files/gitlab-cookbooks/gitlab/templates/default/nginx-gitlab-registry-http.conf.erb (107 lines of code) (raw):

# This file is managed by gitlab-ctl. Manual changes will be # erased! To change the contents below, edit /etc/gitlab/gitlab.rb # and run `sudo gitlab-ctl reconfigure`. ## Lines starting with two hashes (##) are comments with information. ## Lines starting with one hash (#) are configuration parameters that can be uncommented. ## ################################### ## configuration ## ################################### <% if @https && @redirect_http_to_https %> ## Redirects all HTTP traffic to the HTTPS host server { ## HTTPS redirect server <% @listen_addresses.each do |listen_address| %> listen <%= listen_address %>:<%= @redirect_http_to_https_port %><% if @proxy_protocol %> proxy_protocol<% end %>; <% end %> server_name <%= @fqdn %>; server_tokens off; ## Don't show the nginx version number, a security best practice <% if @letsencrypt_enable %> location /.well-known/acme-challenge/ { root <%= @dir %>/www/; } <% end %> location / { <% if @port %> return 301 https://<%= @fqdn %>:<%= @port %>$request_uri; <% else %> return 301 https://<%= @fqdn %>$request_uri; <% end %> } access_log <%= @log_directory %>/gitlab_registry_access.log gitlab_access; error_log <%= @log_directory %>/gitlab_registry_error.log <%= @error_log_level%>; } ## end HTTPS redirect server <% end %> server { ## HTTPS server <% @listen_addresses.each do |listen_address| %> listen <%= listen_address %>:<%= @listen_port %><% if @proxy_protocol %> proxy_protocol<% end %><% if @https %> ssl<% end %>; <% end %> server_name <%= @fqdn %>; server_tokens off; ## Don't show the nginx version number, a security best practice client_max_body_size 0; chunked_transfer_encoding on; <% if @https %> <% if @http2_enabled %> http2 on; <% end %> ## Strong SSL Security ## https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html & https://cipherli.st/ ssl_certificate <%= @ssl_certificate %>; ssl_certificate_key <%= @ssl_certificate_key %>; <% if @ssl_client_certificate %> ssl_client_certificate <%= @ssl_client_certificate%>; <% end %> <% if @ssl_verify_client %> ssl_verify_client <%= @ssl_verify_client%>; ssl_verify_depth <%= @ssl_verify_depth%>; <% end %> ssl_ciphers '<%= @ssl_ciphers %>'; ssl_protocols <%= @ssl_protocols %>; ssl_prefer_server_ciphers <%= @ssl_prefer_server_ciphers %>; ssl_session_cache <%= @ssl_session_cache %>; ssl_session_tickets <%= @ssl_session_tickets %>; ssl_session_timeout <%= @ssl_session_timeout %>; <% if @ssl_dhparam %> ssl_dhparam <%= @ssl_dhparam %>; <% end %> <% if @ssl_password_file %> ssl_password_file '<%= @ssl_password_file %>'; <% end %> <% end %> ## Real IP Module Config ## http://nginx.org/en/docs/http/ngx_http_realip_module.html <% if @real_ip_header %> real_ip_header <%= @real_ip_header %>; <% end %> <% if @real_ip_recursive %> real_ip_recursive <%= @real_ip_recursive %>; <% end %> <% @real_ip_trusted_addresses.each do |trusted_address| %> set_real_ip_from <%= trusted_address %>; <% end %> ## HSTS Config ## https://www.nginx.com/blog/http-strict-transport-security-hsts-and-nginx/ <% unless @hsts_max_age.nil? || @hsts_max_age <= 0 %> add_header Strict-Transport-Security "max-age=<%= @hsts_max_age -%> <% if @hsts_include_subdomains %>; includeSubdomains<% end %>"; <% end %> access_log <%= @log_directory %>/gitlab_registry_access.log gitlab_access; error_log <%= @log_directory %>/gitlab_registry_error.log <%= @error_log_level%>; <% if @letsencrypt_enable %> location /.well-known/acme-challenge/ { root <%= @dir %>/www/; } <% end %> location / { <% @proxy_set_headers.each do |header| %> <% next if header[1].nil? %> proxy_set_header <%= header[0] %> <%= header[1] %>; <% end %> proxy_read_timeout 900; proxy_cache off; proxy_buffering off; proxy_request_buffering off; proxy_http_version 1.1; proxy_pass http://<%= @registry_http_addr %>; } <%= @custom_gitlab_server_config %> } ## end HTTPS server