| @@ -4,10 +4,14 @@ | |||||
| gzip on; | gzip on; | ||||
| gzip_types text/plain application/json application/javascript text/css image/x-icon font/ttf image/gif; | gzip_types text/plain application/json application/javascript text/css image/x-icon font/ttf image/gif; | ||||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; | |||||
| {% if matrix_nginx_proxy_hsts_preload_enabled %} | |||||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always; | |||||
| {% else %} | |||||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; | |||||
| {% endif %} | |||||
| add_header X-XSS-Protection "{{ matrix_nginx_proxy_xss_protection }}"; | |||||
| add_header X-Content-Type-Options nosniff; | add_header X-Content-Type-Options nosniff; | ||||
| add_header X-Frame-Options SAMEORIGIN; | add_header X-Frame-Options SAMEORIGIN; | ||||
| add_header X-XSS-Protection "1; mode=block"; | |||||
| add_header Content-Security-Policy "frame-ancestors 'none'"; | add_header Content-Security-Policy "frame-ancestors 'none'"; | ||||
| {% if matrix_nginx_proxy_floc_optout_enabled %} | {% if matrix_nginx_proxy_floc_optout_enabled %} | ||||
| add_header Permissions-Policy interest-cohort=() always; | add_header Permissions-Policy interest-cohort=() always; | ||||
| @@ -5,6 +5,14 @@ | |||||
| add_header Permissions-Policy interest-cohort=() always; | add_header Permissions-Policy interest-cohort=() always; | ||||
| {% endif %} | {% endif %} | ||||
| {% if matrix_nginx_proxy_hsts_preload_enabled %} | |||||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always; | |||||
| {% else %} | |||||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; | |||||
| {% endif %} | |||||
| add_header X-XSS-Protection "{{ matrix_nginx_proxy_xss_protection }}"; | |||||
| {% for configuration_block in matrix_nginx_proxy_proxy_riot_additional_server_configuration_blocks %} | {% for configuration_block in matrix_nginx_proxy_proxy_riot_additional_server_configuration_blocks %} | ||||
| {{- configuration_block }} | {{- configuration_block }} | ||||
| {% endfor %} | {% endfor %} | ||||
| @@ -67,7 +75,7 @@ server { | |||||
| ssl_stapling_verify on; | ssl_stapling_verify on; | ||||
| ssl_trusted_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_riot_compat_redirect_hostname }}/chain.pem; | ssl_trusted_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_riot_compat_redirect_hostname }}/chain.pem; | ||||
| {% endif %} | {% endif %} | ||||
| {% if matrix_nginx_proxy_ssl_session_tickets_off %} | {% if matrix_nginx_proxy_ssl_session_tickets_off %} | ||||
| ssl_session_tickets off; | ssl_session_tickets off; | ||||
| {% endif %} | {% endif %} | ||||
| @@ -587,4 +587,3 @@ matrix_synapse_configuration_extension: "{{ matrix_synapse_configuration_extensi | |||||
| # Holds the final Synapse configuration (a combination of the default and its extension). | # Holds the final Synapse configuration (a combination of the default and its extension). | ||||
| # You most likely don't need to touch this variable. Instead, see `matrix_synapse_configuration_yaml`. | # You most likely don't need to touch this variable. Instead, see `matrix_synapse_configuration_yaml`. | ||||
| matrix_synapse_configuration: "{{ matrix_synapse_configuration_yaml|from_yaml|combine(matrix_synapse_configuration_extension, recursive=True) }}" | matrix_synapse_configuration: "{{ matrix_synapse_configuration_yaml|from_yaml|combine(matrix_synapse_configuration_extension, recursive=True) }}" | ||||