Compare commits

..

3 Commits

Author SHA1 Message Date
d1c5f0e813
del(nginx): expired Git-server redirect configuration file 2025-06-29 18:06:21 +00:00
3448e988c7
add(nginx): No-CSP security-header file
Content Security Policy breaks some features of Gitea and should be
disabled. This header file allows other configuration files to use it,
too.
2025-06-29 18:05:27 +00:00
50478f062f
update(nginx): file "gitea" "3.0.1.12" > "4.0.0" 2025-06-29 18:04:34 +00:00
3 changed files with 56 additions and 102 deletions

View File

@ -1,53 +1,65 @@
# Inferencium - xb000-0 # Inferencium - xb-00-01
# Nginx - Configuration - Gitea # Nginx - Configuration - Gitea
# Version: 4.0.0
# Copyright 2022 Jake Winters # Copyright 2022 Jake Winters
# SPDX-License-Identifier: BSD-3-Clause # SPDX-License-Identifier: BSD-3-Clause
# Version: 3.0.1.12
# Server (unencrypted) # Server (unencrypted)
## Redirect from this server block to an encrypted server block if TLS is required
server { server {
# General # General
server_name git.inferencium.net; server_name src.inferencium.net www.src.inferencium.net;
listen 80; ## IPv4
listen [::]:80; listen 80;
## IPv6
listen [::]:80;
# Location # Location
location / { location / {
return 301 https://$server_name$request_uri; return 301 https://$server_name$request_uri;
} }
} }
# Server (TLS) # Server (TLS)
server { server {
# General # General
server_name git.inferencium.net; server_name src.inferencium.net;
listen 443 ssl http2; http2 on;
listen [::]:443 ssl http2; ## IPv4
listen 443 ssl;
# Security ## IPv6
ssl_certificate /etc/letsencrypt/live/git.inferencium.net/fullchain.pem; listen [::]:443 ssl;
ssl_certificate_key /etc/letsencrypt/live/git.inferencium.net/privkey.pem;
ssl_protocols TLSv1.3;
ssl_ciphers "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256";
ssl_conf_command Ciphersuites "TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256";
ssl_conf_command Options PrioritizeChaCha;
ssl_prefer_server_ciphers on;
ssl_ecdh_curve X25519;
add_header Strict-Transport-Security "max-age=126200000; includeSubDomains; preload";
add_header X-Frame-Options "DENY";
add_header X-Content-Type-Options nosniff;
# add_header Content-Security-Policy "default-src 'self'; img-src 'self'; media-src 'self'; object-src 'none'; script-src 'none'; connect-src 'none'; frame-src 'none'; style-src 'self'; font-src 'self'";
add_header Referrer-Policy no-referrer;
# Location # Location
location / { location / {
proxy_pass http://unix:/run/gitea/gitea.socket; proxy_pass http://unix:/run/gitea/gitea.sock;
proxy_set_header Host $host; proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Proto $scheme;
} }
# Security
ssl_trusted_certificate /etc/letsencrypt/live/inferencium.net/chain.pem;
ssl_certificate /etc/letsencrypt/live/inferencium.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/inferencium.net/privkey.pem;
ssl_protocols TLSv1.3;
ssl_ciphers "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256";
ssl_conf_command Ciphersuites "TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256";
ssl_conf_command Options PrioritizeChaCha;
ssl_prefer_server_ciphers on;
ssl_ecdh_curve X25519:secp256r1;
ssl_stapling on;
ssl_stapling_verify on;
ssl_session_timeout 1d;
ssl_session_cache shared:MozSSL:10m;
ssl_session_cache shared:ssl_session_cache:10m;
ssl_session_tickets off;
## Headers
include /etc/nginx/include/header-security-nocsp.conf;
} }

View File

@ -0,0 +1,13 @@
# Inferencium - xb-00-01
# Nginx - Configuration - Header - Security - No CSP
# Version: 1.0.0
# Copyright 2025 Jake Winters
# SPDX-License-Identifier: BSD-3-Clause
add_header Strict-Transport-Security "max-age=126200000; includeSubDomains; preload";
add_header X-Frame-Options "DENY";
add_header X-Content-Type-Options nosniff;
add_header Referrer-Policy no-referrer;

View File

@ -1,71 +0,0 @@
# Inferencium - xb000-0
# Nginx - Configuration - Redirect - git.inferencium.net
# Copyright 2023 Jake Winters
# SPDX-License-Identifier: BSD-3-Clause
# Version: 0.0.2.3
# Server (unencrypted)
server {
# General
server_name git.inferencium.net;
listen 80;
# listen [::]:80;
rewrite ^/(.*)$ https://inferencium.net/redirect-git.html permanent;
rewrite ^(/.*)\.html(\?.*)?$ $1$2 permanent;
rewrite ^/(.*)/$ /$1 permanent;
}
# Server (TLS)
server {
# General
server_name git.inferencium.net;
listen 443 ssl http2;
# listen [::]:443 ssl http2;
rewrite ^/(.*)$ https://inferencium.net/redirect-git.html permanent;
rewrite ^(/.*)\.html(\?.*)?$ $1$2 permanent;
rewrite ^/(.*)/$ /$1 permanent;
# Security
ssl_trusted_certificate /etc/letsencrypt/live/git.inferencium.net/chain.pem;
ssl_certificate /etc/letsencrypt/live/git.inferencium.net/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/git.inferencium.net/privkey.pem;
ssl_protocols TLSv1.3;
ssl_ciphers "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256";
ssl_conf_command Ciphersuites "TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256";
ssl_conf_command Options PrioritizeChaCha;
ssl_prefer_server_ciphers on;
ssl_ecdh_curve X25519;
ssl_stapling on;
ssl_stapling_verify on;
ssl_session_timeout 1d;
ssl_session_cache shared:MozSSL:10m;
ssl_session_cache shared:ssl_session_cache:10m;
ssl_session_tickets off;
add_header Strict-Transport-Security "max-age=126200000; includeSubDomains; preload";
add_header X-Frame-Options "DENY";
add_header X-Content-Type-Options nosniff;
add_header Content-Security-Policy "default-src 'self'; img-src 'self'; media-src 'self'; object-src 'none'; script-src 'none'; connect-src 'none'; frame-src 'none'; style-src 'self'; font-src 'self'";
add_header Referrer-Policy no-referrer;
client_max_body_size 16m;
ignore_invalid_headers off;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header Host $http_host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
}
# MIME types
types {
text/html html;
text/css css;
text/xml xml;
text/plain txt;
image/png png;
image/jpeg jpg;
}