File tree Expand file tree Collapse file tree 3 files changed +28
-27
lines changed Expand file tree Collapse file tree 3 files changed +28
-27
lines changed Original file line number Diff line number Diff line change @@ -12,9 +12,9 @@ RUN apt-get update && \
12
12
apt-get install -y openssl && \
13
13
rm -rf /var/lib/apt/lists/*
14
14
15
- RUN mkdir /etc/nginx/location.d
16
15
ADD nginx.conf /etc/nginx/nginx.conf
17
16
17
+ ADD server.d/ /etc/nginx/server.d/
18
18
ADD upstream.d/ /etc/nginx/upstream.d/
19
19
ADD location.d/ /etc/nginx/location.d/
20
20
ADD upstreams-available/ /etc/nginx/upstreams-available/
Original file line number Diff line number Diff line change @@ -47,33 +47,10 @@ http {
47
47
48
48
server {
49
49
listen 8080 ;
50
- listen 8443 ssl http2;
51
- port_in_redirect off ;
52
-
53
- # certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
54
- ssl_certificate /etc/ssl/ssl_certificate;
55
- ssl_certificate_key /etc/ssl/ssl_certificate_key;
56
-
57
- ssl_session_timeout 1d ;
58
- ssl_session_cache shared:SSL:50m;
59
- ssl_session_tickets off;
60
-
61
- # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
62
- ssl_dhparam /etc/ssl/dhparam.pem;
63
-
64
- # intermediate configuration. tweak to your needs.
65
- ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
66
- ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS' ;
67
- ssl_prefer_server_ciphers on ;
68
-
69
- # OCSP Stapling ---
70
- # fetch OCSP records from URL in ssl_certificate and cache them
71
- ssl_stapling on;
72
- ssl_stapling_verify on;
73
-
74
- ## verify chain of trust of OCSP response using Root CA and Intermediate certs
75
- #ssl_trusted_certificate /etc/ssl/root_CA_cert_plus_intermediates;
50
+ # Also listens on 8443 if certificates are provided:
51
+ include /etc/nginx/server.d/*.conf;
76
52
53
+ port_in_redirect off ;
77
54
78
55
# location.d/api-gateway.conf implements API Gateway for DeviceHive services
79
56
include /etc/nginx/location.d/*.conf;
Original file line number Diff line number Diff line change
1
+ listen 8443 ssl http2;
2
+ # certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
3
+ ssl_certificate /etc/ssl/ssl_certificate;
4
+ ssl_certificate_key /etc/ssl/ssl_certificate_key;
5
+
6
+ ssl_session_timeout 1d;
7
+ ssl_session_cache shared:SSL:50m;
8
+ ssl_session_tickets off;
9
+
10
+ # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
11
+ ssl_dhparam /etc/ssl/dhparam.pem;
12
+
13
+ # intermediate configuration. tweak to your needs.
14
+ ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
15
+ ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
16
+ ssl_prefer_server_ciphers on;
17
+
18
+ # OCSP Stapling ---
19
+ # fetch OCSP records from URL in ssl_certificate and cache them
20
+ ssl_stapling on;
21
+ ssl_stapling_verify on;
22
+
23
+ ## verify chain of trust of OCSP response using Root CA and Intermediate certs
24
+ #ssl_trusted_certificate /etc/ssl/root_CA_cert_plus_intermediates;
You can’t perform that action at this time.
0 commit comments