|
|
@@ -0,0 +1,96 @@ |
|
|
|
|
|
global |
|
|
|
|
|
log /dev/log local0 |
|
|
|
|
|
log /dev/log local1 notice |
|
|
|
|
|
chroot /var/lib/haproxy |
|
|
|
|
|
stats socket /run/haproxy/admin.sock mode 660 level admin |
|
|
|
|
|
stats timeout 30s |
|
|
|
|
|
user haproxy |
|
|
|
|
|
group haproxy |
|
|
|
|
|
daemon |
|
|
|
|
|
# Default SSL material locations |
|
|
|
|
|
ca-base /etc/ssl/certs |
|
|
|
|
|
crt-base /etc/ssl/private |
|
|
|
|
|
# Default ciphers to use on SSL-enabled listening sockets. |
|
|
|
|
|
# For more information, see ciphers(1SSL). This list is from: |
|
|
|
|
|
# https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/ |
|
|
|
|
|
ssl-default-bind-ciphers ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS |
|
|
|
|
|
ssl-default-bind-options no-sslv3 |
|
|
|
|
|
|
|
|
|
|
|
defaults |
|
|
|
|
|
log global |
|
|
|
|
|
mode http |
|
|
|
|
|
option httplog |
|
|
|
|
|
option dontlognull |
|
|
|
|
|
option forwardfor |
|
|
|
|
|
option redispatch |
|
|
|
|
|
timeout connect 5000 |
|
|
|
|
|
timeout client 50000 |
|
|
|
|
|
timeout server 50000 |
|
|
|
|
|
errorfile 400 /etc/haproxy/errors/400.http |
|
|
|
|
|
errorfile 403 /etc/haproxy/errors/403.http |
|
|
|
|
|
errorfile 408 /etc/haproxy/errors/408.http |
|
|
|
|
|
errorfile 500 /etc/haproxy/errors/500.http |
|
|
|
|
|
errorfile 502 /etc/haproxy/errors/502.http |
|
|
|
|
|
errorfile 503 /etc/haproxy/errors/503.http |
|
|
|
|
|
errorfile 504 /etc/haproxy/errors/504.http |
|
|
|
|
|
|
|
|
|
|
|
frontend https-frontend |
|
|
|
|
|
bind *:80 |
|
|
|
|
|
# HAproxy wants the full chain and the private key in one file. For Letsencrypt manually generated certs (e.g., wildcard certs) you can use |
|
|
|
|
|
# cat /etc/letsencrypt/live/example.com/fullchain.pem /etc/letsencrypt/live/example.com/privkey.pem > /etc/haproxy/certs/star-example.com.pem |
|
|
|
|
|
bind *:443 ssl crt /etc/haproxy/certs/star-example.com.pem |
|
|
|
|
|
reqadd X-Forwarded-Proto:\ https |
|
|
|
|
|
option httplog |
|
|
|
|
|
option http-server-close |
|
|
|
|
|
# |
|
|
|
|
|
# Matrix |
|
|
|
|
|
# |
|
|
|
|
|
# matrix.example.com |
|
|
|
|
|
acl matrix_domain hdr_dom(host) -i matrix.example.com |
|
|
|
|
|
acl static_files path -i -m beg /.well-known/matrix |
|
|
|
|
|
use_backend nginx-static if static_files |
|
|
|
|
|
# /_matrix/identity and /_matrix/client/r0/user_directory/search |
|
|
|
|
|
acl matrix_identity path -i -m beg /_matrix/identity |
|
|
|
|
|
acl matrix_search path -i -m beg /_matrix/client/r0/user_directory/search |
|
|
|
|
|
# Send to :8090 |
|
|
|
|
|
use_backend matrix-supporting if matrix_identity or matrix_search |
|
|
|
|
|
# /_matrix and /_synapse/admin |
|
|
|
|
|
acl matrix_path path -i -m beg /_matrix |
|
|
|
|
|
acl synapse_admin path -i -m beg /_synapse/admin |
|
|
|
|
|
# Send to :8008 |
|
|
|
|
|
use_backend matrix-main if matrix_path or synapse_admin |
|
|
|
|
|
# riot.example.com |
|
|
|
|
|
acl riot_domain hdr_dom(host) -i riot.example.com |
|
|
|
|
|
# Send to 8765 |
|
|
|
|
|
use_backend riot if riot_domain |
|
|
|
|
|
# If nothing else match, just send to default matrix backend |
|
|
|
|
|
use_backend matrix-main if matrix_domain |
|
|
|
|
|
#default_backend matrix-main |
|
|
|
|
|
|
|
|
|
|
|
frontend matrix-federation |
|
|
|
|
|
bind *:8448 ssl crt /etc/haproxy/certs/star-example.com.pem |
|
|
|
|
|
reqadd X-Forwarded-Proto:\ https |
|
|
|
|
|
option httplog |
|
|
|
|
|
option http-server-close |
|
|
|
|
|
default_backend synapse |
|
|
|
|
|
|
|
|
|
|
|
backend matrix-supporting |
|
|
|
|
|
server matrix-supporting 127.0.0.1:8090 check |
|
|
|
|
|
|
|
|
|
|
|
backend matrix-main |
|
|
|
|
|
server matrix-main 127.0.0.1:8008 check |
|
|
|
|
|
|
|
|
|
|
|
backend synapse |
|
|
|
|
|
server synapse 127.0.0.1:8048 check |
|
|
|
|
|
|
|
|
|
|
|
backend nginx-static |
|
|
|
|
|
capture request header origin len 128 |
|
|
|
|
|
http-response add-header Access-Control-Allow-Origin * |
|
|
|
|
|
rspadd Access-Control-Allow-Methods:\ GET,\ HEAD,\ OPTIONS,\ POST,\ PUT if { capture.req.hdr(0) -m found } |
|
|
|
|
|
rspadd Access-Control-Allow-Credentials:\ true if { capture.req.hdr(0) -m found } |
|
|
|
|
|
rspadd Access-Control-Allow-Headers:\ Origin,\ Accept,\ X-Requested-With,\ Content-Type,\ Access-Control-Request-Method,\ Access-Control-Request-Headers,\ Authorization if { capture.req.hdr(0) -m found } |
|
|
|
|
|
server nginx 127.0.0.1:40888 check |
|
|
|
|
|
|
|
|
|
|
|
backend riot |
|
|
|
|
|
server riot 127.0.0.1:8765 check |
|
|
|
|
|
|