This repository has been archived by the owner on Sep 29, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathnginx.conf
98 lines (76 loc) · 3.2 KB
/
nginx.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
worker_processes 2;
events {
worker_connections 768;
# multi_accept on;
}
http {
include /etc/nginx/mime.types;
default_type application/octet-stream;
gzip on;
server {
listen 80;
server_name dev.letsmeet.click letsmeet.click;
rewrite ^(.*) https://www.letsmeet.click$1;
}
server {
listen 80 default_server;
listen [::]:80;
server_name cname.letsmeet.click;
rewrite ^(.*) https://www.letsmeet.click/cname/$host/;
}
upstream letsmeet_server {
server unix:/home/uid1000/letsmeet/run/server.sock fail_timeout=0;
}
server {
listen 443 ssl;
listen [::]:443 ssl;
ssl_certificate /home/uid1000/letsmeet/nginx/fullchain.pem;
ssl_certificate_key /home/uid1000/letsmeet/nginx/privkey.pem;
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:10m;
ssl_session_tickets off;
# openssl dhparam -out dhparam.pem 2048
ssl_dhparam /home/uid1000/letsmeet/nginx/dhparam.pem;
ssl_protocols TLSv1.1 TLSv1.2;
ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK';
ssl_prefer_server_ciphers on;
add_header Strict-Transport-Security max-age=15768000;
ssl_stapling on;
ssl_stapling_verify on;
## verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate /home/uid1000/letsmeet/nginx/chain.pem;
resolver 8.8.8.8 8.8.4.4 valid=86400;
resolver_timeout 10;
server_name www.letsmeet.click;
if ($http_host = 'dev.letsmeet.click') {
return 307 $scheme://www.letsmeet.click$request_uri;
}
if ($http_host = 'letsmeet.click') {
return 307 $scheme://www.letsmeet.click$request_uri;
}
access_log /home/uid1000/letsmeet/logs/nginx-access.log;
error_log /home/uid1000/letsmeet/logs/nginx-error.log;
client_max_body_size 32M;
location /robots.txt {
alias /home/uid1000/letsmeet/static/robots.txt;
}
location /static/ {
alias /home/uid1000/letsmeet/static/;
}
location /media/ {
alias /home/uid1000/letsmeet/media/;
}
location / {
proxy_redirect off;
proxy_buffering off;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
if (!-f $request_filename) {
proxy_pass http://letsmeet_server;
break;
}
}
}
}