Last active
June 12, 2017 03:58
-
-
Save bekcpear/cfa2045ca4050238e83256ee2726bd5e to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
upstream php-handler { | |
# server 127.0.0.1:9000; | |
server unix:/path/to/your/php-fpm.socket; | |
} | |
server { | |
listen 80; | |
listen [::]:80; | |
server_name example.com; | |
if ($host !~ 'example\.com$'){ | |
return 301 https://www.google.com; | |
} | |
return 301 https://example.com$request_uri; | |
} | |
server { | |
listen 443 ssl http2; | |
listen [::]:443 ssl http2; | |
server_name example.com; | |
if ($host !~ 'example\.com$'){ | |
return 301 https://www.google.com; | |
} | |
keepalive_timeout 70; | |
resolver 8.8.8.8 208.67.222.222 8.8.4.4 valid=30s; | |
# Enable gzip but do not remove ETag headers | |
gzip on; | |
gzip_vary on; | |
gzip_comp_level 4; | |
gzip_min_length 256; | |
gzip_proxied expired no-cache no-store private no_last_modified no_etag auth; | |
gzip_types application/atom+xml application/javascript application/json application/ld+json application/manifest+json application/rss+xml application/vnd.geo+json application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/bmp image/svg+xml image/x-icon text/cache-manifest text/css text/plain text/vcard text/vnd.rim.location.xloc text/vtt text/x-component text/x-cross-domain-policy; | |
ssl_certificate /path/to/your/fullchain.pem; | |
ssl_certificate_key /path/to/your/privkey.pem; | |
ssl_dhparam /path/to/your/dhparam.pem; | |
ssl_ct on; | |
ssl_ct_static_scts /path/to/your/scts_dir; | |
ssl_stapling on; | |
ssl_stapling_verify on; | |
ssl_trusted_certificate /path/to/your/trusted_certs.pem; | |
ssl_session_timeout 1d; | |
ssl_session_cache shared:SSL:10m; | |
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; | |
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS'; | |
ssl_prefer_server_ciphers on; | |
add_header Public-Key-Pins 'pin-sha256="<base64-encoded-server-certificate-SPKI-FP>"; pin-sha256="<base64-encoded-intermediate-certificate-SPKI-FP>"; pin-sha256="<base64-encoded-backup-certificate-SPKI-FP>"; max-age=2592000' always; | |
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always; | |
add_header X-XSS-Protection "1; mode=block"; | |
add_header X-Robots-Tag none; | |
add_header X-Download-Options noopen; | |
add_header X-Content-Type-Options nosniff; | |
add_header Content-Security-Policy "default-src 'self'; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src * 'self' data:; font-src 'self' data:"; | |
add_header X-Permitted-Cross-Domain-Policies none; | |
access_log /path/to/your/access.log main; | |
error_log /path/to/your/error.log error; | |
root /path/to/your/nextcloud_web_dir; | |
location = /robots.txt { | |
allow all; | |
log_not_found off; | |
access_log off; | |
} | |
# The following 2 rules are only needed for the user_webfinger app. | |
# Uncomment it if you're planning to use this app. | |
#rewrite ^/.well-known/host-meta /public.php?service=host-meta last; | |
#rewrite ^/.well-known/host-meta.json /public.php?service=host-meta-json last; | |
location = /.well-known/carddav { | |
return 301 $scheme://$host/remote.php/dav; | |
} | |
location = /.well-known/caldav { | |
return 301 $scheme://$host/remote.php/dav; | |
} | |
#location ^~ /.well-known/acme-challenge { } | |
# set max upload size | |
client_max_body_size 1024M; | |
fastcgi_buffers 64 4K; | |
# Uncomment if your server is build with the ngx_pagespeed module | |
# This module is currently not supported. | |
#pagespeed off; | |
error_page 403 /core/templates/403.php; | |
error_page 404 /core/templates/404.php; | |
location / { | |
rewrite ^ /index.php$uri; | |
} | |
location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)/ { | |
deny all; | |
} | |
location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) { | |
deny all; | |
} | |
location ~ ^/(?:index|remote|public|cron|core/ajax/update|status|ocs/v[12]|updater/.+|ocs-provider/.+)\.php(?:$|/) { | |
fastcgi_split_path_info ^(.+\.php)(/.*)$; | |
if ($fastcgi_path_info = /apps/notifications/api/v2/notifications) { | |
access_log off; | |
} | |
if ($fastcgi_path_info = /apps/notifications/api/v1/notifications) { | |
access_log off; | |
} | |
if ($fastcgi_path_info = /dav/files/ruz/) { | |
access_log off; | |
} | |
include fastcgi_params; | |
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; | |
fastcgi_param PATH_INFO $fastcgi_path_info; | |
fastcgi_param HTTPS on; | |
fastcgi_param modHeadersAvailable true; #Avoid sending the security headers twice | |
fastcgi_param front_controller_active true; | |
fastcgi_pass php-handler; | |
fastcgi_intercept_errors on; | |
fastcgi_request_buffering off; #Available since NGINX 1.7.11 | |
fastcgi_hide_header X-Powered-By; | |
} | |
location ~ ^/(?:updater|ocs-provider)(?:$|/) { | |
try_files $uri/ =404; | |
index index.php; | |
} | |
# Adding the cache control header for js and css files | |
# Make sure it is BELOW the PHP block | |
location ~ \.(?:css|js|woff|svg|gif)$ { | |
try_files $uri /index.php$uri$is_args$args; | |
add_header Cache-Control "public, max-age=15778463"; | |
# Add headers to serve security related headers (It is intended to | |
# have those duplicated to the ones above) | |
# Before enabling Strict-Transport-Security headers please read into | |
# this topic first. | |
# add_header Strict-Transport-Security "max-age=15768000; | |
# includeSubDomains; preload;"; | |
# | |
# WARNING: Only add the preload option once you read about | |
# the consequences in https://hstspreload.org/. This option | |
# will add the domain to a hardcoded list that is shipped | |
# in all major browsers and getting removed from this list | |
# could take several months. | |
add_header Public-Key-Pins 'pin-sha256="<base64-encoded-server-certificate-SPKI-FP>"; pin-sha256="<base64-encoded-intermediate-certificate-SPKI-FP>"; pin-sha256="<base64-encoded-backup-certificate-SPKI-FP>"; max-age=2592000' always; | |
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always; | |
add_header X-XSS-Protection "1; mode=block"; | |
add_header X-Robots-Tag none; | |
add_header X-Download-Options noopen; | |
add_header X-Content-Type-Options nosniff; | |
add_header X-Permitted-Cross-Domain-Policies none; | |
# Optional: Don't log access to assets | |
access_log off; | |
} | |
location ~ \.(?:png|html|ttf|ico|jpg|jpeg)$ { | |
try_files $uri /index.php$uri$is_args$args; | |
# Optional: Don't log access to other assets | |
access_log off; | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment