Initial commit
This commit is contained in:
commit
04c23163fc
2
.gitignore
vendored
Normal file
2
.gitignore
vendored
Normal file
@ -0,0 +1,2 @@
|
||||
node_modules/
|
||||
certs/
|
176
README.md
Normal file
176
README.md
Normal file
@ -0,0 +1,176 @@
|
||||
# Docker + Nginx + Let's Encrypt
|
||||
|
||||
This simple example shows how to set up multiple websites running behind a dockerized Nginx reverse proxy and served via HTTPS using free [Let's Encrypt](https://letsencrypt.org) certificates. New sites can be added on the fly by just modifying `docker-compose.yml` and then running `docker-compose up` as the main Nginx config is automatically updated and certificates (if needed) are automatically acquired.
|
||||
|
||||
Some of the configuration is derived from <https://github.com/fatk/docker-letsencrypt-nginx-proxy-companion-examples> with some simplifications and updates to work with current `nginx.tmpl` from [nginx-proxy](https://github.com/jwilder/nginx-proxy) and docker-compose v2 files.
|
||||
|
||||
## Running the example
|
||||
### Prerequisites
|
||||
* [docker](https://docs.docker.com/engine/installation/) (>= 1.10)
|
||||
* [docker-compose](https://github.com/docker/compose/releases) (>= 1.8.1)
|
||||
* access to (sub)domain(s) pointing to a publicly accessible server (required for TLS)
|
||||
|
||||
### Preparation
|
||||
* Clone the [repository](https://github.com/gilyes/docker-nginx-letsencrypt-sample) on the server pointed to by your domain.
|
||||
* In `docker-compose.yml`:
|
||||
* Change the **VIRTUAL_HOST** and **LETSENCRYPT_HOST** entries from *sampleapi.example.com* and *samplewebsite.example.com* to your domains.
|
||||
* Change **LETSENCRYPT_EMAIL** entries to the email address you want to be associated with the certificates.
|
||||
* In `volumes/config/sample-website/config.js` change **apiUrl** to your API endpoint as set up in the previous point in `docker-compose.yml`.
|
||||
|
||||
### Running
|
||||
In the main directory run:
|
||||
```bash
|
||||
docker-compose up
|
||||
```
|
||||
|
||||
This will perform the following steps:
|
||||
|
||||
* Download the required images from Docker Hub ([nginx](https://hub.docker.com/_/nginx/), [docker-gen](https://hub.docker.com/r/jwilder/docker-gen/), [docker-letsencrypt-nginx-proxy-companion](https://hub.docker.com/r/jrcs/letsencrypt-nginx-proxy-companion/)).
|
||||
* Create containers from them.
|
||||
* Build and create containers for the two sites located in `sample-websites`.
|
||||
* Start up the containers.
|
||||
* *docker-letsencrypt-nginx-proxy-companion* inspects containers' metadata and tries to acquire certificates as needed (if successful then saving them in a volume shared with the host and the Nginx container).
|
||||
* *docker-gen* also inspects containers' metadata and generates the configuration file for the main Nginx reverse proxy
|
||||
|
||||
If everything went well then you should now be able to access your website at the provided address.
|
||||
|
||||
### Troubleshooting
|
||||
* To view logs run `docker-compose logs`.
|
||||
* To view the generated Nginx configuration run `docker exec -ti nginx cat /etc/nginx/conf.d/default.conf`
|
||||
|
||||
## How does it work
|
||||
|
||||
The system consists of 4 main parts:
|
||||
|
||||
* Main Nginx reverse proxy container.
|
||||
* Container that generates the main Nginx config based on container metadata.
|
||||
* Container that automatically handles the acquisition and renewal of Let's Encrypt TLS certificates.
|
||||
* The actual websites living in their own containers. In this example, a very simple website, talking to a very simple API.
|
||||
|
||||
### The main Nginx reverse proxy container
|
||||
This is the only publicly exposed container, routes traffic to the backend servers and provides TLS termination.
|
||||
|
||||
Uses the official [nginx](https://hub.docker.com/_/nginx/) Docker image.
|
||||
|
||||
It is defined in `docker-compose.yml` under the **nginx** service block:
|
||||
|
||||
```
|
||||
services:
|
||||
nginx:
|
||||
restart: always
|
||||
image: nginx
|
||||
container_name: nginx
|
||||
ports:
|
||||
- "80:80"
|
||||
- "443:443"
|
||||
volumes:
|
||||
- "/etc/nginx/conf.d"
|
||||
- "/etc/nginx/vhost.d"
|
||||
- "/usr/share/nginx/html"
|
||||
- "./volumes/proxy/certs:/etc/nginx/certs:ro"
|
||||
```
|
||||
|
||||
As you can see it shares a few volumes:
|
||||
* Configuration folder: used by the container that generates the configuration file.
|
||||
* Default Nginx root folder: used by the Let's Encrypt container for challenges from the CA.
|
||||
* Certificates folder: written to by the Let's Encrypt container, this is where the TLS certificates are maintained.
|
||||
|
||||
### The configuration generator container
|
||||
This container inspects the other running containers and based on their metadata (like **VIRTUAL_HOST** environment variable) and a template file it generates the Nginx configuration file for the main Nginx container. When a new container is spinning up this container detects that, generates the appropriate configuration entries and restarts Nginx.
|
||||
|
||||
Uses the [jwilder/docker-gen](https://hub.docker.com/r/jwilder/docker-gen/) Docker image.
|
||||
|
||||
It is defined in `docker-compose.yml` under the **nginx-gen** service block:
|
||||
|
||||
```
|
||||
services:
|
||||
...
|
||||
|
||||
nginx-gen:
|
||||
restart: always
|
||||
image: jwilder/docker-gen
|
||||
container_name: nginx-gen
|
||||
volumes:
|
||||
- "/var/run/docker.sock:/tmp/docker.sock:ro"
|
||||
- "./volumes/proxy/templates/nginx.tmpl:/etc/docker-gen/templates/nginx.tmpl:ro"
|
||||
volumes_from:
|
||||
- nginx
|
||||
entrypoint: /usr/local/bin/docker-gen -notify-sighup nginx -watch -wait 5s:30s /etc/docker-gen/templates/nginx.tmpl /etc/nginx/conf.d/default.conf
|
||||
```
|
||||
|
||||
The container reads the `nginx.tmpl` template file (source: [jwilder/nginx-proxy](https://github.com/jwilder/nginx-proxy)) via a volume shared with the host.
|
||||
|
||||
It also mounts the Docker socket into the container in order to be able to inspect the other containers (the `"/var/run/docker.sock:/tmp/docker.sock:ro"` line).
|
||||
**Security warning**: mounting the Docker socket is usually discouraged because the container getting (even read-only) access to it can get root access to the host. In our case, this container is not exposed to the world so if you trust the code running inside it the risks are probably fairly low. But definitely something to take into account. See e.g. [The Dangers of Docker.sock](https://raesene.github.io/blog/2016/03/06/The-Dangers-Of-Docker.sock/) for further details.
|
||||
|
||||
NOTE: it would be preferrable to have docker-gen only handle containers with exposed ports (via `-only-exposed` flag in the `entrypoint` script above) but currently that does not work, see e.g. <https://github.com/jwilder/nginx-proxy/issues/438>.
|
||||
|
||||
### The Let's Encrypt container
|
||||
This container also inspects the other containers and acquires Let's Encrypt TLS certificates based on the **LETSENCRYPT_HOST** and **LETSENCRYPT_EMAIL** environment variables. At regular intervals it checks and renews certificates as needed.
|
||||
|
||||
Uses the [jrcs/letsencrypt-nginx-proxy-companion](https://hub.docker.com/r/jrcs/letsencrypt-nginx-proxy-companion/) Docker image.
|
||||
|
||||
It is defined in `docker-compose.yml` under the **letsencrypt-nginx-proxy-companion** service block:
|
||||
|
||||
```
|
||||
services:
|
||||
...
|
||||
|
||||
letsencrypt-nginx-proxy-companion:
|
||||
restart: always
|
||||
image: jrcs/letsencrypt-nginx-proxy-companion
|
||||
container_name: letsencrypt-nginx-proxy-companion
|
||||
volumes_from:
|
||||
- nginx
|
||||
volumes:
|
||||
- "/var/run/docker.sock:/var/run/docker.sock:ro"
|
||||
- "./volumes/proxy/certs:/etc/nginx/certs:rw"
|
||||
environment:
|
||||
- NGINX_DOCKER_GEN_CONTAINER=nginx-gen
|
||||
```
|
||||
|
||||
The container uses a volume shared with the host and the Nginx container to maintain the certificates.
|
||||
|
||||
It also mounts the Docker socket in order to inspect the other containers. See the security warning above in the docker-gen section about the risks of that.
|
||||
|
||||
### The sample website and the sample API
|
||||
These two very simple samples are running in their own respective containers. They are defined in `docker-compose.yml` under the **sample-api** and **sample-website** service blocks:
|
||||
|
||||
```
|
||||
services:
|
||||
...
|
||||
|
||||
sample-api:
|
||||
restart: always
|
||||
image: sample-api
|
||||
build: ./sample-containers/api
|
||||
container_name: sample-api
|
||||
environment:
|
||||
- VIRTUAL_HOST=sampleapi.example.com
|
||||
- VIRTUAL_NETWORK=nginx-proxy
|
||||
- VIRTUAL_PORT=3000
|
||||
- LETSENCRYPT_HOST=sampleapi.example.com
|
||||
- LETSENCRYPT_EMAIL=email@example.com
|
||||
|
||||
sample-website:
|
||||
restart: always
|
||||
image: sample-website
|
||||
build: ./sample-containers/website
|
||||
container_name: sample-website
|
||||
volumes:
|
||||
- "./volumes/nginx-sample-website/conf.d/:/etc/nginx/conf.d"
|
||||
- "./volumes/config/sample-website/config.js:/usr/share/nginx/html/config.js"
|
||||
environment:
|
||||
- VIRTUAL_HOST=samplewebsite.example.com
|
||||
- VIRTUAL_NETWORK=nginx-proxy
|
||||
- VIRTUAL_PORT=80
|
||||
- LETSENCRYPT_HOST=sample.example.com
|
||||
- LETSENCRYPT_EMAIL=email@example.com
|
||||
```
|
||||
The important part here are the environment variables. These are used by the config generator and certificate maintainer containers to set up the system.
|
||||
|
||||
The source code for these two images is in the `sample-containers` subfolder, the images are built from there. In a real-world scenario these images would likely come from a Docker registry.
|
||||
|
||||
## Conclusion
|
||||
This can be a fairly simple way to have easy, reproducible deploys for websites with free, auto-renewing TLS certificates.
|
||||
|
65
docker-compose.yml
Normal file
65
docker-compose.yml
Normal file
@ -0,0 +1,65 @@
|
||||
version: "2"
|
||||
|
||||
services:
|
||||
nginx:
|
||||
restart: always
|
||||
image: nginx
|
||||
container_name: nginx
|
||||
ports:
|
||||
- "80:80"
|
||||
- "443:443"
|
||||
volumes:
|
||||
- "/etc/nginx/conf.d"
|
||||
- "/etc/nginx/vhost.d"
|
||||
- "/usr/share/nginx/html"
|
||||
- "./volumes/proxy/certs:/etc/nginx/certs:ro"
|
||||
|
||||
nginx-gen:
|
||||
restart: always
|
||||
image: jwilder/docker-gen
|
||||
container_name: nginx-gen
|
||||
volumes:
|
||||
- "/var/run/docker.sock:/tmp/docker.sock:ro"
|
||||
- "./volumes/proxy/templates/nginx.tmpl:/etc/docker-gen/templates/nginx.tmpl:ro"
|
||||
volumes_from:
|
||||
- nginx
|
||||
entrypoint: /usr/local/bin/docker-gen -notify-sighup nginx -watch -wait 5s:30s /etc/docker-gen/templates/nginx.tmpl /etc/nginx/conf.d/default.conf
|
||||
|
||||
letsencrypt-nginx-proxy-companion:
|
||||
restart: always
|
||||
image: jrcs/letsencrypt-nginx-proxy-companion
|
||||
container_name: letsencrypt-nginx-proxy-companion
|
||||
volumes_from:
|
||||
- nginx
|
||||
volumes:
|
||||
- "/var/run/docker.sock:/var/run/docker.sock:ro"
|
||||
- "./volumes/proxy/certs:/etc/nginx/certs:rw"
|
||||
environment:
|
||||
- NGINX_DOCKER_GEN_CONTAINER=nginx-gen
|
||||
|
||||
sample-api:
|
||||
restart: always
|
||||
image: sample-api
|
||||
build: ./sample-containers/api
|
||||
container_name: sample-api
|
||||
environment:
|
||||
- VIRTUAL_HOST=sampleapi.example.com
|
||||
- VIRTUAL_NETWORK=nginx-proxy
|
||||
- VIRTUAL_PORT=3000
|
||||
- LETSENCRYPT_HOST=sampleapi.example.com
|
||||
- LETSENCRYPT_EMAIL=email@example.com
|
||||
|
||||
sample-website:
|
||||
restart: always
|
||||
image: sample-website
|
||||
build: ./sample-containers/website
|
||||
container_name: sample-website
|
||||
volumes:
|
||||
- "./volumes/nginx-sample-website/conf.d/:/etc/nginx/conf.d"
|
||||
- "./volumes/config/sample-website/config.js:/usr/share/nginx/html/config.js"
|
||||
environment:
|
||||
- VIRTUAL_HOST=samplewebsite.example.com
|
||||
- VIRTUAL_NETWORK=nginx-proxy
|
||||
- VIRTUAL_PORT=80
|
||||
- LETSENCRYPT_HOST=sample.example.com
|
||||
- LETSENCRYPT_EMAIL=email@example.com
|
24
sample-containers/api/Dockerfile
Normal file
24
sample-containers/api/Dockerfile
Normal file
@ -0,0 +1,24 @@
|
||||
FROM mhart/alpine-node
|
||||
|
||||
EXPOSE 3000
|
||||
|
||||
RUN adduser -S app
|
||||
|
||||
ENV HOME=/home/app
|
||||
|
||||
COPY package.json $HOME/src/
|
||||
RUN chown -R app $HOME/*
|
||||
|
||||
USER app
|
||||
WORKDIR $HOME/src
|
||||
|
||||
RUN npm install && \
|
||||
npm cache clean
|
||||
|
||||
USER root
|
||||
COPY . $HOME/src
|
||||
RUN chown -R app $HOME/*
|
||||
|
||||
USER app
|
||||
|
||||
CMD ["node", "app.js"]
|
13
sample-containers/api/app.js
Normal file
13
sample-containers/api/app.js
Normal file
@ -0,0 +1,13 @@
|
||||
var express = require('express');
|
||||
var cors = require('cors');
|
||||
|
||||
var app = express();
|
||||
app.use(cors());
|
||||
|
||||
app.get('/hello', function (req, res) {
|
||||
res.send('Hello World!');
|
||||
});
|
||||
|
||||
app.listen(3000, function () {
|
||||
console.log('Listening on port 3000.');
|
||||
});
|
12
sample-containers/api/package.json
Normal file
12
sample-containers/api/package.json
Normal file
@ -0,0 +1,12 @@
|
||||
{
|
||||
"name": "sample-api",
|
||||
"version": "1.0.0",
|
||||
"description": "Express Hello World sample",
|
||||
"main": "app.js",
|
||||
"author": "George Ilyes",
|
||||
"license": "MIT",
|
||||
"dependencies": {
|
||||
"express": "^4.14.0",
|
||||
"cors": "^2.8.1"
|
||||
}
|
||||
}
|
3
sample-containers/website/Dockerfile
Normal file
3
sample-containers/website/Dockerfile
Normal file
@ -0,0 +1,3 @@
|
||||
FROM nginx
|
||||
|
||||
COPY ./ /usr/share/nginx/html/
|
14
sample-containers/website/index.html
Normal file
14
sample-containers/website/index.html
Normal file
@ -0,0 +1,14 @@
|
||||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<title>Sample webpage</title>
|
||||
</head>
|
||||
<body>
|
||||
<div>
|
||||
<button id="button">Call API</button>
|
||||
<div id="result"></div>
|
||||
</div>
|
||||
<script src="config.js"></script>
|
||||
<script src="index.js"></script>
|
||||
</body>
|
||||
|
19
sample-containers/website/index.js
Normal file
19
sample-containers/website/index.js
Normal file
@ -0,0 +1,19 @@
|
||||
'use strict';
|
||||
|
||||
(function() {
|
||||
|
||||
var button = document.getElementById('button');
|
||||
var result = document.getElementById('result');
|
||||
|
||||
button.addEventListener('click', function() {
|
||||
fetch(window.config.apiUrl + '/hello', { method: 'GET' })
|
||||
.then(function (response) {
|
||||
return response.text();
|
||||
})
|
||||
.then(function (body) {
|
||||
result.innerHTML += body;
|
||||
});
|
||||
});
|
||||
|
||||
})();
|
||||
|
3
volumes/config/sample-website/config.js
Normal file
3
volumes/config/sample-website/config.js
Normal file
@ -0,0 +1,3 @@
|
||||
window.config = {
|
||||
apiUrl: 'https://sampleapi.example.com'
|
||||
};
|
5
volumes/nginx-sample-website/conf.d/sample-website.conf
Normal file
5
volumes/nginx-sample-website/conf.d/sample-website.conf
Normal file
@ -0,0 +1,5 @@
|
||||
server {
|
||||
listen 80;
|
||||
server_name sample-website;
|
||||
root /usr/share/nginx/html;
|
||||
}
|
237
volumes/proxy/templates/nginx.tmpl
Normal file
237
volumes/proxy/templates/nginx.tmpl
Normal file
@ -0,0 +1,237 @@
|
||||
{{ $CurrentContainer := where $ "ID" .Docker.CurrentContainerID | first }}
|
||||
|
||||
{{ define "upstream" }}
|
||||
{{ if .Address }}
|
||||
{{/* If we got the containers from swarm and this container's port is published to host, use host IP:PORT */}}
|
||||
{{ if and .Container.Node.ID .Address.HostPort }}
|
||||
# {{ .Container.Node.Name }}/{{ .Container.Name }}
|
||||
server {{ .Container.Node.Address.IP }}:{{ .Address.HostPort }};
|
||||
{{/* If there is no swarm node or the port is not published on host, use container's IP:PORT */}}
|
||||
{{ else if .Network }}
|
||||
# {{ .Container.Name }}
|
||||
server {{ .Network.IP }}:{{ .Address.Port }};
|
||||
{{ end }}
|
||||
{{ else if .Network }}
|
||||
# {{ .Container.Name }}
|
||||
server {{ .Network.IP }} down;
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
|
||||
# If we receive X-Forwarded-Proto, pass it through; otherwise, pass along the
|
||||
# scheme used to connect to this server
|
||||
map $http_x_forwarded_proto $proxy_x_forwarded_proto {
|
||||
default $http_x_forwarded_proto;
|
||||
'' $scheme;
|
||||
}
|
||||
|
||||
# If we receive Upgrade, set Connection to "upgrade"; otherwise, delete any
|
||||
# Connection header that may have been passed to this server
|
||||
map $http_upgrade $proxy_connection {
|
||||
default upgrade;
|
||||
'' close;
|
||||
}
|
||||
|
||||
gzip_types text/plain text/css application/javascript application/json application/x-javascript text/xml application/xml application/xml+rss text/javascript;
|
||||
|
||||
log_format vhost '$host $remote_addr - $remote_user [$time_local] '
|
||||
'"$request" $status $body_bytes_sent '
|
||||
'"$http_referer" "$http_user_agent"';
|
||||
|
||||
access_log off;
|
||||
|
||||
{{ if (exists "/etc/nginx/proxy.conf") }}
|
||||
include /etc/nginx/proxy.conf;
|
||||
{{ else }}
|
||||
# HTTP 1.1 support
|
||||
proxy_http_version 1.1;
|
||||
proxy_buffering off;
|
||||
proxy_set_header Host $http_host;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection $proxy_connection;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $proxy_x_forwarded_proto;
|
||||
|
||||
# Mitigate httpoxy attack (see README for details)
|
||||
proxy_set_header Proxy "";
|
||||
{{ end }}
|
||||
|
||||
server {
|
||||
server_name _; # This is just an invalid value which will never trigger on a real hostname.
|
||||
listen 80;
|
||||
access_log /var/log/nginx/access.log vhost;
|
||||
return 503;
|
||||
}
|
||||
|
||||
{{ if (and (exists "/etc/nginx/certs/default.crt") (exists "/etc/nginx/certs/default.key")) }}
|
||||
server {
|
||||
server_name _; # This is just an invalid value which will never trigger on a real hostname.
|
||||
listen 443 ssl http2;
|
||||
access_log /var/log/nginx/access.log vhost;
|
||||
return 503;
|
||||
|
||||
ssl_session_tickets off;
|
||||
ssl_certificate /etc/nginx/certs/default.crt;
|
||||
ssl_certificate_key /etc/nginx/certs/default.key;
|
||||
}
|
||||
{{ end }}
|
||||
|
||||
{{ range $host, $containers := groupByMulti $ "Env.VIRTUAL_HOST" "," }}
|
||||
|
||||
upstream {{ $host }} {
|
||||
{{ range $container := $containers }}
|
||||
{{ $addrLen := len $container.Addresses }}
|
||||
|
||||
{{ range $knownNetwork := $CurrentContainer.Networks }}
|
||||
{{ range $containerNetwork := $container.Networks }}
|
||||
{{ if eq $knownNetwork.Name $containerNetwork.Name }}
|
||||
## Can be connect with "{{ $containerNetwork.Name }}" network
|
||||
|
||||
{{/* If only 1 port exposed, use that */}}
|
||||
{{ if eq $addrLen 1 }}
|
||||
{{ $address := index $container.Addresses 0 }}
|
||||
{{ template "upstream" (dict "Container" $container "Address" $address "Network" $containerNetwork) }}
|
||||
{{/* If more than one port exposed, use the one matching VIRTUAL_PORT env var, falling back to standard web port 80 */}}
|
||||
{{ else }}
|
||||
{{ $port := coalesce $container.Env.VIRTUAL_PORT "80" }}
|
||||
{{ $address := where $container.Addresses "Port" $port | first }}
|
||||
{{ template "upstream" (dict "Container" $container "Address" $address "Network" $containerNetwork) }}
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
{{ end }}
|
||||
}
|
||||
|
||||
{{ $default_host := or ($.Env.DEFAULT_HOST) "" }}
|
||||
{{ $default_server := index (dict $host "" $default_host "default_server") $host }}
|
||||
|
||||
{{/* Get the VIRTUAL_PROTO defined by containers w/ the same vhost, falling back to "http" */}}
|
||||
{{ $proto := or (first (groupByKeys $containers "Env.VIRTUAL_PROTO")) "http" }}
|
||||
|
||||
{{/* Get the HTTPS_METHOD defined by containers w/ the same vhost, falling back to "redirect" */}}
|
||||
{{ $https_method := or (first (groupByKeys $containers "Env.HTTPS_METHOD")) "redirect" }}
|
||||
|
||||
{{/* Get the first cert name defined by containers w/ the same vhost */}}
|
||||
{{ $certName := (first (groupByKeys $containers "Env.CERT_NAME")) }}
|
||||
|
||||
{{/* Get the best matching cert by name for the vhost. */}}
|
||||
{{ $vhostCert := (closest (dir "/etc/nginx/certs") (printf "%s.crt" $host))}}
|
||||
|
||||
{{/* vhostCert is actually a filename so remove any suffixes since they are added later */}}
|
||||
{{ $vhostCert := trimSuffix ".crt" $vhostCert }}
|
||||
{{ $vhostCert := trimSuffix ".key" $vhostCert }}
|
||||
|
||||
{{/* Use the cert specified on the container or fallback to the best vhost match */}}
|
||||
{{ $cert := (coalesce $certName $vhostCert) }}
|
||||
|
||||
{{ $is_https := (and (ne $cert "") (exists (printf "/etc/nginx/certs/%s.crt" $cert)) (exists (printf "/etc/nginx/certs/%s.key" $cert))) }}
|
||||
|
||||
{{ if $is_https }}
|
||||
|
||||
{{ if eq $https_method "redirect" }}
|
||||
server {
|
||||
server_name {{ $host }};
|
||||
listen 80 {{ $default_server }};
|
||||
access_log /var/log/nginx/access.log vhost;
|
||||
return 301 https://$host$request_uri;
|
||||
}
|
||||
{{ end }}
|
||||
|
||||
server {
|
||||
server_name {{ $host }};
|
||||
listen 443 ssl http2 {{ $default_server }};
|
||||
access_log /var/log/nginx/access.log vhost;
|
||||
|
||||
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
||||
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
|
||||
|
||||
ssl_prefer_server_ciphers on;
|
||||
ssl_session_timeout 5m;
|
||||
ssl_session_cache shared:SSL:50m;
|
||||
ssl_session_tickets off;
|
||||
|
||||
ssl_certificate /etc/nginx/certs/{{ (printf "%s.crt" $cert) }};
|
||||
ssl_certificate_key /etc/nginx/certs/{{ (printf "%s.key" $cert) }};
|
||||
|
||||
{{ if (exists (printf "/etc/nginx/certs/%s.dhparam.pem" $cert)) }}
|
||||
ssl_dhparam {{ printf "/etc/nginx/certs/%s.dhparam.pem" $cert }};
|
||||
{{ end }}
|
||||
|
||||
{{ if (ne $https_method "noredirect") }}
|
||||
add_header Strict-Transport-Security "max-age=31536000";
|
||||
{{ end }}
|
||||
|
||||
{{ if (exists (printf "/etc/nginx/vhost.d/%s" $host)) }}
|
||||
include {{ printf "/etc/nginx/vhost.d/%s" $host }};
|
||||
{{ else if (exists "/etc/nginx/vhost.d/default") }}
|
||||
include /etc/nginx/vhost.d/default;
|
||||
{{ end }}
|
||||
|
||||
location / {
|
||||
{{ if eq $proto "uwsgi" }}
|
||||
include uwsgi_params;
|
||||
uwsgi_pass {{ trim $proto }}://{{ trim $host }};
|
||||
{{ else }}
|
||||
proxy_pass {{ trim $proto }}://{{ trim $host }};
|
||||
{{ end }}
|
||||
{{ if (exists (printf "/etc/nginx/htpasswd/%s" $host)) }}
|
||||
auth_basic "Restricted {{ $host }}";
|
||||
auth_basic_user_file {{ (printf "/etc/nginx/htpasswd/%s" $host) }};
|
||||
{{ end }}
|
||||
{{ if (exists (printf "/etc/nginx/vhost.d/%s_location" $host)) }}
|
||||
include {{ printf "/etc/nginx/vhost.d/%s_location" $host}};
|
||||
{{ else if (exists "/etc/nginx/vhost.d/default_location") }}
|
||||
include /etc/nginx/vhost.d/default_location;
|
||||
{{ end }}
|
||||
}
|
||||
}
|
||||
|
||||
{{ end }}
|
||||
|
||||
{{ if or (not $is_https) (eq $https_method "noredirect") }}
|
||||
|
||||
server {
|
||||
server_name {{ $host }};
|
||||
listen 80 {{ $default_server }};
|
||||
access_log /var/log/nginx/access.log vhost;
|
||||
|
||||
{{ if (exists (printf "/etc/nginx/vhost.d/%s" $host)) }}
|
||||
include {{ printf "/etc/nginx/vhost.d/%s" $host }};
|
||||
{{ else if (exists "/etc/nginx/vhost.d/default") }}
|
||||
include /etc/nginx/vhost.d/default;
|
||||
{{ end }}
|
||||
|
||||
location / {
|
||||
{{ if eq $proto "uwsgi" }}
|
||||
include uwsgi_params;
|
||||
uwsgi_pass {{ trim $proto }}://{{ trim $host }};
|
||||
{{ else }}
|
||||
proxy_pass {{ trim $proto }}://{{ trim $host }};
|
||||
{{ end }}
|
||||
{{ if (exists (printf "/etc/nginx/htpasswd/%s" $host)) }}
|
||||
auth_basic "Restricted {{ $host }}";
|
||||
auth_basic_user_file {{ (printf "/etc/nginx/htpasswd/%s" $host) }};
|
||||
{{ end }}
|
||||
{{ if (exists (printf "/etc/nginx/vhost.d/%s_location" $host)) }}
|
||||
include {{ printf "/etc/nginx/vhost.d/%s_location" $host}};
|
||||
{{ else if (exists "/etc/nginx/vhost.d/default_location") }}
|
||||
include /etc/nginx/vhost.d/default_location;
|
||||
{{ end }}
|
||||
}
|
||||
}
|
||||
|
||||
{{ if (and (not $is_https) (exists "/etc/nginx/certs/default.crt") (exists "/etc/nginx/certs/default.key")) }}
|
||||
server {
|
||||
server_name {{ $host }};
|
||||
listen 443 ssl http2 {{ $default_server }};
|
||||
access_log /var/log/nginx/access.log vhost;
|
||||
return 500;
|
||||
|
||||
ssl_certificate /etc/nginx/certs/default.crt;
|
||||
ssl_certificate_key /etc/nginx/certs/default.key;
|
||||
}
|
||||
{{ end }}
|
||||
|
||||
{{ end }}
|
||||
{{ end }}
|
Loading…
x
Reference in New Issue
Block a user