mirror of
				https://github.com/spantaleev/matrix-docker-ansible-deploy.git
				synced 2025-10-25 17:43:23 +00:00 
			
		
		
		
	Fixes https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1154 According to https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy, having both a header and the `<meta>`-tag provided by Element itself is not a problem. The 2 CSP policies get combined.
		
			
				
	
	
		
			105 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Django/Jinja
		
	
	
	
	
	
			
		
		
	
	
			105 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Django/Jinja
		
	
	
	
	
	
| #jinja2: lstrip_blocks: "True"
 | |
| 
 | |
| {% macro render_vhost_directives() %}
 | |
| 	gzip on;
 | |
| 	gzip_types text/plain application/json application/javascript text/css image/x-icon font/ttf image/gif;
 | |
| 
 | |
| 	{% if matrix_nginx_proxy_hsts_preload_enabled %}
 | |
| 		add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always;
 | |
| 	{% else %}
 | |
| 		add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
 | |
| 	{% endif %}
 | |
| 	add_header X-Content-Type-Options nosniff;
 | |
| 	add_header X-XSS-Protection "{{ matrix_nginx_proxy_xss_protection }}";
 | |
| 	add_header X-Frame-Options SAMEORIGIN;
 | |
| 	add_header Content-Security-Policy "frame-ancestors 'self'";
 | |
| 
 | |
| 	{% if matrix_nginx_proxy_floc_optout_enabled %}
 | |
| 		add_header Permissions-Policy interest-cohort=() always;
 | |
| 	{% endif %}
 | |
| 
 | |
| 
 | |
| 	{% for configuration_block in matrix_nginx_proxy_proxy_element_additional_server_configuration_blocks %}
 | |
| 		{{- configuration_block }}
 | |
| 	{% endfor %}
 | |
| 
 | |
| 	location / {
 | |
| 		{% if matrix_nginx_proxy_enabled %}
 | |
| 			{# Use the embedded DNS resolver in Docker containers to discover the service #}
 | |
| 			resolver 127.0.0.11 valid=5s;
 | |
| 			set $backend "matrix-client-element:8080";
 | |
| 			proxy_pass http://$backend;
 | |
| 		{% else %}
 | |
| 			{# Generic configuration for use outside of our container setup #}
 | |
| 			proxy_pass http://127.0.0.1:8765;
 | |
| 		{% endif %}
 | |
| 
 | |
| 		proxy_set_header Host $host;
 | |
| 		proxy_set_header X-Forwarded-For $remote_addr;
 | |
| 	}
 | |
| {% endmacro %}
 | |
| 
 | |
| server {
 | |
| 	listen {{ 8080 if matrix_nginx_proxy_enabled else 80 }};
 | |
| 
 | |
| 	server_name {{ matrix_nginx_proxy_proxy_element_hostname }};
 | |
| 
 | |
| 	server_tokens off;
 | |
| 	root /dev/null;
 | |
| 
 | |
| 	{% if matrix_nginx_proxy_https_enabled %}
 | |
| 		location /.well-known/acme-challenge {
 | |
| 			{% if matrix_nginx_proxy_enabled %}
 | |
| 				{# Use the embedded DNS resolver in Docker containers to discover the service #}
 | |
| 				resolver 127.0.0.11 valid=5s;
 | |
| 				set $backend "matrix-certbot:8080";
 | |
| 				proxy_pass http://$backend;
 | |
| 			{% else %}
 | |
| 				{# Generic configuration for use outside of our container setup #}
 | |
| 				proxy_pass http://127.0.0.1:{{ matrix_ssl_lets_encrypt_certbot_standalone_http_port }};
 | |
| 			{% endif %}
 | |
| 		}
 | |
| 
 | |
| 		location / {
 | |
| 			return 301 https://$http_host$request_uri;
 | |
| 		}
 | |
| 	{% else %}
 | |
| 		{{ render_vhost_directives() }}
 | |
| 	{% endif %}
 | |
| }
 | |
| 
 | |
| {% if matrix_nginx_proxy_https_enabled %}
 | |
| server {
 | |
| 	listen {{ 8443 if matrix_nginx_proxy_enabled else 443 }} ssl http2;
 | |
| 	listen [::]:{{ 8443 if matrix_nginx_proxy_enabled else 443 }} ssl http2;
 | |
| 
 | |
| 	server_name {{ matrix_nginx_proxy_proxy_element_hostname }};
 | |
| 
 | |
| 	server_tokens off;
 | |
| 	root /dev/null;
 | |
| 
 | |
| 	ssl_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_element_hostname }}/fullchain.pem;
 | |
| 	ssl_certificate_key {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_element_hostname }}/privkey.pem;
 | |
| 
 | |
| 	ssl_protocols {{ matrix_nginx_proxy_ssl_protocols }};
 | |
| 	{% if matrix_nginx_proxy_ssl_ciphers != "" %}
 | |
| 	ssl_ciphers {{ matrix_nginx_proxy_ssl_ciphers }};
 | |
| 	{% endif %}
 | |
| 	ssl_prefer_server_ciphers {{ matrix_nginx_proxy_ssl_prefer_server_ciphers }};
 | |
| 
 | |
| 	{% if matrix_nginx_proxy_ocsp_stapling_enabled %}
 | |
| 		ssl_stapling on;
 | |
| 		ssl_stapling_verify on;
 | |
| 		ssl_trusted_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_element_hostname }}/chain.pem;
 | |
| 	{% endif %}
 | |
| 
 | |
| 	{% if matrix_nginx_proxy_ssl_session_tickets_off %}
 | |
| 		ssl_session_tickets off;
 | |
| 	{% endif %}
 | |
| 	ssl_session_cache {{ matrix_nginx_proxy_ssl_session_cache }};
 | |
| 	ssl_session_timeout {{ matrix_nginx_proxy_ssl_session_timeout }};
 | |
| 
 | |
| 	{{ render_vhost_directives() }}
 | |
| }
 | |
| {% endif %}
 |