229 lines
5.1 KiB
Django/Jinja
229 lines
5.1 KiB
Django/Jinja
# Global configuration for country blocking
|
|
{
|
|
servers {
|
|
protocols h1 h2 h3
|
|
}
|
|
}
|
|
|
|
# Country blocking snippet using MaxMind GeoLocation - reusable across all sites
|
|
{% if enable_country_blocking | default(false) and allowed_countries_codes | default([]) | length > 0 %}
|
|
(country_block) {
|
|
@allowed_local {
|
|
remote_ip 127.0.0.1 ::1 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 157.180.41.167 2a01:4f9:c013:1a13::1
|
|
}
|
|
@not_allowed_countries {
|
|
not remote_ip 127.0.0.1 ::1 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 157.180.41.167 2a01:4f9:c013:1a13::1
|
|
not {
|
|
maxmind_geolocation {
|
|
db_path "/etc/caddy/geoip/GeoLite2-Country.mmdb"
|
|
allow_countries {{ allowed_countries_codes | join(' ') }}
|
|
}
|
|
}
|
|
}
|
|
respond @not_allowed_countries "Access denied" 403
|
|
}
|
|
{% else %}
|
|
(country_block) {
|
|
# Country blocking disabled
|
|
}
|
|
{% endif %}
|
|
|
|
{% if inventory_hostname == 'mennos-cachyos-desktop' %}
|
|
git.mvl.sh {
|
|
import country_block
|
|
reverse_proxy gitea:3000
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
git.vleeuwen.me {
|
|
import country_block
|
|
redir https://git.mvl.sh{uri}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
df.mvl.sh {
|
|
import country_block
|
|
redir / https://git.mvl.sh/vleeuwenmenno/dotfiles/raw/branch/master/setup.sh
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
fsm.mvl.sh {
|
|
import country_block
|
|
reverse_proxy factorio-server-manager:80
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
fsm.vleeuwen.me {
|
|
import country_block
|
|
redir https://fsm.mvl.sh{uri}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
beszel.mvl.sh {
|
|
import country_block
|
|
reverse_proxy beszel:8090
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
beszel.vleeuwen.me {
|
|
import country_block
|
|
redir https://beszel.mvl.sh{uri}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
photos.mvl.sh {
|
|
import country_block
|
|
reverse_proxy immich:2283
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
photos.vleeuwen.me {
|
|
import country_block
|
|
redir https://photos.mvl.sh{uri}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
home.mvl.sh {
|
|
import country_block
|
|
reverse_proxy host.docker.internal:8123 {
|
|
header_up Host {upstream_hostport}
|
|
header_up X-Real-IP {http.request.remote.host}
|
|
}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
home.vleeuwen.me {
|
|
import country_block
|
|
reverse_proxy host.docker.internal:8123 {
|
|
header_up Host {upstream_hostport}
|
|
header_up X-Real-IP {http.request.remote.host}
|
|
}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
|
|
unifi.mvl.sh {
|
|
reverse_proxy unifi-controller:8443 {
|
|
transport http {
|
|
tls_insecure_skip_verify
|
|
}
|
|
header_up Host {host}
|
|
}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
hotspot.mvl.sh {
|
|
reverse_proxy unifi-controller:8843 {
|
|
transport http {
|
|
tls_insecure_skip_verify
|
|
}
|
|
header_up Host {host}
|
|
}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
hotspot.mvl.sh:80 {
|
|
redir https://hotspot.mvl.sh{uri} permanent
|
|
}
|
|
|
|
bin.mvl.sh {
|
|
import country_block
|
|
reverse_proxy privatebin:8080
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
ip.mvl.sh ip.vleeuwen.me {
|
|
import country_block
|
|
reverse_proxy echoip:8080 {
|
|
header_up X-Real-IP {http.request.remote.host}
|
|
}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
http://ip.mvl.sh http://ip.vleeuwen.me {
|
|
import country_block
|
|
reverse_proxy echoip:8080 {
|
|
header_up X-Real-IP {http.request.remote.host}
|
|
}
|
|
}
|
|
|
|
overseerr.mvl.sh {
|
|
import country_block
|
|
reverse_proxy overseerr:5055
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
overseerr.vleeuwen.me {
|
|
import country_block
|
|
redir https://overseerr.mvl.sh{uri}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
plex.mvl.sh {
|
|
import country_block
|
|
reverse_proxy host.docker.internal:32400 {
|
|
header_up Host {upstream_hostport}
|
|
header_up X-Real-IP {http.request.remote.host}
|
|
}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
plex.vleeuwen.me {
|
|
import country_block
|
|
redir https://plex.mvl.sh{uri}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
tautulli.mvl.sh {
|
|
import country_block
|
|
reverse_proxy host.docker.internal:8181 {
|
|
header_up Host {upstream_hostport}
|
|
header_up X-Real-IP {http.request.remote.host}
|
|
}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
tautulli.vleeuwen.me {
|
|
import country_block
|
|
redir https://tautulli.mvl.sh{uri}
|
|
tls {{ caddy_email }}
|
|
}
|
|
|
|
drive.mvl.sh drive.vleeuwen.me {
|
|
import country_block
|
|
|
|
# CalDAV and CardDAV redirects
|
|
redir /.well-known/carddav /remote.php/dav/ 301
|
|
redir /.well-known/caldav /remote.php/dav/ 301
|
|
|
|
# Handle other .well-known requests
|
|
handle /.well-known/* {
|
|
reverse_proxy nextcloud:80 {
|
|
header_up Host {host}
|
|
header_up X-Real-IP {http.request.remote.host}
|
|
}
|
|
}
|
|
|
|
# Main reverse proxy configuration with proper headers
|
|
reverse_proxy nextcloud:80 {
|
|
header_up Host {host}
|
|
header_up X-Real-IP {http.request.remote.host}
|
|
}
|
|
|
|
# Security headers
|
|
header {
|
|
# HSTS header for enhanced security (required by Nextcloud)
|
|
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
|
|
# Additional security headers recommended for Nextcloud
|
|
X-Content-Type-Options "nosniff"
|
|
X-Frame-Options "SAMEORIGIN"
|
|
Referrer-Policy "no-referrer"
|
|
X-XSS-Protection "1; mode=block"
|
|
X-Permitted-Cross-Domain-Policies "none"
|
|
X-Robots-Tag "noindex, nofollow"
|
|
}
|
|
|
|
tls {{ caddy_email }}
|
|
}
|
|
{% endif %}
|