diff --git a/nginx/crafty.msfjarvis.dev b/nginx/crafty.msfjarvis.dev index 74e2ffb..05cf6b8 100644 --- a/nginx/crafty.msfjarvis.dev +++ b/nginx/crafty.msfjarvis.dev @@ -15,7 +15,7 @@ server { server_name crafty.msfjarvis.dev; - root /home/minecraft/main-server/output; + root /home/minecraft/wack-server/output; index index.html; ssl_certificate /etc/letsencrypt/live/msfjarvis.dev/fullchain.pem; diff --git a/nginx/crafty2.msfjarvis.dev b/nginx/crafty2.msfjarvis.dev deleted file mode 100644 index 9f983f4..0000000 --- a/nginx/crafty2.msfjarvis.dev +++ /dev/null @@ -1,48 +0,0 @@ -# generated 2020-08-25, Mozilla Guideline v5.6, nginx 1.17.7, OpenSSL 1.1.1d, intermediate configuration -# https://ssl-config.mozilla.org/#server=nginx&version=1.17.7&config=intermediate&openssl=1.1.1d&guideline=5.6 -server { - listen 80; - listen [::]:80; - - server_name crafty2.msfjarvis.dev; - - return 301 https://$host$request_uri; -} - -server { - listen 443 ssl http2; - listen [::]:443 ssl http2; - - server_name crafty2.msfjarvis.dev; - - root /home/minecraft/wack-server/output; - index index.html; - - ssl_certificate /etc/letsencrypt/live/msfjarvis.dev/fullchain.pem; - ssl_certificate_key /etc/letsencrypt/live/msfjarvis.dev/privkey.pem; - ssl_session_timeout 1d; - ssl_session_cache shared:MozSSL:10m; # about 40000 sessions - ssl_session_tickets off; - - # curl https://ssl-config.mozilla.org/ffdhe2048.txt > /path/to/dhparam - ssl_dhparam /etc/nginx/dhparam; - - # intermediate configuration - ssl_protocols TLSv1.2 TLSv1.3; - ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384; - ssl_prefer_server_ciphers off; - - # HSTS (ngx_http_headers_module is required) (63072000 seconds) - add_header Strict-Transport-Security "max-age=63072000" always; - - # OCSP stapling - ssl_stapling on; - ssl_stapling_verify on; - - # Authenticated origin pulls - # ssl_client_certificate /etc/nginx/certs/cloudflare.crt; - # ssl_verify_client on; - - # verify chain of trust of OCSP response using Root CA and Intermediate certs - # ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates; -}