initial commit

This commit is contained in:
ghost 2023-11-23 03:22:20 +02:00
parent 0eb5e465e0
commit 9e6e72eb22
18 changed files with 682 additions and 1 deletions

View File

@ -1,2 +1,88 @@
# YGGbro
Yggdrasil web proxy browser
Collection of web proxies with configuration examples for Yggdrasil
This repository maintained by community, feel free to share your fixes, configuration examples or mirrors into the list below!
## Settings
* [nginx](https://github.com/YGGverse/YGGbro/tree/main/nginx)
## Mirrors
### Radio
* [somafm.com](https://somafm.com/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/soma.fm)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/somafm/suburbsofgoa`
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/somafm/thetrip`
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/somafm/thistle`
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/somafm/cliqhop`
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/somafm/lush`
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/somafm/deepspaceone`
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/somafm/sonicuniverse`
* [djfm.ua](https://djfm.ua/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/djfm.ua)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/djfm`
* [hromadskeradio.org](https://hromadskeradio.org/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/hromadskeradio.org)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/hromadske`
* [liquiradio.com](https://liquiradio.com/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/liquiradio.com)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/liqui`
* [loungefm.com.ua](https://loungefm.com.ua/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/loungefm.com.ua)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/loungefm`
* [mjoy.ua](https://mjoy.ua/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/mjoy.ua)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/rzk`
* [radiobayraktar.ua](https://radiobayraktar.ua/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/radiobayraktar.ua)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/radiobayraktar`
* [radiojazz.ua](https://radiojazz.ua/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/radiojazz.ua)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/jazz`
* [radioroks.ua](https://radioroks.ua/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/radioroks.ua)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/roks`
* [rockradioua.online](https://rockradioua.online/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/rockradioua.online)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/rockradioua/rock`
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/rockradioua/metal`
* [urbanspaceradio.com](https://urbanspaceradio.com/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/urbanspaceradio.com)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/urban-space-radio`
* [vanilladnb.co.ua](https://vanilladnb.co.ua/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/vanilladnb.co.ua)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/yggwave/radio/vanilladnb`
If you're running own station in Yggdrasil network, also take a look:
[YGGwave ~ The Radio Stations Catalog](https://github.com/YGGverse/YGGwave)
### Torrent
* [rutracker.org](https://rutracker.org/)
+ `http://[321:c99a:91a1:cd2c::18]/`
* [rutor.is](https://rutor.is/)
+ `http://[321:c99a:91a1:cd2c::16]/`
### Books
* [flibusta.site](https://flibusta.site/)
+ `http://[321:c99a:91a1:cd2c::7]/`
### IT
* [opennet.ru](https://opennet.ru/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/opennet/www-less)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/opennet`
* [www.opennet.ru](https://opennet.ru/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/opennet/www)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/opennet/www`
* [linux-ru.ru](https://linux-ru.ru/)
+ `http://[221:58c9:9a6:99be:f3d:c1ac:2b5b:9771]/`
### News
* [texty.org.ua](https://texty.org.ua/) | [nginx](https://github.com/YGGverse/YGGbro/blob/main/nginx/texty.org.ua)
+ `http://[201:23b4:991a:634d:8359:4521:5576:15b7]/texty.org.ua/`

19
nginx/djfm.ua Normal file
View File

@ -0,0 +1,19 @@
# Mirror for https://djfm.ua/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /djfm.ua/stream {
proxy_pass https://cast.fex.net/djfm_x;
}
}

19
nginx/hromadskeradio.org Normal file
View File

@ -0,0 +1,19 @@
# Mirror for https://hromadskeradio.org/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /hromadskeradio.org/stream {
proxy_pass http://stream.hromadskeradio.org:8000/stream-ps-hi;
}
}

20
nginx/liquiradio.com Normal file
View File

@ -0,0 +1,20 @@
# Mirror for https://liquiradio.com/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /liquiradio.com/stream {
proxy_pass http://stream-162.zeno.fm/ug59eq099yzuv?zs=NrlynsUKSf2PLPjIMpwYKA;
proxy_set_header Host $host;
}
}

19
nginx/loungefm.com.ua Normal file
View File

@ -0,0 +1,19 @@
# Mirror for https://loungefm.com.ua/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /loungefm.com.ua/stream {
proxy_pass http://cast.loungefm.com.ua:8000/loungefm;
}
}

19
nginx/mjoy.ua Normal file
View File

@ -0,0 +1,19 @@
# Mirror for https://mjoy.ua/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /mjoy.ua/radio-z-kryjivky/stream {
proxy_pass http://stream.mjoy.ua:8000/radio-z-kryjivky;
}
}

133
nginx/opennet/www Normal file
View File

@ -0,0 +1,133 @@
# OpenNet Mirror
#
# https://www.opennet.ru
# https://www.opennet.me
#
# Configuration disable all JS by default, main menu requires exception @TODO
# https://github.com/YGGverse/issues/1
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /opennet/www {
proxy_pass https://www.opennet.ru/;
# .
# sub_filter 'http://opennet.ru' 'http://[$server_addr]/opennet';
# sub_filter 'https://opennet.ru' 'http://[$server_addr]/opennet';
# sub_filter 'http://opennet.me' 'http://[$server_addr]/opennet';
# sub_filter 'https://opennet.me' 'http://[$server_addr]/opennet';
# www
sub_filter 'http://www.opennet.ru' 'http://[$server_addr]/opennet/www';
sub_filter 'https://www.opennet.ru' 'http://[$server_addr]/opennet/www';
sub_filter 'http://www.opennet.me' 'http://[$server_addr]/opennet/www';
sub_filter 'https://www.opennet.me' 'http://[$server_addr]/opennet/www';
# m
# sub_filter 'http://m.opennet.ru' 'http://[$server_addr]/opennet/m';
# sub_filter 'https://m.opennet.ru' 'http://[$server_addr]/opennet/m';
# sub_filter 'http://m.opennet.me' 'http://[$server_addr]/opennet/m';
# sub_filter 'https://m.opennet.me' 'http://[$server_addr]/opennet/m';
# mobile
# sub_filter 'http://mobile.opennet.ru' 'http://[$server_addr]/opennet/mobile';
# sub_filter 'https://mobile.opennet.ru' 'http://[$server_addr]/opennet/mobile';
# sub_filter 'http://mobile.opennet.me' 'http://[$server_addr]/opennet/mobile';
# sub_filter 'https://mobile.opennet.me' 'http://[$server_addr]/opennet/mobile';
# wiki
# sub_filter 'http://wiki.opennet.ru' 'http://[$server_addr]/opennet/wiki';
# sub_filter 'https://wiki.opennet.ru' 'http://[$server_addr]/opennet/wiki';
# sub_filter 'http://wiki.opennet.me' 'http://[$server_addr]/opennet/wiki';
# sub_filter 'https://wiki.opennet.me' 'http://[$server_addr]/opennet/wiki';
# solaris
# sub_filter 'http://solaris.opennet.ru' 'http://[$server_addr]/opennet/solaris';
# sub_filter 'https://solaris.opennet.ru' 'http://[$server_addr]/opennet/solaris';
# sub_filter 'http://solaris.opennet.me' 'http://[$server_addr]/opennet/solaris';
# sub_filter 'https://solaris.opennet.me' 'http://[$server_addr]/opennet/solaris';
# bsd
# sub_filter 'http://bsd.opennet.ru' 'http://[$server_addr]/opennet/bsd';
# sub_filter 'https://bsd.opennet.ru' 'http://[$server_addr]/opennet/bsd';
# sub_filter 'http://bsd.opennet.me' 'http://[$server_addr]/opennet/bsd';
# sub_filter 'https://bsd.opennet.me' 'http://[$server_addr]/opennet/bsd';
# cisco
# sub_filter 'http://cisco.opennet.ru' 'http://[$server_addr]/opennet/cisco';
# sub_filter 'https://cisco.opennet.ru' 'http://[$server_addr]/opennet/cisco';
# sub_filter 'http://cisco.opennet.me' 'http://[$server_addr]/opennet/cisco';
# sub_filter 'https://cisco.opennet.me' 'http://[$server_addr]/opennet/cisco';
# linux
# sub_filter 'http://linux.opennet.ru' 'http://[$server_addr]/opennet/linux';
# sub_filter 'https://linux.opennet.ru' 'http://[$server_addr]/opennet/linux';
# sub_filter 'http://linux.opennet.me' 'http://[$server_addr]/opennet/linux';
# sub_filter 'https://linux.opennet.me' 'http://[$server_addr]/opennet/linux';
# web
# sub_filter 'http://web.opennet.ru' 'http://[$server_addr]/opennet/web';
# sub_filter 'https://web.opennet.ru' 'http://[$server_addr]/opennet/web';
# sub_filter 'http://web.opennet.me' 'http://[$server_addr]/opennet/web';
# sub_filter 'https://web.opennet.me' 'http://[$server_addr]/opennet/web';
# security
# sub_filter 'http://security.opennet.ru' 'http://[$server_addr]/opennet/security';
# sub_filter 'https://security.opennet.ru' 'http://[$server_addr]/opennet/security';
# sub_filter 'http://security.opennet.me' 'http://[$server_addr]/opennet/security';
# sub_filter 'https://security.opennet.me' 'http://[$server_addr]/opennet/security';
# palm
# sub_filter 'http://palm.opennet.ru' 'http://[$server_addr]/opennet/palm';
# sub_filter 'https://palm.opennet.ru' 'http://[$server_addr]/opennet/palm';
# sub_filter 'http://palm.opennet.me' 'http://[$server_addr]/opennet/palm';
# sub_filter 'https://palm.opennet.me' 'http://[$server_addr]/opennet/palm';
# grab
# sub_filter 'http://grab.opennet.ru' 'http://[$server_addr]/opennet/grab';
# sub_filter 'https://grab.opennet.ru' 'http://[$server_addr]/opennet/grab';
# sub_filter 'http://grab.opennet.me' 'http://[$server_addr]/opennet/grab';
# sub_filter 'https://grab.opennet.me' 'http://[$server_addr]/opennet/grab';
# Disable JS / trackers by default
sub_filter '<script' '<!-- <script';
sub_filter '</script>' '</script> -->';
# Relative paths
sub_filter 'href="/' 'href="http://[$server_addr]/opennet/www/';
sub_filter 'src="/' 'src="http://[$server_addr]/opennet/www/';
sub_filter 'data-src="/' 'src="http://[$server_addr]/opennet/www/';
sub_filter "url('/" "url('http://[$server_addr]/opennet/www/";
# Replace all matches
sub_filter_once off;
# Enable multimedia replacement
sub_filter_types *;
}
}

133
nginx/opennet/www-less Normal file
View File

@ -0,0 +1,133 @@
# OpenNet Mirror
#
# https://opennet.ru
# https://opennet.me
#
# Configuration disable all JS by default, main menu requires exception @TODO
# https://github.com/YGGverse/issues/1
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /opennet {
proxy_pass https://opennet.ru/;
# .
sub_filter 'http://opennet.ru' 'http://[$server_addr]/opennet';
sub_filter 'https://opennet.ru' 'http://[$server_addr]/opennet';
sub_filter 'http://opennet.me' 'http://[$server_addr]/opennet';
sub_filter 'https://opennet.me' 'http://[$server_addr]/opennet';
# www
# sub_filter 'http://www.opennet.ru' 'http://[$server_addr]/opennet/www';
# sub_filter 'https://www.opennet.ru' 'http://[$server_addr]/opennet/www';
# sub_filter 'http://www.opennet.me' 'http://[$server_addr]/opennet/www';
# sub_filter 'https://www.opennet.me' 'http://[$server_addr]/opennet/www';
# m
# sub_filter 'http://m.opennet.ru' 'http://[$server_addr]/opennet/m';
# sub_filter 'https://m.opennet.ru' 'http://[$server_addr]/opennet/m';
# sub_filter 'http://m.opennet.me' 'http://[$server_addr]/opennet/m';
# sub_filter 'https://m.opennet.me' 'http://[$server_addr]/opennet/m';
# mobile
# sub_filter 'http://mobile.opennet.ru' 'http://[$server_addr]/opennet/mobile';
# sub_filter 'https://mobile.opennet.ru' 'http://[$server_addr]/opennet/mobile';
# sub_filter 'http://mobile.opennet.me' 'http://[$server_addr]/opennet/mobile';
# sub_filter 'https://mobile.opennet.me' 'http://[$server_addr]/opennet/mobile';
# wiki
# sub_filter 'http://wiki.opennet.ru' 'http://[$server_addr]/opennet/wiki';
# sub_filter 'https://wiki.opennet.ru' 'http://[$server_addr]/opennet/wiki';
# sub_filter 'http://wiki.opennet.me' 'http://[$server_addr]/opennet/wiki';
# sub_filter 'https://wiki.opennet.me' 'http://[$server_addr]/opennet/wiki';
# solaris
# sub_filter 'http://solaris.opennet.ru' 'http://[$server_addr]/opennet/solaris';
# sub_filter 'https://solaris.opennet.ru' 'http://[$server_addr]/opennet/solaris';
# sub_filter 'http://solaris.opennet.me' 'http://[$server_addr]/opennet/solaris';
# sub_filter 'https://solaris.opennet.me' 'http://[$server_addr]/opennet/solaris';
# bsd
# sub_filter 'http://bsd.opennet.ru' 'http://[$server_addr]/opennet/bsd';
# sub_filter 'https://bsd.opennet.ru' 'http://[$server_addr]/opennet/bsd';
# sub_filter 'http://bsd.opennet.me' 'http://[$server_addr]/opennet/bsd';
# sub_filter 'https://bsd.opennet.me' 'http://[$server_addr]/opennet/bsd';
# cisco
# sub_filter 'http://cisco.opennet.ru' 'http://[$server_addr]/opennet/cisco';
# sub_filter 'https://cisco.opennet.ru' 'http://[$server_addr]/opennet/cisco';
# sub_filter 'http://cisco.opennet.me' 'http://[$server_addr]/opennet/cisco';
# sub_filter 'https://cisco.opennet.me' 'http://[$server_addr]/opennet/cisco';
# linux
# sub_filter 'http://linux.opennet.ru' 'http://[$server_addr]/opennet/linux';
# sub_filter 'https://linux.opennet.ru' 'http://[$server_addr]/opennet/linux';
# sub_filter 'http://linux.opennet.me' 'http://[$server_addr]/opennet/linux';
# sub_filter 'https://linux.opennet.me' 'http://[$server_addr]/opennet/linux';
# web
# sub_filter 'http://web.opennet.ru' 'http://[$server_addr]/opennet/web';
# sub_filter 'https://web.opennet.ru' 'http://[$server_addr]/opennet/web';
# sub_filter 'http://web.opennet.me' 'http://[$server_addr]/opennet/web';
# sub_filter 'https://web.opennet.me' 'http://[$server_addr]/opennet/web';
# security
# sub_filter 'http://security.opennet.ru' 'http://[$server_addr]/opennet/security';
# sub_filter 'https://security.opennet.ru' 'http://[$server_addr]/opennet/security';
# sub_filter 'http://security.opennet.me' 'http://[$server_addr]/opennet/security';
# sub_filter 'https://security.opennet.me' 'http://[$server_addr]/opennet/security';
# palm
# sub_filter 'http://palm.opennet.ru' 'http://[$server_addr]/opennet/palm';
# sub_filter 'https://palm.opennet.ru' 'http://[$server_addr]/opennet/palm';
# sub_filter 'http://palm.opennet.me' 'http://[$server_addr]/opennet/palm';
# sub_filter 'https://palm.opennet.me' 'http://[$server_addr]/opennet/palm';
# grab
# sub_filter 'http://grab.opennet.ru' 'http://[$server_addr]/opennet/grab';
# sub_filter 'https://grab.opennet.ru' 'http://[$server_addr]/opennet/grab';
# sub_filter 'http://grab.opennet.me' 'http://[$server_addr]/opennet/grab';
# sub_filter 'https://grab.opennet.me' 'http://[$server_addr]/opennet/grab';
# Disable JS / trackers by default
sub_filter '<script' '<!-- <script';
sub_filter '</script>' '</script> -->';
# Relative paths
sub_filter 'href="/' 'href="http://[$server_addr]/opennet/';
sub_filter 'src="/' 'src="http://[$server_addr]/opennet/';
sub_filter 'data-src="/' 'src="http://[$server_addr]/opennet/';
sub_filter "url('/" "url('http://[$server_addr]/opennet/";
# Replace all matches
sub_filter_once off;
# Enable multimedia replacement
sub_filter_types *;
}
}

19
nginx/radiobayraktar.ua Normal file
View File

@ -0,0 +1,19 @@
# Mirror for https://radiobayraktar.ua/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /radiobayraktar.ua/stream/hd {
proxy_pass http://online.radiobayraktar.ua/RadioBayraktar_HD;
}
}

19
nginx/radiojazz.ua Normal file
View File

@ -0,0 +1,19 @@
# Mirror for https://radiojazz.ua/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /radiojazz.ua/stream/hd {
proxy_pass http://online.radiojazz.ua/RadioJazz_HD;
}
}

19
nginx/radioroks.ua Normal file
View File

@ -0,0 +1,19 @@
# Mirror for https://radioroks.ua/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /radioroks.ua/stream {
proxy_pass http://online.radioroks.ua/RadioROKS;
}
}

20
nginx/radioskovoroda.com Normal file
View File

@ -0,0 +1,20 @@
# Mirror for https://radioskovoroda.com/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /radioskovoroda.com/stream {
proxy_pass http://stream.radioskovoroda.com:8000/radioskovoroda;
}
}

20
nginx/radiosraka Normal file
View File

@ -0,0 +1,20 @@
# Mirror for Radio Sraka
# https://www.facebook.com/s.r.a.k.a.radio
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /radiosraka/stream {
proxy_pass http://212.26.146.50:8000/sraka.mp3;
}
}

23
nginx/rockradioua.online Normal file
View File

@ -0,0 +1,23 @@
# Mirror for https://rockradioua.online/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /rockradioua.online/stream/rock/256 {
proxy_pass https://rockradioua.online:8433/rock_256;
}
location /rockradioua.online/stream/metal/256 {
proxy_pass https://rockradioua.online:8433/metal_256;
}
}

43
nginx/soma.fm Normal file
View File

@ -0,0 +1,43 @@
# Stream mirrors for https://somafm.com/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /soma.fm/suburbsofgoa/128/mp3 {
proxy_pass http://ice6.somafm.com/suburbsofgoa-128-mp3;
}
location /soma.fm/thetrip/128/mp3 {
proxy_pass http://ice5.somafm.com/thetrip-128-mp3;
}
location /soma.fm/thistle/128/mp3 {
proxy_pass http://ice4.somafm.com/thistle-128-mp3;
}
location /soma.fm/cliqhop/128/mp3 {
proxy_pass http://ice6.somafm.com/cliqhop-128-mp3;
}
location /soma.fm/lush/128/mp3 {
proxy_pass http://ice6.somafm.com/lush-128-mp3;
}
location /soma.fm/deepspaceone/128/mp3 {
proxy_pass http://ice6.somafm.com/deepspaceone-128-mp3;
}
location /soma.fm/sonicuniverse/128/mp3 {
proxy_pass http://ice6.somafm.com/sonicuniverse-128-mp3;
}
}

32
nginx/texty.org.ua Normal file
View File

@ -0,0 +1,32 @@
# Mirror for https://texty.org.ua/
# Drops all JS
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /texty.org.ua {
proxy_pass https://texty.org.ua/;
sub_filter 'http://texty.org.ua' 'http://[$server_addr]/texty.org.ua';
sub_filter 'https://texty.org.ua' 'http://[$server_addr]/texty.org.ua';
sub_filter '<script' '<!-- <script';
sub_filter '</script>' '</script> -->';
sub_filter 'href="/support/"' 'href="https://texty.org.ua/p/support"';
sub_filter 'href="/' 'href="http://[$server_addr]/texty.org.ua/';
sub_filter 'src="/' 'src="http://[$server_addr]/texty.org.ua/';
sub_filter 'data-src="/' 'src="http://[$server_addr]/texty.org.ua/';
sub_filter "url('/" "url('http://[$server_addr]/texty.org.ua/";
sub_filter_once off;
sub_filter_types *;
}
}

19
nginx/urbanspaceradio.com Normal file
View File

@ -0,0 +1,19 @@
# Mirror for https://urbanspaceradio.com/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /urbanspaceradio.com/stream {
proxy_pass http://stream.urbanspaceradio.com:8000/urban-space-radio;
}
}

19
nginx/vanilladnb.co.ua Normal file
View File

@ -0,0 +1,19 @@
# Mirror for https://vanilladnb.co.ua/
server {
# HTTP/IPv6 connections only
# listen [::]:80 ipv6only=on;
# Yggdrasil connections only
# allow 0200::/7;
# deny all;
# Tell to server, that's proxy request
# proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
# proxy_set_header X-Real-IP $remote_addr;
location /vanilladnb.co.ua/stream {
proxy_pass http://vanilladnb.co.ua:8000/stream;
}
}