[nginx] Add Quassel TLS tunneling

This commit is contained in:
Vincent Ambo 2016-03-24 22:27:54 +01:00
parent 1e3a90646e
commit 2dbff70567
No known key found for this signature in database
GPG key ID: 66F505681DB8F43B
4 changed files with 35 additions and 4 deletions

View file

@ -23,7 +23,7 @@ http {
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';
ssl_prefer_server_ciphers on;
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_cache shared:HTTPS:50m;
ssl_session_tickets off;
ssl_dhparam /etc/nginx/ssl/dhparam/tls.dhparam;
@ -38,8 +38,8 @@ http {
access_log /var/log/nginx/access.log logstash;
# Default tazj.in config (certs need to be overriden for other stuff, like oslo.pub)
ssl_certificate /etc/nginx/ssl/tazj.in/tls.key;
ssl_certificate_key /etc/nginx/ssl/tazj.in/tls.crt;
ssl_certificate /etc/nginx/ssl/tazj.in/tls.crt;
ssl_certificate_key /etc/nginx/ssl/tazj.in/tls.key;
# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
add_header Strict-Transport-Security max-age=15768000;
@ -48,5 +48,17 @@ http {
}
stream {
ssl_protocols TLSv1.2;
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';
ssl_dhparam /etc/nginx/ssl/dhparam/tls.dhparam;
ssl_prefer_server_ciphers on;
ssl_session_timeout 1d;
ssl_session_cache shared:STREAM:50m;
ssl_session_tickets off;
# Default tazj.in certificate
ssl_certificate /etc/nginx/ssl/tazj.in/tls.crt;
ssl_certificate_key /etc/nginx/ssl/tazj.in/tls.key;
include /etc/nginx/conf/stream.conf;
}

View file

@ -1,6 +1,11 @@
# Gogs SSH tunneling
server {
listen 22;
proxy_pass gogs-priv.default.svc.cluster.local:22;
}
# Quassel TLS -> TCP tunneling
server {
listen 4242 ssl;
proxy_pass quassel-priv.default.svc.cluster.local:4242;
}

View file

@ -17,3 +17,5 @@ spec:
name: https
- port: 22
name: ssh
- port: 4242
name: quassel

12
quassel/quassel-svc.yaml Normal file
View file

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: quassel-priv
labels:
app: quassel
spec:
selector:
app: quassel
ports:
- port: 4242
name: quassel-internal