server { listen 80; listen [::]:80; server_name feeds.bnewbold.net; access_log /var/log/nginx/feeds.access.log; error_log /var/log/nginx/feeds.error.log; location = /temboz_css { proxy_pass http://127.0.0.1:9999/temboz_css; proxy_redirect default; } location = /temboz.css { proxy_pass http://127.0.0.1:9999/temboz.css; proxy_redirect default; } location = /view { proxy_pass http://127.0.0.1:9999/view?show=mylos; proxy_redirect default; } location = / { proxy_pass http://127.0.0.1:9999/view?show=mylos; proxy_redirect default; } location ~* \.gif { root /srv/http/feeds.bnewbold.net/temboz; } # Let's Encrypt SSL Certs location /.well-known/acme-challenge/ { root /var/www/letsencrypt; autoindex off; } } server { listen 443 ssl spdy; listen [::]:443 ssl spdy; server_name feeds.bnewbold.net; ssl_certificate /etc/letsencrypt/live/bnewbold.net/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/bnewbold.net/privkey.pem; #add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'"; add_header X-Frame-Options "SAMEORIGIN"; add_header X-Content-Type-Options "nosniff"; add_header X-Xss-Protection "1"; # Enable STS with one year period (breaks http; optional) #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains"; access_log /var/log/nginx/feeds.access.log; error_log /var/log/nginx/feeds.error.log; # Let's Encrypt SSL Certs location /.well-known/acme-challenge/ { root /var/www/letsencrypt; autoindex off; } location / { proxy_pass http://127.0.0.1:9999; proxy_redirect default; auth_basic "Restricted"; auth_basic_user_file /srv/http/feeds.bnewbold.net/htpasswd; } location ~* \.gif { root /srv/http/feeds.bnewbold.net/temboz; } }