diff options
author | Johannes Löthberg <johannes@kyriasis.com> | 2024-05-16 21:13:26 +0000 |
---|---|---|
committer | Johannes Löthberg <johannes@kyriasis.com> | 2024-05-16 21:13:26 +0000 |
commit | 90387c8d355e975bfeec095631ab8dc3c3e7b121 (patch) | |
tree | f8c01781bc0d54368f61548b346d0ae54cc8290d /nginx | |
parent | 581316670a68d67d6ceed1650038cede4c3aea6d (diff) | |
download | pillar-90387c8d355e975bfeec095631ab8dc3c3e7b121.tar.xz |
Add vault.kyriasis.com
Diffstat (limited to 'nginx')
-rw-r--r-- | nginx/vault_kyriasis_com.sls | 74 |
1 files changed, 74 insertions, 0 deletions
diff --git a/nginx/vault_kyriasis_com.sls b/nginx/vault_kyriasis_com.sls new file mode 100644 index 0000000..e322883 --- /dev/null +++ b/nginx/vault_kyriasis_com.sls @@ -0,0 +1,74 @@ +nginx: + servers: + managed: + vault.kyriasis.com: + enabled: True + config: + - upstream vaultwarden: + - zone: vaultwarden 64k + - server: 127.0.0.1:5010 + - keepalive: 10 + + - 'map $http_upgrade $connection_upgrade': + - default: upgrade + - "''": "\"\"" + + - server: + - server_name: vault.kyriasis.com + - listen: 80 + - listen: '[::]:80' + + - location /.well-known/acme-challenge: + - root: /srv/http/ + + - location /: + - return: '301 https://$server_name$request_uri' + + + - server: + - server_name: vault.kyriasis.com + - listen: 443 ssl http2 + - listen: '[::]:443 ssl http2' + + - ssl_certificate: /etc/letsencrypt/live/vault.kyriasis.com/fullchain.pem + - ssl_certificate_key: /etc/letsencrypt/live/vault.kyriasis.com/privkey.pem + - ssl_dhparam: /etc/nginx/dhparam.pem + + - ssl_stapling: 'on' + - ssl_stapling_verify: 'on' + - ssl_trusted_certificate: /etc/letsencrypt/live/vault.kyriasis.com/fullchain.pem + + # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security + - add_header: 'Strict-Transport-Security "max-age=31536000"' + + # Tell browsers not to render the page inside a frame, and avoid clickjacking. + - add_header: X-Frame-Options SAMEORIGIN + + # Tell browsers to not try to auto-detect the Content-Type. + - add_header: X-Content-Type-Options nosniff + + # Enable the Cross-site scripting filter in most recent browsers. + # Normally enabled by default, but enable it anyway if user has disabled it. + - add_header: 'X-XSS-Protection "1; mode=block"' + + # http://www.gnuterrypratchett.com/ + - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"' + + - client_max_body_size: 525M + + - error_log: /var/log/nginx/vault.error.log + + - location /: + - proxy_pass: http://vaultwarden + - proxy_http_version: 1.1 + - proxy_set_header: 'Upgrade $http_upgrade' + - proxy_set_header: 'Connection $connection_upgrade' + - proxy_set_header: X-Real-IP $remote_addr + - proxy_set_header: X-Forwarded-For $proxy_add_x_forwarded_for + - proxy_set_header: X-Forwarded-Proto $scheme + - proxy_set_header: X-Forwarded-Host $server_name + + - location /.well-known/acme-challenge: + - root: /srv/http/ + +# vim: ft=yaml et: |