From b9bd44812273e94f5eebd5bc454694291992c29c Mon Sep 17 00:00:00 2001 From: packetcat Date: Fri, 3 Mar 2023 10:11:00 -0500 Subject: [PATCH] add nginx config for molly --- ubuntu/molly.silvestris.systems.yml | 153 ++++++++++++++++++++++++++++ 1 file changed, 153 insertions(+) create mode 100644 ubuntu/molly.silvestris.systems.yml diff --git a/ubuntu/molly.silvestris.systems.yml b/ubuntu/molly.silvestris.systems.yml new file mode 100644 index 0000000..30b217b --- /dev/null +++ b/ubuntu/molly.silvestris.systems.yml @@ -0,0 +1,153 @@ +--- +- hosts: molly.silvestris.systems + + roles: + - role: jdauphant.nginx + nginx_user: "www-data" + nginx_events_params: + - worker_connections 1024 + nginx_http_params: + - sendfile "on" + - server_names_hash_bucket_size 512 + nginx_sites: + tenforward.social.http: + - listen *:80 + - listen [::]:80 + - server_name tenforward.social + - location /.well-known/acme-challenge/ { + allow all; + } + - return 301 "https://$host$request_uri" + tenforward.social.https: + - listen *:443 ssl http2 + - listen [::]:443 ssl http2 + - server_name tenforward.social + - root "/home/mastodon/live/public" + - access_log "/var/log/nginx/tenforward.social.access.log" + - error_log "/var/log/nginx/tenforward.social.error.log" + - ssl_certificate "/etc/ssl/letsencrypt/tenforward.social.crt" + - ssl_certificate_key "/etc/ssl/letsencrypt/tenforward.social.pem" + - add_header Referrer-Policy "no-referrer, strict-origin-when-cross-origin" + - add_header Strict-Transport-Security max-age=31536000 + - add_header Access-Control-Allow-Origin * + - include snippets/blockbots.conf + - client_max_body_size 0 + - location / { + try_files $uri @proxy; + } + - location = /sw.js { + add_header Cache-Control "public, max-age=604800, must-revalidate"; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + try_files $uri =404; + } + - location ~ ^/assets/ { + add_header Cache-Control "public, max-age=2419200, must-revalidate"; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + try_files $uri =404; + } + - location ~ ^/avatars/ { + add_header Cache-Control "public, max-age=2419200, must-revalidate"; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + try_files $uri =404; + } + - location ~ ^/emoji/ { + add_header Cache-Control "public, max-age=2419200, must-revalidate"; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + try_files $uri =404; + } + - location ~ ^/headers/ { + add_header Cache-Control "public, max-age=2419200, must-revalidate"; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + try_files $uri =404; + } + - location ~ ^/packs/ { + add_header Cache-Control "public, max-age=2419200, must-revalidate"; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + try_files $uri =404; + } + - location ~ ^/shortcuts/ { + add_header Cache-Control "public, max-age=2419200, must-revalidate"; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + try_files $uri =404; + } + - location ~ ^/sounds/ { + add_header Cache-Control "public, max-age=2419200, must-revalidate"; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + try_files $uri =404; + } + - location ~ ^/system/ { + add_header Cache-Control "public, max-age=2419200, immutable"; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + try_files $uri =404; + } + - location ^~ /api/v1/streaming { + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header Proxy ""; + proxy_pass http://streaming; + proxy_buffering off; + proxy_redirect off; + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection $connection_upgrade; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; + tcp_nodelay on; + } + - location @proxy { + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header Proxy ""; + proxy_pass_header Server; + proxy_pass http://backend; + proxy_buffering on; + proxy_redirect off; + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection $connection_upgrade; + proxy_cache CACHE; + proxy_cache_valid 200 7d; + proxy_cache_valid 410 24h; + proxy_cache_use_stale error timeout updating http_500 http_502 http_503 http_504; + add_header X-Cached $upstream_cache_status; + tcp_nodelay on; + } + - error_page 404 500 501 502 503 504 /500.html; + nginx_configs: + gzip: + - gzip on + - gzip_disable msie6 + - gzip_vary on + - gzip_proxied any + - gzip_comp_level 6 + - gzip_buffers 16 8k + - gzip_http_version 1.1 + - gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript + connectionupgrade: + - map $http_upgrade $connection_upgrade { + default upgrade; + '' close; + } + proxycache: + - proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=1g + ssl: + - ssl_protocols TLSv1.2 TLSv1.3 + - ssl_dhparam "/etc/nginx/dhparams.pem" + - ssl_session_timeout 1d + - ssl_session_cache shared:SSL:50m + - ssl_session_tickets off + upstreams: + - upstream backend { + server 127.0.0.1:3000 fail_timeout=0; + } + - upstream streaming { + server 127.0.0.1:4000 fail_timeout=0; + } + nginx_snippets: + blockbots: + - if ($http_user_agent ~* (LanaiBotmarch|lanaibot|TinyTestBot|TinyBotTestUA) ) { + return 403; + }