-
Notifications
You must be signed in to change notification settings - Fork 408
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
101 additions
and
102 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,116 +1,115 @@ | ||
users: | ||
- name: bs | ||
uid: 2000 | ||
ssh_authorized_keys: | ||
- ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGyjuWQbImwoEG4jZQnRpzIwU4WJpcyukmJRUBhzPnNL lnahum@mule | ||
- ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIECdkKWUa+1PfX+ougqDw3lRGAsrWDLYqIzxdq0FLaYZ nadav@pc | ||
- name: bs | ||
uid: 2000 | ||
ssh_authorized_keys: | ||
- ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGyjuWQbImwoEG4jZQnRpzIwU4WJpcyukmJRUBhzPnNL lnahum@mule | ||
- ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIECdkKWUa+1PfX+ougqDw3lRGAsrWDLYqIzxdq0FLaYZ nadav@pc | ||
|
||
write_files: | ||
- path: /etc/nginx/conf.d/electrs.conf | ||
permissions: 0644 | ||
owner: root | ||
content: | | ||
upstream testnet_tcp { | ||
server 35.201.74.156:143; | ||
server 35.190.42.111:143; | ||
} | ||
upstream testnet_tls { | ||
server 35.201.74.156:993; | ||
} | ||
- path: /etc/nginx/conf.d/electrs.conf | ||
permissions: 0644 | ||
owner: root | ||
content: | | ||
upstream testnet_tcp { | ||
server 34.36.36.12:143; | ||
server 35.190.42.111:143; | ||
} | ||
upstream testnet_tls { | ||
server 34.36.36.12:993; | ||
} | ||
upstream mainnet_tcp { | ||
server 35.201.74.156:110; | ||
server 35.190.42.111:110; | ||
} | ||
upstream mainnet_tls { | ||
server 35.201.74.156:700; | ||
} | ||
upstream mainnet_tcp { | ||
server 34.36.36.12:110; | ||
server 35.190.42.111:110; | ||
} | ||
upstream mainnet_tls { | ||
server 34.36.36.12:700; | ||
} | ||
upstream liquid_mainnet_tcp { | ||
server 35.201.74.156:195; | ||
server 35.190.42.111:195; | ||
} | ||
upstream liquid_mainnet_tls { | ||
server 35.201.74.156:995; | ||
} | ||
upstream liquid_mainnet_tcp { | ||
server 34.36.36.12:195; | ||
server 35.190.42.111:195; | ||
} | ||
upstream liquid_mainnet_tls { | ||
server 34.36.36.12:995; | ||
} | ||
upstream liquid_testnet_tcp { | ||
server 35.201.74.156:587; | ||
server 35.190.42.111:587; | ||
} | ||
upstream liquid_testnet_tls { | ||
server 35.201.74.156:465; | ||
} | ||
upstream liquid_testnet_tcp { | ||
server 34.36.36.12:587; | ||
server 35.190.42.111:587; | ||
} | ||
upstream liquid_testnet_tls { | ||
server 34.36.36.12:465; | ||
} | ||
server { | ||
listen 50401; | ||
listen [::]:50401; | ||
proxy_pass liquid_mainnet_tcp; | ||
} | ||
server { | ||
listen 50402; | ||
listen [::]:50402; | ||
proxy_pass liquid_mainnet_tls; | ||
ssl_preread on; | ||
} | ||
server { | ||
listen 50401; | ||
listen [::]:50401; | ||
proxy_pass liquid_mainnet_tcp; | ||
} | ||
server { | ||
listen 50402; | ||
listen [::]:50402; | ||
proxy_pass liquid_mainnet_tls; | ||
ssl_preread on; | ||
} | ||
server { | ||
listen 50001; | ||
listen [::]:50001; | ||
proxy_pass mainnet_tcp; | ||
} | ||
server { | ||
listen 50002; | ||
listen [::]:50002; | ||
proxy_pass mainnet_tls; | ||
ssl_preread on; | ||
} | ||
server { | ||
listen 50001; | ||
listen [::]:50001; | ||
proxy_pass mainnet_tcp; | ||
} | ||
server { | ||
listen 50002; | ||
listen [::]:50002; | ||
proxy_pass mainnet_tls; | ||
ssl_preread on; | ||
} | ||
server { | ||
listen 60001; | ||
listen [::]:60001; | ||
proxy_pass testnet_tcp; | ||
} | ||
server { | ||
listen 60002; | ||
listen [::]:60002; | ||
proxy_pass testnet_tls; | ||
ssl_preread on; | ||
} | ||
server { | ||
listen 60001; | ||
listen [::]:60001; | ||
proxy_pass testnet_tcp; | ||
} | ||
server { | ||
listen 60002; | ||
listen [::]:60002; | ||
proxy_pass testnet_tls; | ||
ssl_preread on; | ||
} | ||
server { | ||
listen 60401; | ||
listen [::]:60401; | ||
proxy_pass liquid_testnet_tcp; | ||
} | ||
server { | ||
listen 60402; | ||
listen [::]:60402; | ||
proxy_pass liquid_testnet_tls; | ||
ssl_preread on; | ||
} | ||
server { | ||
listen 60401; | ||
listen [::]:60401; | ||
proxy_pass liquid_testnet_tcp; | ||
} | ||
server { | ||
listen 60402; | ||
listen [::]:60402; | ||
proxy_pass liquid_testnet_tls; | ||
ssl_preread on; | ||
} | ||
- path: /etc/nginx/nginx.conf | ||
permissions: 0644 | ||
owner: root | ||
content: | | ||
user www-data; | ||
worker_processes auto; | ||
pid /run/nginx.pid; | ||
include /etc/nginx/modules-enabled/*.conf; | ||
- path: /etc/nginx/nginx.conf | ||
permissions: 0644 | ||
owner: root | ||
content: | | ||
user www-data; | ||
worker_processes auto; | ||
pid /run/nginx.pid; | ||
include /etc/nginx/modules-enabled/*.conf; | ||
events { | ||
worker_connections 768; | ||
# multi_accept on; | ||
} | ||
stream { | ||
include /etc/nginx/conf.d/*.conf; | ||
} | ||
events { | ||
worker_connections 768; | ||
# multi_accept on; | ||
} | ||
stream { | ||
include /etc/nginx/conf.d/*.conf; | ||
} | ||
runcmd: | ||
- apt-get update | ||
- apt-get install -qfy tor nginx | ||
- systemctl enable --now tor | ||
- systemctl enable --now nginx | ||
- apt-get update | ||
- apt-get install -qfy tor nginx | ||
- systemctl enable --now tor | ||
- systemctl enable --now nginx |