summaryrefslogtreecommitdiffstats
path: root/nginx/vault_kyriasis_com.sls
blob: e32288335eb66df070e8cd7a754dd9f4e6e80910 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
nginx:
  servers:
    managed:
      vault.kyriasis.com:
        enabled: True
        config:
          - upstream vaultwarden:
            - zone: vaultwarden 64k
            - server: 127.0.0.1:5010
            - keepalive: 10

          - 'map $http_upgrade $connection_upgrade':
            - default: upgrade
            - "''": "\"\""

          - server:
            - server_name: vault.kyriasis.com
            - listen: 80
            - listen: '[::]:80'

            - location /.well-known/acme-challenge:
              - root: /srv/http/

            - location /:
              - return: '301 https://$server_name$request_uri'


          - server:
            - server_name: vault.kyriasis.com
            - listen: 443 ssl http2
            - listen: '[::]:443 ssl http2'

            - ssl_certificate: /etc/letsencrypt/live/vault.kyriasis.com/fullchain.pem
            - ssl_certificate_key: /etc/letsencrypt/live/vault.kyriasis.com/privkey.pem
            - ssl_dhparam: /etc/nginx/dhparam.pem

            - ssl_stapling: 'on'
            - ssl_stapling_verify: 'on'
            - ssl_trusted_certificate: /etc/letsencrypt/live/vault.kyriasis.com/fullchain.pem

            # https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security
            - add_header: 'Strict-Transport-Security "max-age=31536000"' 

            # Tell browsers not to render the page inside a frame, and avoid clickjacking.
            - add_header: X-Frame-Options SAMEORIGIN

            # Tell browsers to not try to auto-detect the Content-Type.
            - add_header: X-Content-Type-Options nosniff

            # Enable the Cross-site scripting filter in most recent browsers.
            # Normally enabled by default, but enable it anyway if user has disabled it.
            - add_header: 'X-XSS-Protection "1; mode=block"'

            # http://www.gnuterrypratchett.com/
            - add_header: 'X-Clacks-Overhead "GNU Terry Pratchett"'

            - client_max_body_size: 525M

            - error_log: /var/log/nginx/vault.error.log

            - location /:
              - proxy_pass: http://vaultwarden
              - proxy_http_version: 1.1
              - proxy_set_header: 'Upgrade $http_upgrade'
              - proxy_set_header: 'Connection $connection_upgrade'
              - proxy_set_header: X-Real-IP $remote_addr
              - proxy_set_header: X-Forwarded-For $proxy_add_x_forwarded_for
              - proxy_set_header: X-Forwarded-Proto $scheme
              - proxy_set_header: X-Forwarded-Host $server_name

            - location /.well-known/acme-challenge:
              - root: /srv/http/

# vim: ft=yaml et: