diff options
author | Yuqian Yang <crupest@crupest.life> | 2025-03-09 17:31:21 +0800 |
---|---|---|
committer | Yuqian Yang <crupest@crupest.life> | 2025-03-09 18:46:54 +0800 |
commit | ac7c3e0ab3b460a5a96df04496e6f310ef9572d0 (patch) | |
tree | 712d9f164db7623498a97b3778e2322c5d4a9752 /services/docker/nginx/configs | |
parent | 4915c92a8ff30439676cb328864acab050538f37 (diff) | |
download | crupest-ac7c3e0ab3b460a5a96df04496e6f310ef9572d0.tar.gz crupest-ac7c3e0ab3b460a5a96df04496e6f310ef9572d0.tar.bz2 crupest-ac7c3e0ab3b460a5a96df04496e6f310ef9572d0.zip |
feat(service): mv config to docker imagei, better pri/pub git.
Diffstat (limited to 'services/docker/nginx/configs')
12 files changed, 134 insertions, 0 deletions
diff --git a/services/docker/nginx/configs/common/acme-challenge b/services/docker/nginx/configs/common/acme-challenge new file mode 100644 index 0000000..26054b8 --- /dev/null +++ b/services/docker/nginx/configs/common/acme-challenge @@ -0,0 +1,3 @@ +location /.well-known/acme-challenge { + root /srv/acme; +} diff --git a/services/docker/nginx/configs/common/http-listen b/services/docker/nginx/configs/common/http-listen new file mode 100644 index 0000000..76cb18d --- /dev/null +++ b/services/docker/nginx/configs/common/http-listen @@ -0,0 +1,2 @@ +listen 80; +listen [::]:80; diff --git a/services/docker/nginx/configs/common/https-listen b/services/docker/nginx/configs/common/https-listen new file mode 100644 index 0000000..db2f68e --- /dev/null +++ b/services/docker/nginx/configs/common/https-listen @@ -0,0 +1,3 @@ +listen 443 ssl; +listen [::]:443 ssl; +http2 on; diff --git a/services/docker/nginx/configs/common/https-redirect b/services/docker/nginx/configs/common/https-redirect new file mode 100644 index 0000000..56d095d --- /dev/null +++ b/services/docker/nginx/configs/common/https-redirect @@ -0,0 +1,3 @@ +location / { + return 301 https://$host$request_uri; +} diff --git a/services/docker/nginx/configs/common/proxy-common b/services/docker/nginx/configs/common/proxy-common new file mode 100644 index 0000000..4193548 --- /dev/null +++ b/services/docker/nginx/configs/common/proxy-common @@ -0,0 +1,7 @@ +proxy_http_version 1.1; +proxy_set_header Upgrade $http_upgrade; +proxy_set_header Connection $connection_upgrade; +proxy_set_header Host $host; +proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; +proxy_set_header X-Forwarded-Proto $scheme; +proxy_set_header X-Real-IP $remote_addr; diff --git a/services/docker/nginx/configs/conf.d/default.conf b/services/docker/nginx/configs/conf.d/default.conf new file mode 100644 index 0000000..515942b --- /dev/null +++ b/services/docker/nginx/configs/conf.d/default.conf @@ -0,0 +1,9 @@ +server { + listen 80 default_server; + listen [::]:80 default_server; + listen 443 ssl default_server; + listen [::]:443 ssl default_server; + http2 on; + + return 444; +} diff --git a/services/docker/nginx/configs/conf.d/websocket.conf b/services/docker/nginx/configs/conf.d/websocket.conf new file mode 100644 index 0000000..32af4c3 --- /dev/null +++ b/services/docker/nginx/configs/conf.d/websocket.conf @@ -0,0 +1,4 @@ +map $http_upgrade $connection_upgrade { + default upgrade; + '' close; +} diff --git a/services/docker/nginx/configs/templates/code.conf.template b/services/docker/nginx/configs/templates/code.conf.template new file mode 100644 index 0000000..aa70ebc --- /dev/null +++ b/services/docker/nginx/configs/templates/code.conf.template @@ -0,0 +1,6 @@ +server { + server_name code.${CRUPEST_DOMAIN}; + include common/http-listen; + + include common/acme-challenge; +} diff --git a/services/docker/nginx/configs/templates/mail.conf.template b/services/docker/nginx/configs/templates/mail.conf.template new file mode 100644 index 0000000..7f5f215 --- /dev/null +++ b/services/docker/nginx/configs/templates/mail.conf.template @@ -0,0 +1,29 @@ +server { + server_name mail.${CRUPEST_DOMAIN}; + include common/https-listen; + + location = /robots.txt { + root /srv/mail; + } + + location / { + include common/proxy-common; + proxy_pass http://roundcubemail:80/; + } + + location /rspamd/ { + include common/proxy-common; + proxy_pass http://mailserver:11334/; + } + + client_max_body_size 5G; +} + + +server { + server_name mail.${CRUPEST_DOMAIN}; + include common/http-listen; + + include common/https-redirect; + include common/acme-challenge; +} diff --git a/services/docker/nginx/configs/templates/root.conf.template b/services/docker/nginx/configs/templates/root.conf.template new file mode 100644 index 0000000..e3e93ad --- /dev/null +++ b/services/docker/nginx/configs/templates/root.conf.template @@ -0,0 +1,45 @@ +server { + server_name ${CRUPEST_DOMAIN}; + include common/https-listen; + + location / { + root /srv/www; + } + + location /2fa/ { + include common/proxy-common; + proxy_pass http://2fauth:8000/; + } + + location /git/ { + include common/proxy-common; + client_max_body_size 5G; + proxy_pass http://git-server:3636; + } + + location = /github { + return 301 ${CRUPEST_GITHUB}; + } + + location = /github/ { + return 301 ${CRUPEST_GITHUB}; + } + + location /_${CRUPEST_V2RAY_PATH} { + if ($http_upgrade != "websocket") { + return 404; + } + + proxy_redirect off; + include common/proxy-common; + proxy_pass http://v2ray:10000; + } +} + +server { + server_name ${CRUPEST_DOMAIN}; + include common/http-listen; + + include common/https-redirect; + include common/acme-challenge; +} diff --git a/services/docker/nginx/configs/templates/ssl.conf.template b/services/docker/nginx/configs/templates/ssl.conf.template new file mode 100644 index 0000000..54205f1 --- /dev/null +++ b/services/docker/nginx/configs/templates/ssl.conf.template @@ -0,0 +1,17 @@ +# This file contains important security parameters. If you modify this file +# manually, Certbot will be unable to automatically provide future security +# updates. Instead, Certbot will print and log an error message with a path to +# the up-to-date file that you will need to refer to when manually updating +# this file. Contents are based on https://ssl-config.mozilla.org + +ssl_certificate /etc/letsencrypt/live/${CRUPEST_DOMAIN}/fullchain.pem; +ssl_certificate_key /etc/letsencrypt/live/${CRUPEST_DOMAIN}/privkey.pem; + +ssl_session_cache shared:le_nginx_SSL:10m; +ssl_session_timeout 1440m; +ssl_session_tickets off; + +ssl_protocols TLSv1.2 TLSv1.3; +ssl_prefer_server_ciphers off; + +ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"; diff --git a/services/docker/nginx/configs/templates/timeline.conf.template b/services/docker/nginx/configs/templates/timeline.conf.template new file mode 100644 index 0000000..a467594 --- /dev/null +++ b/services/docker/nginx/configs/templates/timeline.conf.template @@ -0,0 +1,6 @@ +server { + server_name timeline.${CRUPEST_DOMAIN}; + include common/http-listen; + + include common/acme-challenge; +} |