9:44 ks + 331 9:44 ls + 332 9:44 service nginx restart + 333 10:06 service nginx restart + 334 10:06 ls + 335 10:06 nano enshrouded.conf + 336 10:10 service nginx restart + 337 18:01 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 338 18:04 service nginx restart + 339 8:37 cd services/ + 340 8:37 ls + 341 8:37 cd /usr/local/etc/nginx/services/ + 342 8:37 ls + 343 8:38 vim photos.conf + 344 8:38 nano photos.conf + 345 8:38 ls + 346 8:38 service nginx restart + 347 9:40 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 348 14:40 service nginx restart + 349 22:42 cd /usr/local/etc/nginx/services/ + 350 22:42 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 351 22:45 service nginx restart + 352 11:29 certbot certonly --dns-ovh --dns-ovh-credentials /root/.ovhapi -d '*.lefloch.eu' + 353 11:31 service nginx restart + 354 20:12 history + 355 20:13 cd /usr/local/etc/nginx/services/ + 356 20:13 ls + 357 20:13 cp plex.conf foundry.conf + 358 20:13 vim foundry.conf + 359 20:13 nano foundry.conf + 360 20:16 service nginx restart + 361 20:27 nano foundry.conf + 362 20:28 service nginx restart + 363 21:30 history diff --git a/reverseProxy NGINX/root/.ovhapi b/reverseProxy NGINX/root/.ovhapi new file mode 100644 index 0000000..483bfd3 --- /dev/null +++ b/reverseProxy NGINX/root/.ovhapi @@ -0,0 +1,4 @@ +dns_ovh_endpoint = ovh-eu +dns_ovh_application_key = 387def5f6eb780a5 +dns_ovh_application_secret = 0494f538dc933b62e74b4bedafd126e6 +dns_ovh_consumer_key = b51bee289c5a19e8c0017ca315de6675 \ No newline at end of file diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/adefault.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/adefault.conf new file mode 100644 index 0000000..f387256 --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/adefault.conf @@ -0,0 +1,30 @@ + server { + #listen 80; + listen 443 ssl; + server_name *.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location / { + # root /usr/local/www/nginx; + # index index.html index.htm; + proxy_pass http://192.168.0.102:80; + proxy_set_header Host $host; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + } diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/cloud.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/cloud.conf new file mode 100644 index 0000000..3c8aeef --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/cloud.conf @@ -0,0 +1,37 @@ + server { + # listen 80; + listen 443 ssl; + server_name cloud.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location /.well-known/carddav { + return 301 $scheme://$host/remote.php/dav; + } + + location /.well-known/caldav { + return 301 $scheme://$host/remote.php/dav; + } + + location / { + # root /usr/local/www/nginx; + # index index.html index.htm; + proxy_pass http://192.168.0.18; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + } diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/enshrouded.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/enshrouded.conf new file mode 100644 index 0000000..3d503d4 --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/enshrouded.conf @@ -0,0 +1,40 @@ + server { + #listen 80; + listen 15637; + server_name enshrouded.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location / { + # root /usr/local/www/nginx; + # index index.html index.htm; + proxy_pass http://192.168.0.102:15637; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + + #error_page 404 /404.html; + + # redirect server error pages to the static page /50x.html + # + error_page 500 502 503 504 /50x.html; + location = /50x.html { + root /usr/local/www/nginx-dist; + } + + } + diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/foundry.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/foundry.conf new file mode 100644 index 0000000..067c6a3 --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/foundry.conf @@ -0,0 +1,35 @@ +server { + listen 443 ssl; + server_name foundry.lefloch.eu; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + location / { + proxy_pass http://192.168.0.102:30000; + + # 🔑 WebSocket support + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection "upgrade"; + + # Headers classiques + proxy_set_header Host $host; + proxy_set_header X-Forwarded-For $remote_addr; + proxy_set_header X-Forwarded-Proto https; + + proxy_read_timeout 86400; + proxy_send_timeout 86400; + } + + error_page 500 502 503 504 /50x.html; + location = /50x.html { + root /usr/local/www/nginx-dist; + } +} diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/localization.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/localization.conf new file mode 100644 index 0000000..4b0a3c4 --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/localization.conf @@ -0,0 +1,29 @@ + server { + #listen 80; + listen 443 ssl; + server_name 5gloc.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location / { + # root /usr/local/www/nginx; + # index index.html index.htm; + proxy_pass http://192.168.0.101:32779; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + } diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/nginx.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/nginx.conf new file mode 100644 index 0000000..7de707f --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/nginx.conf @@ -0,0 +1,54 @@ +#user nobody; +worker_processes 1; + +# This default error log path is compiled-in to make sure configuration parsing +# errors are logged somewhere, especially during unattended boot when stderr +# isn't normally logged anywhere. This path will be touched on every nginx +# start regardless of error log location configured here. See +# https://trac.nginx.org/nginx/ticket/147 for more info. +# +#error_log /var/log/nginx/error.log; +# + +#pid logs/nginx.pid; + + +events { + worker_connections 1024; +} + + +http { + include mime.types; + default_type application/octet-stream; + + #log_format main '$remote_addr - $remote_user [$time_local] "$request" ' + # '$status $body_bytes_sent "$http_referer" ' + # '"$http_user_agent" "$http_x_forwarded_for"'; + + #access_log logs/access.log main; + + sendfile on; + #tcp_nopush on; + + #keepalive_timeout 0; + keepalive_timeout 65; + + #gzip on; + + server { + listen 80; + server_name localhost; + return 301 https://$host$request_uri; + } + + include services/*.conf; + + # redirect HTPP to HTTPS + server { + listen 80 default_server; + server_name _; + return 301 https://$host$request_uri; + } + +} diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/nginxtest.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/nginxtest.conf new file mode 100644 index 0000000..05ceb78 --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/nginxtest.conf @@ -0,0 +1,30 @@ + server { + #listen 80; + listen 443 ssl; + server_name nginx.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location / { + # root /usr/local/www/nginx; + # index index.html index.htm; + proxy_pass http://192.168.0.102:32779; + proxy_set_header Host $host; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + } diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/nms.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/nms.conf new file mode 100644 index 0000000..6040ef5 --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/nms.conf @@ -0,0 +1,30 @@ + server { + #listen 80; + listen 443 ssl; + server_name nms.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location / { + # root /usr/local/www/nginx; + # index index.html index.htm; + proxy_pass http://192.168.0.18:8080/; + proxy_set_header Host $Host; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + } diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/pad.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/pad.conf new file mode 100644 index 0000000..e0571bf --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/pad.conf @@ -0,0 +1,29 @@ + server { + # listen 80; + listen 443 ssl; + server_name pad.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location / { + # root /usr/local/www/nginx; + # index index.html index.htm; + proxy_pass http://192.168.0.18:9001; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + } diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/photos.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/photos.conf new file mode 100644 index 0000000..2496f2d --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/photos.conf @@ -0,0 +1,29 @@ + server { + #listen 80; + listen 443 ssl; + server_name photos.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location / { + # root /usr/local/www/nginx; + # index index.html index.htm; + proxy_pass http://192.168.0.26:80; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + } diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/plex.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/plex.conf new file mode 100644 index 0000000..66205d8 --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/plex.conf @@ -0,0 +1,39 @@ + server { + #listen 80; + listen 443 ssl; + server_name plex.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location / { + # root /usr/local/www/nginx; + # index index.html index.htm; + proxy_pass http://192.168.0.29:32400; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + + #error_page 404 /404.html; + + # redirect server error pages to the static page /50x.html + # + error_page 500 502 503 504 /50x.html; + location = /50x.html { + root /usr/local/www/nginx-dist; + } + + } diff --git a/reverseProxy NGINX/usr/local/etc/nginx/service/rmess.conf b/reverseProxy NGINX/usr/local/etc/nginx/service/rmess.conf new file mode 100644 index 0000000..c87b4d3 --- /dev/null +++ b/reverseProxy NGINX/usr/local/etc/nginx/service/rmess.conf @@ -0,0 +1,39 @@ + server { + #listen 80; + listen 443 ssl; + server_name rmess.lefloch.eu; + #server_name localhost; + + ssl_certificate /usr/local/etc/letsencrypt/live/lefloch.eu/fullchain.pem; + ssl_certificate_key /usr/local/etc/letsencrypt/live/lefloch.eu/privkey.pem; + + ssl_session_cache shared:SSL:1m; + ssl_session_timeout 5m; + + ssl_ciphers HIGH:!aNULL:!MD5; + ssl_prefer_server_ciphers on; + + #charset koi8-r; + + #access_log logs/host.access.log main; + + location / { + root /www/rmess; + index index.html index.htm; + # proxy_pass http://192.168.0.29:32400; + } + + # Enforce HTTPS + #return 301 https://$server_name$request_uri; + + + #error_page 404 /404.html; + + # redirect server error pages to the static page /50x.html + # + error_page 500 502 503 504 /50x.html; + location = /50x.html { + root /usr/local/www/nginx-dist; + } + + } diff --git a/reverseProxy NGINX/www/rmess/index.html b/reverseProxy NGINX/www/rmess/index.html new file mode 100644 index 0000000..be47d07 --- /dev/null +++ b/reverseProxy NGINX/www/rmess/index.html @@ -0,0 +1,570 @@ + + +
+ +Départ de Toulouse
+Arrivée et prise des chambres
+Dîner
+Petit Déjeuner
+Présentations
+Déjeuner
+Présentations
+Pause
+Moment convivial
+Dîner
++ Entrée Tartare de légumes de soleil & son fromage frais +
++ Plat Pavé de saumon accompagné de gratins de pâtes aux + légumes +
+Dessert Tarte Tatin
+
+ Entrée Salade de gésiers de canard confit
++ Plat Délicieuse cuisse de canard confite avec pomme de + terre grenaille & haricots verts +
+Dessert Salade de fruits
+
+ Assortiment de petits plats.
+ + +Plateau de charcuterie
+Plateau de canapés prestige
+Brochette Yakitori
+Assortiment de Mini Quiche
+Assainissement de mini lunch
+Verrine Cocktail
+Assortiment de mignardise
+Vins (1bte/4pax)
+
+