mirror of
https://gitlab.archlinux.org/archlinux/infrastructure.git
synced 2025-01-18 08:06:16 +01:00
We want to roll out HTTP/3 slowly, so this adds the necessary plumbing and makes it possible to enable it per host. Instead of adding the conditional logic to each nginx template, the 443 listen config is moved out into a snippet which is managed by the nginx role. HTTP/3 uses QUIC which is built on UDP. UDP is connectionless and therefore reuseport[1][2] must be used to ensure that UDP packets for the same QUIC connection is directed to the same worker. reuseport can only be enabled once, so a default_server is added to the "inventory_hostname vhost" for SSL/QUIC (reuseport is only enabled for the latter). ssl_reject_handshake[3] is enabled as that allows enabling SSL/QUIC without specifying a certificate. [1] https://nginx.org/en/docs/http/ngx_http_core_module.html#listen [2] https://lwn.net/Articles/542629/ [3] http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_reject_handshake Ref #606
77 lines
2.6 KiB
Django/Jinja
77 lines
2.6 KiB
Django/Jinja
# uwsgi caching zone
|
|
uwsgi_cache_path /var/lib/nginx/cache/ levels=1:2 keys_zone=sec_cache:5m max_size=1g inactive=60m use_temp_path=off;
|
|
|
|
# limit requests to 5 r/s to block DoS attempts with a burst of 10.
|
|
limit_req_zone $binary_remote_addr zone=sec_req_limit:10m rate=5r/s;
|
|
|
|
# limit http status: 429 Too Many Requests
|
|
limit_req_status 429;
|
|
|
|
upstream security-tracker {
|
|
server unix:///run/uwsgi/security-tracker.sock;
|
|
}
|
|
|
|
server {
|
|
listen 80;
|
|
listen [::]:80;
|
|
server_name {{ security_tracker_domain }};
|
|
|
|
access_log /var/log/nginx/{{ security_tracker_domain }}/access.log reduced;
|
|
access_log /var/log/nginx/{{ security_tracker_domain }}/access.log.json json_reduced;
|
|
error_log /var/log/nginx/{{ security_tracker_domain }}/error.log;
|
|
|
|
include snippets/letsencrypt.conf;
|
|
|
|
location / {
|
|
access_log off;
|
|
return 301 https://$server_name$request_uri;
|
|
}
|
|
}
|
|
|
|
server {
|
|
include snippets/listen-443.conf;
|
|
server_name {{ security_tracker_domain }};
|
|
|
|
access_log /var/log/nginx/{{ security_tracker_domain }}/access.log reduced;
|
|
access_log /var/log/nginx/{{ security_tracker_domain }}/access.log.json json_reduced;
|
|
error_log /var/log/nginx/{{ security_tracker_domain }}/error.log;
|
|
|
|
ssl_certificate /etc/letsencrypt/live/{{ security_tracker_domain }}/fullchain.pem;
|
|
ssl_certificate_key /etc/letsencrypt/live/{{ security_tracker_domain }}/privkey.pem;
|
|
ssl_trusted_certificate /etc/letsencrypt/live/{{ security_tracker_domain }}/chain.pem;
|
|
|
|
location = /google9fb65bdd43709b25.html {
|
|
# verification code for anthraxx
|
|
return 200 "google-site-verification: google9fb65bdd43709b25.html";
|
|
}
|
|
|
|
location /static/ {
|
|
alias {{ security_tracker_dir }}/tracker/static/;
|
|
}
|
|
|
|
# API/RSS endpoint
|
|
location ~* .*(atom|json)$ {
|
|
access_log /var/log/nginx/{{ security_tracker_domain }}/access.log main;
|
|
access_log /var/log/nginx/{{ security_tracker_domain }}/access.log.json json_main;
|
|
|
|
include uwsgi_params;
|
|
uwsgi_pass security-tracker;
|
|
uwsgi_cache sec_cache;
|
|
uwsgi_cache_valid 5m;
|
|
uwsgi_cache_key "$request_method$request_uri";
|
|
|
|
limit_req zone=sec_req_limit burst=5 nodelay;
|
|
}
|
|
|
|
# Web UI endpoint
|
|
location / {
|
|
access_log /var/log/nginx/{{ security_tracker_domain }}/access.log main;
|
|
access_log /var/log/nginx/{{ security_tracker_domain }}/access.log.json json_main;
|
|
|
|
include uwsgi_params;
|
|
uwsgi_pass security-tracker;
|
|
|
|
limit_req zone=sec_req_limit burst=10 nodelay;
|
|
}
|
|
}
|