Created
February 18, 2023 01:29
-
-
Save mattstein/8709e4ddc6e05d0ce46fc88890bb1612 to your computer and use it in GitHub Desktop.
Ploi nginx Config for Mastodon
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Ploi Webserver Configuration, do not remove! | |
include /etc/nginx/ploi/t00t.cloud/before/*; | |
map $http_upgrade $connection_upgrade { | |
default upgrade; | |
'' close; | |
} | |
upstream backend { | |
server 127.0.0.1:3000 fail_timeout=0; | |
} | |
upstream streaming { | |
server 127.0.0.1:4000 fail_timeout=0; | |
} | |
proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=1g; | |
server { | |
#listen 80; | |
#listen [::]:80; | |
root /home/ploi/t00t.cloud/live/public; | |
server_name t00t.cloud; | |
include /etc/nginx/ssl/t00t.cloud; | |
ssl_protocols TLSv1.2 TLSv1.3; | |
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS'; | |
ssl_prefer_server_ciphers on; | |
ssl_dhparam /etc/nginx/dhparams.pem; | |
index index.php index.html; | |
add_header X-Frame-Options "SAMEORIGIN"; | |
add_header X-XSS-Protection "1; mode=block"; | |
add_header X-Content-Type-Options "nosniff"; | |
charset utf-8; | |
# Ploi Configuration, do not remove! | |
include /etc/nginx/ploi/t00t.cloud/server/*; | |
keepalive_timeout 70; | |
sendfile on; | |
client_max_body_size 80m; | |
location / { | |
try_files $uri @proxy; | |
} | |
location = /sw.js { | |
add_header Cache-Control "public, max-age=604800, must-revalidate"; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
try_files $uri =404; | |
} | |
location ~ ^/assets/ { | |
add_header Cache-Control "public, max-age=2419200, must-revalidate"; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
try_files $uri =404; | |
} | |
location ~ ^/avatars/ { | |
add_header Cache-Control "public, max-age=2419200, must-revalidate"; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
try_files $uri =404; | |
} | |
location ~ ^/emoji/ { | |
add_header Cache-Control "public, max-age=2419200, must-revalidate"; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
try_files $uri =404; | |
} | |
location ~ ^/headers/ { | |
add_header Cache-Control "public, max-age=2419200, must-revalidate"; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
try_files $uri =404; | |
} | |
location ~ ^/packs/ { | |
add_header Cache-Control "public, max-age=2419200, must-revalidate"; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
try_files $uri =404; | |
} | |
location ~ ^/shortcuts/ { | |
add_header Cache-Control "public, max-age=2419200, must-revalidate"; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
try_files $uri =404; | |
} | |
location ~ ^/sounds/ { | |
add_header Cache-Control "public, max-age=2419200, must-revalidate"; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
try_files $uri =404; | |
} | |
location ~ ^/system/ { | |
add_header Cache-Control "public, max-age=2419200, immutable"; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
try_files $uri =404; | |
} | |
location ^~ /api/v1/streaming { | |
proxy_set_header Host $host; | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto $scheme; | |
proxy_set_header Proxy ""; | |
proxy_pass http://streaming; | |
proxy_buffering off; | |
proxy_redirect off; | |
proxy_http_version 1.1; | |
proxy_set_header Upgrade $http_upgrade; | |
proxy_set_header Connection $connection_upgrade; | |
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains"; | |
tcp_nodelay on; | |
} | |
location @proxy { | |
proxy_set_header Host $host; | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto $scheme; | |
proxy_set_header Proxy ""; | |
proxy_pass_header Server; | |
proxy_pass http://backend; | |
proxy_buffering on; | |
proxy_redirect off; | |
proxy_http_version 1.1; | |
proxy_set_header Upgrade $http_upgrade; | |
proxy_set_header Connection $connection_upgrade; | |
proxy_cache CACHE; | |
proxy_cache_valid 200 7d; | |
proxy_cache_valid 410 24h; | |
proxy_cache_use_stale error timeout updating http_500 http_502 http_503 http_504; | |
add_header X-Cached $upstream_cache_status; | |
tcp_nodelay on; | |
} | |
error_page 404 500 501 502 503 504 /500.html; | |
access_log off; | |
error_log /var/log/nginx/t00t.cloud-error.log error; | |
location ~ /\.(?!well-known).* { | |
deny all; | |
} | |
} | |
# Ploi Webserver Configuration, do not remove! | |
include /etc/nginx/ploi/t00t.cloud/after/*; |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment