server { client_max_body_size 64M; listen 80; server_name {{ domain_nocodb }}; location / { return 301 https://$host$request_uri; } location ~ /.well-known/acme-challenge/ { alias /var/www/html/.well-known/acme-challenge/; default_type "text/plain"; allow all; } } server { client_max_body_size 64M; listen 443 ssl http2; server_name {{ domain_nocodb }}; # SSL Certificates (to be updated by Certbot) # Uncomment this if you want to enforce HSTS # add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; # Allow embedding in iframe add_header X-Frame-Options "ALLOWALL"; add_header Content-Security-Policy "frame-ancestors *;"; # CORS Headers add_header 'Access-Control-Allow-Origin' '*'; add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS, PUT, DELETE'; add_header 'Access-Control-Allow-Headers' 'Authorization, Content-Type'; location / { proxy_pass http://0.0.0.0:3057; proxy_redirect off; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-Proto $scheme; # Support WebSocket proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; proxy_buffer_size 128k; proxy_buffers 4 256k; proxy_busy_buffers_size 256k; } location ~ /.well-known/acme-challenge/ { alias /var/www/html/.well-known/acme-challenge/; default_type "text/plain"; allow all; } ssl_certificate /etc/nginx/placeholder.crt; # managed by Certbot ssl_certificate_key /etc/nginx/placeholder.key; # managed by Certbot }