Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- map $http_upgrade $connection_upgrade {
- default upgrade;
- '' close;
- }
- upstream backend {
- server 127.0.0.1:3000 fail_timeout=0;
- }
- upstream streaming {
- server 127.0.0.1:4000 fail_timeout=0;
- }
- proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=1g;
- server {
- listen 80;
- listen [::]:80;
- server_name example.com;
- root /home/<USERNAME>/mastodon/public;
- location /.well-known/acme-challenge/ { allow all; }
- location / { return 301 https://$host$request_uri; }
- }
- server {
- # I've initially added --redirect flag to certbot
- # if ($host = expacahn.dedyn.io) {
- # return 301 https://$host$request_uri;
- # } # managed by Certbot
- listen 443 ssl http2;
- listen [::]:443 ssl ipv6only=on http2;
- server_name example.com;
- ssl_certificate /etc/letsencrypt/live/expacahn.dedyn.io/fullchain.pem; # managed by Certbot
- ssl_certificate_key /etc/letsencrypt/live/expacahn.dedyn.io/privkey.pem; # managed by Certbot
- include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
- ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
- add_header Strict-Transport-Security "max-age=31536000" always; # managed by Certbot
- ssl_trusted_certificate /etc/letsencrypt/live/expacahn.dedyn.io/chain.pem; # managed by Certbot
- ssl_stapling on; # managed by Certbot
- ssl_stapling_verify on; # managed by Certbot
- keepalive_timeout 70;
- sendfile on;
- client_max_body_size 80m;
- root /home/<USERNAME>/mastodon/public;
- gzip on;
- gzip_disable "msie6";
- gzip_vary on;
- gzip_proxied any;
- gzip_comp_level 6;
- gzip_buffers 16 8k;
- gzip_http_version 1.1;
- gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript image/svg+xml image/x-icon;
- location / {
- try_files $uri @proxy;
- }
- # If Docker is used for deployment and Rails serves static files,
- # then needed must replace line `try_files $uri =404;` with `try_files $uri @proxy;`.
- location = /sw.js {
- add_header Cache-Control "public, max-age=604800, must-revalidate";
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- try_files $uri @proxy;
- }
- location ~ ^/assets/ {
- add_header Cache-Control "public, max-age=2419200, must-revalidate";
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- try_files $uri @proxy;
- }
- location ~ ^/avatars/ {
- add_header Cache-Control "public, max-age=2419200, must-revalidate";
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- try_files $uri @proxy;
- }
- location ~ ^/emoji/ {
- add_header Cache-Control "public, max-age=2419200, must-revalidate";
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- try_files $uri @proxy;
- }
- location ~ ^/headers/ {
- add_header Cache-Control "public, max-age=2419200, must-revalidate";
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- try_files $uri @proxy;
- }
- location ~ ^/packs/ {
- add_header Cache-Control "public, max-age=2419200, must-revalidate";
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- try_files $uri @proxy;
- }
- location ~ ^/shortcuts/ {
- add_header Cache-Control "public, max-age=2419200, must-revalidate";
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- try_files $uri @proxy;
- }
- location ~ ^/sounds/ {
- add_header Cache-Control "public, max-age=2419200, must-revalidate";
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- try_files $uri @proxy;
- }
- location ~ ^/system/ {
- add_header Cache-Control "public, max-age=2419200, immutable";
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- try_files $uri @proxy;
- }
- location ^~ /api/v1/streaming {
- proxy_set_header Host $host;
- proxy_set_header X-Real-IP $remote_addr;
- proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
- proxy_set_header X-Forwarded-Proto $scheme;
- proxy_set_header Proxy "";
- proxy_pass http://streaming;
- proxy_buffering off;
- proxy_redirect off;
- proxy_http_version 1.1;
- proxy_set_header Upgrade $http_upgrade;
- proxy_set_header Connection $connection_upgrade;
- add_header Strict-Transport-Security "max-age=63072000; includeSubDomains";
- tcp_nodelay on;
- }
- location @proxy {
- proxy_set_header Host $host;
- proxy_set_header X-Real-IP $remote_addr;
- proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
- proxy_set_header X-Forwarded-Proto $scheme;
- proxy_set_header Proxy "";
- proxy_pass_header Server;
- proxy_pass http://backend;
- proxy_buffering on;
- proxy_redirect off;
- proxy_http_version 1.1;
- proxy_set_header Upgrade $http_upgrade;
- proxy_set_header Connection $connection_upgrade;
- proxy_cache CACHE;
- proxy_cache_valid 200 7d;
- proxy_cache_valid 410 24h;
- proxy_cache_use_stale error timeout updating http_500 http_502 http_503 http_504;
- add_header X-Cached $upstream_cache_status;
- tcp_nodelay on;
- }
- error_page 404 500 501 502 503 504 /500.html;
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement