parent
					
						
							
								0e61131c1b
							
						
					
				
			
			
				commit
				
					
						6824bf5e4f
					
				
			
		
					 9 changed files with 370 additions and 0 deletions
				
			
		
							
								
								
									
										64
									
								
								resources/chaosknoten/ntfy/nginx/ntfy.hamburg.ccc.de.conf
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										64
									
								
								resources/chaosknoten/ntfy/nginx/ntfy.hamburg.ccc.de.conf
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,64 @@ | |||
| # partly generated 2022-01-08, Mozilla Guideline v5.6, nginx 1.17.7, OpenSSL 1.1.1k, intermediate configuration | ||||
| # https://ssl-config.mozilla.org/#server=nginx&version=1.17.7&config=intermediate&openssl=1.1.1k&guideline=5.6 | ||||
| server { | ||||
|     # Listen on a custom port for the proxy protocol. | ||||
|     listen 8443 ssl proxy_protocol; | ||||
|     http2 on; | ||||
|     # Make use of the ngx_http_realip_module to set the $remote_addr and | ||||
|     # $remote_port to the client address and client port, when using proxy | ||||
|     # protocol. | ||||
|     # First set our proxy protocol proxy as trusted. | ||||
|     set_real_ip_from 172.31.17.140; | ||||
|     # Then tell the realip_module to get the addreses from the proxy protocol | ||||
|     # header. | ||||
|     real_ip_header proxy_protocol; | ||||
| 
 | ||||
|     server_name ntfy.hamburg.ccc.de; | ||||
| 
 | ||||
|     ssl_certificate /etc/letsencrypt/live/ntfy.hamburg.ccc.de/fullchain.pem; | ||||
|     ssl_certificate_key /etc/letsencrypt/live/ntfy.hamburg.ccc.de/privkey.pem; | ||||
|     # verify chain of trust of OCSP response using Root CA and Intermediate certs | ||||
|     ssl_trusted_certificate /etc/letsencrypt/live/ntfy.hamburg.ccc.de/chain.pem; | ||||
| 
 | ||||
|     # HSTS (ngx_http_headers_module is required) (63072000 seconds) | ||||
|     add_header Strict-Transport-Security "max-age=63072000" always; | ||||
| 
 | ||||
|     proxy_set_header Host $host; | ||||
|     proxy_set_header X-Forwarded-Host $host; | ||||
|     proxy_set_header X-Real-IP $remote_addr; | ||||
|     proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | ||||
|     proxy_set_header X-Forwarded-Port 443; | ||||
|     # This is https in any case. | ||||
|     proxy_set_header X-Forwarded-Proto https; | ||||
| 
 | ||||
|     proxy_set_header Upgrade $http_upgrade; | ||||
| 
 | ||||
|     location / { | ||||
|         proxy_pass http://127.0.0.1:2586; | ||||
|         proxy_buffering off; | ||||
|         proxy_request_buffering off; | ||||
|         proxy_redirect off; | ||||
|         client_max_body_size 0; # Stream request body to backend | ||||
|     } | ||||
| 
 | ||||
|     location /settings { | ||||
|         allow ::1/128; | ||||
|         allow 127.0.0.1/32; | ||||
|         # Wieske | ||||
|         allow 172.31.17.128/25; | ||||
|         allow 212.12.51.128/28; | ||||
|         allow 2a00:14b0:42:100::/56; #Neues v6 gerouted via neuem Router | ||||
|         allow 2a00:14b0:4200:3000::/64; #Bei Wieske | ||||
|         allow 2a00:14b0:f000:23::/64; #CCCHH v6 bei Wieske, geroutet über turing | ||||
|         # Z9 | ||||
|         allow 185.161.129.132/32; # z9 | ||||
|         allow 2a07:c480:0:100::/56; | ||||
|         allow 2a07:c481:1::/48; | ||||
| 
 | ||||
|         proxy_pass http://127.0.0.1:2586; | ||||
|         proxy_buffering off; | ||||
|         proxy_request_buffering off; | ||||
|         proxy_redirect off; | ||||
|         client_max_body_size 0; # Stream request body to backend | ||||
|     } | ||||
| } | ||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue