From 6b4d9d67dd65e94c088bcf57b7cbdbe7094b6e6d Mon Sep 17 00:00:00 2001 From: Harsh Shandilya Date: Mon, 10 May 2021 19:11:16 +0530 Subject: [PATCH] nginx: remove decommissioned units Signed-off-by: Harsh Shandilya --- nginx/maven.msfjarvis.dev | 59 -------------------------------------- nginx/studio.msfjarvis.dev | 49 ------------------------------- 2 files changed, 108 deletions(-) delete mode 100644 nginx/maven.msfjarvis.dev delete mode 100644 nginx/studio.msfjarvis.dev diff --git a/nginx/maven.msfjarvis.dev b/nginx/maven.msfjarvis.dev deleted file mode 100644 index 07eef46..0000000 --- a/nginx/maven.msfjarvis.dev +++ /dev/null @@ -1,59 +0,0 @@ -# generated 2020-08-25, Mozilla Guideline v5.6, nginx 1.17.7, OpenSSL 1.1.1d, intermediate configuration -# https://ssl-config.mozilla.org/#server=nginx&version=1.17.7&config=intermediate&openssl=1.1.1d&guideline=5.6 -server { - listen 80; - listen [::]:80; - - server_name maven.msfjarvis.dev; - return 301 https://$host$request_uri; -} - -server { - listen 443 ssl http2; - listen [::]:443 ssl http2; - - server_name maven.msfjarvis.dev; - - location / { - # First attempt to serve request as file, then - # as directory, then fall back to displaying a 404. - # try_files $uri $uri/ =404; # IMPORTANT comment this - dav_methods PUT DELETE MKCOL COPY MOVE; - create_full_put_path on; - dav_access user:rw group:rw all:r; - limit_except GET HEAD OPTIONS { - auth_basic "Only pulling artifacts is supported without authentication"; - auth_basic_user_file /etc/nginx/maven_auth; - } - } - - root /var/www/maven.msfjarvis.dev; - - ssl_certificate /etc/letsencrypt/live/msfjarvis.dev/fullchain.pem; - ssl_certificate_key /etc/letsencrypt/live/msfjarvis.dev/privkey.pem; - ssl_session_timeout 1d; - ssl_session_cache shared:MozSSL:10m; # about 40000 sessions - ssl_session_tickets off; - - # curl https://ssl-config.mozilla.org/ffdhe2048.txt > /path/to/dhparam - ssl_dhparam /etc/nginx/dhparam; - - # intermediate configuration - ssl_protocols TLSv1.2 TLSv1.3; - ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384; - ssl_prefer_server_ciphers off; - - # HSTS (ngx_http_headers_module is required) (63072000 seconds) - add_header Strict-Transport-Security "max-age=63072000" always; - - # OCSP stapling - ssl_stapling on; - ssl_stapling_verify on; - - # Authenticated origin pulls - # ssl_client_certificate /etc/nginx/certs/cloudflare.crt; - # ssl_verify_client on; - - # verify chain of trust of OCSP response using Root CA and Intermediate certs - # ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates; -} diff --git a/nginx/studio.msfjarvis.dev b/nginx/studio.msfjarvis.dev deleted file mode 100644 index e6d15b2..0000000 --- a/nginx/studio.msfjarvis.dev +++ /dev/null @@ -1,49 +0,0 @@ -# generated 2020-08-25, Mozilla Guideline v5.6, nginx 1.17.7, OpenSSL 1.1.1d, intermediate configuration -# https://ssl-config.mozilla.org/#server=nginx&version=1.17.7&config=intermediate&openssl=1.1.1d&guideline=5.6 -server { - listen 80; - listen [::]:80; - - server_name studio.msfjarvis.dev; - - return 301 https://$host$request_uri; -} - -server { - listen 443 ssl http2; - listen [::]:443 ssl http2; - - server_name studio.msfjarvis.dev; - - location / { - proxy_pass https://localhost:9876/index.html; - } - - ssl_certificate /etc/letsencrypt/live/msfjarvis.dev/fullchain.pem; - ssl_certificate_key /etc/letsencrypt/live/msfjarvis.dev/privkey.pem; - ssl_session_timeout 1d; - ssl_session_cache shared:MozSSL:10m; # about 40000 sessions - ssl_session_tickets off; - - # curl https://ssl-config.mozilla.org/ffdhe2048.txt > /path/to/dhparam - ssl_dhparam /etc/nginx/dhparam; - - # intermediate configuration - ssl_protocols TLSv1.2 TLSv1.3; - ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384; - ssl_prefer_server_ciphers off; - - # HSTS (ngx_http_headers_module is required) (63072000 seconds) - add_header Strict-Transport-Security "max-age=63072000" always; - - # OCSP stapling - ssl_stapling on; - ssl_stapling_verify on; - - # Authenticated origin pulls - # ssl_client_certificate /etc/nginx/certs/cloudflare.crt; - # ssl_verify_client on; - - # verify chain of trust of OCSP response using Root CA and Intermediate certs - # ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates; -}