summaryrefslogtreecommitdiff
path: root/templates/nginx/nginx.conf.j2
blob: 7f1ac2b61033354e6dcb846d86240b761d985815 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
user www-data;
worker_processes auto;
pid /run/nginx.pid;
include /etc/nginx/modules-enabled/*.conf;

events {
    worker_connections 1024;
    multi_accept on;
}

http {
    sendfile on;
    tcp_nopush on;
    tcp_nodelay on;
    keepalive_timeout 65;
    types_hash_max_size 2048;
    server_tokens off;

    include /etc/nginx/mime.types;
    default_type application/octet-stream;

    access_log /var/log/nginx/access.log;
    error_log /var/log/nginx/error.log warn;

    gzip on;
    gzip_vary on;
    gzip_proxied any;
    gzip_comp_level 6;
    gzip_buffers 16 8k;
    gzip_http_version 1.1;
    gzip_min_length 256;
    gzip_types
        text/plain
        text/css
        application/json
        application/javascript
        text/xml
        application/xml
        application/xml+rss
        text/javascript
        image/svg+xml;

    server {
        listen 80;
        server_name {{ domain }};
        return 301 https://{{ domain }}$request_uri;
    }

    server {
        listen 443 ssl http2;
        server_name {{ domain }};

        ssl_certificate /etc/letsencrypt/live/{{ domain }}/fullchain.pem;
        ssl_certificate_key /etc/letsencrypt/live/{{ domain }}/privkey.pem;
        #ssl_trusted_certificate /etc/letsencrypt/live/{{ domain }}/chain.pem;

        ssl_protocols TLSv1.2 TLSv1.3;
        ssl_ciphers HIGH:!aNULL:!MD5;
        ssl_prefer_server_ciphers off;
        ssl_session_cache shared:SSL:10m;
        ssl_session_timeout 1d;
        ssl_session_tickets off;

        add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
        add_header X-Frame-Options "DENY" always;
        add_header X-Content-Type-Options "nosniff" always;
        add_header X-XSS-Protection "1; mode=block" always;
        add_header Referrer-Policy "strict-origin-when-cross-origin" always;
        add_header Content-Security-Policy "default-src 'self'; connect-src *; media-src * blob: data:; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline';" always;
        add_header Permissions-Policy "geolocation=(), microphone=(), camera=()" always;

        root /var/www/html;
        index index.html index.htm;

        location / {
            try_files $uri $uri/ =404;
        }

	location /stream {
	    proxy_pass http://localhost:8000/stream;
	    proxy_set_header Host $host;
	    proxy_set_header X-Real-IP $remote_addr;
	    proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
	    proxy_set_header X-Forwarded-Proto $scheme;

	    proxy_http_version 1.1;
	    proxy_buffering off;
	    proxy_request_buffering off;

	    proxy_read_timeout 3600s;
	    chunked_transfer_encoding on;

	    add_header Access-Control-Allow-Origin "*" always;
	    add_header Access-Control-Allow-Methods "GET, OPTIONS" always;
	    add_header Access-Control-Allow-Headers "Range" always;
	    add_header Access-Control-Expose-Headers "Content-Length,Content-Range" always;
	}

        location /admin {
            deny all;
            return 403;
        }

        location /admin/ {
            deny all;
            return 403;
        }

        location ~ ^/(status|statistics|server|webadmin) {
            deny all;
            return 403;
        }

        access_log /var/log/nginx/icecast-access.log;
        error_log /var/log/nginx/icecast-error.log warn;
    }
}