gitlab-ssl 7.17 KB
Newer Older
1 2 3 4
## GitLab
##
## Modified from nginx http version
## Modified from http://blog.phusion.nl/2012/04/21/tutorial-setting-up-gitlab-on-debian-6/
5
## Modified from https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
6
##
7
## Lines starting with two hashes (##) are comments with information.
8
## Lines starting with one hash (#) are configuration parameters that can be uncommented.
9 10
##
##################################
11 12 13 14 15 16
##        CONTRIBUTING          ##
##################################
##
## If you change this file in a Merge Request, please also create
## a Merge Request on https://gitlab.com/gitlab-org/omnibus-gitlab/merge_requests
##
17
###################################
18
##         configuration         ##
19 20
###################################
##
21
## See installation.md#using-https for additional HTTPS configuration details.
22

23
upstream gitlab-workhorse {
24
  # GitLab socket file,
25
  # for Omnibus this would be: unix:/var/opt/gitlab/gitlab-workhorse/socket
26
  server unix:/home/git/gitlab/tmp/sockets/gitlab-workhorse.socket fail_timeout=0;
27
}
28

29 30 31 32 33
map $http_upgrade $connection_upgrade_gitlab_ssl {
    default upgrade;
    ''      close;
}

34 35 36 37 38

## NGINX 'combined' log format with filtered query strings
log_format gitlab_ssl_access $remote_addr - $remote_user [$time_local] "$request_method $gitlab_ssl_filtered_request_uri $server_protocol" $status $body_bytes_sent "$gitlab_ssl_filtered_http_referer" "$http_user_agent";

## Remove private_token from the request URI
39 40
# In:  /foo?private_token=unfiltered&authenticity_token=unfiltered&feed_token=unfiltered&...
# Out: /foo?private_token=[FILTERED]&authenticity_token=unfiltered&feed_token=unfiltered&...
41 42 43 44 45 46
map $request_uri $gitlab_ssl_temp_request_uri_1 {
  default $request_uri;
  ~(?i)^(?<start>.*)(?<temp>[\?&]private[\-_]token)=[^&]*(?<rest>.*)$ "$start$temp=[FILTERED]$rest";
}

## Remove authenticity_token from the request URI
47 48
# In:  /foo?private_token=[FILTERED]&authenticity_token=unfiltered&feed_token=unfiltered&...
# Out: /foo?private_token=[FILTERED]&authenticity_token=[FILTERED]&feed_token=unfiltered&...
49 50 51 52 53
map $gitlab_ssl_temp_request_uri_1 $gitlab_ssl_temp_request_uri_2 {
  default $gitlab_ssl_temp_request_uri_1;
  ~(?i)^(?<start>.*)(?<temp>[\?&]authenticity[\-_]token)=[^&]*(?<rest>.*)$ "$start$temp=[FILTERED]$rest";
}

54 55 56
## Remove feed_token from the request URI
# In:  /foo?private_token=[FILTERED]&authenticity_token=[FILTERED]&feed_token=unfiltered&...
# Out: /foo?private_token=[FILTERED]&authenticity_token=[FILTERED]&feed_token=[FILTERED]&...
57 58
map $gitlab_ssl_temp_request_uri_2 $gitlab_ssl_filtered_request_uri {
  default $gitlab_ssl_temp_request_uri_2;
59
  ~(?i)^(?<start>.*)(?<temp>[\?&]feed[\-_]token)=[^&]*(?<rest>.*)$ "$start$temp=[FILTERED]$rest";
60 61 62 63 64 65 66 67 68
}

## A version of the referer without the query string
map $http_referer $gitlab_ssl_filtered_http_referer {
  default $http_referer;
  ~^(?<temp>.*)\? $temp;
}


69
## Redirects all HTTP traffic to the HTTPS host
70
server {
71
  ## Either remove "default_server" from the listen line below,
72 73 74
  ## or delete the /etc/nginx/sites-enabled/default file. This will cause gitlab
  ## to be served if you visit any address that your server responds to, eg.
  ## the ip address of the server (http://x.x.x.x/)
75
  listen 0.0.0.0:80;
76
  listen [::]:80 ipv6only=on default_server;
77 78
  server_name YOUR_SERVER_FQDN; ## Replace this with something like gitlab.example.com
  server_tokens off; ## Don't show the nginx version number, a security best practice
79
  return 301 https://$http_host$request_uri;
80
  access_log  /var/log/nginx/gitlab_access.log gitlab_ssl_access;
81
  error_log   /var/log/nginx/gitlab_error.log;
82 83
}

84
## HTTPS host
85
server {
86
  listen 0.0.0.0:443 ssl;
87
  listen [::]:443 ipv6only=on ssl default_server;
88
  server_name YOUR_SERVER_FQDN; ## Replace this with something like gitlab.example.com
89
  server_tokens off; ## Don't show the nginx version number, a security best practice
90 91

  ## Strong SSL Security
92
  ## https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html & https://cipherli.st/
93 94 95 96
  ssl on;
  ssl_certificate /etc/nginx/ssl/gitlab.crt;
  ssl_certificate_key /etc/nginx/ssl/gitlab.key;

97
  # GitLab needs backwards compatible ciphers to retain compatibility with Java IDEs
98
  ssl_ciphers "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4";
99 100 101
  ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
  ssl_prefer_server_ciphers on;
  ssl_session_cache shared:SSL:10m;
102
  ssl_session_timeout 5m;
103

104
  ## See app/controllers/application_controller.rb for headers set
105

106 107 108 109 110 111 112 113 114
  ## [Optional] If your certficate has OCSP, enable OCSP stapling to reduce the overhead and latency of running SSL.
  ## Replace with your ssl_trusted_certificate. For more info see:
  ## - https://medium.com/devops-programming/4445f4862461
  ## - https://www.ruby-forum.com/topic/4419319
  ## - https://www.digitalocean.com/community/tutorials/how-to-configure-ocsp-stapling-on-apache-and-nginx
  # ssl_stapling on;
  # ssl_stapling_verify on;
  # ssl_trusted_certificate /etc/nginx/ssl/stapling.trusted.crt;
  # resolver 208.67.222.222 208.67.222.220 valid=300s; # Can change to your DNS resolver if desired
115
  # resolver_timeout 5s;
116 117

  ## [Optional] Generate a stronger DHE parameter:
118
  ##   sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 4096
119 120 121
  ##
  # ssl_dhparam /etc/ssl/certs/dhparam.pem;

122 123 124
  ## [Optional] Enable HTTP Strict Transport Security
  # add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";

125 126 127 128
  ## Real IP Module Config
  ## http://nginx.org/en/docs/http/ngx_http_realip_module.html
  real_ip_header X-Real-IP; ## X-Real-IP or X-Forwarded-For or proxy_protocol
  real_ip_recursive off;    ## If you enable 'on'
129 130
  ## If you have a trusted IP address, uncomment it and set it
  # set_real_ip_from YOUR_TRUSTED_ADDRESS; ## Replace this with something like 192.168.1.0/24
131

132
  ## Individual nginx logs for this GitLab vhost
133
  access_log  /var/log/nginx/gitlab_access.log gitlab_ssl_access;
134 135 136
  error_log   /var/log/nginx/gitlab_error.log;

  location / {
137
    client_max_body_size 0;
138 139 140 141 142 143 144 145
    gzip off;

    ## https://github.com/gitlabhq/gitlabhq/issues/694
    ## Some requests take more than 30 seconds.
    proxy_read_timeout      300;
    proxy_connect_timeout   300;
    proxy_redirect          off;

146
    proxy_http_version 1.1;
147

148
    proxy_set_header    Host                $http_host;
149 150 151 152
    proxy_set_header    X-Real-IP           $remote_addr;
    proxy_set_header    X-Forwarded-Ssl     on;
    proxy_set_header    X-Forwarded-For     $proxy_add_x_forwarded_for;
    proxy_set_header    X-Forwarded-Proto   $scheme;
153 154 155
    proxy_set_header    Upgrade             $http_upgrade;
    proxy_set_header    Connection          $connection_upgrade_gitlab_ssl;

156
    proxy_pass http://gitlab-workhorse;
157
  }
158 159 160 161 162

  error_page 404 /404.html;
  error_page 422 /422.html;
  error_page 500 /500.html;
  error_page 502 /502.html;
163 164
  error_page 503 /503.html;
  location ~ ^/(404|422|500|502|503)\.html$ {
165
    # Location to the GitLab's public directory,
166
    # for Omnibus this would be: /opt/gitlab/embedded/service/gitlab-rails/public
167 168 169
    root /home/git/gitlab/public;
    internal;
  }
170
}