summaryrefslogtreecommitdiff
path: root/roles/private/files/johan
diff options
context:
space:
mode:
authorElizabeth Hunt <elizabeth.hunt@simponic.xyz>2025-08-01 03:04:07 -0400
committerElizabeth Hunt <elizabeth.hunt@simponic.xyz>2025-08-01 03:04:07 -0400
commit4eb2e6990db54cb99b0fc738b3624ce75be09415 (patch)
treeadacaf914b801c55e16ac182ef03d750c9731e2b /roles/private/files/johan
parenta2599ee56244940885bf2f85d9f6f4ddb7dcecd2 (diff)
downloadoldinfra-4eb2e6990db54cb99b0fc738b3624ce75be09415.tar.gz
oldinfra-4eb2e6990db54cb99b0fc738b3624ce75be09415.zip
ARCHIVEHEADmain
Diffstat (limited to 'roles/private/files/johan')
-rw-r--r--roles/private/files/johan/http.roundcube.internal.simponic.xyz.conf13
-rw-r--r--roles/private/files/johan/https.roundcube.internal.simponic.xyz.conf32
2 files changed, 45 insertions, 0 deletions
diff --git a/roles/private/files/johan/http.roundcube.internal.simponic.xyz.conf b/roles/private/files/johan/http.roundcube.internal.simponic.xyz.conf
new file mode 100644
index 0000000..09ce1a6
--- /dev/null
+++ b/roles/private/files/johan/http.roundcube.internal.simponic.xyz.conf
@@ -0,0 +1,13 @@
+server {
+ listen 80;
+ server_name roundcube.internal.simponic.xyz;
+
+ location /.well-known/acme-challenge {
+ root /var/www/letsencrypt;
+ try_files $uri $uri/ =404;
+ }
+
+ location / {
+ rewrite ^ https://roundcube.internal.simponic.xyz$request_uri? permanent;
+ }
+}
diff --git a/roles/private/files/johan/https.roundcube.internal.simponic.xyz.conf b/roles/private/files/johan/https.roundcube.internal.simponic.xyz.conf
new file mode 100644
index 0000000..f21b186
--- /dev/null
+++ b/roles/private/files/johan/https.roundcube.internal.simponic.xyz.conf
@@ -0,0 +1,32 @@
+server {
+ listen 443 ssl;
+ server_name roundcube.internal.simponic.xyz;
+
+ ssl_certificate /etc/letsencrypt/live/roundcube.internal.simponic.xyz/fullchain.pem;
+ ssl_certificate_key /etc/letsencrypt/live/roundcube.internal.simponic.xyz/privkey.pem;
+ ssl_trusted_certificate /etc/letsencrypt/live/roundcube.internal.simponic.xyz/fullchain.pem;
+
+ ssl_session_cache shared:SSL:50m;
+ ssl_session_timeout 5m;
+ ssl_stapling on;
+ ssl_stapling_verify on;
+
+ ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
+ ssl_ciphers "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4";
+
+ ssl_dhparam /etc/nginx/dhparams.pem;
+ ssl_prefer_server_ciphers on;
+
+ location / {
+ proxy_pass http://127.0.0.1:9002;
+ proxy_http_version 1.1;
+ proxy_set_header Upgrade $http_upgrade;
+ proxy_set_header Connection "upgrade";
+ proxy_set_header Host $server_name;
+ proxy_buffering off;
+ proxy_set_header X-Real-IP $remote_addr;
+ proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
+ proxy_set_header X-Forwarded-Proto $http_x_forwarded_proto;
+ add_header Strict-Transport-Security "max-age=15552000; includeSubDomains" always;
+ }
+}