|
@@ -1,5 +1,8 @@
|
|
|
{{ $CurrentContainer := where $ "ID" .Docker.CurrentContainerID | first }}
|
|
|
|
|
|
+{{ $external_http_port := coalesce $.Env.HTTP_PORT "80" }}
|
|
|
+{{ $external_https_port := coalesce $.Env.HTTPS_PORT "443" }}
|
|
|
+
|
|
|
{{ define "upstream" }}
|
|
|
{{ if .Address }}
|
|
|
{{/* If we got the containers from swarm and this container's port is published to host, use host IP:PORT */}}
|
|
@@ -19,7 +22,50 @@
|
|
|
server 127.0.0.1 down;
|
|
|
{{ end }}
|
|
|
{{ end }}
|
|
|
-
|
|
|
+
|
|
|
+{{ end }}
|
|
|
+
|
|
|
+{{ define "ssl_policy" }}
|
|
|
+ {{ if eq .ssl_policy "Mozilla-Modern" }}
|
|
|
+ ssl_protocols TLSv1.3;
|
|
|
+ {{/* nginx currently lacks ability to choose ciphers in TLS 1.3 in configuration, see https://trac.nginx.org/nginx/ticket/1529 /*}}
|
|
|
+ {{/* a possible workaround can be modify /etc/ssl/openssl.cnf to change it globally (see https://trac.nginx.org/nginx/ticket/1529#comment:12 ) /*}}
|
|
|
+ {{/* explicitly set ngnix default value in order to allow single servers to override the global http value */}}
|
|
|
+ ssl_ciphers HIGH:!aNULL:!MD5;
|
|
|
+ ssl_prefer_server_ciphers off;
|
|
|
+ {{ else if eq .ssl_policy "Mozilla-Intermediate" }}
|
|
|
+ ssl_protocols TLSv1.2 TLSv1.3;
|
|
|
+ ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384';
|
|
|
+ ssl_prefer_server_ciphers off;
|
|
|
+ {{ else if eq .ssl_policy "Mozilla-Old" }}
|
|
|
+ ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
|
|
|
+ ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA';
|
|
|
+ ssl_prefer_server_ciphers on;
|
|
|
+ {{ else if eq .ssl_policy "AWS-TLS-1-2-2017-01" }}
|
|
|
+ ssl_protocols TLSv1.2 TLSv1.3;
|
|
|
+ ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:AES128-GCM-SHA256:AES128-SHA256:AES256-GCM-SHA384:AES256-SHA256';
|
|
|
+ ssl_prefer_server_ciphers on;
|
|
|
+ {{ else if eq .ssl_policy "AWS-TLS-1-1-2017-01" }}
|
|
|
+ ssl_protocols TLSv1.1 TLSv1.2 TLSv1.3;
|
|
|
+ ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA';
|
|
|
+ ssl_prefer_server_ciphers on;
|
|
|
+ {{ else if eq .ssl_policy "AWS-2016-08" }}
|
|
|
+ ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
|
|
|
+ ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA';
|
|
|
+ ssl_prefer_server_ciphers on;
|
|
|
+ {{ else if eq .ssl_policy "AWS-2015-05" }}
|
|
|
+ ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
|
|
|
+ ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:DES-CBC3-SHA';
|
|
|
+ ssl_prefer_server_ciphers on;
|
|
|
+ {{ else if eq .ssl_policy "AWS-2015-03" }}
|
|
|
+ ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
|
|
|
+ ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:DHE-DSS-AES128-SHA:DES-CBC3-SHA';
|
|
|
+ ssl_prefer_server_ciphers on;
|
|
|
+ {{ else if eq .ssl_policy "AWS-2015-02" }}
|
|
|
+ ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
|
|
|
+ ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:DHE-DSS-AES128-SHA';
|
|
|
+ ssl_prefer_server_ciphers on;
|
|
|
+ {{ end }}
|
|
|
{{ end }}
|
|
|
|
|
|
# If we receive X-Forwarded-Proto, pass it through; otherwise, pass along the
|
|
@@ -65,6 +111,10 @@ log_format vhost '$host $remote_addr - $remote_user [$time_local] '
|
|
|
|
|
|
access_log off;
|
|
|
|
|
|
+{{/* Get the SSL_POLICY defined by this container, falling back to "Mozilla-Intermediate" */}}
|
|
|
+{{ $ssl_policy := or ($.Env.SSL_POLICY) "Mozilla-Intermediate" }}
|
|
|
+{{ template "ssl_policy" (dict "ssl_policy" $ssl_policy) }}
|
|
|
+
|
|
|
{{ if $.Env.RESOLVERS }}
|
|
|
resolver {{ $.Env.RESOLVERS }};
|
|
|
{{ end }}
|
|
@@ -93,9 +143,9 @@ proxy_set_header Proxy "";
|
|
|
{{ $enable_ipv6 := eq (or ($.Env.ENABLE_IPV6) "") "true" }}
|
|
|
server {
|
|
|
server_name _; # This is just an invalid value which will never trigger on a real hostname.
|
|
|
- listen 80;
|
|
|
+ listen {{ $external_http_port }};
|
|
|
{{ if $enable_ipv6 }}
|
|
|
- listen [::]:80;
|
|
|
+ listen [::]:{{ $external_http_port }};
|
|
|
{{ end }}
|
|
|
{{ $access_log }}
|
|
|
return 503;
|
|
@@ -104,13 +154,14 @@ server {
|
|
|
{{ if (and (exists "/etc/nginx/certs/default.crt") (exists "/etc/nginx/certs/default.key")) }}
|
|
|
server {
|
|
|
server_name _; # This is just an invalid value which will never trigger on a real hostname.
|
|
|
- listen 443 ssl http2;
|
|
|
+ listen {{ $external_https_port }} ssl http2;
|
|
|
{{ if $enable_ipv6 }}
|
|
|
- listen [::]:443 ssl http2;
|
|
|
+ listen [::]:{{ $external_https_port }} ssl http2;
|
|
|
{{ end }}
|
|
|
{{ $access_log }}
|
|
|
return 503;
|
|
|
|
|
|
+ ssl_session_cache shared:SSL:50m;
|
|
|
ssl_session_tickets off;
|
|
|
ssl_certificate /etc/nginx/certs/default.crt;
|
|
|
ssl_certificate_key /etc/nginx/certs/default.key;
|
|
@@ -165,8 +216,8 @@ upstream {{ $upstream_name }} {
|
|
|
{{/* Get the HTTPS_METHOD defined by containers w/ the same vhost, falling back to "redirect" */}}
|
|
|
{{ $https_method := or (first (groupByKeys $containers "Env.HTTPS_METHOD")) "redirect" }}
|
|
|
|
|
|
-{{/* Get the SSL_POLICY defined by containers w/ the same vhost, falling back to "Mozilla-Intermediate" */}}
|
|
|
-{{ $ssl_policy := or (first (groupByKeys $containers "Env.SSL_POLICY")) "Mozilla-Intermediate" }}
|
|
|
+{{/* Get the SSL_POLICY defined by containers w/ the same vhost, falling back to empty string (use default) */}}
|
|
|
+{{ $ssl_policy := or (first (groupByKeys $containers "Env.SSL_POLICY")) "" }}
|
|
|
|
|
|
{{/* Get the HSTS defined by containers w/ the same vhost, falling back to "max-age=31536000" */}}
|
|
|
{{ $hsts := or (first (groupByKeys $containers "Env.HSTS")) "max-age=31536000" }}
|
|
@@ -195,20 +246,32 @@ upstream {{ $upstream_name }} {
|
|
|
{{ if eq $https_method "redirect" }}
|
|
|
server {
|
|
|
server_name {{ $host }};
|
|
|
- listen 80 {{ $default_server }};
|
|
|
+ listen {{ $external_http_port }} {{ $default_server }};
|
|
|
{{ if $enable_ipv6 }}
|
|
|
- listen [::]:80 {{ $default_server }};
|
|
|
+ listen [::]:{{ $external_http_port }} {{ $default_server }};
|
|
|
{{ end }}
|
|
|
{{ $access_log }}
|
|
|
- return 301 https://$host$request_uri;
|
|
|
+
|
|
|
+ # Do not HTTPS redirect Let'sEncrypt ACME challenge
|
|
|
+ location /.well-known/acme-challenge/ {
|
|
|
+ auth_basic off;
|
|
|
+ allow all;
|
|
|
+ root /usr/share/nginx/html;
|
|
|
+ try_files $uri =404;
|
|
|
+ break;
|
|
|
+ }
|
|
|
+
|
|
|
+ location / {
|
|
|
+ return 301 https://$host$request_uri;
|
|
|
+ }
|
|
|
}
|
|
|
{{ end }}
|
|
|
|
|
|
server {
|
|
|
server_name {{ $host }};
|
|
|
- listen 443 ssl http2 {{ $default_server }};
|
|
|
+ listen {{ $external_https_port }} ssl http2 {{ $default_server }};
|
|
|
{{ if $enable_ipv6 }}
|
|
|
- listen [::]:443 ssl http2 {{ $default_server }};
|
|
|
+ listen [::]:{{ $external_https_port }} ssl http2 {{ $default_server }};
|
|
|
{{ end }}
|
|
|
{{ $access_log }}
|
|
|
|
|
@@ -217,36 +280,8 @@ server {
|
|
|
include /etc/nginx/network_internal.conf;
|
|
|
{{ end }}
|
|
|
|
|
|
- {{ if eq $ssl_policy "Mozilla-Modern" }}
|
|
|
- ssl_protocols TLSv1.2;
|
|
|
- ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';
|
|
|
- {{ else if eq $ssl_policy "Mozilla-Intermediate" }}
|
|
|
- ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
|
|
- ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:!DSS';
|
|
|
- {{ else if eq $ssl_policy "Mozilla-Old" }}
|
|
|
- ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2;
|
|
|
- ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:HIGH:SEED:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!RSAPSK:!aDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SRP';
|
|
|
- {{ else if eq $ssl_policy "AWS-TLS-1-2-2017-01" }}
|
|
|
- ssl_protocols TLSv1.2;
|
|
|
- ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:AES128-GCM-SHA256:AES128-SHA256:AES256-GCM-SHA384:AES256-SHA256';
|
|
|
- {{ else if eq $ssl_policy "AWS-TLS-1-1-2017-01" }}
|
|
|
- ssl_protocols TLSv1.1 TLSv1.2;
|
|
|
- ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA';
|
|
|
- {{ else if eq $ssl_policy "AWS-2016-08" }}
|
|
|
- ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
|
|
- ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA';
|
|
|
- {{ else if eq $ssl_policy "AWS-2015-05" }}
|
|
|
- ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
|
|
- ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:DES-CBC3-SHA';
|
|
|
- {{ else if eq $ssl_policy "AWS-2015-03" }}
|
|
|
- ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
|
|
- ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:DHE-DSS-AES128-SHA:DES-CBC3-SHA';
|
|
|
- {{ else if eq $ssl_policy "AWS-2015-02" }}
|
|
|
- ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
|
|
- ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:DHE-DSS-AES128-SHA';
|
|
|
- {{ end }}
|
|
|
+ {{ template "ssl_policy" (dict "ssl_policy" $ssl_policy) }}
|
|
|
|
|
|
- ssl_prefer_server_ciphers on;
|
|
|
ssl_session_timeout 5m;
|
|
|
ssl_session_cache shared:SSL:50m;
|
|
|
ssl_session_tickets off;
|
|
@@ -264,8 +299,8 @@ server {
|
|
|
ssl_trusted_certificate {{ printf "/etc/nginx/certs/%s.chain.pem" $cert }};
|
|
|
{{ end }}
|
|
|
|
|
|
- {{ if (and (ne $https_method "noredirect") (ne $hsts "off")) }}
|
|
|
- add_header Strict-Transport-Security "{{ trim $hsts }}";
|
|
|
+ {{ if (not (or (eq $https_method "noredirect") (eq $hsts "off"))) }}
|
|
|
+ add_header Strict-Transport-Security "{{ trim $hsts }}" always;
|
|
|
{{ end }}
|
|
|
|
|
|
{{ if (exists (printf "/etc/nginx/vhost.d/%s" $host)) }}
|
|
@@ -280,8 +315,10 @@ server {
|
|
|
uwsgi_pass {{ trim $proto }}://{{ trim $upstream_name }};
|
|
|
{{ else if eq $proto "fastcgi" }}
|
|
|
root {{ trim $vhost_root }};
|
|
|
- include fastcgi.conf;
|
|
|
+ include fastcgi_params;
|
|
|
fastcgi_pass {{ trim $upstream_name }};
|
|
|
+ {{ else if eq $proto "grpc" }}
|
|
|
+ grpc_pass {{ trim $proto }}://{{ trim $upstream_name }};
|
|
|
{{ else }}
|
|
|
proxy_pass {{ trim $proto }}://{{ trim $upstream_name }};
|
|
|
{{ end }}
|
|
@@ -304,7 +341,7 @@ server {
|
|
|
|
|
|
server {
|
|
|
server_name {{ $host }};
|
|
|
- listen 80 {{ $default_server }};
|
|
|
+ listen {{ $external_http_port }} {{ $default_server }};
|
|
|
{{ if $enable_ipv6 }}
|
|
|
listen [::]:80 {{ $default_server }};
|
|
|
{{ end }}
|
|
@@ -327,8 +364,10 @@ server {
|
|
|
uwsgi_pass {{ trim $proto }}://{{ trim $upstream_name }};
|
|
|
{{ else if eq $proto "fastcgi" }}
|
|
|
root {{ trim $vhost_root }};
|
|
|
- include fastcgi.conf;
|
|
|
+ include fastcgi_params;
|
|
|
fastcgi_pass {{ trim $upstream_name }};
|
|
|
+ {{ else if eq $proto "grpc" }}
|
|
|
+ grpc_pass {{ trim $proto }}://{{ trim $upstream_name }};
|
|
|
{{ else }}
|
|
|
proxy_pass {{ trim $proto }}://{{ trim $upstream_name }};
|
|
|
{{ end }}
|
|
@@ -347,9 +386,9 @@ server {
|
|
|
{{ if (and (not $is_https) (exists "/etc/nginx/certs/default.crt") (exists "/etc/nginx/certs/default.key")) }}
|
|
|
server {
|
|
|
server_name {{ $host }};
|
|
|
- listen 443 ssl http2 {{ $default_server }};
|
|
|
+ listen {{ $external_https_port }} ssl http2 {{ $default_server }};
|
|
|
{{ if $enable_ipv6 }}
|
|
|
- listen [::]:443 ssl http2 {{ $default_server }};
|
|
|
+ listen [::]:{{ $external_https_port }} ssl http2 {{ $default_server }};
|
|
|
{{ end }}
|
|
|
{{ $access_log }}
|
|
|
return 500;
|