BigW Consortium Gitlab

gitlab-ssl 6.93 KB
Newer Older
1 2 3 4
## GitLab
##
## Modified from nginx http version
## Modified from http://blog.phusion.nl/2012/04/21/tutorial-setting-up-gitlab-on-debian-6/
5
## Modified from https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
6
##
7
## Lines starting with two hashes (##) are comments with information.
8
## Lines starting with one hash (#) are configuration parameters that can be uncommented.
9 10
##
##################################
11 12 13 14 15 16
##        CONTRIBUTING          ##
##################################
##
## If you change this file in a Merge Request, please also create
## a Merge Request on https://gitlab.com/gitlab-org/omnibus-gitlab/merge_requests
##
17
###################################
18
##         configuration         ##
19 20
###################################
##
21
## See installation.md#using-https for additional HTTPS configuration details.
22

23 24
upstream gitlab-workhorse {
  server unix:/home/git/gitlab/tmp/sockets/gitlab-workhorse.socket fail_timeout=0;
25
}
26

27 28 29 30 31
map $http_upgrade $connection_upgrade_gitlab_ssl {
    default upgrade;
    ''      close;
}

32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66

## NGINX 'combined' log format with filtered query strings
log_format gitlab_ssl_access $remote_addr - $remote_user [$time_local] "$request_method $gitlab_ssl_filtered_request_uri $server_protocol" $status $body_bytes_sent "$gitlab_ssl_filtered_http_referer" "$http_user_agent";

## Remove private_token from the request URI
# In:  /foo?private_token=unfiltered&authenticity_token=unfiltered&rss_token=unfiltered&...
# Out: /foo?private_token=[FILTERED]&authenticity_token=unfiltered&rss_token=unfiltered&...
map $request_uri $gitlab_ssl_temp_request_uri_1 {
  default $request_uri;
  ~(?i)^(?<start>.*)(?<temp>[\?&]private[\-_]token)=[^&]*(?<rest>.*)$ "$start$temp=[FILTERED]$rest";
}

## Remove authenticity_token from the request URI
# In:  /foo?private_token=[FILTERED]&authenticity_token=unfiltered&rss_token=unfiltered&...
# Out: /foo?private_token=[FILTERED]&authenticity_token=[FILTERED]&rss_token=unfiltered&...
map $gitlab_ssl_temp_request_uri_1 $gitlab_ssl_temp_request_uri_2 {
  default $gitlab_ssl_temp_request_uri_1;
  ~(?i)^(?<start>.*)(?<temp>[\?&]authenticity[\-_]token)=[^&]*(?<rest>.*)$ "$start$temp=[FILTERED]$rest";
}

## Remove rss_token from the request URI
# In:  /foo?private_token=[FILTERED]&authenticity_token=[FILTERED]&rss_token=unfiltered&...
# Out: /foo?private_token=[FILTERED]&authenticity_token=[FILTERED]&rss_token=[FILTERED]&...
map $gitlab_ssl_temp_request_uri_2 $gitlab_ssl_filtered_request_uri {
  default $gitlab_ssl_temp_request_uri_2;
  ~(?i)^(?<start>.*)(?<temp>[\?&]rss[\-_]token)=[^&]*(?<rest>.*)$ "$start$temp=[FILTERED]$rest";
}

## A version of the referer without the query string
map $http_referer $gitlab_ssl_filtered_http_referer {
  default $http_referer;
  ~^(?<temp>.*)\? $temp;
}


67
## Redirects all HTTP traffic to the HTTPS host
68
server {
69
  ## Either remove "default_server" from the listen line below,
70 71 72
  ## or delete the /etc/nginx/sites-enabled/default file. This will cause gitlab
  ## to be served if you visit any address that your server responds to, eg.
  ## the ip address of the server (http://x.x.x.x/)
73
  listen 0.0.0.0:80;
74
  listen [::]:80 ipv6only=on default_server;
75 76
  server_name YOUR_SERVER_FQDN; ## Replace this with something like gitlab.example.com
  server_tokens off; ## Don't show the nginx version number, a security best practice
77
  return 301 https://$http_host$request_uri;
78
  access_log  /var/log/nginx/gitlab_access.log gitlab_ssl_access;
79
  error_log   /var/log/nginx/gitlab_error.log;
80 81
}

82
## HTTPS host
83
server {
84
  listen 0.0.0.0:443 ssl;
85
  listen [::]:443 ipv6only=on ssl default_server;
86
  server_name YOUR_SERVER_FQDN; ## Replace this with something like gitlab.example.com
87
  server_tokens off; ## Don't show the nginx version number, a security best practice
88 89

  ## Strong SSL Security
90
  ## https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html & https://cipherli.st/
91 92 93 94
  ssl on;
  ssl_certificate /etc/nginx/ssl/gitlab.crt;
  ssl_certificate_key /etc/nginx/ssl/gitlab.key;

95
  # GitLab needs backwards compatible ciphers to retain compatibility with Java IDEs
96
  ssl_ciphers "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4";
97 98 99
  ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
  ssl_prefer_server_ciphers on;
  ssl_session_cache shared:SSL:10m;
100
  ssl_session_timeout 5m;
101

102
  ## See app/controllers/application_controller.rb for headers set
103

104 105 106 107 108 109 110 111 112
  ## [Optional] If your certficate has OCSP, enable OCSP stapling to reduce the overhead and latency of running SSL.
  ## Replace with your ssl_trusted_certificate. For more info see:
  ## - https://medium.com/devops-programming/4445f4862461
  ## - https://www.ruby-forum.com/topic/4419319
  ## - https://www.digitalocean.com/community/tutorials/how-to-configure-ocsp-stapling-on-apache-and-nginx
  # ssl_stapling on;
  # ssl_stapling_verify on;
  # ssl_trusted_certificate /etc/nginx/ssl/stapling.trusted.crt;
  # resolver 208.67.222.222 208.67.222.220 valid=300s; # Can change to your DNS resolver if desired
113
  # resolver_timeout 5s;
114 115

  ## [Optional] Generate a stronger DHE parameter:
116
  ##   sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 4096
117 118 119
  ##
  # ssl_dhparam /etc/ssl/certs/dhparam.pem;

120 121 122
  ## [Optional] Enable HTTP Strict Transport Security
  # add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";

123 124 125 126
  ## Real IP Module Config
  ## http://nginx.org/en/docs/http/ngx_http_realip_module.html
  real_ip_header X-Real-IP; ## X-Real-IP or X-Forwarded-For or proxy_protocol
  real_ip_recursive off;    ## If you enable 'on'
127 128
  ## If you have a trusted IP address, uncomment it and set it
  # set_real_ip_from YOUR_TRUSTED_ADDRESS; ## Replace this with something like 192.168.1.0/24
129

130
  ## Individual nginx logs for this GitLab vhost
131
  access_log  /var/log/nginx/gitlab_access.log gitlab_ssl_access;
132 133 134
  error_log   /var/log/nginx/gitlab_error.log;

  location / {
135
    client_max_body_size 0;
136 137 138 139 140 141 142 143
    gzip off;

    ## https://github.com/gitlabhq/gitlabhq/issues/694
    ## Some requests take more than 30 seconds.
    proxy_read_timeout      300;
    proxy_connect_timeout   300;
    proxy_redirect          off;

144
    proxy_http_version 1.1;
145

146
    proxy_set_header    Host                $http_host;
147 148 149 150
    proxy_set_header    X-Real-IP           $remote_addr;
    proxy_set_header    X-Forwarded-Ssl     on;
    proxy_set_header    X-Forwarded-For     $proxy_add_x_forwarded_for;
    proxy_set_header    X-Forwarded-Proto   $scheme;
151 152 153
    proxy_set_header    Upgrade             $http_upgrade;
    proxy_set_header    Connection          $connection_upgrade_gitlab_ssl;

154
    proxy_pass http://gitlab-workhorse;
155
  }
156 157 158 159 160

  error_page 404 /404.html;
  error_page 422 /422.html;
  error_page 500 /500.html;
  error_page 502 /502.html;
161 162
  error_page 503 /503.html;
  location ~ ^/(404|422|500|502|503)\.html$ {
163 164 165
    root /home/git/gitlab/public;
    internal;
  }
166
}