BigW Consortium Gitlab

gitlab-ssl 5.35 KB
Newer Older
1 2 3 4 5
## GitLab
## Contributors: randx, yin8086, sashkab, orkoden, axilleas
##
## Modified from nginx http version
## Modified from http://blog.phusion.nl/2012/04/21/tutorial-setting-up-gitlab-on-debian-6/
6
## Modified from https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
7
##
8
## Lines starting with two hashes (##) are comments with information.
9
## Lines starting with one hash (#) are configuration parameters that can be uncommented.
10 11 12 13 14 15 16 17 18 19 20 21
##
##################################
##        CHUNKED TRANSFER      ##
##################################
##
## It is a known issue that Git-over-HTTP requires chunked transfer encoding [0]
## which is not supported by Nginx < 1.3.9 [1]. As a result, pushing a large object
## with Git (i.e. a single large file) can lead to a 411 error. In theory you can get
## around this by tweaking this configuration file and either:
## - installing an old version of Nginx with the chunkin module [2] compiled in, or
## - using a newer version of Nginx.
##
22 23
## At the time of writing we do not know if either of these theoretical solutions works. 
## As a workaround users can use Git over SSH to push large files.
24 25 26 27
##
## [0] https://git.kernel.org/cgit/git/git.git/tree/Documentation/technical/http-protocol.txt#n99
## [1] https://github.com/agentzh/chunkin-nginx-module#status
## [2] https://github.com/agentzh/chunkin-nginx-module
28 29 30 31 32 33
##
##
###################################
##        SSL configuration      ##
###################################
##
34
## See installation.md#using-https for additional HTTPS configuration details.
35 36

upstream gitlab {
37
  server unix:/home/git/gitlab/tmp/sockets/gitlab.socket fail_timeout=0;
38 39
}

40
## Normal HTTP host
41
server {
42 43 44
  listen *:80 default_server;
  server_name YOUR_SERVER_FQDN; ## Replace this with something like gitlab.example.com
  server_tokens off; ## Don't show the nginx version number, a security best practice
45 46
  
  ## Redirects all traffic to the HTTPS host
47
  root /nowhere; ## root doesn't have to be a valid path since we are redirecting
48
  rewrite ^ https://$server_name$request_uri? permanent;
49 50
}

51
## HTTPS host
52 53
server {
  listen 443 ssl;
54
  server_name YOUR_SERVER_FQDN; ## Replace this with something like gitlab.example.com
55 56 57 58 59 60 61 62 63 64 65 66 67
  server_tokens off;
  root /home/git/gitlab/public;

  ## Increase this if you want to upload large attachments
  ## Or if you want to accept large git objects over http
  client_max_body_size 20m;

  ## Strong SSL Security
  ## https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
  ssl on;
  ssl_certificate /etc/nginx/ssl/gitlab.crt;
  ssl_certificate_key /etc/nginx/ssl/gitlab.key;

Ben Bodenmiller committed
68
  ssl_ciphers 'AES256+EECDH:AES256+EDH';
69 70 71 72 73 74 75

  ssl_protocols  TLSv1 TLSv1.1 TLSv1.2;
  ssl_session_cache  builtin:1000  shared:SSL:10m;

  ssl_prefer_server_ciphers   on;

  add_header Strict-Transport-Security max-age=63072000;
76
  add_header X-Frame-Options SAMEORIGIN;
77 78
  add_header X-Content-Type-Options nosniff;

79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95
  ## [Optional] If your certficate has OCSP, enable OCSP stapling to reduce the overhead and latency of running SSL.
  ## Replace with your ssl_trusted_certificate. For more info see:
  ## - https://medium.com/devops-programming/4445f4862461
  ## - https://www.ruby-forum.com/topic/4419319
  ## - https://www.digitalocean.com/community/tutorials/how-to-configure-ocsp-stapling-on-apache-and-nginx
  # ssl_stapling on;
  # ssl_stapling_verify on;
  # ssl_trusted_certificate /etc/nginx/ssl/stapling.trusted.crt;
  # resolver 208.67.222.222 208.67.222.220 valid=300s; # Can change to your DNS resolver if desired
  # resolver_timeout 10s;

  ## [Optional] Generate a stronger DHE parameter:
  ##   cd /etc/ssl/certs
  ##   sudo openssl dhparam -out dhparam.pem 4096
  ##
  # ssl_dhparam /etc/ssl/certs/dhparam.pem;

96 97 98 99 100 101 102 103 104 105 106
  ## Individual nginx logs for this GitLab vhost
  access_log  /var/log/nginx/gitlab_access.log;
  error_log   /var/log/nginx/gitlab_error.log;

  location / {
    ## Serve static files from defined root folder.
    ## @gitlab is a named location for the upstream fallback, see below.
    try_files $uri $uri/index.html $uri.html @gitlab;
  }

  ## If a file, which is not found in the root folder is requested,
107
  ## then the proxy passes the request to the upsteam (gitlab unicorn).
108
  location @gitlab {
109
    ## If you use HTTPS make sure you disable gzip compression
110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130
    ## to be safe against BREACH attack.
    gzip off;

    ## https://github.com/gitlabhq/gitlabhq/issues/694
    ## Some requests take more than 30 seconds.
    proxy_read_timeout      300;
    proxy_connect_timeout   300;
    proxy_redirect          off;

    proxy_set_header    Host                $http_host;
    proxy_set_header    X-Real-IP           $remote_addr;
    proxy_set_header    X-Forwarded-Ssl     on;
    proxy_set_header    X-Forwarded-For     $proxy_add_x_forwarded_for;
    proxy_set_header    X-Forwarded-Proto   $scheme;
    proxy_set_header    X-Frame-Options     SAMEORIGIN;

    proxy_pass http://gitlab;
  }

  ## Enable gzip compression as per rails guide:
  ## http://guides.rubyonrails.org/asset_pipeline.html#gzip-compression
131
  ## WARNING: If you are using relative urls remove the block below
132 133 134 135 136 137 138 139 140 141 142
  ## See config/application.rb under "Relative url support" for the list of
  ## other files that need to be changed for relative url support
  location ~ ^/(assets)/ {
    root /home/git/gitlab/public;
    gzip_static on; # to serve pre-gzipped version
    expires max;
    add_header Cache-Control public;
  }

  error_page 502 /502.html;
}