Skip to content

Instantly share code, notes, and snippets.

@msnoigrs
Last active September 13, 2018 09:53
Show Gist options
  • Save msnoigrs/8e29de2e1a56408fd6b135a5e894004f to your computer and use it in GitHub Desktop.
Save msnoigrs/8e29de2e1a56408fd6b135a5e894004f to your computer and use it in GitHub Desktop.
Setting caddy for gitlab
[Unit]
Description=Caddy HTTP/2 web server
Documentation=https://caddyserver.com/docs
After=network-online.target
Wants=network-online.target systemd-networkd-wait-online.service
[Service]
Restart=on-abnormal
; User and group the process will run as.
User=www-data
Group=www-data
; Letsencrypt-issued certificates will be written to this directory.
Environment=CADDYPATH=/etc/ssl/caddy
; Always set "-root" to something safe in case it gets forgotten in the Caddyfile.
ExecStart=/usr/local/bin/caddy -log stdout -agree=true -conf=/etc/caddy/Caddyfile -root=/var/tmp
ExecReload=/bin/kill -USR1 $MAINPID
; Use graceful shutdown with a reasonable timeout
KillMode=mixed
KillSignal=SIGQUIT
TimeoutStopSec=5s
; Limit the number of file descriptors; see `man systemd.exec` for more limit settings.
LimitNOFILE=1048576
; Unmodified caddy is not expected to use more than that.
LimitNPROC=512
; Use private /tmp and /var/tmp, which are discarded after caddy stops.
PrivateTmp=true
; Use a minimal /dev (May bring additional security if switched to 'true', but it may not work on Raspberry Pi's or other devices, so it has been disabled in this dist.)
PrivateDevices=false
; Hide /home, /root, and /run/user. Nobody will steal your SSH-keys.
ProtectHome=true
; Make /usr, /boot, /etc and possibly some more folders read-only.
ProtectSystem=full
; … except /etc/ssl/caddy, because we want Letsencrypt-certificates there.
; This merely retains r/w access rights, it does not add any new. Must still be writable on the host!
ReadWriteDirectories=/etc/ssl/caddy
; The following additional security directives only work with systemd v229 or later.
; They further restrict privileges that can be gained by caddy. Uncomment if you like.
; Note that you may have to add capabilities required by any plugins in use.
;CapabilityBoundingSet=CAP_NET_BIND_SERVICE
;AmbientCapabilities=CAP_NET_BIND_SERVICE
;NoNewPrivileges=true
[Install]
WantedBy=multi-user.target
https://gitlab.example.home {
log /var/log/caddy/gitlab.access.log {
rotate_size 50
rotate_age 90
rotate_keep 20
rotate_compress
}
errors /var/log/caddy/gitlab.errors.log {
404 /opt/gitlab/embedded/service/gitlab-rails/public/404.html
422 /opt/gitlab/embedded/service/gitlab-rails/public/422.html
500 /opt/gitlab/embedded/service/gitlab-rails/public/500.html
502 /opt/gitlab/embedded/service/gitlab-rails/public/502.html
}
proxy / http://localhost:8181 {
fail_timeout 0s
header_upstream X-Forwarded-Ssl on
websocket
transparent
}
tls /etc/ssl/caddy/crt.pem /etc/ssl/caddy/nopass.key
}
http://gitlab.example.home {
redir https://gitlab.example.home
}
mkdir /etc/ssl/caddy
chown root:www-data /etc/ssl/caddy
chmod 770 /etc/ssl/caddy
cp crt.pem /etc/ssl/caddy
cp nopass.key /etc/ssl/caddy
chown root:www-data /etc/ssl/caddy/nopass.key
chmod 640 /etc/ssl/caddy/nopass.key
mkdir /var/log/caddy
chown root:www-data /var/log/caddy
chmod 775 /var/log/caddy
mkdir /etc/caddy
cp CaddyFile /etc/caddy
setcap 'cap_net_bind_service=+ep' /usr/local/bin/caddy
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment