diff options
Diffstat (limited to 'services/templates/nginx')
-rw-r--r-- | services/templates/nginx/common/acme-challenge | 3 | ||||
-rw-r--r-- | services/templates/nginx/common/http-listen | 2 | ||||
-rw-r--r-- | services/templates/nginx/common/https-listen | 3 | ||||
-rw-r--r-- | services/templates/nginx/common/https-redirect | 3 | ||||
-rw-r--r-- | services/templates/nginx/common/proxy-common | 7 | ||||
-rw-r--r-- | services/templates/nginx/conf.d/code.conf.template | 6 | ||||
-rw-r--r-- | services/templates/nginx/conf.d/forbid_unknown_domain.conf | 9 | ||||
-rw-r--r-- | services/templates/nginx/conf.d/mail.conf.template | 25 | ||||
-rw-r--r-- | services/templates/nginx/conf.d/root.conf.template | 36 | ||||
-rw-r--r-- | services/templates/nginx/conf.d/ssl.conf.template | 17 | ||||
-rw-r--r-- | services/templates/nginx/conf.d/timeline.conf.template | 6 | ||||
-rw-r--r-- | services/templates/nginx/conf.d/websocket.conf | 4 |
12 files changed, 121 insertions, 0 deletions
diff --git a/services/templates/nginx/common/acme-challenge b/services/templates/nginx/common/acme-challenge new file mode 100644 index 0000000..26054b8 --- /dev/null +++ b/services/templates/nginx/common/acme-challenge @@ -0,0 +1,3 @@ +location /.well-known/acme-challenge { + root /srv/acme; +} diff --git a/services/templates/nginx/common/http-listen b/services/templates/nginx/common/http-listen new file mode 100644 index 0000000..76cb18d --- /dev/null +++ b/services/templates/nginx/common/http-listen @@ -0,0 +1,2 @@ +listen 80; +listen [::]:80; diff --git a/services/templates/nginx/common/https-listen b/services/templates/nginx/common/https-listen new file mode 100644 index 0000000..db2f68e --- /dev/null +++ b/services/templates/nginx/common/https-listen @@ -0,0 +1,3 @@ +listen 443 ssl; +listen [::]:443 ssl; +http2 on; diff --git a/services/templates/nginx/common/https-redirect b/services/templates/nginx/common/https-redirect new file mode 100644 index 0000000..56d095d --- /dev/null +++ b/services/templates/nginx/common/https-redirect @@ -0,0 +1,3 @@ +location / { + return 301 https://$host$request_uri; +} diff --git a/services/templates/nginx/common/proxy-common b/services/templates/nginx/common/proxy-common new file mode 100644 index 0000000..4193548 --- /dev/null +++ b/services/templates/nginx/common/proxy-common @@ -0,0 +1,7 @@ +proxy_http_version 1.1; +proxy_set_header Upgrade $http_upgrade; +proxy_set_header Connection $connection_upgrade; +proxy_set_header Host $host; +proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; +proxy_set_header X-Forwarded-Proto $scheme; +proxy_set_header X-Real-IP $remote_addr; diff --git a/services/templates/nginx/conf.d/code.conf.template b/services/templates/nginx/conf.d/code.conf.template new file mode 100644 index 0000000..35f74d8 --- /dev/null +++ b/services/templates/nginx/conf.d/code.conf.template @@ -0,0 +1,6 @@ +server { + server_name code.@@CRUPEST_DOMAIN@@; + include common/http-listen; + + include common/acme-challenge; +} diff --git a/services/templates/nginx/conf.d/forbid_unknown_domain.conf b/services/templates/nginx/conf.d/forbid_unknown_domain.conf new file mode 100644 index 0000000..515942b --- /dev/null +++ b/services/templates/nginx/conf.d/forbid_unknown_domain.conf @@ -0,0 +1,9 @@ +server { + listen 80 default_server; + listen [::]:80 default_server; + listen 443 ssl default_server; + listen [::]:443 ssl default_server; + http2 on; + + return 444; +} diff --git a/services/templates/nginx/conf.d/mail.conf.template b/services/templates/nginx/conf.d/mail.conf.template new file mode 100644 index 0000000..2eb53d7 --- /dev/null +++ b/services/templates/nginx/conf.d/mail.conf.template @@ -0,0 +1,25 @@ +server { + server_name mail.@@CRUPEST_DOMAIN@@; + include common/https-listen; + + location / { + include common/proxy-common; + proxy_pass http://roundcubemail:80/; + } + + location /rspamd/ { + include common/proxy-common; + proxy_pass http://mailserver:11334/; + } + + client_max_body_size 5G; +} + + +server { + server_name mail.@@CRUPEST_DOMAIN@@; + include common/http-listen; + + include common/https-redirect; + include common/acme-challenge; +} diff --git a/services/templates/nginx/conf.d/root.conf.template b/services/templates/nginx/conf.d/root.conf.template new file mode 100644 index 0000000..8cd9174 --- /dev/null +++ b/services/templates/nginx/conf.d/root.conf.template @@ -0,0 +1,36 @@ +server { + server_name @@CRUPEST_DOMAIN@@; + include common/https-listen; + + location / { + root /srv/www; + } + + location /2fa/ { + include common/proxy-common; + proxy_pass http://2fauth:8000/; + } + + location /git/ { + include common/proxy-common; + proxy_pass http://git-server:80; + } + + location /_@@CRUPEST_V2RAY_PATH@@ { + if ($http_upgrade != "websocket") { + return 404; + } + + proxy_redirect off; + include common/proxy-common; + proxy_pass http://v2ray:10000; + } +} + +server { + server_name @@CRUPEST_DOMAIN@@; + include common/http-listen; + + include common/https-redirect; + include common/acme-challenge; +} diff --git a/services/templates/nginx/conf.d/ssl.conf.template b/services/templates/nginx/conf.d/ssl.conf.template new file mode 100644 index 0000000..181a1af --- /dev/null +++ b/services/templates/nginx/conf.d/ssl.conf.template @@ -0,0 +1,17 @@ +# This file contains important security parameters. If you modify this file +# manually, Certbot will be unable to automatically provide future security +# updates. Instead, Certbot will print and log an error message with a path to +# the up-to-date file that you will need to refer to when manually updating +# this file. Contents are based on https://ssl-config.mozilla.org + +ssl_certificate /etc/letsencrypt/live/@@CRUPEST_DOMAIN@@/fullchain.pem; +ssl_certificate_key /etc/letsencrypt/live/@@CRUPEST_DOMAIN@@/privkey.pem; + +ssl_session_cache shared:le_nginx_SSL:10m; +ssl_session_timeout 1440m; +ssl_session_tickets off; + +ssl_protocols TLSv1.2 TLSv1.3; +ssl_prefer_server_ciphers off; + +ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"; diff --git a/services/templates/nginx/conf.d/timeline.conf.template b/services/templates/nginx/conf.d/timeline.conf.template new file mode 100644 index 0000000..df4edf8 --- /dev/null +++ b/services/templates/nginx/conf.d/timeline.conf.template @@ -0,0 +1,6 @@ +server { + server_name timeline.@@CRUPEST_DOMAIN@@; + include common/http-listen; + + include common/acme-challenge; +} diff --git a/services/templates/nginx/conf.d/websocket.conf b/services/templates/nginx/conf.d/websocket.conf new file mode 100644 index 0000000..32af4c3 --- /dev/null +++ b/services/templates/nginx/conf.d/websocket.conf @@ -0,0 +1,4 @@ +map $http_upgrade $connection_upgrade { + default upgrade; + '' close; +} |