blob: 777665b632a2c7c9261c928b169cba86e75f66b6 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
For a static website:
server {
listen 80;
listen [::]:80;
server_name <example.com>;
root /srv/http/<example.com>/www;
index index.html;
location / {
try_files $uri $uri/ =404;
}
}
For a reverse proxied website:
server {
listen 80;
listen [::]:80;
server_name <example.com>;
location = /favicon.ico {
access_log off;
log_not_found off;
}
location /theme_static/ {
alias /some/static/files/dir/theme_static/;
}
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://127.0.0.1:<localport>;
}
}
For SSL stuff, add this to the body:
listen 443 ssl http2;
listen [::]:443 ssl http2;
ssl_certificate /etc/letsencrypt/live/<cert-name>/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/<cert-name>/privkey.pem;
add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'";
#add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'";
add_header X-Frame-Options "SAMEORIGIN"; # 'always' if nginx > 1.7.5
add_header X-Content-Type-Options "nosniff"; # 'always' if nginx > 1.7.5
add_header X-Xss-Protection "1";
# Enable STS with one year period (breaks http; optional)
#add_header Strict-Transport-Security "max-age=31557600; includeSubDomains";
if ($scheme = http) {
return 301 https://$server_name$request_uri;
}
# Let's Encrypt SSL Certs
location /.well-known/acme-challenge/ {
root /var/www/letsencrypt;
autoindex off;
}
If your site is going to have inline Javascript (pretty common), you might need
to swith the Content-Security-Policy line to:
add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'";
|