Compare commits

...

2 Commits

Author SHA1 Message Date
61965a5c79
add(nginx): No-CSP security-header file
Content Security Policy breaks some features of Gitea and should be
disabled. This header file allows other configuration files to use it,
too.
2025-06-29 17:56:48 +00:00
081d7e0467
update(nginx): file "gitea" "3.0.1.12" > "4.0.0-beta.1" 2025-06-29 17:54:51 +00:00
2 changed files with 56 additions and 31 deletions

View File

@ -1,17 +1,19 @@
# Inferencium - xb000-0 # Inferencium - xb-00-01
# Nginx - Configuration - Gitea # Nginx - Configuration - Gitea
# Version: 4.0.0-beta.1
# Copyright 2022 Jake Winters # Copyright 2022 Jake Winters
# SPDX-License-Identifier: BSD-3-Clause # SPDX-License-Identifier: BSD-3-Clause
# Version: 3.0.1.12
# Server (unencrypted) # Server (unencrypted)
## Redirect from this server block to an encrypted server block if TLS is required
server { server {
# General # General
server_name git.inferencium.net; server_name src.inferencium.net www.src.inferencium.net;
## IPv4
listen 80; listen 80;
## IPv6
listen [::]:80; listen [::]:80;
# Location # Location
@ -20,34 +22,44 @@ server {
} }
} }
# Server (TLS) # Server (TLS)
server { server {
# General # General
server_name git.inferencium.net; server_name src.inferencium.net;
listen 443 ssl http2; http2 on;
listen [::]:443 ssl http2; ## IPv4
listen 443 ssl;
# Security ## IPv6
ssl_certificate /etc/letsencrypt/live/git.inferencium.net/fullchain.pem; listen [::]:443 ssl;
ssl_certificate_key /etc/letsencrypt/live/git.inferencium.net/privkey.pem;
ssl_protocols TLSv1.3;
ssl_ciphers "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256";
ssl_conf_command Ciphersuites "TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256";
ssl_conf_command Options PrioritizeChaCha;
ssl_prefer_server_ciphers on;
ssl_ecdh_curve X25519;
add_header Strict-Transport-Security "max-age=126200000; includeSubDomains; preload";
add_header X-Frame-Options "DENY";
add_header X-Content-Type-Options nosniff;
# add_header Content-Security-Policy "default-src 'self'; img-src 'self'; media-src 'self'; object-src 'none'; script-src 'none'; connect-src 'none'; frame-src 'none'; style-src 'self'; font-src 'self'";
add_header Referrer-Policy no-referrer;
# Location # Location
location / { location / {
proxy_pass http://unix:/run/gitea/gitea.socket; proxy_pass http://unix:/run/gitea/gitea.sock;
proxy_set_header Host $host; proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Proto $scheme;
} }
# Security
ssl_trusted_certificate /etc/letsencrypt/live/inferencium.net/chain.pem;
ssl_certificate /etc/letsencrypt/live/inferencium.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/inferencium.net/privkey.pem;
ssl_protocols TLSv1.3;
ssl_ciphers "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256";
ssl_conf_command Ciphersuites "TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256";
ssl_conf_command Options PrioritizeChaCha;
ssl_prefer_server_ciphers on;
ssl_ecdh_curve X25519:secp256r1;
ssl_stapling on;
ssl_stapling_verify on;
ssl_session_timeout 1d;
ssl_session_cache shared:MozSSL:10m;
ssl_session_cache shared:ssl_session_cache:10m;
ssl_session_tickets off;
## Headers
include /etc/nginx/include/header-security-nocsp.conf;
} }

View File

@ -0,0 +1,13 @@
# Inferencium - xb-00-01
# Nginx - Configuration - Header - Security - No CSP
# Version: 1.0.0-beta.1
# Copyright 2025 Jake Winters
# SPDX-License-Identifier: BSD-3-Clause
add_header Strict-Transport-Security "max-age=126200000; includeSubDomains; preload";
add_header X-Frame-Options "DENY";
add_header X-Content-Type-Options nosniff;
add_header Referrer-Policy no-referrer;