server { listen 80; listen [::]:80; server_name karakeep.loadingm.xyz; location /.well-known/acme-challenge/ { root /var/www/certbot; } # Uncomment to redirect HTTP to HTTPS location / { return 301 https://$host$request_uri; } } server { # Nginx versions 1.25+ listen 443 ssl; listen [::]:443 ssl; http2 on; server_name karakeep.loadingm.xyz; ## The default `client_max_body_size` is 1M, this might not be enough for some posters, etc. client_max_body_size 20M; ssl_certificate /etc/letsencrypt/live/loadingm.xyz/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/loadingm.xyz/privkey.pem; # include /etc/letsencrypt/options-ssl-nginx.conf; # ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; ssl_trusted_certificate /etc/letsencrypt/live/loadingm.xyz/chain.pem; # Security / XSS Mitigation Headers add_header X-Content-Type-Options "nosniff"; # Permissions policy. May cause issues with some clients add_header Permissions-Policy "accelerometer=(), ambient-light-sensor=(), battery=(), bluetooth=(), camera=(), clipboard-read=(), display-capture=(), document-domain=(), encrypted-media=(), gamepad=(), geolocation=(), gyroscope=(), hid=(), idle-detection=(), interest-cohort=(), keyboard-map=(), local-fonts=(), magnetometer=(), microphone=(), payment=(), publickey-credentials-get=(), serial=(), sync-xhr=(), usb=(), xr-spatial-tracking=()" always; # Content Security Policy # See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP # Enforces https content and restricts JS/CSS to origin # External Javascript (such as cast_sender.js for Chromecast) must be whitelisted. set $CSP "default-src https: data: blob:"; set $CSP "$CSP; img-src 'self' https://* data:"; # add_header Content-Security-Policy "default-src https: data: blob: ; img-src 'self' https://* data: ; style-src 'self' 'unsafe-inline' data:; style-src-elem data:; script-src 'self' 'unsafe-inline' https://www.gstatic.com https://www.youtubse.com blob: data:; worker-src 'self' blob: data:; connect-src 'self' data:; object-src 'none' data:; frame-ancestors 'self' data:; font-src 'self' data:"; add_header Content-Security-Policy $CSP; location /.well-known/acme-challenge/ { root /var/www/certbot; } location / { # Proxy main karakeep traffic proxy_pass http://karakeep-web:3000; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Protocol $scheme; proxy_set_header X-Forwarded-Host $http_host; # Disable buffering when the nginx proxy gets very resource heavy upon streaming proxy_buffering off; } }