symposion_app/deploy/nginx.conf

56 lines
No EOL
1.8 KiB
Nginx Configuration File

upstream {{ site_name }}_django_wsgi {
keepalive 2; # Cache 2 connections.
server unix:/run/symposion/{{ site_name }}_uwsgi.sock;
}
server {
listen 80;
server_name {{ env.domain }};
return 301 https://{{ env.domain }}$request_uri;
}
server {
listen 443 ssl http2;
server_name {{ env.domain }};
client_max_body_size 50M;
root /var/www/fossy;
ssl_certificate /etc/letsencrypt/live/{{ env.domain }}/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/{{ env.domain }}/privkey.pem;
# Ask for HTTPS for 180 days.
add_header Strict-Transport-Security "max-age=15552000; includeSubDomains";
# Advise browsers not to use content type sniffing to reduce chance of XSS attacks.
add_header X-Content-Type-Options nosniff;
# Advise browser to only load external content from these sites.
add_header Content-Security-Policy "script-src 'self' 'unsafe-inline' 'unsafe-eval' https://code.jquery.com/jquery-3.5.1.min.js https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js https://js.stripe.com/v3/ https://r.stripe.com/0";
location @app {
# Django web application including static files (via WhiteNoise).
uwsgi_pass symposion_django_wsgi;
include uwsgi_params;
# Disable gzip compression when where traffic might be over SSL
# to avoid an attack that may compromise Django's CSRF
# protection. See:
# https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/
gzip off;
}
location / {
try_files $uri $uri/index.html $uri.html @app;
}
location /media/ {
# User-uploaded files and generated reports.
alias {{ project_dir }}/media/;
expires 1y;
}
location /.well-known/ {
# Used for "acmi-challenge".
alias {{ project_dir }}/htdocs/.well-known/;
}
}