diff --git a/roles/mastodon-nginx/tasks/main.yml b/roles/mastodon-nginx/tasks/main.yml new file mode 100644 index 0000000..2c74f0f --- /dev/null +++ b/roles/mastodon-nginx/tasks/main.yml @@ -0,0 +1,29 @@ +--- +# This role install nginx, configures it and sets up a Let's Encrypt certificate for the +# Mastodon instance + +- name: Install nginx and letsencrypt + apt: name={{ item }} state=latest update_cache=yes + with_items: + - nginx + - letsencrypt +- name: Stop nginx for now + service: name=nginx state=stopped +- name: Generate Let's Encrypt TLS certificate for Mastodon instance + shell: letsencrypt certonly -n --agree-tos --standalone -d {{ mastodon_hostname }} +- name: Remove default nginx config in sites-enabled + file: + path: /etc/nginx/sites-enabled/default + state: absent +- name: Copy Mastodon nginx vhost template to sites-available + copy: + src: mastodon-nginx.conf + dest: /etc/nginx/sites-available/{{ mastodon_hostname }}.conf + backup: yes +- name: Enable Mastodon nginx vhost template + file: + src: /etc/nginx/sites-available/{{ mastodon_hostname }}.conf + dest: /etc/nginx/sites-enabled/{{ mastodon_hostname }}.conf + state: link +- name: Start nginx + service: name=nginx state=started diff --git a/roles/mastodon-nginx/templates/mastodon-nginx.conf b/roles/mastodon-nginx/templates/mastodon-nginx.conf new file mode 100644 index 0000000..ea8f3a5 --- /dev/null +++ b/roles/mastodon-nginx/templates/mastodon-nginx.conf @@ -0,0 +1,95 @@ +map $http_upgrade $connection_upgrade { + default upgrade; + '' close; +} + +server { + listen 80; + listen [::]:80; + server_name {{ mastodon_hostname }}; + # Useful for Let's Encrypt + location /.well-known/acme-challenge/ { allow all; } + location / { return 301 https://$host$request_uri; } +} + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + server_name {{ mastodon_hostname }}; + + ssl_protocols TLSv1.2; + ssl_ciphers HIGH:!MEDIUM:!LOW:!aNULL:!NULL:!SHA; + ssl_prefer_server_ciphers on; + ssl_session_cache shared:SSL:10m; + + ssl_certificate /etc/letsencrypt/live/{{ mastodon_hostname }}/fullchain.pem; + ssl_certificate_key /etc/letsencrypt/live/{{ mastodon_hostname }}/privkey.pem; + + keepalive_timeout 70; + sendfile on; + client_max_body_size 0; + + root /home/mastodon/live/public; + + gzip on; + gzip_disable "msie6"; + gzip_vary on; + gzip_proxied any; + gzip_comp_level 6; + gzip_buffers 16 8k; + gzip_http_version 1.1; + gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript; + + add_header Strict-Transport-Security "max-age=31536000"; + + location / { + try_files $uri @proxy; + } + + location ~ ^/(emoji|packs|system/accounts/avatars|system/media_attachments/files) { + add_header Cache-Control "public, max-age=31536000, immutable"; + try_files $uri @proxy; + } + + location /sw.js { + add_header Cache-Control "public, max-age=0"; + try_files $uri @proxy; + } + + location @proxy { + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto https; + proxy_set_header Proxy ""; + proxy_pass_header Server; + + proxy_pass http://127.0.0.1:3000; + proxy_buffering off; + proxy_redirect off; + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection $connection_upgrade; + + tcp_nodelay on; + } + + location /api/v1/streaming { + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto https; + proxy_set_header Proxy ""; + + proxy_pass http://127.0.0.1:4000; + proxy_buffering off; + proxy_redirect off; + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection $connection_upgrade; + + tcp_nodelay on; + } + + error_page 500 501 502 503 504 /500.html; +}