matrix-docker-ansible-deploy/examples/reverse-proxies/haproxy/haproxy.cfg

82 lines
3.0 KiB
INI
Raw Normal View History

2019-08-25 21:53:34 +02:00
global
log /dev/log local0
log /dev/log local1 notice
chroot /var/lib/haproxy
stats socket /run/haproxy/admin.sock mode 660 level admin
stats timeout 30s
user haproxy
group haproxy
daemon
# Default SSL material locations
ca-base /etc/ssl/certs
crt-base /etc/ssl/private
# Default ciphers to use on SSL-enabled listening sockets.
# For more information, see ciphers(1SSL). This list is from:
# https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/
ssl-default-bind-ciphers ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS
ssl-default-bind-options no-sslv3
defaults
2019-08-25 21:56:32 +02:00
log global
mode http
2019-08-25 21:59:47 +02:00
option httplog
option dontlognull
option forwardfor
option redispatch
timeout connect 5000
timeout client 50000
timeout server 50000
2019-08-25 21:53:34 +02:00
errorfile 400 /etc/haproxy/errors/400.http
errorfile 403 /etc/haproxy/errors/403.http
errorfile 408 /etc/haproxy/errors/408.http
errorfile 500 /etc/haproxy/errors/500.http
errorfile 502 /etc/haproxy/errors/502.http
errorfile 503 /etc/haproxy/errors/503.http
errorfile 504 /etc/haproxy/errors/504.http
frontend https-frontend
bind *:80
# HAproxy wants the full chain and the private key in one file. For Letsencrypt manually generated certs (e.g., wildcard certs) you can use
# cat /etc/letsencrypt/live/example.com/fullchain.pem /etc/letsencrypt/live/example.com/privkey.pem > /etc/haproxy/certs/star-example.com.pem
bind *:443 ssl crt /etc/haproxy/certs/star-example.com.pem
#bind *:443 ssl crt /etc/haproxy/certs/element.example.com.pem /etc/haproxy/certs/matrix.example.com.pem
2019-08-25 21:53:34 +02:00
reqadd X-Forwarded-Proto:\ https
option httplog
option http-server-close
2024-01-14 16:23:28 +01:00
# You can do per-domain routing (as shown above),
# or just send everything to the same backend via `default_backend`.
2019-08-25 21:53:34 +02:00
acl matrix_domain hdr_dom(host) -i matrix.example.com
use_backend matrix-main if matrix_domain
2024-01-14 16:23:28 +01:00
acl matrix_domain hdr_dom(host) -i element.example.com
use_backend matrix-main if matrix_domain
2019-08-25 21:53:34 +02:00
#default_backend matrix-main
frontend matrix-federation
bind *:8448 ssl crt /etc/haproxy/certs/star-example.com.pem
reqadd X-Forwarded-Proto:\ https
option httplog
option http-server-close
default_backend synapse
backend matrix-main
2024-01-14 16:23:28 +01:00
server matrix-main 127.0.0.1:81 check
2019-08-25 21:53:34 +02:00
2024-01-14 16:23:28 +01:00
backend matrix-federation
server matrix-federation 127.0.0.1:8049 check
2019-08-25 21:53:34 +02:00
backend nginx-static
capture request header origin len 128
http-response add-header Access-Control-Allow-Origin *
2019-08-25 21:53:34 +02:00
rspadd Access-Control-Allow-Methods:\ GET,\ HEAD,\ OPTIONS,\ POST,\ PUT if { capture.req.hdr(0) -m found }
rspadd Access-Control-Allow-Credentials:\ true if { capture.req.hdr(0) -m found }
rspadd Access-Control-Allow-Headers:\ Origin,\ Accept,\ X-Requested-With,\ Content-Type,\ Access-Control-Request-Method,\ Access-Control-Request-Headers,\ Authorization if { capture.req.hdr(0) -m found }
server nginx 127.0.0.1:40888 check
backend element
server element 127.0.0.1:8765 check
2019-08-25 21:53:34 +02:00