diff options
-rw-r--r-- | nginx/kyriasis_com.sls | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/nginx/kyriasis_com.sls b/nginx/kyriasis_com.sls index 11b24fe..58c5ddc 100644 --- a/nginx/kyriasis_com.sls +++ b/nginx/kyriasis_com.sls @@ -16,4 +16,48 @@ nginx: - location /: - return: '301 https://$server_name$request_uri' + + - server: + - server_name: kyriasis.com + - listen: 443 ssl http2 + - listen: '[::]:443 ssl http2' + + - ssl: 'on' + - ssl_certificate: /etc/letsencrypt/live/kyriasis.com/fullchain.pem + - ssl_certificate_key: /etc/letsencrypt/live/kyriasis.com/privkey.pem + - ssl_dhparam: /etc/nginx/dhparam.pem + + - ssl_stapling: 'on' + - ssl_stapling_verify: 'on' + - ssl_trusted_certificate: /etc/letsencrypt/live/kyriasis.com/fullchain.pem + + # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security + - add_header: 'Strict-Transport-Security "max-age=31536000"' + + # Tell browsers not to render the page inside a frame, and avoid clickjacking. + - add_header: X-Frame-Options SAMEORIGIN + + # Tell browsers to not try to auto-detect the Content-Type. + - add_header: X-Content-Type-Options nosniff + + # Enable the Cross-site scripting filter in most recent browsers. + # Normally enabled by default, but enable it anyway if user has disabled it. + - add_header: 'X-XSS-Protection "1; mode=block"' + + # http://www.gnuterrypratchett.com/ + - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"' + + - client_max_body_size: 128m + + - error_log: /var/log/nginx/kyriasis.com.error.log + + - location /.well-known/acme-challenge: + - root: /srv/http/ + + - location /.well-known/matrix/client: + - proxy_pass: https://matrix.kyriasis.com:8448 + - proxy_buffering: "off" + - proxy_set_header: X-Forwarded-For $remote_addr + - proxy_set_header: Host $host + # vim: ft=yaml et: |