Files
@ 8d272d91d3d2
Branch filter:
Location: majic-ansible-roles/roles/php_website/templates/nginx_site.j2 - annotation
8d272d91d3d2
2.2 KiB
text/plain
MAR-165: Deploy Diffie-Helman parameters for LDAP server in the ldap_server role:
- Not relevant for Debian Strech because of a bug in the OpenLDAP
version it ships with.
- This should allow use of DHE ciphers with LDAP server.
- Generated DH parameters only help pick one of the parameters from
RFC-7919 (based on the size of generated ones).
- Make the cipher test lists distro-specific due to differences
between supported algorithms in respective GnuTLS versions.
- Not relevant for Debian Strech because of a bug in the OpenLDAP
version it ships with.
- This should allow use of DHE ciphers with LDAP server.
- Generated DH parameters only help pick one of the parameters from
RFC-7919 (based on the size of generated ones).
- Make the cipher test lists distro-specific due to differences
between supported algorithms in respective GnuTLS versions.
dfb91e411e40 dfb91e411e40 dfb91e411e40 dfb91e411e40 dfb91e411e40 dfb91e411e40 dfb91e411e40 dfb91e411e40 dfb91e411e40 7727c37bce67 40473a82c752 7727c37bce67 40473a82c752 7727c37bce67 7727c37bce67 d26fe0368a4b d26fe0368a4b d26fe0368a4b 18cd76ec050d 18cd76ec050d d26fe0368a4b 3352797ee517 3352797ee517 3352797ee517 3352797ee517 1b05bae8e440 1b05bae8e440 1b05bae8e440 1b05bae8e440 1b05bae8e440 7f8ef577fa2c 40473a82c752 7727c37bce67 7727c37bce67 7f8ef577fa2c 7f8ef577fa2c 7727c37bce67 40473a82c752 7727c37bce67 40473a82c752 7727c37bce67 7727c37bce67 7727c37bce67 7f8ef577fa2c 40473a82c752 40473a82c752 40473a82c752 40473a82c752 40473a82c752 a99958de73d9 40473a82c752 7727c37bce67 40473a82c752 222008c85003 97be416e882e 40473a82c752 40473a82c752 40473a82c752 40473a82c752 40473a82c752 7f8ef577fa2c 7f8ef577fa2c 7f8ef577fa2c 7727c37bce67 7f8ef577fa2c 7727c37bce67 4ca98a158269 4ca98a158269 4ca98a158269 4ca98a158269 4f7054d023b6 4ca98a158269 4ca98a158269 7727c37bce67 7727c37bce67 7727c37bce67 | server {
# HTTP (plaintext) configuration.
listen 80;
server_name {{ fqdn }};
# Redirect plaintext connections to HTTPS
return 301 https://$host$request_uri;
}
server {
# Base settings.
root {{ home }}/htdocs/;
index {{ index }};
server_name {{ fqdn }};
# HTTPS (TLS) configuration.
listen 443 ssl;
listen [::]:443 ssl;
ssl_certificate_key /etc/ssl/private/{{ fqdn }}_https.key;
ssl_certificate /etc/ssl/certs/{{ fqdn }}_https.pem;
# Set-up HSTS header for preventing downgrades for users that visited the
# site via HTTPS at least once.
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
{% for config in additional_nginx_config -%}
# {{ config.comment }}
{{ config.value }}
{% endfor -%}
{% if rewrites -%}
# Generic URL rewrites.
{% for rewrite in rewrites -%}
rewrite {{ rewrite }};
{% endfor -%}
{% endif %}
{% if deny_files_regex -%}
# Deny access to user-specified files.
{% for regex in deny_files_regex -%}
location ~ {{ regex }} {
deny all;
}
{% endfor -%}
{% endif %}
# Interpret PHP files via FastCGI.
location ~ {{ php_file_regex }} {
include snippets/fastcgi-php.conf;
fastcgi_pass unix:/run/php/{{ fqdn }}.sock;
}
# Serve the files.
location ~ /(.+) {
try_files $uri $uri/{% if php_rewrite_urls %} @php_rewrite{% else %} =404{% endif %};
}
{% if php_rewrite_urls -%}
# Apply URL rewrites.
location @php_rewrite {
{% for rewrite in php_rewrite_urls %}
rewrite {{ rewrite }};
{% endfor -%}
}
{% endif -%}
{% if environment_indicator -%}
# Show environment indicator on HTML pages.
sub_filter_types text/html;
sub_filter_once on;
sub_filter "</body>" "<div id='website-environment' style='background-color: {{ environment_indicator.background_colour }}; width: 100%; text-align: center; position: fixed; bottom: 5px; color: {{ environment_indicator.text_colour }}; font-weight: bold; z-index: 999999;'>{{ environment_indicator.text }}</div></body>";
{% endif -%}
access_log /var/log/nginx/{{ fqdn }}-access.log;
error_log /var/log/nginx/{{ fqdn }}-error.log;
}
|