blob: fe016b0ae076383292c3c2b200aa53e78c5275e5 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
server {
listen 80;
listen [::]:80;
server_name feeds.bnewbold.net;
access_log /var/log/nginx/feeds.access.log;
error_log /var/log/nginx/feeds.error.log;
location = /temboz_css {
proxy_pass http://127.0.0.1:9999/temboz_css;
proxy_redirect default;
}
location = /temboz.css {
proxy_pass http://127.0.0.1:9999/temboz.css;
proxy_redirect default;
}
location = /view {
proxy_pass http://127.0.0.1:9999/view?show=mylos;
proxy_redirect default;
}
location = / {
proxy_pass http://127.0.0.1:9999/view?show=mylos;
proxy_redirect default;
}
location ~* \.gif {
root /srv/http/feeds.bnewbold.net/temboz;
}
# Let's Encrypt SSL Certs
location /.well-known/acme-challenge/ {
root /var/www/letsencrypt;
autoindex off;
}
}
server {
listen 443 ssl spdy;
listen [::]:443 ssl spdy;
server_name feeds.bnewbold.net;
ssl_certificate /etc/letsencrypt/live/bnewbold.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/bnewbold.net/privkey.pem;
#add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'";
add_header X-Frame-Options "SAMEORIGIN";
add_header X-Content-Type-Options "nosniff";
add_header X-Xss-Protection "1";
# Enable STS with one year period (breaks http; optional)
#add_header Strict-Transport-Security "max-age=31557600; includeSubDomains";
access_log /var/log/nginx/feeds.access.log;
error_log /var/log/nginx/feeds.error.log;
# Let's Encrypt SSL Certs
location /.well-known/acme-challenge/ {
root /var/www/letsencrypt;
autoindex off;
}
location / {
proxy_pass http://127.0.0.1:9999;
proxy_redirect default;
auth_basic "Restricted";
auth_basic_user_file /srv/http/feeds.bnewbold.net/htpasswd;
}
location ~* \.gif {
root /srv/http/feeds.bnewbold.net/temboz;
}
}
|