forked from CCCHH/ansible-infra
		
	
		
			
				
	
	
		
			134 lines
		
	
	
	
		
			5.8 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			134 lines
		
	
	
	
		
			5.8 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
| # partly generated 2022-01-08, Mozilla Guideline v5.6, nginx 1.17.7, OpenSSL 1.1.1k, intermediate configuration
 | |
| # https://ssl-config.mozilla.org/#server=nginx&version=1.17.7&config=intermediate&openssl=1.1.1k&guideline=5.6
 | |
| upstream nextcloud {
 | |
|     server 127.0.0.1:9000;
 | |
| }
 | |
| 
 | |
| server {
 | |
|     # Listen on a custom port for the proxy protocol.
 | |
|     listen 8443 ssl http2 proxy_protocol;
 | |
|     # Make use of the ngx_http_realip_module to set the $remote_addr and
 | |
|     # $remote_port to the client address and client port, when using proxy
 | |
|     # protocol.
 | |
|     # First set our proxy protocol proxy as trusted.
 | |
|     set_real_ip_from 172.31.17.140;
 | |
|     # Then tell the realip_module to get the addreses from the proxy protocol
 | |
|     # header.
 | |
|     real_ip_header proxy_protocol;
 | |
| 
 | |
|     server_name cloud.hamburg.ccc.de;
 | |
| 
 | |
|     ssl_certificate /etc/letsencrypt/live/cloud.hamburg.ccc.de/fullchain.pem;
 | |
|     ssl_certificate_key /etc/letsencrypt/live/cloud.hamburg.ccc.de/privkey.pem;
 | |
|     # verify chain of trust of OCSP response using Root CA and Intermediate certs
 | |
|     ssl_trusted_certificate /etc/letsencrypt/live/cloud.hamburg.ccc.de/chain.pem;
 | |
| 
 | |
|     # HSTS (ngx_http_headers_module is required) (63072000 seconds)
 | |
|     add_header Strict-Transport-Security "max-age=63072000" always;
 | |
| 
 | |
|     proxy_set_header Host $host;
 | |
|     proxy_set_header X-Forwarded-Host $host;
 | |
|     proxy_set_header X-Real-IP $remote_addr;
 | |
|     proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
 | |
|     proxy_set_header X-Forwarded-Port 443;
 | |
|     # This is https in any case.
 | |
|     proxy_set_header X-Forwarded-Proto https;
 | |
|     # Hide the X-Forwarded header.
 | |
|     proxy_hide_header X-Forwarded;
 | |
|     # Assume we are the only Reverse Proxy (well using Proxy Protocol, but that
 | |
|     # is transparent).
 | |
|     # Also provide "_hidden" for by, since it's not relevant.
 | |
|     proxy_set_header Forwarded "for=$remote_addr;proto=https;host=$host;by=_hidden";
 | |
| 
 | |
|     # HTTP response headers borrowed from Nextcloud `.htaccess`
 | |
|     add_header Referrer-Policy                      "no-referrer"   always;
 | |
|     add_header X-Content-Type-Options               "nosniff"       always;
 | |
|     add_header X-Download-Options                   "noopen"        always;
 | |
|     add_header X-Frame-Options                      "SAMEORIGIN"    always;
 | |
|     add_header X-Permitted-Cross-Domain-Policies    "none"          always;
 | |
|     add_header X-Robots-Tag                         "none"          always;
 | |
|     add_header X-XSS-Protection                     "1; mode=block" always;
 | |
| 
 | |
|     # Remove X-Powered-By, which is an information leak
 | |
|     fastcgi_hide_header X-Powered-By;
 | |
| 
 | |
|     # Path to the root of your installation
 | |
|     root /data/docker/volumes/nextcloud;
 | |
| 
 | |
|     # Specify how to handle directories -- specifying `/index.php$request_uri`
 | |
|     # here as the fallback means that Nginx always exhibits the desired behaviour
 | |
|     # when a client requests a path that corresponds to a directory that exists
 | |
|     # on the server. In particular, if that directory contains an index.php file,
 | |
|     # that file is correctly served; if it doesn't, then the request is passed to
 | |
|     # the front-end controller. This consistent behaviour means that we don't need
 | |
|     # to specify custom rules for certain paths (e.g. images and other assets,
 | |
|     # `/updater`, `/ocm-provider`, `/ocs-provider`), and thus
 | |
|     # `try_files $uri $uri/ /index.php$request_uri`
 | |
|     # always provides the desired behaviour.
 | |
|     index index.php index.html /index.php$request_uri;
 | |
| 
 | |
|     # Rule borrowed from `.htaccess` to handle Microsoft DAV clients
 | |
|     location = / {
 | |
|         if ( $http_user_agent ~ ^DavClnt ) {
 | |
|             return 302 /remote.php/webdav/$is_args$args;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     location = /robots.txt {
 | |
|         allow all;
 | |
|         log_not_found off;
 | |
|         access_log off;
 | |
|     }
 | |
| 
 | |
|     # Rules borrowed from `.htaccess` to hide certain paths from clients
 | |
|     location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)(?:$|/)  { return 404; }
 | |
|     location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console)                { return 404; }
 | |
| 
 | |
|     # Ensure this block, which passes PHP files to the PHP process, is above the blocks
 | |
|     # which handle static assets (as seen below). If this block is not declared first,
 | |
|     # then Nginx will encounter an infinite rewriting loop when it prepends `/index.php`
 | |
|     # to the URI, resulting in a HTTP 500 error response.
 | |
|     location ~ \.php(?:$|/) {
 | |
|         # Required for legacy support
 | |
|         rewrite ^/(?!index|remote|public|cron|core\/ajax\/update|status|ocs\/v[12]|updater\/.+|oc[ms]-provider\/.+|.+\/richdocumentscode\/proxy) /index.php$request_uri;
 | |
| 
 | |
|         fastcgi_split_path_info ^(.+?\.php)(/.*)$;
 | |
|         set $path_info $fastcgi_path_info;
 | |
| 
 | |
|         try_files $fastcgi_script_name =404;
 | |
| 
 | |
|         include fastcgi_params;
 | |
|         #fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
 | |
|         fastcgi_param SCRIPT_FILENAME /var/www/html/index.php;
 | |
|         fastcgi_param PATH_INFO $path_info;
 | |
|         #fastcgi_param HTTPS on;
 | |
| 
 | |
|         fastcgi_param modHeadersAvailable true;         # Avoid sending the security headers twice
 | |
|         fastcgi_param front_controller_active true;     # Enable pretty urls
 | |
|         fastcgi_pass nextcloud;
 | |
| 
 | |
|         fastcgi_intercept_errors on;
 | |
|         fastcgi_request_buffering off;
 | |
|     }
 | |
| 
 | |
|     location ~ \.(?:css|js|svg|gif)$ {
 | |
|         try_files $uri /index.php$request_uri;
 | |
|         expires 6M;         # Cache-Control policy borrowed from `.htaccess`
 | |
|         access_log off;     # Optional: Don't log access to assets
 | |
|     }
 | |
| 
 | |
|     location ~ \.woff2?$ {
 | |
|         try_files $uri /index.php$request_uri;
 | |
|         expires 7d;         # Cache-Control policy borrowed from `.htaccess`
 | |
|         access_log off;     # Optional: Don't log access to assets
 | |
|     }
 | |
| 
 | |
|     # Rule borrowed from `.htaccess`
 | |
|     location /remote {
 | |
|         return 301 /remote.php$request_uri;
 | |
|     }
 | |
| 
 | |
|     location / {
 | |
|         try_files $uri $uri/ /index.php$request_uri;
 | |
|     }
 | |
| }
 |