X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=mods%2Fsample-nginx.config;h=5530bfaefd9cff6d328c81518df30da9bfe8c017;hb=539ac4f2b82e661d63b17c5276550ba6120806fe;hp=e4ce902515e4c858bc2ff09da3e81c1dd2f11af3;hpb=6cf50a14fae25210a0cdb617c29d549abcfde9ac;p=friendica.git diff --git a/mods/sample-nginx.config b/mods/sample-nginx.config index e4ce902515..5530bfaefd 100644 --- a/mods/sample-nginx.config +++ b/mods/sample-nginx.config @@ -35,7 +35,7 @@ server { index index.php; root /var/www/friendica; - rewrite ^ https://friendica.example.net$request_uri? permanent; + rewrite ^ https://$server_name$request_uri? permanent; } ## @@ -51,8 +51,6 @@ server { listen 443 ssl; server_name friendica.example.net; - ssl on; - #Traditional SSL ssl_certificate /etc/nginx/ssl/friendica.example.net.chain.pem; ssl_certificate_key /etc/nginx/ssl/example.net.key; @@ -84,14 +82,14 @@ server { # rewrite to front controller as default rule location / { - try_file $uri /index.php?pagename=$uri&$args; + try_files $uri /index.php?pagename=$uri&$args; } # make sure webfinger and other well known services aren't blocked # by denying dot files and rewrite request to the front controller location ^~ /.well-known/ { allow all; - try_files $uri /index.php?pagename=$uri&$args; + rewrite ^ /index.php?pagename=$uri; } include mime.types; @@ -122,11 +120,14 @@ server { # fastcgi_pass 127.0.0.1:9000; # With php7.0-fpm: - fastcgi_pass unix:/var/run/php/php7.0-fpm.sock; + fastcgi_pass unix:/var/run/php/php7.4-fpm.sock; include fastcgi_params; fastcgi_index index.php; fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; + + fastcgi_buffers 16 16k; + fastcgi_buffer_size 32k; } # block these file types @@ -138,4 +139,9 @@ server { location ~ /\. { deny all; } + + # deny access to the CLI scripts + location ^~ /bin { + deny all; + } }