Last active
December 1, 2016 09:13
-
-
Save ypereirareis/c001b3093be3695ad287d0900b2b9aa3 to your computer and use it in GitHub Desktop.
Nginx configuration to redirect everything (www or not, http or https) to https://www.example.com
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
server { | |
server_name www.example.com; | |
listen 80 ; | |
access_log /var/log/nginx/access.log vhost; | |
return 301 https://$host$request_uri; | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
server { | |
listen 80; | |
server_name example.com; | |
return 301 https://www.example.com$request_uri; | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
server { | |
server_name example.com; | |
listen 443 ssl http2 ; | |
ssl_certificate /etc/nginx/certs/example.com.crt; | |
ssl_certificate_key /etc/nginx/certs/example.com.key; | |
ssl_dhparam /etc/nginx/certs/example.com.dhparam.pem; | |
return 301 $scheme://www.example.com$request_uri; | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
server { | |
server_name www.example.com; | |
listen 443 ssl http2 ; | |
access_log /var/log/nginx/access.log vhost; | |
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; | |
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS'; | |
ssl_prefer_server_ciphers on; | |
ssl_session_timeout 5m; | |
ssl_session_cache shared:SSL:50m; | |
ssl_session_tickets off; | |
ssl_certificate /etc/nginx/certs/www.example.com.crt; | |
ssl_certificate_key /etc/nginx/certs/www.example.com.key; | |
ssl_dhparam /etc/nginx/certs/www.example.com.dhparam.pem; | |
add_header Strict-Transport-Security "max-age=31536000"; | |
include /etc/nginx/vhost.d/default; | |
location / { | |
proxy_pass http://www.example.com; | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment