1
mirror of https://github.com/jakejarvis/mastodon-utils.git synced 2025-04-26 09:05:21 -04:00

fix nginx config for disallowing default IP access

This commit is contained in:
Jake Jarvis 2022-12-14 17:17:39 -05:00
parent 451cafaff2
commit 046c63d220
Signed by: jake
GPG Key ID: 2B0C9CF251E69A39
4 changed files with 160 additions and 142 deletions

View File

@ -31,6 +31,11 @@ http {
access_log /var/log/nginx/access.log; access_log /var/log/nginx/access.log;
error_log /var/log/nginx/error.log; error_log /var/log/nginx/error.log;
# https://github.com/doorkeeper-gem/doorkeeper/issues/1554#issuecomment-1304606633
# proxy_buffers 4 16k;
# proxy_buffer_size 16k;
# proxy_busy_buffers_size 32k;
# stats for prometheus nginx exporter # stats for prometheus nginx exporter
server { server {
listen 9181; listen 9181;

View File

@ -1,15 +1,24 @@
# don't respond to direct IP address requests: # catch-all nginx server
# https://www.codedodle.com/disable-direct-ip-access-nginx.html
server { server {
listen 80 default_server; listen 80 default_server;
listen [::]:80 default_server; listen [::]:80 default_server;
listen 443 default_server; server_name _;
listen [::]:443 default_server; return 444;
}
ssl_reject_handshake on;
server {
server_name _; listen 443 default_server;
return 444; listen [::]:443 default_server;
# intentionally cause an SSL error. this requires a snakeoil certificate, see:
# https://docs.j7k6.org/nginx-default-ssl-site/
ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem;
ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key;
ssl_reject_handshake on;
include /etc/letsencrypt/options-ssl-nginx.conf;
server_name _;
return 444;
} }

View File

@ -1,176 +1,176 @@
# heavily modified from https://github.com/mastodon/mastodon/blob/v4.0.2/dist/nginx.conf # heavily modified from https://github.com/mastodon/mastodon/blob/v4.0.2/dist/nginx.conf
map $http_upgrade $connection_upgrade { map $http_upgrade $connection_upgrade {
default upgrade; default upgrade;
'' close; '' close;
} }
upstream backend { upstream backend {
server 127.0.0.1:3000 fail_timeout=0; server 127.0.0.1:3000 fail_timeout=0;
} }
upstream streaming { upstream streaming {
server 127.0.0.1:4000 fail_timeout=0; server 127.0.0.1:4000 fail_timeout=0;
} }
proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=1g; proxy_cache_path /var/cache/nginx levels=1:2 keys_zone=CACHE:10m inactive=7d max_size=1g;
server { server {
listen [::]:443 http2 ssl ipv6only=on; listen [::]:443 http2 ssl ipv6only=on;
listen 443 http2 ssl; listen 443 http2 ssl;
server_name fediverse.jarv.is; server_name fediverse.jarv.is;
root /home/mastodon/live/public; root /home/mastodon/live/public;
ssl_certificate /etc/letsencrypt/live/fediverse.jarv.is/fullchain.pem; # managed by Certbot ssl_certificate /etc/letsencrypt/live/fediverse.jarv.is/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/fediverse.jarv.is/privkey.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/fediverse.jarv.is/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
# https://ssl-config.mozilla.org/#server=nginx&version=1.22.1&config=intermediate&openssl=1.1.1f&guideline=5.6 # https://ssl-config.mozilla.org/#server=nginx&version=1.22.1&config=intermediate&openssl=1.1.1f&guideline=5.6
ssl_stapling on; ssl_stapling on;
ssl_stapling_verify on; ssl_stapling_verify on;
ssl_trusted_certificate /etc/letsencrypt/live/fediverse.jarv.is/chain.pem; ssl_trusted_certificate /etc/letsencrypt/live/fediverse.jarv.is/chain.pem;
keepalive_timeout 20; keepalive_timeout 20;
sendfile on; sendfile on;
client_max_body_size 100m; client_max_body_size 100m;
gzip on; gzip on;
gzip_disable "msie6"; gzip_disable "msie6";
gzip_vary on; gzip_vary on;
gzip_proxied any; gzip_proxied any;
gzip_comp_level 6; gzip_comp_level 6;
gzip_buffers 16 8k; gzip_buffers 16 8k;
gzip_http_version 1.1; gzip_http_version 1.1;
gzip_types application/atom+xml application/javascript application/json application/rss+xml gzip_types application/atom+xml application/javascript application/json application/rss+xml
application/vnd.ms-fontobject application/x-font-opentype application/x-font-truetype application/vnd.ms-fontobject application/x-font-opentype application/x-font-truetype
application/x-font-ttf application/x-javascript application/xhtml+xml application/xml application/x-font-ttf application/x-javascript application/xhtml+xml application/xml
font/eot font/opentype font/otf font/truetype image/svg+xml image/vnd.microsoft.icon font/eot font/opentype font/otf font/truetype image/svg+xml image/vnd.microsoft.icon
image/x-icon image/x-win-bitmap text/css text/javascript text/plain text/xml; image/x-icon image/x-win-bitmap text/css text/javascript text/plain text/xml;
gzip_min_length 256; gzip_min_length 256;
# https://github.com/google/ngx_brotli#sample-configuration # https://github.com/google/ngx_brotli#sample-configuration
# https://github.com/jakejarvis/mastodon-scripts/wiki/Brotli-compression-for-nginx # https://github.com/jakejarvis/mastodon-scripts/wiki/Brotli-compression-for-nginx
brotli on; brotli on;
brotli_comp_level 4; brotli_comp_level 4;
brotli_static on; brotli_static on;
brotli_types application/atom+xml application/javascript application/json application/rss+xml brotli_types application/atom+xml application/javascript application/json application/rss+xml
application/vnd.ms-fontobject application/x-font-opentype application/x-font-truetype application/vnd.ms-fontobject application/x-font-opentype application/x-font-truetype
application/x-font-ttf application/x-javascript application/xhtml+xml application/xml application/x-font-ttf application/x-javascript application/xhtml+xml application/xml
font/eot font/opentype font/otf font/truetype image/svg+xml image/vnd.microsoft.icon font/eot font/opentype font/otf font/truetype image/svg+xml image/vnd.microsoft.icon
image/x-icon image/x-win-bitmap text/css text/javascript text/plain text/xml; image/x-icon image/x-win-bitmap text/css text/javascript text/plain text/xml;
brotli_min_length 256; brotli_min_length 256;
# add shortcut to public Grafana dashboard # add shortcut to public Grafana dashboard
location ~ ^/dashboard/?$ { location ~ ^/dashboard/?$ {
return 302 https://grafana.pipe.fail/public-dashboards/b5ca7a7c8e844f90b0973d2ab02bad0a; return 302 https://grafana.pipe.fail/public-dashboards/b5ca7a7c8e844f90b0973d2ab02bad0a;
} }
# sends most paths to the backend proxy and ignores the location blocks below, except if # sends most paths to the backend proxy and ignores the location blocks below, except if
# the file exists in /home/mastodon/live # the file exists in /home/mastodon/live
location / { location / {
add_header Strict-Transport-Security "max-age=63072000" always; add_header Strict-Transport-Security "max-age=63072000" always;
try_files $uri @proxy; try_files $uri @proxy;
} }
# condensed version of original Mastodon nginx.conf # condensed version of original Mastodon nginx.conf
location ~ ^/(assets|avatars|emoji|headers|packs|shortcuts|sounds)/ { location ~ ^/(assets|avatars|emoji|headers|packs|shortcuts|sounds)/ {
add_header Cache-Control "public, max-age=2419200, must-revalidate"; # 28 days add_header Cache-Control "public, max-age=2419200, must-revalidate"; # 28 days
add_header Strict-Transport-Security "max-age=63072000" always; add_header Strict-Transport-Security "max-age=63072000" always;
try_files $uri =404; try_files $uri =404;
} }
# media uploads & cache (irrelevant if offloading to S3) # media uploads & cache (irrelevant if offloading to S3)
location ~ ^/system/ { location ~ ^/system/ {
add_header Cache-Control "public, max-age=2419200, immutable"; # 28 days add_header Cache-Control "public, max-age=2419200, immutable"; # 28 days
add_header Strict-Transport-Security "max-age=63072000" always; add_header Strict-Transport-Security "max-age=63072000" always;
try_files $uri =404; try_files $uri =404;
} }
# static files in root of /public (sw.js, favicon.ico, etc) that aren't covered above # static files in root of /public (sw.js, favicon.ico, etc) that aren't covered above
location ~ ^/(.*\.(js|css|png|gif|jpg|txt|ico))$ { location ~ ^/(.*\.(js|css|png|gif|jpg|txt|ico))$ {
add_header Cache-Control "public, max-age=604800, must-revalidate"; # 7 days add_header Cache-Control "public, max-age=604800, must-revalidate"; # 7 days
add_header Strict-Transport-Security "max-age=63072000" always; add_header Strict-Transport-Security "max-age=63072000" always;
try_files $uri @proxy; try_files $uri @proxy;
} }
location ^~ /api/v1/streaming { location ^~ /api/v1/streaming {
proxy_set_header Host $host; proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Proxy ""; proxy_set_header Proxy "";
proxy_pass http://streaming; proxy_pass http://streaming;
proxy_buffering off; proxy_buffering off;
proxy_redirect off; proxy_redirect off;
proxy_http_version 1.1; proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade; proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $connection_upgrade; proxy_set_header Connection $connection_upgrade;
# security headers # security headers
proxy_hide_header Strict-Transport-Security; proxy_hide_header Strict-Transport-Security;
proxy_hide_header X-Powered-By; proxy_hide_header X-Powered-By;
add_header Strict-Transport-Security "max-age=63072000" always; add_header Strict-Transport-Security "max-age=63072000" always;
# debugging headers # debugging headers
add_header Via "1.1 $proxy_host" always; add_header Via "1.1 $proxy_host" always;
tcp_nodelay on; tcp_nodelay on;
} }
location @proxy { location @proxy {
proxy_set_header Host $host; proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Proxy ""; proxy_set_header Proxy "";
# uncomment to allow the 'Server: Mastodon' header to override nginx's: # uncomment to allow the 'Server: Mastodon' header to override nginx's:
# proxy_pass_header Server; # proxy_pass_header Server;
proxy_pass http://backend; proxy_pass http://backend;
proxy_buffering on; proxy_buffering on;
proxy_redirect off; proxy_redirect off;
proxy_http_version 1.1; proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade; proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $connection_upgrade; proxy_set_header Connection $connection_upgrade;
proxy_cache CACHE; proxy_cache CACHE;
proxy_cache_valid 200 7d; proxy_cache_valid 200 7d;
proxy_cache_valid 410 24h; proxy_cache_valid 410 24h;
proxy_cache_use_stale error timeout updating http_500 http_502 http_503 http_504; proxy_cache_use_stale error timeout updating http_500 http_502 http_503 http_504;
# security headers # security headers
proxy_hide_header Referrer-Policy; proxy_hide_header Referrer-Policy;
proxy_hide_header Strict-Transport-Security; proxy_hide_header Strict-Transport-Security;
proxy_hide_header X-Powered-By; proxy_hide_header X-Powered-By;
proxy_hide_header X-Clacks-Overhead; proxy_hide_header X-Clacks-Overhead;
proxy_hide_header X-XSS-Protection; proxy_hide_header X-XSS-Protection;
add_header Referrer-Policy "strict-origin" always; add_header Referrer-Policy "strict-origin" always;
add_header Strict-Transport-Security "max-age=63072000" always; add_header Strict-Transport-Security "max-age=63072000" always;
# debugging headers # debugging headers
add_header Via "1.1 $proxy_host" always; add_header Via "1.1 $proxy_host" always;
add_header X-Cache-Status $upstream_cache_status always; add_header X-Cache-Status $upstream_cache_status always;
add_header X-Got-Milk "2%" always; add_header X-Got-Milk "2%" always;
tcp_nodelay on; tcp_nodelay on;
} }
error_page 404 500 501 502 503 504 /500.html; error_page 404 500 501 502 503 504 /500.html;
} }
server { server {
listen [::]:80; listen [::]:80;
listen 80; listen 80;
server_name fediverse.jarv.is; server_name fediverse.jarv.is;
if ($host = fediverse.jarv.is) { if ($host = fediverse.jarv.is) {
return 301 https://$host$request_uri; return 301 https://$host$request_uri;
} # managed by Certbot } # managed by Certbot
return 403; return 403;
} }

View File

@ -32,6 +32,10 @@ fi
# pull & apply latest patches # pull & apply latest patches
. "$SCRIPTS_ROOT/scripts/apply_patches.sh" . "$SCRIPTS_ROOT/scripts/apply_patches.sh"
# create blank custom.css (this overrides any CSS set in the admin panel, but if that's not being used, then
# this quickly saves a request to the backend)
sudo -u mastodon "$APP_ROOT/public/custom.css"
# set new ruby version # set new ruby version
RUBY_VERSION="$(sudo -u mastodon cat $APP_ROOT/.ruby-version)" RUBY_VERSION="$(sudo -u mastodon cat $APP_ROOT/.ruby-version)"
sudo -u mastodon RUBY_CONFIGURE_OPTS=--with-jemalloc "$RBENV_ROOT/bin/rbenv" install "$RUBY_VERSION" || true sudo -u mastodon RUBY_CONFIGURE_OPTS=--with-jemalloc "$RBENV_ROOT/bin/rbenv" install "$RUBY_VERSION" || true