2015-08-23 22:38:18 +02:00
|
|
|
##
|
|
|
|
# Red Nginx configuration
|
|
|
|
# by Olaf Conradi
|
|
|
|
#
|
|
|
|
# On Debian based distributions you can add this file to
|
|
|
|
# /etc/nginx/sites-available
|
|
|
|
#
|
|
|
|
# Then customize to your needs. To enable the configuration
|
|
|
|
# symlink it to /etc/nginx/sites-enabled and reload Nginx using
|
|
|
|
#
|
|
|
|
# service nginx reload
|
|
|
|
##
|
|
|
|
|
|
|
|
##
|
|
|
|
# You should look at the following URL's in order to grasp a solid understanding
|
|
|
|
# of Nginx configuration files in order to fully unleash the power of Nginx.
|
|
|
|
#
|
|
|
|
# http://wiki.nginx.org/Pitfalls
|
|
|
|
# http://wiki.nginx.org/QuickStart
|
|
|
|
# http://wiki.nginx.org/Configuration
|
|
|
|
##
|
|
|
|
|
|
|
|
##
|
|
|
|
# This configuration assumes your domain is example.net
|
|
|
|
# You have a separate subdomain red.example.net
|
|
|
|
# You want all red traffic to be https
|
|
|
|
# You have an SSL certificate and key for your subdomain
|
|
|
|
# You have PHP FastCGI Process Manager (php5-fpm) running on localhost
|
|
|
|
# You have Red installed in /var/www/red
|
|
|
|
##
|
|
|
|
|
|
|
|
server {
|
|
|
|
listen 80;
|
|
|
|
server_name red.example.net;
|
|
|
|
|
|
|
|
index index.php;
|
|
|
|
root /var/www/red;
|
|
|
|
rewrite ^ https://red.example.net$request_uri? permanent;
|
|
|
|
}
|
|
|
|
|
|
|
|
##
|
|
|
|
# Configure Red with SSL
|
|
|
|
#
|
|
|
|
# All requests are routed to the front controller
|
|
|
|
# except for certain known file types like images, css, etc.
|
|
|
|
# Those are served statically whenever possible with a
|
|
|
|
# fall back to the front controller (needed for avatars, for example)
|
|
|
|
##
|
|
|
|
|
|
|
|
server {
|
|
|
|
listen 443 ssl;
|
|
|
|
server_name red.example.net;
|
|
|
|
|
|
|
|
ssl on;
|
|
|
|
ssl_certificate /etc/nginx/ssl/red.example.net.chain.pem;
|
|
|
|
ssl_certificate_key /etc/nginx/ssl/example.net.key;
|
|
|
|
ssl_session_timeout 5m;
|
|
|
|
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
|
|
|
ssl_ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-DSS-AES128-SHA256:DHE-DSS-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!DHE-RSA-AES128-GCM-SHA256:!DHE-RSA-AES256-GCM-SHA384:!DHE-RSA-AES128-SHA256:!DHE-RSA-AES256-SHA:!DHE-RSA-AES128-SHA:!DHE-RSA-AES256-SHA256:!DHE-RSA-CAMELLIA128-SHA:!DHE-RSA-CAMELLIA256-SHA;
|
|
|
|
ssl_prefer_server_ciphers on;
|
|
|
|
|
|
|
|
fastcgi_param HTTPS on;
|
|
|
|
|
|
|
|
index index.php;
|
|
|
|
charset utf-8;
|
|
|
|
root /var/www/red;
|
|
|
|
access_log /var/log/nginx/red.log;
|
|
|
|
#Uncomment the following line to include a standard configuration file
|
|
|
|
#Note that the most specific rule wins and your standard configuration
|
|
|
|
#will therefore *add* to this file, but not override it.
|
|
|
|
#include standard.conf
|
|
|
|
# allow uploads up to 20MB in size
|
|
|
|
client_max_body_size 20m;
|
|
|
|
client_body_buffer_size 128k;
|
|
|
|
|
|
|
|
# rewrite to front controller as default rule
|
|
|
|
location / {
|
|
|
|
if ($is_args != "") {
|
|
|
|
rewrite ^/(.*) /index.php?q=$uri&$args last;
|
|
|
|
}
|
|
|
|
rewrite ^/(.*) /index.php?q=$uri last;
|
|
|
|
}
|
|
|
|
|
|
|
|
# make sure webfinger and other well known services aren't blocked
|
|
|
|
# by denying dot files and rewrite request to the front controller
|
|
|
|
location ^~ /.well-known/ {
|
|
|
|
allow all;
|
|
|
|
rewrite ^/(.*) /index.php?q=$uri&$args last;
|
|
|
|
}
|
|
|
|
|
|
|
|
# statically serve these file types when possible
|
|
|
|
# otherwise fall back to front controller
|
|
|
|
# allow browser to cache them
|
|
|
|
# added .htm for advanced source code editor library
|
2017-02-05 16:11:01 +01:00
|
|
|
location ~* \.(jpg|jpeg|gif|png|ico|css|js|htm|html|map|ttf|woff|woff2|svg)$ {
|
2015-08-23 22:38:18 +02:00
|
|
|
expires 30d;
|
|
|
|
try_files $uri /index.php?q=$uri&$args;
|
|
|
|
}
|
|
|
|
|
|
|
|
# block these file types
|
|
|
|
location ~* \.(tpl|md|tgz|log|out)$ {
|
|
|
|
deny all;
|
|
|
|
}
|
|
|
|
|
|
|
|
# pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000
|
|
|
|
# or a unix socket
|
|
|
|
location ~* \.php$ {
|
|
|
|
# Zero-day exploit defense.
|
|
|
|
# http://forum.nginx.org/read.php?2,88845,page=3
|
|
|
|
# Won't work properly (404 error) if the file is not stored on this
|
|
|
|
# server, which is entirely possible with php-fpm/php-fcgi.
|
|
|
|
# Comment the 'try_files' line out if you set up php-fpm/php-fcgi on
|
|
|
|
# another machine. And then cross your fingers that you won't get hacked.
|
|
|
|
try_files $uri =404;
|
|
|
|
|
|
|
|
# NOTE: You should have "cgi.fix_pathinfo = 0;" in php.ini
|
|
|
|
fastcgi_split_path_info ^(.+\.php)(/.+)$;
|
|
|
|
|
|
|
|
# With php5-cgi alone:
|
|
|
|
# fastcgi_pass 127.0.0.1:9000;
|
|
|
|
|
|
|
|
# With php5-fpm:
|
|
|
|
fastcgi_pass unix:/var/run/php5-fpm.sock;
|
|
|
|
|
|
|
|
include fastcgi_params;
|
|
|
|
fastcgi_index index.php;
|
|
|
|
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
|
|
|
|
}
|
|
|
|
|
|
|
|
# deny access to all dot files
|
|
|
|
location ~ /\. {
|
|
|
|
deny all;
|
|
|
|
}
|
|
|
|
|
|
|
|
#deny access to store
|
|
|
|
|
|
|
|
location ~ /store {
|
|
|
|
deny all;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
}
|