X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=mods%2Fsample-nginx.config;h=829bfc70af40c74f605c6b8e63fd758129be94b9;hb=8ad523fbc8e346cd21f60e69ef27d3ab039abbe1;hp=0fb31efffc0a042cdc8ea916c3177f0046c6b307;hpb=ca163021116423f9399233c5df52c9d3d7945a8d;p=friendica.git diff --git a/mods/sample-nginx.config b/mods/sample-nginx.config index 0fb31efffc..829bfc70af 100644 --- a/mods/sample-nginx.config +++ b/mods/sample-nginx.config @@ -6,8 +6,9 @@ # /etc/nginx/sites-available # # Then customize to your needs. To enable the configuration -# symlink it to /etc/nginx/sites-enabled and reload Nginx -# using /etc/init.d/nginx reload +# symlink it to /etc/nginx/sites-enabled and reload Nginx using +# +# service nginx reload ## ## @@ -22,16 +23,18 @@ ## # This configuration assumes your domain is example.net # You have a separate subdomain friendica.example.net -# You want all friendica traffic to be https +# You want all Friendica traffic to be https # You have an SSL certificate and key for your subdomain # You have PHP FastCGI Process Manager (php5-fpm) running on localhost -# You have Friendica installed in /mnt/friendica/www +# You have Friendica installed in /var/www/friendica ## server { + listen 80; server_name friendica.example.net; + index index.php; - root /mnt/friendica/www; + root /var/www/friendica; rewrite ^ https://friendica.example.net$request_uri? permanent; } @@ -48,41 +51,52 @@ server { listen 443 ssl; server_name friendica.example.net; - index index.php; - root /mnt/friendica/www; - ssl on; + + #Traditional SSL ssl_certificate /etc/nginx/ssl/friendica.example.net.chain.pem; ssl_certificate_key /etc/nginx/ssl/example.net.key; + + # If you have used letsencrypt as your SSL provider, remove the previous two lines, and uncomment the following two (adjusting the path) instead. + # ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem; + # ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem; + ssl_session_timeout 5m; - ssl_protocols SSLv3 TLSv1; - ssl_ciphers ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP; + ssl_protocols TLSv1 TLSv1.1 TLSv1.2; + ssl_ciphers ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS; ssl_prefer_server_ciphers on; + fastcgi_param HTTPS on; + + index index.php; + charset utf-8; + root /var/www/friendica; + access_log /var/log/nginx/friendica.log; + #Uncomment the following line to include a standard configuration file + #Note that the most specific rule wins and your standard configuration + #will therefore *add* to this file, but not override it. + #include standard.conf # allow uploads up to 20MB in size client_max_body_size 20m; client_body_buffer_size 128k; # rewrite to front controller as default rule location / { - rewrite ^/(.*) /index.php?q=$uri&$args last; + if (!-e $request_filename) { + rewrite ^(.*)$ /index.php?pagename=$1; + } } # make sure webfinger and other well known services aren't blocked # by denying dot files and rewrite request to the front controller location ^~ /.well-known/ { allow all; - rewrite ^/(.*) /index.php?q=$uri&$args last; + if (!-e $request_filename) { + rewrite ^(.*)$ /index.php?pagename=$1; + } } - # statically serve these file types when possible - # otherwise fall back to front controller - # allow browser to cache them - # added .htm for advanced source code editor library - location ~* \.(jpg|jpeg|gif|png|css|js|htm|html)$ { - expires 30d; - try_files $uri /index.php?q=$uri&$args; - } + include mime.types; # block these file types location ~* \.(tpl|md|tgz|log|out)$ { @@ -90,17 +104,28 @@ server { } # pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000 + # or a unix socket location ~* \.php$ { - fastcgi_split_path_info ^(.+\.php)(/.+)$; + # Zero-day exploit defense. + # http://forum.nginx.org/read.php?2,88845,page=3 + # Won't work properly (404 error) if the file is not stored on this + # server, which is entirely possible with php-fpm/php-fcgi. + # Comment the 'try_files' line out if you set up php-fpm/php-fcgi on + # another machine. And then cross your fingers that you won't get hacked. + try_files $uri =404; + # NOTE: You should have "cgi.fix_pathinfo = 0;" in php.ini + fastcgi_split_path_info ^(.+\.php)(/.+)$; # With php5-cgi alone: # fastcgi_pass 127.0.0.1:9000; - # With php5-fpm: - fastcgi_pass unix:/var/run/php5-fpm.sock; - fastcgi_index index.php; + # With php7.0-fpm: + fastcgi_pass unix:/var/run/php/php7.0-fpm.sock; + include fastcgi_params; + fastcgi_index index.php; + fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; } # deny access to all dot files @@ -108,4 +133,3 @@ server { deny all; } } -