173 lines
4.7 KiB
Django/Jinja
173 lines
4.7 KiB
Django/Jinja
upstream php-handler {
|
|
server unix:/run/php/php-fpm.sock;
|
|
}
|
|
|
|
server {
|
|
listen 80;
|
|
listen [::]:80;
|
|
|
|
server_name {{ nextcloud_domain }};
|
|
|
|
location /.well-known/acme-challenge {
|
|
default_type "text/plain";
|
|
alias /var/www/acme-challenge;
|
|
}
|
|
|
|
location / {
|
|
return 301 https://{{ nextcloud_domain }}$request_uri;
|
|
}
|
|
}
|
|
|
|
server {
|
|
listen 443 ssl http2;
|
|
listen [::]:443 ssl http2;
|
|
|
|
server_name {{ nextcloud_domain }};
|
|
|
|
ssl_certificate_key /etc/nginx/ssl/{{ nextcloud_domain }}.key;
|
|
ssl_certificate /etc/nginx/ssl/{{ nextcloud_domain }}.crt;
|
|
|
|
# Add headers to serve security related headers
|
|
add_header Strict-Transport-Security "max-age=15768000; includeSubDomains; preload;";
|
|
add_header X-Content-Type-Options nosniff;
|
|
add_header X-Frame-Options "SAMEORIGIN";
|
|
add_header X-XSS-Protection "1; mode=block";
|
|
add_header X-Robots-Tag "noindex, nofollow";
|
|
add_header X-Download-Options noopen;
|
|
add_header X-Permitted-Cross-Domain-Policies none;
|
|
add_header 'Referrer-Policy' 'no-referrer';
|
|
|
|
# Remove X-Powered-By, which is an information leak
|
|
fastcgi_hide_header X-Powered-By;
|
|
|
|
root /var/www/nextcloud/;
|
|
|
|
# set max upload size
|
|
client_max_body_size 1G;
|
|
fastcgi_buffers 64 4K;
|
|
|
|
index index.php index.html /index.php$request_uri;
|
|
|
|
|
|
location ^~ /browser {
|
|
proxy_pass http://localhost:9980;
|
|
proxy_set_header Host $http_host;
|
|
}
|
|
|
|
location ^~ /hosting/discovery {
|
|
proxy_pass http://localhost:9980;
|
|
proxy_set_header Host $http_host;
|
|
}
|
|
|
|
location ^~ /hosting/capabilities {
|
|
proxy_pass http://localhost:9980;
|
|
proxy_set_header Host $http_host;
|
|
}
|
|
|
|
location ~ ^/cool/(.*)/ws$ {
|
|
proxy_pass http://localhost:9980;
|
|
proxy_set_header Upgrade $http_upgrade;
|
|
proxy_set_header Connection "Upgrade";
|
|
proxy_set_header Host $http_host;
|
|
proxy_read_timeout 36000s;
|
|
}
|
|
|
|
location ~ ^/(c|l)ool {
|
|
proxy_pass http://localhost:9980;
|
|
proxy_set_header Host $http_host;
|
|
}
|
|
|
|
location ^~ /cool/adminws {
|
|
proxy_pass http://localhost:9980;
|
|
proxy_set_header Upgrade $http_upgrade;
|
|
proxy_set_header Connection "Upgrade";
|
|
proxy_set_header Host $http_host;
|
|
proxy_read_timeout 36000s;
|
|
}
|
|
|
|
|
|
# Rule borrowed from `.htaccess` to handle Microsoft DAV clients
|
|
location = / {
|
|
if ( $http_user_agent ~ ^DavClnt ) {
|
|
return 302 /remote.php/webdav/$is_args$args;
|
|
}
|
|
}
|
|
|
|
location = /robots.txt {
|
|
allow all;
|
|
log_not_found off;
|
|
access_log off;
|
|
}
|
|
|
|
# Make a regex exception for `/.well-known` so that clients can still
|
|
# access it despite the existence of the regex rule
|
|
# `location ~ /(\.|autotest|...)` which would otherwise handle requests
|
|
# for `/.well-known`.
|
|
location ^~ /.well-known {
|
|
# The following 6 rules are borrowed from `.htaccess`
|
|
|
|
location = /.well-known/carddav { return 301 /remote.php/dav/; }
|
|
location = /.well-known/caldav { return 301 /remote.php/dav/; }
|
|
# Anything else is dynamically handled by Nextcloud
|
|
location ^~ /.well-known { return 301 /index.php$uri; }
|
|
|
|
try_files $uri $uri/ =404;
|
|
}
|
|
|
|
# Rules borrowed from `.htaccess` to hide certain paths from clients
|
|
location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)(?:$|/) { return 404; }
|
|
location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) { return 404; }
|
|
|
|
# Ensure this block, which passes PHP files to the PHP process, is above the blocks
|
|
# which handle static assets (as seen below). If this block is not declared first,
|
|
# then Nginx will encounter an infinite rewriting loop when it prepends `/index.php`
|
|
# to the URI, resulting in a HTTP 500 error response.
|
|
location ~ \.php(?:$|/) {
|
|
fastcgi_split_path_info ^(.+?\.php)(/.*)$;
|
|
set $path_info $fastcgi_path_info;
|
|
|
|
try_files $fastcgi_script_name =404;
|
|
|
|
include fastcgi_params;
|
|
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
|
|
fastcgi_param PATH_INFO $path_info;
|
|
fastcgi_param HTTPS on;
|
|
|
|
fastcgi_param modHeadersAvailable true; # Avoid sending the security headers twice
|
|
fastcgi_param front_controller_active true; # Enable pretty urls
|
|
fastcgi_pass php-handler;
|
|
|
|
fastcgi_intercept_errors on;
|
|
fastcgi_request_buffering off;
|
|
}
|
|
|
|
location ~ \.(?:css|js|svg|gif)$ {
|
|
try_files $uri /index.php$request_uri;
|
|
expires 6M; # Cache-Control policy borrowed from `.htaccess`
|
|
access_log off; # Optional: Don't log access to assets
|
|
}
|
|
|
|
location ~ \.woff2?$ {
|
|
try_files $uri /index.php$request_uri;
|
|
expires 7d; # Cache-Control policy borrowed from `.htaccess`
|
|
access_log off; # Optional: Don't log access to assets
|
|
}
|
|
|
|
|
|
location / {
|
|
try_files $uri $uri/ /index.php$request_uri;
|
|
}
|
|
|
|
|
|
# collabora static files
|
|
location /drawio {
|
|
access_log off;
|
|
alias /var/www/drawio/src/main/webapp;
|
|
index index.html;
|
|
location ~ ^/drawio/(.*\.(html|xml|js|css|gif|jpg|png))$ {
|
|
alias /var/www/drawio/src/main/webapp/$1;
|
|
}
|
|
}
|
|
|
|
}
|