add nginx config for molly
This commit is contained in:
parent
39c53f1eae
commit
b9bd448122
|
@ -0,0 +1,153 @@
|
|||
---
|
||||
- hosts: molly.silvestris.systems
|
||||
|
||||
roles:
|
||||
- role: jdauphant.nginx
|
||||
nginx_user: "www-data"
|
||||
nginx_events_params:
|
||||
- worker_connections 1024
|
||||
nginx_http_params:
|
||||
- sendfile "on"
|
||||
- server_names_hash_bucket_size 512
|
||||
nginx_sites:
|
||||
tenforward.social.http:
|
||||
- listen *:80
|
||||
- listen [::]:80
|
||||
- server_name tenforward.social
|
||||
- location /.well-known/acme-challenge/ {
|
||||
allow all;
|
||||
}
|
||||
- return 301 "https://$host$request_uri"
|
||||
tenforward.social.https:
|
||||
- listen *:443 ssl http2
|
||||
- listen [::]:443 ssl http2
|
||||
- server_name tenforward.social
|
||||
- root "/home/mastodon/live/public"
|
||||
- access_log "/var/log/nginx/tenforward.social.access.log"
|
||||
- error_log "/var/log/nginx/tenforward.social.error.log"
|
||||
- ssl_certificate "/etc/ssl/letsencrypt/tenforward.social.crt"
|
||||
- ssl_certificate_key "/etc/ssl/letsencrypt/tenforward.social.pem"
|
||||
- add_header Referrer-Policy "no-referrer, strict-origin-when-cross-origin"
|
||||
- add_header Strict-Transport-Security max-age=31536000
|
||||
- add_header Access-Control-Allow-Origin *
|
||||
- include snippets/blockbots.conf
|
||||
- client_max_body_size 0
|
||||
- location / {
|
||||
try_files $uri @proxy;
|
||||
}
|
||||
- location = /sw.js {
|
||||
add_header Cache-Control "public, max-age=604800, must-revalidate";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
try_files $uri =404;
|
||||
}
|
||||
- location ~ ^/assets/ {
|
||||
add_header Cache-Control "public, max-age=2419200, must-revalidate";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
try_files $uri =404;
|
||||
}
|
||||
- location ~ ^/avatars/ {
|
||||
add_header Cache-Control "public, max-age=2419200, must-revalidate";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
try_files $uri =404;
|
||||
}
|
||||
- location ~ ^/emoji/ {
|
||||
add_header Cache-Control "public, max-age=2419200, must-revalidate";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
try_files $uri =404;
|
||||
}
|
||||
- location ~ ^/headers/ {
|
||||
add_header Cache-Control "public, max-age=2419200, must-revalidate";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
try_files $uri =404;
|
||||
}
|
||||
- location ~ ^/packs/ {
|
||||
add_header Cache-Control "public, max-age=2419200, must-revalidate";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
try_files $uri =404;
|
||||
}
|
||||
- location ~ ^/shortcuts/ {
|
||||
add_header Cache-Control "public, max-age=2419200, must-revalidate";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
try_files $uri =404;
|
||||
}
|
||||
- location ~ ^/sounds/ {
|
||||
add_header Cache-Control "public, max-age=2419200, must-revalidate";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
try_files $uri =404;
|
||||
}
|
||||
- location ~ ^/system/ {
|
||||
add_header Cache-Control "public, max-age=2419200, immutable";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
try_files $uri =404;
|
||||
}
|
||||
- location ^~ /api/v1/streaming {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header Proxy "";
|
||||
proxy_pass http://streaming;
|
||||
proxy_buffering off;
|
||||
proxy_redirect off;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection $connection_upgrade;
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
|
||||
tcp_nodelay on;
|
||||
}
|
||||
- location @proxy {
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header Proxy "";
|
||||
proxy_pass_header Server;
|
||||
proxy_pass http://backend;
|
||||
proxy_buffering on;
|
||||
proxy_redirect off;
|
||||
proxy_http_version 1.1;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection $connection_upgrade;
|
||||
proxy_cache CACHE;
|
||||
proxy_cache_valid 200 7d;
|
||||
proxy_cache_valid 410 24h;
|
||||
proxy_cache_use_stale error timeout updating http_500 http_502 http_503 http_504;
|
||||
add_header X-Cached $upstream_cache_status;
|
||||
tcp_nodelay on;
|
||||
}
|
||||
- error_page 404 500 501 502 503 504 /500.html;
|
||||
nginx_configs:
|
||||
gzip:
|
||||
- gzip on
|
||||
- gzip_disable msie6
|
||||
- gzip_vary on
|
||||
- gzip_proxied any
|
||||
- gzip_comp_level 6
|
||||
- gzip_buffers 16 8k
|
||||
- gzip_http_version 1.1
|
||||
- gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript
|
||||
connectionupgrade:
|
||||
- map $http_upgrade $connection_upgrade {
|
||||
default upgrade;
|
||||
'' close;
|
||||
}
|
||||
proxycache:
|
||||
- proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=1g
|
||||
ssl:
|
||||
- ssl_protocols TLSv1.2 TLSv1.3
|
||||
- ssl_dhparam "/etc/nginx/dhparams.pem"
|
||||
- ssl_session_timeout 1d
|
||||
- ssl_session_cache shared:SSL:50m
|
||||
- ssl_session_tickets off
|
||||
upstreams:
|
||||
- upstream backend {
|
||||
server 127.0.0.1:3000 fail_timeout=0;
|
||||
}
|
||||
- upstream streaming {
|
||||
server 127.0.0.1:4000 fail_timeout=0;
|
||||
}
|
||||
nginx_snippets:
|
||||
blockbots:
|
||||
- if ($http_user_agent ~* (LanaiBotmarch|lanaibot|TinyTestBot|TinyBotTestUA) ) {
|
||||
return 403;
|
||||
}
|
Loading…
Reference in New Issue