bundlewrap/bundles/nginx/files/site_template

45 lines
1.6 KiB
Text
Raw Normal View History

server {
server_name ${domain};
root ${webroot if webroot else '/var/www/{}/'.format(domain)};
index ${index if index else 'index.html index.htm'};
listen 443 ssl http2;
listen [::]:443 ssl http2;
ssl_certificate /var/lib/dehydrated/certs/${domain}/fullchain.pem;
ssl_certificate_key /var/lib/dehydrated/certs/${domain}/privkey.pem;
ssl_dhparam /etc/ssl/certs/dhparam.pem;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384;
ssl_prefer_server_ciphers on;
ssl_session_cache shared:SSL:10m;
ssl_stapling on;
ssl_stapling_verify on;
add_header Strict-Transport-Security "max-age=31104000; preload";
2020-06-01 09:31:13 +00:00
add_header Referrer-Policy same-origin;
add_header X-Frame-Options "DENY";
2020-06-01 09:31:13 +00:00
add_header X-Content-Type-Options nosniff;
location /.well-known/acme-challenge/ {
alias /var/lib/dehydrated/acme-challenges/;
}
2020-06-01 09:31:13 +00:00
% if proxy:
% for location, proxy_pass in proxy.items():
location ${location} {
proxy_pass ${proxy_pass};
proxy_set_header X-Script-Name /;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto HTTPS;
proxy_set_header X-Forwarded-Host ${domain};
proxy_buffering off;
}
% endfor
% endif
% if extras:
<%include file="extras/${node.name}/${domain}" />
% endif
}