|
- global
- log /dev/log local0
- log /dev/log local1 notice
- chroot /var/lib/haproxy
- stats socket /run/haproxy/admin.sock mode 660 level admin
- stats timeout 30s
- user haproxy
- group haproxy
- daemon
- # Default SSL material locations
- ca-base /etc/ssl/certs
- crt-base /etc/ssl/private
- # Default ciphers to use on SSL-enabled listening sockets.
- # For more information, see ciphers(1SSL). This list is from:
- # https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/
- ssl-default-bind-ciphers ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS
- ssl-default-bind-options no-sslv3
-
- defaults
- log global
- mode http
- option httplog
- option dontlognull
- option forwardfor
- option redispatch
- timeout connect 5000
- timeout client 50000
- timeout server 50000
- errorfile 400 /etc/haproxy/errors/400.http
- errorfile 403 /etc/haproxy/errors/403.http
- errorfile 408 /etc/haproxy/errors/408.http
- errorfile 500 /etc/haproxy/errors/500.http
- errorfile 502 /etc/haproxy/errors/502.http
- errorfile 503 /etc/haproxy/errors/503.http
- errorfile 504 /etc/haproxy/errors/504.http
-
- frontend https-frontend
- bind *:80
- # HAproxy wants the full chain and the private key in one file. For Letsencrypt manually generated certs (e.g., wildcard certs) you can use
- # cat /etc/letsencrypt/live/example.com/fullchain.pem /etc/letsencrypt/live/example.com/privkey.pem > /etc/haproxy/certs/star-example.com.pem
- bind *:443 ssl crt /etc/haproxy/certs/star-example.com.pem
- #bind *:443 ssl crt /etc/haproxy/certs/riot.example.com.pem /etc/haproxy/certs/matrix.example.com.pem
- reqadd X-Forwarded-Proto:\ https
- option httplog
- option http-server-close
- #
- # Matrix
- #
- # matrix.example.com
- acl matrix_domain hdr_dom(host) -i matrix.example.com
- acl static_files path -i -m beg /.well-known/matrix
- use_backend nginx-static if static_files
- # /_matrix/identity and /_matrix/client/r0/user_directory/search
- acl matrix_identity path -i -m beg /_matrix/identity
- acl matrix_search path -i -m beg /_matrix/client/r0/user_directory/search
- # Send to :8090
- use_backend matrix-supporting if matrix_identity or matrix_search
- # /_matrix and /_synapse/admin
- acl matrix_path path -i -m beg /_matrix
- acl synapse_admin path -i -m beg /_synapse/admin
- # Send to :8008
- use_backend matrix-main if matrix_path or synapse_admin
- # riot.example.com
- acl riot_domain hdr_dom(host) -i riot.example.com
- # Send to 8765
- use_backend riot if riot_domain
- # If nothing else match, just send to default matrix backend
- use_backend matrix-main if matrix_domain
- #default_backend matrix-main
-
- frontend matrix-federation
- bind *:8448 ssl crt /etc/haproxy/certs/star-example.com.pem
- reqadd X-Forwarded-Proto:\ https
- option httplog
- option http-server-close
- default_backend synapse
-
- backend matrix-supporting
- server matrix-supporting 127.0.0.1:8090 check
-
- backend matrix-main
- server matrix-main 127.0.0.1:8008 check
-
- backend synapse
- server synapse 127.0.0.1:8048 check
-
- backend nginx-static
- capture request header origin len 128
- http-response add-header Access-Control-Allow-Origin *
- rspadd Access-Control-Allow-Methods:\ GET,\ HEAD,\ OPTIONS,\ POST,\ PUT if { capture.req.hdr(0) -m found }
- rspadd Access-Control-Allow-Credentials:\ true if { capture.req.hdr(0) -m found }
- rspadd Access-Control-Allow-Headers:\ Origin,\ Accept,\ X-Requested-With,\ Content-Type,\ Access-Control-Request-Method,\ Access-Control-Request-Headers,\ Authorization if { capture.req.hdr(0) -m found }
- server nginx 127.0.0.1:40888 check
-
- backend riot
- server riot 127.0.0.1:8765 check
|