Make nginx more reliable
All checks were successful
ShellCheck / shellcheck (push) Successful in 22s

This commit is contained in:
Mathieu Strypsteen 2024-01-15 18:40:39 +01:00
parent bf5144650e
commit 86105ae7c4
Signed by: mathieu
GPG key ID: 782A42E461BC6824
7 changed files with 10 additions and 9 deletions

View file

@ -4,7 +4,8 @@ server {
listen [::]:443 ssl;
include snippets/headers.conf;
location / {
proxy_pass http://systemd-code-server.:8080;
set $upstream systemd-code-server.;
proxy_pass http://$upstream:8080;
include snippets/proxy.conf;
proxy_http_version 1.1;
proxy_set_header Connection upgrade;

View file

@ -5,7 +5,8 @@ server {
include snippets/headers.conf;
add_header Content-Security-Policy "default-src 'self'; font-src 'self' data:; img-src 'self' data:; script-src 'self' 'unsafe-eval' 'unsafe-inline'; style-src 'self' 'unsafe-inline'";
location / {
proxy_pass http://systemd-forgejo.:3000;
set $upstream systemd-forgejo.;
proxy_pass http://$upstream:3000;
include snippets/proxy.conf;
proxy_hide_header Content-Security-Policy;
}

View file

@ -7,7 +7,8 @@ server {
return 307 https://matrix-client.matrix.org$request_uri;
}
location / {
proxy_pass http://systemd-synapse.:8080;
set $upstream systemd-synapse.;
proxy_pass http://$upstream:8080;
include snippets/proxy.conf;
proxy_hide_header Content-Security-Policy;
}

View file

@ -4,7 +4,8 @@ server {
listen [::]:443 ssl;
include snippets/headers.conf;
location / {
proxy_pass http://systemd-vaultwarden.;
set $upstream systemd-vaultwarden.;
proxy_pass http://$upstream;
include snippets/proxy.conf;
proxy_http_version 1.1;
proxy_set_header Connection upgrade;

View file

@ -26,6 +26,7 @@ http {
client_max_body_size 100M;
proxy_read_timeout 600;
proxy_send_timeout 600;
resolver host.containers.internal;
include /etc/nginx-sites/*;
server {
listen 80;

View file

@ -6,8 +6,7 @@
"DisableTelemetry": true,
"DNSOverHTTPS": {
"Enabled": true,
"Locked": true,
"ProviderURL": "https://dns10.quad9.net/dns-query"
"ProviderURL": "https://dns.quad9.net/dns-query"
},
"EnableTrackingProtection": {
"Value": true,

View file

@ -1,6 +1,3 @@
[Unit]
Requires=code-server.service forgejo.service synapse.service vaultwarden.service
After=code-server.service forgejo.service synapse.service vaultwarden.service
[Container]
Image=cgr.dev/chainguard/nginx
UserNS=auto