- Replace OpenStreetMap CDN with self-hosted Protomaps PMTiles (Wisconsin + Florida regional extracts, served from nginx) - Add protomaps-leaflet for vector tile rendering in dark theme - Update CSP to remove openstreetmap.org, add blob: for vector workers - Add nginx location block for /tiles/ with byte range support - Mount tiles directory as volume (not baked into image) - Remove alert_fired/alert_resolved toast notifications that spammed "undefined" at fleet scale — dashboard still updates via query invalidation - Add *.pmtiles to .gitignore (large binaries) Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
126 lines
5.0 KiB
Plaintext
126 lines
5.0 KiB
Plaintext
map $http_upgrade $connection_upgrade {
|
|
default upgrade;
|
|
'' close;
|
|
}
|
|
|
|
server {
|
|
listen 80;
|
|
server_name _;
|
|
|
|
# Use Docker's embedded DNS resolver so nginx re-resolves upstream hostnames
|
|
# dynamically instead of caching IPs at startup (prevents 502 after container restarts).
|
|
resolver 127.0.0.11 valid=10s ipv6=off;
|
|
|
|
root /usr/share/nginx/html;
|
|
index index.html;
|
|
|
|
# Security headers (server-level -- inherited by all locations unless overridden)
|
|
add_header X-Frame-Options "SAMEORIGIN" always;
|
|
add_header X-Content-Type-Options "nosniff" always;
|
|
add_header X-XSS-Protection "0" always;
|
|
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
|
|
add_header Permissions-Policy "camera=(), microphone=(), geolocation=()" always;
|
|
|
|
# CSP for React SPA with Tailwind CSS and Leaflet maps
|
|
# worker-src required for SRP key derivation Web Worker (Safari won't fall back to script-src)
|
|
add_header Content-Security-Policy "default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: blob:; font-src 'self'; connect-src 'self' ws: wss:; worker-src 'self' blob:; frame-ancestors 'self'; base-uri 'self'; form-action 'self';" always;
|
|
|
|
# Proxy API requests to the backend service
|
|
# The api container is reachable via Docker internal DNS as "api" on port 8000
|
|
location /api/ {
|
|
# Use a variable so nginx applies the resolver on every request.
|
|
# With a variable in proxy_pass, nginx passes the full request URI as-is
|
|
# (no path stripping), so the upstream receives /api/... correctly.
|
|
set $api_upstream api;
|
|
proxy_pass http://$api_upstream:8000;
|
|
proxy_http_version 1.1;
|
|
proxy_set_header Host $host;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
# Disable buffering for streaming/SSE endpoints
|
|
proxy_buffering off;
|
|
proxy_read_timeout 300s;
|
|
# Hide nginx server-level CSP — backend sets its own CSP on API responses
|
|
proxy_hide_header Content-Security-Policy;
|
|
}
|
|
|
|
# WebSocket proxy for SSH terminal
|
|
location /ws/ssh {
|
|
resolver 127.0.0.11 valid=10s ipv6=off;
|
|
set $poller_upstream http://poller:8080;
|
|
|
|
proxy_pass $poller_upstream;
|
|
proxy_http_version 1.1;
|
|
|
|
proxy_set_header Upgrade $http_upgrade;
|
|
proxy_set_header Connection $connection_upgrade;
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header Host $host;
|
|
|
|
proxy_read_timeout 1800s;
|
|
proxy_send_timeout 1800s;
|
|
|
|
proxy_buffering off;
|
|
proxy_request_buffering off;
|
|
proxy_busy_buffers_size 512k;
|
|
proxy_buffers 8 512k;
|
|
}
|
|
|
|
# Proxy Xpra HTML5 client requests to the winbox-worker container
|
|
location ~ ^/xpra/(\d+)/(.*) {
|
|
resolver 127.0.0.11 valid=10s ipv6=off;
|
|
set $xpra_port $1;
|
|
set $xpra_path $2;
|
|
set $worker_upstream winbox-worker;
|
|
|
|
proxy_pass http://$worker_upstream:$xpra_port/$xpra_path$is_args$args;
|
|
proxy_http_version 1.1;
|
|
proxy_set_header Host $host;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header Upgrade $http_upgrade;
|
|
proxy_set_header Connection $connection_upgrade;
|
|
proxy_read_timeout 300s;
|
|
proxy_buffering off;
|
|
# Xpra HTML5 client uses inline event handlers and eval — override the
|
|
# strict server-level CSP. Adding any add_header in a location block
|
|
# replaces all inherited server-level add_header directives in nginx.
|
|
add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval' ws: wss: data: blob:; frame-ancestors 'self';" always;
|
|
add_header X-Content-Type-Options "nosniff" always;
|
|
}
|
|
|
|
# Serve PMTiles with byte range support (protomaps-leaflet reads via HTTP Range)
|
|
location /tiles/ {
|
|
add_header Access-Control-Allow-Origin "*" always;
|
|
add_header X-Content-Type-Options "nosniff" always;
|
|
types {
|
|
application/octet-stream pmtiles;
|
|
}
|
|
try_files $uri =404;
|
|
}
|
|
|
|
# Serve static assets with long cache headers
|
|
# Note: add_header in a location block clears parent-block headers,
|
|
# so we re-add the essential security header for static assets.
|
|
location ~* \.(js|css|png|jpg|jpeg|gif|ico|svg|woff|woff2|ttf|eot)$ {
|
|
expires 1y;
|
|
add_header Cache-Control "public, immutable" always;
|
|
add_header X-Content-Type-Options "nosniff" always;
|
|
try_files $uri =404;
|
|
}
|
|
|
|
# SPA routing: all other requests serve index.html
|
|
location / {
|
|
try_files $uri $uri/ /index.html;
|
|
}
|
|
|
|
# Health check endpoint for container probes
|
|
location /nginx-health {
|
|
access_log off;
|
|
return 200 "OK\n";
|
|
add_header Content-Type text/plain;
|
|
}
|
|
}
|