nginx: servers: managed: vault.kyriasis.com: enabled: True config: - upstream vaultwarden: - zone: vaultwarden 64k - server: 127.0.0.1:5010 - keepalive: 10 - 'map $http_upgrade $connection_upgrade': - default: upgrade - "''": "\"\"" - server: - server_name: vault.kyriasis.com - listen: 80 - listen: '[::]:80' - location /.well-known/acme-challenge: - root: /srv/http/ - location /: - return: '301 https://$server_name$request_uri' - server: - server_name: vault.kyriasis.com - listen: 443 ssl http2 - listen: '[::]:443 ssl http2' - ssl_certificate: /etc/letsencrypt/live/vault.kyriasis.com/fullchain.pem - ssl_certificate_key: /etc/letsencrypt/live/vault.kyriasis.com/privkey.pem - ssl_dhparam: /etc/nginx/dhparam.pem - ssl_stapling: 'on' - ssl_stapling_verify: 'on' - ssl_trusted_certificate: /etc/letsencrypt/live/vault.kyriasis.com/fullchain.pem # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security - add_header: 'Strict-Transport-Security "max-age=31536000"' # Tell browsers not to render the page inside a frame, and avoid clickjacking. - add_header: X-Frame-Options SAMEORIGIN # Tell browsers to not try to auto-detect the Content-Type. - add_header: X-Content-Type-Options nosniff # Enable the Cross-site scripting filter in most recent browsers. # Normally enabled by default, but enable it anyway if user has disabled it. - add_header: 'X-XSS-Protection "1; mode=block"' # http://www.gnuterrypratchett.com/ - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"' - client_max_body_size: 525M - error_log: /var/log/nginx/vault.error.log - location /: - proxy_pass: http://vaultwarden - proxy_http_version: 1.1 - proxy_set_header: 'Upgrade $http_upgrade' - proxy_set_header: 'Connection $connection_upgrade' - proxy_set_header: X-Real-IP $remote_addr - proxy_set_header: X-Forwarded-For $proxy_add_x_forwarded_for - proxy_set_header: X-Forwarded-Proto $scheme - proxy_set_header: X-Forwarded-Host $server_name - location /.well-known/acme-challenge: - root: /srv/http/ # vim: ft=yaml et: