summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--nginx/gallery_remmy_foo.sls86
-rw-r--r--nginx/remmy_foo.sls43
2 files changed, 129 insertions, 0 deletions
diff --git a/nginx/gallery_remmy_foo.sls b/nginx/gallery_remmy_foo.sls
index a58379f..fc988ab 100644
--- a/nginx/gallery_remmy_foo.sls
+++ b/nginx/gallery_remmy_foo.sls
@@ -15,6 +15,54 @@ nginx:
- location /:
- return: '301 https://$server_name$request_uri'
+
+ - server:
+ - server_name: gallery.remmy.foo
+ - listen: 443 ssl http2
+ - listen: '[::]:443 ssl http2'
+
+ - ssl_certificate: /etc/letsencrypt/live/gallery.remmy.foo/fullchain.pem
+ - ssl_certificate_key: /etc/letsencrypt/live/gallery.remmy.foo/privkey.pem
+ - ssl_dhparam: /etc/nginx/dhparam.pem
+
+ - ssl_stapling: 'on'
+ - ssl_stapling_verify: 'on'
+ - ssl_trusted_certificate: /etc/letsencrypt/live/gallery.remmy.foo/fullchain.pem
+
+ # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security
+ - add_header: 'Strict-Transport-Security "max-age=31536000"'
+
+ # Tell browsers not to render the page inside a frame, and avoid clickjacking.
+ - add_header: X-Frame-Options SAMEORIGIN
+
+ # Tell browsers to not try to auto-detect the Content-Type.
+ - add_header: X-Content-Type-Options nosniff
+
+ # Enable the Cross-site scripting filter in most recent browsers.
+ # Normally enabled by default, but enable it anyway if user has disabled it.
+ - add_header: 'X-XSS-Protection "1; mode=block"'
+
+ # http://www.gnuterrypratchett.com/
+ - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"'
+
+ - error_log: /var/log/nginx/gallery_remmy_foo.error.log
+
+ - try_files: $uri $uri.html $uri/ =404
+
+
+ - location /.well-known/acme-challenge:
+ - root: /srv/http
+
+ - location /:
+ - proxy_http_version: '1.1'
+ - proxy_pass: http://127.0.0.1:8186
+ - proxy_set_header: X-Real-IP $remote_addr
+ - proxy_set_header: X-Forwarded-Proto https
+ - proxy_set_header: X-Forwarded-Host $host
+ - proxy_set_header: X-Forwarded-Server $host
+ - proxy_set_header: X-Forwarded-For $proxy_add_x_forwarded_for
+
+
gallery-static.remmy.foo:
enabled: True
config:
@@ -29,4 +77,42 @@ nginx:
- location /:
- return: '301 https://$server_name$request_uri'
+
+ - server:
+ - server_name: gallery-static.remmy.foo
+ - listen: 443 ssl http2
+ - listen: '[::]:443 ssl http2'
+
+ - ssl_certificate: /etc/letsencrypt/live/gallery-static.remmy.foo/fullchain.pem
+ - ssl_certificate_key: /etc/letsencrypt/live/gallery-static.remmy.foo/privkey.pem
+ - ssl_dhparam: /etc/nginx/dhparam.pem
+
+ - ssl_stapling: 'on'
+ - ssl_stapling_verify: 'on'
+ - ssl_trusted_certificate: /etc/letsencrypt/live/gallery-static.remmy.foo/fullchain.pem
+
+ # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security
+ - add_header: 'Strict-Transport-Security "max-age=31536000"'
+
+ # Tell browsers not to render the page inside a frame, and avoid clickjacking.
+ - add_header: X-Frame-Options SAMEORIGIN
+
+ # Tell browsers to not try to auto-detect the Content-Type.
+ - add_header: X-Content-Type-Options nosniff
+
+ # Enable the Cross-site scripting filter in most recent browsers.
+ # Normally enabled by default, but enable it anyway if user has disabled it.
+ - add_header: 'X-XSS-Protection "1; mode=block"'
+
+ # http://www.gnuterrypratchett.com/
+ - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"'
+
+ - error_log: /var/log/nginx/gallery_static_remmy_foo.error.log
+
+ - location /.well-known/acme-challenge:
+ - root: /srv/http
+
+ - location /:
+ - proxy_pass: http://gallery-static.remmy.io.eu-central-1.linodeobjects.com/
+
# vim: ft=yaml et:
diff --git a/nginx/remmy_foo.sls b/nginx/remmy_foo.sls
index e0b57d6..e3b4b03 100644
--- a/nginx/remmy_foo.sls
+++ b/nginx/remmy_foo.sls
@@ -15,4 +15,47 @@ nginx:
- location /:
- return: '301 https://$server_name$request_uri'
+
+ - server:
+ - server_name: remmy.foo
+ - listen: 443 ssl http2
+ - listen: '[::]:443 ssl http2'
+
+ - ssl_certificate: /etc/letsencrypt/live/remmy.foo/fullchain.pem
+ - ssl_certificate_key: /etc/letsencrypt/live/remmy.foo/privkey.pem
+ - ssl_dhparam: /etc/nginx/dhparam.pem
+
+ - ssl_stapling: 'on'
+ - ssl_stapling_verify: 'on'
+ - ssl_trusted_certificate: /etc/letsencrypt/live/remmy.foo/fullchain.pem
+
+ # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security
+ - add_header: 'Strict-Transport-Security "max-age=31536000"'
+
+ # Tell browsers not to render the page inside a frame, and avoid clickjacking.
+ - add_header: X-Frame-Options SAMEORIGIN
+
+ # Tell browsers to not try to auto-detect the Content-Type.
+ - add_header: X-Content-Type-Options nosniff
+
+ # Enable the Cross-site scripting filter in most recent browsers.
+ # Normally enabled by default, but enable it anyway if user has disabled it.
+ - add_header: 'X-XSS-Protection "1; mode=block"'
+
+ # http://www.gnuterrypratchett.com/
+ - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"'
+
+ - error_log: /var/log/nginx/remmy_foo.error.log
+
+ - root: /home/kyrias/public_html/remmy.io/
+ - index: start.html index.html
+ - autoindex: 'on'
+ - try_files: $uri $uri.html $uri/ =404
+
+ - location /.well-known/acme-challenge:
+ - root: /srv/http
+
+ - location ~ \.(js|css|png):
+ - expires: modified +7d
+
# vim: ft=yaml et: