Config-Backup 2026-03-28 15:30:26

Geänderte Dateien:
 - etc/systemd/system/system/chronyd.service
 - etc/systemd/system/system/cloud-config.target.wants/cloud-init-hotplugd.socket
 - etc/systemd/system/system/cloud-init.target.wants/cloud-config.service
 - etc/systemd/system/system/cloud-init.target.wants/cloud-final.service
 - etc/systemd/system/system/cloud-init.target.wants/cloud-init-local.service
 - etc/systemd/system/system/cloud-init.target.wants/cloud-init-main.service
 - etc/systemd/system/system/cloud-init.target.wants/cloud-init-network.service
 - etc/systemd/system/system/dbus-org.freedesktop.timesync1.service
 - etc/systemd/system/system/default.target.wants/wtmpdb-update-boot.service
 - etc/systemd/system/system/getty.target.wants/getty@tty1.service
 - etc/systemd/system/system/hibernate.target.wants/grub-common.service
 - etc/systemd/system/system/hybrid-sleep.target.wants/grub-common.service
 - etc/systemd/system/system/multi-user.target.wants/chrony.service
 - etc/systemd/system/system/multi-user.target.wants/console-setup.service
 - etc/systemd/system/system/multi-user.target.wants/containerd.service
 - etc/systemd/system/system/multi-user.target.wants/cron.service
 - etc/systemd/system/system/multi-user.target.wants/docker.service
 - etc/systemd/system/system/multi-user.target.wants/e2scrub_reap.service
 - etc/systemd/system/system/multi-user.target.wants/fail2ban.service
 - etc/systemd/system/system/multi-user.target.wants/grub-common.service
 - etc/systemd/system/system/multi-user.target.wants/networking.service
 - etc/systemd/system/system/multi-user.target.wants/nmbd.service
 - etc/systemd/system/system/multi-user.target.wants/remote-fs.target
 - etc/systemd/system/system/multi-user.target.wants/rsyslog.service
 - etc/systemd/system/system/multi-user.target.wants/samba-ad-dc.service
 - etc/systemd/system/system/multi-user.target.wants/smbd.service
 - etc/systemd/system/system/multi-user.target.wants/ssh.service
 - etc/systemd/system/system/multi-user.target.wants/start-containers.service
 - etc/systemd/system/system/multi-user.target.wants/unattended-upgrades.service
 - etc/systemd/system/system/multi-user.target.wants/winbind.service
 - etc/systemd/system/system/multi-user.target.wants/zfs.target
 - etc/systemd/system/system/network-online.target.wants/networking.service
 - etc/systemd/system/system/nmb.service
 - etc/systemd/system/system/samba.service
 - etc/systemd/system/system/smb.service
 - etc/systemd/system/system/sockets.target.wants/docker.socket
 - etc/systemd/system/system/ssh.service.wants/sshd-keygen.service
 - etc/systemd/system/system/ssh.socket.wants/sshd-keygen.service
 - etc/systemd/system/system/sshd.service
 - etc/systemd/system/system/sshd.service.wants/sshd-keygen.service
 - etc/systemd/system/system/sshd@.service.wants/sshd-keygen.service
 - etc/systemd/system/system/start-containers.service
 - etc/systemd/system/system/suspend-then-hibernate.target.wants/grub-common.service
 - etc/systemd/system/system/suspend.target.wants/grub-common.service
 - etc/systemd/system/system/sysinit.target.wants/apparmor.service
 - etc/systemd/system/system/sysinit.target.wants/keyboard-setup.service
 - etc/systemd/system/system/sysinit.target.wants/resolvconf.service
 - etc/systemd/system/system/sysinit.target.wants/systemd-pstore.service
 - etc/systemd/system/system/sysinit.target.wants/systemd-timesyncd.service
 - etc/systemd/system/system/syslog.service
 - etc/systemd/system/system/systemd-resolved.service.wants/resolvconf-pull-resolved.path
 - etc/systemd/system/system/systemd-resolved.service.wants/resolvconf-pull-resolved.service
 - etc/systemd/system/system/timers.target.wants/apt-daily-upgrade.timer
 - etc/systemd/system/system/timers.target.wants/apt-daily.timer
 - etc/systemd/system/system/timers.target.wants/dpkg-db-backup.timer
 - etc/systemd/system/system/timers.target.wants/e2scrub_all.timer
 - etc/systemd/system/system/timers.target.wants/fstrim.timer
 - etc/systemd/system/system/timers.target.wants/logrotate.timer
 - etc/systemd/system/system/timers.target.wants/man-db.timer
 - etc/systemd/system/system/zed.service
 - etc/systemd/system/system/zfs-import.target.wants/zfs-import-cache.service
 - etc/systemd/system/system/zfs-mount.service.wants/zfs-load-module.service
 - etc/systemd/system/system/zfs-volumes.target.wants/zfs-volume-wait.service
 - etc/systemd/system/system/zfs.target.wants/zfs-import.target
 - etc/systemd/system/system/zfs.target.wants/zfs-load-module.service
 - etc/systemd/system/system/zfs.target.wants/zfs-mount.service
 - etc/systemd/system/system/zfs.target.wants/zfs-share.service
 - etc/systemd/system/system/zfs.target.wants/zfs-volumes.target
 - etc/systemd/system/system/zfs.target.wants/zfs-zed.service
 - root/docker/Webproxy/Data/nginx/nginx/auth/.htpasswd
 - root/docker/Webproxy/Data/nginx/nginx/service.conf
 - root/docker/dokuwiki/data/conf/conf/acl.auth.php
 - root/docker/dokuwiki/data/conf/conf/license.php
 - root/docker/dokuwiki/data/conf/conf/local.php
 - root/docker/dokuwiki/data/conf/conf/local.php.bak.php
 - root/docker/dokuwiki/data/conf/conf/plugins.local.php
 - root/docker/dokuwiki/data/conf/conf/users.auth.php
 - root/docker/dokuwiki/data/conf/conf/users.auth.php.bak
 - root/docker/gitea/docker-compose.yml
 - root/docker/gitea/start.sh
 - root/docker/traefik/data/letsencrypt/acme.json
This commit is contained in:
Michael Seidel
2026-03-28 15:30:26 +01:00
parent de4ae83476
commit afeb06a80e
81 changed files with 477 additions and 0 deletions

View File

@@ -0,0 +1,2 @@
drawioUser:$2y$05$Ckt.CPSBzFPWkkRhCe3M7eYePnkPVfhfjDcjpw.1Knn7Amh0N.gxq

View File

@@ -0,0 +1,171 @@
#/root/docker/Webproxy/Data/nginx/service.conf
map $http_upgrade $connection_upgrade {
default upgrade;
'' close;
}
server {
listen 80;
server_name service.focus-on-it.net;
location /.well-known/acme-challenge/ { root /var/www/certbot; }
location / { return 301 https://$host$request_uri; }
}
server {
listen 443 ssl;
server_name service.focus-on-it.net;
ssl_certificate /etc/letsencrypt/live/service.focus-on-it.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/service.focus-on-it.net/privkey.pem;
location / {
return 200 "service endpoint\n";
}
}
server {
listen 80;
server_name dokuwiki.focus-on-it.net;
location /.well-known/acme-challenge/ { root /var/www/certbot; }
location / { return 301 https://$host$request_uri; }
}
server {
listen 443 ssl;
server_name dokuwiki.focus-on-it.net;
resolver 127.0.0.11 valid=30s ipv6=off;
ssl_certificate /etc/letsencrypt/live/service.focus-on-it.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/service.focus-on-it.net/privkey.pem;
location / {
set $dokuwiki_upstream dokuwiki:8080;
proxy_pass http://$dokuwiki_upstream;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-Port 443;
}
}
server {
listen 80;
server_name guacamole.focus-on-it.net;
location /.well-known/acme-challenge/ { root /var/www/certbot; }
location / { return 301 https://$host$request_uri; }
}
server {
listen 443 ssl;
server_name guacamole.focus-on-it.net;
ssl_certificate /etc/letsencrypt/live/service.focus-on-it.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/service.focus-on-it.net/privkey.pem;
# optional sinnvoll
client_max_body_size 50m;
# Guacamole läuft standardmäßig unter /guacamole/
location / {
return 302 /guacamole/;
}
location /guacamole/ {
proxy_pass http://guacamole:8080/guacamole/;
proxy_http_version 1.1;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-Port 443;
# WebSocket für Guacamole Tunnel
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $connection_upgrade;
proxy_buffering off;
}
}
server {
listen 80;
server_name drawio.focus-on-it.net;
location /.well-known/acme-challenge/ {
root /var/www/certbot;
}
location / {
return 301 https://$host$request_uri;
}
}
server {
listen 443 ssl;
server_name drawio.focus-on-it.net;
ssl_certificate /etc/letsencrypt/live/service.focus-on-it.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/service.focus-on-it.net/privkey.pem;
client_max_body_size 50m;
location / {
auth_basic "Restricted";
auth_basic_user_file /etc/nginx/auth/.htpasswd;
proxy_pass http://drawio:8080;
proxy_http_version 1.1;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-Port 443;
proxy_read_timeout 300;
proxy_send_timeout 300;
}
}
server {
listen 80;
server_name nextcloud.focus-on-it.net;
location /.well-known/acme-challenge/ {
root /var/www/certbot;
}
location / {
return 301 https://$host$request_uri;
}
}
server {
listen 443 ssl;
server_name nextcloud.focus-on-it.net;
resolver 127.0.0.11 valid=30s ipv6=off;
ssl_certificate /etc/letsencrypt/live/service.focus-on-it.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/service.focus-on-it.net/privkey.pem;
client_max_body_size 10G;
proxy_read_timeout 3600;
proxy_send_timeout 3600;
location / {
set $nextcloud_upstream nextcloud-nginx:80;
proxy_pass http://$nextcloud_upstream;
proxy_http_version 1.1;
proxy_request_buffering off;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto https;
proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Forwarded-Port 443;
}
}