111 lines
4.1 KiB
Text
111 lines
4.1 KiB
Text
# partly generated 2022-01-08, Mozilla Guideline v5.6, nginx 1.17.7, OpenSSL 1.1.1k, intermediate configuration
|
|
# https://ssl-config.mozilla.org/#server=nginx&version=1.17.7&config=intermediate&openssl=1.1.1k&guideline=5.6
|
|
server {
|
|
# Listen on a custom port for the proxy protocol.
|
|
listen 8443 ssl proxy_protocol;
|
|
http2 on;
|
|
# Make use of the ngx_http_realip_module to set the $remote_addr and
|
|
# $remote_port to the client address and client port, when using proxy
|
|
# protocol.
|
|
# First set our proxy protocol proxy as trusted.
|
|
set_real_ip_from 172.31.17.140;
|
|
# Then tell the realip_module to get the addreses from the proxy protocol
|
|
# header.
|
|
real_ip_header proxy_protocol;
|
|
|
|
server_name grafana.hamburg.ccc.de;
|
|
|
|
ssl_certificate /etc/letsencrypt/live/grafana.hamburg.ccc.de/fullchain.pem;
|
|
ssl_certificate_key /etc/letsencrypt/live/grafana.hamburg.ccc.de/privkey.pem;
|
|
# verify chain of trust of OCSP response using Root CA and Intermediate certs
|
|
ssl_trusted_certificate /etc/letsencrypt/live/grafana.hamburg.ccc.de/chain.pem;
|
|
|
|
# HSTS (ngx_http_headers_module is required) (63072000 seconds)
|
|
add_header Strict-Transport-Security "max-age=63072000" always;
|
|
|
|
proxy_set_header Host $host;
|
|
proxy_set_header X-Forwarded-Host $host;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header X-Forwarded-Port 443;
|
|
# This is https in any case.
|
|
proxy_set_header X-Forwarded-Proto https;
|
|
# Hide the X-Forwarded header.
|
|
proxy_hide_header X-Forwarded;
|
|
# Assume we are the only Reverse Proxy (well using Proxy Protocol, but that
|
|
# is transparent).
|
|
# Also provide "_hidden" for by, since it's not relevant.
|
|
proxy_set_header Forwarded "for=$remote_addr;proto=https;host=$host;by=_hidden";
|
|
|
|
location / {
|
|
proxy_pass http://127.0.0.1:3000/;
|
|
}
|
|
|
|
location /ntfy-alertmanager-ccchh-critical/ {
|
|
deny all;
|
|
allow ::1/128;
|
|
allow 127.0.0.1/32;
|
|
# Wieske
|
|
allow 172.31.17.128/25;
|
|
allow 212.12.51.128/28;
|
|
allow 2a00:14b0:42:100::/56; #Neues v6 gerouted via neuem Router
|
|
allow 2a00:14b0:4200:3000::/64; #Bei Wieske
|
|
allow 2a00:14b0:4200:3380::/64;
|
|
allow 2a00:14b0:f000:23::/64; #CCCHH v6 bei Wieske, geroutet über turing
|
|
# Z9
|
|
allow 2a07:c480:0:100::/56;
|
|
allow 2a07:c481:1::/48;
|
|
proxy_pass http://127.0.0.1:8000/;
|
|
}
|
|
|
|
location /ntfy-alertmanager-ccchh/ {
|
|
deny all;
|
|
allow ::1/128;
|
|
allow 127.0.0.1/32;
|
|
# Wieske
|
|
allow 172.31.17.128/25;
|
|
allow 212.12.51.128/28;
|
|
allow 2a00:14b0:42:100::/56; #Neues v6 gerouted via neuem Router
|
|
allow 2a00:14b0:4200:3000::/64; #Bei Wieske
|
|
allow 2a00:14b0:4200:3380::/64;
|
|
allow 2a00:14b0:f000:23::/64; #CCCHH v6 bei Wieske, geroutet über turing
|
|
# Z9
|
|
allow 2a07:c480:0:100::/56;
|
|
allow 2a07:c481:1::/48;
|
|
proxy_pass http://127.0.0.1:8010/;
|
|
}
|
|
|
|
location /ntfy-alertmanager-fux-critical/ {
|
|
deny all;
|
|
allow ::1/128;
|
|
allow 127.0.0.1/32;
|
|
# Wieske
|
|
allow 172.31.17.128/25;
|
|
allow 212.12.51.128/28;
|
|
allow 2a00:14b0:42:100::/56; #Neues v6 gerouted via neuem Router
|
|
allow 2a00:14b0:4200:3000::/64; #Bei Wieske
|
|
allow 2a00:14b0:4200:3380::/64;
|
|
allow 2a00:14b0:f000:23::/64; #CCCHH v6 bei Wieske, geroutet über turing
|
|
# Z9
|
|
allow 2a07:c480:0:100::/56;
|
|
allow 2a07:c481:1::/48;
|
|
proxy_pass http://127.0.0.1:8001/;
|
|
}
|
|
|
|
location /ntfy-alertmanager-fux/ {
|
|
deny all;
|
|
allow ::1/128;
|
|
allow 127.0.0.1/32;
|
|
# Wieske
|
|
allow 172.31.17.128/25;
|
|
allow 212.12.51.128/28;
|
|
allow 2a00:14b0:42:100::/56; #Neues v6 gerouted via neuem Router
|
|
allow 2a00:14b0:4200:3000::/64; #Bei Wieske
|
|
allow 2a00:14b0:4200:3380::/64;
|
|
allow 2a00:14b0:f000:23::/64; #CCCHH v6 bei Wieske, geroutet über turing
|
|
# Z9
|
|
allow 2a07:c480:0:100::/56;
|
|
allow 2a07:c481:1::/48;
|
|
proxy_pass http://127.0.0.1:8011/;
|
|
}
|
|
}
|