diff options
author | Johannes Löthberg <johannes@kyriasis.com> | 2024-05-27 00:13:19 +0200 |
---|---|---|
committer | Johannes Löthberg <johannes@kyriasis.com> | 2024-05-27 00:13:19 +0200 |
commit | 831fb296919d1e6826df83a5424328cb040caaa7 (patch) | |
tree | 61e05ee6c4972fe42d6a9f4c71403dd2953b95cd /nginx | |
parent | 3a095a2f1326073cbd2dffe5ce9c27eb3267470b (diff) | |
download | pillar-831fb296919d1e6826df83a5424328cb040caaa7.tar.xz |
Add real remmy.foo nginx configs
Signed-off-by: Johannes Löthberg <johannes@kyriasis.com>
Diffstat (limited to 'nginx')
-rw-r--r-- | nginx/gallery_remmy_foo.sls | 86 | ||||
-rw-r--r-- | nginx/remmy_foo.sls | 43 |
2 files changed, 129 insertions, 0 deletions
diff --git a/nginx/gallery_remmy_foo.sls b/nginx/gallery_remmy_foo.sls index a58379f..fc988ab 100644 --- a/nginx/gallery_remmy_foo.sls +++ b/nginx/gallery_remmy_foo.sls @@ -15,6 +15,54 @@ nginx: - location /: - return: '301 https://$server_name$request_uri' + + - server: + - server_name: gallery.remmy.foo + - listen: 443 ssl http2 + - listen: '[::]:443 ssl http2' + + - ssl_certificate: /etc/letsencrypt/live/gallery.remmy.foo/fullchain.pem + - ssl_certificate_key: /etc/letsencrypt/live/gallery.remmy.foo/privkey.pem + - ssl_dhparam: /etc/nginx/dhparam.pem + + - ssl_stapling: 'on' + - ssl_stapling_verify: 'on' + - ssl_trusted_certificate: /etc/letsencrypt/live/gallery.remmy.foo/fullchain.pem + + # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security + - add_header: 'Strict-Transport-Security "max-age=31536000"' + + # Tell browsers not to render the page inside a frame, and avoid clickjacking. + - add_header: X-Frame-Options SAMEORIGIN + + # Tell browsers to not try to auto-detect the Content-Type. + - add_header: X-Content-Type-Options nosniff + + # Enable the Cross-site scripting filter in most recent browsers. + # Normally enabled by default, but enable it anyway if user has disabled it. + - add_header: 'X-XSS-Protection "1; mode=block"' + + # http://www.gnuterrypratchett.com/ + - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"' + + - error_log: /var/log/nginx/gallery_remmy_foo.error.log + + - try_files: $uri $uri.html $uri/ =404 + + + - location /.well-known/acme-challenge: + - root: /srv/http + + - location /: + - proxy_http_version: '1.1' + - proxy_pass: http://127.0.0.1:8186 + - proxy_set_header: X-Real-IP $remote_addr + - proxy_set_header: X-Forwarded-Proto https + - proxy_set_header: X-Forwarded-Host $host + - proxy_set_header: X-Forwarded-Server $host + - proxy_set_header: X-Forwarded-For $proxy_add_x_forwarded_for + + gallery-static.remmy.foo: enabled: True config: @@ -29,4 +77,42 @@ nginx: - location /: - return: '301 https://$server_name$request_uri' + + - server: + - server_name: gallery-static.remmy.foo + - listen: 443 ssl http2 + - listen: '[::]:443 ssl http2' + + - ssl_certificate: /etc/letsencrypt/live/gallery-static.remmy.foo/fullchain.pem + - ssl_certificate_key: /etc/letsencrypt/live/gallery-static.remmy.foo/privkey.pem + - ssl_dhparam: /etc/nginx/dhparam.pem + + - ssl_stapling: 'on' + - ssl_stapling_verify: 'on' + - ssl_trusted_certificate: /etc/letsencrypt/live/gallery-static.remmy.foo/fullchain.pem + + # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security + - add_header: 'Strict-Transport-Security "max-age=31536000"' + + # Tell browsers not to render the page inside a frame, and avoid clickjacking. + - add_header: X-Frame-Options SAMEORIGIN + + # Tell browsers to not try to auto-detect the Content-Type. + - add_header: X-Content-Type-Options nosniff + + # Enable the Cross-site scripting filter in most recent browsers. + # Normally enabled by default, but enable it anyway if user has disabled it. + - add_header: 'X-XSS-Protection "1; mode=block"' + + # http://www.gnuterrypratchett.com/ + - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"' + + - error_log: /var/log/nginx/gallery_static_remmy_foo.error.log + + - location /.well-known/acme-challenge: + - root: /srv/http + + - location /: + - proxy_pass: http://gallery-static.remmy.io.eu-central-1.linodeobjects.com/ + # vim: ft=yaml et: diff --git a/nginx/remmy_foo.sls b/nginx/remmy_foo.sls index e0b57d6..e3b4b03 100644 --- a/nginx/remmy_foo.sls +++ b/nginx/remmy_foo.sls @@ -15,4 +15,47 @@ nginx: - location /: - return: '301 https://$server_name$request_uri' + + - server: + - server_name: remmy.foo + - listen: 443 ssl http2 + - listen: '[::]:443 ssl http2' + + - ssl_certificate: /etc/letsencrypt/live/remmy.foo/fullchain.pem + - ssl_certificate_key: /etc/letsencrypt/live/remmy.foo/privkey.pem + - ssl_dhparam: /etc/nginx/dhparam.pem + + - ssl_stapling: 'on' + - ssl_stapling_verify: 'on' + - ssl_trusted_certificate: /etc/letsencrypt/live/remmy.foo/fullchain.pem + + # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security + - add_header: 'Strict-Transport-Security "max-age=31536000"' + + # Tell browsers not to render the page inside a frame, and avoid clickjacking. + - add_header: X-Frame-Options SAMEORIGIN + + # Tell browsers to not try to auto-detect the Content-Type. + - add_header: X-Content-Type-Options nosniff + + # Enable the Cross-site scripting filter in most recent browsers. + # Normally enabled by default, but enable it anyway if user has disabled it. + - add_header: 'X-XSS-Protection "1; mode=block"' + + # http://www.gnuterrypratchett.com/ + - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"' + + - error_log: /var/log/nginx/remmy_foo.error.log + + - root: /home/kyrias/public_html/remmy.io/ + - index: start.html index.html + - autoindex: 'on' + - try_files: $uri $uri.html $uri/ =404 + + - location /.well-known/acme-challenge: + - root: /srv/http + + - location ~ \.(js|css|png): + - expires: modified +7d + # vim: ft=yaml et: |