1
1
mirror of https://gitlab.archlinux.org/archlinux/infrastructure.git synced 2025-01-18 08:06:16 +01:00
infrastructure/roles/conf_archlinux/templates/nginx.d.conf.j2
Sven-Hendrik Haase dd7a7a7219
Relax conf.archlinux.org content security
The site now includes some foreign scripts and we need a more lax CSP in order for that to even work.
2020-09-27 23:21:12 +02:00

50 lines
1.8 KiB
Django/Jinja

server {
listen 80;
listen [::]:80;
server_name {{ conference_domain }};
access_log /var/log/nginx/{{ conference_domain }}/access.log reduced;
error_log /var/log/nginx/{{ conference_domain }}/error.log;
include snippets/letsencrypt.conf;
location / {
access_log off;
return 301 https://$server_name$request_uri;
}
}
server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
server_name {{ conference_domain }};
access_log /var/log/nginx/{{ conference_domain }}/access.log reduced;
error_log /var/log/nginx/{{ conference_domain }}/error.log;
ssl_certificate /etc/letsencrypt/live/{{ conference_domain }}/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/{{ conference_domain }}/privkey.pem;
ssl_trusted_certificate /etc/letsencrypt/live/{{ conference_domain }}/chain.pem;
# Security headers
add_header X-Frame-Options "SAMEORIGIN" always;
add_header X-Xss-Protection "1; mode=block" always;
add_header Referrer-Policy "same-origin";
add_header Feature-Policy "geolocation 'none' ;midi 'none'; sync-xhr 'none'; microphone 'none'; camera 'none'; magnetometer 'none'; gyroscope 'none'; speaker 'none'; fullscreen 'none'; payment 'none';";
add_header Content-Security-Policy "default-src https: *.media.ccc.de embed.twitch.tv kiwiirc.com 'unsafe-inline';";
add_header X-Content-Type-Options "nosniff" always;
# Apply HSTS header again, since adding a header removes previous headers
add_header Strict-Transport-Security $hsts_header;
location /2019 {
return 301 $scheme://$server_name;
}
location /reports/archconf2019 {
return 301 $scheme://$server_name/reports/archconf_2019;
}
root {{ conference_dir }}/public;
}